• Title/Summary/Keyword: Implementation problem

Search Result 2,507, Processing Time 0.031 seconds

A New Dispatch Scheduling Algorithm Applicable to Interconnected Regional Systems with Distributed Inter-temporal Optimal Power Flow (분산처리 최적조류계산 기반 연계계통 급전계획 알고리즘 개발)

  • Chung, Koo-Hyung;Kang, Dong-Joo;Kim, Bal-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.10
    • /
    • pp.1721-1730
    • /
    • 2007
  • SThis paper proposes a new dispatch scheduling algorithm in interconnected regional system operations. The dispatch scheduling formulated as mixed integer non-linear programming (MINLP) problem can efficiently be computed by generalized Benders decomposition (GBD) algorithm. GBD guarantees adequate computation speed and solution convergency since it decomposes a primal problem into a master problem and subproblems for simplicity. In addition, the inter-temporal optimal power flow (OPF) subproblem of the dispatch scheduling problem is comprised of various variables and constraints considering time-continuity and it makes the inter-temporal OPF complex due to increased dimensions of the optimization problem. In this paper, regional decomposition technique based on auxiliary problem principle (APP) algorithm is introduced to obtain efficient inter-temporal OPF solution through the parallel implementation. In addition, it can find the most economic dispatch schedule incorporating power transaction without private information open. Therefore, it can be expanded as an efficient dispatch scheduling model for interconnected system operation.

A Study and Implementation of the Heuristic Autonesting Algorithm in the 2 Dimension Space (2차원 공간에서의 휴리스틱 배치 알고리즘 및 구현에 관한 연구)

  • 양성모;임성국;고석호;김현정;한관희
    • Korean Journal of Computational Design and Engineering
    • /
    • v.4 no.3
    • /
    • pp.259-268
    • /
    • 1999
  • In order to reduce the cost of product and save the processing time, optimal nesting of two-dimensional part is an important application in number of industries like shipbuilding and garment making. There have been many studies on finding the optimal solution of two-dimensional nesting. The problem of two-dimensional nesting has a non-deterministic characteristic and there have been various attempts to solve the problem by reducing the size of problem rather than solving the problem as a whole. Heuristic method and linearlization are often used to find an optimal solution of the problem. In this paper, theoretical and practical nesting algorithm for rectangular, circular and irregular shape of two-dimensional parts is proposed. Both No-Fit-Polygon and Minkowski-Sum are used for solving the overlapping problem of two parts and the dynamic programming technique is used for reducing the number search spae in order to find an optimal solution. Also, nesting designer's expertise is complied into the proposed algorithm to supplement the heuristic method.

  • PDF

An Automatic Construction for Class Diagram from Problem Statement using Natural Language Processing

  • Utama, Ahmad Zulfiana;Jang, Duk-Sung
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.3
    • /
    • pp.386-394
    • /
    • 2019
  • This research will describe algorithm for class diagram extraction from problem statements. Class diagram notation consist of class name, attributes, and operations. Class diagram can be extracted from the problem statement automatically by using Natural Language Processing (NLP). The extraction results heavily depends on the algorithm and preprocessing stage. The algorithm obtained from various sources with additional rules that are obtained in the implementation phase. The evaluation features using five problem statement with different domains. The application will capture the problem statement and draw the class diagram automatically by using Windows Presentation Foundation(WPF). The classification accuracy of 100% was achieved. The final algorithm achieved 92 % of average precision score.

An implementation of network optimaization system using GIS (GIS를 이용한 네트워트 최적화 시스템 구축)

  • 박찬규;이상욱;박순달;성기석;진희채
    • Korean Management Science Review
    • /
    • v.17 no.1
    • /
    • pp.55-64
    • /
    • 2000
  • By managing not only geographical information but also various kinds of attribute data. GIS presents useful information for decision-makings. Most of decision-making problems using GIS can be formulated into network-optimization problems. In this study we deal with the implementation of network optimization system that extracts data from the database in GIS. solves a network optimization problem and present optimal solutions through GIS' graphical user interface. We design a nitwork optimization system and present some implementation techniques by showing a prototype of the network optimization system. Our network optimization system consists of three components : the interface module for user and GIS the basic network the program module the advanced network optimization program module. To handle large-scale networks the program module including various techniques for large sparse networks is also considered, For the implementation of the network optimization system we consider two approaches : the method using script languages supported by GIS and the method using client tools of GIS. Finally some execution results displayed by the prototype version of network optimization system are given.

  • PDF

A Study of Virtual Home Environment Implementation Scenario for Subscriber Privacy (가입자 정보보호를 위한 Virtual Home Environment 시나리오 보안 취약점 분석)

  • Jeong, Jong-Min;Lee, Goo-Yeon;Lee, Yong
    • Journal of Industrial Technology
    • /
    • v.21 no.A
    • /
    • pp.117-122
    • /
    • 2001
  • Currently, the VHE (suggested for global roaming user to provide personal service environment) implementation scenario is being proposed to realize 3G network requirements. However, developing VHE scenarios are focused on signal flow between node and network, and network and network. this case may result in weakness to protect subscriber's privacy in 3G network which commonly uses visited network. In this paper, we reanalyze a several VHE implementation scenarios for user profile protection, indicate a problem concerning user privacy, and finally, design a procedure to cope with vulnerability in VHE implementation scenario.

