• 제목/요약/키워드: Violation

검색결과 858건 처리시간 0.024초

Development of Water Supply System under Uncertainty

  • Chung, Gun-Hui;Kim, Tae-Woong;Kim, Joong-Hoon
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2009년도 학술발표회 초록집
    • /
    • pp.2179-2183
    • /
    • 2009
  • As urbanization is progressed, the network for distributing water in a basin become complex due to the spatial expansion and parameter uncertainties of water supply systems. When a long range water supply plan is determined, the total construction and operation cost has to be evaluated with the system components and parameter uncertainties as many as possible. In this paper, the robust optimization approach of Bertsimas and Sim is applied in a hypothetical system to find a solution which remains feasible under the possible parameter uncertainties having the correlation effect between the uncertain coefficients. The system components to supply, treatment, and transport water are included in the developed water supply system and construction and expansion of the system is allowed for a long-range period. In this approach, the tradeoff between system robustness and total cost of the system is evaluated in terms of the degree of conservatism which can be converted to the probability of constraint violation. As a result, the degree of conservatism increases, the total cost is increased due to the installation of large capacity of treatment and transportation systems. The applied robust optimization technique can be used to determine a long-range water supply plan with the consideration of system failure.

  • PDF

네트워크 트래픽 특성을 이용한 개인정보유출 탐지기법 (Detection of Personal Information Leakage using the Network Traffic Characteristics)

  • 박정민;김은경;정유경;채기준;나중찬
    • 정보처리학회논문지C
    • /
    • 제14C권3호
    • /
    • pp.199-208
    • /
    • 2007
  • 유비쿼터스 네트워크 환경에서 개인정보의 유출은 다양한 사이버 범죄를 야기하며 개인정보의 상품화로 프라이버시의 침해가 증가하므로 개인정보의 유출을 탐지하는 것은 매우 중요하다. 본 논문은 네트워크의 트래픽 특성을 기반으로 한 개인정보 유출 탐지 기법을 제안하고자 한다. 실제 대학망에서 정상 상태의 트래픽을 수집하여 트래픽의 특성을 분석함으로써 네트워크 트래픽이 자기유사성을 지님을 확인하였다. 개인정보의 유출을 시도하는 악성코드의 사전정보수집단계를 모사한 비정상적인 트래픽에 대하여 정상 트래픽에서의 자기유사성과의 변화를 살펴봄으로써 이상을 조기 감지할 수 있었다.

국제상사분쟁해결(國際商事紛爭解決)을 위한 온라인중재(仲裁)에서 정당(正當)한 절차(節次)에 관한 연구(硏究) (A Study on the Due Process in Online Arbitral Proceeding for the International Commercial Disppute Settlement)

  • 유병욱
    • 무역상무연구
    • /
    • 제26권
    • /
    • pp.225-253
    • /
    • 2005
  • Nowadays we does not hesitate to definite answer that the arbitration is the most developed dispute settlement out of court in the international commercial transaction. Online arbitration is desirable for the reasons of speed and cost effectiveness to settle the dispute about the international commercial transaction. Online arbitration is fast because it uses the communication technologies that allow information to be sent fast and efficiently. But in online arbitration too much speed and efficiency may lead to a violation of due process rights and consequently the online arbitration awards run a risk to be set aside or refused its enforcement under the international commercial arbitration mechanism. Speed and efficiency may conflict with the procedural guarantee characterizing each adversary dispute resolution process. As arbitration is exclusive of recourse to courts, a state must guarantee that arbitral proceeding should be satisfied with the claim rights requirement. The main question regarding the sources of regulation is particularly for the due process whether or not this is provided by the availability of grounds to set arbitral award aside. In other words, does it respect due process in the arbitration proceeding including information communication and technology under the online arbitration. In this paper it is discussed about how the main issue in arbitration should be implemented in online arbitration proceedings to cope with the due process requirements in national and international.

