• Title/Summary/Keyword: mitigate

Search Result 2,581, Processing Time 0.026 seconds

Assessment of Magnetic Field Mitigation and Electrical Environmental Effects for Commercially Operating 154kV Transmission Lines with Passive Loop

  • Lee, Byeong-Yoon;Myung, Sung-Ho;Ju, Mun-No;Cho, Yeun-Gyu;Lee, Dong-Il;Lim, Yun-Seog;Kim, Sang-Beom
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.3
    • /
    • pp.991-996
    • /
    • 2014
  • Power frequency magnetic field is still a critical problem for new construction of overhead power transmission lines in Korea because most people have been concerned about possibly carcinogenic effects of it. Although reference level of power frequency(60Hz) magnetic field has been set to 200uT in ICNIRP guidelines published in 2010, Korean government has no intention of adjusting 83.3uT specified by law in 2006 to this new reference level in consideration of people's concerns for the time being. Regardless of the current regulated magnetic field value, electric utility company has been trying to reduce magnetic field in the residential area in the vicinity of overhead power transmission lines to take into account of public concerns on the long-term effect of magnetic fields. In an effort to reduce magnetic field, engineering side has made considerable efforts to develop passive loop based, cost-effective mitigation technique of power frequency magnetic field more than ten years. In order to verify developed power frequency magnetic field mitigation technique based on passive loop, a horizontal type of passive loop was designed and installed for commercially operating 154kV overhead power transmission line for the first time in Korea. The measurement results before and after the installation of passive loop showed that magnetic field could be reduced to about 20%. The electrical environmental effects such as AN, RI and TVI were assessed before and after the installation of passive loop and these values were complied with the requirements specified by electric utility. It has been confirmed from the field test results that passive loop could be commercially and cost-effectively utilized to mitigate power frequency magnetic field.

A Study of the Mitigating Effect Comparison of Voltage Sags by WTG Types Based on the Concept of Area of Vulnerability (타입별 풍력 발전기 설치에 따른 민감 부하의 순간전압강하 저감 효과 비교 분석 연구)

  • Park, Se-Jun;Yoon, Min-Han
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.12
    • /
    • pp.1682-1688
    • /
    • 2017
  • In modern society, the number of industrial customers using equipment sensitive particularly to voltage sags is rapidly increasing. As voltage sags can cause loss of information as well as false operation of the control device, it results in the vast economic damage in industrial processes. One way to mitigate voltage sags in the sensitive loads is the installation of distributed generation (DGs) on the periphery of these loads. In addition, renewable energy sources are currently in the spot light as the potential solution for the energy crisis and environmental issues. In particular, wind power generation which is connected to a grid is rising rapidly because it is energy efficient and also economically feasible compared to other renewable energy sources. On the basis of the above information, in this paper, with Wind Turbine Generators (WTGs) installed nearby the sensitive load, the analysis of the mitigating effect comparison by types of WTGs is performed using voltage sag assessment on the IEEE-30 bus test system. That is, the areas of vulnerability according to types of WTGs are expected to be different by how much reactive power is produced or consumed as WTG reactive power capability is related to the types of WTGs. Using the concept of 'Vulnerable area' with the failure rate for buses and lines, the annual number of voltage sags at the sensitive load with the installation of WTGs per type is studied. This research will be anticipated to be useful data when determining the interconnection of wind power generation in the power system with the consideration of voltage sags.

Thermal-hydraulic Analysis of Operator Action Time on Coping Strategy of LUHS Event for OPR1000 (OPR1000형 원전의 최종열제거원 상실사고 대처전략 및 운전원 조치 시간에 따른 열수력 거동 분석)

  • Song, Jun Kyu
    • Journal of the Korean Society of Safety
    • /
    • v.35 no.5
    • /
    • pp.121-127
    • /
    • 2020
  • Since the Fukushima nuclear accident in 2011, the public were concerned about the safety of Nuclear Power Plants (NPPs) in extreme natural disaster situations, such as earthquakes, flooding, heavy rain and tsunami, have been increasing around the world. Accordingly, the Stress Test was conducted in Europe, Japan, Russia, and other countries by reassessing the safety and response capabilities of NPPs in extreme natural disaster situations that exceed the design basis. The extreme natural disaster can put the NPPs in beyond-design-basis conditions such as the loss of the power system and the ultimate heat sink. The behaviors and capabilities of NPPs with losing their essential safety functions should be measured to find and supplement weak areas in hardware, procedures and coping strategies. The Loss of Ultimate Heat Sink (LUHS) accident assumes impairment of the essential service water system accompanying the failure of the component cooling water system. In such conditions, residual heat removal and cooling of safety-relevant components are not possible for a long period of time. It is therefore very important to establish coping strategies considering all available equipment to mitigate the consequence of the LUHS accident and keep the NPPs safe. In this study, thermal hydraulic behavior of the LUHS event was analyzed using RELAP5/Mod3.3 code. We also performed the sensitivity analysis to identify the effects of the operator recovery actions and operation strategy for charging pumps on the results of the LUHS accident.

