An integrated, flexible, and Internet- based control architecture for home automation system in the Internet Era

Size: px
Start display at page:

Download "An integrated, flexible, and Internet- based control architecture for home automation system in the Internet Era"

Transcription

1 An integrated, flexible, and Internet- based control architecture for home automation system in the Internet Era Neng-Shiang Liang, Li-Chen Fu, Chao-Lin Wu Department of Computer Science & Information Engineering, National Taiwan University, ROC Abstract Because of the advanced development in computer technology, the microprocessors are not only on the desktop but also exist everywhere. It is obvious that microprocessors are embedded in electronic appliances (EAs) in our home today. In the past, the EAs are working stand-alone and cannot cooperate with one another. But in the recent years, these appliances can be monitored and controlled by embedded microprocessors and be displayed on terminals, but they are still in lack of integration. Since the present home automation (HA) system is not equipped with efficient integration mechanism, it cannot fully manifest the worth of these developments. In order to achieve this goal of integration, many appliance manufacturers focus on the development of intelligent (or information) appliances to be integrated into a complete HA system for monitoring and controlling. Due to the advent of advanced computer and wide-band network, the personal computer-based environment seems to be a very suitable platform for system integration. The personal computers can be linked by the network and are capable of powerful computation and easy display. We can take advantage of such abilities to develop an integration system. 1 Introduction A HA system is an integration of the current hardware and software technologies. Thus, development of the current HA can be classified into three categories. Information appliance The development of information appliances (IA) is a hot topic in the recent years. The definition of IA is in [3]. An IA is dedicated to performing a function and has the ability to share information with others. This kind of appliance is different from the traditional EA and plays an important role in the field of HA. Home control network A home control network is designed to control all the EAs including traditional EAs and IA in the home environment. The main job of a home control network is to make all the EAs have the features of modern IA. It means that every EA can be controlled and can share information with one another via the communication protocol in the control network. There are some home control networks proposed today, like LonWorks[5], Jini[4], and BACnet[6]. Software architecture for the HA system Despite that the development of software architecture is not prized as much as the development of hardware currently, it is believed that the software architecture must be an important issue for establishing the HA system architecture. It is clear that the home environment is a complex environment and we expect that an excellent HA system should be a flexible system. In order to achieve the goal flexible, we must consider how to solve the problem by applying software technology. In this paper, we propose a software architecture that makes our HA system fit to various home environment. This is an integrated control architecture for HA system based on the multi-agent concept. This architecture is composed of five main components respectively named space agents, function agents, personal preference agents, environment variables sever, and resource access right control kernel. The integrated home control architecture has the following features: Scalable Inhabitants always expect their house become smarter. It is quite likely that they may want to attach new devices and add new functions by themselves if necessary. This proposed integrated home control architecture should be a scalable architecture to facilitate them to do those. Reconfigurable Even two identical EAs will play different roles in different home environments. For example, somebody wants the lamp in his living room to be turned on when he gets into the house, but contrarily another one may expect it to be turned off under the same condition. The control architecture should be reconfigured easily. Internet-based Internet should play an important role in the HA architecture absolutely. If our HA system is compatible with Internet, we can expand its functionality easily. This paper consists of four sections. In section 2, the entire architecture is explained in detail, which turns out to be the most important part in this paper. In section 3, the proposed integrated home control architecture is actually implemented. In section 4, conclusions are made and some future work discussed. 2 An Integrated Control Architecture for Home Automation (HA) System 2.1 Architecture Overview In this section, we will propose an integrated control architecture for HA system based on the multi-agent concept. This architecture is composed of five main

2 components, respectively, named as space agents, function agents, personal preference agents, environment variables sever, and resource access right control kernel. In the following, Figure 2.1 gives an overview of the integrated HA system proposed in this paper. #1 #M Space Agent #1 Direct Control Operation Register Operation Physical Connection Internet Environment Variable Server Resource Access Right Control Kernel Space Agent #N Personal Preference Agent #1 Personal Preference Agent #K Figure 2.1 Overview of the integrated control architecture 2.2 Important Components in the Integrated Home Control Architecture As has been mentioned earlier, the integrated home control architecture consists of five components. In this architecture, both environment variable server and resource access right control kernel have only one entity for each, but the other components may have more than one entity individually. Each of the five components has its special responsibility to handle particular kind of job. In the following subsections, we will explain the complete architecture and functionality of each component in detail Space Agent It is obviously that there are many kinds of home control network under development currently, which also means that a widely accepted and used standard has not been established yet. Therefore, if we now want to develop a general mechanism to control all EAs, then there will be problems because no single solution exists that can take care of all EAs which may be attached to various home control networks. In order to alleviate this problem, we proposed a component called Space Agent. Referring to the architecture as shown in Figure 2.1, space agents are the only components that are physically connected to the real EAs. The space agents have the following responsibilities: Maintain and update information of electronic appliances which are attached in this zone Because the configuration of home environment is always dynamic, the space agents naturally must be able to keep and update information of EAs in this zone. Inhabitants always want to attach new EAs or detach old ones if necessary. When this action occurs, all the associative space agents should change their register information of EAs rapidly, and we must guarantee the whole control system have the correct configuration of the real home environment. Report data change to the Resource Access Right Control Kernel In the integrated control architecture, space agents are the only mechanism that accesses the EAs directly. When one EA changes its state, for example, a lamp is turned off, we have to get information of this change at almost the same time. If we fail to dominate the status of these EAs, we will also fail to control these EAs efficiently. Receive control commands for electronic appliances The space agents must receive control commands from the resource access right control kernel. Actually they do not care where the control commands come from. When a space agent receives a control command from the resource access right control kernel, it will decode the control command and take some corresponding control actions. The process of generating a control command is complex and it usually results from the cooperation among different components in this proposed architecture. Guarantee some user defined rules will be executed We claim that a space agent should be able to execute some basic rules. For example, if we attach a gas sensor, we may expect the HA system to provide a safety measure in conjunction with this sensor and the hot plates. That is, when this sensor is activated, the hot plates should be turned off anywise. This functionality of executing rules guarantees that some safety or necessary rules can be realizable in any situation. That makes the integrated HA architecture reliable Inhabitants always expect their HA system to achieve various control goals, for example, security, alarm, and energy saving. In the proposed architecture, we claim that inhabitants can make this system adaptable and fit to various environments. In order to establish this feature, an important component called function agent is proposed. The function agents have the following responsibilities: Interpret low level device data to high level meaningful context (named condition variable) describing the home environment What is a condition variable? Simply speaking, condition variables are high level description of this home environment. These condition variables are meaningful words but not general variables in programs. Function agents generate condition variables, and every function agent has different condition variables. According to this definition, function agents must have some expertise in it. It is obviously that function agents have ability to provide some meaningful information by analyzing the data collected from related EAs. Figure

