• Title/Summary/Keyword: industrial communications

Search Result 593, Processing Time 0.025 seconds

5G Mobile Communications: 4th Industrial Aorta (5G 이동통신: 4차 산업 대동맥)

  • Kim, Jeong Su;Lee, Moon Ho
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.1
    • /
    • pp.337-351
    • /
    • 2018
  • This paper discusses 5G IOT, Augmented Reality, Cloud Computing, Big Data, Future Autonomous Driving Vehicle technology, and presents 5G utilization of Pyeongchang Winter Olympic Games and Jeju Smart City model. The reason is that 5G is the main artery of the 4th industry.5G is the fourth industrial aorta because 5G is the core infrastructure of the fourth industrial revolution. In order for the AI, autonomous vehicle, VR / AR, and Internet (IoT) era to take off, data must be transmitted several times faster and more securely than before. For example, if you send a stop signal to LTE, which is a communication technology, to a remote autonomous vehicle, it takes a hundredth of a second. It seems to be fairly fast, but if you run at 100km / h, you can not guarantee safety because the car moves 30cm until it stops. 5G is more than 20 gigabits per second (Gbps), about 40 times faster than current LTE. Theoretically, the vehicle can be set up within 1 cm. 5G not only connects 1 million Internet (IoT) devices within a radius of 1 kilometer, but also has a speed delay of less than 0.001 sec. Steve Mollenkov, chief executive officer of Qualcomm, the world's largest maker of smartphones, said, "5G is a key element and innovative technology that will connect the future." With 5G commercialization, there will be an economic effect of 12 trillion dollars in 2035 and 22 million new jobs We can expect to see the effect of creation.

Implementation of a Vehicle Speed Measurement System Using Image Processing (영상처리에 의한 차량속도 계측 시스템 구현)

  • Park Hyeong taek;Yun Tae won;Hwang Byong won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4C
    • /
    • pp.276-282
    • /
    • 2005
  • These studies developed system as well as its algorithm which can measure traffic flow and vehicle speed on the highway as well as road by using industrial television(ITV) system. This algorithm used the real time processing of dynamic images. The processing algorithm of dynamic images is developed and proved its validity by frame grabber. Frame grabber can process the information of a small number of sample points only instead of the whole pixel of the images. In the techniques of this algorithm, we made approximate contour of vehicle by allocating sampling points in cross-direction of image, and recognized top of contour of vehicle. Applying these technique, we measured the number of passing vehicles of one lane as well as multilane. Speed of each vehicle is measured by computing the time difference between a pair of sample points on two sample Points lines.

Frequency-Tunable Bandpass Filter Design Using Active Inductor (능동 인덕터를 이용한 주파수 가변형 대역통과 필터 설계)

  • Lee, Seok-Jin;Choi, Seok-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.7
    • /
    • pp.3425-3430
    • /
    • 2013
  • The fast-growing market in wireless communications has led to the development of multi-standard mobile terminals. In this paper, a frequency-tunable active RC bandpass filter for multi-standards wireless communication system is designed using an active inductor. The conventional bandpass filter design methods employ the high order filter or high quality factor Q to improve the stopband attenuation characteristics and frequency selectivity of the passband. The proposed bandpass filter based on the high Q active inductor has an improved frequency characteristics. The center frequency and gain of the designed bandpass filter is tuned by employing the tuning circuit. We have performed the simulation using TSMC $0.18{\mu}m$ process parameter to analyze the characteristics of the designed active RC bandpass filter. The bandpass filter with Q=20.5 has 90MHz half power bandwidth at the center frequency of 1.86GHz. Moreover, the center frequency of the proposed bandpass filter can be tuned between 1.86~2.38GHz for the multi-standards wireless communication system using the capacitor of the tuning circuit.

