• Title/Summary/Keyword: Vendors

Search Result 466, Processing Time 0.032 seconds

Construction of IED Conformance Testing System (IED 적합성 인증시험 장치 구축)

  • Lee, N.H.;Kim, J.H.;Jang, B.T.;An, Y.H.;Hwang, K.C.
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.489-490
    • /
    • 2007
  • In order to construct a digital substation based on IEC61850, All of the utility company should used IEDs to be verified and also vendors should get a certification from the international conformance testing organizationsuch as KEMA. So KEPRI in charge of POWER IT project related to SAS was required to IED conformance testing system, which can perform the test previously. The system, KEPCO developed, consists of HMI, IED (Intelligent Electronic Device), network equipment, V/I generator etc

  • PDF

IEC61850 Based FRTU Development Scheme (IEC 61850 기반 FRTU 개발에 관한 연구)

  • Guan, Qiang;Choi, Myeon-Song;Han, Seung-Soo
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.497-498
    • /
    • 2007
  • When we implement the substation automation, the largest problem is that IEDs may come from different vendors, which will result in the reduction of the reliability of communication between IEDs. To solve the problem IEC61850 is investigated, which uniforms the communication interface. However, in order to communicate with an IEC61850 implanted IED, FRTU (Feeder Remote Terminal Unit) need to be compatible with IEC6185 consequentially. A new IEC61850 based FRTU development scheme is proposed. The performance shows his compatibility with other IEC61850 IED, which has already been tested in ARET (Agent-based Reliability Enhancement Technology) system.

  • PDF

A Review on Intelligent Compaction Techniques in Railroad Construction

  • Oh, Jeongho
    • International Journal of Railway
    • /
    • v.7 no.3
    • /
    • pp.80-84
    • /
    • 2014
  • The purpose of this paper was to review Intelligent Compaction (IC) techniques, which is regarded relatively new to the railroad roadbed construction activity. Most of civil structures are built on roadbed that supposed to provide adequate load bearing support to the upper structure through the qualified compaction process. However, it is not uncommon for structure failure attributed to inadequate compaction control take place in field sites. Unlike traditional compaction control method to check field density at several locations, IC techniques continuously measure various compaction quality indices that represent compaction uniformity. In this paper, a series of literature review relevant to IC techniques was conducted to provide concise summary on the following categories: 1) background of IC technique; 2) Summary of IC vendors and basic principles; 3) modeling of IC behavior, and 4) case study along with correlation between IC with other measurements. In summary, IC technologies seem to be promising in future railroad construction to achieve better compaction quality control so that the serviceability of railroad can be ensured with minimizing rehabilitation and maintenance activities.

Fileless cyberattacks: Analysis and classification

  • Lee, GyungMin;Shim, ShinWoo;Cho, ByoungMo;Kim, TaeKyu;Kim, Kyounggon
    • ETRI Journal
    • /
    • v.43 no.2
    • /
    • pp.332-343
    • /
    • 2021
  • With cyberattack techniques on the rise, there have been increasing developments in the detection techniques that defend against such attacks. However, cyber attackers are now developing fileless malware to bypass existing detection techniques. To combat this trend, security vendors are publishing analysis reports to help manage and better understand fileless malware. However, only fragmentary analysis reports for specific fileless cyberattacks exist, and there have been no comprehensive analyses on the variety of fileless cyberattacks that can be encountered. In this study, we analyze 10 selected cyberattacks that have occurred over the past five years in which fileless techniques were utilized. We also propose a methodology for classification based on the attack techniques and characteristics used in fileless cyberattacks. Finally, we describe how the response time can be improved during a fileless attack using our quick and effective classification technique.

Closing the "CIM GAP" in the Process Industries

  • Canfield, Frank-B.;Nair, Pratap-K.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10b
    • /
    • pp.1557-1563
    • /
    • 1991
  • Vendors and consultants struggle to draw attention to their proven experience in discrete CIM in order to convince process manufacturers to adopt CIM technology. The analogy works very well at the periphery where an invoice is an invoice, but disintegrates at the core where modeling of the manufacturing "process" is required. Until recently, it has not been possible to completely and rigorously model entire process plants in real-time, and this missing core element has been called the "CIM GAP" With the recent introduction of the concurrent resolution $^{sm}$ kernel, the CIM GAP now is being closed in the process industries.ntroduction of the concurrent resolution $^{sm}$ kernel, the CIM GAP now is being closed in the process industries.