3 is an example of generating a condition variable. HVAC Energy Saving Function Agent Thermometer Energy is wasting!!! Analyze Sensor Figure 2.2 An example of generating condition variables Accomplish some complex tasks and control real electronic appliances Because each function agent has some special expertise, it can handle several kinds of tasks according to the assigned expertise. The role of this agent is pretty like a servant. If we want to acquire some service, we simply ask our servants to do it, for example, cleaning our house. We ourselves do not have to know how to finish the aforementioned task in detail, and our servants will work together to accomplish it by exploiting each expertise. As has been mentioned, the function agents will broadcast their services and wait for the request messages from the other components in the system. When they receive a request of service, they will execute a list of actions to accomplish this job. Certainly, the function agents will send control messages to all associated space agents, which take charge of the EAs we want to control Personal Preference Agent The personal preference agent is a special mechanism that preserves the personal preference, because a home environment usually has many inhabitants and each person has his particular preference. An ideal HA system should claim that each inhabitant is quite satisfied with use of this architecture. It means that different person needs different automation functions. In order to realize this concept, a component called personal preference agent is proposed to preserve the personal preference in the integrated HA architecture. The personal preference agents have the following responsibility: Execute control strategy according to preference Every personal preference agent represents individual inhabitant preferences. Naturally, the most important job of the personal preference agents is to execute the control strategy of this personal preference agent. Based on our previous statement about condition variables and services of function agents, we will now explain how a personal preference agent can take advantage of those designed features and how a control strategy can be guaranteed. One example is shown in Figure 2.3 In this example, we have a lighting control agent, one personal preference agent and two space agents. The space agent A holds a brightness sensor and the space agent B holds a lighting device. The lighting control function agent provides a condition variable and one service Brighten the room. The strategy of the personal preference agent is If is "Dark" Then "Brighten the room". Cooperation between the lighting control function agent and the personal preference agent is demonstrated in this example. As shown in this figure, the personal preference agent only contacts the function agent. It reads the condition variables from the function agent and makes decision according to its strategy. In this example, if the value of the condition variable is Dark, the personal preference agent will send a service request to the function agent to turn on the lighting devices in the room. But if the value of the condition variable is Bright, the personal preference agent will send a service request to the function agent to turn off the lighting devices. We can easily understand that the personal preference agents only access the interpreted high level data (condition variables) and request some high level services. This explains what we said that a personal preference agent executes strategies. Reading Data Condition Variable (Bright or Dark) Sensor Data Space Agent A Sensor Personal Preference Agent Control Strategy : If is "Dark" Then "Brighten the room" Brighten The Room Space Agent B Device ON/OFF Direct Control Figure 2.3 An example of making strategy Resource Access Right Control Kernel The resource access right control kernel is a mechanism that manages the communication among all components in the architecture. The resource means space agents, function agents, personal preference agents, the environment variable server, the information about EAs, condition variables, services and environment variables. We have introduced three main components in the

4 integrated home control architecture, and it is obvious that sometimes they must communicate with one another to finish some jobs, which implies that there might be some conflicts that need to be resolved by some sort of coordination mechanism. Therefore, we need this special component called resource access right control kernel to avoid conflicts, and it has the following responsibilities: Maintain register information of all the components and route messages between components In order to make this architecture flexible, we hope that every component in the architecture can be moved from one machine to another easily. For example, we may want to disable one working function agent in a slower machine and enable it in another faster machine. If we do not have any special mechanism, we must reconfigure all the other components in this architecture, and it will be a boring job if our system is very large. To achieve this goal without heavy effort, the answer is to use a central communication center, resource access right control kernel. In order to make the architecture reconfigurable, we claim that the resource access right control kernel should keep the information of every component in the architecture. When we add a new component into our system, we must send register information to the resource access right control kernel first. After this action, this new component is a member of this system and its information will be broadcast to other related components. This mechanism makes the address information of all components transparent. Although every component has all needed information about the other components, it is clear that it can not communicate with other components without address information. To make the system work properly, the resource access right control kernel has responsibility to route information among components in this architecture. Figure 2.4 shows an example of sending a control message from a function agent to their destination EAs. Turn on the lamps hold by the living room space agent Turn on Living Room Space Agent Direct control Lamp Lamps control Messages Resource Access Right Control Kernel Message Turn on the lamps hold by living room and bedroom space agents Message Bedroom Space Agent Turn on Direct control Lamp Turn on the lamps hold by the bedroom space agent Figure 2.4 An example of lamp control In this example, we have one function agent and two space agents. The lamps control function agent exactly knows that there are two space agents in the system but does not know where they are. Once it needs to control the lamps belonging to these space agents, it will send the control message to the resource access right control kernel first. The kernel will route the control message to the proper machine according to the register information of these space agents, and these space agents will receive messages from the kernel and control the lamps directly. Guarantee control priority and avoid control conflict As mentioned in the pervious subsections, both function agents and personal preference agents can be multiple in the proposed architecture, so conflict problems may arise within these two kinds of agents. A similar solution is to resort to a priority mechanism to prevent it. In addition to being the communication center for all the components in the architecture, the kernel is capable of coordinating resources out of the entire HA system. However, it is important that the control right of resources should not be uncertain. To this end, we will ask all components in the architecture should obey the following steps when they want to allocate some resources: Step 1. Send resource allocation requests to the kernel Step 2. Send control messages Step 3. Send resource release messages to the kernel Every function agent and personal preference agent has one priority value and these priority values will be compared in step 1 by the resource access right control kernel if necessary. Generally speaking, once a resource is allocated to some agent, we can not allocate it anymore until step 3 is finished, but there is one exception. If the newly arrived allocation request has higher priority, the current control right of this resource will be preempted Environment Variable Server This component is the mechanism that allows the integrated control architecture to take advantages of Internet. Because Internet is a modern technology that influences life dramatically, the system should be much more powerful and will provide greater life quality improvement if we integrate Internet into our architecture. This component has the following responsibilities Maintain environment variables Environment variables are variables that can be referred to by both the components within the control architecture and the sites in the Internet, which can be considered as parameters of the entire architecture. The function agents and personal preference agents should refer to these parameters to make control decisions. The current control strategy will be affected by these environment variables. The environment variable server must protect these variables against the invalid access from the Internet and maintain the database. data from the Internet automatically In the integrated home control architecture we proposed, the environment variable server can be

