• 제목/요약/키워드: Fast Connection

Search Result 228, Processing Time 0.024 seconds

Predictive Direct Power Control in MMC-HVDC System (MMC-HVDC 시스템의 예측 기반 직접전력제어)

  • Lee, Kui-Jun
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.23 no.6
    • /
    • pp.403-407
    • /
    • 2018
  • This study proposes a predictive direct power control method in a modular multilevel converter (MMC) high-voltage direct-current (HVDC) system. The conventional proportional integral (PI)-based control method uses a cascaded connection and requires an optimal gain selection procedure and additional decoupling scheme. However, the proposed control method has a simple structure for active/reactive power control due to the direct power control scheme and exhibits a fast dynamic response by predicting the future status of system variables and considering time delay. The effectiveness of the proposed method is verified by simulation results.

Implementation of Spectrum Analysis System for Vibration Monitoring

  • Nguyen, Thanh Ngoc;Jeon, Taehyun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.27-30
    • /
    • 2019
  • Factory monitoring systems are gaining importance in wide areas of industry. Especially, there have been many efforts in implementation of vibration measurement and analysis for monitoring the status of rotating machines. In this paper, a digital signal processor (DSP) based monitoring system dedicated to the vibration monitoring and analysis on rotating machines is discussed. Vibration signals are acquired and processed for the continuous monitoring of the machine status. Time domain signals and fast Fourier transform (FFT) are used for vibration analysis. All of the signal processing procedures are done in the DSP to reduce the production and maintenance cost. The developed system could also provide remote and mobile monitoring capabilities to operator via internet connection. This paper describes the overview of the functional blocks of the implemented system. Test results based on signals from small-size single phase motors are discussed for monitoring and defect diagnosis of the machine status.

Firmware Design and system of stepwise synchronization for CMOS image sensor (Stepwise 동기화 지원을 위한 CMOS 이미지 센서 Firmware 설계 및 개발)

  • Park, Hyun-Moon;Park, Soo-Huyn;Lee, Myung-Soo;Seo, Hae-Moon;Park, Woo-Chool;Jang, Yun-Jung
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.199-208
    • /
    • 2008
  • Lately, since Complementary Metal Oxide Semiconductor(CMOS) image sensor system has low power, low cost and been miniaturized, hardware and applied software studies using these strengths are being carrying on actively. However, the products equipped with CMOS image sensor based polling method yet has several problems in degree of completeness of applied software and firmware, compared with hardware’s. CMOS image sensor system has an ineffective synchronous problem due to superfluous message exchange. Also when a sending of data is delayed continually, overhead of re-sending is large. So because of these, it has a problem in structural stability according to Polling Method. In this study, polling cycle was subdivided in high-speed synchronization method of firmware -based through MCU and synchronization method of Stepwise was proposed. Also, re-connection and data sending were advanced more efficiently by using interrupt way. In conclusion, the proposed method showed more than 20 times better performance in synchronization time and error connection. Also, a board was created by using C328R board of CMOS image sensor-based and ATmega128L which has low power, MCU and camera modules of proposed firmware were compared with provided software and analyzed in synchronization time and error connection.

  • PDF

Rapid Fabrication of Large-Sized Solid Shape using 3D Scanner and Variable Lamination Manufacturing : Case Study of Mount Rushmore Memorial (삼차원 스캐너와 가변 적층 쾌속조형공정을 이용한 대형 입체 형상의 쾌속 제작 : 러쉬모어산 기념물 제작 사례)

