• Title/Summary/Keyword: wireless applications

Search Result 1,697, Processing Time 0.035 seconds

Analysis of Energy Consumption and Processing Delay of Wireless Sensor Networks according to the Characteristic of Applications (응용프로그램의 특성에 따른 무선센서 네트워크의 에너지 소모와 처리 지연 분석)

  • Park, Chong Myung;Han, Young Tak;Jeon, Soobin;Jung, Inbum
    • Journal of KIISE
    • /
    • v.42 no.3
    • /
    • pp.399-407
    • /
    • 2015
  • Wireless sensor networks are used for data collection and processing from the surrounding environment for various applications. Since wireless sensor nodes operate on low computing power, restrictive battery capacity, and low network bandwidth, their architecture model has greatly affected the performance of applications. If applications have high computation complexity or require the real-time processing, the centralized architecture in wireless sensor networks have a delay in data processing. Otherwise, if applications only performed simple data collection for long period, the distributed architecture wasted battery energy in wireless sensors. In this paper, the energy consumption and processing delay were analyzed in centralized and distributed sensor networks. In addition, we proposed a new hybrid architecture for wireless sensor networks. According to the characteristic of applications, the proposed method had the optimal number of wireless sensors in wireless sensor networks.

A Function Point Model for Measuring the Development Cost of Information Services using Wireless Data Broadcast

  • Seokjin Im
    • International journal of advanced smart convergence
    • /
    • v.13 no.1
    • /
    • pp.12-22
    • /
    • 2024
  • Software applications have a huge and inseparable impact on our lives. The complexity of the applications increases rapidly to support high performance and multifunction. Accordingly, the cost model for applications is increasingly important. Line of Code (LOC) and Man-Month (M/M) as the cost model measure the quantitative sides of the applications. Unlike them, Function Point (FP) measures the functionalities of the application. FP is efficient for estimating qualitative characteristics, but it is restricted to measuring the cost of an application using the wireless data broadcast which can support any number of clients. In this paper, we propose, a Function Point model for Information services using wireles data Broadcast (FPIB) to measure the development cost of an application that serves using the wireless data broadcast environment. FPIB adopts critical parameters of the wireless broadcast environment and the complexity of them to measure effectively the cost developing the application. Through the evaluation comparing the proposed FPIB with FP, we reveal the effectiveness of the proposed FPIB.

The Impact of Wireless Data Technologies in New Zealand: A Study of New Zealand Small and Medium-Sized Enterprises

  • Barnes, Stuart J.
    • Proceedings of the CALSEC Conference
    • /
    • 2004.02a
    • /
    • pp.60-64
    • /
    • 2004
  • The rapidly improving price-performance of wireless technologies is providing an unprecedented platform for the development of wireless applications for the business. Such applications are able to take advantage of a new paradigm of mobility for data services, with the ability to sensitize to location, time and personal features. While big business has been a central feature of wireless implementation, it is now clear that small- and medium-sized enterprises (SMEs) are beginning to take advantage of the strategic benefits of wireless data communications. This study examines the state-of-the-art of wireless data services in New Zealand. It provides a survey of 127 current applications in use, as well as two short illustrative cases of application use. The paper rounds off with a summary and conclusions.

  • PDF

Extending Network Domain for IEEE1394

  • Lee, Seong-Hee;Park, Seong-Hee;Choi, Sang-Sung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.177-178
    • /
    • 2005
  • Wireless 1394 over IEEE802.15.3 must allow a data reserved for delivery over a wired 1394 network to be delivered over an IEEE802.15.3 wireless network through bridging IEEE 1394 to IEEE802.15.3. Isochronous transfers on the 1394 bus guarantee timely delivery of data. Specifically, isochronous transfers are scheduled by the bus so that they occur once every $125\;{\mu}s$ and require clock time synchronization to complete the real-time data transfer. IEEE1394.1 and Protocol Adaptation Layer for IEEE1394 over IEEE802.15.3 specify clock time synchronization for a wired 1394 bus network to a wired 1394 bus network and wireless 1394 nodes, which are IEEE802.15.3 nodes handling 1394 applications, over IEEE802.15.3. Thus, the clock time synchronizations are just defined within a homogeneous network environment like IEEE1394 or IEEE802.15.3 until now. This paper proposes new clock time synchronization method for wireless 1394 heterogeneous networks between 1394 and 802.15.3. If new method is adopted for various wireless 1394 products, consumer electronics devices such as DTV and Set-top Box or PC devices on a 1394 bus network can transmit real time data to the AV devices on the other 1394 bus in a different place via IEEE 802.15.3.

