• Title/Summary/Keyword: Protection Systems

Search Result 2,301, Processing Time 0.037 seconds

Protection Level Evaluation of Distribution Systems Based on Dempster-Shafer Theory of Evidence (Dempster-Shafer 증거 이론을 이용한 배전계통 보호도 평가)

  • Kim, He-Chul;Lee, Seung-Jae;Kang, Sang-Hee;Ahn, Bok-Shin;Park, Jong-Kuk
    • Proceedings of the KIEE Conference
    • /
    • 1998.07c
    • /
    • pp.896-898
    • /
    • 1998
  • Recent development of the digital computer and communication technology has made the concept of the adaptive protection possible, which is to adapt the operating parameters of the protective devices to the system changes, so that the best protection function can be maintained all the time. In order to achieve the adaptive protection, it is necessary to have the way to determine whether the change of the settings is needed under the certain system change or how good the current protection level is. This paper proposed the protectability index, which is a way to evaluate the protection level of the system under arbitary conditions and the operating strategy of the adaptive protection utilizing this index. It is based on an hierachical evaluation model and the evidence combination rule of the Dempster-Shafer theory.

  • PDF

A Study on the Protection System for AT Feeding on the Electric Railway (전기철도 AT급전방식 보호시스템 최적구성 방안 연구)

  • 창상훈;이형수;홍재승;김정훈
    • Proceedings of the KSR Conference
    • /
    • 1999.11a
    • /
    • pp.344-351
    • /
    • 1999
  • The safe operation of electro railways is greatly dependant on its protective systems. The system so-called Fault Protection Wire(FW) is now widely adapted to protect in AT feeding systems. It is connected between the feeder and trolley circuit to return the fault current to autotransfonmers at substation. This paper computed the distribution of fault currents at FW in the system and also evaluated the safety from electric shock when ground fault or flashover occur in the feeding system. The results show FW is useful to protect power supply network from fault in electric railways

  • PDF

APPLICATION OF A FUZZY EXPERT MODEL FOR POWER SYSTEM PROTECTION

  • Kim, C.J.;B.Don-Russell
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1074-1077
    • /
    • 1993
  • The objective of this paper is to develop a fuzzy logic based decision-making system to detect low current faults using multiple detection algorithms. This fuzzy system utilizes a fuzzy expert model which executes an operation without complicated mathematical models. This fuzzy system decides the performance weights of the detection algorithms. The weights and the turnouts of the detection algorithms discriminate faults from normal events. This system can also be a generic group decision-making tool for other areas of power system protection.

  • PDF

Improvement Method of Education for Personal Information Protection through Survey on Perception in College Students (대학생 개인정보보호 인식조사를 통한 교육 개선방안 연구)

  • Kim, Ju-yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.3
    • /
    • pp.349-355
    • /
    • 2019
  • In the trend of continuously increasing collection and use of personal information, there are legal grounds for protecting personal information and various policies and systems are implemented, but there is insufficient analysis about education and its effect of personal information protection. In this study, we surveyed and analyzed the degree of awareness and actual perception level in the protection of personal information of college students, and investigated the satisfaction of personal information protection education. The results of the analysis showed that students' interest in privacy protection and concern about personal information exposure was very high, but the efforts to protect personal information and the perception level of rights and systems for protecting personal information was very low. In addition, the experience and satisfaction of education for personal information protection were found to be very low. Students felt that the necessity of education for personal information protection was strongly agreed and preferred regular and continuous education rather than one-time education.

A Study on Searching Algorithm for Malfunction Pattern of Protection Devices in Distribution System with PV Systems (태양광전원이 연계된 배전계통 보호협조기기의 부동작패턴 탐색알고리즘에 관한 연구)

  • Kwon, Soon-Hwan;Tae, Dong-Hyun;Lee, Hu-Dong;Rho, Dae-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.9
    • /
    • pp.652-661
    • /
    • 2020
  • Recently, the Korean government developed the RE3020 (renewable energy) policy to overcome environmental problems, such as fine dust, climate change, and large-scale PV systems interconnected with a distribution system. When a large-scale PV system is interconnected in the distribution system, however, a malfunction can occur, and the protection devices may not be operated because of the dividing effect depending on the magnitude and direction of fault current as well as connection types and location of the PV system. Therefore, this paper proposes a search algorithm for the malfunction pattern of protection devices based on various scenarios, when large-scale PV systems are operated and interconnected in a distribution system. This paper presents a malfunction mechanism of protection devices according to the installation locations of recloser (R/C). Furthermore, the modeling of a distribution system with large-scale PV systems was performed using Off-DAS S/W, and the malfunction patterns of protection devices were analyzed based on a range of scenarios. From the simulation results with the proposed model and algorithm for searching for protection devices, it was confirmed that they are useful and effective in identifying a malfunction phenomenon depending on the installation location of the R/C and connection type of PV system.

