• Title/Summary/Keyword: wireless network

Search Result 7,288, Processing Time 0.045 seconds

The Performance Analysis of Equalizer for Next Generation W-LAN with OFDM System (OFDM 방식의 차세대 무선 LAN 환경에서 등화기의 성능 분석)

  • Han, Kyung-Su;Youn, Hee-Sang
    • Journal of Advanced Navigation Technology
    • /
    • v.6 no.1
    • /
    • pp.44-51
    • /
    • 2002
  • This paper describes the performance evaluation and analysis of an Orthogonal Frequency-Division Multiplexing (OFDM) system having the least Inter Symbol Interference (ISI) in a multi-path fading channel environment. Wireless Local Area Network (W-LAN) in accordance with IEEE 802.11a and IEEE 802.11b provides high-speed transmission to universities, businesses and other various places. In addition, service providers can offer a public W-LAN service on restricted areas such as a subway. The proliferation of W-LAN has led to greater W-LAN service demands, but problems are also on the rise in offering a good W-LAN service. In particular, urban areas with high radio wave interference and many buildings are vulnerable to deteriorated QoS including disconnected data and errors. For example, when high-speed data is transmitted in such areas, the relatively high frequency generates ISI between Access Points (AP) and Mobile Terminals (such as a notebook computer), leading to a frequency selective fading channel environment. Consequently, it is difficult to expect a goodW-LAN service. The simulation proves that the OFDM system enables W-LAN to implement QoS in high-speed data transmission in a multi-path fading channel environment. The enhanced OFDM performance with 52 sub-carriers is verified via data modulation methods such as BPSK, QPSK and 16QAM based on IEEE 802.11a and punched convolutional codes with code rate of 1/2 and 3/4 and constraint length of 7. Especially, the simulation finds that the OFDM system has better performance and there is no data disconnection even in a mobile environment by applying a single tap equalizer and a decision feedback equalizer to a mobile channel environment with heavy fading influence. Given the above result, the OFDM system is an ideal solution to guarantee QoS of the W-LAN service in a high-speed mobile environment.

  • PDF

Localization Algorithm in Wireless Sensor Networks using the Acceleration sensor (가속도 센서를 이용한 무선 센서 네트워크하에서의 위치 인식 알고리즘)

  • Hong, Sung-Hwa;Jung, Suk-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.4
    • /
    • pp.1294-1300
    • /
    • 2010
  • In an environment where all nodes move, the sensor node receives anchor node's position information within communication radius and modifies the received anchor node's position information by one's traveled distance and direction in saving in one's memory, where if there at least 3, one's position is determined by performing localization through trilateration. The proposed localization mechanisms have been simulated in the Matlab. In an environment where certain distance is maintained and nodes move towards the same direction, the probability for the sensor node to meet at least 3 anchor nodes with absolute coordinates within 1 hub range is remote. Even if the sensor node has estimated its position with at least 3 beacon information, the angle ${\theta}$ error of accelerator and digital compass will continuously apply by the passage of time in enlarging the error tolerance and its estimated position not being relied. Dead reckoning technology is used as a supplementary position tracking navigation technology in places where GPS doesn't operate, where one's position can be estimated by knowing the distance and direction the node has traveled with acceleration sensor and digital compass. The localization algorithm to be explained is a localization technique that uses Dead reckoning where all nodes are loaded with omnidirectional antenna, and assumes that one's traveling distance and direction can be known with accelerator and digital compass. The simulation results show that our scheme performed better than other mechanisms (e.g. MCL, DV-distance).

Development of MRI Simulator Early Diagnosis Program for Self Learning (자가 학습을 위한 MRI Simulator 초기 검사 프로그램 개발)

  • Jeong, Cheon-Soo;Kim, Chong-Yeal
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.9
    • /
    • pp.403-410
    • /
    • 2015
  • Since 1970, MRI has greatly been developing in terms of strength of magnetic field, the number of receipt channels, and short time of examination. With the development of digital systems and wireless network, hospitals have also acquired, saved, and managed digital images taken by various kinds of medical imaging equipment. However, domestic universities fail to provide practice training course independently thanks to expensive practice equipment and high maintenance cost, and rely on clinical training. Therefore, this study developed a MR patient diagnosis program based on Windows PC to help out students before their working in clinical filed. The designed Relational Database of MRI Simulator is made up of seven tables according to functions and data characteristics. Regarding the designed patient information, each stepwise function was classified by the patient registration method in clinical field. In addition, on the assumption of the basic information for diagnosis, each setting and content were classified. The menu by execution step was arrayed on the left side for easy view. For patient registration, a patient's name, gender, unique ID, birth date, weight, and other types of basic information were entered, and the patient's posture and diagnosis direction were set up. In addition, the body regions for diagnosis and Pulse Sequence were listed for selection. Also, Protocol name and other additional factors were allowed to be entered. The final window was designed to check diagnosis images, patient information, and diagnosis conditions. By learning how to enter patient information and change diagnosis conditions in this program, users will be able to understand more theories and terms learned in practice and thereby to shorten their learning time in actual clinical work.

