• Title/Summary/Keyword: wireless application

Search Result 1,722, Processing Time 0.028 seconds

A study on RFID technology and application of China (중국의 RFID 기술과 응용에 대한 고찰)

  • Li, Peng;Zhang, Yu;Shin, Yun-Ho;Shin, Hyun-Sik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.2
    • /
    • pp.330-336
    • /
    • 2011
  • RFID is the item is at the core of the Internet, promoting action in the online community is a pivotal element. RFID uses radio frequency waves to automatically find the technology to track individuals and items referring to the short-range wireless technology can be included. For example, ZigBee and Bluetooth has a strong ability to track and calculate. In this study, major advances in this technology by analyzing the techniques of intensive discussions, the current progress of mankind, and the impact on the future direction of development is included.

Design and Evaluation of a Dynamic Anomaly Detection Scheme Considering the Age of User Profiles

  • Lee, Hwa-Ju;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.18 no.2
    • /
    • pp.315-326
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents a dynamic anomaly detection scheme that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with both the age of the user profile and weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed dynamic scheme that considers the age of user profiles.

  • PDF

An Efficient Key Management Scheme in Tactical Ad-Hoc Network (전술 Ad-hoc 네트워크에서의 효율적인 키 관리 기법)

  • Kim, Eun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.3
    • /
    • pp.317-324
    • /
    • 2009
  • Tactical Information Communication Network(TICN) uses both a wireless and wired network. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. However, Ad-hoc network is faced to many security threats due to its intrinsic characteristics. Therefore, to apply the Ad-hoc networking technology to battlefield environments and TICN, an intensive study on security countermeasure must go side by side with the development of enabling technology. In this paper, we suggest an efficient key management scheme for TICN of which the Ad-hoc networking technology is applied.

A Formula Derivation of Channel Capacity Calculation in a MIMO System

  • Kabir, S.M.Humayun;Lee, Eun-Ju;Yoon, Gi-Wan
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.182-184
    • /
    • 2009
  • In this letter, we derive a tight closed-form formula for an ergodic capacity of a multiple-input multiple-output (MIMO) for the application of wireless communications. The derived expression is a simple closed-form formula to determine the ergodic capacity of MIMO systems. Assuming the channels are independent and identically distributed (i.i.d.) Rayleigh flat-fading between antenna pairs, the ergodic capacity can be expressed in a closed form as the finite sum of exponential integrals.

Four-armed Dual-band Rectangular Patch Antenna Design

  • Maharjan, Ram Krishna;Shrestha, Bhanu;Ch, Zorigt;Kim, Nam-Young
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2010.06a
    • /
    • pp.342-342
    • /
    • 2010
  • This paper mainly focuses and describes four-armed dual-band rectangular type patch antenna using teflon of 0.54 mm thickness substrate for the application in personal wireless communications at about 2 GHz and 2.5 GHz frequency ranges. The dual-band patch antenna is obtained by embedding one centered and two pairs of rectangular patches on single body above the substrate. Details of the proposed antenna design are presented and discussed as a novel design with remarkable value of return loss (S11) of -28.68 dB and it is the most suitable for WiMAX applications as well.

  • PDF

Design and Implementation of Security Integration Framework for Secure Mobile RFID Service Network (안전한 모바일 RFID 서비스 네트워크를 위한 보안 통합 프레임워크의 설계 및 구현)

  • Park, Nam-Je;Chung, Kyo-Il
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.63-64
    • /
    • 2008
  • The mobile RFID (Radio Frequency Identification) is a new application to use mobile phone as RFID reader with a wireless technology and provides new valuable services to user by integrating RFID and ubiquitous sensor network infrastructure with mobile communication and wireless internet. However, there are an increasing number of concerns, and even some resistances, related to consumer tracking and profiling using RFID technology. Therefore, in this paper, we describe the security analysis and implementation leveraging globally networked mobile RFID services which complies with the Korea's mobile RFID forum standard.

  • PDF

Small-Sized High-Power PIN Diode Switch with Defected Ground Structure for Wireless Broadband Internet

  • Kim, Dong-Wook
    • ETRI Journal
    • /
    • v.28 no.1
    • /
    • pp.84-86
    • /
    • 2006
  • This letter presents a small-sized, high-power single-pole double-throw (SPDT) switch with defected ground structure (DGS) for wireless broadband Internet application. To reduce the circuit size by using a slow-wave characteristic, the DGS is used for the quarter-wave (${\lambda}$/4) transmission line of the switch. To secure a high degree of isolation, the switch with DGS is composed of shunt-connected PIN diodes. It shows an insertion loss of 0.8 dB, an isolation of 50 dB or more, and power capability of at least 50 W at 2.3 GHz. The switch shows very similar performance to the conventional shunt-type switch, but the circuit size is reduced by about 50% simply with the use of DGS patterns.

  • PDF

A Software Architecture for Highly Reconfigurable Sensor Operating Systems (재구성 가능한 고성능 센서 운영체제를 위한 소프트웨어 아키텍처 설계)

  • Kim, Tae-Hwan;Kim, Hie-Cheol
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.4
    • /
    • pp.242-250
    • /
    • 2007
  • Wireless sensor networks are subject to highly heterogeneous system requirements in terms of their functionality and performance due to their broad application areas. Though the heterogeneity hinders the opportunity of developing a single universal platform for sensor networks, efforts to provide uniform, inter-operable and scalable ones for sensor networks are still essential for the growth of the industry as well as their technological advance. As a part of our work to develop such a robust platform, this paper presents the software architecture for sensor nodes with focus on our sensor node operating system and its configuration methodology. Addressing principle issues in its design space which includes programming, execution, task scheduling and software layer models, our architecture is highly reconfigurable with respect to system resources and functional requirements and also highly efficient in supporting multi-threading under small system resources.

  • PDF

Delay Analysis for Packet Forward Scheme in Wireless Packet Networks

  • Koh, Seung-Kwang;Park, Cheon-Won
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.121-124
    • /
    • 1999
  • In a packet-switched wireless cellular network, a packet destined to a mobile station is queued at a base station and then broadcast over the base station's cell. When an active mobile station leaves a cell, there re-main packets which are destined to the mobile and not yet delivered to it at the cell's base station. For application which are sensitive to packet losses, such back- logged packets must be forwarded to the new base station. Otherwise, an end-to-end retransmission may be required. However, an increase in packet delay is incurred by employing the packet forward scheme, since a packet may be forwarded many times before it is delivered to the destined mobile station. For an enhanced quality-of-service level, it is preferred to reduce tile packet delay time. In this paper, we develop an analytical approximation method for deriving mean packet delay times. Using the approximation and simulation methods, we investigate the effect of network parameters on the packet delay time.

  • PDF

Realization of Water AMR Network using ZigBee Protocol (ZigBee 무선표준을 이용한 상수도 원격검침 네트워크 구현)

  • Kwon, Jong-Won;Park, Yong-Man;Odgerel, Odgerel;Kim, Hie-Sik
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.168-170
    • /
    • 2006
  • In this paper, authors realize water AMR(Automatic Meter Reading) network using low power ZigBee protocol included routing ability for improving wireless communitation error detection and network range. ZigBee wireless standard is an important standard of the field related Ubiquitous industry and recently has application to Home-Network. It's special features are to spend low power and to include routing ability each terminator. Because of these features, authors realize water AMR system on Embedded system using ZigBee protocol for applying to transfer data between a water meter and RF module equipped with a water meter in each house.

  • PDF