• Title/Summary/Keyword: disconnection

Search Result 415, Processing Time 0.032 seconds

Transient Simulation of a Self-Excited Induction Generator during Grid Faults

  • Kim, Chan-Ki;Choy, Young-Do;Lim, Seong-Joo
    • Journal of Power Electronics
    • /
    • v.7 no.2
    • /
    • pp.89-96
    • /
    • 2007
  • This paper deals with the transient performance of an induction generator in a wind power plant. An induction generator and grid equipment may be damaged when a sudden disturbance occurs, for example, a sudden disconnection from the utility grid. The reasons for this are over-voltage and over speed. This paper analyzes this phenomena using PSCAD/EMTDC and coincides with its corresponding mathematical equation.

Junctional Neurulation : A Junction between Primary and Secondary Neural Tubes

  • Kim, Kyung Hyun;Lee, Ji Yeoun
    • Journal of Korean Neurosurgical Society
    • /
    • v.64 no.3
    • /
    • pp.374-379
    • /
    • 2021
  • Recent case reports of junctional neural tube defect (JNTD) which is a peculiar type of spinal anomaly showing the functional disconnection of the primary and secondary neural tubes has risen interest in the process of junctional neurulation (the connection between the two neural tubes) during development. This article summarizes the clinical features of the JNTD and reviews the literature on the basic research on junctional neurulation.

Study on Windows Event Log-Based Corporate Security Audit and Malware Detection (윈도우 이벤트 로그 기반 기업 보안 감사 및 악성코드 행위 탐지 연구)

  • Kang, Serim;Kim, Soram;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.591-603
    • /
    • 2018
  • Windows Event Log is a format that records system log in Windows operating system and methodically manages information about system operation. An event can be caused by system itself or by user's specific actions, and some event logs can be used for corporate security audits, malware detection and so on. In this paper, we choose actions related to corporate security audit and malware detection (External storage connection, Application install, Shared folder usage, Printer usage, Remote connection/disconnection, File/Registry manipulation, Process creation, DNS query, Windows service, PC startup/shutdown, Log on/off, Power saving mode, Network connection/disconnection, Event log deletion and System time change), which can be detected through event log analysis and classify event IDs that occur in each situation. Also, the existing event log tools only include functions related to the EVTX file parse and it is difficult to track user's behavior when used in a forensic investigation. So we implemented new analysis tool in this study which parses EVTX files and user behaviors.

Preventing Communication Disruption in the Urban Environment Using RRPS (RSU Request Priority Scheduling) (도심환경에서 통신 단절 예방을 위한 RRPS(RSU Request Priority Scheduling)설계)

  • Park, Seok-Gyu;Ahn, Heui-Hak;Jeuong, Yi-Na
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.6
    • /
    • pp.584-590
    • /
    • 2016
  • This paper proposed "Priority Scheduling and MultiPath Routing Protocol (RRPS) for preventing communication disruption in the urban environment" to minimize the disconnection or disruption of V2I and V2V communication in the urban environment where communication is frequently disconnected according to density. The flow of the RRPS is explained as follows. RSU Request Priority Scheduling (RRPS) is used to apply the priority of the request message prior to reaching the end line by using the Start Line and End Line, which are the management areas of the RSU). This paper also proposed MPRP (Multi Path Routing Protocol) design to set up the multipath to the destination. As a result, the proposed RRPS improves the processing efficiency of V2I by applying priority scheduling to the message of the vehicle requesting the information in the RSU, and can prevent the communication disconnection. Thereby, it is improved the transmission success probability.

A Cache Consistency Scheme to Consider Period of Data in Mobile Computing Environments (이동 컴퓨팅 환경에서 데이터의 주기성을 고려한 캐쉬 일관성 기법)

  • Lim, Jong-Won;Hwang, Byung-Yeon
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.4
    • /
    • pp.421-431
    • /
    • 2007
  • Due to the rapid development of wireless communication technology, demands on data services in mobile computing environment are gradually increasing. In mobile computing environments, a mobile host began to use cache to overcome the weak point. Caching at mobile host could reduce the bandwidth consumption and query response time, but mobile host must maintain cache consistency. In this paper, we propose a cache consistency strategy to consider the period of data usage. The server allows an effective broadcasting by classifying data into two groups of periodic and non-periodic. By classifying the data, it prevent from elimination of cache after disconnection of periodic data by using expired time. By storing IR(Invalidation Report) messages, this scheme divides cached data by selection after disconnection. Consequently, we have shown much improvement in total consumption of bandwidth than the conventional scheme.

  • PDF

A Path Establishment Method for Improving Path Stability in Mobile Ad-Hoc Networks (이동 애드혹 네트워크에서 경로의 안정성 향상을 위한 경로 설정 방식)

  • Joe, In-Whee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.9B
    • /
    • pp.563-568
    • /
    • 2007
  • This paper proposes a routing establishment method for improving path stability in mobile ad-hoc networks. In mobile ad-hoc networks, the network topology is highly dynamic due to the node mobility unlike wired networks. Since the existing methods are based on the shortest path algorithm with the minimum hop count regardless of the path stability, it could lead to packet loss and path disconnection in mobile ad-hoc networks. In particular, if control packets and critical data are transmitted on the unstable path, it causes serious problems. Therefore, this paper proposes one approach in order to minimize packet loss and path disconnection by considering the node mobility. After the destination node receives multiple RREQ messages, it selects the stable path through the proposed MinMax algorithm according to the node speed.

