• Title/Summary/Keyword: wireless communication method

Search Result 1,718, Processing Time 0.027 seconds

Energy Efficiency Localization System Based On Wireless Sensor Network (무선 센서 네트워크 기반의 에너지 효율적인 위치 탐색 시스템)

  • Jung, Won-Soo;Oh, Young-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 2007.10a
    • /
    • pp.497-498
    • /
    • 2007
  • The most of important thing when we design a Wireless Sensor Network is resources. You have to consider energy efficient operation When you design Wireless Sensor Network. Because Sensor devices have a limited resources. In this paper, we proposed energy efficiency localization technique in Wireless Sensor Network. We used Cell ID technique for location search. This method can reduce power consumption and the network life time will be extension.

  • PDF

The Study of Fire Detector Circuit with Wireless Communication (무선통신기능을 갖는 화재감지기 회로에 대한 연구)

  • Baek, Dong-Hyun;Kim, Jang-Won
    • Fire Science and Engineering
    • /
    • v.24 no.1
    • /
    • pp.111-115
    • /
    • 2010
  • For the development of fire detector equipments that was fused independent type of fire detector and a wireless communication function, this paper adopted a signal processing method of an independent formation fire sensor by a ZigBee communication method, and it was designed that the combinations of fire detector and wireless communications network were enabled. When a fire occurred, output voltage of a fire detector was 0.4 V, the movement pulse width was $600{\mu}s$, and that was confirmed by an experiment. When it has lookout state, LED worked by 30 s cycle and working current is 0.12 mA. When a fire occurred, LED worked by 0.5 s cycle and working current was 7 mA, and through this experiment of power source, Chamber tester, smoke tester,IRED, LED lighting, the propriety of the method that we showed in this paper confirmed.

Implementation of Wireless Network simulator considering a User's Call Characteristics (사용자 통화 특성을 고려한 무선 네트워크 시뮬레이터 구현)

  • Yoon, Young Hyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.3
    • /
    • pp.107-115
    • /
    • 2009
  • Traditionally, simulation method is used to test and evaluate the performance of communication protocol or functional elements for mobile communication service. In this paper, wireless network simulator is implemented using the C++ object-oriented programming language. This simulator can simulate wireless data services, like as ad-hoc networks, by considering the user's mobility. In this paper, the simulator includes network traffic model to reflect wireless data service and traffic source model to represent a user's mobility similar to real service environment and traffic characteristics can be reflected on the simulation, and also more accurate simulation results can be got through that. In addition, by using object-oriented techniques, new service feature or environment can be easily added or changed so that the developed mobile communication simulator can reflect the real service environment all the time. This simulator can be used in adjusting the characteristics of wireless data hosts following the mobility of the user, and also can be used in building new wireless ad-hoc network routing protocols.

RRSEB: A Reliable Routing Scheme For Energy-Balancing Using A Self-Adaptive Method In Wireless Sensor Networks

  • Shamsan Saleh, Ahmed M.;Ali, Borhanuddin Mohd.;Mohamad, Hafizal;Rasid, Mohd Fadlee A.;Ismail, Alyani
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1585-1609
    • /
    • 2013
  • Over recent years, enormous amounts of research in wireless sensor networks (WSNs) have been conducted, due to its multifarious applications such as in environmental monitoring, object tracking, disaster management, manufacturing, monitoring and control. In some of WSN applications dependent the energy-efficient and link reliability are demanded. Hence, this paper presents a routing protocol that considers these two criteria. We propose a new mechanism called Reliable Routing Scheme for Energy-Balanced (RRSEB) to reduce the packets dropped during the data communications. It is based on Swarm Intelligence (SI) using the Ant Colony Optimization (ACO) method. The RRSEB is a self-adaptive method to ensure the high routing reliability in WSNs, if the failures occur due to the movement of the sensor nodes or sensor node's energy depletion. This is done by introducing a new method to create alternative paths together with the data routing obtained during the path discovery stage. The goal of this operation is to update and offer new routing information in order to construct the multiple paths resulting in an increased reliability of the sensor network. From the simulation, we have seen that the proposed method shows better results in terms of packet delivery ratio and energy efficiency.

Development and Verification of Wireless Check-up System of POD for Captive Flight Test (탑재비행시험용 POD 무선 점검 시스템 개발 및 검증)

  • Ko, Myoungjun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.2
    • /
    • pp.204-210
    • /
    • 2021
  • In this paper, we studied a method of wirelessly checking up the POD for captive flight tests which is performed during the development of guided weapons systems. The wireless power transfer module, the power distribution device, and the battery pack were designed to wirelessly power the captive flight test POD, and the communication device was designed to enable wireless communication between the POD and the check-up device. The communication device was designed to enable WiFi, IR communication, and laser diode communication, so that various communication methods could be tested. Through the performance test, it was confirmed that power was stably supplied to the captive flight test POD, and the wireless communication performance was verified by measuring the delay time and error rate. As a result, by using our system the POD check-up for the captive flight test was performed wirelessly and the data of the captive equipment could be obtained effectively.

