• Title/Summary/Keyword: environment sensor

Search Result 3,394, Processing Time 0.029 seconds

RESOURCE ORIENTED ARCHITECTURE FOR MUTIMEDIA SENSOR NETWORKS IWAIT2009

  • Iwatani, Hiroshi;Nakatsuka, Masayuki;Takayanagi, Yutaro;Katto, Jiro
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.456-459
    • /
    • 2009
  • Sensor network has been a hot research topic for the past decade and has moved its phase into using multimedia sensors such as cameras and microphones [1]. Combining many types of sensor data will lead to more accurate and precise information of the environment. However, the use of sensor network data is still limited to closed circumstances. Thus, in this paper, we propose a web-service based framework to deploy multimedia sensor networks. In order to unify different types of sensor data and also to support heterogeneous client applications, we used ROA (Resource Oriented Architecture [2]).

  • PDF

Design of A Faulty Data Recovery System based on Sensor Network (센서 네트워크 기반 이상 데이터 복원 시스템 개발)

  • Kim, Sung-Ho;Lee, Young-Sam;Youk, Yui-Su
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.56 no.1
    • /
    • pp.28-36
    • /
    • 2007
  • Sensor networks are usually composed of tens or thousands of tiny devices with limited resources. Because of their limited resources, many researchers have studied on the energy management in the WSNs(Wireless Sensor Networks), especially taking into account communications efficiency. For effective data transmission and sensor fault detection in sensor network environment, a new remote monitoring system based on PCA(Principle Component Analysis) and AANN(Auto Associative Neural Network) is proposed. PCA and AANN have emerged as a useful tool for data compression and identification of abnormal data. Proposed system can be effectively applied to sensor network working in LEA2C(Low Energy Adaptive Connectionist Clustering) routing algorithms. To verify its applicability, some simulation studies on the data obtained from real WSNs are executed.

An energy efficient clustering scheme by adjusting group size in zigbee environment (Zigbee 환경에서 그룹 크기 조정에 의한 에너지 효율적인 클러스터링 기법)

  • Park, Jong-Il;Lee, Kyoung-Hwa;Shin, Yong-Tae
    • Journal of Sensor Science and Technology
    • /
    • v.19 no.5
    • /
    • pp.342-348
    • /
    • 2010
  • The wireless sensor networks have been extensively researched. One of the issues in wireless sensor networks is a developing energy-efficient clustering protocol. Clustering algorithm provides an effective way to extend the lifetime of a wireless sensor networks. In this paper, we proposed an energy efficient clustering scheme by adjusting group size. In sensor network, the power consumption in data transmission between sensor nodes is strongly influenced by the distance of two nodes. And cluster size, that is the number of cluster member nodes, is also effected on energy consumption. Therefore we proposed the clustering scheme for high energy efficiency of entire sensor network by controlling cluster size according to the distance between cluster header and sink.

Implementation of Multi-Precision Multiplication over Sensor Networks with Efficient Instructions

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.1
    • /
    • pp.12-16
    • /
    • 2013
  • Sensor network is one of the strongest technologies for various applications including home automation, surveillance system and monitoring system. To ensure secure and robust network communication between sensor nodes, plain-text should be encrypted using encryption methods. However due to their limited computation power and storage, it is difficult to implement public key cryptography, including elliptic curve cryptography, RSA and pairing cryptography, on sensor networks. However, recent works have shown the possibility that public key cryptography could be made available in a sensor network environment by introducing the efficient multi-precision multiplication method. The previous method suggested a broad rule of multiplication to enhance performance. However, various features of sensor motes have not been considered. For optimized implementation, unique features should be handled. In this paper, we propose a fully optimized multiplication method depending on a different specification for sensor motes. The method improves performance by using more efficient instructions and general purpose registers.

Performance Comparison of Sensor-Programming Schemes According to the Shapes of Obstacles

  • Chung, Jong-In;Chae, Yi-Geun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.56-62
    • /
    • 2021
  • MSRDS(Microsoft Robotics Developer Studio) provides the ability to simulate these technologies. SPL(Simple Programming Language) of MSRDS provides many functions for sensor programming to control autonomous robots. Sensor programming in SPL can be implemented in two types of schemes: procedure sensor notification and while-loop schemes. We considered the three programming schemes to control the robot movement after studying the advantages and disadvantages of the sensor notification procedure and the while-loop scheme. We also created simulation environments to evaluate the performance of the three considered schemes when applied to four different mazes. The simulation environment consisted of a maze and a robot with the most powerful sensor, i.e., the LRF(Laser Range Finder) sensor. We measured the required travel time and robot actions (number of turns and number of collisions) needed to escape the maze and compared the performance outcomes of the three considered schemes in the four different mazes.