  • PDF

전력계통의 무효전력 제어 및 안전도 평가를 위한 Asynchronous Team 이론의 적용에 관한 연구 (A Study on the Application of Asynchronous Team Theory for QVC and Security Assessment in a Power System)

  • 김두현;김상철
    • 한국안전학회지
    • /
    • 제12권3호
    • /
    • pp.67-75
    • /
    • 1997
  • This paper presents a study on the application of Asynchronous Team(A-Team) theory for QVC(Reactive power control) and security assessment in a power system. Reactive power control problem is the one of optimally establishing voltage level given reactive power sources, which is very important problem to supply the demand without interruption and needs methods to alleviate a bus voltage limit violation more quickly. It can be formulated as a mixed-integer linear programming(MILP) problem without deteriorating of solution accuracy to a certain extent. The security assessment is to estimate the relative robustness of the system and deterministic approach based on AC load flow calculations is adopted to assess it, especially voltage security. A distance measure, as a measurement for voltage security, is introduced. In order to analyze the above two problem, reactive power control and static security assessment, In an integrated fashion, a new organizational structure, called an A-team, is adopted. An A-team is well-suited to the development of computer-based, multi-agent systems for operation of large-scaled power systems. In order to verify the usefulness of the suggested scheme herein, modified IEEE 30 bus system is employed as a sample system. The results of a case study are also presented.

  • PDF

과도 안정도를 고려한 총 송전용량 평가 (Assessment of Total Transfer Capability Considering Transient Stability)

  • 박진욱;배인수;김진오;김규호
    • 조명전기설비학회논문지
    • /
    • 제19권7호
    • /
    • pp.94-99
    • /
    • 2005
  • 본 논문은 기존의 총 송전용량 결정에 있어서 고려하기 어려웠던 과도 안정도 제약을 판별법을 적용하기 위해 2단계 계산 기법을 이용하여 보다 용이하게 적용하였다. 총 송전용량을 계산하기 위한 방법으로 첫 번째 단계에서는 RPF(Repeated Power Flow) 방법을 이용하여 전압과 열적한계를 판별하고, 두 번째 단계에서는 첫 번째 단계에서 결정된 총 송전용량이 시스템의 과도 안정도 조건의 위반여부를 판별하여 시스템의 총 송전용량을 결정하였다.

Adaptive Truncation technique for Constrained Multi-Objective Optimization

  • Zhang, Lei;Bi, Xiaojun;Wang, Yanjiao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권11호
    • /
    • pp.5489-5511
    • /
    • 2019
  • The performance of evolutionary algorithms can be seriously weakened when constraints limit the feasible region of the search space. In this paper we present a constrained multi-objective optimization algorithm based on adaptive ε-truncation (ε-T-CMOA) to further improve distribution and convergence of the obtained solutions. First of all, as a novel constraint handling technique, ε-truncation technique keeps an effective balance between feasible solutions and infeasible solutions by permitting some excellent infeasible solutions with good objective value and low constraint violation to take part in the evolution, so diversity is improved, and convergence is also coordinated. Next, an exponential variation is introduced after differential mutation and crossover to boost the local exploitation ability. At last, the improved crowding density method only selects some Pareto solutions and near solutions to join in calculation, thus it can evaluate the distribution more accurately. The comparative results with other state-of-the-art algorithms show that ε-T-CMOA is more diverse than the other algorithms and it gains better in terms of convergence in some extent.

Deadline Constrained Adaptive Multilevel Scheduling System in Cloud Environment

  • Komarasamy, Dinesh;Muthuswamy, Vijayalakshmi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권4호
    • /
    • pp.1302-1320
    • /
    • 2015
  • In cloud, everything can be provided as a service wherein a large number of users submit their jobs and wait for their services. hus, scheduling plays major role for providing the resources efficiently to the submitted jobs. The brainwave of the proposed ork is to improve user satisfaction, to balance the load efficiently and to bolster the resource utilization. Hence, this paper roposes an Adaptive Multilevel Scheduling System (AMSS) which will process the jobs in a multileveled fashion. The first level ontains Preprocessing Jobs with Multi-Criteria (PJMC) which will preprocess the jobs to elevate the user satisfaction and to itigate the jobs violation. In the second level, a Deadline Based Dynamic Priority Scheduler (DBDPS) is proposed which will ynamically prioritize the jobs for evading starvation. At the third level, Contest Mapping Jobs with Virtual Machine (CMJVM) is roposed that will map the job to suitable Virtual Machine (VM). In the last level, VM Scheduler is introduced in the two-tier VM rchitecture that will efficiently schedule the jobs and increase the resource utilization. These contributions will mitigate job iolations, avoid starvation, increase throughput and maximize resource utilization. Experimental results show that the performance f AMSS is better than other algorithms.

