• Title/Summary/Keyword: industrial wireless network

Search Result 410, Processing Time 0.025 seconds

Minimizing Energy Consumption of Sensor Networks with Energy Balance Ratio and Relay Node Placement (에너지 균형비와 중계노드 위치를 함께 고려한 센서 네트워크의 에너지 소비 최소화)

  • Sohn, Surg-Won;Han, Kwang-Rok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.7
    • /
    • pp.1549-1555
    • /
    • 2009
  • The Relay node placement problem is one of the most important requirements for many wireless sensor networks because the lifetime of sensor networks is closely related with the placement of relay nodes which receive sensed data from sensor nodes and forward them to the base station. Relay node placement problem has focused at minimization of dissipated total energy of the sensor nodes in whole networks. However, minimum total energy causes the unbalance of consumed energy in sensor nodes due to different distances between relay nodes and sensor nodes. This paper proposes the concept of energy balance ratio and finds the locations of relay nodes using objective functions which maximize the energy balance ratio. Maximizing this ratio results in maximizing the network lifetime by minimizing the energy consumption of large-scale sensor networks. However, finding a solution to relay node placement problem is NP-hard and it is very difficult to get exact solutions. Therefore, we get approximate solutions to EBR-RNP problem which considers both energy balance ratio and relay node placement using constraint programming.

Traffic Control using Q-Learning Algorithm (Q 학습을 이용한 교통 제어 시스템)

  • Zheng, Zhang;Seung, Ji-Hoon;Kim, Tae-Yeong;Chong, Kil-To
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.11
    • /
    • pp.5135-5142
    • /
    • 2011
  • A flexible mechanism is proposed in this paper to improve the dynamic response performance of a traffic flow control system in an urban area. The roads, vehicles, and traffic control systems are all modeled as intelligent systems, wherein a wireless communication network is used as the medium of communication between the vehicles and the roads. The necessary sensor networks are installed in the roads and on the roadside upon which reinforcement learning is adopted as the core algorithm for this mechanism. A traffic policy can be planned online according to the updated situations on the roads, based on all the information from the vehicles and the roads. This improves the flexibility of traffic flow and offers a much more efficient use of the roads over a traditional traffic control system. The optimum intersection signals can be learned automatically online. An intersection control system is studied as an example of the mechanism using Q-learning based algorithm, and simulation results showed that the proposed mechanism can improve the traffic efficiency and the waiting time at the signal light by more than 30% in various conditions compare to the traditional signaling system.

A Blocking Algorithm of a Target Object with Exposed Privacy Information (개인 정보가 노출된 목표 객체의 블로킹 알고리즘)

  • Jang, Seok-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.43-49
    • /
    • 2019
  • The wired and wireless Internet is a useful window to easily acquire various types of media data. On the other hand, the public can easily get the media data including the object to which the personal information is exposed, which is a social problem. In this paper, we propose a method to robustly detect a target object that has exposed personal information using a learning algorithm and effectively block the detected target object area. In the proposed method, only the target object containing the personal information is detected using a neural network-based learning algorithm. Then, a grid-like mosaic is created and overlapped on the target object area detected in the previous step, thereby effectively blocking the object area containing the personal information. Experimental results show that the proposed algorithm robustly detects the object area in which personal information is exposed and effectively blocks the detected area through mosaic processing. The object blocking method presented in this paper is expected to be useful in many applications related to computer vision.

Optimal Node Analysis in LoRaWAN Class B (LoRaWAN Class B에서의 최적 노드 분석)

  • Seo, Eui-seong;Jang, Jong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.100-103
    • /
    • 2019
  • Due to the fourth industrial revolution called 'fusion and connection', interest in 'high connectivity society' and 'highland society' is increasing, and related objects are not limited to automation and connected cars. The Internet of Things is the main concern of the 4th Industrial Revolution and it is expected to play an important role in establishing the basis of the next generation mobile communication service. Several domestic and foreign companies have been studying various types of LPWANs for the construction of the Internet based on things, and there is Semtech's LoRaWAN technology as representative. LoRaWAN is a long-distance, low-power network designed to manage a large number of devices and sensors, with communications from hundreds to thousands to thousands of devices and sensors. In this paper, we analyze the optimum node capacity of gateway for maximum performance while reducing resource waste in using LoRaWAN.

