• Title/Summary/Keyword: M.E.P. 시스템

Search Result 128, Processing Time 0.03 seconds

PSS Tuning of EX2000 Excitation System in Thermal Plant: Part I- Optimal PSS Parameter Design (대형 화력발전소 EX2000 여자시스템 PSS 튜닝 : Part 1- 최적 PSS 파라메터 설계)

  • Kim, D.J.;Moon, Y.M.;Kim, S.M.;Kim, J.Y.;Hwang, B.H.;Choi, J.M.
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.13-14
    • /
    • 2008
  • This paper describes the optimal PSS parameter design for the PSS of EX2000 excitation system. The suggested tuning technique uses the model-based PSS tuning method which have three steps: generation system modeling, determination of PSS parameters, and on-site test. Using this method, the PSS parameters of EX2000 system in Dangjin T/P #4 was designed and verified by linear analysis program, PSS/E, and EMTDC/PSCAD.

  • PDF

A Study on HEMS for BlockChain based small scale of power trading between e-Prosumers (블록체인 기반 에너지 프로슈머간 소규모 전력거래를 위한 HEMS 시스템 활용 방안 연구)

  • Park, Chong-Tai;Jung, Su-mi;Kim, Seong-Cheol;Park, Taek-Geun;Park, Jae-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.05a
    • /
    • pp.123-125
    • /
    • 2018
  • 본 논문은 블록체인 알고리즘을 탑재한 HEMS 시스템을 활용하여 전력의 생산과 소비를 동시에 수행하는 에너지 프로슈머들 간의 안전하고 신뢰성 있는 전력거래 시스템을 구현하기 위한 방안을 연구하였다. 신재생발전원의 가정내 보급이 증대하고 HEMS를 통해 댁내 에너지관리가 보다 스마트해지고 전력정보의 실시간 취득이 가능해짐에 따라 동일 변대주 인근 배전선로와 연결된 에너지 프로슈머들간의 소규모 전력거래에 있어 블록체인 기반 기술 적용이 보다 용이해 질 것으로 예상된다. 또한, HEMS를 활용하여 블록체인 기반 P2P간의 전력거래에 있어 기술적 한계를 극복하기 위한 추가적인 연구 방향을 함께 제시하였다.

Fuzzy-PI controller for molten steel level of continuous casting process (연속 주조의 용강 높이 제어를 위한 퍼지-PI 제어기)

  • Joo, Moon-G.;Kim, Do-E.;Kim, Ho-K.;Kim, Jong-M.
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.4
    • /
    • pp.488-493
    • /
    • 2008
  • A mathematical model of molten steel level for continuous casting process is presented, where the molten steel level, input and output flow in the mold, the relation between stopper position and input flow etc. are considered. The mathematical model is implemented and simulated by using MATLAB. Comparing the result of molten steel level from the simulator with that of real plant, the performance of the model is shown to be reasonable. By using this simulator, it is shown that PI controller with variable P gain, adjusted by fuzzy logic system, has better control result than conventional PI controller.

Applications and Strategies on Defense Acquisition based CPS & IoT Technology (사이버물리시스템(CPS)과 사물인터넷(loT) 기술의 군사적 활용방안 및 추진전략)

  • Kye, J.E.;Park, P.J.;Kim, W.T.;Lim, C.D.
    • Electronics and Telecommunications Trends
    • /
    • v.30 no.4
    • /
    • pp.92-101
    • /
    • 2015
  • 미래 전장은 정보 지식 기반의 첨단 전력체계를 확충하기 위해 향후 전력구조를 통합, 지휘통제통신(C4I) 체계와 생존성과 통합성이 향상된 전장의 네트워크중심전(NCW) 수행능력을 향상시킬 것이다. 사이버물리시스템(Cyber-Physical Systems: CPS)은 함정전투체계에 적용되고 있는 DDS를 포함하여 국방 M&S의 근간인 Live, Virture, Constructive(L-V-C) 체계의 큰 축을 형성하고 있다. 사물인터넷(Internet of Things: IoT) 기술은 센서네트워크, 통신, Radio Frequency Identification(RFID), Ubiquitous Sensor Network(USN), Machine to Machine(M2M), D2D 기술 및 상황인지, 지능서비스를 위한 정보수집/가공/융합/분석/예측기술을 포괄적으로 포함한 기술로서 미래산업을 이끌어 갈 차세대 선도 기술이며, 특히 군사적으로도 감시정찰 센서네트워크(USN), 견마형로봇, 경전투로봇과 무인기 기술 및 전술정보통신망체계(TICN) 등 첨단 통신네트워크 기술의 전력화 추세는 IoT 기술의 적용영역을 넓혀주고 있다. 감시정찰체계(Sensor)에서는 감시정찰 분야 영상정보 처리, 표적탐지 등과 관련된 IoT 기술 소요와 지휘통제통신(C4I) 체계의 상호운용성, 데이터링크, 지능형 통신체계 등 C4I 관련 IoT 기술 소요 및 타격체계(Shooter)의 내장형 SW 등 유 무인 무기체계 관련 IoT 기술의 소요가 증대될 것으로 예상된다. 본고는 CPS 및 IoT 기술의 군사적 활용방안 및 획득전략에 대한 적용기술 및 발전방향을 살펴본다.

