• Title/Summary/Keyword: systems approach method

Search Result 3,708, Processing Time 0.033 seconds

A Method for Determining Sending Rates of Peers for Efficient Network Resource Utilization in P2P Environment (P2P 환경에서 효율적 망 자원 이용을 위한 피어의 송신률 결정 방법)

  • Park, Jaesung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.2
    • /
    • pp.99-102
    • /
    • 2012
  • The performance of P2P application services may be improved by reducing unnecessary inter-network traffic through intelligent peer selection. However, since a logical link between peers in a P2P overlay network is composed of a set of physical links in an underlay network, the traffic pattern determined by the sending rates of selected peers imposes loads on each underlay links. Thus, if the sending rates are not determined carefully, the loads between underlay links may not be balanced, which means some links are underloaded while the other links are congested. In this paper, we take an optimization approach to determine the sending rates of peers strategically to avoid the inefficient use of underlay links. The proposed scheme also guarantee the minimum receiving rates of peers while minimizing the maximum link utilization of underlay links, which is beneficial both to P2P applications and an underlay network.

Stationary Frame Current Control Evaluations for Three-Phase Grid-Connected Inverters with PVR-based Active Damped LCL Filters

  • Han, Yang;Shen, Pan;Guerrero, Josep M.
    • Journal of Power Electronics
    • /
    • v.16 no.1
    • /
    • pp.297-309
    • /
    • 2016
  • Grid-connected inverters (GCIs) with an LCL output filter have the ability of attenuating high-frequency (HF) switching ripples. However, by using only grid-current control, the system is prone to resonances if it is not properly damped, and the current distortion is amplified significantly under highly distorted grid conditions. This paper proposes a synchronous reference frame equivalent proportional-integral (SRF-EPI) controller in the αβ stationary frame using the parallel virtual resistance-based active damping (PVR-AD) strategy for grid-interfaced distributed generation (DG) systems to suppress LCL resonance. Although both a proportional-resonant (PR) controller in the αβ stationary frame and a PI controller in the dq synchronous frame achieve zero steady-state error, the amplitude- and phase-frequency characteristics differ greatly from each other except for the reference tracking at the fundamental frequency. Therefore, an accurate SRF-EPI controller in the αβ stationary frame is established to achieve precise tracking accuracy. Moreover, the robustness, the harmonic rejection capability, and the influence of the control delay are investigated by the Nyquist stability criterion when the PVR-based AD method is adopted. Furthermore, grid voltage feed-forward and multiple PR controllers are integrated into the current loop to mitigate the current distortion introduced by the grid background distortion. In addition, the parameters design guidelines are presented to show the effectiveness of the proposed strategy. Finally, simulation and experimental results are provided to validate the feasibility of the proposed control approach.

A Formal Approach for the Reorganization of Class Hierarchies for the Extension of Object Oriented Applications (객체지향 어플리케이션의 확장을 위한 클래스 계층 구조의 재구성에 대한 정형기법)

  • Hwang, Suk-Hyung;Kim, Dae-Won;Yang, Hae-Sool
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.589-602
    • /
    • 1999
  • There are some advantages of developing applications based on the object oriented concepts. One os them is that it is possible to reuse the existing designs and products. This paper provides a formal method for the reorganization of class hierarchies for the object extension in the object oriented design phase. In this paper, we introduce classes, and edges to represent the inheritance and aggregation relationship between classes. Based on the graph, we define an order relation(called the object extension) between class hierarchy graphs. And also we present a set of five basic transformations preserving the object extension relation. The set is proven to be correct and complete. The results of this paper help form a theoretical basis for the extension and reorganization object-oriented application systems.

