• Title/Summary/Keyword: Decentralized method

Search Result 243, Processing Time 0.028 seconds

A Study on Zero Knowledge Proof Blockchain Personal Information Authentication Using Smartphone (스마트폰을 이용한 영지식증명 블록체인 개인정보 인증에 관한 연구)

  • Lee Kwangkyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.3
    • /
    • pp.37-44
    • /
    • 2023
  • In the future society, a means to verify the identity of the information owner is required at the beginning of most services that the information owner encounters, and the emergence and gradual spread of digital identification that proves the identity of the information owner is essential. In addition, as the utilization value of personal information increases, discussions on how to provide personal information are active. Therefore, there is a need for a personal information management method necessary for building a hyper-connected society that is safe from various hacking, forgery, alteration, and theft by allowing the owner to directly manage and provide personal information management. In this study, a decentralized identity information management model that overcomes the problems and limitations of the centralized identity management method of personal information and manages and selectively provides personal information by the information owner himself and implemented a smart personal information provision system(SPIPS: Smart Personal Information Provision System) using a smartphone.

Effective Decentralized Sampled-Data Control for Nonlinear Systems in T-S' Form: Overlapping IDR Approach (타카기-수게노 형태의 비선형 시스템의 효율적 분산 샘플치 제어: 중복 지능형 디지털 재설계 접근법)

  • Lee, Ho-Jae;Kim, Do-Wan
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.1
    • /
    • pp.94-99
    • /
    • 2012
  • This paper discusses a decentralized sampled-data control problem for large-scale nonlinear systems. The system is represented in Takagi-Sugeno's form. Next, we design a decentralized analog controller based on the overlapping decomposition technique. The final step is to apply the intelligent digital redesign scheme for converting the analog controller into the sampled-data one. Design condition is represented in terms of linear matrix inequalities. A simulation result is provided for the effectiveness of the proposed design method.

A Study on the Application of Under Voltage Load Shedding Scheme in Line Contingency considering Motor Load (모터부하를 고려한 상정사고 발생 시 저전압 부하차단 적용 방안에 대한 연구)

  • Lee, Yun-Hwan
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.66 no.1
    • /
    • pp.21-26
    • /
    • 2017
  • Failure of high-voltage transmission line, which is responsible for large-scale power transmission, can be reason for system voltage instability. There are many methods to prevent voltage instability like adjustment of equipment, the generator voltage setting, and load shedding. Among them, the load shedding, have a problem of economic loss and cascading effect to power system. Therefore, the execution of load shedding, amount and timing is very important. Conventionally, the load shedding setting is decided by the preformed simulation. Now, it is possible to monitor the power system in real time by the appearance of PMU(Phasor Measurement Unit). By this reason, some of research is performed about decentralized load shedding. The characteristics of the load can impact to amount and timing of decentralized load shedding. Especially, it is necessary to consider the influence of the induction motor loads. This paper review recent topic about under voltage load shedding and compare with decentralized load shedding scheme with conventional load shedding scheme. And simulations show the effectiveness of proposed method in resolving the delayed voltage recovery in the Korean Power System.

Design of Decentralized Guidance Algorithm for Swarm Flight of Fixed-Wing Unmanned Aerial Vehicles (고정익 소형무인기 군집비행을 위한 분산형 유도 알고리듬 설계)

  • Jeong, Junho;Myung, Hyunsam;Kim, Dowan;Lim, Heungsik
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.12
    • /
    • pp.981-988
    • /
    • 2021
  • This paper presents a decentralized guidance algorithm for swarm flight of fixed-wing UAVs (Unmanned Aerial Vehicles). Considering swarm flight missions, we assume four representative swarm tasks: gathering, loitering, waypoint/path following, and individual task. Those tasks require several distinct maneuvers such as path following, flocking, and collision avoidance. In order to deal with the required maneuvers, this paper proposes an integrated guidance algorithm based on vector field, augmented Cucker-Smale model, and potential field methods. Integrated guidance command is synthesized with heuristic weights designed for each guidance method. The proposed algorithm is verified through flight tests using up to 19 small fixed-wing UAVs.

