• Title/Summary/Keyword: remote control technologies

Search Result 153, Processing Time 0.042 seconds

Land Mine Detecting Technology by Using IR Cameras

  • Shimoi, Nobuhiro;Takita, Yoshihiro;Nonami, Kenzo;Wasaki, Katsumi
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.28.4-28
    • /
    • 2001
  • This paper proposes an IR camera system that performs the task of removing mines for humanitarian purposes. Because of the high risks involved, it is necessary to conduct mine detection from the most remote endeavoring. By mating use of infrared ray (IR) cameras, scattered mines can be detected from remote locations. In the case of mines buried in the ground, detection is possible if the peripheral temperature difference is large enough between the ground and mine weapon. As one of the world´s advanced nations in sensor technology, Japan should promote surveys and studies for detecting mines safely by using its advanced remote sensing technologies.

  • PDF

Design and Implementation of a Multiple Client Remote Management System using WMI (WMI를 이용한 다중 클라이언트 원격 관리 시스템 설계 및 구현)

  • Yeo, Myung-Ho;Park, Jun-Ho;Kang, Gwang-Goo;Kwon, Hyun-Ho;Lee, Jin-Ju;Lee, Ji-Hee;Choi, Hyoung-Rak;Jang, Su-Min;Seo, Won-Seok;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.10
    • /
    • pp.26-35
    • /
    • 2010
  • Recently, multi client PC technologies that several users can use one set of computer at the same time are being designed to use the surplus computer resource. In general, as the existing PC management system considers only a single client PC that only one user uses a computer, various kinds of complicated problems may be arisen. This paper designs and realizes a remote management system that can monitor and control the information used in the windows based OS multi-client using WMI technology. The proposed system herein uses WMI technology and newly defined client management protocol and provides the monitoring and control functions on individual resource use information of multi-client. As well, it provides a communication function between the server and the client, and locking setting and access control functions.

A study on Access Control Model for Home Network (홈 네트워크 접근 제어 모델에 관한 연구)

  • Kim, Geon-Woo;Kim, Do-Woo;Lee, Jun-Ho;Hwang, Jin-Beon;Han, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.841-844
    • /
    • 2005
  • As various mobile technologies, sensor technologies, remote control and infrastructure are developing and expectations on quality of life are increasing, a lot of researches and developments on home network technologies and services are actively on going. Until now, we focused on how to provide users with high-level home network services, while not many researches on home network security for guaranteeing safety are progressing, So, in this paper, we propose an access control model for home network that provides various users with home network services up one's characteristics and features, and protects home network systems from illegal accesses or intrusions.

  • PDF

Home Gateway-based Home Network Access Control Mechanism (홈게이트웨이 기반 홈네트워크 접근제어 메커니즘)

  • Kim Geon-Woo;Kim Do-Woo;Lee Jun-Ho;Hwang Jin-Beon;Han Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.733-736
    • /
    • 2006
  • As various mobile technologies, sensor technologies, remote control and network infrastructure are developing and expectations on quality of life are increasing, a lot of researches and developments on home network technologies and services are actively on going. Until now, home network is just beginning, and we are developing home network services necessary to users, incrementing easiness, however we need to research on the safety of home network system guaranteeing the easiness as the services are going actively. So, in this paper, we propose the access control mechanism for protecting the home network system against indoor/outdoor illegal accesses and unauthorized accesses.

  • PDF

Near Real Time Burnt Scars Monitoring using MODIS in Thailand

  • Tanpipat Veerachai;Honda Kiyoshi;Akaakara Siri
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.149-152
    • /
    • 2005
  • A new methodology to detect forest fire burnt scars at near real time using MODIS (Moderate-resolution Imaging Spectroradiometer) data is presented here with a goal of introducing a new and improved capability to detect forest fire burnt scars in Thailand. This new technology is expected to increase the efficiency and effectiveness of the forest fire tackling resources distribution and management of the country. Using MODIS data in burnt scars detection has two major advantages - high availability of data and high resolution per performance ratio. Results prove the near real time algorithm suitable and working well in order to monitor the forest fire dynamic movement. The algorithm is based on the threshold separated linear equation of burnt and un-burnt. A ground truth experiment confirms the burnt and un-burnt? areas characteristics (temperature and NDVI). A threshold line on a scatter plot of Band I and Band 2 is determined to separate the burnt from un-burnt pixels. The different threshold values of NDVI and temperature use to identify pixels' anomaly, abnormal low NDVI and high temperature. The overlay (superimpose) method is used to verify burnt pixels. Since forest fire is a dynamic phenomenon, MODIS burnt scars information is suiting well to fill in the missing temporal information of LANDSAT for the forest fire control managing strategy in Thailand. This study was conducted in the Huai-Kha-Kaeng (HKK) Wildlife Sanctuary, Thailand

  • PDF

A Study on Time Synchronization Method for Analyzing the Network Performance of Remote Control System (원격운용 시스템의 네트워크 성능분석을 위한 시간동기화 방안에 관한 연구)