  • 이상호;김효찬;송민섭;박승교;양동열
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.28 no.12
    • /
    • pp.1958-1967
    • /
    • 2004
  • This paper describes the method to rapidly fabricate the large-sized physical model with the envelope model size of more than 600 mm${\times}$ 600 mm${\times}$ 600 mm using two type semi-automatic VLM-ST processes in connection with the reverse engineering technology. The fabrication procedure of the large-sized solid shape is as follows: (1) Generation of STL data from 3D scan data using 3D scanner, (2) generation of shell-type STL data by Boolean operation, (3) division of shell-type STL data into several pieces by solid splitting, (4) generation of USL data for each piece with VLM-Slicer, (5) fabrication of each piece by cutting and stacking according to USL data using VLM-ST apparatus, (6) completion of a shell-type prototype by zigzag stacking and assembly for each piece, (7) completion of a 3D solid shape by foam backing, (8) surface finish of a completed 3D solid shape by coating and sanding. In order to examine the applicability of the proposed method, the miniature of the Mount Rushmore Memorial has been fabricated. The envelope model size of the miniature of the Mount Rushmore Memorial is 1,453 mm${\times}$ 760 mm${\times}$ 853 mm in size. From the result of the fabricated miniature of the Mount Rushmore Memorial, it has been shown that the method to fabricate the large object using two type semi-automatic VLM-ST processes in connection with the reverse engineering technology are very fast and efficient.

A Fast Restoration Method for the High Priority Traffics in MPLS Networks (MPLS 망에서 우선 순위가 높은 트래픽을 위한 빠른 복구 방법)

  • Lee Bong-Ha;Kim Eung-Ha;Song Jung-Gil
    • Journal of Internet Computing and Services
    • /
    • v.4 no.2
    • /
    • pp.1-9
    • /
    • 2003
  • Path restoration, which is needed to increase network survivability in MPLS networks, is a technology of supplying reliable service by delivering the traffics through restoring the paths when links or nodes of a working path are failed. In this paper, we propose a path restoration method using duplication of working paths for link failure as a method of restoring paths for the high priority traffics. The existing path restoration method transmits the traffics to the path restoration uniformly in regardless of the priority while link obstacle. It has a problem to take a long time to restore the connection of the high priority traffics. On the other hand, the suggested restoration method establishes the duplication path for the working path, which transmits the high priority traffics and transmit the traffics through the duplication path. It has a strong point to restore the connection quickly. Also, through simulation we analyze the performance of the restoration system using the duplication path and prove that the proposed restoration method is superior in performance to the existing restoration methods regarding to the high priority traffics.

  • PDF

An Optimal AP Discovery Method in 802.11 Network (802.11망에서 최적의 AP 검색 기법)

  • Lee, Daewon
    • The Journal of Korean Association of Computer Education
    • /
    • v.15 no.5
    • /
    • pp.55-62
    • /
    • 2012
  • With the development of mobile communications and Internet technology, there is a strong need to provide seamless and fast connectivity for roaming devices. Generally, the mobile host (MH) may have several available networks when entering a new wireless area. However, the standard of decision for user's internet connection is provided only the subsystem identification (SSID) and signal strength of access point (AP). These two standards could not enough to decide optimal AP to the MH. Therefore, to decide the optimal AP, more information is needed. In this paper, we present additional information such as status of MH, capacity, current load, and depth of network hierarchy, by router advertisement message at layer 3. Also, we proposed decision engine (DE) on the MH that analyzes APs and decides the optimal AP automatically by AP's status information. For the MH, wireless connection period is increased, the power consumption is decreased, and the signaling overhead is reduced. For AP and router, the load balancing is provided and the network topology can also be more efficient.

  • PDF

FE validation of the equivalent diameter calculation model for grouped headed studs

