• Title/Summary/Keyword: Real-Time Network

Search Result 4,360, Processing Time 0.033 seconds

An Analysis on the Effects of Demand Response in Electricity Markets (수요반응자원의 전력시장 도입효과 분석)

  • Yoo, Young-Gon;Song, Byung-Gun;Kang, Seung-Jin
    • Environmental and Resource Economics Review
    • /
    • v.16 no.1
    • /
    • pp.99-127
    • /
    • 2007
  • When the margin between available capacity and demand is thin in a liberalized electricity market, prices rise steeply and system reliability is threatened. The principal response to these circumstances is often an assumption that price spikes and electricity shortages are the result of a failure to build sufficient new supplying facilities. It is, of course, often the case that additional investments in generation and network facilities would improve reliability, and such investments are often needed. But focusing on additional generation and transmission facilities for restoring balance to the grid overlooks the essential fact that reliability is a function of the relationship between supply and demand, imposing unnecessary costs on electric system. When the relationship is out of balance, the search for solutions must consider not only investments supply-side resources but also cost-effective demand-side resources such as accelerated load management, efficiency measures, and price-responsive load programs. Integrating demand resources into electricity markets can add enormous value to the electric system, widening the capacity margin, lowering costs and enhancing system reliability at the same time. This paper studies several challenges now facing electricity markets: demand-side management-especially, economic effects of demand response, potential reliability problems, market and system operation, CBP market improvements and so on. The paper concludes with a series of policy recommendations in five areas: (i) The Effects of efficient improvement to incorporate demand responses and demand-side resources into modem electricity markets, (ii) Fosteing price based demand response and (iii) improving incentive based demand response, (iv) strengthen demand response analysis and valuation, (v) integrating demand response into resource planning and adopting enabling technologies.

  • PDF

A Determination Model of the Data Transmission-Interval for Collecting Vehicular Information at WAVE-technology driven Highway by Simulation Method (모의실험을 이용한 WAVE기반 고속도로 차량정보 전송간격 결정 모델 연구)

  • Jang, Jeong-Ah;Cho, Han-Byeog;Kim, Hyon-Suk
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.4
    • /
    • pp.1-12
    • /
    • 2010
  • This paper deals with the transmission interval of vehicle data in smart highway where WAVE (Wireless Access for Vehicular Environments) systems have been installed for advanced road infrastructure. The vehicle data could be collected at every second, which is containing location information of the vehicle as well the vehicle speed, RPM, fuel consuming and safety data. The safety data such as DTC code, can be collected through OBD-II. These vehicle data can be used for valuable contents for processing and providing traffic information. In this paper, we propose a model to decide the collection interval of vehicle information in real time environment. This model can change the transmission interval along with special and time-variant traffic condition based on the 32 scenarios using microscopic traffic simulator, VISSIM. We have reviewed the transmission interval, communication transmission quantity and communication interval, tried to confirm about communication possibility and BPS, etc for each scenario. As results, in 2-lane from 1km highway segment, most appropriate transmission interval is 2 times over spatial basic segment considering to communication specification. In the future, if a variety of wireless technologies on the road is introduced, this paper considering not only traffic condition but also wireless network specification will be utilized the high value.

Implementation and Design of motorcar consumption management iOS based software with OBD-II and WiFi network (OBD-II WiFi를 이용한 iOS 기반의 자동차 소모품관리 소프트웨어 설계 및 구현)

  • Jeong, Da-Woon;Nam, Jae-Hyun;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.475-478
    • /
    • 2011
  • driver for safety always check the status of their vehicle, and it is essential to understand. But if you want to know the status of the driver of the vehicle in specialist referral time and money because it costs the operator shall be paid. Today's rapidly changing IT technology with the development of the various features of your phone to check the status of the vehicle was able to do. However, the car's existing phone system, car diagnostic expertise must be learned because it will reveal the status of the vehicle do not have the expertise to not highlight the need for diagnostic. To reflect these points in smartphone users to easily use their own vehicles at a time to determine the status of a system that is required. In this paper, OBD-II protocol conversion WiFi OBD-II connector, retrieving information from the driver of the vehicle replacement cycle of consumables required vehicle inspection, vehicle problems in real-time diagnostic information to the user ease of use shows the IOS implementation in the automotive supply was implemented based on the smartphone.

