• Title/Summary/Keyword: Penetration violation

Search Result 3, Processing Time 0.014 seconds

A Simulation Model for the Response of Information-Warfare based on Computer Forensics (정보전대응을 위한 컴퓨터 포렌식스 기반 모의실험1))

  • Choe, Yong-Rak;Ko, Byong-Su;Park, Meong-Chan
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.391-421
    • /
    • 2003
  • While the social activities using Internet become generalized, the side effect of the information security violation is increasing steadily and threaten the countries which is not ready to prevent from offensive penetration such as the Information-fighter or Cyber-military. In this paper, we define the concept and characteristics of the modern Information-Warfare and analyze various kinds of threatened elements and also examine the recent trend in other countries. And introducing Computer Forensics raised recently for the confrontation against the security violation in the future, we will show the developing strategies and the necessity in order to response cyber attacks. These developing strategies can be used to ensure and re-trace the technical evidence for the security violation and to achieve the disaster relief effectively. So we hope that can apply them to the actual preparation through developing cyber trial test of the defense and attack for the Information-Warfare.

  • PDF

Dynamic analysis for delaminated composites based on finite element (다중 층간분리부가 내재된 복합재 평판의 유한요소 진동해석)

  • 오진호;조맹효;김준식
    • Proceedings of the Korean Society For Composite Materials Conference
    • /
    • 2003.04a
    • /
    • pp.143-146
    • /
    • 2003
  • A finite element based on the efficient higher order zig-zag theory with multiple delaminations Is developed to refine the predictions of frequency and mode shapes. Displacement field through the thickness are constructed by superimposing linear zig-zag field to the smooth globally cubic varying field. The layer-dependent degrees of freedom of displacement fields are expressed in terms of reference primary degrees of freedom by applying interface continuity conditions including delaminated interfaces as well as free hounding surface conditions of transverse shear stresses. Thus the proposed theory is not only accurate but also efficient. This displacement field can systematically handle the number, shape, size, and locations of delaminations. Throught the dynamic version of variational approach, the dynamic equilibrium equations and variationally consistent boundary conditions are obtained. Through the natural frequency analysis and time response analysis of composite plate with multiple delaminations, the accuracy and efficiency of the present finite element are demonstrated. The present finite element is suitable in the predictions of the dynamic response of the thick composite plate with multiple delaminations.

  • PDF

Strategy based PSO for Dynamic Control of UPFC to Enhance Power System Security

  • Mahdad, Belkacem;Bouktir, T.;Srairi, K.
    • Journal of Electrical Engineering and Technology
    • /
    • v.4 no.3
    • /
    • pp.315-322
    • /
    • 2009
  • Penetration and installation of a new dynamic technology known as Flexible AC Transmission Systems (FACTS) in a practical and dynamic network requires and force expert engineer to develop robust and flexible strategy for planning and control. Unified Power Flow Controller (UPFC) is one of the recent and effective FACTS devices designed for multi control operation to enhance the power system security. This paper presents a dynamic strategy based on Particle Swarm Optimization (PSO) for optimal parameters setting of UPFC to enhance the system loadability. Firstly, we perform a multi power flow analysis with load incrementation to construct a global database to determine the initial efficient bounds associated to active power and reactive power target vector. Secondly a PSO technique applied to search the new parameters setting of the UPFC within the initial new active power and reactive power target bounds. The proposed approach is implemented with Matlab program and verified with IEEE 30-Bus test network. The results show that the proposed approach can converge to the near optimum solution with accuracy, and confirm that flexible multi-control of this device coordinated with efficient location enhance the system security of power system by eliminating the overloaded lines and the bus voltage violation.