• Title/Summary/Keyword: Sensitive Customer

Search Result 87, Processing Time 0.032 seconds

Analysis on Momentary Voltage Dips with the Interconnection Operation of Utility-interactive Cogneration Systems Considering Their Generator Type (발전기 형태를 고려한 열병합발전시스템의 배전계통 연계운전시의 순시전압변동 해석)

  • 최준호;김재철
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.14 no.4
    • /
    • pp.23-30
    • /
    • 2000
  • Cogeneration systems are seen as a significant innovation for dispersed energy generation since they are both environmentally friendly and has comparatively high degrees of efficiency. It is especially suited for the decentralized provision of electricity and heat. However, it causes operational problems such as voltage regulation, voltage variation, protection and safety. Especially, it is expected that the interconnection/disconnection operation of cogeneration system has an effect on distribution voltage regulation and variation. Recently, with the increased use of customer-owned computers and other sensitive electronic equipment, electric power quality has become an important concerns. Therefore, the voltage quality problems with cogeneration system should be investigated because the voltage quality is an important part of electrical power quality. In this paper, the momentary voltage dips associated with the interconnection/disconnection operation of cogeneration system are analyzed, including restraint solutions at the customer level. In addition, the unit capacity of cogeneration systems per feeder are evaluated from the view point of momentary voltage variations. The results of this paper are useful analysis data for interconnection standards/guidelines of cogeneration systems and dispersed generation (DG)

  • PDF

Securing Sensitive Data in Cloud Storage (클라우드 스토리지에서의 중요데이터 보호)

  • Lee, Shir-Ly;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.871-874
    • /
    • 2011
  • The fast emerging of network technology and the high demand of computing resources have prompted many organizations to outsource their storage and computing needs. Cloud based storage services such as Microsoft's Azure and Amazon's S3 allow customers to store and retrieve any amount of data, at anytime from anywhere via internet. The scalable and dynamic of the cloud storage services help their customer to reduce IT administration and maintenance costs. No doubt, cloud based storage services brought a lot of benefits to its customer by significantly reducing cost through optimization increased operating and economic efficiencies. However without appropriate security and privacy solution in place, it could become major issues to the organization. As data get produced, transferred and stored at off premise and multi tenant cloud based storage, it becomes vulnerable to unauthorized disclosure and unauthorized modification. An attacker able to change or modify data while data inflight or when data is stored on disk, so it is very important to secure data during its entire life-cycle. The traditional cryptography primitives for the purpose of data security protection cannot be directly adopted due to user's lose control of data under off premises cloud server. Secondly cloud based storage is not just a third party data warehouse, the data stored in cloud are frequently update by the users and lastly cloud computing is running in a simultaneous, cooperated and distributed manner. In our proposed mechanism we protect the integrity, authentication and confidentiality of cloud based data with the encrypt- then-upload concept. We modified and applied proxy re-encryption protocol in our proposed scheme. The whole process does not reveal the clear data to any third party including the cloud provider at any stage, this helps to make sure only the authorized user who own corresponding token able to access the data as well as preventing data from being shared without any permission from data owner. Besides, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data, our scheme also protect the data integrity by using hash function.

Critical Success Factor of Noble Payment System: Multiple Case Studies (새로운 결제서비스의 성공요인: 다중사례연구)

