• Title/Summary/Keyword: wireless environment

Search Result 2,907, Processing Time 0.029 seconds

A Study on the Simulator Design of OFDM/QPSK Image Transmission System Embedded Watermark in Wireless Channel Environment (무선 채널 환경에서 워터마크가 삽입된 OFDM/QPSK 영상전송 시스템 시뮬레이터 구현에 관한 연구)

  • Seo, In-Hye;Kim, Ji-Woong;Kang, Heau-Jo
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.133-141
    • /
    • 2005
  • In this paper, we designed about OFDM/QPSK image transmission system simulator embedded watermark in wireless channel environment. Channel environment used OFDM/QPSK still image transmission system considering AWGN, Multi-path fading. And, we analyzed effect of still image and watermark information in considered channel environment. Watermark information is coded by DM-SS (Direct Matric/Spread Spectrum) image watermarking scheme, Also, we used interleaving scheme for mitigating the degradation in watermarking data under wireless channel. As a results, we could know that PSNR of watermark image improved of about 1dB by 54.2371dB then apply interleaving in same multi-path fading environment.

  • PDF

An Energy-efficient MAC Protocol in Cognitive Radio Environment (Cognitive Radio 환경을 고려한 에너지 효율적인 MAC 프로토콜)

  • Kim, Byung-Boo;Rhee, Seung-Hyong
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.2
    • /
    • pp.81-91
    • /
    • 2008
  • In mobile wireless communications, there is a new approach that uses the lacking spectrum efficiently. A cognitive radio is a device that can changes its transmitter parameters based on interaction with the environment in which it operates. At present, the wireless communication standard for wireless device contains power-saving modes or energy efficient mechanisms which cuts off the power of transmitter and receiver for power-saving. However, in cognitive radio environment, every device has the Quiet Period for searching channel and existing energy-saving method is not appropriate to be adjust to cognitive radio environment. In this paper, we propose an energy-efficient MAC protocol of mobile device in cognitive radio environment and prove the improvement of proposed method.

  • PDF

A Study on Authentication of Mobile Agency AP Connection Using Trusted Third Party in Smart Phone Environment (스마트폰 환경에서 신뢰기관을 이용한 이동 통신사 AP 접속 인증에 관한 연구)

  • Lee, Gi-Sung;Min, Dae-Gi;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.11
    • /
    • pp.5496-5505
    • /
    • 2012
  • As the IT industry develops, the smart-phone technology and functions which are actively being studied at the moment greatly influence the entire living environment. With the smart-phone technology and functions, people's interest for the wireless LAN which can be used to get access to the Internet anytime anywhere is gradually increasing. However, since the malicious attacker can easily carry out hacking or approach the contents due to the characteristics of the wireless radio wave, the personal information with a high level of importance for data security is easily exposed due to Spoofing, Denial of Service attack and Man in the Middle attack. Therefore, the demand for security is gradually increasing. In this paper, the safe wireless network service environment is provided by supplementing the vulnerability in regard to Spoofing, Session Hijacking and Man in the Middle attack after executing the client's authentication process, the AP authentication process and the Mobile Agency authentication process with the client's information in the USIM, the AP information and the Mobile Agency information when the client uses the wireless Internet through the Mobile Agency AP access in the smart phone environment.

Performance Analysis of a Media Access Control Protocol for Magnetic Field Communication (자기장 통신을 위한 매체 접근 제어 프로토콜의 성능분석)

  • Jeong, Eui-Hoon;Won, Yun-Jae;Kim, Sun-Hee;Lim, Seung-Ok;Bang, Young-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5A
    • /
    • pp.464-472
    • /
    • 2011
  • As wireless sensor networks are applied to various applications such as environment monitoring and disaster sensing system, there are increased needs for wireless communication in underground environment. Since the previous wireless communication technology using electromagnetic wave is not appropriate for the underground environment, a new alternative is required. Recently a magnetic field communication technology has been proposed and standardized as a domestic KS standard. In this paper, we analyze the media access control protocol of the KS standard by an analysis and a simulation study.

