• Title/Summary/Keyword: 에너지 변조

Search Result 168, Processing Time 0.021 seconds

Photovoltaic Generation System Control Using Space Vector PWM Method (공간벡터 PWM 방식을 이용한 태양광 발전 시스템 제어)

  • Cho, Moon-Taek;Choi, Hae-Gill;Lee, Chung-Sik;Baek, Jong-Mu
    • Journal of the Korean Society of Radiology
    • /
    • v.4 no.3
    • /
    • pp.31-37
    • /
    • 2010
  • In this paper, a photovoltaic system is designed with PWM(Pulse Width Modulation) voltage source inverter. Proposed synchronous signal and control signal was processed by 56F8323 microprocessor for stable modulation. The PWM voltage source inverter using inverter consists of complex type of electric power converter to compensate for the defect, that is solar cell cannot be developed continuously by connecting with the source of electric power for ordinary use. It can cause the effect of saving electric power, from 10 to 20[%]. The PWM voltage source inverter operates in situation that its output voltage is in same phase with the utility voltage. In addition, I connected extra power to the system through operation the system voltage and inverter power in a synchronized way by extracting the system voltage so that the phase of the system and PWM voltage inverter can be synchronized. In the system of this research showed good results after being controlled in order to provide stable power to the load and the system through maintaining and low output power of harmonics.

A study on Zigbee Authentication Protocol Using System IDs in Environments of Smart Grid (스마트 그리드 환경에서 시스템 ID를 이용한 지그비 인증 프로토콜에 관한 연구)

  • Kim, Kyoung-Mok;Im, Song-Bin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.101-110
    • /
    • 2011
  • A smart grid networks delivers electricity from suppliers to consumers using digital technology with two-way communications to control appliances at consumers' homes to save energy, reduce cost and increase reliability and transparency. Security is critically important for smart grid networks that are usually used for the electric power network and IT environments that are opened to attacks, such as, eavesdroping, replay attacks of abnormal messages, forgery of the messages to name a few. ZigBee has emerged as a strong contender for smart grid networks. ZigBee is used for low data rate and low power wireless network applications. To deploy smart grid networks, the collected information requires protection from an adversary over the network in many cases. The security mechanism should be provided for collecting the information over the network. However, the ZigBee protocol has some security weaknesses. In this paper, these weaknesses are discussed and a method to improve security aspect of the ZigBee protocol is presented along with a comparison of the message complexity of the proposed security protocol with that of the current ZigBee protocol.

An Improved Decoding Scheme of LCPC Codes (LCPC 부호의 개선된 복호 방식)

  • Cheong, Ho-Young
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.4
    • /
    • pp.430-435
    • /
    • 2018
  • In this paper, an improved decoding scheme for low-complexity parity-check(LCPC) code with small code length is proposed. The LCPC code is less complex than the turbo code or low density parity check(LDPC) code and requires less memory, making it suitable for communication between internet-of-things(IoT) devices. The IoT devices are required to have low complexity due to limited energy and have a low end-to-end delay time. In addition, since the packet length to be transmitted is small and the signal processing capability of the IoT terminal is small, the LCPC coding system should be as simple as possible. The LCPC code can correct all single errors and correct some of the two errors. In this paper, the proposed decoding scheme improves the bit error rate(BER) performance without increasing the complexity by correcting both errors using the soft value of the modulator output stage. As a result of the simulation using the proposed decoding scheme, the code gain of about 1.1 [dB] was obtained at the bit error rate of $10^{-5}$ compared with the existing decoding method.

Multiplication optimization technique for Elliptic Curve based sensor network security (Elliptic curve기반 센서네트워크 보안을 위한 곱셈 최적화 기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1836-1842
    • /
    • 2010
  • Sensor network, which is technology to realize the ubiquitous environment, recently, could apply to the field of Mechanic & electronic Security System, Energy management system, Environment monitoring system, Home automation and health care application. However, feature of wireless networking of sensor network is vulnerable to eavesdropping and falsification about message. Presently, PKC(public key cryptography) technique using ECC(elliptic curve cryptography) is used to build up the secure networking over sensor network. ECC is more suitable to sensor having restricted performance than RSA, because it offers equal strength using small size of key. But, for high computation cost, ECC needs to enhance the performance to implement over sensor. In this paper, we propose the optimizing technique for multiplication, core operation in ECC, to accelerate the speed of ECC.

A Non-coherent IR-UWB RF Transceiver for WBAN Applications in 0.18㎛ CMOS (0.18㎛ CMOS 공정을 이용한 WBAN용 비동기식 IR-UWB RF 송수신기)

  • Park, Myung Chul;Chang, Won Il;Ha, Jong Ok;Eo, Yun Seong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.2
    • /
    • pp.36-44
    • /
    • 2016
  • In this paper, an Impulse Radio-Ultra Wide band RF Transceiver for WBAN applications is implemented in $0.18{\mu}m$ CMOS technology. The designed RF transceiver support 3-5GHz UWB low band and employs OOK(On-Off Keying) modulation. The receiver employs non-coherent energy detection architecture to reduce complexity and power consumption. For the rejection of the undesired interferers and improvement of the receiver sensitivity, RF active notch filter is integrated. The VCO based transmitter employs the switch mechanism. As adapt the switch mechanism, power consumption and VCO leakage can be reduced. Also, the spectrum mask is always same at each center frequency. The measured sensitivity of the receiver is -84.1 dBm at 3.5 GHz with 1.579 Mbps. The power consumption of the transmitter and receiver are 0.3nJ/bit and 41 mW respectively.

