• Title/Summary/Keyword: distributed controlled system

Search Result 188, Processing Time 0.035 seconds

Seismic control performance and experimental study of multiple pounding tuned rolling mass damper

  • Peiran Fan;Shujin Li;Ling Mao
    • Earthquakes and Structures
    • /
    • v.24 no.4
    • /
    • pp.247-258
    • /
    • 2023
  • Multiple pounding tuned rolling mass damper (MPTRMD) distributed in the cavity of voided slabs is proposed to passively control multi-story frame structures, which disperses the mass of the oscillator to multiple dampers so that the control device can be miniaturized without affecting the vibration control performance. The mechanism and the differential motion equations of the MPTRMD-controlled multi-degree-of-freedom system are derived based on the Lagrange principle. Afterward, this advanced RMD is applied to a simplified 20-floor steel frame to evaluate the seismic control performance in the numerical analysis. A four-storey frame structure equipped with MPTRMD is then taken for a shaking table test to verify its effectiveness of control performance. The pounding mechanism has been detailed studied numerically and experimentally as well. The numerical and experimental results show that the proposed damper is practically promising not only for its prominent control performance but also for its lightweight and space-saving. Additionally, the pounding mechanism influenced by the variable impact parameters exhibits a balance between the two effects of motional limitations and energy dissipation.

Simulation of Contaminant Draining Strategy with User Participation in Water Distribution Networks

  • Marlim, Malvin S.;Kang, Doosun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.146-146
    • /
    • 2021
  • A contamination event occurring in water distribution networks (WDNs) needs to be handled with the appropriate mitigation strategy to protect public health safety and ensure water supply service continuation. Typically the mitigation phase consists of contaminant sensing, public warning, network inspection, and recovery. After the contaminant source has been detected and treated, contaminants still exist in the network, and the contaminated water should be flushed out. The recovery period is critical to remove any lingering contaminant in a rapid and non-detrimental manner. The contaminant flushing can be done in several ways. Conventionally, the opening of hydrants is applied to drain the contaminant out of the system. Relying on advanced information and communication technology (ICT) on WDN management, warning and information can be distributed fast through electronic media. Water utilities can inform their customers to participate in the contaminant flushing by opening and closing their house faucets to drain the contaminated water. The household draining strategy consists of determining sectors and timeslots of the WDN users based on hydraulic simulation. The number of sectors should be controlled to maintain sufficient pressure for faucet draining. The draining timeslot is determined through hydraulic simulation to identify the draining time required for each sector. The effectiveness of the strategy is evaluated using three measurements, such as Wasted Water (WW), Flushing Duration (FD), and Pipe Erosion (PE). The optimal draining strategy (i.e., group and timeslot allocation) in the WDN can be determined by minimizing the measures.

  • PDF

Design and Implementation of an Intrusion Detection System based on Outflow Traffic Analysis (유출트래픽 분석기반의 침입탐지시스템 설계 및 구현)

  • Shin, Dong-Jin;Yang, Hae-Sool
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.131-141
    • /
    • 2009
  • An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are growing quickly. This paper proposes an intrusion detection system based outflow traffic analysis. Many research efforts and commercial products have focused on preventing intrusion by filtering known exploits or unknown ones exploiting known vulnerabilities. Complementary to these solutions, the proposed IDS can detect intrusion of unknown new mal ware before their signatures are widely distributed. The proposed IDS is consists of a outflow detector, user monitor, process monitor and network monitor. To infer user intent, the proposed IDS correlates outbound connections with user-driven input at the process level under the assumption that user intent is implied by user-driven input. As a complement to existing prevention system, proposed IDS decreases the danger of information leak and protects computers and networks from more severe damage.

A Design of Power Converter for Fuel Cell Controlled by Micro-Processor (마이크로프로세서에 의해 제어되는 연료전지용 전력변환 회로 설계)

  • Won, Chung-Yuen;Jang, Su-Jin;Lee, Won-Chul;Lee, Tae-Won;Kim, Soo-Seok
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.18 no.5
    • /
    • pp.61-68
    • /
    • 2004
  • Recently, a fuel cell is remarkable for new generation system. The fuel cell is characterized by low voltage and high current. Therefor, for connecting to general load, it needs both a step up converter and an inverter. The proposed system consists of an isolated DC-DC converter to boost the fuel cell voltage to 380[Vdc] and a PWM inverter with LC filter to convert the dc voltage to single phase 220[Vac]. Also, bi-directional DC-DC converter for fuel cell generation system is composed to improve load response characteristic. In this paper, full bridge converter and the single phase inverter are designed and installed for fuel cell. Simulation and experiment verify that fuel cell generation system could be applied for the distributed generation.

Automation System for Sharing CDM Data (CDM 데이터 공유를 위한 자동화 시스템)

  • Jeong, Chae-Eun;Kang, Yunhee;Park, Young B.
    • Journal of Platform Technology
    • /
    • v.8 no.3
    • /
    • pp.3-9
    • /
    • 2020
  • As the need for sharing for research purposes in the medical field increases, the use of a Common Data Model (CDM) is increasing. However, when sharing CDM data, there are some problems in that access control and personal information in the data are not protected. In this paper, in order to solve this problem, access to CDM data is controlled by using an encryption method in a blockchain network, and information of CDM data is recorded to enable tracking. In addition, IPFS was used to share a large amount of CDM data, and Celery was used to automate the sharing process. In other words, we propose a multi-channel automation system in which the information required for CDM data sharing is shared by a trust-based technology, a distributed file system, and a message queue for automation. This aims to solve the problem of access control and personal information protection in the data that occur in the process of sharing CDM data.

