• 제목/요약/키워드: aggregator

검색결과 62건 처리시간 0.01초

Development of the Load Curtailment Allocation Algorithm for Load Aggregator in Emergeney Demand Response (부하관리사업자의 비상시 부하제어량 배분 알고리즘 개발)

  • Chung, Koo-Hyung;Kim, Jin-Ho;Kim, Bal-Ho
    • Proceedings of the KIEE Conference
    • /
    • 대한전기학회 2003년도 하계학술대회 논문집 A
    • /
    • pp.633-635
    • /
    • 2003
  • Electricity industries throughout the world are undergoing unprecedented changes. As a result, these changes lead to the separation of traditional integrated utilities and the introduction of competition in order that increase efficiency in electricity industry. Direct load control (DLC) system in competitive electricity market has a hierarchical interactive operation system, therefore, its control logic is also applied by bilateral interactive method that interchanges information related to interruptible load between operation hierarchies. Consequently, load curtailment allocation algorithm appropriate for new DLC system is required, and based on interchanged information, this algorithm should be implemented by most efficient way for each operation hierarchy. In this paper, we develop the load curtailment allocation algorithm in an emergency for new DLC system. Especially, the optimal algorithm for load aggregator (LA) that participates in competitive electricity market as a main operator for load management is developed.

  • PDF

DRM-FL: A Decentralized and Randomized Mechanism for Privacy Protection in Cross-Silo Federated Learning Approach (DRM-FL: Cross-Silo Federated Learning 접근법의 프라이버시 보호를 위한 분산형 랜덤화 메커니즘)

  • Firdaus, Muhammad;Latt, Cho Nwe Zin;Aguilar, Mariz;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2022년도 춘계학술발표대회
    • /
    • pp.264-267
    • /
    • 2022
  • Recently, federated learning (FL) has increased prominence as a viable approach for enhancing user privacy and data security by allowing collaborative multi-party model learning without exchanging sensitive data. Despite this, most present FL systems still depend on a centralized aggregator to generate a global model by gathering all submitted models from users, which could expose user privacy and the risk of various threats from malicious users. To solve these issues, we suggested a safe FL framework that employs differential privacy to counter membership inference attacks during the collaborative FL model training process and empowers blockchain to replace the centralized aggregator server.

Usability Evaluation of Aggregator-supplied Full-text Database (수집자공급형 학술정보데이터베이스의 사용성 평가에 관한 연구)

  • Kim, Jong-Ae
    • Journal of Korean Library and Information Science Society
    • /
    • 제40권2호
    • /
    • pp.223-242
    • /
    • 2009
  • This is an exploratory study targeting initial users to evaluate the usability of an aggregator-supplied full-text database and to analyze the differences in task performance and perceptions based on participant characteristics. The differences in completion time and perceptions on ease of use, terminology, subject categories and satisfaction were analyzed based on the participant characteristics such as Kolb learning style, gender and participation in user instruction on full-text databases. The results indicated that there was a statistically significant difference in completion time based on the Kolb learning style. Also a statistically significant difference was found in perceptions on ease of use and terminology based on gender. However no statistically significant difference was found in perceptions on the usability of the database based on the participation in user instruction.

  • PDF

A Sextant Cluster Based Monitoring on Secure Data Aggregation and Filtering False Data in Wireless Sensor Networks (무선센서 네트워크에서의 육분원 방식 모니터링 기반 안전한 데이터 병합 및 위조 데이터 필터링)

  • Boonsongsrikul, Anuparp;Park, Seung-Kyu;Shin, Seung-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • 제17권2호
    • /
    • pp.119-126
    • /
    • 2012
  • Local monitoring is an effective technique in securing data of wireless sensor networks. Existing solutions require high communication cost for detecting false data and this results in a network lifetime being shortened. This paper proposes novel techniques of monitoring based secure data aggregation and filtering false data in wireless sensor networks. The aim is to reduce energy consumption in securing data aggregation. An aggregator and its monitoring node perform data aggregation in a 60o sextant cluster. By checking Message Authentication Codes (MAC), aggregation data will be dropped by a forward aggregator if data aggregated by the aggregator and data monitored by the monitoring node are inconsistent. The simulation shows that the proposed protocol can reduce the amount of average energy consumption about 64% when comparing with the Data Aggregation and Authentication protocol (DAA)[1]. Additionally, the network lifetime of the proposed protocol is 283% longer than that of DAA without any decline in data integrity.

