• Title/Summary/Keyword: Security limits

Search Result 166, Processing Time 0.025 seconds

Fitness Sharing Particle Swarm Optimization Approach to FACTS Installation for Transmission System Loadability Enhancement

  • Chang, Ya-Chin
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.1
    • /
    • pp.31-39
    • /
    • 2013
  • Proper installation of Flexible AC Transmission Systems (FACTS) devices in existing transmission networks can enable power systems to accommodate more power transfer with less network expansion cost. The problem to maximize transmission system loadability by determining optimal locations and settings for installations of two types of FACTS devices, namely static var compensator (SVC) and thyristor controlled series compensator (TCSC), is formulated as a mixed discrete-continuous nonlinear optimization problem (MDCP). For solving the MDCP, in the paper, the proposed method with fitness sharing technique involved in the updating process of the particle swarm optimization (PSO) algorithm, can diversify the particles over the search regions as much as possible, making it possible to achieve the optimal solution with a big probability. The modified IEEE-14 bus network and a practical power system are used to validate the proposed method.

Lightweight Cryptography and RFID: Tackling the Hidden Overhead

  • Poschmann, Axel;Robshaw, Matthew J.B.;Vater, Frank;Paar, Christof
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.2
    • /
    • pp.98-116
    • /
    • 2010
  • The field of lightweight cryptography has developed significantly over recent years and many impressive implementation results have been published. However these results are often concerned with a core computation and when it comes to a real implementation there can be significant hidden overheads. In this paper we consider the case of cryptoGPS and we outline a full implementation that has been fabricated in ASIC. Interestingly, the implementation requirements still remain within the typically-cited limits for on-the-tag cryptography.

A Study on the Risk Management in International Transaction of Digital Goods (디지털물(物) 국제법래(國際去來)의 리스크관리방안(管理方案)에 관한 연구(硏究))

  • Ahn, Byung-Soo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.29
    • /
    • pp.143-172
    • /
    • 2006
  • This study focuses on the risk management of "Digital Goods" appeared with the progress of information technology(IT) in international transaction. As a result of that digital goods have a lot of uncertainty between the general goods or service which have been deal with object of international transaction broadly because digital goods hold uniqueness. In this study, the author give a definition of "Digital Goods" and make an examination of uniqueness of that in international transaction. Next, six risks are defined base on risk theory and risk analysis matrix applying risk mapping model is made. Conclusionally, risk transfer as insurance is adequate to manage business risk, security risk, credit risk and legal risk. Meanwhile, risk avoidance is adequate to manage reputation risk and market risk. But, this study have following three limits. Firstly, concerning definition of the risk, real case is not applied owing to lack of transaction data. Secondly, measuring of the risk is not based on absolute data but relative data. Lastly, suggesting way of risk management is not concrete and practical to international trader of digital goods.

  • PDF

A Study on Open of Information Data and Privacy Rights

  • Kim, Taek
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.11
    • /
    • pp.73-78
    • /
    • 2016
  • All citizens will not be infringed communications rub. That can be seen to have the privacy freedom.lot (Internet of things) have released a security system in the era of information privacy appear that public safety and threat. Currently, Information and communication devices can be use criminal investigation, including search and seizure confirmed the fact communication of the communication restriction information storage medium for the common purpose of providing material system, the system provides data and communications. This paper focused on Privacy and open of information data by the Prosecutor and Police in korea. Privacy rights include that transparency information, communication, and protections for the rights of the individuals. It is necessary to be lawfulness of processing, individuals consent while Prosecutors investigations. especially we need explicit condition and National agency need to obtain in order to legitimize their processing of personal information data. The author emphasize are as follows: first, to examine Privacy rights information' necessity and problem, second, to understand Privacy rights and limits, third, to suggest improvements for the purpose of Transparency, codes of conduct and Democracy of information.

