• Title/Summary/Keyword: Information and communication Technology

Search Result 11,774, Processing Time 0.053 seconds

A Novel Multi-link Integrated Factor Algorithm Considering Node Trust Degree for Blockchain-based Communication

  • Li, Jiao;Liang, Gongqian;Liu, Tianshi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.3766-3788
    • /
    • 2017
  • A blockchain is an underlying technology and basic infrastructure of the Bitcoin system. At present, blockchains and their applications are developing rapidly. However, the basic research of blockchain technology is still in the early stages. The efficiency and reliability of blockchain communication is one of the research problems that urgently need to be studied and addressed. Existing algorithms may be less feasible for blockchain-based communication because they only consider a single communication factor (node communication capability or node trust degree) and only focus on a single communication performance parameter(communication time or communication reliability). In this paper, to shorten the validation time of blockchain transactions and improve the reliability of blockchain-based communication, we first establish a multi-link concurrent communication model based on trust degree, and then we propose a novel integrated factor communication tree algorithm (IFT). This algorithm comprehensively considers the node communication link number and the node trust degree and selects several nodes with powerful communication capacity and high trust as the communication sources to improve the concurrency and communication efficiency. Simulation results indicate that the IFT algorithm outperforms existing algorithms. A blockchain communication routing scheme based on the IFT algorithm can increase communication efficiency by ensuring communication reliability.

An Architecture of IoT Information Gateway in the IMS (IMS 기반의 IoT 정보 게이트웨이 구조)

  • Wang, Qichao;Lee, Jaeoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.3
    • /
    • pp.29-36
    • /
    • 2019
  • With the rapid development of 5G technology, more and more network functions are interconnected and more popular. In order to effectively manage emerging network concepts, it allows any device object in the real world to be connected anywhere and at any time through the integration of device object recognition, interaction and raw data collection technologies. In addition, IP Multimedia Subsystem (IMS) is an architecture framework for transmitting IP-based information to the device object which can be represented as end user. Therefore, the Internet of Things and IP Multimedia Subsystem (IoT-IMS) communication platform can provide a convenient and fast way for user or device objects to deploy new application services effectively. In particular, in order to collect and manage the device information from IoT effectively in the IoT-IMS communication platform, an IoT Information Gateway (IIG) is proposed. Through the IoT Application Service (AS) scenario, the collected device information can be easily observed and managed in a unified way.

A Protection Technique Against the Damages Caused by Lightning Surges on Information and Communication Facilities

  • Lee, Bok-Hee;Kang, Sung-Man;Ahn, Chang-Hwan
    • KIEE International Transactions on Electrophysics and Applications
    • /
    • v.3C no.4
    • /
    • pp.117-122
    • /
    • 2003
  • The AC power lines and signal lines of info-communication networks are routed on overhead poles and are highly exposed to lightning strikes. Due to the potential difference between grounding points of AC power lines and signal lines, the electronic equipments connected to the signal lines can easily be damaged by lightning surges. In this work, in order to develop reliable methods of protecting information and communication facilities from lightning surges, the reliability and performance of SPDs (surge protective devices) were experimentally investigated in an actual-sized test circuit. The behaviors of SPDs against lightning surges from AC power lines and signal lines and the coordinated effects of SPD installation methods were evaluated. As a consequence, it was confirmed that the bypass arrester methods and common grounding system are both highly effective.

Design and Implementation of Problem-Based Learning System Based on Video Communication Technology (화상통신기술을 활용한 문제중심학습 시스템 설계 및 구현)

  • Kim, Bum-Shik;An, Sung-Hun;Kim, Dong-Ho
    • Journal of The Korean Association of Information Education
    • /
    • v.8 no.2
    • /
    • pp.167-176
    • /
    • 2004
  • Due to the development of information communication technology, educational environment has undergone much change and various types of teaching and learning methods based on information communication technology has been suggested. Recently, remote education using the internet are also spreading. However, in current classrooms, students are asked to do an teacher-centered assignment, which they are required to collect and report some information using the internet. This method does not help students use the advantages of learning using the internet, which stimulate students-students interaction and teacher-students interaction.Thus, this study focused on the problem-based learning system based on video communication technology. The researcher designed the problem-based learning system based on video communication technology and applied the system to classes at elementary school. The results were analyzed in terms of students-students interaction and teacher-students interaction in the internet. This research found that the problem-based learning system stimulates teacher and students communication and has positive effects on students' attitude and interest in learning. This research proposes that the traditional teacher-centered teaching method can be supplemented with cyber space learning, which has the merit of problem-based learning model.

  • PDF

Reliability Verification of Secured V2X Communication for Cooperative Automated Driving (자율협력주행을 위한 V2X 보안통신의 신뢰성 검증)

  • Jung, Han-gyun;Lim, Ki-taeg;Shin, Dae-kyo;Yoon, Sang-hun;Jin, Seong-keun;Jang, Soo-hyun;Kwak, Jae-min
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.5
    • /
    • pp.391-399
    • /
    • 2018
  • V2X communication is a technology in which a vehicle exchanges information with various entities such as other vehicles, infrastructure, networks, pedestrians, etc. through a wired or wireless network. Recently, V2X communication technology has been steadily developed and recently it has played an important role in autonomous cooperation driving technology combined with autonomous vehicle technology. Autonomous vehicles can utilize the external information received via V2X communication to extend the recognition range of existing sensors and to support more safe and natural autonomous driving. In order to operate these autonomous cooperative vehicles on public roads, the security and reliability of autonomous V2X communication should be verified in advance. In this paper, we present test scenarios and test procedures of secure V2X communication for cooperative automated driving and present verification results.

