• Title/Summary/Keyword: generating operators

Search Result 44, Processing Time 0.027 seconds

A study on the maximum penetration limit of wind power considering output limit of WTGs (풍력발전기 출력제한을 고려한 풍력한계용량 산정에 관한 연구)

  • Kim, Hyeong-Taek;Myeong, Ho-San;Kim, Se-Ho
    • Journal of the Korean Solar Energy Society
    • /
    • v.31 no.6
    • /
    • pp.23-31
    • /
    • 2011
  • The wind energy is one of the most prospective resources in renewable energy. However, the WTGS shouldn't be installed indiscriminately because the power system can be negatively influenced by a variable and uncertain nature of the wind energy. It is the reason why it has to be limited to install the WTGS thoughtlessly mentioned above that support the importance of the maximum penetration limit of wind power. It may required that power system operators suggests a new way of power system operation as percentage of the WTGS increase in the existing power system. The wind power is fixed in a limited area, so using rate of the wind power will be increased by installing additional WTGS. In this paper, we have studied on economic evaluation of the wind capacity increased by restricting the output of the WTGS as the way to increase the wind capacity.

Proposing a New Method for Calculating Reactive Power Service Charges using the Reactive Power Market

  • Ro, Kyoung-Soo;Park, Sung-Jin
    • KIEE International Transactions on Power Engineering
    • /
    • v.4A no.4
    • /
    • pp.262-267
    • /
    • 2004
  • With the advent of electric power systems moving from a vertically integrated structure to a deregulated environment, calculating reactive power service charges has become a new and challenging theme for market operators. This paper examines various methods for reactive power management adopted throughout various deregulated foreign and domestic markets and then proposes an innovative method to calculate reactive power service charges using a reactive power market in a wholesale electricity market. The reactive power market is operated based on bids from the generating sources and it settles on uniform prices by running the reactive OPF programs of the day-ahead electricity market. The proposed method takes into account recovering not only the costs of installed capacity but also the lost opportunity costs incurred by reducing active power output to increase reactive power production. Based on the result of the reactive OPF program, the generators that produce reactive power within the obligatory range do not make payments whereas the generators producing reactive power beyond the obligatory range receive compensation by the price determined in the market. A numerical sample study is carried out to illustrate the processes and appropriateness of the proposed method.

A Study on the Web-based Overall Information Management System Developement of the Overhead Distribution Facilities Using SIAS (SIAS를 이용한 웹 기반 가동배전설비 종합 정보관리 시스템 개발에 관한 연구)

  • Lee, Dong-Yeop;Kim, Dong-Sik
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.5
    • /
    • pp.898-904
    • /
    • 2009
  • The objective of the present study lies in constructing web-based GIS system providing broad range of information applicable for power/telecommunications distribution facilities through cable. Nowadays, Korea is renowned forits faste sttele communications network across the nation enjoyable for being a test-runbed by worldwide contents providers. It is not too much to say that the trend is caused by the fact that Korea utilizes the cobweb-like power transmission cables applicable for the nationwide telecommunications networking. In particular, the trend has been all the more encouraged by the governmental drive to expedite the telecommunication network by way of the established power transmission facilities deemed as publicutility. Nevertheless, few can deny that the overexcessive competition among telecommunication service providers increasingly gives rise to unauthorized, arbitrary facilitation of distribution devices, which becomes much burden in operating the normal power/telecommunications distribution facilities by a power-generating company. In this regard, the study, to cope with such problems, attempts to develop a web GIS-based information management system compatible with NDIS(New Distribution Information System), a distribution facility management system now under operation by KEPCO, making advantage of GE Energy's SIAS(Smallworld Internet Application) technology. The model provided by this study is expected to get closer into effective operation of distribution facilities along with better sharing of information among conventional telecommunications operators, while getting rid of infringed facilitation cases

The Development Strategies of the Port of Busan in the Midst of Rapidly Growing Chinese Economy (중국 경제의 급부상에 따른 부산항의 발전전략)

