• Title/Summary/Keyword: device network

Search Result 2,412, Processing Time 0.032 seconds

The design of Smart flowerpot management system (스마트 화분관리 시스템 설계)

  • Jeon, Pil-kyeong;Park, Suhyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.133-135
    • /
    • 2015
  • This paper is about the design of flowerpot management system which allows you to manage the flowerpot more efficiently and conveniently using Internet of Things when you start to grow plants. IoT connects all things to the network to provide various services to users, it has recently been focused on the center of the IT convergence techniques. So by using the realization sensor based IoT technology the need for research and development of IoT technologies were designed for the system. Basically, Device is using soil humidity sensor and Arduino, Android smart phone and smart light bulb. Transmit the humidity value of the flowerpot that measured by the sensor in a wireless communication, by controlling the state according to the value of the humidity, users can be provided a visual information and set up a flowerpot management and plan.

  • PDF

An Effective Frequency Sharing Method using Spectrum Etiquette and Genetic Algorithm for the Coexistence of WRAN and WLAN in TV White Space (TVWS에서 스펙트럼 에티켓 및 GA를 사용한 WRAN과 WLAN의 효율적 주파수 공유기법)

  • Jeong, Won-Sik;Jang, Sung-Jeen;Yong, Seulbaro;Kim, Jae-Moung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2A
    • /
    • pp.83-94
    • /
    • 2012
  • Various wireless communication devices or network such as WRAN and WLAN will coexist in the TVWS(TV White Space). Because of this coexistence, the wireless devices which use the TVWS have to avoid interfering to not only licensed TV receiver and wireless microphone but also homogeneous or heterogeneous TVBD(TV Band Device)s. In this paper, we propose two frequency sharing methods for the coexistence of WLAN and WRAN in terms of interference reduction and throughput enhancement in both homogeneous and heterogeneous networks. One is the WRAN spectrum etiquette to provide more wide bandwidth for WLAN users and the other is the WLAN frequency selection methods to improve the throughput performance. The simulation results have confirmed the throughput improvement of the proposed methods. Moreover, the proposed methods is also applicable to improve the throughput performance and reduce interference of similar systems working in a cognitive manner.

Dynamic Allocation of Channel Times based on Link Quality of HR-WPAN (HR-WPAN에서 링크 상태에 따른 동적 채널 타임 할당 기법)

  • Kang, Jae-Eun;Byun, Sung-Won;Lee, Jong-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3B
    • /
    • pp.264-273
    • /
    • 2009
  • For IEEE 802.15.3 HR-WPAN, we propose the DABL algorithm that PNC can allocate the channel times to the DEV in super frame in order that system frame throughput is increased and the delay is decreased. In detail, the DABL algorithm allows to dynamically allocate channel time as well as to adaptively apply the modulation and coding scheme based on the link quality of the DEV. In addition, due to the facts that QoS is quite different depending on service types, we provide the DABL algorithm taking into account RT(Real Time) traffic and Non-RT traffic respectively. Finally, we show simulation results of the DABL algorithm compared to the conventional algorithm that the PNC equally allocates channel times to the DEV regardless of the link quality of the DEV.

A Study on the Fingerprint-based User Authentication Protocol Considering both the Mobility and Security in the Telematics Environment (텔레메틱스 환경에서 이동성과 보안성을 고려한 지문정보를 이용한 사용자 인증 프로토콜에 관한 연구)

  • Kim, Tae-Sub;Oh, Ryong;Lee, Sang-Joon;Lee, Sung-Ju;Kim, Hak-Jae;Chung, Yong-Wha;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11A
    • /
    • pp.1128-1137
    • /
    • 2007
  • Recently, according to being advanced internet, mobile communication technique, Telematics environment which users in vehicle can use internet service in LAN(Local Area Network) via mobile device has being realized. In this paper, we propose the remote user authentication protocol to solve these issues. Additionally, we use biometrics(fingerprint) for our user authentication protocol cause it can provide to avoid critical weakness that can be lost, stolen, or forgotten and to make authentication easily. In our user authentication protocol, to protect the biometric we use session key which is generated from master key distributed in our key distribution protocol. In particular, we propose secure protocol between APs considering weakness of security in mobile environment. Based on implementation of our proposed protocol, we conform that our proposed protocols are secure from various attack methods and provide real-time authentication.

The Development of Hemodialysis System Based on Embedded System (임베디드 시스템 기반의 혈액 투석기 시스템의 개발)

  • Ji, Jung-Ho;Lee, Kyoung-Joung;Kim, Young-Ho;Park, Kwang-Li
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.51 no.11
    • /
    • pp.521-527
    • /
    • 2002
  • The Hemodialysis system is the device for the patients who have suffered from end stage renal failure as the kidney which removes the waste products in a human body. The existing hemodialysis is based on a 8-bit micro-controller and it is not a touch-screen type but a manual type. This paper is focused on hemodialysis system based on high control and expension embedded system. The whole system consists of main control unit and sub control unit(dialysis control unit, blood control unit, monitoring control unit, networking unit). The dialysis control unit, blood control unit, monitoring control unit are processed by 3 microcontrollers and network unit is for monitoring a renal failure patient's condition. For the evaluation of the system performance, the saline was pured into blood unit and then water removal rate, conductivity and temperature of hemodialysis liquid were measured 10 times in an each state suing the UF pump in the fluid unit varing the quantity of saline to 1000cc, 2000cc, 3000cc and 4000cc. As a result, the rates of water removal are 98.6% in condition of 000cc saline, 96.9% in 2000cc, 98.9% in 3000cc and 98.3% in 4000cc. The conductivities of hemodialysis liquid are 99.6% in the first to third condition and 99.7% in the forth condition. The temperatures of hemodialysis liquid are 99.8% in the first to third condition and 99.6% in th forth condition.

