• Title/Summary/Keyword: Sensor Operating Systems

Search Result 240, Processing Time 0.029 seconds

Indoor Localization Method using Single Inertial and Ultrasonic Sensors (단일 관성 센서와 초음파를 이용한 실내 위치추정 방법)

  • Ryu, Seoung-Bum;Song, Chang-Woo;Chung, Kyung-Yong;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.4
    • /
    • pp.115-122
    • /
    • 2010
  • Most of intelligent services provided today work based on the users' location. Numerous devices for indoor localization services have their own characteristic functions and operating systems, we need the interoperability and diversity of middleware to connect and control these devices. The indoor localization method using existing inertial sensors are relatively less efficient because of additional cost according to the size of space. Accordingly, the indoor user localization method proposed in this study supports integrated services using OSGi framework, an open source project, and solves problems in inertial sensor based on accurate distance to a specific object measured using ultrasonic sensor. Furthermore, it reduces errors resulting from difference in response rate by adding the reliability item.

Micro toluene gas sensor of SWNTs-PtOx system using the vacuum filtering deposition method (진공여과증착법을 이용한 SWNT-PtOx계 마이크로 톨루엔 가스센서)

  • Kim, Il-Jin;Jeon, Young-Zip;Choi, Chang-Kyu;Lee, Young-Uk;Choi, Si-Young;Han, Chang-Soo;Han, Sang-Do
    • Journal of Sensor Science and Technology
    • /
    • v.18 no.2
    • /
    • pp.179-183
    • /
    • 2009
  • Toluene($C_6H_5CH_3$) gas sensors were fabricated using $PtO_x$ loaded with SWNTs by a new deposition method. The nanoparticle powders of SWNTs-$PtO_x$ composite were deposited on Si wafer substrates by a vacuum filtering deposition method. The fabricated sensors were tested against toluene gas which is a kind of the Volatile Organic Compounds. The composition ratio that exhibited the highest response to toluene gases was SWNTs : $PtO_x\;=\;99:1$ in wt% ratio at operating temperature of about $150^{\circ}C$. The response and recovery times of the sensors were as short as less than 1 min., respectively.

Status Analysis for the Confinement Monitoring Technology of PWR Spent Nuclear Fuel Dry Storage System (경수로 사용후핵연료 건식저장시스템의 격납감시 기술현황 분석)

  • Baeg, Chang-Yeal;Cho, Chun-Hyung
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.14 no.1
    • /
    • pp.35-44
    • /
    • 2016
  • Leading national R&D project to design a PWR spent nuclear fuel interim dry storage system that has been under development since mid-2009, which consists of a dual purpose metal cask and concrete storage cask. To ensure the safe operation of dry storage systems in foreign countries, major confinement monitoring techniques currently consist of pressure and temperature measurement. In the case of a dual purpose metal cask, a pressure sensor is installed in the interspace of bolted double lid(primary and secondary lid) in order to measure pressure. A concrete storage cask is a canister based system made of double/redundant welded lid to ensure confinement integrity. For this reason, confinement monitoring method is real time temperature measurement by thermocouple placed in the air flow(air intake and exit) of the concrete structure(over pack and module). The use of various monitoring technologies and operating experiences for the interim dry storage system over the last decades in foreign countries were analyzed. On the basis of the analysis above, development of the confinement monitoring technology that can be used optimally in our system will be available in the near future.

Research on Anti-Reader Collision Protocols for Integrated RFID-WSNs

  • Ko, Doo-Hyun;Kim, Bum-Jin;An, Sun-Shin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.776-796
    • /
    • 2010
  • Integrated RFID-WSNs (wireless sensor networks) have recently been researched to provide object identities, sensing information, mobile service, and network functionalities. In integrated RFID-WSNs, the reader collision is one of the critical problems. Above all, due to the absence of universally applicable anti-collision protocols and the channel capture phenomenon, the medium access control protocols in integrated RFID-WSNs suffer from reader collision and starvation problems. In this paper, we propose an efficient MAC protocol, called EMP, to avoid the above problems in integrated RFID-WSNs. EMP is a CSMA-based MAC protocol which is compatible with sensor networks operating on integrated nodes which consist of an RFID reader and a senor node. EMP resolves not only the reader collision problem, but also the starvation problem using a power control mechanism. To verify the performance of EMP, we compared it with other anti-reader collision MAC protocols using simulations. As a result, the performance of EMP showed improvements in throughput, system efficiency, and energy consumption compared to the single data channel protocols (CSMA/CA, Pulse, and DiCa) in dense deployment environments.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

An Energy Balancing Low Power Routing Method for Sensor Network with Fixed Data Acquisition Nodes (고정식 정보획득 노드로 구성된 센서 네트워크에 적용 가능한 에너지 밸런싱 저전력 라우팅 기법)

