• Title/Summary/Keyword: Protection systems

Search Result 2,324, Processing Time 0.024 seconds

A Study on the Protection of EPON (EPON 장애 대책에 관한 연구)

  • Koo Bon-Jeong;Hur Jeong;Kim Sunghwi;Cho Seong-Dae;Park Youngil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.11A
    • /
    • pp.1231-1236
    • /
    • 2004
  • Network protection has been mainly applied to trunk network. PTP, ring, linear, mesh topologies of SONET/SDH system and 565 Mbps PDH systems are among those examples. But, as larger capacity PON system is introduced, protection in access network system also becomes necessary. In this paper, an efficient EPON protection scheme utilizing the EPON's frame and protocol is proposed and the implementation results showing protection within 1 msec are provided.

A Development of Intrusion Detection and Protection System using Netfilter Framework (넷필터 프레임워크를 이용한 침입 탐지 및 차단 시스템 개발)

  • Baek, Seoung-Yub;Lee, Geun-Ho;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.33-41
    • /
    • 2005
  • Information can be leaked, changed, damaged and illegally used regardless of the intension of the information owner. Intrusion Detection Systems and Firewalls are used to protect the illegal accesses in the network. But these are the passive protection method, not the active protection method. They only react based on the predefined protection rules or only report to the administrator. In this paper, we develop the intrusion detection and protection system using Netfilter framework. The system makes the administrator's management easy and simple. Furthermore, it offers active protection mechanism against the intrusions.

  • PDF

An Adaptive Reclosing Algorithm Considering Distributed Generation

  • Seo, Hun-Chul;Kim, Chul-Hwan
    • International Journal of Control, Automation, and Systems
    • /
    • v.6 no.5
    • /
    • pp.651-659
    • /
    • 2008
  • Autoreclosing techniques have been used in power systems to maintain system stability and continuity of supply. Environmental and economical issues have driven significant increases in the development of distributed generation (DG). DG connected to distribution systems, however, may impose negative influences with respect to power quality, protection, and stability, because DG can cause some challenges to protection, especially to reclosing. For this reason, in order to improve the reliability and safety of the distribution system, the rules and guidelines suggest that the DG system needs to be rapidly disconnected from the system before reclosing. We present, in this paper, an adaptive reclosing algorithm considering the DG. The algorithm consists of an angle oscillation's judgment, the emergency extended equal-area criterion (EEEAC), the calculation of an optimal reclosing time, and a reconnection algorithm. Our simulation results for three different DG technologies with Electromagnetic Transient Program (EMTP) indicate that we can maintain transient stability while the DG is protected against disturbances.

Fuzzy programming for improving redundancy-reliability allocation problems in series-parallel systems

  • Liu, C.M.;Li, J.L.
    • International Journal of Reliability and Applications
    • /
    • v.12 no.2
    • /
    • pp.79-94
    • /
    • 2011
  • Redundancy-reliability allocation problems in multi-stage series-parallel systems are addressed in this study. Fuzzy programming techniques are proposed for finding satisfactory solutions. First, a multi-objective programming model is formulated for simultaneously maximizing system reliability and minimizing system total cost. Due to the nature of uncertainty in the problem, the fuzzy set theory and technique are used to convert the deterministic multi-objective programming model into a fuzzy nonlinear programming problem. A heuristic method is developed to get satisfactory solutions for the fuzzy nonlinear programming problem. A Pareto optimal solution is found with maximal degree of satisfaction from the interception area of fuzzy sets. A case study that is related to the electronic control unit installed on aircraft engine over-speed protection system is used to implement the developed approach. Results suggest that the developed fuzzy multi-objective programming model can effectively resolve the fuzzy and uncertain problem when design goals and constraints are not clearly confirmed at the initial conceptual design phase.

  • PDF

DISCO: A COMPUTER PROGRAM FOR PROTECTION COORDINATION OF DISTRIBUTION SYSTEMS (DISCO: 배전 계통 보호 기기 정정 프로그램)

  • Lee, Seung-Jae;Park, Young-Moon;Lee, Jeoung-Won;Yoon, Sang-Hyun;Yoon, Man-Chul;Lee, Sang-Ok
    • Proceedings of the KIEE Conference
    • /
    • 1990.07a
    • /
    • pp.125-128
    • /
    • 1990
  • A program for the protection coordination of distribution systems is reported. The developed program nailed DISCO, consisting of two modules has a capability of selling the overcurrent relays, reclosers, sectionalizers, fuses which are commonly used in the primary feeder systems. Setting is performed in a downstream fashion starting from the substation, and coordination rules are applied identifying the pattern of the primary-backup devices based on the depth-first search. T/C curves of various devices are handled by digitization for accuracy and various graphics and windows are adopted for user-friendly interface.

