• Title/Summary/Keyword: maritime networks

Search Result 232, Processing Time 0.028 seconds

Structural monitoring of wind turbines using wireless sensor networks

  • Swartz, R. Andrew;Lynch, Jerome P.;Zerbst, Stephan;Sweetman, Bert;Rolfes, Raimund
    • Smart Structures and Systems
    • /
    • v.6 no.3
    • /
    • pp.183-196
    • /
    • 2010
  • Monitoring and economical design of alternative energy generators such as wind turbines is becoming increasingly critical; however acquisition of the dynamic output data can be a time-consuming and costly process. In recent years, low-cost wireless sensors have emerged as an enabling technology for structural monitoring applications. In this study, wireless sensor networks are installed in three operational turbines in order to demonstrate their efficacy in this unique operational environment. The objectives of the first installation are to verify that vibrational (acceleration) data can be collected and transmitted within a turbine tower and that it is comparable to data collected using a traditional tethered system. In the second instrumentation, the wireless network includes strain gauges at the base of the structure. Also, data is collected regarding the performance of the wireless communication channels within the tower. In both turbines, collected wireless sensor data is used for off-line, output-only modal analysis of the ambiently (wind) excited turbine towers. The final installation is on a turbine with embedded braking capabilities within the nacelle to generate an "impulse-like" load at the top of the tower. This ability to apply such a load improves the modal analysis results obtained in cases where ambient excitation fails to be sufficiently broad-band or white. The improved loading allows for computation of true mode shapes, a necessary precursor to many conditional monitoring techniques.

A multi carrier selectable routing scheme by normalized transmission characteristics (MCS-NTC) at marine multi-carrier MANETs (다중캐리어 해상 MANET에서 여러 캐리어 선택가능하고 정규화된 전송특성에 의한 경로배정방식)

  • Son, Jooyoung
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.37 no.2
    • /
    • pp.199-204
    • /
    • 2013
  • Marine data communications still look for a novel data communication system at sea because of the restriction of bandwidths and costs of current carriers. In order to make the most efficient use of the broadband land carriers at sea, this paper proposes a routing scheme (MCS-NTC) at a marine MANET model. The routing scheme optimizes the route by choosing optimal nodes and carriers among the traditional and land carriers based on normalized transmission characteristics of applications and carriers. The performance is compared with the max-win method (OMH-MW) scheme considering the specific values of transmission characteristics. The result shows that our scheme derives more efficient routes than the previous one in terms of the transmission characteristics such as bandwidth, cost, delay, the number of hops and carriers.

Optimization Algorithm for Minimizing Network Energy Consumption with Traffic Redundancy Elimination (트래픽 중복 제거로 네트워크 에너지 소비를 최소화하기 위한 최적화 알고리즘)

  • Jang, Kil-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.7
    • /
    • pp.930-939
    • /
    • 2021
  • In recent years, the use of broadband bandwidth and redundant links for stable transmission in networks has resulted in excessive energy consumption and reduced transmission efficiency. In this paper, we propose an optimization algorithm that reduces the number of transmission links and minimizes transmission energy by removing redundant traffic in networks where traffic redundancy is allowed. The optimization algorithm proposed in this paper uses the meta-heuristic method using Tabu search algorithm. The proposed optimization algorithm minimizes transmission energy by designing a neighborhood generation method that efficiently routes overlapping traffic. The performance evaluation of the proposed optimization algorithm was performed in terms of the number of links used to transmit all traffic generated in the network and the transmission energy consumed. From the performance evaluation results, it was confirmed that the proposed algorithm is superior to other algorithms previously proposed.