  • PDF

A Comparative Analysis of Research Trends in the Information and Communication Technology Field of South and North Korea Using Data Mining

  • Jiwan Kim;Hyunkyoo Choi;Jeonghoon Mo
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.1
    • /
    • pp.14-30
    • /
    • 2023
  • The purpose of this study is to compare research trends in the information and communication technology (ICT) field between North and South Korea and analyze the differences by using data mining. Frequency analysis, clustering, and network analysis were performed using keywords from seven South Korean and two North Korean ICT academic journals published for five years (2015-2019). In the case of South Korea (S. Korea), the frequency of research on image processing and wireless communication was high at 16.7% and 16.3%, respectively. North Korea (N. Korea) had a high frequency of research, in the order of 18.2% for image processing, 16.9% for computer/Internet applications/security, and 16.4% for industrial technology. N. Korea's natural language processing (NLP) sector was 11.9%, far higher than S. Korea's 0.7 percent. Student education is a unique subject that is not clustered in S. Korea. In order to promote exchanges between the two Koreas in the ICT field, the following specific policies are proposed. Joint research will be easily possible in the image processing sector, with the highest research rate in both Koreas. Technical cooperation of medical images is required. If S. Korea's high-quality image source is provided free of charge to N. Korea, research materials can be enriched. In the field of NLP, it calls for proposing exchanges such as holding a Korean language information conference, developing a Korean computer operating system. The field of student education encourages support for remote education contents and management know-how, as well as joint research on student remote evaluation.

Design of V2I Based Vehicle Identification number In a VANET Environment (VANET 환경에서 차대번호를 활용한 V2I기반의 통신 프로토콜 설계)

  • Lee, Joo-Kwan;Park, Byeong-Il;Park, Jae-Pyo;Jun, Mun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.12
    • /
    • pp.7292-7301
    • /
    • 2014
  • With the development of IT Info-Communications technology, the vehicle with a combination of wireless-communication technology has resulted in significant research into the convergence of the component of existing traffic with information, electronics and communication technology. Intelligent Vehicle Communication is a Machine-to-Machine (M2M) concept of the Vehicle-to-Vehicle. The Vehicle-to-Infrastructure communication consists of safety and the ease of transportation. Security technologies must precede the effective Intelligent Vehicle Communication Structure, unlike the existing internet environment, where high-speed vehicle communication is with the security threats of a wireless communication environment and can receive unusual vehicle messages. In this paper, the Vehicle Identification number between the V2I and the secure message communication protocol was proposed using hash functions and a time stamp, and the validity of the vehicle was assessed. The proposed system was the performance evaluation section compared to the conventional technique at a rate VPKI aspect showed an approximate 44% reduction. The safety, including authentication, confidentiality, and privacy threats, were analyzed.

Patent Analysis on 5G Technology Trends from the Perspective of Smart Factory (특허 분석을 통한 스마트공장 관점의 5G 기술개발 동향 연구)

  • Cho, Eunnuri;Chang, Tai-Woo
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.3
    • /
    • pp.95-108
    • /
    • 2020
  • The development of 5G technology, which is a next-generation communication technology capable of processing large amounts of data in real-time and solving delays, is drawing attention. Not only in the United States but also Korea, 5G is focused on supporting R&D as a national strategic technology. The strategy for the smart factory, one of the core services of the 5G, aims to increase the flexibility of manufacturing production lines. The existing wired communications devices can be replaced into wireless ones with the ultra-low-delay and ultra-high-speed characteristics of 5G. For the efficient development of 5G technology, it is necessary to keep abreast of the status and trend. In this study, based on the collected data of 1517 Korea patents and 1928 US patents, 5G technologies trend was analyzed and key technologies were identified by network analysis and topic modeling. We expect that it will be used for decision making for policy establishment and technology strategy of related industries to provide the trends of technology development related to the introduction of 5G technology to smart factories.