  • Spremic, Milan;Pavlovic, Marko;Markovic, Zlatko;Veljkovic, Milan;Budjevac, Dragan
    • Steel and Composite Structures
    • /
    • v.26 no.3
    • /
    • pp.375-386
    • /
    • 2018
  • Existing design codes for steel-concrete composite structures give only general information about the shear connection provided by headed studs in group arrangement. Grouting of the openings in prefabricated concrete slabs, where the grouped headed studs are placed in the deck pockets is alternative to cast-in-place decks to accomplish fast execution of composite structures. This paper considers the possibility to reduce the distance between the studs within the group, bellow the Eurocode limitations. This may lead to increased competitiveness of the prefabricated construction because more studs are placed in the group if negative effectives of smaller distances between studs are limited. The main purpose of this work is to investigate these limits and propose an analytical calculation model for prediction of the shear resistance of grouped stud arrangements in the deck pockets. An advanced FEA model, validated by results of push-out experiments, is used to analyze the shear behavior of the grouped stud with smaller distance between them than recommended by EN 1994-1. Calculation model for shear resistance, which is consistent with the existing Eurocode rules, is proposed based on a newly introduced equivalent diameter of the stud group, $d_G$. The new calculation model is validated by comparison to the results of FE parametric study. The distance between the studs in the longitudinal direction and the number of stud rows and columns in the group are considered as the main variables.

A Design and Implementation of Secure Electronic Bidding System (인터넷 기반 전자입찰시스템의 보안 설계 및 구현)

  • 윤선희
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.7
    • /
    • pp.861-870
    • /
    • 2002
  • The area of business applications in the internet are extended enormously in result of fast development of computing and communication technologies, increase of internet use, and use of intranet/extranet in enterprise information system. Widely spread the use of the internet, there are various applications for Business to Business (B to B) or Business to Customer(B to C) model that are based on the intranet or extranet. This paper designed and implemented the Web-based Electronic Bidding System for Business to Business (B to B) model. The technical issues of electronic bidding system in the internet are involved in the connection between web client and server, electronic data interchange for the contract document, and security solution during the bidding and contracting processes. The web-based electronic bidding system in this paper is implemented using Java applet and servlet as a connection interface for web client and sewer, XML/EDI-based documents for a bid and a contract, and bidding server and notary server for enhancing the security using PKI(Public Key Infrastructure)-based public key cryptography, digital signature and Certification Authority (CA).

  • PDF

REL License Edit tool development for right integration use of multimedia resources (멀티미디어 자원의 저작권 통합 운용을 위한 REL 라이선스 저작 툴 개발)

  • 송병규;임산송;최종근;정회경
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.221-224
    • /
    • 2004
  • By effect of infinity internet market copyright connection skills for extent extension of digital contents and profit rescue through this impoliticly research and develop. Contents protection techniques, management techniques, circulation techniques etc. are becoming development by contents circulation company and developers but that there is no standard as problem advances soul between copyright managerial system by development competition and in reciprocity compatibility tell. ISO MPEG commission arrived that develop MPEG-21 framework to solve problem that do that is to copyright management's opacity province that non efficiency and standard of contents distribution structure that do that is by redundancy investment are not. Data structure in Framework interior is doing and propose copyright expression language of XML base of REL to establish copyright connection data standard and normalized based on no XML. But, a tool that can be easy as must understand whole framework and can have problem in to edit REL and create copyright document fast was required. In this paper, research about method that edit REL document and develop and spend a edit tool that tan be that expressing intuitionally.

  • PDF

Selection of Detection Measures for Malicious Codes using Naive Estimator (단순 추정량을 이용한 악성코드의 탐지척도 선정)

  • Mun, Gil-Jong;Kim, Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.97-105
    • /
    • 2008
  • The various mutations of the malicious codes are fast generated on the network. Also the behaviors of them become intelligent and the damage becomes larger step by step. In this paper, we suggest the method to select the useful measures for the detection of the codes. The method has the advantage of shortening the detection time by using header data without payloads and uses connection data that are composed of TCP/IP packets, and much information of each connection makes use of the measures. A naive estimator is applied to the probability distribution that are calculated by the histogram estimator to select the specific measures among 80 measures for the useful detection. The useful measures are then selected by using relative entropy. This method solves the problem that is to misclassify the measure values. We present the usefulness of the proposed method through the result of the detection experiment using the detection patterns based on the selected measures.