• Title/Summary/Keyword: wireless signal

Search Result 1,966, Processing Time 0.026 seconds

A Study on Spatial Smoothing Technique for Angle of Arrival Estimation of Coherent Incoming Waves (코히어런트 입사파의 도래방향 추정을 위한 공간평균법의 개선에 관한 연구)

  • Jeong Jung-Sik
    • Journal of Navigation and Port Research
    • /
    • v.29 no.5 s.101
    • /
    • pp.403-408
    • /
    • 2005
  • The techniques of estimating angle of arrival(AOA) have played a key role for enhancement of wireless communications using array antennas. Among those techniques, the superresolution algorithms, such as MUSIC and ESPRIT, calculate the covariance matrix of the array output vectors which are observed at the array antennas, and then by using eigen-decomposition of the covariance matrix, they estimate AOAs of the received signals with high accuracy. However, superresolution algorithms based eigenvalue decomposition fails to estimate AOAs under multipath environments. Under multipath environments, it is difficult to estimate AOAs of the received signals due to coherency and high-correlation. To resolve coherent signals, the covariance matrix is calculated by using the conventional spatial smoothing technique, and then the techniques based on eigen-descomposition is applied. The result of the conventional spatial smoothing technique, however, is obtained at the cost of losing effective spatial aperture. Moreover, the conventional technique ignores any information in the cross-correlations of the array outputs the subarrays. As the result, the performance for AOA estimation is degraded. In this paper, we propose a new spatial smoothing technique, which consider the cross-correlation for subarrays. By computer simulation, the AOA estimation performance of the proposed method is compared with the conventional method and evaluated.

A Secure Mobile Message Authentication Over VANET (VANET 상에서의 이동성을 고려한 안전한 메시지 인증기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.5
    • /
    • pp.1087-1096
    • /
    • 2011
  • Vehicular Ad Hoc Network(VANET) using wireless network is offering the communications between vehicle and vehicle(V2V) or vehicle and infrastructure(V2I). VANET is being actively researched from industry field and university because of the rapid developments of the industry and vehicular automation. Information, collected from VANET, of velocity, acceleration, condition of road and environments provides various services related with safe drive to the drivers, so security over network is the inevitable factor. For the secure message authentication, a number of authentication proposals have been proposed. Among of them, a scheme, proposed by Jung, applying database search algorithm, Bloom filter, to RAISE scheme, is efficient authentication algorithm in a dense space. However, k-anonymity used for obtaining the accurate vehicular identification in the paper has a weak point. Whenever requesting the righteous identification, all hash value of messages are calculated. For this reason, as the number of car increases, a amount of hash operation increases exponentially. Moreover the paper does not provide a complete key exchange algorithm while the hand-over operation. In this paper, we use a Received Signal Strength Indicator(RSSI) based velocity and distance estimation algorithm to localize the identification and provide the secure and efficient algorithm in which the problem of hand-over algorithm is corrected.

Channel Searching Method of IEEE 802.15.4 Nodes for Avoiding WiFi Traffic Interference (WiFi 트래픽 간섭을 피하기 위한 IEEE 802.15.4 노드의 채널탐색방법)

  • Song, Myong Lyol
    • Journal of Internet Computing and Services
    • /
    • v.15 no.2
    • /
    • pp.19-31
    • /
    • 2014
  • In this paper, a parallel backoff delay procedure on multiple IEEE 802.15.4 channels and a channel searching method considering the frequency spectrum of WiFi traffic are studied for IEEE 802.15.4 nodes to avoid the interference from WiFi traffic. In order to search the channels being occupied by WiFi traffic, we analyzed the methods measuring the powers of adjacent channels simultaneously, checking the duration of measured power levels greater than a threshold, and finding the same periodicity of sampled RSSI data as the beacon frame by signal processing. In an wireless channel overlapped with IEEE 802.11 network, the operation of CSMA-CA algorithm for IEEE 802.15.4 nodes is explained. A method to execute a parallel backoff procedure on multiples IEEE 802.15.4 channels by an IEEE 802.15.4 device is proposed with the description of its algorithm. When we analyze the data measured by the experimental system implemented with the proposed method, it is observed that medium access delay times increase at the same time in the associated IEEE 802.15.4 channels that are adjacent each other during the generation of WiFi traffic. A channel evaluation function to decide the interference from other traffic on an IEEE 802.15.4 channel is defined. A channel searching method considering the channel evaluations on the adjacent channels together is proposed in order to search the IEEE 802.15.4 channels interfered by WiFi, and the experimental results show that it correctly finds the channels interfered by WiFi traffic.

