• Title/Summary/Keyword: Information and communication Technology

Search Result 11,726, Processing Time 0.044 seconds

A Patient Treatment System Using RFID and Internet Communication

  • Jo, Heung-Kuk
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.5
    • /
    • pp.586-590
    • /
    • 2010
  • Medical technology is gradually being developed by applying information technologies. Especially, RFID technology is being used for precise disease history information of patients [4]. And in case the patient is far away, the patient can be treated using network communication of the internet [5][6]. The internet makes us to treat or operate the patient without being restricted to time or space. If the above technologies are made as a system, the patient can be treated or operated without being restricted to time or space. In this paper, we present a patient treatment system has been implemented with a system using RFID and network communication of the internet [1][2][3][4]. The system is driven as follows. First, the information of patient can be checked from a remote PC, if the tag that a patient has been read through a reader. And a remote treatment is performed by controlling robot's arm with a joystick using internet network [19][20][21]. The RFID system was implemented in frequency of 125 KHz [1]. The information of patient can be checked with PDA, PC and C-LCD using Bluetooth and WLAN [7][8][9][10]. For the treatment and operation of the patient, the robot's arm has been formed using AX-12 motor, joystick and two buttons [11][12][13][14][15] [17][18].

Data Transmission Algorithm for LED Communication Systems (LED 통신 시스템의 데이터 전송 알고리즘)

  • Kim, Kyung Ho;Hwang, Yu Min;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.8 no.2
    • /
    • pp.44-49
    • /
    • 2013
  • LED communication is a wireless communication technology to transmit information using visible light coming out from the LED(Light Emitting Diode). It is a technique that can overcome RF(Radio Frequency) communication problems that are frequency allocations, human body hazards, security vulnerabilities, and interference between electronic devices. As a technique that can be used as lighting and communications with using LED, LED communication is suitable for ubiquitous environment. This paper introduces the process of data transmission algorithm for LED communication systems algorithm using LED, PD(Photodiode), and MCU(Micro Controller Unit).

A Study on the Analysis of Security Requirements through Literature Review of Threat Factors of 5G Mobile Communication

  • DongGyun Chu;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • v.20 no.1
    • /
    • pp.38-52
    • /
    • 2024
  • The 5G is the 5th generation mobile network that provides enhanced mobile broadband, ultra-reliable & low latency communications, and massive machine-type communications. New services can be provided through multi-access edge computing, network function virtualization, and network slicing, which are key technologies in 5G mobile communication. However, these new technologies provide new attack paths and threats. In this paper, we analyzed the overall threats of 5G mobile communication through a literature review. First, defines 5G mobile communication, analyzes its features and technology architecture, and summarizes possible security issues. Addition, it presents security threats from the perspective of user devices, radio access network, multi-access edge computing, and core networks that constitute 5G mobile communication. After that, security requirements for threat factors were derived through literature analysis. The purpose of this study is to conduct a fundamental analysis to examine and assess the overall threat factors associated with 5G mobile communication. Through this, it will be possible to protect the information and assets of individuals and organizations that use 5G mobile communication technology, respond to various threat situations, and increase the overall level of 5G security.

How Network Coding Benefits Converge-Cast in Wireless Sensor Networks

  • Tang, Zhenzhou;Wang, Hongyu;Hu, Qian;Hai, Long
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1180-1197
    • /
    • 2013
  • Network coding is one of the most promising techniques to increase the reliability and reduce the energy consumption for wireless sensor networks (WSNs). However, most of the previous works mainly focus on the network coding for multicast or unicast in WSNs, in spite of the fact that the converge-cast is the most common communication style in WSNs. In this paper, we investigate, for the first time as far as we know, the feasibility of acquiring network coding benefits in converge-cast, and we present that with the ubiquitous convergent structures self-organized during converge-casting in the network, the reliability benefits can be obtained by applying linear network coding. We theoretically derive the network coding benefits obtained in a general convergent structure, and simulations are conducted to validate our theoretical analysis. The results reveal that the network coding can improve the network reliability considerably, and hence reduce number of retransmissions and improve energy-efficiency.

Development of Data-Flow Control Algorithm of Wireless Network for Sewage Disposal Facility

  • Jung, Soonho;Shin, Jaekwon;Kang, Jeongjin;Lee, Seungyoun;Lee, Junghoon
    • International journal of advanced smart convergence
    • /
    • v.4 no.2
    • /
    • pp.14-19
    • /
    • 2015
  • Recently, water sewage disposal facilities are able to manage real-time data collection and record management through compact broadband modem LAN switching technology. Therefore, it needs more stable and efficient facility management. So, we required practical use of environmental facilities convergence based on broadband integrated modem. In this paper, we proposed short distance wireless communication network of compact broadband modem for sewage disposal facilities. And it received data inside of water treatment facility using the two communication methods (IEEE802.11x and IEEE802.15.4x). Then, our proposed an data-flow control algorithm of wireless network technology will prioritize processing data when emergency happen through collecting data, analysis data and processing. Lastly, we proved usefulness by experiment and simulation analysis.