5 considered as the information provider of the outside world. The decision mechanism in the architecture may require the current data of the real world to make some decisions. Because of this requirement, we proposed that the environment variable server should have ability to collect information from the Internet automatically. Accept query and update request of environment variable from the Internet or the home network Because the environment variables are the bridge between the HA system and the outside world, it must handle the query and update request of environment variable from the Internet or the home network. 3 Experiment 3.1 Experiment Environment In our experiment, we construct the purposed architecture in the Intelligent Robotics Laboratory in NTU. The complete HA system includes software and hardware, and it allows people to control both real and virtual EAs. The conceptual structure is shown in Figure 3.1. Integraged Home Control Architecture DDE ( Dynamic Data Exchange) LonWorks Network Real Appliacnes Intouch Virtual Appliacnes Figure 3.1 Architecture of implementation Now, we list all the hardware devices and software components used in our experiment in the following. Integrated home control architecture All the components implemented in the architecture include the space agents, the resource access right control kernel, the personal preference agents and the environment variable server. Besides these components, two function agents are also implemented to execute power saving strategy and to remotely control EAs, respectively. From previous explanation about function agents in section 2, we know that adding and deleting function agents will change the control capability in our HA system. In the setup of our experiment, totally five personal computers are used, and each one executes one software component in the architecture. Dynamic data exchange Dynamic data exchange (DDE) is a mechanism provided by Microsoft Windows. It provides a convenient way to exchange data between different programs. Because we want to control both real and virtual EAs, we use DDE as the interface technique between our software components and the EAs. We have two DDE servers. One is Echelon LNS DDE server[5] which is developed by Echelon and we can exchange data between our programs and the LonWorks network through this server. The other one is developed by ourselves to be a bridge between our programs and the Intouch[11]. LonWorks network We have established a LonWorks network in our laboratory with two LonWorks control nodes, both of which act as the controller of physical EAs. Real electronic appliances We installed several real EAs to demonstrate the capability of our HA system. Temperature sensor: The temperature sensor can sense the temperature in the environment. sensor: The brightness sensor can sense the brightness in the environment. Smoke sensor: This smoke sensor can sense whether there exists smoke in this space. Person Infrared Radio Sensor: This sensor can detect the existence of humans around the space. Switch: The lighting switch can turn on and turn off the lights. Camera: The camera can take pictures while receiving request to monitor the surrounding space. Intouch Intouch is a graphical human-machine interface (HMI) for industrial automation, process control and supervisory monitoring. It has ability to exchange data by DDE, and we take advantage of this feature to produce a virtual home environment. Virtual electronic appliance We created a virtual home environment by using Intouch, and there are some virtual EAs in it. The virtual home environment is shown in Figure 3.2. Figure 3.2 Virtual home 3.2 System Setup In this HA system, we have two space agents, two

6 function agents, one resource access right control kernel, one personal preference agent and one environment variable server. Because we use DDE as the interface technique between our software components and EAs, we control both real and virtual EAs at the same time. As has been described in section 2, we know that the function agents installed in the system provide the pre-defined functionality to the HA system. In our experiment, we have function agents with power saving and remote control functionality, respectively. Because of these function agents, we can make our real and virtual EAs change their status according to the current home environment automatically. The physical layout of our system is shown in Figure 3.3. Environment Variable Server Ethernet Power Saving & Remote Control Personal Preference Agent References [1] Li-Chen Fu; Teng-Jei Shih, Holonic supervisory control and data acquisition kernel for 21st century intelligent building system, Robotics and Automation, Proceedings. ICRA '00. IEEE International Conference on, Volume: 3, 2000 Page(s): [2]Nunes, R.J.C.; Delgado, J.C.M., An internet application for home automation, Electrotechnical Conference, MELECON th Mediterranean, Volume: 1, 2000, Page(s): [3]Want, R.; Borriello, G., Survey on information appliances, IEEE Computer Graphics and Applications, Volume: 20 3, May-June 2000, Page(s): [4]Jini Network Technology, [5]Echelon Corporation, PDA Wireless Remote Control Intouch Virtual Home Environment Space Agent A Resource Access Right Control Kernel Space Agent B LonWorks Network Control Node Smoke sensor Temperature sensor Camera Control Node sensor Person Infrared Radio Sensor Figure 3.3 Physical layout of our experiment 4 Conclusion There are some important factors in the HA system, including EAs, control strategies, and personal preference. These factors will be different in each home environment. Thus, we have to find a solution so that we can adjust these factors easily. In order to solve this problem, we proposed five components in our integrated home control architecture to allow the automation system to be easily re-configured according to various special requirements. We also construct a tight relation between the HA system and the Internet. In the future, the HA system will become smarter because of the ability of collecting information from the Internet. In our experiment, all the components in our architecture are implemented. We also created a real home environment and a virtual one to be controlled by our HA system. The process of developing a powerful HA system will encounter a lot of problems. In this paper, we considered the possible problems and tried to find an efficient way to resolve these problems in the software level. We will continuously research how to construct a more powerful HA both in the hardware and software aspects. Undoubtedly, living in an intelligent home environment is the trend in the 21st century. [6]Haakenstad, L.K., The open protocol standard for computerized building systems: BACnet, Control Applications, Proceedings of the 1999 IEEE International Conference on, Volume: 2, 1999, Page(s): [7]Steven T. Bushby, BACnet: a Standard Communication Infrastructure for Intelligent Buildings, Journal of Automation in Construction, 1997, Vol 6, [8]J. M. Bradshaw, editor, Software Agents. AAAI/MIT Press, Menlo Park, CA, ISBN [9]Wonderware Corp., [10]XML.com, [11]Java Remote Method Invocation (RMI), [12]Overview of CORBA.,

Policy-Based Context-Management for Mobile Solutions

Policy-Based Context-Management for Mobile Solutions Policy-Based Context-Management for Mobile Solutions Caroline Funk 1,Björn Schiemann 2 1 Ludwig-Maximilians-Universität München Oettingenstraße 67, 80538 München caroline.funk@nm.ifi.lmu.de 2 Siemens AG,

More information

Building Management Solutions. for Data Centers and Mission Critical Facilities

Building Management Solutions. for Data Centers and Mission Critical Facilities Building Management Solutions for Data Centers and Mission Critical Facilities How Efficient is Your Data Center? Recent years have seen rapid growth in global demand for computing capacity, resulting

More information

RESEARCH OF A NEW METHODOLOGY FOR INTEGRATING BAS WITH MULTIPLE STANDARDS

RESEARCH OF A NEW METHODOLOGY FOR INTEGRATING BAS WITH MULTIPLE STANDARDS , Volume 5, Number 2, p.52-57, 2004 RESEARCH OF A NEW METHODOLOGY FOR INTEGRATING BAS WITH MULTIPLE STANDARDS C.Q. Dong and P.F. Hu Institute of Environment Science & Engineering, Huazhong University of

