• Title/Summary/Keyword: Communication algorithm

Search Result 7,845, Processing Time 0.037 seconds

Optimal Operation Method and Capacity of Energy Storage System(ESS) in Primary Feeders with Step Voltage Regulator(SVR) (선로전압조정장치(SVR)가 설치된 고압배전선로에서 전기저장장치(ESS)의 최적운용 및 적정용량 산정방안)

  • Kim, Byungki;Ryu, Kyung-Sang;Kim, Dae-Jin;Jang, Moon-seok;Ko, Hee-sang;Rho, Daeseok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.6
    • /
    • pp.9-20
    • /
    • 2018
  • When a large-scale photovoltaic (PV) system is introduced into a distribution system, the customer's voltage may exceed the allowable limit ($220V{\pm}6%$) due to voltage variations and reverse power flow in the PV system. In order to solve this problem, we propose a method for adjusting the customer voltage using the existing step voltage regulator (SVR) installed in the primary feeder. However, due to the characteristics of a mechanically operating SVR, the customer voltage during the tap changing time of the SVR is likely to deviate from the allowable limit. In this paper, an energy storage system (ESS) with optimal operation strategies, and an appropriate capacity calculation algorithm are proposed, and the parallel driving scheme between the SVR and the ESS is also proposed to solve the customer voltage problem that may occur during the tap changing time of the SVR. The simulation results show that the allowable limit of the customer voltage is verified by the proposed methods during the tap changing time of the SVR when the large-scale PV system is connected to the distribution system.

An Efficient Secure Routing Protocol Based on Token Escrow Tree for Wireless Ad Hoc Networks (무선 애드 혹 네트워크에서 보안성을 고려한 Token Escrow 트리 기반의 효율적인 라우팅 프로토콜)

  • Lee, Jae Sik;Kim, Sung Chun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.4
    • /
    • pp.155-162
    • /
    • 2013
  • Routing protocol in ad hoc mobile networking has been an active research area in recent years. However, the environments of ad hoc network tend to have vulnerable points from attacks, because ad hoc mobile network is a kind of wireless network without centralized authentication or fixed network infrastructure such as base stations. Also, existing routing protocols that are effective in a wired network become inapplicable in ad hoc mobile networks. To address these issues, several secure routing protocols have been proposed: SAODV and SRPTES. Even though our protocols are intensified security of networks than existing protocols, they can not deal fluidly with frequent changing of wireless environment. Moreover, demerits in energy efficiency are detected because they concentrated only safety routing. In this paper, we propose an energy efficient secure routing protocol for various ad hoc mobile environment. First of all, we provide that the nodes distribute security information to reliable nodes for secure routing. The nodes constitute tree-structured with around nodes for token escrow, this action will protect invasion of malicious node through hiding security information. Next, we propose multi-path routing based security level for protection from dropping attack of malicious node, then networks will prevent data from unexpected packet loss. As a result, this algorithm enhances packet delivery ratio in network environment which has some malicious nodes, and a life time of entire network is extended through consuming energy evenly.

Vertical Handover between LTE and Wireless LAN Systems based on Common Radio Resource Management (CRRM) and Generic Link Layer (GLL) (LTE/WLAN 이종망 환경에서 범용링크계층과 통합무선자 원관리 기법이 적용된 VHO 방안 연구)

  • Kim, Tae-Sub;Oh, Ryong;Lee, Sang-Joon;Yoon, Suk-Ho;Ryu, Seung-Wan;Cho, Choong-Ho
    • Journal of Internet Computing and Services
    • /
    • v.11 no.1
    • /
    • pp.35-48
    • /
    • 2010
  • For the next generation mobile communication system, diverse wireless network techniques such as beyond 3G LTE, WiMAX/WiBro, and next generation WLAN etc. are proceeding to the form integrated into the All-IP core network. According to this development, Beyond 3G integrated into heterogeneous wireless access technologies must support the vertical handover and network to be used of several radio networks. However, unified management of each network is demanded since it is individually serviced. Therefore, in order to solve this problem this study is introducing the theory of Common Radio Resource Management (CRRM) based on Generic Link Layer (GLL). This study designs the structure and functions to support the vertical handover and propose the vertical handover algorithm of which policy-based and MCDM are composed between LTE and WLAN systems using GLL and CRRM. Finally, simulation results are presented to show the improved performance over the data throughput, handover success rate and the system service cost.