An Enhanced WLAN MAC Protocol for Directional Broadcast (지향성 브로드캐스트를 위한 무선 LAN MAC 프로토콜)

  • Cha, Woo-Suk;Cho, Gi-Hwan
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.16-27
    • /
    • 2006
  • The wireless transmission medium inherently broadcasts a signal to all neighbor nodes in the transmission range. Existing asynchronous MAC protocols do not provide a concrete solution for reliable broadcast in link layer. This mainly comes from that an omni-directional broadcasting causes to reduce the network performance due to the explosive collisions and contentions. This paper proposes a reliable broadcast protocol in link taller based on directional antennas, named MDB(MAC protocol for Directional Broadcasting). This protocol makes use of DAST(Directional Antennas Statement Table) information and D-MACA(Directional Multiple Access and Collision Avoidance) scheme through 4-way handshake to resolve the many collision problem wit]1 omni-directional antenna. To analyze its performance, MDB protocol is compared with IEEE 802.11 DCF protocol [9] and the protocol 2 of reference [3], in terms of the success rate of broadcast and the collision rate. As a result of performance analysis through simulation, it was confirmed that the collision rate of the MDB protocol is lower than those of IEEE 802.11 and the protocol 2 of reference [3], and that the completion rate of broadcast of MDB protocol is higher than those of IEEE 802.11 and the protocol 2 of reference [3].

Accuracy Improvement of Laser Navigation System using FIS and Reliability (FIS와 신뢰도를 이용한 레이저 내비게이션의 정밀도 향상)

  • Jung, Eun-Kook;Kim, Jung-Min;Jung, Kyung-Hoon;Kim, Sung-Shin
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.3
    • /
    • pp.383-388
    • /
    • 2011
  • This paper presents to study the accuracy improvement of the laser navigation using FIS(fuzzy inference system) and the reliability. As wireless guidance system, the top-mounted laser with the laser navigation can rotate $360^{\circ}$ with phototransistor or other optical sensors that read the return signal from reflectors mounted at the perimeter of the workspace. The type of major existing guidance systems is a wire guidance system. Because they have high accuracy and fast response time, they are used to most industries. However, their installation cost is very expensive and maintenance is very difficult because their sensors are placed approximately 1 inch below the ground or embedded in the floor. To solve those problems, the laser navigation was developed as a wire guidance system. It does not need to reconstruct a floor or ground. And it can reduce costs of installation and maintenance because changing the layout is easy. However, it is difficult to apply to an industrial field because it is easily affected by disturbances which cause loss and damage of data, and has slow respond time. Therefore, we study the accuracy improvement of the laser navigation. The proposed method is a correction method using reliability of the laser navigation. here, reliability is calculated by FIS which is designed with the analyzed characteristics of the laser navigation. For performance comparison, we use original position data form the laser navigation and position data corrected by original reliability from the laser navigation. In experimental result, we verified that the performance of the proposed method compared the others is improved by about 50% or more.

Patent Trend and Characteristics of Major Companies in the Field of Seismic Nodal System (탄성파 탐사 무선 수진기 특허동향 및 주요 기업의 기술 분석)

  • Park, Jung Kyu
    • Journal of the Korean Society of Mineral and Energy Resources Engineers
    • /
    • v.55 no.6
    • /
    • pp.635-648
    • /
    • 2018
  • This study analyzed patent trends of seismic nodal systems and the technical characteristics of core patents of three major companies, including Fairfield, Sercel, and Wireless Seismic, to examine the focus of technology development of each company. From the analysis, the patent application growth rate of seismic nodal systems has steadily increased since early to mid-2000s and has recently shown a higher growth rate. Over the same period, the patent application growth rate of the three major companies examined was higher than that of the global trend, and patent infringement cases was also examined to evaluate market competition in this field. Analysis of the technical characteristics of the three companies' 33 core patents showed that they are generally focused on seismic signal detection. Sub-technologies included improved reliability of data acquisition, data transmission efficiency, and overall operating of the seismic nodal system. New entrants in field of technology development or manufacturing of seismic nodal systems where the market is growing must closely analyze the contents of major companies' products and patents to prevent possible patent disputes or duplicate research.

