• 제목/요약/키워드: computational power

검색결과 1,932건 처리시간 0.03초

고속 계산을 위한 연속 조류 계산 시스템의 향상 (The Enhancement of Continuation Power Flow at Minimal computational Costs)

  • 박민석;송화창;이병준;권세혁
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2000년도 추계학술대회 논문집 학회본부 A
    • /
    • pp.13-16
    • /
    • 2000
  • Continuation power flow has been developed to remove the ill-condition problem caused by singularity of power flow Jacobian at and near steady-state voltage instability point in conventional power flow. When solving large-scale power transmission systems, continuation power flow require large computational costs. Therefore, technique to improve the speed of continuation power flow system was required. In this paper Decoupled Power Flow Method (DPFM), Enhanced Decoupled Power Flow Method (EDPFM), Robust Fast Decoupled Power Flow Method (RFDPFM) are applied to continuation power flow algorithm to improve the speed of continuation power flow system.

  • PDF

PARALLEL COMMUNICATING AUTOMATA SYSTEMS -A SURVEY

  • Carlos Martin-Vide;Victor Mitrana
    • Journal of applied mathematics & informatics
    • /
    • 제7권2호
    • /
    • pp.357-377
    • /
    • 2000
  • A parallel communicating automata system is an accepting device based on the communications between more automata working in parallel. It consists of several automata corking independently but communicating with each other by request. We survey several variants of parallel communicating automata systems with respect to their computational power. Other aspects like decidability and complexity matters are also briefly discussed. Some open problem sand directions for future research are finally pointed out.

COMPUTATIONAL INTELLIGENCE IN NUCLEAR ENGINEERING

  • UHRIG ROBERT E.;HINES J. WESLEY
    • Nuclear Engineering and Technology
    • /
    • 제37권2호
    • /
    • pp.127-138
    • /
    • 2005
  • Approaches to several recent issues in the operation of nuclear power plants using computational intelligence are discussed. These issues include 1) noise analysis techniques, 2) on-line monitoring and sensor validation, 3) regularization of ill-posed surveillance and diagnostic measurements, 4) transient identification, 5) artificial intelligence-based core monitoring and diagnostic system, 6) continuous efficiency improvement of nuclear power plants, and 7) autonomous anticipatory control and intelligent-agents. Several changes to the focus of Computational Intelligence in Nuclear Engineering have occurred in the past few years. With earlier activities focusing on the development of condition monitoring and diagnostic techniques for current nuclear power plants, recent activities have focused on the implementation of those methods and the development of methods for next generation plants and space reactors. These advanced techniques are expected to become increasingly important as current generation nuclear power plants have their licenses extended to 60 years and next generation reactors are being designed to operate for extended fuel cycles (up to 25 years), with less operator oversight, and especially for nuclear plants operating in severe environments such as space or ice-bound locations.

Securing a Cyber Physical System in Nuclear Power Plants Using Least Square Approximation and Computational Geometric Approach

  • Gawand, Hemangi Laxman;Bhattacharjee, A.K.;Roy, Kallol
    • Nuclear Engineering and Technology
    • /
    • 제49권3호
    • /
    • pp.484-494
    • /
    • 2017
  • In industrial plants such as nuclear power plants, system operations are performed by embedded controllers orchestrated by Supervisory Control and Data Acquisition (SCADA) software. A targeted attack (also termed a control aware attack) on the controller/SCADA software can lead a control system to operate in an unsafe mode or sometimes to complete shutdown of the plant. Such malware attacks can result in tremendous cost to the organization for recovery, cleanup, and maintenance activity. SCADA systems in operational mode generate huge log files. These files are useful in analysis of the plant behavior and diagnostics during an ongoing attack. However, they are bulky and difficult for manual inspection. Data mining techniques such as least squares approximation and computational methods can be used in the analysis of logs and to take proactive actions when required. This paper explores methodologies and algorithms so as to develop an effective monitoring scheme against control aware cyber attacks. It also explains soft computation techniques such as the computational geometric method and least squares approximation that can be effective in monitor design. This paper provides insights into diagnostic monitoring of its effectiveness by attack simulations on a four-tank model and using computation techniques to diagnose it. Cyber security of instrumentation and control systems used in nuclear power plants is of paramount importance and hence could be a possible target of such applications.

