• Title/Summary/Keyword: System-Level Simulator

Search Result 276, Processing Time 0.04 seconds

Dedicated Cutback Control of a Wind Power Plant Based on the Ratio of Command Power to Available Power

  • Thapa, Khagendra;Yoon, Gihwan;Lee, Sang Ho;Suh, Yongsug;Kang, Yong Cheol
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.3
    • /
    • pp.835-842
    • /
    • 2014
  • Cutback control in a grid code is one of the functions of a wind power plant (WPP) that is required to support the system protection and frequency stability. When a cutback control command signal is delivered to the WPP from the system operator, the output of a WPP should be decreased to 20% of the rated power within 5 s. In this paper, we propose a dedicated cutback control algorithm of a WPP based on the ratio of the command power to the available power. If a cutback control signal is delivered, the algorithm determines the pitch angle for the cutback control and starts the pitch angle control. The proposed algorithm keeps the rotor speed at the speed before the start of the cutback control to quickly recover the previous output prior to the cutback control. The performance of the algorithm was validated for a 100 MW aggregated WPP based on a permanent magnet synchronous generator under various wind conditions using an EMTP-RV simulator. The results clearly shows that the proposed algorithm not only successfully reduces the output to the command power within 5 s by minimizing the fluctuation of the pitch angle, but also rapidly recovers to the output level before the cutback control.

Analysis and Advice on Cache Algorithms of SSD FTL (SSD FTL 캐시 알고리즘 분석 및 제언)

  • Hyung Bong, Lee;Tae Yun, Chung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.1
    • /
    • pp.1-8
    • /
    • 2023
  • It is impossible to overwrite on an already allocated page in SSDs, so whenever a write operation occurs a page replacement with a clean page is required. To resolve this problem, SSDs have an internal flash translation layer called FTL that maps logical pages managed by a file system of operating system to currently allocated physical pages. SSD pages discarded due to write operations must be recycled through initialization, but since the number of initialization times is limited the FTL provides a caching function to reduce the number of writes in addition to the page mapping function, which is a core function. In this study, we focus on the FTL cache methodologies reducing the number of page writes and analyze the related algorithms, and propose a write-only cache strategy. As a result of experimenting with the write-only cache using a simulator, it showed an improvement of up to 29%.

Measurement of inconvenience, human errors, and mental workload of simulated nuclear power plant control operations

  • Oh, I.S.;Sim, B.S.;Lee, H.C.;Lee, D.H.
    • Proceedings of the ESK Conference
    • /
    • 1996.10a
    • /
    • pp.47-55
    • /
    • 1996
  • This study developed a comprehensive and easily applicable nuclear reactor control system evaluation method using reactor operators behavioral and mental workload database. A proposed control panel design cycle consists of the 5 steps: (1) finding out inconvenient, erroneous, and mentally stressful factors for the proposed design through evaluative experiments, (2) drafting improved design alternatives considering detective factors found out in the step (1), (3) comparative experiements for the design alternatives, (4) selecting a best design alternative, (5) returning to the step (1) and repeating the design cycle. Reactor operators behavioral and mental workload database collected from evaluative experiments in the step (1) and comparative experiments in the step (3) of the design cycle have a key roll in finding out defective factors and yielding the criteria for selection of the proposed reactor control systems. The behavioral database was designed to include the major informations about reactor operators' control behaviors: beginning time of operations, involved displays, classification of observational behaviors, dehaviors, decisions, involved control devices, classification of control behaviors, communications, emotional status, opinions for man-machine interface, and system event log. The database for mental workload scored from various physiological variables-EEG, EOG, ECG, and respir- ation pattern-was developed to indicate the most stressful situation during reactor control operations and to give hints for defective design factors. An experimental test for the evaluation method applied to the Compact Nuclear Simulator (CNS) installed in Korea Atomic Energy Research Institute (KAERI) suggested that some defective design factors of analog indicators should be improved and that automatization of power control to a target level would give relaxation to the subject operators in stressful situation.

  • PDF

An Implementation of IEEE 1516.1-2000 Standard with the Hybrid Data Communication Method (하이브리드 데이터 통신 방식을 적용한 IEEE 1516.1-2000 표준의 구현)

  • Shim, Jun-Yong;Wi, Soung-Hyouk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1094-1103
    • /
    • 2012
  • Recently, software industry regarding national defense increases system development of distributed simulation system of M&S based to overcome limit of resource and expense. It is one of key technologies for offering of mutual validation among objects and reuse of objects which are discussed for developing these systems. RTI, implementation of HLA interface specification as software providing these technologies uses Federation Object Model for exchanging information with joined federates in the federation and each federate has a characteristic that is supposed to have identical FOM in the federation. This technology is a software which is to provide the core technology which was suggested by the United state's military M&S standard framework. Simulator, virtual simulation, and inter-connection between military weapons system S/W which executes on network which is M&S's core base technology, and it is a technology which also can be used for various inter-connection between S/W such as game and on-line phone. These days although RTI is used in military war game or tactical training unit field, there is none in Korea. Also, it is used in mobile-game, distribution game, net management, robot field, and other civilian field, but the number of examples are so small and informalized. Through this developing project, we developed the core technique and RTI software and provided performance of COTS level to improve communication algorithms.