  • PDF

A Large Scale Distributed Presence Service System by SIP Message Control Session (SIP 메시지 제어 세션에 의한 대용량 분산 프레즌스 서비스 시스템)

  • Jang, Choonseo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.5
    • /
    • pp.514-520
    • /
    • 2018
  • Presence service provides various information about users such as locations, status of on/offline and network access methods, and number of presence resources required by each users increases largely in mobile environment. Therefore an effective method which can reduce load of presence servers is needed. In this paper, a large scale distributed presence service system which can distribute effectively total presence system load of presence servers using message control session has been presented. This large scale distributed presence service system provides various presence information for massive volumes of users. In this study, a new message control session architecture which can dynamically distribute loads of the presence servers to multiple servers has been presented, and a new presence information data architecture for controlling load of the presence servers has been designed. In this architecture, each presence server can exchange current load level in real time to get variance of the total system load change according to user numbers, and can distribute system load to maintain load level of each server evenly. The performance of the proposed large scale distributed presence service system has been analysed by experiments. The results has been showed that average presence resource subscription processing time reduced from 42.6% to 73.6%, and average presence notification processing time reduced from 37.6% to 64.8%.

A Study on Virtual Source-based Differentiated Multicast Routing and Wavelength Assignment Algorithms in the Next Generation Optical Internet based on DWDM Technology (DWDM 기반 차세대 광 인터넷 망에서 VS기반의 차등화된 멀티캐스트 라우팅 및 파장할당 알고리즘 연구)

  • Kim, Sung-Un;Park, Seon-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.5
    • /
    • pp.658-668
    • /
    • 2011
  • Over the past decade, the improvement of communications technologies and the rapid spread of www (World Wide Web) have brought on the exponential growth of users using Internet and real time multimedia multicast services like video conferencing, tele-immersive virtual reality, and Internet games. The dense-wavelength division multiplexing (DWDM) networks have been widely accepted as a promising approach to meet the ever-increasing bandwidth demands of Internet users, especially in next generation Internet backbone networks for nation-wide or global coverage. A major challenge in the next generation Internet backbone networks based on DWDM technologies is the resolution of the multicasting RWA (Routing and Wavelength Assignment) problem; given a set of wavelengths in the DWDM network, we set up light-paths by routing and assigning a wavelength for each connection so that the multicast connections are set-upped as many as possible. Finding such optimal multicast connections has been proven to be Non-deterministic Polynomial-time-complete. In this paper, we suggest a new heuristic multicast routing and wavelength assignment method for multicast sessions called DVS-PMIPMR (Differentiated Virtual Source-based Priority Minimum Interference Path Multicast Routing algorithm). We measured the performance of the proposed algorithm in terms of number of wavelength and wavelength channel. The simulation results demonstrate that DVS-PMIPMR algorithm is superior to previous multicast routing algorithms.

Vulnerable Analysis of Emergency Medical Facilities based on Accessibility to Emergency Room and 119 Emergency Center (응급실과 119 안전센터의 접근성을 고려한 응급의료 취약지 분석)

  • Jeon, Jeongbae;Park, Meejeong;Jang, Dodam;Lim, Changsu;Kim, Eunja
    • Journal of Korean Society of Rural Planning
    • /
    • v.24 no.4
    • /
    • pp.147-155
    • /
    • 2018
  • The purpose of this study was to identify vulnerable area of emergency medical care. In the existing method, the emergency medical vulnerable area is set as an area that can not reach the emergency room within 30 minutes. In this study, we set up an area that can not reach within 30 minutes including the accessibility of 119 emergency center. To accomplish this, we obtained information on emergency room and 119 emergency center through Open API and constructed road network using digital map to perform accessibility analysis. As a result, 509 emergency room are located nationwide, 78.0% of them are concentrated in the region, 1,820 emergency center are located, and 61.0% of them are located in rural areas. The average access time from the center of the village to the emergency room was analyzed as 15.3 minutes, and the average access time considering the 119 emergency center was 21.8 minutes, 6.5 minutes more. As a result of considering the accessibility of 119 emergency center, vulnerable areas increased by 2.5 times, vulnerable population increased by 2.0 times, and calculating emergency medical care vulnerable areas, which account for more than 30% of the urban unit population, it was analyzed that it increased from 17 to 34 cities As a further study, it will be necessary to continuously monitor and research the real-time traffic information, medical personnel, medical field, and ambulance information to reflect the reality and to diagnose emergency medical care in the future.

