• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.038 seconds

A Tracking Service of Animal Situation using RFID, GPS, and Sensor (RFID, GPS 및 센서를 이용한 동물 상태 추적 서비스)

  • Kim, So-Hyeun;Kim, Do-Hyeun;Park, Hee-Dong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.79-84
    • /
    • 2009
  • Recently, many researches are being carried out on monitoring animal behaviour and interactions with the environment using sensor networks and for tracing animal chain management and identifying animals using RFID techniques. And we are studying about the management and burglarproof of a pet using GPS technique. But there is a lack of study for providing users intelligence services in zoo using GPS, RFID, and sensor networks. Accordingly, in this paper, we propose a intelligence tracking service of animal situation based on GPS, RFID, and sensor in zoo. Firstly, we present a tracking service scenario of animal situation and system configuration according to this scenario. The proposed service provides users realtime animal situation information of animal like the present location, temperature, image, etc. In addition, we can chase the animals to know a location and situation of animal when the animals escapes from their cages. Next, we implement and test prototype operations of animal tracking system based on this scenario to verify the proposed service.

  • PDF

LQI Standard Deviation Routing Algorithm for Energy Loss Reduction in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 손실 감소를 위한 LQI 표준편차 라우팅 알고리즘)

  • Shin, Hyun-Jun;Oh, Chang-Heon
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.6
    • /
    • pp.960-967
    • /
    • 2012
  • Wireless sensor network is used at the environment to obtain nearby information and since such information is transferred through wireless link, it causes unnecessary re-sending and disadvantage of big energy consumption at node. Because of this to select reliable, energy effective link, method of estimating quality on wireless link using RSSI(received signal strength indication), LQI(link quality indication), etc is needed on wireless link. To set up path extending survival time by reducing energy consumption of nodes at the wireless sensor network, the thesis selects with small standard deviation of LQI after obtaining LQI within each path. Additionally, LQI standard deviation routing algorithm is compared based on LQI algorithm such as minimum-LQI, hop-LQI weight and RF output -7dBm. According to the outcome, the algorithm suggested has superior characters such as the number of node, retransmission rate and network life span respectively compared to existing algorithm. Therefore, energy consumption can be efficiently reduced in case that LQI standard deviation routing scheme suggested by this paper is adapted to wireless sensor network.

Real-Time Object Tracking Algorithm based on Minimal Contour in Surveillance Networks (서베일런스 네트워크에서 최소 윤곽을 기초로 하는 실시간 객체 추적 알고리즘)

  • Kang, Sung-Kwan;Park, Yang-Jae
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.337-343
    • /
    • 2014
  • This paper proposes a minimal contour tracking algorithm that reduces transmission of data for tracking mobile objects in surveillance networks in terms of detection and communication load. This algorithm perform detection for object tracking and when it transmit image data to server from camera, it minimized communication load by reducing quantity of transmission data. This algorithm use minimal tracking area based on the kinematics of the object. The modeling of object's kinematics allows for pruning out part of the tracking area that cannot be mechanically visited by the mobile object within scheduled time. In applications to detect an object in real time,when transmitting a large amount of image data it is possible to reduce the transmission load.

Blind Channel Estimation based on Hadamard Matrix Interstream Transmission for Multi-Cell MIMO Networks (다중 셀 MIMO 네트워크를 위한 Hadamard 행렬 Interstream 전송 기반 Blind 채널 추정)

  • Yang, Jae-Seung;Hanif, Mohammad Abu;Park, Ju-Yong;Lee, Moon-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.119-125
    • /
    • 2015
  • In this paper, we introduce a Hadamard matrix interstream transmission based blind channel estimation for multi-cells multiple-input and multiple-output (MIMO) networks. The proposed scheme is based on a network with mobile stations (MS) which are deployed with multi cells. We assume that the MS have the signals from both cells. The signal from near cell are considered as desired signal and the signals from the other cells are interference signal. Since the channel is blind, so that we transmit Hadamard matrix pattern pilot stream to estimate the channel; that gives easier and fast channel estimation for large scale MIMO channel. The computation of Hadamard based system takes only complex additions, and thus the complexity of which is much lower than the scheme with Fourier transform since complex multiplications are not needed. The numerical analysis will give perfection of proposed channel estimation.

A Study on Co-author Networks in the Journal of a Branch of Computers (컴퓨터 분야의 공저자 소셜 네트워크 분석)

  • Jang, Hee-suk;Park, Yoo-hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.2
    • /
    • pp.295-301
    • /
    • 2018
  • In various disciplines, researchers, not single researchers, tend to cooperate to study the same topic. There are many studies to analyze the collaborative form of various researchers through the social network analysis method, but there are few such studies in the computer field. In this paper, we analyze the characteristics of network and various groups of researchers through the social network analysis technique of the co-authors of the Journal of Korea Institute of Information and Communication Engineering, and analyze the degree centrality, the between centrality and edge weight. As a result of the analysis, many groups were extracted from the co-author's network, but the top 20 groups accounted for more than 50% of the total, also, we could find a pair of researchers who do joint research with a very high frequency. These Co-author networks are expected to be the basis for in-depth research on the subject and direction of research through future researches.

