• Title/Summary/Keyword: Channel Card

Search Result 80, Processing Time 0.025 seconds

A Study on TTX Traction Characteristics using Measurement System (계측시스템을 활용한 틸팅열차 추진장치 특성 연구)

  • Han, Young-Jae;Lee, Su-Gil;Park, Choon-Soo;Han, Seong-Ho;Lee, Jun-Seok;Jung, Kwon-Il
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.20 no.12
    • /
    • pp.1093-1098
    • /
    • 2007
  • Tilting trains are currently in operation in 13 countries around the world. With the advances in tilting technology, verification of economic efficiency, and changes in economic situations, the introduction of tilting trains will rapidly spread across the globe. The measurement system is composed of the industrial computers installed in the console and the measurement racks mounted on each car. It is utilized to accumulate the data by the communication card and the optical cable. The optical cable and power cable are coupled at the connector located in joint of train to make easy to disconnect car each other. The signal conditioner is designed to choose and to extend the channel for each sensor readily. The sensor measurement rack has adopted as decentralization method. It is installed in each car to minimize the cable length. In also, it is manufactured based on 19"rack and covered to protect the cable. In this study, the programs for measurement and analysis were also developed to understand the traction system characteristics of TTX. Using this measurement system, we studied that acceleration test, re-powering test, and gradually powering test. The acceleration performance of TTX is 1.735 km/h/s, and it is inner standard value. The notch test result from 1 to 7 steps, DC link voltage is under standard value, and the output electric current of inverter is controlled normally. From the test results, we saw the performances of the traction systems are normal.

A Study on Model for the Evaluation of Customer Composition in Internet Shopping Malls (인터넷 쇼핑몰의 고객구성 평가 모델에 관한 연구)

  • Park, Kwang-Ho;Han, Dong-Seok;Kim, Hak-So;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.29 no.2
    • /
    • pp.83-91
    • /
    • 2006
  • Internet shopping mall has become a huge distribution channel with dramatic growth in recent years. The number of consumers has exponentially increased as the scale of shopping mall has been large so that shopping malls with thousands or millions of consumers become a general case. However, it is essential to evaluate whether current assortment of consumers is proper or not in the strategic aspect in order to operate Internet shopping mall effectively and gain profits. That is, it is important to evaluate whether consumer strategy of corporation is proper or not from the corporation. Despite this business importance, consumer assortment has not been evaluated well and related study is not sufficient. This study supposes a framework for consumer assortment evaluation, which evaluates whether consumer assortment of Internet shopping mall is proper or not. In the framework for consumer assortment evaluation, analysis data based on order data and consumer data in database is made. Then, four factors, consumer maintenance rate, consumer profitability, consumer securing rate and consumer conversion are setup, and 22 measurement indexes are drawn. Finally, a consumer assortment evaluation score card is made by integrating them. This study has applied a supposed framework to a domestic typical community based shopping mall, and it is expected that the evaluation result will be used as informant strategic information to operate the shopping mall effectively.

Mobile Payment System Design with Transaction Certificate Mode (거래 인증 모드를 사용한 이동 결제 시스템 설계)

  • Sung, Soon-Hwa;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.931-939
    • /
    • 2014
  • The Web or Mobile channel of previous Web access authentication system for a payment only provides the authentication of remote users, and does not provide the authentication between a user and a bank/financial institution. Therefore, this paper proposes the Transaction Certificate Mode(TCM) for a payment which can preserve the mutual authentication between a user and a bank/financial institution for Web-based payment systems. The proposed system has designed for wireless network instead of Secure Electronic Transaction (SET) designed for wired electronic transaction. In addition, this system with TCM is able to support an account-based transaction for wireless networks instead of a disadvantage of SET such as a card-based transaction for wired networks. Therefore, customers can check their balances without logging on their bank's web site again due to mutual authentication between a customer and his bank/financial institution.