The Effect of Children's Leadership and Self-regulation Upon Peer Play Behaviors (유아의 리더십과 자기조절능력이 또래 놀이행동에 미치는 영향)

  • Jang, Yun-Hee;Moon, Hyuk-Jun
    • Journal of Families and Better Life
    • /
    • v.29 no.2
    • /
    • pp.73-87
    • /
    • 2011
  • The purpose of this study is to investigate the influence of children's socia-demographic variables(i.e., gender, birth order, and the amount of time staying in kindergarten) on, leadership, self-regulation and children's peer play behaviors. The participants of this study are 336 children aged between five and seven in four classes in a private kindergarten and eight classes in a private preschool located in the capital region. The results revealed that, girls showed more leadership, self-regulation, and play interaction section than boys: whereas, boys showed higher response in play disruption and the lack of play disconnection. However, birth order, did not have a significant effect on the sub-domain of leadership, self-regulation competence, and peer play behaviors. As for the duration children stay in preschool or in preschool or kindergarten, children who spend half-day showed higher reaction in behavioral self-control and emotional taking abilities than children who stay in the preschool or kindergarten full day. On the other hand, self-esteem of full-time children was higher than half-time children. Children who were emotionally sensitive, knew how to lead their peer group, and those who were sociable and self-regulated presented to be more active in peer-interaction than others. Second, as the result of the correlation analysis reveals, children's leadership, self-regulation competence, peer play behaviors, and play interaction had a meaningful effect on the sub-variations of children's leadership and self-regulation and they showed significant influence upon play disruption and play disconnection. In addition, girls who were not able to manage or to inspect their behavior and had insensitive emotion demonstrated higher tendency to play disconnected. Children, who participated in full-day program with having difficulties in self-regulation or inspecting their behavior properly but had a strong leadership and insensitive showed play disruption highly.

Characteristic of VSI Driven by Source Synchronous Type for the Utility Interactive using a Photovoltaic Generation for the LED Luminaire Emergency Exit Sign Operation (LED 비상 유도등 동작을 위한 태양광발전 계통연계 전원동기 방식의 전압형 인버터 구동 특성)

  • Hwang, Lark-Hoon;Na, Yong-Ju
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.5
    • /
    • pp.420-428
    • /
    • 2018
  • In this paper, represented uninterruptible power supply (UPS) equipment maintaining constant output voltage, the proposes a photovoltaic system constructed with a step up boosting chopper and single phase pulse width modulation (PWM) voltage source inverter. as power source disconnection, voltage variation and output current variation with load variation. This system is driven by being synchronized voltage fed inverter and AC source, and in the steady state of power source charge battery connected to DC side with solar cell using a Photovoltaic that it was so called constant voltage charge. It can be results of saving electric power, and through a normal operation of energy storage system (ESS), the system operated the LED a calling on signal changes at the airport in an efficient manner. In addition, better output waveform was generated because of PWM method, and it was proved to test by experiment maintained constant output voltage regardless of AC source disconnection, load variation, and voltage variation of AC power source.

The establishment of Proactive Routing Selection and Maintenance Algorithms for Mobile Ad Hoc Networks (이동 Ad Hoc 네트워크에서 사전 활성화 라우팅 선택과 관리유지 알고리즘의 구축)

  • Cho, Young-Joo;Lee, Yeo-Jin;Chung, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.73-80
    • /
    • 2007
  • In conventional on-demand mobile ad hoc routing algorithms, an alternate path is sought only after an active path is broken. It incurs a significant cost in terms of money and time in detecting the disconnection and establishing a new route. In this thesis, we propose proactive route selection and maintenance to conventional mobile ad hoc on-demand routing algorithms. The key idea for this research is to only consider a path break to be likely when the signal power of a received packet drops below an optimal threshold value and to generate a forewarning packet. In other words, if a path is lost with high probability, the neighboring node that may easily be cut off notifies the source node by sending a forewarning packet. Then the source node can initiate route discovery early and switched to a reliable path potentially avoiding the disconnection altogether. For the simulational study, network simulator(NS2) is used. The result of simulation shows that the algorithm significantly improves the performance of networks comparing to conventional on-demand routing protocols based on DSR and AODV in terms of packet delivery ratio, packet latency and routing overhead.

A Recovery Scheme of Mobile Transaction Based on Updates Propagation for Updating Spatial Data (공간데이터를 변경하는 모바일 트랜잭션의 변경 전파 회복 기법)

  • Kim, Dong-Hyun;Kang, Ju-Ho;Hong, Bong-Hee
    • Journal of Korea Spatial Information System Society
    • /
    • v.5 no.2 s.10
    • /
    • pp.69-82
    • /
    • 2003
  • Mobile transactions updating spatial objects are long transactions that update local objects of mobile clients during disconnection. Since a recovered transaction cannot read the write sets of other transactions committed before the recovery due to disconnection, the recovered transaction may conflicts with them. However, aborting of the recovered long transaction leads to the cancellation of all updates including the recovered updates. It is definitely unsuitable to cancel the recovered updates due to the conflicts. In this paper, we propose the recovery scheme to retrieve foreign conflictive objects from the write sets of other transactions for reducing aborting of a recovered transaction. The foreign conflictive objects are part of the data committed by other transactions and may conflict with the objects updated by the recovered transaction. In the scheme, since the recovered transaction can read both the foreign conflictive objects and the recently checkpoint read set, it is possible to reupdate properly the potentially conflicted objects.

  • PDF