• Title/Summary/Keyword: Relay-based

Search Result 897, Processing Time 0.025 seconds

A Study on Fault Characteristics of DFIG in Distribution Systems Based on the PSCAD/EMTDC (PSCAD/EMTDC를 이용한 풍력발전의 배전계통 사고특성에 관한 연구)

  • Son, Joon-Ho;Kim, Byung-Ki;Jeon, Jin-Taek;Rho, Dae-Seok
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.2
    • /
    • pp.47-56
    • /
    • 2011
  • Korea Ministry of Knowledge Economy has estimated that wind power (WP) will be occupied 37% in 2020 and 42% in 2030 of the new energy sources, and also green energies such as photovoltaic (PV) and WP are expected to be interconnected with the distribution system because of Renewable Portfolio Standard (RPS) starting from 2012. However, when a large scale wind power plant (over 3[MW]) is connected to the traditional distribution system, protective devices (mainly OCR and OCGR of re-closer) will be occurred mal-function problems due to changed fault currents it be caused by Wye-grounded/Delta winding of interconnection transformer and %impedance of WP's turbine. Therefore, when Double-Fed Induction Generator (DFIG) of typical WP's Generator is connected into distribution system, this paper deals with analysis three-phase short, line to line short and a single line ground faults current by using the symmetrical components of fault analysis and PSCAD/EMTDC modeling.

Implementation of User-friendly Intelligent Space for Ubiquitous Computing (유비쿼터스 컴퓨팅을 위한 사용자 친화적 지능형 공간 구현)

  • Choi, Jong-Moo;Baek, Chang-Woo;Koo, Ja-Kyoung;Choi, Yong-Suk;Cho, Seong-Je
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.443-452
    • /
    • 2004
  • The paper presents an intelligent space management system for ubiquitous computing. The system is basically a home/office automation system that could control light, electronic key, and home appliances such as TV and audio. On top of these basic capabilities, there are four elegant features in the system. First, we can access the system using either a cellular Phone or using a browser on the PC connected to the Internet, so that we control the system at any time and any place. Second, to provide more human-oriented interface, we integrate voice recognition functionalities into the system. Third, the system supports not only reactive services but also proactive services, based on the regularities of user behavior. Finally, by exploiting embedded technologies, the system could be run on the hardware that has less-processing power and storage. We have implemented the system on the embedded board consisting of StrongARM CPU with 205MHz, 32MB SDRAM, 16MB NOR-type flash memory, and Relay box. Under these hardware platforms, software components such as embedded Linux, HTK voice recognition tools, GoAhead Web Server, and GPIO driver are cooperated to support user-friendly intelligent space.

A Study on Operation Method of Protection Device for LVDC Distribution Feeder in Light Rail System (경전철용 LVDC 배전계통의 보호기기 운용 방안에 관한 연구)

  • Kang, Min-Kwan;Choi, Sung Sik;Lee, Hu-Dong;Kim, Gi-Yung;Rho, Dae-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.25-34
    • /
    • 2019
  • Recently, when a fault occurs at a long-distance point in a LVDC (low voltage direct current) distribution feeder in a light rail system, the magnitude of the current can decrease to less than that of the load current of a light rail system. Therefore, proper protection coordination method to distinguish a fault current from a load current is required. To overcome these problems, this paper proposes an optimal algorithm of protection devices for a LVDC distribution feeder in a light rail system. In other words, based on the characteristics of the fault current for ground resistance and fault location, this paper proposes an optimal operation algorithm of a selective relay to properly identify the fault current compared to the load current in a light rail system. In addition, this paper modelled the distribution system including AC/DC converter using a PSCAD/EMTDC S/W and from the simulation results for a real light rail system, the proposed algorithm was found to be a useful and practical tool to correctly identify the fault current and load current.