A Multi-point I/O module development that utilize PC's LAN card and Switching (PC의 랜카드와 스위칭 허브를 활용한 다접점 I/O 모듈 개발)

  • Kim, Tae-Min;Jeon, Yoon-Han;Shin, Gun-Soon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.2022-2030
    • /
    • 2008
  • System such as FA and breakup TC is applied by real time and need to manage. This paper studies data processing skill that can divide TC and data of much quantity with collection by real time. Modularize to several system, and use of computer communication network that interlink computers that can achieve control function of each systems to network is spreading. Develop that can take advantage of Ideonet communication method and transmit signal of channel because do multiplex all. Do data that have semi-conductor equipment or many input of LCD equipment and output node multiplex, and several units real time Ideonet communication that control is available use that all input of point of contact and output module develop.

Performance improvement of serial communication converter of train control computer (열차제어컴퓨터 시리얼통신변환장치(HADAX)의 성능개선에 관한 연구)

  • Cho, Bong-Kwan
    • Journal of The Korean Society For Urban Railway
    • /
    • v.6 no.4
    • /
    • pp.427-436
    • /
    • 2018
  • HADAX is a serial communication converter of train control computer. It is connected with various signal equipments such as wayside signal equipments, station signal equipments, train control computers, and transmits control information and signal condition information for train control. And transmits information to several electronic interlocking devices through a splitter interface. Since HADAX interfaces with many signaling devices through serial communication, frequent communication connection faults necessitate improvement of performance such as dual system configuration, integration of external splitter, and multi-channelization of communication card. The improved HADAX device should have compatibility with the dimensions of existing enclosure and enclosure, and verify the performance of dual system and splitter integration. Therefore, we verified the performance of HADAX through the route control test, dual system test, and multi-channel communication test with splitter integrated connection by connecting with the existing signal equipment.

New Simple Power Analysis on scalar multiplication based on sABS recoding (sABS 형태의 스칼라 곱셈 연산에 대한 새로운 단순전력 공격)

  • Kim, Hee-Seok;Kim, Sung-Kyoung;Kim, Tae-Hyun;Park, Young-Ho;Lim, Jong-In;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.115-123
    • /
    • 2007
  • In cryptographic devices like a smart-card whose computing ability and memory are limited, cryptographic algorithms should be performed efficiently. Scalar multiplication is very important operation in Elliptic Curve Cryptosystems, and so must be constructed in safety against side channel attack(SCA). But several countermeasures proposed against SCA are exposed weaknesses by new un-dreamed analysis. 'Double-and-add always scalar multiplication' algorithm adding dummy operation being known to secure against SPA is exposed weakness by Doubling Attack. But Doubling Attack cannot apply to sABS receding proposed by Hedabou, that is another countermeasure against SPA. Our paper proposes new strengthened Doubling Attacks that can break sABS receding SPA-countermeasure and a detailed method of our attacks through experimental result.

Dynamic Bandwidth Allocation Algorithm with Two-Phase Cycle for Ethernet PON (EPON에서의 Two-Phase Cycle 동적 대역 할당 알고리즘)

  • Yoon, Won-Jin;Lee, Hye-Kyung;Chung, Min-Young;Lee, Tae-Jin;Choo, Hyun-Seung
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.349-358
    • /
    • 2007
  • Ethernet Passive Optical Network(EPON), which is one of PON technologies for realizing FTTx(Fiber-To-The-Curb/Home/Office), can cost-effectively construct optical access networks. In addition, EPON can provide high transmission rate up to 10Gbps and it is compatible with existing customer devices equipped with Ethernet card. To effectively control frame transmission from ONUs to OLT EPON can use Multi-Point Control Protocol(MPCP) with additional control functions in addition to Media Access Control(MAC) protocol function. For EPON, many researches on intra- and inter-ONU scheduling algorithms have been performed. Among the inter-ONU scheduling algorithms, IPS(Interleaved Polling with Stop) based on polling scheme is efficient because OLT assigns available time portion to each ONU given the request information from all ONUs. Since the IPS needs an idle time period on uplink between two consecutive frame transmission periods, it wastes time without frame transmissions. In this paper, we propose a dynamic bandwidth allocation algorithm to increase the channel utilization on uplink and evaluate its performance using simulations. The simulation results show that the proposed Two-phase Cycle Danamic Bandwidth Allocation(TCDBA) algorithm improves the throughput about 15%, compared with the IPS and Fast Gate Dynamic Bandwidth Allocation(FGDBA). Also, the average transmission time of the proposed algorithm is lower than those of other schemes.

