• Title/Summary/Keyword: Data collection protocol

Search Result 126, Processing Time 0.026 seconds

A Study on the Visualization of Facility Data Using Manufacturing Data Collection Standard (제조설비 데이터 수집 표준을 이용한 설비 데이터 시각화에 대한 연구)

  • Ko, Dongbeom;Park, Jeongmin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.3
    • /
    • pp.159-166
    • /
    • 2018
  • This paper introduces a manufacturing facility visualization system for the monitoring of smart factories. With the development of technology and the emergence of such terms as the Fourth Industrial Revolution and Industry 4.0, technologies for smart factories are becoming more important. A Manufacturing Execution System that can improve productivity and help decision making by monitoring production plants in real-time is one of the key technologies for smart factories. The application of digital twin technology for more accurate monitoring technology is also an important issue. However, digital twin implementations require an integrated infrastructure that can integrate facility data from multiple manufacturers. Therefore, this paper designs and develops a visualization program that can verify real-time information of facilities using data collection system based on international standard protocol for heterogeneous collection and monitoring of facility data. This allows a factory to consolidate equipment data from multiple manufacturers and to view them in real-time.

Design and Analysis of a Secure Protocol for the P3P Standard (S-P3P: P3P 표준을 반영한 보안 프로토콜 설계 및 분석)

  • Choi, Hyun-Woo;Jang, Hyun-Su;Ko, Kwang-Sun;Kim, Gu-Su;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.14C no.7
    • /
    • pp.545-552
    • /
    • 2007
  • P3P(Platform for Privacy Preference) that is used in the World Wide Web is a standard to define and negotiate policies about definition, transmission, collection, and maintenance of personal information. Current P3P standard provides methods that define client personal information protection policy and P3P policy associated with web server. It also provides a method that compares these two policies. The current P3P standard, however, does not handle detail functions for safe transmission of the personal information and data. Also, it does not handle problems that can be induced by the detail functions. In this paper, in order to solve these problems, we propose a Secure P3P(S-P3P) protocol, which is a security protocol for the current P3P standard, offers mutual authentication between the web server and the client, and guarantees integrity and confidentiality of the messages and data. Furthermore, a S-P3P protocol provides non-repudiation on transmission and reception of personal information that is transmitted from the client to the web server.

Power and Location Information based Routing Protocol Design in Wireless Sensor Networks (무선 센서 네트워크에서 전력과 위치정보 기반 라우팅 프로토콜 디자인)

  • Son Byung-Rak;Kim Jung-Gyu
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.2
    • /
    • pp.48-62
    • /
    • 2006
  • In recent years, wireless sensor networks(WSNs) have emerged as a new fast-growing application domain for wireless distributed computing and embedded systems. Recent Progress in computer and communication technology has made it possible to organize wireless sensor networks composed tiny sensor nodes. Furthermore, ad-hoc network protocols do not consider the characteristics of wireless sensor nodes, making existing ad-hoc network protocols unsuitable for the wireless sensor networks. First, we propose power-aware routing protocols based on energy-centered routing metrics. Second, we describe power management techniques for wireless sensor nodes using the spatial locality of sensed data. Many nodes can go into a power-down mode without sacrificing the accuracy of sensed data. Finally, combining the proposed techniques, we describe an overall energy-efficient protocol for data collection. Experimental results show that the proposed routing protocol can extend the routing path lifetime more than twice. The average energy consumption per sensing period is reduced by up to 30%.

  • PDF

Data Dissemination Protocol based on Predictable Mobility of Sinks in Wireless Sensor Networks (무선 센서 네트워크에서 예측 가능한 싱크 이동성을 기반으로 한 데이타 전달 프로토콜)

  • Park, Soo-Chang;Lee, Eui-Sin;Jin, Min-Sook;Choi, Young-Hwan;Kim, Sang-Ha
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.3
    • /
    • pp.276-280
    • /
    • 2008
  • Many dissemination protocols on the mobility support in wireless sensor networks have been designed based on the assumption that the movement trace of sinks, such as soldiers and fire fighters, is random. However, the mobility of the sinks in many applications, for example, the movement trace of a soldier on operation in a battle field, can be determined in advance. In this paper, we propose a Predictable Mobility-based Data Dissemination protocol that enables data to directly route from source nodes to moving sinks by taking into consideration predictable movement behavior of the sinks. We also show the superiority of the predictable mobility-based data dissemination protocol through the performance comparison with the random mobility-based data dissemination protocols.