  • PDF

A Secure Network for Mobile Wireless Service

  • Peng, Kun
    • Journal of Information Processing Systems
    • /
    • v.9 no.2
    • /
    • pp.247-258
    • /
    • 2013
  • A new secure network communication technique that has been designed for mobile wireless services, is presented in this paper. Its network services are mobile, distributed, seamless, and secure. We focus on the security of the scheme and achieve anonymity and reliability by using cryptographic techniques like blind signature and the electronic coin. The question we address in this paper is, "What is the best way to protect the privacy and anonymity of users of mobile wireless networks, especially in practical applications like e-commerce?" The new scheme is a flexible solution that answers this question. It efficiently protects user's privacy and anonymity in mobile wireless networks and supports various applications. It is employed to implement a secure e-auction as an example, in order to show its advantages in practical network applications.

Experimental Interference Studies Between WCDMA and UWB System

  • Kim, Myung-Jong;Kim, Jae-Young;Kang, Young-Jin;Hong, Ic-Pyo
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.187-190
    • /
    • 2005
  • Ultra wideband (UWB) technologies have been developed to exploit a new spectrum resource in substances and to realize ultra-high-speed communication, high precision geolocation, and other applications. The energy of UWB signal is extremely spread from near DC to a few GHz. This means that the interference between conventional narrowband systems and UWB systems is inevitable. However, the interference effects had not previously been studied from UWB wireless systems to conventional mobile wireless systems sharing the frequency bands such as WCDMA system. This paper experimentally evaluates the interference from two kinds of UWB sources, namely a direct-sequence spread-spectrum UWB source and an impulse radio UWB source, to a WCDMA digital transmission system. The average frame error rate degradations are presented. From these experimental results, we show that in all practical cases UWB system can coexist with WCDMA terminal without causing any dangerous interference.

  • PDF

Silicon-Based Integrated Inductors for Wireless Applications

  • Kim, Bruce C.
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.389-393
    • /
    • 2003
  • This paper presents circuit modeling and characterization of silicon-based on-chip integrated inductors in Giga Hertz range for wireless communication products. We compare several different designs of on-chip inductors for self-resonant frequency and quality factor. The measurement data could be used as a design guide for manufacturing practical spiral inductors for wireless applications. We provide the equivalent inductor circuit parameters from the actual measurement data.

  • PDF

Wireless Power Transfer Technologies Trends (무선전력전송에 대한 기술 개발 동향)

  • Eom, T.Y.;Oh, C.S.;Park, S.J.
    • Journal of Energy Engineering
    • /
    • v.24 no.2
    • /
    • pp.174-178
    • /
    • 2015
  • We have surveyed on technical method of wireless power transfer and have also surveyed on applications of the wireless charging for mobiles and of the wireless charging for electrical vehicle and electrical equipments. In this study, we have described about wireless power transfer and have analyzed and checked wireless power transfer prospects of applications and practical development.

Throughput Analysis of Wireless Transmission Platform using Multiple Wireless Chips for M2M Networks (M2M 어플리케이션 지원을 위한 무선 결합 전송 플랫폼의 전송률 분석)

  • Wang, Hanho;Woo, Choongchae
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.63 no.3
    • /
    • pp.195-199
    • /
    • 2014
  • Various M2M applications have different quality-of-service(QoS) requirements to be implemented practically. QoS requirements are normally data rate and delay constraint. However, there are limited number of wireless communication chip solutions which cannot support QoS requirements for all M2M application. Hence, aggregated usage of plural wireless communication chip solutions should be needed to implement M2M applications. In this paper, we consider the case that two wireless communication chips using random access protocol work together to transmit data of an M2M application. In such case, data rate and delay performance are mathematically analyzed. In our results, practical data rate can be improved from 2.5 to 7 times while delay constraints are satisfied if we simply use two wireless communication chips together.

A Survey on Key Management Strategies for Different Applications of Wireless Sensor Networks

  • Raazi, Syed Muhammad Khaliq-Ur-Rahman;Lee, Sung-Young
    • Journal of Computing Science and Engineering
    • /
    • v.4 no.1
    • /
    • pp.23-51
    • /
    • 2010
  • Wireless Sensor Networks (WSN) have proved to be useful in applications that involve monitoring of real-time data. There is a wide variety of monitoring applications that can employ Wireless Sensor Network. Characteristics of a WSN, such as topology and scale, depend upon the application, for which it is employed. Security requirements in WSN vary according to the application dependent network characteristics and the characteristics of an application itself. Key management is the most important aspect of security as some other security modules depend on it. We discuss application dependent variations in WSN, corresponding changes in the security requirements of WSN and the applicability of existing key management solutions in each scenario.