Method for Inferring Format Information of Data Field from CAN Trace (CAN 트레이스 분석을 통한 데이터 필드 형식 추론 방법 연구)

  • Ji, Cheongmin;Kim, Jimin;Hong, Manpyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.167-177
    • /
    • 2018
  • As the number of attacks on vehicles has increased, studies on CAN-based security technologies are actively being carried out. However, since the upper layer protocol of CAN differs for each vehicle manufacturer and model, there is a great difficulty in researches such as developing anomaly detection for CAN or finding vulnerabilities of ECUs. In this paper, we propose a method to infer the detailed structure of the data field of CAN frame by analyzing CAN trace to mitigate this problem. In the existing Internet environment, many researches for reverse engineering proprietary protocols have already been carried out. However, CAN bus has a structure difficult to apply the existing protocol reverse engineering technology as it is. In this paper, we propose new field classification methods with low computation-cost based on the characteristics of data in CAN frame and existing field classification method. The proposed methods are verified through implementation that analyze CAN traces generated by simulations of CAN communication and actual vehicles. They show higher accuracy of field classification with lower computational cost compared to the existing method.

The Trend of System Level Thermal Management Technology Development for Aero-Vehicles (항공기 시스템 레벨 열관리 기술개발 동향)

  • Kim, Youngjin;Son, Changmin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.1
    • /
    • pp.35-42
    • /
    • 2016
  • Modern aircraft is facing the increase of power demands and thermal challenges. In accordance with the application of more electric technology and advanced mission requirement, aircraft system requires increase of power generation and it cause increase of internal heat generation. Simultaneously, restrictions have significantly been imposed to the thermal management system. Modern aircraft must maintain low radar observability and infra-red signature. In addition, new composite aircraft skins have reduced the amount of heat that can be rejected to the environment. The combination of these characteristics has increased the challenges faced by thermal management. In order to mitigate the thermal challenges, the concept of system level thermal management should be applied and new modeling and simulation tools need to be developed. To develop and utilize system level thermal management technology, three key points are considered. Firstly, the performance changes of subsystems and components must be assessed at an integrated thermal system. It is because that each subsystem and component interacts with other subsystems or components and it can directly effects on overall system performance. Secondly, system level thermal management requirements and solutions must be evaluated early in conceptual design process as vehicle and propulsion system configuration decisions are being made. Finally, new component level thermal management technologies must focus on reducing heat generation and increasing the availability of heat sinks.

Efficient Modulation for the Last Symbol in OFDM Systems (OFDM 시스템의 마지막 심볼을 위한 효율적인 변조 방식)

  • Yu, Heejung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.3
    • /
    • pp.513-519
    • /
    • 2018
  • OFDM modulation has been used for a transmission scheme in 4G LTE (Long Term Evolution) and Wi-Fi systems to mitigate the effects of frequency selective fading channels. An OFDM modulation is a block transmission scheme because an OFDM symbol consists of multiple subcarriers with narrow bandwidth. Therefore, all OFDM symbols in a frame should be filled out with data and padding bits. Depending on the amount of data, more padding bits than information bits can occupy the last OFDM symbol. Such inefficiency causes the loss of throughput. To overcome this problem, an efficiency padding method is proposed by using the property of DFT (Discrete Fourier Transform). In the proposed method, symbol duration of the last symbol is changed depending on the number used data subcarriers in the last symbol. With numerical evaluation, it is examined that throughput enhancement achieved by the proposed method can be about 20% depending a transmission scheme and data length.