Nuclear Fuel Cycle Analysis Technology to Develop Advanced Nuclear Fuel Cycle (선진 핵연료주기 기술 개발을 위한 핵연료주기 분석 기술)

  • Park, Byung-Heung;Ko, Won-Il
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.9 no.4
    • /
    • pp.219-230
    • /
    • 2011
  • The nuclear fuel cycle (NFC) analysis is a study to set a NFC policy and to promote systematic researches by analyzing technologies and deriving requirements at each stage of a fuel cycle. System analysis techniques are utilized for comparative analysis and assessment of options on a considered system. In case that NFC is taken into consideration various methods of the system analysis techniques could be applied depending on the range of an interest. This study presented NFC analysis strategies for the development of a domestic advanced NFC and analysis techniques applicable to different phases of the analysis. Strategically, NFC analysis necessitates the linkage with technology analyses, domestic and international interests, and a national energy program. In this respect, a trade-off study is readily applicable since it includes various aspects on NFC as metrics and then analyzes the considered NFC options according to the derived metrics. In this study, the trade-off study was identified as a method for NFC analysis with the derived strategies and it was expected to be used for development of an advanced NFC. A technology readiness level (TRL) method and NFC simulation codes could be utilized to obtain the required metrics and data for assessment in the trade-off study. The methodologies would guide a direction of technology development by comparing and assessing technological, economical, environmental, and other aspects on the alternatives. Consequently, they would contribute for systematic development and deployment of an appropriate advanced NFC.

Flexible Intelligent Exit Sign Management of Cloud-Connected Buildings

  • Lee, Minwoo;Mariappan, Vinayagam;Lee, Junghoon;Cho, Juphil;Cha, Jaesang
    • International Journal of Advanced Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.58-63
    • /
    • 2017
  • Emergencies and disasters can happen any time without any warning, and things can change and escalate very quickly, and often it is swift and decisive actions that make all the difference. It is a responsibility of the building facility management to ensure that a proven evacuation plan in place to cover various worst scenario to handled automatically inside the facility. To mapping out optimal safe escape routes is a straightforward undertaking, but does not necessarily guarantee residents the highest level of protection. The emergency evacuation navigation approach is a state-of-the-art that designed to evacuate human livings during an emergencies based on real-time decisions using live sensory data with pre-defined optimum path finding algorithm. The poor decision on causalities and guidance may apparently end the evacuation process and cannot then be remedied. This paper propose a cloud connected emergency evacuation system model to react dynamically to changes in the environment in emergency for safest emergency evacuation using IoT based emergency exit sign system. In the previous researches shows that the performance of optimal routing algorithms for evacuation purposes are more sensitive to the initial distribution of evacuees, the occupancy levels, and the type and level of emergency situations. The heuristic-based evacuees routing algorithms have a problem with the choice of certain parameters which causes evacuation process in real-time. Therefore, this paper proposes an evacuee routing algorithm that optimizes evacuation by making using high computational power of cloud servers. The proposed algorithm is evaluated via a cloud-based simulator with different "simulated casualties" are then re-routed using a Dijkstra's algorithm to obtain new safe emergency evacuation paths against guiding evacuees with a predetermined routing algorithm for them to emergency exits. The performance of proposed approach can be iterated as long as corrective action is still possible and give safe evacuation paths and dynamically configure the emergency exit signs to react for real-time instantaneous safe evacuation guidance.

Effects of Dementia Experience using Virtual Reality on Public Awareness and Attitude toward Dementia Patients (3D 가상치매체험 프로그램이 치매에 대한 태도와 인식변화에 미치는 효과)

  • Jeong, Ji Woon;Kim, Hyun Taek;Park, June Hyuk
    • Journal of the HCI Society of Korea
    • /
    • v.13 no.4
    • /
    • pp.5-14
    • /
    • 2018
  • The Empathy for Dementia using Virtual Reality (EDuVR) system, developed by the Jeju Provincial Dementia Center, is a 3D video system capturing the experience of dementia in a first-person perspective using 360 degree vritual reality (VR) technology. It was developed to create a greater understanding of dementia and to help people empathize with individuals with dementia through an immersive VR experience. The EDuVR shows how a dementia patient has impairments in memory, orientation, language, judgment and problem solving, as well as problems with activities of daily living. The present study reported the effectiveness of the EDuVR experience in changing public awareness of, and attitude toward, dementia. Sixty-six participants were assigned to the EDuVR (n = 34) or the conventional education (n = 32) groups, and two types of questionnaires - attitude and awareness questionnaires - were administered to the subjects before and after the EDuVR experience or education. The simulator sickness and presence questionnaires were administered to the EDuVR group to assess cybersickness and presence of the VR experience. As a results, the attitude and awareness toward dementia patients changed positively in both the EDuVR and the conventional education groups, and these changes did not differ between two groups. Only one person reported a significant level of cybersicness after experiencing the EDuVR system. These results suggest that the EDuVR enhances the level of understanding and empathy for dementia and would be a useful tool for improving awareness in the general public.

