• Title/Summary/Keyword: real-time industrial network

Search Result 329, Processing Time 0.03 seconds

An Experimental Performance Evaluation with Xenomai for WSN (WSN을 위한 Xenomai의 실험적 성능평가)

  • Son, Tae-Yeong;Rim, Seong-Rak
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.1
    • /
    • pp.709-714
    • /
    • 2017
  • Structures like bridges or buildings need to be checked continuously to diagnose their safety. However, it is extremely difficult for the people who access such structures to check all areas directly. To overcome this problem, there is a lot of active research into structural health monitoring (SHM) with wireless sensor nodes (WSNs). In this paper, for more accurate checking of SHM with WSNs, we experimentally compare and evaluate the performance of Xenomai, which provides real-time processing under the traditional Linux kernel. For this purpose, we patch Xenomai into the traditional Linux kernel of a commercial embedded board, Raspberry Pi, and implement a task that periodically reads vibration data of the z-axis from an accelerometer in order to analyze the natural frequency of cantilever beams. Reading the data from the traditional Linux kernel with the same method, we analyze the natural frequency of the cantilever beams using Smart Office Analyzer. Finally, to review the validity of Xenomai for WSNs, we obtain vibration data on the z-axis from the accelerometer via wired network and compared and analyzed them the same way.

A Study on an Impedance Matching Technique for Rail Power Line Communication (레일 전력선통신을 위한 임피던스 정합방안 연구)

  • Seo, Ill-Kwon;Ahn, Seung-Ho;Kim, Chul-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.202-207
    • /
    • 2016
  • An auxiliary real-time train communications system among drivers, train-traffic controllers and field workers is necessary to share hazard information (i.e. rockfall detection, track maintenance) in low visibility zones (long tunnels and steep curved track). To develop the appropriate communication system, this paper proposes a new way of power line communication using the rail track (Rail - PLC), which has little noise and distortion of attenuation. Therefore, it is important to measure the impedance of the rail and to apply an impedance matching technique to increase the transmission characteristic of the Rail - PLC. This study would evaluate the reflection and the transmission characteristics of the rail using a network analyzer and an impedance matching transformer. The suitable impedance matching ratio was 1:3.28 from the result of back-to-back testing. The results confirmed that the transformer can improve the performance of the transmission signal in Rail - PLC using an impedance matching technique.

A Study on Social Media Market Competition based on User Gratification (이용자의 충족에 따른 소셜미디어 시장 내 경쟁관계에 관한 연구)

  • Huang, Yunchu;Baek, Heon;Yang, Chang-Gyu
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.2
    • /
    • pp.105-117
    • /
    • 2014
  • The change of social media market toward multimedia environment makes users select social media according to preference factor's gratification and this also causes competition among various social medias. So this study focused on competition among social media from the perspective of users' gratification while considering multimedia environment of social media market. The widely known Niche theory is used to confirm competitions among media in an environment with limited resource. According to research result, (1) Facebook and Kakao Talk mostly satisfies users' expectations; (2) Facebook and Kakao Talk form leading group and Blog, Youtube and Twitter form chasing group in this competition; (3) Kakao Talk greatly satisfies users' various expectations. The research result implies that, for social media to have competitive advantage in the market, it is better to provide convenience and real-time responsiveness in mobile environment and to improve service so that users could more easily utilize network.

A study of data harvest in distributed sensor networks (분산 센서 네트워크에서 데이터 수집에 대한 연구)

  • Park, Sangjoon;Lee, Jongchan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.5
    • /
    • pp.3421-3425
    • /
    • 2015
  • In sensor networks, sensor nodes are usually distributed to manage the networks in continuous unique area, however as by the network property nodes can be located in several areas. The data gathering of distributed nodes to several areas can be different with current continuous area. Hence, the distributed networks can be differently managed to the current continuous networks. In this paper, we describe the data gathering of sensor nodes in distributed sensor areas. It is possible that sensor nodes cannot instantly connect the mobile sink, and the node operation should be considered. The real time data sending to the instant connection scheme of mobile sink can be implemented, but the property of mobile sink should be considered for the sink connection of distributed areas. In this paper, we analyze the proposed scheme by the simulation results. The simulation results show that the overall lifetime to the periodic data gathering method is longer than the threshold method.

