• Title/Summary/Keyword: wireless control network

Search Result 1,580, Processing Time 0.029 seconds

A Study of Wireless Communication Network Constructing Policy Plan for an Efficient Railroad System Infrastructure (효율적인 철도시스템을 위한 무선통신망 구축정책 방안연구)

  • Lee, Seungho;Kim, Sigion
    • Journal of the Korean Society for Railway
    • /
    • v.16 no.4
    • /
    • pp.262-271
    • /
    • 2013
  • Wireless communication networks are recently taking an important role in railroad systems as railways now require high speed and high density operation with the aid of advanced information technology to improve maintenance efficiency and to handle passenger service growth. Train control systems are consequently changing from track circuitbased systems to communication-based systems. This paper analyses the role of wireless communication networks in recent railroad systems, reviews foreign cases, and then suggests a communication network constructing policy for increased transport capacity increase, securement of safety, and efficient train control.

A study of Human robot Walking Method Using Zigbee Sensor Network (센서 네트워크를 이용한 2족 보행 로봇의 워킹 방법에 관한 연구)

  • Shin, Dae-Seob;Lee, Hyeong-Cheol
    • Proceedings of the IEEK Conference
    • /
    • 2009.05a
    • /
    • pp.375-377
    • /
    • 2009
  • This paper researched the algorithm of robot's walking and action on the basis of robot studied and made at our laboratory and studied how to efficiently control the robot joints by developing wireless Digital Servo Motor using Zigbee Sensor Network Module which is using at wide part recently. I realized the stable walking by adopt Press Sensor at the bottom of robot foot to get stability of walking. Also I let the algorithm calculate the robot movement to make the joint motion and monitored the robot walk to its motion. At this Paper, I studied the method organizing the motion by the each robot walking and measuring the torque applying to the joint. And I also knew that it is possible to make its control and construct hardware more conveniently than them of the existing studied and controling 2Legs Walking Robot by applying it at walking robot and developing wireless servo motor by Zirbee Sensor Network.

  • PDF

Integrated Fire Monitoring System Based on Wireless Multi-Hop Sensor Network and Mobile Robot (무선 멀티 홉 센서 네트워크와 이동로봇을 이용한 통합 화재 감시 시스템)

  • Kim, Tae-Hyoung;Seo, Gang-Lae;Lee, Jae-Yeon;Lee, Won-Chang
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.2
    • /
    • pp.114-119
    • /
    • 2010
  • Network technology has been developed rapidly for digital service in these days. ZigBee, one of the IEEE 802.15.4 protocols, supporting local communication has become the core technology in the wireless network area. In this paper we designed an integrated fire monitoring system using a mobile robot and the ZigBee sensor nodes which are deployed to monitor fires. When a fire breaks out, the image information of the scene of a fire is transmitted by an autonomous mobile robot and we also monitor the current position of the robot. Furthermore, the data around the place where the fire breaks out and the positions of the sensor nodes can be transmitted to a server via the multi-hop communication in the real time.

Online Learning Control for Network-induced Time Delay Systems using Reset Control and Probabilistic Prediction Method (네트워크 기반 시간지연 시스템을 위한 리세트 제어 및 확률론적 예측기법을 이용한 온라인 학습제어시스템)

  • Cho, Hyun-Cheol;Sim, Kwang-Yeul;Lee, Kwon-Soon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.15 no.9
    • /
    • pp.929-938
    • /
    • 2009
  • This paper presents a novel control methodology for communication network based nonlinear systems with time delay nature. We construct a nominal nonlinear control law for representing a linear model and a reset control system which is aimed for corrective control strategy to compensate system error due to uncertain time delay through wireless communication network. Next, online neural control approach is proposed for overcoming nonstationary statistical nature in the network topology. Additionally, DBN (Dynamic Bayesian Network) technique is accomplished for modeling of its dynamics in terms of casuality, which is then utilized for estimating prediction of system output. We evaluate superiority and reliability of the proposed control approach through numerical simulation example in which a nonlinear inverted pendulum model is employed as a networked control system.

Design and Application of a LonRF Device based Sensor Network for an Ubiquitous Home Network (유비쿼터스 홈네트워크를 위한 LonRF 디바이스 기반의 센서 네트워크 설계 및 응용)

  • Ro Kwang-Hyun;Lee Byung-Bog;Park Ae-Soon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.7 no.3
    • /
    • pp.87-94
    • /
    • 2006
  • For realizing an ubiquitous home network(uHome-net), various sensors should be able to be connected to an integrated wire/wireless sensor network. This paper describes an application case of applying LonWorks technology being widely used in control network to wire/wireless sensor network in uHome-net and the design and application of LonRF device that consists of a neuron chip including LonTalk protocol, a 433.92MHz RF transceiver, a sensor, and application programs. As an application example of the LonRF device, the LonRF smart badge that can measure the 3D location of objects in indoor environment and interwork with the uHome-net was developed. LonRF device based home network services were realized on the uHome-net testbed such as indoor positioning service, remote surveillance service and remote metering service were realized. This research shows that LonWorks technology based sensor network could be applicable to the control network in an ubiquitous home network and the LonRF device can be used as a wireless node in various sensor networks.

