• Title/Summary/Keyword: Device-to-device communications

Search Result 756, Processing Time 0.031 seconds

Similarity Comparison Among Open API Parameters Using Open API Description Document (Open API 기술문서를 이용한 Open API 파라미터 유사도 비교)

  • Kim, Sang-il;Kim, Hwa-sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.2
    • /
    • pp.241-243
    • /
    • 2016
  • The recent spread of smart devices has led to creating a variety of services based on the smart device, and the needs for the user-centric services that fit the individual users according to their situations and characteristics are increasing. However, current services can not fulfil the individual requirement of individual user, because these services are intended for unspecified individual. This paper, as a key technology of automatic user-centric service mash-up considering the situation of individual user, investigated the similarity comparison method between the Open API parameters by calculating the amount of mutual information of the parameters extracted from the Open API documents.

A Supplementary Service Technology for Enhanced Receiver Performance of Emergency Alert Broadcast Based on 5G Cellular Communications (5G 이동통신 기반 재난 방송의 수신 성능 향상을 위한 부가 서비스 기법)

  • Chang, Sekchin
    • Journal of Broadcast Engineering
    • /
    • v.26 no.2
    • /
    • pp.197-207
    • /
    • 2021
  • The emergency alert broadcast service based on cellular communications is defined as CBS. However, the CBS just supports a limited text message, which might be unavailable to foreigners, who are unfamiliar with local characters. The CBS protocol relies on a broadcast mechanism. Such a broadcast technology exhibits that the number of outage users significantly increases under poor channel conditions. In this paper, we present a supplementary service technology for 5G CBS, which considerably enhances the accessibility of foreigners and illiterate persons, and the receiver performance. For the enhanced receiver performance, the proposed supplementary service approach effectively exploits the device-based geo-targeting capability that the 5G CBS can afford to offer.

Wearable Computers

  • Cho, Gil-Soo;Barfield, Woodrow;Baird, Kevin
    • Fiber Technology and Industry
    • /
    • v.2 no.4
    • /
    • pp.490-508
    • /
    • 1998
  • One of the latest fields of research in the area of output devices is tactual display devices [13,31]. These tactual or haptic devices allow the user to receive haptic feedback output from a variety of sources. This allows the user to actually feel virtual objects and manipulate them by touch. This is an emerging technology and will be instrumental in enhancing the realism of wearable augmented environments for certain applications. Tactual displays have previously been used for scientific visualization in virtual environments by chemists and engineers to improve perception and understanding of force fields and of world models populated with the impenetrable. In addition to tactual displays, the use of wearable audio displays that allow sound to be spatialized are being developed. With wearable computers, designers will soon be able to pair spatialized sound to virtual representations of objects when appropriate to make the wearable computer experience even more realistic to the user. Furthermore, as the number and complexity of wearable computing applications continues to grow, there will be increasing needs for systems that are faster, lighter, and have higher resolution displays. Better networking technology will also need to be developed to allow all users of wearable computers to have high bandwidth connections for real time information gathering and collaboration. In addition to the technology advances that make users need to wear computers in everyday life, there is also the desire to have users want to wear their computers. In order to do this, wearable computing needs to be unobtrusive and socially acceptable. By making wearables smaller and lighter, or actually embedding them in clothing, users can conceal them easily and wear them comfortably. The military is currently working on the development of the Personal Information Carrier (PIC) or digital dog tag. The PIC is a small electronic storage device containing medical information about the wearer. While old military dog tags contained only 5 lines of information, the digital tags may contain volumes of multi-media information including medical history, X-rays, and cardiograms. Using hand held devices in the field, medics would be able to call this information up in real time for better treatment. A fully functional transmittable device is still years off, but this technology once developed in the military, could be adapted tp civilian users and provide ant information, medical or otherwise, in a portable, not obstructive, and fashionable way. Another future device that could increase safety and well being of its users is the nose on-a-chip developed by the Oak Ridge National Lab in Tennessee. This tiny digital silicon chip about the size of a dime, is capable of 'smelling' natural gas leaks in stoves, heaters, and other appliances. It can also detect dangerous levels of carbon monoxide. This device can also be configured to notify the fire department when a leak is detected. This nose chip should be commercially available within 2 years, and is inexpensive, requires low power, and is very sensitive. Along with gas detection capabilities, this device may someday also be configured to detect smoke and other harmful gases. By embedding this chip into workers uniforms, name tags, etc., this could be a lifesaving computational accessory. In addition to the future safety technology soon to be available as accessories are devices that are for entertainment and security. The LCI computer group is developing a Smartpen, that electronically verifies a user's signature. With the increase in credit card use and the rise in forgeries, is the need for commercial industries to constantly verify signatures. This Smartpen writes like a normal pen but uses sensors to detect the motion of the pen as the user signs their name to authenticate the signature. This computational accessory should be available in 1999, and would bring increased peace of mind to consumers and vendors alike. In the entertainment domain, Panasonic is creating the first portable hand-held DVD player. This device weight less than 3 pounds and has a screen about 6' across. The color LCD has the same 16:9 aspect ratio of a cinema screen and supports a high resolution of 280,000 pixels and stereo sound. The player can play standard DVD movies and has a hour battery life for mobile use. To summarize, in this paper we presented concepts related to the design and use of wearable computers with extensions to smart spaces. For some time, researchers in telerobotics have used computer graphics to enhance remote scenes. Recent advances in augmented reality displays make it possible to enhance the user's local environment with 'information'. As shown in this paper, there are many application areas for this technology such as medicine, manufacturing, training, and recreation. Wearable computers allow a much closer association of information with the user. By embedding sensors in the wearable to allow it to see what the user sees, hear what the user hears, sense the user's physical state, and analyze what the user is typing, an intelligent agent may be able to analyze what the user is doing and try to predict the resources he will need next or in the near future. Using this information, the agent may download files, reserve communications bandwidth, post reminders, or automatically send updates to colleagues to help facilitate the user's daily interactions. This intelligent wearable computer would be able to act as a personal assistant, who is always around, knows the user's personal preferences and tastes, and tries to streamline interactions with the rest of the world.

