• Title/Summary/Keyword: Current detection

Search Result 2,524, Processing Time 0.031 seconds

The Inductance Computation of IPMSM using Current Vector Control Test (전류벡터제어시험법에 의한 IPMSM의 인덕턴스 산정)

  • Cho, Gyu-Won;Lee, Jung-Gyu;Kim, Gyu-Tak
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.12
    • /
    • pp.1807-1812
    • /
    • 2012
  • In this paper, the d, q-axis inductance of IPMSM(Interior Permanent Magnet Synchronous Motor) was calculated by the FEA(Finite Element Analysis). And the CVCT(Current Vector Control Test) was performed, and compared with FEA. Therefore the inductance experiment according to the variation of the current phase angle was performed. However, the error was generated in the fundamental wave detection of the voltage and current waveform. So, error has largely effect on the result of computation, it has to note specially. In addition, by using the calculated inductance, the torque calculation was performed and this result was compared through the dynamometer experiment.

Development of Differential Type Eddy Current Probe for NDT Evaluation of the Steam Generator Tube (증기발생기 전열관의 비파괴 탐상용 차등형 와전류 탐촉자 개발)

  • Jung, S.Y.;Son, D.;Ryu, K.S.;Park, D.K.
    • Journal of the Korean Magnetics Society
    • /
    • v.15 no.5
    • /
    • pp.292-297
    • /
    • 2005
  • Steam generator of a nuclear power plant has important rolls for the heat transfer and the isolation of radioactive materials. So bursting of the steam generator tube is directly related to the accident of nuclear power plants. Incone1600 has been used for the steam generator tube material. The material shows non-magnetic and metallic properties, eddy current NDT method has been employed for defects detection. In this work, a differential type of eddy current probe was developed to improve resolution of defect detection. To verify properties of the developed differential type eddy current probe, we have made reference material with SUS304 which has similar magnetic and electrical properties of Inconel600. Using the developed differential type eddy current probe, we can detect defect size of 0.25 mm in diameter and 0.2 mm in depth (volume of $1{\times}10^{-3}\;mm^3$) with the reference material.

Development of Electrical Fire Detection System Applying Fuzzy Logic for Main Causes of Electrical Fire in Traditional Market Shops

  • Kim, Doo Hyun;Hwang, Dong Kyu;Kim, Sung Chul;Kim, Sang Ryull;Kim, Yoon Bok
    • International Journal of Safety
    • /
    • v.11 no.2
    • /
    • pp.15-21
    • /
    • 2012
  • This paper is aimed to develop an electrical fire detection system (EFDS) which can analyze the possibility of electrical fire for overcurrent, leakage current and arc signals of panel board in traditional market shop. The EFDS adopted fuzzy logic and precursory data for overcurrent, leakage current and arc signals to evaluate the possibility of electrical fire. The signals are obtained directly from panel board in traditional market shops and fuzzy membership function is obtained from experiment, simulation, expert's advice. The overcurrent data is acquired by thermal data of normal and abnormal states (partial disconnection) on the insulated electrical wire, in accordance with the increase of the current signal, The leakage current data is obtained under various environments. The arc signal is acquisited by waveforms of instantaneous value in time domain and frequency band in frequency domain. The Fuzzy algorithm for DB of EFDS consists of fuzzification, inference engine by Mamdani's method and defuzzification by center of gravity method. In order to verify the performance and reliability of EFDS, it was applied to Jeon-Ju traditional market shops (90 shops) in Korea. Results show that EFDS in this paper is useful in alarming the fire case, which will prevent severe damage to human beings and properties, and reduce the electrical fires in a vulnerable area of electrical disaster.

LSTM based Supply Imbalance Detection and Identification in Loaded Three Phase Induction Motors

  • Majid, Hussain;Fayaz Ahmed, Memon;Umair, Saeed;Babar, Rustum;Kelash, Kanwar;Abdul Rafay, Khatri
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.147-152
    • /
    • 2023
  • Mostly in motor fault detection the instantaneous values 3 axis vibration and 3phase current in time domain are acquired and converted to frequency domain. Vibrations are more useful in diagnosing the mechanical faults and motor current has remained more useful in electrical fault diagnosis. With having some experience and knowledge on the behavior of acquired data the electrical and mechanical faults are diagnosed through signal processing techniques or combine machine learning and signal processing techniques. In this paper, a single-layer LSTM based condition monitoring system is proposed in which the instantaneous values of three phased motor current are firstly acquired in simulated motor in in health and supply imbalance conditions in each of three stator currents. The acquired three phase current in time domain is then used to train a LSTM network, which can identify the type of fault in electrical supply of motor and phase in which the fault has occurred. Experimental results shows that the proposed single layer LSTM algorithm can identify the electrical supply faults and phase of fault with an average accuracy of 88% based on the three phase stator current as raw data without any processing or feature extraction.

