• Title/Summary/Keyword: sensor deployment

Search Result 238, Processing Time 0.026 seconds

Methods on Kubernetes-based deployment of IoMT software (IoMT 소프트웨어 배포 및 관리를 위한 Kubernetes 적용 기법)

  • Kum, Seungwoo;Kim, Youngkee;Yu, Miseon;Moon, Jaewon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2020.07a
    • /
    • pp.528-529
    • /
    • 2020
  • IoMT 표준은 미디어 관련 분석 기술에 대한 IoT 기술의 적용을 통하여 IoT 기반 프로토콜로 미디어 분석 기술에 대한 제어 및 IoT 기기간 연동을 제어할 수 있는 기술로써 ISO/IEC SC29 산하에서 이루어지고 있는 표준 기술이다. 2019년 국제 표준의 도출을 통하여 각종 미디어 관련 제어 기술을 분석 (Analyze), 입력 (Sensor), 표현 (Actuator), 저장 (Storage) 등의 기기 분류를 통하여 표준화하고 있으며, 다양한 유즈케이스에 대응하는 영상 분석 기술에 대한 인터페이스가 도출된 바 있다. 본 논문은 이러한 인터페이스를 가지는 IoMT 기술에 대하여 서비스를 구성 및 배포 관리하기 위한 기법을 제안한다. IoMT 기기 혹은 서비스를 조합하여 영상 입력으로부터 최종 결과까지의 서비스를 구성하기 위해서는 각각의 IoMT 기기에 대한 설정 및 기기, 서비스간 연결의 설정이 요구된다. 다만 IoMT 표준은 각 IoMT 서비스 기기에 대한 인터페이스만을 정의하고 있어 이러한 기기 및 서비스간 연결에 대한 구성이 포함되어 있지 않으며, 본 논문에서 제시하는 방법은 클라우드에서 사용되고 있는 자원 관리 및 배포 기술인 Kubernetes를 통하여 IoMT 기기들간의 연결을 설정하고 최종 서비스를 구성하는 방법을 포함한다.

  • PDF

A Mobile Application for Navigating the Optimal Escape Route in Accidents and Emergency Situations (모바일 어플리케이션을 이용한 재난상황 발생 시 최적 대피경로 설정)

  • Cho, Sung Hyun;Joo, Ki Don;Kang, Hoon;Park, Kyo Shik;Shin, Dong Il
    • Korean Journal of Hazardous Materials
    • /
    • v.3 no.1
    • /
    • pp.28-36
    • /
    • 2015
  • In early 2011, the Fukushima nuclear power plant had greater damage due to earthquake in Japan, and the awareness of safety has increased. In particular, special response systems should be required to handle disaster situations in plant sites which are likely to occur for large disasters. In this study, a program is designed to set up optimum escape routes, by a smart phone application, when a disaster situation occurs. This program could get information of the cumulative damage from sensors and display the escape route of the smallest damage in real-time on the screen. Utilizing our application in real-time evacuation has advantage in reducing cumulative damage. The optimal evacuation route, focusing on horizontal path, is calculated based on getting the data of fire, detected radioactivity and hazardous gas. Thus, using our application provides information of optimal evacuation to people who even can not hear sensor alarms or do not know geography, without requiring additional costs except fixed sensors or server network deployment cost. As a result, being informed of real-time escape route, the user could behave rapidly with suitable response to individual situation resulting in improved evacuation than simply reacting to existing warning alarms.

Optimizing Laser Scanner Selection and Installation through 3D Simulation-Based Planning - Focusing on Displacement Measurements of Retaining Wall Structures in Small-scale Buildings -

  • Lee, Gil-yong;Kim, Jun-Sang;Yoou, Geon hee;Kim, Young Suk
    • Korean Journal of Construction Engineering and Management
    • /
    • v.25 no.3
    • /
    • pp.68-82
    • /
    • 2024
  • The planning stage of laser scanning is crucial for acquiring high-quality 3D source data. It involves assessing the target space's environment and formulating an effective measurement strategy. However, existing practices often overlook on-site conditions, with decisions on scanner deployment and scanning locations relying heavily on the operators' experience. This approach has resulted in frequent modifications to scanning locations and diminished 3D data quality. Previous research has explored the selection of optimal scanner locations and conducted preliminary reviews through simulation, but these methods have significant drawbacks. They fail to consider scanner inaccuracies, do not support the use of multiple scanners, rely on less accurate 2D drawings, and require specialized knowledge in 3D modeling and programming. This study introduces an optimization technique for laser scanning planning using 3D simulation to address these issues. By evaluating the accuracy of scan data from various laser scanners and their positioning for scanning a retaining wall structure in a small-scale building, this method aids in refining the laser scanning plan. It enhances the decision-making process for end-users by ensuring data quality and reducing the need for plan adjustments during the planning phase.