A Data Aggregation Scheme for Enhancing the Efficiency of Data Aggregation and Correctness in Wireless Sensor Networks (무선 센서 네트워크에서 데이터 수집의 효율성 및 정확성 향상을 위한 데이터 병합기법)

  • Kim, Hyun-Tae;Yu, Tae-Young;Jung, Kyu-Su;Jeon, Yeong-Bae;Ra, In-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.5
    • /
    • pp.531-536
    • /
    • 2006
  • Recently, many of researchers have been studied in data processing oriented middleware for wireless sensor networks with the rapid advances on sensor and wireless communication technologies. In a wireless sensor network, a middleware should handle the data loss problem at an intermediate sensor node caused by instantaneous data burstness to support efficient processing and fast delivering of the sensing data. To handle this problem, a simple data discarding or data compressing policy for reducing the total amount of data to be transferred is typically used. But, data discarding policy decreases the correctness of a collected data, in other hand, data compressing policy requires additional processing overhead with the high complexity of the given algorithm. In this paper, it proposes a data-average method for enhancing the efficiency of data aggregation and correctness where the sensed data should be delivered only with the limited computing power and energy resource. With the proposed method, unnecessary data transfer of the overlapped data is eliminated and data correctness is enhanced by using the proposed averaging scheme when an instantaneous data burstness is occurred. Finally, with the TOSSTM simulation results on TinyBB, we show that the correctness of the transferred data is enhanced.

Method of Detecting and Isolating an Attacker Node that Falsified AODV Routing Information in Ad-hoc Sensor Network (애드혹 센서 네트워크에서 AODV 라우팅 정보변조 공격노드 탐지 및 추출기법)

  • Lee, Jae-Hyun;Kim, Jin-Hee;Kwon, Kyung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2293-2300
    • /
    • 2008
  • In ad-hoc sensor network, AODV routing information is disclosed to other nodes because AODV protocol doesn't have any security mechanisms. The problem of AODV is that an attacker can falsify the routing information in RREQ packet. If an attacker broadcasts the falsified packet, other nodes will update routing table based on the falsified one so that the path passing through the attacker itself can be considered as a shortest path. In this paper, we design the routing-information-spoofing attack such as falsifying source sequence number and hop count fields in RREQ packet. And we suggest an efficient scheme for detecting the attackers and isolating those nodes from the network without extra security modules. The proposed scheme doesn't employ cryptographic algorithm and authentication to reduce network overhead. We used NS-2 simulation to evaluate the network performance. And we analyzed the simulation results on three cases such as an existing normal AODV, AODV under the attack and proposed AODV. Simulation results using NS2 show that the AODV using proposed scheme can protect the routing-information-spoofing attack and the total n umber of received packets for destination node is almost same as the existing norm at AODV.

Sensitivity of COMS/GOCI Measured Top-of-atmosphere Reflectances to Atmospheric Aerosol Properties (COMS/GOCI 관측값의 대기 에어러솔의 특성에 대한 민감도 분석)

