• Title/Summary/Keyword: 무선통신장치

Search Result 839, Processing Time 0.034 seconds

The 4-channel Multiple Contact Resistance Measurement Systems using MQTT Broker Server for AC 22.9 kV COS/Lightning Arrester (MQTT 브로커 서버를 이용한 AC 22.9 kV 차단기/피뢰기의 4-채널 다중 접촉저항 측정 시스템)

  • Ra-Yun Boo;Jung-Hun Choi;Myung-Eui Lee
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.2
    • /
    • pp.203-208
    • /
    • 2023
  • In this study, we propose a method to improve the precision of contact resistance measurement circuits using constant current method and voltage drop method, and implement a dashboard that monitors the measured data of contact resistance measurement systems through MQTT broker server. The contact resistance measurement system measures the resistance value and transmits the measured value to the MQTT broker server using wireless communications. This developed dashboard uses Node-RED and Node-RED-Dashboard to receive the resistance values of up to four contact resistance measurement systems and show them to user's monitor screen. Users can manage multiple measurement data using a single dashboard and easily interface with other devices through the MQTT broker server. Through the experimental results from real data measurements, the relative standard deviation about precision is improved to average 40.37% and maximum 64.73% respectively.

A Study on Data Acquisition in the Invisible Zone of UAV through LTE Remote Control (LTE 원격관제를 통한 UAV의 비가시권 데이터 취득방안)

  • Jeong, HoHyun;Lee, Jaehee;Park, Seongjin
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.6_1
    • /
    • pp.987-997
    • /
    • 2019
  • Recently the demand for drones is rapidly increasing, as developing Unmanned Aerial Vehicle (UAV) and growing interest in them. Compared to traditional satellite and aerial imagery, it can be used for various researches (environment, geographic information, ocean observation, and remote sensing) because it can be managed with low operating costs and effective data acquisition. However, there is a disadvantage in that only a small area is acquired compared to the satellite and an aircraft, which is a traditional remote sensing method, depending on the battery capacity of the UAV, and the distance limit between Ground Control System (GCS) and UAV. If remote control at long range is possible, the possibility of using UAV in the field of remote sensing can be increased. Therefore, there is a need for a communication network system capable of controlling regardless of the distance between the UAV and the GCS. The distance between UAV and GCS can be transmitted and received using simple radio devices (RF 2.4 GHz, 915 MHz, 433 MHz), which is limited to around 2 km. If the UAV can be managed simultaneously by improving the operating environment of the UAV using a Long-Term Evolution (LTE) communication network, it can make greater effects by converging with the existing industries. In this study, we performed the maximum straight-line distance 6.1 km, the test area 2.2 ㎢, and the total flight distance 41.75 km based on GCS through LTE communication. In addition, we analyzed the possibility of disconnected communication through the base station of LTE communication.

A Study on Red Tide Monitoring system using Wireless Sensor Network (무선센서네트워크를 이용한 적조모니터링 시스템 구축을 위한 연구)

  • Min Heo;Mo Soo-Jong;Yim Jae-Hong;Kim Ki-Moon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.489-492
    • /
    • 2006
  • Red tide occurred sporadically in early 90s. But It is happening extensively by global warming. So, Airline observation, Red tide buoy development, and Red tide alarm system research is progressing for monitor ring. However, study to early forecast red tide and red tide alarm system did not exist hard. This paper proposed development that design and implementation red tide database of using wireless sensor network. There are GPS, Water Temperature sensor, Oxygen sensor, and Turbidity sensor in each node. And data is stored to red tide database through Ad-hoc network. This data is integrated and analyzed. So, forecast red tide. And red tide database has red tide data that happen at past. This is utilized to comparative analysis data for red tide estimate. Main screen displays position of node and measured value in electron map. Much studies must be backed for this a study. But I think that contribute to analyze red tide data by red tide database construction.

  • PDF

Effective Picture Search in Lifelog Management Systems using Bluetooth Devices (라이프로그 관리 시스템에서 블루투스 장치를 이용한 효과적인 사진 검색 방법)

  • Chung, Eun-Ho;Lee, Ki-Yong;Kim, Myoung-Ho
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.383-391
    • /
    • 2010
  • A Lifelog management system provides users with services to store, manage, and search their life logs. This paper proposes a fully-automatic collecting method of real world social contacts and lifelog search engine using collected social contact information as keyword. Wireless short-distance network devices in mobile phones are used to detect social contacts of their users. Human-Bluetooth relationship matrix is built based on the frequency of a human-being and a Bluetooth device being observed at the same time. Results show that with 20% of social contact information out of full social contact information of the observation times used for calculation, 90% of human-Bluetooth relationship can be correctly acquired. A lifelog search-engine that takes human names as keyword is suggested which compares two vectors, a row of Human-Bluetooth matrix and a vector of Bluetooth list scanned while a lifelog was created, using vector information retrieval model. This search engine returns more lifelog than existing text-matching search engine and ranks the result unlike existing search-engine.

Different Heterogeneous IoT Data Management Techniques for IoT Cloud Environments (IoT 클라우드 환경을 위한 서로 다른 이기종의 IoT 데이터 관리 기법)

  • Cho, Sung-Nam;Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.15-21
    • /
    • 2020
  • Although IoT systems are used in a variety of heterogeneous environments as cloud environments develop, all IoT devices are not provided with reliable protocols and services. This paper proposes an IoT data management technique that can extend the IoT cloud environment to an n-layer multi-level structure so that information collected from different heterogeneous IoT devices can be efficiently sorted and processed. The proposed technique aims to classify and process IoT information by transmitting routing information and weight information through wireless data link data collected from heterogeneous IoT devices. The proposed technique not only delivers information classified from IoT devices to the corresponding routing path but also improves the efficiency of IoT data processing by assigning priority according to weight information. The IoT devices used in the proposed technique use each other's reliable protocols, and queries for other IoT devices locally through a local cloud composed of hierarchical structures have features that ensure scalability because they maintain a certain cost.y channels of IoT information in order to make the most of the multiple antenna technology.

