Pub Date : 2016-03-31DOI: 10.7236/IJASC.2016.5.1.59
Woosuk Lee, S. Lee, Jong-Yong Lee
Abstract In this paper, we’re compared network protocol which is network lifetime longer when using LEACH Protocol, SEP, and TEEN in a heterogeneous Wireless Sensor Network with a Large Sensor Area. Also, we propose a method of divided layer the wide-area sensor filed and transmitting a multi-hop to improve the network lifetime. And we’re compared network protocol which is network lifetime more improved apply the proposed method to LEACH Protocol, SEP, and TEEN. We tried to compare results, TEEN showed the best network lifetime. Apply the proposed method to divided the sensor field, L-TEEN (Layered TEEN)’s network lifetime rates of improvement is highest. Keywords: WSN, BSN, WBAN, LEACH, SEP, TEEN, L-LEACH, L-SEP, L-TEEN 1. Introduction Wireless Sensor Network [1, 2, 6] is a network of Sensor Nodes which are consisting of Wireless. One of those utilizing wireless sensor network is a BSN. There are Homogeneous Network and Heterogeneous Network of the Wireless Sensor Network Type. Homogeneous Network is the same amount of energy of all nodes. Heterogeneous Network is nodes have different amounts of energy. According to the characteristics of the Wireless Sensor Network, it has been focused the study of the network lifetime. Various Protocols have been proposed to solve the problem of the network lifetime. It is to take advantage of the Wireless Sensor Network Protocol can improve the energy efficiency during the communication between the wireless device configured BSN. The typical protocol is LEACH Protocol, and continuously to improve and extend the LEACH Protocol. In addition, SEP and TEEN is proposed based on the concept of LEACH Protocol. LEACH Protocol is equally the energy consumption of sensor nodes selected by the Cluster Head random method. But LEACH Protocol does not guarantee to create ideal cluster. SEP is basically a Heterogeneous Network based Protocol and operations similar to LEACH Protocol, but the Normal Node and Advanced Node gives the threshold formula with a different Weighting factor. TEEN also operations similar to
{"title":"The Improved Efficiency Network Life-time in TEEN","authors":"Woosuk Lee, S. Lee, Jong-Yong Lee","doi":"10.7236/IJASC.2016.5.1.59","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.1.59","url":null,"abstract":"Abstract In this paper, we’re compared network protocol which is network lifetime longer when using LEACH Protocol, SEP, and TEEN in a heterogeneous Wireless Sensor Network with a Large Sensor Area. Also, we propose a method of divided layer the wide-area sensor filed and transmitting a multi-hop to improve the network lifetime. And we’re compared network protocol which is network lifetime more improved apply the proposed method to LEACH Protocol, SEP, and TEEN. We tried to compare results, TEEN showed the best network lifetime. Apply the proposed method to divided the sensor field, L-TEEN (Layered TEEN)’s network lifetime rates of improvement is highest. Keywords: WSN, BSN, WBAN, LEACH, SEP, TEEN, L-LEACH, L-SEP, L-TEEN 1. Introduction Wireless Sensor Network [1, 2, 6] is a network of Sensor Nodes which are consisting of Wireless. One of those utilizing wireless sensor network is a BSN. There are Homogeneous Network and Heterogeneous Network of the Wireless Sensor Network Type. Homogeneous Network is the same amount of energy of all nodes. Heterogeneous Network is nodes have different amounts of energy. According to the characteristics of the Wireless Sensor Network, it has been focused the study of the network lifetime. Various Protocols have been proposed to solve the problem of the network lifetime. It is to take advantage of the Wireless Sensor Network Protocol can improve the energy efficiency during the communication between the wireless device configured BSN. The typical protocol is LEACH Protocol, and continuously to improve and extend the LEACH Protocol. In addition, SEP and TEEN is proposed based on the concept of LEACH Protocol. LEACH Protocol is equally the energy consumption of sensor nodes selected by the Cluster Head random method. But LEACH Protocol does not guarantee to create ideal cluster. SEP is basically a Heterogeneous Network based Protocol and operations similar to LEACH Protocol, but the Normal Node and Advanced Node gives the threshold formula with a different Weighting factor. TEEN also operations similar to","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128405953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-31DOI: 10.7236/IJASC.2016.5.1.30
Hoon Jin, Yong-Gyu Jung