More information

An Intelligent Agent for RFID-based Home Network System

An Intelligent Agent for RFID-based Home Network System An Intelligent Agent for RFID-based Home Network System Woojin Lee 1, Juil Kim 2, Kiwon Chong 3 Department of Computing, Soongsil University, Seoul, Korea {bluewj 1, sespop 2 }@empal.com, chong@comp.ssu.ac.kr

More information

ROCI 2: A Programming Platform for Distributed Robots based on Microsoft s.net Framework

ROCI 2: A Programming Platform for Distributed Robots based on Microsoft s.net Framework ROCI 2: A Programming Platform for Distributed Robots based on Microsoft s.net Framework Vito Sabella, Camillo J. Taylor, Scott Currie GRASP Laboratory University of Pennsylvania Philadelphia PA, 19104

More information

INTELLIGENT SCADA FOR LOAD CONTROL

INTELLIGENT SCADA FOR LOAD CONTROL INTELLIGENT SCADA FOR LOAD CONTROL S. R. KATKAR 1 & S. V. UMREDKAR 2 1 G. H. Raisoni College of Engg. Digdoh Hill, Hingna Road, Nagpur-440016 (M.S.), India 2 Electrical Engineering Department, An Autonomous

More information

Multiprocessor scheduling

Multiprocessor scheduling Chapter 10 Multiprocessor scheduling When a computer system contains multiple processors, a few new issues arise. Multiprocessor systems can be categorized into the following: Loosely coupled or distributed.

More information

Face Detection CUDA Accelerating

Face Detection CUDA Accelerating Face Detection CUDA Accelerating Jaromír Krpec Department of Computer Science VŠB Technical University Ostrava Ostrava, Czech Republic krpec.jaromir@seznam.cz Martin Němec Department of Computer Science

More information

Database Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No.

Database Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No. Database Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No. # 20 Concurrency Control Part -1 Foundations for concurrency

More information

Hope in Solutions of Special Projects

Hope in Solutions of Special Projects 2017 ACE Awards Category 2 Meeting the Challenge of a Difficult Job Specialty Contractor Specialty Contractor: Ludvik Electric Co. Project Name: University of Colorado Boulder CASA Hope in 2021 Established

More information

The research and design of user interface in parallel computer system

The research and design of user interface in parallel computer system 5th International Conference on Education, Management, Information and Medicine (EMIM 2015) The research and design of user interface in parallel computer system Liu Xiang 1 Shang Liyuan 2 Lu Zhenting

More information

Decentralized and Embedded Management for Smart Buildings

Decentralized and Embedded Management for Smart Buildings PROCEEDINGS OF THE WORKSHOP ON APPLICATIONS OF SOFTWARE AGENTS ISBN 978-86-7031-188-6, pp. 3-7, 2011 Decentralized and Embedded Management for Smart Buildings Giancarlo Fortino and Antonio Guerrieri DEIS

More information

Position-Aware Active Learning Services Based on Connectionless Positioning in Indoor Environment

Position-Aware Active Learning Services Based on Connectionless Positioning in Indoor Environment Position-Aware Active Learning Services Based on Connectionless Positioning in Indoor Environment Li-Der CHOU, Ching-Chao LEE, Ming-Yu LEE, Chun-Yen CHANG Department of Computer Science and Information

More information

Continuous Security. Improve Web Application Security by using Continuous Security Scans

Continuous Security. Improve Web Application Security by using Continuous Security Scans Continuous Security Improve Web Application Security by using Continuous Security Scans 1 The world of software development has changed. Nowadays around 65% of software projects use agile development 1.

More information

Virtualization. Q&A with an industry leader. Virtualization is rapidly becoming a fact of life for agency executives,

Virtualization. Q&A with an industry leader. Virtualization is rapidly becoming a fact of life for agency executives, Virtualization Q&A with an industry leader Virtualization is rapidly becoming a fact of life for agency executives, as the basis for data center consolidation and cloud computing and, increasingly, as

More information

Dynamic Scheduling Based on Simulation of Workflow

Dynamic Scheduling Based on Simulation of Workflow Dynamic Scheduling Based on Simulation of Workflow Ji Haifeng, Fan Yushun Department of Automation, Tsinghua University, P.R.China (100084) Extended Abstract: Scheduling is classified into two sorts by

More information

... with data security and Store & Forward

... with data security and Store & Forward Environmental Monitoring System... with data security and Store & Forward Secure electronic data Self healing data archiving Dynamic reporting Pharmaceutical Environmental Quality Monitoring System Control

More information

A Tutorial on Agent Based Software Engineering

A Tutorial on Agent Based Software Engineering A tutorial report for SENG 609.22 Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far A Tutorial on Agent Based Software Engineering Qun Zhou December, 2002 Abstract Agent oriented software

More information

Networking Basics. Networking Basics. This document provides a brief overview of basic networking principles and how they apply to the FRC hardware.

Networking Basics. Networking Basics. This document provides a brief overview of basic networking principles and how they apply to the FRC hardware. Networking Basics This document provides a brief overview of basic networking principles and how they apply to the FRC hardware. Table of Contents Networking Basics Overview IP Addressing Background What

More information

Distributed Control Systems (DCS)

Distributed Control Systems (DCS) Training Title Distributed Control Systems (DCS) Training Duration 5 days Training Venue and Dates Distributed Control Systems (DCS) 5 13-17 May $3,300 Abu Dhabi In any of the 5 star hotel. The exact venue

More information

Multi-Layered Architecture of Middleware for Ubiquitous Robot

Multi-Layered Architecture of Middleware for Ubiquitous Robot Multi-Layered Architecture of Middleware for Ubiquitous Robot In-Bae Jeong, Jong-Hwan Kim Department of Electrical Engineering and Computer Science KAIST Daejeon, Republic of Korea {ibjeong,johkim}@rit.kaist.ac.kr

More information

Remote Monitoring and Actuation Based on LonWorks Technology

Remote Monitoring and Actuation Based on LonWorks Technology Remote Monitoring and Actuation Based on LonWorks Technology Sergio R. M. Canovas a, Marlon G. Chermont b,carlose.cugnasca c a Agricultural Automation Laboratory (LAA), Polytechnic School, University of

More information

J. Dinijamma et.al; International Journal of Advance Research, Ideas and Innovations in Technology

J. Dinijamma et.al; International Journal of Advance Research, Ideas and Innovations in Technology ISSN: 2454-132X Impact factor: 4.295 (Volume 4, Issue 2) Available online at: www.ijariit.com Device Control based on Wireless Virtual Reality Technique using Artificial Intelligence J. Dinijamma dinija028@gmail.com

