• Title/Summary/Keyword: Multi-device environment

Search Result 245, Processing Time 0.03 seconds

Monitoring algal bloom in river using unmanned aerial vehicle(UAV) imagery technique (UAV(Unmanned aerial vehicle)를 활용한 하천 녹조 모니터링 평가)

  • Kim, Eun-Ju;Nam, Sook-Hyun;Koo, Jae-Wuk;Hwang, Tae-Mun
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.32 no.6
    • /
    • pp.573-581
    • /
    • 2018
  • The purpose of this study is to evaluate the fixed wing type domestic UAV for monitoring of algae bloom in aquatic environment. The UAV used in this study is operated automatically in-flight using an automatic navigation device, and flies along a path targeting preconfigured GPS coordinates of desired measurement sites input by a flight path controller. The sensors used in this study were Sequoia multi-spectral cameras. The photographed images were processed using orthomosaics, georeferenced digital surface models, and 3D mapping software such as Pix4D. In this study, NDVI(Normalized distribution vegetation index) was used for estimating the concentration of chlorophyll-a in river. Based on the NDVI analysis, the distribution areas of chlorophyll-a could be analyzed. The UAV image was compared with a airborne image at a similar time and place. UAV images were found to be effective for monitoring of chlorophyll-a in river.

Implementation of Beamforming-based RF Wireless Power Transmission System using PLUTO SDR Platform (PLUTO SDR 플랫폼을 활용한 빔포밍 기반 RF 무선전력전송 테스트베드 구현)

  • Yoo Jung Moon;Changseok Yoon;Sung Sik Nam;Jae-Pil Chung
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.2
    • /
    • pp.221-227
    • /
    • 2023
  • In this paper, by using a multi-PLUTO SDR platform, we implement a beamforming wireless power transmission test bed capable of beam alignment for the receiving end by calculating the location information of the target device (power receiving platform) in a situation where power transmitting and receiving platforms do not know each other's location information. Experiments were conducted in a laboratory environment based on the built test bed, and the experimental results were compared with the simulation results to confirm both whether the testbed was effectively configured and the performance effectiveness of the test bed.

The Scheme for Efficient Key Management for N-Screen Service in Multi Device Environment (N-스크린 서비스가 제공되는 환경에서 효율적인 멀티 디바이스 지원을 위한 키 관리 기법)

  • Kim, Junghoon;Lee, Hoonjung;Kim, Sangjin;Oh, Heekuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.921-924
    • /
    • 2011
  • 단방향 서비스만을 제공하였던 기존의 케이블과 위성 방송은 인터넷을 활용하여 양방향 서비스를 제공하게 되었고, 이로 인해 사용자는 방송 시간에 구애받지 않고 원하는 콘텐츠를 시청할 수 있게 되었다. 현재는 더 나아가 사용자가 원하는 디바이스에서 자유롭게 콘텐츠를 이용할 수 있는 N-스크린 서비스를 제공하기 위한 노력을 기울이고 있다. 기존 방송 시스템에서 유료 콘텐츠를 보호하기 위해 사용한 접근제어 시스템에서는 암호키의 갱신 시간 때문에 사용자 소유가 아닌 디바이스에 일시적인 시청권한을 부여하는 N-스크린 서비스를 제공할 수 없지만 기존 환경에서 키 계층을 늘리는 방법을 통해 이러한 문제를 해결할 수 있다. 하지만 N-스크린 서비스가 제공되는 것은 사용자가 댁내의 TV 뿐만 아니라 다양한 모바일 디바이스를 사용하는 멀티 디바이스 환경을 요구하게 된다. 기존의 접근제어 시스템에서 여러 디바이스를 지원하려면 디바이스의 수 만큼 암호키를 분배하기 위한 메시지를 생성해야 되며, 이로 인해 메시지를 생성하기 위한 시간과 통신 대역폭에 오버헤드가 발생한다. 본 논문에서는 N-스크린 서비스를 제공하기 위해 키 계층을 늘린 접근제어 시스템에서 멀티 디바이스를 효율적으로 지원하기 위한 키 관리 기법을 제안한다.

Development of high performance universal contrller based on multiprocessor (다중처리기를 갖는 고성능 범용제어기의 개발과 여유자유도 로봇 제어에의 응용)

  • Park, J.Y.;Chang, P.H.
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.10 no.4
    • /
    • pp.227-235
    • /
    • 1993
  • In this paper, the development of a high performance flexible controller is described. The hardware of the controller, based on VME-bus, consists of four M68020 single-board computers (32-bit) with M68881 numerical coprocessors, two M68040 single board donputers, I/O devices (such as A/D and D/A converters, paraller I/O, encoder counters), and bus-to-bus adaptor. This software, written in C and based on X-window environment with Unix operating system, includes : text editor, compiler, downloader, and plotter running in a host computer for developing control program ; device drivers, scheduler, and mathemetical routines for the real time control purpose ; message passing, file server, source level debugger virtural terminal, etc. The hardware and software are structured so that the controller might have both flexibility and extensibility. In papallel to the controller, a three degrees of freedom kinematically redundant robot has been developed at the same time. The development of the same time. The development of the robot was undertaken in order to provide, on the one hand, a computationally intensive plant to which to apply the controller, and on the other hand a research tool in the field of kinematically redundant manipulator, which is, as such, an important area. By using the controller, dynamic control of the redundant manipulator was successfully experimented, showing the effectiveness and flexibility of the controller.