With the advent of big data, data mining is more increasingly utilized in various decision-making fields by extracting hidden and meaningful information from large amounts of data. Even as exponential increase of the request of unrevealing the hidden meaning behind data, it becomes more and more important to decide to select which data mining algorithm and how to use it. There are several mainly used data mining algorithms in biology and clinics highlighted; Logistic regression, Neural networks, Supportvector machine, and variety of statistical techniques. In this paper it is attempted to compare the classification performance of an exemplary algorithm J48 and REPTree of ML algorithms. It is confirmed that more accurate classification algorithm is provided by the performance comparison results. More accurate prediction is possible with the algorithm for the goal of experiment. Based on this, it is expected to be relatively difficult visually detailed classification and distinction. program or a training learning act to optimize the parameters of the model. The learned model can predict the results from the new data have never met in the learning process. In this paper, we compare the performance of the algorithm proceeds separation is made based on the ML. Machine learning is used to predict the
{"title":"Performance Comparison of Decision Trees of J48 and Reduced-Error Pruning","authors":"Hoon Jin, Yong-Gyu Jung","doi":"10.7236/IJASC.2016.5.1.30","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.1.30","url":null,"abstract":"With the advent of big data, data mining is more increasingly utilized in various decision-making fields by extracting hidden and meaningful information from large amounts of data. Even as exponential increase of the request of unrevealing the hidden meaning behind data, it becomes more and more important to decide to select which data mining algorithm and how to use it. There are several mainly used data mining algorithms in biology and clinics highlighted; Logistic regression, Neural networks, Supportvector machine, and variety of statistical techniques. In this paper it is attempted to compare the classification performance of an exemplary algorithm J48 and REPTree of ML algorithms. It is confirmed that more accurate classification algorithm is provided by the performance comparison results. More accurate prediction is possible with the algorithm for the goal of experiment. Based on this, it is expected to be relatively difficult visually detailed classification and distinction. program or a training learning act to optimize the parameters of the model. The learned model can predict the results from the new data have never met in the learning process. In this paper, we compare the performance of the algorithm proceeds separation is made based on the ML. Machine learning is used to predict the","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133511480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-31DOI: 10.7236/IJASC.2016.5.1.47
So Hee Kim, M. Kang, Y. Jung
Big Data is coming rapidly in recent times and keep the vast amount of data was utilized them. These data are utilized in many fields in particular, based on the patient data in the medical field to increase the therapeutic effect, as well as re-incidence to better treatment, lowering the readmission rates increased the quality of life. In this paper it is practiced to report basis of the analysis and verification of data using python. And it can be analyzed the data through a simple formula, from Select reason of Python to how it used; by Press analysis of Agriculture, Forestry and Fisheries research. In this process, a simple formula can be used that expression for analyzing the actual data so it taking advantage of the use of functions in real life
{"title":"Big data Analysis using Python in Agriculture Forestry and Fisheries","authors":"So Hee Kim, M. Kang, Y. Jung","doi":"10.7236/IJASC.2016.5.1.47","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.1.47","url":null,"abstract":"Big Data is coming rapidly in recent times and keep the vast amount of data was utilized them. These data are utilized in many fields in particular, based on the patient data in the medical field to increase the therapeutic effect, as well as re-incidence to better treatment, lowering the readmission rates increased the quality of life. In this paper it is practiced to report basis of the analysis and verification of data using python. And it can be analyzed the data through a simple formula, from Select reason of Python to how it used; by Press analysis of Agriculture, Forestry and Fisheries research. In this process, a simple formula can be used that expression for analyzing the actual data so it taking advantage of the use of functions in real life","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129620715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-31DOI: 10.7236/IJASC.2016.5.1.8
S. Park, Kyedong Jung, Jong-Yong Lee
Studies have been made for the wireless sensor network protocols by a number of researchers to date. In particular, the studies as to the hierarchical protocol LEACH algorithm was concentrated. Various studies have been derived for the performance of the protocol is based on the LEACH protocol have been made. Improved algorithms have been proposed continuously. On the other hand, The performance comparison and evaluation of the improved algorithm is insufficient. Therefore, we compared the performance for the ML-LEACH (Multi Hop-Layered) and DL-LEACH (Dual Hop-Layered) been derived mainly LEACH. scalability, energy consumption, CH elected, network lifetime were selected as a Performance evaluation items.