More information

ARCHITECTURE AND IMPLEMENTATION OF A NEW USER INTERFACE FOR INTERNET SEARCH ENGINES

ARCHITECTURE AND IMPLEMENTATION OF A NEW USER INTERFACE FOR INTERNET SEARCH ENGINES ARCHITECTURE AND IMPLEMENTATION OF A NEW USER INTERFACE FOR INTERNET SEARCH ENGINES Fidel Cacheda, Alberto Pan, Lucía Ardao, Angel Viña Department of Tecnoloxías da Información e as Comunicacións, Facultad

More information

Operating System Performance and Large Servers 1

Operating System Performance and Large Servers 1 Operating System Performance and Large Servers 1 Hyuck Yoo and Keng-Tai Ko Sun Microsystems, Inc. Mountain View, CA 94043 Abstract Servers are an essential part of today's computing environments. High

More information

THINGS YOU NEED TO KNOW ABOUT USER DOCUMENTATION DOCUMENTATION BEST PRACTICES

THINGS YOU NEED TO KNOW ABOUT USER DOCUMENTATION DOCUMENTATION BEST PRACTICES 5 THINGS YOU NEED TO KNOW ABOUT USER DOCUMENTATION DOCUMENTATION BEST PRACTICES THIS E-BOOK IS DIVIDED INTO 5 PARTS: 1. WHY YOU NEED TO KNOW YOUR READER 2. A USER MANUAL OR A USER GUIDE WHAT S THE DIFFERENCE?

More information

Introduction CHAPTER. Practice Exercises. 1.1 What are the three main purposes of an operating system? Answer: The three main puropses are:

Introduction CHAPTER. Practice Exercises. 1.1 What are the three main purposes of an operating system? Answer: The three main puropses are: 1 CHAPTER Introduction Practice Exercises 1.1 What are the three main purposes of an operating system? Answer: The three main puropses are: To provide an environment for a computer user to execute programs

More information

CptS 464/564 Lecture 18

CptS 464/564 Lecture 18 CptS 464/564 Lecture 18 2nd November 2004 Checkpoint What have we covered so far? Paradigms and Models: frameworks for the discussion of DS What is the plan ahead? Next: examples of distributed systems

More information

Mobility Solutions Extend Cisco Unified Communications

Mobility Solutions Extend Cisco Unified Communications Mobility Solutions Extend Cisco Unified Communications Organizations worldwide have used powerful new technologies such as the Internet, IP communications, and mobility to improve their business processes.

More information

How OPC UA Software Enhances Big Data Integrity for IIoT SCADA Systems. Charles Chen Product Manager

How OPC UA Software Enhances Big Data Integrity for IIoT SCADA Systems. Charles Chen Product Manager How OPC UA Software Enhances Big Data Integrity for IIoT SCADA Systems Charles Chen Product Manager Big Data Integrity Is a Critical Factor in the Evolution from Traditional to IIoT SCADA Systems Over

More information

ADAM-6000 Series. Features. The Path to Seamless Integration. Why Smart I/O? Why Web I/O? Control Strategy Moves to Field Devices. Why Mixed I/O?

ADAM-6000 Series. Features. The Path to Seamless Integration. Why Smart I/O? Why Web I/O? Control Strategy Moves to Field Devices. Why Mixed I/O? ADAM-6000 Series Features Ethernet-based smart I/O Mixed I/O in single module Pre-built HTTP server and web pages in each module Active I/O message by data stream or event trigger function Industrial Modbus/TCP

More information

Smart Metering & Home Automation Technologies Re-Training for Electricians

Smart Metering & Home Automation Technologies Re-Training for Electricians Smart Metering & Home Automation Technologies Re-Training for Electricians Project objectives The adoption of energy efficiency measures is shifting the building installation industry towards green technologies

More information

Application of LonWorks Distributed Control Technology in Greenhouses

Application of LonWorks Distributed Control Technology in Greenhouses Application of LonWorks Distributed Control Technology in Greenhouses Gilberto A. Pereira a, Carlos E. Cugnasca b a Agricultural Automation Laboratory, Escola Politécnica, Universidade de São Paulo, Brazil,

More information

IPv6 Home Automation. IGC/INET, 12/05/2004 Jordi Palet & Francisco Ortiz Consulintel

IPv6 Home Automation. IGC/INET, 12/05/2004 Jordi Palet & Francisco Ortiz Consulintel IPv6 Home Automation IGC/INET, 12/05/2004 Jordi Palet & Francisco Ortiz Consulintel -1 IPv6 & the Home: good room-mates IPv6 Compelling reason: More Addresses Billions of devices, users, always-on technologies

More information

A Robot Recognizing Everyday Objects

A Robot Recognizing Everyday Objects A Robot Recognizing Everyday Objects -- Towards Robot as Autonomous Knowledge Media -- Hideaki Takeda Atsushi Ueno Motoki Saji, Tsuyoshi Nakano Kei Miyamato The National Institute of Informatics Nara Institute

More information

SoftEther VPN Server supports the clustering function. This section explains the clustering function.

SoftEther VPN Server supports the clustering function. This section explains the clustering function. SoftEther VPN Server supports the clustering function. This section explains the clustering function. 3.9.1 What is Clustering? Clustering Necessity In general terms, clustering is a processing method

More information

Acceptance Test Plan

Acceptance Test Plan Acceptance Test Plan Terminus Security Contents Power Control... 5 Door Lock... 5 Video Capture... 6 Motion Detection... 7 Temperature Sensing... 7 UPS... 8 Token Authentication... 8 Logging System...

More information

Main objectives or functions can be modelled like different blocks or components that can be observed in Figure 1. Figure 1: HOPE System Architecture

Main objectives or functions can be modelled like different blocks or components that can be observed in Figure 1. Figure 1: HOPE System Architecture Overall Approach HOPE system can be modelled as a distributed system where many agents (subsystem located in each patient 's home) are connected to a main agent, the HOPE server, using IP communication

More information

The Improved WCMRP Protocol for Mobile Wireless Sensor Networks

The Improved WCMRP Protocol for Mobile Wireless Sensor Networks 152 JOURNAL OF COMMUNICATIONS, VOL. 6, NO. 2, APRIL 2011 The Improved WCMRP Protocol for Mobile Wireless Sensor Networks Ming Huang Guo Department of Information Management, Shih-Hsin University, Taipei,

More information

A Data Collecting and Caching Mechanism for Gateway Middleware in the Web of Things

A Data Collecting and Caching Mechanism for Gateway Middleware in the Web of Things A Data Collecting and Caching Mechanism for Gateway Middleware in the Web of Things Xuchao Chang, Chunhong Zhang, Li Sun Beijing University of Posts and Telecommunications, Beijing, 100876, China E-mail:

More information

GRAPHICAL USER INTERFACE FOR BULK EDITING OF 3WORLDS ECOLOGICAL MODELS

GRAPHICAL USER INTERFACE FOR BULK EDITING OF 3WORLDS ECOLOGICAL MODELS RESEARCH SCHOOL OF COMPUTER SCIENCE COLLEGE OF ENGINEERING AND COMPUTER SCIENCE GRAPHICAL USER INTERFACE FOR BULK EDITING OF 3WORLDS ECOLOGICAL MODELS COMP6470 SPECIAL TOPICS IN COMPUTING Supervisors Dr.