An SDN based hopping multicast communication against DoS attack

  • Zhao, Zheng;Liu, Fenlin;Gong, Daofu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2196-2218
    • /
    • 2017
  • Multicast communication has been widely used in the Internet. However, multicast communication is vulnerable to DoS attack due to static router configuration. In this paper, HMC, a hopping multicast communication method based on SDN, is proposed to tackle this problem. HMC changes the multicast tree periodically and makes it difficult for the attackers to launch an accurate attack. It also decreases the probability of multicast communication being attacked by DoS and in the meanwhile, the QoS constrains are not violated. In this research, the routing problem of HMC is proven to be NP-complete and a heuristic algorithm is proposed to solve it. Experiments show that HMC has the ability to resist DoS attack on multicast route effectively. Theoretically, the multicast compromised probability can drop more than 0.6 when HMC is adopt. In addition, experiments demonstrate that HMC achieves shorter average multicast delay and better robustness compared with traditional method, and more importantly, it better defends DoS attack.

A Study on Transforming ICT Research Information Service into Semantic Web Environment

  • Song, Jong-Cheol;Moon, Byung-Joo;Jung, Hoe-Kyung
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.3
    • /
    • pp.249-253
    • /
    • 2007
  • The Research on the ICT(Information & Communication Technology) is proposed the category to IT839 strategy by Government. Government is driving to researching on technology about IT839 Strategy. By transforming this category and research information into Semantic Web environment, it is possible to search function utilizing knowledge base and information object by use of TBox and ABox. In this regard, this study proposes technology for generation of Semantic Web Document about ICT Research Information. The ontology is constructed by using category to IT839 Strategy. The features of framework proposed in this study is to have used a skill to directly map Ontology instance and in case of inability of direct mapping, proposed a skill to establish reliable Semantic Web Document by suggesting indirect mapping skill using mechanical study. In addition, it is possible to establish low cost/high quality Semantic Web Document about ICT research information.

Smart Phone and Vehicle Authentication Scheme with M2M Device (M2M 기기에서 스마트폰 및 차량 인증 기법)

  • Yeo, Seong-Gwon;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.4
    • /
    • pp.1-7
    • /
    • 2011
  • As the developing of the information technology, M2M market that is using communication between devices is growing rapidly and many companies are involved in M2M business. In this paper, the concept of telematics and vulnerabilities of vehicle network security are discussed. The convergence of vehicle and information technology, the development of mobile communication technology have improved quality of service that provided to user but as a result security threats has diverse. We proposed new business model that be occurred to the participation of mobile carriers in telematics business and we analyzed mobile radio communication network security vulnerabilities. We proposed smart phone and Vehicle authentication scheme with M2M device as a way to solve vulnerabilities.

A Study on the Management and Application for Prevention Information Communication System (방재정보통신시스템 관리 운용 및 응용에 관한 연구)

  • Kang, Heau-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.6
    • /
    • pp.611-618
    • /
    • 2008
  • The development of information society together with information telecommunication's influence on the human society is a ripple effect and getting wider. Among those ripple effects the disaster prevention is in the public eye in the present day. On the way to the ubiquitous society the main techniques to be concerned in ubiquitous sensor networks are the field of damage of storm and flood, safety facilities, traffic safety, industrial safety, energy safety, fire fighting, specific safety of radioactivity escape incident, environmental pollution, sea pollution, mountain and forrest disaster so on. In this paper the USN technique based on the disaster prevention communication technology service and its requirement technology and application are studied.

  • PDF

V2X Technology Trends for Next-Generation Mobility

  • Kim, Young-Hak
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.7-13
    • /
    • 2020
  • We describes V2X technology, a connectivity-based recognition technology that is attracting attention as a key technology for implementing autonomous driving technology, and autonomous communication modules that implement ADAS technology, a sensor-based recognition technology. It also explains the trends in V2X technology standardization centered on IEEE 802.11p, which is a WAVE technology standard based on Wi-Fi/DSRC. Finally, we will discuss the market growth trend of V2X communication modules in the United States, the leading V2X technology module, and the development of technology development trends of major domestic and international companies that are leading the global technology market related to V2X communication modules. V2X and ADAS technologies will be the biggest influence on automotive purchasing decisions. In recent years, V2I mandates have been promoted beyond V2V, mainly in developed countries such as the United States. The related industry needs to focus on the development of information transmission network technology that can support high frequency high efficiency(transmission rate) and sophisticated positioning accuracy beyond conventional vehicle communication.