  • PDF

Efficient Hop-based Access Control for Private Social Networks (소셜 네트워크에서 프라이버시를 보호하는 효율적인 거리기반 접근제어)

  • Jung, Sang-Im;Kim, Dong-Min;Jeong, Ik-Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.505-514
    • /
    • 2012
  • Because people usually establish their online social network based on their offline relationship, the social networks (i.e., the graph of friendship relationships) are often used to share contents. Mobile devices let it easier in these days, but it also increases the privacy risk such as access control of shared data and relationship exposure to untrusted server. To control the access on encrypted data and protect relationship from the server, M. Atallah et al. proposed a hop-based scheme in 2009. Their scheme assumed a distributed environment such as p2p, and each user in it shares encrypted data on their social network. On the other hand, it is very inefficient to keep their relationship private, so we propose an improved scheme. In this paper, among encrypted contents and relationships, some authenticated users can only access the data in distributed way. For this, we adopt 'circular-secure symmetric encryption' first. Proposed scheme guarantees the improved security and efficiency compared to the previous work.

A $0.13-{\mu}m$ CMOS RF Front-End Transmitter for LTE-Advanced Systems (LTE-Advanced 표준을 지원하는 $0.13-{\mu}m$ CMOS RF Front-End 송신기 설계)

  • Kim, Jong-Myeong;Lee, Kyoung-Wook;Park, Min-Kyung;Choi, Yun-Ho;Jung, Jae-Ho;Kim, Chang-Wan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.402-403
    • /
    • 2011
  • This paper has proposed a $0.13-{\mu}m$ CMOS RF Front-end transmitter for LTE-Advanced systems. The proposed RF Front-end supports a band 7 (from 2500 MHz to 2570 MHz) in E-UTRA of 3GPP. It can provide a maximum output power level of +10 dBm but it's a normal output power level is +0 dBm considering a low PAPR. The post-layout simulation results show that the quadrature up-conversion mixer and a driver amplifier consumes 14 mA and 28 mA from a 1.2 V supply voltage respectively, while providing a output power level of 0 dBm at the input power level of -13 dBm.

  • PDF

Testing for $P(X_{1}\;<\;X_{2})$ in Bivariate Exponential Model with Censored Data (중단자료를 갖는 이변량 지수 모형에서 $P(X_{1}\;<\;X_{2})$에 대한 검정)

  • Park, Jin-Pyo;Cho, Jang-Sik
    • Journal of the Korean Data and Information Science Society
    • /
    • v.8 no.2
    • /
    • pp.143-152
    • /
    • 1997
  • In this paper, we obtain maximum likelihood estimators for $P(X_{1}\;<\;X_{2})$ in the Marshall and Olkin's bivariate exponential model with bivariate censored data. The asymptotic normality of the estimator is derived. Also we propose approximate testing for $P(X_{1}\;<\;X_{2})$ based on the M.L.E. We compare the test powers under vsrious conditions through Monte Carlo simulation.

  • PDF

Parallel Implementation of Radon Transform on TMS320C80-based System (TMS320C80시스템에서 Radon 변환의 병렬 구현)

  • 송정호;성효경최흥문
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.727-730
    • /
    • 1998
  • In this paper, we propose an implementation of an efficient parallel Radon transform on TMS320C80-based system. For an N$\times$N SAR image, we can obtain O(NM/p) of the conventional parallel Radon transform, by representing the projection patterns in Radon space variables instead of the image space variables, and pipelining the algorithm, where p is the number of processors and M is the number of projection angles. Also, we can reduce the time for the dynamic load distribution among the nodes and the communication overheads of accessing the global memories, by pipelining the memory and processing operations by using tripple buffer structure. Experimental results show an efficient parallel Radon transform of speedup Sp=3.9 and efficiency E=97.5% for 256$\times$256 image, when implemented on TMS320C80 composed of four parallel slave processors with three memory blocks.

  • PDF

TOWARDS A MODEL OF THE DIGITAL UNIVERSITY;A GENERALIZED NET MODEL FOR PRODUCING COURSE TIMETABLES

  • Shannon, A.;Orozova, D.;Sotirova, E.;Atanassov, K.;Krawczak, M.;Melo-Pinto, P.;Nikolov, R.;Sotirov, S.;Kim, T.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2008.04a
    • /
    • pp.299-305
    • /
    • 2008
  • In a series of research papers, the authors have studied some of the most important models of a contemporary universities, such as: the research university, the entrepreneurial university and the digital university and construct their Generalized Net (GN) models. This paper is based on the case-studies of Sofia University, the Technical University of Munich and the University of Edinburgh. The main focus is to put the analysis of the processes of the functioning of a university which effectively integrates Information and Communication Technologies (ICT) in all university activities. A concrete example based on the process of course administration at University of Edinburgh is considered. This university is in a process of developing an integrated information system covering most of the university activities. The opportunity of using GNs as a tool for modeling such processes is analyzed as well.

  • PDF

An Elliptic Approach to Fuzzy Pattern Recognition

  • Karbou, Fatiha;Karbou, Fatima;Karbou, M.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1998.06a
    • /
    • pp.272-277
    • /
    • 1998
  • If we want to compare the form of two objects, the human vision takes into account the parameter's width/length/height at the same time. however, the machine needs to compare width then lengths and finally height. In each comparison the machine considers only one character. The goal of this paper is to imitate the human manner of comparison and recognition by using two or three characters instead of one during the comparison. The ellipse is a first approach of comparison because it provides us a general and a simple relation that can link two parameters that are the half axis of the ellipse. Indeed, we assimilate each character to a half axis of the ellipse and the result is a geometrical figure that varies according to values of the two characters.

  • PDF