• Title/Summary/Keyword: wireless application

Search Result 1,722, Processing Time 0.038 seconds

Implementation of Smart Convergent Communication System of Satellite and Wireless for Monitoring in Closed Room of Vessel (선박의 밀폐된 선내에서 해상관제를 위한 스마트 위성·무선 복합통신시스템 구현)

  • Park, Heum;Lee, Chang Bum;An, Sung Mun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1853-1858
    • /
    • 2015
  • The existence communications of vessel focused on voice, FAX, ISDN, etc. using satellite on the existent most communications on the ships, and recently, the ships need high quality smart communication service environments. In the results of experiments using the existent system, it could access on board, but in the closed room of vessel, was impossible to access e-mail and smart apps except voice communication. In the present paper, we implemented a novel communication system that can access voice, text, e-mail, file, vessel monitoring apps, etc. It consists of a convergent communication terminal combined with satellite and communication for Smartphone, and smart communication environment on the closed room. As the results, we can access a variety of smart communication in anywhere on board.

Indoor Precise Positioning Technology for Vehicles Using Floor Marks (플로어 마크를 이용한 차량용 실내 정밀 측위 기술)

  • Park, Ji-hoon;Lee, Jaesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2321-2330
    • /
    • 2015
  • A variety of studies for indoor positioning are now being in progress due to the limit of GPS that becomes obsolete in the room. However, most of them are based on private wireless networks and the situation is difficult to commercialize them since they are expensive in terms of installation and maintenance costs, non-real-time, and not accurate. This paper applies the mark recognition algorithm used in existing augmented reality applications to the indoor vehicle positioning application. It installs floor marks on the ground, performs the perspective transformation on it and decodes the internal data of the mark and, as a result, it obtains an absolute coordinate. Through the geometric analysis, it obtains current position (relative coordinates) of a vehicle away from the mark and the heading direction of the vehicle. The experiment results show that when installing the marks every 5 meter, an error under about 30 cm occurred. In addition, it is also shown that the mark recognition rate is 43.2% of 20 frames per second at the vehicle speed of 20km/h. Thus, it is thought that this idea is commercially valuable.

LED IT-based System sensor network transceiver module research (LED IT 기반 시스템 센서 네트워크 송수신 모듈 연구)

  • Jang, Tae-Su;Lee, Jun-Myung;Choi, Jung-Won;Kim, Yong-kab
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.11-12
    • /
    • 2012
  • In this paper, efficient visible light communication technology LED (Light Emitting Diode) lighting through the existing infrared sensor used for performance analysis of transmitting and receiving is possible. LED utilizes lighting by changing light into electricity. Lighting features while maintaining the basic principles of flashing LED and PD (Photo Diode) to send and receive communications from LED lighting communication convergence principle be realized simultaneously enabling. Multiple IT applications under the basic structure of LED technology development, and the current was encountered in real life. LED lighting anywhere with wireless communication technology that can, in order to ~ 1m above the initial value by taking advantage of the system H/W and infrared sensors(PD) are widely used in the entire system that can improve the speed of visible light data transmission system is finished. LED module that is used to communicate whether the performance analysis, For forecasting and communication distance on the LED and infrared sensor configuration of the implementation of the research is to study about the possibility of application methods and indicates.

  • PDF

An Active Network Execution Environment for on Demand Customization of Communication Protocols and Services (맞춤형 통신 프로토콜과 서비스를 위한 액티브 네트워크 실행환경)

  • Lee Hwa Young;Kang Bo-young;Lim Kyungshik
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.937-950
    • /
    • 2004
  • In this paper, we present the design and implementation of new execution environment named Customizable Architecture for Flexible Execution Environment(CAFEs) that supports the mechanism of protocol customization and service referencing. We introduce a new concept as micro protocols and active services to enhance software reusability. Micro protocol represents a specific algorithm or functionality of existing network protocol and the active service is in charge of binding legacy application and releasing the active network oriented services. The pro-posed active network execution environment is made up of three parts, virtual network system, protocol and service manager, event engine. First, the virtual network system is used to connect each active nodes using virtual network channels which are based on multiple existing protocol layers. Second, the protocol and service manager is responsible for composing micro protocols and active services to develop new network proto-col and service easily. Finally, the event engine is used to detect the automatic transition of system components using event delegation model. To verify the CAFTs, we have an experiment about the delivery of web contents which are suitable for the user's terminals in the wireless Internet environment. As a result. we are able to obtain the availability of developed execution environment.

The Measurement Method of CO2 Emission for Construction Equipment using ZigBee Sensor (ZigBee 센서를 활용한 건설장비의 CO2 배출량 측정방법)

  • Chun, Jin-Ku;Kim, Byung-Soo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.32 no.2D
    • /
    • pp.167-174
    • /
    • 2012
  • Recently, the effort to reduce $CO_2$ emission concerning certified emission reductions (CERs) is progressing lively with the institute in the center through lifecycle. However, the technique for reduce $CO_2$ emission is the first stage yet and the technique is insufficient to calculate with accuracy it. Therefore, this study tries to develop the method to measure by actual time $CO_2$ emission of construction equipment using Zigbee sensor. To review the method that calculate $CO_2$ emission, have classified the impact factors that affect at $CO_2$ emission by IPCC guideline. It also has review the application of Zigbee sensor that use wireless data communication. The reviewed result get that the measuring objects are the $CO_2$ emssion, RPM and fuel consumption of equipment, there are needs to search the year of equipment, waiting time, kind of vehicle and fuel that affect to $CO_2$ emission.

