• Title/Summary/Keyword: Security Constraint

Search Result 86, Processing Time 0.024 seconds

The Optimal Power Flow Algorithm Considering Load Power Factor Limits (부하역률 제약조건을 고려한 최적 급전 알고리즘)

  • 김광욱;조종만;김진오
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.53 no.9
    • /
    • pp.494-499
    • /
    • 2004
  • This paper presents to compute the power economic dispatch, an optimal power flow (OPF) computation algorithm, considering the load power factor limits constraint in developed. Efficient reactive power planning enhances economic operation as well as system security. Accordingly, an adequate level of power factor limits for the load busesshould be evaluated for economic operation. In this paper, the ranges of acceptable load power factors are portrayed as bandwidths of load power factor expressed as a function of load level. The load power factor limits are included and described into the OPF's objective function. The method Proposed is applied to IEEE 26 bus system.

The Maximum Installable DG Capacity According to Operation Methods of Voltage Regulator in Distribution Systems (배전계통의 전압조정기 운영방법에 따른 분산형전원 최대 도입 용량 산출)

  • Kim, Mi-Young
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.7
    • /
    • pp.1263-1269
    • /
    • 2009
  • Stable and sustainable power supply means maintaining a certain level of power quality and service while securing energy resource and resolving environmental issues. Distributed generation (DG) has become an essential and indispensable element from environmental and energy security perspectives. It is known that voltage violation is the most important constraint for load variation and the maximum allowable DG. In distribution system, sending voltage from distribution substation is regulated by ULTC (Under Load Tap Changer) designed to maintain a predetermined voltage level. ULTC is controlled by LDC (Line Drop Compensation) method compensating line voltage drop for a varying load, and the sending voltage of ULTC calls for LDC parameters. The consequence is that the feasible LDC parameters considering variation of load and DG output are necessary. In this paper, we design each LDC parameters determining the sending voltage that can satisfy voltage level, decrease ULTC tap movement numbers, or increase DG introduction. Moreover, the maximum installable DG capacity based on each LDC parameters is estimated.

A Study on Electronic Commerce Transaction Modeling based on SET (SET을 기반으로 한 전자상거래 트랜잭션 모델링에 대한 연구)

  • 고영철;송병열;조현규;함호상
    • The Journal of Society for e-Business Studies
    • /
    • v.2 no.1
    • /
    • pp.79-94
    • /
    • 1997
  • Commerce activities which are free form space and time constraint using a communication network are called Electronic Commerce(EC). Because of sending a commercial information using open network such as Internet in EC, they need the security of commerce information (payment information and purchase information), checking the integrity of transferring data and certifying all parts participated in commerce for a secure commerce. Recently Visa and MasterCard Co. released the Secure Electronic Transaction (SET) Protocol for secure payment card transaction on Internet. This paper proposes a Secure Electronic Commerce Transaction Model(SECTM) using SET in order to support the secure commerce on Internet. The proposed transaction model prevents merchant from abusing the cardholder's payment information (credit-card number etc.) and enables cardholder to shop securely in Electronic Shopping Mall.

  • PDF

Analysis on the structural model on the participation rate of the leisure constraint of private security agents in order to deduct priority list of investing related policies: applying IPA technique (정책투자우선순위 도출을 위한 민간경비원의 여가제약 참가지수 구조모형 분석: IPA기법 적용)

  • Jung, Joo-Sub;Kim, Chan-Sun;Park, Young-Man
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2010.05a
    • /
    • pp.179-181
    • /
    • 2010
  • 이 연구는 IPA 기법을 적용하여 민간경비원들의 여가활동 집중개선 종목을 도출하고, 나아가 여가제약이 참가지수에 미치는 영향을 규명하는데 주된 목적이 있다. 본 연구는 2010년 서울 소재 6개소 민간경비업체를 대상으로 판단표집법을 적용하여 최종분석에 사용된 사례 수는 총 267명이다. 결론은 다음과 같다. 첫째, 민간경비원들의 여가활동 참가 지수인 선호도와 참여도는 차이가 있다. 중점개선 여가활동은 헬스, 산책/조깅, 숙박관광, 당일여행 등이다. 둘째, 민간경비원들의 여가제약은 여가활동 참가지수에 영향을 미친다. 개인내적, 주변의식적, 대인적 제약이 클수록 선호하는 여가활동에 부적 영향을 미치는 반면, 구조적, 시간 경제적 제약을 극복하고 선호하는 여가활동에 정적 영향을 미쳤다. 본 연구결과를 토대로 민간경비원들의 복지적처우개선에 집중적인 투자가 이루어져야 할 것이다.

  • PDF

The optimal power flow algorithm considering load power factor limits (부하역률 제약을 고려한 최적 급전 알고리즘)

  • Kim, Kwang-Wook;Cho, Jong-Man;Kim, Jin-O
    • Proceedings of the KIEE Conference
    • /
    • 2003.07a
    • /
    • pp.98-100
    • /
    • 2003
  • This paper presents the method for computing the power economic dispatch with an optimal power flow (OPF) computation algorithm, considering the power factor limits constraint. Efficient reactive power planning enhances economic operation as well as system security. Accordingly, an adequate level of power factor limits for the load buses should be evaluated for economic operation. The power factor limits are included and described into the OPF's objective function. The proposed method is applied to IEEE 26 buses system.

