• Title/Summary/Keyword: Discrete Power System

Search Result 335, Processing Time 0.019 seconds

Wind-sand coupling movement induced by strong typhoon and its influences on aerodynamic force distribution of the wind turbine

  • Ke, Shitang;Dong, Yifan;Zhu, Rongkuan;Wang, Tongguang
    • Wind and Structures
    • /
    • v.30 no.4
    • /
    • pp.433-450
    • /
    • 2020
  • The strong turbulence characteristic of typhoon not only will significantly change flow field characteristics surrounding the large-scale wind turbine and aerodynamic force distribution on surface, but also may cause morphological evolution of coast dune and thereby form sand storms. A 5MW horizontal-axis wind turbine in a wind power plant of southeastern coastal areas in China was chosen to investigate the distribution law of additional loads caused by wind-sand coupling movement of coast dune at landing of strong typhoons. Firstly, a mesoscale Weather Research and Forecasting (WRF) mode was introduced in for high spatial resolution simulation of typhoon "Megi". Wind speed profile on the boundary layer of typhoon was gained through fitting based on nonlinear least squares and then it was integrated into the user-defined function (UDF) as an entry condition of small-scaled CFD numerical simulation. On this basis, a synchronous iterative modeling of wind field and sand particle combination was carried out by using a continuous phase and discrete phase. Influencing laws of typhoon and normal wind on moving characteristics of sand particles, equivalent pressure distribution mode of structural surface and characteristics of lift resistance coefficient were compared. Results demonstrated that: Compared with normal wind, mesoscale typhoon intensifies the 3D aerodynamic distribution mode on structural surface of wind turbine significantly. Different from wind loads, sand loads mainly impact on 30° ranges at two sides of the lower windward region on the tower. The ratio between sand loads and wind load reaches 3.937% and the maximum sand pressure coefficient is 0.09. The coupling impact effect of strong typhoon and large sand particles is more significant, in which the resistance coefficient of tower is increased by 9.80% to the maximum extent. The maximum resistance coefficient in typhoon field is 13.79% higher than that in the normal wind field.

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

Design and Performance Evaluation of Selective DFT Spreading Method for PAPR Reduction in Uplink OFDMA System (OFDMA 상향 링크 시스템에서 PAPR 저감을 위한 선택적 DFT Spreading 기법의 설계와 성능 평가)

  • Kim, Sang-Woo;Ryu, Heung-Gyoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.18 no.3 s.118
    • /
    • pp.248-256
    • /
    • 2007
  • In this paper, we propose a selective DFT spreading method to solve a high PAPR problem in uplink OFDMA system. A selective characteristic is added to the DFT spreading, so the DFT spreading method is mixed with SLM method. However, to minimize increment of computational complexity, differently with common SLM method, our proposed method uses only one DFT spreading block. After DFT, several copy branches are generated by multiplying with each different matrix. This matrix is obtained by linear transforming the each phase rotation in front of DFT block. And it has very lower computational complexity than one DFT process. For simulation, we suppose that the 512 point IFFT is used, the number of effective sub-carrier is 300, the number of allowed sub-carrier to each user's is 1/4 and 1/3 and QPSK modulation is used. From the simulation result, when the number of copy branch is 4, our proposed method has more than about 5.2 dB PAPR reduction effect. It is about 1.8 dB better than common DFT spreading method and 0.95 dB better than common SLM which uses 32 copy branches. And also, when the number of copy branch is 2, it is better than SLM using 32 copy branches. From the comparison, the proposed method has 91.79 % lower complexity than SLM using 32 copy branches in similar PAPR reduction performance. So, we can find a very good performance of our proposed method. Also, we can expect the similar performance when all number of sub-carrier is allocated to one user like the OFDM.

A Study on the Resilience Process of Persons with Disabilities (중도장애인의 레질리언스(Resilience) 과정에 관한 연구)

  • Kim, Mi-Ok
    • Korean Journal of Social Welfare
    • /
    • v.60 no.2
    • /
    • pp.99-129
    • /
    • 2008
  • This study analyzed the resilience process of persons with disabilities using the grounded theory approach. To conduct this study, the researcher conducted in-depth interviews with 8 persons with disabilities. In data analysis, this study identified 393 concepts on the resilience process of persons with disabilities and the concepts were categorized into 45 sub-categories and 18 primary categories. In the paradigm model on the resilience process of persons with disabilities, it was identified that casual conditions included 'unawareness of disability before being disability', 'extreme pain', 'repressing psychological pain', and the contingent conditions were 'dis-empowerment by staying in home', 'isolation by himself with difficulty in accepting the disability', 'experience of frustration from social barriers with prejudice against persons with disabilities'. Also, it was identified that the resilience process could be dependent on the type and the degree of the disability, the gender, and the length of time being disability. In spite of the casual and contingent conditions, the central way in which persons with disabilities could acquire resilience was identified as 'enhancement of the power of positive thinking'. The control conditions which accelerate or retard central phenomenon were 'the awareness of not being alone through family, friends, neighborhood and the social system' externally and 'finding purpose in life through religion and help from other persons with disabilities', internally. The action/interactional sequences enhanced the efforts, self searching and active acting, and as a result, persons with disabilities could find comfort in life, participate in society and change the perspective of disability in society. The core categories of resilience process in persons with disabilities were a belief in affirmation and choice of life by initiative. In the process analysis, stages developed in the following: 'pain', 'strangeness', 'reflection', 'daily life'. This stage was more continuous and causal than discrete and complete. In this process, the types of resilience of persons with disabilities are divided into 'existence reflection', 'course development', 'implicit endeavor', and 'active execution'. This study showed the details of the paradigm models, the process and types with an in-depth understanding of the resilience process of persons with disabilities using grounded theory as well as theory construction and policy and clinical involvement on the study of persons with disabilities.