Exploiting Mobility for Efficient Data Dissemination in Wireless Sensor Networks

  • Lee, Eui-Sin;Park, Soo-Chang;Yu, Fucai;Kim, Sang-Ha
    • Journal of Communications and Networks
    • /
    • v.11 no.4
    • /
    • pp.337-349
    • /
    • 2009
  • In this paper, we introduce a novel mobility model for mobile sinks in which the sinks move towards randomly distributed destinations, where each destination is associated with a mission. The novel mobility model is termed the random mobility with destinations. There have been many studies on mobile sinks; however, they merely support two extreme cases of sink mobility. The first case features the most common and general mobility, with the sinks moving randomly, unpredictably, and inartificially. The other case takes into account mobility only along predefined or determined paths such that the sinks can gather data from sensor nodes with minimum overhead. Unfortunately, these studies for the common mobility and predefined path mobility might not suit for supporting the random mobility with destinations. In order to support random mobility with destination, we propose a new protocol, in which the source nodes send their data to the next movement path of a mobile sink. To implement the proposed protocol, we first present a mechanism for predicting the next movement path of a mobile sink based on its previous movement path. With the information about predicted movement path included in a query packet, we further present a mechanism that source nodes send energy-efficiently their data along the next movement path before arriving of the mobile sink. Last, we present mechanisms for compensating the difference between the predicted movement path and the real movement path and for relaying the delayed data after arriving of the mobile sink on the next movement path, respectively. Simulation results show that the proposed protocol achieves better performance than the existing protocols.

Secure routing security algorithm S-ZRP used Zone Routing Protocol in MANET (MANET환경에서 Zone Routing Protocol을 이용한 안전한 경로설정 보안 알고리즘 S-ZRP)

  • Seo Dae-Youl;Kim Jin-Chul;Kim Kyoung-Mok;Oh Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.4 s.346
    • /
    • pp.13-21
    • /
    • 2006
  • An mobile ad hoc network(MANET) is a collection of wireless computers (nodes), communicating among themselves over multi-hop paths, without the help of any infrastructure such as base stations or access points. Prior research in MANET has generally studied the routing problem in a non-adversarial setting, assuming a trusted environment. In this paper, we design and evaluate the Secure Zone Routing Protocol(T-ZRP), a secure ad hoc network routing protocol is based on the design of the hash chain. In order to support use with nodes of limited CPU processing capability, and to guard against Denial-of-Service attacks in which an attacker attempts to cause other nodes to consume excess network bandwidth or processing time, we use efficient one-way hash functions and don't use asymmetric cryptographic operations in the protocol. Proposed algorithm can safely send to data through authentication mechanism and integrity about routing establishment.

Mobile Sink Path Planning in Heterogeneous IoT Sensors: a Salp Swarm Algorithm Scheme

  • Hamidouche, Ranida;Aliouat, Zibouda;Ari, Ado Adamou Abba;Gueroui, Abdelhak
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2225-2239
    • /
    • 2021
  • To assist in data collection, the use of a mobile sink has been widely suggested in the literature. Due to the limited sensor node's storage capacity, this manner to collect data induces huge latencies and drop packets. Their buffers will be overloaded and lead to network congestion. Recently, a new bio-inspired optimization algorithm appeared. Researchers were inspired by the swarming mechanism of salps and thus creating what is called the Salp Swarm Algorithm (SSA). This paper improves the sink mobility to enhance energy dissipation, throughput, and convergence speed by imitating the salp's movement. The new approach, named the Mobile Sink based on Modified Salp Swarm Algorithm (MSSA), is approved in a heterogeneous Wireless Sensor Network (WSN) data collection. The performance of the MSSA protocol is assessed using several iterations. Results demonstrate that our proposal surpass other literature algorithms in terms of lifespan and throughput.

Cluster Group Multicast by Weighted Clustering Algorithm in Mobile Ad-hoc Networks (이동 에드-혹 네트워크에서 조합 가중치 클러스터링 알고리즘에 의한 클러스터 그룹 멀티캐스트)

  • 박양재;이정현
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.3
    • /
    • pp.37-45
    • /
    • 2004
  • In this paper we propose Clustered Group Multicast by Clustering Algorithm in Wireless Mobile Ad-hoc Network. The proposed scheme applies to Weighted Cluster Algorithm Ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or reliable support services such as wired network and base station. In ad hoc network muting protocol because of limited bandwidth and high mobility robust, simple and energy consume minimal. WCGM method uses a base structure founded on combination weighted value and applies combination weight value to cluster header keeping data transmission by seeped flooding, which is the advantage of the exiting FGMP method. Because this method has safe and reliable data transmission, it shows the effect to decrease both overhead to preserve transmission structure and overhead for data transmission.

