The Research of Ranging with Timing over Packet Network for the Mine Safety Application

نویسندگان

  • Xiaoxiao Liu
  • Jun Steed Huang
  • Zujue Chen
چکیده

Due to the recent saturation of the traditional telecom markets, the vendors are shifting their focus on to the vertical markets, including but not limited to oil and mine industries. This paper is offering a solution for one of the key issues the mine industry is facing. When the accident happen under the mine, the first thing to do is to locate the workers, there are many methods been proposed; however, each has pros and cons. For example, we can use RFID to locate the people, the problem is when there are too many miners at the same spot, the method doesn’t work well; we can use CDMA indoor GPS system to locate the person, however, the base station is not cheap; we can use IEEE802.15 Zigbee system to locate people, but we need huge amount of nodes to cover reasonable size of mine; for these reasons, we propose to use low cost WiFi system to fulfill the task. We introduce IEEE1588 Precision Timing Protocol into the existing WiFi or similar mesh networks, to increase the Time of Arrival ranging accuracy. This way, with limited increasing of the system cost, we satisfy the customer requirements. To prove the concept, Matlab is used to work out the theoretical bit-flow vacation model and the simple linear-ranging algorithms. Index Terms — wireless packet network, precise time synchronization, emergency miner locating

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Feedback Based Mechanism for Video Streaming Over Multipath Ad Hoc Networks

Ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. Such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. Video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. H...

متن کامل

Application of cut set method to reliability evaluation of mine ventilation networks

Providing a fresh and cool airflow in underground mines is one of the main concerns during mining. Destruction of support systems, the presence of undesirable objects in the airway and distortion of airflow are the parameters involved that would result in pressure loss, which would affect the ventilation network. There are a lot of research works about the ventilation network planning that cons...

متن کامل

Application of artificial neural network and genetic algorithm to modelling the groundwater inflow to an advancing open pit mine

In this study, a hybrid intelligent model has been designed to predict groundwater inflow to a mine pit during its advance. Novel hybrid method coupling artificial neural network (ANN) with genetic algorithm (GA) called ANN-GA, was utilised. Ratios of pit depth to aquifer thickness, pit bottom radius to its top radius, inverse of pit advance time and the hydraulic head (HH) in the observation w...

متن کامل

Feature Extraction to Identify Network Traffic with Considering Packet Loss Effects

There are huge petitions of network traffic coming from various applications on Internet. In dealing with this volume of network traffic, network management plays a crucial rule. Traffic classification is a basic technique which is used by Internet service providers (ISP) to manage network resources and to guarantee Internet security. In addition, growing bandwidth usage, at one hand, and limit...

متن کامل

A Method to Reduce Effects of Packet Loss in Video Streaming Using Multiple Description Coding

Multiple description (MD) coding has evolved as a promising technique for promoting error resiliency of multimedia system in real-time application programs over error-prone communicational channels. Although multiple description lattice vector quantization (MDCLVQ) is an efficient method for transmitting reliable data in the context of potential error channels, this method doesn’t consider disc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JNW

دوره 7  شماره 

صفحات  -

تاریخ انتشار 2012