• Title/Summary/Keyword: Network protection

Search Result 1,103, Processing Time 0.029 seconds

On-line Estimation of DNB Protection Limit via a Fuzzy Neural Network

  • Na, Man-Gyun
    • Nuclear Engineering and Technology
    • /
    • v.30 no.3
    • /
    • pp.222-234
    • /
    • 1998
  • The Westinghouse OT$\Delta$T DNB protection logic heavily restricts the operation region by applying the same logic for a full range of operating pressure in order to maintain its simplicity. In this work, a fuzzy neural network method is used to estimate the DNB protection limit using the measured average temperature and pressure of a reactor core. Fuzzy system parameters are optimized by a hybrid learning method. This algorithm uses a gradient descent algorithm to optimize the antecedent parameters and a least-squares algorithm to solve the consequent parameters. The proposed method is applied to Yonggwang 3&4 nuclear power plants and the proposed method has 5.99 percent larger thermal margin than the conventional OT$\Delta$T trip logic. This simple algorithm provides a good information for the nuclear power plant operation and diagnosis by estimating the DNB protection limit each time step.

  • PDF

RFID-based Secure Communication for Smart Device in Future Home Network Environment

  • Li, Nong-Jun;Choi, Kee-Hyun;Jang, Kyung-Soo;Shin, Dong-Ryeol
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.5 no.1
    • /
    • pp.18-22
    • /
    • 2013
  • We introduce, in this paper, a novel approach of protection mechanism for data which are transmitted not only between the networked devices but also between the digital media devices. As the devices are getting more powerful and more storage capacity, they can process the encoded/encrypted data autonomously. However, all devices must know the secret key that used to encrypt data, and also use secure method to distribute that key. Moreover, there are no protection mechanisms supporting end-to-end copy protection which result in the fact that the data passed through various devices can be manipulated or captured. Therefore, we propose a RFID-based key distribution and protection mechanism to resolve these problems.

Current Problems of Criminal Law Protection of Information Relations in the Border Sphere

  • Kushnir, Iryna;Kuryliuk, Yurii;Nikiforenko, Volodymyr;Stepanova, Yuliia;Kushnir, Yaroslav
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.171-176
    • /
    • 2021
  • The article considers some issues of criminal law protection of information relations. With the emergence of new types of threats to Ukraine's national security in the field of protection and defense of the state border, the issues of development and strengthening of information protection become especially important. Proper compliance with information legislation also depends on the established responsibility for its violation, which rests on certain provisions of the Criminal Code of Ukraine. It is stated that these norms are placed in different sections and do not have a proper systematization. The article singles out the subjects of information relations in the border area, which are subject to criminal law protection: persons who are not bound by stable relations with the SBGS (who cross the state border of Ukraine, etc.); persons who are members of the SBGS (servicemen and employees); SBGS as a public authority (official and secret information, information about the activities of the agency, its officials, etc.).

A method for the protection of the message in social network service(SNS) using access control and hash-chain (SNS에서 접근제어 및 해시체인을 이용한 메시지 보호 기법)

  • Jeong, Hanjae;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.81-88
    • /
    • 2013
  • As social network service(SNS) has grown rapidly, the variety information being shared through SNS. However, the privacy of individuals can be violated due to the shared information through a SNS or the post written in the past at the SNS. Although, many researches concerned about it, they did not suggest key management and access control especially. In this paper, we propose the method for the protection of the message in SNS using access control and hash-chain.

Android Operating System: Security Features, Vulnerabilities, and Protection Mechanisms

  • AlJeraisy, Lulwa Abdulmajeed;Alsultan, Arwa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.367-372
    • /
    • 2022
  • In the age of smartphones, users accomplish their daily tasks using their smartphones due to the significant growth in smartphone technology. Due to these tremendous expansions, attackers are highly motivated to penetrate numerous mobile marketplaces with their developed malicious apps. Android has the biggest proportion of the overall market share when compared to other platforms including Windows, iOS, and Blackberry. This research will discuss the Android security features, vulnerabilities and threats, in addition to some existing protection mechanisms.