  • PDF

Case Study on The Implementation of Student Teachers' Practicums Based on a Blended Model (블렌디드 모형에 기초한 보육실습 운영에 관한 사례연구)

  • Shin, Hae-Young
    • Journal of the Korean Home Economics Association
    • /
    • v.48 no.5
    • /
    • pp.129-143
    • /
    • 2010
  • In order to improve the quality of student teachers' practicum, this study analysed the current situation of student teachers' field practice in child care centers. The study also assessed the practicum implementation case of H Cyber University. First, this research examined the characteristics of practicum implementation in universities. Second, a variety of strategies based on a blended model, on/off-line lectures, professor-student interaction, university-daycare centers collaboration, e-mentoring, and student teachers' portfolios that reduce the problems of student teachers' training, were explored. Finally, the practicum implementation case that adopted these factors was assessed. The results from this case study implied that student teachers' practicums based on a blended model can be an alternative method for problem-solving in existing student teachers' training in universities.

The Analysis on the Forecasting Demand & the Implementation of IT Systems for SMEs (중소기업 정보시스템 활용실태와 수요 전망)

  • Hyoung, Jun-Ho;Kim, Moon-Sun;Hwang, Soon-Hwan
    • Journal of Information Technology Services
    • /
    • v.3 no.2
    • /
    • pp.1-8
    • /
    • 2004
  • Recently, most managers of Small & Medium Enterprises(SMEs) think that all problem of a company is solved if only implementation of ERP or e-business. But it's too risky. Technology of IT is developing so radical, so managers didn't have enough time to consider what system is appropriate in their business process and how implement information system is when they establish Information System. This Study addresses the present Information System that operating and needed for SMEs based on the Value Chain of IS. Thus through the prediction on the consequence of IS implementation, we could cut down unnecessary investment cost and support core competence of a company. Next time, the study on the classification of more detail IS associated in SME's performance is required.

A Practical Implementation of the LTJ Adaptive Filter and Its Application to the Adaptive Echo Canceller (LTJ 적응필터의 실용적 구현과 적응반향제거기에 대한 적용)

  • Yoo, Jae-Ha
    • Speech Sciences
    • /
    • v.11 no.2
    • /
    • pp.227-235
    • /
    • 2004
  • In this paper, we proposed a new practical implementation method of the lattice transversal joint (LTJ) adaptive filter using speech codec's information. And it was applied to the adaptive echo cancellation problem to verify the efficiency of the proposed method. Realtime implementation of the LTJ adaptive filter is very difficult due to high computational complexity for the filter coefficients compensation. However, in case of using speech codec, complexity can be reduced since linear predictive coding (LPC) coefficients are updated each frame or sub-frame instead of every sample. Furthermore, LPC coefficients can be acquired from speech decoder and transformed to the reflection coefficients. Therefore, the computational complexity for updates of the reflection coefficients can be reduced. The effectiveness of the proposed LTJ adaptive filter was verified by the experiments about convergence and tracking performance of the adaptive echo canceller.

  • PDF

Efficient Masking Methods Appropriate for the Block Ciphers ARIA and AES

  • Kim, Hee-Seok;Kim, Tae-Hyun;Han, Dong-Guk;Hong, Seok-Hie
    • ETRI Journal
    • /
    • v.32 no.3
    • /
    • pp.370-379
    • /
    • 2010
  • In this paper, we propose efficient masking methods for ARIA and AES. In general, a masked S-box (MS) block can be constructed in different ways depending on the implementation platform, such as hardware and software. However, the other components of ARIA and AES have less impact on the implementation cost. We first propose an efficient masking structure by minimizing the number of mask corrections under the assumption that we have an MS block. Second, to make a secure and efficient MS block for ARIA and AES, we propose novel methods to solve the table size problem for the MS block in a software implementation and to reduce the cost of a masked inversion which is the main part of the MS block in the hardware implementation.

Parallel Implementation of A Neural Network Ensemble on the Connection Machine CM-2 (Connection Machine CM-2상에서 신경망군(群)의 병렬 구현)

  • 김대진
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.34C no.1
    • /
    • pp.28-41
    • /
    • 1997
  • This paper describes a parallel implementation of a neurla network ensemble developed for object recognition on the connection machine CM-2. The implementation ensures that multiple networks are implemented simultaneously starting from different initial weights and all training samples are applied to each network by one sample per a copy of each network. When compared with a sequential implementation, this accelerates the computation speed by O(N.m.n) where N, m, and n are the network, respectively. The speedup in the computation time and the convergence characteristics of sthe modified backpropagation learning precedure were evaluated by two-dimensional object recognition problem.

  • PDF