• Title/Summary/Keyword: Protection requirements

Search Result 562, Processing Time 0.025 seconds

Development of Overload Prevention Algorithm for the Crane Safety (크레인 안전을 위한 과부하 방지 알고리즘 개발)

  • Lee, Sang Young
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.2
    • /
    • pp.11-19
    • /
    • 2012
  • Crane systems have been widely used for transportation in building sites, ports, nuclear wastehandling operation and so on. As a typical underactuated system, an overhead crane has such merits as high flexibility and less energy consumption. And it's getting more types of cranes, universally applicable algorithms should be developed. That is the design and development of scalable algorithms are required. Developed algorithms can be used for the controller and crane overload protection that meets the requirements of the algorithm are presented. These algorithms force the state to warn the operator and stops the operation of equipment. In this paper, crane overload conditions that can cause damage to alert the operator, and to limit the operation of equipment overload protection algorithm is presented.

Mandatory Access Control Protection Profile for Secure Operating System (보안 운영체제를 위한 강제적 접근 제어 보호 프로파일)

  • Ko Young Woong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.1 s.33
    • /
    • pp.141-148
    • /
    • 2005
  • Nowadays, it is possible to access sharing data from unauthorized People. Access control prevents unauthorized access to computing resource, information resources, and communication resources. It is very important to defend the critical system resources from the unauthorized. The importance of this study is to develop Protection Profile for Mandatory Access Control (MAC) that satisfies TCSEC assurance level B2. protection profile for MAC will help developers to use reference for the development of requirements and formulating security specification.

  • PDF

A Study on the Design of the Bay Controller for Generator Protection and Control (발전기 보호제어를 위한 Bay Controller 설계에 관한 연구)

  • Jang, Nak-Won;Woo, Chun-Hee;Lee, Sung-Hwan
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.57 no.1
    • /
    • pp.46-55
    • /
    • 2008
  • In this paper, we designed the bay control unit that is based on the microprocessors and integrates with the new technology of electrical, electronic, and mechanical fields. Nowadays the customers have required much more integrated multi-protection relay, monitoring, control devices and power management for better and easier maintenance, performance, electrical system analysis and communication according to new trend of switchboard This bay controller supplies those requirements of customers with easy handling and operation. This bay controller provides a graphic display with rear-lit liquid crystal LCD and push buttons as kinds of HMI(Human Machine Interface). This bay controller provides the parameter setting program, control setting program, various editors and fault recording and analysis program on Windows/95/98/NT/2000/XP for HMI. In addition, this bay controller can be set manually and this manual setting function helps user to interface easily.

A Directional Relay Algorithm Using Positive-Sequence Superimposed Quantity for Transmission Line Protection (정상 성분 변화량을 이용한 송전선로 보호용 방향 계전 알고리즘)

  • 이명수;유석구
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.52 no.4
    • /
    • pp.226-233
    • /
    • 2003
  • Directional elements are fundamental to protection scheme security and selectivity, performing such critical tasks as supervising distance elements and controlling overcurrent elements. But, conventional operating principles for directional detection based on negative or zero sequence quantify do not satisfy the requirements for improved sensitivity and fast operation under any fault conditions. In this paper, new algorithm for directional elements is proposed. The proposed algorithm use the positive-sequence superimposed voltages and currents in order to be used in all fault conditions. Also, because this algorithm uses a voltage compensation method. it can be well operated under strong source conditions.

Installation of Test Equipment for Lightning Surge Complying with International Standard (국제시험규격에 적합한 뇌서지 시험설비 구축)

  • Lee, Tae-Hyung;Cho, Sung-Chul;Eom, Ju-Hong;Lee, Bok-Hee
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2006.05a
    • /
    • pp.360-364
    • /
    • 2006
  • Recently KS documents related to lightning protection were revised complying with the requirements of IEC standards. Lightning protection parts are divided three in IEC, those are arrestor(60099), SPD(61643), and protection facilities(62305). According as international standard is applicable in Korea, type tests, routine tests, and acceptance tests shall be made to demonstrate compliance with the relevant standards. KESRI have installed test equipment which is funded by Ministry of Commerce, Industry and Energy fit for lightning surge test form 2002, and we introduce the test equipments in detail.