Dual Process Linear Protection Switching Method Supporting Node Redundancy (노드 이중화를 위한 이중 프로세스 선형 보호 절체 방법)

  • Kim, Dae-Ub;Kim, Byung Chul;Lee, Jae Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.9
    • /
    • pp.26-37
    • /
    • 2016
  • The core technologies of the current transport network are OAM and protection switching to meet the sub-50ms protection switching time via a path redundancy when a link or node failure occurs. The transport networks owned by public network operators, central/local governments, and major enterprises are individually configured and managed with service resiliency in each own protected sub-network. When such networks are cascaded, it is also important to provide a node resiliency between two protected sub-networks. However, the linear protection switching in packet transport networks, such as MPLS-TP and Carrier Ethernet, does not define a solution of dual node interconnection. Although Ethernet ring protection switching covers the dual node interconnection scheme, a large amount of duplicated data frames may be flooded when a failure occurs on an adjacent (sub) ring. In this paper, we suggest a dual node interconnection scheme with linear protection switching technology in multiple protected sub-networks. And we investigate how various protected sub-network combinations with a proposed linear or ring protection process impact the service resiliency of multiple protected sub-networks through extensive experiments on link and interconnected node failures.

Development of a Loss of Mains Detection Method for Distributed Resources (분산 전원의 고립 운전 검출 기법 개발)

  • Jang, S.I.;Kim, K.H.
    • Proceedings of the KIEE Conference
    • /
    • 2001.05a
    • /
    • pp.42-45
    • /
    • 2001
  • The islanding protection for distributed resources (DR) becomes an important and emerging issue in power system protection since the distributed generator installations are rapidly increasing and most of the installed systems are interconnected with distribution network. In order to avoid the negative impacts on distributed network resulting from islanding operations of DR, it is necessary to detect the loss of mains (LOM) effectively. This paper presents a new LOM detection method using the rate of change in total harmonic distortion (THD) of current. The proposed method effectively detects LOM of the DR unit operating in parallel with the distribution network. We also verified the efficiency of the proposed method using the radial distribution network of IEEE 34 bus model.

  • PDF

Comparison of Honeypot System, Types, and Tools

  • Muhammad Junaid Iqbal;Muhammad Usman Ahmed;Muhammad Asaf
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.169-177
    • /
    • 2023
  • Network security is now more crucial than ever for consumers, companies, and military clients. Security has elevated to the top of the priority list since the Internet's creation. The evolution of security technology is now better understood. The area of community protection as a whole is broad and dynamic. News from the days before the internet and more recent advancements in community protection are both included in the topic of observation. Recognize current research techniques, previous Defence strategies that were significant, and network attack techniques that have been used before. The security of various domain names is the subject of this article's description of bibliographic research.

대규모건축물적용 특수방재설비

  • 이성모
    • Fire Science and Engineering
    • /
    • v.10 no.4
    • /
    • pp.37-42
    • /
    • 1996
  • The "Intelligent Fire detecting and Extinguishing System" is an up-to-date fire protection system for modern high-rise buildings, international airports, enormous industrial facilities, dome stadiums such as specific areas in which the application of our local fire protection regulation could not be satisfied. The state-of-the art initiating devices communicated with sophisticated network control panels enable peoples to get reliable and powerful suppressions using water or gas, providing absolute protection. The Intelligent Water Cannon System, the Low Pressure $CO_2$ System and the MXL Networking Fire Alarm System introduced in this paper accomplish the dynamic protection for the special hazards.

  • PDF

Development of Protection Coordination Algorithm for Smart Distribution Management System using Communication Method based on IEC61850 (IEC61850 기반의 통신방식을 이용한 스마트 배전운영시스템용 보호협조 알고리즘 개발)

  • Chu, Cheol-Min;Yun, Sang-Yun;Kwan, Seung-Chul;Chu, Kyung-Yong;Jin, Young-Kyu;Choi, Myeon-Song
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.10
    • /
    • pp.1412-1419
    • /
    • 2012
  • In this paper, we propose the protection coordination algorithm using communication methode based on IEC 61850. The communication protocol in power distribution management system has been issued by IEC standard, IEC61850 of them, which was made for substation automation system, has researched to apply into power distribution system, even though the standard is not a suitable for the system. In smart distribution management system' launched in 2009, the communication network based on the ethernet network for IEC 61850 has been designed to apply the self-healing concept, which is to perform the system protection through the communication between remote terminal units(RTU) according to the standard. However, it is first time to apply the scheme in the real. Thus, this paper proposed the protection algorithm and consideration for applying communication method and introduced the result of demonstration.