Design and Implementation of Resources Management System for Extension of outside Data Space in Mobile Device (모바일 디바이스에서 외부 데이터 영역의 확장을 위한 자원관리시스템의 설계 및 구현)

  • 나승원;오세만
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.2
    • /
    • pp.33-48
    • /
    • 2003
  • Wireless Internet, created through the merging of mobile communication with Internet technology, provides the advantage of mobility, but the restrictions of the mobile environment are deterring it from growing into a mass public service. Of the restricting factors of the wireless environment, narrow memory space creates the disadvantage of not being able to manage resources in mobile devices efficiently Because there is a limit to obtaining sufficient memory space from hardware made with consideration of portability, future devices will need to have a platform design with storage area extended from internal storage to external storage space. In this paper, we present a mobile agent that extends the memory space from only the inside of a mobile device to an external server making it possible to use data by on-line Run-time, and can also manage internal files efficiently. We have designed and implemented a RMS(Resources Management System) as a realization. Devices using the proposed RMS will be able to apply extended processes with the 'Mobile Space Extension' and will be benefited with optimal memory space through efficient internal file management.

  • PDF

Development of Mobile Camera Vision System and Build of Wire.Wireless Integration ERP System (모바일 카메라 비전 시스템 개발과 유.무선 통합 ERP 시스템 구축)

  • Lee, Hyae-Jung;Shin, Hyun-Cheol;Joung, Suck-Tae
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.81-89
    • /
    • 2007
  • Mobile computing environment that support so that can offer employees inside information that enterprise has always improves business productivity and fetches efficiency enlargement. In this paper, limit model that can process ERP information by real-time as easy and convenient always utilizing radio network and PDA, Mobile camera based on Mobile vision concept. Calculable information between seller and customer is supplied supplying real-time brand image and information by practical use of Enterprise Resource Planning doing based on Mobile. Technical development and commercialization that utilize mobility, enforcement stronghold, portability etc. that is advantage of Mobile communication are required. In this paper, mobility of precious metals.jewel field that use portable terminal equipment taking advantage of a Mobile technology is secured. Constructed Mobile vision system that satisfy photography and bar-code scan at the same time from Mobile camera.

  • PDF

A Study for Smart Apartment for Supporting Intelligent Service based on Ubiquitous (유비쿼터스 기반의 지능형 서비스를 지원하는 스마트 아파트 연구)

  • Ahn, Byeong-Tae;Lee, Chong-Ha;Chung, Bhum-suk
    • Management & Information Systems Review
    • /
    • v.32 no.3
    • /
    • pp.247-261
    • /
    • 2013
  • Recently, the smart phone, a carrying along terminal connection technology such as Galaxytap/iPad etc. evolves, and supply is increasing rapidly, is included for smart phone because various sensor technologies are developed and service application that is acted in terminal with this is accompanied and grow. Continuously 4 generation to 3 Gs, Wibro Wireless network technology of communications a LTE technology from that is constructed, environment for Ubiquitous realization is being constructed fast. Therefore, in this paper it can inquire state of electronic, furniture devices through apartment complex web server and gear that control groove network at smart phone, and control, and confirms home state prevention of crimes state, and video inquiry of position that CCTV is placed in apartment complex was available. And it proposed integrated smart apartment with parking system and medical system using RFID system in ubiquitous environment.

  • PDF

Security Threats and Scenarios using Drones on the Battlefield (전장에서 드론을 활용한 보안 위협과 시나리오)

  • Park, Keun-Seog;Cheon, Sang-pil;Kim, Seong-Pyo;Eom, Jung-ho
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.73-79
    • /
    • 2018
  • Since 1910s, the drones were mainly used for military purposes for reconnaissance and attack targets, but they are now being used in various fields such as disaster prevention, exploration, broadcasting, and surveillance of risk areas. As drones are widely used from military to civilian field, hacking into the drones such as radio disturbance, GPS spoofing, hijacking, etc. targeting drones has begun to occur. Recently, the use of drones in hacking into wireless network has been reported. If the artificial intelligence technology is applied to the drones in the military, hacking into unmanned combat system using drones will occur. In addition, a drone with a hacking program may be able to relay a hacking program to the hacking drone located far away, just as a drone serves as a wireless communication station. And the drones will be equipped with a portable GPS jamming device, which will enable signal disturbance to unmanned combat systems. In this paper, we propose security threats and the anticipated hacking scenarios using the drones on the battlespace to know the seriousness of the security threats by hacking drones and prepare for future cyberspace.

  • PDF

A Cell-based Compression Technique of the Spatial Data for the Mobile GIS (모바일 GIS를 위한 셀 기반의 공간 데이터 압축 기법)

  • Lee, Ki-Young;Lim, Keun;Choi, Gyoo-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.6
    • /
    • pp.49-54
    • /
    • 2008
  • Recently, with the development of wireless communications and GIS, interest about mobile computing is rising. In this case, the GIS needs to be placed in a constricted environment than the environment of server computing. For this reason large amounts of spatial data must be compressed into the mobile device. The compression technique of the spatial data is difficult and must be processed in the correct order because the size of the data is unpredictable. Therefore, in this paper, the cell-based compression technique of the spatial data for mobile GIS is presented. This paper includes the process of transformation of spatial data from a certain server to a mobile device by cell-based compression technique. In this paper, the cell-based compression technique of the spatial data has been proven practically efficient.

  • PDF