  • PDF

An Analysis of Performance Testing for Metallic Connection Components of Lightning Protection System (피뢰시스템 구성부품 중 금속접속재의 성능시험 및 결과분석)

  • Lee, Ju-Cheol;Lee, An-Ki;Kim, Jae-Chul
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.28 no.7
    • /
    • pp.69-74
    • /
    • 2014
  • Recently, IEC published new standards about the requirements and tests for lightning protection system(LPS) components. If components are used for LPS, they should comply with the IEC standards. This paper, we collected six specimens for the metallic connection components using in domestic, and it tested for withstand lightning current which according to the IEC 62561-1. As a result, only one specimen meet this performance requirement. The specimen is the metallic connection component with four bolts fixed. Therefor, when designing of LPS in domestic, the metallic connection components shall be taken into account for the selection of the withstand lightning current. In addition, we need to develop for LPS components product and the national standards.

Simulation and Design of Optimized Three-Layer Radiation Shielding to Protect Electronic Boards of Satellite Revolving in Geostationary Earth Orbit (GEO) Orbit against Proton Beams

  • Ali Alizadeh;Gohar Rastegarzadeh
    • Journal of Astronomy and Space Sciences
    • /
    • v.41 no.1
    • /
    • pp.17-23
    • /
    • 2024
  • The safety of electronic components used in aerospace systems against cosmic rays is one of the most important requirements in their design and construction (especially satellites). In this work, by calculating the dose caused by proton beams in geostationary Earth orbit (GEO) orbit using the MCNPX Monte Carlo code and the MULLASSIS code, the effect of different structures in the protection of cosmic rays has been evaluated. A multi-layer radiation shield composed of aluminum, water and polyethylene was designed and its performance was compared with shielding made of aluminum alone. The results show that the absorbed dose by the simulated protective layers has increased by 35.3% and 44.1% for two-layer (aluminum, polyethylene) and three-layer (aluminum, water, polyethylene) protection respectively, and it is effective in the protection of electronic components. In addition to that, by replacing the multi-layer shield instead of the conventional aluminum shield, the mass reduction percentage will be 38.88 and 39.69, respectively, for the two-layer and three-layer shield compared to the aluminum shield.

Technical and Managerial Requirements for Privacy Protection Using Face Detection and Recognition in CCTV Systems (영상감시 시스템에서의 얼굴 영상 정보보호를 위한 기술적·관리적 요구사항)

  • Shin, Yong-Nyuo;Chun, Myung Geun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.97-106
    • /
    • 2014
  • CCTV(Closed Circuit television) is one of the widely used physical security technologies and video acquisition device installed at specific point with various purposes. Recently, as the CCTV capabilities improve, facial recognition from the information collected from CCTV video is under development. However, in case these technologies are exploited, concerns on major privacy infringement are high. Especially, a computer connected to a particular space images taken by the camera in real time over the Internet has emerged to show information services. In the privacy law, safety measures which is related with biometric template are notified. Accordingly, in this paper, for the protection of privacy video information in the video surveillance system, the technical and managerial requirements for video information security are suggested.

Investigation of Radio Communications-based Train Control System with Interoperability (무선통신기반 열차제어시스템 상호운영성 연구)

  • Choi, June-Young;Park, Jae-Young
    • Journal of the Korean Society for Railway
    • /
    • v.17 no.1
    • /
    • pp.35-42
    • /
    • 2014
  • This paper analyzes the hazard related to train control, the functional requirements for atrain control system(TCS) and the automatic train protection(ATP) functional allocation that ensures the interoperability of a radio communications-based TCS. In addition, the interoperability can be obtained using wireless communications technology standards and standardized functional allocations of TCS performed on the wayside and onboard. Using this information, an integrated operating system for a rail network can be constructed. The functional allocations of TCS that support interoperability, require hazard analysis of TCS and definition of the system requirements. The hazard factors for a TCS are confirmed through setting the train safety space control and train speed limit excess. Furthermore, this paper determines the impact of the hazard factors on the TCS and, defines the functional requirements for the TCS subsystems and the ATP wayside and onboard functional allocations.

Design Plan of Secure IoT System based Common Criteria (CC 기반의 안전한 IoT 시스템 설계 방안)

  • Kim, Ju-Hun;Jung, Hyun-Mi;Cho, Han-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.10
    • /
    • pp.61-66
    • /
    • 2017
  • Recently, IoT technology is rapidly developing with the keyword "Anytime, Anywhere, Convenient". In addition, security problems in IoT systems are exploding and the damage is increasing as well. In this paper, we propose a method to develop IoT system safely by using internationally recognized CC evaluation in ICT by identifying the standardization and security technology development status defining IoT system security requirements. For this purpose, IoT system and service security aspects are analyzed. Based on this, it is possible to design the security functional requirements and to demonstrate the rationale of the security objective through the correspondence relation, and it is possible to design the protection profile for the IoT system. This is a sufficient basis for the development methodology to be presented in this paper because it is used as a means of referring to the set of security requirements of administrators, developers, and users.