RF Circuit Design for IEEE 802.11p Implementation (IEEE 802.11p 구현을 위한 RF 회로 설계)

  • Lee, Se-Yeun;Lee, Myung-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.1
    • /
    • pp.54-61
    • /
    • 2012
  • The WAVE specification, which for the Next-Generation ITS environment is a common title: IEEE 802.11p and IEEE P1609 specifications. These days, there are many activities for researching WAVE specification by release of the IEEE 802.11p specification. The difference between high-speed vehicle environment and the indoor environment, the wireless communication channel mode is that much more severe. Thus, the wireless communication system design, temperature, noise, multipath fading and can degrade the performance of the system points should be fully considered matters of. In this paper, we showed WAVE wireless communication system which based on IEEE 802.11p PHY/MAC design process, and also showed solving process many implementation problems.

Facial Gender Recognition via Low-rank and Collaborative Representation in An Unconstrained Environment

  • Sun, Ning;Guo, Hang;Liu, Jixin;Han, Guang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4510-4526
    • /
    • 2017
  • Most available methods of facial gender recognition work well under a constrained situation, but the performances of these methods have decreased significantly when they are implemented under unconstrained environments. In this paper, a method via low-rank and collaborative representation is proposed for facial gender recognition in the wild. Firstly, the low-rank decomposition is applied to the face image to minimize the negative effect caused by various corruptions and dynamical illuminations in an unconstrained environment. And, we employ the collaborative representation to be as the classifier, which using the much weaker $l_2-norm$ sparsity constraint to achieve similar classification results but with significantly lower complexity. The proposed method combines the low-rank and collaborative representation to an organic whole to solve the task of facial gender recognition under unconstrained environments. Extensive experiments on three benchmarks including AR, CAS-PERL and YouTube are conducted to show the effectiveness of the proposed method. Compared with several state-of-the-art algorithms, our method has overwhelming superiority in the aspects of accuracy and robustness.

A study on linkage of database and information search service based on WIPI (WIPI 기반 데이터베이스 연동 및 정보 제공 서비스에 관한 연구)

  • 임창묵;정성훈;임재홍
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2004.04a
    • /
    • pp.379-383
    • /
    • 2004
  • Mobile Internet has different platform cause interrupt activation of mobile internet because contents providers have each different development environment. To use of WIPI(Wireless Internet Platform for Interoperability) developer by KWISF(Korea Wireless Internet Standard Forum) founded to solve this problem guarantee independence of hardware and interpretation of mobile application. In this paper, we research method to activate WIPI which is standard platform to develop applications easily and efficiently in mobile environment and we implement WIPI application to show the excellent of WIPI in mobile development environment.

  • PDF

Performance analysis of OFDM Wireless Transmission System for Medical Information transmission in Multi-path fading channel Environment (다중경로 페이딩 채널 환경에서 의료정보 전송을 위한 OFDM 무선 전송시스템 성능 분석)

  • Seo, In-Hye;Kang, Heau-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.40-45
    • /
    • 2007
  • In this paper, aim to suggest the medical information wireless transmission system to provide the mobility of medical service by means of wireless area network which makes it possible, home or at a long range, to check and oversee the state of patients, and to can out a simulation. The proposed method converts medical information to digital data in an emergency and sends them to mobile terminals such as PDAs to make possible swift first aid. The simulation took advantage of the OFDM transmission method based on IEEE 802.1la in order to send reliable medical information in mobile wireless channel environment, and analyzed the system performance by applying convolution encoding to transmit reliable information in AWGN and 3-ray mobile multipath fading channel environment.

Study of the Wireless Ad-hoc Networks with Robust Route Maintenance Scheme

  • Hong, Geun-Bin;Yun, Ji-Hun;Kim, Kwan-Woong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.2
    • /
    • pp.46-49
    • /
    • 2010
  • This paper has proposedfor wireless Ad-hoc networks with robust route maintenance schemes. The device feature Bluetooth and/or IEEE 802.11 network interfaces and communicate in a decentralized manner. The nodes have the responsibility of self-organizing so that the network is robust to the variations in network topology due to node mobility as well as the fluctuations of the signal quality in the wireless environment.

  • PDF

Research of Security Methods based on Mobile Internet (모바일 인터넷 상의 보안 기법 연구)

  • 이원구;이재광
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.296-300
    • /
    • 2004
  • In this paper, we discuss about mobile Internet security. The past few years have seen unprecedented growth in the number of wireless user, applications, and network access technologies. Wireless Internet is similar to wired internet, but it has some constrained wireless environment. So many internet technologies for wireless are developing now

  • PDF