{"title":"The Comparison of Performance Hierarchical Routing Protocols in Wide Area Sensor Field","authors":"S. Park, Kyedong Jung, Jong-Yong Lee","doi":"10.7236/IJASC.2016.5.1.8","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.1.8","url":null,"abstract":"Studies have been made for the wireless sensor network protocols by a number of researchers to date. In particular, the studies as to the hierarchical protocol LEACH algorithm was concentrated. Various studies have been derived for the performance of the protocol is based on the LEACH protocol have been made. Improved algorithms have been proposed continuously. On the other hand, The performance comparison and evaluation of the improved algorithm is insufficient. Therefore, we compared the performance for the ML-LEACH (Multi Hop-Layered) and DL-LEACH (Dual Hop-Layered) been derived mainly LEACH. scalability, energy consumption, CH elected, network lifetime were selected as a Performance evaluation items.","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133519050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-31DOI: 10.7236/IJASC.2016.5.1.23
Seon-Mi Woo, Malrey Lee, HyangRan Lee
The information is to be considered as important part of any network, the communication nodes within network can able to communicate and transmit information by the means of configured LAN/WAN, or/and using internet technology. Thus, vast enhancement has been made in- exchanging of information over transmission media, this should be beneficial in various disciplines of modern client/server applications but at other side, several massive vulnerabilities have been directly/in-directly associated with them. To resolve the security issues, a security mechanism is proposed which hide the sensitive information of images before transmitting to networks. Random size image samples have used and encrypted to protect them from unauthorized entities. The encryption mechanism manipulates the sample images, and corresponding secret codes are generated which help to protect the images from adversaries. To provide an indestructible security mechanism, cryptography algorithms are deployed and considered as best solutions to keep the secret information of images.
{"title":"A study of keep the Secret information of Random Sized Images from using Indestructible Security","authors":"Seon-Mi Woo, Malrey Lee, HyangRan Lee","doi":"10.7236/IJASC.2016.5.1.23","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.1.23","url":null,"abstract":"The information is to be considered as important part of any network, the communication nodes within network can able to communicate and transmit information by the means of configured LAN/WAN, or/and using internet technology. Thus, vast enhancement has been made in- exchanging of information over transmission media, this should be beneficial in various disciplines of modern client/server applications but at other side, several massive vulnerabilities have been directly/in-directly associated with them. To resolve the security issues, a security mechanism is proposed which hide the sensitive information of images before transmitting to networks. Random size image samples have used and encrypted to protect them from unauthorized entities. The encryption mechanism manipulates the sample images, and corresponding secret codes are generated which help to protect the images from adversaries. To provide an indestructible security mechanism, cryptography algorithms are deployed and considered as best solutions to keep the secret information of images.","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128457487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-31DOI: 10.7236/IJASC.2016.5.1.66
Young-Il Song, Kyedong Jung, S. Lee, Jong-Yong Lee
In this paper, we proposed the clustering algorithm using fuzzy inference system for improving adaptability the cluster head selection of TEEN. The stochastic selection method cannot guarantee available of cluster head. Furthermore, because the formation of clusters is not optimized, the network lifetime is impeded. To improve this problem, we propose the algorithm that gathers attributes of sensor node to evaluate probability to be cluster head
{"title":"A Study of Cluster Head Election of TEEN applying the Fuzzy Inference System","authors":"Young-Il Song, Kyedong Jung, S. Lee, Jong-Yong Lee","doi":"10.7236/IJASC.2016.5.1.66","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.1.66","url":null,"abstract":"In this paper, we proposed the clustering algorithm using fuzzy inference system for improving adaptability the cluster head selection of TEEN. The stochastic selection method cannot guarantee available of cluster head. Furthermore, because the formation of clusters is not optimized, the network lifetime is impeded. To improve this problem, we propose the algorithm that gathers attributes of sensor node to evaluate probability to be cluster head","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"66 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114011386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-31DOI: 10.7236/IJASC.2016.5.1.16
Yean-Woo Jung, Jong-Yong Lee, Kyedong Jung
The database integration is being emphasized to one way of the companies collaboration. To database integration, companies are use like one database what their own, it can be provided more efficient service to customer. However, there exist some difficulty to database integration. that is the database security and database heterogeneity problems. In this paper, we proposed the MapReduce based p2p DBaaS hub system to solve database heterogeneity problem. The proposed system provides an environment for companies in the P2P cloud to integrate a database of each other. The proposed system uses DBaaS Hub for a collection of data in the P2P cloud, and use MapReduce for integrating the collected data.
