• Title/Summary/Keyword: Data Acquisition Devices

Search Result 184, Processing Time 0.024 seconds

A Development of Cipher Device based on Embedded Linux for Serial Communication in SCADA (임베디드 리눅스 기반의 SCADA 직렬통신 구간 암호화 장치 개발)

  • Lee, Jong-Joo;Kim, Seog-Joo;Kang, Dong-Joo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.4
    • /
    • pp.25-32
    • /
    • 2010
  • The Supervisory Control and Data Acquisition Systems (SCADA) system provides monitoring, data gathering, analysis, and control of the equipment used to manage most infrastructure. The SCADA Network is implemented in a various manner for larger utilities, and multiple types of protocol and communication interfaces are used to network the control center to remote sites. The existing SCADA equipment and protocols were designed and implemented with availability and efficiency, and as a result security was not a consideration. So, performance, reliability, flexibility and safety of SCADA systems are robust, while the security of these systems is often weak. This makes some SCADA networks potentially vulnerable to disruption of service, process redirection, or manipulation of operational data that could result in public safety concerns and/or serious disruptions to the infrastructure. To reduce the risks, therefore, there is a need to have a security device such as cipher devices or cryptographic modules for security solutions. In this paper we develop an embedded cipher device for the SCADA equipment. This paper presents a cipher device designed to improve the security of its networks, especially in the serial communication.

Extraction method of Stay Point using a Statistical Analysis (통계적 분석방법을 이용한 Stay Point 추출 연구)

  • Park, Jin Gwan;Oh, Soo Lyul
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.26-40
    • /
    • 2016
  • Recent researches have been conducted for a user of the position acquisition and analysis since the mobile devices was developed. Trajectory data mining of location analysis method for a user is used to extract the meaningful information based on the user's trajectory. It should be preceded by a process of extracting Stay Point. In order to carry out trajectory data mining by analyzing the user of the GPS Trajectory. The conventional Stay Point extraction algorithm is low confidence because the user to arbitrarily set the threshold values. It does not distinguish between staying indoors and outdoors. Thus, the ambiguity of the position is increased. In this paper we proposed extraction method of Stay Point using a statistical analysis. We proposed algorithm improves position accuracy by extracting the points that are staying indoors and outdoors using Gaussian distribution. And we also improve reliability of the algorithm since that does not use arbitrarily set threshold.

Program Construction of slope Spatial Information Acquistion in Mobile Environment (모바일 환경의 경사지 공간정보획득 프로그램 구축)

  • Kang, In-Joon;Kang, Ho-Yun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.27 no.3
    • /
    • pp.367-374
    • /
    • 2009
  • Every year there are great socio-economic loss and damage caused by landslides in steep slopes. According to recent statistics, the percentage of casualty due to breakdown in steep slopes was 27.3% of all natural disasters occurring over the past decade($1998{\sim}2007$). Therefore, the nationwide scale survey on the landslide susceptibility was made to recognize the status quo for appropriate troubleshooting measure against the collapse of steep slopes. Nevertheless, few dent that the data collected is not sufficient to grasp the overall understanding of the onsite situation due to lack of spatial information. As a result, the study aims to develop a program enabling to send on site topological data and prefixed data-gather criteria directly to the central management server in real-time basis. It will be conducted through mobile devices and portable GPS system, accordingly. This program is expected to be implemented as an efficient application tool of slope spatial information acquisition.

An Attention-based Temporal Network for Parkinson's Disease Severity Rating using Gait Signals