  • PDF

The Individual Discrimination Location Tracking Technology for Multimodal Interaction at the Exhibition (전시 공간에서 다중 인터랙션을 위한 개인식별 위치 측위 기술 연구)

  • Jung, Hyun-Chul;Kim, Nam-Jin;Choi, Lee-Kwon
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.2
    • /
    • pp.19-28
    • /
    • 2012
  • After the internet era, we are moving to the ubiquitous society. Nowadays the people are interested in the multimodal interaction technology, which enables audience to naturally interact with the computing environment at the exhibitions such as gallery, museum, and park. Also, there are other attempts to provide additional service based on the location information of the audience, or to improve and deploy interaction between subjects and audience by analyzing the using pattern of the people. In order to provide multimodal interaction service to the audience at the exhibition, it is important to distinguish the individuals and trace their location and route. For the location tracking on the outside, GPS is widely used nowadays. GPS is able to get the real time location of the subjects moving fast, so this is one of the important technologies in the field requiring location tracking service. However, as GPS uses the location tracking method using satellites, the service cannot be used on the inside, because it cannot catch the satellite signal. For this reason, the studies about inside location tracking are going on using very short range communication service such as ZigBee, UWB, RFID, as well as using mobile communication network and wireless lan service. However these technologies have shortcomings in that the audience needs to use additional sensor device and it becomes difficult and expensive as the density of the target area gets higher. In addition, the usual exhibition environment has many obstacles for the network, which makes the performance of the system to fall. Above all these things, the biggest problem is that the interaction method using the devices based on the old technologies cannot provide natural service to the users. Plus the system uses sensor recognition method, so multiple users should equip the devices. Therefore, there is the limitation in the number of the users that can use the system simultaneously. In order to make up for these shortcomings, in this study we suggest a technology that gets the exact location information of the users through the location mapping technology using Wi-Fi and 3d camera of the smartphones. We applied the signal amplitude of access point using wireless lan, to develop inside location tracking system with lower price. AP is cheaper than other devices used in other tracking techniques, and by installing the software to the user's mobile device it can be directly used as the tracking system device. We used the Microsoft Kinect sensor for the 3D Camera. Kinect is equippedwith the function discriminating the depth and human information inside the shooting area. Therefore it is appropriate to extract user's body, vector, and acceleration information with low price. We confirm the location of the audience using the cell ID obtained from the Wi-Fi signal. By using smartphones as the basic device for the location service, we solve the problems of additional tagging device and provide environment that multiple users can get the interaction service simultaneously. 3d cameras located at each cell areas get the exact location and status information of the users. The 3d cameras are connected to the Camera Client, calculate the mapping information aligned to each cells, get the exact information of the users, and get the status and pattern information of the audience. The location mapping technique of Camera Client decreases the error rate that occurs on the inside location service, increases accuracy of individual discrimination in the area through the individual discrimination based on body information, and establishes the foundation of the multimodal interaction technology at the exhibition. Calculated data and information enables the users to get the appropriate interaction service through the main server.

A Research of LEACH Protocol improved Mobility and Connectivity on WSN using Feature of AOMDV and Vibration Sensor (AOMDV의 특성과 진동 센서를 적용한 이동성과 연결성이 개선된 WSN용 LEACH 프로토콜 연구)

  • Lee, Yang-Min;Won, Joon-We;Cha, Mi-Yang;Lee, Jae-Kee
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.167-178
    • /
    • 2011
  • As the growth of ubiquitous services, various types of ad hoc networks have emerged. In particular, wireless sensor networks (WSN) and mobile ad hoc networks (MANET) are widely known ad hoc networks, but there are also other kinds of wireless ad hoc networks in which the characteristics of the aforementioned two network types are mixed together. This paper proposes a variant of the Low Energy Adaptive Cluster Hierarchy (LEACH) routing protocol modified to be suitable in such a combined network environment. That is, the proposed routing protocol provides node detection and route discovery/maintenance in a network with a large number of mobile sensor nodes, while preserving node mobility, network connectivity, and energy efficiency. The proposed routing protocol is implemented with a multi-hop multi-path algorithm, a topology reconfiguration technique using node movement estimation and vibration sensors, and an efficient path selection and data transmission technique for a great many moving nodes. In the experiments, the performance of the proposed protocol is demonstrated by comparing it to the conventional LEACH protocol.