Frequency Selection Methods in RF-Powered Backscatter Cognitive Radio Networks with Spectrum Sensing (스펙트럼 센싱을 적용한 인지 무선 기반 백스케터 네트워크의 주파수 선택 기법)

  • Hong, Seung Gwan;Lee, Sun Yui;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.3
    • /
    • pp.98-102
    • /
    • 2017
  • In this paper, we study RF-powered backscatter cognitive radio networks to improve the performance for the secondary user which is backscatter radio based wireless sensors. In our proposed model, we consider an avoiding the doubly round-trip attenuation to add a carrier emitter and utilization of spectrum sensing information. When the primary channel is busy, the secondary user is able to harvest RF energy from the channel through a hybrid-access point (H-AP) and a carrier emitter. When the channel becomes idle, the secondary user will be use the harvested energy to operate wireless sensors, to use the sensing and to backscatter through the carrier emitter. We model mathematically the deterministic and multisource elements of a number of tagged channels. In the proposed communication environment, we show the BER performance of the backscatter communication using WiFi signal.

A Study on Automotive Diagnostic System using CAN, CAN FD, FlexRay (CAN, CAN FD, FlexRay를 이용한 자동차용 진단시스템에 관한 연구)

  • Son, Chang-Koan;Oh, Se-Chun;Kim, Eui-Ryong;Kim, Sin-Ryeong;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.311-318
    • /
    • 2016
  • Recent vehicles are using car internal network for various purposes such as vehicle control, diagnostic functions, and ECU program upgrade. Currently CAN and FlexRay are the most representative networks. In the next-generation network, the use of CAN FD and car ethernet is actively studied. In this paper, we aimed to compare and evaluate the diagnostic function and the program of the ECU from the upgrade view on characteristics related to download time for each network when CAN, CAN FD, and FlexRay network are applied. As a result of the simulation, it was possible to determine that the CAN FD network is currently the most suitable for the next-generation network by suppressing other networks in terms of cost performance even under conditions of 500 Kbps and 2 Mbps which are practically usable speeds.

Probability-based IoT management model using blockchain to expand multilayered networks (블록체인을 이용하여 다층 네트워크를 확장한 확률 기반의 IoT 관리 모델)

  • Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.4
    • /
    • pp.33-39
    • /
    • 2020
  • Interest in 5G communication security has been growing recently amid growing expectations for 5G technology with faster speed and stability than LTE. However, 5G has so far included disparate areas, so it has not yet fully supported the issues of security. This paper proposes a blockchain-based IoT management model in order to efficiently provide the authentication of users using IoT in 5G In order to efficiently fuse the authentication of IoT users with probabilistic theory and physical structure, the proposed model uses two random keys in reverse direction at different layers so that two-way authentication is achieved by the managers of layers and layers. The proposed model applied blockchain between grouped IoT devices by assigning weights to layer information of IoT information after certification of IoT users in 5G environment is stratified on a probabilistic basis. In particular, the proposed model has better functions than the existing blockchain because it divides the IoT network into layered, multi-layered networks.

Performance of Prioritized Service Discipline based on a Hop Count for Optical Burst Wireless Switched Networks (홉 기반의 우선처리를 고려한 광버스트 무선 교환방식의 성능분석)

  • Kim, Dong-Ok;Yoon, Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.34-39
    • /
    • 2005
  • In this paper, we propose a new prioritized Optical Burst Switching (OBS) protocol based on a hop count, which can provide an efficient utilization in optical Wireless networks. Under several legacy schemes, a switch drops the burst with a shorter time among ones regardless of its traversed hop count. As a result, the dropped burst that have been traversed more hops might cause to waste bandwidth than the one traversed a few hops. Noting that this problem, we propose the Just Enough Time(JET) with a hop count scheme which can reduce the wasted bandwidth by prioritizing the burst traversed more hops over others. From the simulation result, we show that the proposed scheme is advantageous over the legacy schemes in terms of the burst blocking probability and the link utilization.

A Study on the 3D-Puzzle Security Policy in Integrated Security System Network (통합보안 시스템 망 내 3차원-Puzzle 보안정책에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.4
    • /
    • pp.425-434
    • /
    • 2010
  • This study shows a limit to attacks that the prevention system, which is used as the mutual third aggressive packet path between open heterogeneous networks and applies prevention techniques according to the trace like IP tracking and attack methods, can prevent. Therefore, the study aims to learn information of constant attack routing protocol and of the path in network, the target of attack and build a database by encapsulating networks information routing protocol operates in order to prevent source attack paths. In addition, the study is conducted to divide network routing protocols developed from the process of dividing the various attack characters and prevent various attacks. This study is meaningful in that it analyzes attack path network and attacks of each routing protocol and secure exact mechanism for prevention by means of 3D-Puzzle, Path, and Cube of the integrated security system which is an implementation method of integrated information protection for access network defense.