  • PDF

Disambiguation of Homograph Suffixes using Lexical Semantic Network(U-WIN) (어휘의미망(U-WIN)을 이용한 동형이의어 접미사의 의미 중의성 해소)

  • Bae, Young-Jun;Ock, Cheol-Young
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.1 no.1
    • /
    • pp.31-42
    • /
    • 2012
  • In order to process the suffix derived nouns of Korean, most of Korean processing systems have been registering the suffix derived nouns in dictionary. However, this approach is limited because the suffix is very high productive. Therefore, it is necessary to analyze semantically the unregistered suffix derived nouns. In this paper, we propose a method to disambiguate homograph suffixes using Korean lexical semantic network(U-WIN) for the purpose of semantic analysis of the suffix derived nouns. 33,104 suffix derived nouns including the homograph suffixes in the morphological and semantic tagged Sejong Corpus were used for experiments. For the experiments first of all we semantically tagged the homograph suffixes and extracted root of the suffix derived nouns and mapped the root to nodes in the U-WIN. And we assigned the distance weight to the nodes in U-WIN that could combine with each homograph suffix and we used the distance weight for disambiguating the homograph suffixes. The experiments for 35 homograph suffixes occurred in the Sejong corpus among 49 homograph suffixes in a Korean dictionary result in 91.01% accuracy.

A Study on Damping Improvement of a Synchronous Generator with Static VAR Compensator using a Fuzzy-PI Controller (퍼지-PI 제어기를 이용하여 정지형 무효전력 보상기를 포함한 동기 발전기의 안정도 개선에 관한 연구)

  • 주석민;허동렬;김상효;정동일;정형환
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.15 no.3
    • /
    • pp.57-66
    • /
    • 2001
  • This paper resents a control approach for designing a fuzzy-PI controller for a synchronous generator excitation and SVC system A combination of thyristor-controlled reactors and fixed capacitors (TCR-FC) type SVC is recognized as having the must fiexible control and high speed response, which has been widely utilized in power systems, is considered and designed to improve the response of a synchronous generator, as well as controlling the system voltage A Fuzzy-PI controller for SVC system was proposed in this paper. The PI gain parameters of the proposed Fuzzy-PI controller which is a special type of PI ones are self-tuned by fuzzy inference technique. It is natural that the fuzzy inference technique should be barred on humans intuitions and empirical knowledge. Nonetheless, the conventional ones were not so. Therefore, In this paper, the fuzzy inference technique of PI gains using MMGM(Min Max Gravity Method) which is very similar to humans inference procedures, was presented and allied to the SVC system. The system dynamic responses are examined after applying all small disturbance condition.

  • PDF

A Study on the License & Training System of Security Agent in Japan (일본 민간경비원의 자격 및 훈련제도에 관한 연구)

  • Jo, Yong-Chul;Kim, Soon-Seok
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.339-356
    • /
    • 2008
  • This study discusses some topics of Security License System and Security Training System in Japan. Especially, the Security License must be very influence that the growth of security industry. And it's true that a few enlightened approach to cooperation between police and private security has already begun to take place in some divisions. The most important thing of the License Test System in Japan is the method of test rule and test section. Then the training systems of the security agent have been very impressive rule and the system for security agent. Today, the market of the security industry in Korea have been going to develop and extend to the future industry. The assignments that are leaved to security industry in Korea must be that the improvement of the License & Training System of Security Agent in Korea should be made effort by the security industry and the public section that looks like the police.

  • PDF

Effects on Conservation and Flood Control Systems According In Normal Water Level Change from Daechung Multi-Purpose Reservoir (대청 다목적댐의 상시만수위 변경에 따른 이수 및 치수 영향 검토)

  • Yi, Jae-Eung;Kwon, Dong-Seok
    • Journal of Korea Water Resources Association
    • /
    • v.40 no.1 s.174
    • /
    • pp.1-10
    • /
    • 2007
  • Reallocation procedure of multipurpose reservoir storage capacity between flood control and conservation is presented as an alternative to secure more water resources. Storage reallocation is an adaptive management mechanism for converting existing normal pool level of reservoirs to more beneficial uses without requirement for physical alteration. This study is intended to develop a reservoir storage reallocation methodology that allows increased water supply storage without minimizing adverse impacts on flood control. The methodology consists of flood control reservoir simulation for inflows with various return periods, flow routing from reservoir to a potential damage site, analyzing river carrying capacity, and reservoir yields estimation for reallocated storages. For the flood control model, a simulation model called Rigid ROM(Reservoir Operation Method) and HEC-5 are used. The approach is illustrated by applying it to two reservoirs system in Geum River basin. Especially with and without new project conditions are considered to analyze trade-offs between competing objectives.

