• Title/Summary/Keyword: industrial distributed control systems

Search Result 126, Processing Time 0.025 seconds

A Study on a Multi-period Inventory Model with Quantity Discounts Based on the Previous Order (주문량 증가에 따른 할인 정책이 있는 다기간 재고 모형의 해법 연구)

  • Lim, Sung-Mook
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.32 no.4
    • /
    • pp.53-62
    • /
    • 2009
  • Lee[15] examined quantity discount contracts between a manufacturer and a retailer in a stochastic, two-period inventory model where quantity discounts are provided based on the previous order size. During the two periods, the retailer faces stochastic (truncated Poisson distributed) demands and he/she places orders to meet the demands. The manufacturer provides for the retailer a price discount for the second period order if its quantity exceeds the first period order quantity. In this paper we extend the above two-period model to a k-period one (where k < 2) and propose a stochastic nonlinear mixed binary integer program for it. In order to make the program tractable, the nonlinear term involving the sum of truncated Poisson cumulative probability function values over a certain range of demand is approximated by an i-interval piecewise linear function. With the value of i selected and fixed, the piecewise linear function is determined using an evolutionary algorithm where its fitness to the original nonlinear term is maximized. The resulting piecewise linear mixed binary integer program is then transformed to a mixed binary integer linear program. With the k-period model developed, we suggest a solution procedure of receding horizon control style to solve n-period (n < k) order decision problems. We implement Lee's two-period model and the proposed k-period model for the use in receding horizon control style to solve n-period order decision problems, and compare between the two models in terms of the pattern of order quantities and the total profits. Our computational study shows that the proposed model is superior to the two-period model with respect to the total profits, and that order quantities from the proposed model have higher fluctuations over periods.

Comparison of SIEM Solutions for Network Security (네트워크 보안을 위한 SIEM 솔루션 비교 분석)

  • Lee, Jong-Hwa;Bang, Jiwon;Kim, Jong-Wouk;Choi, Mi-Jung
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.11-19
    • /
    • 2019
  • As technology develops, the latest security threats on the network applied to users are increasing. By attacking industrial or corporate systems with malicious purposes, hackers cause many social problems such as confidential information leakage, cyber terrorism, infringement of information assets, and financial damage. Due to the complex and diversified threats, the current security personnel alone are not enough to detect and analyze all threats. In particular, the Supervisory Control And Data Acquisition (SCADA) used in industrial infrastructures that collect, analyze, and return static data 24 hours a day, 265 days a year, is very vulnerable to real-time security threats. This paper introduces security information and event management (SIEM), a powerful integrated security management system that can monitor the state of the system in real time and detect security threats. Next, we compare SIEM solutions from various companies with the open source SIEM (OSSIM) from AlienVault, which is distributed as an open source, and present cases using the OSSIM and how to utilize it.

The acceptance of nuclear energy as an alternative source of energy among Generation Z in the Philippines: An extended theory of planned behavior approach

  • Zachariah John A. Belmonte;Yogi Tri Prasetyo;Omar Paolo Benito;Jui-Hao Liao;Krisna Chandra Susanto;Michael Nayat Young;Satria Fadil Persada;Reny Nadlifatin
    • Nuclear Engineering and Technology
    • /
    • v.55 no.8
    • /
    • pp.3054-3070
    • /
    • 2023
  • Nuclear Power Plants (NPP) are widely utilized around the globe from different base forms as it is one of the most dependable renewable resources that technological advancements have offered. However, different perceptions of the usage of NPPs emerged from different generations. The purpose of this study was to investigate the acceptance of nuclear energy as an alternative source of energy among Generation Z in the Philippines by utilizing an extended Theory of Planned Behavior (TPB) approach. An online questionnaire which consisted of 31 items was distributed using a purposive sampling approach and 450 respondents of Generation Z voluntarily answered. Structural Equation Modeling (SEM) showed that the knowledge regarding NPP had significant effects on risk perception and benefit perception which subsequently led to subjective norms. In addition, perceived behavioral control and subjective norms had significant effects on behavioral intention which led to nuclear acceptance. Interestingly, the respondents perceived the benefit of NPP as slightly higher than the perceived risk. With these, it was clear that the commissioning Nuclear Power Plant must consider as an alternative source of electric energy in the Philippines. Moreover, this study is one of the first studies that investigated the acceptance of NPP among Generation Z. Lastly, the model could be a basis to strengthen the acceptance strategy of opening NPP among Generation Z, particularly in developing countries.