AutoML and Artificial Neural Network Modeling of Process Dynamics of LNG Regasification Using Seawater (해수 이용 LNG 재기화 공정의 딥러닝과 AutoML을 이용한 동적모델링)

  • Shin, Yongbeom;Yoo, Sangwoo;Kwak, Dongho;Lee, Nagyeong;Shin, Dongil
    • Korean Chemical Engineering Research
    • /
    • v.59 no.2
    • /
    • pp.209-218
    • /
    • 2021
  • First principle-based modeling studies have been performed to improve the heat exchange efficiency of ORV and optimize operation, but the heat transfer coefficient of ORV is an irregular system according to time and location, and it undergoes a complex modeling process. In this study, FNN, LSTM, and AutoML-based modeling were performed to confirm the effectiveness of data-based modeling for complex systems. The prediction accuracy indicated high performance in the order of LSTM > AutoML > FNN in MSE. The performance of AutoML, an automatic design method for machine learning models, was superior to developed FNN, and the total time required for model development was 1/15 compared to LSTM, showing the possibility of using AutoML. The prediction of NG and seawater discharged temperatures using LSTM and AutoML showed an error of less than 0.5K. Using the predictive model, real-time optimization of the amount of LNG vaporized that can be processed using ORV in winter is performed, confirming that up to 23.5% of LNG can be additionally processed, and an ORV optimal operation guideline based on the developed dynamic prediction model was presented.

An Efficient Method of Forensics Evidence Collection at the Time of Infringement Occurrence (호스트 침해 발생 시점에서의 효율적 Forensics 증거 자료 수집 방안)

  • Choi Yoon-Ho;Park Jong-Ho;Kim Sang-Kon;Kang Yu;Choe Jin-Gi;Moon Ho-Gun;Rhee Myung-Su;Seo Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.69-81
    • /
    • 2006
  • The Computer Forensics is a research area that finds the malicious users by collecting and analyzing the intrusion or infringement evidence of computer crimes such as hacking. Many researches about Computer Forensics have been done so far. But those researches have focussed on how to collect the forensic evidence for both analysis and poofs after receiving the intrusion or infringement reports of hosts from computer users or network administrators. In this paper, we describe how to collect the forensic evidence of good quality from observable and protective hosts at the time of infringement occurrence by malicious users. By correlating the event logs of Intrusion Detection Systems(IDSes) and hosts with the configuration information of hosts periodically, we calculate the value of infringement severity that implies the real infringement possibility of the hosts. Based on this severity value, we selectively collect the evidence for proofs at the time of infringement occurrence. As a result, we show that we can minimize the information damage of the evidence for both analysis and proofs, and reduce the amount of data which are used to analyze the degree of infringement severity.

Different Impacts of Independent Recurrent and Non-Recurrent Congestion on Freeway Segments (고속도로상의 독립적인 반복 및 비반복정체의 영향비교)

  • Gang, Gyeong-Pyo;Jang, Myeong-Sun
    • Journal of Korean Society of Transportation
    • /
    • v.25 no.6
    • /
    • pp.99-109
    • /
    • 2007
  • There have been few studies on the impacts of independent recurrent and non-recurrent congestion on freeway networks. The main reason is due partly to the lack of traffic data collected during those periods of recurrent and non-recurrent congestion and partly to the difficulty of using the simulation tools effectively. This study has suggested a methodology to analyze the independent impacts of the recurrent and non-recurrent congestion on target freeway segments. The proposed methodology is based on an elaborately calibrated simulation analysis, using real traffic data obtained during the recurrent and non-recurrent congestion periods. This paper has also summarized the evaluation results from the field tests of two ITS technologies, which were developed to provide drivers with real-time traffic information under traffic congestion. As a result, their accuracy may not be guaranteed during the transition periods such as the non-recurrent congestion. In summary, this study has been focused on the importance of non-recurrent congestion compared to recurrent congestion, and the proposed methodology is expected to provide a basic foundation for prioritizing limited government investments for improving freeway network performance degraded by recurrent or non-recurrent congestion.

A Practical Feature Extraction for Improving Accuracy and Speed of IDS Alerts Classification Models Based on Machine Learning (기계학습 기반 IDS 보안이벤트 분류 모델의 정확도 및 신속도 향상을 위한 실용적 feature 추출 연구)

  • Shin, Iksoo;Song, Jungsuk;Choi, Jangwon;Kwon, Taewoong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.385-395
    • /
    • 2018
  • With the development of Internet, cyber attack has become a major threat. To detect cyber attacks, intrusion detection system(IDS) has been widely deployed. But IDS has a critical weakness which is that it generates a large number of false alarms. One of the promising techniques that reduce the false alarms in real time is machine learning. However, there are problems that must be solved to use machine learning. So, many machine learning approaches have been applied to this field. But so far, researchers have not focused on features. Despite the features of IDS alerts are important for performance of model, the approach to feature is ignored. In this paper, we propose new feature set which can improve the performance of model and can be extracted from a single alarm. New features are motivated from security analyst's know-how. We trained and tested the proposed model applied new feature set with real IDS alerts. Experimental results indicate the proposed model can achieve better accuracy and false positive rate than SVM model with ordinary features.