• Title/Summary/Keyword: electric networks

Search Result 329, Processing Time 0.027 seconds

Analysis of the Policy Network for the “Feed-in Tariff Law” in Japan: Evidence from the GEPON Survey

  • Okura, Sae;Tkach-Kawasaki, Leslie;Kobashi, Yohei;Hartwig, Manuela;Tsujinaka, Yutaka
    • Journal of Contemporary Eastern Asia
    • /
    • v.15 no.1
    • /
    • pp.41-63
    • /
    • 2016
  • Energy policy is known to have higher path dependency among policy fields (Kuper and van Soest, 2003; OECD, 2012; Kikkawa, 2013) and is a critical component of the infrastructure development undertaken in the early stages of nation building. Actor roles, such as those played by interest groups, are firmly formed, making it unlikely that institutional change can be implemented. In resource-challenged Japan, energy policy is an especially critical policy area for the Japanese government. In comparing energy policy making in Japan and Germany, Japan’s policy community is relatively firm (Hartwig et al., 2015), and it is improbable that institutional change can occur. The Japanese government’s approach to energy policy has shifted incrementally in the past half century, with the most recent being the 2012 implementation of the “Feed-In Tariff Law” (Act on Special Measures Concerning Procurement of Renewable Electric Energy by Operators of Electric Utilities), which encourages new investment in renewable electricity generation and promotes the use of renewable energy. Yet, who were the actors involved and the factors that influenced the establishment of this new law? This study attempts to assess the factors associated with implementing the law as well as the roles of the relevant major actors. In answering this question, we focus on identifying the policy networks among government, political parties, and interest groups, which suggests that success in persuading key economic groups could be a factor in promoting the law. Our data is based on the “Global Environmental Policy Network Survey 2012-2013 (GEPON2)” which was conducted immediately after the March 11, 2011 Great East Japan Earthquake with respondents including political parties, the government, interest groups, and civil society organizations. Our results suggest that the Feed in Tariff (FIT) Law’s network structure is similar to the information network and support network, and that the actors at the center of the network support the FIT Law. The strength of our research lays in our focus on political networks and their contributing mechanism to the law’s implementation through analysis of the political process. From an academic perspective, identifying the key actors and factors may be significant in explaining institutional change in policy areas with high path dependency. Close examination of this issue also has implications for a society that can promote renewable and sustainable energy resources.

A Study of Hierarchical Policy Model of Policy-based Integrated Security Management for managing Heterogeneous Security Systems (이종의 보안시스템 관리를 위한 정책 기반의 통합보안관리시스템의 계층적 정책모델에 관한 연구)

  • Lee, Dong-Yeong;Kim, Dong-Su;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.607-614
    • /
    • 2001
  • With a remarkable growth and expansion of Internet, the security issues emerged from intrusions and attacks such as computer viruses, denial of services and hackings to destroy information have been considered as serious threats for Internet and the private networks. To protect networks from those attacks, many vendors have developed various security systems such as firewalls, intrusion detection systems, and access control systems. However, managing those systems individually requires too much work and high cost. Thus, in order to manage integrated security management and establish consistent security management for various security products, the policy model of PN-ISMS (Policy Based Integrated Security Management System) has become very important. In this paper, present the hierarchical policy model which explore the refinement of high-level/conceptual policies into a number of more specific policies to form a policy hierarchy. A formal method of policy description was used as the basis of the mode in order to achieve precision and generality. Z-Notation was chosen for this propose. The Z-Notation is mathematical notation for expressing and communicating the specifications of computer programs. Z uses conventional notations of logic and set theory organized into expressions called schemas.

  • PDF

Implementation of abnormal behavior detection system based packet analysis for industrial control system security (산업 제어 시스템 보안을 위한 패킷 분석 기반 비정상행위 탐지 시스템 구현)

  • Kim, Hyun-Seok;Park, Dong-Gue
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.47-56
    • /
    • 2018
  • National-scale industrial control systems for gas, electric power, water processing, nuclear power, and traffic control systems increasingly use open networks and open standards protocols based on advanced information and communications technologies. The frequency of cyberattacks increases steadily because of the use of open networks and open standards protocols, but follow-up actions are limited. Therefore, the application of security solutions to an industrial control system is very important. However, it is not possible to apply security solutions to a real system because of the characteristics of industrial control systems. And a security system that can detect attacks without affecting the existing system is imperative. Therefore, in this paper, we propose an intrusion detection system based on packet analysis that can detect anomalous behaviors without affecting the industrial control system, and we verify the effectiveness of the proposed intrusion detection system by applying it in a test bed simulating a real environment.