On Implementing and Deploying Label Distribution Protocol in MultiProtocal Label Switching Systems (MPLS시스템에서 LDP 기능 구현 및 활용 방안)

  • 김미희;이종협;이유경
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.270-281
    • /
    • 2003
  • ETF made the RFCs of MPLS technologies for providing the QoS of ATM or Frame Relay and the flexibility&scalability of IP on the Internet services. IETF has been expanding MPLS technologies as a common control component for supporting the various switching technologies called GMPLS. Also, IETF has standardized the signaling protocols based on such technologies, such as LDP, CR-LDP and RSVP-TE. ETRI developed the MPLS system based on ATM switch in order to provide more reliable services, differentiated services and value-added services like the VPN and traffic engineering service on the Korea Public Sector network. We are planning on deploying model services and commercial services on that network. This paper explains the basic functions of LDP, design and development of LDP on our system, and compares with LDP development and operation on other MPLS systems made by Cisco, Juniper, Nortel and Riverstone. In conclusion, this paper deduces the future services and applications by LDP through these explanation and comparison.

A Study on Expressive Aspects of Subversive Mimesis Found in Architectural Design - With a Focus on the Concepts of Appropriation and Détournment - (건축디자인에 나타난 전복적 미메시스의 표현특성 연구 - 전유, 전용을 중심으로 -)

  • Park, Young-Tae
    • Korean Institute of Interior Design Journal
    • /
    • v.22 no.2
    • /
    • pp.68-80
    • /
    • 2013
  • This study is about expressive aspects of subversive mimesis found in architectural design under 2nd Modernity. Architectural works under 2nd Modernity are described based on pseudo-scientific positivism and philosophical ontology of Deleuze. However, subversiveness found in works of arts by architects such as Rem Koolhaas present a few complexities to relay on such a description. This is about 'subversiveness' which absorbs the positive and negative factors of modernity which has been multi-layered as 'cultural capital'. This study aims to identify meta-phenomenon as well as the specific correlations between expression and purposes of any work of art that is presented in the form of subversiveness. To achieve this aim, this study approached with the concepts of appropriation and detournment based on Adorno's subversive mimesis concept. Meta-phenomena of architectural design methods occur from relations of three, which are social reality, artist, and work of art. This was connected to productivity of mimesis practice of self-reference and self-examination, which was then, summed up from the perspectives of appropriation in pure arts and d$\acute{e}$tournment of situationalists. Based on this work, subversive expressive characteristics of architecture under 2nd Modernity were framed from the perspectives of the absorption of cultural capital, reflection and negation, autonomy, instrumentality, and meta properties. In this way, this study found that Adorno's subversiveness should be effective for creative and methodological systemization in terms of interpretation of cognition, practice, and effect after materialization.

Routing for Enhancing Source-Location Privacy in Wireless Sensor Networks of Multiple Assets

  • Tscha, Yeong-Hwan
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.589-598
    • /
    • 2009
  • In wireless sensor networks, a node that reports information gathered from adjacent assets should relay packets appropriately so that its location context is kept private, and thereby helping ensure the security of the assets that are being monitored. Unfortunately, existing routing methods that counter the local eavesdropping-based tracing deal with a single asset, and most of them suffer from the packet-delivery latency as they prefer to take a separate path of many hops for each packet being sent. In this paper, we propose a routing method, greedy perimeter stateless routing-based source-location privacy with crew size w (GSLP-w), that enhances location privacy of the packet-originating node (i.e., active source) in the presence of multiple assets. GSLP-w is a hybrid method, in which the next-hop node is chosen in one of four modes, namely greedy, random, perimeter, and retreat modes. Random forwarding brings the path diversity, while greedy forwarding refrains from taking an excessively long path and leads to convergence to the destination. Perimeter routing makes detours that avoid the nodes near assets so that they cannot be located by an adversary tracing up the route path. We study the performance of GSLP-w with respect to crew size w (the number of packets being sent per path) and the number of sources. GSLP-w is compared with phantom routing-single path (PR-SP), which is a notable routing method for source-location privacy and our simulation results show that improvements from the point of the ratio of safety period and delivery latency become significant as the number of source nodes increases.

