• Title/Summary/Keyword: network stability factor

Search Result 71, Processing Time 0.032 seconds

Maximization of Transmission System Loadability with Optimal FACTS Installation Strategy

  • Chang, Ya-Chin;Chang, Rung-Fang
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.5
    • /
    • pp.991-1001
    • /
    • 2013
  • Instead of building new substations or transmission lines, proper installation of flexible AC transmission systems (FACTS) devices can make the transmission networks accommodate more power transfers with less expansion cost. In this paper, the problem to maximize power system loadability by optimally installing two types of FACTS devices, namely static var compensator (SVC) and thyristor controlled series compensator (TCSC), is formulated as a mixed discrete-continuous nonlinear optimization problem (MDCP). To reduce the complexity of the problem, the locations suitable for SVC and TCSC installations are first investigated with tangent vector technique and real power flow performance index (PI) sensitivity factor and, with the specified locations for SVC and TCSC installations, a set of schemes is formed. For each scheme with the specific locations for SVC and TCSC installations, the MDCP is reduced to a continuous nonlinear optimization problem and the computing efficiency can be largely improved. Finally, to cope with the technical and economic concerns simultaneously, the scheme with the biggest utilization index value is recommended. The IEEE-14 bus system and a practical power system are used to validate the proposed method.

An Authentication Protocol using the EXOR and the Hash Function in RFID/USN (RFID/USN에서의 EXOR과 해쉬 함수를 이용한 인증 프로토콜)

  • Shin, Jin-Seob;Park, Young-Ho
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.2
    • /
    • pp.24-29
    • /
    • 2007
  • The essential factor of ubiquitous is security technology to properly prepare making possible network access, economic and convenient information exchange. This paper proposes an authentication protocol for RFID as one technology to realize such an ubiquitous. The proposed protocol used only the EXOR and the hash function operations reduces operations at RFID tag, which improves stability compared to existing protocols.

  • PDF

The Program Development for Real-Time Monitoring And Control of RF Output

  • Shin, Gang-wook;Hong, Sung-Tak;Yang, Jae-Rheen
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.69.6-69
    • /
    • 2001
  • The SSPA makes the power level of EIRP up to 16W, and compensates for temperature to the SSPA´s maximum stability. The up and the down converters are dually conversed like as individual synthesizers for selecting of independent transmit-receive transponder. The function of the up-converter is to convert the 70MHz IF signal modulated in the indoor unit modem into a 14.0 ∼ 14.5 GHz Ku-band up-link signal to be sent to the antenna. The down-converter converts the 12.25 ∼ 12.75 GHz Ku-band down-link signal or a trouble malfunction of SSPA may be a fatal factor to operation of the whole satellite communication network. Therefore, this study developed the remote monitoring and control program to monitor the SSPA´s status before the problem occurs for stable operation of the system. This software ...

  • PDF

Relation of Social Security Network, Community Unity and Local Government Trust (지역사회 사회안전망구축과 지역사회결속 및 지방자치단체 신뢰의 관계)

  • Kim, Yeong-Nam;Kim, Chan-Sun
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.7-36
    • /
    • 2015
  • This study aims at analyzing difference of social Security network, Community unity and local government trust according to socio-demographical features, exploring the relation of social Security network, Community unity and local government trust according to socio-demographical features, presenting results between each variable as a model and verifying the property of mutual ones. This study sampled general citizens in Gwangju for about 15 days Aug. 15 through Aug. 30, 2014, distributed total 450 copies using cluster random sampling, gathered 438 persons, 412 persons of whom were used for analysis. This study verified the validity and credibility of the questionnaire through an experts' meeting, preliminary test, factor analysis and credibility analysis. The credibility of questionnaire was ${\alpha}=.809{\sim}{\alpha}=.890$. The inout data were analyzed by study purpose using SPSSWIN 18.0, as statistical techniques, factor analysis, credibility analysis, correlation analysis, independent sample t verification, ANOVA, multi-regression analysis, path analysis etc. were used. the findings obtained through the above study methods are as follows. First, building a social Security network has an effect on Community institution. That is, the more activated a, the higher awareness on institution. the more activated street CCTV facilities, anti-crime design, local government Security education, the higher the stability. Second, building a social Security network has an effect on trust of local government. That is, the activated local autonomous anti-crime activity, anti-crime design. local government's Security education, police public oder service, the more increased trust of policy, service management, busines performance. Third, Community unity has an effect on trust of local government. That is, the better Community institution is achieved, the higher trust of policy. Also the stabler Community institution, the higher trust of business performance. Fourth, building a social Security network has a direct or indirect effect on Community unity and local government trust. That is, social Security network has a direct effect on trust of local government, but it has a higher effect through Community unity of parameter. Such results showed that Community unity in Gwangju Region is an important factor, which means it is an important variable mediating building a social Security network and trust of local government. To win trust of local residents, we need to prepare for various cultural events and active communication space and build a social Security network for uniting them.