국제물품매매협약상 손해경감의무 (Duty to Mitigate Damages under CISG)

  • 허해관
    • 무역상무연구
    • /
    • 제69권
    • /
    • pp.63-84
    • /
    • 2016
  • Article 77 of CISG requires an aggrieved party, the promisee, claiming damages to take reasonable measures to mitigate losses. The reasonable measures required hereunder are limited to those that can be expected under the circumstances having regard to the principle of good faith. When taking such measures, the aggrieved party must do so within a reasonable time under the circumstances. The expenses incurred in taking such measures are recoverable from the promisor. If the aggrieved party fails to do so, the damages recoverable from the promisor are reduced in the amount the loss that should have been mitigated. The aggrieved party's duty to mitigate damages applies to claim for damages only. That is, the violation of this duty should not be invoked against other remedies available under CISG, such as the right to claim specific performance, the right to claim for the price or the right of reduction of price. In practice, under the provision of article 77, the aggrieved party, the seller or the buyer, is often required to enter into a substitute transaction as a measure to mitigate losses and many cases involving a substitute transaction are internationally reported. Therefore this paper intends to provide a certain understanding of the aggrieved party's duty to take measures to mitigate losses based on such cases reported.

  • PDF

Crowdsourcing Identification of License Violations

  • Lee, Sanghoon;German, Daniel M.;Hwang, Seung-won;Kim, Sunghun
    • Journal of Computing Science and Engineering
    • /
    • 제9권4호
    • /
    • pp.190-203
    • /
    • 2015
  • Free and open source software (FOSS) has created a large pool of source codes that can be easily copied to create new applications. However, a copy should preserve copyright notice and license of the original file unless the license explicitly permits such a change. Through software evolution, it is challenging to keep original licenses or choose proper licenses. As a result, there are many potential license violations. Despite the fact that violations can have high impact on protecting copyright, identification of violations is highly complex. It relies on manual inspections by experts. However, such inspection cannot be scaled up with open source software released daily worldwide. To make this process scalable, we propose the following two methods: use machine-based algorithms to narrow down the potential violations; and guide non-experts to manually inspect violations. Using the first method, we found 219 projects (76.6%) with potential violations. Using the second method, we show that the accuracy of crowds is comparable to that of experts. Our techniques might help developers identify potential violations, understand the causes, and resolve these violations.

고대 및 현대 암호 방식을 결합한 초안전 문서 보안 프로그램의 설계 및 구현 (Design and Implementation of a Security Program for Supersafe Document Using Ancient and Modern Cryptography)

  • 유연수;이상곤
    • 한국멀티미디어학회논문지
    • /
    • 제20권12호
    • /
    • pp.1913-1927
    • /
    • 2017
  • Encryption technology is to hide information in a cyberspace built using a computer and to prevent third parties from changing it. If a malicious user accesses unauthorized device or application services on the Internet of objects, it may be exposed to various security threats such as data leakage, denial of service, and privacy violation. One way to deal with these security threats is to encrypt and deliver the data generated by a user. Encrypting data must be referred to a technique of changing data using a complicated algorithm so that no one else knows the content except for those with special knowledge. As computers process computations that can be done at a very high speed, current cryptographic techniques are vulnerable to future computer performance improvements. We designed and implemented a new encryption program that combines ancient and modern cryptography so that the user never knows about data management, and transmission. The significance of this paper is that it is the safest method to combine various kinds of encryption methods to secure the weaknesses of the used cryptographic algorithms.