• Title/Summary/Keyword: wireless applications

Search Result 1,706, Processing Time 0.136 seconds

A Study on the Energy Efficient MAC Layer ARQ Protocol for Wireless Ubiquitous Networks (무선 유비쿼터스 네트워크를 위한 에너지 효율적인 MAC Layer ARQ 프로토콜에 대한 연구)

  • Roh, Jae-Sung;Kim, Wan-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.1
    • /
    • pp.54-60
    • /
    • 2011
  • The development of wireless sensor networks (WSN) can be motivated by several types of applications. However, these applications demand an energy-efficient WSN that can prolong the network lifetime and can provide high throughput, low latency and delay. Designing wireless sensor networks with the capability of prolonging network lifetime catch the attention of many researchers in wireless system and network field. Contrasts with Mobile Ad Hoc Network system, Wireless Sensor Networks designs focused more on survivability of each node in the network instead of maximizing data throughput or minimizing end-to-end delay. In this paper, we will study part of data link layer in Open Systems Interconnection (OSI) model, called medium access control (MAC) layer. Since the MAC development of energy aware MAC Protocol for wireless sensor layer controls the physical radio part, it has a large impact on the overall energy consumption and the lifetime of a node. This paper proposes a analytical approach that tries to reduce idle energy consumption, and shows the increasement of network end-to-end arrival rate due to efficiency in energy consumption from time slot management.

Introducing Mobile Cloud Computing-Cloudlet for implementing mobile APP (모바일앱을 구현하기 위한 모바일 클라우드 도입)

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.304-307
    • /
    • 2015
  • Virtualization lacks capabilities for enabling the application to scale efficiently because of new applications components which are raised to be configured on demand. In this paper, we propose an architecture that affords mobile app based on nomadic smartphone using not only mobile cloud computing-cloudlet architecture but also a dedicated platform that relies on using virtual private mobile networks to provide reliable connectivity through Long Term Evolution (LTE) wireless communication. The design architecture lies with how the cloudlet host discovers service and sends out the cloudlet IP and port while locating the user mobile device. We demonstrate the effectiveness of the proposed architecture by implementing an android application responsible of real time analysis by using a vehicle to applications smart phones interface approach that considers the smartphones to act as a remote users which passes driver inputs and delivers outputs from external applications.

  • PDF

Magnetic Resonant Wireless Power Transfer with L-Shape Arranged Resonators for Laptop Computer

  • Choi, Jung Han;Kang, Seok Hyon;Jung, Chang Won
    • Journal of electromagnetic engineering and science
    • /
    • v.17 no.3
    • /
    • pp.126-132
    • /
    • 2017
  • In this study, we designed, measured, and analyzed a rearranged L-shape magnetic resonance coupling wireless power transfer (MR-WPT) system for practical applications with laptops. The typical four resonator MR-WPT (Tx part: source loop and Tx coil; Rx part: Rx coil and load loop) is difficult to apply to small-sized stationary and mobile applications, such as laptop computers, tablet-PCs, and smartphones, owing to the large volume of the Rx part and the spatial restrictions of the Tx and Rx coils. Therefore, an L-shape structure, which is the orthogonal arrangement of the Tx and Rx parts, is proposed for indoor environment applications, such as at an L-shaped wall or desk. The relatively large Tx part and Rx coil can be installed in the wall and the desk, respectively, while the load loop is embedded in the small stationary or mobile devices. The transfer efficiency (TE) of the proposed system was measured according to the transfer distance (TD) and the misaligned locations of the load loop. In addition, we measured the TE in the active/non-active state and monitor-open/closed state of the laptop computer. The overall highest TE of the L-shape MR-WPT was 61.43% at 45 cm TD, and the TE decreased to 27.9% in the active and monitor-open state of the laptop computer. The conductive ground plane has a much higher impact on the performance when compared to the impact of the active/non-active states. We verified the characteristics and practical benefits of the proposed L-shape MR-WPT compared to the typical MR-WPT for applications to L-shaped corners.

A Study of Security Measures and Vulnerability Analysis on the Application using WiBro Service (WiBro 서비스를 이용한 응용프로그램의 취약점 분석 및 보안 대책 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.479-482
    • /
    • 2012
  • WiBro(Wireless Broadband) service is the world standardized fourth-generation communications in Korea. The services through internet-based applications using WiBro communication-based is increasing. WiBro service in the Internet-based applications when using the service, the application may need to analyze the vulnerability. In this paper, we use the Internet when in WiBro service, to analyze the vulnerability. And, Internet-based applications for vulnerabilities that could lead to hacker attacks is analyzed. It will be studied that security measures through analysis of vulnerability of WiBro services and applications.

