• Title/Summary/Keyword: network reconfiguration

Search Result 129, Processing Time 0.024 seconds

Design of Reconfigurable Flight Control Law Using Neural Networks (신경회로망을 이용한 재형상 비행제어법칙 설계)

  • 김부민;김병수;김응태;박무혁
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.34 no.7
    • /
    • pp.35-44
    • /
    • 2006
  • When control surface failure occurs, it is conventional to correct a current control or to transform to other control. In this paper, instead of adopting a conventional way, a reconfiguration method which compensate the failure with alternative control surface deflection, depending on the level of failure, by using neural network and PCH(Pseudo-Control Hedging). The Conroller is designed of inner-loop(SCAS : Stability Command Augmentation System) with DMI(Dynamic Model Inversion) and outer-loop with Y axis acceleration feedback for a coordinate turn. Additionally, double PCH method was adopted to prevent actuator saturation and input command was generated to compensate for failure. At the end, The feasibility of the method is validated with randomly selected failure scenarios.

Application Management System with ZeroMQ and Alarms in Distribution Management System (배전운영 시스템에서의 ZeroMQ와 알람 정보를 이용한 운영기능 관리 시스템)

  • Kim, Pil-Seok;Kang, Ho-Young;Lim, Il-Hyung;Park, Jong-Ho;Shin, Yong-Hak
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.64 no.8
    • /
    • pp.1161-1167
    • /
    • 2015
  • Distribution Management System(DMS) ienhancing distribution automation system-based operation efficiency is an optimized system by various operational applications in a distribution network. DMS employs various applications like topology reconfiguration, volt/var control, and restoration at events such as overload, voltage violation, and a fault in a distribution system. An operation efficiency to employ multi-applications as restoration with short-term load forecasting is higher than a performance by a single application; and the applications are accomplished by an operator’s control. Applications’ combination is determined by various alarm information which means critical issues in order to operate a distribution system. Thus, this paper proposes an application management system which can configure application combination, control applications depending on alarm information and check their performance condition. The proposed application management system can be customized by operator easily and have high operation efficiency and reliability because it is worked by reviewed alarm information from operator.

Rapid-to-deploy reconfigurable wireless structural monitoring systems using extended-range wireless sensors

  • Kim, Junhee;Swartz, R. Andrew;Lynch, Jerome P.;Lee, Jong-Jae;Lee, Chang-Geun
    • Smart Structures and Systems
    • /
    • v.6 no.5_6
    • /
    • pp.505-524
    • /
    • 2010
  • Wireless structural monitoring systems consist of networks of wireless sensors installed to record the loading environment and corresponding response of large-scale civil structures. Wireless monitoring systems are desirable because they eliminate the need for costly and labor intensive installation of coaxial wiring in a structure. However, another advantageous characteristic of wireless sensors is their installation modularity. For example, wireless sensors can be easily and rapidly removed and reinstalled in new locations on a structure if the need arises. In this study, the reconfiguration of a rapid-to-deploy wireless structural monitoring system is proposed for monitoring short- and medium-span highway bridges. Narada wireless sensor nodes using power amplified radios are adopted to achieve long communication ranges. A network of twenty Narada wireless sensors is installed on the Yeondae Bridge (Korea) to measure the global response of the bridge to controlled truck loadings. To attain acceleration measurements in a large number of locations on the bridge, the wireless monitoring system is installed three times, with each installation concentrating sensors in one localized area of the bridge. Analysis of measurement data after installation of the three monitoring system configurations leads to reliable estimation of the bridge modal properties, including mode shapes.

Community Radio's Interaction with Local Community Residents A Field Report on Mapo FM's Case (공동체 라디오와 지역 공동체 구성원의 상호작용에 대한 현장연구 마포 FM 사례를 중심으로)

  • Ban, Myeong Jin;Kim, Young Chan
    • Korean journal of communication and information
    • /
    • v.78
    • /
    • pp.79-115
    • /
    • 2016
  • This study, by proposing a case study of community radio, attempts to expand the horizon of academic and social discussion on the medium that has been disproportionately skewed towards discourses on alternative media, technology, and programming content. As residents of local community actively participate in the production process, they reconstruct their cultural identities. In that sense, community radio is a medium that makes it possible the re-negotiation and reconfiguration of cultural identities of local residents. That is to say, a case study on the specific ways in which community residents appropriate community radio in reconstructing their identities offers us some entry points where we may come up with a new perspective on the identity of community radio. The results of fieldwork show that community radio, as it is closely intertwined with the residents' participatory cultural practices, is a medium of 'lived culture' -i.e., a medium that contributes to the making of civility, communitarianism, and social network. Community radio, then, may be redefined as an interactive medium that contributes to the formation of social rapport and solidarity.

  • PDF

Node Density Based Routing in Ad Hoc Networks (노드 밀집도 기반 애드학 라우팅)

  • Kim Sang-Kyung;Choi Seung-Sik
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.535-542
    • /
    • 2005
  • This paper proposes an on-demand ad hoc routing protocol, Node Density Based Routing (NDBR), which enhances the routing performance applying a new method to establish alternate patlis. It is important to reserve alternate paths for the route from source to destination in mobile ad hoc networks that are susceptible to failure due to the movement or the power exhaustion of mobile nodes. NDBR aims to establish a route that contains more alternate paths toward the destination by involving intermediate nodes with relatively more adjacent nodes in a possible route, and introduces a new routing criterion called 'node density.' This approach can localize the effects of route failures, and reduce control traffic overhead and route reconfiguration time by enhancing the reachability to the destination node without source-initiated route re-discoveries at route failures. This paper describes the route setup procedure using node density and the route re-configuration procedures employing alternate path information at the intermediate nodes. We show the performance of our routing schemes through a series of simulations using the Network Simulator 2 (ns-2).

