• Title/Summary/Keyword: Network protection

Search Result 1,103, Processing Time 0.028 seconds

Forecasting Fish Communities in River Networks

  • Rashleigh, Brenda;White, Denis;Ebersole, Joe L.;Barber, Craig;Boxall, George;Brookes, Allen
    • Korean Journal of Ecology and Environment
    • /
    • v.45 no.2
    • /
    • pp.150-157
    • /
    • 2012
  • Fish communities in river networks provide significant ecosystem services that will likely decline under future land use and climate change. We developed a model that simulates the consequences to multiple populations of one or more fish species-a meta-community-from multiple stressors across a river network. The model is spatially-explicit and age-structured, with three components: habitat suitability; population dynamics, including species interactions; and movement across a spatial network. Although this model is simple, it can form the basis of fisheries assessments and may be incorporated into an integrated modeling system for watershed management and prediction.

Development of Dynamic Frequency Monitoring Software for Wide-Area Protection Relaying Intelligence (광역 보호계전 지능화를 위한 동적 주파수 모니터링 S/W 개발)

  • Kim, Yoon-Sang;Park, Chul-Won
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.61 no.4
    • /
    • pp.174-179
    • /
    • 2012
  • The social and economic level of damages might be highly increased in the case of wide-area black-outages, because of heavy dependence of electricity. Therefore, the development of a wide-area protection relay intelligence techniques is required to prevent massive power outages and minimize the impact strength at failure. The frequency monitoring and prediction for wide-area protection relaying intelligence has been considered as an important technology. In this paper, a network-based frequency monitoring system developed for wide-area protection relay intelligence is presented. In addition, conventional techniques for frequency estimation are compared, and a method for advanced frequency estimation and measurement to improve the precision is proposed. Finally, an integrated monitoring system called K-FNET(Korea-Frequency Monitoring Network) is implemented based on the GPS and various energy monitoring cases are studied.

Criminal And Legal Protection Of Information Relations

  • Manzhai, Oleksandr;Kuryliuk, Yurii;Miroshnykov, Ivan;Syiploki, Mykola;Vazhynskyi, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.284-288
    • /
    • 2022
  • The article analyzes the regulations of current criminal law, which ensures the protection and protection of information relations, offers the optimal model of the system of norms of the Criminal Code of Ukraine, which establishes liability for violation of information. The subject of the article is protected information, which should include information or data, the procedure for access to and distribution of which, regardless of the method of submission, storage or organization, are subject to legal regulation in accordance with laws and regulations. For the purposes of criminal law, information as an object of criminal law protection should be classified on the following grounds: depending on the content: personal or family secrets; information constituting a state secret; data included in the official secret; information that constitutes a professional secret; information that constitutes a commercial, tax, banking secret, and, depending on the medium - documented and undocumented.

Protection Scheme Guaranteeing the Recovery Time Defined in Service Level Agreement in WDM Mesh Networks (WDM Mesh 네트워크에서 SLA 복구시간을 만족시키는 보호기법)

  • Hong, Kiwon;Yim, Taihyong;Kyung, Yeonwoong;Park, Jinwoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.1
    • /
    • pp.41-43
    • /
    • 2014
  • In this paper, we proposed a new protection scheme of the WDM mesh networks that can utilize the network resources efficiently while satisfying with the recovery time defined in the SLA (service level agreement). The protection scheme and the backup path are selected based on the comparison of the expected protection time with the SLA recovery time. The superior performance of the proposed protection scheme was demonstrated by comparing with ones of the existing protection schemes.

A Protection Ratio with Composite Fade Margin for Detailed Frequency Coordination in Microwave Relay System Network

  • Suh, Kyoung-Whoan
    • Journal of electromagnetic engineering and science
    • /
    • v.7 no.2
    • /
    • pp.83-90
    • /
    • 2007
  • In this paper, the formulation of the protection ratio based upon a composite fade margin and availability is newly presented for the detailed planning of frequency coordination in the microwave relay system network, and computed results for co-channel and adjacent channel protection ratios are illustrated over an actual system with 6.2 GHz. It is shown that the protection ratio to assure a quality of service can be expressed in terms of the composite fade margin, noise-to-interference ratio, net filter discrimination, and system parameters. In addition, the net filter discrimination, depending upon the transmitter spectrum mask and the overall receiver filter characteristic, has been examined to investigate the effect of the adjacent channel protection ratio caused by the adjacent channel interference. Regarding simulated results for 6.2 GHz, 60 km, 64-QAM, and N/I=6 dB at the bit error rate of $10^{-6}$, composite fade margin and co-channel protection ratio yield 25.14 and 50.3 dB, respectively. Also, the net filter discrimination of 26.5 dB and the adjacent channel protection ratio of 23.8 dB are obtained at the first adjacent channel of 30 MHz. The proposed method provides some merits in view of a comprehensive and practical application with more detailed and various system parameters needed to access the criteria for making the proper frequency coordination.

