• Title/Summary/Keyword: Wire/Wireless

Search Result 459, Processing Time 0.023 seconds

Design of New Smart Switch with Remote Power Control and Standby Power Management Function (원격 전력제어 및 대기전력 관리 기능을 갖는 새로운 스마트 스위치 설계)

  • Lee, Yong-An;Kim, Kang-Chul;Han, Seok-Bung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.10
    • /
    • pp.2343-2350
    • /
    • 2010
  • In this paper, new smart switch that can monitor and control the power consumption and standby power in real-time by implementing an embedded web-server is proposed. The proposed switch can perform the following functions: measuring the electric power like commercial smart meter product, monitoring the power consumption in real-time in distant places through wire and wireless devices, and finally controlling ON/OFF of each switch. In addition, it also contains auto power-shutoff functions for standy power, overvoltage and overcurrent just like existing power-saving outlet and mulitap. Finally, the proposed smart switch has lower hardware and power consumption than the existing products and can be commercialized as a small-sized product by using exclusive embedded web-server of its own, rather than using PC for monitoring and remote control.

Feature Extraction using Dynamic Time-warped Algorithms based on Discrete Wavelet Transform in Wireless Sensor Networks for Barbed Wire Entanglements Surveillance (철조망 감시를 위한 무선 센서 네트워크에서 이산 웨이블릿 변환 기반의 동적 시간 정합 알고리즘을 이용한 특징 추출)

  • Lee, Tae-Young;Cha, Dae-Hyun;Hong, Jin-Keun;Han, Kun-Hui;Hwang, Chan-Sik
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.12a
    • /
    • pp.185-189
    • /
    • 2009
  • 무선 센서 네트워크는 화산 감시, 전장 감시, 동물 서식지 감시, 건축물의 감시, 농장 관리, 의료분야등 다양한 분야에서 연구되고 있다. 국내에서도 국가 정책 사업으로 교량 및 건축물의 균열 감시, 표적의 침입 탐지 및 식별을 위한 무선 센서 네트워크 연구가 활발히 진행 중이다. 특히, 무선 센서 네트워크의 다양한 분야의 연구 중에서 철조망을 이용한 표적의 침입 탐지 및 식별에 관한 연구는 산업 시설, 보안지역, 교도소, 군사지역, 공항 등 다양한 분야에서 사용된다. 현재 철조망 감시는 대부분 유선 센서 노드를 통한 유선 센서 네트워크 환경에서 이루어지고 있다. 기존의 유선 센서 네트워크는 높은 데이터 전송률을 통해 수신되는 높은 정보의 신호를 이용하여 고속 푸리에 변환에 의한 신호의 주파수 분석 기법을 사용해 왔다. 하지만, 유선 센서 네트워크의 높은 데이터 전송률과 비교하여 무선 센서 네트워크의 센서 노드는 유선 센서 네트워크에 비해 매우 낮은 데이터 전송률을 가진다. 따라서 무선 센서 네트워크에서 수신되는 신호의 정보가 매우 낮고, 유선 센서 네트워크에서 사용된 고속 푸리에 변환에 의한 신호의 주파수 분석에 따른 주파수별 특징 추출을 할 수 없다. 따라서 본 논문에서는 철조망 감시를 위한 높은 데이터 전송률을 보장하는 유선 센서 네트워크에 비해 제한된 통신자원과 센서 노드의 낮은 데이터 전송률로 인해 수신되는 한정적인 신호의 정보를 이용한 무선 센서 네트 워크에서 철조망의 표적 침입 탐지 및 식별을 위한 특징 추출 알고리즘을 제안한다.