  • PDF

Cooperative Decode-and-Forward Relaying for Secure Multicasting

  • Lee, Jong-Ho;Sohn, Illsoo;Song, Sungju;Kim, Yong-Hwa
    • ETRI Journal
    • /
    • v.38 no.5
    • /
    • pp.934-940
    • /
    • 2016
  • In this paper, secure multicasting with the help of cooperative decode-and-forward relays is considered for the case in which a source securely sends a common message to multiple destinations in the presence of a single eavesdropper. We show that the secrecy rate maximization problem in the secure multicasting scenario under an overall power constraint can be solved using semidefinite programing with semidefinite relaxation and a bisection technique. Further, a suboptimal approach using zero-forcing beamforming and linear programming based power allocation is also proposed. Numerical results illustrate the secrecy rates achieved by the proposed schemes under secure multicasting scenarios.

A Study on Secure Binding Update Protocol Supporting Mobile Nodes with Constraint Computational Power in Mobile IPv6 Environment (모바일 IPv6 환경에서 제한된 계산 능력을 갖는 모바일 노드를 지원하는 바인딩 갱신 인증 프로토콜에 관한 연구)

  • Choi, Sung-Kyo;You, Il-Sun
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.11-25
    • /
    • 2005
  • In MIPv6 environment, an important design consideration for public key based binding update protocols is to minimize asymmetric cryptographic operations in mobile nodes with constraint computational power, such as PDAs and cellular phones, For that, public key based protocols such as CAM-DH. SUCV and Deng-Zhou-Bao's approach provides an optimization to offload asymmetric cryptographic operations of a mobile node to its home agent. However, such protocols have some problems in providing the optimization. Especially, CAM-DH with this optimization does not unload all asymmetric cryptographic operations from the mobile node, while resulting in the home agent's vulnerability to denial of service attacks. In this paper, we improve the drawbacks of CAM-DH. Furthermore, we adopt Aura's two hash-based CGA scheme to increase the cost of brute-force attacks searching for hash collisions in the CGA method. The comparison of our protocol with other public key based protocols shows that our protocol can minimize the MN's computation overhead, in addition to providing better manageability and stronger security than other protocols.

  • PDF

Korean welfare regime in the conservative administration, 2008-2016 (역진적 선별성의 지속과 확장성의 제약, 2008~2016: 이명박·박근혜 정부시기 한국복지체제의 특성)

  • Yoon, Hongsik
    • 한국사회정책
    • /
    • v.25 no.4
    • /
    • pp.163-198
    • /
    • 2018
  • This study analyzed the change of the Korean welfare regime during the conservative government. It is clear that the welfare expanded during the conservative government, but this expansion was the process of realizing the constraint of expansion that reduces future welfare expenditure in Korea. In addition, as the public welfare centered on social insurance expanded after 10 years of liberal government, the backward selectivity of the Korean welfare regime strengthened in the conservative administration. Expanding social insurance itself does not reinforce the backward selectivity of the Korean welfare regime. However, the industrial structure created by the export-led growth system has intensified the fragmentation of the labor market, and expanding social insurance designed based on regular workers under these conditions has forced the backward selectivity of the social security system. It is for this reason that the backward selectivity has been reinforced during the conservative government.

Design of U-Healthcare Access Authority Control Model Using Context Constrain RBAC Model (상황제한 RBAC 모델을 이용한 U-헬스케어 접근권한 제어모델 설계)

  • Kim, Chang-Bok;Kim, Nam-Il;Park, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.233-242
    • /
    • 2009
  • The security of medical information need continued research about steady and flexible security model because of privacy of patient's as well as directly relation in the patient's life. In particular, u-healthcare environment is need flexible and detailed access control by variety changes of context. Control model analyzed relation of resource and authority, and analyzed authority about all accessible resource from access point using K2BASE. The context-based access control model can change flexibly authority change and role, and can obtain resource of authority granted and meaningly connected resource. As a result, this thesis can apply flexible and adaptive access control model at u-healthcare domain which context change various.

  • PDF

An Improvement of Mobile IPv6 Binding Update Protocol Using Address Based Keys (주소기반의 키를 사용하는 모바일 IPv6 바인딩 갱신 프로토콜 개선)

  • You, Il-Sun;Choi, Sung-Kyo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.5
    • /
    • pp.21-30
    • /
    • 2005
  • Recently, a mobile IPv6 binding update protocol using Address Based Keys (BU-ABK) was proposed. This protocol applies Address Based Keys (ABK), generated through identity-based cryptosystem, to enable strong authentication and secure key exchange without any global security infrastructure. However, because it cannot detect that public cryptographic parameters for ABKs are altered or forged, it is vulnerable to man-in-the-middle attacks and denial of service attacks. Furthermore, it has heavy burden of managing the public cryptographic parameters. In this paper, we show the weaknesses of BU-ABK and then propose an enhanced BU-ABK (EBU-ABK). Furthermore, we provide an optimization for mobile devices with constraint computational power. The comparison of EBU-ABK with BU-ABK shows that the enhanced protocol achieves strong security while not resulting in heavy computation overhead on a mobile node.