• Title/Summary/Keyword: Topology processing

Search Result 271, Processing Time 0.03 seconds

Development of Network Analysis Applications for Korean Energy Management Systems (한국형 EMS 계통해석 프로그램 개발)

  • Cho, Y.S.;Yun, S.Y.;Lee, U.W.;Shin, C.H.;Lee, J.;Hur, S.I.;Kim, S.K.;Lee, H.S.
    • Proceedings of the KIEE Conference
    • /
    • 2009.07a
    • /
    • pp.258_259
    • /
    • 2009
  • This paper describes the development of robust processor for analyzing network state in Korean Energy Management System. The important function of topology processing is to convert the switching/device model into a bus/branch model by the status of switching devices. The state estimator also provides a consistent unified solution, not only for measurement of the observable system, but also for the unobservable system. The primary function of the online power flow is to provide a highly reliable and flexible power flow solution that can be used to solve a wide variety of power systems problems. The validity of the newly developed functions has been verified through comparative simulations with the existing EMS functions, which are currently in use in the Korean power system.

  • PDF

A Study on the Validation Methodology of Network Analysis Applications in Energy Management Systems (계통운영시스템 계통해석 프로그램 검증 방안에 관한 연구)

  • Cho, Yoon-Sung
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.28 no.10
    • /
    • pp.27-36
    • /
    • 2014
  • Network analysis applications in energy management systems play a key role in the economic and reliable operation of power systems. In order to provide operators with useful network information, the accurate results of topology processing, state estimation, power flow, and contingency analysis must be simulated. This paper proposes a validation methodology of network analysis applications in energy management systems. The energy management systems was checked to ensure that it meets the originally specified functions based on the proposed methodology. In addition, the performance of state estimation is evaluated with the reference of the proposed methodology. The proposed methodology is being conducted by energy management systems and the Korean power systems have been utilized for the test systems.

Design of Network Topology and Link Capacity for the future Power Telecommunication (향후 네트워크 트래픽 수용계획을 고려한 전력통신망의 토폴로지 및 링크용량 설계)

  • Kim, Seon-Ik;Park, Myeong-Hye;O, Do-Eun;Im, Yong-Hun;Lee, Jin-Gi;Jo, Seon-Gu
    • The KIPS Transactions:PartC
    • /
    • v.8C no.4
    • /
    • pp.405-414
    • /
    • 2001
  • 전력연구원에서는 ATM WAN 통합망 기반 구축을 통하여 통신회선 임대비용의 절감과 안정적이고 고속의 인터넷 서비스를 수용함으로써 통신망의 경쟁력을 확보하는 것을 목표로 ATM 기반 전력통신망을 설계하였다. 이를 위하여 기존의 패킷 통신망 트래픽 통계 분석결과와 연간 트래픽 증가량 예측치를 기반으로 향후 서비스 수용계획을 고려한 토폴로지와 링크용량을 설계하였으며, 이를 바탕으로 전력통신망에서의 ATM 스위치 기반 네트워크 모델을 확립하였다. 본 논문에서는 ATM 기반 전력통신망의 설계결과를 요약한다.

  • PDF

Hangul Segmentation and Word Verification System for Automatic Address Processing (문자 가분할과 Support Vector Machine을 이용한 필기 한글 단어 고속 검증기)

  • 이충식;김인중;신종탁;김진형
    • Proceedings of the IEEK Conference
    • /
    • 2000.11c
    • /
    • pp.37-40
    • /
    • 2000
  • A fast method of Hangul address word verification is presented in this Paper. Pre-segmentation and recognition by DP matching is adopted in this paper. An address line image is over-segmented by analyzing the topology of connected components and the projection profile. A fast individual Hangul character verifier was developed by applying SVM (Support Vector Machine). The segmentation hypothesis was represented by lattice structure, and a best path search by dynamic programming generates the most probable segmentation path and the final verification score. The word verifier was tested on 310 address image DB, and it show the possibility of improvements of this method.

  • PDF

A Study on Hierarchy-based Secure Encryption Protocol for Trust Improvement on Multicast Environment of MANET (MANET의 멀티캐스트 환경에서 신뢰성 향상을 위한 계층기반 암호 프로토콜 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.43-51
    • /
    • 2017
  • MANET consists of only wireless nodes having limited processing capability. It processes routing and data transmission through cooperation among each other. And it is exposed to many attack threats due to the dynamic topology by movement of nodes and multi-hop communication. Therefore, the reliability of transmitted data between nodes must be improved and security of integrity must be high. In this paper, we propose a method to increase the reliability of transmitted data by providing a secure cryptography protocol. The proposed method used a hierarchical structure to provide smooth cryptographic services. The cluster authentication node issues the cluster authentication key pair and unique key to the nodes. The nodes performs the encryption through two steps of encryption using cluster public key and block encryption using unique key. Because of this, the robustness against data forgery attacks was heightened. The superior performance of the proposed method can be confirmed through comparative experiment with the existing security routing method.

