• Title/Summary/Keyword: Protection Systems

Search Result 2,311, Processing Time 0.031 seconds

Linear Unequal Error Protection Codes based on Terminated Convolutional Codes

  • Bredtmann, Oliver;Czylwik, Andreas
    • Journal of Communications and Networks
    • /
    • v.17 no.1
    • /
    • pp.12-20
    • /
    • 2015
  • Convolutional codes which are terminated by direct truncation (DT) and zero tail termination provide unequal error protection. When DT terminated convolutional codes are used to encode short messages, they have interesting error protection properties. Such codes match the significance of the output bits of common quantizers and therefore lead to a low mean square error (MSE) when they are used to encode quantizer outputs which are transmitted via a noisy digital communication system. A code construction method that allows adapting the code to the channel is introduced, which is based on time-varying convolutional codes. We can show by simulations that DT terminated convolutional codes lead to a lower MSE than standard block codes for all channel conditions. Furthermore, we develop an MSE approximation which is based on an upper bound on the error probability per information bit. By means of this MSE approximation, we compare the convolutional codes to linear unequal error protection code construction methods from the literature for code dimensions which are relevant in analog to digital conversion systems. In numerous situations, the DT terminated convolutional codes have the lowest MSE among all codes.

Study on Social Network Service(SNS) Users' Privacy Protection Behavior : Focusing on the protection motivation theory (소셜 네트워크 서비스(SNS) 이용자들의 개인정보보호 행동에 관한 연구: 보호동기이론을 중심으로)

  • Kim, Jung-Eun;Kim, Seong-Jun;Kwon, Do-Soon
    • The Journal of Information Systems
    • /
    • v.25 no.3
    • /
    • pp.1-30
    • /
    • 2016
  • Purpose The purpose of this study is to grasp the factors influencing domestic SNS users' privacy protection behavior and verify their relationship through self-efficacy and responsiveness. Thus, this study tries to suggest efficient and effective measures for SNS personal information protection. Design/methodology/approach To this end, with main variables of the protection motivation theory based on the assumption that when users are exposed to the threat to their health, they would have protection motivation and change their behavior of protecting their health, a research model was suggested. In addition, in order to empirically verify the research model, a survey was performed targeting general college students having the experience of using SNS. Findings As a result of the analysis, first, perceived effectiveness and self-efficacy had a positive effect on responsiveness. Second, perceived barrier had a positive effect on self-efficacy. Third, self-efficacy and responsiveness had a positive effect on privacy protection behavior. This study is expected to contribute to establishing an effective guideline for measures that could induce SNS users' privacy protection behavior.

Study on the Association between Personal Information Protection Legislation and Information Security Product (개인정보보호 관련 법령의 내용과 보안제품 분포간의 연관성 분석)

  • Kim, Min-Jeong;Lee, Jung Won;Yoo, Jinho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1549-1560
    • /
    • 2015
  • For the past few years, personal information breach incidents, great and small, occurred constantly. Accordingly, the Personal Information Protection related Ordinances are enacted and amended persistently, and the information security products also keep advancing and developing in the same way. There are the certification systems such as Common Criteria Evaluation and Validation(CC) and Korea Cryptographic Module Validation Program(KCMVP) for the information security products. These are also strictly carried out. This paper analyzes and categorizes the 5 Personal Information Protection related Ordinances in the aspects of technical protection measures by using key words. Here are the 5 related ordinances; 'the Personal Information Protection Act', 'the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc', 'the Act on the Protection, Use, Etc, of Location Information', 'the Use and Protection of Credit Information Act', and 'the Electronic Financial Transactions Act.' Moreover, this study analyzes the association between the technical protection measures in the 5 relevant laws and the information security products that are obtaining the CC Evaluation & Validation(CC) and the products that are now produced at KISIA's member companies.

Automatic Protection Schemes for Distribution System with Open and Closed-loop

  • Guan, Kang-Le;Lee, Seung-Jae;Choi, Myeon-Song
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.5
    • /
    • pp.969-974
    • /
    • 2013
  • Protection issues in distribution systems which are to be operated in open and closed-loop modes in a smart grid are studied and a generalized protection setting method is proposed to meet the new requirements. The developed setting method assumes a conventional over-current protection scheme for the system with reclosers and over-current relays. In a closed-loop mode, it identifies protective devices that have to be sacrificed in order to maximize protection coordination for bidirectional fault current flow. The proposed setting method has been tested on many systems with different complexity and is proved effective.

A Study on the Activation Plan of the Support Systems for SMEs' Technology Protection (중소기업 기술보호 지원제도의 활성화 방안 연구)

  • Kim, Sung-won;Park, Hyun-ae;Lee, Hwansoo
    • Korean small business review
    • /
    • v.42 no.1
    • /
    • pp.1-17
    • /
    • 2020
  • As technology competition among companies has intensified, the importance of technology protection is increasing day by day. However, according to the status of technology leakage in Korea, the technology protection level of SMEs is weak. SMEs' technology leakage continues to occur, and the damage can be even more serious to SMEs. Thus, the government is operating various support systems for SMEs. However, despite the support system, the interest and use of SMEs is low. This study examines the current status of major support systems for SME technology protection in Korea, and empirically analyzes the recognition and expectation effects of companies on the support systems. Based on the results, this study discusses ways to improve the recognition and use of the support system. The results of this study will contribute to strengthening SMEs 'technology protection by increasing the utility and enhancing the utilization of the support systems.