Design of Serendipity Service Based on Near Field Communication Technology (NFC 기반 세렌디피티 시스템 설계)

  • Lee, Kyoung-Jun;Hong, Sung-Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.293-304
    • /
    • 2011
  • The world of ubiquitous computing is one in which we will be surrounded by an ever-richer set of networked devices and services. Especially, mobile phone now becomes one of the key issues in ubiquitous computing environments. Mobile phones have been infecting our normal lives more thoroughly, and are the fastest technology in human history that has been adapted to people. In Korea, the number of mobile phones registered to the telecom company, is more than the population of the country. Last year, the numbers of mobile phone sold are many times more than the number of personal computer sold. The new advanced technology of mobile phone is now becoming the most concern on every field of technologies. The mix of wireless communication technology (wifi) and mobile phone (smart phone) has made a new world of ubiquitous computing and people can always access to the network anywhere, in high speed, and easily. In such a world, people cannot expect to have available to us specific applications that allow them to accomplish every conceivable combination of information that they might wish. They are willing to have information they want at easy way, and fast way, compared to the world we had before, where we had to have a desktop, cable connection, limited application, and limited speed to achieve what they want. Instead, now people can believe that many of their interactions will be through highly generic tools that allow end-user discovery, configuration, interconnection, and control of the devices around them. Serendipity is an application of the architecture that will help people to solve a concern of achieving their information. The word 'serendipity', introduced to scientific fields in eighteenth century, is the meaning of making new discoveries by accidents and sagacity. By combining to the field of ubiquitous computing and smart phone, it will change the way of achieving the information. Serendipity may enable professional practitioners to function more effectively in the unpredictable, dynamic environment that informs the reality of information seeking. This paper designs the Serendipity Service based on NFC (Near Field Communication) technology. When users of NFC smart phone get information and services by touching the NFC tags, serendipity service will be core services which will give an unexpected but valuable finding. This paper proposes the architecture, scenario and the interface of serendipity service using tag touch data, serendipity cases, serendipity rule base and user profile.

Multi-Cell Search Scheme for Heterogeneous Networks (이기종 네트워크를 위한 다중 셀 검출 기법)

  • Cho, Yong-Ho;Ko, Hak-lim;Im, Tae-ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.4
    • /
    • pp.395-403
    • /
    • 2016
  • This paper introduces a multi-cell search method for heterogeneous networks (HetNet), in which user equipments need to search multiple cells in its vicinity simultaneously. Due to the difficulty of acquiring channel informations for multiple cells, a non-coherent approach is preferred. In this paper, a non-coherent single-cell search scheme using a weighted vector is proposed, and the successive interference cancellation based multi-cell search algorithm is devised. In order to improve cell search performance, the weighted vector is designed in a way to exploit the general characteristic of wireless channel. Based on the fact that the performance of the proposed single-cell search scheme deviates slowly from the one using the optimal weighted vector, a universal weighted vector is also proposed, which shows the performance close to the optimal ones for various channel environments and signal-to-noise ratio regimes. Simulation results confirm that the proposed multi-cell search algorithm is capable of identifying cells more accurately with the help of the proposed single-cell search scheme, and can detect the remaining cells more effectively by removing the signals of the identified cells from the received signal.

Effective Picture Search in Lifelog Management Systems using Bluetooth Devices (라이프로그 관리 시스템에서 블루투스 장치를 이용한 효과적인 사진 검색 방법)

  • Chung, Eun-Ho;Lee, Ki-Yong;Kim, Myoung-Ho
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.383-391
    • /
    • 2010
  • A Lifelog management system provides users with services to store, manage, and search their life logs. This paper proposes a fully-automatic collecting method of real world social contacts and lifelog search engine using collected social contact information as keyword. Wireless short-distance network devices in mobile phones are used to detect social contacts of their users. Human-Bluetooth relationship matrix is built based on the frequency of a human-being and a Bluetooth device being observed at the same time. Results show that with 20% of social contact information out of full social contact information of the observation times used for calculation, 90% of human-Bluetooth relationship can be correctly acquired. A lifelog search-engine that takes human names as keyword is suggested which compares two vectors, a row of Human-Bluetooth matrix and a vector of Bluetooth list scanned while a lifelog was created, using vector information retrieval model. This search engine returns more lifelog than existing text-matching search engine and ranks the result unlike existing search-engine.

