• Title/Summary/Keyword: low power network

Search Result 1,244, Processing Time 0.03 seconds

Positioning testbed implementation for performance evaluation of ship wireless network (선내 무선 네트워크 특성조사를 통한 측위 테스트베드 구축)

  • Lee, Su-Bong;Kang, Dong-Hoon;Lee, Jong-Hyeon;Lee, Jae-Chul;Kim, Young-Hoon;Lee, Soon-Sup
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.41 no.4
    • /
    • pp.353-361
    • /
    • 2017
  • As ship-based tourism increases, safe sailing and management are necessary to prevent maritime accidents. Because external rescue support cannot arrive rapidly in the case of ship-related accidents, the initial response is very important for damage minimization. Further, for secondary damage prevention, it is necessary to accurately determine passenger positions. In this paper, considering the characteristics of a ship, the enhanced-Zigbee(e-Zigbee) position determination technology (PDT) is applied, which improved upon the Zigbee PDT by having advantages such as low power consumption and smaller size. According to user needs, a low-cost and high-precision passenger positioning tag and access point(AP) is provided. A ship testbed that yields improved positioning accuracy based on a performance evaluation is constructed.

Performance Analysis of Fractional Bandwidth Mode Detection for a Cognitive Radio Based OFDM System (인지 라디오 기반 OFDM 시스템을 위한 부분대역모드 검출 기법의 성능 분석)

  • Lee, Ji-Hye;Wang, Jin-Soo;Kim, Yun-Hee;Yoon, Seok-Ho;Song, Lick-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2C
    • /
    • pp.238-245
    • /
    • 2010
  • For orthogonal frequency division multiplexing (OFDM) systems sharing the spectrum with narrow band primary devices, a fractional bandwidth (FBW) mode has been proposed recently to reduce the interference to the primary users. The FBW mode divides the total OFDM bandwidth into subbands and activates (or deactivates) a subset of the subbands according to the result of spectrum sensing. In this paper, we analyze the detection error probability of FBW mode information which is delivered by the sequence embedded in the preamble and evaluate the performance in wireless regional area network environments. The results show that the detection probability derived analytically estimates the actual value from simulation adequately and that a low detection error probability less than $10^{-3}$ is obtained at a low signal-to-noise power ratio.

Resource Allocation in Full-Duplex OFDMA Networks: Approaches for Full and Limited CSIs

  • Nam, Changwon;Joo, Changhee;Yoon, Sung-Guk;Bahk, Saewoong
    • Journal of Communications and Networks
    • /
    • v.18 no.6
    • /
    • pp.913-925
    • /
    • 2016
  • In-band wireless full-duplex is a promising technology that enables a wireless node to transmit and receive at the same time on the same frequency band. Due to the complexity of self-interference cancellation techniques, only base stations (BSs) are expected to be full-duplex capable while user terminals remain as legacy half-duplex nodes in the near future. In this case, two different nodes share a single subchannel, one for uplink and the other for downlink, which causes inter-node interference between them. In this paper, we investigate the joint problem of subchannel assignment and power allocation in a single-cell full-duplex orthogonal frequency division multiple access (OFDMA) network considering the inter-node interference. Specifically, we consider two different scenarios: i) The BS knows full channel state information (CSI), and ii) the BS obtains limited CSI through channel feedbacks from nodes. In the full CSI scenario, we design sequential resource allocation algorithms which assign subchannels first to uplink nodes and then to downlink nodes or vice versa. In the limited CSI scenario, we identify the overhead for channel measurement and feedback in full-duplex networks. Then we propose a novel resource allocation scheme where downlink nodes estimate inter-node interference with low complexity. Through simulation, we evaluate our approaches for full and limited CSIs under various scenarios and identify full-duplex gains in various practical scenarios.

Effect of Deposition Parameter on Ionic Conductivity of RF Magnetron Sputtered Li$_2$O-B$_2$O$_3$-SiO$_2$ Solid Electroiyte Films (RF 마그네트론 스퍼터링법으로 증착된 Li$_2$O-B$_2$O$_3$-SiO$_2$ 계 비정질 박막 고체전해질의 증착변수에 따른 이온전도 특성에 관한 연구)

