• Title/Summary/Keyword: 중계성

Search Result 436, Processing Time 0.028 seconds

Design of a Miniature Power Divider Based on the CRLH Zeroth Order Resonator with the Bandpass Filtering for the Military Satellite (군 위성통신 중계기용 대역통과 여파기 특성을 갖는 CRLH O-차 공진 기반 소형 전력분배기의 설계)

  • Eom, Da-Jeong;Kahng, Sung-Tek;Song, Choong-Ho;Woo, Chun-Sik;Park, Do-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8C
    • /
    • pp.637-644
    • /
    • 2012
  • In this paper, a new compact power divider is suggested. Instead of the quarter wavelength transmission line(TX-line)s for the branches of the conventional Wilkinson's power divider design method, we use our composite right- and left-handed(CRLH) TX-line zeroth order resonator(ZOR) bandpass filters of one twelfth wavelength and reduce the physical length of the power divider. Besides, the filters in the branches can secure the passband for power-division. To validate the proposed power divider, we take an L-band for millitary satellaite transponder as the test case and the performances of the circuit and full-wave simulation results with the CRLH properties of the structure are shown with the dispersion curve and E-field at the ZOR. The measurement is compared with the simulation results. Also, the size reduction effect by the proposed scheme is addressed

The Method of Force of Fire in High-Rise Building by Guide to the Fire Safety Concepts Tree: Focusing on Manually Fire Suppression Strategy (화재안전트리 이론에 따른 초고층건축물의 소방력 공급방안: 수동화재진압 전략을 중심으로)

  • Oh, Seong-Ju;Kong, Ha-Sung
    • Fire Science and Engineering
    • /
    • v.34 no.1
    • /
    • pp.79-88
    • /
    • 2020
  • This study analyzes the issue of the supply of force of fire in the high-rise buildings, and proposes an efficient method to do so. The results are as follows. First, in terms of Detect fire, it is necessary to shorten force of fire supply time by diversifying fire alarms such as alarms, vibrations, and voices from outside, clarification of fire occurrence points, and marking of fire. Second, with regard to communication signals, strengthening the installation target of wireless communication auxiliary facilities, supplementing the installation of repeaters, and constructing a multicommunications network were proposed. Third, in terms of Decide action, it is necessary to supply firefighter and firefighting equipment with the method of crossing of a river in adjacent buildings. Fourth, in terms of Respond to site, helicopters and emergency elevators are used to assist in the supply of firefighting equipment using drones. Easy-to-break glass windows and identification marks are required in every floor. Finally, in terms of applying fire suppressants, water can be supplied by means of a helicopter adjacent to the structure.

Display System Design for Signifying the Received Signals of the Mobile Phone (휴대폰 착신 알림을 위한 모바일 디스플레이 시스템 설계)

  • Park, Jong-An;Chun, Jong-Hun;Kang, Sung-Kwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.289-294
    • /
    • 2011
  • In this paper, we developed a phone call display system or "alimi" for displaying the received phone data at limited space that can not carry a mobile phone and and its validity was confirmed. It consists of a data communication application transmitting the phone data via bluetooth, a RF data repeater to extend the range of data communication, and a display system part for displaying the received phone data to the phone user. It has economy in terms of system installation because the implementation of the proposed system is simple and low cost installation is possible. As ordinary mobile phones users using the system can easily utilize it by downloading the application on the app. store, it has economy and convenience checking whether a call is received.

Hierarchical Cellular Network Design with Channel Allocation (채널할당을 고려한 다중계층 셀룰러 네트워크 설계)

  • Park, Hyun-Soo;Lee, Sang-Heon
    • Journal of the military operations research society of Korea
    • /
    • v.34 no.2
    • /
    • pp.63-77
    • /
    • 2008
  • With the limited frequency spectrum and an increasing demand for cellular communication services, the problem of channel assignment becomes increasingly important. However, finding a conflict free channel assignment with the minimum channel span is NP hard. The innovations are cellular concept, dynamic channel assignment and hierarchical network design. We consider the frequency assignment problem and the base station placement simultaneously. Our model takes the candidate locations emanating from this process and the cost of assigning a frequency, operating and maintaining equipment as an input. Hierarchical network design using genetic algorithm is the first three-tier (Macro, Micro, Pico) model. We increase the reality through applying to Electromagnetic Compatibility Constraints. Computational experiments on 72 problem instances which have $15{\sim}40$ candidate locations demonstrate the computational viability of our procedure. The result of experiments increases the reality and covers 90% of the demand.

Investigation for Applicability of Bluetooth Mesh Networking in Underground Space (BMN(Bluetooth Mesh Networking)의 지하공간 적용성에 대한 사례 조사)

  • Lee, Chulho;Choi, Soon-Wook;Kang, Tae-Ho;Jeon, Jinoh;Ahn, Cheongjin;Song, Tae-Geon
    • Tunnel and Underground Space
    • /
    • v.29 no.6
    • /
    • pp.367-378
    • /
    • 2019
  • As the development of IT technology, the way to manage the underground construction site in real time using wireless network communication is being considered. Underground space is limited area compared to the ground site due to the enclosed communication environment and spatial characteristics. BMN (Bluetooth Mesh Networking) technology is a recently introduced wireless communication technology that bluetooth device acts as a repeater to form a networking mesh and monitor individual devices. This article examines the areas to be considered for analyzing the applicability of BMN technology to underground spaces, and the cases studies of wireless communication monitoring systems currently being developed. And the BMN technology which is being developed for the underground application is also introduced.

