• Title/Summary/Keyword: spreading model

Search Result 444, Processing Time 0.023 seconds

Gird Connected Modeling of Primary Frequency Recovery Reserve Provided by Electric Vehicle Considering Characteristics of Electric Vehicle Charge/Discharge Control Integrated Environment (전기자동차 충·방전제어 통합 환경을 고려한 전기차 1차 주파수 회복예비력의 계통연계형 모델링)

  • Kook, Kyung Soo;Lee, Jihoon;Moon, Jonghee;Choi, Wooyeong;Park, Kijun;Jang, Dongsik
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.7 no.2
    • /
    • pp.249-254
    • /
    • 2021
  • As the spreading speed of electric vehicles increases rapidly, those are expected to be able to use them as flexible resources in the power system beyond the concern for the supply of its charging power. Especially when the Renewable Energy sources (RES) which have no intrinsic control capability have replaced the synchronous generators more and more, the power system needs to secure the additional frequency control resources to ensure its stability. However, the feasibility of using electric vehicles as the frequency control resources should be analyzed from the perspective of the power system operation and it requires the existing simulation frameworks for the power system. Therefore, this paper proposes the grid connected modeling of the primary frequency control provided by electric vehicles which can be integrated into the existing power system model. In addition, the proposed model is implemented considering technical performances constrained by the characteristics of the Vehicle-Grid Integration (VGI) system so that the simulation results can be accepted by the power utilities operating the power system conservatively.

Growth Monitoring for Soybean Smart Water Management and Production Prediction Model Development

  • JinSil Choi;Kyunam An;Hosub An;Shin-Young Park;Dong-Kwan Kim
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2022.10a
    • /
    • pp.58-58
    • /
    • 2022
  • With the development of advanced technology, automation of agricultural work is spreading. In association with the 4th industrial revolution-based technology, research on field smart farm technology is being actively conducted. A state-of-the-art unmanned automated agricultural production demonstration complex was established in Naju-si, Jeollanam-do. For the operation of the demonstration area platform, it is necessary to build a sophisticated, advanced, and intelligent field smart farming model. For the operation of the unmanned automated agricultural production demonstration area platform, we are building data on the growth of soybean for smart cultivated crops and conducting research to determine the optimal time for agricultural work. In order to operate an unmanned automation platform, data is collected to discover digital factors for water management immediately after planting, water management during the growing season, and determination of harvest time. A subsurface drip irrigation system was established for smart water management. Irrigation was carried out when the soil moisture was less than 20%. For effective water management, soil moisture was measured at the surface, 15cm, and 30cm depth. Vegetation indices were collected using drones to find key factors in soybean production prediction. In addition, major growth characteristics such as stem length, number of branches, number of nodes on the main stem, leaf area index, and dry weight were investigated. By discovering digital factors for effective decision-making through data construction, it is expected to greatly enhance the efficiency of the operation of the unmanned automated agricultural production demonstration area.

  • PDF

Design and Evaluation of DRM Model with Strong Security Based on Smart Card (스마트카드 기반의 강한 보안을 갖는 DRM 모델의 설계 및 평가)

  • Park, Jong-Yong;Kim, Young-Hak;Choe, Tae-Young
    • Journal of Digital Contents Society
    • /
    • v.12 no.2
    • /
    • pp.165-176
    • /
    • 2011
  • Recently, digital rights management (DRM) related researches are widely spreading with prosperity of IT industries. The DRM technology protects proprietor of copyright by preventing mischanneling and illegal copy. In this paper, we propose a new DRM model that has an enhanced and efficient protocol based on certificate using smart card. The proposed model overcomes weaknesses of WCDRM model and has following additional advantages: first, copy protection is enhanced by hiding user's specific information from attacker by storing the information within smart card; second, server load for contents encryption is reduced by making clear protocols among author, distributer, certificate authority, and users; third, offline user authentication is guaranteed by combining partial secret values in media players and smart card. Exposure of core information also is minimized by storing them in smart card. In addition, we show that the proposed system is more secure than WCDRM model by comparing various factors of anonymous attackers.