Area Extraction of License Plates Using an Artificial Neural Network

  • Kim, Hyun-Yul;Lee, Seung-Kyu;Lee, Geon-Wha;Park, Young-rok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.7 no.4
    • /
    • pp.212-222
    • /
    • 2014
  • In the current study, the authors propose a method for extracting license plate regions by means of a neural network trained to output the plate's center of gravity. The method is shown to be effective. Since the learning pattern presentation positions are defined by random numbers, a different pattern is submitted to the neural network for learning each time, which enables it to form a neural network with high universality of coverage. The article discusses issues of the optimal learning surface for a license plate covered by the learning pattern, the effect of suppression learning of the number and pattern enlargement/reduction and of concentration value conversion. Results of evaluation tests based on pictures of 595 vehicles taken at an under-ground parking garage demonstrated detection rates of 98.5%, 98.7%, and 100%, respectively.

Design of Hybrid V2X Communication Module for Cooperative Automated Driving (자율협력주행을 위한 하이브리드 V2X 통신모듈 설계)

  • Lim, Ki-taeg;Jin, Seong-keun;Kwak, Jae-min
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.3
    • /
    • pp.213-219
    • /
    • 2018
  • In this paper, we propose a design method and process for hardware and software of hybrid V2X communication module that supports both C-ITS communication protocol designed for vehicle environment and Legacy LTE communication technology. C-ITS is suitable for safety service applications due to its low latency characteristics, and Legacy LTE is a technology suitable for non-safety applications such as traffic information and infotainment due to high latency and high capacity. The hybrid V2X communication module supports multiple communication technologies of WAVE and LTE, in which WAVE supports multiple channels, so that it is designed to transmit road information such as LDM and positioning correction information to an autonomous vehicle in real time. The main design results presented in this paper will be applied to the implementation of future hybrid V2X communication terminals for vehicles.

Channel Statistical MAC Protocol for Cognitive Radio

  • Xiang, Gao;Zhu, Wenmin;Park, Hyung-Kun
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.1
    • /
    • pp.40-44
    • /
    • 2010
  • opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, with bring new research challenges in MAC design. We propose a cognitive MAC protocol using statistical channel information and selecting appropriate idle channel for transmission. The protocol based on the CSMA/CA, exploits statistics of spectrum usage for decision making on channel access. Idle channel availability, spectrum hole sufficiency and available channel condition will be included in algorithm statistical information. The model include the control channel and data channel, the transmitter negotiates with receiver on transmission parameters through control channel, statistical decision results (successful rate of transmission) from exchanged transmission parameters of control channel should pass the threshold and decide the data transmission with spectrum hole on data channel. A dynamical sensing range as a important parameter introduced to maintain the our protocol performance. The proposed protocol's simulation will show that proposed protocol does improve the throughput performance via traditional opportunistic spectrum access MAC protocol.

Multi-Channel MAC Protocol Using Statistical Channel Utilization for Cognitive Networks

  • Xiang, Gao;Zhu, Wen-Min;Park, Hyung-Kun
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.3
    • /
    • pp.273-276
    • /
    • 2010
  • Opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, with bring new research challenges in MAC design. We propose a cognitive MAC protocol using statistical channel information and selecting appropriate idle channel for transmission. The protocol based on the CSMA/CA, exploits statistics of spectrum usage for decision making on channel access. Idle channel availability, spectrum hole sufficiency and available channel condition will be included in algorithm statistical information. The model include the control channel and data channel, the transmitter negotiates with receiver on transmission parameters through control channel, statistical decision results (successful rate of transmission) from exchanged transmission parameters of control channel should pass the threshold and decide the data transmission with spectrum hole on data channel. The proposed protocol's simulation will show that proposed protocol does improve the throughput performance via traditional opportunistic spectrum access MAC protocol.

Research on Relay Selection Technology Based on Regular Hexagon Region Segmentation in C-V2X

  • Li, Zhigang;Yue, Xinan;Wang, Xin;Li, Baozhu;Huang, Daoying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.9
    • /
    • pp.3138-3151
    • /
    • 2022
  • Traffic safety and congestion are becoming more and more serious, especially the frequent occurrence of traffic accidents, which have caused great casualties and economic losses. Cellular Vehicle to Everything (C-V2X) can assist in safe driving and improve traffic efficiency through real-time information sharing and communication between vehicles. All vehicles communicate directly with Base Stations (BS), which will increase the base station load. And when the communicating vehicles are too far apart, too fast or there are obstacles in the communication path, the communication link can be unstable or even interrupted. Therefore, choosing an effective and reliable multi-hop relay-assisted Vehicle to Vehicle (V2V) communication can not only reduce the base station load and improve the system throughput but also expand the base station coverage and improve the communication quality of edge vehicles. Therefore, a communication area division scheme based on regular hexagon segmentation technology is proposed, a relay-assisted V2V communication mechanism is designed for the divided communication areas, and an efficient communication link is constructed by selecting the best relay node. Simulation results show that the scheme can improve the throughput of the system by nearly 55% and enhance the robustness of the V2V communication link.