• Title/Summary/Keyword: User-defined Model

Search Result 415, Processing Time 0.026 seconds

Optimal Charging and Discharging for Multiple PHEVs with Demand Side Management in Vehicle-to-Building

  • Nguyen, Hung Khanh;Song, Ju Bin
    • Journal of Communications and Networks
    • /
    • v.14 no.6
    • /
    • pp.662-671
    • /
    • 2012
  • Plug-in hybrid electric vehicles (PHEVs) will be widely used in future transportation systems to reduce oil fuel consumption. Therefore, the electrical energy demand will be increased due to the charging of a large number of vehicles. Without intelligent control strategies, the charging process can easily overload the electricity grid at peak hours. In this paper, we consider a smart charging and discharging process for multiple PHEVs in a building's garage to optimize the energy consumption profile of the building. We formulate a centralized optimization problem in which the building controller or planner aims to minimize the square Euclidean distance between the instantaneous energy demand and the average demand of the building by controlling the charging and discharging schedules of PHEVs (or 'users'). The PHEVs' batteries will be charged during low-demand periods and discharged during high-demand periods in order to reduce the peak load of the building. In a decentralized system, we design an energy cost-sharing model and apply a non-cooperative approach to formulate an energy charging and discharging scheduling game, in which the players are the users, their strategies are the battery charging and discharging schedules, and the utility function of each user is defined as the negative total energy payment to the building. Based on the game theory setup, we also propose a distributed algorithm in which each PHEV independently selects its best strategy to maximize the utility function. The PHEVs update the building planner with their energy charging and discharging schedules. We also show that the PHEV owners will have an incentive to participate in the energy charging and discharging game. Simulation results verify that the proposed distributed algorithm will minimize the peak load and the total energy cost simultaneously.

A Study on Two-Dimensional Analysis with the Acceptance of High-Tech New Product - Focusing on Smart-Phone's Usefulness Expectancy referring to Product and Application - (하이테크 신제품 수용의 2차원 연구 - 스마트폰의 제품과 애플리케이션 유용성 기대를 중심으로-)

  • Lim, Yang Whan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.151-162
    • /
    • 2011
  • This study defined acceptance of high-tech new product as user's active using the product such as utilizing application software rather than purchasing it. As exploring factors to effect on customer's acceptance, usefulness expectancy was examined from product side and application side. When investigating the exogenous variables to influence on usefulness expectancy from the product side, customer's product knowledge and social influences are put forward to support the hypothesis. From the application side, customer's knowledge about the application and its trust are put to explain usefulness expectancy of the application. Smart phone users were good subjects for this study and most hypotheses were tested using structural equation model and the results are followings. First usefulness expectancy of the product and of application significantly effect on customer's intention to use high-tech new product and also usefulness expectancy of the product positively effects on which of the application. Second customer's perceived knowledge about the product and social influences impact usefulness expectancy of the product. But third customer's perceived trust toward application didn't any positive impact usefulness expectancy of the application. Through the result, there will be several implications. First, from both of side; product and application, customer's usefulness expectancy should be satisfied to be successful in high-tech products market. Second, customer should be Ieant about advantages of the product and knowledge about the application as well, and then trigger their usefulness expectancy.

Video Object Extraction Using Contour Information (윤곽선 정보를 이용한 동영상에서의 객체 추출)

  • Kim, Jae-Kwang;Lee, Jae-Ho;Kim, Chang-Ick
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.48 no.1
    • /
    • pp.33-45
    • /
    • 2011
  • In this paper, we present a method for extracting video objects efficiently by using the modified graph cut algorithm based on contour information. First, we extract objects at the first frame by an automatic object extraction algorithm or the user interaction. To estimate the objects' contours at the current frame, motion information of objects' contour in the previous frame is analyzed. Block-based histogram back-projection is conducted along the estimated contour point. Each color model of objects and background can be generated from back-projection images. The probabilities of links between neighboring pixels are decided by the logarithmic based distance transform map obtained from the estimated contour image. Energy of the graph is defined by predefined color models and logarithmic distance transform map. Finally, the object is extracted by minimizing the energy. Experimental results of various test images show that our algorithm works more accurately than other methods.

