• Title/Summary/Keyword: 점검규칙

Search Result 51, Processing Time 0.023 seconds

Reconfiguration of Distribution System Using Simulated Annealing (시뮬레이티드 어닐링을 이용한 배전 계통 재구성)

  • 전영재;김재철
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 1999.03a
    • /
    • pp.195-202
    • /
    • 1999
  • 본 논문은 배전 계통에서 부하 제약조건과 운전 제약조건을 고려한 손실 감소와 부하 평형에 대해 시뮬레이티드 어닐링 알고리즘을 적용한 재구성 방법을 서술하였다. 네트워크 재구성은 수많은 연계 개폐기와 구분 계폐기의 조합에 의해 이루어지기 때문에 조합적인 최적화 문제이다. 이러한 문제는 수많은 조합에 제약조건까지 있어 해를 구하기가 쉽지 않을뿐 아니라 국소 해에 빠질 가능성이 많다. 따라서 신경망 중에서 제약조건에 따라 신경망 구조에 영향을 미치지 않으면서 전역 최소해에 수렴하는 특성을 가진 시뮬레이티드 어닐링 기법을 이용하여 배전 계통의 선로를 재구성하였다. 시뮬레이티드 어닐링은 이론적으로 최적해가 보장되지만 무한대의 시간이 걸리기 때문에 현실적으로 적용할 때 해 공간을 탐색하는 규칙과 온도를 적절히 내리는 냉각 스케줄(cooling schedule)이 중요하다. 본 논문에서는 알고리즘 상에서 제약조건 위한 여부를 점검할 수 있는 제약조건과 페널티 상수(penalty factor)를 통해 목적함수에 반영하는 제약조건으로 나누어 모든 후보해를 가능해가 되게 하였고 기존에 사용되는 Kirkpatrick의 냉각 스케줄 대신에 후보해의 통계적 처리에 의해 온도를 내리는 다항-시간 냉각 스케줄(polynomial-time schedule)을 사용하여 수행시간을 단축하고 수렴성을 높였다. 제안한 알고리즘의 효용성을 입증하기 위해 32,69모선 예제 계통으로 테스트하였다.

  • PDF

VLCC기항에 따른 인천VTS 안전대책

  • Lee, Seong-Yong;Jang, Jae-Yeong;Choe, Ja-Yun;Lee, Chang-U;Park, Hyeon-Ji
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2014.06a
    • /
    • pp.316-318
    • /
    • 2014
  • VLCC에 의한 SK에너지 울산CLX와 인천CLX의 일원화된 효율적 원유 수급체계에 따른 물류비용의 절감, 이에 따른 국가 산업 경쟁력확보 및 항만경쟁력 강화를 위한 고도화 사업의 일환으로 고부가가치 선박인 VLCC가 인천항에 처녀입항하게 되었다. 이로 인한 해상교통관제센터(VTS)의 안전대책이 요구되어 비교적 통항량이 많고 항로길이가 긴 인천항의 VLCC운항 계획에 따른 해상교통 혼잡도 등, 다각적인 통항 안전성 및 VLCC 입출항에 따른 타 통항선과의 항행안전 관계등을 점검하여, 계속적인 VLCC 입항에 따른 항행 위험성을 파악하고, 앞으로의 인천항만 안전을 위한 통항안전관리대책을 모색하고자 한다.

  • PDF

Dynamic Syntax-Directed SGML Document Editor (동적 구문지향 SGML 문서편집기)

  • 강춘길;신경희;유재우
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.04a
    • /
    • pp.71-73
    • /
    • 2000
  • 본 논문에서 다루는 SGML 문서편집기는 파서를 내포하는 구조로서, 문서편집을 위하여 DTD 가 입력되고, 입력된 DTD 는 DTD 파서에 의해 적합성을 점검하게 된다. DTD 파서는 표준규칙에 따라 DTD를 파싱하고, 결과를 편집처리에 적합한 BNF-스타일 형태로 변환된 문법 테이블을 생성한다. SGML 문서 편집은 문법테이블 정보에 따라 처리된다. 문법 테이블의 크기는 엘리먼트 선언내용 중 컨텐트 모델의 표현에 따라 결정된다. 그 중 and(&) 접속자는 엘리먼트 개수에 따라 문법수가 기하급수적으로 증가하므로 DTD 파서에 의해 처리된다면 속도나 비용면에서 비효율적이다. 이에 본 논문에서는 고정된 문법테이블을 이용하는 SGML 편집기에 and 접속자로 표현된 엘리먼트 문법을 동적으로 확정 처리할 수 있는 기능이 추가 향상된 구문지향적 SGML 문서편집기를 제시한다. 그러므로 향상된 구문지향 SGML 문서편집기는 고정된 문법을 이용한 문서편집 뿐 아니라 편집처리에 따른 변환에 능동적으로 처리할 수 있다는 특징을 갖게된다.

