• Title/Summary/Keyword: Grid-based Approach

Search Result 324, Processing Time 0.029 seconds

Power Quality Early Warning Based on Anomaly Detection

  • Gu, Wei;Bai, Jingjing;Yuan, Xiaodong;Zhang, Shuai;Wang, Yuankai
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.4
    • /
    • pp.1171-1181
    • /
    • 2014
  • Different power quality (PQ) disturbance sources can have major impacts on the power supply grid. This study proposes, for the first time, an early warning approach to identifying PQ problems and providing early warning prompts based on the monitored data of PQ disturbance sources. To establish a steady-state power quality early warning index system, the characteristics of PQ disturbance sources are analyzed and summed up. The higher order statistics anomaly detection (HOSAD) algorithm, based on skewness and kurtosis, and hierarchical power quality early warning flow, were then used to mine limit-exceeding and abnormal data and analyze their severity. Cases studies show that the proposed approach is effective and feasible, and that it is possible to provide timely power quality early warnings for limit-exceeding and abnormal data.

The Analysis of Hydropower Development and the Mekong Power Grid on Regional Cooperation : Focus on the Greater Mekong Subregion Program

  • Nayeon Shin;Seungho Lee
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.245-245
    • /
    • 2023
  • This paper examines the extent to which the Mekong River Basin countries have achieved socioeconomic benefits based on regional cooperation through the Greater Mekong Subregion (GMS) Program, focusing on hydropower development and the Mekong Power Grid. This study pays attention to the time period from 2012 to 2022. The benefit sharing approach is employed to evaluate the extent to which hydropower development and the Mekong Power Grid have contributed to the regional energy trade in the GMS program. The GMS program was launched by the Asian Development Bank (ADB) in 1992, and the Chinese provinces of Yunnan and Guangxi, Myanmar, Lao PDR, Thailand, Cambodia, and Vietnam have taken an active part in the program. The goals of the GMS program are to achieve poverty alleviation, economic development, and regional cooperation in various sectors, including energy, tourism, and transportation. The GMS Economic Cooperation Program Strategic Framework 2030 (GMS-2030), in 2021, provides a new framework for prosperous and sustainable development in the river basin. In the energy sector, the GMS program has been instrumental in facilitating hydropower development and creating the Mekong Power Grid with the Regional Grid Code (RGC), contributing to economic benefits and promoting regional trade of hydroelectricity. It is argued that the GMS program has enhanced regional cooperation between the riparian countries. Despite such achievements, the GMS program has faced challenges, including the gap of economic development between the riparian countries, socioeconomic and environmental concerns regarding hydropower development between the Upper and Lower Mekong countries, and geopolitical tensions from the US-China rivalry. These challenges should adequately be addressed within the program, which can guarantee the sustainability of the program for the river basin.

  • PDF

New OTP Authentication Approach based on Table Pattern Schedule (테이블 패턴 스케줄 기반 OTP 인증)

  • Balilo, Benedicto B. Jr.;Gerardo, Bobby D.;Medina, Ruji P.;Byun, Yung-Cheol
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.12
    • /
    • pp.1899-1904
    • /
    • 2017
  • This paper presents a new one-time password approach generated based on $4{\times}4$ pattern schedule. It demonstrates generation of passkey from initial seed of random codes and mapping out in table pattern schedule which will produce a new form of OTP scheme in protecting information or data. The OTP-2FA has been recognized by many organizations as a landmark to authentication techniques. OTP is the solution to the shortcomings of the traditional user name/password authentication. With the application of OTP, some have benefited already while others have had second thoughts because of some considerations like cryptographic issue. This paper presents a new method of algorithmic approach based on table schedule (grid authentication). The generation of OTP will be based on the random parameters that will be mapped out in rows and columns allowing the user to form the XY values to get the appropriate values. The algorithm will capture the values and extract the predefined characters that produce the OTP codes. This scheme can work in any information verification system to enhance the security, trust and confidence of the user.

Hyperparameter Tuning Based Machine Learning classifier for Breast Cancer Prediction

  • Md. Mijanur Rahman;Asikur Rahman Raju;Sumiea Akter Pinky;Swarnali Akter
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.196-202
    • /
    • 2024
  • Currently, the second most devastating form of cancer in people, particularly in women, is Breast Cancer (BC). In the healthcare industry, Machine Learning (ML) is commonly employed in fatal disease prediction. Due to breast cancer's favorable prognosis at an early stage, a model is created to utilize the Dataset on Wisconsin Diagnostic Breast Cancer (WDBC). Conversely, this model's overarching axiom is to compare the effectiveness of five well-known ML classifiers, including Logistic Regression (LR), Decision Tree (DT), Random Forest (RF), K-Nearest Neighbor (KNN), and Naive Bayes (NB) with the conventional method. To counterbalance the effect with conventional methods, the overarching tactic we utilized was hyperparameter tuning utilizing the grid search method, which improved accuracy, secondary precision, third recall, and finally the F1 score. In this study hyperparameter tuning model, the rate of accuracy increased from 94.15% to 98.83% whereas the accuracy of the conventional method increased from 93.56% to 97.08%. According to this investigation, KNN outperformed all other classifiers in terms of accuracy, achieving a score of 98.83%. In conclusion, our study shows that KNN works well with the hyper-tuning method. These analyses show that this study prediction approach is useful in prognosticating women with breast cancer with a viable performance and more accurate findings when compared to the conventional approach.