Distributed Authentication Model using Multi-Level Cluster for Wireless Sensor Networks (무선센서네트워크를 위한 다중계층 클러스터 기반의 분산형 인증모델)

  • Shin, Jong-Whoi;Yoo, Dong-Young;Kim, Seog-Gyu
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.3
    • /
    • pp.95-105
    • /
    • 2008
  • In this paper, we propose the DAMMC(Distributed Authentication Model using Multi-level Cluster) for wireless sensor networks. The proposed model is that one cluster header in m-layer has a role of CA(Certificate Authority) but it just authenticates sensor nodes in lower layer for providing an efficient authentication without authenticating overhead among clusters. In here, the m-layer for authentication can be properly predefined by user in consideration of various network environments. And also, the DAMMC uses certificates based on the threshold cryptography scheme for more reliable configuration of WSN. Experimental results show that the cost of generation and reconfiguration certification are decreased but the security performance are increased compared to the existing method.

  • PDF

A Study on the Link Cost Estimation for Data Reliability in Wireless Sensor Network (무선 센서 네트워크에서 데이터 신뢰성을 위한 링크 비용 산출 방안에 관한 연구)

  • Lee, Dae-hee;Cho, Kyoung-woo;Kang, Chul-gyu;Oh, Chang-heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.571-573
    • /
    • 2018
  • Wireless sensor networks have unbalanced energy consumption due to the convergence structure in which data is concentrated to sink nodes. To solve this problem, in the previous research, the relay node was placed between the source node and the sink node to merge the data before being concentrated to the sink node. However, selecting a relay node that does not consider the link quality causes packet loss according to the link quality of the reconfigured routing path. Therefore, in this paper, we propose a link cost calculation method for data reliability in routing path reconfiguration for relay node selection. We propose a link cost estimation formula considering the number of hops and RSSI as the routing metric value and select the RSSI threshold value through the packet transmission experiment between the sensor modules.

  • PDF

A Secure Routing Scheme for Wireless Sensor Network with a Mobile Sink (이동 싱크를 가진 무선 센서 네트워크의 안전한 라우팅 기법)

  • Kim Taekvun;Kim Sangjin;Lee Ik-Seob;Yoo Dongyoung;Oh Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.53-64
    • /
    • 2005
  • Previous secure routing protocols for wireless sensor networks assume that a sink is static. In many cases, however, a sink operated by man or vehicle is moving. A mobile sink creates a lot of technical problems such as reconfiguration of routing path exposure of sink location. and selection of secure access point node, which are not considered by many previous researches. In this paper, we propose a new secure routing scheme for solving such problems using hi-directional hash chain and delegation nodes of grid structure. This scheme provides a secure routing path and prevents attacker from recognizing the location of a mobile sink in sensor networks. This new method reduces the resource requirements compared to the cashed routing schemes. Simulation results also show that the system is secure and efficient enough.

War-game Simulator Using Event based Web Services (이벤트 기반 웹서비스를 이용한 워게임 시뮬레이터 제작)

  • Lee, Jae-Min;Kim, Byoung-Chul;Kim, Tae-Sup;Lee, Kang-Sun
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.33-39
    • /
    • 2010
  • As future warfare becomes network-centric, war-game simulators require high interoperability between networked forces and dynamic reconfiguration in accordance with war events. In this paper, we propose an event-driven methodology to develop dynamic war-game simulations. Federates are developed by event-driven web services. The event-driven web services consistently sense war events and response them only if they are interested. By the sense-and-response mechanism and asynchronous event processing, we are able to save simulation time. An Anti-Surface-Warfare simulator is constructed to demonstrate the methodology and suggests that event-driven web services are efficient to model and simulate warfare where numerous events are generated from hardware systems and people dispersed on the network.

High-availability Seamless Redundancy(HSR) Protocol for Automobile Networks (차세대 차량 네트워크를 위한 HSR (High-availability seamless Redundancy) 프로토콜 적용 연구)

  • Park, Jin-Pyo;Nsaif, Saad Allawi;Rhee, Jong-Myung
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.3
    • /
    • pp.33-40
    • /
    • 2014
  • One of the most important requirements for the Ethernet-based automobile is the reliability. In order to achieve this goal, we propose using the High-availability Seamless Redundancy (HSR) protocol (IEC 62439-3 clause 5) in these networks. The HSR protocol provides duplicated frame copies for each sent frame, which means that the destination node will receive at least one copy in case the second copy is lost due to a failure. In other words, there will be no network stoppage even if failure occurs. Moreover, the destination node will receive at least one frame copy with zero-recovery time (seamless) and it will not need to wait to receive the other copy if the first one is lost, which occurs it in the Ethernet standard, as a result of reconfiguration of the network paths. However, the main drawback of the HSR protocol is the unnecessary redundant traffic that is caused by the duplicated frames. Several solutions, including QR, VRing, RURT, and DVP, have already been proposed to improve the traffic performance of the HSR protocol. In this paper, we propose three automobile network topologies. each of which has pros and cons depending on the automobile requirements. Then we applied the HSR protocol with and without the QR and VRing approaches to each scenario. The comparison among these topologies depend on the traffic performance result for each of them. The QR and VRing approaches give a better traffic reduction percentage, ranging from 48% to 75% compared to the standard HSR protocol. Therefore they could limit the redundant traffic in automobile networks when the HSR protocol is used instead of the Ethernet network, which does not provide any seamless recovery if a failure occurs.