  • Lee, Kwon-Ho;Kim, Young-Joon
    • Korean Journal of Remote Sensing
    • /
    • v.24 no.6
    • /
    • pp.559-569
    • /
    • 2008
  • The Geostationary Ocean Color Imager (GOCI) on board the Communication Ocean Meteorological Satellite (COMS), the first geostationary ocean color sensor, requires accurate atmospheric correction since its eight bands are also affected by atmospheric constituents such as gases, molecules and atmospheric aerosols. Unlike gases and molecules in the atmosphere, aerosols can interact with sunlight by complex scattering and absorption properties. For the purpose of qualified ocean remote sensing, understanding of aerosol-radiation interactions is needed. In this study, we show micro-physical and optical properties of aerosols using the Optical Property of Aerosol and Cloud (OPAC) aerosol models. Aerosol optical properties, then, were used to analysis the relationship between theoretical satellite measured radiation from radiative transfer calculations and aerosol optical thickness (AOT) under various environments (aerosol type and loadings). It is found that the choice of aerosol type makes little different in AOT retrieval for AOT<0.2. Otherwise AOT differences between true and retrieved increase as AOT increases. Furthermore, the differences between the AOT and angstrom exponent from standard algorithms and this study, and the comparison with ground based sunphotometer observations are investigated. Over the northeast Asian region, these comparisons suggest that spatially averaged mean AOT retrieved from this study is much better than from standard ocean color algorithm. Finally, these results will be useful for aerosol retrieval or atmospheric correction of COMS/GOCI data processing.

A single-memory based FFT/IFFT core generator for OFDM modulation/demodulation (OFDM 변복조를 위한 단일 메모리 구조의 FFT/IFFT 코어 생성기)

  • Yeem, Chang-Wan;Jeon, Heung-Woo;Shin, Kyung-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.253-256
    • /
    • 2009
  • This paper describes a core generator (FFT_Core_Gen) which generates Verilog HDL models of 8 different FFT/IFFT cores with $N=64{\times}2^k$($0{\leq}k{\leq}7$ for OFDM-based communication systems. The generated FFT/IFFT cores are based on in-place single memory architecture, and use a hybrid structure of radix-4 and radix-2 DIF algorithm to accommodate various FFT lengths. To achieve both memory reduction and the improved SQNR, a conditional scaling technique is adopted, which conditionally scales the intermediate results of each computational stage, and the internal data and twiddle factor has 14 bits. The generated FFT/IFFT cores have the SQNR of 58-dB for N=8,192 and 63-dB for N=64. The cores synthesized with a $0.35-{\mu}m$ CMOS standard cell library can operate with 75-MHz@3.3-V, and a 8,192-point FFT can be computed in $762.7-{\mu}s$, thus the cores satisfy the specifications of wireless LAN, DMB, and DVB systems.

  • PDF

Development of artificial intelligence-based river flood level prediction model capable of independent self-warning (독립적 자체경보가 가능한 인공지능기반 하천홍수위예측 모형개발)

  • Kim, Sooyoung;Kim, Hyung-Jun;Yoon, Kwang Seok
    • Journal of Korea Water Resources Association
    • /
    • v.54 no.12
    • /
    • pp.1285-1294
    • /
    • 2021
  • In recent years, as rainfall is concentrated and rainfall intensity increases worldwide due to climate change, the scale of flood damage is increasing. Rainfall of a previously unobserved magnitude falls, and the rainy season lasts for a long time on record. In particular, these damages are concentrated in ASEAN countries, and at least 20 million people among ASEAN countries are affected by frequent flooding due to recent sea level rise, typhoons and torrential rain. Korea supports the domestic flood warning system to ASEAN countries through various ODA projects, but the communication network is unstable, so there is a limit to the central control method alone. Therefore, in this study, an artificial intelligence-based flood prediction model was developed to develop an observation station that can observe water level and rainfall, and even predict and warn floods at once at one observation station. Training, validation and testing were carried out for 0.5, 1, 2, 3, and 6 hours of lead time using the rainfall and water level observation data in 10-minute units from 2009 to 2020 at Junjukbi-bridge station of Seolma stream. LSTM was applied to artificial intelligence algorithm. As a result of the study, it showed excellent results in model fit and error for all lead time. In the case of a short arrival time due to a small watershed and a large watershed slope such as Seolma stream, a lead time of 1 hour will show very good prediction results. In addition, it is expected that a longer lead time is possible depending on the size and slope of the watershed.

