• Title/Summary/Keyword: wireless location

Search Result 1,174, Processing Time 0.027 seconds

TELE-OPERATIVE SYSTEM FOR BIOPRODUCTION - REMOTE LOCAL IMAGE PROCESSING FOR OBJECT IDENTIFICATION -

  • Kim, S. C.;H. Hwang;J. E. Son;Park, D. Y.
    • Proceedings of the Korean Society for Agricultural Machinery Conference
    • /
    • 2000.11b
    • /
    • pp.300-306
    • /
    • 2000
  • This paper introduces a new concept of automation for bio-production with tele-operative system. The proposed system showed practical and feasible way of automation for the volatile bio-production process. Based on the proposition, recognition of the job environment with object identification was performed using computer vision system. A man-machine interactive hybrid decision-making, which utilized a concept of tele-operation was proposed to overcome limitations of the capability of computer in image processing and feature extraction from the complex environment image. Identifying watermelons from the outdoor scene of the cultivation field was selected to realize the proposed concept. Identifying watermelon from the camera image of the outdoor cultivation field is very difficult because of the ambiguity among stems, leaves, shades, and especially fruits covered partly by leaves or stems. The analog signal of the outdoor image was captured and transmitted wireless to the host computer by R.F module. The localized window was formed from the outdoor image by pointing to the touch screen. And then a sequence of algorithms to identify the location and size of the watermelon was performed with the local window image. The effect of the light reflectance of fruits, stems, ground, and leaves were also investigated.

  • PDF

AN EVENT-BASED MIDDLEWARE FOR ANALYZING CONTEXT INFORMATION UNDER USN ENVIRONMENT

  • Lee, Yong-Mi;Nam, Kwang-Woo;Kim, Hi-Seok;Ryu, Keun-Ho
    • Proceedings of the KSRS Conference
    • /
    • 2007.10a
    • /
    • pp.568-572
    • /
    • 2007
  • With the proliferation of advanced wireless network and sensor technologies, smart devices under USN(ubiquitous sensor network) environment are capable of collecting context information such as temperature, humidity, weight, and location about objects at real time. Therefore, applications must be able to analyze collected information and notify useful information to wanted users timely. This service can be realized by implementing an event-based middleware. In the middleware, event messages collected from physical environment will be filtered according to profiles that users define in advance and the result will be sent to the interested users. In this paper, we present XML-based event model, ECA-based profile model, and the architecture of an event-based middleware suitable to USN environment. We will also model and describe them using the examples of logistics area. By implementing the system based on the design above, the middleware enable applications or users to easily access to physical sources. The proposed middleware can also apply to not only logistics area but also other various areas under USN environment such as intelligent traffic control system, national disaster management system and u-medical system.

  • PDF

Performance of Internet DGPS Using Active X Control (Active X 컨트롤을 이용한 인터넷 DGPS 구현)

  • 강준묵;이용욱;이은수;조성호
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2003.04a
    • /
    • pp.37-44
    • /
    • 2003
  • The aim of this research was performance of Web-based real time DGPS using MS visual basic 6.0 Active X control. This system supported the navigation of rover by transmitting the DGPS correction information of base station via internet and monitored the moving of rover by displaying the corrected results received from rover as well as permitting Web users monitoring for rover. The Web-based DGPS server and the client system using MS visual basic 6.0 Active X control for DGPS displayed on Web-browser with the pre analysis was constructed and the system loading test via Web-browser was performed after debugging this system through the static GPS test and publishing it on Web. Also, the wireless internet DGPS test on Web by changing the distance between a base station and a rover was carried out. As the result of the test, the real time DGPS could be performed by transmitting the correction message which calculated from the server system to the client system continually. The rover could be managed by displaying the location information which received from the client system. Other users also could monitor the rover by connecting with this system via internet in real time.

  • PDF

Applications of Java Computing Technology to GPS/GIS-based AVL(Automated Vehicle Location) System

  • Kim, Kwang-Soo;Kim, Min-Soo;Lee, Jae-Yeon;Lee, Ki-Won;Lee, Jong-Hun
    • Proceedings of the KSRS Conference
    • /
    • 1998.09a
    • /
    • pp.149-152
    • /
    • 1998
  • Nowadays, GIS, as multi-discipline information system, is closely linked with GPS application in conjunction with GIS-T or Logistics GIS. With this R&D trend. CPS/GIS application system for AVL is newly developed in this study. This AVL is designed and implemented by using pure Java computing technology towards com ing Car-equipped wireless Internet PC age, and main features of Java are included at this system: Platform independence, Multi-thread processing, and Object-oriented paradigm. While, because core modules of this AVL are based on GIS spatial engine, unlike other commercial AVLs, large spatial database problem handling digital image/spatial information and attribute information and direct access problem of GIS data is easily dealt with. this system can directly access external database by using JDBC: MS Access for desktop version and Oracle for W/S version. Finally, it is thought that Java-based AVL, one of CPS/CIS applications, can be easily extended into other prospective GIS applications: Land surveyor supporting system, Flight tracking system, 3D facility management system with CPS, and so forth.

