• Title/Summary/Keyword: online algorithm

Search Result 587, Processing Time 0.043 seconds

TCSC Nonlinear Adaptive Damping Controller Design Based on RBF Neural Network to Enhance Power System Stability

  • Yao, Wei;Fang, Jiakun;Zhao, Ping;Liu, Shilin;Wen, Jinyu;Wang, Shaorong
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.2
    • /
    • pp.252-261
    • /
    • 2013
  • In this paper, a nonlinear adaptive damping controller based on radial basis function neural network (RBFNN), which can infinitely approximate to nonlinear system, is proposed for thyristor controlled series capacitor (TCSC). The proposed TCSC adaptive damping controller can not only have the characteristics of the conventional PID, but adjust the parameters of PID controller online using identified Jacobian information from RBFNN. Hence, it has strong adaptability to the variation of the system operating condition. The effectiveness of the proposed controller is tested on a two-machine five-bus power system and a four-machine two-area power system under different operating conditions in comparison with the lead-lag damping controller tuned by evolutionary algorithm (EA). Simulation results show that the proposed damping controller achieves good robust performance for damping the low frequency oscillations under different operating conditions and is superior to the lead-lag damping controller tuned by EA.

Clustering Normal User Behavior for Anomaly Intrusion Detection (비정상행위 탐지를 위한 사용자 정상행위 클러스터링 기법)

  • Oh, Sang-Hyun;Lee, Won-Suk
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.857-866
    • /
    • 2003
  • For detecting an intrusion based on the anomaly of a user's activities, previous works are concentrated on statistical techniques in order to analyze an audit data set. However. since they mainly analyze the average behavior of a user's activities, some anomalies can be detected inaccurately. In this paper, a new clustering algorithm for modeling the normal pattern of a user's activities is proposed. Since clustering can identify an arbitrary number of dense ranges in an analysis domain, it can eliminate the inaccuracy caused by statistical analysis. Also, clustering can be used to model common knowledge occurring frequently in a set of transactions. Consequently, the common activities of a user can be found more accurately. The common knowledge is represented by the occurrence frequency of similar data objects by the unit of a transaction as veil as the common repetitive ratio of similar data objects in each transaction. Furthermore, the proposed method also addresses how to maintain identified common knowledge as a concise profile. As a result, the profile can be used to detect any anomalous behavior In an online transaction.

Synergetics based damage detection of frame structures using piezoceramic patches

  • Hong, Xiaobin;Ruan, Jiaobiao;Liu, Guixiong;Wang, Tao;Li, Youyong;Song, Gangbing
    • Smart Structures and Systems
    • /
    • v.17 no.2
    • /
    • pp.167-194
    • /
    • 2016
  • This paper investigates the Synergetics based Damage Detection Method (SDDM) for frame structures by using surface-bonded PZT (Lead Zirconate Titanate) patches. After analyzing the mechanism of pattern recognition from Synergetics, the operating framework with cooperation-competition-update process of SDDM was proposed. First, the dynamic identification equation of structural conditions was established and the adjoint vector (AV) set of original vector (OV) set was obtained by Generalized Inverse Matrix (GIM).Then, the order parameter equation and its evolution process were deduced through the strict mathematics ratiocination. Moreover, in order to complete online structural condition update feature, the iterative update algorithm was presented. Subsequently, the pathway in which SDDM was realized through the modified Synergetic Neural Network (SNN) was introduced and its assessment indices were confirmed. Finally, the experimental platform with a two-story frame structure was set up. The performances of the proposed methodology were tested for damage identifications by loosening various screw nuts group scenarios. The experiments were conducted in different damage degrees, the disturbance environment and the noisy environment, respectively. The results show the feasibility of SDDM using piezoceramic sensors and actuators, and demonstrate a strong ability of anti-disturbance and anti-noise in frame structure applications. This proposed approach can be extended to the similar structures for damage identification.

