• Title/Summary/Keyword: Backup Method

Search Result 139, Processing Time 0.023 seconds

A Study on the Optimal System Sizing of the Standalone Photovoltaic Power Generation System for Uninterruptible Power Supply (독립형 태양광 발전 시스템의 무정전 전력공급을 위한 시스템 용량 최적 선정에 관한 연구)

  • Kim, Ki-Young;Choi, Woojin
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.23 no.2
    • /
    • pp.77-85
    • /
    • 2018
  • Renewable energy has been increasingly used and widely acclaimed as one of the solutions to rampant environmental problems. Among numerous kinds of renewable sources, the penetration rate of the PV system is relatively higher than that of others due to ease of installation. However, one disadvantage of the PV system is its dependence on weather condition. The PV system is especially critical when it is used for standalone systems because it cannot operate when the power generated from a PV module is not enough. Therefore, PV systems are often used with an energy storage system, such as batteries, to store backup energy when the weather condition is insufficient to supply power to the system. Blackout time can be reduced by increasing the size of the energy storage system, but it is a trade-off with system cost. In this work, optimal sizing of a standalone PV system is proposed to supply power to the system without blackout. The sizing of PV modules and batteries is performed by a simulation based on actual irradiation data collected during the past five years. The Life cycle costing of each system is evaluated to determine an optimal set of PV modules and batteries among several different combinations. The standalone PV system designed by the proposed method can supply power to the system with no interruption as long as the weather condition is similar to those of the past five years.

A study on the solar assisted heating system with refrigerant as working fluid (냉매를 작동유체로 사용하는 태양열 난방시스템에 관한 연구)

  • Kim, Ji-Young;Ko, Gawng-Soo;Park, Youn-Cheol
    • Journal of the Korean Solar Energy Society
    • /
    • v.25 no.4
    • /
    • pp.37-44
    • /
    • 2005
  • An experimental study was conducted to analyze performance of a heating system with variation of control logic of the system. The system uses a solar as heat source and composed with heat pump that uses R-22 as working fluid. The difference between the developed system and the commercially available heating system is working fluid. The solar assisted heating system which was widely distributed in the market uses water as a working fluid. It could be freezing in case of the temperature drops down under freezing point. The anti-freezing fluids such as methyl-alcohol or ethylene-glycol are mixed with the water to protect the freezing phenomena. However, the system developed in this study uses a refrigerant as a working fluid. It makes the system to run under zero degree temperature conditions. Another difference of the developed system compare with commercial available one is auxiliary heating method. The developed system has removed an auxiliary electric heater that has been used in conventional solar assisted heating system. Instead of the auxiliary electric heater, an air source heat exchanger which generally used as an evaporator of a heat pump was adapted as a backup heating device of the developed system. As results, an efficiency of the developed system is higher than a solar assisted heat pump with auxiliary electric heater. The merit of the developed system is on the performance increment when the system operates at a lower solar energy climate conditions. In case of the developed system operates at a normal condition, COP of the solar collector driven heat pump is higher than the air source heat exchanger driven heat pump's.

A Study on the Election of Cluster Alternative node for Energy-Efficient in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적인 클러스터의 대체노드 선출 방법에 관한 연구)

  • Oh, Young-Jun;Lee, Knag-Whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.233-241
    • /
    • 2013
  • One fundamental issue in ad hoc networks is the alternative node election problem, which reflects how well a sensor network is monitored or tracked by sensors. In this paper, we proposed EEAP(Energy-Efficient Alternative Paths). This is a method of selecting an alternative node for path routing management. When some node disconnection on the path routing, using pre-selected backup node provides immediately recover the path recovery. When selecting an alternative node of Step-Parents head node on the path management, the node's energy level and distance information are cared in context-awareness. This is not only increased the system's capacity cost effectively, but also reduce transmission power entire nodes consume energy. As a result, each node could efficiently management and improves the life time for mobile host and extends system coverage.

