• Title/Summary/Keyword: 감시 제어

Search Result 1,271, Processing Time 0.025 seconds

A Formal Modeling for Temporal and Active Properties of Managed Object Behavior (망관리 객체의 시간지원 능동 특성에 대한 전형적 모델링)

  • Choe, Eun-Bok;Lee, Hyeong-Ho;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.9
    • /
    • pp.2479-2492
    • /
    • 1999
  • Network management system(NMS) provides not only effective monitoring and controlling of network which consists of heterogeneous network elements but prompt response to users' need for high-level communication services. Recommendations of ITU-T and ISO stipulate the managerial abstraction of static and dynamic characteristics of network elements, management functions as well as management communication protocol. But the current description method does not provide the formal mechanism for the behavior characteristics of managed objects in clear manner but in natural language form, the complete specification of managed objects is not fully described. In this paper, we describe determinants for the behaviour of managed objects applicable to every managed object, and present a language for specifying behavioral aspects of managed objects based on their temporal and active properties.

  • PDF

Development of High Performance Battery for Navigation Aid's Power (항로표지(등부표) 전원공급용 고성능 축전지 개발)

  • Yoon, Seok-Jun;Cho, Myung-Hun;Lee, Dae-Pyo
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2009.06a
    • /
    • pp.435-438
    • /
    • 2009
  • A navigation aid buoy is a kind of safety facility for maritime navigation with a purpose of leading the vessels for navigating, docking and sail off. An advanced rechargeable battery is required for stable power supply for navigation aid buoy as the high magnitude LED lamps, real time location/control for navigation aids and e-Navigation support systems with maritime climate observation equipments have recently been deployed. This study is focused on the lithium battery, especially lithium polymer battery which is believed to be safer than the other types of batteries. The lithium polymer battery reviewed in this study is designed with $LiFePO_4$-based cathode, which has superior safety features to the oxide-based cathodes. Besides, a 3.6kWh battery pack has been built with the above-mentioned unit cells for the purpose of comparative research with lead acid battery system.

  • PDF

Design and Implementation of large Beacon Monitoring System (대형등명기 모니터링 시스템 설계 및 구현)

  • Kim, Ji-Hoon;Ye, Seong-Hyeon;Han, Soonhee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2516-2522
    • /
    • 2014
  • Our country has a convoluted coastline and the marine weather fluctuates locally, so it needs effective AtoN operation for the safe navigation of vessels and fishing boats sailing the coast. Especially, large beacon must ensure the safety of the vessels and always lit at night. If large beacons installed in the lighthouse are not lit, vessels can not assure their location. Thus the accidents is likely to occur, which can cause great economic damage. In this paper, we developed a monitoring system of large beacon to monitor and control the status of information. This system was designed for a special purpose of taking precautions against possible accidents on the sea.

Robot Navigation Control using Laserscanner to Restrict Human Movement (인간행동제약을 위한 레이저파인더 기반의 로봇주행제어)

  • Jin, Tae-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1070-1075
    • /
    • 2013
  • In this research, we describe a security robot system and ongoing research results to control human's wrong direction in order to forbid human to enter security zone. Proposed robot system surveils a security area with equipped laserscanner sensor usually. When it detect walking human who is for the area, robot calculates his velocity vector, plans own path to forestall and interrupts him who want to head restricted area and starts to move along the estimated trajectory. The walking human is assumed to be a point-object and projected onto an scanning plane to form a geometrical constraint equation that provides position data of the human based on the kinematics of the mobile robot. While moving the robot continues these processes for adapting change of situation. After arriving at an opposite position human's walking direction, the robot advises him not to be headed more and change his course. The experimental results of estimating and tracking of the human in the wrong direction with the mobile robot are presented.

The IOA-Based Intelligent Information Protection System for Response of Advanced Persistent Threats (IOA 기반의 지능형지속위협 대응 위한 지능형 정보보호시스템)

  • Ryu, Chang-su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2067-2072
    • /
    • 2016
  • Recently, due to the development of attack techniques that can circumvent existing information protection systems, continuous threats in a form unrecognized by the user have threatened information assets. Therefore, it is necessary to support the prompt responses to anticipated attempts of APT attacks, bypass access attacks, and encryption packet attacks, which the existing systems have difficulty defending against through a single response, and to continuously monitor information protection systems with a defense strategy based on Indicators of Attack (IOA). In this paper, I suggest a centralized intelligent information protection system to support the intelligent response to a violation by discerning important assets through prevention control in a performance impact assessment about information properties in order to block the attack routes of APT; establishing information control policies through weakness/risk analyses in order to remove the risks in advance; establishing detection control by restricting interior/exterior bypass networks to server access and monitoring encrypted communications; and lastly, performing related corrective control through backup/restoration.