  • PDF

A Study on Electronic Circuit for Liwe-Time Correction in Multi-Channel Analyzer : Survey and Analysis (방사선 스펙트럼 계측기 (Multi-Channel Analyzer)의 Live-Time 보상회로에 관한 연구)

  • Hwang, I.K.;Kwon, K.H.;Song, S.J.
    • Nuclear Engineering and Technology
    • /
    • v.27 no.5
    • /
    • pp.784-791
    • /
    • 1995
  • This paper describes the counting-loss problem for radiation measurement Multi-channel analyzers and spectrometers adopt various techniques for compensation for counting-losses in process-ing the radiation pulses from a detector. Researchers hate tried to seek the best solution for the problem. However, any absolute solution has not been reached and vendors of radiation instruments use their own algorithms individually. This survey explains the various compensation algorithms with electronic implementation approach. Shortcomings and merits of each algorithm are also reviewed and a direction is suggested of the recommendable development strategy for counting-loss compensation.

  • PDF

An Analysis of Spot Cloud in Cloud Computing

  • Mansoor, Usman;Mehmood, Usman;Khan, Faraz Idris;Kim, Ki-Hyung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.242-245
    • /
    • 2011
  • Cloud Computing is a fast developing domain in computer system architecture which enables dynamically scalable and virtualized resources to its users. Spot Cloud is the next evolutionary step in this field which allows the cloud computing resources to be treated as a market commodity. Cloud computing vendors will now be able to put their un used computational resources for sale using the singular access platform provided by Spot Cloud. Meanwhile customers will be able to buy/sell these resources according to their requirements. This paper analyzes the idea of Spot Cloud and the anticipated impact it will have on Cloud Computing globally. The paper also presents the risks and inherent barriers associated with this idea and how they might hinder the development of Spot Cloud to its full potential.

The Effects of Psychological Contract Violation on OS User's Betrayal Behaviors: Window XP Technical Support Ending Case (심리적 계약 위반이 OS이용자의 배신 행동에 미치는 영향: 윈도우 XP 기술적 지원서비스 중단 사례)

  • Lee, Un-Kon
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.325-344
    • /
    • 2014
  • Technical support of Window XP ended in March, 8, 2014, and it makes OS(Operating System) users fall in a state of confusion. Sudden decision making of OS upgrade and replacement is not a simple problem. Firms need to change the long term capacity plan in enterprise IS management, but they are pressed for time and cost to complete it. Individuals can not help selecting the second best plan, because the following OSs of Window XP are below expectations in performances, new PC sales as the opportunities of OS upgrade decrease, and the potential risk of OS technical support ending had not announced to OS users at the point of purchase. Microsoft as the OS vendors had not presented precaution or remedy for this confusion. Rather, Microsoft announced that the technical support of the other following OSs of Wndow XP such as Window 7 would ended in two years. This conflict between OS vendor and OS users could not happen in one time, but could recur in recent future. Although studies on the ways of OS user protection policy would be needed to escape from this conflict, few prior studies had conducted this issue. This study had challenge to cautiously investigate in such OS user's reactions as the confirmation with OS user's expectation in the point of purchase, three types of justice perception on the treatment of OS vendor, psychological contract violation, satisfaction and the other betrayal behavioral intention in the case of Window XP technical support ending. By adopting the justice perception on this research, and by empirically validating the impact on OS user's reactions, I could suggest the direction of establishing OS user protection policy of OS vendor. Based on the expectation-confirmation theory, the theory of justice, literatures about psychological contract violation, and studies about consumer betrayal behaviors in the perspective of Herzberg(1968)'s dual factor theory, I developed the research model and hypothesis. Expectation-confirmation theory explain that consumers had expectation on the performance of product in the point of sale, and they could satisfied with their purchase behaviors, when the expectation could have confirmed in the point of consumption. The theory of justice in social exchange argues that treatee could be willing to accept the treatment by treater when the three types of justice as distributive, procedural, and interactional justice could be established in treatment. Literatures about psychological contract violation in human behaviors explains that contracter in a side could have the implied contract (also called 'psychological contract') which the contracter in the other side would sincerely execute the contract, and that they are willing to do vengeance behaviors when their contract had unfairly been broken. When the psychological contract of consumers had been broken, consumers feel distrust with the vendors and are willing to decrease such beneficial attitude and behavior as satisfaction, loyalty and repurchase intention. At the same time, consumers feel betrayal and are willing to increase such retributive attitude and behavior as negative word-of-mouth, complain to the vendors, complain to the third parties for consumer protection. We conducted a scenario survey in order to validate our research model at March, 2013, when is the point of news released firstly and when is the point of one year before the acture Window XP technical support ending. We collected the valid data from 238 voluntary participants who are the OS users but had not yet exposed the news of Window OSs technical support ending schedule. The subject had been allocated into two groups and one of two groups had been exposed this news. The data had been analyzed by the MANOVA and PLS. MANOVA results indicate that the OSs technical support ending could significantly decrease all three types of justice perception. PLS results indicated that it could significantly increase psychological contract violation and that this increased psychological contract violation could significantly reduce the trust and increase the perceived betrayal. Then, it could significantly reduce satisfaction, loyalty, and repurchase intention, and it also could significantly increase negative word-of-month intention, complain to the vendor intention, and complain to the third party intention. All hypothesis had been significantly approved. Consequently, OS users feel that the OSs technical support ending is not natural value added service ending, but the violation of the core OS purchase contract, that it could be the posteriori prohibition of OS user's OS usage right, and that it could induce the psychological contract violation of OS users. This study would contributions to introduce the psychological contract violation of the OS users from the OSs technical support ending in IS field, to introduce three types of justice as the antecedents of psychological contract violation, and to empirically validate the impact of psychological contract violation both on the beneficial and retributive behavioral intentions of OS users. For practice, the results of this study could contribute to make more comprehensive OS user protection policy and consumer relationship management practices of OS vendor.