A study on the Site Survey and Detection Efficiency for Kepco Lightning Detection and Information Network (낙뢰측정 네트워크(KLDNet)를 위한 감지기 사이트서베이와 낙뢰 감지율 검토)

  • Woo, J.W.;Kwak, J.S.;Moon, J.D.
    • The Transactions of the Korean Institute of Electrical Engineers C
    • /
    • v.55 no.11
    • /
    • pp.532-537
    • /
    • 2006
  • Lightning induced faults accounts for more than 66% at the transmission lines of KEPCO. The lightning causes damages to power system equipments including transmission line, the blackout of electricity and the electro-magnetic interference. Because of this reason, we need the real time lightning information for the optimal operation of power system. And, it is required to obtain and accumulate the lightning current parameters for the insulation design. In 2005, KEPRI constructed a lightning detection network, the KLDNet (i.e. Kepco Lightning Detection & Information System) and launched a lightning information service for KEPCO customers. It is intended to provide data service on the operation of transmission lines and collect lightning-related data, which is the most important factor regulating power system design and operation. The new system will replace LPATS, the old detection system, which has been operating since 1995 and is rapidly failing in terms of both detection performance and location accuracy. The purpose of this paper is to explain the work performed and the results of that work in performing a site survey of several locations. The purpose of the site survey is to find locations acceptable for the installation of a lightning location receiver in support of a Lightning detection system(LDS). A restriction was placed on the surveyed locations, as they must belong to the Korea Electric Power Company. This requirement was made to facilitate the communication needs of the LDS network. Total of 15 sites were evaluated as possible LDS sensor sites. Some of the sites were rejected for physical reasons and therefore no electrical testing was performed. Of the 15 sites, total of 10 sites were considered acceptable and 5 sites were rejected for various reason. In this paper, we would like to explain the site survey and detection efficiency for LDS.

Performance Improvement of Pedestrian Detection using a GM-PHD Filter (GM-PHD 필터를 이용한 보행자 탐지 성능 향상 방법)

  • Lee, Yeon-Jun;Seo, Seung-Woo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.12
    • /
    • pp.150-157
    • /
    • 2015
  • Pedestrian detection has largely been researched as one of the important technologies for autonomous driving vehicle and preventing accidents. There are two categories for pedestrian detection, camera-based and LIDAR-based. LIDAR-based methods have the advantage of the wide angle of view and insensitivity of illuminance change while camera-based methods have not. However, there are several problems with 3D LIDAR, such as insufficient resolution to detect distant pedestrians and decrease in detection rate in a complex situation due to segmentation error and occlusion. In this paper, two methods using GM-PHD filter are proposed to improve the poor rates of pedestrian detection algorithms based on 3D LIDAR. First one improves detection performance and resolution of object by automatic accumulation of points in previous frames onto current objects. Second one additionally enhances the detection results by applying the GM-PHD filter which is modified in order to handle the poor situation to classified multi target. A quantitative evaluation with autonomously acquired road environment data shows the proposed methods highly increase the performance of existing pedestrian detection algorithms.