  • 배병태
    • Journal of Korea Port Economic Association
    • /
    • v.18 no.2
    • /
    • pp.109-133
    • /
    • 2002
  • The China entered World Trade Oganization(WTO) last year, thus opening its border to more - and freer - trade. With its foreign trade rapidly expanding and with economic growth continuing at a substantial -rate, China will be the largest container traffic generating country in the world. In the light of this potential trade bonanza, regional ports in North-East Asia strive to gain a competitive-edge. The Port of Busan, the world's third largest container port, wants to capture a significant share of the china's container cargoes. In this circumstance, development strategies of the Port of Busan are suggested as follows. First, to cope with increasing volumes, the New Busan Port on Gaduk island should be constructed without failure. Second, it is necessary to add modernized high-performance gantry cranes and to train crane operators' skill. Third, it needs to apply Dwell Time- Sliding Scale System for transshipment cargoes. Fourth, it needs to develop the EDI network in terminal areas or adjacent hub ports to exchange trustworthy and satisfactory informations Fifth, port authority -needs to enlarge designated Free Trade Zone to facilitate the free flow of cargoes. Sixth, the restoration of rail links between North and South Korea is abundantly clear. Thus it needs to enlarge railroad facilities in advance. Seventh, it needs to establish the Port Authority of Busan immediately. Finally, it needs to strengthen port sales and to open events like 'Marine Week 2001' regularly to attract potential canters or big shippers.

  • PDF

An Intra Prediction Hardware Architecture Design for Computational Complexity Reduction of HEVC Decoder (HEVC 복호기의 연산 복잡도 감소를 위한 화면내 예측 하드웨어 구조 설계)

  • Jung, Hongkyun;Ryoo, Kwangki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1203-1212
    • /
    • 2013
  • In this paper, an intra prediction hardware architecture is proposed to reduce computational complexity of intra prediction in HEVC decoder. The architecture uses shared operation units and common operation units and adopts a fast smoothing decision algorithm and a fast algorithm to generate coefficients of a filter. The shared operation unit shares adders processing common equations to remove the computational redundancy. The unit computes an average value in DC mode for reducing the number of execution cycles in DC mode. In order to reduce operation units, the common operation unit uses one operation unit generating predicted pixels and filtered pixels in all prediction modes. In order to reduce processing time and operators, the decision algorithm uses only bit-comparators and the fast algorithm uses LUT instead of multiplication operators. The proposed architecture using four shared operation units and eight common operation units which can reduce execution cycles of intra prediction. The architecture is synthesized using TSMC 0.13um CMOS technology. The gate count and the maximum operating frequency are 40.5k and 164MHz, respectively. As the result of measuring the performance of the proposed architecture using the extracted data from HM 7.1, the execution cycle of the architecture is about 93.7% less than the previous design.

A Qualitative Study on Facilitating Factors of User-Created Contents: Based on Theories of Folklore (사용자 제작 콘텐츠의 활성화 요인에 대한 정성적 연구: 구비문학 이론을 중심으로)

