• Title/Summary/Keyword: Network energy

Search Result 3,776, Processing Time 0.03 seconds

Exploring the Applicability of the Appropriate Technology as a Means Endogenous Development of Rural Areas - Focused on Yeonggwang-gun in Jeollanam-do - (내생적 농촌지역발전 수단으로서의 적정기술 적용 가능성 탐색 - 전남 영광군을 사례로 -)

  • Ko, Kyungho;Ann, Byeong-il
    • Journal of Korean Society of Rural Planning
    • /
    • v.25 no.3
    • /
    • pp.45-57
    • /
    • 2019
  • This study aims to explore the policy directions to apply and activate the appropriate technology in rural areas from the perspective of the endogenous and sustainable regional development theories. To this end, according to the analysis framework based on ideas, values, and strategies that are common to both endogenous regional development strategic theories and sustainable regional development theories, in this paper, various surveys and reviews were conducted on the study areas to explore the possibility of localization of the appropriate technology. The policy implications derived from research results are as follows; first, rural areas have high potential and scalability to apply and activate the appropriate technology, particularly in the field of renewable energy, due to their nature based on local resources. Second, for the practical application of the appropriate technology, first of all, together with the establishment of the role of public sector, it is necessary to plan the projects based on the cooperation network of the relevant innovation entities within and outside the regions and to build the implementation systems. Third, the training system for high skilled manpower and indigenous entrepreneurs should be stably built in order to create independent conditions, which are key elements for growth of the appropriate technology. Fourth, there is a need to find the market and establish policies that can solve the typical economic problems of rural areas such as aging population, depopulation and decline in youth, economic unrest. Fifth, in order for the appropriate technology to contribute to socio-economic innovations and the revitalization of the virtuous circle economy in the region, technical items and various business items suitable for the industrial infrastructures and autonomous conditions of rural areas are essential.

Establishment of Wave Information Network of Korea (WINK) (전국파랑관측자료 제공시스템 WINK 구축)

  • Jeong, Weon-Mu;Oh, Sang-Ho;Ryu, Kyung-Ho;Back, Jong-Dai;Choi, Il-Hoon
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.30 no.6
    • /
    • pp.326-336
    • /
    • 2018
  • Continuous measurement of nearshore waves around Korea over long period is very demanding to setup plans for prevention of disasters of port and coastal structures. In this respect, a new web-based system, termed as WINK, was established, which collects nearshore wave data from Korea Meteorological Agency (KMA), Korea Hydrographic and Oceanographic Agency (KHOA), and Ministry of Oceans and Fisheries (MOF) and provide them after quality control of the data. This paper describes technical aspects regarding collection and selection of the wave observation data, construction of wave hindcasting data, the methodology of quality control for the selected wave data, and overall process of building the web-based data providing system.

Study on Dimensionality Reduction for Sea-level Variations by Using Altimetry Data around the East Asia Coasts

  • Hwang, Do-Hyun;Bak, Suho;Jeong, Min-Ji;Kim, Na-Kyeong;Park, Mi-So;Kim, Bo-Ram;Yoon, Hong-Joo
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.1
    • /
    • pp.85-95
    • /
    • 2021
  • Recently, as data mining and artificial neural network techniques are developed, analyzing large amounts of data is proposed to reduce the dimension of the data. In general, empirical orthogonal function (EOF) used to reduce the dimension in the ocean data and recently, Self-organizing maps (SOM) algorithm have been investigated to apply to the ocean field. In this study, both algorithms used the monthly Sea level anomaly (SLA) data from 1993 to 2018 around the East Asia Coasts. There was dominated by the influence of the Kuroshio Extension and eddy kinetic energy. It was able to find the maximum amount of variance of EOF modes. SOM algorithm summarized the characteristic of spatial distributions and periods in EOF mode 1 and 2. It was useful to find the change of SLA variable through the movement of nodes. Node 1 and 5 appeared in the early 2000s and the early 2010s when the sea level was high. On the other hand, node 2 and 6 appeared in the late 1990s and the late 2000s, when the sea level was relatively low. Therefore, it is considered that the application of the SOM algorithm around the East Asia Coasts is well distinguished. In addition, SOM results processed by SLA data, it is able to apply the other climate data to explain more clearly SLA variation mechanisms.

