• Title/Summary/Keyword: Standard operating system

Search Result 673, Processing Time 0.023 seconds

A Study About Distribution Automation System Based on CIM (CIM 기반의 Distribution Automation System에 관한 연구)

  • Lee, Hee-Joo;Seo, Jeong-Il;Han, Ju-Hyun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.5
    • /
    • pp.913-920
    • /
    • 2011
  • Distribution systems for operating the various systems should be operated organically. Distribution systems for organic operations extend the functionality of the system and system integration for the extension is doing. However, in systems integration for each unique non-standard definition of linkage and exchange systems are used. Non-standard definition of a unique linkage and exchange systems in the maintenance and expansion will result in many negative results. To solve these problems, the system and the exchange of information about the links between systems should define standards. IEC (International Electrotechnical Commission) power to solve these problems in the field of the Common Information Model (Common Information Model, CIM) standard (IEC61970, IEC61968) is defined as the transmission and distribution system integration and standardization for the exchange of information. In this paper, standardized system for building CIM-based distribution automation system should describe the process of building. In addition, the process of establishing a common information model needed (CIM) defined and associated services for a defined set of models is proposed in the standardization process.

A Study on the U.S Emergency Communications Operating System and Standard Operating Procedures Analysis (미국 재난통신 운영체계 및 표준운영절차 분석 연구)

  • Han, Cheol-Hee;Park, Su-Hyeong;Yoon, Myong-O
    • Fire Science and Engineering
    • /
    • v.31 no.5
    • /
    • pp.78-86
    • /
    • 2017
  • Disasters in South Korea are taking on more diverse and intricate aspects than before, while being affected by the industrial development and deterioration of the cities. Therefore, it is urgently needed for success in disaster countermeasures to secure emergency communications operating system which would make it possible to share various information between the control tower and field personnel quickly and accurately. This study proposes a method of improving the national emergency communications operating system based on the Federal disaster management system, emergency communications system, and Standard Operating Procedures (SOPs) employed in the US, which is the leading country in the field of disaster management. First, the organization of the emergency communications needs to be more systematized than in the past. The organization of the emergency communications of the central and local governments have to be administered according to their different roles and objectives. Furthermore, they must cooperate with each other based on interoperability. Second, emergency communications councils need to be established, composed of representatives related to disasters, and national and regional units need to be formed and operated separately. Third, the SOPs should not only cover both the operational and technical elements, but also assign the roles and responsibilities to the members of the disaster communications system. These improvements will assure the correct functioning of the disaster communications system in the field, which is expected to increase the probability of success in disaster countermeasures.

Analysist of Instantaneous Current Tracking Control Inverter Characteristics for Photovoltaic System (태양광 발전용 순시치 전류제어형 인버터의 특성 해석)

  • 조금배;김한성
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.43 no.5
    • /
    • pp.770-778
    • /
    • 1994
  • In this paper, the photovoltaic inverter system with instantaneous sinusoidal current tracking control is proposed to improve the utilization factor of photovoltaic power system which would be connected utility interactive system. The proposed inverter is designed to track maximum power point by two-state value control method and utility interactive operation, and to decrease output harmonics component. Optimal operating region is described by state space averaging method, and present tracking condition of standard guide line. The experimental result shows the effectiveness of inverter system using the instantaneous control method.

Analysis of Security Overhead in Secure Operating System (보안 운영체제의 오버헤드 분석)

  • Ko Young-Woong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.11-19
    • /
    • 2005
  • The importance of this Paper is to develop a standard Performance evaluation model and scenario for the secure OS. According to the scenario that was conducted for Performance evaluation, benchmarking was Performed. All the benchmarking result was thoroughly analyzed. Our result contribute to evaluating Secure 05 that contains various security policy affecting system Performance. In this paper, it is expected to Provide guidelines of secure operating system for the consumer, developer and evaluator. It will also contribute to the systematic basis for evaluation of security 05 and the promotion of domestic information security industry by retaining basic technology for international trends.

  • PDF

A proposal of total energy operating system development using spatial information visualization and energy monitoring - Case study on design of total operation system in Sejong city - (건물 에너지 모니터링과 공간정보 시각화를 이용한 에너지 통합 운영시스템 개발 방안 제안 - 세종시 첫마을 공공건물을 대상으로 한 시스템 구축 사례 -)

  • Kwon, KeeJung;Lee, DongHwan;Cha, KiChun;Park, SeungHee
    • Journal of KIBIM
    • /
    • v.4 no.1
    • /
    • pp.8-12
    • /
    • 2014
  • This research and project is going on the Korean government. The objective of project is that developing total energy management solution. So, this paper is going to introduce a proposal that energy total operating system development using spatial information visualization and energy monitoring. It could efficiently operate the building energy wirelessly controling cooling/heating, lighting, air-conditioning and geothermal system. The metering data is collected to total database. The data is linked to BAS gateway, which is connected the device by the standard protocol.

