• Title/Summary/Keyword: network operator

Search Result 394, Processing Time 0.029 seconds

Technological and Architectural trends of a domestically developed DCS system (국산개발 DCS시스템 기술동향 및 구조분석)

  • Lee, Joo-Hyun;Kim, Eung-Seok;Kim, Kwan-Hang
    • Proceedings of the KIEE Conference
    • /
    • 1998.07b
    • /
    • pp.778-780
    • /
    • 1998
  • The distributied control system consists of PCS(Process Control System), OIS(Operator Interface System), Communication Network and EWS(Engineering Workstation). This parer describes the system structures and the technological trends of domestically developed distributied control system (DCS).

  • PDF

Cost-effective Exchange Auto Back Monitoring in Mobile Communication System (교환기 장애 긴급 복구를 위한 중계선 절체 솔루션)

  • An, Jang-Hoon;Yoon, Dae-Hee;Kwon, June-Hyuk
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.242-245
    • /
    • 2008
  • Exchange System for mobile communication operator is very important for providing continuous services to customers. However traditional solution is too expensive for choosing in the real environment. In this paper, we suggest cost-effective auto backup monitoring solution, which is robust for system failure. And this suggested solution will also can be adopted to the $4^{th}$ generation of IP core network.

  • PDF

I2DM : An Improved Identity Management Protocol for Internet Applications in Mobile Networks (모바일 네트워크에서 인터넷 응용을 위한 향상된 ID관리 프로토콜)

  • Park, In-Shin;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.29-38
    • /
    • 2012
  • Due to rapid spread of smart phones and SNS(Social Network Service), using of Internet applications has increased and taking up bandwidth more than 3G network's capacity recently. This caused reduction of speed and service quality, and occurred strong needs that backbone network company to increasing investment costs. Also a great rise of mobile network users causing identity management problems on mobile service provider through mobile network. This paper proposes advanced IDM3G[1] - to solve user ID management and security problems on mobile internet application services over 3G network and more - authentication management protocol. $I^2DM$ protocol breakup loads which made by existing IDM3G protocol's mutual authentication via mobile operator, via sending some parts to internet application service provider, enhancing mobile and ID management of service provider and network load and process load from information handling and numbers of transmitting packets, to suggest more optimized protocol against further demanding of 3G mobile network.

Two-Stage Model for Security Network-Constrained Market Auction in Pool-Based Electricity Market

  • Kim, Mun-Kyeom
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.6
    • /
    • pp.2196-2207
    • /
    • 2017
  • This paper presents a two-stage market auction model in a pool-based electricity market, which explicitly takes into account the system network security. The security network-constrained market auction model considers the use of corrective control to yield economically efficient actions in the post-contingency state, while ensuring a certain security level. Under this framework, the proposed model shows not only for quantifying the correlation between secure system operation and efficient market operation, but also for providing transparent information on the pricing system security for market participants. The two-stage market auction procedure is formulated using Benders decomposition (BD). In the first stage, the market participants bid in the market for maximizing their profit, and the independent system operator (ISO) clears the market based on social welfare maximization. System network constraints incorporating post-contingency control actions are described in the second stage of the market auction procedure. The market solutions, along with the BD, yield nodal spot prices (NSPs) and nodal congestion prices (NCPs) as byproducts of the proposed two-stage market auction model. Two benchmark systems are used to test and demonstrate the effectiveness of the proposed model.

A Hybrid Neural Network Framework for Hour-Ahead System Marginal Price Forecasting (하이브리드 신경회로망을 이용한 한시간전 계통한계가격 예측)

  • Jeong, Sang-Yun;Lee, Jeong-Kyu;Park, Jong-Bae;Shin, Joong-Rin;Kim, Sung-Soo
    • Proceedings of the KIEE Conference
    • /
    • 2005.11b
    • /
    • pp.162-164
    • /
    • 2005
  • This paper presents an hour-ahead System Marginal Price (SMP) forecasting framework based on a neural network. Recently, the deregulation in power industries has impacted on the power system operational problems. The bidding strategy of market participants in energy market is highly dependent on the short-term price levels. Therefore, short-term SMP forecasting is a very important issue to market participants to maximize their profits. and to market operator who may wish to operate the electricity market in a stable sense. The proposed hybrid neural network is composed of tow parts. First part of this scheme is pattern classification to input data using Kohonen Self-Organizing Map (SOM) and the second part is SMP forecasting using back-propagation neural network that has three layers. This paper compares the forecasting results using classified input data and unclassified input data. The proposed technique is trained, validated and tested with historical date of Korea Power Exchange (KPX) in 2002.

  • PDF

LCD Defect Detection using Neural-network based on BEP (BEP기반의 신경회로망을 이용한 LCD 패널 결함 검출)

  • Ko, Jung-Hwan
    • 전자공학회논문지 IE
    • /
    • v.48 no.2
    • /
    • pp.26-31
    • /
    • 2011
  • In this paper we show the LCD simulator for defect inspection using image processing algorithm and neural network. The defect inspection algorithm of the LCD consists of preprocessing, feature extraction and defect classification. Preprocess removes noise from LCD image, using morphology operator and neural network is used for the defect classification. Sample images with scratch, pinhole, and spot from real LCD color filter image are used. From some experiments results, the proposed algorithms show that defect detected and classified in the ratio of 92.3% and 94.5 respectively. Accordingly, in this paper, a possibility of practical implementation of the LCD defect inspection system is finally suggested.