Efficient and Secure User Authentication and Key Agreement In SIP Networks (효율적이고 안전한 SIP 사용자 인증 및 키 교환)

  • Choi, Jae-Duck;Jung, Sou-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.73-82
    • /
    • 2009
  • This paper proposes an efficient and secure user authentication and key agreement scheme instead of the HTTP digest and TLS between the SIP UA and server. Although a number of security schemes for authentication and key exchange in SIP network are proposed, they still suffer from heavy computation overhead on the UA's side. The proposed scheme uses the HTIP Digest authentication and employs the Diffie-Hellman algorithm to protect user password against dictionary attacks. For a resource-constrained SIP UA, the proposed scheme delegates cryptographically computational operations like an exponentiation operation to the SIP server so that it is more efficient than the existing schemes in terms of energy consumption on the UA. Furthermore, it allows the proposed scheme to be easily applied to the deployed SIP networks since it does not require major modification to the signaling path associated with current SIP standard.

Resource Allocation for D2D Communication in Cellular Networks Based on Stochastic Geometry and Graph-coloring Theory

  • Xu, Fangmin;Zou, Pengkai;Wang, Haiquan;Cao, Haiyan;Fang, Xin;Hu, Zhirui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4946-4960
    • /
    • 2020
  • In a device-to-device (D2D) underlaid cellular network, there exist two types of co-channel interference. One type is inter-layer interference caused by spectrum reuse between D2D transmitters and cellular users (CUEs). Another type is intra-layer interference caused by spectrum sharing among D2D pairs. To mitigate the inter-layer interference, we first derive the interference limited area (ILA) to protect the coverage probability of cellular users by modeling D2D users' location as a Poisson point process, where a D2D transmitter is allowed to reuse the spectrum of the CUE only if the D2D transmitter is outside the ILA of the CUE. To coordinate the intra-layer interference, the spectrum sharing criterion of D2D pairs is derived based on the (signal-to-interference ratio) SIR requirement of D2D communication. Based on this criterion, D2D pairs are allowed to share the spectrum when one D2D pair is far from another sufficiently. Furthermore, to maximize the energy efficiency of the system, a resource allocation scheme is proposed according to weighted graph coloring theory and the proposed ILA restriction. Simulation results show that our proposed scheme provides significant performance gains over the conventional scheme and the random allocation scheme.

A study on Improving the Level of Introduction of Smart Factories Using the Extended Innovation Resistance Model (확장된 혁신저항모델을 활용한 스마트 팩토리 도입 수준 제고에 대한 연구)

  • Park, Chan-Kwon
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.3
    • /
    • pp.107-124
    • /
    • 2021
  • This study is a study on the innovation resistance that may arise in connection with the introduction and use of smart factory-related technologies by SMEs. It is to study the effect of the leading factors of innovation resistance on innovation resistance and the effect of innovation resistance on use intention by using the extended innovation resistance model. A total of 176 survey data were used for the study, and the study was conducted using SPSS 25 and Smart PLS 2.0. Relative advantage, suitability, perceived risk, social impact, and organizational characteristics have a significant effect on innovation resistance, and innovation resistance was tested to have a significant effect on the intention to use. As an implication according to the research, a plan to improve the level of introduction and use of smart factories using the expanded innovative storage model was presented by dividing positive and negative factors, and factors that should be improved and factors that should be reduced are presented. It was specifically presented.

