• Title/Summary/Keyword: Network protection

Search Result 1,089, Processing Time 0.031 seconds

Enhancing Location Privacy through P2P Network and Caching in Anonymizer

  • Liu, Peiqian;Xie, Shangchen;Shen, Zihao;Wang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1653-1670
    • /
    • 2022
  • The fear that location privacy may be compromised greatly hinders the development of location-based service. Accordingly, some schemes based on the distributed architecture in peer-to-peer network for location privacy protection are proposed. Most of them assume that mobile terminals are mutually trusted, but this does not conform to realistic scenes, and they cannot make requirements for the level of location privacy protection. Therefore, this paper proposes a scheme for location attribute-based security authentication and private sharing data group, so that they trust each other in peer-to-peer network and the trusted but curious mobile terminal cannot access the initiator's query request. A new identifier is designed to allow mobile terminals to customize the protection strength. In addition, the caching mechanism is introduced considering the cache capacity, and a cache replacement policy based on deep reinforcement learning is proposed to reduce communications with location-based service server for achieving location privacy protection. Experiments show the effectiveness and efficiency of the proposed scheme.

Radionuclide identification method for NaI low-count gamma-ray spectra using artificial neural network

  • Qi, Sheng;Wang, Shanqiang;Chen, Ye;Zhang, Kun;Ai, Xianyun;Li, Jinglun;Fan, Haijun;Zhao, Hui
    • Nuclear Engineering and Technology
    • /
    • v.54 no.1
    • /
    • pp.269-274
    • /
    • 2022
  • An artificial neural network (ANN) that identifies radionuclides from low-count gamma spectra of a NaI scintillator is proposed. The ANN was trained and tested using simulated spectra. 14 target nuclides were considered corresponding to the requisite radionuclide library of a radionuclide identification device mentioned in IEC 62327-2017. The network shows an average identification accuracy of 98.63% on the validation dataset, with the gross counts in each spectrum Nc = 100~10000 and the signal to noise ratio SNR = 0.05-1. Most of the false predictions come from nuclides with low branching ratio and/or similar decay energies. If the Nc>1000 and SNR>0.3, which is defined as the minimum identifiable condition, the averaged identification accuracy is 99.87%. Even when the source and the detector are covered with lead bricks and the response function of the detector thus varies, the ANN which was trained using non-shielding spectra still shows high accuracy as long as the minimum identifiable condition is satisfied. Among all the considered nuclides, only the identification accuracy of 235U is seriously affected by the shielding. Identification of other nuclides shows high accuracy even the shielding condition is changed, which indicates that the ANN has good generalization performance.

Development of a Digital System for Protection and Control of a Substation Part 2 - Development of Fiber Optic Network (변전소의 보호.제어를 위한 디지탈 시스템 개발 PART 2 - 광 통신망 개발)

  • Kwon, W.H.;Park, S.H.;Kim, M.J.;Lee, Y.I.;Park, H.K.;Moon, Y.S.;Yoon, M.C.;Kim, I.D.;Lee, J.H.
    • Proceedings of the KIEE Conference
    • /
    • 1992.07a
    • /
    • pp.362-364
    • /
    • 1992
  • In this paper, the development of a fiber optic network for an integrated digital protection relay system is described. The structure of the developed network is determined to loosen the optic requirements and to have good extensibility while providing sufficient functions for protection and control for substations. The network has a hierarchical structure with two levels. The upper level handles data for monitoring and control of the system with star topology. The lower level manages the real time data for bus protection with one-to-one connections. Communication flows of each level are described. The HDLC is employed as the network protocol.

  • PDF

Information Protection against The Hacker's Attack of Ubiquitous Home Networks (해커의 유비쿼터스 홈 네트워크 공격에 대한 정보보호 기술)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.145-154
    • /
    • 2007
  • Analyzed about a matter and requirements to intimidate security of ubiquitous and home network threatening various security for personal information protection in ubiquitous home networks at this paper, and studied. Got authentication procedures and verification procedures acid user approach to be reasonable through designs to the home security gateway which strengthened a security function in the outsides, and strengthened protection of a home network. Also, execute a DoS. DDoS, IP Spoofing attack protective at home network security gateways proved, and security regarding against the Hacker's attack was performed, and confirmed. Strengthen appliances and security regarding a user, and confirm a defense regarding an external attack and present a home network security model of this paper to the plans that can strengthen personal information protection in ubiquitous home networks in ubiquitous home networks through experiment.

  • PDF

Development of a Islanding Protection Algorithm for Distributed Resources (분산 전원의 고립 운전 진단 알고리즘 개발)

  • Jang, S.I.;Park, J.Y.;Kim, K.H.
    • Proceedings of the KIEE Conference
    • /
    • 2001.07b
    • /
    • pp.1287-1289
    • /
    • 2001
  • This paper presents the logic based islanding protection algorithm for distributed resources(DR) which are interconnected with distribution network. Due to the negative impacts from islanding operations of DR on protection, operation and management of distribution system, it is necessary to effectively detect the islanding operations of DR and disconnect it from distribution network rapidly. Generally, it is difficult to detect islanding operation by monitoring only one system parameter. The proposed islanding protection algorithm utilizes multi-criteria, voltage variation, phase displacement frequency variation, the variation of total harmonic distortion(THD) of current; therefore it effectively detects island operation of DR unit. We also verified the efficiency of the proposed algorithm using the radial distribution network of IEEE 34 bus model.

