• Title/Summary/Keyword: remote monitoring and control

Search Result 718, Processing Time 0.022 seconds

Ungrounded System Fault Section Detection Method by Comparison of Phase Angle of Zero-Sequence Current

  • Yang, Xia;Choi, Myeon-Song;Lee, Seung-Jae;Lim, Il-Hyung;Lim, Seong-Il
    • Journal of Electrical Engineering and Technology
    • /
    • v.3 no.4
    • /
    • pp.484-490
    • /
    • 2008
  • In this paper, an integrated fault section detection and isolation strategy is proposed based on the application of the Distribution Automation System(DAS) utilizing advanced IT and communication technologies. The Feeder Remote Terminal Unit(FRTU) has been widely used to collect data in the Korean distribution system. The achieved data is adopted in this method for detecting multiple fault types. Especially in the case of single phase-to-ground fault, the fault section is detected by comparison of the zero-sequence current phase angle. The test results have verified the effectiveness of the proposed method in a radial distribution system through extensive simulations in Matlab/Simulink. Furthermore, a communication-based demo system identical to the simulation model has been developed, and it can be applied as an online monitoring and control program for fault section detection and isolation.

CFD Analyses on Cactus PSE(Problem Solving Environment) (Cactus PSE의 활용을 통한 전산유체역학 문제 해석)

  • Ko S. H.;Cho K. W.;Na J.;Kim Y. G.;Song Y. D.;Kim C.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2005.04a
    • /
    • pp.47-50
    • /
    • 2005
  • The Grid'[1] means the collaboration of computing and experimental resources in dispersed organizations by high-speed network. It has been paid much attention for an unlimited number of potential resources available and the easiness to build collaborative environments among multiple disciplines. However, the difficulty in establishing the environments and accessing and utilizing the resources has prevented application scientists from conducting Grid computing. Thus, the present study focuses on building PSE(Problem Solving Environment) which assists application researchers to easily access and utilize the Grid. The Cactus toolkit, originally developed by astrophysicists, is used as a base frame for Grid PSE. Some modules are newly developed and modified for CFD(Computational Fluid Dynamics) analysis. Simultaneously, a web portal, Grid-One portal, is built for remote monitoring/control and job migration. Cactus frame through the web portal service has been applied to various CFD problems, demonstrating that the developed PSE is valuable for large-scaled applications on the Grid.

  • PDF

The real-time Traffic Monitoring System Design for the in-service of ATM Network (ATM망의 서비스 회선에 대한 실시간 트래픽 모니터링 시스템 설계)

  • 정승국;이영훈
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.3
    • /
    • pp.115-121
    • /
    • 2002
  • This paper discussed to design system to overcome time, place and service limitation in the case of extracting traffic on active service in the ATM network. There are several specification in this system : for a remote control function, a real-time traffic extraction from ATM link on service without affect in-service, and an O&M(Operating and Maintenance) cost down effect. This paper include the requirement, module structure, operating characteristics and command for the developing function. This product installed at the KT's telephone office. And we have tested the stability, reliability and functionality. As the result, it was verified that this system commercially is abel to use without especial problem. Hereafter, we are improving module structure for the cost down.

  • PDF

Interannual Changes of Bar Morphology in the Han River Estuary Using Satellite Imagery (인공위성에 의한 한강 하구역 퇴적상 경년 변동 특성 조사)

  • Yang, Chan-Su
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2007.11a
    • /
    • pp.57-60
    • /
    • 2007
  • The Han River is divided into North and South Korea by NLL(Northern Limit Line) and its area has been blocked by CCL(Civil Control Line) since the Korean War in 1950. Satellite remote sensing, therefore, is uniquely suited to monitoring bar transformation in the region. In river with bar, the characteristics of its physical conditions have a close relationship with bar morphology. In this paper, a monitoring approach of bar transformation in the Han River Estuary is presented using RADARSAT/SAR images from 2000 to 2005 and spatial patterns of bar morphology are presented. It could be said that in the estuary vegetated area and natural levees are developed well, but bars are shifted after an event like a flood. It is also showed that suspended solids such as silt transported through the estuary could contribute highly to a sedimentation environment around Incheon.

  • PDF

CACH Distributed Clustering Protocol Based on Context-aware (CACH에 의한 상황인식 기반의 분산 클러스터링 기법)

  • Mun, Chang-Min;Lee, Kang-Whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.6
    • /
    • pp.1222-1227
    • /
    • 2009
  • In this paper, we proposed a new method, the CACH(Context-aware Clustering Hierarchy) algorithm in Mobile Ad-hoc Network(MANET) systems. The proposed CACH algorithm based on hybrid and clustering protocol that provide the reliable monitoring and control of a variety of environments for remote place. To improve the routing protocol in MANET, energy efficient routing protocol would be required as well as considering the mobility would be needed. The proposed analysis could help in defining the optimum depth of hierarchy architecture CACH utilize. Also, the proposed CACH could be used localized condition to enable adaptation and robustness for dynamic network topology protocol and this provide that our hierarchy to be resilient. As a result, our simulation results would show that a new method for CACH could find energy efficient depth of hierarchy of a cluster.

Development of Safety Sensor for Vehicle-Type Forest Machine in Forest Road

  • Ki-Duck Kim;Hyun-Seung Lee;Gyun-Hyung Kim;Boem-Soo Shin
    • Journal of Forest and Environmental Science
    • /
    • v.39 no.4
    • /
    • pp.254-260
    • /
    • 2023
  • A sensor system has been developed that uses an ultrasonic sensor to detect the downhill slope on the side of a forest road and prevents a vehicle-type forest machine from rolling down a mountainside. A specular reflection of ultrasonic wave might cause severe issues in measuring distances to targets. By investigating the installation angle of the sensor to minimize the negative effects of specular reflection, the installation angle of lateral monitoring ultrasonic sensor could be determined based on the width of road shoulder. Obstacles such as small rocks or piece of log in a forest road may cause the forest machine to be overturned while the machine riding over due to excessive its posture change. It was determined that the laser sensor could be a part of a sensor system capable of specifying the location and size of small obstacles. Not only this sensor system including ultrasonic and laser sensors can issue a warning of dangerous sections to drivers in forest forwarders currently in use, but also it can be used as a driving safety sensor in autonomous forest machine or remote-control forest machine in the future.