{"title":"Map Reduce-based P2P DBaaS Hub system","authors":"Yean-Woo Jung, Jong-Yong Lee, Kyedong Jung","doi":"10.7236/IJASC.2016.5.1.16","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.1.16","url":null,"abstract":"The database integration is being emphasized to one way of the companies collaboration. To database integration, companies are use like one database what their own, it can be provided more efficient service to customer. However, there exist some difficulty to database integration. that is the database security and database heterogeneity problems. In this paper, we proposed the MapReduce based p2p DBaaS hub system to solve database heterogeneity problem. The proposed system provides an environment for companies in the P2P cloud to integrate a database of each other. The proposed system uses DBaaS Hub for a collection of data in the P2P cloud, and use MapReduce for integrating the collected data.","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127765961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-31DOI: 10.7236/IJASC.2016.5.1.51
Young-Hyun Chang
Regarding the role of infrastructure in the university and education sector, which is the most important factor for securing future competitiveness of a country, timely application from qualified applicants is an important factor. Thus, this study is to propose creative value regarding education and certification for smart IT sector, which will be a major topic in continuous technology development over the next 10 more years, and to bring out ripple effects by policy research regarding education and certification for smart IT sector in the software-oriented society. This research on policy regarding education and certification for smart IT sector in the software oriented society can be used as a guideline in education and certification for smart IT sector at colleges and can be also used for establishing groundwork for completing practical education required in smart ICT field at colleges and for cultivating mobile app program developers required by enterprises.
{"title":"Research on Policy regarding Education and Certification for Smart IT Sector in the Software-Oriented Society","authors":"Young-Hyun Chang","doi":"10.7236/IJASC.2016.5.1.51","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.1.51","url":null,"abstract":"Regarding the role of infrastructure in the university and education sector, which is the most important factor for securing future competitiveness of a country, timely application from qualified applicants is an important factor. Thus, this study is to propose creative value regarding education and certification for smart IT sector, which will be a major topic in continuous technology development over the next 10 more years, and to bring out ripple effects by policy research regarding education and certification for smart IT sector in the software-oriented society. This research on policy regarding education and certification for smart IT sector in the software oriented society can be used as a guideline in education and certification for smart IT sector at colleges and can be also used for establishing groundwork for completing practical education required in smart ICT field at colleges and for cultivating mobile app program developers required by enterprises.","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132115595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-31DOI: 10.7236/IJASC.2016.5.1.1
Sungbin Park, Seok-Jae Moon, Jong-Yong Lee, Kyedong Jung
Recently, introduced a cloud computing technology to the IT industry, smart phones, it has become possible connection between mobility terminal such as a tablet PC. For dissemination and popularization of movable wireless terminal, the same operation have focused on a viable mobile cloud in various terminal. Also, it evolved Wireless Sensor Network(WSN) technology, utilizing a Body Sensor Network(BSN), which research is underway to build large Ubiquitous Sensor Network(USN). BSN is based on large-scale sensor networks, it integrates the state information of the patient's body, it has been the need to build a managed system. Also, by transferring the acquired sensor information to HIS(Hospital Information System), there is a need to frequently monitor the condition of the patient. Therefore, In this paper, possible sensor information exchange between terminals in a mobile cloud environment, by integrating the data obtained by the body sensor HIS and interoperable data DBaaS (DataBase as a Service) it will provide a base of mBodyCloud System. Therefore, to provide an integrated protocol to include the sensor data to a standard HL7(Health Level7) medical information data.