펄스파워를 이용한 실린더형 전극간 금속 플라즈마 생성현상의 전산유동해석 (COMPUTATIONAL MODELING AND SIMULATION OF METAL PLASMA GENERATION BETWEEN CYLINDRICAL ELECTRODES USING PULSED POWER)

  • 김경진;곽호상;박중윤
    • 한국전산유체공학회지
    • /
    • 제19권4호
    • /
    • pp.68-74
    • /
    • 2014
  • This computational study features the transient compressible and inviscid flow analysis on a metallic plasma discharge from the opposing composite electrodes which is subjected to pulsed electric power. The computations have been performed using the flux corrected transport algorithm on the axisymmetric two-dimensional domain of electrode gap and outer space along with the calculation of plasma compositions and thermophysical properties such as plasma electrical conductivity. The mass ablation from aluminum electrode surfaces are modeled with radiative flux from plasma column experiencing intense Joule heating. The computational results shows the highly ionized and highly under-expanded supersonic plasma discharge with strong shock structure of Mach disk and blast wave propagation, which is very similar to muzzle blast or axial plasma jet flows. Also, the geometrical effects of composite electrodes are investigated to compare the amount of mass ablation and penetration depth of plasma discharge.

Efficient power allocation algorithm in downlink cognitive radio networks

  • Abdulghafoor, Omar;Shaat, Musbah;Shayea, Ibraheem;Mahmood, Farhad E.;Nordin, Rosdiadee;Lwas, Ali Khadim
    • ETRI Journal
    • /
    • 제44권3호
    • /
    • pp.400-412
    • /
    • 2022
  • In cognitive radio networks (CRNs), the computational complexity of resource allocation algorithms is a significant problem that must be addressed. However, the high computational complexity of the optimal solution for tackling resource allocation in CRNs makes it inappropriate for use in practical applications. Therefore, this study proposes a power-based pricing algorithm (PPA) primarily to reduce the computational complexity in downlink CRN scenarios while restricting the interference to primary users to permissible levels. A two-stage approach reduces the computational complexity of the proposed mathematical model. Stage 1 assigns subcarriers to the CRN's users, while the utility function in Stage 2 incorporates a pricing method to provide a power algorithm with enhanced reliability. The PPA's performance is simulated and tested for orthogonal frequency-division multiplexing-based CRNs. The results confirm that the proposed algorithm's performance is close to that of the optimal algorithm, albeit with lower computational complexity of O(M log(M)).

저전력 모바일 장치에 적합한 효율적인 동적 그룹 키 동의 (An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices)

  • 조석향;남정현;김승주;원동호;이혜주;최진수
    • 정보처리학회논문지C
    • /
    • 제12C권2호
    • /
    • pp.157-168
    • /
    • 2005
  • 그룹 키 동의 프로토콜은 공개된 통신망을 통해 안전하게 통신하려는 그룹 구성원들에게 세션키를 제공하기 위해 설계된다. 모바일 컴퓨팅 기술은 프로토콜 참가자의 계산적인 능력 측면에서 비대칭적이다. 즉 프로토콜 참가자는 충분한 계산 능력을 가진 고정된 서버(애플리케이션 서버)와 제한된 계산 자원을 가진 모바일 장치들(클라이언트)로 구성되어 있다. 스마트카드나 개인 휴대 정보 단말기(PDA)와 같은 저전력 모바일 장치를 포함하는 그룹에서는 각 구성원의 계산량을 최소화하는 것이 바람직하다. 또한 그룹 구성원이 현재의 그룹을 탈퇴하거나 다수의 새로운 구성원이 현재의 그룹에 참여할 필요가 있을 때 길은 계산 비용으로 그룹 키의 갱신이 요구된다. 본 논문에서는 저전력 모바일 장치인 클라이언트 쪽의 계산 효율성이 높은 동적 그룹 키 동의 프로토콜을 제안한다. 제안한 프로토콜과 기존 프로토콜을 통신과 계산 비용 측면에서 비교하고, 제안한 프로토콜의 안전성은 랜덤 오라클 모델에서 수동적인 공격자에 대하여 안전함을 증명한다.