• Title/Summary/Keyword: application development scheme

Search Result 286, Processing Time 0.025 seconds

Fault Locator using GPS Time-synchronized Phasor for Transmission Line (송전선로의 동기페이저를 이용한 고장점 표정장치)

  • Lee, Kyung-Min;Park, Chul-Won
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.65 no.1
    • /
    • pp.47-52
    • /
    • 2016
  • Fault location identification in the transmission line is an essential part of quick service restoration for maintaining a stable in power system. The application of digital schemes to protection IEDs has led to the development of digital fault locators. Normally, the impedance measurement had been used to for the location detection of transmission line faults. It is well known that the most accurate fault location scheme uses two-ended measurements. This paper deals with the complete design of a fault locator using GPS time-synchronized phasor for transmission line fault detection. The fault location algorithm uses the transmitted relaying signals from the two-ended terminal. The fault locator hardware consists of a Main Processor Unit, Analog Digital Processor Unit, Signal Interface Unit, and Power module. In this paper, sample real-time test cases using COMTRADE format of Omicron apparatus are included. We can see that the implemented fault locator identified all the test faults.

Application of AIS in AtoN Wireless Surveillance System

  • Liu, Chang;Liu, Ren-Jie;Shi, Xiao-Fei;Huang, Yao-Liang
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2006.10a
    • /
    • pp.129-133
    • /
    • 2006
  • In China, the traditional method of artificial and periodical cruise is still adopted for the AtoN management, which has brought many disadvantages to the work of the AtoN management, such as non real-time, fallibility, and low efficiency However, with the rapid development of AIS technique, now AIS equipments have been widely installed on ships, and on the other hand China Maritime Safety Administration (abr. China MSA) is carrying out the scheme of AIS base station network in china, based on which the digital AtoN will develop in the future. According to what have been analyzed above, this paper puts forward a design of AtoN wireless surveillance system based on AIS. The system consists of AIS on AtoN, AIS base station and AtoN management center. It can provide such functions as the information gathering, managing of AtoN and the service of navigation assistance. This paper gives the whole design including the work theory, the hardware structure and the software scheme of the system, and finally gives the simulation software of the AtoN management center. The AtoN wireless surveillance system brought forward by this paper will be more efficient with less repair cost and less work of the supervisors. It will bring revolutionary progress in the navigation aids system in China.

  • PDF

Multipoint variable generalized displacement methods: Novel nonlinear solution schemes in structural mechanics

  • Maghami, Ali;Shahabian, Farzad;Hosseini, Seyed Mahmoud
    • Structural Engineering and Mechanics
    • /
    • v.83 no.2
    • /
    • pp.135-151
    • /
    • 2022
  • The generalized displacement method is a nonlinear solution scheme that follows the equilibrium path of the structure based on the development of the generalized displacement. This method traces the path uniformly with a constant amount of generalized displacement. In this article, we first develop higher-order generalized displacement methods based on multi-point techniques. According to the concept of generalized stiffness, a relation is proposed to adjust the generalized displacement during the path-following. This formulation provides the possibility to change the amount of generalized displacement along the path due to changes in generalized stiffness. We, then, introduce higher-order algorithms of variable generalized displacement method using multi-point methods. Finally, we demonstrate with numerical examples that the presented algorithms, including multi-point generalized displacement methods and multi-point variable generalized displacement methods, are capable of following the equilibrium path. A comparison with the arc length method, generalized displacement method, and multi-point arc-length methods illustrates that the adjustment of generalized displacement significantly reduces the number of steps during the path-following. We also demonstrate that the application of multi-point methods reduces the number of iterations.