Monitoring-Based Secure Data Aggregation Protocol against a Compromised Aggregator in Wireless Sensor Networks (무선 센서 네트워크에서 Compromised Aggregator에 대응을 위한 모니터링 기반 시큐어 데이터 병합 프로토콜)

  • Anuparp, Boonsongsrikul;Lhee, Kyung-Suk;Park, Seung-Kyu
    • The KIPS Transactions:PartC
    • /
    • 제18C권5호
    • /
    • pp.303-316
    • /
    • 2011
  • Data aggregation is important in wireless sensor networks. However, it also introduces many security problems, one of which is that a compromised node may inject false data or drop a message during data aggregation. Most existing solutions rely on encryption, which however requires high computation and communication cost. But they can only detect the occurrence of an attack without finding the attacking node. This makes sensor nodes waste their energy in sending false data if attacks occur repeatedly. Even an existing work can identify the location of a false data injection attack but it has a limitation that at most 50% of total sensor nodes can participate in data transmission. Therefore, a novel approach is required such that it can identify an attacker and also increase the number of nodes which participate in data transmission. In this paper, we propose a monitoring-based secure data aggregation protocol to prevent against a compromised aggregator which injects false data or drops a message. The proposed protocol consists of aggregation tree construction and secure data aggregation. In secure data aggregation, we use integration of abnormal data detection with monitoring and a minimal cryptographic technique. The simulation results show the proposed protocol increases the number of participating nodes in data transmission to 95% of the total nodes. The proposed protocol also can identify the location of a compromised node which injects false data or drops a message. A communication overhead for tracing back a location of a compromised node is O(n) where n is the total number of nodes and the cost is the same or better than other existing solutions.

Dynamic Equivalent Battery as a Metric to Evaluate the Demand Response Performance of an EV Fleet

  • Yoon, Sung Hyun;Jin, Young Gyu;Yoon, Yong Tae
    • Journal of Electrical Engineering and Technology
    • /
    • 제13권6호
    • /
    • pp.2220-2226
    • /
    • 2018
  • Electric vehicles (EVs) are significant resources for demand response (DR). Thus, it is essential for EV aggregators to quantitatively evaluate their capability for DR. In this paper, a concept of dynamic equivalent battery (DEB) is proposed as a metric for evaluating the DR performance using EVs. The DEB is the available virtual battery for DR. The capacity of DEB is determined from stochastic calculation while satisfying the charging requirements of each EV, and it varies also with time. Further, a new indicator based on the DEB and time-varying electricity prices, named as value of DEB (VoDEB), is introduced to quantify the value of DEB coupled with the electricity prices. The effectiveness of the DEB and the VoDEB as metrics for the DR performance of EVs is verified with the simulations, where the difference of charging cost reduction between direct charging and optimized bidding methods is used to express the DR performance. The simulation results show that the proposed metrics accord well with the DR performance of an EV fleet. Thus, an EV aggregator may utilize the proposed concepts of DEB and VoDEB for designing an incentive scheme to EV users, who participate in a DR program.

