• Title/Summary/Keyword: Digital IF

Search Result 2,192, Processing Time 0.03 seconds

A Percentage Current Differential Relaying Algorithm for Bus Protection Blocked by a CT Saturation Detection Algorithm (변류기 포화 곤단 알고리즘으로 억제된 모선보호용 비율 전류차동 계전방식)

  • 강용철;윤재성
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.52 no.1
    • /
    • pp.44-49
    • /
    • 2003
  • This paper describes a percentage current differential relaying algorithm for bus protection blocked by a CT saturation detection algorithm. The detection algorithm blocks the output of a current differential relay only if a differential current is caused by CT saturation in the case of an external fault. Moreover, if a current differential relay operates faster than the detection algorithm, the blocking signal is not ignited. On the other hand. if the detection algorithm operates faster than a current differential relay, the output of the relay is blocked. The results of the simulation show that the proposed algorithm can discriminate internal faults from external faults ever when a CT is saturated in both cases. This paper concludes by implementing the algorithm into the TMS320C6701 digital signal processor. The results of hardware implementation are also satisfactory The algorithm can not only increase the sensitivity of the current differential relay but Improve the stability of the relay for an external faults.

The Profit Analysis of Straddle Sell by Entry-Time and Delta at System Trading (시스템 트레이딩에서 진입시점과 델타에 따른 스트래들 매도의 성능 분석)

  • Ko, Young Hoon;Kim, Yoon Sang
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.1
    • /
    • pp.151-157
    • /
    • 2010
  • This paper proposes the Pyramid strategy which is based on the straddle sell. The Pyamid strategy has multi-entry features with starting date and delta parameters. And It is hedged against a loss by mutual trades and dynamic ripples. This paper analyzes the profit and MDD(maximum draw down) of the Pyramid strategy on system trading. The portfolio tool is used for the experiment which is one of the Multicharts' package. The Multicharts is a good trading system of recent years. For the experiment, three call options and three put options are used at october in 2009. Two parameters are used which are the starting date from first October to twentieth October in 2009 and delta from eight percent to fifty percent. As a result, the profit of composite option is about 3 million won. If the strategy starts before the beginning of option month, investors feel uncomfortable because of a large MDD. If a delta belows 20%, it shows high profit and the ratio of profit and MDD builds up a low value. However a low delta makes frequent trades and results in a loss unless increasing entry levels which mean more amount of investment. This work provides a safer trade system than native option trades. It is important how much levels of multi-entry are acceptable. And an amount of investment with appropriate levels of multi-entry is a subject of a future study.

A Study on the Self-destructing Data for Information Privacy (개인정보 보호를 위한 데이터의 자가 초기화에 대한 고찰)

  • Kim, Jonguk;Kang, Sukin;Hong, Manpyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.629-638
    • /
    • 2013
  • Recently the interest in the information privacy has been growing. Digital data can be easily transferred via Internet. Service providers ask users for private data to give customized services. Users believe that their shared data are protected as they deliver their private data securely. However, their private data may be leaked if service providers do not delete or initialize them when they expire. The possibility of information leak may lower if the service providers deal with users' private data properly. In this paper, we study the self-destruction of private data for information privacy and propose the glass-box model.

An Efficient Vector Quantization Codebook generation using a Triangle Inequality (삼각 부등식을 이용한 빠른 벡터 양자화 코드북 생성)

  • Lee, Hyun-Jin
    • Journal of Digital Contents Society
    • /
    • v.13 no.3
    • /
    • pp.309-315
    • /
    • 2012
  • Active data are the input data which are changed its membership as Vector Quantization codebook generation algorithm is processed. In the process of VQ codebook generation algorithm performed, the actual active data out of the entire input data will be less presented as the process is performed. Therefore, if we can accurately find the active data and only if we are going to do VQ codebook generation on the active data, then we can significantly reduce the overall generation time. In this paper, we presented the triangle inequality based algorithm to select the active data. Experimental results show that our algorithm is superior to other methods in terms of the VQ codebook generation time.

A Multichannel Authentication Technique In The Internet Banking System Using OTP (OTP를 이용한 인터넷뱅킹 시스템의 다중 채널 인증 기법)

  • Yoon, Seong Gu;Park, Jae Pyo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.131-142
    • /
    • 2010
  • Due to the development of the Internet, Internet banking that we are liberated from time and space has evolved into banking system. So modern life became comfortable. However, Dysfunction (malicious Information leakage and hacking etc.) of the Internet development has become a serious social problem. According to this, The need for security is rapidly growing. In this paper, we proposed the Internet Banking Authentication System using a dual-channel in OTP(One Time Password) authentication. This technology is that A user transfer transaction information to Bank through one Internet channel then bank transfer transaction information to user using the registered mobile phone or smart phone. If user confirm transaction information then bank request user's OTP value. User create OTP value and transfer to bank and bank authenticate them throgth the ARS. If authentication is pass then transaction permitted. Security assessment that the proposed system, the security requirement that the confidentiality and integrity, authentication, repudiation of all of the features provide a key length is longer than the current Internet banking systems, such as using encryption, the security provided by the Financial Supervisory Service Level 1 rating can be applied to more than confirmed.

