• Title/Summary/Keyword: Power Constraint

Search Result 500, Processing Time 0.029 seconds

Energy-Efficient Power Allocation for Cognitive Radio Networks with Joint Overlay and Underlay Spectrum Access Mechanism

  • Zuo, Jiakuo;Zhao, Li;Bao, Yongqiang;Zou, Cairong
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.471-479
    • /
    • 2015
  • Traditional designs of cognitive radio (CR) focus on maximizing system throughput. In this paper, we study the joint overlay and underlay power allocation problem for orthogonal frequency-division multiple access-based CR. Instead of maximizing system throughput, we aim to maximize system energy efficiency (EE), measured by a "bit per Joule" metric, while maintaining the minimal rate requirement of a given CR system, under the total power constraint of a secondary user and interference constraints of primary users. The formulated energy-efficient power allocation (EEPA) problem is nonconvex; to make it solvable, we first transform the original problem into a convex optimization problem via fractional programming, and then the Lagrange dual decomposition method is used to solve the equivalent convex optimization problem. Finally, an optimal EEPA allocation scheme is proposed. Numerical results show that the proposed method can achieve better EE performance.

A Study on Development of Power Transfer Capability Calculation Algorithm Considering Voltage Stability Margin (전압안정도 여유를 고려한 수송능력산정 알고리즘의 개발에 관한 연구)

  • Kim, Yong-Ha;Lee, Bum;Moon, Hyuk-Ki;Jung, Hyun-Sung;Cho, Sung-Rin
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.17 no.3
    • /
    • pp.18-24
    • /
    • 2003
  • This paper presents a power transfer capability calculation algorithm considering voltage stability margin. In this method, voltage stability margin constraints are incorporated into a power transfer capability formulation to guarantee adequate voltage security levels in an interconnected power system The proposed method is applied to IEEE-24 reliability test systems and the results show the effectiveness of the method.

Increasing Effect Analysis of the Wind Power Limit Using Energy Storage System in Jeju-Korea (에너지저장장치를 이용한 제주지역 풍력발전 한계용량 증대효과 분석)

  • Kim, Yeong-Hwan;Kim, Se-Ho
    • Journal of the Korean Solar Energy Society
    • /
    • v.34 no.1
    • /
    • pp.81-90
    • /
    • 2014
  • The Jeju-Korea power system is a small-sized network with a system demand ranging from a autumn minimum of 350MW to a summer peak of 716MW. Because Jeju island is well exposed to north-east winds with high speed, applications to connect to Jeju power system are flooded. Considering physical/environmental constraints, Jeju Self-governing Province has also target for the wind power capacity of 1,350MW by 2020. It amounts to two or three times of Jeju average-demand power and wind power limit capacity announced by Korea Power Exchange (KPX) company. Wind farm connection agreements will be signed to maximize utilization of wind resource. In spite of submarine cable HVDC connected to Korea mainland, Jeju power system is independently operated by frequency and reserve control. This study reevaluates wind power limit based on the KPX criteria from 2016 to 2020. First of all wind power generation limit are affected by off-peak demand in Jeju power system. Also the possibility capacity rate of charging wind power output is evaluated by using energy storage system (ESS). As a result, in case of using 110MWh ESS, wind power limit increases 33~55MW(30~50% of ESS), wind power constraint energy decreases from 68,539MWh to 50,301MWh and wind farm capacity factor increases from 25.9 to 26.1% in 2020.

Cooperative Relaying Protocol using Fountain Codes under Interference Constraint Networks (간섭 제약 네트워크에서 파운틴 코드를 사용한 협동 릴레이 프로토콜 설계)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.39-45
    • /
    • 2013
  • In this paper, we propose a cooperative relaying protocol using Fountain codes for secondary network under interference constraint. In the proposed protocol, a secondary source uses Fountain codes to transmit its message to a secondary destination with help of a secondary relay. The secondary source and relay operate in the underlay model, in which they must adapt their transmit power so that the interference caused at a primary user is lower than an allowable threshold. To evaluate performance of the proposed protocol, we derive the expressions of average number of transmission times over Rayleigh fading channel. Various Monte-Carlo simulations are presented to verify the derivations.