Activation Strategies of Non-government Certification Using SWOT/AHP Analysis (SWOT/AHP 분석을 이용한 민간인증제도 활성화 전략)

  • Goh, Hyun-Woo
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.32 no.2
    • /
    • pp.104-111
    • /
    • 2009
  • Recently, it is becoming the big issue internationally where the safety problem of the industrial product including the foodstuffs. The way is able to construct the trust of the consumer that the external specialized agency independently operating confirms what production process of the product keep a standard or a technical regulation. This is conformity assessment. In the many countries, agencies entrusted government authority do conformity assessment. Specially, 'certification' in one form of conformity assessment process is operating a certification system at the government and the non-government body in Korea. Also non-government certification is fixed by trusted system from consumer. He has to prepare a competitive power in liberalization time, so need the countermeasure urgently. This study purpose that develops strategy so as to activating of non-government certification system in gist of the origination called 'self-control.' I present activation strategies using SWOT/AHP analysis.

Implementation of Dual-Kernel based Control System and Evaluation of Real-time Control Performance for Intelligent Robots (지능형 로봇을 위한 이중 커널 구조의 제어 시스템 구현 및 실시간 제어 성능 분석)

  • Park, Jeong-Ho;Yi, Soo-Yeong;Choi, Byoung-Wook
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.11
    • /
    • pp.1117-1123
    • /
    • 2008
  • This paper implements dual-kernel system using standard Linux and real-time embedded Linux for the real-time control of intelligent robot systems. Such system provides more useful services including standard Linux thread that is easy to implement complicated tasks and real-time tasks for the deterministic response to velocity control. Here, an open source real-time embedded Linux, XENOMAI, is ported on embedded target board. And for interfacing with motor controller we adopted a real-time serial device driver. The real-time task was implemented with a priority to keep the cyclic control command for trajectory control. In order to validate deterministic response of the proposed system, the performance measurement of the delay in performing trajectory control with feedback loop is evaluated with non real-time standard Linux. The proposed software architecture is anticipated to take advantage of features in both standard Linux and real-time operating systems for the intelligent robot systems.

A Study on Standard Management Model for The Logistics Center (물류센터 표준 관리 모델 구축 방안 연구)

  • Kim, Yin-Gyu;Choi, Hoon-Young;Baek, Seon-Woo;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.3
    • /
    • pp.221-229
    • /
    • 2015
  • The economy is advancing at quite a bit is the role of the Distribution Center, a rise is evolving and mullyuryang Any existing storage facilities were not creating added value from contact with the customer service centers play the role. In order to increase its market competitiveness also pl approach to three in order to enforce cost savings and run. But by industry, the goods, operating characteristics of the cooperating in order to differentiate themselves with the operating process of improvement of operating system, including costs and took lots of time of service.Quality is lower ; all were missing. Such logistics centers, standard management model to address a little bit problem with highest academic. I want to try send it to, each product-category's industrial and business forms, standardisation is really a difficult situation, current study is further progress all you if you are The process managed to turn component is sure that we will be able to be judged.

Entity management technology for automatic design in standard machine element (표준 기계부품의 자동설계를 위한 Entity 운용 기술)

  • 송재호;반갑수;이석희
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10a
    • /
    • pp.707-712
    • /
    • 1991
  • In machining a part in CAD/CAM system, it is required that the drawing information should be automatically generated, modified, deleted, and thus be used as an general information throughout the entire manufacturing process. This research addresses basic entities(point, line, circle, arc) for design feature and combination of this features, based on GT concepts, with minimum user's manual input. This paper deals with the generalization of operating system which can cover the s parts which appears in mechanical part handbook and the basic constitutional part of sold base. The system developed shows a strong application impact on automatic process planning system of medium - size injection sold companies.

  • PDF

Systems Engineering Approach to develop the FPGA based Cyber Security Equipment for Nuclear Power Plant

  • Kim, Jun Sung;Jung, Jae Cheon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.14 no.2
    • /
    • pp.73-82
    • /
    • 2018
  • In this work, a hardware based cryptographic module for the cyber security of nuclear power plant is developed using a system engineering approach. Nuclear power plants are isolated from the Internet, but as shown in the case of Iran, Man-in-the-middle attacks (MITM) could be a threat to the safety of the nuclear facilities. This FPGA-based module does not have an operating system and it provides protection as a firewall and mitigates the cyber threats. The encryption equipment consists of an encryption module, a decryption module, and interfaces for communication between modules and systems. The Advanced Encryption Standard (AES)-128, which is formally approved as top level by U.S. National Security Agency for cryptographic algorithms, is adopted. The development of the cyber security module is implemented in two main phases: reverse engineering and re-engineering. In the reverse engineering phase, the cyber security plan and system requirements are analyzed, and the AES algorithm is decomposed into functional units. In the re-engineering phase, we model the logical architecture using Vitech CORE9 software and simulate it with the Enhanced Functional Flow Block Diagram (EFFBD), which confirms the performance improvements of the hardware-based cryptographic module as compared to software based cryptography. Following this, the Hardware description language (HDL) code is developed and tested to verify the integrity of the code. Then, the developed code is implemented on the FPGA and connected to the personal computer through Recommended Standard (RS)-232 communication to perform validation of the developed component. For the future work, the developed FPGA based encryption equipment will be verified and validated in its expected operating environment by connecting it to the Advanced power reactor (APR)-1400 simulator.