Automatic Encryption Method within Kernel Level using Various Access Control Policy in UNIX system (유닉스 시스템에서 다양한 접근제어 정책을 이용한 커널 수준의 자동 암호화 기법)

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.387-396
    • /
    • 2003
  • Many studies have been done on secure kernel and encryption filesystem for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policy like ACL, MAC, RBAC and so on, but cannot protect user or system data from stealing backup media or disk itself. In addition to access control policy, there are many studies on encryption filesystem that encrypt file data within system level. However few studies have been done on combining access control policy and encryption filesystem. In this paper we proposed a new encryption filesystem that provides a transparency to the user by integrating encryption service into virtual filesystem layer within secure kernel that has various access control policies. Proposed encryption filesystem can provide a simple encryption key management architecture by using encryption keys based on classes of MAC policy and overcome a limit of physical data security of access control policy for stealing.

Energy Demand Estimation in Metropolitan Area in Case of Emergency using Spatial Information (공간정보를 활용한 대도시권역 비상시 에너지 수요량 예측)

  • Nam, Gyeongmok;Lee, Hong Chul;Lee, Dong-Eun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.20 no.3
    • /
    • pp.105-112
    • /
    • 2019
  • Due to abnormal high temperature, electric power demand has exceeded the backup power reserved for emergency case, hence, resulting in a major power outage. In today's overcrowded cities, the unexpected disruption in energy supply and demand is a major threat to the enormous economic damage and urban malfunctions. Existing methods for estimating the demand of the emergency power source do not lend themselves to predict the actual demand in the spatial dimension of the city. In addition, the reserve power is arbitrarily distributed in the case of emergency. This paper presents a method that predicts the emergency power demand using the spatial distribution of emergency power demand by applying the daily energy consumption intensity and emergency power demand according to urban spatial information and building use.

A Study on Key Protection Method based on WhiteBox Cipher in Block Chain Environment (블록체인 환경에서 화이트박스 암호기반 키 보호 기법에 관한 연구)

  • Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.10
    • /
    • pp.9-15
    • /
    • 2019
  • Recently, in the field of next-generation e-commerce and finance, interest in blockchain-based technologies such as Bitcoin and Ethereum is great. Although the security of blockchain technology is known to be secure, hacking incidents / accidents related to cryptocurrencies are being issued. The main causes were vulnerabilities in the external environment, such as taking over login sessions on cryptocurrency wallets, exposing private keys due to malware infection, and using simple passwords. However, private key management recommends general methods such as utilizing a dedicated application or local backup and physical archiving through document printing. In this paper, we propose a white box password-based private key protection scheme. As a result of safety and performance analysis, we strengthened the security against vulnerability of private key exposure and proved the processing efficiency of existing protocol.

A Defense Mechanism Against Attacks on Files by Hiding Files (파일 은닉을 통한 파일 대상 공격 방어 기법)

  • Choi, Jione;Lee, Junghee;Lee, Gyuho;Yu, Jaegwan;Park, Aran
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.2
    • /
    • pp.1-10
    • /
    • 2022
  • Deception technology is an extended concept of honeypot, which detects, prevents or delays attacks by deceiving adversaries. It has been applied to various system components such as network ports, services, processes, system calls and database management systems. We can apply the same concept to attacks on files. A representative example of a file attack is ransomware. Ransomware is a type of malware that encrypts user files and ask for ransom to recover those files. Another example is the wiper attack, which erases all or target files of a system. In this paper we propose a defense mechanism against these kinds of attacks by hiding files. Compared to backup or virtualization techniques, the proposed method incurs less space and performance overheads.