  • PDF

A Study on the Profiling of Collect Site for the Effective Reputation Analysis (효과적인 평판분석을 위한 수집사이트 프로파일링에 관한 연구)

  • Song, Eun-Jee;Kang, Min-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.617-618
    • /
    • 2014
  • 본 논문에서는 보다 정확하고 효과적인 평판분석을 위하여 서비스 산업별 타겟으로 하는 수집사이트를 프로파일링 하는 방법을 제안한다. 먼저 각 서비스에 특화된 타겟 사이트를 추출하고 등록하고 각 서비스에 관련한 정보 및 의견 공유 게시판과 지식인 추천/질문 등 지식 공유 사이트를 추출한다. 또한 업종별 주요 사이트를 선택하고 등록하여 유효 데이터 수집한다. 이를 통해 실시간 수집 데이터의 활용 기술을 이용하여 수집원 프로파일링을 통한 미디어별 수집 주기 산정하고 수집 엔진의 유연한 확장성을 활용한 실시간 수집 제반 기술 확대할 수 있다. 또한 지속적인 수집원 변경관리를 수행한다. 즉, 신규 생성, 변경, 삭제되는 사이트에 대한 변경관리를 수행하고 지속적인 수집량 모니터링을 통한 수집여부를 점검하며 수집 필터링 규칙에 대한 튜닝으로 데이터 품질 확보하도록 한다.

  • PDF

A Study on the Improvement of Cybersecurity Training System in Nuclear Facilities (원자력 시설 사이버보안 훈련체계 개선 방안 연구)

  • Kim, Hyun-hee;Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.187-188
    • /
    • 2022
  • As information processing technology develops with the trend of the times, the possibility of cyber threats to nuclear facilities is increasing. In the 2000s, there was a growing perception that cyberattacks on nuclear facilities were needed, and in fact, a cybersecurity regulatory system for nuclear power plants began to be established to prepare for cyberattacks. In Korea, in order to prepare for cyber threats, in 2013 and 2014, the Act on Protection and Radiation Disaster Prevention, Enforcement Decree, and Enforcement Rules of Nuclear Facilities, etc., and notices related to the Radioactive Disaster Prevention Act were revised. In 2015, domestic nuclear operators prepared information system security regulations for each facility in accordance with the revised laws and received approval from the Nuclear Safety Commission for implementation of information system security regulations divided into seven stages. In 2019, a special inspection for step-by-step implementation was completed, and since 2019, the cybersecurity system of operators has been continuously inspected through regular inspections. In this paper, we present some measures to build improved training to suit the steadily revised inspection of the nuclear facility cybersecurity system to counter cyber threats to the ever-evolving nuclear facilities.

  • PDF

Analysis of Local Laws and Regulations Related to the Library (지방자치단체의 도서관 자치법규 분석)

  • Kim, Hong-Ryul
    • Journal of Korean Library and Information Science Society
    • /
    • v.45 no.2
    • /
    • pp.117-138
    • /
    • 2014
  • This study was to investigate and analysis the library-related laws and regulations enacted by local governments. As a result, library regulations are investigated all 629 cases in nationwide survey. Among them, library-related ordinances are 393 cases, library-related regulations are 187 cases, and library-related anweisung are 43 cases, such as the order was followed. The Library ordinance 393 cases consist of library management ordinance(205 cases), small library ordinance(101 cases), reading promotion ordinance(49 cases), and so on. The 32 local governments did not enact the Library laws and regulations. And the 40 local government did not enact Library management ordinance. It is suggested that local government did not enact library-related laws should be established the library laws as soon as possible.