  • Park, Arum;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.59-87
    • /
    • 2014
  • In MIS field, the researches on payment services are focused on adoption factors of payment service using behavior theories such as TRA(Theory of Reasoned Action), TAM(Technology Acceptance Model), and TPB (Theory of Planned Behavior). The previous researches presented various adoption factors according to types of payment service, nations, culture and so on even though adoption factors of identical payment service were presented differently by researchers. The payment service industry relatively has strong path dependency to the existing payment methods so that the research results on the identical payment service are different due to payment culture of nation. This paper aims to suggest a successful adoption factor of noble payment service regardless of nation's culture and characteristics of payment and prove it. In previous researches, common adoption factors of payment service are convenience, ease of use, security, convenience, speed etc. But real cases prove the fact that adoption factors that the previous researches present are not always critical to success to penetrate a market. For example, PayByPhone, NFC based parking payment service, successfully has penetrated to early market and grown. In contrast, Google Wallet service failed to be adopted to users despite NFC based payment method which provides convenience, security, ease of use. As shown in upper case, there remains an unexplained aspect. Therefore, the present research question emerged from the question: "What is the more essential and fundamental factor that should takes precedence over factors such as provides convenience, security, ease of use for successful penetration to market". With these cases, this paper analyzes four cases predicted on the following hypothesis and demonstrates it. "To successfully penetrate a market and sustainably grow, new payment service should find non-customer of the existing payment service and provide noble payment method so that they can use payment method". We give plausible explanations for the hypothesis using multiple case studies. Diners club, Danal, PayPal, Square were selected as a typical and successful cases in each category of payment service. The discussion on cases is primarily non-customer analysis that noble payment service targets on to find the most crucial factor in the early market, we does not attempt to consider factors for business growth. We clarified three-tier non-customer of the payment method that new payment service targets on and elaborated how new payment service satisfy them. In case of credit card, this payment service target first tier of non-customer who can't pay for because they don't have any cash temporarily but they have regular income. So credit card provides an opportunity which they can do economic activities by delaying the date of payment. In a result of wireless phone payment's case study, this service targets on second of non-customer who can't use online payment because they concern about security or have to take a complex process and learn how to use online payment method. Therefore, wireless phone payment provides very convenient payment method. Especially, it made group of young pay for a little money without a credit card. Case study result of PayPal, online payment service, shows that it targets on second tier of non-customer who reject to use online payment service because of concern about sensitive information leaks such as passwords and credit card details. Accordingly, PayPal service allows users to pay online without a provision of sensitive information. Final Square case result, Mobile POS -based payment service, also shows that it targets on second tier of non-customer who can't individually transact offline because of cash's shortness. Hence, Square provides dongle which function as POS by putting dongle in earphone terminal. As a result, four cases made non-customer their customer so that they could penetrate early market and had been extended their market share. Consequently, all cases supported the hypothesis and it is highly probable according to 'analytic generation' that case study methodology suggests. We present for judging the quality of research designs the following. Construct validity, internal validity, external validity, reliability are common to all social science methods, these have been summarized in numerous textbooks(Yin, 2014). In case study methodology, these also have served as a framework for assessing a large group of case studies (Gibbert, Ruigrok & Wicki, 2008). Construct validity is to identify correct operational measures for the concepts being studied. To satisfy construct validity, we use multiple sources of evidence such as the academic journals, magazine and articles etc. Internal validity is to seek to establish a causal relationship, whereby certain conditions are believed to lead to other conditions, as distinguished from spurious relationships. To satisfy internal validity, we do explanation building through four cases analysis. External validity is to define the domain to which a study's findings can be generalized. To satisfy this, replication logic in multiple case studies is used. Reliability is to demonstrate that the operations of a study -such as the data collection procedures- can be repeated, with the same results. To satisfy this, we use case study protocol. In Korea, the competition among stakeholders over mobile payment industry is intensifying. Not only main three Telecom Companies but also Smartphone companies and service provider like KakaoTalk announced that they would enter into mobile payment industry. Mobile payment industry is getting competitive. But it doesn't still have momentum effect notwithstanding positive presumptions that will grow very fast. Mobile payment services are categorized into various technology based payment service such as IC mobile card and Application payment service of cloud based, NFC, sound wave, BLE(Bluetooth Low Energy), Biometric recognition technology etc. Especially, mobile payment service is discontinuous innovations that users should change their behavior and noble infrastructure should be installed. These require users to learn how to use it and cause infra-installation cost to shopkeepers. Additionally, payment industry has the strong path dependency. In spite of these obstacles, mobile payment service which should provide dramatically improved value as a products and service of discontinuous innovations is focusing on convenience and security, convenience and so on. We suggest the following to success mobile payment service. First, non-customers of the existing payment service need to be identified. Second, needs of them should be taken. Then, noble payment service provides non-customer who can't pay by the previous payment method to payment method. In conclusion, mobile payment service can create new market and will result in extension of payment market.