A reconfigurable modular approach for digital neural network (디지털 신경회로망의 하드웨어 구현을 위한 재구성형 모듈러 디자인의 적용)

  • Yun, Seok-Bae;Kim, Young-Joo;Dong, Sung-Soo;Lee, Chong-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2002.07d
    • /
    • pp.2755-2757
    • /
    • 2002
  • In this paper, we propose a now architecture for hardware implementation of digital neural network. By adopting flexible ladder-style bus and internal connection network into traditional SIMD-type digital neural network architecture, the proposed architecture enables fast processing that is based on parallelism, while does not abandon the flexibility and extensibility of the traditional approach. In the proposed architecture, users can change the network topology by setting configuration registers. Such reconfigurability on hardware allows enough usability like software simulation. We implement the proposed design on real FPGA, and configure the chip to multi-layer perceptron with back propagation for alphabet recognition problem. Performance comparison with its software counterpart shows its value in the aspect of performance and flexibility.

  • PDF

Soft Switching Inverter with An Auxiliary Active Quasi-Resonant DC Link Snubber for AC Servo Motor Drive

  • Mun, Sang-Pil;Kim, Chil-Ryong;Lee, Jong-Kurl;Park, Man-Kyu;Kwon, Soon-Kurl
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.22 no.3
    • /
    • pp.79-87
    • /
    • 2008
  • This paper presents a simple circuit topology of the auxiliary active quasi-resonant DC link snubber-assisted three phase voltage source soft-switching inverter for small scale PM motor drive applications. The pulse processing drive circuit interface and its soft-switching operation are discussed from an experimental point of view. Moreover, its conductive noise is measured and evaluated for electrical AC servo motor drive as compared with that of the conventional hard switching inverter.

Optical Pipelined Multi-bus Interconnection Network Intrinsic Topologies

  • d'Auriol, Brian Joseph
    • ETRI Journal
    • /
    • v.39 no.5
    • /
    • pp.632-642
    • /
    • 2017
  • Digital all-optical parallel computing is an important research direction and spans conventional devices and convergent nano-optics deployments. Optical bus-based interconnects provide interesting aspects such as relative information communication speed-up or slow-down between optical signals. This aspect is harnessed in the newly proposed All-Optical Linear Array with a Reconfigurable Pipelined Bus System (OLARPBS) model. However, the physical realization of such communication interconnects needs to be considered. This paper considers spatial layouts of processing elements along with the optical bus light paths that are necessary to realize the corresponding interconnection requirements. A metric in terms of the degree of required physical constraint is developed to characterize the variety of possible solutions. Simple algorithms that determine spatial layouts are given. It is shown that certain communication interconnection structures have associated intrinsic topologies.

Design of Secure Protocol based on trust model and trust values for Ubiquitous Sensor Networks (Ubiquitous Sensor Network에서 안전성 증가를 위한 신뢰모델과 신뢰값에 관한 프로토콜 설계)

  • Jang, Kun Won;Suh, Jang Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.3
    • /
    • pp.9-18
    • /
    • 2008
  • Mobile devices do not need the fixed network infrastructure in ad-hoc network, these devices communicate each other through the distributed control. Accordingly, mobile devices can discover several services using dynamic searching method and provide safely public ownership of these services. Ad-hoc network needs the distributed control and topology of dynamic network because the limited power for processing and network communication. This paper is devoted to provide the secure protocol that provides efficient services discovery using SDP(Service Discovery Protocol) and considers the security requirements. Proposed protocol provides the distributed control based on PKI without central server, the discovery of trusted service, secure telecommunication, the identification among mobile devices, and service access control by user authority.

Topology Building Transaction Processing (위상구축 트랜잭션의 처리)

  • 신명진;장인성;이기준
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10a
    • /
    • pp.201-203
    • /
    • 1999
  • 지리정보시스템의 정보를 관리하는 공간데이터베이스 관리시스템에서는 위상정보에 대한 효율적인 저장과 관리가 필요하다. 이렇게 기하학적인 정보만을 가진 객체의 자료 구조에 위상정보를 추가하거나 또는 위상적인 정보만으로 이러한 지도를 만드는 작업을 위상정보 구축작업이라고 한다. 공간데이터베이스의 위상정보를 생성하는 작업은 많은 연산과 상당한 시간을 요구하므로 일종의 장기 트랜잭션이라 할 수 있다. 이런 위상정보 구축 트랜잭션은 위상적 데이터의 특성을 이용하면 기존에 제안된 방법보다 효과적으로 처리할 수 있다. 본 논문에서는 위상정보 생성시의 장기 트랜잭션을 위하여 정의한 위상구축 트랜잭션이 완전성을 유지하면서 하위 트랜잭션으로 나눌수 있도록 Plane-sweeping을 이용한 위상구축 알고리즘을 제안하였다. 이 방법을 이용하면 위상구축이 수행되는 동안에도 위상이 구축되어 있는 지역에 대한 질의의 결과를 보장할 수 있다.

  • PDF