  • Jeong Gye-Gab;Kim Hwang-Gi;Lee Nam-Il;Kim Jun-Nyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.6 s.324
    • /
    • pp.59-68
    • /
    • 2004
  • Thanks to the development of microelectromechanical systems(MEMS), wireless communication technology and microsensor technology, it was Possible to manufacture a very small and low costdata acquisition node with sensing function, processing function, wireless communication function and battery. Thus sensor networks begin to be prevailed. The sensor network is a spontaneous system which sets up automatically routing paths and transmits asignificant data to the destination. Sensor nodes requires low-power operation because most of them use a battery as operating power. Sensor nodes transmit a sensing data to the destination. Moreover, they play a router. In fact, because the later consumes more energy than the former, the low-power routing is very important. Sensor networks don't have a routing standard unlike general wireless Ad-hoc networks. So This paper proposes a low-power routing method for anting to sensor networks. It is based on AODV and adapts a method to drop probably RREQ depending on remaining power. We examined it through simulations. From simulation results, we could confirm to reduce power consumption about $10-20\%$ and distribute equally power consumption among nodes.

Improvements of the Anti-collision Algorithms for Multi Tag Interrogation in RFID System (RFID 시스템에서 다중 태그 인식을 위한 충돌회피 알고리즘의 성능 개선에 관한 연구)

  • NamGung, Ho-Young;Min, Byoung-Taek;Jeon, Jun-Soo;Kim, Cheol-Sung
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1169-1172
    • /
    • 2005
  • In this paper, we propose an improved anti-collision algorithm for multi tag interrogation in ubiquitous sensor network(USN) and show the result of simulation for multi tag interrogation in RFID systems. We have analyzed an EPC(Electronic Product Code) protocol which specifies the physical and logical requirements for a passive-backscatter Reader-Talk-First(RTF) RFID(Radio Frequency Identification) system operating in the $860MHz{\sim}960MHz$ frequency range. We have also designed and implemented the simulator of the RFID system based on the EPC protocol. Finally, we find that proposed algorithm works better than an existing algorithm.

  • PDF

Reagent Cabinet Management System Using Danger Priority

  • Cao, Kerang;Kang, Inshik;Choi, Hyungwook;Jung, Hoekyung
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.4
    • /
    • pp.227-231
    • /
    • 2017
  • Recently, as the number of safety accidents caused by reagents increases, researches on a system that can reduce safety accidents are underway. Existing systems managed reagent cabinet through various sensors. On the other hand, there are disadvantages in that countermeasures against simultaneous danger situations are insufficient at multi-reagents cabinet. In order to solve this problem, this paper proposes a system to manage the reagents cabinet through danger priority. Danger priorities are selected through domestic chemical accident cases and the Chemical Safety Management Act. If a danger situation occurs in the reagent cabinet, make sure it is from a single or multiple reagent cabinets. For multiple reagent cabinets, compare the reagent cabinet priorities and run the device sequentially from the reagent cabinet with the highest priority. Thus, by operating the device according to the danger priority, the chain reaction can be prevented in advance and the reagent cabinet can be safely managed.

Development of an Exclusive Sensor for Detecting Positions of Field Robot Arms

  • Kim, Jong-Hwa;Yang, Yong-Soon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.51.4-51
    • /
    • 2001
  • In order to comprise a basic closed-loop control system for a field robot it is necessary to detect the piston rod stroke of a hydraulic cylinder. There are mary conventional type sensors which can detect the displacement of cylinders. However, they cannot reveal the original performance normally or the cannot be applied at all where the operating circumstance of cylinders is beyond specifications of sensors. In this paper, an exclusive method for detecting the piston rod stroke is suggested, which adopts a remote detecting technique using optical fiber sensors. Several experiments using the prototype are executed for verifying the effectiveness of the suggested method and the possibility of the accurate detection of stroke.

  • PDF

Individual Cylinder Spark Advance Control Using Cylinder Pressure in SI Engines

  • Park, Seungbum;Myoungho Sunwoo;Paljoo Yoon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.160.2-160
    • /
    • 2001
  • This paper presents an individual cylinder spark advance control strategy based upon the location of peak pressure (LPP) in spark ignition engines using artificial neural networks. The LPP is estimated using a feedforward multi-layer perceptron network (MLPN), which needs only five samples of output voltage from the cylinder pressure sensor. The cyclic variation of LPP restricts the gain of the feedback controller, and results in poor regulation performance during the transient operation of the engine. The transient performance of the spark advance controller is improved by adding a feedforward controller which reflects the abrupt changes of the engine operating conditions such as engine speed and manifold absolute pressure (MAP)...

  • PDF