A Study on the Source Profile Development for Fine Particles (PM2.5) Emitted from Biomass Burning (Biomass-burning에서 배출되는 미세입자 (PM2.5)의 배출원 구성물질 성분비 개발에 관한 연구)

  • Kang, Byung-Wook;Lee, Hak-Sung
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.28 no.4
    • /
    • pp.384-395
    • /
    • 2012
  • This study was performed to develop the source profiles for fine particles ($PM_{2.5}$) emitted from the biomass burning. The multi-method research strategy included a usage of combustion devices such as field burning, fireplace, and residential wood burning to burn rice straw, fallen leaves, pine tree, and oak tree. The data were collected from multiple sources and measured water-soluble ions, elements, elemental carbon (EC), and organic carbon (OC). From this study, it turned out that OC (34~67%) and EC (1.2~39%) are the major components emitted from biomass burning. In the case of burning rice straw at field burning, OC (66.6%) was the most abundant species, followed by EC (4.3%), $Cl^-$ (3.6%), Cl (2.1%), and $SO^{2-}_4$(1.9%). Burning rice straw, fallen leaves, pine tree, and oak tree at fireplace, the amount of OC was 58.5%, 52.7%, 52.5%, and 61.2%, and that of EC was 1.2%, 18.4%, 36.5%, and 2.7%, respectively. The ratio of OC for the burning of pine tree and oak tree from the residential wood burning device was 56.9% and 34.3%, and that of EC was 25% and 38.6%, respectively. Applying the measured data with respect to the proportion of components emitted from biomass burning to reference model, it turned out that self-diagnosed result was appropriate level, and the result based on the model is in highly corresponding to actual timing of biomass burning.

Indoor air quality and ventilation requirement in residential buildings: A case study of Tehran, Iran

  • Ataei, Abtin;Nowrouzi, Ali;Choi, Jun-Ki
    • Advances in environmental research
    • /
    • v.4 no.3
    • /
    • pp.143-153
    • /
    • 2015
  • The ventilation system is a key device to ensure both healthful indoor air quality (IAQ) and thermal comfort in buildings. The ventilation system should make the IAQ meet the standards such as ASHRAE 62. This study deals with a new approach to modeling the ventilation and IAQ requirement in residential buildings. In that approach, Elite software is used to calculate the air supply volume, and CONTAM model as a multi-zone and contaminant dispersal model is employed to estimate the contaminants' concentrations. Amongst various contaminants existing in the residential buildings, two main contaminates of carbon dioxide ($CO_2$) and carbon monoxide (CO) were considered. CO and $CO_2$ are generated mainly from combustion sources such as gas cooking and heating oven. In addition to the mentioned sources, $CO_2$ is generated from occupants' respirations. To show how that approach works, a sample house with the area of $80m^2$ located in Tehran was considered as an illustrative case study. The results showed that $CO_2$ concentration in the winter was higher than the acceptable level. Therefore, the air change rate (ACH) of 4.2 was required to lower the $CO_2$ concentration below the air quality threshold in the living room, and in the bedrooms, the rate of ventilation volume should be 11.2 ACH.

Performance Analysis of LED-ID Communication Systems In an Indoor Environment (실내 환경에서의 LED-ID 통신 시스템의 성능 분석)

  • Choi, Jae-Hyuck;Kim, Yoon-Hyun;Kim, Jin-Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.4
    • /
    • pp.43-51
    • /
    • 2010
  • In this paper, we studied line coding technology tendency for high speed data communication at LED-ID (Identification) communication system in indoor environment. A LED-ID technology is a communication using visible ray (RGB) that come out in LED device. It is energy curtailment effect and possible in ubiquitous network service applications. The LED-ID system has the above advantages about that the communication throughout the whole room is enabled by high power lighting and lighting equipment with white colored LED which are easy to install and have good outward appearance. Therefore, the transmission by light waves is more suitable for wireless networks than by radio waves. We compared with the NRZ, AMI, 4B5B, HDB3, 8B10B line coding for efficient in error detection and serves data transmission of high speed.

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud

  • Song, Eun-Ha;Kim, Hyun-Woo;Jeong, Young-Sik
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.347-358
    • /
    • 2012
  • Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is exposed to a lot of risks and the security of its spaces where data is stored is vulnerable. Accordingly, in order to reduce threat factors to security, the TCG proposed a highly reliable platform based on a semiconductor-chip, the TPM. However, there have been no technologies up to date that enables a real-time visual monitoring of the security status of a PC that is operated based on the TPM. And the TPB has provided the function in a visual method to monitor system status and resources only for the system behavior of a single host. Therefore, this paper will propose a m-TMS (Mobile Trusted Monitoring System) that monitors the trusted state of a computing environment in which a TPM chip-based TPB is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. The m-TMS is provided to users so that system resources of CPU, RAM, and process, which are the monitoring objects in a computer system, may be monitored. Moreover, converting and detouring single entities like a PC or target addresses, which are attack pattern methods that pose a threat to the computer system security, are combined. The branch instruction trace function is monitored using a BiT Profiling tool through which processes attacked or those suspected of being attacked may be traced, thereby enabling users to actively respond.