  • PDF

Military Group Key Management for Mobile and Secure Multicast Communications (이동성과 보안성 있는 멀티케스트 통신을 위한 군용 그룹 키 관리)

  • Jung, Youn-Chan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.977-983
    • /
    • 2010
  • In mobile and secure military networks, full-meshed IPSec tunnels, which do correspond to not physical links but logical links between each IPSec device and its peer, are required to provide multicast communications. All IPSec devices need support in changing IPSec tunnels by a way of using a multicast group key which is updated dynamically. Tactical terminals, which often constitute a group, need also secure multicast communications in the same group members. Then, the multicast group key is required to be updated dynamically in order to support group members' mobility. This paper presents challenging issues of designing a secure and dynamic group key management of which concept is based on the Diffie-Hellman (DH) key exchange algorithm and key trees. The advantage of our dynamic tree based key management is that it enables the dynamic group members to periodically receive status information from every peer members and effectively update a group key based on dynamically changing environments.

Maximum Delay-Aware Admission Control for Machine-to-Machine Communications in LTE-Advanced Systems (LTE-Advanced 시스템에서 M2M 통신의 최대 지연시간을 고려한 호 수락 방법)

  • Jun, Kyungkoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.12
    • /
    • pp.1113-1118
    • /
    • 2012
  • Smart grid and intelligent transportation system draw significant interest since they are considered as one of the green technologies. These systems require a large number of sensors, actuators, and controllers. Also, machine-to-machine (M2M) communications is important because of the automatic control. The LTE-Advanced networks is preparing a set of functions that facilitate the M2M communications, and particularly the development of an efficient call admission control mechanism is critical. A method that groups MTC devices according to QoS constraints and determines the admission depending on the QoS satisfaction is limitedly applied only if the data transmission period and the maximum delay are identical. This paper proposed a call admission control that is free from such limitation and also optimizes the admission process under the certain condition of the transmission period and maximum delay. The theorems regarding the proposed method are presented with the proofs. The simulations confirms its validity and shows it is better in call admission probability than existing works.

A Fast Vision-based Head Tracking Method for Interactive Stereoscopic Viewing

  • Putpuek, Narongsak;Chotikakamthorn, Nopporn
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1102-1105
    • /
    • 2004
  • In this paper, the problem of a viewer's head tracking in a desktop-based interactive stereoscopic display system is considered. A fast and low-cost approach to the problem is important for such a computing environment. The system under consideration utilizes a shuttle glass for stereoscopic display. The proposed method makes use of an image taken from a single low-cost video camera. By using a simple feature extraction algorithm, the obtained points corresponding to the image of the user-worn shuttle glass are used to estimate the glass center, its local 'yaw' angle, as measured with respect to the glass center, and its global 'yaw' angle as measured with respect to the camera location. With these estimations, the stereoscopic image synthetic program utilizes those values to interactively adjust the two-view stereoscopic image pair as displayed on a computer screen. The adjustment is carried out such that the so-obtained stereoscopic picture, when viewed from a current user position, provides a close-to-real perspective and depth perception. However, because the algorithm and device used are designed for fast computation, the estimation is typically not precise enough to provide a flicker-free interactive viewing. An error concealment method is thus proposed to alleviate the problem. This concealment method should be sufficient for applications that do not require a high degree of visual realism and interaction.

