• Title/Summary/Keyword: distributed applications

Search Result 1,258, Processing Time 0.031 seconds

Optimal DG Placement in a Smart Distribution Grid Considering Economic Aspects

  • Buaklee, Wirote;Hongesombut, Komsan
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.4
    • /
    • pp.1240-1247
    • /
    • 2014
  • The applications of Distributed Generation (DG) in a smart distribution grid environment are widely employed especially for power balancing and supporting demand responses. Using these applications can have both positive and negative impacts on the distribution system. The sizing and location of their installations are the issues that should be taken into consideration to gain the maximum benefit from them when considering the economic aspects. This paper presents an application of the Bat Algorithm (BA) for the optimal sizing and siting of DG in a smart distribution power system in order to maximize the Benefit to Cost Ratio (BCR), subjected to system constraints including real and reactive power generation, line and transformer loading, voltage profile, energy losses, fault level as well as DG operating limits. To demonstrate the effectiveness of the proposed methodology and the impact of considering economic issues on DG placement, a simplify 9-bus radial distribution system of the Provincial Electricity Authority of Thailand (PEA) is selected for the computer simulation to explore the benefit of the optimal DG placement and the performance of the proposed approach.

Active Networking Approach for Multimedia Service framework (멀티미디어 서비스 프레임워크에서의 Active Networking 기술 적용 방안)

  • 이종화;함진호
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.3
    • /
    • pp.367-377
    • /
    • 1998
  • In this paper, we propose a framework (named Multimedia Service Framework) that provides the development and operation of different kind of multimedia applications. This framework defines the architectures and its functionalities for supporting multimedia services, in 3 layers of: Application, Distributed Support System and Network. Firstly, we analyzed general characteristics of multimedia applications, and defined a set of horizontal and vertical services in the Application Architecture. Also, we determined functionalities and services required to support all application services in the Distributed Support System Architecture which must provide functions for the distribution transparencies, resource sharing, interoperability and portabiliy. Finally, in the Network Architecture we proposed the network infrastructure and services to increase the efficiency in resource management and processing capacity of network components such as router and switch, adopting the active networking approach.

  • PDF

Android Application Analysis Method for Malicious Activity Detection (안드로이드 앱 악성행위 탐지를 위한 분석 기법 연구)

  • Sim, Won-Tae;Kim, Jong-Myoung;Ryou, Jae-Cheol;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.213-219
    • /
    • 2011
  • Due to the rapid growth of smartphone market, the security threats are also increased. One of the smartphone security threats is that w1Verified applications are distributed on the smartphone market. In the case of Andoroid market, Google have no Application Approval Process that can detect malicious android application so many malicious android applications are distributed in the Android market. To reduce this security threat, it is essential the skill to detect the malicious activities of application. In this paper, we propose the android application analysis method for malicious activity detection and we introduce the implementation of our method which can automatically analyze the android application.

A Secure Network for Mobile Wireless Service

  • Peng, Kun
    • Journal of Information Processing Systems
    • /
    • v.9 no.2
    • /
    • pp.247-258
    • /
    • 2013
  • A new secure network communication technique that has been designed for mobile wireless services, is presented in this paper. Its network services are mobile, distributed, seamless, and secure. We focus on the security of the scheme and achieve anonymity and reliability by using cryptographic techniques like blind signature and the electronic coin. The question we address in this paper is, "What is the best way to protect the privacy and anonymity of users of mobile wireless networks, especially in practical applications like e-commerce?" The new scheme is a flexible solution that answers this question. It efficiently protects user's privacy and anonymity in mobile wireless networks and supports various applications. It is employed to implement a secure e-auction as an example, in order to show its advantages in practical network applications.

Charted Depth Interpolation: Neuron Network Approaches

  • Shi, Chaojian
    • Journal of Navigation and Port Research
    • /
    • v.28 no.7
    • /
    • pp.629-634
    • /
    • 2004
  • Continuous depth data are often required in applications of both onboard systems and maritime simulation. But data available are usually discrete and irregularly distributed. Based on the neuron network technique, methods of interpolation to the charted depth are suggested in this paper. Two algorithms based on Levenberg-Marquardt back-propaganda and radial-basis function networks are investigated respectively. A dynamic neuron network system is developed which satisfies both real time and mass processing applications. Using hyperbolic paraboloid and typical chart area, effectiveness of the algorithms is tested and error analysis presented. Special process in practical applications such as partition of lager areas, normalization and selection of depth contour data are also illustrated.