A Study on Privacy Protection Technology based on Blockchain and Zero Knowledge Proof (블록체인과 영지식 증명에 기반한 프라이버시 보호 기술 연구)

  • Kwang Kyu Lee
    • Smart Media Journal
    • /
    • v.12 no.9
    • /
    • pp.95-102
    • /
    • 2023
  • As the utilization value of personal information increases, discussions on how to provide personal information are active, but information required by institutions to utilize personal information is being exposed more than necessary. Therefore, personal privacy protection is essential to overcome the problems and limitations of personal information protection. In this study, a decentralized identity information management model that overcomes the problems and limitations of the centralized identity management method of personal information and manages and selectively provides personal information by the information owner himself and demonstrates the excellence of personal information by implementing the Smart Personal Information Provision System (SPIPS) in the PBFT consensus algorithm through experiments.

A Proposal of the Prediction Method of Decentralized Power on Climatic Change (기후 변화에 따른 분산 전력 예측 방법 제안)

  • Kim, Jeong-Young;Kim, Bo-Min;Bang, Hyun-Jin;Jang, Min-Seok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.942-945
    • /
    • 2010
  • The development of decentralized power has appeared as part of an effort to decrease the energy loss and the cost for electric power facilities through installing small renewable energy generation systems including solar and wind power generation. Recently a new era for decentralized power environment in building is coming in order to handle the climatic and environmental change occurred all over the world. Especially solar and wind power generation systems can be easily set up and are also economically feasible, and thus many industrial companies enter into this business. This paper suggests the overall architecture for the decentralized renewable power system and the prediction method of power on climatic change. The ultimate goal is to help manage the overall power efficiently and thus provide the technological basis for achieving zero-energy house.

  • PDF

A Model for Self-Authentication Based on Decentralized Identifier (탈중앙화 신원증명에 기반한 본인 인증 모델)

  • Kim, Ho-Yoon;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.66-74
    • /
    • 2021
  • With the development of the Internet, user authentication technology that proves me online is improving. Existing ID methods pose a threat of personal information leakage if the service provider manages personal information and security is weak, and the information subject is to the service provider. In this study, as online identification technology develops, we propose a DID-based self-authentication model to prevent the threat of leakage of personal information from a centralized format and strengthen sovereignty. The proposed model allows users to directly manage personal information and strengthen their sovereignty over information topics through VC issued by the issuing agency. As a research method, a self-authentication model that guarantees security and integrity is presented using a decentralized identifier method based on distributed ledger technology, and the security of the attack method is analyzed. Because it authenticates through DID Auth using public key encryption algorithms, it is safe from sniffing, man in the middle attack, and the proposed model can replace real identity card.

Hierarchical optimisation for large scale discrete-time systems using extended interaction prediction method (확장된 상호작용 예측방법을 이용한 대규모 이산시간 시스템의 계층적 최적제어)

  • 정희태;전기준
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1987.10b
    • /
    • pp.223-227
    • /
    • 1987
  • This paper presents the extended interaction prediction method for large scale discrete-time systems with interconnected state and control. Feedback gain is obtained from decentralized calculation without solving Riccati equation. Hence, Computer storage and calculation time is reduced.

  • PDF

Study on the Changes in Evapotranspiration according to the Decentralized Rainwater Management (분산식 빗물관리시설 적용에 따른 증발산 변화 연구)

  • Han, Young-Hae;Lee, Tae-Goo
    • KIEAE Journal
    • /
    • v.12 no.5
    • /
    • pp.3-10
    • /
    • 2012
  • In this study, the influence of decentralized rainwater management over the changes in evapotranspiration was analyzed. The analysis method was obtained by establishing the decentralized rainwater management plan according to different scenarios, and subsequently examined evapotranspiration in the plan. Scenario 1 refers to the analysis of the existing situation, in which was 100% of a parking lot is asphalt pavement. In Scenario 2, the pavement of the parking surface in the parking lot is replaced with lawn blocks. In Scenario 3, some asphalt pavement was removed to establish a flower-bed type infiltration system to allow rainwater to permeate. In Scenario 4, infiltration and storage of rain water would be achieved by transforming the parking surface into lawn blocks, keeping the asphalt for the parking road while establishing a vegetation strip. The amount of evapotranspiration of the target site was analyzed with a water budget analysis program (CAT) using the 2001 meteorological data for each scenario According to the analysis values of S2 and S3, it was found that evapotranspiration is critically affected by the amount of area replaced with pervious area in the total target site. An energy equivalent to 680kWh is required for 1 ton of water to evaporate. Hence, it can be seen that the active inducement of evapotranspiration in urban area makes a positive contribution not only to heat island mitigation, but also to the small-scale water circulation process in a city.