• 제목/요약/키워드: Information and communication Technology

검색결과 11,774건 처리시간 0.043초

A Study on the Integration Between Smart Mobility Technology and Information Communication Technology (ICT) Using Patent Analysis

  • Alkaabi, Khaled Sulaiman Khalfan Sulaiman;Yu, Jiwon
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권6호
    • /
    • pp.89-97
    • /
    • 2019
  • This study proposes a method for investigating current patents related to information communication technology and smart mobility to provide insights into future technology trends. The method is based on text mining clustering analysis. The method consists of two stages, which are data preparation and clustering analysis, respectively. In the first stage, tokenizing, filtering, stemming, and feature selection are implemented to transform the data into a usable format (structured data) and to extract useful information for the next stage. In the second stage, the structured data is partitioned into groups. The K-medoids algorithm is selected over the K-means algorithm for this analysis owing to its advantages in dealing with noise and outliers. The results of the analysis indicate that most current patents focus mainly on smart connectivity and smart guide systems, which play a major role in the development of smart mobility.

A Comparison of Spectrum-Sensing Algorithms Based on Eigenvalues

  • Ali, Syed Sajjad;Liu, Jialong;Liu, Chang;Jin, Minglu
    • Journal of information and communication convergence engineering
    • /
    • 제13권4호
    • /
    • pp.241-247
    • /
    • 2015
  • Cognitive radio has been attracting increased attention as an effective approach to improving spectrum efficiency. One component of cognitive radio, spectrum sensing, has an important relationship with the performance of cognitive radio. In this paper, after a summary and analysis of the existing spectrum-sensing algorithms, we report that the existing eigenvalue-based semi-blind detection algorithm and blind detection algorithm have not made full use of the eigenvalues of the received signals. Applying multi-antenna systems to cognitive users, we design a variety of spectrum-sensing algorithms based on the joint distribution of the eigenvalues of the received signal. Simulation results validate that the proposed algorithms in this paper are able to detect whether the signal of the primary user exists or not with high probability of detection in an environment with a low signal-to-noise ratio. Compared with traditional algorithms, the new algorithms have the advantages of high detection performance and strong robustness

The usage of Electronic Databases in Academic Libraries in Ghana. The Experience of Ghana Communication Technology University Library (GCTUL)

  • Afua Frempong- Kore;Ameyaw Samuel
    • International Journal of Knowledge Content Development & Technology
    • /
    • 제14권2호
    • /
    • pp.7-27
    • /
    • 2024
  • This study examines the use of electronic databases (e-databases) by faculty members of the Ghana Communication Technology University (GCTU). The study used a descriptive research method. Copies of the questionnaire were used for the data collection. Due to the manageable population, no sampling method was used in this study. The Statistical Package for the Social Sciences (IBM-SPSS 21.0) was used for data analysis. The results showed that most faculty members were aware of the availability of databases in the library. Additionally, the findings established that Emerald, as well as Taylor and Francis, were ranked highly in terms of availability and accessibility. The study identified problems such as difficulty in downloading information as well as poor internet connectivity. Based on the results, the study recommended that library management should address all the challenges that users encounter as soon as possible.

Anti-Reactive Jamming Technology Based on Jamming Utilization

  • Xin Liu;Mingcong Zeng;Yarong Liu;Mei Wang;Xiyu Song
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권10호
    • /
    • pp.2883-2902
    • /
    • 2023
  • Since the existing anti-jamming methods, including intelligent methods, have difficulty against high-speed reactive jamming, we studied a new methodology for jamming utilization instead of avoiding jamming. Different from the existing jamming utilization techniques that harvest energy from the jamming signal as a power supply, our proposed method can take the jamming signal as a favorable factor for frequency detection. Specifically, we design an intelligent differential frequency hopping communication framework (IDFH), which contains two stages of training and communication. We first adopt supervised learning to get the jamming rule during the training stage when the synchronizing sequence is sent. And then, we utilize the jamming rule to improve the frequency detection during the communication stage when the real payload is sent. Simulation results show that the proposed method successfully combated high-speed reactive jamming with different parameters. And the communication performance increases as the power of the jamming signal increase, hence the jamming signal can help users communicate in a low signal-to-noise ratio (SNR) environment.