A Study on FPGA utilization For PC-based Full-HD DVR System Implementation (Full-HD급 PC기반 DVR System 구현을 위한 FPGA 활용에 관한 연구)

  • Kim, Ki-Hwa
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.4
    • /
    • pp.2363-2369
    • /
    • 2014
  • The DVR system supports multiple cameras and should be able to receive images at 30 frames per channel in real time. Thus, The system is using Full-HD-grade Multiplexer and Hardware compression codec. In this paper, Describing the design and implementation for the 4-channel Full-HD-grade PC-based DVR using FPGA and GPU inside CPU without Multiplexer and Hardware codec. The existing DVR system for Full-HD-grade has drawbacks to acquire images of about only 20 frames per channel in real time. The system to acquire images of multiple channel in real time was designed using FPGA. The software for the system was implemented using Intel Media SDK. At the result of performance evaluation, It was satisfied all for the required conditions. The practicality of the system was confirmed as implementation the system without using hardware compression.

Cyber KillChain Based Security Policy Utilizing Hash for Internet of Things (해시를 활용한 사이버킬체인 기반의 사물인터넷 보안 정책)

  • Jeong, So-Won;Choi, Yu-Rim;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.179-185
    • /
    • 2018
  • Technology of Internet of Things (IoT) which is receiving the spotlight recently as a new growth engine of Information Communications Technology (ICT) industry in the $4^{th}$ Industrial Revolution needs trustworthiness beyond simple technology of security. IoT devices should consider trustworthiness from planning and design of IoTs so that everyone who develop, evaluate and use the device can measure and trust its security. Increased number of IoTs and long lifetime result in the increased securituy vulnerability due to the difficulty of software patch and update. In this paper, we investigated security and scalability issues of current IoT devices through research of the technical, political and industrial trend of IoT. In order to overcome the limitations, we propose an automatic verification of software integrity utilizing and a political solution to apply cyber killchain based security mechanism using hash which is an element technology of blockchain to solve these problems.

Practical Project Behavior Management Methods for Large-scale IT Projects (대규모 IT 프로젝트를 위한 실용적 행태관리 방안)

  • Kim, Min-Seon;Song, Sung-Hwan;Kim, Yong-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4897-4911
    • /
    • 2015
  • Technology developments accelerate the change of the society and companies with unparalleled pace, so large scaled projects are in progress urgently. Large scaled projects deal with high technologies and massive tasks, and these need enormous labor force and costs, it is necessary to manage strategic conflicts based on human psychology and complex system theory. However, traditional management plan fails to suggest practical mechanism for successful projects. We study failure cases and key elements, leadership for projects, and suggest project management plan with psychological and behavioral economy approach by focusing on complexity and conflict structure on large scaled projects. Project behavior management plan, suggested in this study, is designed with phased strategy and practice to solve the failure of large scaled IT projects originally and preemptively. We verified the effectiveness of behavior management plan suggested by investigating experts and working groups, and stable projects are to be progressed with introducing this plan on large-scaled projects.

Performance Analysis of Dualrate MC-CDMA Systems Based on Code Grouping (코드그룹화에 의한 이중전송률 MC-CDMA 시스템의 성능분석)

  • Kim, Nam-Sun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.4
    • /
    • pp.112-120
    • /
    • 2006
  • Multicarrier code division multiple access(MC-CDMA) system that combines multicarrier modulation with CDMA offers robustness to frequency selective fading and can support higher rate data transmission with higher spectral efficiency. A new asynchronous MC-CDMA system to implement multiple data rate communications is proposed in this paper. In a W-CDMA downlink the orthogonal variable spreading factor(OVSF) code is used for variable spreading factor for various multimedia traffic. Proposed system utilizes the OVSF code that generated by generation property for spreading. The proposed MC-CDMA system use different lengths of OVSF code as a spreading code according to their data rate. The groupwise processing is accomplished by code grouping in OVSF code generation tree. For the analysis of average BER performance, numerical method and computer simulation were used. We also compare the system performance with that of a single rate MC-CDMA system used orthogonal code as a spreading code.