A Case Study on Smart Livestock with Improved Productivity after Information and Communications Technologies Introduction

  • Kim, Gok Mi
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.177-182
    • /
    • 2021
  • The fourth industrial revolution based on information and communication technology (ICT) becomes the center of society, and the overall industrial structure is also changing significantly. ICT refers to the hardware of information devices and the software technologies required for the operation and information management of these devices, and any means of collecting, producing, processing, preserving, communicating and utilizing them. ICT is integrated into industries and services or combined with new technologies in various fields such as robotics and nanotechnology to connect all products and services to the network. The development of ICT, which continuously creates new products and services, has spread to all sectors of the industry, affecting not only daily life but also the livestock sector recently. In agriculture, ICT technology can reduce production costs by efficiently managing labor and energy because it can improve quality and yield based on data on environmental and growth information such as temperature, humidity, light and soil. In particular, smart livestock is considered suitable for achieving livestock management goals because it can reduce labor force and improve productivity by remotely and automatically managing accurate information necessary for raising and breeding livestock with ICT devices. The purpose of this study is to propose the need for ICT technology by comparing farm productivity before and after ICT is introduced. The method of the study is to compare the productivity before and after the introduction of ICT in Korean beef farms, pig farms, and poultry farms. The effectiveness of the study proved the excellence of ICT technology through the production results before ICT introduction and the productivity improvement case of livestock farms that efficiently operated manpower management and reduced labor force after ICT introduction. The conclusion of this paper is to present the need for smart livestock through ICT adoption through case study results.

Non-Intrusive Load Monitoring Method based on Long-Short Term Memory to classify Power Usage of Appliances (가전제품 전력 사용 분류를 위한 장단기 메모리 기반 비침입 부하 모니터링 기법)

  • Kyeong, Chanuk;Seon, Joonho;Sun, Young-Ghyu;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.109-116
    • /
    • 2021
  • In this paper, we propose a non-intrusive load monitoring(NILM) system which can find the power of each home appliance from the aggregated total power as the activation in the trading market of the distributed resource and the increasing importance of energy management. We transform the amount of appliances' power into a power on-off state by preprocessing. We use LSTM as a model for predicting states based on these data. Accuracy is measured by comparing predicted states with real ones after postprocessing. In this paper, the accuracy is measured with the different number of electronic products, data postprocessing method, and Time step size. When the number of electronic products is 6, the data postprocessing method using the Round function is used, and Time step size is set to 6, the maximum accuracy can be obtained.

Forecasting LNG Freight rate with Artificial Neural Networks

  • Lim, Sangseop;Ahn, Young-Joong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.187-194
    • /
    • 2022
  • LNG is known as the transitional energy source for the future eco-friendly, attracting enormous market attention due to global eco-friendly regulations, Covid-19 Pandemic, Russia-Ukraine War. In addition, since new LNG suppliers such as the U.S. and Australia are also diversifying, the LNG spot market is expected to grow. On the other hand, research on the LNG transportation market has been marginalized. Therefore, this study attempted to predict short-term LNG 160K spot rates and compared the prediction performance between artificial neural networks and the ARIMA model. As a result of this paper, while it was difficult to determine the superiority and superiority of ARIMA and artificial neural networks, considering the relative free of ANN's contraints, we confirmed the feasibility of ANN in LNG 160K spot rate prediction. This study has academic significance as the first attempt to apply an artificial neural network to forecasting LNG 160K spot rates and are expected to contribute significantly in practice in that they can improve the quality of short-term investment decisions by market participants by increasing the accuracy of short-term prediction.

A New Design of Privacy Preserving Authentication Protocol in a Mobile Sink UAV Setting (Mobile Sink UAV 환경에서 프라이버시를 보장하는 새로운 인증 프로토콜 설계)

  • Oh, Sang Yun;Jeong, Jae Yeol;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1247-1260
    • /
    • 2021
  • For more efficient energy management of nodes in wireless sensor networks, research has been conducted on mobile sink nodes that deliver data from sensor nodes to server recently. UAV (Unmanned Aerial vehicle) is used as a representative mobile sink node. Also, most studies on UAV propose algorithms for calculating optimal paths and have produced rapid advances in the IoD (Internet of Drones) environment. At the same time, some papers proposed mutual authentication and secure key exchange considering nature of the IoD, which requires efficient creation of multiple nodes and session keys in security perspective. However, most papers that proposed secure communication in mobile sink nodes did not protect end-to-end data privacy. Therefore, in this paper, we propose integrated security model that authentication between mobile sink nodes and sensor nodes to securely relay sensor data to base stations. Also, we show informal security analysis that our scheme is secure from various known attacks. Finally, we compare communication overhead with other key exchange schemes previously proposed.