BLDC 모터 제어를 위한 PWM 분석과 전류리플 최소화 (Minimization of Current Ripple and Analysis of PWM methods for the Control of BLDCM)

  • 오태석;신윤수;허남억;김일환
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2008년도 심포지엄 논문집 정보 및 제어부문
    • /
    • pp.242-243
    • /
    • 2008
  • 사다리꼴 역기전력을 갖는 BLDC 전동기 제어는 구형파 전류를 인가함으로서 DC 모터와 같은 제어를 할 수 있어 많은 응용 분야에 사용되고 있다. 구형파 전류를 인가하기 위하여 연구된 PWM방식을 분석해 보면 몇 가지 문제점을 가지고 있다. 기존의 연구내용으로는 유니폴라 PWM방법, 바이폴라 PWM 방법, 하이브리드 PWM 방법이 있으나 PWM을 정확히 분석해보면 원하는 전압을 인가할 수 없는 부분이 있음을 알 수 있다. 특히 방향을 바꾸는 시점이나 속도를 급격히 줄이는 부분에서는 원하는 전압이 인가되지 않음을 알 수 있다. 본 논문에서는 이러한 문제점을 분석하고 정확한 전압이 인가될 수 있는 방법을 제안한다.

  • PDF

V2X 통신 기술 동향 (V2X Communication Technology Trends)

  • Han-gyun Jung;Seong-keun Jin;Jae-min Kwak
    • 한국항행학회논문지
    • /
    • 제27권6호
    • /
    • pp.861-864
    • /
    • 2023
  • Recently, V2X (vehicle-to-everyting) communication has established itself as an essential technology for cooperative autonomous driving. V2X communication currently includes DSRC (dedicated short range communication) communication technology, which is a WLAN (wireless local area network) based communication technology, and C-V2X (cellular-V2X) communication technology, which is a Cellular-based communication technology. Since these two communication methods are not compatible with each other, various studies and experiments are being conducted to select one of the two communication methods. In the case of C-V2X communication, there are LTE-V2X (long term evolutionV2X) communication technology, which is an initial version, and 5G-V2X communication technology, which is a next-generation version. 5G-V2X communication technology has been completed only until standardization, so LTE-V2X communication technology is mainly used. In this paper, we introduce trends related to various issues in V2X communication, including communication method decisions.

Flexible Protocol Reconfiguration for Emergency Communication Systems

  • Zhang, Ji;Li, Hai;Hou, Shujuan
    • ETRI Journal
    • /
    • 제33권1호
    • /
    • pp.18-26
    • /
    • 2011
  • The necessity for services of emergency communication systems to be uninterrupted and reliable has brought forward strict requirements for express software upgrades of base stations. Based on reconfigurability technology, this paper presents a protocol reconfiguration scheme for emergency communication base stations. By introducing the concept of 'local safe state,' the proposed scheme could make the updating and replacement of the protocol software flexible and maintain interactions during the updating procedure to achieve seamless system upgrades. Further, taking TETRA protocol stack and VxWorks operating system as an example, specific processes and realization methods of reconfiguration are proposed in this paper, along with the measurements of the factors impacting on the system performance. Simulation results show that, compared with traditional technology, the method proposed significantly improves the system efficiency and does not interrupt system services.

혼돈신호를 이용한 IoT의 MQTT 보안 프로토콜 설계 (IoT MQTT Security Protocol Design Using Chaotic Signals)

  • 임거수
    • 한국정보전자통신기술학회논문지
    • /
    • 제11권6호
    • /
    • pp.778-783
    • /
    • 2018
  • 정보통신과 산업기술의 급속한 발전으로 인간과 모든 프로그램 그리고 사물들이 인터넷을 통해 연결되는 초연결사회(hyper-connected society)가 구현되고 있다. 초연결사회를 구현하기 위한 정보의 수집은 사물과 사물 그리고 사물과 인간을 연결하는 사물인터넷(IoT: Internet of Thing)이 그 역할을 담당하고 있다. (MQTT: Message Queuing Telemetry Transport)는 이런 사물인터넷의 제약된 통신환경에 최적화되어 개발된 푸시 기술(push technology) 기반의 경량 메시지 전송 프로토콜이다. 초연결사회를 지향하면서 IoT가 담고 있는 정보는 센서의 환경정보에서 이제는 사람의 질병과 건강관리까지 담당하는 광범위한 정보가 되었다. 이런 MQTT에 대한 보안 문제는 환경정보 유출뿐만 아니라 개인의 정보 침해에까지 이르게 되었다. 우리는 이런 MQTT의 보안의 문제점을 해결하기 위해 혼돈계의 초기치 민감성, 유사 난수성을 무결성과 기밀성에 적용하여 새로운 보안 MQTT통신방법을 설계하였다. 우리가 설계한 혼돈계를 이용한 암호화 방법은 구조가 간단하고 계산량이 적기 때문에 IoT와 같은 제한된 통신환경에 적합한 통신방법이라고 생각된다.