More information

A REASONING COMPONENT S CONSTRUCTION FOR PLANNING REGIONAL AGRICULTURAL ADVANTAGEOUS INDUSTRY DEVELOPMENT

A REASONING COMPONENT S CONSTRUCTION FOR PLANNING REGIONAL AGRICULTURAL ADVANTAGEOUS INDUSTRY DEVELOPMENT A REASONING COMPONENT S CONSTRUCTION FOR PLANNING REGIONAL AGRICULTURAL ADVANTAGEOUS INDUSTRY DEVELOPMENT Yue Fan 1, Yeping Zhu 1*, 1 Agricultural Information Institute, Chinese Academy of Agricultural

More information

Design and Implementation of Inspection System for Lift Based on Android Platform Yan Zhang1, a, Yanping Hu2,b

Design and Implementation of Inspection System for Lift Based on Android Platform Yan Zhang1, a, Yanping Hu2,b 2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) Design and Implementation of Inspection System for Lift Based on Android Platform Yan Zhang1, a, Yanping Hu2,b 1

More information

Bill Parrish Scott Inscore Bob Worth

Bill Parrish Scott Inscore Bob Worth Bill Parrish Scott Inscore Bob Worth A Systems Integration Company, Providing Automation and SCADA Solutions. teampiedmont.com a Full-Service, Turn Key Solution: An integrated team of engineers & designers

More information

Introducing Collaboration to Single User Applications

Introducing Collaboration to Single User Applications Introducing Collaboration to Single User Applications Abstract Brian Cornell UNC Chapel Hill brian@cs.unc.edu Most research in collaborative systems has been based on designing an ideal system from ground

More information

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Shifting budgets and responsibilities require IT and physical security teams to consider fundamental change in day-to-day

More information

Cisco Wireless Video Surveillance: Improving Operations and Security

Cisco Wireless Video Surveillance: Improving Operations and Security Cisco Wireless Video Surveillance: Improving Operations and Security What You Will Learn Today s organizations need flexible, intelligent systems to help protect people and assets as well as streamline

More information

Integration of information security and network data mining technology in the era of big data

Integration of information security and network data mining technology in the era of big data Acta Technica 62 No. 1A/2017, 157 166 c 2017 Institute of Thermomechanics CAS, v.v.i. Integration of information security and network data mining technology in the era of big data Lu Li 1 Abstract. The

More information

Supervisory System Design and Implementation of Automatic Illumination Control for Dimmable Flat LED Lighting Devices in Buildings

Supervisory System Design and Implementation of Automatic Illumination Control for Dimmable Flat LED Lighting Devices in Buildings Sensors and Materials, Vol. 29, No. 4 (2017) 379 386 MYU Tokyo 379 S & M 1330 Supervisory System Design and Implementation of Automatic Illumination Control for Dimmable Flat LED Lighting Devices in Buildings

More information

101seminartopics.com. Bluetooth Based Smart Sensor Networks

101seminartopics.com. Bluetooth Based Smart Sensor Networks Bluetooth Based Smart Sensor Networks ABSTRACT Dragging the world towards wireless galaxy Various sensors are already in a broad use today as part of different devices or as standalone devices connected

More information

Design and Implementation of Intelligent Home Control System under the Concept of IoT

Design and Implementation of Intelligent Home Control System under the Concept of IoT 2018 2nd International Conference on Systems, Computing, and Applications (SYSTCA 2018) Design and Implementation of Intelligent Home Control System under the Concept of IoT Weiliang Li1, Hao Yu2, Yantong

More information

NEW WEB BROWSER-BASED APPLIANCE ADDS TO DATA CENTER SECURITY

NEW WEB BROWSER-BASED APPLIANCE ADDS TO DATA CENTER SECURITY CASE STUDY Standby Generation for Data Centers NEW WEB BROWSER-BASED APPLIANCE ADDS TO DATA CENTER SECURITY Taking the Next Step to Protect Critical Data If you live or work there, you understand that

More information

Symantec NetBackup 7 for VMware

Symantec NetBackup 7 for VMware V-Ray visibility into virtual machine protection Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing

More information

Annotation for the Semantic Web During Website Development

Annotation for the Semantic Web During Website Development Annotation for the Semantic Web During Website Development Peter Plessers and Olga De Troyer Vrije Universiteit Brussel, Department of Computer Science, WISE, Pleinlaan 2, 1050 Brussel, Belgium {Peter.Plessers,

More information

Announcements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris

Announcements.  me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,

More information

OPERATING- SYSTEM CONCEPTS

OPERATING- SYSTEM CONCEPTS INSTRUCTOR S MANUAL TO ACCOMPANY OPERATING- SYSTEM CONCEPTS SEVENTH EDITION ABRAHAM SILBERSCHATZ Yale University PETER BAER GALVIN Corporate Technologies GREG GAGNE Westminster College Preface This volume

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Table of Contents. Cisco How NAT Works

Table of Contents. Cisco How NAT Works Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9

More information

The Analysis and Research of IPTV Set-top Box System. Fangyan Bai 1, Qi Sun 2

The Analysis and Research of IPTV Set-top Box System. Fangyan Bai 1, Qi Sun 2 Applied Mechanics and Materials Online: 2012-12-13 ISSN: 1662-7482, Vols. 256-259, pp 2898-2901 doi:10.4028/www.scientific.net/amm.256-259.2898 2013 Trans Tech Publications, Switzerland The Analysis and

More information

Dräger UCF 6000 Thermal Imaging Camera

Dräger UCF 6000 Thermal Imaging Camera Dräger UCF 6000 Thermal Imaging Camera Missing important details at a fire scene can place lives at risk. But fire, smoke and darkness make visibility and navigation difficult. The UCF 6000 thermal imaging

More information

Pow-R-Command 1000 OPC Server

Pow-R-Command 1000 OPC Server Pow-R-Command 1000 OPC Server Technical Data TD01412040E Effective October 2007 New Information Contents General............................................... 2 Pow-R-Command 1000 System.........................

