• Title/Summary/Keyword: Information and communication technology

Search Result 11,774, Processing Time 0.06 seconds

A Study on the Integration Between Smart Mobility Technology and Information Communication Technology (ICT) Using Patent Analysis

  • Alkaabi, Khaled Sulaiman Khalfan Sulaiman;Yu, Jiwon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.6
    • /
    • pp.89-97
    • /
    • 2019
  • This study proposes a method for investigating current patents related to information communication technology and smart mobility to provide insights into future technology trends. The method is based on text mining clustering analysis. The method consists of two stages, which are data preparation and clustering analysis, respectively. In the first stage, tokenizing, filtering, stemming, and feature selection are implemented to transform the data into a usable format (structured data) and to extract useful information for the next stage. In the second stage, the structured data is partitioned into groups. The K-medoids algorithm is selected over the K-means algorithm for this analysis owing to its advantages in dealing with noise and outliers. The results of the analysis indicate that most current patents focus mainly on smart connectivity and smart guide systems, which play a major role in the development of smart mobility.

A Comparison of Spectrum-Sensing Algorithms Based on Eigenvalues

  • Ali, Syed Sajjad;Liu, Jialong;Liu, Chang;Jin, Minglu
    • Journal of information and communication convergence engineering
    • /
    • v.13 no.4
    • /
    • pp.241-247
    • /
    • 2015
  • Cognitive radio has been attracting increased attention as an effective approach to improving spectrum efficiency. One component of cognitive radio, spectrum sensing, has an important relationship with the performance of cognitive radio. In this paper, after a summary and analysis of the existing spectrum-sensing algorithms, we report that the existing eigenvalue-based semi-blind detection algorithm and blind detection algorithm have not made full use of the eigenvalues of the received signals. Applying multi-antenna systems to cognitive users, we design a variety of spectrum-sensing algorithms based on the joint distribution of the eigenvalues of the received signal. Simulation results validate that the proposed algorithms in this paper are able to detect whether the signal of the primary user exists or not with high probability of detection in an environment with a low signal-to-noise ratio. Compared with traditional algorithms, the new algorithms have the advantages of high detection performance and strong robustness

The usage of Electronic Databases in Academic Libraries in Ghana. The Experience of Ghana Communication Technology University Library (GCTUL)

  • Afua Frempong- Kore;Ameyaw Samuel
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.14 no.2
    • /
    • pp.7-27
    • /
    • 2024
  • This study examines the use of electronic databases (e-databases) by faculty members of the Ghana Communication Technology University (GCTU). The study used a descriptive research method. Copies of the questionnaire were used for the data collection. Due to the manageable population, no sampling method was used in this study. The Statistical Package for the Social Sciences (IBM-SPSS 21.0) was used for data analysis. The results showed that most faculty members were aware of the availability of databases in the library. Additionally, the findings established that Emerald, as well as Taylor and Francis, were ranked highly in terms of availability and accessibility. The study identified problems such as difficulty in downloading information as well as poor internet connectivity. Based on the results, the study recommended that library management should address all the challenges that users encounter as soon as possible.

Anti-Reactive Jamming Technology Based on Jamming Utilization

  • Xin Liu;Mingcong Zeng;Yarong Liu;Mei Wang;Xiyu Song
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2883-2902
    • /
    • 2023
  • Since the existing anti-jamming methods, including intelligent methods, have difficulty against high-speed reactive jamming, we studied a new methodology for jamming utilization instead of avoiding jamming. Different from the existing jamming utilization techniques that harvest energy from the jamming signal as a power supply, our proposed method can take the jamming signal as a favorable factor for frequency detection. Specifically, we design an intelligent differential frequency hopping communication framework (IDFH), which contains two stages of training and communication. We first adopt supervised learning to get the jamming rule during the training stage when the synchronizing sequence is sent. And then, we utilize the jamming rule to improve the frequency detection during the communication stage when the real payload is sent. Simulation results show that the proposed method successfully combated high-speed reactive jamming with different parameters. And the communication performance increases as the power of the jamming signal increase, hence the jamming signal can help users communicate in a low signal-to-noise ratio (SNR) environment.