Toward Energy-Efficient Task Offloading Schemes in Fog Computing: A Survey

  • Alasmari, Moteb K.;Alwakeel, Sami S.;Alohali, Yousef
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.163-172
    • /
    • 2022
  • The interconnection of an enormous number of devices into the Internet at a massive scale is a consequence of the Internet of Things (IoT). As a result, tasks offloading from these IoT devices to remote cloud data centers become expensive and inefficient as their number and amount of its emitted data increase exponentially. It is also a challenge to optimize IoT device energy consumption while meeting its application time deadline and data delivery constraints. Consequently, Fog Computing was proposed to support efficient IoT tasks processing as it has a feature of lower service delay, being adjacent to IoT nodes. However, cloud task offloading is still performed frequently as Fog computing has less resources compared to remote cloud. Thus, optimized schemes are required to correctly characterize and distribute IoT devices tasks offloading in a hybrid IoT, Fog, and cloud paradigm. In this paper, we present a detailed survey and classification of of recently published research articles that address the energy efficiency of task offloading schemes in IoT-Fog-Cloud paradigm. Moreover, we also developed a taxonomy for the classification of these schemes and provided a comparative study of different schemes: by identifying achieved advantage and disadvantage of each scheme, as well its related drawbacks and limitations. Moreover, we also state open research issues in the development of energy efficient, scalable, optimized task offloading schemes for Fog computing.

Traffic Analysis of Statistics based on Internet Application Services (인터넷 응용 서비스의 통계에 근거한 트래픽 분석)

  • 정태수;최진섭;정중수;김정태;김대영
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.5
    • /
    • pp.995-1003
    • /
    • 2004
  • A number of Internet application services are used with the development of Internet backbone nowadays. Well-known services such as WWW, ]n, email are provided at first time. Tremendous unwell-known services are presented according to the demands of various contents. After analyzing PDU information of the packet using unwell-known port travelling on the internet, searching internet service type and its statistical data is provided with internet traffic analyst as very useful information. This paper presents the mechanism to extract the internet application services operated on (un)well-known port of UDP or TCP used occasionally through netflow and tcpdump method introduced by ethereal and the operation scheme of the service. Afterwards to get the detailed statistics of the analyzed application service, the agent and the server environment, the agent gathering raw data traffics and the server adapting the traffic received from the agent BNF(Backus-Naur Form) method, is also introduced. Adapting the presented mechanism eve. LAN of Andong national university, the internet traffic service type and the detailed statistics of the analyzed application services which provides with internet traffic analyst are presented as very useful information.

The Study of Collaborative Work-Flow System Architecture for Optimization of Product Development in Enterprise (기업의 제품 개발업무 최적화를 위한 Collaborative Work-Flow System Architecture 연구)

  • Lee, Jae-Cheol;Bang, Heon;Ahn, Dae-Jung;Kim, Tae-Yun;Lee, Seung-Ho;Ryu, Yeong-Seon;Song, Byeong-Jae;Choi, Yeong-Jun;Ahn, Gye-Ho;Chang, Jeong-Ryeol;Cho, Sang-seok;Ryu Byeon-Gil;Hwang, Chang-Gyu
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.25-28
    • /
    • 2001
  • Today enterprises are bringing forward the strong needs for the Global Work Space that is able to realize the collaboration of the virtual enterprise in order to achieve the rapid entrance to market, the quality improvement as well as the cost reduction of their new products. Especially, they are building the efficient Product Management Infrastructure in parallel with the real-time knowledge management for the information generated in the course of a product lifecycle and the Process Innovation making the Concurrent Engineering possible. Building a system in the web environment cannot be the entire effort to realize the Global Work Space within an enterprise that is an essential factor for the reduction of a product development period which in turn contributes to Time to Market. Various work models and processes are found in enterprises and many different application programs are developed and utilized to support these. This study proposes a scheme for the optimized Collaborative Workflow System Architecture that is able to take in and apply various application programs accompanied by the product development work process. Through this, we are to examine various limits and problems existing in the real-time collaborative system between enterprises and to reform these.