  • Huimin Wu;Yongcan Liu;Haozhe Yang;Zhongxiang Xie;Xianchao Chen;Mingzhi Wen;Aite Zhao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2627-2642
    • /
    • 2023
  • Parkinson's disease (PD) is a typical, chronic neurodegenerative disease involving the concentration of dopamine, which can disrupt motor activity and cause different degrees of gait disturbance relevant to PD severity in patients. As current clinical PD diagnosis is a complex, time-consuming, and challenging task that relays on physicians' subjective evaluation of visual observations, gait disturbance has been extensively explored to make automatic detection of PD diagnosis and severity rating and provides auxiliary information for physicians' decisions using gait data from various acquisition devices. Among them, wearable sensors have the advantage of flexibility since they do not limit the wearers' activity sphere in this application scenario. In this paper, an attention-based temporal network (ATN) is designed for the time series structure of gait data (vertical ground reaction force signals) from foot sensor systems, to learn the discriminative differences related to PD severity levels hidden in sequential data. The structure of the proposed method is illuminated by Transformer Network for its success in excavating temporal information, containing three modules: a preprocessing module to map intra-moment features, a feature extractor computing complicated gait characteristic of the whole signal sequence in the temporal dimension, and a classifier for the final decision-making about PD severity assessment. The experiment is conducted on the public dataset PDgait of VGRF signals to verify the proposed model's validity and show promising classification performance compared with several existing methods.

A Study on Data Acquisition in the Invisible Zone of UAV through LTE Remote Control (LTE 원격관제를 통한 UAV의 비가시권 데이터 취득방안)

  • Jeong, HoHyun;Lee, Jaehee;Park, Seongjin
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.6_1
    • /
    • pp.987-997
    • /
    • 2019
  • Recently the demand for drones is rapidly increasing, as developing Unmanned Aerial Vehicle (UAV) and growing interest in them. Compared to traditional satellite and aerial imagery, it can be used for various researches (environment, geographic information, ocean observation, and remote sensing) because it can be managed with low operating costs and effective data acquisition. However, there is a disadvantage in that only a small area is acquired compared to the satellite and an aircraft, which is a traditional remote sensing method, depending on the battery capacity of the UAV, and the distance limit between Ground Control System (GCS) and UAV. If remote control at long range is possible, the possibility of using UAV in the field of remote sensing can be increased. Therefore, there is a need for a communication network system capable of controlling regardless of the distance between the UAV and the GCS. The distance between UAV and GCS can be transmitted and received using simple radio devices (RF 2.4 GHz, 915 MHz, 433 MHz), which is limited to around 2 km. If the UAV can be managed simultaneously by improving the operating environment of the UAV using a Long-Term Evolution (LTE) communication network, it can make greater effects by converging with the existing industries. In this study, we performed the maximum straight-line distance 6.1 km, the test area 2.2 ㎢, and the total flight distance 41.75 km based on GCS through LTE communication. In addition, we analyzed the possibility of disconnected communication through the base station of LTE communication.

Research on a Mobile-aware Service Model in the Internet of Things

  • An, Jian;Gui, Xiao-Lin;Yang, Jian-Wei;Zhang, Wen-Dong;Jiang, Jin-Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1146-1165
    • /
    • 2013
  • Collaborative awareness between persons with various smart multimedia devices is a new trend in the Internet of Things (IoT). Because of the mobility, randomness, and complexity of persons, it is difficult to achieve complete data awareness and data transmission in IoT. Therefore, research must be conducted on mobile-aware service models. In this work, we first discuss and quantify the social relationships of mobile nodes from multiple perspectives based on a summary of social characteristics. We then define various decision factors (DFs). Next, we construct a directed and weighted community by analyzing the activity patterns of mobile nodes. Finally, a mobile-aware service routing algorithm (MSRA) is proposed to determine appropriate service nodes through a trusted chain and optimal path tree. The simulation results indicate that the model has superior dynamic adaptability and service discovery efficiency compared to the existing models. The mobile-aware service model could be used to improve date acquisition techniques and the quality of mobile-aware service in the IoT.

Implementation of smart security CCTV system based on wireless sensor networks and GPS data (무선 센서 네트워크와 GPS정보를 이용한 스마트 보안 CCTV 시스템 구현)

  • Yoon, Kyung-Hyo;Park, Jin-Hong;Kim, Jungjoon;Seo, Dae-Hwa
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.37 no.8
    • /
    • pp.918-931
    • /
    • 2013
  • The conventional object tracking techniques using PTZ camera detects object movements by analyzing acquired image. However, this technique requires expensive hardware devices to perform a complex image processing. And it is occasionally hard to detect object movements, if an acquired image is low quality or image acquisition is impossible. In this paper, we proposes a smart security CCTV system applying to wireless sensor network technique based on IEEE 802.15.4 standard to overcome the problems of conventional object tracking technique, which enables to track suspicious objects by detecting object movements and GPS data in sensor node. This system enables an efficient control of PTZ camera to observe a wide area, decreasing image processing complexity. Also, wireless sensor network is implemented using mesh networks to increase the efficiency of installing sensor node.

