• Title/Summary/Keyword: Information Power

Search Result 16,709, Processing Time 0.05 seconds

A Study on Leakage of Critical Information via the Power Analysis of Power Lines (전원선의 전력분석을 이용한 주요정보 유출 가능성에 관한 연구)

  • Han, Kyong-Ho;Lee, Seong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.11
    • /
    • pp.1571-1574
    • /
    • 2014
  • In this paper, we propose a unidirectional transmission of critical information obtained by keyboard hacking or kernel and keyboard driver hacking even though the computer is not connected to the external network. We show the hacking can be attempted in the proposed method to show the way preventing such attempts in advance. Firewalls and other various methods are used to prevent the hacking from the external network but the hacking is also attempted in various ways to detour the firewall. One of the most effective way preventing from the hacking attack is physically disconnect the internal intranet systems from the external internet and most of the government systems, military systems and big corporate systems are using this way as on one of the protection method. In this paper, we show the feasibility of transmission of security codes, etc via the short message to the external network on the assumption that a hacking program such as Trojan Horse is installed on the computer systems separated from the external network. Previous studies showed that the letters on the monitor can be hijacked by electromagnetic analysis on the computer to obtain the information even though the system is not connected ti the network. Other studies showed that the security code hint can obtained by analyzing the power consumption distribution of CPU. In this paper, the power consumption distribution of externally accessible power line is analyzed to obtain the information and the information can be transmitted to the external network. Software controlling the CPU and GPU usage is designed to control the power supply of computer. The sensors such as the Rogowski coils can be used on the external power line to collect the data of power consumption change rates. To transmit the user password by short message, due to the capacitive components and the obstacle from other power supply, A very slow protocol are used.

A Study on Programmable Logic-based Smart Peak Power Control System (프로그램 로직 기반의 스마트 최대 전력 관리 시스템에 관한 연구)

  • Lee, Woo-Cheol;Kwon, Sung-Hyun
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.28 no.2
    • /
    • pp.92-99
    • /
    • 2014
  • The paper is related to smart maximum power system based on program logic. Especially, this system compares the total demand power with the target power by using the signal from the digital kilo watt meter. Based on the power information by the maximum power control equipment the consumed future power is anticipated. In addition, through consumed future power the controllable target power is set, and it applies on the maximum power control equipment. User or manager would control the load efficiently through the simple programming which could control load based on the control sequence and relay. To begin with the conventional maximum power control algorithm is surveyed, and the smart maximum power control system based on program logic is used, and the new algorithm from full load to proportion shut down is proposed by using PLC program. the validity of the proposed control scheme is investigated by both simulation results.

The Power Saving Strategy of Dual Mode Access Terminal in WiBro and WLAN Hierarchical Network (WiBro/WLAN Hierarchical 네트워크에서 듀얼모드 단말기의 Power Saving 전략)

  • Moon, Tae-Wook;Ko, Bong-Jin;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.10 no.4
    • /
    • pp.306-311
    • /
    • 2006
  • When the WiBro/WLAN hierarchical network is structured, a dual mode access terminal should keep WLAN module with power on state for operating in WiBro network outside of WLAN hotspot zone. Power consumption of user's access terminal can be increased to maintain WLAN module power on state of dual mode access terminal in WiBro network outside of the hotspot zone. This paper focuses on power saving strategy for a dual mode access terminal in WiBro/WLAN Hierarchical network to overcome problems regarding power. We will apply information about hotspot in WiBro network to establish the efficient power saving strategy for dual mode access terminal.

  • PDF

Artificial neural network reconstructs core power distribution

  • Li, Wenhuai;Ding, Peng;Xia, Wenqing;Chen, Shu;Yu, Fengwan;Duan, Chengjie;Cui, Dawei;Chen, Chen
    • Nuclear Engineering and Technology
    • /
    • v.54 no.2
    • /
    • pp.617-626
    • /
    • 2022
  • To effectively monitor the variety of distributions of neutron flux, fuel power or temperatures in the reactor core, usually the ex-core and in-core neutron detectors are employed. The thermocouples for temperature measurement are installed in the coolant inlet or outlet of the respective fuel assemblies. It is necessary to reconstruct the measurement information of the whole reactor position. However, the reading of different types of detector in the core reflects different aspects of the 3D power distribution. The feasibility of reconstruction the core three-dimension power distribution by using different combinations of in-core, ex-core and thermocouples detectors is analyzed in this paper to synthesize the useful information of various detectors. A comparison of multilayer perceptron (MLP) network and radial basis function (RBF) network is performed. RBF results are more extreme precision but also more sensitivity to detector failure and uncertainty, compare to MLP networks. This is because that localized neural network could offer conservative regression in RBF. Adding random disturbance in training dataset is helpful to reduce the influence of detector failure and uncertainty. Some convolution neural networks seem to be helpful to get more accurate results by use more spatial layout information, though relative researches are still under way.