A Study on Acquisition of Overhead Line Location Information of Pantograph for E-Highway (E-Highway를 위한 팬터그래프의 가공선 위치정보 취득에 관한 연구)

  • Gwang-Cheol Song;Jun-Jae An;Tuan-Vu Le;Seong-Mi Park;Sung-Jun Park
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.26 no.5
    • /
    • pp.915-923
    • /
    • 2023
  • As environmental regulations on carbon emissions are strengthened worldwide, the existing internal combustion engine-centered automobile industry is being reformed. In particular, large buses and large cargo trucks are pointed out as one of the main causes of environmental destruction due to excessive carbon emissions. The E-Highway power collection system, which has recently been proposed as a solution, uses the vehicle's battery as a backup power source or regenerative braking, depending on whether the pan head of the pentograph installed in the vehicle is in contact with the overhead line. It is used to store the excess energy generated. However, wear through contact due to continuous contact reduces the current collection effect and causes failure. In this paper, by using the current difference, the horizontal position information of the panhead in contact with the overhead line is acquired, thereby reducing the abrasion of the conductor and the panhead Make it possible to follow the overhead line. The position estimation method proposed in this paper simply configures a device that can detect the position of the overhead line of the pantograph by the difference in resistance. It is economical and has the advantage of reducing the volume. The characteristics of the pantograph estimating the location of overhead lines were analyzed using the difference between the two currents of the current collector, the feasibility of the positioning estimation system was verified through simulations and experiments.

A Study on Improvement of Operation Characteristics and Inspection Method of Standby Power Supply such as Emergency Induction Light using Li-ion Capacitor (리튬이온커패시터를 활용한 비상유도등 예비전원장치의 동작 특성 및 점검방법 개선에 관한 연구)

  • Jung, Jun-Chea
    • Journal of the Society of Disaster Information
    • /
    • v.16 no.2
    • /
    • pp.392-401
    • /
    • 2020
  • Purpose: This study analyzes the operating characteristics of a lithium ion capacitor that can be used as a standby power supply in an emergency, and determines whether the standby power supply is abnormal even by measuring the voltage using a linear proportionality characteristic during charging and discharging. The aim is to provide an experimental basis that can be done. Method: As a method for this study, first, analyze the operation principle and characteristics of the existing backup power supply and lithium ion capacitor, and then measure the voltage of the lithium ion capacitor according to the configuration and system block diagram of the induction lamp used in the experiment. We proceed with the test of the measured value of discharge power for each voltage band to check the amount of power held by the battery and the operation test experiment using induction lamps. Results: Just by checking the charging voltage using the linear proportional characteristics of lithium ion capacitors, it provides a basis for accurately inferring the effective operating time of induction lamp lamps. Conclusion: In the event of a disaster, the lithium ion capacitor is used as a spare power supply for emergency induction lamps to prevent complete discharge of emergency induction lamps, to prevent the problem of performing normal operation of the standby power supply, and to use only a simple voltage measurement to reserve power. It was intended to suggest many uses for evacuation equipment application in the future by making it possible to check whether the device is abnormal.

A Compensation Method of Timing Signals for Communications Networks Synchronization by using Loran Signals (Loran 신호 이용 통신망 동기를 위한 타이밍 신호 보상 방안)

  • Lee, Young-Kyu;Lee, Chang-Bok;Yang, Sung-Hoon;Lee, Jong-Gu;Kong, Hyun-Dong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.11A
    • /
    • pp.882-890
    • /
    • 2009
  • In this paper, we describe a compensation method that can be used for the situation where Loran receivers lose their phase lock to the received Loran signals when Loran signals are employed for the synchronization of national infrastructures such as telecommunication networks, electric power distribution and so on. In losing the phase lock to the received signals in a Loran receiver, the inner oscillator of the receiver starts free-running and the performance of the timing synchronization signals which are locked to the oscillator's phase is very severly degraded, so the timing accuracy under 1 us for a Primary Reference Clock (PRC) required in the International Telecommunications Union (ITU) G.811 standard can not be satisfied in the situation. Therefore, in this paper, we propose a method which can compensate the phase jump by using a compensation algorithm when a Loran receiver loses its phase lock and the performance evaluation of the proposed algorithm is achieved by the Maximum Time Interval Error (MTIE) of the measured data. From the performance evaluation results, it is observed that the requirement under 1 us for a PRC can be easily achieved by using the proposed algorithm showing about 0.6 us with under 30 minutes mean interval of smoothing with 1 hour period when the loss of phase lock occurs.