Mobile Lighting Control Scheme Based on DALI Protocol

2015 ◽  
Vol 734 ◽  
pp. 970-974
Author(s):  
Qi Peng He ◽  
Xiao Yang He ◽  
Ying Ming Gao ◽  
Nian Yu Zou ◽  
Zhi Sen Wang ◽  
...  

Unable to control at long range is the shortage of DALI protocol. In order to solve this problem, a remote control scheme based on GPRS module is designed. In the hardware part, the GPRS module is set as a communication device of main controller, and the interface of MCU supports to the DALI protocol. In the software part, the control mechanism between the main controller and mobile terminal is realized. The software runs on the mobile terminal is developed, which is based on J2ME. The experimental result shows that the system responses are fast when user is at long range. It is of significant meaning for this design scheme on the development of advanced indoor lighting automation system.

2021 ◽  
Vol 295 (2) ◽  
pp. 40-44
Author(s):  
D. STATSENKO ◽  
◽  
B. ZLOTENKO ◽  
S. NATROSHVILI ◽  
T. KULIK ◽  
...  

The analysis of modern tendencies related to “Smart House” technologies is carried out in this article. The questions of programming languages of microcontrollers and microprocessors are considered. Software products that are used to create mobile applications for smartphones or tablets are presented. A computer system for remote control of room lighting is considered. The design and principle of its operation are shown schematically. A prototype of a computer system that has the following functions: 1) Control, on / off, lighting systems, depending on the needs of the owner of the premises. 2) Transfer of information about the level of illumination to the user, the owner of the premises. 3) Automatic switching on / off of electric, electroluminescent light sources, which are included in the room lighting control system. Photo of the prototype is shown. The principle of operation of the system control program based on the use of a photoresistor is presented. The Arduino microcontroller receives and processes information from the photoresistor, on the basis of which it automatically sends signals to the room lighting control system. The formulas for calculating the illumination using the results of the data obtained from the photoresistor of the prototype are given. The processed information, using wireless networks, goes to the interactive devices of the user, who can remotely check the value of illumination and, if necessary, control it. The visual interface of a mobile application for mobile phones and tablets using the Android operating system is presented. A computer system for controlling the lighting of premises, which is easy to use and does not require significant financial costs, is considered and analyzed. The methods of modeling, observation and research of computer systems are used in the work. The obtained results allow obtaining an effective computer system for remote control of indoor lighting.


2018 ◽  
Vol 7 (2.21) ◽  
pp. 99 ◽  
Author(s):  
Susan G Varghese ◽  
Ciji Pearl Kurian ◽  
V I. George ◽  
T S. Sudheer Kumar

This paper reports the results of measurements performed in a test room to test how digital camera can be used as luminance meter and thus to investigate the lighting control scheme based on the inputs coming from camera. An indoor lighting control scheme which adapts according to the daylight availability is presented in this work. The camera calibration procedure based on High Dynamic Range Imaging technique is used to obtain the camera response function which allows to relate pixel values obtained from the image and the photopic luminance values. Luminance gradient evaluation for the uniformity analysis is discussed for the test room.  


2013 ◽  
Vol 385-386 ◽  
pp. 1705-1707
Author(s):  
Tzer Long Chen ◽  
Yu Fang Chung ◽  
Jian Mao Hong ◽  
Jeng Hong Jhong ◽  
Chin Sheng Chen ◽  
...  

It is important to notice that the access control mechanism has been widely applied in various areas, such as on-line video systems, wireless network, and electronic documents. We propose an access control mechanism which is constructed based on two mathematical fundamentals: Lagrange interpolation and ElGamal algorithm. We conduct performance analysis to compare the efficiency of our proposed scheme with that of several related published schemes in both key generation phase and key derivation phase. Our new scheme is proven to be more efficient. It is shown, as expected, a more efficient scheme provides relatively less security and a more secure scheme is relatively less efficient for private keys of the same size.


