• Title/Summary/Keyword: 선형발전시스템

Search Result 220, Processing Time 0.034 seconds

Voronoi-Based Search Scheme for Road Network Databases (도로 망 데이터베이스를 위한 보로노이 기반의 탐색 방안)

  • Kim, Dae-Hoon;Hwang, Een-Jun
    • Journal of IKEEE
    • /
    • v.11 no.4
    • /
    • pp.348-357
    • /
    • 2007
  • Due to the improved performance and cost of personal mobile devices and rapid progress of wireless communication technology, the number of users who utilize these devices is increasing. This trend requires various types of services be available to users. So far, there have been many solutions provided for the shortest path problem. But, technologies which can offer various recommendation services to user depending on user’s current location are focused on Euclidean spaces rather than road network. Thus, in this paper, we extend the previous work to satisfy this requirement on road network database. Our proposed scheme requires pre-computation for the efficient query processing. In the preprocessing step, we first partition the input road network into a fixed number of Voronoi polygons and then pre-compute routing information for each polygon. In the meantime, we select the number of Voronoi polygons in proposition to the scale of road network. Through this selection, the required size of pre-computation is linearly increasing to the size of road network. Using this pre-computated information, we can process queries more quickly. Through experiments, we have shown that our proposed scheme can achieve excellent performance in terms of scheduling time and the number of visited nodes.

  • PDF

전력시장 소매가격의 규제가 사회후생에 미치는 영향

  • Kim, Hyeon-Suk;Lee, Su-Jin;Lee, Jeong-In
    • Environmental and Resource Economics Review
    • /
    • v.21 no.1
    • /
    • pp.93-127
    • /
    • 2012
  • We estimate how much KEPCO can save their loss and how much social welfare can be increased by applying the real-time pricing instead of current regulated retail price in the electricity market in order to analyze the problem of the regulated retail price which is fixed below the marginal cost. We estimate the demand functions of peak time and off-peak time in summer (June to August) and winter (December to February). We construct the supply function based on hourly step-wise linear marginal cost functions, too. We find that the increase of social welfare will be 67 billion won in summer if the fixed retail price is changed into the real-time pricing scheme. The total 705 billion won will be transferred from consumer surplus to producer surplus and the rest (67 billion won) will be saved from the reduction of deadweight loss among KEPCO's loss. In winter, the increase of social surplus will be 225 billion won and 1,174 billion won of KEPCO's loss will be transferred from consumer surplus. As a result, we conclude that the regulation of the retail price in the electricity market induces the social welfare loss and KEPCO suffers a huge loss.

  • PDF

Practical Reading of Gilles Deleuze on Frame from Filmmaking Perspective (들뢰즈의 프레임: 영화제작 관점에서 읽기)

  • Kim, Jung-Ho;Kim, Jae Sung
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.11
    • /
    • pp.527-548
    • /
    • 2019
  • For Deleuze, the frame is a closed system with numerous subsets of information. the frame can be defined by mathematics and physics. it is a geometric system of equilibrium and harmony with variables or coordinates. like paintings, Linear perspective represents a three-dimensional depth in a two-dimensional plane through vanishing points, horizontal lines in the frame. Linear perspective makes it possible to assume the infinity towards the vanishing point and the infinity towards the outside of the frame, the opposite of the vanishing point. Not only figures and lines in the drawing paper, but also the space between the figures and lines in the drawing paper was recognized. that is space, the 3rd dimension. with the centripetal force and centrifugal force of the frame, frame follow the physical rules of power and movement. de framing is against the dominant linear perspective and central tendency of the frame. The film contains four-dimensional time while reproducing three-dimensional space in two dimensions. It may be that the outside of the frame, or outside the field of view, contains thought, the fifth dimension.