最近,将云计算技术引入IT行业的智能手机,已经成为连接平板电脑等移动终端的可能。对于移动无线终端的传播和普及,同样的操作都集中在各种终端上可行的移动云。此外,它还发展了无线传感器网络(WSN)技术,利用身体传感器网络(BSN),该技术正在研究中,以建立大型无处不在的传感器网络(USN)。BSN是基于大规模的传感器网络,它集成了患者身体的状态信息,已经需要建立一个管理系统。此外,通过将获取的传感器信息传输到HIS(医院信息系统),需要经常监测患者的状况。因此,本文研究移动云环境下终端之间可能的传感器信息交换,通过整合身体传感器HIS获取的数据和可互操作的数据DBaaS (DataBase as a Service),为mBodyCloud系统提供基础。因此,提供一个集成协议,将传感器数据包含到标准HL7(Health Level7)医疗信息数据中。
{"title":"The Design of mBodyCloud System for Sensor Information Monitoring in the Mobile Cloud Environment","authors":"Sungbin Park, Seok-Jae Moon, Jong-Yong Lee, Kyedong Jung","doi":"10.7236/IJASC.2016.5.1.1","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.1.1","url":null,"abstract":"Recently, introduced a cloud computing technology to the IT industry, smart phones, it has become possible connection between mobility terminal such as a tablet PC. For dissemination and popularization of movable wireless terminal, the same operation have focused on a viable mobile cloud in various terminal. Also, it evolved Wireless Sensor Network(WSN) technology, utilizing a Body Sensor Network(BSN), which research is underway to build large Ubiquitous Sensor Network(USN). BSN is based on large-scale sensor networks, it integrates the state information of the patient's body, it has been the need to build a managed system. Also, by transferring the acquired sensor information to HIS(Hospital Information System), there is a need to frequently monitor the condition of the patient. Therefore, In this paper, possible sensor information exchange between terminals in a mobile cloud environment, by integrating the data obtained by the body sensor HIS and interoperable data DBaaS (DataBase as a Service) it will provide a base of mBodyCloud System. Therefore, to provide an integrated protocol to include the sensor data to a standard HL7(Health Level7) medical information data.","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129103775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-31DOI: 10.7236/IJASC.2016.5.1.34
Yong-Gil Kim, Kyung-Il Moon
Networked Control System (NCS) has evolved in the past decade through the advances in communication technology. The problems involved in NCS are broadly classified into two categories namely network issues due to network and control performance due to system network. The network problems are related to bandwidth allocation, scheduling and network security, and the control problems deal with stability analysis and delay compensation. Various delays with variable length occur due to sharing a common network medium. Though most delays are very less and mostly neglected, the network induced delay is significant. It occurs when sensors, actuators, and controllers exchange data packet across the communication network. Networked induced delay arises from sensor to controller and controller to actuator. This paper presents an adaptive delay compensation process for efficient control. Though Smith predictor has been commonly used as dead time compensators, it is not adaptive to match with the stochastic behavior of network characteristics. Time delay adaptive compensation gives an effective control to solve dead time, and creates a virtual environment using the plant model and computed delay which is used to compensate the effect of delay. This approach is simulated using TrueTime simulator that is a Matlab Simulink based simulator facilitates co-simulation of controller task execution in real-time kernels, network transmissions and continuous plant dynamics for NCS. The simulation result is analyzed, and it is confirmed that this control provides good performance.
{"title":"Adaptive Time Delay Compensation Process in Networked Control System","authors":"Yong-Gil Kim, Kyung-Il Moon","doi":"10.7236/IJASC.2016.5.1.34","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.1.34","url":null,"abstract":"Networked Control System (NCS) has evolved in the past decade through the advances in communication technology. The problems involved in NCS are broadly classified into two categories namely network issues due to network and control performance due to system network. The network problems are related to bandwidth allocation, scheduling and network security, and the control problems deal with stability analysis and delay compensation. Various delays with variable length occur due to sharing a common network medium. Though most delays are very less and mostly neglected, the network induced delay is significant. It occurs when sensors, actuators, and controllers exchange data packet across the communication network. Networked induced delay arises from sensor to controller and controller to actuator. This paper presents an adaptive delay compensation process for efficient control. Though Smith predictor has been commonly used as dead time compensators, it is not adaptive to match with the stochastic behavior of network characteristics. Time delay adaptive compensation gives an effective control to solve dead time, and creates a virtual environment using the plant model and computed delay which is used to compensate the effect of delay. This approach is simulated using TrueTime simulator that is a Matlab Simulink based simulator facilitates co-simulation of controller task execution in real-time kernels, network transmissions and continuous plant dynamics for NCS. The simulation result is analyzed, and it is confirmed that this control provides good performance.","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132727993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}