Design and Development of Embedded Turbine Supervisory Instruments Based on ARM and Linux

2011 ◽  
Vol 80-81 ◽  
pp. 1237-1243
Author(s):  
Jian Cheng ◽  
Yi Min Wei ◽  
Xin Xiong ◽  
Chun Biao Gan ◽  
Shi Xi Yang

Aiming at issues of the modern embedded turbine supervisory instruments such as simplistic function, weak process power, low efficiency and so on, the technique of double CPUs with the cores of Intel PXA270 and Cyclone II EP2C20 microprocessors is employed in the present design. With embedded linux operating system and the developing platform of Qt software implemented, important functions such as data acquisition, data transfer based on TCP/IP protocols, display of data waveform, local storage of data, data analysis, elementary fault diagnosis and so forth can be achieved all together in a single facility. After tested on the Rotor Kit 4 of Bently Nevada and applied on 300MW turbine of the Power System Dynamic Simulation Laboratory in North China Electric Power University, the newly designed embedded turbine supervisory instruments show that the technique of double CPUs is effective, and the portable system can overcome the deficiencies of the modern embedded turbine supervisory instruments as mentioned above.

Aerospace ◽  
2021 ◽  
Vol 8 (5) ◽  
pp. 133
Author(s):  
Sugjoon Yoon ◽  
Dongcho Shin ◽  
Younghoon Choi ◽  
Kyungtae Park

In order to study air traffic control of UAS’s (Unmanned Aerial Systems) in very low altitudes, the UTM (UAS Traffic Management) simulator has to be as flexible and expandable as other research simulators because relevant technologies and regulations are not matured enough at this stage. Available approaches using open sources and platforms are investigated to be used in the UTM simulator. The fundamental rationale for selection is availability of necessary resources to build a UTM simulator. Integration efforts to build a UTM simulator are elaborated, using Ardupilot, MavProxi, Cesium, and VWorld, which are selected from the thorough field study. Design requirements of a UTM simulator are determined by analyzing UTM services defined by NASA (National Aeronautics and Space Administration) and Eurocontrol. The UTM simulator, named eUTM, is composed of three components: UOS (UTM Operating System), UTM, and multiple GCSs (Ground Control Stations). GCSs are responsible for generation of flight paths of various UASs. UTM component copies functions of a real UTM such as monitoring and controlling air spaces. UOS provides simulation of environment such as weather, and controls the whole UTM simulator system. UOS also generates operation scenarios of UTM, and resides on the same UTM computer as an independent process. Two GCS simulators are connected to the UTM simulator in the present configuration, but the UTM simulator can be expanded to include up to 10 GCS simulators in the present design. In order to demonstrate the flexibility and expandability of eUTM simulator, several operation scenarios are realized and typical deconfliction scenarios among them are tested with a deconfliction algorithm. During the study, some limits are identified with applied open sources and platforms, which have to be resolved in order to obtain a flexible and expandable UTM simulator supporting relevant studies. Most of them are related to interfacing individual sources and platforms which use different program languages and communication drivers.


2016 ◽  
Vol 23 (3) ◽  
pp. 514-525 ◽  
Author(s):  
Patrick C Sanger ◽  
Andrea Hartzler ◽  
Ross J Lordon ◽  
Cheryl AL Armstrong ◽  
William B Lober ◽  
...  

Objective The proposed Meaningful Use Stage 3 recommendations require healthcare providers to accept patient-generated health data (PGHD) by 2017. Yet, we know little about the tensions that arise in supporting the needs of both patients and providers in this context. We sought to examine these tensions when designing a novel, patient-centered technology – mobile Post-Operative Wound Evaluator (mPOWEr) – that uses PGHD for post-discharge surgical wound monitoring. Materials and Methods As part of the iterative design process of mPOWEr, we conducted semistructured interviews and think-aloud sessions using mockups with surgical patients and providers. We asked participants how mPOWEr could enhance the current post-discharge process for surgical patients, then used grounded theory to develop themes related to conflicts and agreements between patients and providers. Results We identified four areas of agreement: providing contextual metadata, accessible and actionable data presentation, building on existing sociotechnical systems, and process transparency. We identified six areas of conflict, with patients preferring: more flexibility in data input, frequent data transfer, text-based communication, patient input in provider response prioritization, timely and reliable provider responses, and definitive diagnoses. Discussion We present design implications and potential solutions to the identified conflicts for each theme, illustrated using our work on mPOWEr. Our experience highlights the importance of bringing a variety of stakeholders, including patients, into the design process for PGHD applications. Conclusion We have identified critical barriers to integrating PGHD into clinical care and describe design implications to help address these barriers. Our work informs future efforts to ensure the smooth integration of essential PGHD into clinical practice.