Application technique on thrust jacking pressure of shield TBM in the sharp curved tunnel alignment by model tests (축소모형실험을 통한 급곡선 터널에서의 Shield TBM 추진 압력 적용 기술에 대한 연구)

  • Kang, Si-on;Kim, Hyeob;Kim, Yong-Min;Kim, Sang-Hwan
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.19 no.2
    • /
    • pp.335-353
    • /
    • 2017
  • This paper presents the application technique on thrust jacking pressuring of shield TBM in the sharp curved tunnel alignment by model tests. Recently, the application of shield TBM method as mechanized tunnelling is increasing to prevent the vibration and noise problems, which can be occurred in the NATM in the urban area in Korea. However, it is necessary to plan the sharp curved tunnel alignment in order to avoid the building foundation and underground structures, to develop the shield TBM operation technique in the shape curved tunnel alignment. Therefore, the main operation parameters of shield TBM in the curved tunnel alignment are reviewed and analyzed based on the case study and analytical study. The results show that the operation of shield jacking force system is the most important technique in the shape curved tunnel alignment. The simplified scaled model tests are also carried out in order to examine the ground-shield TBM head behaviour. The earth pressures acting on the head of shield TBM are investigated according to two different shield jacking force systems (uniform and un-uniform pressure) and several articulation angles. The results obtained from the model tests are analysed. These results will be very useful to understand the shield TBM head interaction behaviour due to the shield jacking operation technique in the shape curved tunnel alignment, and to develop the operation technique.

Robust Feature Extraction Based on Image-based Approach for Visual Speech Recognition (시각 음성인식을 위한 영상 기반 접근방법에 기반한 강인한 시각 특징 파라미터의 추출 방법)

  • Gyu, Song-Min;Pham, Thanh Trung;Min, So-Hee;Kim, Jing-Young;Na, Seung-You;Hwang, Sung-Taek
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.3
    • /
    • pp.348-355
    • /
    • 2010
  • In spite of development in speech recognition technology, speech recognition under noisy environment is still a difficult task. To solve this problem, Researchers has been proposed different methods where they have been used visual information except audio information for visual speech recognition. However, visual information also has visual noises as well as the noises of audio information, and this visual noises cause degradation in visual speech recognition. Therefore, it is one the field of interest how to extract visual features parameter for enhancing visual speech recognition performance. In this paper, we propose a method for visual feature parameter extraction based on image-base approach for enhancing recognition performance of the HMM based visual speech recognizer. For experiments, we have constructed Audio-visual database which is consisted with 105 speackers and each speaker has uttered 62 words. We have applied histogram matching, lip folding, RASTA filtering, Liner Mask, DCT and PCA. The experimental results show that the recognition performance of our proposed method enhanced at about 21% than the baseline method.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

A study on skin temperature distribution of the human body as fundamental data for developing heat energy harvesting clothing (열전에너지 수확 의류를 위한 인체표면 온도분포의 기초적 고찰)

  • Yang, Jin-Hee;Cho, Hyun-Seung;Park, Sun-Hyung;Lee, Joo-Hyeon
    • Science of Emotion and Sensibility
    • /
    • v.14 no.3
    • /
    • pp.435-444
    • /
    • 2011
  • The development of ubiquitous healthcare technology and portable electronic devices requires new energy sources for providing continuous power supply. This study particularly focuses on an energy harvesting system capable of charging energy using clothing. One of the sources for energy harvesting is heat energy, which is the difference in temperature of the body and the surrounding environment. In this study, the skin temperature distribution of the human body was empirically measured to determine the basic materials needed to develop heat energy harvesting clothing. The distribution of skin temperature in different sections of the human body was analyzed. The analysis found that the skin temperature of the upper body was higher than that of the lower body. The area close to the heart with a lot of blood flow was especially high. The skin temperature of the back side of the body, such as the back of the neck, upper back, and waist, was higher than that of the front side of the body. As for the arms, the skin temperature of the upper arms was higher than that of the lower arms, and the skin temperature of the back side of the arms was lower than that of the front and the flank side of the arms. The difference in the average skin temperature and the environment temperature was highest at the back of the neck, and thereby is considered to be the most appropriate section to integrate the heat energy harvesting function and structure. The following sections had the next highest difference in values, listed in descending order: the back of the waist, the sides of shoulders, the front chest area, the front side of the upper arms, and the front abdomen. Based on the skin temperatures of the different sections of the human body, this study outlines the basic guidelines for developing heat energy harvesting clothing.