More information

MATLAB-to-ROCI Interface. Member(s): Andy Chen Faculty Advisor: Camillo J. Taylor

MATLAB-to-ROCI Interface. Member(s): Andy Chen Faculty Advisor: Camillo J. Taylor MATLAB-to-ROCI Interface Member(s): Andy Chen (chenab@seas.upenn.edu) Faculty Advisor: Camillo J. Taylor (cjtaylor@cis.upenn.edu) Abstract The Remote Objects Control Interface, or ROCI, is a framework

More information

THE TRUTH ABOUT SEARCH 2.0

THE TRUTH ABOUT SEARCH 2.0 THE TRUTH ABOUT SEARCH 2.0 SEO A WORLD OF PERPETUAL CHANGE Twelve months ago we launched the Truth About Search in a bid to simplify exactly what is going on in the world of search. Within the last year

More information

Vehicular Cloud Computing: A Survey. Lin Gu, Deze Zeng and Song Guo School of Computer Science and Engineering, The University of Aizu, Japan

Vehicular Cloud Computing: A Survey. Lin Gu, Deze Zeng and Song Guo School of Computer Science and Engineering, The University of Aizu, Japan Vehicular Cloud Computing: A Survey Lin Gu, Deze Zeng and Song Guo School of Computer Science and Engineering, The University of Aizu, Japan OUTLINE OF TOPICS INTRODUCETION AND MOTIVATION TWO-TIER VEHICULAR

More information

Java-Based Home Automation System

Java-Based Home Automation System 498 Java-Based Home Automation System A. R. Al-Ali, Member, IEEE & M. AL-Rousan Abstract This paper presents the design and implementation of a Java-based automation system that can monitor and control

More information

Open Access Apriori Algorithm Research Based on Map-Reduce in Cloud Computing Environments

Open Access Apriori Algorithm Research Based on Map-Reduce in Cloud Computing Environments Send Orders for Reprints to reprints@benthamscience.ae 368 The Open Automation and Control Systems Journal, 2014, 6, 368-373 Open Access Apriori Algorithm Research Based on Map-Reduce in Cloud Computing

More information

Topic 4 - Introduction to Metering on a DSLR

Topic 4 - Introduction to Metering on a DSLR Getting more from your Camera Topic 4 - Introduction to Metering on a DSLR Learning Outcomes In this lesson, we will look at another important feature on a DSLR camera called Metering Mode. By the end

More information

THE REAL ROOT CAUSES OF BREACHES. Security and IT Pros at Odds Over AppSec

THE REAL ROOT CAUSES OF BREACHES. Security and IT Pros at Odds Over AppSec THE REAL ROOT CAUSES OF BREACHES Security and IT Pros at Odds Over AppSec EXECUTIVE SUMMARY Breaches still happen, even with today s intense focus on security. According to Verizon s 2016 Data Breach Investigation

More information

Wireless Smart Home Security System Based on Android

Wireless Smart Home Security System Based on Android 2017 2 nd International Conference on Artificial Intelligence and Engineering Applications (AIEA 2017) ISBN: 978-1-60595-485-1 Wireless Smart Home Security System Based on Android LIANGYU CHEN, SEN ZHANG

More information

Question #1: 1. The assigned readings use the phrase "Database Approach." In your own words, what is the essence of a database approach?

Question #1: 1. The assigned readings use the phrase Database Approach. In your own words, what is the essence of a database approach? Question #1: 1. The assigned readings use the phrase "Database Approach." In your own words, what is the essence of a database approach? Respondant: I understand the essence of "database approach" to be

More information

ICT A BRIEF INTRODUCTION

ICT A BRIEF INTRODUCTION ICT A BRIEF INTRODUCTION TOPICS: What is ICT? Where does ICT literacy begin What skills makes one an ICT literate Why is ICT so important What are the fundamental elements of ICT How do you create information

More information

Intelligent Computer Room Management Platform Based on RF Card

Intelligent Computer Room Management Platform Based on RF Card 2017 2 nd International Conference on Artificial Intelligence and Engineering Applications (AIEA 2017) ISBN: 978-1-60595-485-1 Intelligent Computer Room Management Platform Based on RF Card LI ZHANG and

More information

SkyEyes: A Semantic Browser For the KB-Grid

SkyEyes: A Semantic Browser For the KB-Grid SkyEyes: A Semantic Browser For the KB-Grid Yuxin Mao, Zhaohui Wu, Huajun Chen Grid Computing Lab, College of Computer Science, Zhejiang University, Hangzhou 310027, China {maoyx, wzh, huajunsir}@zju.edu.cn

More information

TERMINOLOGY MANAGEMENT DURING TRANSLATION PROJECTS: PROFESSIONAL TESTIMONY

TERMINOLOGY MANAGEMENT DURING TRANSLATION PROJECTS: PROFESSIONAL TESTIMONY LINGUACULTURE, 1, 2010 TERMINOLOGY MANAGEMENT DURING TRANSLATION PROJECTS: PROFESSIONAL TESTIMONY Nancy Matis Abstract This article briefly presents an overview of the author's experience regarding the

More information

Mapping UML Component Specifications to JEE Implementations

Mapping UML Component Specifications to JEE Implementations Journal of Computer Science 3 (10): 780-785, 2007 ISSN 1549-3636 2007 Science Publications Mapping UML Component Specifications to JEE Implementations Jyhjong Lin Department of Information Management,

More information

INTRODUCING THE UNIFIED E-BOOK FORMAT AND A HYBRID LIBRARY 2.0 APPLICATION MODEL BASED ON IT. 1. Introduction

INTRODUCING THE UNIFIED E-BOOK FORMAT AND A HYBRID LIBRARY 2.0 APPLICATION MODEL BASED ON IT. 1. Introduction Преглед НЦД 14 (2009), 43 52 Teo Eterović, Nedim Šrndić INTRODUCING THE UNIFIED E-BOOK FORMAT AND A HYBRID LIBRARY 2.0 APPLICATION MODEL BASED ON IT Abstract: We introduce Unified e-book Format (UeBF)

More information

2 Geek Tech Support Services 2GTSS Products

2 Geek Tech Support Services 2GTSS Products CCTV / Security Camera Buying Guide Shopping for Security camera or CCTV system can be confusing sometimes especially with so many different kind of systems, trying find the right installer and making

More information

What is a Network Camera?

What is a Network Camera? Technology and Applications WHITE PAPER What is a Network Camera? Axis White Paper, 2002-1 - Copyright 2002, Axis Communications TABLE OF CONTENTS 1. INTRODUCTION... 3 2. WHY USE A NETWORK CAMERA AND WHERE?...