An Effective Task Allocation Algorithm in Two-Dimensional Mesh Interconnection Networks (이차원 메쉬 상호 연결 망에 대한 효율적인 태스크할당 알고리즘)

  • Chu, Hyeon-Seung;Park, Gyeong-Rin;Yu, Seong-Mu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.6
    • /
    • pp.1667-1677
    • /
    • 1999
  • An effective allocation of requested number of processors to newly incoming tasks in two-dimensional (2D) mesh interconnection networks is very important for achieving the desired high performance and resource utilization. It also needs to guarantee the complete recognition of the free submeshes based on contiguous and available processors with minimum overhead. An efficient task allocation algorithm for 2D meshes is presented in this paper. By employing a new approach for searching the one-dimensional array, the proposed algorithm can find the available submesh without the scanning of the entire 2D array unlike earlier designs. As a result, the new algorithm can significantly reduce the task allocation time. Comprehensive computer simulation shows that the average allocation time and waiting delay are much smaller than earlier irrespective of the size of meshes. The hardware overhead is comparable to other algorithms.

  • PDF

A Study on Secure and Efficient Wireless Network Management Scheme based Multi users for Ubiquitous Environment (유비쿼터스 환경을 위한 다중 사용자 기반의 안전하고 효율적인 무선 네트워크 관리 기법 제안)

  • Seo Dae-Hee;Lee Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.1-10
    • /
    • 2006
  • Ubiquitous computing, a new type of network environment has been generating much interest recently and has been actively studied. In ubiquitous computing, the sensor network which consists of low electric power ad-hoc network-based sensors and sensor nodes, is particularly the most important factor The sensor network serves as the mediator between ubiquitous computing and the actual environment. Related studies are focused on network . management through lightweight hardware using RFID. However, to apply these to actual environment, more practical scenarios as well as more secured studies equipped with secures and efficiency features are needed. Therefore, this study aims to build a wireless network based on PTD for multi users, which provides the largest utility in individual networks, and propose an appropriate management method. The proposed method is designed to enhance security and efficiency related to various services required in wireless networks, based on the reliable peripheral devices for users or pm. using pm, which has been applied to electronic commerce transactions in existing papers, this study also proposed an appropriate management method that is suitable for a dynamic environment and setting a temporary group to provide various services.

Distributed Mutual Exclusion Algorithm for Maintaining Tree-Height Balance in Mobile Computing Environments (이동 컴퓨팅 환경에서 트리 높이의 균형을 유지하는 상호 배제 알고리즘)

  • Kim, Hyeong-Sik;Eom, Yeong-Ik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.10
    • /
    • pp.1206-1216
    • /
    • 1999
  • 이동 호스트란 시간과 공간의 제약 없이 필요한 기능을 수행하고, 또한 원하는 정보에 접근할 수 있는 휴대용 컴퓨터를 일컫는다. 이동 컴퓨팅 환경이란 이러한 이동 호스트들을 지원할 수 있도록 구성된 분산 환경이다. 따라서 이동 컴퓨팅 환경에서의 분산 알고리즘은 정적 호스트만을 고려한 기존의 분산 환경에서와는 다르게 이동 호스트의 여러 가지 특성들을 고려하여 제안되어야 한다. 즉, 이동 컴퓨팅 환경의 도래로 인하여 이동성과 휴대성, 그리고 무선 통신과 같은 특성들을 고려한 새로운 분산 상호 배제 알고리즘이 필요하다. 이제까지 이동 컴퓨팅 환경에서의 상호 배제 알고리즘은 토큰 링 구조에 기반을 두고 설계되었다. 토큰 링 구조는 이동 호스트들의 위치를 유지하기 위하여 높은 비용을 필요로 하는 단점을 가지고 있다. 본 논문에서는 균형 높이 트리(height-balanced tree)라는 새로운 모형을 제안함으로써 정적 분산 환경과 이동 분산 환경이 혼합된 환경에서 상호 배제 비용을 감소시킬 수 있는 새로운 알고리즘을 제안하며, 각 경우에 있어서의 비용을 산출하고 평가한다.Abstract The mobile host is a potable computer that carries out necessary functions and has the ability to access desirable informations without any constraints in time and space. Mobile computing environment is a distributed environment that is organized to support such mobile hosts. In that environment, distributed algorithms of which environment not only with static hosts but with mobile host's several properties should be proposed. With the emergence of mobile computing environments, a new distributed mutual exclusion method should be required to consider properties mobile computing system such as mobility, portability, and wireless communication. Until now, distributed mutual exclusion methods for mobile computing environments are designed based on a token ring structure, which have the drawbacks of requiring high costs in order to locate mobile hosts. In this paper, we propose a distributed mutual exclusion method that can reduce such costs by structuring the entire system as a height-balanced tree for static distributed networks and for networks with mobile hosts. We evaluated the operation costs in each case.