Multiple-Class Dynamic Threshold algorithm for Multimedia Traffic (멀티미디어 트래픽을 위한 MCDT (Multiple-Class Dynamic Threshold) 알고리즘)

  • Kim, Sang-Yun;Lee, Sung-Chang;Ham, Jin-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.12
    • /
    • pp.17-24
    • /
    • 2005
  • Traditional Internet applications such as FIP and E-mail are increasingly sharing bandwidth with newer, more demanding applications such as Web browsing, IP telephony, video conference and online games. These new applications require Quality of Service (QoS), in terms of delay, loss and throughput that are different from QoS requirements of traditional applications. Unfortunately, current Active Queue Management (AQM) approaches offer monolithic best-effort service to all Internet applications regardless of the current QoS requirements. This paper proposes and evaluates a new AQM technique, called MCDT that provides dynamic and separated buffer threshold for each Applications, those are FTP and e-mail on TCP traffic, streaming services on tagged UDP traffic, and the other services on untagged UDP traffic. Using a new QoS metric, our simulations demonstrate that MCDT yields higher QoS in terms of the delay variation and a packet loss than RED when there are heavy UDP traffics that include streaming applications and data applications. MCDT fits the current best-effort Internet environment without high complexity.

Examining Factors Affecting the Binge-Watching Behaviors of OTT Services (OTT(Over-the-Top) 서비스의 몰아보기 시청행위 영향 요인 탐색)

  • Hwang, Kyung-Ho;Kim, Kyung-Ae
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.3
    • /
    • pp.181-186
    • /
    • 2020
  • The purpose of this study is to empirically examine the factors affecting the binge-watching behaviors of OTT service users by using a multi-layer perceptron (MLP) artificial neural network. All samples (n=1,000) were collected from 'A survey on user awareness in OTT service' published by a Media Research Center of the Korea Press Foundation in 2018. Our research model includes one dependent variable which is binge-watching behaviors on OTT service and five independent variables such as gender, age, frequency of service usage, users' satisfaction with content recommendation algorithm, and content types mainly consumed. Our findings demonstrate that age, frequency of service usage, users' satisfaction with content recommendation algorithms, and certain types of contents (e.g., Korean dramas, Korean films, and foreign dramas) were found to be highly related to binge-watching behavior on OTT services.

Phishing Detection Methodology Using Web Sites Heuristic (웹사이트 특징을 이용한 휴리스틱 피싱 탐지 방안 연구)

  • Lee, Jin Lee;Park, Doo Ho;Lee, Chang Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.10
    • /
    • pp.349-360
    • /
    • 2015
  • In recent year, phishing attacks are flooding with services based on the web technology. Phishing is affecting online security significantly day by day with the vulnerability of web pages. To prevent phishing attacks, a lot of anti-phishing techniques has been made with their own advantages and dis-advantages respectively, but the phishing attack has not been eradicated completely yet. In this paper, we have studied phishing in detail and categorize a process of phishing attack in two parts - Landing-phase, Attack-phase. In addition, we propose an phishing detection methodology based on web sites heuristic. To extract web sites features, we focus on URL and source codes of web sites. To evaluate performance of the suggested method, set up an experiment and analyze its results. Our methodology indicates the detection accuracy of 98.9% with random forest algorithm. The evaluation of proof-of-concept reveals that web site features can be used for phishing detection.

A Study on the Performance Evaluation of Elliptic Curve Cryptography based on a Real Number Field (실수체 기반 타원곡선 암호의 성능 평가에 관한 연구)

  • Woo, Chan-Il;Goo, Eun-Hee;Lee, Seung-Dae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1439-1444
    • /
    • 2013
  • Recently, as the use of the applications like online banking and stock trading is increasing by the rapid development of the network, security of data content is becoming more and more important. Accordingly, public key or symmetric key encryption algorithm is widely used in open networks such as the internet for the protection of data. Generally, public key cryptographic systems is based on two famous number theoretic problems namely factoring or discrete logarithm problem. So, public key cryptographic systems is relatively slow compared to symmetric key cryptography systems. Among public key cryptographic systems, the advantage of ECC compared to RSA is that it offers equal security for a far smaller key. For this reason, ECC is faster than RSA. In this paper, we propose a efficient key generation method for elliptic curve cryptography system based on the real number field.