  • PDF

A Design of the Social Disasters Safety Platform based on the Structured and Unstructured Data (정형/비정형 데이터 기반 사회재난 안전 플랫폼 설계)

  • Lee, Chang Yeol;Park, Gil Joo;Kim, Junggon;Kim, Taehwan
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.3
    • /
    • pp.609-621
    • /
    • 2022
  • Purpose: Natural Disaster has well formed framework more than social disaster, because natural disaster is controlled by one department, such as MOIS, but social disaster is distributed. This study is on the design of the integrated service platform for the social diaster data. and then, apply to the local governments. Method: Firstly, we design DB templates for the incident cases considering the incident investigation reports. For the risk management, life-damage oriented social disaster risk assessment is defined. In case of the real-time incident data from NDMS, AI system provides the prediction information in the life damage and the cause of the incident. Result: We design the structured and unstructured incident data management system, and design the integrated social disaster and safety incident management system. Conclusion: The integrated social disaster and safety incident management system may be used in the local governments

Blockchain-Based Smart Home System for Access Latency and Security (지연시간 및 보안을 위한 블록체인 기반 스마트홈 시스템 설계)

  • Chang-Yu Ao;Kang-Chul Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.1
    • /
    • pp.157-164
    • /
    • 2023
  • In modern society, smart home has become a part of people's daily life. But traditional smart home systems often have problems such as security, data centralization and easy tampering, so a blockchain is an emerging technology that solves the problems. This paper proposes a blockchain-based smart home system which consists in a home and a blockchain network part. The blockchain network with 8 nodes is implemented by HyperLeger Fabric platform on Docker. ECC(Elliptic Curve Cryptography) technology is used for data transmission security and RBAC(role-based access control) manages the certificates of network members. Raft consensus algorithm maintains data consistency across all nodes in a distributed system and reduces block generation time. The query and data submission are controlled by the smart contract which allows nodes to safely and efficiently access smart home data. The experimental results show that the proposed system maintains a stable average query and submit time of 84.5 [ms] and 93.67 [ms] under high concurrent accesses, respectively and the transmission data is secured through simulated packet capture attacks.

Analysis of Influencing Factors on Cavity Collapse and Evaluation of the Existing Cavity Management System (공동 붕괴를 유발하는 영향인자 분석 및 기존 공동관리 시스템 평가)

  • Lee, Kicheol;Park, Jongho;Choi, Byeong-Hyun;Kim, Dongwook
    • Journal of the Korean Geosynthetics Society
    • /
    • v.17 no.1
    • /
    • pp.45-54
    • /
    • 2018
  • In this study, numerical analysis is performed to determine highly influential factors that increase the possibility of asphalt road collapse due to cavity underneath the road. The considered influence factors on road collapse due to underground cavity were the asphalt layer thickness, the cover depth, the cavity width, and the cavity height. The concentrated load and uniform distributed pressure were applied on the top surface of asphalt pavement layers with different shape of cavity and asphalt thickness. For each analysis case of given cavity and asphalt thickness, failure load was analyzed under displacement controlled condition. Based on the analyzed failure loads, the applicability of the cavity management system developed by Seoul city was evaluated. As a result of the analysis, the effect of cavity height on road collapse was not significant while the other factors considerably influenced road collapse. Consequently, degree of road collapse susceptibility should be classified by failure load rather than by the condition of existing cavity.

A Priority-based Feedback Control Mechanism for Scalability (확장적 우선 순위 피드백 제어 기법)

  • 정상운;정원창;김상복
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.3
    • /
    • pp.339-346
    • /
    • 1999
  • When a multicast video conference system utilizes RTP (Real Time Protocol) and RTCP (Real Time Control Protocol), the loss rate and the synchronization of transfer in RTCP affect the scalability of the system. The random delay technique introduced to resolve the problems is so simple that leads the network to meet some congestion in synchronizing feedback information when lots of people transfer the feedback information simultaneously, which reduces the scalability of system. In this paper, we propose a new feedback control algorithm that provides priority levels with the RTCP packet, which cuts down the feedback delay and increases the scalability. The criteria of providing priority Based on the decided priority level, Agent forced the session participants to provide much more RTCP packets, positively controlled, and the possible bandwidth can be measured. The simulation on this technique decreases the delay, and the feedback messages are equally distributed on a given time period.

  • PDF

Multilingual Product Retrieval Agent through Semantic Web and Semantic Networks (Semantic Web과 Semantic Network을 활용한 다국어 상품검색 에이전트)

  • Moon Yoo-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.2
    • /
    • pp.1-13
    • /
    • 2004
  • This paper presents a method for the multilingual product retrieval agent through XML and the semantic networks in e-commerce. Retrieval for products is an important process, since it represents interfaces of the customer contact to the e-commerce. Keyword-based retrieval is efficient as long as the product information is structured and organized. But when the product information is expressed across many online shopping malls, especially when it is expressed in different languages with cultural backgrounds, buyers' product retrieval needs language translation with ambiguities resolved in a specific context. This paper presents a RDF modeling case that resolves semantic problems in the representation of product information and across the boundaries of language domains. With adoption of UNSPSC code system, this paper designs and implements an architecture for the multilingual product retrieval agents. The architecture is based on the central repository model of product catalog management with distributed updating processes. It also includes the perspectives of buyers and suppliers. And the consistency and version management of product information are controlled by UNSPSC code system. The multilingual product names are resolved by semantic networks, thesaurus and ontology dictionary for product names.

  • PDF