A Study on Lightweight Block Cryptographic Algorithm Applicable to IoT Environment (IoT 환경에 적용 가능한 경량화 블록 암호알고리즘에 관한 연구)

  • Lee, Seon-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.3
    • /
    • pp.1-7
    • /
    • 2018
  • The IoT environment provides an infinite variety of services using many different devices and networks. The development of the IoT environment is directly proportional to the level of security that can be provided. In some ways, lightweight cryptography is suitable for IoT environments, because it provides security, higher throughput, low power consumption and compactness. However, it has the limitation that it must form a new cryptosystem and be used within a limited resource range. Therefore, it is not the best solution for the IoT environment that requires diversification. Therefore, in order to overcome these disadvantages, this paper proposes a method suitable for the IoT environment, while using the existing block cipher algorithm, viz. the lightweight cipher algorithm, and keeping the existing system (viz. the sensing part and the server) almost unchanged. The proposed BCL architecture can perform encryption for various sensor devices in existing wire/wireless USNs (using) lightweight encryption. The proposed BCL architecture includes a pre/post-processing part in the existing block cipher algorithm, which allows various scattered devices to operate in a daisy chain network environment. This characteristic is optimal for the information security of distributed sensor systems and does not affect the neighboring network environment, even if hacking and cracking occur. Therefore, the BCL architecture proposed in the IoT environment can provide an optimal solution for the diversified IoT environment, because the existing block cryptographic algorithm, viz. the lightweight cryptographic algorithm, can be used.

A Study on Efficient Access Point Installation Based on Fixed Radio Wave Radius for WSN Configuration at Subway Station (지하철 역사 내 WSN 환경구축을 위한 고정 전파범위 기반의 효율적인 AP설치에 관한 연구)

  • An, Taeki;Ahn, Chihyung;Lee, Youngseok;Nam, Myungwoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.740-748
    • /
    • 2016
  • IT and communication technologies has contributed significantly to the convenience of passengers and the financial management of stations in accordance with the task automation in the field of the urban railway system. The foundation of the above development is based on the large amounts of data from various sensors installed in railways, trains, and stations. In particular, the sensor network that is installed in the station and train has played an important role in the railway information system. The performance of AP is affected by the number of APs and their locations installed in the station. In the installation of APs in stations, the intensity of the radio wave of the AP on its underlying position is considered to determine the number and position of APs. This paper proposes a method to estimate the number of APs and their position based on the structure of the underlying station and implemented a simulator to simulate the performance of the proposed method. The implemented simulator was applied to the decision of AP installation at Busan Seomyeon station to evaluate its performance.

The Realization on GAS Sensor Module for Inteligent Wireless Communication (지능형 무선통신용 가스 센서 모듈 구현)

  • Kim, Hyo-Chan;Weon, Young-Su;Cho, Hyung-Rae
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.6
    • /
    • pp.123-132
    • /
    • 2012
  • Gas sensors has been used very differently that depending on following purposes; Automotive (exhaust gas, fuel mixture gas, oxygen, particulates), agriculture / food industry (fresh, stored, CO2, humidity, NH3, nitrogen oxide gas, organic gas, toxic gas emitted from pesticides and insecticides), industrial / medical (chemical gas, hydrogen, oxygen and toxic gases), military (chemical weapon), environmental measurements (CO and other air pollution consisting of sulfur and nitrogen gas), residential (LNG, LPG, butane, indoor air, humidity). The types of industrial toxic substances are known about 700 species and many of these exist in gaseous form under normal conditions. he multi-gas detection sensors will be developed for casualties that detect the most important and find easy three kinds of gases in marine plant; carbon dioxide(CO2), carbon(CO), ammonia(NH3). Package block consists of gas sensing device minor ingredient, rf front end, zigbee chip. Develope interworking technology between the sensor and zigbee chip inside a package. Conduct a performance test through test jig about prototype zigbee sensor module with rf output power and unwanted emission test. This research task available early address when poisonous gas leaked from large industrial site and contribution for workers' safety at the enclosed space.