The Technique of Installing Floating Photovoltaic Systems (수상태양광의 시공기술에 관한 실증연구)

  • Choi, Young-Kwan;Yi, Jong-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.9
    • /
    • pp.4447-4454
    • /
    • 2013
  • In October 2011, a commercialized 100kW class floating photovoltaic system positive plant was installed at Hapcheon dam a multi-purpose reservoir the first time ever in the nation. Floating photovoltaic system differs in water float, mooring device and underwater cable process from land photovoltaic system. As for land and building photovoltaic power generation equipments, many installation cases and skilled experiences are available, and thus installation is not difficult. However, commercial power generation floating photovoltaic system, which is attempted for the first time in the nation, requires to be designed and installed through a series of processes like technical review and verification of data by process in comparison with similar cases. The structure of floating photovoltaic system, an equipment for float photovoltaic module and other electrical equipment, is required to withstand weather environments like wind or typhoon etc and yet not affect water quality negatively, and for implementation of this system, construction efficiency and economy etc should be considered comprehensively. In this paper, the techniques of installing floating photovoltaic structure, mooring device, underwater cable, electrical equipment and remote monitoring control system are explained. The 100kW floating PV system is operating with 15% average capacity factor.

Implementation of Client Authentication System on Transparency Cache (투명 캐시에서의 사용자 인증 시스템 구현)

  • Kim, Seong-Rak;Gu, Yong-Wan
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.181-188
    • /
    • 2002
  • There are recently a lot of inconvenience because every client should be set to the proxy server on the browser in order to control the access by means of the client authentication in the proxy server. The client authentication technology using the transparency cache in this paper will be transparently used for every user in the internet which option of the authentication function is simply set in the cache server. In addition, the administrator will get the benefit since he can control the traffic of each client and strengthen the security. And also, this system is expected to use in the eCRM deeply rotated to the tendency of the client in the field of the e-commerce like shopping mall in the internet since the administrator can monitor the pattern of the client using the internet. This technique can be applied to the company affiliated research center, the EC website, and the military where it is essential for the tight security even though there are no additional security devices.

A Study on the Customer Voltage Characteristic Based on the Test Devices for PV Systems (태양광전원 계통연계 시험장치에 의한 수용가전압 특성에 관한 연구)

  • Park, Hyeon-Seok;Son, Joon-Ho;Ji, Seong-Ho;Rho, Dae-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.11
    • /
    • pp.4529-4536
    • /
    • 2010
  • This paper develops an interconnection test devices for photovoltaic(PV) systems composed of distribution system simulator, PV systems simulator and control and monitoring systems using the LabVIEW S/W, and simulates the customer voltage characteristics considering the 3 parameters on the introduction capacity for PV systems, system configuration and load factor. This paper also proposes a new calculation algorithm for voltage profile to make a comparison between calculation values and test device values. The results show that the test results for the normal operation characteristics of PV systems is very practical and effective.

A Study ou Iuternet Traffic Coutrol: Blockiug of harmful information based on IP spoofing (인터넷 트래픽 제어에 관한 연구: IP 주소 위조 기법을 사용한 유해 정보 차단 시스템)

  • Paek Seon-uck
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.5 no.5
    • /
    • pp.447-453
    • /
    • 2004
  • In this paper, we propose a new system to block harmful Internet information based on IP spoofing. The proposed system is located on a organization's internal network and monitors all outgoing traffic and lets all this traffic go outside. Once the proposed system detects a host's access to a harmful site, it sends the host a pseudo RST packet that pretends to be the response from the harmful site, and prevents the connection between the host and the harmful site. The proposed software system is installed on only a server, and need not be installed on user hosts at all. Thus we can maintain and upgrade the blocking system easily. The performance evaluation of the proposed system shows that it effectively blocks the access to the harmful sites. Since the proposed system is based on IP spoofing, it can be used badly as a hacking tool. Finally we propose some methods to eliminate this possibility.

  • PDF

The development of industrial secure L2 switch and introduction example for management and security improvement of supervisory control network in purification plant (정수장 감시제어망의 관리와 보안개선을 위한 산업용 보안 L2스위치 개발 및 적용사례)

  • Kim, Yunha;Yu, Chool;Oh, Eun;Kim, Chanmoon;Park, Ikdong;Kim, Yongseong;Choi, Hyunju
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.33 no.5
    • /
    • pp.329-339
    • /
    • 2019
  • Recently, the advancement of information and communication technology(ICT) is expanding the connectivity through Internet of Things(IoT), and the media of connection is also expanding from wire/cable transmission to broadband wireless communication, which has significantly improved mobility. This hyperconnectivity has become a key element of the fourth industrial revolution, whereas the supervisory control network of purification plants in korea is operated as a communication network separated from the outside, thereby lagging in terms of connectivity. This is considered the best way to ensure security, and thus there is hardly any consideration of establishing alternatives to operate an efficient and stable communication network. Moreover, security for management of a commercialized communication network and network management solution may be accompanied by immense costs, making it more difficult to make new attempts. Therefore, to improve the conditions for the current supervisory control network of purification plants, this study developed a industrial security L2 switch that supports modbus TCP(Transmission Control Protocol) communication and encryption function of the transmission section. As a result, the communication security performance improved significantly, and the cost for implementing the network management system using Historical Trend and information of HMI(Human Machine Interface) could be reduced by approximately KRW 200 million. The results of this study may be applied to systems for gas, electricity and social safety nets that are infrastructure communication networks that are similar to purification plants.