• Title/Summary/Keyword: Mechanism of monitoring

Search Result 664, Processing Time 0.031 seconds

Development of Monitoring Robot with Quadruped Link Mechanism (4족 링크 구조의 감시용 로봇 시스템 개발)

  • 정기범;박병훈;전병준;김동환
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.46-46
    • /
    • 2000
  • A quadruped monitoring robot is introduced. The robot has several features that poses arbitrary position thanks to a 4-wheel hive mechanism, transmits an image and command data via RF wireless communication, and moreover, the imaged date are transferred through a network communication. The robot plays a role in monitoring what is happening around the robot and covers wide range due to a moving camera operated by the 4-wheel mechanism. The robot system can be applied k versatile models based the distinguished techniques introduced in this paper

  • PDF

A Monitoring Method of Movements in Control Rod Drive Mechanism using Wavelet Transform (웨이블릿 변환을 이용한 원자로 제어봉구동장치 동작 감시 방법)

  • Cheon, Jong-Min;Kim, Choon-Kyoung;Park, Min-Kook;Lee, Jong-Moo;Kwon, Soon-Man
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.270-272
    • /
    • 2005
  • In this paper, we proposed a new method detecting actions of some components driven by the coil excitation. Nuclear power reactors are typically controlled by the movement of several neutron-absorbing control rods into or out of the reactor core. For moving control rods, we use an electromagnetic-jack-typed mechanism, which is called Control Rod Drive Mechanism. This mechanism moves control rods by the step composed of sequential actions of components. In case any mechanical problems happen in the mechanism, the orders for the control rod movement from the higher system cannot be performed properly. This abnormal state must be monitored and the sequential actions of the components can be the monitoring target. The actions of components generate some deviations in the profiles of the currents flowing into the coils in the mechanism. We focused on this phenomena and devised a new method of detecting the actions of the components in Control Rod Drive Mechanism by using the wavelet transform for observing the current profile.

  • PDF

Monitoring Robot System with RF and Network Communication (네트워크 및 RF 기반의 감시용 로봇 시스템)

  • Kim, Dong-Hwan;Jeong, Gi-Beom;Hong, Yeong-Ho
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.7 no.9
    • /
    • pp.733-740
    • /
    • 2001
  • A monitoring robot capable of doing network and RF communication is introduced. The robot has several features that poses arbitrary position thanks to a mechanism combining the 4wheel drive and 4 link mechanism, transmits an image and command data via RF wireless communication. Moreover, the image data from the camera are transferred through a network communication. The robot plays a role in monitoring what is happening around the robot, and covers wide range due to a moving camera associated with the 4 arms. The robot can adjust its mass center by the 4 link mechanism, hence it guarantees a stability in moving on the slope.

  • PDF

Transmission Rate-Based Overhead Monitoring for Multimedia Streaming Optimization in Wireless Networks (무선 네트워크상에서 멀티미디어 스트리밍 최적화를 위한 전송율 기반의 오버헤드 모니터링)

  • Lee, Chong-Deuk
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.3
    • /
    • pp.358-366
    • /
    • 2010
  • In the wireless network the congestion and delay occurs mainly when there are too many packets for the network to process or the sender transmits more packets than the receiver can accept. The congestion and delay is the reason of packet loss which degrades the performance of multimedia streaming. This paper proposes a novel transmission rate monitoring-based optimization mechanism to optimize packet loss and to improve QoS. The proposed scheme is based on the trade-off relationship between transmission rate monitoring and overhead monitoring. For this purpose this paper processes a source rate control-based optimization which optimizes congestion and delay. Performance evaluated RED, TFRC, and the proposed mechanism. The simulation results show that the proposed mechanism is more efficient than REC(Random Early Detection) mechanism and TFRC(TCP-friendly Rate Control) mechanism in packet loss rate, throughput rate, and average response rate.

A Study on the Development and the Monitoring of Micro Hole Drilling Machine (미소경 드릴링 머신의 시작과 감시에 관한 연구)

  • 백인환;정우섭
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.18 no.4
    • /
    • pp.62-68
    • /
    • 1994
  • Recently, the trends toward reduction in size and weight of industrial products increased the application of micro hole for manufacturing gadgets of high precision and gave rise to a great deal of interest for micro hole drilling M/C. Quite a few research work is performed on micro drilling on domestic basis compared with the tendency of analyzing cutting mechanism, adaptive control, monitoring of generally available drills of diameter greater than 1mm. This study adresses the design, manufacturing and controlling a micro hole drilling M/C with the overload detection instrument and the step feed mechanism. Controlling and monitoring of the drilling process are acomplished on PC basis for more user interfaces and effectiveness. The test machine of the results of this research shows a good foundation for extending further micro hole machining technique.