Interworking of SIP Authentication with DIAMETER and Security Analysis (SIP와 DIAMETER의 인증 연동 및 안전성 분석)

  • 박성준;정수환;이병길;김현곤
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3C
    • /
    • pp.426-435
    • /
    • 2004
  • The DIAMETER protocol provides Authentication, Authorization, and Accounting (AAA) transactions across the Internet. SIP(Session Initiation Protocol) will be used for new types of signaling, such as instant messaging and application level mobility across networks. And SIP will be a major signaling protocol for next generation wireless networks. But the Digest authentication scheme is not using a secure method of user authentication in SIP, and it is vulnerable to man-in-the-middle attacks or dictionary attacks. This study focused on designing a SIP proxy for interworking with AAA server with respect to user authentication and security analysis. We compared and analyzed the security aspects of the scenarios and propose two proposals that a response which include the user address and password-based mutual authentication and key agreement protocol. It is claimed to be more secure against common attacks than current scenarios.

Information and Communication Management Systems (ICMS) in India -Connecting the Resource Poor Farmers to Knowledge and Institutions

  • Mudda, Suresh K;Ravikumar, NK;Giddi, Chitti B
    • Agribusiness and Information Management
    • /
    • v.8 no.1
    • /
    • pp.1-10
    • /
    • 2016
  • Information and communication technologies (ICTs) have always mattered in agriculture too. In day-to-day practices of agriculture and allied sectors, the farmers often share their information. Changing weather patterns, soil conditions, pests and diseases always throw challenges to small and marginal farmers. So, the farmer needs up-dated information to cope with and even benefit from these changes. In the developing countries like India, where agriculture still plays a crucial role (over 58% of the rural households depend on agriculture as their livelihood) and the rising population from 1027 million to 1419 million during 2001-16 (a total rise of 38 percent or 1.3 percent per year) pose a lot of pressure on land and other resources to meet the food security needs on one hand and to meet the challenges of globalization on the other. Understanding and addressing these challenges are very crucial, in which ICT can play a major role. With the booming mobile, wireless, and Internet industries, ICT has found a foothold even in poor marginal and smallholder farms and in their activities. The survey conducted among the 120 farmers in Srikakulam district in India revealed that, ICT has revolutionized the agriculture in the modern days. Production and marketing information is accessed by 91% of the sample farmers through mobile in 2015, where it was only 5% in 2005. The extent of use of mobile phones by the farmers varied with the decision to be taken by them like Harvesting, packing, and storing (94%), Selling Decision (91%), Seed purchase (89%), Application of fertilizers and pesticides (88%) and Land preparation and planting (84%), other package of practices (77%). The farmers further opined that, 'Voice' was the dominating source of communication (96%) compared to Short Message Service (SMS) (only 27%) and Internet access (10%), as majority are illiterate. The use of camera (71%), Bluetooth (33%), Radio (61%) TV (41%) are the other means of sharing the information. In this context of importance of ICTs in Indian agriculture, greater attention justifies about the applications of ICT's to alleviate poverty and promote economic growth of the farming population.

Field Application of a Cable NDT System for Cable-Stayed Bridge Using MFL Sensors Integrated Climbing Robot (누설자속센서를 탑재시킨 이동로봇을 이용한 사장교 케이블 비파괴검사 시스템의 현장 적용)

  • Kim, Ju-Won;Choi, Jun-Sung;Lee, Eun-Chan;Park, Seung-Hee
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.34 no.1
    • /
    • pp.60-67
    • /
    • 2014
  • In this study, an automated cable non-destructive testing(NDT) system was developed to monitor the steel cables that are a core component of cable-stayed bridges. The magnetic flux leakage(MFL) method, which is suitable for ferromagnetic continuum structures and has been verified in previous studies, was applied to the cable inspection. A multi-channel MFL sensor head was fabricated using hall sensors and permanent magnets. A wheel-based cable climbing robot was fabricated to improve the accessibility to the cables, and operating software was developed to monitor the MFL-based NDT research and control the climbing robot. Remote data transmission and robot control were realized by applying wireless LAN communication. Finally, the developed element techniques were integrated into an MFL-based cable NDT system, and the field applicability of this system was verified through a field test at Seohae Bridge, which is a typical cable-stayed bridge currently in operation.

Design Procedure and Case Study for the Test Maturity Model of an Embedded Software(Emb-TMM) (임베디드 소프트웨어 테스트 성숙도 모델(Emb-TMM) 설계절차 및 사례연구)

  • Beak, Sang-Hoon;Yoon, Hee-Byung
    • Journal of the military operations research society of Korea
    • /
    • v.33 no.2
    • /
    • pp.49-60
    • /
    • 2007
  • Recently, the application area of an embedded software become larger and larger rapidly due to the development of the wire and wireless communication, the expansion of the digital information device and the convergence of the digital devices and emphasize the effort of the development of more complete software. As a consequence, the importance of the software test process was raised to discover the defects of the software early and improve the quality of an embedded software. However there was no test process model for applying the embedded software which is required the highly precision and the real-time process. In this paper, therefore, we propose the design procedure and case study for the test maturity model of an embedded software(Emb-TMM) which reflects the characteristics of the embedded software and test process. for this, we suggest the three category of the proposed procedure which consists of the selection of the reference model and the derivation of the area, the categorization of the area level, and design model. Then we suggest the case study how the proposed procedure can be applied to the development of an embedded software actually.

Context cognition technology through integrated cyber security context analysis (통합 사이버 보안 상황분석을 통한 관제 상황인지 기술)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.80-85
    • /
    • 2015
  • As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.