An Implementation of a Current Controlled Inverter for Improved quality of the Grid (계통의 품질개선을 위한 전류제어형 인버터의 구현)

  • Lee S. S.;Jeon C. H.;Ko S. S.;Shin Y. C.
    • Proceedings of the KIPE Conference
    • /
    • 2004.07b
    • /
    • pp.515-518
    • /
    • 2004
  • Increasing of the nonlinear power electronics equipments, power conditioning systems have been researched and developed for many years to compensate the harmonic disturbances and the reactive power. The main function of power conditioning systems is to reduce harmonic distortions, since extensive surveys quantify the problems associated with electric networks having non-linear loads. The main function of power conditioner compensates the current instead of the voltage. Therefore the inverter used in power conditioner is mostly the current controlled type. In this paper, we propose the power conditioner using photovoltaic system, which is operated by the PRT(Polarized Ramp Time) current control algorithm. The proposed system could also achieve Demand Side Management's function and Uninterruptible Power Supply's function simultaneously. To verify the proposed current controlled inverter for improved quality of the grid, the detail simulation and experiment results indicate that operation PCS, DSM and UPS can be achieved.

  • PDF

Development and application of on-line lightning information service (온라인(On-line) 낙뢰정보 활용 서비스의 개발과 활용)

  • Kwak, J.S.;Woo, J.W.;Kang, Y.W.;Koo, G.S.;Choi, H.Y.
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.696-698
    • /
    • 2007
  • As overhead transmission lines are exposed to the outdoor weather, lightning induced fault accounts for about 66% of faults in transmission lines. The lightning may cause the damage of power system apparatus or the shut down of electricity. Not only in order to decrease the damage of the power system itself but also to ensure the reliable power supply, an appropriate insulation design based on the long-term lightning statistics is required. Meanwhile, real time information of lightning might be more useful to quickly locate the point of lightning induced fault in the line, leading to minimization of the adverse effects derived from the fault. Korea Electric Power Corporation has been providing an on-line lightning information service, named as KLDNet, since 2006 in order to meet the need inside our company. This paper describes the development and application of the information system.

  • PDF

An Improved Control Method for Power Conversion System under a Weak Grid by the Adoption of Virtual Resistors

  • Gao, Ning;Sang, Shun;Li, Rui;Cai, Xu
    • Journal of Power Electronics
    • /
    • v.17 no.3
    • /
    • pp.756-765
    • /
    • 2017
  • The control of the power conversion system (PCS) in a battery energy storage system has a challenge due to the existence of grid impedance. This paper studies an impedance model of an LCL-based PCS in the d-q domain. The feature of a PCS connected to a weak grid is unveiled by use of an impedance model and a generalized Nyquist criterion. It is shown that the interaction between grid impedance and the PCS destabilizes the cascaded system in certain cases. Therefore, this paper proposes a novel control method that adopts virtual resistors to overcome this issue. The improvement in the control loop leads the PCS to a more stable condition than the conventional method. Impedance measurement is implemented to verify the correctness of the theoretical analysis. Experimental results obtained from a down-scaled prototype indicate that the proposed control method can improve the performance of the PCS under a weak grid.

Countermeasure Techniques Analysis for Power Analysis Attack (전력분석공격에 대한 대응기술 분석)

  • Kang, Young-Jin;Jo, Jung-Bok;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.221-223
    • /
    • 2014
  • Power analysis attack on cryptographic hardware device aims to study the power consumption while performing operations using secrets keys. Power analysis is a form of side channel attack which allow an attacker to compute the key encryption from algorithm using Simple Power Analysis (SPA), Differential Power Analysis (DPA) or Correlation Power Analysis (CPA). The theoretical weaknesses in algorithms or leaked informations from physical implementation of a cryptosystem are usually used to break the system. This paper describes how power analysis work and we provide an overview of countermeasures against power analysis attacks.

  • PDF

D2D Power Control in the Cellular System: Iterative Algorithm and Convergence

  • Oh, Changyoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.41-47
    • /
    • 2017
  • In this paper, we consider the case where D2D users and the cellular user share the uplink of the cellular system. We propose an iterative power control algorithm that converges to the optimum power value. Each user iteratively updates its transmit power level according to the interference function. Finally, all D2D users and cellular user that participate in the transmission get the optimum transmit power level. We first investigate the interference structure and define the interference function. Then, we show that the considered interference function belongs to the standard interference function that converges the unique transmit power level. Through numerical examples, the convergence of the proposed power control algorithm is examined in the various transmission scenarios.

Cluster Head Chain Routing Protocol suitable for Wireless Sensor Networks in Nuclear Power Plants (원전 무선 센서 네트워크에 적합한 클러스터 헤드 체인 라우팅 프로토콜)

  • Jung, Sungmin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.2
    • /
    • pp.61-68
    • /
    • 2020
  • Nuclear power plants have a lower cost of power generation, and they are more eco-friendly than other power generation plants. Also, we need to prepare nuclear plant accidents because of their severe damage. In the event of a safety accident, such as a radiation leak, by applying a wireless sensor network to a nuclear power plant, many sensor nodes can be used to monitor radiation and transmit information to an external base station to appropriately respond to the accident. However, applying a wireless sensor network to nuclear power plants requires routing protocols that consider the sensor network size and bypass obstacles such as plant buildings. In general, the hierarchical-based routing protocols are efficient in energy consumption. In this study, we look into the problems that may occur if hierarchical-based routing protocols are applied to nuclear power plants and propose improved routing protocols to solve these problems. Simulation results show that the proposed routing protocol is more effective in energy consumption than the existing LEACH protocol.