HYPERSTABILITY OF A SUM FORM FUNCTIONAL EQUATION RELATED DISTANCE MEASURES

  • Lee, Young Whan
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.33 no.1
    • /
    • pp.147-156
    • /
    • 2020
  • The functional equation related to a distance measure f(pr, qs) + f(ps, qr) = M(r, s)f(p, q) + M(p, q)f(r, s) can be generalized a sum form functional equation as follows $${\frac{1}{n}}{\sum\limits_{i=0}^{n-1}}f(P{\cdot}{\sigma}_i(Q))=M(Q)f(P)+M(P)f(Q)$$ where f, g is information measures, P and Q are the set of n-array discrete measure, and σi is a permutation for each i = 0, 1, ⋯, n-1. In this paper, we obtain the hyperstability of the above type functional equation.

Identification and SWOT analysis of ecological and security issues of battery electric vehicles

  • Sanjeev Kumar;Amit Pal
    • Advances in Energy Research
    • /
    • v.8 no.3
    • /
    • pp.165-174
    • /
    • 2022
  • Environmental sustainability is critical; else, the whole planet would face climatic disasters in the near future. A transportation system based on electric vehicles is assumed to be capable of providing long-term mobility. However, despite several attempts by national and international authorities, a great aim could not be met in India or the rest of the globe. Existing electric cars have a number of limits and obstacles. This report highlighted significant environmental and safety-related constraints that contribute to the low adoption rate of BEVs in India. A SWOT analysis was also carried out to identify the important elements influencing the future of BEV penetration in India.

The limits in legislating and the methods for improving the current 'National Guidelines on Anti-Terror Activities' (현행 '국가대테러활동지침'의 문제점과 입법적 개선방안에 관한 연구)

  • Kim, Soon-Seok;Shin, Jae-Chul
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.95-117
    • /
    • 2009
  • Ever since the 9/11 terror attack, all the world has perceived the need and taken actions to make an anti-terror law, however The Republic of Korea has not yet come up with any relevant output. Currently, the Korean government apportions duties to each related government agency and sets up systems for cooperation among them to make preparations against and cope with terror threats, according to The National Guidelines on Anti-Terror Activities (the presidential directive number 47 given on January 21, 1982). However, the directive has many limits and shortcomings in coping with national emergencies. In this situation, this research aims to compare the national anti-terror laws of others countries with Korea's, in order to understand the problems in Korea, i.e., that The National Guidelines on Anti-Terror Activities, which are the only anti-terror regulations in Korea do not clearly describe the concept and range of a terror, that national anti-terror meetings and the anti-terror standing committee have problems with their operation, that the Terrorism Information Integration Center has also its own problems, and that Korea lacks in preparatory actions against terror crimes and there are still problems about investigations into terror incidents. In order to solve these problems for the future, the present author suggests that the purpose of the law on The National Guidelines on Anti-Terror Activities shall be re-established so as to meet the current anti-terror conditions of Korea, the concept of a terror and anti-terror activities shall be clarified, anti-terror organizations shall be unified, the chair of the anti-terror standing committee shall be appointed legally and automatically according to the relevant rule and be given more rights so as to have free access to private information for anti-terror activities and terror-related information, and systems shall be supplemented for reporting terror-involved persons and funds.

  • PDF

Analysis and countermeasure of causes of inducing violence of private security companies on the actual sites of administrative execution by proxy (행정대집행 현장에서 민간경비업체의 폭력 유발 원인 분석과 대책)