Hangul Password System for Preventing Shoulder-Surfing (훔쳐보기 방지를 위한 한글 패스워드 시스템)

  • Kim, Jong-Woo;Kim, Sung-Hwan;Park, Sun-Young;Cho, Hwan-Gue
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.4
    • /
    • pp.33-41
    • /
    • 2011
  • Although conventional text-based passwords are used as the most common authentication method, they have significant drawbacks such as guess attacks, dictionary attacks, key loggers, and shoulder-surfing. To address the vulnerabilities of traditional text-based passwords, graphical password schemes have been developed as possible alternative solutions, but they have a potential drawback that they are more vulnerable to shoulder-surfing than conventional text-based passwords. In this paper, we present a new Hangul password input method to prevent shoulder-surfing attacks. Our approach uses Hangul as a password, and it requires the users to locate their password in the given wheeling password grid instead of entering the password. Our approach makes it difficult for attackers to observe a user's password since the system shows the users' passwords with decoy characters as the noise on the screen. Also, we provide security analysis for random attacks, dictionary attacks, and shoulder-surfing attacks, and it shows that our password system is robust against these attacks.

Three Dimensional F.E. Mesh Generation by Composite Hyperpatch Representation (복합 하이퍼패치 표현을 이용한 3차원 유한 요소 격자의 자동생성)

  • Lee, Won-Yang;Choi, Young;Cho, Seong-Wook
    • Korean Journal of Computational Design and Engineering
    • /
    • v.1 no.1
    • /
    • pp.76-83
    • /
    • 1996
  • A three dimensional FE mesh generation scheme based on mapping approach is proposed in this study. A volume in Eucledian space is represented by composite hyperpatches which are piecewise cubic functions in parameters u, v, w. A key idea in the proposed approach is that I sampled grid data points lying only on the boundary surfaces are needed for the shape representation. Inner points which are necessary to form a hyperpatch are internally generated by Coons patches. This approach is most appropriate for the shapes which are compositions of hexahedronlike shapes and also severely curved.

  • PDF

Full-Coverage algorithm with local obstacle avoidance algorithm (지역적 회피 알고리즘을 갖는 Full-Coverage 알고리즘)

  • Park G-M.;Son Y-D.;Kim Y.B.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2005.06a
    • /
    • pp.1468-1471
    • /
    • 2005
  • This Paper is to find out a solution for the full-coverage algorithm requiring the real-time processing such as mobile home service robots and vacuum cleaner robots. Previous methods are used by adopting based grid approach method. They used lots of sensors, a high speed CPU, expensive ranger sensors and huge memory. Besides, most full-coverage algorithms should have a map before obstacle avoidance. However, if a robot able to recognize the tangent vector of obstacles, it is able to bring the same result with less sensors and simplified hardware. Therefore, this study suggests a topological based approach and a local obstacle voidance method using a few of PSD sensors and ultra sonic sensors. The simulation results are presented to prove its applicability.

  • PDF

Pattern Recognition of Monitored Waveforms from Power Supplies Feeding High-Speed Rail Systems

  • Gu, Wei;Zhang, Shuai;Yuan, Xiaodong;Chen, Bing;Bai, Jingjing
    • Journal of Electrical Engineering and Technology
    • /
    • v.11 no.1
    • /
    • pp.55-64
    • /
    • 2016
  • The development of high-speed rail (HSR) has had a major impact on the power supply grid. Based on the monitored waveforms of HSR, a pattern recognition approach is proposed for the first time in this paper to identify the operating conditions. To reduce the data dimensions for monitored waveforms, the principal component analysis (PCA) algorithm was used to extract the characteristics and their waveforms from the monitored waveforms data. The dynamic time wrapping (DTW) algorithm was then used to identify the operating conditions of the HSR. Cases studies show that the proposed approach is effective and feasible, and that it is possible to identify the real-time operating conditions based on the monitored waveforms.

Global GPS Ionospheric Modelling Using Spherical Harmonic Expansion Approach

  • Choi, Byung-Kyu;Lee, Woo-Kyung;Cho, Sung-Ki;Park, Jong-Uk;Park, Pil-Ho
    • Journal of Astronomy and Space Sciences
    • /
    • v.27 no.4
    • /
    • pp.359-366
    • /
    • 2010
  • In this study, we developed a global ionosphere model based on measurements from a worldwide network of global positioning system (GPS). The total number of the international GPS reference stations for development of ionospheric model is about 100 and the spherical harmonic expansion approach as a mathematical method was used. In order to produce the ionospheric total electron content (TEC) based on grid form, we defined spatial resolution of 2.0 degree and 5.0 degree in latitude and longitude, respectively. Two-dimensional TEC maps were constructed within the interval of one hour, and have a high temporal resolution compared to global ionosphere maps which are produced by several analysis centers. As a result, we could detect the sudden increase of TEC by processing GPS observables on 29 October, 2003 when the massive solar flare took place.

Univector Field Method based Multi-Agent Navigation for Pursuit Problem

  • Viet, Hoang Huu;An, Sang-Hyeok;Chung, Tae-Choong
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.12 no.1
    • /
    • pp.86-93
    • /
    • 2012
  • This paper presents a new approach to solve the pursuit problem based on a univector field method. In our proposed method, a set of eight agents works together instantaneously to find suitable moving directions and follow the univector field to pursue and capture a prey agent by surrounding it from eight directions in an infinite grid-world. In addition, a set of strategies is proposed to make the pursuit problem more realistic in the real world environment. This is a general approach, and it can be extended for an environment that contains static or moving obstacles. Experimental results show that our proposed algorithm is effective for the pursuit problem.