  • PDF

A Comparative Analysis of the Legal Systems of Four Major Countries on Privacy Policy Disclosure (개인정보 처리방침(Privacy Policy) 공개에 관한 주요 4개국 법제 비교분석)

  • Tae Chul Jung;Hun Yeong Kwon
    • Journal of Information Technology Services
    • /
    • v.22 no.6
    • /
    • pp.1-15
    • /
    • 2023
  • This study compares and analyzes the legal systems of Korea, the European Union, China, and the United States based on the disclosure principles and processing policies for personal data processing and provides references for seeking improvements in our legal system. Furthermore, this research aims to suggest institutional implications to overcome data transfer limitations in the upcoming digital economy. Findings on a comparative analysis of the relevant legal systems for disclosing privacy policies in four countries showed that Korea's privacy policy is under the eight principles of privacy proposed by the OECD. However, there are limitations in the current situation where personal information is increasingly transferred overseas due to direct international trade e-commerce. On the other hand, the European Union enacted the General Data Protection Regulation (GDPR) in 2016 and emphasized the transfer of personal information under the Privacy Policy. China also showed differences in the inclusion of required items in its privacy policy based on its values and principles regarding transferring personal information and handling sensitive information. The U.S. CPRA amended §1798.135 of the CCPA to add a section on the processing of sensitive information, requiring companies to disclose how they limit the use of sensitive information and limit the use of such data, thereby strengthening the protection of data providers' rights to sensitive information. Thus, we should review our privacy policies to specify detailed standards for the privacy policy items required by data providers in the era of digital economy and digital commerce. In addition, privacy-related organizations and stakeholders should analyze the legal systems and items related to the principles of personal data disclosure and privacy policies in major countries so that personal data providers can be more conveniently and accurately informed about processing their personal information.

Audit Method for Personal Information Protection in On-line Games (온라인게임에서 개인정보보호 감리 모형)

  • Kim, Hee-Wan;Shin, Joong-Won;Kim, Dong-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.23-37
    • /
    • 2012
  • Illegal game players' hacking and propagation of malignant code in online game exposes privacy of online game customers. So, online game companies have to support the standardized systems and operations of customers' privacies. Since online game companies implement authentication of information protection, which focuses on assets or physical, systemic security, they need a more professional system that is related to protection of individual privacy. We analyzed the individual information protection system, which includes ISO27001, ISMS of KISA, GMITS, ePrivacy, online game privacy protection guide, and BS10012. Using the suggested systems, we proposed the systemic tools that measure the level of individual information protection, which includes process and check items of each phase.

A Study on Improvement Plans for Technology Protection of SMEs in Korea (중소기업 기술보호 개선방안에 대한 연구)

  • Lee, Jang Hoon;Shin, Wan Seon;Park, Hyun Ju
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.37 no.2
    • /
    • pp.77-84
    • /
    • 2014
  • The purpose of this research is to identify and develop technology protection plans for small and medium-sized enterprises (SMEs) by analyzing past technology leakage patterns which were experienced by SMEs. We identified factors which affect the technology leakage, and analyzed patterns of the influences using a data mining algorithms. A decision tree analysis showed several significant factors which lead to technology leakage, so we conclude that preemptive actions must be put in place for prevention. We expect that this research will contribute to determining the priority of activities necessary to prevent technology leakage accidents in Korean SMEs. We expect that this research will help SMEs to determine the priority of preemptive actions necessary to prevent technology leakage accidents within their respective companies.

A Study on the Detection of Asynchronous State of the Synchronous Generator

  • Choi, Hyung-Joo;Lee, Heung-Ho
    • Journal of international Conference on Electrical Machines and Systems
    • /
    • v.2 no.4
    • /
    • pp.405-412
    • /
    • 2013
  • This paper includes new protection concepts and practices to avoid mechanical damage of three-phase transformer by asynchronous operation of synchronous generator. this failure is often caused just after synchronous generator was connected to the grid because of a malfunction of the controller or misconnections of the synchronous devices. The results of the studies on the analyzing the phenomenon of asynchronous operation experienced in Korea and rapidly detecting asynchronous state are descrived.

The Study on the redundancy of HVDC Control and Protection System (HVDC Control and Protection 시스템의 이중화에 대한 고찰)

  • Moon, Jun-Mo;Lee, Yil-Hwa
    • Proceedings of the KIPE Conference
    • /
    • 2014.11a
    • /
    • pp.175-176
    • /
    • 2014
  • 본 논문은 HVDC C&P 시스템에 적용된 이중화 기술 및 기능을 설명한다. LS산전은 2009년 HVDC 사업을 착수한 이래 HVDC Control and Protection(C&P) System을 개발해 왔으며 현재 2010년부터 한국전력공사와 협동연구로 진행하고 있는 HVDC 제주 실증단지에 적용하여 실증운전 중이다. 당사가 개발한 HVDC C&P 시스템은 시스템의 신뢰성 및 가용성을 높이기 위해 Fully Redundancy 시스템으로 구성되고 Hot Standby 방식으로 제어 및 보호 알고리즘을 수행한다. 본 논문에서는 HVDC C&P 시스템의 구성과 제어기 및 네트워크의 이중화 구조에 대해 소개 하고자 한다.

  • PDF