The Effects of Clinical Application of a Nursing Diagnosis Protocol (간호진단 프로토콜(Protocol)의 임상적용 효과에 관한 연구)

  • 이향련;조미영;조결자;김윤희;김귀분;김광주;문희자;박신애;강현숙
    • Journal of Korean Academy of Nursing
    • /
    • v.19 no.1
    • /
    • pp.40-62
    • /
    • 1989
  • This study was conducted to measure the effects of clinical application of a Nursing Diagnosis Protocol. The dependent variables were the degree of patient's satisfaction and the degree of nurse's satisfaction with the nursing activity. Analysis of the effect of the use of the nursing diagnosis protocol was based on the nursing record. The subjects for this study were 61 nurses(experimental group 31, control group 30) and 155 patients (experimental group 55, control group 100) on four internal medicine wards in K University Hospital in Seoul. Data collection was done from August to October 12,1988. The results obtained in this study can be summarized as follows, 1, Effect of the clinical application of the nursing diagnosis protocol. 1) The first hypothesis ; “nurses who use the nursing diagnosis protocol will have higher degrees of satisfaction than those who use traditional methods” was rejected (t=.54, df=58, p=.59). 2) The second hypothesis ; “patients nursed by nurses using the nursing diagnosis protocol will have higher degrees of satisfaction than those nursed with traditional methods” was supported(t=1.93, df=154, p=.05). 3) The third hypothisis : Major hypothesis ; “the nursing records of the experimental group, who used the nursing diagnosis protocol, will be more detailed than those of the control group” was supported (t=6.40, df=79.90, p=.000). (1) The first subhypothesis ; “The recorded data collection of the experimental group will be more detailed than that of the control group” was rejected (t=1.79, df=118, p=.07). (2) The second subhypothesis ; “The recorded patient's problem statement of the experimental group will be more detailed than that of the control group”, was supported. (3) The third subhypothesis ; “The nursing record of the experimental group will be more convenient for implementation than that of the control group” was supported. 2. Factors related to the nurse's degree of satisfaction with protocol. 1) No general characteristics(age, religion, education level, duty career, present duty career) were related to the nurse's degree of satisfaction. 2) Variables related to the nurse's degree of satisfaction were “satisfaction as a nurse” and “consider nursing as lifelong job” (t=-2.6, df=13.22, p=.02, t=2.41, df=23.85, p=.02). 3. Factors related to the patient's degree of satisfaction. 1) General characteristics related to the patient's degree of satisfaction with nurses using the protocol were age, educational level, and being married.(F=5.17, df=3/153, p=.00, t= -2.39, df=154, p=,01, f=5.91, df=2/153, p=.00) 2) The variables previous hospitalization, duration of hospitalization, the hospital unit presence of a relative, medical insurance, or medical diagnosis were not related to the patient's degree of satisfaction. 1. The experimental group's nursing record was more detailed than the control group's record with regard to the physical and psychological state of the patients. As noted above, the experimental group nurses, who use a nursing diagnosis had protocol were less satisfied than the control group who used traditional methods of the recording, but experimental group patients had a higher degree of satisfaction than the control group patients. The nursing records of experimental group, using the nursing, diagnosis protocol was more detailed than that of the control group. If the nursing diagnosis protocol is used in clinical nursing practice, the quality of nursing care may be improved.

  • PDF

Developing a semi-automatic data conversion tool for Korean ecological data standardization

  • Lee, Hyeonjeong;Jung, Hoseok;Shin, Miyoung;Kwon, Ohseok
    • Journal of Ecology and Environment
    • /
    • v.41 no.3
    • /
    • pp.78-84
    • /
    • 2017
  • Recently, great demands are rising around the globe for monitoring and studying of long-term ecological changes. To go with the stream, many researchers in South Korea have attempted to share and integrate ecological data for practical use. Although some achievements were made in the meantime, we still have to overcome a big obstacle that existing ecological data in South Korea are mostly spread all over the country in various formats of computer files. In this study, we aim to handle the situation by developing a semi-automatic data conversion tool for Korean ecological data standardization, based on some predefined protocols for ecological data collection and management. The current implementation of this tool works on only five species (libythea celtis, spittle bugs, mosquitoes, pinus, and quercus mongolica), helping data managers to quickly and efficiently obtain a standardized format of ecological data from raw collection data. With this tool, the procedure of data conversion is divided into four steps: data file and protocol selection step, species selection step, attribute mapping step, and data standardization step. To find the usability of this tool, we utilized it to conduct the standardization of raw five species data collected from six different observatory sites of Korean National Parks. As a result, we could obtain a common form of standardized data in a relatively short time. With the help of this tool, various ecological data could be easily integrated into the nationwide common platform, providing broad applicability towards solving many issues in ecological and environmental system.