• Title/Summary/Keyword: GDT

Search Result 36, Processing Time 0.03 seconds

Residual Voltage Reduction of Coaxial Surge Arrestor Using Ceramic Filler (세라믹 필터를 이용한 동축 서지어레스터의 잔류전압 저감)

  • Eom, Ju-Hong;Cho, Sung-Chul;Lee, Tae-Hyung;Lee, Young-Chul
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.21 no.2
    • /
    • pp.46-53
    • /
    • 2007
  • Extension of the mobile communication and the rapidly developing services connected with wireless multimedia(W-CDMA, DMB, Wibro, and so on) need great many base station transceiver systems, antennas, and many signal transmission line to embody these services. The min communication appliances system is exposed always in danger of transient overvoltage by direct stroke or induced lightning surge flowing in through antenna because the antenna of base station transceiver system or relay equipment is combined with expensive communication network equipments through signal transmission line. Now, gas discharge tube(GDT) or narrow band stub arrestor which is used by the surge protector for communication use is exposing limitations as for lightning surge protective means of the communication facility with high speed and wide frequency band. Therefore, for improving performance of surge arrestor, we applied ceramic filter which can reduce lightning surge invading from antenna effectively, and proved that ceramic filter is effective in residual voltage reduction through the experimental research.

System Integrity Monitoring System using Kernel-based Virtual Machine (커널 기반 가상머신을 이용한 시스템 무결성 모니터링 시스템)

  • Nam, Hyun-Woo;Park, Neung-Soo
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.157-166
    • /
    • 2011
  • The virtualization layer is executed in higher authority layer than kernel layer and suitable for monitoring operating systems. However, existing virtualization monitoring systems provide simple information about the usage rate of CPU or memory. In this paper, the monitoring system using full virtualization technique is proposed, which can monitor virtual machine's dynamic kernel object as memory, register, GDT, IDT and system call table. To verify the monitoring system, the proposed system was implemented based on KVM(Kernel-based Virtual Machine) with full virtualization that is directly applied to linux kernel without any modification. The proposed system consists of KvmAccess module to access KVM's internal object and API to provide other external modules with monitoring result. In experiments, the CPU utilization for monitoring operations in the proposed monitering system is 0.35% when the system is monitored with 1-second period. The proposed monitoring system has a little performance degradation.

Transient Voltage's Breaking by Development of High Performance SPD (고성능 서지보호기 개발을 통한 과도 이상전압 차단)

  • Kim, Jae-Hoon;Han, Sang-Ok;Kim, Sun-Ho;Koo, Kyung-Wan;Lee, Sei-Hyun;Park, Kang-Sik
    • Proceedings of the KIEE Conference
    • /
    • 2009.07a
    • /
    • pp.2065_2066
    • /
    • 2009
  • In this paper, we have developed high performance SPD(surge protective device) and evaluated the characteristics in comparison with typical SPD used in the inside and outside of the country. The new SPD was composed of MOV(metal oxide varistor), GDT(gas discharge tube) and impedance such as resistors, capacitors or varistors. To estimate operating the characteristic of the SPD which was developed, it was measured surge voltage caused by fault current or surge according to IEC 61000-4-5. As a result it was found that the power supply was cut off by high performance SPD when caused a short-circuit. In addition we could know that it could prevent ELB(earth leakage breaker)'s malfunction caused by surge.

  • PDF

A study on the Application of a Monitoring System for Gas Insulaterd Switchgear (가스절연개폐장치용 감시시스템 적용에 관한 연구)

  • Kim, Jeong-Bae;Kim, Min-Su;Song, Won-Pyo;Kim, Deok-Su;Jeon, Chan-Seok;Gil, Gyeong-Seok
    • The Transactions of the Korean Institute of Electrical Engineers C
    • /
    • v.51 no.1
    • /
    • pp.22-30
    • /
    • 2002
  • ln this paper, it was reported the developed results of the monitoring unit for 72.5kY GIS which it is one part of the monitoring system for the substation that Korea Railway Company is promoting. In order to monitor the operational status of GIS, four parameters were chosen: the number of times of the circuit breaker switching, tightness of the gas-sealed units (circuit breaker / disconnecting switch / earthing switch), the number of times of the lightning arrestor operating and the leakage current of the lighting arrester. We constructed the monitoring system that can be judged the operating condition of the GIS from the signal of the suitable sensor for the purpose. Therefore, it is possible to on line monitoring for the condition of the GlS without efforts of the Periodic inspection.

A Method for Reducing the Residual Voltage of Hybrid SPD Circuit Using Choke Coils (초크코일을 이용한 SPD 조합회로의 잔류전압 저감기법)

  • Cho, Sung-Chul;Eom, Ju-Hong;Lee, Tae-Hyung
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2007.05a
    • /
    • pp.250-253
    • /
    • 2007
  • Gas Discharge Tubes (GDTs) are widely used as surge protectors for commnuication applications due to their small internal capacitance. In these days, however, they are mostly used in combined configurations, because the activation voltage required to initiate the discharge process in the GDTs for sufficient amount of time can be large enough to damage surge-sensitive protected circuits. For GDTs with a considerably high initial over-voltage value, we should limit the peak voltage using a TVS or filter. As for ZnO varistors, even though their performance for voltage restriction is excellent, their applications in high-frequency commnuication circuits have been limited because of higher internal capacitance when compared to the GDTs. In order to develop a surge protector for commnuication applications by taking advantages of these two devices, we built a combination circuit that connects a GDT and a ZnO varistor along with a choke coil in common and differential modes. We describe how the applied SPDs operate in protection process steps with the actual data obtained from the residual voltage measurements at each step. The experiment results show that the surge voltage restriction with the choke coil is more effective in 100 [kHz] RingWave voltage than in lightning impulse voltage.