  • PDF

Characteristics of SiGe Thin Film Resistors in SiGe ICs (SiGe 집적회로 내의 다결정 SiGe 박막 저항기의 특성 분석)

  • Lee, Sang-Heung;Lee, Seung-Yun;Park, Chan-Woo
    • Journal of the Korean Vacuum Society
    • /
    • v.16 no.6
    • /
    • pp.439-445
    • /
    • 2007
  • SiGe integrated circuits are being used in the field of high-speed wire/wireless communications and microwave systems due to the RF/high-speed analog characteristics and the easiness in the fabrication. Reducing the resistance variation in SiGe thin film resistors results in enhancing the reliability of integrated circuits. In this paper, we investigate the causes that generate the resistance nonuniformity after the silicon-based thin film resistor was fabricated, and consider the counter plan against that. Because the Ti-B precipitate, which formed during the silicide process of the SiGe thin film resistor, gives rise to the nonuniformity of SiGe resistors, the boron ions should be implanted as many as possible. In addition, the resistance deviation increases as the size of the contact hole that interconnects the SiGe resistor and the metal line decreases. Therefore, the size of the contact hole must be enlarged in order to reduce the resistance deviation.

The Comparative Study on Performance Analysis of Windows 7 and Ubuntu Applying Open Source IDS/IPS Suricata (오픈소스 IDS/IPS Suricata를 적용한 Windows7과 Ubuntu 성능 비교 분석)

  • Seok, Jinug;Kim, Jimyung;Choi, Moonseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.141-151
    • /
    • 2017
  • Nowadays, It is undeniable that the threat of network security is growing as time flows due to worldwide development of wire/wireless, various Internet platform and sophisticated hacking techniques. The amount of traffics that Network security solution has to handle is increasing and recently many occurrence of explosive traffic attacks from PulseWave are being observed which has many similar characteristics to New DDos. Medium and small sized firms abroad have developed and distributed Snort and Suricata that are based on open-source Intrusion Detection System(IDS) / Intrusion Prevention System (IPS). The goal of this study is to compare between Windows7 by applying suicata 4.0.0 32bit version and Ubuntu 16.04.3 LTS by applying suicata 4.0.0 version which is an open source Intrusion Detection System / Intrusion Protection System that uses multi threads method. This experiment's environment was set as followed C1100 server model of Dell, Intel Xeon CPU L5520 2.27GHz*2 with 8 cores and 16 threads, 72GB of RAM, Samsung SSD 250GB*4 of HDD which was set on RAID0. According to the result, Suricata in Ubuntu is superior to Suricata in Windows7 in performance and this result indicates that Ubuntu's performance is far advanced than Windows7. This meaningful result is derived because Ubuntu that applied Suricata used multi core CPU and RAM more effectively.

A Method of Extracting Significant Design Attributes using PRETREE Model (PRETREE 모형을 이용한 중요 디자인 속성 추출 방법)

  • Lee, Yuri;Park, Sang-June
    • Science of Emotion and Sensibility
    • /
    • v.15 no.4
    • /
    • pp.565-574
    • /
    • 2012
  • This study focuses on a consumer-based design process that overcomes practical drawbacks of the previously used design process. On the contrary of the existing method of attracting design attributes by designers' own insights, it present the PRETREE model that attracts the important design attributes of the products based on consumer preferences. The PRETREE model has the advantage that it does not require identifying design attributes a priori. For the wire-wireless telephones, this study presents the identifying process the important design attributes empirically using PRETREE Model. The PRETREE Model has been widely used in the fields of psychology, consumer science, economics and business administration. It might also be useful in the design field because it can identify the important design attributes objectively without designers' own insights.

  • PDF

Do Diverse Physical Contexts Matter in Mobile Internet Use\ulcorner (모바일 인터넷 사용 성과와 만족도에 영향을 미치는 신체적 정황 요인에 관한 연구)

  • 류호성;최영완;김진우
    • Korean Journal of Cognitive Science
    • /
    • v.12 no.4
    • /
    • pp.1-9
    • /
    • 2001
  • Mobile Internet can be used anytime and anyplace thanks to the portability of mobile phones and wireless connectivity to the Internet. Therefore Mobile Internet users can be in various contexts compared with Wire Internet users in stationary contexts. In this research out of various context attributes, we selected physical context attributes of hands feet and eyes and studied how these affect the performance of Internet use and user\\` satisfaction. For this research we made control1ed experiments in performing the given task in each attribute and measured the task accuracy and the subjective satisfaction. The experiments indicated that each attribute doesn\\`t affect the accuracy and satisfaction when it is given individually but when two of more context attributes are given simultaneously in context of disturbance of eyes and motion of legs the accuracy and satisfaction declines. This suggests that the subjects need more attention for the physical context of two or more factors than one factor because of the attention capacity limit. As the result, the attention capacity for the task shrinks.