Device Authentication System in IoT environment (IoT 환경의 단말 인증 시스템)

  • Dong-Yeon, Kang;Ji-Soo, Jeon;Sung-Hwa, Han
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.97-102
    • /
    • 2023
  • IoT is being used in a lot of industry domain such as smart home, smart ocean, smart energy, and smart farm, as well as legacy information services. For a server, an IoT device using the same protocol is a trusted object. Therefore, a malicious attacker can use an unauthorized IoT device to access IoT-based information services and access unauthorized important information, and then modify or extract it to the outside. In this study, to improve these problems, we propose an IoT device authentication system used in IoT-based information service. The IoT device authentication system proposed in this study applies identifier-based authentication such as MAC address. If the IoT device authentication function proposed in this study is used, only the authenticated IoT device can access the server. Since this study applies a method of terminating the session of an unauthorized IoT device, additional research on the access deny method, which is a more secure authentication method, is needed.

Implement IoT device Authentication System (IoT 단말 인증 시스템 구현)

  • Kang, Dong-Yeon;Jeon, Ji-Soo;Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.344-345
    • /
    • 2022
  • ogy is being used in many fields, such as smart farms, smart oceans, smart homes, and smart energy. Various IoT terminals are used for these IoT services. Here, IoT devices are physically installed in various places. A malicious attacker can access the IoT service using an unauthorized IoT device, access unauthorized important information, and then modify it. In this study, to solve these problems, we propose an authentication system for IoT devices used in IoT services. The IoT device authentication system proposed in this study consists of an authentication module mounted on the IoT device and an authentication module of the IoT server. If the IoT device authentication system proposed in this study is used, only authorized IoT devices can access the service and access of unauthorized IoT devices can be denied. Since this study proposes only the basic IoT device authentication mechanism, additional research on additional IoT device authentication functions according to the security strength is required.IoT technol

  • PDF

Blockchain-based Smart Meter Authentication Protocol in Smart Grid Environment (스마트 그리드 환경에서 블록체인 기반 스마트 미터 인증 프로토콜)

  • Jonghyun Kim;Myeonghyun Kim;Youngho Park
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.28 no.5
    • /
    • pp.41-54
    • /
    • 2023
  • Smart grid that supports efficient energy production and management is used in various fields and industries. However, because of the environment in which services are provided through open networks, it is essential to resolve trust issues regarding security vulnerabilities and privacy preservation. In particular, the identification information of smart meter is managed by a centralized server, which makes it vulnerable to security attacks such as device stolen, data forgery, alteration, and deletion. To solve these problems, this paper proposes a blockchain based authentication protocol for a smart meter. The proposed scheme issues an unique decentralized identifiers (DIDs) for individual smart meter through blockchain and utilizes a random values based on physical unclonable function (PUF) to strengthen the integrity and reliability of data. In addition, we analyze the security of the proposed scheme using informal security analysis and AVISPA simulation, and show the efficiency of the proposed scheme by comparing with related work.

Effect of Dose Rate Variation on Dose Distribution in IMRT with a Dynamic Multileaf Collimator (동적다엽콜리메이터를 이용한 세기변조방사선 치료 시 선량분포상의 선량률 변화에 따른 효과)