  • PDF

Designing Index for Assessing Structural Vulnerability of Supply Chain considering Risk Propagation (위험 전파 모형을 고려한 공급사슬의 구조적 취약성 평가 지표 설계)

  • Moon, Hyangki;Shin, KwangSup
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.125-140
    • /
    • 2015
  • It is general that the impact of supply chain risk spread out to the whole network along the connected structure. Due to the risk propagation the probability to exposure a certain risk is affected by not only the characteristics of each risk factor but also network structure. It means that the structural connectivity among vertices should be considered while designing supply chain network in order to minimize disruption cost. In this research, the betweenness centrality has been utilized to quantitatively assess the structural vulnerability. The betweenness centrality is interpreted as the index which can express both the probability of risk occurrence and propagation of risk impact. With the structural vulnerability index, it is possible to compare the stability of each alternative supply chain structure and choose the better one.

A Study on the Selecting Factors of Manufacturing and Logistic Hub in Far Eastern Area (극동지역 제조 및 물류거점 선정요인 중요도 분석에 관한 연구)

  • Kim, Hak-so;Han, Ji-young
    • Journal of Korea Port Economic Association
    • /
    • v.32 no.4
    • /
    • pp.29-39
    • /
    • 2016
  • As geopolitical, archaeological and strategic interests on cooperation with countries in the Far Eastern Area is gradually increased, countries are competing to attract or install a logistics or manufacturing hub in their countries. In this study, we investigated the relative importance of factors on the main three and nine detailed criteria from the domestic and overseas experts on Far Eastern Area. Using AHP(Analytic Hierarchy Process) analysis, priority importance of factors was derived. As a result, we find that the most important factor was economic factor. In detail, industrial complex creation was the highest factor and the institutional guarantees for the investment on policy and transportation network was second highest factor. Based on analysis result, specific competitiveness level in the 10 region of Far East was follows. Hunchun, Vladivostok, Yanji, Tumen, Rajin, Hassan, Ussuriysk, Cheongjin, Mihaylov Skiing, Nije Jeuchinski were showed in order. Hunchun showed the highest competitive level in location, topography, compliance to the around cities, transportation network, industrial complex, excellence in logistics facilities, long-term investment plans, institutional guarantees for investment, customs efficiency and political stability. However, in other factors such as population and number of households, public facilities, potential demand and resource utilization, Vladivostok showed the highest level.

Development and Validation of Adaptive Game Use Scale (AGUS) (적응적 게임활용 척도 개발 및 타당화)

  • Hoon-Seok Choi ;Kyo-Heon Kim ;Joung Soon Ryong ;Keum-Mi Kim
    • Korean Journal of Culture and Social Issue
    • /
    • v.15 no.4
    • /
    • pp.565-589
    • /
    • 2009
  • The present study explored the major components of adaptive game behavior among adolescents in Korea. Based on relevant research and a pilot testing, an Adaptive Game Use Scale (AGUS) was developed and validated. A stratified sampling procedure was used to draw a representative sample, and a total of 600 male and female students from middle schools and high schools in various regions participated in the study. Factor analyses revealed 7 facets of adaptive game behavior, including experiencing vitality, expanding life experience, making good use of leisure time, experiencing flow, exercising control, experiencing self-esteem, maintaining and expanding social network. Internal consistency and temporal stability(4 weeks) of the scale were both high. A confirmatory factor analysis indicated that a 7-factor hierarchical model fits well with the data. Moreover, additional analyses suggested that AGUS and game addiction are conceptually distinct. Correlational analyses also indicated that AGUS has good discriminant validity and concurrent validity. Implications of the findings and future directions were discussed.