  • PDF

An Efficient Authentication Mechanism Strengthen the Privacy Protection in 3G Network (3G 네트워크에서 프라이버시 보호를 강화한 효율적인 인증 메커니즘)

  • Jeon, Seo-Kwan;Oh, Soo-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.12
    • /
    • pp.5049-5057
    • /
    • 2010
  • As communication technologies are developed and variety of services to mobile devices are provided, mobile users is rapidly increasing every year. However, mobile services running on wireless network environment are exposed to various security threats, such as illegal tampering, eavesdropping, and disguising identity. Accordingly, the secure mobile communications services to 3GPP were established that the standard for 3GPP-AKA specified authentication and key agreement. But in the standard, sequence number synchronization problem using false base station attack and privacy problem were discovered through related researches. In this paper, we propose an efficient authentication mechanism for enhanced privacy protection in the 3G network. We solve the sequence number synchronization existing 3GPP authentication scheme using timestamp and strengthen a privacy problem using secret token. In addition, the proposed scheme can improve the bandwidth consumption between serving network and home network and the problem of authentication data overhead for the serving network because it uses only one authentication vector.

An Empirical Study of Factors Influencing on the Learning Effects of Perceived Characteristics of Multimedia Media (멀티미디어 매체의 지각된 특성이 학습 효과에 미치는 영향에 관한 실증적 연구)

  • 신호균;김병곤;김종욱
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1999.12a
    • /
    • pp.301-313
    • /
    • 1999
  • Recently, the rabid development of information technology has brought enormous changes in education. Consolidation of communications and multimedia technologies are enabling the new educational paradigm such as distance learning and virtual education. Furthermore, many studies in the education engineering field report that teaching using multimedia technologies more enhances students' performance than the traditional instructor-teaching method. However, little research regarding the education using multimedia has been done in the MIS filed. None of multimedia-related studies could be found in the top-ranked MIS journals published in Korea for the last five years, and only a few studies were found even worldwide. In this regard, the purpose of this study is to investigate which features of multimedia software are most important to enhance the teaching results of students. From the previous research, we found out the specific features of the educational multimedia software which are considered to affect the students'performance, and defined the research variables related to those educational software features. And, based on the constructivism and motivation theory of the education engineering field a theoretical research model and research hypotheses were developed. Perceived usefulness of the class and a student's perceived interests in the class were used as surrogate variables to measure teaching performance. Total 277 students participated separately in one of the two multimedia classes which have continued for three weeks. One was C programming language class and the other was multimedia CD-title development class. Each student listened for the multimedia session of the class using multimedia software and, at the end of the multimedia session, answered the survey questionnaire. The results of the study show that motivation to the class and the contents of education were statistically significant to the students'performance in the class. That implies, not only in the traditional instructor-teaching method but also in the multimedia class, that the contents of education itself and student's motivation to the class are most important to raise instructional results.

  • PDF

Interference Analysis based on the Monte-Carlo Method (Monte-Carlo 기반의 간섭분석에 관한 연구)

  • Kim, Seong-Kweon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.2
    • /
    • pp.58-64
    • /
    • 2008
  • In this paper, we proposed the methodology of interference analysis based on monte-carlo method for effective use of Industrial, Scientific, Medical (ISM) band. The interference scenario is divided according to the distance and density. The simulation of interference analysis evaluates the interference probability according to distribution density of Interfering Transmitters (It) in the Secure Interference Area (SIA). The SIA is gained from the Interference Efficiency Range that satisfied to Interference Permissible Range of Victim Receiver (Vr). Simulation result that apply the proposed interference scenario to the WLAN and bluetooth, Interference Permissible Range was 60~400m. And the WLAN was acceptable within interference permissible range to six bluetooth that exist in the SIA. In the same condition, when applied Listen Before Talk (LBT) based on Cognitive Radio (CR) to the bluetooth using Frequency Hopping (FH), interference probability was decreased sharply. The Spectrum Engineering Advanced Monte Carlo Analysis Tool (SEAMCAT) that has been developed based on the monte-carlo method by European Radio-communications Office (ERO) were used to the interference simulation.

  • PDF