Chaos Secure Communication using Chua Circuit with Equivalent Power Lines (등가 전력선을 가진 Chua 회로에서의 카오스 비밀통신)

  • 배영철
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.263-266
    • /
    • 2000
  • In this paper, we formed a transmitter and receiver by using two identical Chua's circuits and then formed wireless transmission line from the channel which was between those two circuits. We proposed a secure communication method in which the desired information signal was synthesized with the chaos signal created in a Chua's circuit and sent to the transmitter through channel. Then the signal was demodulated receiver of Chua's circuit. The method we used to accomplish the sun communication was synthesizing the desired information with the chaos circuit by parallel connection in a wireless transmission line. After transmitting the synthesized signal to the wireless transmission line, we confirmed the actuality of the secure communication by separating the information signal and the chaos signal in the receiver. In order to confirm the security, we compared the wiretapped signal and the recovery signal under the assumption that the wiretapping had taken place. In order to separate the two signals, we transformed the information signal to a current source in the transmitter and detected the current in the receiver.

  • PDF

Communication Quality Measurement and Management System in Smartphone (스마트폰에서의 WCDMA 통화품질 측정 및 관리시스템)

  • Choi, Ho-Yeon;Lee, Sang-Min;Lee, Goo-Yeon
    • Journal of Industrial Technology
    • /
    • v.31 no.B
    • /
    • pp.99-105
    • /
    • 2011
  • Recently, smartphones have been widely used in wireless communications which caused severe data overload in cellular networks. Cellular companies consider increasing wireless data capacity in overloaded areas. Determining overloaded areas is mainly made from user reports which are currently collected by calling or simple apps by some active users experiencing overloads. Since the current reporting method is inconvenient and does not contain detail information about the overload conditions, and therefore is used by only some active users, the overloaded areas determined from the reports are not likely to be accurate. Therefore, we need a new reporting method which is convenient enough for even inactive users to willingly report the overload condition and which delivers detail information about the overloads. In this paper, we design and implement a measurement function of smartphone's WCDMA communication quality including overload condition and management system of mobile wireless communication networks about smartphones' communication quality.

  • PDF

Chaos Secure Communication Using Chua Circuit (Chua 회로에서의 카오스 비밀통신)

  • 배영철
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.05a
    • /
    • pp.238-241
    • /
    • 2000
  • In this paper, we formed a transmitter and receiver by using two identical Chua's circuits and then formed wireless transmission line from the channel which was between those two circuits. We proposed a secure communication method in which the desired information signal was synthesized with the chaos signal created in a Chua's circuit and sent to the transmitter through channel. Then the signal was demodulated receiver of Chua's circuit. The Method we used to accomplish the secure communication was synthesizing the desired information with the chaos circuit by parallel connection in a wireless transmission line. After transmitting the synthesized signal to the wireless transmission line, we confirmed the actuality of the secure communication by separating the information signal and the chads signal in the receiver. In order to confirm the security, we compared the wiretapped signal and the recovery signal under the assumption that the wiretapping had taken place. In order to separate the two signals, we transformed the information signal to a current source in the transmitter and detected the current in the receiver.

  • PDF

Efficient Polling Scheme for Multiple Direct Link Communication Between STAs in Infrastructure Mode IEEE 802.11 Wireless LANs (Infrastructure Mode IEEE 802.11 무선랜 시스템에서 단말간의 다중 직접 통신을 위한 효율적인 폴링 방식)

  • Choi, Woo-Yong
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.33 no.2
    • /
    • pp.237-245
    • /
    • 2007
  • In this paper, a modified PCF (Point Coordination Function) MAC (Medium Access Control) Protocol is proposed to support the multiple direct link communication between STAs (STAtions) in infrastructure mode IEEE 802.11 wireless LANs. By the proposed MAC protocol, the direct link communication between STAs, which are located within the communication range of each other, is allowed without the use of AP (Access Point) as a relay. Moreover, when multiple direct data communication between STAs can be simultaneously performed with a sufficiently small interference, multiple simultaneous direct link communication is allowed for the efficient use of radio bandwidth. AP polls STAs to grant the transmission opportunities using the direct link communication by transmitting the polling frames to STAs. An efficient polling method for granting the transmission opportunities to STAs is proposed to reduce the number of the polling frame transmissions and enhance the PCF MAC performance.

Privacy-Preserving, Energy-Saving Data Aggregation Scheme in Wireless Sensor Networks

  • Zhou, Liming;Shan, Yingzi
    • Journal of Information Processing Systems
    • /
    • v.16 no.1
    • /
    • pp.83-95
    • /
    • 2020
  • Because sensor nodes have limited resources in wireless sensor networks, data aggregation can efficiently reduce communication overhead and extend the network lifetime. Although many existing methods are particularly useful for data aggregation applications, they incur unbalanced communication cost and waste lots of sensors' energy. In this paper, we propose a privacy-preserving, energy-saving data aggregation scheme (EBPP). Our method can efficiently reduce the communication cost and provide privacy preservation to protect useful information. Meanwhile, the balanced energy of the nodes can extend the network lifetime in our scheme. Through many simulation experiments, we use several performance criteria to evaluate the method. According to the simulation and analysis results, this method can more effectively balance energy dissipation and provide privacy preservation compared to the existing schemes.