  • PDF

Novel Pass-transistor Logic based Ultralow Power Variation Resilient CMOS Full Adder

  • Guduri, Manisha;Islam, Aminul
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.17 no.2
    • /
    • pp.302-317
    • /
    • 2017
  • This paper proposes a new full adder design based on pass-transistor logic that offers ultra-low power dissipation and superior variability together with low transistor count. The pass-transistor logic allows device count reduction through direct logic realization, and thus leads to reduction in the node capacitances as well as short-circuit currents due to the absence of supply rails. Optimum transistor sizing alleviates the adverse effects of process variations on performance metrics. The design is subjected to a comparative analysis against existing designs based on Monte Carlo simulations in a SPICE environment, using the 22-nm CMOS Predictive Technology Model (PTM). The proposed ULP adder offers 38% improvement in power in comparison to the best performing conventional designs. The trade-off in delay to achieve this power saving is estimated through the power-delay product (PDP), which is found to be competitive to conventional values. It also offers upto 79% improvement in variability in comparison to conventional designs, and provides suitable scalability in supply voltage to meet future demands of energy-efficiency in portable applications.

Recent Trends in Standards Related to the Internet of Things and Machine-to-Machine Communications

  • Husain, Syed;Prasad, Athul;Kunz, Andreas;Papageorgiou, Apostolos;Song, JaeSeung
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.4
    • /
    • pp.228-236
    • /
    • 2014
  • One of major purposes of these standard technologies is to ensure interoperability between entities from different vendors and enable interworking between various technologies. As interoperability and interworking are essential for machine-to-machine communications (M2M) and Internet of Things (IoT) for them to achieve their ultimate goal, i.e., things to be connected each other, multiple standards organizations are now working on development M2M/IoT related specifications. This paper reviews the current activities of some of the most relevant standardization bodies in the area of M2M and IoT: third-generation partnership project (3GPP) core and radio network aspects, broadband forum, and oneM2M. The major features and issues being focused upon in these standards bodies are summarized. Finally, some key common trends among the different bodies are identified: a common service layer platform, new technologies mitigating an explosive growth of network traffic, and considerations and efforts related to the development of device management technologies.

Packet Transceiver on 2.4GHz for Whooper Swan

  • Nakada, Kaoru;Nakajima, Isao;Hata, Jun-ichi;Ta, Masuhisa
    • Journal of Multimedia Information System
    • /
    • v.5 no.2
    • /
    • pp.91-98
    • /
    • 2018
  • We devised a bird-borne transceiver unit for S-band packet radio communications based on the CC2500 transceiver, a device manufactured by Texas Instruments (TI). Our assessments determined the optimal parameters needed to achieve successful bird-to-center communication over a distance of 18 km and bird-to-bird communication over a distance of 200 m. These parameters included optimal modulation methods, transmission rates, and antennas. We equipped the transceiver unit with a modified dipole antenna (collinear antenna), which we tested in a 10 m anechoic chamber. Our experimental assessments and circuit design review identified the following parameters: 2FSK modulation method; 14.28 kHz frequency shift; 101.56 kHz IF reception bandwidth; and Manchester encoding (+). Our assessments showed bird-to-bird communications could be achieved over a distance of 200 m assuming MSK, FEC (+), and 500 kbps. Following tests by an official body, we obtained 28 sets of a type approval license for 2.4 GHz. In cooperation with the Yamashina Institute for Ornithology, we attempted to tag and release six or more swans. This unit gives us the ability to obtain vital data on swans. We expect this data to provide significant benefits, including clues on improving screening for infected individuals.

User Route analysis of using GPS on a Mobile Device and Moving Route Recommendation System (모바일장치의 GPS를 이용한 사용자 이동경로 분석 및 이동경로 추천 시스템)

  • Kim, Sun-Yong;Park, Bum-Jun;Jung, Jai-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.135-141
    • /
    • 2011
  • Mobile communication technology in the field of ubiquitous computing is one of important technologies. The development of GPS technology in mobile communications technology and PDA, the vast majority of mobile devices such as smart phones also being equipped with GPS functionality. This user where they are located where they are based on the number of through services were able to receive information. In this paper, mounted on a mobile device user's location using GPS capabilities to track the migration routes and the accumulated user to determine the migratory path of the system used to recommend the proposed route of the proposed method and system Designs. The services offered by tracking the location of the user to move the user to route data to create and upload to the server. Upload a migration path to move data from where they currently reside to the user is recommended to go to your destination. The services offered by the users do not know where to travel or go to your destination, etc. If you do not remember the path can be useful.