• Title/Summary/Keyword: 위치 서비스

Search Result 3,756, Processing Time 0.028 seconds

Performance of Interference Mitigation using Optical Relay and Optical Beamforming in Visible Light Communication Systems (가시광 통신 시스템에서 Optical Relay와 Optical Beamforming을 통한 간섭 완화 성능)

  • Hwang, Yu Min;Kim, Yoon Hyun;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.3
    • /
    • pp.63-68
    • /
    • 2012
  • The VLC (visible light communication) system is communication technology using visible rays (RGB) that come out in LED device. It is energy curtailment effect and possible in ubiquitous network service applications. Also, VLC system has the above advantage about that the communication throughout the whole room is enabled by high power lighting and lighting equipment with white colored LED which are easy to install and have good outward appearance. However, the signal detection performance for the receiver near the network of transmitter boundary is severely degraded and the transmission efficiency decreased due to the influence of the interference signal from the adjacent networks. In this paper, we propose an interference mitigation method with optical relay and optical beamforming scheme in VLC systems, and evaluate the reception performance. For the system BER, the proposed system demonstrates the performance enhancement compared to the not using the optical relay and optical beamforming scheme, and SNR performance gain and higher channel capacity is achieved.

A Study of Fire Shunt Guidance Based on Wireless Sensor Networks (무선 센서 네트워크 기반의 화재 대피 유도 연구)

  • Kim, Yong-Woo;Kim, Do-Hyeon;Kwak, Ho-Young;Park, Hee-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.11
    • /
    • pp.1547-1554
    • /
    • 2008
  • This paper proposes a fire shunt guidance system model based on rule, it presents suitable shunt route in real-time according to collected fire information of the building inside using wireless sensor networks. So, this system model is composed of the sensor alert module, the behavior suggestion module, and the emergency device control module. The sensor alert module uses rule-base algorithm that monitored the information to collect periodically in wireless sensor networks. And, the behavior suggestion module proposed a suitable behavior, this module supports to judge the fire area with danger sensor list. Additional, the emergency device control module controls a related emergency device according to the suggested behavior and to present on a control screen. We experiment the fire shunt guidance system based on Internet Web for operation verification of the proposed system. Consequently, this study supports people safety with the behavior suggestion according to the context information when an emergency situation happens.

  • PDF

Trust-Based Filtering of False Data in Wireless Sensor Networks (신뢰도 평가를 통한 무선 센서 네트워크에서의 거짓 데이타 제거)

  • Hur, Jun-Beom;Lee, Youn-Ho;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.1
    • /
    • pp.76-90
    • /
    • 2008
  • Wireless sensor networks are expected to play a vital role in the upcoming age of ubiquitous computing such as home environmental, industrial, and military applications. Compared with the vivid utilization of the sensor networks, however, security and privacy issues of the sensor networks are still in their infancy because unique challenges of the sensor networks make it difficult to adopt conventional security policies. Especially, node compromise is a critical threat because a compromised node can drain out the finite amount of energy resources in battery-powered sensor networks by launching various insider attacks such as a false data injection. Even cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the insider attack from a compromised node. In this paper, we propose a novel trust-based secure aggregation scheme which identifies trustworthiness of sensor nodes and filters out false data of compromised nodes to make resilient sensor networks. The proposed scheme suggests a defensible approach against the insider attack beyond conventional cryptographic solutions. The analysis and simulation results show that our aggregation scheme using trust evaluation is more resilient alternative to median.

Design and Implementation of Outdoor Positioning System Using MSS Mechanism & Wireless AP characteristic (MSS 기법과 무선 AP 특징을 활용 실외 측위 시스템 설계 및 구현)

  • Lee, Hyoun-Sup;Kim, Jin-Deog
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.3
    • /
    • pp.433-439
    • /
    • 2011
  • The positioning system based on wireless AP collects AP information distributed in the real world, stores it into database, and measures the position objects by comparing with searched AP information. The existing fingerprinting method is a probabilistic modeling method that acquires much of the data collected from one location upon database composition, and stores the average of the data for the sake of use it in positioning objects. Using the average value, however, may cause the probability of errors Such errors are fatal weaknesses for services based on the accurate position. This paper described the characteristics and problems of the previously used wireless AP positioning system, and proposed a method of using the AP DB and an MSS mechanism for outdoor positioning in order to solve the aforementioned problems. And the results obtained from experimental tests showed that the proposed method achieved very low error rate(27%) compared with the existing method.

DEVELOPMENT OF iRTK (iNVERTED REAL-TIME KINEMATIC) SYSTEM BASED ON THE INTERNET (인터넷 기반 iRTK 시스템 개발)

  • Joh, Jeong-Ho;Park, Jong-Uk;Choi, Byung-Kyu;Park, Pil-Ho
    • Journal of Astronomy and Space Sciences
    • /
    • v.20 no.3
    • /
    • pp.197-204
    • /
    • 2003
  • We demonstrated positioning accuracy of iRTK system, which has been developed by Korea Astronomy Observatory, using a low-price GPS receiver. Each four different baseline positioning tests using the iRTK system, we certified 1-3 meters level positioning accuracy of the iRTK system. While the iRTK is similar to conventional RTK at coverage and accuracy, the iRTK positioning carried out from data processing center. And also, the iRTK system has no limit of data communication coverage because of using wire/wireless Internet. But the iRTK system has a weakness of short available coverage within 5km. Therefore we discussed a plan to adopt VRS (Virtual Reference System) as completion of the iRTK system preparing nation-wide iRTK service in near future.