Efficient Relay Selection Algorithm Using S-MPR for Ad-Hoc Networks Based on CSMA/CA (CSMA/CA 기반 애드혹 네트워크에서 S-MPR을 이용한 효율적인 중계 노드 선택 알고리즘)

  • Park, Jong-Ho;Oh, Chang-Yeong;Ahn, Ji-Hyoung;Seo, Myung-Hwan;Cho, Hyung-Weon;Lee, Tae-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8B
    • /
    • pp.657-667
    • /
    • 2012
  • In the MPR selection algorithm of Optimized Link State Routing (OLSR), each node selects own MPRs independently, so most of nodes are selected to MPR at least once. To cope with this problem, the MPR candidate selection algorithm was proposed. The MPR candidate selection algorithm can reduce the number of MPRs, but the efficiencies of route and connectivity decline due to decreased number of MPRs. So, in this paper, we propose the Significant Multi-Point Relay (S-MPR) selection algorithm which can enhance the performance of ad hoc network by improving the MPR selection algorithm of OLSR. In proposed S-MPR selection algorithm, each node selects the most important node to S-MPR to guarantee the connectivity then selects remaining MPRs in MPR candidates. So proposed S-MPR selection algorithm can reduce the overhead of many MPRs without decline of routing performance. To show the performance gain of proposed S-MPR selection algorithm, we simulate the proposed S-MPR selection algorithm by using OPNET.

RFID Distance Bounding Protocol Secure Against Mafia and Terrorist Fraud (테러리스트 공격과 마피아 공격에 안전한 RFID 거리 제한 프로토콜)

  • Kwon, Hye Jin;Kim, Soon Ja
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.11
    • /
    • pp.660-674
    • /
    • 2014
  • RFID system has been used in a variety of services. So, a lot of attacks like a free ride on the service, leakage of property or personal information are known. Therefore, the solutions that address these attacks have been proposed. Among the attacks, mafia fraud, a kind of relay attack, can not be addressed by common authentication protocol. So, Hancke and Kuhn used distance bounding protocol for RFID authentication. After that, Munilla and Peinado modified HK protocol by adding void challenge. So the mafia fraud success probability of adversary is lower than probability of HK protocol. Ahn et al. proposed a protocol that reduces number of a hash computation and traffic than MP protocol. Here, we show that MP protocol can not defend the terrorist fraud and is vulnerable to noise. And we show that also AYBN protocol is vulnerable to mafia fraud and key leakage. Moreover, we propose a new protocol and our experimental results show that our protocol is secure to terrorist and mafia fraud.

DT-GPSR: Delay Tolerant-Greedy Perimeter Stateless Routing Protocol (DT-GPSR: 지연감내형 GPSR 라우팅 프로토콜)

  • Nam, Jae-Choong;Cho, You-Ze
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.2
    • /
    • pp.189-197
    • /
    • 2016
  • Mobile ad-hoc networks (MANETs) experience frequent link disconnections due to non-uniform node distribution and mobility. Thus, end-to-end path establishment-based routing protocols cause frequent transmission failures in MANETs, resulting in heavy control messages for path reestablishment. While location-based MANET routing protocols, such as Greedy Perimeter Stateless Routing (GPSR), use location information to forward messages in a hop-by-hop routing fashion without an end-to-end path establishment procedure, such protocols encounter communication void problems when message forwarding to the next hop fails due to the absence of a relay node. Therefore, to solve this problem, this paper proposes a Delay Tolerant-GPSR (DT-GPSR) protocol, which combines Delay Tolerant Networking (DTN) technology with the GPSR protocol. The performance of DT-GPSR is compared with the performances of the original GPSR and PRoPHET routing protocols through simulation using NS-2. The simulation results confirm that DT-GPSR outperforms GPSR and PRoPHET in terms of the message delivery ratio and message delivery delay.

Design of r-Sensor Protocol and Hardware Implementation for Intelligent Home Service (지능형 홈서비스를 위한r-Sensor프로토콜설계 및 하드웨어 구현)

  • Kwak, Tae-Kil;Lee, Bum-Sung;Jung, Jin-Wook;Jin, Kyo-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.2113-2119
    • /
    • 2006
  • In this paper, we design the r-Sensor protocol for reliable data transmission in the Intelligent Home Service based on the wireless sensor network environment. The r-Sensor protocol improve the reliability of data transmission and node fairness using simple routing algorithm, congestion control, and loss recovery method that minimize the load of relay node. Reposed routing algorithm find out upstream and downstream nodes using the Network Management packet. Meanwhile, loss recovery algorithm uses the Aggregated-Nack. To apply supposed algorithm, the IHS-AMR(Intelligent Home Service - Automatic Meter Reader) and sensor node are designed and implemented in hardware. The IHS-AMR provides remote metering service and also offers home safety service by internetworking with sensor network, mobile phone network and internet.

Multiagent-based Intellignet Electronic Commerce System (다중에이저트 기반의 지능형 전자상거래 시스템)

  • Lee, Eun-Seok;Lee, Jin-Goo
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.855-864
    • /
    • 2001
  • With the increasing importance and complexity of EC (Electronic Commerce) across the Internet, the need and expectation for intelligent software agents to support both consumers and suppliers through the whole process of EC are growing rapidly. To realize the intelligent EC. a multiagent based EC system. which includes foundational technologies such as the establishment of standard product ontology the definition of message and negotiation protocol and brockering, is required. In this paper we propose an intelligent EC System named ICOMA(Intelligent electronic CO mmerce system based on Multi-Agent) as an open infrastructure of multiagent-based EC. Concretely we have proposed. designed and implemented an architecture of multiagent-based EC system including 6-types of agents message protocol for inter-agent negotiation, personalized produst retrieval and filtering., We have confirmed the effectiveness of the system through experiments.

  • PDF