More information

See operational efficiency in a whole new light The Redwood intelligent lighting network solution from CommScope. Intelligent Building Solutions

See operational efficiency in a whole new light The Redwood intelligent lighting network solution from CommScope. Intelligent Building Solutions See operational efficiency in a whole new light The Redwood intelligent lighting network solution from CommScope Intelligent Building Solutions Efficiency opportunities are as close as your ceiling Data

More information

The Impact of the coming Standard IEC61850 on the Life-cycle of Open Communication Systems in Substations

The Impact of the coming Standard IEC61850 on the Life-cycle of Open Communication Systems in Substations The Impact of the coming Standard IEC61850 on the Life-cycle of Open Communication Systems in Substations Lars Andersson, Klaus-Peter Brand, Wolfgang Wimmer ABB Power Automation Ltd, Switzerland Abstract

More information

A Scalable Location Aware Service Platform for Mobile Applications Based on Java RMI

A Scalable Location Aware Service Platform for Mobile Applications Based on Java RMI A Scalable Location Aware Service Platform for Mobile Applications Based on Java RMI Olaf Droegehorn, Kirti Singh-Kurbel, Markus Franz, Roland Sorge, Rita Winkler, and Klaus David IHP, Im Technologiepark

More information

A Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme

A Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme A Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme Yue Zhang 1 and Yunxia Pei 2 1 Department of Math and Computer Science Center of Network, Henan Police College, Zhengzhou,

More information

How to Choose the Right Bus for Your Measurement System

How to Choose the Right Bus for Your Measurement System 1 How to Choose the Right Bus for Your Measurement System Overview When you have hundreds of different data acquisition (DAQ) devices to choose from on a wide variety of buses, it can be difficult to select

More information

First-Time Usability Testing for Bluetooth-Enabled Devices

First-Time Usability Testing for Bluetooth-Enabled Devices The University of Kansas Technical Report First-Time Usability Testing for Bluetooth-Enabled Devices Jim Juola and Drew Voegele ITTC-FY2005-TR-35580-02 July 2004 Project Sponsor: Bluetooth Special Interest

More information

Paper. It s all about input, connectivity, decision making, and output instructions.

Paper. It s all about input, connectivity, decision making, and output instructions. main menu SCADALESS SCADA USING WIRELESS MESH RADIO TELEMETRY Submitted January 23, 2007 by Louis F. De Silvio President, Industrial Telemetry, Inc. For Presentation at ISA Conference in Tulsa, April,

More information

Adaptive Middleware for Real-Time Software. Louise Avila CIS November 2, 2005

Adaptive Middleware for Real-Time Software. Louise Avila CIS November 2, 2005 Adaptive Middleware for Real-Time Software Louise Avila CIS 700-02 November 2, 2005 Topic An Adaptive Middleware for Context-Sensitive Communications for Real-Time Applications in Ubiquitous Computing

More information

ForSinglePrintOnly. Networking: ZigBee. Commissioning a wireless sensor and control system. By Jason Choong and Zachary Smith

ForSinglePrintOnly. Networking: ZigBee. Commissioning a wireless sensor and control system. By Jason Choong and Zachary Smith Networking: ZigBee Commissioning a wireless sensor and control system By Jason Choong and Zachary Smith ZigBee sensors are quite easy to install individually, but correctly designing and installing a large

More information

How to Improve Energy Efficiency & Reduce Maintenance

How to Improve Energy Efficiency & Reduce Maintenance How to Improve Energy Efficiency & Reduce Maintenance Getting the most from your energy management system John Wallace Emerson Climate Technologies Retail Solutions Discussion Topics Introduction to an

More information

xpc Target communication efficiency when multiple targets are involved

xpc Target communication efficiency when multiple targets are involved xpc Target communication efficiency when multiple targets are involved * *University of Craiova, Department of Automatic Control, 200585-Craiova Romania (Tel: +40-251-438198; e-mail: madalin@automation.ucv.ro)

More information

AOSA - Betriebssystemkomponenten und der Aspektmoderatoransatz

AOSA - Betriebssystemkomponenten und der Aspektmoderatoransatz AOSA - Betriebssystemkomponenten und der Aspektmoderatoransatz Results obtained by researchers in the aspect-oriented programming are promoting the aim to export these ideas to whole software development

More information

ECOTERRA Journal of Environmental Research and Protection

ECOTERRA Journal of Environmental Research and Protection ECOTERRA Journal of Environmental Research and Protection PC based data acquisition, monitoring and controlling techniques in wastewater treatment processes Leontin Catarig, Ciprian Pop, Csaba Bartha S.C.

More information

CSCI 445 Amin Atrash. Control Architectures. Introduction to Robotics L. Itti, M. J. Mataric

CSCI 445 Amin Atrash. Control Architectures. Introduction to Robotics L. Itti, M. J. Mataric Introduction to Robotics CSCI 445 Amin Atrash Control Architectures The Story So Far Definitions and history Locomotion and manipulation Sensors and actuators Control => Essential building blocks Today

More information

Today, utilities are focusing on improving or maintaining

Today, utilities are focusing on improving or maintaining TRANSFORMER MONITORING Trends in continuous on-line condition monitoring ABSTRACT The article describes new trends in the field of continuous on-line condition monitoring of transformers. These trends

More information

User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps

User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps Position Paper Gökhan Bal, Kai Rannenberg Goethe University Frankfurt

More information

Fusion of Radar and EO-sensors for Surveillance

Fusion of Radar and EO-sensors for Surveillance of Radar and EO-sensors for Surveillance L.J.H.M. Kester, A. Theil TNO Physics and Electronics Laboratory P.O. Box 96864, 2509 JG The Hague, The Netherlands kester@fel.tno.nl, theil@fel.tno.nl Abstract

More information

The Design of Supermarket Electronic Shopping Guide System Based on ZigBee Communication

The Design of Supermarket Electronic Shopping Guide System Based on ZigBee Communication The Design of Supermarket Electronic Shopping Guide System Based on ZigBee Communication Yujie Zhang, Liang Han, and Yuanyuan Zhang College of Electrical and Information Engineering, Shaanxi University

More information

Z-Wave Control Network. Introducing the next-generation wireless solution to integrate home electronics and systems

Z-Wave Control Network. Introducing the next-generation wireless solution to integrate home electronics and systems Z-Wave Control Network Introducing the next-generation wireless solution to integrate home electronics and systems Overview Z-Wave LCD Remote Control Controls the entire Z-Wave lighting control network

More information

Network Processing Technology for Terminals Enabling High-quality Services

Network Processing Technology for Terminals Enabling High-quality Services : Services for Hikari Era: Terminal Component Technologies Network Processing Technology for Terminals Enabling High-quality Services Yukikuni Nishida and Keiichi Koike Abstract This article describes

More information

Supercomputing and Mass Market Desktops

Supercomputing and Mass Market Desktops Supercomputing and Mass Market Desktops John Manferdelli Microsoft Corporation This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

More information

Troubleshooting CHAPTER

Troubleshooting CHAPTER CHAPTER 10 This chapter provides information for diagnosing and correcting common problems that may occur when you install and operate the client adapter. The following topics are covered in this chapter:

More information