  • Yang, DongWon;Kim, Namgon;Kim, Dojong
    • Journal of IKEEE
    • /
    • v.26 no.2
    • /
    • pp.141-149
    • /
    • 2022
  • With the development of artificial intelligence and unmanned technologies, the remote surveillance/autonomous driving systems have been actively researched. For an effective performance analysis of the developed remote control system, it is important to record the data of it in real time. In addition, in order to analyze the performance between the control system and the remote system, the recorded data from them should be synchronized with time. In this paper we proposed a novel time synchronization method for the remote control system. The proposed remote control system satisfies the time difference of the recorded data within 1 ms, and we can reduce the time difference by using a CPU shielding and affinity setting. The performance of the proposed method was proved through various network data storage experiments. And the experiments confirmed that the proposed method can be applied to recording devices of unmanned ground vehicles and control vehicles. The proposed method will be used as a method for analyzing network data of UGV-R (Unmanned Ground Vehicle - Reconnaissance).

A Study on Analysis and Control of Circumvent Connection to the Private Network of Corporation (기업 사설 네트워크 우회 접속 분석 및 통제 대책 연구)

  • Lee, Chul-Won;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.183-194
    • /
    • 2010
  • A company's private network protected by a firewall and NAT(Network Address Translation) is not accessible directly through an external internet. However, as Reverse Connection technology used by NetCat extends to the technologies such as SSH Tunnel or HTTP Tunnel, now anyone can easily access a private network of corporation protected by a firewall and NAT. Furthermore, while these kinds of technologies are commercially stretching out to various services such as a remote control and HTTP Tunnel, security managers in a company or general users are confused under the circumstances of inner or outer regulation which is not allowed to access to an internal system with a remote control. What is more serious is to make a covert channel invading a company's private network through a malicious code and all that technologies. By the way, what matters is that a given security system such as a firewall cannot shield from these perceived dangers. So, we analyze the indirect access of technological methods and the status quo about a company's internal network and find a solution to get rid of the related dangers.

Trends in the Telepresence Technologies and Services Beyond 5G (5G를 향한 영상회의 기술 및 서비스 동향)

  • Lee, H.K.;Han, M.K.;Jang, J.H.
    • Electronics and Telecommunications Trends
    • /
    • v.32 no.5
    • /
    • pp.20-29
    • /
    • 2017
  • In this paper, a video conferencing system, which has been attracting significant attention as an immersive telepresence service owing to the recent emergence of 5G networks, is described. We propose a service platform for Giga Media based video conferencing for 5G convergence services. The video conferencing service consists of a traditional structure that provides information exchange through the transmission of video and voice of remote participants using a Multipoint Control Unit (MCU), a browser-based video conferencing based on WebRTC, a multi-view point video conferencing, and holographic telepresence centered on mixed reality. The paper introduces the trends and detailed structures of various technologies used in the video conferencing system, and compares the video conferencing system technologies and video conferencing service characteristics for the integrated Giga Media platform.

An Integrated Emergency Call System based on Public Switched Telephone Network for Elevators

  • Lee, Guisun;Ryu, Hyunmi;Park, Sunggon;Cho, Sungguk;Jeon, Byungkook
    • International journal of advanced smart convergence
    • /
    • v.8 no.3
    • /
    • pp.69-77
    • /
    • 2019
  • Today, most of elevators have an emergency call facility for emergency situations. However, if the network installed in the elevator is also out of power, it cannot be used for the elevator remote monitoring and management. So, we develop an integrated and unified emergency call system, which can transmit not only telephone call but also data signals using PSTN(Public Switched Telephone Network) in order to remote monitoring and management of elevators, even though a power outage occurs. The proposed integrated emergency call system to process multiple data such as voice and operational information is a multi-channel board system which is composed of an emergency phone signal processing module and an operational information processing module in the control box of elevator. In addition, the RMS(remote management server) systems based on the Web consist of a dial-up server and a remote monitoring server where manages the elevator's operating information, status records, and operational faults received via the proposed integrated and unified emergency call system in real time. So even if there's a catastrophic emergency, the proposed RMS systems shall ensure and maintain the safety of passengers inside the elevator. Also, remote control of the elevator by this system should be more efficient and secure. In near future, all elevator emergency call system need to support multifunctional capabilities to transmit operational data as well as phone calls for the safety of passengers. In addition, for safer elevators, it is necessary to improve them more efficiently by combining them with high-tech technologies such as the Internet of Things and artificial intelligence.

PDA-based Supervisory Control of Mobile Robot (PDA를 이용한 이동로봇 제어)

  • Kim, Seong-Joo;Jung, Sung-Ho;Kim, Yong-Taek;Jeon, Hong-Tae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.12 no.4
    • /
    • pp.379-384
    • /
    • 2002
  • This paper represents the mobile robot system remote controlled by PDA(personal digital assistance). So far, owing to the development of internet technologies, lots of remote control methods through internet have been proposed. To control a mobile robot through internet and guide it under unknown environment, We propose a control method activated by PDA. In a proposed system, PDA acts as a user interface to communicate with notebook as a controller of the mobile robot system using TCP/IP protocol, and the notebook controls the mobile robot system. The information about the direction and velocity of the mobile robot feedbacks to the PDA and the PDA send new control method produced from the fuzzy inference engine.