Micromachines ◽  
2020 ◽  
Vol 11 (12) ◽  
pp. 1075
Author(s):  
Tao Cai ◽  
Qingjian He ◽  
Dejiao Niu ◽  
Fuli Chen ◽  
Jie Wang ◽  
...  

The non-volatile memory (NVM) device is a useful way to solve the memory wall in computers. However, the current I/O software stack in operating systems becomes a performance bottleneck for applications based on NVM devices, especially for key–value stores. We analyzed the characteristics of key–value stores and NVM devices and designed a new embedded key–value store for an NVM device simulator named PMEKV. The embedded processor in NVM devices was used to manage key–value pairs to reduce the data transfer between NVM devices and key–value applications. Meanwhile, it also cut down the data copy between the user space and the kernel space in the operating system to alleviate the I/O software stacks on the efficiency of key–value stores. The architecture, data layout, management strategy, new interface and log strategy of PMEKV are given. Finally, a prototype of PMEKV was implemented based on PMEM. We used YCSB to test and compare it with Redis, MongDB, and Memcache. Meanwhile, the Redis for PMEM named PMEM-Redis and PMEM-KV were also used to test and compared with PMEKV. The results show that PMEKV had the advantage of throughput and adaptability compared with the current key–value stores.


Author(s):  
Sitna Hajar Hadad

Abstrak: Tujuan Penelitian ini adalah Untuk merancang dan mengimplementasikan jaringan protokol IPv4 pada Kampus Aikom Ternate, Penelitian ini dilakukan pada Laboraturium Akademi Ilmu Komputer (AIKOM) Ternate. Teknik Pengumpulan data melaui Pustaka, Penilitian Lapangan, observasi dan interview, Metode Perancangan dan implementasi Jaringan menggunakan protokol IPv4 dengan system operasi Linux Sabily. Jaringan tersebut dibuat dengan menggunakan router yang terkoneksi IPv4 ke internet, Pengujian menggunakan Sistem Operasi Linux Sabily, data yang diuji secara realtime mengenai suhu, kecepatan transfer data dan ketersediaan sumber daya. dengan adanya Rancang Bangun Sistem Jaringan Menggunakan Linux Sabily diharapkan dapat mempermudah penyampaian materi, informasi dan proses belajar mengajar antar komputer di laboratorium Akademi Ilmu Komputer (AIKOM) TernateKata kunci: Rancang, Sistem jaringan, Linux SabilyAbstract: The purpose of this research is to design and implementation network protocol IPv4 on the campus on Akademi Ilmu Komputer (Aikom) Ternate, This research was conducted at the Laboraturium Akademi Ilmu Komputer (Aikom) Ternate. The technique of data collection through the library, Penilitian, Field observation and interview, Network design and implementation method uses the IPv4 protocol with Sabily Linux operating system, The network created by using IPv4 router connected to the internet, Testing using the operating system Linux, Sabily tested in realtime data about temperature, the speed of data transfer and availability of resources, with the network system is expected to facilitate the delivery of content, teaching and learning processes and information between computers in the lab on Akademi Ilmu Komputer (Aikom) TernateKeywords: Design, Network System, Linux Sabily


Author(s):  
X. Tan ◽  
L. Di ◽  
M. Deng ◽  
A. Chen ◽  
Z. Sun ◽  
...  

Flooding caused serious losses in China in the past two decades; therefore, responding to and mitigating the impact of flooding is a task of critical importance. The traditional flood response process is usually very time-consuming and labor-intensive. The Service-Oriented Architecture (SOA)-based flood response is a method with low efficiency due to the large volume of geospatial data transfer, and this method cannot meet the real-time requirement of a rapid response to flooding. This paper presents an Agent- and Cloud-supported geospatial service aggregation to obtain a more efficient geospatial service system for the response to flooding. The architecture of this method is designed and deployed on the Cloud environment, and the flooding response prototype system is built on the Amazon AWS Cloud to demonstrate that the proposed method can avoid transferring large volumes of geospatial data or Big Spatial Data. Consequently, this method is able to achieve better performance than that of the SOA-based method.


Author(s):  
Maradani Bhuvana Chandra ◽  
Korada Puneeth ◽  
Gaurav Dubey

This paper presents the implementation of an Internet of Things (IoT) application that performs the Moisture level sensing through node MCU and Raspberry Pi, and data transfer to the Cloud of the Amazon Web Services or Raspberry Pi. The implementation is done using programming the Node MCU using Embedded C, Raspberry pi is Operated using Raspbian operating system and AWS EC2 Internet of Things platform based on the Node-RED tool installed on the Raspberry Pi and the AWS EC2. The Interconnection of data from the Node MCU to Raspberry Pi is done by MQTT Data Transfer Protocol and Mosquitto Protocol.