Study on the Localization Improvement of the Dead Reckoning using the INS Calibrated by the Fusion Sensor Network Information (융합 센서 네트워크 정보로 보정된 관성항법센서를 이용한 추측항법의 위치추정 향상에 관한 연구)

  • Choi, Jae-Young;Kim, Sung-Gaun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.18 no.8
    • /
    • pp.744-749
    • /
    • 2012
  • In this paper, we suggest that how to improve an accuracy of mobile robot's localization by using the sensor network information which fuses the machine vision camera, encoder and IMU sensor. The heading value of IMU sensor is measured using terrestrial magnetism sensor which is based on magnetic field. However, this sensor is constantly affected by its surrounding environment. So, we isolated template of ceiling using vision camera to increase the sensor's accuracy when we use IMU sensor; we measured the angles by pattern matching algorithm; and to calibrate IMU sensor, we compared the obtained values with IMU sensor values and the offset value. The values that were used to obtain information on the robot's position which were of Encoder, IMU sensor, angle sensor of vision camera are transferred to the Host PC by wireless network. Then, the Host PC estimates the location of robot using all these values. As a result, we were able to get more accurate information on estimated positions than when using IMU sensor calibration solely.

Robust Localization Algorithm for Mobile Robots in a Dynamic Environment with an Incomplete Map (동적 환경에서 불완전한 지도를 이용한 이동로봇의 강인한 위치인식 알고리즘의 개발)

  • Lee, Jung-Suk;Chung, Wan Kyun;Nam, Sang Yep
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.3 no.2
    • /
    • pp.109-118
    • /
    • 2008
  • We present a robust localization algorithm using particle filter for mobile robots in a dynamic environment. It is difficult to describe moving obstacles like people or other robots on the map and the environment is changed after mapping. A mobile robot cannot estimate its pose robustly with this incomplete map because sensor observations are corrupted by un-modeled obstacles. The proposed algorithms provide robustness in such a dynamic environment by suppressing the effect of corrupted sensor observations with a selective update or a sampling from non-corrupted window. A selective update method makes some particles keep track of the robot, not affected by the corrupted observation. In a sampling from non-corrupted window method, particles are always sampled from several particle sets which use only non-corrupted observation. The robustness of proposed algorithm is validated with experiments and simulations.

  • PDF

Development of ESAD with Flight Environment Sensing Function and Sled Test Method for Function Verification (비행환경 감지 기능을 보유한 ESAD 개발 및 기능 확인을 위한 슬레드 시험 방안)

  • Hanseong Jo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.3
    • /
    • pp.273-280
    • /
    • 2023
  • Recently electronic safety and arming device(ESAD) has attracted increasing attention due to its design flexibility. However, ESAD can be armed unintentionally due to a malfunction of an external device or interface. Thus ESAD needs an internally generated arming signal independent from the external device. In this paper, a new sensor-hybrid ESAD(SHESAD) with a flight environment sensing function for generating arming signal internally is proposed and a sled test based method is also suggested for evaluating its functions. Through the test results, the operability of the flight environment sensing function was confirmed. Also, it is shown that the proposed test method is suitable for verification of ESAD with the flight environment sensing function.

Implementation of an Indoor Mobile Robot and Environment Recognition using Line Histogram Method (실내 자율주행 로봇의 구현 및 라인 히스토그램을 이용한 환경인식)

  • Moon, Chan-Woo;Lee, Young-Dae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.2
    • /
    • pp.45-50
    • /
    • 2009
  • The environment exploration is an essential process for indoor robots such as clean robot and security robot. Apartment house and office building has common frame structure, but internal arrangement of each room may be slightly different. So, it is more convenient to use a common frame map than to build a new map at every time the arrangement is changed. In this case, it is important to recognize invariant features such as wall, door and window. In this paper, an indoor mobile robot is implemented, and by using the laser scanner data and line segment histogram with respect to segment orientation and distance, an environment exploration method is presented and tested. This robot is fitted with a laser scanner, gyro sensor, ultra sonic sensor and IR sensor, and programed with C language.

  • PDF

Security Vulnerability of Internet of Things and Its Solution (사물인터넷 보안 문제제기와 대안)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.69-78
    • /
    • 2015
  • Internet of Things(IoT) is electronic devices and household appliances use wireless sensor network in environment of high speed wireless network and LTE mobile service. The combination of the development of Internet and wireless network led to development of new forms of service such as electronic devices and household appliances can connect to the Internet through various sensors and online servers such as a Home Network. Even though Internet of Things is useful, there are problems in Internet of Things. In environment of Internet of Things, information leakage could happens by illegal eavesdropping and spoofing. Also illegal devices of wireless communication interference can cause interfere in Internet of things service, physical damage and denial of service by modulation of data and sensor. In this thesis, it will analyze security threats and security vulnerability in environment of mobile services and smart household appliances, then it will suggest plan. To solve security issues, it is important that IT and RFID sensor related companies realize importance of security environment rather than focus on making profit. It is important to develop the standardized security model that applies to the Internet of Things by security-related packages, standard certification system and strong encrypted authentication.