• Title/Summary/Keyword: 무선통신융합

Search Result 514, Processing Time 0.025 seconds

Transmission Performance Analysis of VCCN with SUMO depending on Packet Size and Participating Number of Clients (SUMO를 이용한 VCCN에서 패킷의 크기와 참여한 클라이언트 수에 따른 전송 성능에 대한 연구)

  • Yeon, Seunguk;Chae, Ye-Eun;Kang, Seung-Seok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.1
    • /
    • pp.285-290
    • /
    • 2018
  • Vehicular ad hoc network (VANET) is one of the future communication technologies in which it offers safe-driving information and Internet access for both drivers and passengers by communicating among cars on the road. In case of applying Content Centric Network (CCN) rather than TCP/IP over VANET, called VCCN, it can provide efficient multicast communication of shared information among participating cars as well as offer corresponding one-to-one communications. This paper introduces SUMO for simulating traffic flows, VANET for car-to-car ad hoc communications, and CCN for a future Internet architecture. In addition, it compares and analyses the transmission performance of moving cars over VCCN. According to the simulation results using SUMO and VCCN, the larger the packet size, the better the transmission performance. In addition, VCCN provides higher packet transmission rate than that of TCP/IP when the clients shares the same contents. Furthermore, the overall data reception rate exceeds the physical transmission channel rate.

Recent Advances in Medical Image Processing and Diagnosis Technology for Capsule Endoscope Systems (캡슐 내시경 시스템의 최신 의료 영상처리 및 진단 기술)

  • Kim, Ki-Yun;Kim, Tae-Kwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.9
    • /
    • pp.802-812
    • /
    • 2013
  • Recently, Capsule Endoscope(CE) system is receiving great attention as a innovative convergence technology that allows doctors to examine the digestive tract of a human body in the minimum invasive way. Once patients swallow the vitamin pill-sized capsule, doctors can detect disease such as blood-based abnormalities, polyps, ulcers, and Crohn's disease through the image information delivered by wireless or human body communication module in CE. Although CE is really a innovative technology, it still suffers from some drawbacks in terms of correct diagnosis of lesion and analysis required time. Due to the massive images approximately 60~120 thousand frames taken by miniature camera in the CE, doctors spend too much time examining the images and analyzing the lesions. Therefore, to lighten the burden of doctors, software tools for fast diagnosis and medical image processing techniques for correct diagnosis of lesion are essential in CE system. In this paper, we investigate the latest trends of diagnosis tools and image processing techniques based on major makers of CE systems, which are hardly known to the general public.

Design and Implementation of Cattle Estrus Detection System based on Wireless Communication and Internet of Things (무선 통신과 사물인터넷 기반의 소 발정 관찰 시스템 설계 및 구현)

  • Lee, Ha-Woon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.6
    • /
    • pp.1309-1316
    • /
    • 2018
  • Cattle estrus detection system based on Internet of Things is designed and implemented by using Arduino pro-mini, gyroscope, acceleration sensor, bluetooth master and slave module. The implemented system measures cattle's moving and the measured data are transmitted to the computer connected to RX module by bluetooth TX module. They are plotted in 2-dimensional graph on the computer monitor and the number of transition at each sensor axis are calculated from the graph. The detected and gathered data from the system are analyzed by the proposed algorithm to decide which cows are in the estrus or not. The method to apply bluetooth scatternet is shown and the proposed system can be used to increase the success rate of artificial insemination in normal estrus by detecting the cow's behaviors such as the number of jumping. In this paper, the implemented cattle behavior detecting the system(TX module) are strapped on cattle's leg and it measures the cattle behaviors for determining where that a cattle is estrus or not by the proposed algorithm.

Position Tracking Method in Construction field using IT Technology (IT기술을 이용한 건설현장 내 위치관제 기법)

  • Kim, Hyun-soo;Do, Seoung-bok;Choi, Hyun-young;Jang, Young-gu;Jeon, Heung-su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.475-478
    • /
    • 2014
  • This paper proposed the position tracking and recognition method of workers and cars in construction field. The reason why the position of workers and cars has to be tracked is to prevent the safety accident, emergency rescue, and theft of building materials by unauthorized people and car, etc. To realize the tracking, it needs to adopt the Information Telecommunication technology to the construction field as an integrated support system. In this paper, we proposed the continuous positioning tracking algorithm for workers and moving cars using the selected wireless communication network. And we proposed the virtual gateway method to detect the entrance status of moving workers and cars. All of these proposed methods are evaluated in real construction field using the prototype of support system made by ourselves.

  • PDF

Research on Impact Sensors for Developing the Electronic Body Protector of Taekwondo (태권도 전자호구 개발을 위한 충격감지 센서 연구)

  • Ki, Jae-Sug;Jeong, Dong-Hwa;Lee, Hyun-Jun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.648-655
    • /
    • 2019
  • This paper proposes the differential development of a Taekwondo electronic body protector. For this development, the most suitable sensor system was selected after analyzing and testing various sensor methods (magnetic sensors, electric capacity sensors, contact switch sensors, and piezo-film sensors) that could be applied in the electronic body protector, the selected sensors were distributed to the body and feet to make a more precise hit score, unlike the existing system in which all sensors are centralized on the body. Furthermore, it aims to illuminate using a lightweight film-type piezoelectric sensor on the body protector. In the case of an existing electronic body protector, all sensors and network device were concentrated on the body protector, so users need to purchase a set if they want it. On the other hand, the proposed system cloud can be used individually using a smart scoring WEP program. The effects of decreasing weight by up to 20% were compared with those of the existing system. Setting up a test facility is very difficult, so more study will be needed to analyze the effects of a hit.

