• Title/Summary/Keyword: School security

Search Result 3,327, Processing Time 0.028 seconds

ISO Coordination of Generator Maintenance Scheduling in Competitive Electricity Markets using Simulated Annealing

  • Han, Seok-Man;Chung, Koo-Hyung;Kim, Balho-H.
    • Journal of Electrical Engineering and Technology
    • /
    • v.6 no.4
    • /
    • pp.431-438
    • /
    • 2011
  • To ensure that equipment outages do not directly impact the reliability of the ISO-controlled grid, market participants request permission and receive approval for planned outages from the independent system operator (ISO) in competitive electricity markets. In the face of major generation outages, the ISO will make a critical decision as regards the scheduling of the essential maintenance for myriads of generating units over a fixed planning horizon in accordance with security and adequacy assessments. Mainly, we are concerned with a fundamental framework for ISO's maintenance coordination in order to determine precedence of conflicting outages. Simulated annealing, a powerful, general-purpose optimization methodology suitable for real combinatorial search problems, is used. Generally, the ISO will put forward its best effort to adjust individual generator maintenance schedules according to the time preferences of each power generator (GENCO) by taking advantage of several factors such as installed capacity and relative weightings assigned to the GENCOs. Thus, computer testing on a four-GENCO model is conducted to demonstrate the effectiveness of the proposed method and the applicability of the solution scheme to large-scale maintenance scheduling coordination problems.

Reversible Secret Sharing Scheme Using Symmetric Key Encryption Algorithm in Encrypted Images (암호화된 이미지에서 대칭키 암호화 알고리듬을 이용한 가역 비밀이미지 공유 기법)

  • Jeon, Byoung-Hyun;Shin, Sang-Ho;Jung, Ki-Hyun;Lee, Joon-Ho;Yoo, Kee-Young
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.11
    • /
    • pp.1332-1341
    • /
    • 2015
  • This paper proposes a novel reversible secret sharing scheme using AES algorithm in encrypted images. In the proposed scheme, a role of the dealer is divided into an image provider and a data hider. The image provider encrypts the cover image with a shared secret key and sends it to the dealer. The dealer embeds the secret data into the encrypted image and transmits encrypted shadow images to the corresponding participants. We utilize Galois polynomial arithmetic operation over 28 and the coefficient of the higher-order term is fixed to one in order to prevent the overflow. In experimental results, we demonstrate that the PSNR is sustained close to 44dB and the embedding capacity is 524,288 bits.

Context-based classification for harmful web documents and comparison of feature selecting algorithms

  • Kim, Young-Soo;Park, Nam-Je;Hong, Do-Won;Won, Dong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.6
    • /
    • pp.867-875
    • /
    • 2009
  • More and richer information sources and services are available on the web everyday. However, harmful information, such as adult content, is not appropriate for all users, notably children. Since internet is a worldwide open network, it has a limit to regulate users providing harmful contents through each countrie's national laws or systems. Additionally it is not a desirable way of developing a certain system-specific classification technology for harmful contents, because internet users can contact with them in diverse ways, for example, porn sites, harmful spams, or peer-to-peer networks, etc. Therefore, it is being emphasized to research and develop context-based core technologies for classifying harmful contents. In this paper, we propose an efficient text filter for blocking harmful texts of web documents using context-based technologies and examine which algorithms for feature selection, the process that select content terms, as features, can be useful for text categorization in all content term occurs in documents, are suitable for classifying harmful contents through implementation and experiment.

  • PDF

A Study on Process of Change and Assumption of Archetype of Winsborough Hall at Speer Girls' School in Gwangju (광주구수피아여학교 윈스브로우홀의 변화와 원형추정 연구)

  • Shin, Woong-Ju;Sung, Dae-Chul
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.14 no.4
    • /
    • pp.97-105
    • /
    • 2012
  • Winsborough Hall built by Martin L. Winehart who was the missionary of the Presbyterian Church of America in 1927 was built by Mrs. Winsborough's birthday contribution. Winsborough Hall was clearly divided into the original form built in 1927 and remodelled form by extension. Most of walls were constructed with several kinds of bricks for both sides and opening in the original form and remodelled form. Each room divided by inner wall was kept with original form because it is difficult to remodel it on the characteristics of building. But, it was confirmed through the related literatures that security of opening at some rooms and annexation of rooms through removal of the wall on the 2nd floor which was relatively easy to transform wall compared to the first floor were made. Variability of the wall affected the truss structure of roof and it created rare double truss structure. Architectural value of Winsborough Hall was in its first architectural trial using red brick in Gwangju region since 1920s. It suggested that it was differential architectural trial from Korean-Western mixed building constructed by the missionaries from 1940 to 1910 and buildings made of gray bricks prevailed from 1911 to 1920 and it showed the advancement in the architectural structure and materials.

A Study on the Effect of the Use of Reserve Officers on the Military (예비역 간부 활용이 군에 미치는 효과 연구)

  • Han, Bongkyu;Yang, Gumyong;Kim, Gakgyu
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.2
    • /
    • pp.147-158
    • /
    • 2020
  • Korea Ministry of National Defense has directed the state-of-the-art technology Forces troops structures that can respond to security threats in all directions through the Defense Innovation 2.0, which aims to reorganize the personnel and organizations in response to population decline. An implement of effective analysis to maintain combat power is necessary due to possible restrictions on combat power, especially in division of mobilization where reserve manpower is operated frequently. In this study, the normal operations of the reserve officers were investigated, the direct effects of the combat forces of the reserve officers was analyzed using ARENA modeling, and the budget required to operate the innovation and indirect effects of employment of veterans were studied. The result of the simulation proved to be effective in demonstrating unit combat power when the reserve officer was in full-time operations and economic benefits were also significant in terms of efficiency of defense budget management.

