• Title/Summary/Keyword: Graphical substitution

Search Result 5, Processing Time 0.021 seconds

Network analysis by signal-flow graph (Signal-flow graph에 의한 회로분석)

  • Hyung Kap Kim
    • 전기의세계
    • /
    • v.17 no.2
    • /
    • pp.11-15
    • /
    • 1968
  • One of the most important methods used in the modern analysis of linear networks and systems is the signal flow graph technique, first introduced by S.J. Mason in 1953. In essence, the signal-flow graph technique is a graphical method of solving a set of simultaneous. It can, therefore, be regarded as an alternative to the substitution method or the conventional matrix method. Since a flow-graph is the pictorial representation of a set of equations, it has an obvious advantage, i.e., it describes the flow of signals from one point of a system to another. Thus it provides cause-and-effect relationship between signals. And it often significantly reduces the work involved, and also yields an easy, systematic manipulation of variables of interest. Mason's formula is very powerful, but it is applicable only when the desired quantity is the transmission gain between the source node and sink node. In this paper, author summarizes the signal-flow graph technique, and stipulates three rules for conversion of an arbitrary nonsource node into a source node. Then heuses the conversion rules to obtain various quantities, i.e., networks gains, functions and parameters, through simple graphical manipulations.

  • PDF

State Transition Diagram을 이용한 신규 정보통신 서비스의 대체/보완관계 분석: 와이브로(WiBro) 서비스를 중심으로

  • An Jae-Hyeon;Kim Mun-Gu;Han Sang-Pil;Park Bong-Won;Lee Sang-Yun;Bang Yeong-Seok
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.304-316
    • /
    • 2004
  • When new services are introduced, one of the drivers for market performance of them is the interactions among existing and new services. They are characterized by the substitution or complementary effects among existing and new service or the cannibalization of existing services by new services. This paper analyzes these issues in the telecommunications service industry context. To analyze them, a simple graphical tool or State Transition Diagram(STD) is developed and used. The diagram helps to clearly represent and explain the substitution, complement and cannibalization impact. Then, using the face-to-face survey of 1,200 people, a new wireless internet access service or WiBro is analyzed to identify the substitution/complement and cannibalization impacts in relation with the other competing services. Additionally, the important factors explaining customer subscription and substitution behavior are identified. The analysis results indicate that males, students or on-line game users are more likely to subscribe WiBro. Also, among the potential WiBro subscribers, customers who are less satisfied with the existing fixed line broadband internet access services are more likely to stop subscribing the fixed line service, which implies substitution by a new service. Additionally, this raises the issue of cannibalization if the existing and new services are provided by the same company. In fact we find the cannibalization effect is more serious for the cost sensitive group. We believe that our tool, approach, analysis results and their implications would be very helpful to devise a winning strategy for the new services in the highly uncertain telecommunications business environment.

  • PDF

THE GRAPHICAL D-Q TRANSFORMATION OF GENERAL POWER SWITCHING CONVERTERS

  • Rim, Chun-T.;Hu, Dong-Y.;Cho, Gyu-H.
    • Proceedings of the KIEE Conference
    • /
    • 1988.11a
    • /
    • pp.388-393
    • /
    • 1988
  • New circuit D-Q transformation concept is introduced to analyze AC converters such as inverters, rectifiers and cyclo-converters with ease. The equivalent linear time invariant circuit is obtained by substituting switches with equivalent turn-ratio variable transformers and changing balanced AC reactors into equivalent DC reactors combined by gyrators. This circuit enables us to utilize the powerful linear system analysis techniques such as Laplace transform otherwise which could not be applied to the time varying switching systems. Direct substitution of switches of DC converters with transformers is shown as a preliminary. Then the modeling procedure is shown for a controlled rectifier-inverter circuit. Finally an analysis example is proposed for a buck-boost inverter and the result is compared with the conventional approach. This approach is applicable to all AC converter families to determine the AC transfer functions and the DC operating points. It is identified that the switching systems are equivalent to the RLC filter circuits with transformers and gyrators.

  • PDF

Cognitive Approach to Anti-Phishing and Anti-Pharming: Survey (피싱/파밍 예방을 위한 인지기반 접근 방법)

  • Hong, Sunghyuck
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.2
    • /
    • pp.33-39
    • /
    • 2013
  • Recently, lots of anti-phishing schemes have been developed. Several products identify phishing sites and show the results on the address bar of the internet browser. However, they determine only by domain names or IP addresses. Although this kind of method is effective against recent DNS Pharming attacks, there is still a possibility that hidden attacks which modifies HTML codes could incapacitate those anti-phishing programs. In this paper, the cognitive approach which compares images to decide phishing or Pharming is presented by using system tray and balloon tips that are hard to fake with pop-ups or flash in order for users to compare pictures from connecting sites and system tray. It differs from an old method that a program analyzes IP or domains to judge if it is phishing or Pharming. Therefore, proposed method effective cognitive approach against phishing and Pharming attacks.

  • PDF

Cognitive Approach to Anti-Phishing and Anti-Pharming (피싱 및 파밍 방지를 위한 인지 기반의 접근 방법)

  • Kim, Ju-Hyun;Maeng, Young-Jae;Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.113-124
    • /
    • 2009
  • Recently, lots of anti-phishing schemes have been developed. Several products identify phishing sites and show the results on the address bar of the internet browser, but they determine only by domain names or IP addresses. Although this kind of method is effective against recent DNS pharming attacks, there is still a possibility that hidden attacks which modifies HTML codes could incapacitate those anti-phishing programs. In this paper, the cognitive approach which compares images to decide phishing or pharming is presented, using system tray and balloon tips that are hard to fake with pop-ups or flash in order for users to compare pictures from connecting sites and system tray. It differs from an old method that a program analyzes IP or domains to judge if it is phishing or pharming, but observes if there were HTML code changing between plug-ins and a server.