Security issues and requirements for cloud-based u-Healthcare System (클라우드기반 u-헬스케어 시스템을 위한 보안 이슈 및 요구사항 분석)

  • Lee, Young Sil;Kim, TaeYong;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.299-302
    • /
    • 2014
  • Due to the convergence between digital devices and the development of wireless communication technology, bit-signal sensor miniaturization, building an Electronic Medical Record (EMR) which is a digital version of a paper chart that contains all of a patient's medical history and the information of Electronic Health Record (EHR), Ubiquitous healthcare (u-Healthcare) that can monitor their health status and provide personal healthcare service anytime and anywhere. Also, the appearance of cloud computing technology is one of the factors that accelerate the development of u-healthcare service. However, if the individual information to be used maliciously during the u-healthcare service utilization, leads to serious problems directly related to the individual's life because if it goes beyond the level of simple health screening and treatment, it may not provide accurate and reliable healthcare services. For this reason, we analyzed a variety of security issues related to u-healthcare service in cloud computing environment and described about directions of secure health information sharing system construction. In addition, we suggest the future developmental direction for th activation of u-healthcare industry.

  • PDF

A Study on Fire Alarm Test of IoT Multi-Fire Detector combined Smoke/CO and Smoke/Temperature Sensors (연기/CO 및 연기/열 복합형 IoT 멀티 화재 감지기의 화재감지실험 연구)

  • Son, Geun­Sik;So, Soo­Hyun
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.2
    • /
    • pp.236-244
    • /
    • 2021
  • Purpose: The purpose of this study is to develop IoT multi-fire detectors combined smoke/carbon monoxide/heat and wireless IoT communication and to confirm the detect performance by smoke generator fire test and cotton wicks fire test. Method: The IoT multi-fire detector combined smoke and CO and combined smoke and heat were experimented the detect performance by smoke generator test and fire test of cotton wicks. And the case of fire alarm was checked. Result: The IoT multi-fire detector combined smoke and CO rung the alarm at the fire test of cotton wicks, did not ring the alarm at the smoke generator test. In comparison, the IoT multi-fire detector combined smoke and heat did not ring the alarm both at the smoke generator test and the fire test of cotton wicks. Conclusion: The IoT multi-fire detector combined smoke and CO detected the only smoke including the carbon monoxide and the IoT multi-fire detector combined smoke and heat did not ring the alarm for lack of heat. As a result, when the developed IoT multi-fire detector was detected the signal more than the set point, the fire alarm was sounded through cotton wicks fire test and smoke generator.

An Implementation of an Intelligent Access Point System Based on a Feed Forward Neural Network for Internet of Things (사물인터넷을 위한 신경망 기반의 지능형 액세스 포인트 시스템의 구현)

  • Lee, Youngchan;Lee, SoYeon;Kim, Dae-Young
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.95-104
    • /
    • 2019
  • Various kinds of devices are used for the Internet of Things (IoT) service, and IoT devices mainly use communication technology that uses the frequency of the unlicensed band. There are several types of communication technology in the unlicensed band, but WiFi is most commonly used. Devices used for IoT services vary in computing resources from devices with limited capabilities to smartphones and provide services over wireless networks such as WiFi. Most IoT devices can't perform complex operations for network control, thus they choose a WiFi access point (AP) based on signal strength. This causes a decrease in IoT service efficiency. In this paper, an intelligent AP system that can efficiently control the WiFi connection of the IoT devices is implemented. Based on the network information measured by the IoT device, the access point learns using a feed forward neural network algorithm, and predicts a network connection state to control the WiFi connection. By controlling the WiFi connection at the AP, the service efficiency of the IoT device can be improved.

A Study on the Analysis of R&D Trends and the Development Plan of Electronic Attack System (전자공격체계 연구개발 동향 분석과 발전방안에 대한 연구)

  • Sim, Jaeseong;Park, Byoung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.469-476
    • /
    • 2021
  • An electronic attack (EA) system is an essential weapon system for performing electronic warfare missions that contain signal tracking and jamming against multiple threats using electromagnetic waves, such as air defense radars, wireless command and communication networks, and guided missiles. The combat effectiveness can be maximized, and the survivability of militarily protecting combat power can be enhanced through EA mission operations, such as disabling the functions of multiple threats. The EA system can be used as a radio frequency jamming system to respond to drone attacks on the core infrastructure, such as airports, power plants, and communication broadcasting systems, in the civilian field. This study examined the criteria for classification according to the electronic attack missions of foreign EA systems based on an aviation platform. The foreign R&D trends by those criteria were investigated. Moreover, by analyzing the R&D trends of domestic EA systems and future battlefields in the domestic security environments, this paper proposes technological development plans of EA systems suitable for the future battlefield environments compared to the foreign R&D trends.