  • PDF

An analysis of UAV line-of-sight according to mission environment (임무 환경에 따른 무인항공기 가시선 분석)

  • Choi, Jun-Su;Hur, Chang-Wu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1414-1418
    • /
    • 2013
  • In this paper, analyzed of UAVs operation altitude and range from the point of view of the data link. UAVs operation altitude is determined by the specification of the mission equipment and operational purposes. The link-of-sight analysis of data link equipment before deciding the unmanned aircraft operation altitude conditions should be considered. If GDT=0m installation then 32dBi antenna apply 15,779 meter is operation altitude. 44dBi antenna 7,927 meters. Operating altitude perspective, high-gain antenna is recommended of the long range communication.

An Analysis of UAV operation altitude according to Line-Of-Sight communication range. (가시선 통신거리에 따른 무인항공기 운용 고도 분석)

  • Choi, Jun-su;Hur, Chang-wu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.783-785
    • /
    • 2013
  • In this paper, analyzed of UAVs operation altitude and range from the point of view of the data link. UAVs operation altitude is determined by the specification of the mission equipment and operational purposes. The link-of-sight analysis of data link equipment before deciding the unmanned aircraft operation altitude conditions should be considered. If GDT=0m installation then 32dBi antenna apply 13,724 meter is operation altitude. 44dBi antenna 6,657 meters. Operating altitude perspective, high-gain antenna is recommended of the long range communication.

  • PDF

Rain Attenuation Analysis for Designing UAV Data Link on Ku-Band (Ku대역 무인항공기 데이터 링크 설계를 위한 강우감쇠 분석)

  • Lee, Jaeyoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.7
    • /
    • pp.1248-1256
    • /
    • 2015
  • It is necessary to apply an exact data and a precise prediction model for a rain attenuation to design the link margin for a data link using Ku-band with the serious effect by rain. In this paper, we investigate the regional rainfall-rate distribution of Korea proposed in TTAK.KO-06.0122/R1 and compare it with the distribution provided by Rec. ITU-R PN.837-1 and Crane. And, the rain rate climate regions similar with the rainfall-rate distribution of Korea in Rec. ITU-R PN.837-1 and Crane model are selected. Finally, using Rec. ITU-R P.618-8 and Crane rain attenuation prediction model, we derive and analyze the rain attenuation for Ku-band frequency according to the time percentage of an average year and the distance of wireless communication link between unmanned aerial vehicle (UAV) and ground data terminal (GDT).

A study on the Relationship between Cyberloafing Characteristic and Cognitive Dissonance

  • Chang, Hwal-Sik;Jung, Dae-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.9
    • /
    • pp.73-80
    • /
    • 2015
  • Cyberloafing is a term used to describe the actions of employees who use their Internet access at work for personal use while pretending to do legitimate work. This research that this puts the foundation on the general deterrence theory, social control theory, and Triandis model compares the individual characteristic including the group norm, self-control, perceived value among many factors having an effect on the personal ethical decision-making besides the general principles of ethics and stipulated regulation like the severity of sanction together. It was exposed to have the effect that the severity of punishment, self control, and perceived value notes to the internet abuse action. Therefore, the education and rules of punishment which is consistent along with the theoretical thesis supporting the groping of the preparation plan that is active in the various ethic problems has to be built. It is necessary that the company devises the internet application in the appropriate range, that is the partial the affirmation feeling which and it can allow officially. According to the cognitive dissonance, since this will have to allow with the positive direction can move to the misuse action with the intention differently, it can draw a conclusion.

A Study on the Factors for Violation of Information Security Policy in Financial Companies : Moderating Effects of Perceived Customer Information Sensitivity (금융회사 정보보안정책의 위반에 영향을 주는 요인 연구 : 지각된 고객정보 민감도에 따른 조절효과)

  • Lee, Jeong-Ha;Lee, Sang-Yong Tom
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.4
    • /
    • pp.225-251
    • /
    • 2015
  • This paper analyzed factors for employees to violate information security policy in financial companies based on the theory of reasoned action (TRA), general deterrence theory (GDT), and information security awareness and moderating effects of perceived sensitivity of customer information. Using the 376 samples that were collected through both online and offline surveys, statistical tests were performed. We found that the perceived severity of sanction and information security policy support to information policy violation attitude and subjective norm but the perceived certainty of sanction and general information security awareness support to only subjective norm. Also, the moderating effects of perceived sensitivity of customer information against information policy violation attitude and subjective norm were supported. Academic implications of this study are expected to be the basis for future research on information security policy violations of financial companies; Employees' perceived sanctions and information security policy awareness have an impact on the subjective norm significantly. Practical implications are that it can provide a guide to establish information security management strategies for information security compliance; when implementing information security awareness training for employees to deter violations by emphasizing the sensitivity of customer information, a company should make their employees recognize that the customer information is very sensitive data.