Development and Evaluation of Impregnated Carbon Systems Against Iodine Vapours

  • Srivastava, Avanish Kumar;Saxena, Amit;Singh, Beer;Srivas, Suresh Kumar
    • Carbon letters
    • /
    • v.8 no.4
    • /
    • pp.274-279
    • /
    • 2007
  • In order to understand the breakthrough behaviour of iodine vapours on impregnated carbon systems, an active carbon, 80 CTC grade, $12{\times}30$ BSS particle size and $1104\;m^2/g$ surface area, was impregnated with metal salts such Cu, Cr, Ag, Mo and Zn, and an organic compound Triethylene diamine (TEDA) to prepare different carbon systems such as whetlerite, whetlerite/TEDA, whetlerite/KI/KOH and ASZMT. The prepared adsorbents along with active carbon were characterized for surface area and pore volume by $N_2$ adsorption at liquid nitrogen temperature. These carbon systems were compared for their CT (concentration X time) values at 12.73 to 53.05 cm/sec space velocities and 2 to 5 cm carbon column bed heights. The carbon column of 5.0 cm bed height and 1.0 cm diameter was found to be providing protection against iodine vapours up to 5.5 h at 3.712 mg/L iodine vapour concentration and 12.73 cm/sec space velocity. The study clearly indicated the adsorption capacities of carbon systems to be directly proportional to their surface area values. Dead layer with all the prepared carbon systems was found to be less than 2.0 cm indicating it to be minimum bed height to have protection against $I_2$ vapours. Effect of carbon bed height and flow rate was also studied. The active carbon showed maximum protection at all bed heights and flow rates in comparison to all other impregnated carbon systems, showing that only physical adsorption is responsible for the removal of iodine vapours.

The Legal Justice of Conferring Criminal Negligence on Chief Privacy Officers(CPO) (개인정보관리자의 책임과 벌칙의 형평성)

  • Kim, Beom-Soo
    • Journal of Information Technology Services
    • /
    • v.10 no.4
    • /
    • pp.21-32
    • /
    • 2011
  • The recently revised "Telecommunications Business Promotion and Personal Data Protection Act" is an important legal milestone in promoting the Korean telecommunications infrastructure and industry as well as protecting individuals' personal data and individuals' rights to privacy. Special characteristics of information security and privacy protection services including public goods' feature, adaptiveness, relativity, multi-dimensionality, and incompleteness, are reviewed. The responsibility of chief security/privacy officers in the IT industry, and the fairness and effectiveness of the criminal negligence in the Telecommunications Act are analyzed. An assessment of the rationale behind the act as well as a survey of related laws and cases in different countries, offers the following recommendations : i) revise the act and develop new systems for data protection, ii) grant a stay of execution or reduce the sentence given extenuating circumstances, or iii) use technical and managerial measures in data protection for exemption from criminal negligence.

Development of Personal Information Protection Model using a Mobile Agent

  • Bae, Seong-Hee;Kim, Jae-Joon
    • Journal of Information Processing Systems
    • /
    • v.6 no.2
    • /
    • pp.185-196
    • /
    • 2010
  • This paper proposes a personal information protection model that allows a user to regulate his or her own personal information and privacy protection policies to receive services provided by a service provider without having to reveal personal information in a way that the user is opposed to. When the user needs to receive a service that requires personal information, the user will only reveal personal information that they find acceptable and for uses that they agree with. Users receive desired services from the service provider only when there is agreement between the user's and the service provider's security policies. Moreover, the proposed model utilizes a mobile agent that is transmitted from the user's personal space, providing the user with complete control over their privacy protection. In addition, the mobile agent is itself a self-destructing program that eliminates the possibility of personal information being leaked. The mobile agent described in this paper allows users to truly control access to their personal information.

A Study on the Protection of EPON (EPON 장애 대책에 관한 연구)

  • Koo Bon-Jeong;Hur Jeong;Kim Sunghwi;Cho Seong-Dae;Park Youngil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.11A
    • /
    • pp.1231-1236
    • /
    • 2004
  • Network protection has been mainly applied to trunk network. PTP, ring, linear, mesh topologies of SONET/SDH system and 565 Mbps PDH systems are among those examples. But, as larger capacity PON system is introduced, protection in access network system also becomes necessary. In this paper, an efficient EPON protection scheme utilizing the EPON's frame and protocol is proposed and the implementation results showing protection within 1 msec are provided.

A Development of Intrusion Detection and Protection System using Netfilter Framework (넷필터 프레임워크를 이용한 침입 탐지 및 차단 시스템 개발)

  • Baek, Seoung-Yub;Lee, Geun-Ho;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.33-41
    • /
    • 2005
  • Information can be leaked, changed, damaged and illegally used regardless of the intension of the information owner. Intrusion Detection Systems and Firewalls are used to protect the illegal accesses in the network. But these are the passive protection method, not the active protection method. They only react based on the predefined protection rules or only report to the administrator. In this paper, we develop the intrusion detection and protection system using Netfilter framework. The system makes the administrator's management easy and simple. Furthermore, it offers active protection mechanism against the intrusions.

  • PDF