• Title/Summary/Keyword: wireless communication service

Search Result 1,265, Processing Time 0.033 seconds

Implementation of an Application System using Middleware and Context Server for Handling Context-Awareness (상황인식 처리를 위한 미들웨어 및 컨텍스트 서버를 이용한 응용시스템의 구현)

  • Shim Choon-Bo;Tae Bong-Sub;Chang Jae-Woo;Kim Jeong-Ki;Park Seung-Min
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.1
    • /
    • pp.31-42
    • /
    • 2006
  • Context-awareness is a technology to facilitate information acquisition and execution by supporting interoperability between users and devices based on users' context. It is one of the most important technologies in ubiquitous computing. In this paper, we propose a middleware and a context server for dealing with context-awareness in ubiquitous Computing and implement an application system using them. The middleware proposed in our work plays an important role in recognizing a moving node with mobility by using a Bluetooth wireless communication technology as well as in executing an appropriate execution module according to the context acquired from a context server. In addition, the proposed context server functions as a manager that efficiently stores into a database server context information, such as user's current status, physical environment, and resources of a computing system. Finally, our application system implemented in our work one which provides a music playing service based on context information, and it verifies the usefulness of both the middleware and the context server developed in our work.

Design and Implementation of RFID based Tree History Information System for Cultural Heritage Restoration (RFID 기반 문화재 복원용 임목 이력 정보 시스템의 설계 및 구현)

  • Kim, Sam-Geun;Moon, Il-Hwan;Park, Jae-Pyo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1360-1368
    • /
    • 2010
  • Recently, as the development of Radio Frequency Identification (RFID) technology becomes active, the demand for services which can electronically manage the history and location information of major trees, including trees for cultural heritage restoration and nurse trees, has been increased. This information has been managed by separated drawings and documents or storing its information into PDAs and then structuring data files through input and computation. But, these methods imply limitations in terms of its extensibility and scalability. This paper has designed and implemented an RFID based Tree History Information System (THIS) for cultural heritage restoration. The purpose of the proposed system is to support to be able to effectively and consistently manage historical information of major trees and improve working processes by implementing mobile RFID services through wireless Internet or Local Area Network (LAN) as mobile communication networks. Through implementation, it is confirmed that the proposed system can manage the historical information of major trees more effectively than conventional methods and also improve previous field working conditions.

Road Network Distance based User Privacy Protection Scheme in Location-based Services (위치 기반 서비스에서 도로 네트워크의 거리 정보를 이용한 사용자 정보 은닉 기법)

  • Kim, Hyeong Il;Shin, Young Sung;Chang, Jae Woo
    • Spatial Information Research
    • /
    • v.20 no.5
    • /
    • pp.57-66
    • /
    • 2012
  • Recent development in wireless communication technology like GPS as well as mobile equipments like PDA and cellular phone makes location-based services (LBSs) popular. However, because users request a query to LBS servers by using their exact locations while moving on the road network, users' privacy may not be protected in the LBSs. Therefore, a mechanism for users' privacy protection is required for the safe and comfortable use of LBSs by mobile users. For this, we, in this paper, propose a road network distance based cloaking scheme supporting user privacy protection in location-based services. The proposed scheme creates a cloaking area by considering road network distance, in order to support the efficient and safe LBSs on the road network. Finally, we show from our performance analysis that our cloaking scheme outperforms the existing cloaking scheme in terms of cloaking area and service time.

Design of TDD Synchronizer for Wibro RF Repeater (Wibro RF 중계기를 위한 TDD 동기 검출기의 설계)

  • Seo, Young-Ho;Kim, Dong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.11A
    • /
    • pp.909-917
    • /
    • 2009
  • In this paper, we proposed and implemented the method to efficiently generate TDD synchronization signal and the digital circuit for the RF repeater which can eliminate the shadow region in the wireless communication field using the time division duplex (TDD) method. After detecting the TDD signal from the transmitted or received RF signal, the detected TDD signal is fed to the RF repeater for the normal operation. The proposed technique detects the envelop of the downlink signal and amplifies the detected envelop, and then restores the degraded envelop with the proposed digital filtering method. Finally the restored envelop is manipulated to the TDD synchronization signal. Our focus on the proposed algorithm is to develop it with simple feature and low cost but robust performance. The proposed scheme was implemented to the integrated system which has both RF and digital circuit and tested under the same condition with the commercial WiBro service.

A Study on Experiment of Transmission Power Assignment for Indoor TVWS Wireless Communication System (실내 TVWS 무선통신을 위한 송신 전력 설정 실험에 관한 연구)

  • Yun, Deok-Won;Chang, Hyung-Min;Lee, Won-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.10
    • /
    • pp.851-860
    • /
    • 2013
  • To overcome a scarcity of radio resources to mobile broadband service, the usage of TV white space gains much attraction around the world. This paper carries out an interference analysis either by performing realistic experiments or by executing statistical Monte-Carlo simulation to exploit interference probability. The results obtained from experiments are compared to those from simulations in order to clarify the coexistence of utilization of TV band devices (TVBD) in indoor circumstances. Along the execution of our experiment in the presence of DTV receiver, we apply to a variety of transmission parameters proposed in FCC for TVBD. According to experimental and simulation works, the allowable transmission powers of TVBD systems are exploited for the plausible which are coexist on the first as well as the second adjacent frequency bands. Throughout results, it can conclude that TVBD systems can be coexisted via achieving proper transmission powers depending on the locations of themselves without showing harmful interference to DTV reception.