Optimal Control Scheme for SEIR Model in Viral Communications (Viral 통신에서의 SEIR모델을 위한 최적제어 기법)

  • Radwan, Amr
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1487-1493
    • /
    • 2016
  • The susceptible, exposed, infectious, and recovered model (SEIR) is used extensively in the field of epidemiology. On the other hand, dissemination information among users through internet grows exponentially. This information spreading can be modeled as an epidemic. In this paper, we derive the mathematical model of SEIR in viral communication from the view of optimal control theory. Overall the methods based on classical calculus, In order to solve the optimal control problem, proved to be more efficient and accurate. According to Pontryagin's minimum principle (PMP) the Hamiltonian function must be optimized by the control variables at all points along the solution trajectory. We present our method based on the PMP and forward backward algorithm. In this algorithm, one should integrate forward in time for the state equations then integrate backward in time for the adjoint equations resulting from the optimality conditions. The problem is mathematically analyzed and numerically solved as well.

Modeling and Evaluating Information Diffusion for Spam Detection in Micro-blogging Networks

  • Chen, Kan;Zhu, Peidong;Chen, Liang;Xiong, Yueshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.3005-3027
    • /
    • 2015
  • Spam has become one of the top threats of micro-blogging networks as the representations of rumor spreading, advertisement abusing and malware distribution. With the increasing popularity of micro-blogging, the problems will exacerbate. Prior detection tools are either designed for specific types of spams or not robust enough. Spammers may escape easily from being detected by adjusting their behaviors. In this paper, we present a novel model to quantitatively evaluate information diffusion in micro-blogging networks. Under this model, we found that spam posts differ wildly from the non-spam ones. First, the propagations of non-spam posts mostly result from their followers, but those of spam posts are mainly from strangers. Second, the non-spam posts relatively last longer than the spam posts. Besides, the non-spam posts always get their first reposts/comments much sooner than the spam posts. With the features defined in our model, we propose an RBF-based approach to detect spams. Different from the previous works, in which the features are extracted from individual profiles or contents, the diffusion features are not determined by any single user but the crowd. Thus, our method is more robust because any single user's behavior changes will not affect the effectiveness. Besides, although the spams vary in types and forms, they're propagated in the same way, so our method is effective for all types of spams. With the real data crawled from the leading micro-blogging services of China, we are able to evaluate the effectiveness of our model. The experiment results show that our model can achieve high accuracy both in precision and recall.

A proposal of capstone design model for government, academic, and civil cooperative convergence education - A case study on the development of fashion products for the promotion of child rights - (관·학·민 협력 융복합 교육 캡스톤디자인 모델 제시 - 아동권리증진을 위한 패션제품개발 사례를 중심으로 -)

  • Cha, You Mi;Kim, In Kyung
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.21 no.1
    • /
    • pp.131-148
    • /
    • 2019
  • In this study, the purpose of the research is to present a cooperative convergence education Capstone design operational model that can promote community relations by spreading excellent practices through governmental, academic, and civil cooperation, ultimately contributing to the development of systematic plans among cooperative groups for successful promotion, and the production high effects in the fashion sector. The case study presented a new model that combines convergence in interdisciplinary studies, focusing on the case study of the "Fashion Capstone Design" textbook. The characteristics of the proposed model suggested three types of convergence- the convergence of government, academia and private cooperation, and the convergence of academic and civil organizations, depending on their role. The proposed educational model has the advantage of complementing and dealing with the difficulties presented by interdisciplinary education. It also has the effect of activating community linkages with colleges in the community. In addition, the effectiveness of community colleges and community links can be optimized. Through the example of this study, we look forward to being used as a references for a variety of cooperative convergence education capstone design projects.

The Effect of Public PMO Service Quality on Customer Satisfaction and Reuse Intention (공공 PMO 서비스 품질이 고객만족과 고객충성도에 미치는 영향)

  • HYUNG-CHUNG, BACK;JA-HEE, KIM
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.467-474
    • /
    • 2023
  • After the revision of the Software Promotion Act, small and medium-sized enterprises (SMEs) with little experience in e-government projects began to participate in public projects. Accordingly, the government introduced the public Project Management Office (PMO) in July 2013 to reduce the risks and secure the quality of informatization business, and the public PMO is still spreading. However, the public PMO service currently experiences sluggish business, such as low-priced orders, due to cut-throat competition, and thus needs improvement plans. In this research, we establish a research model for quality factors of public PMO services that can be considered for the improvement plans, measure and evaluate quality factors based on the model, and then analyze the impact of service quality on customer satisfaction and customer loyalty. For that, we measure quality factors using the SERVPERF model for those who have used public PMO services, establish a structural equation research model, and empirically analyze and evaluate the impact of quality factors. Lastly, we suggest improvement plans and implications for public PMO services.