2018 ◽  
pp. 128-132
Author(s):  
Нина Николаевна Лопунова ◽  
Вадим Владимирович Нерубасский

Today, Motor Sich JSC is developing its helicopter production. At the same time, great attention is paid to the creation of an infrastructure that should provide a full cycle of development and testing of new and modernized  helicopter assemblies. For resource testing of the power plant, the carrier system and transmission of the MSB-2 helicopter was created an open stand. To modernization the stand the program-technical complex PTK-MSB-2 was developed and implemented.A general description of the composition and structure of the open rig for resource testing of the MSB-2 light helicopter is given. The rig equipment includes a control panel with helicopter remote control, power supplies, sensors and actuators, communication channels. The control panel allows performing all technological operations for start/stop of two AI-450M turboshaft engines, helicopter remote control along seven channels (using seven servo-amplifiers/servomotors). It is indicated that the main means of automation of the rig is the PTC-MSB-2 program-technical complex. The basic elements and principles of operation of the hardware of PTC-MSB-2 are described. PTC-MSB-2 hardware consists of two hierarchical levels: the lower and the upper. Lower level consists of the cabs of the communication device with the object. The upper level of the PTC is two workstations (WS1 and WS2) and matrix printer. The software tools of PTC-MSB-2, their main functions and features of functioning are considered in detail. It is noted that the Running the software components is possible when the individual measuring channels fail, and when the WS2 fails. At the same time, the functions of the failed components are terminated.The goals of the modernization of the PTC-MSB-2 are listed, the principles for the implementation of algorithms for emergency protection and automation of helicopter resource testing are described. The chosen principle of automation of cyclic tests is based on the concepts of test mode, test cycle and test stage. There is a normal and emergency interruption of the test cycle. With a normal interruption, it is possible to resume the test stage from the next test cycle. The features of testing automation in regular and abnormal situations are briefly described.


2018 ◽  
Vol 7 (2.12) ◽  
pp. 174
Author(s):  
Yong Ho Kim ◽  
Hui IL Chang

Background/Objectives: It is a common for existing golf courses to manage all lighting facilities in batches because it is hard to controllighting individually. That is very much part of the golf courses and forces the whole golf course to light on even though play was finished due to the difficulty of real time checking situationMethods/Statistical analysis: Lighting control device and method in this study are provided not only to control remotely individual lighting installed each hole in golf course but to inspect failure of lighting. There is no longer to stay golf course in person to control lighting system.Findings:Lighting control device and method to be able to control individual lighting installed each hole in golf course is provided to response for the problem in a waste of electricity after playing. User device makes it possible to remotely control lighting and inspect failure of itImprovements/Applications: It can expect to reduce golf course operation management cost by building a smart tower remote control system  


2011 ◽  
Vol 2 (3) ◽  
pp. 22-37 ◽  
Author(s):  
Roel Peeters ◽  
Dave Singelée ◽  
Bart Preneel

Designing a secure, resilient and user-friendly access control system is a challenging task. In this article, a threshold-based location-aware access control mechanism is proposed. This design uniquely combines the concepts of secret sharing and distance bounding protocols to tackle various security vulnerabilities. The proposed solution makes use of the fact that the user carries around various personal devices. This solution offers protection against any set of or fewer compromised user’s devices, with being an adjustable threshold number. It removes the single point of failure in the system, as access is granted when one carries any set of user’s devices. Additionally it supports user-centered management, since users can alter the set of personal devices and can adjust the security parameters of the access control scheme towards their required level of security and reliability.


2020 ◽  
Vol 4 (3) ◽  
pp. 36
Author(s):  
Zonglin Yi ◽  
To Ngai

The properties of binary colloidal systems have gained the interest of researchers because they have much richer structures than their one-component counterpart. Continuing efforts are being made on the theoretical side on binary colloidal systems, while many issues remained unsolved for the lack of solid experimental supports, especially for study in the field of two-dimensional (2D) binary colloids system. Oil–water interfaces can serve as a good stringent 2D confinement for colloidal particles and can avoid anomalous problems caused by the quasi-two-dimensional environment in previous experimental reports. In this work, we conduct experimental research of binary colloids system in an oil–water interface to revisit theoretical predication. We measure an ultra-long-range attraction and discuss the possible mechanism of this attraction by comparing the experimental result with existing model and theory. This study could contribute more understanding of the binary colloidal system in both experimental aspects and theoretical aspects.


Sign in / Sign up

Export Citation Format

Share Document