M/G/1 Preemptive Priority Queues With Finite and Infinite Buffers (유한 및 무한 용량 대기열을 가지는 선점 우선순위 M/G/1 대기행렬)

  • Kim, Kilhwan
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.4
    • /
    • pp.1-14
    • /
    • 2020
  • Recently, M/G/1 priority queues with a finite buffer for high-priority customers and an infinite buffer for low-priority customers have applied to the analysis of communication systems with two heterogeneous traffics : delay-sensitive traffic and loss-sensitive traffic. However, these studies are limited to M/G/1 priority queues with finite and infinite buffers under a work-conserving priority discipline such as the nonpreemptive or preemptive resume priority discipline. In many situations, if a service is preempted, then the preempted service should be completely repeated when the server is available for it. This study extends the previous studies to M/G/1 priority queues with finite and infinite buffers under the preemptive repeat-different and preemptive repeat-identical priority disciplines. We derive the loss probability of high-priority customers and the waiting time distributions of high- and low-priority customers. In order to do this, we utilize the delay cycle analysis of finite-buffer M/G/1/K queues, which has been recently developed for the analysis of M/G/1 priority queues with finite and infinite buffers, and combine it with the analysis of the service time structure of a low-priority customer for the preemptive-repeat and preemptive-identical priority disciplines. We also present numerical examples to explore the impact of the size of the finite buffer and the arrival rates and service distributions of both classes on the system performance for various preemptive priority disciplines.

The Post-IMF firm strategy and the corporate restructuring in the heavy & chemical industrial district: the case of Ulsan, Korea (울산 중화학공업의 재구조화 특성 - IMF 체제 이후의 기업전략을 중심으로 -)

  • Park, Yang-Choon
    • Journal of the Korean association of regional geographers
    • /
    • v.7 no.2
    • /
    • pp.17-34
    • /
    • 2001
  • This paper is to analyze how firms in a large firm-led industrial city have carried out the restructuring in the face of radical shifts, with focus on the strategy and the restructuring of firms in Ulsan, a typical industrial district in Korea that is specialized in heavy & chemical industry. It has been well known that the local economy has been led by a small number of large firms, including affiliates of chaebol, and its industrial structure has also been characterised as a clear dichotomy between large firms as a customer and small and medium-size firms as a supplier, which can be called not horizontal but vertical relations. It can identify some tendencies, however, that local companies have been rather dynamically changing in response to increasingly turbulent environment since the Asian crisis. Some are radical, but some incremental. These can be summarized in four distinctive but interlinked ways. First, more than half of local companies surveyed have attempted to change their production systems, mainly from the fordist mass production towards the flexible mass production, seeking both economies of scale and scope. Second, local firms have vigorously continued to reorganize the boundary of the production and the organization, by specializing products and focusing on the core competence in order to save costs and cope with radically changing customer demands in a flexible way. Third, there have been various strategies for the organizational innovation such as the introduction of team organization, the boundary blurring between the managerial and production workers and the intra-firm spin-offs, so as to improve managerial efficiency and competence in the use of internal labour market. Finally, they have tried to be more sensitive to the market and customers. These tendencies seem to be increasingly critical to sustain their competitiveness. To do so, they tend to focus increasingly not only on the competing via the product quality rather than through price, but also to seek to diversify the market and customer firms beyond national boundary.

  • PDF

Performance Analysis of a Dynamic Bandwidth Allocation Scheme for improving the delay of the real time traffic in an EPON (EPON에서 실시간 트래픽의 지연성능 향상을 위한 동적 대역할당방안의 성능분석)

  • Park, Chul-Geun;Lee, Yu-Tae;Chung, Hae;You, Geon-Il;Kim, Jong-An
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.11B
    • /
    • pp.1023-1030
    • /
    • 2003
  • In this paper, we deal with an effective dynamic bandwidth allocation(DBA) scheme in order to support the qualify of services (QoS) in the customer access network which supports various applications with own service requirements. we discuss the DBA scheme for upstream traffic in the EPON which support both the delay sensitive traffic such as voice and real-time video and non-real time traffic such as data and BE. We propose the new DBA scheme which guarantee the delay performance of the real time traffic and utilize the upstream bandwidth effectively in the limited resource environment. We analize the delay performance of the proposed scheme by simulation.

