2017
DOI: 10.1186/s13673-017-0101-x
|View full text |Cite
|
Sign up to set email alerts
|

PLC-based design of monitoring system for ICT-integrated vertical fish farm

Jun-Ho Huh

Abstract: The common cause of the mass mortality of fishes in a fish farm is a power failure. There can be many reasons for the power failures but most of them are the result of natural disasters, systematic faults, ill-willed sabotages, or mistakes of employees. Such incidents usually have a bad influence upon small or medium-scale farmers. To deal with unexpected power failures, this research proposes a status monitoring system utilizing both PLC and ICT. Consistent supply of electric power in Fish Farms is essential … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0
1

Year Published

2017
2017
2019
2019

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 52 publications
(33 citation statements)
references
References 20 publications
0
32
0
1
Order By: Relevance
“…Currently, a fingerprint authentication system is being widely adopted by smart devices: Application Programming Interface (API) for Android Marshmellow, Touch ID (iOS), and the similar systems used by Chinese-made smartphones. IT researchers believe that such a phenomenon will continue even though security concerns over the increasing number of smart devices are yet to be solved [22][23][24]. Meanwhile, Satoshi Nakamoto (200) had proposed a solution [1] for the duplicate payment issue on P2P networks.…”
Section: Background Knowledgementioning
confidence: 99%
“…Currently, a fingerprint authentication system is being widely adopted by smart devices: Application Programming Interface (API) for Android Marshmellow, Touch ID (iOS), and the similar systems used by Chinese-made smartphones. IT researchers believe that such a phenomenon will continue even though security concerns over the increasing number of smart devices are yet to be solved [22][23][24]. Meanwhile, Satoshi Nakamoto (200) had proposed a solution [1] for the duplicate payment issue on P2P networks.…”
Section: Background Knowledgementioning
confidence: 99%
“…Information on living individuals, such as names, resident registration numbers, and videos, can be easily combined with other information, even if it is not possible to recognize a particular individual. And personal information is information about identified or identifiable surviving individuals and takes the basic principles of OECD privacy [14][15][16][17]. This includes identifying an individual easily combined with other information, even though the information alone does not identify the individual.…”
Section: Privacymentioning
confidence: 99%
“…In this paper, we propose an approach to automatically extract law terms and their definitions so as to construct a law ontology. Much current state-of-the-art research has explored automation strategies [8][9][10][11] to support various online applications. In the following sections, we describe the related work in terms of Chinese word segmentation and ontology.…”
Section: Chinese Word Segmentationmentioning
confidence: 99%