A Study for Task Detection Acquiring Abnormal Permission in Linux (리눅스의 비정상 권한 획득 태스크의 탐지방법 연구)

  • Kim, Won-Il;Yoo, Sang-Hyun;Kwak, Ju-Hyun;Lee, Chang-Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.11
    • /
    • pp.427-432
    • /
    • 2014
  • The Purpose of local system attacks is to acquire administrator's(root) privilege shell through the execution of the malicious program or change the flow of the program. This acquiring shell through attack is still valid approach method and it is difficult to cope with improving each of vulnerability because the attacker can select various forms of attack. Linux allocate a set of credentials when login, in order to manage user permissions. Credentials were issued and managed by the kernel directly, and also the kernel ensures that any change cannot be occurred outside of kernel. But, user's credentials that acquired root privilege through system attacks occurs a phenomenon that does not remain consistent. In this paper we propose a security module to detect a security threats that may cause to users and tasks by analysis user task execution and inconsistency credentials.

Long term structural health monitoring for old deteriorated bridges: a copula-ARMA approach

  • Zhang, Yi;Kim, Chul-Woo;Zhang, Lian;Bai, Yongtao;Yang, Hao;Xu, Xiangyang;Zhang, Zhenhao
    • Smart Structures and Systems
    • /
    • v.25 no.3
    • /
    • pp.285-299
    • /
    • 2020
  • Long term structural health monitoring has gained wide attention among civil engineers in recent years due to the scale and severity of infrastructure deterioration. Establishing effective damage indicators and proposing enhanced monitoring methods are of great interests to the engineering practices. In the case of bridge health monitoring, long term structural vibration measurement has been acknowledged to be quite useful and utilized in the planning of maintenance works. Previous researches are majorly concentrated on linear time series models for the measurement, whereas nonlinear dependences among the measurement are not carefully considered. In this paper, a new bridge health monitoring method is proposed based on the use of long term vibration measurement. A combination of the fundamental ARMA model and copula theory is investigated for the first time in detecting bridge structural damages. The concept is applied to a real engineering practice in Japan. The efficiency and accuracy of the copula based damage indicator is analyzed and compared in different window sizes. The performance of the copula based indicator is discussed based on the damage detection rate between the intact structural condition and the damaged structural condition.

The research for human bio-signal monitoring smart home system (생체신호 모니터링 스마트 홈 모니터링에 관한 연구)

  • Kim, Kuk-Se;Kwon, Young-Sun;Lee, Ho-Young;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.2097-2104
    • /
    • 2008
  • Ubiquitous services are high duality and differentiated services which are provided for users by recognizing the context of users and environmental conditions actively. In this case, context-aware middleware is one of the most important technologies required to implement the ubiquitous services. In this paper, we propose a method for providing ubiquitous services in a specific user space effectively and monitoring human bio-signal sensors. That is, the design and implementation of intelligent home service middleware and monitoring human bio-signal sensor based on context awareness is discussed here. Context information from various sensors is gathered, and suitable services are inferred and provided to users by the middleware system. In our approach, user services can be modelled easily by using facts and rules, and the system can be extended easily to support various ubiquitous services other than intelligent home services also. The system can be integrated with external applications and legacy systems effectively by using various protocols such as RMI, socket and HTTP, XML and Zigbee etc. We have designed and evaluated various facts and rules for intelligent home services in real environments. Functionality evaluation with the system shows that ubiquitous services can be provided to users effectively in a home environment.