• Title/Summary/Keyword: Security System Modeling

Search Result 266, Processing Time 0.02 seconds

Supervisory Control for Energy Management of Islanded Hybrid AC/DC Microgrid

  • Mansour, Henda Ben;Chaarabi, Lotfi;Jelassi, Khaled;Guerrero, Josep M.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.355-363
    • /
    • 2022
  • This paper presents the modeling for islanded hybrid AC/DC microgrid and the verification of the proposed supervisory controller for energy management for this microgrid. The supervisory controller allows the microgrid system to operate in different power flows through the proposed control algorithm, it has several roles in the management of the energy flow between the different components of the microgrid for reliable operation. The proposed microgrid has both essential objectives such as the maximum use of renewable energies resources and the reduction of multiple conversion processes in an individual AC or DC microgrids. The microgrid system considered for this study has a solar photovoltaic (PV), a wind turbine (WT), a battery (BT), and a AC/DC loads. A small islanded hybrid AC/DC microgrid has been modeled and simulated using the MATLAB-Simulink. The simulation results show that the system can maintain stable operation under the proposed supervisory controller when the microgrid is switched from one operating mode of energy flow to another.

Modeling of Virtual Switch in Cloud System (클라우드 시스템의 가상 스위치 모델링)

  • Ro, Cheul-Woo
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.479-485
    • /
    • 2013
  • Virtualization is a promising approach to consolidating multiple online services onto a smaller number of computing resources. A virtualized server environment allows computing resources to be shared among multiple performance isolated platforms called virtual machines. Through server virtualization software, applications servers are encapsulated into VMs, and deployed with APIs on top generalized pools of CPU and memory resources. Networking and security have been moved to a software abstraction layer that transformed computing, network virtualization. And it paves the way for enterprise to rapidly deploy networking and security for any application by creating the virtual network. Stochastic reward net (SRN) is an extension of stochastic Petri nets which provides compact modeling facilities for system analysis. In this paper, we develop SRN model of network virtualization based on virtual switch. Measures of interest such as switching delay and throughput are considered. These measures are expressed in terms of the expected values of reward rate functions for SRNs. Numerical results are obtained according to the virtual switch capacity and number of active VMs.

Security-Reverse-Attack Engineering Life-cycle Model for Attack System and Attack Specification Models (공격시스템을 위한 보안-역-공격공학 생명주기 모델과 공격명세모델)

  • Kim, Nam-Jeong;Kong, Mun-Soo;Lee, Gang-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.6
    • /
    • pp.17-27
    • /
    • 2017
  • Recently, as cyber attacks have been activated, many such attacks have come into contact with various media. Research on security engineering and reverse engineering is active, but there is a lack of research that integrates them and applies attack systems through cost effective attack engineering. In this paper, security - enhanced information systems are developed by security engineering and reverse engineering is used to identify vulnerabilities. Using this vulnerability, we compare and analyze lifecycle models that construct or remodel attack system through attack engineering, and specify structure and behavior of each system, and propose more effective modeling. In addition, we extend the existing models and tools to propose graphical attack specification models that specify attack methods and scenarios in terms of models such as functional, static, and dynamic.

A Study of Pervasive Roaming Services with Security Management Framework (퍼베이시브 로밍 서비스를 위한 보안 관리 프레임워크)

  • Kim, Gwan-Yeon;Hwang, Zi-On;Kim, Yong;Uhm, Yoon-Sik;Park, Se-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.115-129
    • /
    • 2007
  • The ubiquitous and autonomic computing environments is open and dynamic providing the universal wireless access through seamless integration of software and system architectures. The ubiquitous computing have to offer the user-centric pervasive services according to the wireless access. Therefore the roaming services with the predefined security associations among all of the mobile devices in various networks is especially complex and difficult. Furthermore, there has been little study of security coordination for realistic autonomic system capable of authenticating users with different kinds of user interfaces, efficient context modeling with user profiles on Smart Cards, and providing pervasive access service by setting roaming agreements with a variety of wireless network operators. This paper proposes a Roaming Coordinator-based security management framework that supports the capability of interoperator roaming with the pervasive security services among the push service based network domains. Compared to traditional mobile systems in which a Universal Subscriber Identity Module(USIM) is dedicated to one service domain only, our proposed system with Roaming Coordinator is more open, secure, and easy to update for security services throughout the different network domains such as public wireless local area networks(PWLANs), 3G cellular networks and wireless metropolitan area networks(WMANs).