A Study on Data Management and Communication Infrastructure Based Upon Standards for Smart Grid Operation (스마트그리드 운영을 위한 표준 기반 데이터 관리 및 통신 인프라에 관한 연구)

  • Choi, Seung-Hwan;Shin, Jin-Ho;Kim, Jun-Sung
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.9
    • /
    • pp.1209-1216
    • /
    • 2013
  • Recently, there is a rising interest in smart grid operating system which manages various types of distributed generation, smart meters, and electric vehicles with power grid. Considering the features of smart grid environment, the interoperability should be one of the important factors to build smart grid environment successfully. To secure interoperability, smart grid operating system should conform to some standards in terms of the data representation and communication. CIM and OPC-UA are the international standards widely used in smart grid domain for enabling interoperability. They provide common information model and the unified architecture for communicating between each systems or applications. In this paper, we illustrate a smart grid operating system that we have developed to secure interoperability between not only applications but also numerous legacy systems(applications) by implementing CIM based information model and OPC-UA based communication interface services.

Charted Depth Interpolation: Neuron Network Approaches

  • Chaojian, Shi
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2004.08a
    • /
    • pp.37-44
    • /
    • 2004
  • Continuous depth data are often required in applications of both onboard systems and maritime simulation. But data available are usually discrete and irregularly distributed. Based on the neuron network technique, methods of interpolation to the charted depth are suggested in this paper. Two algorithms based on Levenberg-Marquardt back-propaganda and radial-basis function networks are investigated respectively. A dynamic neuron network system is developed which satisfies both real time and mass processing applications. Using hyperbolic paraboloid and typical chart area, effectiveness of the algorithms is tested and error analysis presented. Special process in practical applications such as partition of lager areas, normalization and selection of depth contour data are also illustrated.

  • PDF

RAS: Request Assignment Simulator for Cloud-Based Applications

  • Rajan, R. Arokia Paul;Francis, F. Sagayaraj
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.6
    • /
    • pp.2035-2049
    • /
    • 2015
  • Applications deployed in cloud receive a huge volume of requests from geographically distributed users whose satisfaction with the cloud service is directly proportional to the efficiency with which the requests are handled. Assignment of user requests based on appropriate load balancing principles significantly improves the performance of such cloud-based applications. To study the behavior of such systems, there is a need for simulation tools that will help the designer to set a test bed and evaluate the performance of the system by experimenting with different load balancing principles. In this paper, a novel architecture for cloud called Request Assignment Simulator (RAS) is proposed. It is a customizable, visual tool that simulates the request assignment process based on load balancing principles with a set of parameters that impact resource utilization. This simulator will help to ascertain the best possible resource allocation technique by facilitating the designer to apply and test different load balancing principles for a given scenario.

Error Recovery Script of Immunity Debugger for C# .NET Applications

  • Shinde, Rupali;Choi, Min;Lee, Su-Hyun
    • Journal of Information Processing Systems
    • /
    • v.15 no.6
    • /
    • pp.1438-1448
    • /
    • 2019
  • We present a new technique, called VED (very effective debugging), for detecting and correcting division by zero errors for all types of .NET application. We use applications written in C# because C# applications are distributed through the internet and its executable format is used extensively. A tool called Immunity Debugger is used to reverse engineer executable code to get binaries of source code. With this technique, we demonstrate integer division by zero errors, the location of the error causing assembly language code, as well as error recovery done according to user preference. This technique can be extended to work for other programming languages in addition to C#. VED can work on different platforms such as Linux. This technique is simple to implement and economical because all the software used here are open source. Our aims are to simplify the maintenance process and to reduce the cost of the software development life cycle.

Applications of BOTDR fiber optics to the monitoring of underground structures

  • Moffat, Ricardo A.;Beltran, Juan F.;Herrera, Ricardo
    • Geomechanics and Engineering
    • /
    • v.9 no.3
    • /
    • pp.397-414
    • /
    • 2015
  • Three different applications for monitoring displacements in underground structures using a BOTDR-based distributed optical fiber strain sensing system are presented. These applications are related to the strain measurements of (1) instrumented PVC tube designed to be attached to tunnel side wall and ceiling as a sensor; (2) rock bolts for tunnels; and (3) shotcrete lining under loading. The effectiveness of using the proposed strain sensing system is evaluated by carrying out laboratory tests, in-situ measurements, and numerical simulations. The results obtained from this validation process provide confidence that the optical fiber is able to quantify strain fields under a variety of loading conditions and consequently use this information to estimate the behavior of rock mass during mining activity. As the measuring station can be located as far as 1 km of distance, these alternatives presented may increase the safety of the mine during mining process and for the personnel doing the measurements on the field.