Extraction of Physical Contact in Elevator (엘리베이터 내의 신체적 접촉 장면 추출)

  • Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.12
    • /
    • pp.2852-2857
    • /
    • 2015
  • Assault and violence in the elevator is a crime that occurs most frequently. In particular, these days, is a phenomenon that occurs frequently, knowing that there is a CCTV camera. In this paper, we extract the phenomena of contact between people in the elevator. Many people ride the elevator does not cause these symptoms. However, this crime occurs when fewer people ride the elevator. Extraction method of contact is seeking the skeleton of binary image and extracts the contact status of each skeleton. Therefore, immediately detecting the violence and assaults that occur in the elevator and to notify the security office of the building.

An Improved Detection System for the Network Vulnerability Scan Attacks (네트워크 취약점 검색공격에 대한 개선된 탐지시스템)

  • You, Il-Sun;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.543-550
    • /
    • 2001
  • In this paper, an improved detection system for the network vulnerability scan attacks is proposed. The proposed system improves the methodology for detecting the network vulnerability scan attacks and provides a global detection and response capability that can counter attacks occurring across an entire network enterprize. Through the simulation, we show that the proposed system can detect vulnerable port attacks, coordinated attacks, slow scans and slow coordinated attacks. We also show our system can achieve more global and hierarchical response to attacks through the correlation between server and agents than a stand-alone system can make.

  • PDF

A Study on Releases Determination Scheme for a Forecasted Flood (예측홍수의 방류량 결정방안에 관한 연구)

  • Kwon, Oh-Ig;Shim, Myung-Pil
    • Journal of Korea Water Resources Association
    • /
    • v.30 no.3
    • /
    • pp.257-268
    • /
    • 1997
  • Reservoir operators and managers need to present a rational basis of determining releases for a flood event. This study divides a forecasted flood hydrograph by two parts on the basis of non-damaging discharge, which consists of one part con,trolled by non-damaging discharge and another controlled by using flood control storage of the reservoir. In case of using flood control storage, a new reservoir operation method. called TRF (Transformed Reservoir Flood) ROM, is suggested for the operating rules during a flood to consider the reservoir security as well as the operational efficiency. This paper presents an application of the methodology to the operation of a single multipurpose reservoir at the Taechong Dam during flood and the results analyzed.alyzed.

  • PDF

Synthesis of the Multifunctional Core/Intermediate/Shell Nanoparticles: Tunable Magnetic and Photoluminescence Properties (자성 및 발광 특성이 조절 가능한 다기능 코어/중간체/쉘 나노 입자 합성)

  • Kim, Mun-Kyoung;Kim, Seyun;Moon, Kyoung-Seok;Shin, Weon Ho;Jeong, Hyung Mo
    • Journal of Powder Materials
    • /
    • v.26 no.6
    • /
    • pp.463-470
    • /
    • 2019
  • Fe3O4/SiO2/YVO4:Eu3+ multifunctional nanoparticles are successfully synthesized by facile stepwise sol-gel processes. The multifunctional nanoparticles show a spherical shape with narrow size distribution (approximately 40 nm) and the phosphor shells are well crystallized. The Eu3+ shows strong photoluminescence (red emission at 619 nm, absorbance at 290 nm) due to an effective energy transfer from the vanadate group to Eu. Core-shell structured multifunctional nanoparticles have superparamagnetic properties at 300 K. Furthermore, the core-shell nanoparticles have a quick response time for the external magnetic field. These results suggest that the photoluminescence and magnetic properties could be easily tuned by either varying the number of coating processes or changing the phosphor elements. The nanoparticles may have potential applications for appropriate fields such as laser systems, optical amplifiers, security systems, and drug delivery materials.

A Study on the Determinants of Third Party Logistics Service Suppliers in Dongdaemun Market

  • Zhang, Yu-Liang;Yoo, Chang-Gwon;Kim, Gi-Pyoung
    • Journal of Distribution Science
    • /
    • v.15 no.2
    • /
    • pp.27-36
    • /
    • 2017
  • Purpose - This study was intended to find the selection attribution factors and service satisfaction determinants of third party logistics suppliers in Dongdaemun wholesale market. Research design, data, and methodology - A questionnaire survey was performed, and the retailers and wholesalers in Dongdaemun wholesale market were asked to fill in it. Company employees using third party logistics service were selected by a random sampling method. Results - It is easy for both retailers and wholesalers to use third party logistics service. The logistics companies in Dongdaemun wholesale market have paid more heed to the security of freight and the operability. That is, the freight safety and operating service are the most important factors in selecting third party logistics suppliers, and they both have a close relationship with user satisfaction. There is no relation between service level and recognition in selection factors of third party logistics suppliers. All the responsiveness, operability and informativeness of third-party logistics providers has a significant relationship with user satisfaction. Conclusions - Third party logistics service is entirely different from the existing delivery or transport service. The most market vendors' wish for third party logistics suppliers is the stability of freight and robust operating service. They also demand the responsiveness for special or emergency situation with having information strength.