Implementation Plan of Integrated Medical Information System for Ubiquitous Healthcare Service (U-Healthcare 서비스를 위한 통합의료정보시스템의 구축방안)

  • Jung, Yong-Sik
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.2
    • /
    • pp.115-126
    • /
    • 2010
  • Modern society can be described as ubiquitous computing over the concept of information. Information technology(IT) has been developing in a way that relative technologies are integrated to each other. Especially in ubiquitous environment, medical information industry shows significant interest in the U-healthcare service area. This paper will first look into U-healthcare service environment and component of Integrated Medical Information Systems(IMIS). Secondly, it examines the basic technological factors for integrated medical information systems, which is datawarehouse, network, communication standards and technology related U-healthcare service. Finally it proposes how to implement and operate new integrated medical information system for ubiquitous health care service. The system will do point of care(POC) for customers by real time and diagnose them using their various and personal medical data. The information will be communicated back to the customers, which will improve their satisfaction.

A Study on the Establishment of Comparison System between the Statement of Military Reports and Related Laws (군(軍) 보고서 등장 문장과 관련 법령 간 비교 시스템 구축 방안 연구)

  • Jung, Jiin;Kim, Mintae;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.109-125
    • /
    • 2020
  • The Ministry of National Defense is pushing for the Defense Acquisition Program to build strong defense capabilities, and it spends more than 10 trillion won annually on defense improvement. As the Defense Acquisition Program is directly related to the security of the nation as well as the lives and property of the people, it must be carried out very transparently and efficiently by experts. However, the excessive diversification of laws and regulations related to the Defense Acquisition Program has made it challenging for many working-level officials to carry out the Defense Acquisition Program smoothly. It is even known that many people realize that there are related regulations that they were unaware of until they push ahead with their work. In addition, the statutory statements related to the Defense Acquisition Program have the tendency to cause serious issues even if only a single expression is wrong within the sentence. Despite this, efforts to establish a sentence comparison system to correct this issue in real time have been minimal. Therefore, this paper tries to propose a "Comparison System between the Statement of Military Reports and Related Laws" implementation plan that uses the Siamese Network-based artificial neural network, a model in the field of natural language processing (NLP), to observe the similarity between sentences that are likely to appear in the Defense Acquisition Program related documents and those from related statutory provisions to determine and classify the risk of illegality and to make users aware of the consequences. Various artificial neural network models (Bi-LSTM, Self-Attention, D_Bi-LSTM) were studied using 3,442 pairs of "Original Sentence"(described in actual statutes) and "Edited Sentence"(edited sentences derived from "Original Sentence"). Among many Defense Acquisition Program related statutes, DEFENSE ACQUISITION PROGRAM ACT, ENFORCEMENT RULE OF THE DEFENSE ACQUISITION PROGRAM ACT, and ENFORCEMENT DECREE OF THE DEFENSE ACQUISITION PROGRAM ACT were selected. Furthermore, "Original Sentence" has the 83 provisions that actually appear in the Act. "Original Sentence" has the main 83 clauses most accessible to working-level officials in their work. "Edited Sentence" is comprised of 30 to 50 similar sentences that are likely to appear modified in the county report for each clause("Original Sentence"). During the creation of the edited sentences, the original sentences were modified using 12 certain rules, and these sentences were produced in proportion to the number of such rules, as it was the case for the original sentences. After conducting 1 : 1 sentence similarity performance evaluation experiments, it was possible to classify each "Edited Sentence" as legal or illegal with considerable accuracy. In addition, the "Edited Sentence" dataset used to train the neural network models contains a variety of actual statutory statements("Original Sentence"), which are characterized by the 12 rules. On the other hand, the models are not able to effectively classify other sentences, which appear in actual military reports, when only the "Original Sentence" and "Edited Sentence" dataset have been fed to them. The dataset is not ample enough for the model to recognize other incoming new sentences. Hence, the performance of the model was reassessed by writing an additional 120 new sentences that have better resemblance to those in the actual military report and still have association with the original sentences. Thereafter, we were able to check that the models' performances surpassed a certain level even when they were trained merely with "Original Sentence" and "Edited Sentence" data. If sufficient model learning is achieved through the improvement and expansion of the full set of learning data with the addition of the actual report appearance sentences, the models will be able to better classify other sentences coming from military reports as legal or illegal. Based on the experimental results, this study confirms the possibility and value of building "Real-Time Automated Comparison System Between Military Documents and Related Laws". The research conducted in this experiment can verify which specific clause, of several that appear in related law clause is most similar to the sentence that appears in the Defense Acquisition Program-related military reports. This helps determine whether the contents in the military report sentences are at the risk of illegality when they are compared with those in the law clauses.