  • PDF

Development of Leader Selection Algorithm to Support Fault Tolerance of Integrated Management Systems in the Naval Combat System (함정 전투체계에서 통합 통제 시스템의 고장 감내를 지원하기 위한 리더 선정 알고리즘 개발)

  • Seo, Yongjin;Jo, Jun Young;Kim, Hyeon Soo;Go, Youngkeun;Kim, Chum-Soo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.3
    • /
    • pp.382-391
    • /
    • 2019
  • The naval combat system is a distributed system in which various subsystems are integrated and operated together. The integrated management system(IMS) is a software system for systematically and consistently managing the application software which control and operate various devices in such a combat system. Since the malfunction or failure of such an IMS can disable the entire combat system, the IMS is more important than other application software of the combat system. In this paper, we propose a method to guarantee the stable and correct operation of the combat system. To this end, we propose a redundancy scheme composed of one leader and several followers so as to tolerate the failure situation of the IMS. We also propose a leader selection algorithm to select a new leader when the leader fails and can no longer perform its role. To verify the validity of the study, we verify the fault tolerance behavior of the system and the accuracy of the leader selection algorithm.

A Probabilistic Prediction of Weapon Systems Evaluation Test Execution Ratio and Management Scheme (무기체계 평가시험 수행율의 확률적 예측 및 관리기법)

  • Jang, Young-sik;Han, Sung-hee;Han, Hyun-goo;Mun, Chang-min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.468-474
    • /
    • 2017
  • A test service for the weapon systems evaluation is one of the most important processes during the weapon systems acquisition or development life cycle. Before completion of weapon systems development, the appropriate evaluation test can reduce risk and expense which might be expected during weapon systems development procedure. In this paper, it is suggested that a probabilistic prediction method based on Monte Carlo simulation for how much the annual weapon systems evaluation test excution ratio can be reached compared to the yearly initial planned test quantity. And then a weapon systems evaluation test quantitative management scheme is suggested to assist decision making for the test schedule manager who can arrange monthly test schedule based on the prediction result of annual test excution ratio. And the proposed method is applied for the weapon systems evaluation firing test data of the 8th directorate, Agency for Defense Development(ADD). And also the application result is examined.

Reversible Watermarking For Relational Databases using DE (Difference Expansion) Algorithm (DE 알고리즘을 사용한 관계형 데이터베이스를 위한 가역 워터마킹)

  • Kim, Cheonshik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.7-13
    • /
    • 2015
  • Generally, watermarking can be used copyright for contents such as audios, videos, images, and texts. With the development of Internet, many malicious attackers illegally copy relational databases synchronized applications Therefore, it is needed for the protection of databases copyright, because databases involve various sensitive information such as personal information, information industry, and secret national intelligence. Thus, the protection of relational databases is a major research field in the databases research topics. In this paper, we will review previous researches related the protection of relational databases and propose new method for relational data. Especially, we propose watermarking scheme for databases using reversible method in this paper. As an experimental result, the proposed scheme is very strong to malicious attacks. In addition, we proved our proposed scheme is to apply real application.

Multi-layer Network Virtualization for QoS Provisioning in Tactical Networks (전술망의 서비스 품질 보장을 위한 다계층 네트워크 가상화 기법)

  • Kim, Yohan;An, Namwon;Park, Juman;Park, Chan Yi;Lim, Hyuk
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.4
    • /
    • pp.497-507
    • /
    • 2018
  • Tactical networks are evolving into an All-IP based network for network centric warfare(NCW). Owing to the flexibility of IP based network, various military data applications including real-time and multi-media services are being integrated in tactical networks. Because each application has diverse Quality-of-service(QoS) requirements, it is crucial to develop a QoS provisioning method for guaranteeing QoS requirements efficiently. Conventionally, differentiated services(DiffServ) have been used to provide a different level of QoS for traffic flows. However, DiffServ is not designed to guarantee a specific requirement of QoS such as delay, loss, and bandwidth. Therefore, it is not suitable for military applications with a tight bound of QoS requirements. In this paper, we propose a multi-layer network virtualization scheme that allocates traffic flows having different QoS requirements to multiple virtual networks, which are constructed to support different QoS policies such as virtual network functions(VNFs), routing, queueing/active queue management(AQM), and physical layer policy. The experiment results indicate that the proposed scheme achieves lower delays and losses through multiple virtual networks having differentiated QoS policies in comparison with conventional networks.