  • PDF

Dynamic Head Election Method For Energy-Efficient Cluster Reconfiguration In Wireless Sensor Networks (무선 센서망에서 에너지 효율적인 클러스터 재구성을 위한 동적 헤드 선출 방법)

  • Jo Yong-hyun;Lee Hyang-tack;Roh Byeong-hee;Yoo S.W.
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11A
    • /
    • pp.1064-1072
    • /
    • 2005
  • For the efficient operation of sensor networks, it is very important to design sensor networks for sensors to utilize their energies in very effective ways. Cluster-based routing schemes such as LEACH can achieve their energy efficiencies by delivering data between cluster heads and sensor nodes. In those cluster-based schemes, cluster reconfiguration algorithm is one of the most critical issues to achieve longer operation lifetime of sensor networks. In this paper, we propose a new energy efficient cluster reconfiguration algorithm. Proposed method does not require any location or energy information of sensors, and can configure clusters with fair cluster regions such that all the sensors in a sensor network can utilize their energies equally. The performances of the proposed scheme have been compared with LEACH and LEACH-C.

A Security Module for Vehicle Network Communication (차량 네트워크 통신용 보안 모듈)

  • Kwon, Byeong-Heon;Park, Jin-Sung
    • Journal of Digital Contents Society
    • /
    • v.8 no.3
    • /
    • pp.371-376
    • /
    • 2007
  • Many modules such as controller, sensor, telematics terminal, navigation, audio and video are connected each other via vehicle network (CAN, MOST, etc). Futhermore, users can have ITS or internet services in moving by connecting to wireless mobile network. These network capabilities can cause a lots of security issues such as data hacking, privacy violation, location tracking and so on. Some possibilities which raise a breakdown or accident by hacking vehicle operation data (sensor, control data) are on the increase. In this paper, we propose a security module which has encryption functionalities and can be used for vehicle network system such as CAN, MOST, etc. This security module can provide conventional encryption algorithms and digital signature processing functionality such as DES, 3-DES, SEED, ECC, and RSA.

  • PDF

A Mobile Object Tracking Scheme by Wired/wireless Integrated Street Lights with RFID

  • Cha, Mang Kyu;Kim, Jung Ok;Lee, Won Hee;Yu, Ki Yun
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.24 no.2
    • /
    • pp.25-35
    • /
    • 2016
  • Since a sophisticated location determination technology (LDT) is necessary for accurate positioning in urban area environments, numerous studies related to the LDT using the RFID (Radio Frequency IDentification) technology have been implemented for real-time positioning and data transferring. However, there are still lots of unsolved questions especially regarding what to use as base stations and what are corresponding results under the intrinsic complexity of alignment and configuration of components used for the RFID positioning. This study proposes the street light fixtures as base stations where the RFID receivers will be embedded for the mobile tracking scheme. As street light fixtures are usually installed at a certain distance interval, they can be used as base stations for the RFID receiver installation. Using the principle of the single row triangle network, the RFID receiver organization is determined based on the experiments such as recognition distance measurement and tag position accuracy estimation at inside and outside of the single row triangle network. The results verify that the mobile tracking scheme which uses RFID-embedded street light fixtures, suggested and configured in this study, is effective for the real-time outdoor positioning.

Development of Complex USN Sensor for Zero Energy House with Blind System (블라인더가 설치된 제로에너지 하우스를 위한 복합 USN 센서 개발)

  • Kim, Kee-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.221-227
    • /
    • 2013
  • In this paper, zero-energy house in order to monitor the energy savings come with Zigbee communication temperature humidity, smoke detection, illumination and CO2 to develop complex sensor board a protocol for handling about it dealt. In particular, indoor space to mount the sensor based on the location of the control algorithm, so it varies through the Zigbee wireless sensor mounting position is free, and the advantage of being able to change. Also, the energy loss that occurs through the window can be reduced to the room lighting can play an important role in the control system.

Emergency Rescue Request Notification Service Using Bluetooth Low Energy Technology (Bluetooth Low Energy 기술을 이용한 긴급구조요청 알림서비스)

  • Kim, Sung-Jin;Cho, Kyoung-woo;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.529-530
    • /
    • 2016
  • When the mountain accident occurred, the accident victims should inform anyone of information of the location and accident situation rapidly. But if you are in the radio shadow area where you cannot use GPS, 3G/4G, and wireless communication, you can't inform someone your accidents. In this paper, we suggest the emergency rescue request notification service in situation that victims can't report their accidents. This service is to send request message for rescue in radio shadow area, in mountain accident, by BLE(Bluetooth Low Energy).

  • PDF

A Fusion of Data Mining Techniques for Predicting Movement of Mobile Users

  • Duong, Thuy Van T.;Tran, Dinh Que
    • Journal of Communications and Networks
    • /
    • v.17 no.6
    • /
    • pp.568-581
    • /
    • 2015
  • Predicting locations of users with portable devices such as IP phones, smart-phones, iPads and iPods in public wireless local area networks (WLANs) plays a crucial role in location management and network resource allocation. Many techniques in machine learning and data mining, such as sequential pattern mining and clustering, have been widely used. However, these approaches have two deficiencies. First, because they are based on profiles of individual mobility behaviors, a sequential pattern technique may fail to predict new users or users with movement on novel paths. Second, using similar mobility behaviors in a cluster for predicting the movement of users may cause significant degradation in accuracy owing to indistinguishable regular movement and random movement. In this paper, we propose a novel fusion technique that utilizes mobility rules discovered from multiple similar users by combining clustering and sequential pattern mining. The proposed technique with two algorithms, named the clustering-based-sequential-pattern-mining (CSPM) and sequential-pattern-mining-based-clustering (SPMC), can deal with the lack of information in a personal profile and avoid some noise due to random movements by users. Experimental results show that our approach outperforms existing approaches in terms of efficiency and prediction accuracy.