A Study on Smart Ground Resistance Measurement Technology Based on Aduino (아두이노 기반 IT융합 스마트 대지저항 측정 기술 연구)

  • Kim, Hong Yong
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.4
    • /
    • pp.684-693
    • /
    • 2021
  • Purpose: The purpose is to establish a safe facility environment from abnormal voltages such as lightning by developing a smart land resistance measuring device that can acquire real-time land resistance data using Arduino. Method: This paper studied design models and application cases by developing a land resistance acquisition and analysis system with Arduino and a power line communication (PLC) system. Some sites in the wind power generation complex in Gyeongsangnam-do were selected as test beds, and real-time land resistance data applied with new technologies were obtained. The electrode arrangement adopted a smart electrode arrangement using a combination of a Wenner four electrode arrangement and a Schlumberger electrode arrangement. Result: First, the characteristic of this technology is that the depth of smart multi-electrodes is organized differently to reduce the error range of the acquired data even in the stratigraphic structure with specificity between floors. Second, IT convergence technology was applied to enable real-time transmission and reception of information on land resistance data acquired from smart ground electrodes through the Internet of Things. Finally, it is possible to establish a regular management system and analyze big data accumulated in the server to check the trend of changes in various elements, and to model the optimal ground algorithm and ground system design for the IT convergence environment. Conclusion: This technology will reduce surge damage caused by lightning on urban infrastructure underlying the 4th industrial era and design an optimized ground system model to protect the safety and life of users. It is also expected to secure intellectual property rights of pure domestic technology to create jobs and revitalize our industry, which has been stagnant as a pandemic in the post-COVID-19 era.

Research on rapid source term estimation in nuclear accident emergency decision for pressurized water reactor based on Bayesian network

  • Wu, Guohua;Tong, Jiejuan;Zhang, Liguo;Yuan, Diping;Xiao, Yiqing
    • Nuclear Engineering and Technology
    • /
    • v.53 no.8
    • /
    • pp.2534-2546
    • /
    • 2021
  • Nuclear emergency preparedness and response is an essential part to ensure the safety of nuclear power plant (NPP). Key support technologies of nuclear emergency decision-making usually consist of accident diagnosis, source term estimation, accident consequence assessment, and protective action recommendation. Source term estimation is almost the most difficult part among them. For example, bad communication, incomplete information, as well as complicated accident scenario make it hard to determine the reactor status and estimate the source term timely in the Fukushima accident. Subsequently, it leads to the hard decision on how to take appropriate emergency response actions. Hence, this paper aims to develop a method for rapid source term estimation to support nuclear emergency decision making in pressurized water reactor NPP. The method aims to make our knowledge on NPP provide better support nuclear emergency. Firstly, this paper studies how to build a Bayesian network model for the NPP based on professional knowledge and engineering knowledge. This paper presents a method transforming the PRA model (event trees and fault trees) into a corresponding Bayesian network model. To solve the problem that some physical phenomena which are modeled as pivotal events in level 2 PRA, cannot find sensors associated directly with their occurrence, a weighted assignment approach based on expert assessment is proposed in this paper. Secondly, the monitoring data of NPP are provided to the Bayesian network model, the real-time status of pivotal events and initiating events can be determined based on the junction tree algorithm. Thirdly, since PRA knowledge can link the accident sequences to the possible release categories, the proposed method is capable to find the most likely release category for the candidate accidents scenarios, namely the source term. The probabilities of possible accident sequences and the source term are calculated. Finally, the prototype software is checked against several sets of accident scenario data which are generated by the simulator of AP1000-NPP, including large loss of coolant accident, loss of main feedwater, main steam line break, and steam generator tube rupture. The results show that the proposed method for rapid source term estimation under nuclear emergency decision making is promising.