Slot-Time Optimization Scheme for Underwater Acoustic Sensor Networks (수중음향 센서네트워크를 위한 슬롯시간 최적화 기법)

  • Lee, Dongwon;Kim, Sunmyeng;Lee, Hae-Yeoun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.4
    • /
    • pp.351-361
    • /
    • 2014
  • Compared to a terrestrial communication, the high BER(Bit Error Ratio) and low channel bandwidth are the major factor of throughput degradation due to characteristics of underwater channel. Therefore, a MAC protocol must be designed to solve this problem in UWASNs(Underwater Acoustic Sensor Networks). MAC protocols for UWASNs can be classified into two major types according to the contention scheme(Contention-free scheme and Contention-based scheme). In large scale of sensor networks, a Contention-based scheme is commonly used due to time-synchronize problem of Contention-free scheme. In the contention-based scheme, Each node contends with neighbor nodes to access network channel by using Back-off algorithm. But a Slot-Time of Back-off algorithm has long delay times which are cause of decrease network throughput. In this paper, we propose a new scheme to solve this problem. The proposed scheme uses variable Slot-Time instead of fixed Slot-Time. Each node measures propagation delay from neighbors which are used by Slot-time. Therefore, Slot-Times of each node are optimized by considering node deployment. Consequently, the wasted-time for Back-off is reduced and network throughput is improved. A new mac protocol performance in throughput and delay is assessed through NS3 and compared with existing MAC protocol(MACA-U). Finally, it was proved that the MAC protocol using the proposed scheme has better performance than existing MAC protocol as a result of comparison.

Distributed Key Management Using Regression Model for Hierarchical Mobile Sensor Networks (계층적인 이동 센서 네트워크에서 회귀모델을 이용한 분산 키 관리)

  • Kim Mi-Hui;Chae Ki-Joon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.1-13
    • /
    • 2006
  • In this paper, we introduce a novel key management scheme that is based on the key pre-distribution but provides the key re-distribution method, in order to manage keys for message encryption and authentication of lower-layer sensor nodes on hierarchical mobile sensor networks. The characteristics of our key management are as follows: First, the role of key management is distributed to aggregator nodes as well as a sink node, to overcome the weakness of centralized management. Second, a sink node generates keys using regression model, thus it stores only the information for calculating the keys using the key information received from nodes, but does not store the relationship between a node and a key, and the keys themselves. As the disadvantage of existing key pre-distributions, they do not support the key re-distribution after the deployment of nodes, and it is hard to extend the key information in the case that sensor nodes in the network enlarge. Thirdly, our mechanism provides the resilience to node capture(${\lambda}$-security), also provided by the existing key pre-distributions, and fourth offers the key freshness through key re-distribution, key distribution to mobile nodes, and scalability to make up for the weak points in the existing key pre-distributions. Fifth, our mechanism does not fix the relationship between a node and a key, thus supports the anonymity and untraceability of mobile nodes. Lastly, we compare ours with existing mechanisms, and verify our performance through the overhead analysis of communication, computation, and memory.

A Centralized Deployment Protocol with Sufficient Coverage and Connectivity Guarantee for WSNs (무선 센서 네트워크에서 유효 커버리지 및 접속성 보장을 위한 중앙 집중형 배치 프로토콜)

  • Kim, Hyun-Tae;Zhang, Gui-Ping;Kim, Hyoung-Jin;Joo, Young-Hoon;Ra, In-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.6
    • /
    • pp.683-690
    • /
    • 2006
  • Reducing power consumption to extend network lifetime is one of the most important challenges in designing wireless sensor networks. One promising approach to conserving system energy is to keep only a minimal number of sensors active and put others into low-powered sleep mode, while the active sensors can maintain a connected covet set for the target area. The problem of computing such minimum working sensor set is NP-hard. In this paper, a centralized Voronoi tessellation (CVT) based approximate algorithm is proposed to construct the near optimal cover set. When sensor's communication radius is at least twice of its sensing radius, the covet set is connected at the same time; In case of sensor's communication radius is smaller than twice of its sensing radius, a connection scheme is proposed to calculate the assistant nodes needed for constructing the connectivity of the cover set. Finally, the performance of the proposed algorithm is evaluated through theoretical analysis and extensive numerical experiments. Experimental results show that the proposed algorithm outperforms the greedy algorithm in terms of the runtime and the size of the constructed connected cover set.