Investigation of Open-Loop Transmit Power Control Parameters for Homogeneous and Heterogeneous Small-Cell Uplinks

  • Haider, Amir;Sinha, Rashmi Sharan;Hwang, Seung-Hoon
    • ETRI Journal
    • /
    • v.40 no.1
    • /
    • pp.51-60
    • /
    • 2018
  • In Long Term Evolution (LTE) cellular networks, the transmit power control (TPC) mechanism consists of two parts: the open loop (OL) and closed loop. Most cellular networks consider OL/TPC because of its simple implementation and low operation cost. The analysis of OL/TPC parameters is essential for efficient resource management from the cellular operator's viewpoint. In this work, the impact of the OL/TPC parameters is investigated for homogeneous small cells and heterogeneous small-cell/macrocell network environments. A mathematical model is derived to compute the transmit power at the user equipment, the received power at the eNodeB, the interference in the network, and the received signal-to-interference ratio. Using the analytical platform, the effects of the OL/TPC parameters on the system performance in LTE networks are investigated. Numerical results show that, in order to achieve the best performance, it is appropriate to choose ${\alpha}_{small}=1$ and $P_{o-small}=-100dBm$ in a homogenous small-cell network. Further, the selections of ${\alpha}_{small}=1$ and $P_{o-small}=-100dBm$ in the small cells and ${\alpha}_{macro}=0.8$ and $P_{o-macro}=-100dBm$ in the macrocells seem to be suitable for heterogeneous network deployment.

Vulnerability Assessment of a Large Sized Power System Using Neural Network Considering Various Feature Extraction Methods

  • Haidar, Ahmed M. A;Mohamed, Azah;Hussian, Aini
    • Journal of Electrical Engineering and Technology
    • /
    • v.3 no.2
    • /
    • pp.167-176
    • /
    • 2008
  • Vulnerability assessment of power systems is important so as to determine their ability to continue to provide service in case of any unforeseen catastrophic contingency such as power system component failures, communication system failures, human operator error, and natural calamity. An approach towards the development of on-line power system vulnerability assessment is by means of using an artificial neural network(ANN), which is being used successfully in many areas of power systems because of its ability to handle the fusion of multiple sources of data and information. An important consideration when applying ANN in power system vulnerability assessment is the proper selection and dimension reduction of training features. This paper aims to investigate the effect of using various feature extraction methods on the performance of ANN as well as to evaluate and compare the efficiency of the proposed feature extraction method named as neural network weight extraction. For assessing vulnerability of power systems, a vulnerability index based on power system loss is used and considered as the ANN output. To illustrate the effectiveness of ANN considering various feature extraction methods for vulnerability assessment on a large sized power system, it is verified on the IEEE 300-bus test system.

Reviews of Bus Transit Route Network Design Problem (버스 노선망 설계 문제(BTRNDP)의 고찰)

  • Han, Jong-Hak;Lee, Seung-Jae;Lim, Seong-Su;Kim, Jong-Hyung
    • Journal of Korean Society of Transportation
    • /
    • v.23 no.3 s.81
    • /
    • pp.35-47
    • /
    • 2005
  • This paper is to review a literature concerning Bus Transit Route Network Design(BTRNDP), to describe a future study direction for a systematic application for the BTRNDP. Since a bus transit uses a fixed route, schedule, stop, therefore an approach methodology is different from that of auto network design problem. An approach methodology for BTRNDP is classified by 8 categories: manual & guideline, market analysis, system analytic model. heuristic model. hybrid model. experienced-based model. simulation-based model. mathematical optimization model. In most previous BTRNDP, objective function is to minimize user and operator costs, and constraints on the total operator cost, fleet size and service frequency are common to several previous approach. Transit trip assignment mostly use multi-path trip assignment. Since the search for optimal solution from a large search space of BTRNDP made up by all possible solutions, the mixed combinatorial problem are usually NP-hard. Therefore, previous researches for the BTRNDP use a sequential design process, which is composed of several design steps as follows: the generation of a candidate route set, the route analysis and evaluation process, the selection process of a optimal route set Future study will focus on a development of detailed OD trip table based on bus stop, systematic transit route network evaluation model. updated transit trip assignment technique and advanced solution search algorithm for BTRNDP.

Design and Operation of a Multipath Reservation-Based Remote Crane Control System (다중경로 예약 기반 크레인 원격 운전시스템 설계 및 운용)

  • Choi Dae-Woo;Lho Tae-Jung;Kim Jin-Young
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.9
    • /
    • pp.816-821
    • /
    • 2005
  • The remote operation of $4\~5$ cranes for container loading/unloading at a port by one operator will dramatically improve loading/unloading efficiency through productivity increase, cost reduction, and so on. This study develops a remote crane control system for container loading/unloading yard cranes. First, a wireless video and audio system to transmit views and sounds of the working field is designed by using 3 web cameras and a microphone. Next, a RSVP-based multi-path reservation method is presented with a view to improving the quality of service in the communication network for remote control. Simulation results show that a RSVP-based multi-path reservation can enhance the reservation success rate in the TCP/IP network.