CPLD Implementation of SEED Cryptographic Coprocessor (SEED 암호 보조 프로세서의 CPLD 구현)

  • Choi Byeong-Yoon;Kim Jin-Il
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.1 no.2
    • /
    • pp.177-185
    • /
    • 2000
  • In this paper CPLD design of cryptographic coprocessor which implements SEED algorithm is described. To satisfy trade-off between area and speed, the coprocessor has structure in which 1 round operation is divided into three subrounds and then each subround is executed using one clock. To improve clock frequency, online precomputation scheme for round key is used. To apply the coprocessor to various applications, four operating modes such as ECB, CBC, CFB, and OFB are supported. The cryptographic coprocessor is designed using Altera EPF10K100GC503-3 CPLD device and its operation is verified by encryption or decryption of text files through ISA bus interface. It consists of about 29,300 gates and performance of CPLD chip is about 44 Mbps encryption or decryption rate under 18 Mhz clock frequency and ECB mode.

  • PDF

Line Impedance Estimation Based Adaptive Droop Control Method for Parallel Inverters

  • Le, Phuong Minh;Pham, Xuan Hoa Thi;Nguyen, Huy Minh;Hoang, Duc Duy Vo;Nguyen, Tuyen Dinh;Vo, Dieu Ngoc
    • Journal of Power Electronics
    • /
    • v.18 no.1
    • /
    • pp.234-250
    • /
    • 2018
  • This paper presents a new load sharing control for use between paralleled three-phase inverters in an islanded microgrid based on the online line impedance estimation by the use of a Kalman filter. In this study, the mismatch of power sharing when the line impedance changes due to temperature, frequency, significant differences in line parameters and the requirements of the Plug-and-Play mode for inverters connected to a microgrid has been solved. In addition, this paper also presents a new droop control method working with the line impedance that is different from the traditional droop algorithm when the line impedance is assumed to be pure resistance or pure inductance. In this paper, the line impedance estimation for parallel inverters uses the minimum square method combined with a Kalman filter. In addition, the secondary control loops are designed to restore the voltage amplitude and frequency of a microgrid by using a combined nominal value SOGI-PLL with a generalized integral block and phase lock loop to monitor the exact voltage magnitude and frequency phase at the PCC. A control model has been simulated in Matlab/Simulink with three voltage source inverters connected in parallel for different ratios of power sharing. The simulation results demonstrate the accuracy of the proposed control method.

Auto-tagging Method for Unlabeled Item Images with Hypernetworks for Article-related Item Recommender Systems (잡지기사 관련 상품 연계 추천 서비스를 위한 하이퍼네트워크 기반의 상품이미지 자동 태깅 기법)

  • Ha, Jung-Woo;Kim, Byoung-Hee;Lee, Ba-Do;Zhang, Byoung-Tak
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.10
    • /
    • pp.1010-1014
    • /
    • 2010
  • Article-related product recommender system is an emerging e-commerce service which recommends items based on association in contexts between items and articles. Current services recommend based on the similarity between tags of articles and items, which is deficient not only due to the high cost in manual tagging but also low accuracies in recommendation. As a component of novel article-related item recommender system, we propose a new method for tagging item images based on pre-defined categories. We suggest a hypernetwork-based algorithm for learning association between images, which is represented by visual words, and categories of products. Learned hypernetwork are used to assign multiple tags to unlabeled item images. We show the ability of our method with a product set of real-world online shopping-mall including 1,251 product images with 10 categories. Experimental results not only show that the proposed method has competitive tagging performance compared with other classifiers but also present that the proposed multi-tagging method based on hypernetworks improves the accuracy of tagging.