A Study of Effective game designing processes (효과적인 게임 기획 프로세스 방안 연구)

  • Jeon, Joon Hyun;Jeong, Eui Jun
    • Journal of Korea Game Society
    • /
    • v.16 no.3
    • /
    • pp.35-44
    • /
    • 2016
  • The progress of the game engine make us easier to develop a game product and it is possible for one man to make a game. This means that if you have ideas about game, you can make a game as you thought only if you know how to design a game. Because the game designing is not the field that may not be used like tools and could not buy like graphical data. This study, based on the practice, presented to the understanding and guidance for people who want to know about game designing such as no experienced person and starting new game design. These contributions are supported by a detailed exploration of common understandings of game design methods so that I expect to help designing or managing the project.

A Study of the Feminism Design Emphasizing Feminity and Conversion of Design Paradigm (디자인 패러다임의 전환과 여성성이 강조되는 페미니즘 디자인에 관한 연구)

  • Kim, Yang-Hee
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.10 no.1
    • /
    • pp.5-14
    • /
    • 2010
  • The change in the social paradigm has been directly reflected in design. Throughout the conversion of design paradigm based on ecological paradigm, ecological design and green design make it possible to sustain society and improve the quality of human life. Also, the conversion of design paradigm mean that it changed from Male-identified and Male-dominated design to feminism design, which emphasizes femininity. Because the characteristic of ecological design and feminism design can be understood in the same context. Feminism design is not the kind of design that embodies the stereotype of social gender but the design that reflects the femininity which can be conferred as emotional, intuitional, mutual, sharing, organic and natural. If the result of design recognizes the diversities and differences of the users -based on the female users' experiences and knowledge- and if the need and the requirement of the design are useful enough, through the unity with human environment and harmonious participation, Eco-design and Feminism design will use their abilities to sustain the society and to enhance the quality of human life.

New DC-suppression Method of Modulation Codes for High Density Optical Recording Systems (고밀도 광 기록 장치를 위한 변조 코드의 새로운 직류 성분 제거 방법)

  • Lee, Joo-Hyun;Lee, Jae-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1A
    • /
    • pp.13-17
    • /
    • 2002
  • For elimination DC component, the optical recording systems generally exploit WRDS (word-end running digital sum) criterion. However, its performance is degraded if the lengths of the control bits and codewords are increased. Another criterion is MSW (mean-square weight) method. Whereas MSW criterion has the complexity, this hs optimal performance. In this paper, we have proposed a new dc-component suppression method (MPRDS, minimum peak RDS) of the modulation codes for high density optical recording system. This method requires less complexity than MSW's, and the performance is near to MSW's even if the lengths of the control bits and codewords are increased.

A Exploration of Neural Network Development Methodologies (인공지능 네트워크의 Methodology 개발 상호비교)

  • Lee, Ki-Dong;Meso, Peter
    • Journal of Digital Convergence
    • /
    • v.9 no.4
    • /
    • pp.91-101
    • /
    • 2011
  • We examined current publications on artificial neural network development with a View to identifying the methodologies that are being used to develop these networks, how extensive these methodologies are, the categorization of these methodologies, if these methodologies demonstrate a common underlying and generic (standard) methodology for the development of artificial neural networks, and how closely these methodologies (and the underlying genetic methodology, if established) relate to the conventional systems development methodologies.

A Simulation Based Assessment for Evaluating the Effectiveness of Quasi-Zenith Satellite System

  • Suh, Yong-Cheol;Shibasaki, Ryosuke
    • Korean Journal of Remote Sensing
    • /
    • v.19 no.3
    • /
    • pp.181-190
    • /
    • 2003
  • Since the operation of the first satellite-based navigation service, satellite positioning has played an increasing role in both surveying and geodesy, and has become an indispensable tool for precise relative positioning. However, in some situations, e.g. at a low angle of elevation, the use of satellites for navigation is seriously restricted because obstacles like buildings and mountains can block signals. As a mean to resolve this problem, the quasi-zenith satellite system has been proposed as a next-generation satellite navigation system. Quasi-zenith satellite is a system which simultaneously deploys several satellites in a quasi-zenith geostationary orbit so that one of the satellites always stay close to the zenith if viewed from a specific point on the ground of East Asia. Thus, if a position measurement function compatible with CPS is installed in the quasi-zenith and stationary satellites, and these satellites are utilized together with the CPS, four satellites can be accessed simultaneously nearly all day long and a substantial improvement in position measurement, especially in metropolitan areas, can be achieved. The purpose of this paper is to evaluate the effectiveness of quasi-zenith satellite system on positioning accuracy improvement through simulation by using precise orbital information of the satellites and a three-dimensional digital map. Through this developed simulation system, it is possible to calculate the number of simultaneously visible satellites and available area for positioning without the need of actual observation. Furthermore, this system can calculate the Dilution Of Precision (DOP) and the error distribution.