  • PDF

A Study of Security Measures and Vulnerability Analysis on the Application using WiBro Service (WiBro 서비스를 이용한 응용프로그램의 취약점 분석 및 보안 대책 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.6
    • /
    • pp.1217-1222
    • /
    • 2012
  • WiBro(Wireless Broadband) service is the world standardized fourth-generation communications in Korea. The services through internet-based applications using WiBro communication-based is increasing. WiBro service in the Internet-based applications when using the service, the application may need to analyze the vulnerability. In this paper, we use the Internet when in WiBro service, to analyze the vulnerability. And, Internet-based applications for vulnerabilities that could lead to hacker attacks is analyzed. It will be studied that security measures through analysis of vulnerability of WiBro services and applications.

Routing Algorithm of Wireless Sensor Network for Building Automation System (빌딩 자동화를 위한 무선 센서 네트워크 라우팅 프로토콜)

  • Lu, Delai;Hong, Seung-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2009.05a
    • /
    • pp.45-47
    • /
    • 2009
  • Wireless Sensor Network(WSN) has been very popular in unattended surveillance systems recently. For Applying WSN into Building Automation system(BAS), a novel hierarchial network structure and static routing algorithm which eliminates the scalability limitation of Zigbee are proposed in this paper. The static routing algorithm relying on the hierarchial network address reduces the computational complexity to a great extent and has a real-time performance which satisfies urgent applications well.

  • PDF

Weighted Neighbor-node Distribution Localization for Large-scale Wireless Sensor Networks (대규모 무선 센서 네트워크에서 이웃 노드 분포를 이용한 분산 위치인식 기법 및 구현)

  • Lee, Sang-Hoon;Lee, Ho-Jae;Lee, Sang-Hoon
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.255-256
    • /
    • 2008
  • Distributed localization algorithms are required for large-scale wireless sensor network applications. In this paper, we introduce an efficient algorithm, termed weighted neighbor-node distribution localization(WNDL), which emphasizes simple refinement and low system-load for low-cost and low-rate wireless sensors. We inspect WNDL algorithm through MATLAB simulation.

  • PDF

An implementation of wireless sensor network for security system using Bluetooth (블루투스를 이용한 보안을 위한 무선 센서네트워크의 구현)

  • Kim, Jae-Wan;Kim, Byoung-Kug;Eom, Doo-Seop
    • Annual Conference of KIPS
    • /
    • 2004.05a
    • /
    • pp.1501-1504
    • /
    • 2004
  • We describe a Bluetooth wireless sensor network for security systems, which includes the implementation issues about system architecture, power management, self-configuration of network, and routing. We think that the methods or algorithms described in this paper can be easily applied to other embedded Bluetooth applications for wireless networks.

  • PDF

5th Generation Wireless Networks Security: Challenges and Solutions

  • Siddiq, Bashayer Ahmed Bin
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.157-162
    • /
    • 2022
  • In reason of the high capacity and low latency, the 5G wireless networks used nowadays in many of life applications such as: remote surgery and guiding vehicle. The high requirements of 5G networks makes it more vulnerable for security threats and attacks. This paper presents some challenges faced by 5G networks and presets some of the security solutions.

Design of efficient location system for multiple mobile nodes in the wireless sensor network

  • Kim, Ki-Hyeon;Ha, Bong-Soo;Lee, Yong-Doo;Hong, Won-Kee
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.81-84
    • /
    • 2005
  • Various design schemes for network using wireless sensor nodes have been widely studied on the several application areas ranging from the real world information collection to environmental monitor. Currently, the schemes are focused on the design of sensor network for low power consumption, power-aware routing protocol, micro miniature operating system and sensor network middleware. The indoor localization system that identifies the location of the distributed nodes in a wireless sensor network requires features dealing with mobility, plurality and other environmental constraints of a sensor node. In this paper, we present an efficient location system to cope with mobility of multiple mobile nodes by designing a location handler that processes location information selectively depending on the nodes' density in a specific region. In order to resolve plurality of multiple mobile nodes, a routing method for the location system is also proposed to avoid the occurrence of overlapped location data.

  • PDF