• Title/Summary/Keyword: wireless application

Search Result 1,722, Processing Time 0.029 seconds

L-shaped Slot Antenna for WLAN MIMO Application (무선랜 MIMO용 L-형 슬롯 안테나)

  • Song, Won-Ho;Nam, Ju-Yeol;Lee, Ki-Yong;Lee, Young-soon
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.4
    • /
    • pp.344-351
    • /
    • 2016
  • In the present study, a dual-band multiple-input-multiple-output (MIMO) antenna covering WLAN frequency bands of 2.4 GHz (2.4 ~ 2.484 GHz) and 5 GHz (5.15 ~ 5.825 GHz) is newly presented to avoid use of decoupling structure for increasing isolation. The antenna consists of two L-shaped slots with n-shaped slots etched on the floating ground plane surrounded by open ended L-shaped slots which are placed in the left and right corner of PCB respectively. The proposed antenna is designed and fabricated on one side of FR4 substrate with dielectric constant of 4.3, thickness of 1.6 mm, and size of $50{\times}50mm2$. It has been observed that the measured impedance bandwidths ($S_{11}{\leq}-10dB$) are 0.3 GHz (2.28 ~ 2.58 GHz) in 2.4 GHz frequency band and 0.89 GHz (5.11 ~ 6 GHz) in 5 GHz frequency band respectively. In addition, It has been observed that the whole efficiency are more than 80 % in the whole operating frequency band and envelope correlation coefficient of the antenna is less than 0.05 as a very small value in spite of nothing of the decoupling structure.

Disjointed Multipath Routing for Real-time Multimedia Data Transmission in Wireless Sensor Networks (무선 센서 네트워크 환경에서 실시간 멀티미디어 데이터 전송을 위한 비-중첩 다중 경로 라우팅)

  • Jo, Mi-Rim;Seong, Dong-Ook;Park, Jun-Ho;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.78-87
    • /
    • 2011
  • A variety of intelligent application using the sensor network system is being studied. In general, the sensor network consists of nodes which equipped with a variety of sensing module and is utilized to collect environment information. Recently, the demands of multimedia data are increasing due to the demands of more detailed environmental monitoring or high-quality data. In this paper, we overcome the limitations of low bandwidth in Zigbee-based sensor networks and propose a routing algorithm for real-time multimedia data transmission. In the previously proposed algorithm for multimedia data transmission occurs delay time of routing setup phase and has a low data transmission speed due to bandwidth limitations of Zigbee. In this paper, we propose the hybrid routing algorithm that consist of Zigbee and Bluetooth and solve the bandwidth problem of existing algorithm. We also propose the disjointed multipath setup algorithm based on competition that overcome delay time of routing setup phase in existing algorithm. To evaluate the superiority of the proposed algorithm, we compare it with the existing algorithm. Our experimental results show that the latency was reduced by approximately 78% and the communication speed is increased by approximately 6.9-fold.

An Efficient Data Centric Storage Scheme with Non-uniformed Density of Wireless Sensor Networks (센서의 불균일한 배포밀도를 고려한 효율적인 데이터 중심 저장기법)

  • Seong, dong-ook;Lee, seok-jae;Song, seok-il;Yoo, jae-soo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.135-139
    • /
    • 2007
  • Recently Data Centric Storage (DCS) schemes are variously studied for several applications (e.g. natural environment investigation, military application systems and environmental changes monitoring). In DCS scheme, data is stored at nodes within the network by name. There are several drawbacks in the existing schemes. The first is the inefficiency of the range query processing on not considered the locality of store point. the second is the non-homogeneity of store load of each sensors in case of the sensor distribution density is non-uniformed. In this paper, we propose a novel data centric storage scheme with the sensor distribution density which satisfied with the locality of data store location. This scheme divides whole sensor network area using grid and distributes the density bit map witch consist of the sensor density information of each cell. sensors use the density bit map for storing and searching the data. We evaluate our scheme with existing schemes. As a result, we show improved load balancing and more efficient range query processing than existing schemes in environment which sensors are distributed non-uniform.