  • PDF

Evaluation of Parameter Characteristics of the Storage Function Model Using the Kinematic Wave Model (운동파모형을 이용한 저류함수법 매개변수의 특성 평가)

  • Choi, Jong-Nam;Ahn, Won-Shik;Kim, Hung-Soo;Park, Min-Kyu
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.10 no.4
    • /
    • pp.95-104
    • /
    • 2010
  • The storage function model is one of the most commonly used models for flood forecasting and warning system in Korea. This paper studies the physical significance of the storage function model by comparing it with kinematic wave model. The results showed universal applicability of the storage function model to Korean basins. Through a comparison of the basic equations for the models, the storage function model parameters, K, P and $T_l$, are shown to be related with the kinematic wave model parameters, k and p. The analysis showed that P and p are identical and K and $T_l$ can be related to k, basin area, and coefficients of Hack's law. To apply the storage function model throughout the southern part of Korean peninsular, regional parameter relationships for K and $T_l$ were developed for watershed area using data from 17 watersheds and 101 flood events. These relationships combine the kinematic wave parameters with topographic information using Hack's Law.

Modeling of Magnetotelluric Data Based on Finite Element Method: Calculation of Auxiliary Fields (유한요소법을 이용한 MT 탐사 자료의 모델링: 보조장 계산의 고찰)

  • Nam, Myung-Jin;Han, Nu-Ree;Kim, Hee-Joon;Song, Yoon-Ho
    • Geophysics and Geophysical Exploration
    • /
    • v.14 no.2
    • /
    • pp.164-175
    • /
    • 2011
  • Using natural electromagnetic (EM) fields at low frequencies, magnetotelluric (MT) surveys can investigate conductivity structures of the deep subsurface and thus are used to explore geothermal energy resources and investigate proper sites for not only geological $CO_2$ sequestration but also enhanced geothermal system (EGS). Moreover, marine MT data can be used for better interpretation of marine controlled-source EM data. In the interpretation of MT data, MT modeling schemes are important. This study improves a three dimensional (3D) MT modeling algorithm which uses edge finite elements. The algorithm computes magnetic fields by solving an integral form of Faraday's law of induction based on a finite difference (FD) strategy. However, the FD strategy limits the algorithm in computing vertical magnetic fields for a topographic model. The improved algorithm solves the differential form of Faraday's law of induction by making derivatives of electric fields, which are represented as a sum of basis functions multiplied by corresponding weightings. In numerical tests, vertical magnetic fields for topographic models using the improved algorithm overcome the limitation of the old algorithm. This study recomputes induction vectors and tippers for a 3D hill and valley model which were used for computation of the responses using the old algorithm.

A Study on Unstable Phenomenon of Space Truss Structures Considering Initial Imperfection (트러스형 공간구조물의 초기 불완전을 고려한 불안정 현상에 관한 연구)

  • Lee, Jin-Hyouk;Baik, Tai-Soon;Shon, Su-Deok;Kim, Seung-Deog;Kang, Moon-Myung
    • Journal of Korean Association for Spatial Structures
    • /
    • v.4 no.2 s.12
    • /
    • pp.63-71
    • /
    • 2004
  • The structural space is gradually wide and is wanting agreeable environment by the requirement and necessity of people who lives modem stage. The building coincides with such requirements and is the high rise building actual circumstances which is doing ultra-large. The confirmed report of the technology to organize great merit is becoming currently considerably important issue in constructing a building field. Thus, this paper examine closely for nonlinear unstable taking a picture uneasiness height of prosperity considering to initial imperfection by a numerical method with a space frame structure of discrete system in large space structure. Based on previous investigation method, this paper induce nodal stiffness matrix of solid truss elements considering geometrical nonlinear using finite element method. In this paper, three types of space structure considered; i) 1-free node space structure, ii) 2-free node space structure, iii) multi-free node space structure. It apply the above examples to a nonlinear program, next, grasp the characteristic of an unstable conduct and the result was a clearing low.

  • PDF