  • Lim, Kyoung-Dal;Jae, Young-Wan;Yoon, Il-Kyu;Lee, Jae-Hee;Yoo, Suk-Hyun
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.24 no.1
    • /
    • pp.1-10
    • /
    • 2012
  • Purpose: To evaluate dose distribution differences when the dose rates are randomly changed in intensity-modulated radiation therapy using a dynamic multileafcollimator. Materials and Methods: Two IMRT treatment plans including small-field and large-field plans were made using a commercial treatment planning system (Eclipse, Varian, Palo Alto, CA). Each plan had three sub-plans according to various dose rates of 100, 400, and 600 MU/min. A chamber array (2D-Array Seven729, PTW-Freiburg) was positioned between solid water phantom slabs to give measurement depth of 5 cm and backscattering depth of 5 cm. Beam deliveries were performed on the array detector using a 6 MV beam of a linear accelerator (Clinac 21EX, Varian, Palo Alto, CA) equipped with 120-leaf MLC (Millenium 120, Varian). At first, the beam was delivered with same dose rates as planned to obtain reference values. After the standard measurements, dose rates were then changed as follows: 1) for plans with 100 MU/min, dose rate was varied to 200, 300, 400, 500 and 600 MU/min, 2) for plans with 400 MU/min, dose rate was varied to 100, 200, 300, 500 and 600 MU/min, 3) for plans with 600 MU/min, dose rate was varied to 100, 200, 300, 400 and 500 MU/min. Finally, using an analysis software (Verisoft 3.1, PTW-Freiburg), the dose difference and distribution between the reference and dose-rate-varied measurements was evaluated. Results: For the small field plan, the local dose differences were -0.8, -1.1, -1.3, -1.5, and -1.6% for the dose rate of 200, 300, 400, 500, 600 MU/min, respectively (for 100 MU/min reference), +0.9, +0.3, +0.1, -0.2, and -0.2% for the dose rate of 100, 200, 300, 500, 600 MU/min, respectively (for 400 MU/min reference) and +1.4, +0.8, +0.5, +0.3, and +0.2% for the dose rate of 100, 200, 300, 400, 500 MU/min, respectively (for 600 MU/min reference). On the other hand, for the large field plan, the pass-rate differences were -1.3, -1.6, -1.8, -2.0, and -2.4% for the dose rate of 200, 300, 400, 500, 600 MU/min, respectively (for 100 MU/min reference), +2.0, +1.8, +0.5, -1.2, and -1.6% for the dose rate of 100, 200, 300, 500, 600 MU/min, respectively (for 400 MU/min reference) and +1.5, +1.9, +1.7, +1.9, and +1.2% for the dose rate of 100, 200, 300, 400, 500 MU/min, respectively (for 600 MU/min reference). In short, the dose difference of dose-rate variation was measured to the -2.4~+2.0%. Conclusion: Using the Varian linear accelerator with 120 MLC, the IMRT dose distribution is differed a little <(${\pm}3%$) even though the dose-rate is changed.

  • PDF

Comparison and evaluation of volumetric modulated arc therapy and intensity modulated radiation therapy plans for postoperative radiation therapy of prostate cancer patient using a rectal balloon (직장풍선을 삽입한 전립선암 환자의 수술 후 방사선 치료 시 용적변조와 세기변조방사선치료계획 비교 평가)

  • Jung, hae youn;Seok, jin yong;Hong, joo wan;Chang, nam jun;Choi, byeong don;Park, jin hong
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.27 no.1
    • /
    • pp.45-52
    • /
    • 2015
  • Purpose : The dose distribution of organ at risk (OAR) and normal tissue is affected by treatment technique in postoperative radiation therapy for prostate cancer. The aim of this study was to compare dose distribution characteristic and to evaluate treatment efficiency by devising VMAT plans according to applying differed number of arc and IMRT plan for postoperative patient of prostate cancer radiation therapy using a rectal balloon. Materials and Methods : Ten patients who received postoperative prostate radiation therapy in our hospital were compared. CT images of patients who inserted rectal balloon were acquired with 3 mm thickness and 10 MV energy of HD120MLC equipped Truebeam STx (Varian, Palo Alto, USA) was applied by using Eclipse (Version 11.0, Varian, Palo Alto, USA). 1 Arc, 2 Arc VMAT plans and 7-field IMRT plan were devised for each patient and same values were applied for dose volume constraint and plan normalization. To evaluate these plans, PTV coverage, conformity index (CI) and homogeneity index (HI) were compared and $R_{50%}$ was calculated to assess low dose spillage as per treatment plan. $D_{25%}$ of rectum and bladder Dmean were compared on OAR. And to evaluate the treatment efficiency, total monitor units(MU) and delivery time were considered. Each assessed result was analyzed by average value of 10 patients. Additionally, portal dosimetry was carried out for accuracy verification of beam delivery. Results : There was no significant difference on PTV coverage and HI among 3 plans. Especially CI and $R_{50%}$ on 7F-IMRT were the highest as 1.230, 3.991 respectively(p=0.00). Rectum $D_{25%}$ was similar between 1A-VMAT and 2A-VMAT. But approximately 7% higher value was observed on 7F-IMRT compare to the others(p=0.02) and bladder Dmean were similar among the all plan(P>0.05). Total MU were 494.7, 479.7, 757.9 respectively(P=0.00) for 1A-VMAT, 2A-VMAT, 7F-IMRT and at the most on 7F-IMRT. The delivery time were 65.2sec, 133.1sec, 145.5sec respectively(p=0.00). The obvious shortest time was observed on 1A-VMAT. All plans indicated over 99.5%(p=0.00) of gamma pass rate (2 mm, 2%) in portal dosimetry quality assurance. Conclusion : As a result of study, postoperative prostate cancer radiation therapy for patient using a rectal balloon, there was no significant difference of PTV coverage but 1A-VMAT and 2A-VMAT were more efficient for dose reduction of normal tissue and OARs. Between VMAT plans. $R_{50%}$ and MU were little lower in 2A-VMAT but 1A-VMAT has the shortest delivery time. So it is regarded to be an effective plan and it can reduce intra-fractional motion of patient also.

  • PDF