The Automation Model of Ransomware Analysis and Detection Pattern (랜섬웨어 분석 및 탐지패턴 자동화 모델에 관한 연구)

  • Lee, Hoo-Ki;Seong, Jong-Hyuk;Kim, Yu-Cheon;Kim, Jong-Bae;Gim, Gwang-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.8
    • /
    • pp.1581-1588
    • /
    • 2017
  • Recently, circulating ransomware is becoming intelligent and sophisticated through a spreading new viruses and variants, targeted spreading using social engineering attack, malvertising that circulate a large quantity of ransomware by hacking advertising server, or RaaS(Ransomware-as-a- Service), from the existing attack way that encrypt the files and demand money. In particular, it makes it difficult to track down attackers by bypassing security solutions, disabling parameter checking via file encryption, and attacking target-based ransomware with APT(Advanced Persistent Threat) attacks. For remove the threat of ransomware, various detection techniques are developed, but, it is very hard to respond to new and varietal ransomware. Accordingly, in this paper, find out a making Signature-based Detection Patterns and problems, and present a pattern automation model of ransomware detecting for responding to ransomware more actively. This study is expected to be applicable to various forms in enterprise or public security control center.

Analysis of the factors related to the infection control practice of 119 emergency medical service providers based on the PRECEDE model (PRECEDE 모형에 기반한 119구급대원의 감염관리 수행 관련 요인 분석)

  • Yang, Yeunsoo;Kimm, Heejin;Jee, Sun Ha;Hong, Seok-Hwan;Han, Sang-Kyun
    • The Korean Journal of Emergency Medical Services
    • /
    • v.24 no.1
    • /
    • pp.7-24
    • /
    • 2020
  • Purpose: Emergency medical service (EMS) personnel are at high risk of spreading infection. In this study, we used the PRECEDE model to identify the knowledge, status, and barriers to infection control among Korean paramedics to provide basic infection control data. Methods: A total of 164 respondents were analyzed for the study. A questionnaire was administered and collected through an online self-response platform. Descriptive analysis, t-test, ANOVA, multiple regression, and logistic regression analyses were performed to determine infection control practices and associated factors using SAS 9.4. To identify the pathways and direct, indirect, total effects based on the PRECEDE model, we used AMOS 26.0. Results: Highly rated self-efficacy (OR 8.82, 95% CI: 3.23-24.09), awareness (OR 6.05, 95% CI: 2.06-17.72), and enabling factors (OR 3.23, 95% CI: 1.18-8.78) led to superior infection control. As a result of the structural model analysis, the highly rated enabling factors and awareness led to superior practice patterns. Conclusion: Practice is related to self-efficacy, awareness, and enabling factors; however, further research is needed to develop strategies for infection control. In particular, institutional arrangements are needed to improve the enabling factors. Improving infection control performance may lead to better infection control and enhanced protection of EMS personnel and patients against infection risks.

Transformation from XML DTD to OODB Schema using Object Model (객체모델을 이용한 XML DTD의 OODB 스키마로의 변환)

  • Choe, Mun-Yeong;Ju, Gyeong-Su
    • The KIPS Transactions:PartD
    • /
    • v.9D no.2
    • /
    • pp.195-202
    • /
    • 2002
  • Information exchange on XML such as B2B electronic commerce is spreading. Therefore the systematic and stable management mechanism for storing the exchanged information is needed. For this goal there are many research activities for connection between XML application and relational database. But because XML data have hierarchical structures and relational database can store only flat-structured data, we need to store XML data in object-oriented database that support hierarchical structure. Accordingly the modeling methodology for storing XML data in object-oriented database is needed. In this parer, the transforming methods based on object model from XML DTD to object-oriented database schema is proposed. For this, we first introduce mapping methods that map XML DTD to object model and then we propose soem methods that transform from the object model to object-oriented database schema.