Simulation Implementation of Fossil Power Plant Condensate Pumps' Rotation Operation Logic Using MATLAB/Simulink (MATLAB/Simulink를 이용한 화력발전소 복수펌프 순환기동로직 시뮬레이션 구현)

  • Yoon, Chang-Sun;Hong, Yeon-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.1
    • /
    • pp.693-699
    • /
    • 2016
  • The simulators for pump operation developed by domestic or overseas research have been developed for dynamic analysis or operator training purposes. However, previous developed simulators focused on the operators so they are unsuitable for logic designers or commissioning engineers who need to change the operation conditions or logics arbitrarily. In addition, the simulator for two or more condensate pumps' operation, which can be used easily by plant designers or operators, has not been developed. Accordingly, this paper suggests a simulation method that can be used easily for plant designers or operators using MATLAB Simulink. This suggestion helps users who can use MATLAB to implement ANSI/ISA S5.2, which is applied mainly for DCS (Distributed Control System). In addition, to implement the logics specified in the CODE, Sub-Systems were created for the block and evaluated to determine if they can be used in the simulator. In the working level stage using the suggested method, all error possibilities that might occur during the three pumps' rotation operation could be verified with the suggested simulator during the design stage or before operation.

Musculoskeletal Disorder Symptom Factors and Control Strategies in General Hospital Nurses (종합병원 간호사의 근골격계질환 증상요인 및 관리방안)

  • Park, Jung-Keun
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.24 no.3
    • /
    • pp.371-382
    • /
    • 2014
  • Objectives: This study was undertaken in order to examine how musculoskeletal disorder(MSD) symptoms were affected by particular factors and then to explore control strategies to prevent MSDs in general hospital nurses. Materials: This, as part of a large study, was conducted using a set of information on literature review, questionnaire survey and focus group interview. It obtained prevalence and factors of MSD symptoms and examined how MSD symptoms were distributed and affected by the factors in nurses working at 15 general hospitals across Korea. The factors were personal factors, work organization, nursing tasks, physical factors and psychosocial factors. Results: A total of 501 nurses were determined as subjects. The highest MSD symptom prevalence was 61% for the shoulder, among body parts, followed by leg/feet(55%), low back(51%), neck(42%), wrist(38%), and elbow(21%). Prevalence for the whole body was 80%. Odds ratios ranged from 0.4 to 22.4 in logistic regression analyses. The symptoms were significantly attributed to factor variables such as body mass index, current health status, daily work time, nursing task, pooled-physical factors, ergonomic factors, work load, interpersonal conflict, and job insecurity. Conclusions: Two or more factor variables were significant, depending on body part, for MSD systems in the general hospital nurses. It was noticeable that physical factors, such as pooled-physical factors, ergonomic factors or work load, were selectively significant for MSD symptoms in all body parts, indicating that such information should be used for prevention of MSDs in the hospital sector.

Evaluation and Analysis of Scheduling Algorithms for Peak Power Reduction (전력 피크 감소를 위한 스케줄링 알고리즘의 성능 평가 및 분석)

  • Sung, Minyoung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.4
    • /
    • pp.2777-2783
    • /
    • 2015
  • Peak power reduction is becoming increasingly important not only for grid operators but also for residential users. The scheduling of electric loads tries to reduce the power peak by splitting the power-on period of an electric device into multiple smaller ones and by interleaving the on-periods of every device in a holistic way. This paper analyzes the performance of EDF, LSF, TCBM, and lazy scheduling algorithms and proposes the enhancement schemes. For analysis, we have implemented the scheduling policies in a simulation environment for distributed control systems. Through extensive experiments using real power traces, we discuss their performance characteristics in terms of power deviation, switch count, and temperature violation ratio. To prevent excessive switching, we propose to employ the concept of limited preemptibility and evaluate its effect on performance. It is found that the best performance is achieved when the scheduler capacity is dynamically adjusted to the actual power demand. The experiment results show that, by load scheduling, the probability of having a power deviation greater than 150W is reduced from 21.5% down to 3.2%.

Feasibility Study of Developing Ship Engineering Control System based on DDS Middle-ware (DDS 미들웨어 기반의 선박 통합기관감시제어체계 개발 가능성 연구)

  • Seongwon Oh
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.6
    • /
    • pp.653-658
    • /
    • 2023
  • In systems like the combat management system of a naval ship or smart city of civilians, where many sensors and actuators are connected, the middle-ware DDS (Data Distribution Service) is mainly used to transmit large amounts of data. It is scalable and can effectively respond to the increase in sensors or equipment connected to the system in the future. The engineering control system (ECS), which plays an important role similar to the combat management system of a naval ship, still uses Server-Client model with industrial protocols such as Modbus and CAN (Controller Area Network) bus, to transmit data, which is unfavorable in terms of scalability. However, as automation and unmanned systems advance, more sensors and actuators are expected to be added, necessitating substantial program modification. DDS can effectively address such situations. The purpose of this study is to confirm the development possibility of an integrated monitoring and control system of a ship by using OpenDDS, which follows the OMG (Object Management Group) standard among the middle-ware DDS used in the combat management system. To achieve this goal, field equipment simulators and an ECS server were configured to perform field equipment data input/output and simulation using DDS was performed. The ECS prototype successfully handled data transmission, confirming that DDS is capable of serving as the middle-ware for the ECS of a ship.