The Personal Data Protection Mechanism in the European Union

  • Syroid, Tetiana L.;Kaganovska, Tetiana Y.;Shamraieva, Valentyna M.;Perederiі, Оlexander S.;Titov, Ievgen B.;Varunts, Larysa D.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.113-120
    • /
    • 2021
  • The adoption of the General Data Protection Regulation (EU) 2016/679 transformed approaches and concepts to the implementation of the personal data protection mechanism in the European Union. Within the EU, almost all countries have adapted a new protection mechanism, which requires a study of the specifics of its use. The article intends to assess the legal provisions of the current mechanism of personal data protection in the EU. The author studied the mechanism of personal data protection under the General Data Protection Regulation (EU) 2016/679 (GDPR) based on the concept of contextual integrity and analysis of EU legislation on personal data protection. The scientific publications for 2016-2020 were reviewed for the formation of ideas of a new personal data protection mechanism in the EU, informative and transparent analysis of legal provisions. The article notes that the personal data privacy and protection is increasing, there is an ongoing unification of the legal status of personal data protection and the formation of a digital market for dissemination, exchange, control, and supervision of data. Cross-border cooperation is part of the personal data protection mechanism. The author proved that the GDPR has changed approach to personal data protection: the emphasis is now shifting to the formation of a digital market, where the EU's role in ensuring regulation is crucial. The article identifies the emergence of a new protectionist legal system and strengthening of legal provisions regarding privacy. This legal system needs unification and harmonization in accordance with national legislation, is territorially fragmented and differentiated within the EU.

Digital Content Protection and Computer Forensics Evidence Management Mechanism using MPEG-21 in Network Service Environment (네트워크 서비스 환경에서 MPEG-21을 활용한 디지털 콘텐츠 보호 및 컴퓨터 포렌식스 증거 관리 메커니즘)

  • Jang, Eun Gyeom;Lee, Bum Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.129-141
    • /
    • 2010
  • In network service environment, cultures from diversified fields are easily accessible thanks to the convenient digital content services. Unfortunately, unauthorized access and indiscreet misuse behaviors have deprived content owners of their copyrights. This study suggests an integrity-ensured model applicable for forensic evidence of digital content infringement in network service environment. The suggested model is based on MPEG-21 core components for digital content protection and the system is designed in connection with the components of digital content forensics. Also, the present study suggests an efficient technology to protect and manage computer forensic evidence and digital content by authorizing digital content use and catching infringing logs of authorized users without lag in network environment for the benefit of network security and reliability.

Influence of the Interconnected Wind farm on Protection for Distribution Networks (풍력발전단지의 계통연계 운전이 배전선 보호계전에 미치는 영향)

  • 장성일;김광호
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.52 no.3
    • /
    • pp.151-157
    • /
    • 2003
  • Wind farm interconnected with grid can supply the power into a power network not only the normal conditions, but also the fault conditions of distribution network. If the fault happened in the distribution power line with wind fm, the fault current level measured in a relaying point might be lower than that of distribution network without wind turbine generator due to the contribution of wind farm. Consequently, it may be difficult to detect the fault happened in the distribution network connected with wind generator This paper describes the effect of the interconnected wind turbine generators on protective relaying of distribution power lines and detection of the fault occurred in a power line network. Simulation results shows that the current level of fault happened in the power line with wind farm depends on the fault impedance, the fault location. the output of wind farm. and the load condition of distribution network.

A Method for Preemptive Intrusion Detection and Protection Against DDoS Attacks (DDoS 공격에 대한 선제적 침입 탐지·차단 방안)

  • Kim, Dae Hwan;Lee, Soo Jin
    • Journal of Information Technology Services
    • /
    • v.15 no.2
    • /
    • pp.157-167
    • /
    • 2016
  • Task environment for enterprises and public institutions are moving into cyberspace-based environment and structing the LTE wireless network. The applications "App" operated in the LTE wireless network are mostly being developed with Android-based. But Android-based malwares are surging and they are the potential DDoS attacks. DDoS attack is a major information security threat and a means of cyber attacks. DDoS attacks are difficult to detect in advance and to defense effectively. To this end, a DMZ is set up in front of a network infrastructure and a particular server for defensive information security. Because There is the proliferation of mobile devices and apps, and the activation of android diversify DDoS attack methods. a DMZ is a limit to detect and to protect against DDoS attacks. This paper proposes an information security method to detect and Protect DDoS attacks from the terminal phase using a Preemptive military strategy concept. and then DDoS attack detection and protection app is implemented and proved its effectiveness by reducing web service request and memory usage. DDoS attack detection and protecting will ensure the efficiency of the mobile network resources. This method is necessary for a continuous usage of a wireless network environment for the national security and disaster control.

Estimation of the Number of Cell Sites for Nationwide Public Protection and Disaster Relief Network Using WiBro and LTE Technical Methods (WiBro 및 LTE를 이용한 재난안전무선통신망용 셀 수량 추정)

  • Song, Ki-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1266-1272
    • /
    • 2013
  • This paper calculates estimated number of cell sites to build a nationwide PPDR(Public Protection and Disaster Relief) network of WiBro and LTE technical methods through a link budget calculation, presents the efficient technical method through a comparison between the number of cell sites using WiBro and LTE. As a calculation results, the number of cell sites using WiBro method are larger than twice compared to that of LTE method on the same frequency bands, due to the differences of uplink PAPR, uplink transmission technique and SINR. On the basis of the result, LTE mothod is considered as a more effective technology than the WiBro method on the economic, technical and marketing points of views on building a nationwide network.