  • Jung, Seung-Ki;Lee, Ki-Ho;Lee, In-Seong;Kim, Jin-Woo
    • Asia pacific journal of information systems
    • /
    • v.19 no.2
    • /
    • pp.43-72
    • /
    • 2009
  • Recently, user-created content (UCC) have emerged as popular medium of on-line participation among users. The Internet environment has been constantly evolving, attracting active participation and information sharing among common users. This tendency is a significant deviation from the earlier Internet use as an one-way information channel through which users passively received information or contents from contents providers. Thanks to UCCs online users can now more freely generate and exchange contents; therefore, identifying the critical factors that affect content-generating activities has increasingly become an important issue. This paper proposes a set of critical factors for stimulating contents generation and sharing activities by Internet users. These factors were derived from the theories of folklores such as tales and songs. Based on some shared traits of folklores and UCC content, we found four critical elements which should be heeded in constructing UCC contents, which are: context of culture, context of situation, skill of generator, and response of audience. In addition, we selected three major UCC websites: a specialized contents portal, a general internet portal, and an official contents service site, They have different use environments, user interfaces, and service policies, To identify critical factors for generating, sharing and transferring UCC, we traced user activities, interactions and flows of content in the three UCC websites. Moreover, we conducted extensive interviews with users and operators as well as policy makers in each site. Based on qualitative and quantitative analyses of the data, this research identifies nine critical factors that facilitate contents generation and sharing activities among users. In the context of culture, we suggest voluntary community norms, proactive use of copyrights, strong user relationships, and a fair monetary reward system as critical elements in facilitating the process of contents generation and sharing activities. Norms which were established by users themselves regulate user behavior and influence content format. Strong relationships of users stimulate content generation activities by enhancing collaborative content generation. Particularly, users generate contents through collaboration with others, based on their enhanced relationship and specialized skills. They send and receive contents by leaving messages on website or blogs, using instant messenger or SMS. It is an interesting and important phenomenon, because the quality of contents can be constantly improved and revised, depending on the specialized abilities of those engaged in a particular content. In this process, the reward system is an essential driving factor. Yet, monetary reward should be considered only after some fair criterion is established. In terms of the context of the situation, the quality of contents uploading system was proposed to have strong influence on the content generating activities. Among other influential factors on contents generation activities are generators' specialized skills and involvement of the users were proposed. In addition, the audience response, especially effective development of shared interests as well as feedback, was suggested to have significant influence on contents generation activities. Content generators usually reflect the shared interest of others. Shared interest is a distinct characteristic of UCC and observed in all the three websites, in which common interest is formed by the "threads" embedded with content. Through such threads of information and contents users discuss and share ideas while continuously extending and updating shared contents in the process. Evidently, UCC is a new paradigm representing the next generation of the Internet. In order to fully utilize this innovative paradigm, we need to understand how users take advantage of this medium in generating contents, and what affects their content generation activities. Based on these findings, UCC service providers should design their websites as common playground where users freely interact and share their common interests. As such this paper makes an important first step to gaining better understand about this new communication paradigm created by UCC.

De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining

  • Su, Xin;Liu, Xuchong;Lin, Jiuchuang;He, Shiming;Fu, Zhangjie;Li, Wenjia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.3230-3253
    • /
    • 2017
  • Android malware steals users' private information, and embedded unsafe advertisement (ad) libraries, which execute unsafe code causing damage to users. The majority of such traffic is HTTP and is mixed with other normal traffic, which makes the detection of malware and unsafe ad libraries a challenging problem. To address this problem, this work describes a novel HTTP traffic flow mining approach to detect and categorize Android malware and unsafe ad library. This work designed AndroCollector, which can automatically execute the Android application (app) and collect the network traffic traces. From these traces, this work extracts HTTP traffic features along three important dimensions: quantitative, timing, and semantic and use these features for characterizing malware and unsafe ad libraries. Based on these HTTP traffic features, this work describes a supervised classification scheme for detecting malware and unsafe ad libraries. In addition, to help network operators, this work describes a fine-grained categorization method by generating fingerprints from HTTP request methods for each malware family and unsafe ad libraries. This work evaluated the scheme using HTTP traffic traces collected from 10778 Android apps. The experimental results show that the scheme can detect malware with 97% accuracy and unsafe ad libraries with 95% accuracy when tested on the popular third-party Android markets.

Relevance Feedback Method of an Extended Boolean Model using Hierarchical Clustering Techniques (계층적 클러스터링 기법을 이용한 확장 불리언 모델의 적합성 피드백 방법)

  • 최종필;김민구
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.10
    • /
    • pp.1374-1385
    • /
    • 2004
  • The relevance feedback process uses information obtained from a user about an initially retrieved set of documents to improve subsequent search formulations and retrieval performance. In the extended Boolean model, the relevance feedback Implies not only that new query terms must be identified, but also that the terms must be connected with the Boolean AND/OR operators properly Salton et al. proposed a relevance feedback method for the extended Boolean model, called the DNF (disjunctive normal form) method. However, this method has a critical problem in generating a reformulated queries. In this study, we investigate the problem of the DNF method and propose a relevance feedback method using hierarchical clustering techniques to solve the problem. We show the results of experiments which are performed on two data sets: the DOE collection in TREC 1 and the Web TREC 10 collection.