DB set-up of the Year 2000 date problem for medical device (의료기기 Year2000 문제해결을 위한 데이터베이스 구축방안)

  • Kim, S.H.;Juh, R.H.;Lee, S.D.;Shin, T.S.;Kim, J.S.;Kim, S.H.;Huh, S.J.
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1998 no.11
    • /
    • pp.104-105
    • /
    • 1998
  • To minimize the Y2K (year 2000) date aware problem of medical devices, we are developing a database that keeps the data such as equipment type, specification, serial number, model number, acquisition date, vendor, manufacturer of the device as well as the names of departments that installed and that is currently responsible for the management of the medical device. The database also keeps the information as to whether the device awares the date, whether it is affected by the Y2K problem or not, how to solve the problem, reference home page address, and so on. The data was collected via internet search of the FDA web site and related of manufacturers homepages. To manage the Y2K problem effectively, the database should be updated regularly to include recent information.

  • PDF

Development of artificial neural network based modeling scheme for wind turbine fault detection system (풍력발전 고장검출 시스템을 위한 인공 신경망 기반의 모델링 기법 개발)

  • Moon, Dae Sun;Ra, In Ho;Kim, Sung Ho
    • Smart Media Journal
    • /
    • v.1 no.2
    • /
    • pp.47-53
    • /
    • 2012
  • Wind energy is currently the fastest growing source of renewable energy used for electrical generation around world. Wind farms are adding a significant amount of electrical generation capacity. The increase in the number of wind farms has led to the need for more effective operation and maintenance procedures. Condition Monitoring System(CMS) can be used to aid plant owners in achieving these goals. In this work, systematic design procedure for artificial neural network based normal behavior model which can be applied for fault detection of various devices is proposed. Furthermore, to verify the design method SCADA(Supervisor Control and Data Acquisition) data from 850kW wind turbine system installed in Beaung port were utilized.

  • PDF

Bridge Inspection and condition assessment using Unmanned Aerial Vehicles (UAVs): Major challenges and solutions from a practical perspective

  • Jung, Hyung-Jo;Lee, Jin-Hwan;Yoon, Sungsik;Kim, In-Ho
    • Smart Structures and Systems
    • /
    • v.24 no.5
    • /
    • pp.669-681
    • /
    • 2019
  • Bridge collapses may deliver a huge impact on our society in a very negative way. Out of many reasons why bridges collapse, poor maintenance is becoming a main contributing factor to many recent collapses. Furthermore, the aging of bridges is able to make the situation much worse. In order to prevent this unwanted event, it is indispensable to conduct continuous bridge monitoring and timely maintenance. Visual inspection is the most widely used method, but it is heavily dependent on the experience of the inspectors. It is also time-consuming, labor-intensive, costly, disruptive, and even unsafe for the inspectors. In order to address its limitations, in recent years increasing interests have been paid to the use of unmanned aerial vehicles (UAVs), which is expected to make the inspection process safer, faster and more cost-effective. In addition, it can cover the area where it is too hard to reach by inspectors. However, this strategy is still in a primitive stage because there are many things to be addressed for real implementation. In this paper, a typical procedure of bridge inspection using UAVs consisting of three phases (i.e., pre-inspection, inspection, and post-inspection phases) and the detailed tasks by phase are described. Also, three major challenges, which are related to a UAV's flight, image data acquisition, and damage identification, respectively, are identified from a practical perspective (e.g., localization of a UAV under the bridge, high-quality image capture, etc.) and their possible solutions are discussed by examining recently developed or currently developing techniques such as the graph-based localization algorithm, and the image quality assessment and enhancement strategy. In particular, deep learning based algorithms such as R-CNN and Mask R-CNN for classifying, localizing and quantifying several damage types (e.g., cracks, corrosion, spalling, efflorescence, etc.) in an automatic manner are discussed. This strategy is based on a huge amount of image data obtained from unmanned inspection equipment consisting of the UAV and imaging devices (vision and IR cameras).