Performance Evaluation with Protective Function test of Inverter for Solar Power Generation (태양광발전용 인버터 보호기능시험 성능평가)

  • Yoon, Yong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.11
    • /
    • pp.1570-1575
    • /
    • 2018
  • The increased penetration of PV is impacting on grid operation and in particular the voltage within the local grid can be significantly influenced by the various PV systems. The increased penetration of PV is impacting on grid operation and in particular the voltage within the local grid can be significantly influenced by the various PV systems. This paper describes domestic technical standard of Photovoltaic(PV) PCS(Power Conditioning Systems)- Characteristics of the utility interface. Especially protective function test items of 1) Output overvoltage protection test, 2) Output undervoltage protection test, 3) Frequency rise protection test, 4) Frequency fall protection test, 5) System voltage's momentary interruptions, 6) System voltage distortion capability test. Therefore in this paper protective function test item of facilities evaluation detailed standards for new renewable energy, small, medium and large photovoltaic inverter standard is studied and analyzed and finally full tested by PV inverter performance function.

Analysis of IEC 61727 Photovoltaic (PV) systems Characteristics of the utility interface

  • Lee, Jeong Hyeon;Yoon, Yong Ho;Kim, Jae Moon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.90-95
    • /
    • 2015
  • This paper describes IEC 61727 standard of Photovoltaic (PV) systems -Characteristics of the utility interface. IEC 61727 standard tests include utility compatibility and personnel safety and equipment protection of PV inverter performance functions. Especially utility compatibility part includes test items of 1) voltage, current and frequency, 2) normal voltage operating range, 3) flicker, 4) DC injection, 5) normal frequency operating range, 6) harmonics and 7) waveform distortion, 8) power factor of PV inverter. Also personnel safety and equipment protection part includes test items 1)loss of utility voltage, 2)over/under voltage and frequency, 3)Islanding protection, 4)response to utility recovery, 5)earthing, 6)short circuit protection, 7)Isolation and switching of PV inverter. In this paper, each item of IEC 61727 standard test is studied and analyzed and finally full tested by PV inverter performance function.

Motor Protection and Control with Digital Protective Relays (디지털 보호 계전기를 이용한 모터 보호 및 제어)

  • 이성환;안인석
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.178-178
    • /
    • 2000
  • In this paper, intelligent methods using digital protection relay in power management and control system is developed in order to protect power systems by means of timely fault detection during operation and control at starting for induction motor which have various load environments and capacities in power systems. The digital protective relay was designed with DSP CPU(TMS320C31) to Protect and measure more quickly and precisely. The test result on the basis of KEMCl120 and IEC60255, show that the operation time error of the digital motor protection relay is improved within $\pm$5%. Also, we can control motors at starting according to starting types with simple method as programmable sequence editor. So we can improve the demerits of high cost and much manhour for rework.

  • PDF

Preventing cascading failure of electric power protection systems in nuclear power plant

  • Moustafa, Moustafa Abdelrahman Mohamed Mohamed;Chang, Choong-koo
    • Nuclear Engineering and Technology
    • /
    • v.53 no.1
    • /
    • pp.121-130
    • /
    • 2021
  • Cascading failure is the main cause of large blackouts in electrical power systems; this paper analyzes a cascading failure in Hanbit nuclear power plant unit two (2) caused by a circuit breaker (CB) operation failure. This malfunction has been expanded to the loss of offsite power (LOOP). In this study, current practices are reviewed and then the methodologies of how to prevent cascading failures in protection power systems are introduced. An overview on the implementation of IEC61850 GOOSE messaging-based zone selective interlocking (ZSI) scheme as key solution is proposed. In consideration of ZSI blocking time, all influencing factors such as circuit breaker opening time, relay I/O response time and messages travelling time in the communication network should be taken into account. The purpose of this paper is to elaborate on the effect of cascading failure in NPP electrical power protection system and propose preventive actions for this failures. Finally, the expected advantages and challenges are elaborated.

Characteristics of Lightning Overvoltages Coming in Low-Voltage Power Distribution Systems

  • Lee, Bok-Hee;Lee, Dong-Moon;Lee, Su-Bong;Jeong, Dong-Cheol;Lee, Jae-Bok;Myung, Sung-Ho
    • KIEE International Transactions on Electrophysics and Applications
    • /
    • v.3C no.3
    • /
    • pp.91-98
    • /
    • 2003
  • The importance of improving the quality of electric power is being strongly raised, owing to an increasing use of sensitive and small-sized electronic devices and systems. The transient over-voltages on low-voltage power distribution systems are induced by direct or indirect lightning return strokes. These can cause damage and/or malfunction of the utility systems for home automation, office automation, factory automation, medical automation, etc. The behaviors of lightning overvoltages transferred through the transformer to the low-voltage distribution systems using a Marx generator were experimentally investigated. Furthermore, the coupling mechanisms of lightning overvoltages transferred to the low-voltage systems were clearly illustrated through a theoretical simulation using a Pspice program. The overvoltages in low-voltage ac power systems are rarely limited by the application of the surge arrester to the primary side of the distribution transformer. A superior surge protection scheme is to install surge protection devices at the service entrance switchboard and/or at the load devices in TN power systems.