• Title/Summary/Keyword: information and communications technology convergence

Search Result 302, Processing Time 0.031 seconds

Performance Improvement of Multiuser DS-CDMA with Carrier Interferometry Codes in Frequency Selective Fading Channels

  • Chung, Yeon-Ho
    • Journal of information and communication convergence engineering
    • /
    • v.2 no.1
    • /
    • pp.5-8
    • /
    • 2004
  • DS-COMA is now a matured multiple access technology that utilizes spreading codes for user separation. In this paper, we attempt to improve the performance of a multiuser DS-COMA system with a unique chip shaping code called Carrier Interferometry (CI) code. The CI codes exhibit an excellent correlation property that can be used in many applications. In DS-COMA with CI codes (CI/DS-COMA), the symbols are spread by a spreading code and then the chip signals are shaped using a CI code. Due to the correlation property of the CI code, a diversity gain from the shaped chip signals is achieved and the performance of DS-COMA is significantly improved. Comparison study demonstrates that the DS-COMA with CI outperforms the conventional DS-COMA system in multiuser environments.

A Study on Advanced RF4CE Key Agreement for Device Convergence Security (디바이스 융합 보안을 위한 향상된 RF4CE 키 교환 기법에 관한 연구)

  • Shon, Tae-Shik;Koo, Bon-Hyun;Han, Kyu-Suk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.970-976
    • /
    • 2010
  • Platform convergence originated from the convergence of broadcast and telecommunication is making rapid progress including IT and not-IT fields in order to provide a variety of converged services, S/W eco-system construction, and so on. With the advent of convergence environment, IEEE 802.15.4-based RF4CE technology is rising because of creating momentum for the market using converged connectivity between home and office devices as well as all around located devices. In this paper, we present enhanced RF4CE key seed distribution approach in order to provide efficient connection and control between devices. The proposed approach consists of device mutual authentication, initial vector assignment, and two-phase key seed distribution. Moreover, we make a development real RF4CE test board and its key agreement simulator to verify the proposed approach.

The Requirements of Internet of Thing Platform for Railway Environments (철도 환경에 적합한 사물인터넷 플랫폼의 요구사항 분석)

  • Kim, Juyeop;Song, Yong-Soo;Kim, Yong-Kyu;Choi, Sang Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.7
    • /
    • pp.833-842
    • /
    • 2016
  • The governments in many country recently focus their efforts on developing the industry of Internet of Thing (IoT). At the same time, each industrial field considers to apply the IoT concept and develops their own IoT system for upgrading the existing services or launching new services. In the railway field, many organizations such as Korea Rail Network Authority (KR) expect that the IoT concept can bring many good effects and try to adopt IoT to their existing railway services. In this paper, we survey the current technology level of IoT platform, which is a core technology to realize IoT, and figure out the technical requirements and challenges to apply IoT platform to railway environments.

Q-NAV: NAV Setting Method based on Reinforcement Learning in Underwater Wireless Networks (Q-NAV: 수중 무선 네트워크에서 강화학습 기반의 NAV 설정 방법)

  • Park, Seok-Hyeon;Jo, Ohyun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.6
    • /
    • pp.1-7
    • /
    • 2020
  • The demand on the underwater communications is extremely increasing in searching for underwater resources, marine expedition, or environmental researches, yet there are many problems with the wireless communications because of the characteristics of the underwater environments. Especially, with the underwater wireless networks, there happen inevitable delay time and spacial inequality due to the distances between the nodes. To solve these problems, this paper suggests a new solution based on ALOHA-Q. The suggested method use random NAV value. and Environments take reward through communications success or fail. After then, The environments setting NAV value from reward. This model minimizes usage of energy and computing resources under the underwater wireless networks, and learns and setting NAV values through intense learning. The results of the simulations show that NAV values can be environmentally adopted and select best value to the circumstances, so the problems which are unnecessary delay times and spacial inequality can be solved. Result of simulations, NAV time decreasing 17.5% compared with original NAV.

A Proposed Private Blockchain System for Preserving Evidence of False Internet Communications (인터넷 허위통신 신고의 증거물 보존을 위한 프라이빗 블록체인 시스템 제안)

  • Bae, Suk-Min;Yang, Seong-Ryul;Jung, Jai-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.11
    • /
    • pp.15-21
    • /
    • 2019
  • Allowing only authorized users to record and inquire in the ledger, private blockchain technology is attracting attention from institutions and companies. Based on distributed ledger technology, records are immutable. Because news via the Internet can be easily modified, the possibility of manipulation is high. Some false communication report systems are designed to prevent such harm. However, during the gap between the false communication report and verification time, contents on the website can be modified, or false evidence can be submitted intentionally. We propose a system that collects evidence using a headless browser for more accurate false communication management, and securely preserves evidence through a private blockchain and prevents possibilities of manipulation. The proposed system downloads original HTML, captures the website as an image, stores it in a transaction along with the report, and stores it in a private blockchain to ensure the integrity from acquisition to preservation of evidence.