Performance Improvement of Power Attacks with Truncated Differential Cryptanalysis (부정차분을 이용한 전력분석 공격의 효율 향상*)

  • Kang, Tae-Sun;Kim, Hee-Seok;Kim, Tae-Hyun;Kim, Jong-Sung;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.43-51
    • /
    • 2009
  • In 1998, Kocher et al. introduced Differential Power Attack on block ciphers. This attack allows to extract secret key used in cryptographic primitives even if these are executed inside tamper-resistant devices such as smart card. At FSE 2003 and 2004, Akkar and Goubin presented several masking methods, randomizing the first few and last few($3{\sim}4$) rounds of the cipher with independent random masks at each round and thereby disabling power attacks on subsequent inner rounds, to protect iterated block ciphers such as DES against Differential Power Attack. Since then, Handschuh and Preneel have shown how to attack Akkar's masking method using Differential Cryptanalysis. This paper presents how to combine Truncated Differential Cryptanalysis and Power Attack to extract the secret key from intermediate unmasked values and shows how much more efficient our attacks are implemented than the Handschuh-Preneel method in term of reducing the number of required plaintexts, even if some errors of Hamming weights occur when they are measured.

Impact Evaluation of Water Footprint on Stages of Drainage Works (배수공 각 작업 단계별 물발자국 영향평가)

  • Chen, Di;Kim, Joon-Soo;Batagalle, Vinuri;Kim, Byung-Soo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.40 no.2
    • /
    • pp.225-231
    • /
    • 2020
  • Fresh water that can be used by a person of the total amount of water on the planet is increased because it is less than 0.01 % except underground water, ice and snow, etc. water management response need. In order to protect and efficiently utilize water resources, major countries are conducting water footprint studies that can quantitatively estimate the amount of water put into the operating phase of the resource harvesting phase, mainly agriculture. Korea has also recently developed a number of policies in order to cope with water shortages, and in the construction industry, as well as the need for basic research to support it has been emphasized. This study was constructed DB up to the raw material harvesting step, the transport step, the production stage in order to estimate the water consumption of resources to be put into the work process to target the drainage of the road. Water usage estimation method was utilized the method presented in the Water Footprint Manual and the environmental score card certification guide, unit water usage each drainage main method was calculated after estimating the water footprint considering the water character factor, indirect water and the direct water, the water consumption factor of material input to each process. Brown asphalt, rebar, remicon of the drainage material as a result of the water footprint calculation accounted for 97 % of the total. Drainage method is a culvert, a side channel, a culvert wing wall, reinforced concrete open channel accounted for 92.2 % of the total. Drainage total step-by-step calculated water consumption and water footprint was found in order of raw material harvesting step, transport stage, production stage. Water footprint each drainage method or total drainage material calculated in this study can be used as a base data in the agricultural and construction sectors. In order to increase the reliability of the analysis, it is believed that further overseas databases will be needed for continuous review and research.

Assessing the Damage: An Exploratory Examination of Electronic Word of Mouth (손해평고(损害评估): 대전자구비행소적탐색성고찰(对电子口碑行销的探索性考察))