Low price type inspection and monitoring system of lithium ion batteries for hybrid vessels (하이브리드 선박용 리튬 배터리의 저가형 감시시스템 구현)

  • Kwon, Hyuk-joo;Kim, Min-kwon;Lee, Sung-geun
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.1
    • /
    • pp.28-33
    • /
    • 2016
  • Batteries are used for main power engine in the fields such as mobiles, electric vehicles and unmanned submarines, for starter and lamp driver in general automotive, for emergency electric source in ship. These days, lead-acid and the lithium ion batteries are increasingly used in the fields of the secondary battery, and the lead-acid battery has a low price and safety comparatively, The lithium ion battery has a high energy density, excellent output characteristics and long life, whereas it has the risk of explosion by reacting with moisture in the air. But Recently, due to the development of waterproof, fireproof, dustproof technology, lithium batteries are widely used, particularly, because their usages are getting wider enough to be used as a power source for hybrid ship and electric propulsion ship, it is necessary to manage more strictly. Hybrid ship has power supply units connected to the packets to produce more than 500kWh large power source, and therefore, A number of the communication modules and wires need to implement the wire inspection and monitor system(WIIMS) that allows monitoring server to transmit detecting voltage, current and temperature data, which is required for the management of the batteries. This paper implements a low price type wireless inspection and monitoring system(WILIMS) of the lithium ion battery for hybrid vessels using BLE wireless communication modules and power line modem( PLM), which have the advantages of low price, no electric lines compared to serial communication inspection systems(SCIS). There are state of charge(SOC), state of health(SOH) in inspection parts of batteries, and proposed system will be able to prevent safety accidents because it allows us to predict life time and make a preventive maintenance by checking them at regular intervals.

A Classification Model for Illegal Debt Collection Using Rule and Machine Learning Based Methods

  • Kim, Tae-Ho;Lim, Jong-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.4
    • /
    • pp.93-103
    • /
    • 2021
  • Despite the efforts of financial authorities in conducting the direct management and supervision of collection agents and bond-collecting guideline, the illegal and unfair collection of debts still exist. To effectively prevent such illegal and unfair debt collection activities, we need a method for strengthening the monitoring of illegal collection activities even with little manpower using technologies such as unstructured data machine learning. In this study, we propose a classification model for illegal debt collection that combine machine learning such as Support Vector Machine (SVM) with a rule-based technique that obtains the collection transcript of loan companies and converts them into text data to identify illegal activities. Moreover, the study also compares how accurate identification was made in accordance with the machine learning algorithm. The study shows that a case of using the combination of the rule-based illegal rules and machine learning for classification has higher accuracy than the classification model of the previous study that applied only machine learning. This study is the first attempt to classify illegalities by combining rule-based illegal detection rules with machine learning. If further research will be conducted to improve the model's completeness, it will greatly contribute in preventing consumer damage from illegal debt collection activities.

An Analysis of the Characteristics of Effective Mathematics Instruction in the Elementary School (초등학교 우수 수업 동영상에 나타난 좋은 수학 수업의 특징 분석)

  • Pang, JeongSuk;Kwon, Misun;Kim, Jeongwon
    • Journal of Elementary Mathematics Education in Korea
    • /
    • v.16 no.3
    • /
    • pp.403-426
    • /
    • 2012
  • This paper analyzed 20 teaching practices of elementary mathematics lessons which were recognized as effective instruction by the local educational offices throughout Korea, using an analytic framework with 4 main domains (i.e., curriculum and content, teaching and learning, classroom environment and atmosphere, and assessment) and a total of 44 sub-elements. The results of this study showed that the lessons focused on the key mathematics concepts according to the national mathematics curriculum and learning objectives, managed students in terms of shared rules within each classroom, and evaluated students' understanding of the concepts at the end of the lesson. However, the lessons did not foster students' calculation skills and only partly used either technology or game. Building on the related studies, this paper included implications of implementing high-quality mathematics instruction.

  • PDF

The Future of BlockChain Technology Leading Innovation in the Industrial Ecosystem (산업 생태계의 혁신을 선도할 블록체인 기술의 미래전망)

  • Kim, Jung-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.6
    • /
    • pp.324-332
    • /
    • 2018
  • Blockchain technology has the potential to revolutionize trust models and business processes in a variety of industries. However, it is considered to be the initial stage of the system that pursues autonomy rather than efficiency, and it is necessary to monitor and inspect the distributed ledger technology from the price and introduction time as compared with the existing relational DB transaction technology. However, domestic and foreign private sectors have already been activated by applying block-chain technology in the national domain, and the block chain is devoid of doubt that it is an exaggerated technology, characterized by the invariance of the record, transparency, and autonomous execution of business rules. It has begun to be utilized in history, identity, certification and auditing in the financial industry as well as various industries. In this paper, we analyze the problems such as security weakness, insufficient regulatory environment, technical consensus and lack of common standard. In addition, the business sense and possibility of the block chain technology is expected to be the innovation of the industrial ecosystem by entering into the reality system from the concept through monitoring the actual introduction performance in the field of copyright, logistics, health care and environment.