2021 ◽  
Vol 11 (12) ◽  
pp. 2937-2949
Author(s):  
M. Rajakumaran ◽  
S. Ramabalan

Future mechanical frameworks will be arranged in exceptionally organized conditions in which they speak with modern control frameworks, cloud administrations or various other systems at distant areas. In this pattern of solid digitization of modern frameworks (likewise some of the time alluded to as Industry 4.0), digital assaults are an in-wrinkling danger to the uprightness of the automated frameworks at the center of this unique turn of events. It is normal, that the ROS shall assume a significant function in advanced mechanics outside of unadulterated exploration situated situations. ROS anyway has noteworthy security issues which should be tended to before such items should arrive at mass business sectors. Robot Operating System has emerged promptly as an alluring production method at micro and nano scales, particularly in the area of biomedical applications because of its flexibility and condensed size. As disputed to conventional grippers in the field of biomedical applications where mobility is less and show size restriction threats, ROS based micro-grippers are clear from outside power input and yield better mobility. It also has a significant impact on the field of biomedical surgery, where security is a major threat. With the current improvements in wireless communications, Tactile Internet has endorsed a dominant impact. It is regarded as the future huge development which can give current-time regulation in industrial systems, especially in the field of tele surgery. Even though, in remote-surgery environment the data transfer is subjected to various attack points. Hence, in order to understand the real capacity of safe tele-surgery, it is needed to develop a safe verification and key agreement protocol for tele-surgery. We offer here an effective, secure and common verification method in the field of biomedical application in the field of robotic tele-operation. The developed protocol ensures safe interaction samidst the surgeon, robotic arm, and the devoted jurisdiction; The results obtained express the flexibility of the protocol against offline password assuming attacks, replay attacks, imitation attacks, man-in-the-middle attacks, DoS attacks, etc.


2011 ◽  
Vol 255-260 ◽  
pp. 2188-2191
Author(s):  
Geng Xin Sun ◽  
Feng Jing Shao ◽  
Sheng Bin

Focusing on the characteristics of the new high secure architecture of network computer, an operating system with internal network structure is designed. The operating system contains two subkernels: local kernel and network kernel, the two subkernels run individually in two subsystems. In order to communicate between two subsystems securely, an inter-subsystem private data transfer protocol is proposed and implemented in this paper. The private protocol is a connection-oriented protocol, it can provide reliable end-to-end connectivity Protocol format and protocol connection management based on signature verification are elaborated.


Author(s):  
Suchita Kamble ◽  
N. N. Mhala

The continuing advances in the performance of network servers make it essential for network interface cards (NICs) to provide more sophisticated services and data processing. Modern network interfaces provide fixed functionality and are optimized for sending and receiving large packets. Network interface cards allow the operating system to send and receive packets through the main memory to the network. The operating system stores and retrieves data from the main memory and communicates with the NIC over the local interconnect, usually a peripheral component interconnect bus (PCI). Most NICs have a PCI hardware interface to the host server, use a device driver to communicate with the operating system and use local receive and transmit storage buffers. NICs typically have a direct memory access (DMA) engine to transfer data between host memory and the network interface memory. In addition, NICs include a medium access control (MAC) unit to implement the link level protocol for the underlying network such as Ethernet, and use a signal processing hardware to implement the physical (PHY) layer defined in the network. To execute and synchronize the above operations NICs also contents controller whose architecture is customized for network data transfer. In this paper we present the architecture of application specific controller that can be used in NICs.


2013 ◽  
Vol 341-342 ◽  
pp. 1181-1186
Author(s):  
Li Hong Zhang ◽  
Shu Qian Chen

The mobile agent route is essentially a multi-constraint optimization problem, Genetic Algorithms has fast random global search ability, but the feedback information of the system does not use and has the problem of low efficiency of finding exact solutions, propose a genetic hybrid ant colony algorithm for WSN mobile agent route. Use of the fast random global search capabilities of genetic algorithm to find better solutions, then the better solution replaced by the initial pheromone of the ant colony algorithm, finally use the advantages of convergence speed of ant colony algorithm to find the global optimal solution for mobile agent route. Simulation results show that the algorithm can find optimal mobile agent route in a relatively short time, relative to other routing algorithms, reducing network latency and average energy consumption, improving the speed and efficiency of data transfer.


Sign in / Sign up

Export Citation Format

Share Document