Strength Analysis of Composite Double-lap Bolted Joints by Progressive Failure Theory Based on Damage Variables (손상변수기반 점진적 파손이론을 이용한 복합재 이중 겹침 볼트 체결부의 강도 해석)

  • Kim, Sang-Kuk;Kweon, Jin-Hwe
    • Composites Research
    • /
    • v.26 no.2
    • /
    • pp.91-98
    • /
    • 2013
  • A three-dimensional finite analysis method was proposed to predict the failure of composite double-lap bolted joints, which is based on the stiffness degradation method using damage variables and Hashin's three-dimensional failure criteria. Ladeveze's theory using damage variables to consider the matrix/shear damage was combined with stiffness degradation in fiber direction. Four different failure modes were considered including matrix compression/shear, matrix tension/shear, fiber compression, and tension failures. The friction between bolt and composite and the clamping force were considered using a commercial finite element software ABAQUS. The damage model was incorporated using the user-defined subroutine of the software. The predicted result was verified with the existing test result for bearing tension double shear and showed the deviation ranging 7~16% from test results.

Development Software to Select Boundary Manikins for Product Evaluation: Applied to an Automobile Case (사용성 평가 전용 인체모델 선정 소프트웨어 개발 및 자동차 적용사례)

  • Lim, Young-Jae;Park, Sung-Joon;Park, Woo-Jin;Park, Jun-Soo;Jung, Eui-S.;Lim, Ik-Sung
    • Journal of the Ergonomics Society of Korea
    • /
    • v.29 no.6
    • /
    • pp.831-841
    • /
    • 2010
  • Usability evaluation of physical products involves characterizing complex physical interactions between humans and products. Human models known as manikins have been widely utilized as usability evaluation tools for automobile interior package design. When combined with computer-aided design software programs, such manikins can be used to simulate driving postures and evaluate driver-interior fits early in the design process, and therefore, may greatly facilitate achieving high-quality design in a cost-efficient manner. The purpose of this study was to define a set of manikins for designing automobile interior packages for the South Korean male population. These manikins were conceptualized as "boundary" manikins, which represent individuals lacking in certain physical capacities or having usability-related issues (e.g., an individual with the 5th percentile forward reach capability, an individual with the 95th percentile shoulder width). Such boundary manikins can serve as an efficient tool for determining if an automobile interior design accommodates the majority of the population. The boundary manikins were selected from the large sample of Korean males whose anthropometric dimensions were described in the recent Size Korea anthropometric database. For each male in the database, his comfortable driving posture was represented using a kinematic body linkage model and various physical capacity measured and usability-related characteristics relevant to driver accommodation were evaluated. For each such measure, a boundary manikin was selected among the Korean males. The manikins defined in this study are expected to serve as tools for ergonomic design of automobile interior packages. The manikin selection method developed in this study was implemented as a generic software program useful for various product design applications.

FMS 스케쥴링을 위한 Priority 함수의 자동 생성에 관한 연구

  • 김창욱;신호섭;장성용;박진우
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1997.04a
    • /
    • pp.93-99
    • /
    • 1997
  • Most of the past studies on FMS scheduling problems may be classified into two classes, namely off-line scheduling and on-line scheduling approach. The off-line scheduling methods are used mostly for FMS planning purposes and may not be useful real time control of FMSs, because it generates solutions only after a relatively long period of time. The on-line scheduling methods are used extensively for dynamic real-time control of FMSs although the performance of on-line scheduling algorithms tends vary dramatically depending on various configurations of FMS. Current study is about finding a better on-line scheduling rules for FMS operations. In this study, we propose a method to create priority functions that can be used in setting relative priorities among jobs or machines in on-line scheduling. The priority functions reflect the configuration of FMS and the user-defined objective functions. The priority functions are generated from diverse dispatching rules which may be considered a special priority functions by themselves, and used to determine the order of processing and transporting parts. Overall system of our work consists of two modules, the Priority Function Evolution Module (PFEM) and the FMS Simulation Module (FMSSM). The PFEM generates new priority functions using input variables from a terminal set and primitive functions from a function set by genetic programming. And the FMSSM evaluates each priority function by a simulation methodology. Based on these evaluated values, the PFEM creates new priority functions by using crossover, mutation operation and probabilistic selection. These processes are iteratively applied until the termination criteria are satisfied. We considered various configurations and objective functions of FMSs in our study, and we seek a workable solution rather than an optimum or near optimum solution in scheduling FMS operations in real time. To verify the viability of our approach, experimental results of our model on real FMS are included.