  • PDF

THE CURRENT STATUS OF BIOMEDICAL ENGINEERING IN THE USA

  • Webster, John G.
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1992 no.05
    • /
    • pp.27-47
    • /
    • 1992
  • Engineers have developed new instruments that aid in diagnosis and therapy Ultrasonic imaging has provided a nondamaging method of imaging internal organs. A complex transducer emits ultrasonic waves at many angles and reconstructs a map of internal anatomy and also velocities of blood in vessels. Fast computed tomography permits reconstruction of the 3-dimensional anatomy and perfusion of the heart at 20-Hz rates. Positron emission tomography uses certain isotopes that produce positrons that react with electrons to simultaneously emit two gamma rays in opposite directions. It locates the region of origin by using a ring of discrete scintillation detectors, each in electronic coincidence with an opposing detector. In magnetic resonance imaging, the patient is placed in a very strong magnetic field. The precessing of the hydrogen atoms is perturbed by an interrogating field to yield two-dimensional images of soft tissue having exceptional clarity. As an alternative to radiology image processing, film archiving, and retrieval, picture archiving and communication systems (PACS) are being implemented. Images from computed radiography, magnetic resonance imaging (MRI), nuclear medicine, and ultrasound are digitized, transmitted, and stored in computers for retrieval at distributed work stations. In electrical impedance tomography, electrodes are placed around the thorax. 50-kHz current is injected between two electrodes and voltages are measured on all other electrodes. A computer processes the data to yield an image of the resistivity of a 2-dimensional slice of the thorax. During fetal monitoring, a corkscrew electrode is screwed into the fetal scalp to measure the fetal electrocardiogram. Correlations with uterine contractions yield information on the status of the fetus during delivery To measure cardiac output by thermodilution, cold saline is injected into the right atrium. A thermistor in the right pulmonary artery yields temperature measurements, from which we can calculate cardiac output. In impedance cardiography, we measure the changes in electrical impedance as the heart ejects blood into the arteries. Motion artifacts are large, so signal averaging is useful during monitoring. An intraarterial blood gas monitoring system permits monitoring in real time. Light is sent down optical fibers inserted into the radial artery, where it is absorbed by dyes, which reemit the light at a different wavelength. The emitted light travels up optical fibers where an external instrument determines O2, CO2, and pH. Therapeutic devices include the electrosurgical unit. A high-frequency electric arc is drawn between the knife and the tissue. The arc cuts and the heat coagulates, thus preventing blood loss. Hyperthermia has demonstrated antitumor effects in patients in whom all conventional modes of therapy have failed. Methods of raising tumor temperature include focused ultrasound, radio-frequency power through needles, or microwaves. When the heart stops pumping, we use the defibrillator to restore normal pumping. A brief, high-current pulse through the heart synchronizes all cardiac fibers to restore normal rhythm. When the cardiac rhythm is too slow, we implant the cardiac pacemaker. An electrode within the heart stimulates the cardiac muscle to contract at the normal rate. When the cardiac valves are narrowed or leak, we implant an artificial valve. Silicone rubber and Teflon are used for biocompatibility. Artificial hearts powered by pneumatic hoses have been implanted in humans. However, the quality of life gradually degrades, and death ensues. When kidney stones develop, lithotripsy is used. A spark creates a pressure wave, which is focused on the stone and fragments it. The pieces pass out normally. When kidneys fail, the blood is cleansed during hemodialysis. Urea passes through a porous membrane to a dialysate bath to lower its concentration in the blood. The blind are able to read by scanning the Optacon with their fingertips. A camera scans letters and converts them to an array of vibrating pins. The deaf are able to hear using a cochlear implant. A microphone detects sound and divides it into frequency bands. 22 electrodes within the cochlea stimulate the acoustic the acoustic nerve to provide sound patterns. For those who have lost muscle function in the limbs, researchers are implanting electrodes to stimulate the muscle. Sensors in the legs and arms feed back signals to a computer that coordinates the stimulators to provide limb motion. For those with high spinal cord injury, a puff and sip switch can control a computer and permit the disabled person operate the computer and communicate with the outside world.

  • PDF