• Title/Summary/Keyword: Technology network analysis

Search Result 3,917, Processing Time 0.035 seconds

Exergy Analysis and Heat Exchanger Network Synthesis for Improvement of a Hydrogen Production Process: Practical Application to On-Site Hydrogen Refueling Stations (수소 생산 공정 개선을 위한 엑서지 분석과 열 교환망 합성: 분산형 수소 충전소에 대한 실용적 적용)

  • YUN, SEUNGGWAN;CHO, HYUNGTAE;KIM, MYUNGJUN;LEE, JAEWON;KIM, JUNGHWAN
    • Journal of Hydrogen and New Energy
    • /
    • v.33 no.5
    • /
    • pp.515-524
    • /
    • 2022
  • In this study, the on-site hydrogen production process for refueling stations that were not energy-optimized was improved through exergy analysis and heat exchange network synthesis. Furthermore, the process was scaled up from 30 Nm3/h to 150 Nm3/h to improve hydrogen production capacity. Exergy analysis results show that exergy destruction in the SMR reactor and the heat exchanger accounts for 58.1 and 19.8%, respectively. Thus, the process is improved by modifying the heat exchange network to reduce the exergy loss in these units. As a result of the process simulation analysis, thermal and exergy efficiency is improved from 75.7 to 78.6% and 68.1 to 70.4%, respectively. In conclusion, it is expected to improve the process efficiency when installing on-site hydrogen refueling stations.

Throughput and Delay Analysis of a Network Coding-enabled Cooperative MAC Protocol for Ad Hoc Networks

  • Jang, Jae-Shin;Kim, Sang-Wu;Wie, Sung-Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1668-1688
    • /
    • 2012
  • Cooperative communications and network coding schemes have been proposed to increase system throughput for ad hoc networks. In this paper, we present throughput and delay analysis of the new network coding-enabled cooperative MAC protocol called NC-MAC, which has been proposed by us in order to significantly enhance system performance. This protocol introduces an approach that can accommodate both cooperative communication and network coding for wireless ad hoc networks by slightly increasing overhead and modifying standards. The protocol's performance is evaluated using mathematical analysis and computer simulation and two performance measures, system throughput and average channel access delay, are used for a performance comparison with previous schemes. It is assumed that all the frames exchanged over a wireless channel are susceptible to transmission errors, which is a new but more reasonable assumption differentiating this research from previous research. Numerical results show this protocol provides significantly enhanced system performance compared with conventional cooperative MAC protocols used in previous research. For instance, system performance is 47% higher using the NC-MAC protocol than when using the rDCF protocol.

Power Flow Algorithm for Weakly Meshed Distribution Network with Distributed Generation Based on Loop-analysis in Different Load Models

  • Su, Hongsheng;Zhang, Zezhong
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.2
    • /
    • pp.608-619
    • /
    • 2018
  • As distributed generation (DG) is connected to grid, there is new node-type occurring in distribution network. An efficient algorithm is proposed in this paper to calculate power flow for weakly meshed distribution network with DGs in different load models. The algorithm respectively establishes mathematical models focusing on the wind power, photovoltaic cell, fuel cell, and gas turbine, wherein the different DGs are respectively equivalent to PQ, PI, PQ (V) and PV node-type. When dealing with PV node, the algorithm adopts reactive power compensation device to correct power, and the reactive power allocation principle is proposed to determine reactive power initial value to improve convergence of the algorithm. In addition, when dealing with the weakly meshed network, the proposed algorithm, which builds path matrix based on loop-analysis and establishes incident matrix of node voltage and injection current, possesses good convergence and strong ability to process the loops. The simulation results in IEEE33 and PG&G69 node distribution networks show that with increase of the number of loops, the algorithm's iteration times will decrease, and its convergence performance is stronger. Clearly, it can be effectively used to solve the problem of power flow calculation for weakly meshed distribution network containing different DGs.

A Performance Analysis of Video Smoke Detection based on Back-Propagation Neural Network (오류 역전파 신경망 기반의 연기 검출 성능 분석)

  • Im, Jae-Yoo;Kim, Won-Ho
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.4
    • /
    • pp.26-31
    • /
    • 2014
  • In this paper, we present performance analysis of video smoke detection based on BPN-Network that is using multi-smoke feature, and Neural Network. Conventional smoke detection method consist of simple or mixed functions using color, temporal, spatial characteristics. However, most of all, they don't consider the early fire conditions. In this paper, we analysis the smoke color and motion characteristics, and revised distinguish the candidate smoke region. Smoke diffusion, transparency and shape features are used for detection stage. Then it apply the BPN-Network (Back-Propagation Neural Network). The simulation results showed 91.31% accuracy and 2.62% of false detection rate.

Performance Analysis of a Two-Hop Fixed-Gain MIMO Multiuser Relay Network with End-to-End Antenna Selection

  • Li, Guangping;Blostein, Steven David;Zhang, Guangchi;Feng, Jiuchao
    • ETRI Journal
    • /
    • v.34 no.2
    • /
    • pp.264-267
    • /
    • 2012
  • This letter analyzes the performance of a two-hop MIMO multiuser relay network with a fixed gain amplify-and-forward protocol and antenna selection at the transmitter and receiver. A new expression for the cumulative distribution function of the highest instantaneous end-to-end signal-to-noise ratio is derived. Based on the above result, closed-form expressions for outage probability and bit error rate are presented. Also, the diversity order of the system is determined. Finally, computer simulations are compared to the analytical results, and insights and observations are provided.