Operation System Design of Distribution Feeder with Distributed Energy Resources (분산전원이 연계된 배전선로의 운영시스템 설계)

  • Kim, Seong-Man;Chang, Young-Hak;Kim, Kyeong-Hun;Kim, Sul-Ki;Moon, Chae-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1183-1194
    • /
    • 2021
  • Traditionally, electric power systems have been known as the centralized structures, which is organized into placing customers at the end of the supply chain. However, recent decades have witnessed the emergence of distributed energy resources(:DERs) such as rooftop solar, farming PV system, small wind turbines, battery energy storage systems and smart home appliances. With the emergence of distributed energy resources, the role of distributed system operators(:DSOs) will expand. The increasing penetration of DERs could lead to a less predictable and reverse flow of power in the system, which can affect the traditional planning and operation of distribution and transmission networks. This raises the need for a change in the role of the DSOs that have conventionally planned, maintained and managed networks and supply outages. The objective of this research is to designed the future distribution operation system with multi-DERs and the proposed distribution system model is implemented by hardware-in-the-loop simulation(HILS). The test results show the normal operation domain and reduction of distribution line loss.

Study on Energy Efficient Mobility-MAC Protocol for Underwater Networks (수중통신망에서 노드 이동성을 고려한 에너지 효율적인 매체접속제어 프로토콜 연구)

  • Son, Woong;Jang, Youn-Seon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.4
    • /
    • pp.3-9
    • /
    • 2017
  • Due to difficulties of continuous electric power provision to underwater communication nodes, the efficient power usage is highly required in underwater network protocol. In this paper, we studied the energy efficient MAC(Medium Access Control) protocol for underwater network supporting mobile nodes such as UUV(Unmanned Underwater Vehicle) and AUV(Autonomous Underwater Vehicle). The mobile nodes could waste the electric power in vain when the receiver moves out of the radio propagation coverage during the data exchange and thus the transmitted data fails in reaching the receiver. Expecially, such a failure is much more obvious in underwater acoustic channels since the propagation delay is about $10^5$ times slower than in terrestrial radio channels. This proposed mobility-MAC controls the data dropping stochastically in the Dropping Zone by considering the receiver's location and moving velocity. In conclusion, this selective dropping method not only improves latency and throughput by reducing invalid droppings but also boosts power efficiency by valid droppings.

An Adaptive Setting Method for the Overcurrent Relay of Distribution Feeders Considering the Interconnected Distributed Generations

  • Jang Sung-Il;Kim Kwang-Ho;Park Yong-Up;Choi Jung-Hwan;Kang Yong-Cheol;Kang Sang-Hee;Lee Seung-Jae;Oshida Hideharu;Park Jong-Keun
    • KIEE International Transactions on Power Engineering
    • /
    • v.5A no.4
    • /
    • pp.357-365
    • /
    • 2005
  • This research investigates the influences of distributed generations (DG), which are interconnected to the bus by the dedicated lines, on the overcurrent relays (OCR) of the neighboring distribution feeders and also proposes a novel method to reduce the negative effects on the feeder protection. Due to the grid connected DG, the entire short-circuit capacity of the distribution networks increases, which may raise the current of the distribution feeder during normal operations as well as fault conditions. In particular, during the switching period for loop operation, the current level of the distribution feeder can be larger than the pickup value for the fault of the feeder's OCR, thereby causing the OCR to perform a mal-operation. This paper proposes the adaptive setting algorithm for the OCR of the distribution feeders having the neighboring dedicated feeders for the DG to prevent the mal-operations of the OCR under normal conditions. The proposed method changes the pickup value of the OCR by adapting the power output of the DG monitored at the relaying point in the distribution network. We tested the proposed method with the actual distribution network model of the Hoenggye substation at the Korea Electric Power Co., which is composed of five feeders supplying the power to network loads and two dedicated feeders for the wind turbine generators. The simulation results demonstrate that the proposed adaptive protection method could enhance the conventional OCR of the distribution feeders with the neighboring dedicated lines for the DG.

Battery charge prediction of sailing yacht regeneration system using neural networks (신경망을 이용한 세일링 요트 리제너레이션 시스템의 배터리 충전 예측)

  • Lee, Tae-Hee;Hwang, Woo-Sung;Choi, Myung-Ryul
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.241-246
    • /
    • 2020
  • In this paper, we propose a neural network model to converge the marine electric propulsion system and deep learning algorithm to predict the DC/DC converter output current in the electric propulsion regeneration system and to predict the battery charge during regeneration. In order to experiment with the proposed neural network, the input voltage and current of the PCM were measured and the data set was secured on the prototype PCM board. In addition, in order to improve the learning results in the insufficient data set, the scale of the data set was increased through data fitting and its learning was executed further. After learning, the difference between the data prediction result of the neural network model and the actual measurement data was compared. The proposed neural network model effectively showed the prediction of battery charge according to changes in input voltage and current. In addition, by predicting the characteristic change of the analog circuit constituting the DC/DC converter through a neural network, it is determined that the characteristics of the analog circuit should be considered when designing the regeneration system.