Design of V2I Based Vehicle Identification number In a VANET Environment (VANET 환경에서 차대번호를 활용한 V2I기반의 통신 프로토콜 설계)

  • Lee, Joo-Kwan;Park, Byeong-Il;Park, Jae-Pyo;Jun, Mun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.12
    • /
    • pp.7292-7301
    • /
    • 2014
  • With the development of IT Info-Communications technology, the vehicle with a combination of wireless-communication technology has resulted in significant research into the convergence of the component of existing traffic with information, electronics and communication technology. Intelligent Vehicle Communication is a Machine-to-Machine (M2M) concept of the Vehicle-to-Vehicle. The Vehicle-to-Infrastructure communication consists of safety and the ease of transportation. Security technologies must precede the effective Intelligent Vehicle Communication Structure, unlike the existing internet environment, where high-speed vehicle communication is with the security threats of a wireless communication environment and can receive unusual vehicle messages. In this paper, the Vehicle Identification number between the V2I and the secure message communication protocol was proposed using hash functions and a time stamp, and the validity of the vehicle was assessed. The proposed system was the performance evaluation section compared to the conventional technique at a rate VPKI aspect showed an approximate 44% reduction. The safety, including authentication, confidentiality, and privacy threats, were analyzed.

U-Bus Advertisement Business Model and System Implementation based on Wireless Networks (무선망 기반의 U-버스광고 비즈니스 모델 및 시스템 구축 방안)

  • Roh, Su-Sung;Kim, Do-Nyun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.88-97
    • /
    • 2010
  • Recently the more convenient services are provided to people in the city in line with the change of city paradigm and the recent development of ubiquitous. For example, Information on bus arrivals an effective advertisement the combination of high technology and departures through smart-phones. However, in respect of the mobile advertisement, because of difficulties such as the means of transferring the mass storage data or the burden of communication charges. there need means to improve such difficulties. This study has been conducted aiming to overcome such difficulties. This study suggests the strategic differentiation plan through the analysis of the media characteristics such as real time service information when in traveling, U-Bus business model in the category of mobile advertisement, etc. and also the concrete system establishment plan from the operation center via network to the delivery of the advertisement through vehicle terminals. In respect that this study suggests the implications as a practical business model through the fusion of high technology and diverse media. It has great significance.

A Pseudo-Random Number Generator based on Segmentation Technique (세그먼테이션 기법을 이용한 의사 난수 발생기)

  • Jeon, Min-Jung;Kim, Sang-Choon;Lee, Je-Hoon
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.17-23
    • /
    • 2012
  • Recently, the research for cryptographic algorithm, in particular, a stream cipher has been actively conducted for wireless devices as growing use of wireless devices such as smartphone and tablet. LFSR based random number generator is widely used in stream cipher since it has simple architecture and it operates very fast. However, the conventional multi-LFSR RNG (random number generator) suffers from its hardware complexity as well as very closed correlation between the numbers generated. A leap-ahead LFSR was presented to solve these problems. However, it has another disadvantage that the maximum period of the generated random numbers are significantly decreased according to the relationship between the number of the stages of the LFSR and the number of the output bits of the RNG. This paper presents new leap-ahead LFSR architecture to prevent this decrease in the maximum period by applying segmentation technique to the conventional leap-ahead LFSR. The proposed architecture is implemented using VHDL and it is simulated in FPGA using Xilinx ISE 10.1, with a device Virtex 4, XC4VLX15. From the simulation results, the proposed architecture has only 20% hardware complexity but it can increases the maximum period of the generated random numbers by 40% compared to the conventional Leap-ahead archtecture.

Smart Poster Authentication Scheme based on Authentication URL (인증 URL 기반의 스마트 포스터 인증기법)

  • Lee, Jae-Cheol;Park, Chang-Seop
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.91-99
    • /
    • 2014
  • NFC(Near Field Communication) is a wireless data exchange technology in 13.56MHz frequency band between devices. The NFC Forum defines the NDEF(NFC Data Exchange Format) exchanging data format between NFC devices and NFC Tags, the NFC RTD(Record Type Definition) defining the record types in the NDEF messages, the Smart Poster RTD in order to replace current paper posters and the Signature RTD to ensure the authenticity and integrity for NDEF records. But the previous smart poster authentication scheme have the weaknesses of using the PKI(Public Key Infrastructure) with certificates to verify the public key for the smart poster authentication and requiring the additional storage capacity of NFC tags for the authentication path. Therefore in this paper we propose a smart poster authentication scheme and implementation based on the authentication URL, a digital signature and a public key without the PKI and certificates for the smart poster authentication.

A Study on Distributed Cooperation Intrusion Detection Technique based on Region (영역 기반 분산협력 침입탐지 기법에 관한 연구)

  • Yang, Hwan Seok;Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.53-58
    • /
    • 2014
  • MANET can quickly build a network because it is configured with only the mobile node and it is very popular today due to its various application range. However, MANET should solve vulnerable security problem that dynamic topology, limited resources of each nodes, and wireless communication by the frequent movement of nodes have. In this paper, we propose a domain-based distributed cooperative intrusion detection techniques that can perform accurate intrusion detection by reducing overhead. In the proposed intrusion detection techniques, the local detection and global detection is performed after network is divided into certain size. The local detection performs on all the nodes to detect abnormal behavior of the nodes and the global detection performs signature-based attack detection on gateway node. Signature DB managed by the gateway node accomplishes periodic update by configuring neighboring gateway node and honeynet and maintains the reliability of nodes in the domain by the trust management module. The excellent performance is confirmed through comparative experiments of a multi-layer cluster technique and proposed technique in order to confirm intrusion detection performance of the proposed technique.