A Study on the Auction Schemes of Fish Commodities in the Koheung Region (고흥지역 수산물 경매시장의 특성에 관한 연구)

  • 강연실
    • The Journal of Fisheries Business Administration
    • /
    • v.29 no.2
    • /
    • pp.111-141
    • /
    • 1998
  • Why are auctions so prevalent in fisheries fields\ulcorner One answer is, perhaps, that fisheries products have no standard value. The price of any catch of fish (at least of fish destined for the fresh fish market) depends on the demand and supply conditions at a specific moment of time, influenced by prospective market developments and prices must be remade for each transaction. There are various auction schemes including written-bid method in Korea. It is difficult to make decision the application of auction selling in market distribution. One reason is the absence of adequate data on which to base firm statements. There is very little precise information about the relative volume handled by auction scheme as compared with other sales schemes Because of the paucity reliable data, one must depend largely on qualitative in attempting to above this problem. This paper is designed to examine which auction scheme is more efficient as a economic tool by introducing the three auctions, as samples, utilized in Koheung peninsula. Koheung coast with abundant fisheries resource, locates on the Middle-South part in Korea and has three auction firm operating by fisheries cooperatives. fur selling of dry fish included sea weed, live fish and fresh fish respectively, As a result, 1 found that there are three interesting auction schemes as follow : 1. More than one winners are selected as buyers. The highest bidder can at first get fishes he wants to buy, second winner can get surplus fishes after the highest bidder employes one's privilege with the highest pay, and next winner would be a buyer if fishes would be left in sequence after being sold with higher price. Every fisherman can sell one' s fishes with equal unit price if he delivery it to the winner within one day. Therefore, all the vendors feel they are equal members of fisheries cooperation. 2. Written-bid pricing on the cover of handy book. It is easy to write and to erase the figure more than on the small black board, and is convenient also to keep in the pocket. 3. Auctioning on the fixed platform with fixed fish tank is a very fast auction scheme in spite of short displaying time. Auctioneer presides bidding at one place on the fixed platform, instead of moving, vendors should carry a container of live fishes in the fish tank into showing table in front of would-be buyers and auctioneer. Although the applicability of the auction system to a marketing problem depends in part on subjective considerations by those making decision, basically it is a matter of comparative economic efficiency. In general, if the scheme maximizes returns in relation to the effort expanded by both buyers and sellers, it will be utilized. If it does not, a more efficiency may take place over a period of time, but, even more important, those making decisions may become aware of the potentialities of new schemes. Therefore, in order to applicate the three interesting auction schemes introduced in this paper to other fisheries market, it is necessary not only to analyze many other auction schemes but also to compare the economic efficiency those schemes utilizing in other fisheries market.

  • PDF

Transmission modes of Pneumocystis carinii among rats observed by karyotype analysis (핵형 추적에 의한 카리니주폐포자충의 전파 양상 확인)

  • 홍성태;류진숙
    • Parasites, Hosts and Diseases
    • /
    • v.30 no.4
    • /
    • pp.283-288
    • /
    • 1992
  • To observe the transmission patterns of karyotype of Pneumocystis carinii (Pc) by rat colonies, three strains of rats, Sprague-Dawlcy(SD), Wistar(W) and Fisher (F) from various animal vendors, were suppressed of their immunity by injection of methyl prednisolone. They were kept for 5 to 13 weeks in 3 different animal rooms, A, B, and C. The purified organisms were prepared in low melting point agarose gel by embedded Iysis method for pulsed field gel electrophoresis. Field inversion gel electrophoresis showed 2 patterns of the kart·otype of Pc. The rooms A and C contained SD rats from the source p, and also the room A was used for F and W rats. However, Pc from all of the SD and F rats in the room A showed same karyotypes, the pattern I. The SD rats from difFerent vendors, M and 5, were reared in the room B, and shared the same Pc karyotypes, the pattern II . The rats of W strain were from the vendor M, and immune-suppressed in the animal room A. Five weeks after the expe- riment, the Pc showed the karyotype pattern II but the pattern became mixed with the type I after 7 to 8 weeks. The Bindings revealed that the animals born and reared in the same animal quarter harbored Pc with same karyotypes. If the animals were kept under immune-suppression in the same room with heavily infected hosts, they could be infected by Pc from their neighbors. The present experimental findings suggest that Pc is transmitted among rats through the air.

  • PDF