Experimental Design of AODV Routing Protocol with Maximum Life Time (최대 수명을 갖는 AODV 라우팅 프로토콜 실험 설계)

  • Kim, Yong-Gil;Moon, Kyung-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.29-45
    • /
    • 2017
  • Ad hoc sensor network is characterized by decentralized structure and ad hoc deployment. Sensor networks have all basic features of ad hoc network except different degrees such as lower mobility and more stringent energy requirements. Existing protocols provide different tradeoffs among some desirable characteristics such as fault tolerance, distributed computation, robustness, scalability and reliability. wireless protocols suggested so far are very limited, generally focusing on communication to a single base station or on aggregating sensor data. The main reason having such restrictions is due to maximum lifetime to maintain network activities. The network lifetime is an important design metric in ad hoc networks. Since every node does a router role, it is not possible for other nodes to communicate with each other if some nodes do not work due to energy lack. In this paper, we suggest an experimental ad-hoc on-demand distance vector routing protocol to optimize the communication of energy of the network nodes.The load distribution avoids the choice of exhausted nodes at the route selection phase, thus balances the use of energy among nodes and maximizing the network lifetime. In transmission control phase, there is a balance between the choice of a high transmission power that lead to increase in the range of signal transmission thus reducing the number of hops and lower power levels that reduces the interference on the expense of network connectivity.

Fixed node reduction technique using relative coordinate estimation algorithm (상대좌표 추정 알고리즘을 이용한 고정노드 저감기법)

  • Cho, Hyun-Jong;Kim, Jong-Su;Lee, Sung-Geun;Kim, Jeong-Woo;Seo, Dong-Hoan
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.37 no.2
    • /
    • pp.220-226
    • /
    • 2013
  • Recently, with the rapid development of factory automation and logistics system, a few workers were able to manage the broad workplace such as large vessels and warehouse. To estimate the exact location of these workers in the conventional wireless indoor localization systems, three or more fixed nodes are generally used to recognize the location of a mobile node consisting of a single node. However, these methods are inefficient in terms of node deployment because the broad workplace requires a lot of fixed nodes compared to workers(mobile nodes). Therefore, to efficiently deploy fixed nodes in these environments that need a few workers, this paper presents a novel estimation algorithm which can reduce the number of fixed nodes by efficiently recognizing the relative coordinates of two fixed nodes through a mobile node composed of three nodes. Also, to minimize the distance errors between mobile node and fixed node, rounding estimation(RE) technique is proposed. Experimental results show that the error rate of localization is improved, by using proposed RE technique, 90.9% compared to conventional trilateration in the free space. In addition, despite the number of fixed nodes can be reduced by up to 50% in the indoor free space, the proposed estimation algorithm recognizes precise location which has average error of 0.15m.

Weld Quality Monitoring System Development Applying A design Optimization Approach Collaborating QFD and Risk Management Methods (품질 기능 전개법과 위험 부담 관리법을 조합한 설계 최적화 기법의 용접 품질 감시 시스템 개발 응용)

  • Son, Joong-Soo;Park, Young-Won
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.6 no.2
    • /
    • pp.207-216
    • /
    • 2000
  • This paper introduces an effective system design method to develop a customer oriented product using a design optimization process and to select a set of critical design paramenters,. The process results in the development of a successful product satisfying customer needs and reducing development risk. The proposed scheme adopted a five step QFD(Quality Function Deployment) in order to extract design parameters from customer needs and evaluated their priority using risk factors for extracted design parameters. In this process we determine critical design parameters and allocate them to subsystem designers. Subsequently design engineers develop and test the product based on these parameters. These design parameters capture the characteristics of customer needs in terms of performance cost and schedule in the process of QFD, The subsequent risk management task ensures the minimum risk approach in the presence of design parameter uncertainty. An application of this approach was demonstrated in the development of weld quality monitoring system. Dominant design parameters affect linearity characteristics of weld defect feature vectors. Therefore it simplifies the algorithm for adopting pattern classification of feature vectors and improves the accuracy of recognition rate of weld defect and the real time response of the defect detection in the performance. Additionally the development cost decreases by using DSP board for low speed because of reducing CPU's load adopting algorithm in classifying weld defects. It also reduces the cost by using the single sensor to measure weld defects. Furthermore the synergy effect derived from the critical design parameters improves the detection rate of weld defects by 15% when compared with the implementation using the non-critical design parameters. It also result in 30% saving in development cost./ The overall results are close to 95% customer level showing the effectiveness of the proposed development approach.

  • PDF

Simulation Study of Energy-efficient Routing Algorithm in Hierarchical WSN Environments (계층적 구조의 WSN 환경에서 에너지 효율적인 라우팅 알고리즘의 시뮬레이션 연구)

  • Kang, Moon-Kyoung;Jin, Kyo-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.8
    • /
    • pp.1729-1735
    • /
    • 2009
  • The hierarchical routing could cause a lot of energy consumption for transferring data by assigning hierarchical routes although actual nodes could be located in physically near spots. Also, when Node Failure or Association Error occurs, the Hierarchical routing could waste more energy to deliver the control messages. This paper evaluate performance of SHP(Shortest Hop Routing) algorithm that suggests short-cut routing algorithm using NL(Neighbor List) and Redirect_ACK message to improve problem of hierarchical routing algorithm. We do a computer simulation by the size of network, deployment of sensor nodes, sink position and POS. As a result of simulation, SHP has better performance than Zigbee Hierarchical routing and HiLow.