  • PDF

Cure and Mechanical Behaviors of Cycloaliphatic/DGEBA Epoxy Blend System using Electron-Beam Technique (전자선 조사에 의한 고리지방족/DGEBA 에폭시 블렌드 시스템의 경화 및 기계적 특성)

  • 이재락;허건영;박수진
    • Polymer(Korea)
    • /
    • v.27 no.3
    • /
    • pp.210-216
    • /
    • 2003
  • 4-Vinyl-1-cyclohexene diepoxide (VCE)/diglycidyl ether of bisphenol-A (DGEBA) epoxy blends with benzylquinoxalinium hexafluoroanti-monate were cured using an electron-beam technique. The effect of DGEBA content to VCE on cure behavior, thermal stabilities, and mechanical properties was investigated. The composition of VCE/DGEBA blend system vaned within 100:0, 80:20, 60:40, 40:60, 20:80, and 0:100 wt%. The cure behavior and thermal stability of the cured specimens was monited by near-infrared spectroscopy and thermogravimetric analysis, respectively. Also, the critical stress intensity factor ($_{4}$) test of the cured specimens was performed to study the mechanical interfacial properties. As a result, the decreases of short side-chain structure and chain scission were observed in NIR measurements as the DGEBA content increases, resulting in varying the hydroxyl and carbonyl groups. And, the initial decomposition temperature (IDT), temperature of maximum weight loss (T$\_$max/), and decomposition activation energy (E$\_$d/) as thermal stability factors were increased with increasing the DGEBA content. These results could be explained by mean of decreasing viscosity, stable aromatic ring structure, and grafted interpenetrating polymer network with increasing of DGEBA content. Also, the maximum $_{4}$ value showed at mixing ratio of 40:60 wt% in this blend system. in this blend system.

An Efficient Routing Algorithm Considering Packet Collisions in Cognitive Radio Ad-hoc Network (CR Ad-hoc Network에서 패킷 충돌을 고려한 효율적인 경로탐색 알고리즘)

  • Kim, Jin-Su;Choi, Jun-Ho;Shin, Myeong-Jin;Lee, Ji-Seon;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.9
    • /
    • pp.751-764
    • /
    • 2013
  • In cognitive radio ad-hoc networks, common control channel overload and packet collisions are occured due to indiscriminate broadcasting of control packets. So that the path reliability is reduced and control channel is easily saturated. In this paper, we propose a new routing algorithm considering the probability of appearance of primary user and channel status of neighbor nodes. When the source node needs to transmit a data packet to the destination, it performs route discovery process by exchanging control messages using a control channel in ADOV CR Ad-hoc networks. If any intermediate node doesn't have common data channel with previous node to transmit data, it doesn't rebroadcast control packet. And if it has common data channels with previous node, each node determines channel contribution factor with the number of common channels. Based on the channel contribution factor, each node performs different back-off broadcasting. In addition, each node controls control packet flooding by applying to proposed advanced mode using such as number of available channels and channel stability. With the proposed method, the number of control packets to find the data transmission path and the probability of collision among control packets can be decreased. While the path reliability can be increased. Through simulation, we show that our proposed algorithm reduces packet collisions in comparison with the traditional algorithm.

Advanced discretization of rock slope using block theory within the framework of discontinuous deformation analysis

  • Wang, Shuhong;Huang, Runqiu;Ni, Pengpeng;Jeon, Seokwon
    • Geomechanics and Engineering
    • /
    • v.12 no.4
    • /
    • pp.723-738
    • /
    • 2017
  • Rock is a heterogeneous material, which introduces complexity in the analysis of rock slopes, since both the existing discontinuities within the rock mass and the intact rock contribute to the degradation of strength. Rock failure is often catastrophic due to the brittle nature of the material, involving the sliding along structural planes and the fracturing of rock bridge. This paper proposes an advanced discretization method of rock mass based on block theory. An in-house software, GeoSMA-3D, has been developed to generate the discrete fracture network (DFN) model, considering both measured and artificial joints. Measured joints are obtained from the photogrammetry analysis on the excavation face. Statistical tools then facilitate to derive artificial joints within the rock mass. Key blocks are searched to provide guidance on potential reinforcement measures. The discretized blocky system is subsequently implemented into a discontinuous deformation analysis (DDA) code. Strength reduction technique is employed to analyze the stability of the slope, where the factor of safety can be obtained once excessive deformation of slope profile is observed. The combined analysis approach also provides the failure mode, which can be used to guide the choice of strengthening strategy if needed. Finally, an illustrated example is presented for the analysis of a rock slope of 20 m height inclined at $60^{\circ}$ using combined GeoSMA-3D and DDA calculation.