Assessing the Effect of Voltage Sag in Distribution System Using a Fuzzy Risk Assessment Model (퍼지 위험도 평가 모델을 이용한 배전계통의 순간전압강하 영향 평가)

  • Yun, Sang-Yun;Oh, Jung-Hwan;Han, Byung-Duk;Kim, Jae-Chul;Park, Joong-Shin;Lim, Dong-Gyun
    • Proceedings of the KIEE Conference
    • /
    • 1999.07c
    • /
    • pp.1085-1087
    • /
    • 1999
  • In this paper, we propose the method for assessing the effect of voltage sag in power distribution system using fuzzy risk assessment model. The proposed method is based on SCBEMA curve that expresses the representative susceptibility curve by voltage sag for each customer type. These corves are made using the CBEMA curves obtained from the experiment for the customers'sensitive equipment. In order to transform SCBEMA curves to the probability damage by voltage sag, the fuzzy risk assessment model is used in this paper. Case studies were performed to analyze the effect of voltage sag by varying parameters. The Monte Carlo simulation method and the historical reliability data in KEPCO are used for case studies.

  • PDF

Technology of Stip Rolling of Shadow Mask Steel Plate By Reversing Cold Rolling Mill (가역식 냉간압연기의 Shadow Mask재 압연기술)

  • 김광수;박성권;이중웅;김종호
    • Proceedings of the Korean Society for Technology of Plasticity Conference
    • /
    • 1999.08a
    • /
    • pp.403-411
    • /
    • 1999
  • The steel plate for shadow mask is used in a Cathode-ray tube of TV monitor and is the strictest product in surface quality because hundreds thousand of holes are perforated in a plane of 25 ${\times}$25 inches. To mass-produce this product, a reversible cold rolling mill for silicon steel was used and the rolling technology and the activity for quality improvement are described in this work. Because the steel plate is a mild steel, which is very sensitive to strip-breakage even in a low tension, we reset the minimum tension values matching to the operating conditions. The roll mark due to the multi-segmented araangement of shape controlling roll was prevented by hardening the intermediate shape controlling roll and by changing the existing working-roll into a HSS (Hig Speed Steel) roll. The scratch caused by the speed difference between a idle roll and a strip was prevented by increasing the roll roughness. With these activities, the steel plate for shadow mask can be stable. The continuous improvement of quality is, however, required for the customer satisfaction both of domestic and overseas market.

  • PDF

A Study on Developing the Simulation Model of Micro-Sources (마이크로소스의 EMTDC 시뮬레이션 모델 개발에 관한 연구)

  • Son, Kwang-Myoung
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.19 no.8
    • /
    • pp.24-32
    • /
    • 2005
  • Micro-source units having power ratings in thousands of watts can provide power quality with higher reliability and efficiency than the conventional large scale units. Since these units are small and easy to install, they are clustered with loads creating micro-grid services to customer sites such as office buildings, industrial parks and homes. Micro-sources adopt voltage source inverter to ensure the power quality of sensitive loads. This paper deals with the connection of micro-sources into the system grid EMTDC modeling of the grid connected micro-sources at the power frequency range are proposed and the characteristics of the control system parameters are investigated. Simulation results show that the micro-grid system with two micro-sources has good dynamic characteristics.

Using Huff Model for Predicting the Potential Chiness Retail Market

  • Su, Shuai;Youn, Myoung-Kil
    • Asian Journal of Business Environment
    • /
    • v.1 no.1
    • /
    • pp.9-12
    • /
    • 2011
  • This study aimed to predict retail sales of local markets in Jinan city of China with the Huff model. Using the Huff Model, we examined whether the predicted retail sales of local markets may be different in Jinan, China, from the department stores, supermarkets, shopping centers/shopping malls, and home appliance stores. The probability that a customer shops at location depends upon the store size and the travel time factors calculated by the Huff Model. We found that the predictedretail sales of shopping malls have a greater value than others. People who live in a mid-sized city may have easier access to any stores within the city boundary than people in metropolitan areas. Therefore, people in a mid-sized city are more sensitive to store size, because a bigger store size means greater opportunities, incentivizing consumers to travel further to competing stores after passing by nearer, smaller stores. This study has some limitations. First, the data is somewhat restricted in that the subject stores do not represent all of the stores in Jinan. Second, we cannot compare the estimated market share of the stores and the actual sales data. It is further suggested in this study that more databases be developed throughout such East Asian countries as Korea and Japan and that a different parameter λ value in the Huff Model be utilized for mid-sized cities.

  • PDF