A Suggestion of New R&D Strategy based on an Analysis on a Trend of Evolution of World Wide High-Speed Rail Technology (최근 세계 고속철도 기술의 진화경향 분석을 통한 한국 고속철도의 향후 기술개발 전략)

  • Kim, Ki-Hwan;Mok, On-Yong
    • Proceedings of the KSR Conference
    • /
    • 2009.05b
    • /
    • pp.165-170
    • /
    • 2009
  • The Korean high-speed rail network has been made a remarkable growth recording the world's 4th rank passenger transportation scale during last 5 years after opening the revenue service of Kyoung-bu high-speed line in 2004. However, in spite of it's outstanding growth, Korean Rail technology should meet a demand of intensive technology development in order to prepare a severe competition with an advance parties of worldwide high-speed rail technology. In this paper, the characteristics and new trend of world's rail industry was reviewed based on the most recent statistics and papers of worldwide rail network from UIC and WCR32008. In conclusion, new R&D strategy with choice an concentration for the Korean high-speed rail industry was suggested based on an analysis on the trend of evolution of the state of the art technologies in worldwide high-speed rail system.

  • PDF

Social Media Data Analysis Trends and Methods

  • Rokaya, Mahmoud;Al Azwari, Sanaa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.358-368
    • /
    • 2022
  • Social media is a window for everyone, individuals, communities, and companies to spread ideas and promote trends and products. With these opportunities, challenges and problems related to security, privacy and rights arose. Also, the data accumulated from social media has become a fertile source for many analytics, inference, and experimentation with new technologies in the field of data science. In this chapter, emphasis will be given to methods of trend analysis, especially ensemble learning methods. Ensemble learning methods embrace the concept of cooperation between different learning methods rather than competition between them. Therefore, in this chapter, we will discuss the most important trends in ensemble learning and their applications in analysing social media data and anticipating the most important future trends.

Novel Optimizer AdamW+ implementation in LSTM Model for DGA Detection

  • Awais Javed;Adnan Rashdi;Imran Rashid;Faisal Amir
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.133-141
    • /
    • 2023
  • This work take deeper analysis of Adaptive Moment Estimation (Adam) and Adam with Weight Decay (AdamW) implementation in real world text classification problem (DGA Malware Detection). AdamW is introduced by decoupling weight decay from L2 regularization and implemented as improved optimizer. This work introduces a novel implementation of AdamW variant as AdamW+ by further simplifying weight decay implementation in AdamW. DGA malware detection LSTM models results for Adam, AdamW and AdamW+ are evaluated on various DGA families/ groups as multiclass text classification. Proposed AdamW+ optimizer results has shown improvement in all standard performance metrics over Adam and AdamW. Analysis of outcome has shown that novel optimizer has outperformed both Adam and AdamW text classification based problems.

Proposed Method for Mobile Forensics Investigation Analysis of Remnant Data on Google Drive Client

  • Gandeva Bayu Satrya;Soo Young Shin
    • Journal of Internet Technology
    • /
    • v.19 no.6
    • /
    • pp.1741-1752
    • /
    • 2018
  • The best known software developers all offer cloud storage services. Microsoft offers Onedrive to its users, Apple offers iCloud Drive and Google offers Google Drive or GDrive. The battle between these software developers is ongoing and they will always strive to give the best services to their users. It is not only technology that is evolving, however, but also ways in which security can be breached and data abused. The security of information on the Internet is increasingly at risk and there are many threats to cloud storage platforms. This research used the mobile forensics approach to help in identifying and analyzing user behavior that may occur while using GDrive application for cybercrime. The novelty of comparison and analyzing methods performed in this research can help to find remnant data from all activities performed by GDrive users in Android smartphones. Hence, this proposed method can assist investigators in finding remnant data on GDrive client and can provide knowledge for legal practitioners.

Resilient Packet Transmission (RPT) for the Buffer Based Routing (BBR) Protocol

  • Rathee, Geetanjali;Rakesh, Nitin
    • Journal of Information Processing Systems
    • /
    • v.12 no.1
    • /
    • pp.57-72
    • /
    • 2016
  • To provide effective communication in the wireless mesh network (WMN), several algorithms have been proposed. Since the possibilities of numerous failures always exist during communication, resiliency has been proven to be an important aspect for WMN to recover from these failures. In general, resiliency is the diligence of the reliability and availability in network. Several types of resiliency based routing algorithms have been proposed (i.e., Resilient Multicast, ROMER, etc.). Resilient Multicast establishes a two-node disjoint path and ROMER uses a credit-based approach to provide resiliency in the network. However, these proposed approaches have some disadvantages in terms of network throughput and network congestion. Previously, the buffer based routing (BBR) approach has been proposed to overcome these disadvantages. We proved earlier that BBR is more efficient in regards to w.r.t throughput, network performance, and reliability. In this paper, we consider the node/link failure issues and analogous performance of BBR. For these items we have proposed a resilient packet transmission (RPT) algorithm as a remedy for BBR during these types of failures. We also share the comparative performance analysis of previous approaches as compared to our proposed approach. Network throughput, network congestion, and resiliency against node/link failure are particular performance metrics that are examined over different sized WMNs.