  • PDF

A Study on the Performance Enhancement of the Macro Handover in HMIP According to Protocol Layers

  • Woo, Jong-Jung;Ahn, Chi-Hyun
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.2
    • /
    • pp.168-172
    • /
    • 2010
  • The Network-based handover still has problems such as the transmission delays and the packet losses in the case of macro mobility, though technological advances have been made in the wireless and mobile communication. For end-to-end handover, the link bandwidth has been reduced in the wireless network due to its burst errors and congestion control. To overcome such problems, we propose a new scheme of the macro handover according to the protocol layer. The proposed macro handover is implemented on the network layer to partially substitute wired signaling for wireless signaling, to flexibly employ buffers, and on the transport layer to postpone its retransmission time. We have performed extensive simulation using ns-2 and the result shows that our proposed scheme outperforms the other existing schemes in terms of transmission delay, packet loss, and data transfer rate during the handovers.

Power control in Ad Hoc network using ZigBee/IEEE802.15.4 Standard (ZigBee/IEEE802.15.4 표준을 사용하는 Ad Hoc 네트워크 상의 전력 통제)

  • Kirubakaran K.;Lee Jae-Kwang
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.219-222
    • /
    • 2006
  • In this paper an intrusion detection system technique of wireless Ad Hoc network is explained and the advantage of making them work in IEEE 802.15.4/ZigBee wireless standard is also discussed. The methodology that is mentioned here is intrusion detection architecture based on a local intrusion database [1]. An ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. Due to increased connectivity (especially on the Internet), and the vast spectrum of financial possibilities that are opening up, more and more systems are subject to attack by intruders. An ideal IDS should able to detect an anomaly caused by the intruders quickly so that the misbehaving node/nodes can be identified and appropriate actions (e.g. punish or avoid misbehaving nodes) can be taken so that further damage to the network is minimized

  • PDF

Access Control to Objects and their Description in the Future Network of Information

  • Renault, Eric;Ahmad, Ahmad;Abid, Mohamed
    • Journal of Information Processing Systems
    • /
    • v.6 no.3
    • /
    • pp.359-374
    • /
    • 2010
  • The Future Internet that includes Real World Objects and the Internet of Things together with the more classic web pages will move communications from a nodecentric organization to an information-centric network allowing new a paradigm to take place. The 4WARD project initiated some works on the Future Internet. One of them is the creation of a Network of Information designed to enable more powerful semantic searches. In this paper, we propose a security solution for a model of information based on a semantic description and search of objects. The proposed solution takes into account both the access and the management of both objects and their descriptions.

Implementation of a MAC protocol for wireless sensor networks (센서 네트워크의 MAC 프로토콜 구현)

  • Kim Hayang;Kim Minjung;Kim Kyungae;Kim Jintae;Lee Seungjun
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2004.11a
    • /
    • pp.291-294
    • /
    • 2004
  • Wireless sensor network을 위 한 MAC(Medium Access Control) layer를 low-rate WPAN을 목적으로 한 IEEE 802.15.4 사양에 따라 구현하고 검증하였다. 센서 네트워크의 노드는 배터리로 동작하므로 에너지 소모가 가장 큰 걸림돌이 된다. power saving을 위한 몇 가지 방법을 포함한 IEEE 802.15.4 MAC protocol을 구현함으로써 wireless sensor network에 적용 가능함을 보였다.

  • PDF

A DDoS attack Mitigation in IoT Communications Using Machine Learning

  • Hailye Tekleselase
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.170-178
    • /
    • 2024
  • Through the growth of the fifth-generation networks and artificial intelligence technologies, new threats and challenges have appeared to wireless communication system, especially in cybersecurity. And IoT networks are gradually attractive stages for introduction of DDoS attacks due to integral frailer security and resource-constrained nature of IoT devices. This paper emphases on detecting DDoS attack in wireless networks by categorizing inward network packets on the transport layer as either "abnormal" or "normal" using the integration of machine learning algorithms knowledge-based system. In this paper, deep learning algorithms and CNN were autonomously trained for mitigating DDoS attacks. This paper lays importance on misuse based DDOS attacks which comprise TCP SYN-Flood and ICMP flood. The researcher uses CICIDS2017 and NSL-KDD dataset in training and testing the algorithms (model) while the experimentation phase. accuracy score is used to measure the classification performance of the four algorithms. the results display that the 99.93 performance is recorded.