• Title/Summary/Keyword: Wireless Open Access

Search Result 66, Processing Time 0.096 seconds

Development of AI Image Analysis Emergency Door Opening and Closing System linked Wired/Wireless Counting (유무선 카운팅 연동형 AI 영상분석 비상문 개폐 시스템 개발)

  • Cheol-soo, Kang;Ji-yun, Hong;Bong-hyun, Kim
    • Journal of Digital Policy
    • /
    • v.1 no.2
    • /
    • pp.1-8
    • /
    • 2022
  • In case of a dangerous situation, the roof, which serves as an emergency exit, must be open in case of fire according to the Fire Act. However, when the roof door is opened, it has become a place of various incidents and accidents such as illegal entry, crime, and suicide. As a result, it is a reality to close the roof door in terms of facility management to prevent crime, various incidents, and accidents. Accordingly, the government is pushing to legislate regulations on housing construction standards, etc. that mandate the installation of electronic automatic opening and closing devices on rooftop doors. Therefore, in this paper, an intelligent emergency door opening/closing device system is proposed. To this end, an intelligent emergency door opening and closing system was developed by linking wired and wireless access counting and AI image analysis. Finally, it is possible to build a wireless communication-based integrated management platform that provides remote control and history management in a centralized method of device status real-time monitoring and event alarm.

Behavior Monitoring System based on WAP for the Elderly and the Disabled (장애인 및 노약자를 위한 WAP 기반 행동 모니터링 시스템)

  • 김택현;이희영
    • Proceedings of the IEEK Conference
    • /
    • 2003.07c
    • /
    • pp.2565-2568
    • /
    • 2003
  • This paper presents a behavioral data monitoring system based on WAP(wireless application protocol) service for the 24-hour continuous health state monitoring of the elderly and the disabled. The developed system transmits a character message to the predefined mobile cell phone through SMS service when an emergency state takes place. Simultaneously, the image captured by a CCD camera is transmitted to the server computer installed WAP service program. Then, the user of the cell phone who received he message can access the server and open the transmitted image. This system can be used for the effective health monitoring of the elderly and disabled.

  • PDF

DMB+, a General Data Transmission Technique

  • Wang, Guoyu;Zhang, Hongsheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2043-2060
    • /
    • 2020
  • Developed from Digital Multimedia Broadcasting (DMB), DMB+ changes the application focus fundamentally. The plus symbol "+" indicates that DMB+ is no longer for digital radio/videos, instead it works as a general data transmission technique. The merits of wireless transmission, broad coverage, high quality, information security and low building/maintenance cost make DMB+ suitable for a wide range of applications with numerous terminals and users, such as public information release, alarm and administration etc. The concept of DMB+ base station enables DMB+ to be used in building independent networks and for remote control and management, as well as for Industry 4.0. DMB+ will access into a new field that till now has been dominated by communication techniques, will open a huge commercial opportunity.

A Study on Validity of New Mobile Policies in Korea

  • Yang, Je-Min;Park, Jae-Chon
    • International Journal of Contents
    • /
    • v.6 no.3
    • /
    • pp.59-64
    • /
    • 2010
  • The world mobile service is growing sharply and became bigger market than wired. So it is very needed to find the political way to promote mobile industry. The United States government recently decided to introduce new mobile policies for promoting mobile industry. Until now the telecommunications policies of the United States have affected policy developments for many countries including Korea. In this context, we studied the validity of introducing new mobile policies of the United States in Korea. We found that new mobile policies can cause the change of mobile market environment; mobile market power will be dispersed from network to content, application and devise, and new mobile market environment where consumers freely select and use network as well as content, application and devise will be made. Also we found empirically that if new policies are introduced in Korea, mobile industry will be promoted as Korean consumers use mobile services and goods quite actively in new mobile market. We think our results provide reasonable evidence to introduce new mobile policies in Korea.

Dynamic Retry Adaptation Scheme to Improve Transmission of H.264 HD Video over 802.11 Peer-to-Peer Networks

  • Sinky, Mohammed;Lee, Ben;Lee, Tae-Wook;Kim, Chang-Gone;Shin, Jong-Keun
    • ETRI Journal
    • /
    • v.37 no.6
    • /
    • pp.1096-1107
    • /
    • 2015
  • This paper presents a dynamic retry adaptation scheme for H.264 HD video, called DRAS.264, which dynamically adjusts the retry limits of frames at the medium access control (MAC) layer according to the impact those frames have on the streamed H.264 HD video. DRAS.264 is further improved with a bandwidth estimation technique, better prediction of packet delays, and expanded results covering multi-slice video. Our study is performed using the Open Evaluation Framework for Video Over Networks as a simulation environment for various congestion scenarios. Results show improvements in average peak signal-to-noise ratios of up to 4.45 dB for DRAS.264 in comparison to the default MAC layer operation. Furthermore, the ability of DRAS.264 to prioritize data of H.264 bitstreams reduces error propagation during video playback, leading to noticeable visual improvements.