  • 노남석;권혁상
    • Journal of Surface Science and Engineering
    • /
    • v.27 no.2
    • /
    • pp.65-73
    • /
    • 1994
  • Effects of deposition parameter on the ionic conductivity and structural change of the Lithium borosili-cate solid electrolyte films, prepared by rf sputtering using 7$LI_2O-3B_2O_3-1SiO_2$ single phase target and also a mosaic target enriched with $LI_2O$, were analyzed by measuring AC impedance and IR absorption spectra for the films. Thed solid electrolyte film deposited from the single phase target exhibited very low ionic conductivi-ty of $10^{-10}{\Omega}^{-1}cm{-1}$ at room temperature, a result of low $Li^+$ ion content(7.52 at%) in the film. The $Li^+$ con-ductivity for the films deposited from the mosaic target, however, significantly increased to $10^{-7}{\Omega}^{-1}cm{-1}$ due to both an increased $Li^+$content (14.75 at %) and a structural change of the films. The increased ionic conduc-tivity of the film appears to be associated with an easiness of ionic mobility by structural change of glassy film from a some close packed network structure to a open one. These structural changes of film were found to be closely related to the increase in the peak intensity at~$960cm^{-1}$ of IR absorption spectra for the glassy films. With increasing either argon pressure from 3 to 21 mtorr or rf power from 2 to 3 W/$cm^2$, the $Li^+$ conduc-tivity for the films significantly increased to an order of $10^{-6}{\Omega}^{-1}cm{-1}$ due to an increase in openness of film structure, as confirmed by both an increase in the IR absorption peak intensity at ~$960cm^{-1}$ and a resultant reduction of activation energy for mobility of $Li^+$ ion.

  • PDF

Design and Implementation of a H.264 Video player based on DirectShow via Bluetooth (블루투스를 이용한 DirectShow기반의 H.264 동영상 플레이어의 설계 및 구현)

  • Park, Tae-Jun;Cho, Tai-Hoon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.4
    • /
    • pp.493-498
    • /
    • 2009
  • Bluetooth is a popular wireless data transmission method with low power consumption, but it has low data transmission rate. Thus, although many video stream players of a local or network file exist, there have been few players of video stream transmitted via Bluetooth. MPEG-4 AVC/H.264 codec is one of video codecs available with best compression rates for a certain quality, so a H.264 encoder seems to be adequate for video stream to be transmitted via Bluetooth. In this paper, we present a DirectShow filter based player of video stream encoded by H.264 codec, which is transmitted via Bluetooth. Details on the design and implementation of this program are described. Experimental results are shown to demonstrate the validity of the implemented program using various video samples.

Web Server Implementation via OpenWRT-based Wired/Wireless Router (OpenWRT 기반 유무선 공유기를 통한 웹 서버 구축)

  • Ha, Seung-Eup;Min, Jun-Ki;Ban, Tae-Hak;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.1055-1057
    • /
    • 2013
  • Routers currently used in homes and institutions have a function of multiple computers to connect to the Internet with a single IP address. It is possible only through setting or establishing a separate operation in a used PC or server to function as a web/printer server, web hard, and P2P. In this paper, by utilizing the OpenWRT Linux-based through the construction of the Web server through a router OpenWRT of (Open Wireless Router) base, to build a server simple compact, low power consumption, low cost, to operate by reliability to provide Internet telephony and multimedia services high securely over the server security, which is based on the setting of policy and various firewall at the same time the configuration of the network utilizing OpenWRT router that can be enhanced, to construct a Web server through a router multi functional can receive the provision of services using the program PC and mobile APP.

  • PDF

Development of Internet of Things Sensor-based Information System Robust to Security Attack (보안 공격에 강인한 사물인터넷 센서 기반 정보 시스템 개발)

  • Yun, Junhyeok;Kim, Mihui
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.95-107
    • /
    • 2022
  • With the rapid development of Internet of Things sensor devices and big data processing techniques, Internet of Things sensor-based information systems have been applied in various industries. Depending on the industry in which the information systems are applied, the accuracy of the information derived can affect the industry's efficiency and safety. Therefore, security techniques that protect sensing data from security attacks and enable information systems to derive accurate information are essential. In this paper, we examine security threats targeting each processing step of an Internet of Things sensor-based information system and propose security mechanisms for each security threat. Furthermore, we present an Internet of Things sensor-based information system structure that is robust to security attacks by integrating the proposed security mechanisms. In the proposed system, by applying lightweight security techniques such as a lightweight encryption algorithm and obfuscation-based data validation, security can be secured with minimal processing delay even in low-power and low-performance IoT sensor devices. Finally, we demonstrate the feasibility of the proposed system by implementing and performance evaluating each security mechanism.

Analysis of Latency and Computation Cost for AES-based Whitebox Cryptography Technique (AES 기반 화이트박스 암호 기법의 지연 시간과 연산량 분석)

  • Lee, Jin-min;Kim, So-yeon;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.115-117
    • /
    • 2022
  • Whitebox encryption technique is a method of preventing exposure of encryption keys by mixing encryption key information with a software-based encryption algorithm. Whitebox encryption technique is attracting attention as a technology that replaces conventional hardware-based security encryption techniques by making it difficult to infer confidential data and keys by accessing memory with unauthorized reverse engineering analysis. However, in the encryption and decryption process, a large lookup table is used to hide computational results and encryption keys, resulting in a problem of slow encryption and increased memory size. In particular, it is difficult to apply whitebox cryptography to low-cost, low-power, and light-weight Internet of Things products due to limited memory space and battery capacity. In addition, in a network environment that requires real-time service support, the response delay time increases due to the encryption/decryption speed of the whitebox encryption, resulting in deterioration of communication efficiency. Therefore, in this paper, we analyze whether the AES-based whitebox(WBC-AES) proposed by S.Chow can satisfy the speed and memory requirements based on the experimental results.