Cooperative Transmission Protocol based on Opportunistic Incremental Relay Selection over Rayleigh fading channels (레일리 페이딩 채널 상에서 기회주의적 증분형 중계기 선택 기법을 기반으로 한 협력 전송 알고리즘)

  • Xuyen, Tran Thi;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.53-58
    • /
    • 2011
  • In this paper, we firstly propose a novel cooperative transmission protocol, which utilizes the advantages of mid-notes in the route from the source to the destination. Taking benefits from balancing between the received packet from the source and acknowledge message from the destination, the mid-node between the source and the destination is firstly considered to be the broadcaster. If its signal is successfully received from the source, it leads to consider the next nodes, which has closer distance to the destination than it. If one of these nodes correctly receives the signal, it performs broadcasting the signal to the destination instead of mid-node. Otherwise, the mid-node directs attention to these nodes being near to the destination. As the result, some nodes are unnecessary to be considered and passed over time. After that, we analyze some published selection relaying schemes based on geographic information to choose the best nodes instead of the instantaneous SNR as before. Finally, simulation results are given to demonstrate the correctness of the performance analyses and show the significant improvement of the selection relaying schemes based geographic information compared to the other ones.

An Efficient Dynamic Bandwidth Allocation Algorithm for VoDSL Services (VoDSL 서비스를 위한 효율적인 동적 대역폭 할당 알고리즘)

  • Kim, Hoon;Park, Jong-Dae;Nam, Sang-Sig;Park, Kwang-Chae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1C
    • /
    • pp.48-58
    • /
    • 2002
  • As internet traffic increases, the problem that it should be efficiently accepted in to the existing voice network in the pending problem importantly to the existing communication corporations. The feature of next generation exchange network is made up of the form of integration network that connect data traffic(internet service. Etc) with the existing voice network and it can be showed with very diverse aspects according to the constitution time of network or the characteristics of business. The progress strategy that develop the existing circuit based communication network into packet-based communication network can be divided into two in a large scale according to the application position These are VoDSL application method(Technology that packetize access network) and softswitch technology application method(after packetizing relay network, packetizing that into the access network). In this paper, we will deduce the desirable technology that can construct packet-based next generation exchange networks in the structure of the existing communication network environment. We will perform the research on a device to offer the necessary core technique VoSDL service with realistic resolutions primarily.

PNC(Pipeline Network Coding)-Based Message and Node Authentication in Wireless Networks (무선 네트워크에서 파이프라인 네트워크 코딩 기반 메시지 및 노드 인증)

  • Ahn, Myeong-Gi;Cho, Young-Jong;Kang, Kyungran
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.5
    • /
    • pp.999-1008
    • /
    • 2017
  • In this paper, we propose a pipeline network coding (PNC) scheme for efficient data transmission in wireless networks, a data authentication scheme for verifying the integrity of data, and a node authentication scheme for a virtual source. PNC is a technique that improves the overall network performance by relaying data such that the relay node performing network coding transmits to the sender instead. However, network coding is vulnerable to a pollution attack, which is an attack by a malicious attacker to inject modified data into the network. To prevent this, hash-based message authentication code (HMAC) is used. For this purpose, in order to generate a tag used for data authentication, a key must be distributed to the nodes performing authentication. We applied a hash chain to minimize the overhead of key distribution. A null vector is used as the authentication scheme for the virtual source. Finally, we analyze the safety and complexity of the proposed scheme and show he performance through simulation.

CRARQ: A Cooperative Routing using ARQ-based Transmission in Mobile Ad-hoc Wireless Sensor Networks (CRARQ: 모바일 Ad-hoc 무선 센서 네트워크를 위한 ARQ 전송기반 협력도움 라우팅 프로토콜)

  • Duy, Tran-Trung;An, Beong-Ku;Kong, Hyung-Yun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.2
    • /
    • pp.36-43
    • /
    • 2009
  • In this paper, we propose a Cooperative Routing using ARQ-based Transmission (CRARQ) in Mobile Ad-hoc Wireless Sensor Networks (MAWSN). The goals of the CRARQ are to improve both the efficiency of transmission and the reliability of transmission together. The main features and contributions of the proposed CRARQ for supporting these goals are as follows. First, CRARQ uses a reactive concept to construct a route from a source to a destination. Second, CRARQ chooses the most stable relay at each hop along the route by mobility-based strategy. Third, cooperative transmission using the ARQ technique which can improve reliability is used at each hop to send data packets from source to destination. Finally, we present a theoretical analysis model for the proposed CRARQ. The performance evaluation of our protocol is implemented via simulation using Optimized Network Engineering Tool (OPNET) and analysis. The results of both simulation and analysis show that CRARQ achieves the improved packet delivery ratio (PDR) and outage probability.