  • Choi, Kee-Nam
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.119-141
    • /
    • 2009
  • Administrative execution by proxy is one of forced executions of administration and is also called as "enforced execution by proxy" in which administration institutions or the third party executes by proxy on behalf of parties who did not execute obligations under administration law and files claims to compensate expenses required in the proxy execution. Despite the actual site of administrative execution by law, social problems are generated because various violence and behaviors of infringement of human rights between executer and obligator are rampant and thus causing human damages since forced execution by physical force is carried out and cases of police indictments and petition to human rights committee are gradually increasing. Majority of people mobilized in this actual site of violence are supplied by private security companies which provide service contract and mobilization of people without qualification of guards or security service and irrational execution by proxy and violent actions by so-called service hooligans connected to violence organizations are now becoming social issues. In these actual sites of violence, structurally very complicated problems such as economic rights, right of residence, struggle for living, and intervention by outsiders are contained. This thesis has analyzed causes of outbreaks of violence and discussed about improvement countermeasure by paying attention to mobilization of people by private security companies. As the result, through revision and improvement of laws and systems, execution institution and policemen must be present at actual sites of execution by proxy to control physical execution of private security companies to be carried out legally and when violent collisions are occurring, it shall be stipulated that police should immediately intervene. Practices of execution by proxy of execution administration institutions shall be avoided and causes of occurrences of violence shall be eliminated by discrete decisions of execution by proxy, elimination of service contract conditions focused on accomplishments, and stipulation of responsibility of execution institutions when problems occur. Practices of solving petitions through collective actions of obligators shall be eliminated and strict enforcement of laws such as disturbance of official execution or compensation claims for expenses of execution by proxy must be carried out and intervention by the third parties must be intercepted. Mobilization of manpower by security companies shall be limited to people with prior registration who have acquired and finished qualification and education by security business law and before putting them on actual sites, it shall be obliged that execution plan with clear written records of working location, mission, and work rules must be submitted in advance to police station in charge and also they must be controlled to follow laws and statutes such as uniform and equipments. In addition, personal criminal responsibility for violent actions must be clearly stipulated and advanced securing soundness of security companies such as limits of service contracts with records of accidents is required. Order placement behaviors of special organizations under the pretext of rehabilitation business must be eradicated and companies with capability and strong intention of observation of laws must be able to receive orders by intercepting chains of contracts and sub-contracts. Issues of improvement countermeasure of social problem, living, and compensation including rights of residence and environment are excluded from the discussion.

  • PDF

A Study on the Relationship between Industrial Espionage, Self-Control, and Organizational Commitment (산업기술유출과 자기통제력, 조직애착도의 관계에 관한 연구)

  • Hwang, Hyun-Dong;Lee, Chang-Moo
    • Korean Security Journal
    • /
    • no.47
    • /
    • pp.119-137
    • /
    • 2016
  • In a recent period, it becomes more and more important to keep the cutting-edge industrial technology secured. This is because competitive technology appears to be a cornerstone of national power. Although the industrial espionage must be an illegal behavior or a kind of white-collar crime, there has been few researches on industrial espionage from a criminological perspective. This study investigates the relationship between industrial espionage, self-control, and organizational commitment. The hypotheses of this study were found to be statistically significant. The hypothesis 1 that the high self-control reduces the possibility of industrial espionage was accepted, and the hypothesis 2 that the high organizational commitment reduces the possibility of industrial espionage was also accepted. This results showed that self-control and organizational commitment were the key factors to prevent industrial espionage, which eventually reinforces industrial security. This study used a convenient sampling, which might be the limits of this study. By using a convenient sampling, the result of the study could not depend on representative sample. Nonetheless, this study was trying to explore the relationship between industrial espionage, self-control, and organizational commitment which was not researched yet. The purpose of this study is to contribute to find out the criminological causes of industrial espionage and eventually to prevent it.

  • PDF

The Examination and Development Plan of Maritime Policing Act ("해양경비법" 검토와 발전방안)

  • Roh, Ho-Rae
    • Korean Security Journal
    • /
    • no.32
    • /
    • pp.95-122
    • /
    • 2012
  • The ocean in the 21st century is getting emphasized as a treasury of natural resources and a growth engine for the nation. And nations around the world have entered into the hyper-competition to take the initiative for those marine resources. Under the situation, the Korea Coast Guard is devoting itself with full force to protecting maritime sovereignty, ensuring maritime safety and security and preserving the marine environment. Purpose of this study is to analyze Maritime Policing Act of 2012 and their problems and to suggest improvement measures. Objectives of Maritime Policing Act of 2012 is national Defence, policing for maritime security, protection of marine natural resources and marine facility in territorial waters and exclusive economic zone(EEZ) of Korea. Limits of Maritime Policing Act of 2012 are as follows. First, As organization related rules in Maritime Policing Act of 2012 are not enough, Maritime police agency Act should be revised and enacted in order to cope with future administrative demands and legal ground. Second, Article 22 penal regulation is more severe than regulations of another Act. Third, Article 14 should be made improvement for pre-prevention through the pre-report and the establishment of prohibition boundary in maritime demonstration.

  • PDF