  • PDF

Resource-Efficient Object Detector for Low-Power Devices (저전력 장치를 위한 자원 효율적 객체 검출기)

  • Akshay Kumar Sharma;Kyung Ki Kim
    • Transactions on Semiconductor Engineering
    • /
    • v.2 no.1
    • /
    • pp.17-20
    • /
    • 2024
  • This paper presents a novel lightweight object detection model tailored for low-powered edge devices, addressing the limitations of traditional resource-intensive computer vision models. Our proposed detector, inspired by the Single Shot Detector (SSD), employs a compact yet robust network design. Crucially, it integrates an 'enhancer block' that significantly boosts its efficiency in detecting smaller objects. The model comprises two primary components: the Light_Block for efficient feature extraction using Depth-wise and Pointwise Convolution layers, and the Enhancer_Block for enhanced detection of tiny objects. Trained from scratch on the Udacity Annotated Dataset with image dimensions of 300x480, our model eschews the need for pre-trained classification weights. Weighing only 5.5MB with approximately 0.43M parameters, our detector achieved a mean average precision (mAP) of 27.7% and processed at 140 FPS, outperforming conventional models in both precision and efficiency. This research underscores the potential of lightweight designs in advancing object detection for edge devices without compromising accuracy.

The Construction Direction of the ROK NAVY for the Protection of Marine Sovereignty (국가의 해양주권 수호를 위한 한국해군의 전력건설 방향)

  • Shin, In-Kyun
    • Strategy21
    • /
    • s.30
    • /
    • pp.99-142
    • /
    • 2012
  • Withe increased North Korea's security threats, the South Korean navy has been faced with deteriorating security environment. While North Korea has increased asymmetric forces in the maritime and underwater with the development of nuclear weapons, and China and Japan have made a large investment in the buildup of naval forces, the power of the Pacific fleet of the US, a key ally is expected to be weakened. The biggest threat comes from China's intervention in case of full-scale war with North Korea, but low-density conflict issues are also serious problems. North Korea has violated the Armistice Agreement 2,660 times since the end of Korean War, among which the number of marine provocations reaches 1,430 times, and the tension over the NLL issue has been intensifying. With tension mounting between Korea and Japan over the Dokdo issue and conflict escalating with China over Ieo do Islet, the US Navy has confronted situation where it cannot fully concentrate on the security of the Korean peninsula, which leads to need for strengthening of South Korea's naval forces. Let's look at naval forces of neighboring countries. North Korea is threatening South Korean navy with its increased asymmetric forces, including submarines. China has achieved the remarkable development of naval forces since the promotion of 3-step plan to strengthen naval power from 1989, and it now retains highly modernized naval forces. Japan makes an investment in the construction of stat of the art warship every year. Since Japan's warship boasts of its advanced performance, Japan's Maritime Self Defense Force is evaluated the second most powerful behind the US Navy on the assumption that submarine power is not included in the naval forces. In this situation, naval power construction of South Korean navy should be done in phases, focusing on the followings; First, military strength to repel the energy warship quickly without any damage in case of battle with North Korea needs to be secured. Second, it is necessary to develop abilities to discourage the use of nuclear weapons of North Korea and attack its nuclear facilities in case of emergency. Third, construction of military power to suppress armed provocations from China and Japan is required. Based on the above naval power construction methods, the direction of power construction is suggested as follows. The sea fleet needs to build up its war potential to defeat the naval forces of North Korea quickly and participate in anti-submarine operations in response to North Korea's provocations. The task fleet should be composed of 3 task flotilla and retain the power to support the sea fleet and suppress the occurrence of maritime disputes with neighboring countries. In addition, it is necessary to expand submarine power, a high value power asset in preparation for establishment of submarine headquarters in 2015, develop anti-submarine helicopter and load SLAM-ER missile onto P-3C patrol aircraft. In case of maine corps, division class military force should be able to conduct landing operations. It takes more than 10 years to construct a new warship. Accordingly, it is necessary to establish plans for naval power construction carefully in consideration of reality and future. For the naval forces to safeguard maritime sovereignty and contribute to national security, the acquisition of a huge budget and buildup of military power is required. In this regard, enhancement of naval power can be achieved only through national, political and military understanding and agreement. It is necessary to let the nation know that modern naval forces with improved weapon system can serve as comprehensive armed forces to secure the command of the sea, perform defense of territory and territorial sky and attack the enemy's strategic facilities and budget inputted in the naval forces is the essential source for early end of the war and minimization of damage to the people. If the naval power construction is not realized, we can be faced with a national disgrace of usurpation of national sovereignty of 100 years ago. Accordingly, the strengthening of naval forces must be realized.

  • PDF