  • PDF

A Network-adaptive Context Extraction Method for JPEG2000 Using Tree-Structure of Coefficients from DWT (DWT 계수의 트리구조를 이용한 네트워크-적응적 JPEG2000 컨텍스트 추출방법)

  • Choi Hyun-Jun;Seo Young-Ho;Kim Dong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9C
    • /
    • pp.939-948
    • /
    • 2005
  • In EBCOT, the context extraction process takes excessive calculation time and this paper proposed a method to reduce this calculation time. That is, if a coefficient is less than a pre-defined threshold value the coefficient and its descendents skip the context extraction process. There is a trade-off relationship between the calculation time and the image quality or the amount of output data such that as this threshold value increases, the calculation time and the amount of output data decreases, but the image degradation increases. Therefore, by deciding this threshold value according to the network environments or conditions, it is possible to establish a network-adaptive context extraction method. The experimental results showed that the range of the threshold values for acceptable image quality(better than 30dB) is from 0 to 4. The experimental results showed that in this range the Resulting reduction rate in calculation time was from $3\%\;to\;64\%$ in average, the reduction rate in output data was from $32\%$ to $73\%$ in average, which means that large reduction in calculation time and output data can be obtained with a cost of an acceptable image quality degradation. Therefore, the proposed method is expected to be used efficiently in the application area such as the real-time image/video data communication in wireless environments, etc.

Development and Verification of A Module for Positioning Buried Persons in Collapsed Area (붕괴지역의 매몰자 위치측위를 위한 모듈 개발 및 검증)

  • Moon, Hyoun-Seok;Lee, Woo-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.12
    • /
    • pp.427-436
    • /
    • 2016
  • Due to disasters such as earthquakes and landslides in urban areas, persons have been buried inside collapsed buildings and structures. Rescuers have mainly utilized detection equipment by applying sound, video and electric waves, but these are expensive and due to the directional approaches onto the collapsed site, secondary collapse risk can arise. In addition, due to poor utilization of such equipment, new human detection technology with quick and high reliability has not been utilized. To address these issues, this study develops a wireless signal-based human detection module that can be loaded into an Unmanned Aerial Vehicle (UAV). The human detection module searches for the 3D location for buried persons by collecting Wi-Fi signal and barometer sensors data transmitted from the mobile phones. This module can gain diverse information from mobile phones for buried persons in real time. We present a development framework of the module that provides 3D location data with more reliable information by delivering the collected data into a local computer in the ground. This study verified the application feasibility of the developed module in a real collapsed area. Therefore, it is expected that these results can be used as a core technology for the quick detection of buried persons' location and for relieving them after disasters that induce building collapses.

Design of Personalization Service System in Mobile GIS (모바일 GIS에서의 개인화 서비스 시스템 설계)

  • Park, Key-Ho;Jung, Jae-Gon
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2008.10a
    • /
    • pp.106-112
    • /
    • 2008
  • Personalization is user oriented dynamic method based on user preferences for easy access to what users want to view or get. It has become more important in mobile domain with rapid growth of wireless Internet and mobile phone market after success of web based market and therefore, it can be applied to service of spatial analysis result. In this paper, spatial analysis using user profile and notification service methods are proposed as one of personalized spatial data service methods for mobile users. A service system for spatial analysis with user profile is designed to prove possibility of spatial analysis based on user preferences and notification service is also designedto show generated output can be sent to user's mobile devices efficiently to make users informed of preferred information. Prototype system is implemented and it is applied to real estate data that has many selectable conditions by users. Information service based on user preferences can be applied to spatial data by using proposed system and it is efficient when cache module is used to shorten response time. Various user models for application domains and performance evaluation methods need to be developed in the future.

  • PDF

Model Verification of a Safe Security Authentication Protocol Applicable to RFID System (RFID 시스템에 적용시 안전한 보안인증 프로토콜의 모델검증)

  • Bae, WooSik;Jung, SukYong;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.221-227
    • /
    • 2013
  • RFID is an automatic identification technology that can control a range of information via IC chips and radio communication. Also known as electronic tags, smart tags or electronic labels, RFID technology enables embedding the overall process from production to sales in an ultra-small IC chip and tracking down such information using radio frequencies. Currently, RFID-based application and development is in progress in such fields as health care, national defense, logistics and security. RFID structure consists of a reader that reads tag information, a tag that provides information and the database that manages data. Yet, the wireless section between the reader and the tag is vulnerable to security issues. To sort out the vulnerability, studies on security protocols have been conducted actively. However, due to difficulties in implementation, most suggestions are concerned with theorem proving, which is prone to vulnerability found by other investigators later on, ending up in many troubles with applicability in practice. To experimentally test the security of the protocol proposed here, the formal verification tool, CasperFDR was used. To sum up, the proposed protocol was found to be secure against diverse attacks. That is, the proposed protocol meets the safety standard against new types of attacks and ensures security when applied to real tags in the future.