Conceptual Design of PLS-II Control System for PLS (가속기 제어시스템의 성능향상을 위한 연구)

  • Yoon, J.C.;Lee, J.W.;Lee, E.H.;Ha, H.G.;Kim, J.M.;Park, S.J.;Kim, K.R.
    • Proceedings of the KIEE Conference
    • /
    • 2009.07a
    • /
    • pp.1658_1659
    • /
    • 2009
  • PLS(Pohang Light Source) will begin the PLS-II project that has been funded by the KOREA Government in order to further upgrade the PLS which has operated since 1992. The control system of the PLS-II has distributed control architecture, with two layers of hierarchy; operator interface computer (OIC) layer and machine interface computer (MIC) layer. The OIC layer is based on SUN workstation with UNIX. A number of PC-based consoles allow to remotely operating the machine from the control room. PC-based consoles use the Linux or Windows operation system. Similar consoles in the experimental hall are used to control experiments. The MIC layer is directly interfaced to individual machine devices for low-level data acquisition and control. MIC layer is based on VMEbus standard with vxWorks real-time operating system. Executable application software modules are downloaded from host computers at the system start-up time. The MIC's and host computers are linked through Ethernet network. It should enable the use of hardware and software already developed for specific light source requirements. The core of the EPICS (Experimental Physics and Industrial Control System)[1] has been chosen as the basis for the control system software.

  • PDF

Low Power Security Architecture for the Internet of Things (사물인터넷을 위한 저전력 보안 아키텍쳐)

  • Yun, Sun-woo;Park, Na-eun;Lee, Il-gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.199-201
    • /
    • 2021
  • The Internet of Things (IoT) is a technology that can organically connect people and things without time and space constraints by using communication network technology and sensors, and transmit and receive data in real time. The IoT used in all industrial fields has limitations in terms of storage allocation, such as device size, memory capacity, and data transmission performance, so it is important to manage power consumption to effectively utilize the limited battery capacity. In the prior research, there is a problem in that security is deteriorated instead of improving power efficiency by lightening the security algorithm of the encryption module. In this study, we proposes a low-power security architecture that can utilize high-performance security algorithms in the IoT environment. This can provide high security and power efficiency by using relatively complex security modules in low-power environments by executing security modules only when threat detection is required based on inspection results.

  • PDF

Fruit price prediction study using artificial intelligence (인공지능을 이용한 과일 가격 예측 모델 연구)

  • Im, Jin-mo;Kim, Weol-Youg;Byoun, Woo-Jin;Shin, Seung-Jung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.2
    • /
    • pp.197-204
    • /
    • 2018
  • One of the hottest issues in our 21st century is AI. Just as the automation of manual labor has been achieved through the Industrial Revolution in the agricultural society, the intelligence information society has come through the SW Revolution in the information society. With the advent of Google 'Alpha Go', the computer has learned and predicted its own machine learning, and now the time has come for the computer to surpass the human, even to the world of Baduk, in other words, the computer. Machine learning ML (machine learning) is a field of artificial intelligence. Machine learning ML (machine learning) is a field of artificial intelligence, which means that AI technology is developed to allow the computer to learn by itself. The time has come when computers are beyond human beings. Many companies use machine learning, for example, to keep learning images on Facebook, and then telling them who they are. We also used a neural network to build an efficient energy usage model for Google's data center optimization. As another example, Microsoft's real-time interpretation model is a more sophisticated translation model as the language-related input data increases through translation learning. As machine learning has been increasingly used in many fields, we have to jump into the AI industry to move forward in our 21st century society.

A Study on Reliable Multicast Transmission using Recovery Cluster (복구 클러스터를 이용한 신뢰성 있는 멀티캐스트 전송에 관한 연구)

  • Gu, Myeong-Mo;Kim, Bong-Gi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.11
    • /
    • pp.1-6
    • /
    • 2019
  • Multicast is an efficient method for real-time transmission in many multimedia applications. It is important to recover lost packets and to manage multicast groups according to the network status in order to improve the reliability of multicast transmissions. In this paper, we propose a method that can efficiently recover lost packets in a large multicast group. In the proposed method, we create a recovery cluster (RC) using a multicast domain (MD) for recovery of lost packets. In the conventional methods, clusters send a request message for lost packets to the senders in order to recover the packets lost from many multicast applications. This increases packet delay time and overhead because of the feedback messages and retransmitted packets. In the proposed method, we improve these problems using the RC, which consists of many MDs (which have overlay multicast senders), and many cluster heads (CHs). We divide the message into blocks, and divide each block into many segments for packet recovery using the CHs. When packet loss occurs, all CHs share the segment information and recover the lost segments at the same time. Simulation results show that the proposed method could improve the packet recovery ratio by about 50% compared to the conventional methods.