An Implementation of CAN Communication Interface using the Embedded Processor System based on FPGA (FPGA 기반의 임베디드 프로세서 시스템을 이용한 CAN 통신 인터페이스 구현)

  • Koo, Tae-Mook;Park, Young-Seak
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.11 no.1
    • /
    • pp.53-62
    • /
    • 2010
  • Recently, various industrial embedded systems including vehicles controlled electronically are evolving to distributed multi-micro controller system. Accordingly, there is a need for standard CAN(Controller Area Network) protocol that ensures high stability and reliability of communication and is simple to construct object-oriented system with high control efficiency. CAN communication interface used general-purpose processor doesn't have many limitations in various application development because of fixed hardware architecture. This paper design and implement a CAN communication interface system based on FPGA. It is verified function and performance of system through monitoring communication with existing AT90CAN128 controller. Implemented CAN communication interface can be reused in development of application systems based on FPGA. And it provides low-cost, small-size and low-power design advantages.

Study on the Prioritization of Management for Each Toxic Chemical Substance in Ansan Smart Hub. (안산스마트허브 유해화학물질별 관리우선순위 선정에 관한 연구)

  • Choi, Bong Seok;Sa, Jae-Hwan;Kim, Min Wook;Jeon, Eui Chan
    • Korean Journal of Hazardous Materials
    • /
    • v.2 no.1
    • /
    • pp.12-17
    • /
    • 2014
  • With a rapid growth of domestic industry in korea, now about 25,000 kinds of chemicals are being distributed, and it has been known that just about 15% of them has toxic substances. Recently, South Koreans have an anxiety about the stability and accidents of chemicals because chemical accidents like Gumi hydrofluoric acid accident have occurred. The U.S. has adopted the systems like EPCRA (Emergency Planning and Community Right-to-Know Act), TRI (Toxic Release Inventory) and TSCA (Toxic Substances Control Act), and is also managing the hazardous chemicals by providing the information about them to its people and site workers. Japan's Ministry of Health, Labor and Welfare also has adopted J-CHECK system and is implementing it to let Japanese people know the information of safety of chemicals about REACH. However, the Korean government has a difficult situation to mediate the different idea with the Korean industry to make lower statute of Pre-legislation registration & evaluation of chemicals that will be implemented and Chemical Material Control Association that is being implemented. Especially city and country areas located in the industrial areas need political improvement focusing on vulnerable area through the check about current situation of hazardous chemicals of jurisdiction and management method, but the information about the management situation of small scale work places is insufficient. Therefore this study set up the urgent management area in Ansan Smart Hub through NFPA code according to the types of accident and dander characteristics of each chemical being used in the companies that have less than 50 workers and deal with chemicals located in Ansan Smart Hub in Gyeonggi-do.

A Design of Authority Management Protocol for Secure Storage Access Control in Cloud Environment (클라우드 환경에서 안전한 스토리지 접근 제어를 위한 권한 관리 프로토콜 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.12-20
    • /
    • 2016
  • With the enhancements in existing major industries, cloud computing-based converging services have been created, as well as value-added industries. A variety of converging services are now provided, from personalized services up to industrial services. In Korea, they have become the driving force behind existing industries throughout the whole economy, but mainly in finance, mobile systems, social computing, and home services, based on cloud services. However, not only denial of service (DOS) and distributed DOS (DDOS) attacks have occurred, but also attack techniques targeting core data in storage servers. Even security threats that are hardly detected, such as multiple attacks on a certain target, APT, and backdoor penetration have also occurred. To supplement defenses against these, in this article, a protocol for authority management is designed to provide users with safe storage services. This protocol was studied in cases of integration between a cloud environment and big data-based technology, security threats, and their requirements. Also studied were amalgamation examples and their requirements in technology-based cloud environments and big data. With the protocol suggested, based on this, security was analyzed for attack techniques that occur in the existing cloud environment, as well as big data-based techniques, in order to find improvements in session key development of approximately 55%.