A Survey on Security Issues of M2M Communications in Cyber-Physical Systems

  • Chen, Dong;Chang, Guiran
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.24-45
    • /
    • 2012
  • In this paper, we present a survey of security and privacy preserving issues in M2M communications in Cyber-Physical Systems. First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed for building secure Cyber-Physical Systems. Then, a secure architecture suitable for Cyber-Physical Systems is proposed to cope with these security issues. Eventually, the corresponding countermeasures to the security issues are discussed from four aspects: access control, intrusion detection, authentication and privacy preserving, respectively. Along the way we highlight the advantages and disadvantages of various existing security schemes and further compare and evaluate these schemes from each of these four aspects. We also point out the open research issues in each subarea and conclude with possible future research directions on security in Cyber-Physical Systems. It is believed that once these challenges are surmounted, applications with intrinsic security considerations will become immediately realizable.

FANET:-Communication Architecture and Routing Protocols A Review

  • Moazzam Ali;Adil Idress;Jawwad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.181-190
    • /
    • 2024
  • FANET (Flying ad-hoc network) is a self-adjusting wireless network that enables easy to deploy flying nodes, inexpensive, flexible such as UAV in the absence of fixed network infrastructure they communicate amoung themselves. Past few decades FANET is only the emerging networks with it's huge range of next-generation applications.FANET is a sub-set of MANET's(Mobile Ad-hoc Network) and UAV networks are known as FANET.Routing enables the flying nodes to establish routes to radio access infrastructure specifically FANET and among themselves coordinate and collaborate.This paper presents a review on existing proposed communication architecture and routing protocols for FANETS.In addition open issues and challenges are summarized in tabular form with proposed solution.Our goal is to provide a general idea to the researchers about different topics to be addressed in future.

Design and Implementation of a Telematics Service Framework for Open Services in the Heterogeneous Network Environment (이기종 네트워크 환경에서 개방형 서비스를 위한 텔레매틱스 서비스 프레임워크 설계 및 구현)

  • Lee, Deuk-Woo;Kang, Hong-Koo;Han, Ki-Joon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.2
    • /
    • pp.137-148
    • /
    • 2009
  • Recently, as technology for obtaining locational awareness and wireless telecommunications improve, technologies and services involving Telematics has grown rapidly. However, the services are currently available on certain terminals selected by the telematics service provider (TSP). This means in order to access services provided by other TSPs, it is necessary to purchase related terminals. To solve this problem, it is essential to achieve service interoperability between TSPs, or between TSPs and the contents provider (CP). Under this backdrop, the aim of this paper is to design and implement a telematics service framework for openning services in a heterogeneous network environment. Futhermore, the paper presents open telematics protocols required for communication in the telematics service framework, and develop technologies to deal with this in different network environments.

  • PDF

Application of Wavelet-Based RF Fingerprinting to Enhance Wireless Network Security

  • Klein, Randall W.;Temple, Michael A.;Mendenhall, Michael J.
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.544-555
    • /
    • 2009
  • This work continues a trend of developments aimed at exploiting the physical layer of the open systems interconnection (OSI) model to enhance wireless network security. The goal is to augment activity occurring across other OSI layers and provide improved safeguards against unauthorized access. Relative to intrusion detection and anti-spoofing, this paper provides details for a proof-of-concept investigation involving "air monitor" applications where physical equipment constraints are not overly restrictive. In this case, RF fingerprinting is emerging as a viable security measure for providing device-specific identification (manufacturer, model, and/or serial number). RF fingerprint features can be extracted from various regions of collected bursts, the detection of which has been extensively researched. Given reliable burst detection, the near-term challenge is to find robust fingerprint features to improve device distinguishability. This is addressed here using wavelet domain (WD) RF fingerprinting based on dual-tree complex wavelet transform (DT-$\mathbb{C}WT$) features extracted from the non-transient preamble response of OFDM-based 802.11a signals. Intra-manufacturer classification performance is evaluated using four like-model Cisco devices with dissimilar serial numbers. WD fingerprinting effectiveness is demonstrated using Fisher-based multiple discriminant analysis (MDA) with maximum likelihood (ML) classification. The effects of varying channel SNR, burst detection error and dissimilar SNRs for MDA/ML training and classification are considered. Relative to time domain (TD) RF fingerprinting, WD fingerprinting with DT-$\mathbb{C}WT$ features emerged as the superior alternative for all scenarios at SNRs below 20 dB while achieving performance gains of up to 8 dB at 80% classification accuracy.

Medium Access Control Protocols for Full-Duplex Communications in WLAN Systems: Approaches and Challenges (무선랜 시스템에서 전이중 통신을 위한 MAC 프로토콜 분석)

  • Kim, Wonjung;Song, Taewon;Kim, Taeyoon;Pack, Sangheon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.7
    • /
    • pp.1276-1285
    • /
    • 2015
  • Full-duplex communications have emerged as a key technology for next-generation wireless local area networks (WLANs). Although the key enabling technology for full-duplex communications is the self-interference cancellation (SIC) technique in the physical layer, the employment of full-duplex communications has huge potentials to substantially increase the throughput at the medium access control (MAC) layer. At the same time, full-duplex communications pose non-trivial challenges to the MAC protocol design. In this article, we first identify salient problems in supporting full-duplex communications in WLAN MAC protocols. After that, we survey the state-of-the art to address those problems and analyze their pros and cons. Finally, we present open research challenges to improve the effectiveness of full-duplex communications in WLANs.