A Building Method of Security Vulnerability Measurement Framework under u-Healthcare System Traffic Domain Environment Based on USN (USN기반 u-Healthcare 시스템 트래픽도메인 환경에서의 보안위험도 평가체계 설계방안)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.39-46
    • /
    • 2011
  • Smart environment of health information technology, u-Healthcare architecture, ad-hoc networking and wireless communications environment are major factors that increase vulnerability of u-healthcare information systems. Traffic domain is the concept of network route that identifies the u-Healthcare information systems area as the traffic passing and security technologies application. The criterion of division is an area requiring the application of security technology. u-Healthcare information system domains are derived from the intranet section. the public switched network infrastructure, and networking sectors. Domains of health information systems are separated by domain vulnerability reason. In this study, domain-specific security vulnerability assessment system based on the USN in u-Healthcare system is derived. The model used in this study suggests how to establish more effective measurement USN-based health information network security vulnerability which has been vague until now.

Analysis of Field Conditions and Requirements for Deploying Smart Factory (스마트공장 구축을 위한 현장실태 및 요구사항 분석)

  • Lee, Hyunjeong;Kim, Yong Jin;Yim, Jeongil;Kim, Yong-Woon;Lee, Soo-Hyung
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.34 no.1
    • /
    • pp.29-34
    • /
    • 2017
  • The operating environments of factories and manufacturing units have changed dramatically due to globalization, population, and customization. The existing factories are converted into smart units using information and communications technology (ICT). These smart factories can produce, control, repair, and manage themselves. The manufacturing processes are efficiently optimized using the monitoring and analysis methods of ICT. In this experimental study, we carried out a survey on the system solution providers and consumer companies to determine the field conditions and requirements necessary for assembling a smart factory. Using the results of this survey, we effectively devised smart factory solutions and implemented them on the existing conditions in various factories.

The Full-Duplex Device-to-Device Security Communication Under the Coverage of Unmanned Aerial Vehicle

  • Zeng, Qian;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1941-1960
    • /
    • 2019
  • Unmanned aerial vehicles (UAVs), acting as mobile base stations (BSs), can be deployed in the typical fifth-generation mobile communications (5G) scenarios for the purpose of substantially enhancing the radio coverage. Meanwhile, UAV aided underlay device-to-device (D2D) communication mode can be activated for further improving the capacity of the 5G networks. However, this UAV aided D2D communication system is more vulnerable to eavesdropping attacks, resulting in security risks. In this paper, the D2D receivers work in full-duplex (FD) mode, which improves the security of the network by enabling these legitimate users to receive their useful information and transmit jamming signal to the eavesdropper simultaneously (with the same frequency band). The security communication under the UAV coverage is evaluated, showing that the system's (security) capacity can be substantially improved by taking advantage of the flexible radio coverage of UAVs. Furthermore, the closed-form expressions for the coverage probabilities are derived, showing that the cellular users (CUs)' secure coverage probability in downlink transmission is mainly impacted by the following three factors: its communication area, the relative position with UAV, and its eavesdroppers. In addition, it is observed that the D2D users or DUs' secure coverage probability is relevant to state of the UAV. The system's secure capacity can be substantially improved by adaptively changing the UAV's position as well as coverage.

The Evaluation on EU′s Info-Communication Regulatory Policy in Preparation for Media Convergence (미디어 융합에 대응한 EU의 통신규제정책에 대한 평가)

  • Kim Pang-Ryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.11B
    • /
    • pp.1001-1011
    • /
    • 2004
  • The structure of info-communications industry has been changing from vertical integration to horizontal layered disintegration as the Internet technology has been rapidly developed. Considering with this background, EU has decided to introduce new regulatory framework called 2003 framework and asked member states to shift to new framework by July 2003. The key words of the new framework is to be denoted by the following three characteristics: Introduction of cross-media regulatory framework Alleviation of entry regulation by general authorization, Transition from ex ante regulation to ex post regulation.

A Comparative Analysis of Informatization Level for Agricultural Corporations and SMEs (농업법인과 중소기업의 정보화수준 비교 분석)

  • Bock, Gene;Kim, Bae-Bong;Lee, Jae-Keun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.892-902
    • /
    • 2015
  • Agri-food ICT(Information and Communications Technologies) convergence has been raised as an important issue for agricultural industry competence. In this situation, this study is to enhance agricultural competitiveness and seek to development plan for agricultural corporation by diagnosing informatization level. For this purpose, this study conducted survey on informatization level of 3,019 agricultural corporations and calculated level score. And result is compared with SMEs(Small and Medium Enterprise) informatization survey, including manufacturing and service industries, conducted by Korea Technology & Information Promotion Agency for SMEs in recent agricultural corporations' growing with automation of agricultural production and improving service to customer satisfaction. Evaluation system is established to calculate informatization level score and AHP(Analytic Hierarchy Process) method was used by the experts to investigate weighting of assessment area, assessment indicators, assessment items. As a result, agricultural corporation informatization level score was 40.16 points which is lower than the benefitted organization of agri-food IT convergence modeling(43.44 points). By assessment area, the informatization level of promotional environment area was low and investment and training items were analyzed low especially so need to improve urgently. In the analysis result by organization type, agricultural company corporation's informatization level was higher than the agricultural association corporation and 'Processing and distribution' was higher than others by business type. Informatization level of agricultural corporation is 80 percent of 2013 SMEs' level(50.18 points) and 59.4 percent of a large corporation(67.64 points). In particular, big difference is occurred in investment feasibility analysis, informatization investment and education which will be need to improve.