Fatigue-characteristic Evaluation of a Ventilating Blade in the Air-conditioner (냉방기용 송풍 Blade의 피로특성 평가)

  • Choi, Jung-Hun;Koo, Jae-Mean;Seok, Chang-Sung;Kim, Jong-Hak;Chang, Sung-Yong
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.27 no.11
    • /
    • pp.72-77
    • /
    • 2010
  • The fatigue characteristic of a material or a structure is derived from fatigue tests of standard specimens. However, many test results of standard specimens are very different from those of real structures. One reason for this difference is the constraint effects according to the geometrical difference. Therefore, to calculate more accurate fatigue life, the constraint effect must be considered by comparing test results of standard specimens with those of real structures. In this study, a blade of an air-conditioner was evaluated by both the test and the analysis. The results showed that a standard specimen is conservative, compared with a structure specimen. And fatigue life of an air-conditioner's blade was predicted from those.

Analysis of Error Rate in the Variations of Shearing Amount in Measuring the Internal Defect using a Shearography (전단간섭계를 이용한 압력용기 내부 결함 측정시 전단량 변화에 따른 오차분석)

  • Hong, Kyung-Min;Kang, Young-June;Choi, In-Young;Ahn, Yong-Jin;Yoon, Suk-Bum
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.21 no.5
    • /
    • pp.726-732
    • /
    • 2012
  • Pipe and Pressure Vessels that is used in power plant and chemical industry have many Internal Defects that is corrosion caused by the flow of fluid. These Internal Defects that have possibility of explosion are very dangerous because it can not see from the outside. This days many companys using NDT method to find an Internal Defect. Most of the NDT methods have limitations that are constraint of shape and materials. But Sheargoraphy have many advantages compared conventional NDT method. It has very fast measuring speed, non-destructive and non contacting measurement. As well as it hasn't constraint of shape and materials. As a paper on the analysis of measurement of error, the important factors were the Shearing Amount and pressure, and discovered measurement of the Internal Defect of the object by using shearography. The optimal Shearing Amount and pressure was discovered and utilized.

Robust algorithm for estimating voltage stability by the modified method of sensitivity index dP/de of real value on voltage vector (전압벡터의 유효분 감도지표 dP/de 수정법에 의한 견고한 전압안정도 평가에 관한 연구)

  • 송길영;김세영;김용하
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.45 no.1
    • /
    • pp.1-8
    • /
    • 1996
  • Recently, much attention has been paid to problems which is concerned with voltage instability phenomena and much works on these phenomena have been made. In this paper, by substituting d $P_{k}$ d $e_{k}$ ( $v^{\rarw}$= e +j f) for $P_{k}$ in conventional load flow, direct method for finging the limit of voltage stability is proposed. Here, by using the fact that taylor se- ries expansion in .DELTA. $P_{k}$ and .DELTA. $Q_{k}$ is terminated at the second-order terms, constraint equation (d $P_{k}$ d $e_{k}$ =0) and power flow equations are formulated with new variables .DSLTA. e and .DELTA.f, so partial differentiations for constraint equation are precisely calculated. The fact that iteratively calculated equations are reformulated with new variables .DELTA.e and .DELTA.f means that limit of voltage stability can be traced precisely through recalculation of jacobian matrix at e+.DELTA.e and f+.DELTA.f state. Then, during iterative process divergence may be avoid. Also, as elements of Hessian mat rix are constant, its computations are required only once during iterative process. Results of application of the proposed method to sample systems are presented. (author). 13 refs., 11 figs., 4 tab.