Necessity Analysis and Link Budget of Two Way Paging Earth Station for Satellite (양방향 무선호출 위성 지구국 시스템의 필요성 분석 및 위성 링크 설계)

  • Jang, Dae-Ik;Kim, Dae-Yeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.9
    • /
    • pp.2460-2469
    • /
    • 1999
  • Recently, appearing of various wireless telecommunications services, the competitive power of paging service is requested. In this paper, two-way paging earth station for satellite was proposed and designed to enhance the competitive power of cost and technique, and the link budget of this two-way paging networks using Koreas at was discussed. To reduce the cost of remote station, the antenna and HPA size of Hub and remote station were differently designed, and an idea of power allocations of inbound and outbound carriers was proposed and utilized in this link budget of two-way earth station for using satellite. The results of this link budget were follows. At the 0.043% time rate of rain, antenna size of Hub and remote station were 3.7m and 1.2m, the HPA size of Hub and remote station were 10.37W and 2.0W, and power allocations of outbound and inbound were 84% and 16% respectively. At the 0.02% time rate of rain, the antenna size of Hub and remote station were 3.7m and 1.8m and power allocations of outbound and inbound were 63% and 37% respectively.

  • PDF

Design of Antenna for Beam Scanning for Dual-Band base station (이중대역 기지국용 빔 스캔 안테나 설계)

  • Ko Jin-Hyun;Jang Jae-Su;Ha Jae-Kwon;Park Sae-Houn
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.632-636
    • /
    • 2006
  • It is needed to use the beam scanning to control the cell coverage of the base station considering operation conditions, season, time period, radiation character and mobility of customers and vehicles for varied wireless communication service and quality improvement. This paper proposes a mobile antenna system which can obtain the characteristics of the beam scanning by controlling the directivity depending on the operation condition. Radiation block is made of 2 sub-array of $1\times3$ patched antennas for ITS of 5.8GHZ bandwidth with the gain of 13dBi, and of 2 sub-array of single patched antenna for WiBro of 2.3GHZ bandwidth with the gain of 12dBi. RF module is made of a switch, an amplifier, a PAD, a 3-Bit phase shifter, and a power divider. The system is able to control the beam tilting with electronic methode by using 3-bit phase shifter$(45^{\circ},\;90^{\circ},\;180^{\circ})$.

  • PDF

Design and Implementation of a Secure E-Mail System using Elliptic Curve Cryptosystem (타원곡선 암호 시스템을 이용한 보안 메일 시스템의 설계 및 구현)

  • Lee, Won-Goo;Kim, Sung-Jun;Lee, Hee-Gyu;Mun, Ki-Young;Lee, Jae-Kwang
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.333-345
    • /
    • 2002
  • As computers and networks become popular, distributing information on the Internet is common in our daily life. Also, the explosion of the Internet, of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. But secure mail is gaining popularity abroad and domestically because of their nature of providing security. That is. It has been used a variety of fields such as general mail and e-mail for advertisement. But, As the data transmitted on network can be easily opened or forged with simple operations. Most of existing e-mail system don't have any security on the transmitted information. Thus, security mail system need to provide security including message encryption, content integrity, message origin authentication, and non-repudiation. In this paper, we design and implement secure mail system with secure key agreement algorithm, non-repudiation service, and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services.

User Scheduling Algorithm Based on Signal Quality and Inter-User Interference for Outage Minimization in Full-Duplex Cellular Networks (전이중 셀룰라 네트워크에서 아웃티지 최소화를 위한 신호 품질과 사용자간 간섭량 기반의 사용자 스케쥴링 알고리즘)

  • Choi, Hyun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2576-2583
    • /
    • 2015
  • In a full-duplex (FD) wireless cellular network, uplink (UL) users induce the severe inter-user interference to downlink (DL) users. Therefore, a user scheduling that makes a pair of DL user and UL user to use the same radio resource simultaneously influences the system performances significantly. In this paper, we first formulate an optimization problem for user scheduling to minimize the occurrence of outage, aiming to guarantee the quality of service of users, and then we propose a suboptimal user scheduling algorithm with low complexity. The proposed scheduling algorithm is designed in a way where the DL user with a worse signal quality has a higher priority to choose its UL user that causes less interference. Simulation results show that the FD system using the proposed user scheduling algorithm achieves the optimal performance and significantly decreases the outage probability compared with the conventional half-duplex cellular system.

AP-Initiated Flow Redirection Mechanism for AP Load Balancing in WLAN Environments (무선랜 환경에서 AP 로드 밸런싱을 위한 AP-개시 플로우 리다이렉션 메커니즘)

  • Kim, Mi-Hui;Chae, Ki-Joon
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.65-73
    • /
    • 2009
  • IEEE802.11 Wireless LAN(WLAN) is being widely used in public space such as airport, and increases the networking boundary in campus and enterprise, and it has lastly attracted considerable attention for mesh network and converged network with other 3G mobile communication networks. In WLAN, load balancing among Access Points(AP) is an important issue for efficient resource management or supporting the Quality of Service(QoS) of traffic, but most researches focused on the AP selection in network entry or roaming of Stations(STA). In this paper, we propose an AP-Initiated Flow Redirection(FR) for AP load balancing by monitoring AP's availability in the true sense. When the AP's resource becomes almost saturated, that is used more than a specific threshold, the AP queries the roaming possible neighbor APs about their availability and calculates the distribution of traffic load with statistical methods such as entropy or chi-square. Finally, the AP decides flows and new APs for redirection and performs it. Our simulation results show that our FR mechanism increases the performance in the various views.

  • PDF