Emergency Rescue Guidance Scheme Using Wireless Sensor Networks (재난 상황 시 센서 네트워크 기반 구조자 진입 경로 탐색 방안)

  • Joo, Yang-Ick
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1248-1253
    • /
    • 2019
  • Using current evacuation methods, a crew describes the physical location of an accident and guides evacuation using alarms and emergency guide lights. However, in case of an accident on a large and complex building, an intelligent and effective emergency evacuation system is required to ensure the safety of evacuees. Therefore, several studies have been performed on intelligent path finding and emergency evacuation algorithms which are centralized guidance methods using gathered data from distributed sensor nodes. However, another important aspect is effective rescue guidance in an emergency situation. So far, there has been no consideration on the efficient rescue guidance scheme. Therefore, this paper proposes the genetic algorithm based emergency rescue guidance method using distributed wireless sensor networks. Performance evaluation using a computer simulation shows that the proposed scheme guarantees efficient path finding. The fitness converges to the minimum value in reasonable time. The density of each exit node is remarkably decreased as well.

Tabu search Algorithm for Maximizing Network Lifetime in Wireless Broadcast Ad-hoc Networks (무선 브로드캐스트 애드혹 네트워크에서 네트워크 수명을 최대화하기 위한 타부서치 알고리즘)

  • Jang, Kil-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.8
    • /
    • pp.1196-1204
    • /
    • 2022
  • In this paper, we propose an optimization algorithm that maximizes the network lifetime in wireless ad-hoc networks using the broadcast transmission method. The optimization algorithm proposed in this paper applies tabu search algorithm, a metaheuristic method that improves the local search method using the memory structure. The proposed tabu search algorithm proposes efficient encoding and neighborhood search method to the network lifetime maximization problem. By applying the proposed method to design efficient broadcast routing, we maximize the lifetime of the entire network. The proposed tabu search algorithm was evaluated in terms of the energy consumption of all nodes in the broadcast transmission occurring in the network, the time of the first lost node, and the algorithm execution time. From the performance evaluation results under various conditions, it was confirmed that the proposed tabu search algorithm was superior to the previously proposed metaheuristic algorithm.

Analysis of the IP Spoofing Attack Exploiting Null Security Algorithms in 5G Networks

  • Park, Tae-Keun;Park, Jong-Geun;Kim, Keewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.113-120
    • /
    • 2022
  • In this paper, we analyze the feasibility of the IP spoofing attack exploiting null security algorithms in 5G networks based on 3GPP standard specifications. According to 3GPP standard specifications, the initial Registration Request message is not protected by encryption and integrity. The IP spoofing attack exploits the vulnerability that allows a malicious gNB (next generation Node B) to modify the contents of the initial Registration Request message of a victim UE (User Equipment) before forwarding it to AMF (Access and Mobility Management Function). If the attack succeeds, the victim UE is disconnected from the 5G network and a malicious UE gets Internet services, while the 5G operator will charge the victim UE. In this paper, we analyze the feasibility of the IP spoofing attack by analyzing whether each signaling message composing the attack conforms to the 3GPP Rel-17 standard specifications. As a result of the analysis, it is determined that the IP spoofing attack is not feasible in the 5G system implemented according to the 3GPP Rel-17 standard specifications.

A Mrthod on the Design of Sensor Network for the Surrounding Safety Using Drones (드론을 활용한 주변 안전을 위한 센서 네트워크 구성 방안)

  • Hong, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.667-669
    • /
    • 2021
  • Recently, RFID/USN technology has been applied in various fields such as logistics, environment, education, home network, disaster prevention, military, and medical care, but despite the remarkable development of RFID/USN technology, it is difficult to apply it to marine industry due to the characteristics of poor marine environment. Therefore, satellites are mainly used in the marine sector, and existing communication networks are used in the coast, so measures for forming a shelf-only short-range network in the ocean are being considered. In this paper, we consider the use of drones as mobile base stations of USN as a base station role using USN in existing PS-LTE and LTE networks.Since autonomous navigation vessels are aiming for the intelligent system, the number of crew and labor force should be reduced and the function of autonomous network formation in the form of more stable and intelligent ICT convergence technology should be strengthened.

