DOI QR코드

DOI QR Code

Design of Data Exchange Technique for Power Facilities Monitoring using Augmented Reality

증강현실을 이용한 전력 설비 모니터링 시스템의 데이터 교환 기법 설계

  • Received : 2020.09.02
  • Accepted : 2020.11.20
  • Published : 2020.11.28

Abstract

Since it is difficult for individual power producers and non-professionals who lack basic knowledge to control, manage, and operate facilities through EMS (Energy Management System), augmented reality and virtual reality monitoring systems are applied. However, in the existing systems, data access efficiency is inferior due to the process of analyzing column values for analog signal values collected from sensors and converting data after combining the columns. In addition, high-speed operation processing is difficult due to a large number of indexes for accommodating access patterns for various analog signal waveforms. Therefore, in this paper, a bitmap generator is inserted into a non-tree structure to convert the data collected from power facilities into physical property information, and the converted information is encrypted with a common key, so that the resources for the resources shared between each device are We propose a method of exchanging data for an augmented reality-based power system that is controlled by measurement.

개인 전력 생산자 및 기반 지식이 부족한 비전문가의 경우 EMS(Energy Management System)을 통해 시설을 제어, 관리, 운영하기 어렵기 때문에 증강현실 및 가상현실을 적용한 모니터링 시스템이 적용되고 있다. 그러나 기존의 시스템들은 센서에서 수집된 아날로그 신호 값에 대한 컬럼 값을 분석하고 이에 대한 컬럼들을 결합한 후 데이터를 변환하는 과정으로 인하여 데이터 엑세스 효율성이 떨어진다. 그리고 다양한 아날로그 신호 파형에 대한 액세스 패턴을 수용하기 위한 다수의 인덱스들로 인하여 고속 연산 처리가 어렵다. 따라서 본 논문에서는 전력설비에서 수집된 데이터를 비트맵 생성기(Bitmap Generator)를 비-트리 구조에 삽입하여 물성 정보로 변환하고 변환된 정보를 공통 키로 암호화하여 각 기기 사이에서 공유되는 리소스에 대한 자원을 계측적으로 제어하는 증강현실 기반 전력시스템의 데이터 교환방법을 제안한다.

Keywords

References

  1. G. Chang et al. (2019). Guest Editorial Introduction to the Special Issue on Advances in Condition Monitoring and Assessment of Power Equipment. IEEE Transactions on Power Delivery, 34(4), 1219. https://doi.org/10.1109/TPWRD.2019.2926168
  2. A. J. Adams, J. N. Johansen, M. Ogrinz, H. Dolan, W. P. Jacobson & M. J. Kurian. (2020). U.S. Patent No. 10,607,230. Washington, DC: U.S. Patent and Trademark Office.
  3. A. Pande, D. Y. Joshi, D. Joshi & D. Wadhwa. (2020). Analysis of Tree Structure for Secure Group Communication Using LKH Approach. Lalitkumar, Analysis of Tree Structure for Secure Group Communication Using LKH Approach (June 1, 2020).
  4. H. Kimata, W. Xiaojun & R. Tanida. (2020, June). Hierarchical and Compact Bitmap Based Data Structure of Human Dynamics Data for Visualization. In Proceedings of the 2020 The 4th International Conference on Graphics and Signal Processing (pp. 98-102).
  5. R. Bhardwaj & A. Aggarwal. (2020). Hiding clinical information in medical images: an enhanced encrypted reversible data hiding algorithm grounded on hierarchical absolute moment block truncation coding. Multidimensional Systems and Signal Processing, 1-24.
  6. N. Hammler, A. Cathelin, P. Cathelin & B. Murmann. (2019). A Spectrum-Sensing DPD Feedback Receiver With $30\times $ Reduction in ADC Acquisition Bandwidth and Sample Rate. IEEE Transactions on Circuits and Systems I: Regular Papers, 66(9), 3340-3351. https://doi.org/10.1109/TCSI.2019.2920828
  7. M. Perez-Patricio & A. Aguilar-Gonzalez. (2019). FPGA implementation of an efficient similarity-based adaptive window algorithm for real-time stereo matching. Journal of Real-Time Image Processing, 16(2), 271-287. https://doi.org/10.1007/s11554-015-0530-6
  8. A. Nejati, Y. Bastan, P. Amiri & M. H. Maghami. (2019). A low-voltage bulk-driven differential CMOS Schmitt trigger with tunable hysteresis. Journal of Circuits, Systems and Computers, 28(07), 1920004. https://doi.org/10.1142/S0218126619200044
  9. D. Valencia & A. Alimohammad. (2019). An efficient hardware architecture for template matching-based spike sorting. IEEE transactions on biomedical circuits and systems, 13(3), 481-492. https://doi.org/10.1109/TBCAS.2019.2907882
  10. B. Bhandari & G. Park. (2020). Development of a real-time security management system for restricted access areas using computer vision and deep learning. Journal of Transportation Safety & Security, 1-16.
  11. Jeong, W. C., Jun, M. S., & Choi, D. H. (2020). AMI Network Failure Analysis based on Graph Database. Journal of Convergence for Information Technology, 10(7), 41-48. https://doi.org/10.22156/CS4SMB.2020.10.07.041
  12. J. O. Park. (2020). A Design of Certificate Management Method for Secure Access Control in IoT-based Cloud Convergence Environment. Journal of Convergence for Information Technology, 10(7), 7-13. DOi : 10.22156/CS4SMB.2020.10.07.007
  13. S. Kanai, H. Date & T. Kishinami. (1998). Digital watermarking for 3D polygons using multiresolution wavelet decomposition. In Proc. Sixth IFIP WG, 5, 296-307.
  14. E. Damiani, S. Vimercati, S. Parabosch & P. Samarati. (2000, March). Securing XML documents. In International Conference on Extending Database Technology (pp. 121-135). Springer : Berlin, Heidelberg.