Improvement of Hierarchical Routing in ZigBee Networks (지그비 계층적 라우팅의 성능 향상 기법)

  • Kim, Taehong;Kim, Daeyoung;Yoo, Seong-Eun;Sung, Jongwoo;Kim, Youngsoo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.1 no.2
    • /
    • pp.104-112
    • /
    • 2006
  • ZigBee is the emerging industrial standard for ad hoc networks based on IEEE 802.15.4. It is used for low data rate and low power wireless network applications. Expected applications of ZigBee include wireless sensor networks for remote monitoring, home control, and industrial automation. Since one of the most important design goals of ZigBee is to reduce the installation and running costs, the ZigBee stack is embedded in the cheap and small micro-controller unit. The hierarchical routing algorithm is used for ZigBee end devices which have very limited resources. Using the block addressing scheme, end devices can send data to the destination without a routing table. However, hierarchical routing has the problem that the packets follow the tree hierarchy to the destination even if the destination is located nearby. In this paper, we propose a scheme to improve the hierarchical routing algorithm in ZigBee networks by employing the neighbor table that is originally used together with the routing table. We suggest selecting the neighbor node that has the minimum remaining hops to the destination as the next hop node. Simulation result shows that the proposed scheme saves more than 30% of the hop counts compared with the original hierarchical routing.

  • PDF

Analysis and Experiment of 2.4GHz Radio Frequency Interference for Wireless Sensor Networks-based Applications (WSNs 기반의 어플리케이션을 위한 2.4GHz 대역의 주파수 간섭 분석 및 검증 실험)

  • Kwon, Jong-Won;Ahn, Gwang-Hoon;Kim, Seok-Rae;Kim, Hie-Sik;Kang, Sang-Hyuk
    • Proceedings of the IEEK Conference
    • /
    • 2009.05a
    • /
    • pp.290-292
    • /
    • 2009
  • With advance in technologies for wireless sensor networks(WSNs), 2.4 GHz band has become gradually attractive due to increase in low-power wireless communication devices. Especially ZigBee(IEEE 802.15.4-based) technology whose frequency band includes the 2.4GHz industrial, scientific and medical band providing nearly worldwide availability has been universally applicable to a various remote monitoring system and applications related home network system. However network throughput of these systems is significantly deteriorated due to this ISM band is a license-exemption used in a variety of low-power wireless communication devices. For instance, other IEEE 802 wireless standards such as Bluetooth, WLAN, Wi-Fi and others cause radio interference to ZigBee. The experiments was carried out to analyze radio frequency interference between heterogeneous devices using ISM bands to improve the limited frequency utility factor. Finally this paper suggests a frequency hopping-based adaptive multi-channel methods to decrease interference with empirical results.

  • PDF

A Study on the Security Framework in IoT Services for Unmanned Aerial Vehicle Networks (군집 드론망을 통한 IoT 서비스를 위한 보안 프레임워크 연구)

  • Shin, Minjeong;Kim, Sungun
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.897-908
    • /
    • 2018
  • In this paper, we propose a security framework for a cluster drones network using the MAVLink (Micro Air Vehicle Link) application protocol based on FANET (Flying Ad-hoc Network), which is composed of ad-hoc networks with multiple drones for IoT services such as remote sensing or disaster monitoring. Here, the drones belonging to the cluster construct a FANET network acting as WTRP (Wireless Token Ring Protocol) MAC protocol. Under this network environment, we propose an efficient algorithm applying the Lightweight Encryption Algorithm (LEA) to the CTR (Counter) operation mode of WPA2 (WiFi Protected Access 2) to encrypt the transmitted data through the MAVLink application. And we study how to apply LEA based on CBC (Cipher Block Chaining) operation mode used in WPA2 for message security tag generation. In addition, a modified Diffie-Hellman key exchange method is approached to generate a new key used for encryption and security tag generation. The proposed method and similar methods are compared and analyzed in terms of efficiency.

A Development of Cipher Device based on Embedded Linux for Serial Communication in SCADA (임베디드 리눅스 기반의 SCADA 직렬통신 구간 암호화 장치 개발)

  • Lee, Jong-Joo;Kim, Seog-Joo;Kang, Dong-Joo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.4
    • /
    • pp.25-32
    • /
    • 2010
  • The Supervisory Control and Data Acquisition Systems (SCADA) system provides monitoring, data gathering, analysis, and control of the equipment used to manage most infrastructure. The SCADA Network is implemented in a various manner for larger utilities, and multiple types of protocol and communication interfaces are used to network the control center to remote sites. The existing SCADA equipment and protocols were designed and implemented with availability and efficiency, and as a result security was not a consideration. So, performance, reliability, flexibility and safety of SCADA systems are robust, while the security of these systems is often weak. This makes some SCADA networks potentially vulnerable to disruption of service, process redirection, or manipulation of operational data that could result in public safety concerns and/or serious disruptions to the infrastructure. To reduce the risks, therefore, there is a need to have a security device such as cipher devices or cryptographic modules for security solutions. In this paper we develop an embedded cipher device for the SCADA equipment. This paper presents a cipher device designed to improve the security of its networks, especially in the serial communication.