A Study on the Relationship between Digital Informatization Level and Policy Activity Satisfaction Level of Disabled Persons (장애인들의 디지털정보화 수준과 정책활동 만족도 수준과의 관계에 대한 연구)

  • Lee, Hyangsoo;Lee, Seong-Hoon
    • Journal of Digital Convergence
    • /
    • v.16 no.4
    • /
    • pp.23-28
    • /
    • 2018
  • In recent years, activities have become more important in political activities and participation in policies. Therefore, the level of digital informatization can affect the participation in policy in the online environment. In this study, we examined how the policy activities of the disabled have a relationship with the informatization level. To this end, we analyzed the relationship between the level of digital informatization and the level of satisfaction with policy activities based on the results of the digital divide survey of 2017. The results of this study are as follows: First, it shows that the disabled people have a positive relationship with the digital access and policy activity satisfaction levels such as the possession of wired / wireless information devices and Internet accessibility. Second, it is found that digital information capacity level and income level such as PC utilization ability and mobile digital device utilization ability have a positive (+) relationship. Third, as the level of digital information utilization such as wired and mobile Internet usage increased, the level of satisfaction with policy activities also increased positively. This suggests that the government needs various information policy to increase the level of digital informatization of the disabled.

Mobility Management Method for Constrained Sensor Nodes in WoT Environment (WoT 환경에서 제한된 센서 노드의 이동성 관리 방법)

  • Chun, Seung-Man;Ge, Shu-Yuan;Park, Jong-Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.9
    • /
    • pp.11-20
    • /
    • 2014
  • For Web-based applications in IoT environment, IETF CoRE WG has standardizing the CoAP. One of limitations of CoAP is that CoAP standard does not consider the mobility management of the CoAP sensor node. In this paper, we propose the mobility management protocol of CoAP sensor node by considering the characteristics of the constrained network. The proposed mobility management protocol supports for Web client to be transmitted the sensing data from CoAP node reliably while the CoAP sensor moves into different wireless networks. To do this, we designed the architecture with the separate IP address management of CoAP sensor node and presented the mobility management protocol, which includes the holding and binding mode, in order to provide the reliable transmission. Finally, the numerical analysis and simulation with NS2 tool have been done for the performance evaluation in terms of the handover latency and packet loss with comparing the proposed mobility management protocol with other the existing mobility management protocols. The performance result shows that the proposed mobility management can provide the transmission of sensing data without the packet loss comparing with the existing mobility management protocol reliably.

Vehicle-to-Vehicle Broadcast Protocols Based on Wireless Multi-hop Communication (무선 멀티 홉 통신 기반의 차량간 브로드캐스트 프로토콜)

  • Han, Yong-Hyun;Lee, Hyuk-Joon;Choi, Yong-Hoon;Chung, Young-Uk
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.4
    • /
    • pp.53-64
    • /
    • 2009
  • Inter-vehicular communication that propagates information without infrastructures has drawn a lot of interest. However, it is difficult to apply conventional ad-hoc routing protocols directly in inter-vehicular communication due to frequent changes in the network topology caused by high mobility of the vehicles. MMFP(Multi-hop MAC Forwarding) is a unicast forwarding protocol that transport packets based on the reachability information instead of path selection or position information. However, delivering public safety messages informing road conditions such as collision, obstacles and fog through inter-vehicular communication requires broadcast rather than unicast since these messages contain information valuable to most drivers within a close proximity. Flooding is one of the simplest methods for multi-hop broadcast, but it suffers from reduced packet delivery-ratio and high transmission delay due to an excessive number of duplicated packets. This paper presents two multi-hop broadcast protocols for inter-vehicular communication that extend the MMFP. UMHB(Unreliable Multi-Hop Broadcast) mitigates the duplicated packets of MMFP by limiting the number of nodes to rebroadcast packets. UMHB, however, still suffers from low delivery ratio. RMHB(Reliable Multi-Hop Broadcast) uses acknowledgement and retransmission in order to improve the reliability of UMHB at the cost of increase in transmission delay, which we show through simulation is within an acceptable range for collision avoidance application.

  • PDF