  • Funches, Venessa Martin;Foxx, William;Park, Eun-Joo;Kim, Eun-Young
    • Journal of Global Scholars of Marketing Science
    • /
    • v.20 no.2
    • /
    • pp.188-198
    • /
    • 2010
  • This study attempts to examine the influence that negative WOM (NWOM) has in an online context. It specifically focuses on the impact of the service failure description and the perceived intention of the communication provider on consumer evaluations of firm competence, attitude toward the firm, positive word of mouth and behavioral intentions. Studies of communication persuasiveness focus on "who says what; to whom; in which channel; with what effect (Chiu 2007)." In this research study, we examine electronic web posting, particularly focusing on two aspects of "what": the level of service failure communicated and perceived intention of the individual posting. It stands to reason electronic NWOM that appears to be trying to damage a product’s or firm's reputation will be viewed as more biased and will thus be considered as less credible. According to attribution theory, people search for the causes of events especially those that are negative and unexpected (Weiner 2006). Hennig-Thurau and Walsh (2003) state "since the reader has only limited knowledge and trust of the author of an online articulation the quality of the contribution could be expected to serve as a potent moderator of the articulation-behavior relationship. We therefore posit the following hypotheses: H1. Subjects exposed to electronic NWOM describing a high level of service failure will provide lower scores on measures of (a) firm competence, (b) attitude toward the firm, (c) positive word of mouth, and (d) behavioral intention than will subjects exposed to electronic NWOM describing a low level of service failure. H2. Subjects exposed to electronic NWOM with a warning intent will provide lower scores on measures of (a) firm competence, (b) attitude toward the firm, (c) positive word of mouth, and (d) behavioral intention than will subjects exposed to electronic NWOM with a vengeful intent. H3. Level of service failure in electronic NWOM will interact with the perceived intention of the electronic NWOM, such that there will be a decrease in mean response on measures of (a) firm competence, (b) attitude toward the firm, (c) positive word of mouth, and (d) behavioral intention from electronic NWOM with a warning intent to a vengeful intent. The main study involved a2 (service failure severity) x2 (NWOM with warning versus vengeful intent) factorial experiment. Stimuli were presented to subjects online using a mock online web posting. The scenario described a service failure associated with non-acceptance of a gift card in a brick-and-mortar retail establishment. A national sample was recruited through an online research firm. A total of 113 subjects participated in the study. A total of 104 surveys were analyzed. The scenario was perceived to be realistic with 92.3% giving the scenario a greater than average response. Manipulations were satisfactory. Measures were pre-tested and validated. Items were analyzed and found reliable and valid. MANOVA results found the multivariate interaction was not significant, allowing our interpretation to proceed to the main effects. Significant main effects were found for post intent and service failure severity. The post intent main effect was attributable to attitude toward the firm, positive word of mouth and behavioral intention. The service failure severity main effect was attributable to all four dependent variables: firm competence, attitude toward the firm, positive word of mouth and behavioral intention. Specifically, firm competence for electronic NWOM describing high severity of service failure was lower than electronic NWOM describing low severity of service failure. Attitude toward the firm for electronic NWOM describing high severity of service failure was lower than electronic NWOM describing low severity of service failure. Positive word of mouth for electronic NWOM describing high severity of service failure was lower than electronic NWOM describing low severity of service failure. Behavioral intention for electronic NWOM describing high severity of service failure was lower for electronic NWOM describing low severity of service failure. Therefore, H1a, H1b, H1c and H1d were all supported. In addition, attitude toward the firm for electronic NWOM with a warning intent was lower than electronic NWOM with a vengeful intent. Positive word of mouth for electronic NWOM with a warning intent was lower than electronic NWOM with a vengeful intent. Behavioral intention for electronic NWOM with a warning intent was lower than electronic NWOM with a vengeful intent. Thus, H2b, H2c and H2d were supported. However, H2a was not supported though results were in the hypothesized direction. Otherwise, there was no significant multivariate service failure severity by post intent interaction, nor was there a significant univariate service failure severity by post intent interaction for any of the three hypothesized variables. Thus, H3 was not supported for any of the four hypothesized variables. This study has research and managerial implications. The findings of this study support prior research that service failure severity impacts consumer perceptions, attitude, positive word of mouth and behavioral intentions (Weun et al. 2004). Of further relevance, this response is evidenced in the online context, suggesting the need for firms to engage in serious focused service recovery efforts. With respect to perceived intention of electronic NWOM, the findings support prior research suggesting reader's attributions of the intentions of a source influence the strength of its impact on perceptions, attitude, positive word of mouth and behavioral intentions. The implication for managers suggests while consumers do find online communications to be credible and influential, not all communications are weighted the same. A benefit of electronic WOM, even when it may be potentially damaging, is it can be monitored for potential problems and additionally offers the possibility of redress.