  • PDF

The upgrade of coordination program for distribution automation system (배전자동화용 보호협조프로그램 개선)

  • Seol, Leel-Ho;Ha, Bok-Nam;Park, Shin-Yeol;Jung, Young-Beom;Lee, Sang-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2005.07a
    • /
    • pp.629-631
    • /
    • 2005
  • The DASPRO (Protection Coordination Program for DAS) is one of the application programs for Distribution Automation System (DAS) of the KEPCO. Application programs developed by KEPCO provide optimal operation in distribution network. The DASPRO includes diverse functions to operate network as construction of database using existing information. creation of diagram for protection coordination. calculation of fault current. evaluation network. power quality monitoring, etc. The DASPRO can examine validity of setting values for protective devices by comparing to T-C curves. Unless the protection coordination is correct, the most suitable setting value for protection devices are displayed on the screen. In this paper, I will introduce the contents of the DASPRO.

  • PDF

A study on An Optimal Protection System for Power Distribution Networks by Applying Multi-Agent System (Multy-agent system을 애용한 배전계통 최적 보호시스템 연구)

  • Jung, K.H.;Min, B.W.;Lee, S.J.;Choi, M.S.;Kang, S.H.
    • Proceedings of the KIEE Conference
    • /
    • 2003.07a
    • /
    • pp.299-301
    • /
    • 2003
  • In this paper, a protection system using Multi-Agent concept for power distribution network is proposed. Multi agent system consist of Feeder agent, OCR(Over Current Relay) agent, Recloser agent and Switch agent. An agent calculates and corrects its parameter by itself through communication with neighboring agents and its own intelligence algorithm. Simulations in a simple distribution network show the effectiveness of the suggested protection system. Multi-Agent System, protection of distribution network, Communication.

  • PDF

Privacy Protection Method for Sensitive Weighted Edges in Social Networks

  • Gong, Weihua;Jin, Rong;Li, Yanjun;Yang, Lianghuai;Mei, Jianping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.540-557
    • /
    • 2021
  • Privacy vulnerability of social networks is one of the major concerns for social science research and business analysis. Most existing studies which mainly focus on un-weighted network graph, have designed various privacy models similar to k-anonymity to prevent data disclosure of vertex attributes or relationships, but they may be suffered from serious problems of huge information loss and significant modification of key properties of the network structure. Furthermore, there still lacks further considerations of privacy protection for important sensitive edges in weighted social networks. To address this problem, this paper proposes a privacy preserving method to protect sensitive weighted edges. Firstly, the sensitive edges are differentiated from weighted edges according to the edge betweenness centrality, which evaluates the importance of entities in social network. Then, the perturbation operations are used to preserve the privacy of weighted social network by adding some pseudo-edges or modifying specific edge weights, so that the bottleneck problem of information flow can be well resolved in key area of the social network. Experimental results show that the proposed method can not only effectively preserve the sensitive edges with lower computation cost, but also maintain the stability of the network structures. Further, the capability of defending against malicious attacks to important sensitive edges has been greatly improved.

Study on Social Network Service(SNS) Users' Privacy Protection Behavior : Focusing on the protection motivation theory (소셜 네트워크 서비스(SNS) 이용자들의 개인정보보호 행동에 관한 연구: 보호동기이론을 중심으로)

  • Kim, Jung-Eun;Kim, Seong-Jun;Kwon, Do-Soon
    • The Journal of Information Systems
    • /
    • v.25 no.3
    • /
    • pp.1-30
    • /
    • 2016
  • Purpose The purpose of this study is to grasp the factors influencing domestic SNS users' privacy protection behavior and verify their relationship through self-efficacy and responsiveness. Thus, this study tries to suggest efficient and effective measures for SNS personal information protection. Design/methodology/approach To this end, with main variables of the protection motivation theory based on the assumption that when users are exposed to the threat to their health, they would have protection motivation and change their behavior of protecting their health, a research model was suggested. In addition, in order to empirically verify the research model, a survey was performed targeting general college students having the experience of using SNS. Findings As a result of the analysis, first, perceived effectiveness and self-efficacy had a positive effect on responsiveness. Second, perceived barrier had a positive effect on self-efficacy. Third, self-efficacy and responsiveness had a positive effect on privacy protection behavior. This study is expected to contribute to establishing an effective guideline for measures that could induce SNS users' privacy protection behavior.

An Improvement of Distance Relay Technique Reliability using Elman Network (Elman Network를 이용한 거리계전기법의 신뢰성 향상)

  • Jung, H.S.;Lee, J.J.;Shin, M.C.;Lee, B.K.;Park, C.W.;Jang, S.I.
    • Proceedings of the KIEE Conference
    • /
    • 2000.07a
    • /
    • pp.212-214
    • /
    • 2000
  • The distance relay technique used for transmission line protection operates overreach and underreach to the self protection region because the power system becomes complex and fault conditions are different. To solve these problems, this paper describes new technique to set the reliable self protection lesion. The trip region of the quadrilateral distance relay is set by training of multi layer recurrent elman network. The proposed network is able to reach the trip zone for the fault impedance, fault initial angle and source impedance variance correctly.

  • PDF