Method for Detection and Identification of Satellite Anomaly Based on Pseudorange (의사거리 기반 위성 이상 검출 및 식별 기법)

  • Seo, Ki-Yeol;Park, Sang-Hyun;Jang, Won-Seok;Kim, Young-Ki
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.3
    • /
    • pp.328-333
    • /
    • 2012
  • Current differential GPS (DGPS) system consists of reference station (RS), integrity monitor (IM), and control station (CS). The RS computes the pseudorange corrections (PRC) and generates the RTCM messages for broadcasting. The IM receives the corrections from the RS broadcasting and verifies that the information is within tolerance. The CS performs realtime system status monitoring and control of the functional and performance parameters. The primary function of a DGPS integrity monitor is to verify the correction information and transmit feedback messages to the reference station. However, the current algorithms for integrity monitoring have the limitations of integrity monitor functions for satellite outage or anomalies. Therefore, this paper focuses on the detection and identification methods of satellite anomalies for maritime DGPS RSIM. Based on the function analysis of current DGPS RSIM, it first addresses the limitation of integrity monitoring functions for DGPS RSIM, and then proposes the detection and identification method of satellite anomalies. In addition, it simulates an actual GPS clock anomaly case using a GPS simulator to analyze the limitations of the integrity monitoring function. It presents the brief test results using the proposed methods for detection and identification of satellite anomalies.

WebSHArk 1.0: A Benchmark Collection for Malicious Web Shell Detection

  • Kim, Jinsuk;Yoo, Dong-Hoon;Jang, Heejin;Jeong, Kimoon
    • Journal of Information Processing Systems
    • /
    • v.11 no.2
    • /
    • pp.229-238
    • /
    • 2015
  • Web shells are programs that are written for a specific purpose in Web scripting languages, such as PHP, ASP, ASP.NET, JSP, PERL-CGI, etc. Web shells provide a means to communicate with the server's operating system via the interpreter of the web scripting languages. Hence, web shells can execute OS specific commands over HTTP. Usually, web attacks by malicious users are made by uploading one of these web shells to compromise the target web servers. Though there have been several approaches to detect such malicious web shells, no standard dataset has been built to compare various web shell detection techniques. In this paper, we present a collection of web shell files, WebSHArk 1.0, as a standard dataset for current and future studies in malicious web shell detection. To provide baseline results for future studies and for the improvement of current tools, we also present some benchmark results by scanning the WebSHArk dataset directory with three web shell scanning tools that are publicly available on the Internet. The WebSHArk 1.0 dataset is only available upon request via email to one of the authors, due to security and legal issues.

Modified Electrical Resistivity Survey for Leakage Detection of a Waterside Concrete Barrage (콘크리트 수변구조물의 누수 탐지를 위한 변형된 전기비저항 탐사 연구)

  • Lee, Bomi;Oh, Seokhoon;Im, Eunsang
    • Geophysics and Geophysical Exploration
    • /
    • v.18 no.3
    • /
    • pp.115-124
    • /
    • 2015
  • A modified electrical resistivity survey has been suggested and applied to a leakage detection problem of concrete barrage. We suggest the modified electrical resistivity methods using electrodes floating on the water and apply line current sources instead of conventional point current sources in order to facilitate simple analysis. In addition, the study introduced the following three variations of modified electrode array: Direct potential array, Parallel potential array and Cross potential array. These arrays were tested and investigated through numerical experiment, physical model experiment and geophysical field exploration in order to verify their applicability to the water leakage detection of a concrete barrage. When water leakage occurred, all kind of array operations demonstrated distinct changes of aspects of potential difference in graphs obtained by not only the numerical and physical model experiments but also geophysical field exploration. Therefore, this modified electrode arrays of electrical resistivity survey, which has been adapted to the concrete barrage, has been found to be a useful method to detect water leakage.

A Method for Efficient Malicious Code Detection based on the Conceptual Graphs (개념 그래프 기반의 효율적인 악성 코드 탐지 기법)

  • Kim Sung-Suk;Choi Jun-Ho;Bae Young-Geon;Kim Pan-Koo
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.45-54
    • /
    • 2006
  • Nowadays, a lot of techniques have been applied for the detection of malicious behavior. However, the current techniques taken into practice are facing with the challenge of much variations of the original malicious behavior, and it is impossible to respond the new forms of behavior appropriately and timely. There are also some limitations can not be solved, such as the error affirmation (positive false) and mistaken obliquity (negative false). With the questions above, we suggest a new method here to improve the current situation. To detect the malicious code, we put forward dealing with the basic source code units through the conceptual graph. Basically, we use conceptual graph to define malicious behavior, and then we are able to compare the similarity relations of the malicious behavior by testing the formalized values which generated by the predefined graphs in the code. In this paper, we show how to make a conceptual graph and propose an efficient method for similarity measure to discern the malicious behavior. As a result of our experiment, we can get more efficient detection rate.