Fingerprint Verification System Using Improved Preprocessing (개선된 전처리 과정을 이용한 지문 인식 시스템)

  • Lee Dong-Wook;Ahn Do-Rang;Lee Jee-Won
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.7 no.2
    • /
    • pp.73-80
    • /
    • 2006
  • Fingerprint-based verification system has been used for a very long time. Because of their well-known uniqueness and immutability, fingerprint is one of the most widely used biometric features. However, fingerprint identification system has such a critical weakness that the performance of verification is reduced drastically for a poor input fingerprint. In this paper, an image enhancement algorithm using enhanced direction and enhanced binary and aiming image is used to mitigate the problem in the preprocessing. The goal of image enhancement is to estimate the quality of input fingerprint image and to improve the clarity of ridge and valley structures of input fingerprint image. Also, a ridge orientation extraction method using index table is proposed to improve the speed of verification. It is shown by the experiments that proposed fingerprint verification system improves the minutiae extraction accuracy and performance of verification.

  • PDF

Credit Card Bad Debt Prediction Model based on Support Vector Machine (신용카드 대손회원 예측을 위한 SVM 모형)

  • Kim, Jin Woo;Jhee, Won Chul
    • Journal of Information Technology Services
    • /
    • v.11 no.4
    • /
    • pp.233-250
    • /
    • 2012
  • In this paper, credit card delinquency means the possibility of occurring bad debt within the certain near future from the normal accounts that have no debt and the problem is to predict, on the monthly basis, the occurrence of delinquency 3 months in advance. This prediction is typical binary classification problem but suffers from the issue of data imbalance that means the instances of target class is very few. For the effective prediction of bad debt occurrence, Support Vector Machine (SVM) with kernel trick is adopted using credit card usage and payment patterns as its inputs. SVM is widely accepted in the data mining society because of its prediction accuracy and no fear of overfitting. However, it is known that SVM has the limitation in its ability to processing the large-scale data. To resolve the difficulties in applying SVM to bad debt occurrence prediction, two stage clustering is suggested as an effective data reduction method and ensembles of SVM models are also adopted to mitigate the difficulty due to data imbalance intrinsic to the target problem of this paper. In the experiments with the real world data from one of the major domestic credit card companies, the suggested approach reveals the superior prediction accuracy to the traditional data mining approaches that use neural networks, decision trees or logistics regressions. SVM ensemble model learned from T2 training set shows the best prediction results among the alternatives considered and it is noteworthy that the performance of neural networks with T2 is better than that of SVM with T1. These results prove that the suggested approach is very effective for both SVM training and the classification problem of data imbalance.

A Study on Median Filter using Directional Mask in Salt & Pepper Noise Environments (Salt & Pepper 잡음 환경에서 방향성 마스크를 이용한 메디안 필터에 관한 연구)

  • Hong, Sang-Woo;Kim, Nam-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.230-236
    • /
    • 2015
  • In these digital times, the image signal processing is being used in various areas like vehicle recognition, security, and robotics. Generally, the image deterioration occurs by salt & pepper noise in the procedures of image transmission, storage, and processing. Methods to remove this noise are SMF, CWMF, and SWMF and these methods have few unsatisfactory noise reduction characteristics in salt & pepper noise environment. Therefore, in order to mitigate salt & pepper noise which is added in the image, this study suggested an algorithm which subdivides the masks in the image into four areas and processes using non-noise pixel numbers in each area. Additionally, in order to prove the excellence of the proposed algorithm, relevant performances were compared with existing methods using PSNR.

Towards the Spatiality of Social Movements: Exploring Geographical Contributions to the Study of Social Movements (사회운동의 공간성: 사회운동연구에 있어서 지리학적 기여에 대한 탐색)

  • Jung Hyun-Joo
    • Journal of the Korean Geographical Society
    • /
    • v.41 no.4 s.115
    • /
    • pp.470-490
    • /
    • 2006
  • The paper critically examines resource mobilization theories, frame theory, and new social movement theories, and proposes studies on the spatiality of the social movements as one potential to mitigate the limitation in these theories. The resource mobilization theories and the frame theory, the strategy-oriented approaches, lack contextual understandings of the origin of social movements. While new social movement theories provide macro-scale analysis and the structural explanations of the origins of social movements, they have covered limited geographical areas. The spatiality of social movements promotes deep understandings of local differences, and contexts in and through which grievances are constructed and collective actions are organized. Physical structures and symbolic representations of places are often created and utilized as social movement strategies. The spatiality of social movements can be a useful conceptual tool to explain the diversity and the dynamics of social movements.