A Study on the Implementation and Service of the RSS Based Science and Technology Information Aggregation System (RSS 기반 과학기술정보 수집시스템의 개발과 활용방안에 관한 연구)

  • Hyun, mi-hwan;Lee, sang-hwan;Lee, tae-seok;Yae, yong-hee
    • Proceedings of the Korea Contents Association Conference
    • /
    • 한국콘텐츠학회 2007년도 추계 종합학술대회 논문집
    • /
    • pp.405-409
    • /
    • 2007
  • The RSS which is a kind of syndication technology enables a part or the whole of the content which it provides from web site to be able to be used in different service. It is protocol to summarize and share various contents on web site. This Paper propose the ways to implement system to aggregate RSS feed and archive it and the services using it. Also, the users register the channel RSS to the RSS aggregator system and recommend it. It can drive to share of knowledge between researchers.

  • PDF

Context Awareness Reasoning System for Personalized Services in Ubiquitous Mobile Environments (유비쿼터스 모바일 환경에서 개인화 서비스를 위한 상황인지 추론 시스템)

  • Moon, Aekyung;Park, Yoo-mi;Kim, Sang-gi;Lee, Byung-sun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • 제4권3호
    • /
    • pp.139-147
    • /
    • 2009
  • This paper proposed the context awareness reasoning system to provide the personalized services dynamically in a ubiquitous mobile environments. The proposed system is designed to provide the personalized services to mobile users and consists of the context aggregator and the knowledge manager. The context aggregator can collect information from networks through Open API Gateway as well as sensors in a various ubiquitous environment. And it can also extract the place types through the geocoding and the social address domain ontology. The knowledge manager is the core component to provide the personalized services, and consists of activity reasoner, user pattern learner and service recommender to provide the services predict by extracting the optimized service from user situations. Activity reasoner uses the ontology reasoning and user pattern learner learns with previous service usage history and contexts. And to design service recommender easy to flexibly apply in dynamic environments, service recommender recommends service in the only use of current accessible contexts. Finally, we evaluate the learner and recommender of proposed system by simulation.

  • PDF

Development of CLICK for Improved Accessibility and Tight coupled Links between Information Resources (정보자원 간 밀겹합 및 접근성 제고를 위한 과학기술정보링크센터 구축)

  • Lee, Sang-gi;Kim, Sun-tae;Lee, Yong-sik;Yae, Yong-hee
    • Proceedings of the Korea Contents Association Conference
    • /
    • 한국콘텐츠학회 2007년도 추계 종합학술대회 논문집
    • /
    • pp.421-425
    • /
    • 2007
  • The exponential increase of digital contents brought about the e-Challenge crisis to the librarians. How can all the e-resources be managed effectively? How can we detect all the broken links? How can we assist the users to the right resources? This paper concentrates on building CLICK(Cooperative Link Center in KOREA) as a knowledge compass by collecting diverse science & technology information and creating tight coupled links between information resources for reference linking and providing users with the optimal route for the resource per user. If the publishers, Abstract & Index DB, Searching Portal, Electronic Libraries, Full-text DB and Aggregator can be linked by using a standardized way through a CLICK, the service channels can be diversified. Users can select the channels without rein under according to a use purpose and conditions.

  • PDF

Pattern Analysis of News Lifecycle in a Social News Aggregation Service (소셜 뉴스 집적 서비스에서의 카테고리별 뉴스 수명주기 패턴 분석)

  • Won, Mi-Kyoung;Lee, Sang-Jin;Lee, Sung-Jun;Park, Jong-Hun
    • The Journal of Society for e-Business Studies
    • /
    • 제14권2호
    • /
    • pp.41-56
    • /
    • 2009
  • The purpose of this paper is to present a statistical model that can predict the rapid shift of users' attention by analyzing the lifecycle patterns of news in a social news aggregation service. Internet news service sites have a distinct characteristic in a sense that users' attention change very quickly in a short period of time. In this research, we propose a regression model for each news category which can model the decay pattern of users' attention and the content promotion policy of a social news aggregator is proven to be a major source of the rapid growth in the popularity of news. The proposed model is expected to be useful for evaluation of the social news aggregation service provider's content promotion policy that attempts to maximize users' attention as well as the diversity of news contents.

  • PDF