Concept Optimization for Mechanical Product Using Genetic Algorithm

  • Huang Hong Zhong;Bo Rui Feng;Fan Xiang Feng
    • Journal of Mechanical Science and Technology
    • /
    • v.19 no.5
    • /
    • pp.1072-1079
    • /
    • 2005
  • Conceptual design is the first step in the overall process of product design. Its intrinsic uncertainty, imprecision, and lack of information lead to the fact that current conceptual design activities in engineering have not been computerized and very few CAD systems are available to support conceptual design. In most of the current intelligent design systems, approach of principle synthesis, such as morphology matrix, bond graphic, or design catalogues, is usually adopted to deal with the concept generation, in which optional concepts are generally combined and enumerated through function analysis. However, as a large number of concepts are generated, it is difficult to evaluate and optimize these design candidates using regular algorithm. It is necessary to develop a new approach or a tool to solve the concept generation. Generally speaking, concept generation is a problem of concept synthesis. In substance, this process of developing design candidate is a combinatorial optimization process, viz., the process of concept generation can be regarded as a solution for a state-place composed of multi-concepts. In this paper, genetic algorithm is utilized as a feasible tool to solve the problem of combinatorial optimization in concept generation, in which the encoding method of morphology matrix based on function analysis is applied, and a sequence of optimal concepts are generated through the search and iterative process which is controlled by genetic operators, including selection, crossover, mutation, and reproduction in GA. Several crucial problems on GA are discussed in this paper, such as the calculation of fitness value and the criteria for heredity termination, which have a heavy effect on selection of better concepts. The feasibility and intellectualization of the proposed approach are demonstrated with an engineering case. In this work concept generation is implemented using GA, which can facilitate not only generating several better concepts, but also selecting the best concept. Thus optimal concepts can be conveniently developed and design efficiency can be greatly improved.

Design and Implementation of Unmanned Surface Vehicle JEROS for Jellyfish Removal (해파리 퇴치용 자율 수상 로봇의 설계 및 구현)

  • Kim, Donghoon;Shin, Jae-Uk;Kim, Hyongjin;Kim, Hanguen;Lee, Donghwa;Lee, Seung-Mok;Myung, Hyun
    • The Journal of Korea Robotics Society
    • /
    • v.8 no.1
    • /
    • pp.51-57
    • /
    • 2013
  • Recently, the number of jellyfish has been rapidly grown because of the global warming, the increase of marine structures, pollution, and etc. The increased jellyfish is a threat to the marine ecosystem and induces a huge damage to fishery industries, seaside power plants, and beach industries. To overcome this problem, a manual jellyfish dissecting device and pump system for jellyfish removal have been developed by researchers. However, the systems need too many human operators and their benefit to cost is not so good. Thus, in this paper, the design, implementation, and experiments of autonomous jellyfish removal robot system, named JEROS, have been presented. The JEROS consists of an unmanned surface vehicle (USV), a device for jellyfish removal, an electrical control system, an autonomous navigation system, and a vision-based jellyfish detection system. The USV was designed as a twin hull-type ship, and a jellyfish removal device consists of a net for gathering jellyfish and a blades-equipped propeller for dissecting jellyfish. The autonomous navigation system starts by generating an efficient path for jellyfish removal when the location of jellyfish is received from a remote server or recognized by a vision system. The location of JEROS is estimated by IMU (Inertial Measurement Unit) and GPS, and jellyfish is eliminated while tracking the path. The performance of the vision-based jellyfish recognition, navigation, and jellyfish removal was demonstrated through field tests in the Masan and Jindong harbors in the southern coast of Korea.