  • PDF

A Study on Policy Making for e-Navigation from the Viewpoint of a Maritime Digital Communication Network (e-Navigation을 위한 해상디지털통신 구축에 관한 정책 연구)

  • Lim, Hyuntaek;Cho, Yong-Gab
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.6
    • /
    • pp.679-685
    • /
    • 2018
  • In order to reduce marine accidents using advanced information and communication technology, various research and development projects are conducted globally on e-Navigation related technologies and services. Existing studies do not provide policy measures for LTE-M. In order for these technologies and services to be installed on vessels and to contribute to the prevention of accidents at sea, the law should be expand operational organizations and systems. In particular, communication equipment and related technical standards should be prepared, and its digital communication technology (LTE-M, VDES, Digital-MF / HF, etc.) In this study, we conducted short, medium, and long term performance assessment of the identification system and the policy for effective implementation of Korean e-Navigation. We presented a visible plan of the relevant policy. For example, e-Navigation core services, e-Navigation communication networks and operating systems, e-Navigation international standard leading technologies and e-navigation services activated in the field. To do this, we conducted research based on the progress data of the Korean e-Navigation project, which was led by the Ministry of Maritime Affairs and Fisheries, and conducted research discussions with practitioners and experts in related fields. As a result of this study, it is expected that the proposed policies will contribute to the reduction of marine accidents, the promotion of the maritime industry and the development of additional government policies for national security.

Site Monitoring of Crews and Passengers on Board by the BLE and PLM Combination (BLE와 PLM 조합의 승선자 위치 모니터링)

  • Kwon, Hyuk-Joo;Yang, Hyun-Suk;Lee, Sung-Geun
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.4
    • /
    • pp.463-467
    • /
    • 2015
  • When unforeseen accidents occur in a ship, it is important to save passengers safely and remove them from the accident area quickly. To solve such a situation, site information of passengers on board always must be identified. This paper implemented a site monitoring of crews and passengers based on the BLE and PLM combination, to prepare for unexpected accidents of the ships. This system was composed of BLE tag for crews, passengers and each room, PLM networks, data server, and monitoring PC. In this system, site information derived from the tag attached to the bodies and cabins of crews and passengers are transmitted through a power line network, and monitored on the screen of a monitoring PC. The proposed system guides them into the only authorized area considering the ship security and passengers' safety, and even has a special alarm call to warn them after entering an unauthorized area. This system enables the BLE-embedded tag battery to use for a long time because the BLE consumes low electric power, and can gain an economic advantage.

Panamax Second-hand Vessel Valuation Model (파나막스 중고선가치 추정모델 연구)

  • Lim, Sang-Seop;Lee, Ki-Hwan;Yang, Huck-Jun;Yun, Hee-Sung
    • Journal of Navigation and Port Research
    • /
    • v.43 no.1
    • /
    • pp.72-78
    • /
    • 2019
  • The second-hand ship market provides immediate access to the freight market for shipping investors. When introducing second-hand vessels, the precise estimate of the price is crucial to the decision-making process because it directly affects the burden of capital cost to investors in the future. Previous studies on the second-hand market have mainly focused on the market efficiency. The number of papers on the estimation of second-hand vessel values is very limited. This study proposes an artificial neural network model that has not been attempted in previous studies. Six factors, freight, new-building price, orderbook, scrap price, age and vessel size, that affect the second-hand ship price were identified through literature review. The employed data is 366 real trading records of Panamax second-hand vessels reported to Clarkson between January 2016 and December 2018. Statistical filtering was carried out through correlation analysis and stepwise regression analysis, and three parameters, which are freight, age and size, were selected. Ten-fold cross validation was used to estimate the hyper-parameters of the artificial neural network model. The result of this study confirmed that the performance of the artificial neural network model is better than that of simple stepwise regression analysis. The application of the statistical verification process and artificial neural network model differentiates this paper from others. In addition, it is expected that a scientific model that satisfies both statistical rationality and accuracy of the results will make a contribution to real-life practices.