  • PDF

Evaluation of Fracture Toughness by J-A$_2$ Method Considering Size Effect (시편크기의 영향을 고려한 J-A$_2$ 방법에 의한 파괴인성 평가)

  • 이정윤;김영종;김용환;김재훈
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.17 no.1
    • /
    • pp.153-163
    • /
    • 2000
  • The size effect on fracture toughness was investigated by introducing $J-A_2$ theory. For this application,small size specimens were chosen to establish $J-A_2$ assessment curve with FEM analysis. Two-dimensional FEM analysis was conducted with plane strain model using ABAQUS by domain integral method to calculate both crack tip stress and fracture toughness which were used to establish $J-A_2$ curve. The assessment curve predicted the fracture toughness of large specimens very well when compared to the test values. The results showed good prediction for deep crack specimen, though there were acceptable deviations in shallow cracked specimens, presumably caused by constraint effect. When the curve applied to reactor vessel in order to predict end of life fracture toughness with assumption of on-power pressure test condition, it provided the reasonable pressure compared to the existing design value. Better predictions would be possible if more test data were available.

  • PDF

Vibration Characteristics of A Rectangular Tank in accordance with Changing Thickness And Boundary Condition (경계조건과 두께 변화에 따른 사각탱크의 진동 특성)

  • Bae, S.Y.
    • Journal of Power System Engineering
    • /
    • v.15 no.1
    • /
    • pp.24-31
    • /
    • 2011
  • Rectangular box type structures are used in many fields of civil, mechanical and marine engineering. Especially, Most ship structures are often in contact with inner or outer fluid, like ballast, fuel and stem tanks. Fatigue damages are sometimes observed in these tanks which seem to be caused by resonance with exciting force of engine and propeller. Vibration characteristics of these thin walled tanks in contact with fluid near engine and propeller are strongly affected by added mass of containing fluid. Therefore it is essentially important to estimate the added mass effect to predict vibration of the tanks. Many authors have studied vibration of rectangular tanks containing fluid. Few research on dynamic interaction among tank walls filled with fluid are reported in the vibration of rectangular tanks recently. In case of rectangular tanks, structural coupling between adjacent panels and effect of vibration modes of multiple panels on added mass of water have to be considered. In the previous report, a numerical analysis is performed for the coupling effect between panels of a tank on added mass of containing fluid, the effect of structural constraint between panels on each vibration mode for fluid region, and mode characteristics in accordance with changing breadth of the plates by using finite element method for plates and boundary element method for fluid region. In this paper, the coupling effect between panels of a tank on added mass of containing fluid, the effect of structural constraint between panels on each vibration mode for fluid region, and mode characteristics in accordance with changing length, thickness, and boundary condition of the plates are investigated numerically and discussed.

A Study on Secure Binding Update Protocol Supporting Mobile Nodes with Constraint Computational Power in Mobile IPv6 Environment (모바일 IPv6 환경에서 제한된 계산 능력을 갖는 모바일 노드를 지원하는 바인딩 갱신 인증 프로토콜에 관한 연구)

  • Choi, Sung-Kyo;You, Il-Sun
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.11-25
    • /
    • 2005
  • In MIPv6 environment, an important design consideration for public key based binding update protocols is to minimize asymmetric cryptographic operations in mobile nodes with constraint computational power, such as PDAs and cellular phones, For that, public key based protocols such as CAM-DH. SUCV and Deng-Zhou-Bao's approach provides an optimization to offload asymmetric cryptographic operations of a mobile node to its home agent. However, such protocols have some problems in providing the optimization. Especially, CAM-DH with this optimization does not unload all asymmetric cryptographic operations from the mobile node, while resulting in the home agent's vulnerability to denial of service attacks. In this paper, we improve the drawbacks of CAM-DH. Furthermore, we adopt Aura's two hash-based CGA scheme to increase the cost of brute-force attacks searching for hash collisions in the CGA method. The comparison of our protocol with other public key based protocols shows that our protocol can minimize the MN's computation overhead, in addition to providing better manageability and stronger security than other protocols.

  • PDF