  • PDF

A Study on Distributed Self-Reliance Wireless Sensing Mechanism for Supporting Data Transmission over Heterogeneous Wireless Networks

  • Caytiles, Ronnie D.;Park, Byungjoo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.32-38
    • /
    • 2020
  • The deployment of geographically distributed wireless sensors has greatly elevated the capability of monitoring structural health in social-overhead capital (SOC) public infrastructures. This paper deals with the utilization of a distributed mobility management (DMM) approach for the deployment of wireless sensing devices in a structural health monitoring system (SHM). Then, a wireless sensing mechanism utilizing low-energy adaptive clustering hierarchy (LEACH)-based clustering algorithm for smart sensors has been analyzed to support the seamless data transmission of structural health information which is essentially important to guarantee public safety. The clustering of smart sensors will be able to provide real-time monitoring of structural health and a filtering algorithm to boost the transmission of critical information over heterogeneous wireless and mobile networks.

Self-reliant wireless health monitoring based on tuned-mass-damper mechanism

  • Makihara, Kanjuro;Hirai, Hidekazu;Yamamoto, Yuta;Fukunaga, Hisao
    • Smart Structures and Systems
    • /
    • v.15 no.6
    • /
    • pp.1625-1642
    • /
    • 2015
  • We propose an electrically self-reliant structural health monitoring (SHM) system that is able to wirelessly transmit sensing data using electrical power generated by vibration without the need for additional external power sources. The provision of reliable electricity to wireless SHM systems is a highly important issue that has often been ignored, and to expand the applicability of various wireless SHM innovations, it will be necessary to develop comprehensive wireless SHM devices including stable electricity sources. In light of this need, we propose a new, highly efficient vibration-powered generator based on a tuned-mass-damper (TMD) mechanism that is quite suitable for vibration-based SHM. The charging time of the TMD generator is shorter than that of conventional generators based on the impedance matching method, and the proposed TMD generator can harvest 16 times the amount of energy that a conventional generator can. The charging time of an SHM wireless transmitter is quantitatively formulated. We conduct wireless monitoring experiments to validate a wireless SHM system composed of a self-reliant SHM and a vibration-powered TMD generator.

Development and Application of Distributed Multilayer On-line Monitoring System for High Voltage Vacuum Circuit Breaker

  • Mei, Fei;Mei, Jun;Zheng, Jianyong;Wang, Yiping
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.4
    • /
    • pp.813-823
    • /
    • 2013
  • On-line monitoring system is important for high voltage vacuum circuit breakers (HVCBs) in operation condition assessment and fault diagnosis. A distributed multilayer system with client/server architecture is developed on rated voltage 10kV HVCB with spring operating mechanism. It can collect data when HVCB switches, calculate the necessary parameters, show the operation conditions and provide abundant information for fault diagnosis. Ensemble empirical mode decomposition (EEMD) is used to detect the singular point which is regarded as the contact moment. This method has been applied to on-line monitoring system successfully and its satisfactory effect has been proved through experiments. SVM and FCM are both effective methods for fault diagnosis. A combinative algorithm is designed to judge the faults of HVCB's operating mechanism. The system's precision and stability are confirmed by field tests.

A Study on Survivability of Node using Response Mechanism in Active Network Environment (액티브 네트워크 환경에서 대응 메커니즘을 이용한 노드 생존성에 관한 연구)

  • Yang, Jin-Seok;Lee, Ho-Jae;Chang, Beom-Hwan;Kim, Hyoun-Ku;Han, Young-Ju;Chung, Tai-Myoung
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.799-808
    • /
    • 2003
  • Existing security solutions such as Firewell and IDS (Intrusion Detection System) have a trouble in getting accurate detection rate about new attack and can not block interior attack. That is, existing securuty solutions have various shortcomings. Shortcomings of these security solutions can be supplemented with mechanism which guarantees an availability of systems. The mechanism which guarantees the survivability of node is various, we approachintrusion telerance using real time response mechanism. The monitoring code monitors related resources of system for survivability of vulnerable systm continuously. When realted resources exceed threshold, monitoring and response code is deployed to run. These mechanism guarantees the availability of system. We propose control mathod about resource monitoring. The monitoring code operates with this method. The response code may be resident in active node for availability or execute a job when a request is occurred. We suggest the node survivability mechanism that integrates the intrusion tolerance mechanism that complements the problems of existing security solutions. The mechanism takes asvantage of the automated service distribution supported by Active Network infrastructure instead of passive solutions. The mechanism takes advantage of the automated service distribution supported by Active Network infrastructure instead of passive system reconfiguration and patch.

An Anti-Trojan Horse Mechanism with Attached Data from Developers (개발자 첨부 자료에 의한 트로이 목마 대응 기법)

  • Cho, Eun-Sun;Yeh, Hong-Jin;Oh, Se-Chang;Hong, Sun-Ho;Hong, Man-Pyo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.4
    • /
    • pp.220-231
    • /
    • 2002
  • Trojan-horse programs are the programs that disguise normal and useful programs but do malicious thing to the hosts. This paper proposes an anti-Trojan horse mechanism using the information attached to the code by the developers. In this mechanism, each code is accompanied with the information on their possible accesses to resources, and based on this information users determine whether the code is malicious or not. Even in the case a code is accepted by users due to its non-malicious appearance, its runtime behaviors are monitored and halted whenever any attempts to malicious operations are detected. By hiring such runtime monitoring system, this mechanism enables detecting unknown Trojan horses and reduces the decision-making overhead being compared to the previous monitoring-based approaches. We describe the mechanism in a formal way to show the advantages and the limitations of the security this mechanism provides.