A Navigation System for a Patrol Robot in Indoor Environments (실내 환경에서의 경비로봇용 주행시스템)

  • Choi, Byoung-Wook;Lee, Young-Min;Park, Jeong-Ho;Shin, Dong-Kwan
    • The Journal of Korea Robotics Society
    • /
    • v.1 no.2
    • /
    • pp.117-124
    • /
    • 2006
  • In this paper, we develope the navigation system for patrol robots in indoor environment. The proposed system consists of PDA map modelling, a localization algorithm based on a global position sensor and an automatic charging station. For the practical use in security system, the PDA is used to build object map on the given indoor map. And the builded map is downloaded to the mobile robot and used in path planning. The global path planning is performed with a localization sensor and the downloaded map. As a main controller, we use PXA270 based hardware platform in which embedded linux 2.6 is developed. Data handling for various sensors and the localization algorithm are performed in the linux platform. Also, we implemented a local path planning algorithm for object avoidance with ultra sonar sensors. Finally, for the automatic charging, we use an infrared ray system and develop a docking algorithm. The navigation system is experimented with the two-wheeled mobile robot using North-Star localization system.

  • PDF

Dynamic Analysis of a System Using Reduced Modeling of Substructures (부분구조물의 단순모델화를 이용한 시스템의 동적해석)

  • Hwang, Woo-Seok
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.19 no.2
    • /
    • pp.200-207
    • /
    • 2009
  • Complex systems are made of many subsystems, those are developed and manufactured by many part companies. Even though the information for a part is necessary to analyze the performance of the other part, it is not so easy to get the information for that part from other companies due to many reasons like security or compatibilities. If the modal parameters of a system between the connecting points are available, we can reconstruct a reduced model for that system in a physical coordinate not in a generalized coordinate. The assemble of the equations of motion for the main system and the reduced equations of motion for the connected system can give a response of the main system considering the effects of connected systems. The results show that the proposed method can give the response of a system accurately. The rule for the selection of modes is to use the fundamental modes whose natural frequencies are low.

An Empirical Study on Influential Factors of the Development and Implementation in Firm Security Management (기업 보안관리 강화의지 및 실행에 영향을 미치는 요인에 관한 연구)

  • Hwang, Jong-Ho
    • Management & Information Systems Review
    • /
    • v.32 no.2
    • /
    • pp.213-235
    • /
    • 2013
  • This study investigates proper solution available for flexibly management pointing out reality a lack of understanding and interest for executing security management while importance of firm security management gets bigger. Accordingly, this study suggests 4 exogenous variables such as organizational commitment, experience of security risks, perceived benefits, partner interdependence as factors of having influence upon development and implementation in security management. It suggests IT volatility as moderating variable, which will intensify between development and implementation. The research model was tested by using Structural Equation Modeling, via Amos 19.0 analysis on a sample collected from 209 firms. As a result, the remaining variables except partner interdependence showed statistically positive influence. The implications of the findings suggest a new theoretical framework of the security management and offers important solutions for the practical application guidelines.

  • PDF

Control items modeling methodology to establish core technology management system and successfully operating suggestions for institutional improvement (핵심 기술 관리 체계(CTMS) 수립을 위한 통제 항목 모델링 연구 및 제도적 개선 제안)

  • Shin, Dong-Hyuk;Shim, Mina;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.109-126
    • /
    • 2013
  • Recently the core technology leakage continues to increase. It is critical issue relating to national competitiveness rely on the company's competitiveness as well as both survival and competitiveness of company. So other countries have impyz roved their laws consistently to solve these problems. And recently our country amended the law. In the paper, we will analyze world's various laws and institutions relating industrial core technologies. And this paper will provide the suggestion to settle and to develop our country's industrial core technology's protection by refer to other laws.

Investigation of Research Trends in Information Systems Domain Using Topic Modeling and Time Series Regression Analysis (토픽모델링과 시계열회귀분석을 활용한 정보시스템분야 연구동향 분석)

  • Kim, Chang-Sik;Choi, Su-Jung;Kwahk, Kee-Young
    • Journal of Digital Contents Society
    • /
    • v.18 no.6
    • /
    • pp.1143-1150
    • /
    • 2017
  • The objective of this study is to examine the trends in information systems research. The abstracts of 1,245 articles were extracted from three leading Korean journals published between 2002 and 2016: Asia Pacific Journal of Information Systems, Information Systems Review, and The Journal of Information Systems. Time series analysis and topic modeling methods were implemented. The topic modeling results showed that the research topics were mainly "systems implementation", "communication innovation", and "customer loyalty". The time series regression results indicated that "customer satisfaction", "communication innovation", "information security", and "personal privacy" were hot topics, and on the other hand, "system implementation" and "web site" were the least popular. This study also provided suggestions for future research.

Design and Implementation of the Security System for the Moving Object Detection (이동물체 검출을 위한 보안 시스템의 설계 및 구현)

  • 안용학;안일영
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.77-86
    • /
    • 2002
  • In this paper, we propose a segmentation algorithm that can reliably separate moving objects from noisy background in the image sequence received from a camera at the fixed position. Image segmentation is one of the most difficult process in image processing and an adoption in the change of environment must be considered for the increase in the accuracy of the image. The proposed algorithm consists of four process : generation of the difference image between the input image and the reference image, removes the background noise using the background nois modeling to a difference image histogram, then selects the candidate initial region using local maxima to the difference image, and gradually expanding the connected regions, region by region, using the shape information. The test results show that the proposed algorithm can detect moving objects like intruders very effectively in the noisy environment.

  • PDF