  • PDF

A Study of Security QoS(Quality of Service) Measurement Methodology for Network Security Efficiency (네트워크 보안 효율성 제고를 위한 보안 QoS(Quality of Service) 측정방법론 연구)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.39-48
    • /
    • 2011
  • QoS(Quality of Service) is defined "The collective effect of service performance which determines the degree of satisfaction of a user of the service" by ITU-T Rec. E.800. The final goal of information system is to secure the performance efficiency within the required time. The security QoS framework is the modeling of the QoS measurement metrics, the measurement time schedule, instrument, method of measurement and the series of methodology about analysis of the result of measurement. This paper relates to implementing issue and performance measuring about blended mechanism between networking technology and security technology. We got more effectiveness in overall network security, when applying and composing amalgamated security mechanism between network technology and security technology. In this paper, we suggest techniques being used on infrastructure system and also offers a security QoS methodology as a model of more effective way. Methodology proposed in this research has proven that it is possible to measure response time through the scheduled method.

Performance Analysis of Asynchronous OFDMA Uplink Systems with Timing Misalignments over Frequency-selective Fading Channels (주파수 선택적 페이딩 채널에서 시간오차에 의한 비동기 OFDMA 상향 시스템의 성능 분석)

  • Park, Myong-Hee;Ko, Kyun-Byoung;Park, Byung-Joon;Lee, Young-Il;Hong, Dae-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.2A
    • /
    • pp.34-42
    • /
    • 2005
  • In orthogonal frequency-division multiple access (OFDMA) uplink environments, asynchronously received signals can cause multiple access interference (MAI). This paper focuses on the performance degradation due to the MAI over frequency-selective fading channels. We first introduce the timing misalignment, which is defined as the relative timing difference between asynchronous timing error of uplink user and reference time of the base station, and analytically derive the MAI using the power delay profile of wide-sense stationary uncorrelated scattering (WSSUS) channel model. Then, the effective signal-to-noise ratio (SNR) and the average symbol error probability (SEP) are derived. The proposed analytical results are verified through simulations with respect to the region of the timing misalignment and the number of asynchronous users.

A Study on the Use of Stopword Corpus for Cleansing Unstructured Text Data (비정형 텍스트 데이터 정제를 위한 불용어 코퍼스의 활용에 관한 연구)

  • Lee, Won-Jo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.891-897
    • /
    • 2022
  • In big data analysis, raw text data mostly exists in various unstructured data forms, so it becomes a structured data form that can be analyzed only after undergoing heuristic pre-processing and computer post-processing cleansing. Therefore, in this study, unnecessary elements are purified through pre-processing of the collected raw data in order to apply the wordcloud of R program, which is one of the text data analysis techniques, and stopwords are removed in the post-processing process. Then, a case study of wordcloud analysis was conducted, which calculates the frequency of occurrence of words and expresses words with high frequency as key issues. In this study, to improve the problems of the "nested stopword source code" method, which is the existing stopword processing method, using the word cloud technique of R, we propose the use of "general stopword corpus" and "user-defined stopword corpus" and conduct case analysis. The advantages and disadvantages of the proposed "unstructured data cleansing process model" are comparatively verified and presented, and the practical application of word cloud visualization analysis using the "proposed external corpus cleansing technique" is presented.

Testing case analysis of Database Software (데이터베이스 소프트웨어의 시험 사례 분석)

  • Yang, Hae-Sool;Kang, Bae-Keun;Lee, Ha-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.167-174
    • /
    • 2009
  • The meaning of Database in order to manage the data which is huge in the meeting of the record which logically had become the fire tube or file 'efficiently' is widely used from the place which controls a many double meaning data. Like this data base it creates, it manages, the programs which send an answer back according to demand of the user as DBMS it calls. Like this it will be able to grasp the quality level of the data base software product which is important index from the research which index it buys it defined. Also, in order to produce the result of index it selects the collection item which is necessary and collection and analysis it leads and what kind of defect types occur substantially mainly, and it confirmed and the test and evaluation model in about data base software and a tentative instance it developed it analyzed.