Minimization of Current Ripple and Analysis of PWM methods for the Control of BLDCM (BLDC 모터 제어를 위한 PWM 분석과 전류리플 최소화)

  • Oh, Tae-Seok;Shin, Yun-Su;Her, Nam-Euk;Kim, Il-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 2008.04a
    • /
    • pp.242-243
    • /
    • 2008
  • 사다리꼴 역기전력을 갖는 BLDC 전동기 제어는 구형파 전류를 인가함으로서 DC 모터와 같은 제어를 할 수 있어 많은 응용 분야에 사용되고 있다. 구형파 전류를 인가하기 위하여 연구된 PWM방식을 분석해 보면 몇 가지 문제점을 가지고 있다. 기존의 연구내용으로는 유니폴라 PWM방법, 바이폴라 PWM 방법, 하이브리드 PWM 방법이 있으나 PWM을 정확히 분석해보면 원하는 전압을 인가할 수 없는 부분이 있음을 알 수 있다. 특히 방향을 바꾸는 시점이나 속도를 급격히 줄이는 부분에서는 원하는 전압이 인가되지 않음을 알 수 있다. 본 논문에서는 이러한 문제점을 분석하고 정확한 전압이 인가될 수 있는 방법을 제안한다.

  • PDF

V2X Communication Technology Trends (V2X 통신 기술 동향)

  • Han-gyun Jung;Seong-keun Jin;Jae-min Kwak
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.6
    • /
    • pp.861-864
    • /
    • 2023
  • Recently, V2X (vehicle-to-everyting) communication has established itself as an essential technology for cooperative autonomous driving. V2X communication currently includes DSRC (dedicated short range communication) communication technology, which is a WLAN (wireless local area network) based communication technology, and C-V2X (cellular-V2X) communication technology, which is a Cellular-based communication technology. Since these two communication methods are not compatible with each other, various studies and experiments are being conducted to select one of the two communication methods. In the case of C-V2X communication, there are LTE-V2X (long term evolutionV2X) communication technology, which is an initial version, and 5G-V2X communication technology, which is a next-generation version. 5G-V2X communication technology has been completed only until standardization, so LTE-V2X communication technology is mainly used. In this paper, we introduce trends related to various issues in V2X communication, including communication method decisions.

Flexible Protocol Reconfiguration for Emergency Communication Systems

  • Zhang, Ji;Li, Hai;Hou, Shujuan
    • ETRI Journal
    • /
    • v.33 no.1
    • /
    • pp.18-26
    • /
    • 2011
  • The necessity for services of emergency communication systems to be uninterrupted and reliable has brought forward strict requirements for express software upgrades of base stations. Based on reconfigurability technology, this paper presents a protocol reconfiguration scheme for emergency communication base stations. By introducing the concept of 'local safe state,' the proposed scheme could make the updating and replacement of the protocol software flexible and maintain interactions during the updating procedure to achieve seamless system upgrades. Further, taking TETRA protocol stack and VxWorks operating system as an example, specific processes and realization methods of reconfiguration are proposed in this paper, along with the measurements of the factors impacting on the system performance. Simulation results show that, compared with traditional technology, the method proposed significantly improves the system efficiency and does not interrupt system services.

IoT MQTT Security Protocol Design Using Chaotic Signals (혼돈신호를 이용한 IoT의 MQTT 보안 프로토콜 설계)

  • Yim, Geo-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.778-783
    • /
    • 2018
  • With the rapid advancement of information and communication technology and industrial technologies, a hyper-connected society is being realized to connect human beings, all programs and things via the Internet. IoT (Internet of Thing), which connects a thing and another thing, and things and human beings, gathers information to realize the hyper-connected society. MQTT (Message Queuing Telemetry Transport) is a push-technology-based light message transmission protocol that was developed to be optimized to the limited communication environment such as IoT. In pursuing the hyper-connected society, IoT's sensor environment information is now being used as a wide range of information on people's diseases and health management. Thus, security problems of such MQTT include not only the leak of environmental information but also the personal information infringement. To resolve such MQTT security problems, we have designed a new security MQTT communication by applying the initial-value sensitivity and pseudorandomness of the chaotic system to the integrity and confidentiality. The encryption method using our proposed chaotic system offers a simple structure and a small amount of calculation, and it is deemed to be suitable to the limited communication environment such as IoT.