A Design of Key Generation and Communication for Device Access Control based on Smart Health Care (스마트 헬스케어 기반의 디바이스 접근제어를 위한 키 생성 및 통신기법 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.746-754
    • /
    • 2016
  • Smart healthcare systems, a convergent industry based on information and communications technologies (ICT), has emerged from personal health management to remote medical treatment as a distinguished industry. The smart healthcare environment provides technology to deliver vital information, such as pulse rate, body temperature, health status, and so on, from wearable devices to the hospital network where the physician is located. However, since it deals with the patient's personal medical information, there is a security issue for personal information management, and the system may be vulnerable to cyber-attacks in wireless networks. Therefore, this study focuses on a key-development and device-management system to generate keys in the smart environment to safely manage devices. The protocol is designed to provide safe communications with the generated key and to manage the devices, as well as the generated key. The security level is analyzed against attack methods that may occur in a healthcare environment, and it was compared with existing key methods and coding capabilities. In the performance evaluation, we analyze the security against attacks occurring in a smart healthcare environment, and the security and efficiency of the existing key encryption method, and we confirmed an improvement of about 15%, compared to the existing cipher systems.

Design and Implementation of Factory Equipment Monitoring System using Grid-based Key Pre-Distribution (그리드 기반 키 선분배 방식을 사용하는 공장 설비 모니터링 시스템 설계 및 구현)

  • CHO, YANGHUI;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.51-56
    • /
    • 2016
  • In this paper, we propose an Arduino-based plant monitoring system. The proposed system is based on the Arduino platform, using an environmental sensor and a pressure sensor for measuring temperature, humidity and illuminance in order to monitor the state of the environment and the facilities of the plant. Monitoring data are transmitted to a ZigBee coordinator connected to a server through a radio frequency transceiver. When using a pressure sensor and the environment sensor data stored on the host server, checking the pressure in the environment of the plant and equipment is intended to report any alarm status to the administrator. Using a grid line-based key distribution scheme, the authentication node dynamically generates a data key to protect the monitoring information. Applying a ZigBee wireless sensor network does not require additional wiring for the actual implementation of a plant monitoring system. Possible working-environment monitoring of an efficient plant can help analyze the cause of any failure by backtracking the working environment when a failure occurs. In addition, it is easy to expand or add a sensor function using the Arduino platform and an expansion board.

Mobility Management Method for Constrained Sensor Nodes in WoT Environment (WoT 환경에서 제한된 센서 노드의 이동성 관리 방법)

  • Chun, Seung-Man;Ge, Shu-Yuan;Park, Jong-Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.9
    • /
    • pp.11-20
    • /
    • 2014
  • For Web-based applications in IoT environment, IETF CoRE WG has standardizing the CoAP. One of limitations of CoAP is that CoAP standard does not consider the mobility management of the CoAP sensor node. In this paper, we propose the mobility management protocol of CoAP sensor node by considering the characteristics of the constrained network. The proposed mobility management protocol supports for Web client to be transmitted the sensing data from CoAP node reliably while the CoAP sensor moves into different wireless networks. To do this, we designed the architecture with the separate IP address management of CoAP sensor node and presented the mobility management protocol, which includes the holding and binding mode, in order to provide the reliable transmission. Finally, the numerical analysis and simulation with NS2 tool have been done for the performance evaluation in terms of the handover latency and packet loss with comparing the proposed mobility management protocol with other the existing mobility management protocols. The performance result shows that the proposed mobility management can provide the transmission of sensing data without the packet loss comparing with the existing mobility management protocol reliably.

Vehicle-to-Vehicle Broadcast Protocols Based on Wireless Multi-hop Communication (무선 멀티 홉 통신 기반의 차량간 브로드캐스트 프로토콜)

  • Han, Yong-Hyun;Lee, Hyuk-Joon;Choi, Yong-Hoon;Chung, Young-Uk
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.4
    • /
    • pp.53-64
    • /
    • 2009
  • Inter-vehicular communication that propagates information without infrastructures has drawn a lot of interest. However, it is difficult to apply conventional ad-hoc routing protocols directly in inter-vehicular communication due to frequent changes in the network topology caused by high mobility of the vehicles. MMFP(Multi-hop MAC Forwarding) is a unicast forwarding protocol that transport packets based on the reachability information instead of path selection or position information. However, delivering public safety messages informing road conditions such as collision, obstacles and fog through inter-vehicular communication requires broadcast rather than unicast since these messages contain information valuable to most drivers within a close proximity. Flooding is one of the simplest methods for multi-hop broadcast, but it suffers from reduced packet delivery-ratio and high transmission delay due to an excessive number of duplicated packets. This paper presents two multi-hop broadcast protocols for inter-vehicular communication that extend the MMFP. UMHB(Unreliable Multi-Hop Broadcast) mitigates the duplicated packets of MMFP by limiting the number of nodes to rebroadcast packets. UMHB, however, still suffers from low delivery ratio. RMHB(Reliable Multi-Hop Broadcast) uses acknowledgement and retransmission in order to improve the reliability of UMHB at the cost of increase in transmission delay, which we show through simulation is within an acceptable range for collision avoidance application.

  • PDF