A Study on Integrity Monitoring Improvement of the DGPS Reference Station (DGPS 기준국 무결성 감시 체계 고도화 방안 연구)

  • Cho, Deuk-Jae;Park, Sang-Hyun;Choi, Jin-Kyu;Suh, Sang-Hyun
    • Journal of Navigation and Port Research
    • /
    • v.31 no.6
    • /
    • pp.509-514
    • /
    • 2007
  • The importance of the GPS is becoming larger and larger since it is one of the Global Navigation Satellite Systems and is regarded as a national infrastructure in the field positioning and timing Nowadays many researches avoiding and/or minimizing economic loss caused by unexpected fault of the GPS are being carried out because GPS fault can give a large impact on social security system as well as economic system NDGPS network which has been authorized by the Ministry of Marine and Fisheries provides services for marine users and evolved into a national infrastructure for GNSS users. Many researchers and engineers are doing research work in order to apply the NDGPS network to other fields. From this trend, it can be expected that the integrity and related functions for the NDGPS users will become more important than before. This paper analyzes integrity informations about the real GNSS fault and proposes method on integrity monitoring improvement of the DGPS reference station.

Implementation of Mobile Agent Multicast Migration Model for Minimizing Network Required Time (네트워크 소요시간 최소화를 위한 이동 에이전트의 멀티캐스트 이주 모델 구현)

  • Kim Kwang-jong;Ko Hyun;Kim Young Ja;Lee Yon-sik
    • The KIPS Transactions:PartD
    • /
    • v.12D no.2 s.98
    • /
    • pp.289-302
    • /
    • 2005
  • The mobile agent has very various performance according to the element of communication number of times between hosts, quantity of transmission data agent's size, network state etc. specially, migration method is caused much effect in whole performance of distributed system. Most existing migration methods have simplicity structure that it moves doing to accumulate continuously result after achieving task by visiting host in the fixed order. Therefore, in case there are situation such as fault, obstacle, and service absence etc. This can be inefficient due to mobile agent increased network required time. In this paper, we design and implementation Multicast Migration Model for minimizing network required time by solving this problems. Multicast Migration Model includes components such as mobile agent including call module and naming agent, which provides object replication information and distributed server's location transparence. And we evaluate and compare with existing migration method applying prototype system to verify implemented migration model.

Wireless Caching Algorithm Based on User's Context in Smallcell Environments (소형셀 환경에서 사용자 컨텍스트 기반 무선 캐시 알고리즘)

  • Jung, Hyun Ki;Jung, Soyi;Lee, Dong Hak;Lee, Seung Que;Kim, Jae-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.7
    • /
    • pp.789-798
    • /
    • 2016
  • In this paper, we propose a cache algorithm based on user's context for enterprise/urban smallcell environments. The smallcell caching method is to store mobile users' data traffic at a storage which is equipped in smallcell base station and it has an effect of reducing core networks traffic volume. In our algorithm, contrary to existing smallcell cache algorithms, the cache storage is equipped in a edge server by using a concept of the Mobile Edge Computing. In order to reflect user's characteristics, the edge server classifies users into several groups based on user's context. Also the edge server changes the storage size and the cache replacement frequency of each group to improve the cache efficiency. As the result of performance evaluation, the proposed algorithm can improve the cache hit ratio by about 11% and cache efficiency by about 5.5% compared to the existing cache algorithm.

A Management Method for Personal Purchases in Mobile RFID System (개인 물품 관리 지원 모바일 RFID 시스템)

  • Kim, Tae-Sung;Sohn, Kyung-Ho;Yoon, Kang-Jin;Kim, Young-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.296-301
    • /
    • 2010
  • Radio frequency identification(RFID) system can identify an object using wireless transmission. RFID applications are numerous and far reaching. The most interesting and widely used applications are supply chain management for companies. Currently, RFID tags must be detached or killed for security and privacy reasons when tagged objects are purchased. In this paper, we present a new architecture that transfers information about products from the electronic product code information services (EPCIS) server of a company to an individual's personal purchases management (PPM) server when products with RFID codes are sold. It solves the security and privacy issues without detaching the tag. Moreover, the PPM server described in this paper allows customers to handle the expiration dates, updates, location management, and group management of products.

Location Based Subway Information Service Using Bluetooth (블루투스를 이용한 위치기반 지하철 정보 서비스)

  • Cheong, Seung-Ho;Kim, Dae-Ok;Park, Chong-Kwang;Kim, Kwang-Hwan;Lee, Eun-Chul;Kim, Kyo-Sun
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.163-165
    • /
    • 2006
  • The subway passengers are usually alert to the current location of the train in order not to miss the destination or transfer stations. The Global Positioning System (GPS), although expensive, can give an alarm if properly programmed, but cannot receive the satellite signals, underground. Therefore, a novel approach to context-aware location-based subway information system is motivated. The passengers, who are equipped with mobile devices such as laptop, PDA, and mobile phone as clients of the Personal Area Network (PAN), request the Bluetooth connection to the server which is installed in each car of the train. While the sorrel broadcasts the location-based information including the previous station, the current velocity of the train, the distance and time to the next station, the clients provide additional services based on the recognized context of the information, and what the passengers individually want. The services are spontaneous and autonomous rather than passive. The services include not only the information on the nearby stations, exit numbers, connection buses but also the location-based alarms which can be set specific to various personal requests, and sounded by the location of the train rather than time. Whereas the arrival time may not be accurate due to the delays of the train, the location can be accurately traced and broadcast by the server. Also, the clients do not need any expensive systems like GFS. Towards validating the proposed approach, we implemented a Bluetooth PAN including a PC server, two PDA clients and a laptop client. We modeled a train on the Incheon Subway Line #1 and a train on the Seoul-to-Incheon Line on the server, simulated the virtual trains together with the real clients. and verified that all the services were successfully provided.

  • PDF