A Study on the Real-time Cyber Attack Intrusion Detection Method (실시간 사이버 공격 침해사고 탐지방법에 관한 연구)

  • Choi, Jae-Hyun;Lee, Hoo-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.55-62
    • /
    • 2018
  • Recently, as the threat of cyber crime increases, the importance of security control to cope with cyber attacks on the information systems in the first place such as real-time detection is increasing. In the name of security control center, cyber terror response center and infringement response center, institutional control personnel are making efforts to prevent cyber attacks. Especially, we are detecting infringement accident by using network security equipment or utilizing control system, but it's not enough to prevent infringement accident by just controlling based on device-driven simple patterns. Therefore, the security control system is continuously being upgraded, and the development and research on the detection method are being actively carried out by the prevention activity against the threat of infringement. In this paper, we have defined the method of detecting infringement of major component module in order to improve the problem of existing infringement detection method. Through the performance tests for each module, we propose measures for effective security control and study effective infringement threat detection method by upgrading the control system using Security Information Event Management (SIEM).

Chaos Based Random Number Generation In Tiny MCU (소형마이콤에서의 카오스난수 발생 함수구현)

  • Hyun, Jae-Ho
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.47 no.3
    • /
    • pp.1-4
    • /
    • 2010
  • RS-485, communication bases from small network system must prepare in collision. The collision is that mean the data transfer breaks. For a stabilized communication chooses 1:N polling methods. But polling is low speed in addition to maybe overload Master device. So, usual N:N Prefers a communication. In this case, must be preparing to avoid collision or some solutions. Generally, to after collision retransmits after short time. It's called delay time for short time. When making a delay time, uses address of each systems. (Address of each node) If the many nodes collided, the each node has different delay time. When making a delay time, uses a usual random number. Making a random number is hard job. So uses a usual pseudorandom number. It is more difficult from small size MCU. The Chaos random number provides stabled value. Finally, when uses the Chaos random number, the stability and reliability of system get better.

EAP-AKA Authentication without UICC for Interworking Authentication in Heterogeneous Wireless Networks (이질적인 무선 네트워크 환경에서 인증 연동을 위한 비 UICC 방식의 EAP-AKA 인증)

  • Choi, Jae-Duck;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.168-177
    • /
    • 2009
  • This paper proposes the EAP-AKA scheme without UICC for extending its usage to existing WLAN/WiBro devices. To apply the current EAP-AKA scheme, the WLAN/WiBro devices require an external Universal Integrated Circuit Card (UICC) reader. If they don't use UICC due to cost overhead and architectural problem of device, the EAP-AKA scheme loses its own advantages in security and portability aspects. The proposed scheme uses the DH key algorithm and a password for non-UICC devices instead of using the long-term key stored in UICC. The main contribution is to maintain the security and portability of the EAP-AKA while being applied to non-3GPP network devices not equipped with UICC. Furthermore, it does not require major modifications of authentication architecture in 3GPP.

Improving Sensitivity of SAW-based Pressure Sensor with Metal Ground Shielding over Cavity

  • Lee, Kee-Keun;Hwang, Jeang-Su;Wang, Wen;Kim, Geun-Young;Yang, Sang-Sik
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.12 no.3 s.36
    • /
    • pp.267-274
    • /
    • 2005
  • This paper presents the fabrication of surface acoustic wave (SAW)-based pressure sensor for long-term stable mechanical compression force measurement. SAW pressure sensor has many attractive features for practical pressure measurement: no battery requirement, wireless pressure detection especially at hazardous environments, and easy other functionality integrations such as temperature, humidity, and RFID. A $41^{\circ}$ YX $LiNbO_3$ piezoelectric substrate was used because of its high SAW propagation velocity and large values of electromechanical coupling factors $K^2$. A silicon substrate with $\~200{\mu}m$ deep cavity was bonded to the diaphragm with epoxy, in which gold was covered all over the inner cavity in order to confine electromagnetic energy inside the sensor, and provide good isolation of the device from its environment. The reflection coefficient $S_{11}$ was measured using network analyzer. High S/N ratio, sharp reflected peaks, and clear separation between the peaks were observed. As a mechanical compression force was applied to the diaphragm from top with extremely sharp object, the diaphragm was bended, resulting in the phase shifts of the reflected peaks. The phase shifts were modulated depending on the amount of applied mechanical compression force. The measured $S_{11}$ results showed a good agreement with simulated results obtained from equivalent admittance circuit modeling.

  • PDF

Design and Implementation of IoT based Urination Management System (사물인터넷 기반의 배뇨관리 시스템 설계 및 구현)

  • Lee, Hak-Jai;Lee, Kyung-Hoon;Kim, Young-Min
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.1
    • /
    • pp.209-218
    • /
    • 2017
  • Healthcare services can be provided through a number of independent service platforms for measurement of vital signs, diagnosis and prevention of diseases, and Information and communication technology(ICT) such as internet and mobile are converged to provide health information to users at anytime and anywhere, and it is in the center of the IoT(Internet of things). Accordingly, in this paper, we designed IoT based urination management system and evaluate the performance. A low - power Zigbee network was constructed for the configuration of the urination management system. The implemented capacitive diaper sensor was operable for the duration of 2,000 hours. We also built a database server using Raspberry Pi, a tiny embedded device, and stored the collected data to verify the data through an Android-based mobile application. The proposed urination management system can be utilized not only for the older patients, but also for the infants.