  • PDF

A Study on the Enhancement Process of the Telecommunication Network Management using Big Data Analysis (Big Data 분석을 활용한 통신망 관리 시스템의 개선방안에 관한 연구)

  • Koo, Sung-Hwan;Shin, Min-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.12
    • /
    • pp.6060-6070
    • /
    • 2012
  • Real-Time Enterprise (RTE)'s key requirement is that it should respond and adapt fast to the change of the firms' internal and external situations including the change of market and customers' needs. Recently, the big data processing technology to support the speedy change of the firms is spotlighted. Under the circumstances that wire and wireless communication networks are evolving with an accelerated rate, it is especially critical to provide a strong security monitoring function and stable services through a real-time processing of massive communication data traffic. By applying the big data processing technology based on a cloud computing architecture, this paper solves the managerial problems of telecommunication service providers and discusses how to operate the network management system effectively.

High-Volume Data Processing using Complex Event Processing Engine in the Web of Next Generation (차세대 웹 환경에서 Complex Event Processing 엔진을 이용한 대용량데이터 처리)

  • Kang, Man-Mo;Koo, Ra-Rok;Lee, Dong-Hyung
    • Journal of KIISE:Databases
    • /
    • v.37 no.6
    • /
    • pp.300-307
    • /
    • 2010
  • According to growth of web, data processing technology is developing. In the Web of next generation, high-speed or high-volume data processing technologies for various wire-wireless users, USN and RFID are developing too. In this paper, we propose a high-volume data processing technology using Complex Event Processing(CEP) engine. CEP is the technology to process complex events. CEP Engine is the following characteristics. First it collects a high-volume event(data). Secondly it analyses events. Finally it lets event connect to new actions. In other words, CEP engine collects, analyses, filters high-volume events. Also it extracts events using pattern-matching for registered events and new events. As the results extracted. We use it by an input event of other work, real-time response for demanded event and can trigger to database for only valid data.

Design of Integrated Authentication Scheme for Safe Personal Information Management in a U-Health Environment (U-Health환경에서 안전한 개인정보 관리를 위한 통합 인증스키마 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.6
    • /
    • pp.3865-3871
    • /
    • 2014
  • The U-health service provides medical services with patients anytime or anywhere and is defined as the service that combines information and communication technology with health and medical service. However, it causes some troubles, such as the disclosure of patients' medical information or data spills (personal information extrusion). Moreover, it has the weak point of the security threats associated with data based on existing wire-wireless systems because it conducts data transmission and reception through the network. Therefore, this paper suggests a safe personal information management system by designing integrated certification schema that will help compensate for the weaknesses of the U-health service. In the proposal, the protocols for user information, certification between medical institution and users, data communication encryption & decryption, and user information disuse were designed by applying the ID-Based Encryption, and analyzed such existing systems and PKI Based-based communication process, securely and safely.

DEVELOPMENT OF iRTK (iNVERTED REAL-TIME KINEMATIC) SYSTEM BASED ON THE INTERNET (인터넷 기반 iRTK 시스템 개발)

  • Joh, Jeong-Ho;Park, Jong-Uk;Choi, Byung-Kyu;Park, Pil-Ho
    • Journal of Astronomy and Space Sciences
    • /
    • v.20 no.3
    • /
    • pp.197-204
    • /
    • 2003
  • We demonstrated positioning accuracy of iRTK system, which has been developed by Korea Astronomy Observatory, using a low-price GPS receiver. Each four different baseline positioning tests using the iRTK system, we certified 1-3 meters level positioning accuracy of the iRTK system. While the iRTK is similar to conventional RTK at coverage and accuracy, the iRTK positioning carried out from data processing center. And also, the iRTK system has no limit of data communication coverage because of using wire/wireless Internet. But the iRTK system has a weakness of short available coverage within 5km. Therefore we discussed a plan to adopt VRS (Virtual Reference System) as completion of the iRTK system preparing nation-wide iRTK service in near future.