  • PDF

Effects of Secondary Tasks on Relative Change of Skin Conductance Level and Ability to Maintain Following Distance and Vehicle Velocity during Driving of Experienced Taxi Drivers (운전 중 동시과제 수행이 택시운전자의 차간거리 및 속도유지 능력과 피부전도도 변화율에 미치는 영향)

  • Yeon, Hong-Won;Yoon, Hee-Jeong;Kim, Han-Su;Kim, Ji-Hye;Choi, Mi-Hyun;Choi, Jin-Seung;Ji, Doo-Hwan;Tack, Gye-Rae;Min, Byung-Chan;Chung, Soon-Cheol
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.35 no.2
    • /
    • pp.9-15
    • /
    • 2012
  • The purpose of this study was to investigate the effects of the secondary tasks such as sending text message (STM) and searching navigation (SN) on skin conductance level (SCL) and driving performance of relatively aged and high-experienced drivers. The subjects included 26 taxi drivers; 12 males aged $56.3{\pm}4.4$ with $28.4{\pm}6.4$ years of driving experiences and 14 females aged $55.5{\pm}3.5$ with $19.4{\pm}5.0$ years of driving experiences. All subjects were instructed to keep a constant following distance (30m) from the car ahead and a given vehicle speed (80km/h or 100km/h) in a driving simulator. The relative change of SCL, vehicle velocity deviations, and average following distances were measured during driving only and driving with secondary tasks. The relative change of SCL, average following distance, and vehicle velocity deviation were more increased during the driving with secondary tasks than driving only. The relative change of SCL, vehicle velocity deviation, and average following distance were more affected by driving with 100km/hr than 80km/hr of a given vehicle speed. Secondary tasks increased a work load of drivers in term of SCL change, and decreased driving performance in terms of the vehicle velocity deviation and average following distance.

Survivability Analysis of MANET Routing Protocols under DOS Attacks

  • Abbas, Sohail;Haqdad, Muhammad;Khan, Muhammad Zahid;Rehman, Haseeb Ur;Khan, Ajab;Khan, Atta ur Rehman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3639-3662
    • /
    • 2020
  • The network capability to accomplish its functions in a timely fashion under failures and attacks is known as survivability. Ad hoc routing protocols have been studied and extended to various domains, such as Intelligent Transport Systems (ITSs), Unmanned Aerial Vehicles (UAVs), underwater acoustic networks, and Internet of Things (IoT) focusing on different aspects, such as security, QoS, energy. The existing solutions proposed in this domain incur substantial overhead and eventually become burden on the network, especially when there are fewer attacks or no attack at all. There is a need that the effectiveness of these routing protocols be analyzed in the presence of Denial of Service (DoS) attacks without any intrusion detection or prevention system. This will enable us to establish and identify the inherently stable routing protocols that are capable to survive longer in the presence of these attacks. This work presents a DoS attack case study to perform theoretical analysis of survivability on node and network level in the presence of DoS attacks. We evaluate the performance of reactive and proactive routing protocols and analyse their survivability. For experimentation, we use NS-2 simulator without detection or prevention capabilities. Results show that proactive protocols perform better in terms of throughput, overhead and packet drop.

A study on the in-vitro wear of the natural tooth structure by opposing zirconia or dental porcelain

  • Jung, Yu-Seok;Lee, Jae-Whang;Choi, Yeon-Jo;Ahn, Jin-Soo;Shin, Sang-Wan;Huh, Jung-Bo
    • The Journal of Advanced Prosthodontics
    • /
    • v.2 no.3
    • /
    • pp.111-115
    • /
    • 2010
  • PURPOSE. This study was conducted to evaluate clinical validity of a zirconia full-coverage crown by comparing zirconia's wear capacity over antagonistic teeth with that of feldspathic dental porcelain. MATERIALS AND METHODS. The subject groups were divided into three groups: the polished feldspathic dental porcelain group (Group 1), the polished zirconia group (Group 2), and the polished zirconia with glazing group (Group 3). Twenty specimens were prepared from each group. Each procedure such as plasticity, condensation, and glazing was conducted according to the manufacturer's manual. A wear test was conducted with 240,000 chewing cycles using a dual-axis chewing simulator. The degree of wear of the antagonistic teeth was calculated by measuring the volume loss using a three-dimensional profiling system and ANSUR 3D software. The statistical significance of the measured degree of wear was tested with a significant level of 5% using one-way ANOVA and the Tukey test. RESULTS. The degrees of wear of the antagonistic teeth were $0.119{\pm}0.059\;mm^3$ in Group 1, $0.078{\pm}0.063\;mm^3$ in Group 3, and $0.031{\pm}0.033\;mm^3$ in Group 2. Statistical significance was found between Group 1 and Groups 2 and between Group 2 and 3, whereas no statistical significance was found between Group 1 and Group 3. CONCLUSION. Despite the limitations of this study on the evaluation of antagonistic teeth wear, the degree of antagonistic tooth wear was less in zirconia than feldspathic dental porcelain, representing that the zirconia may be more beneficial in terms of antagonistic tooth wear.