• 제목/요약/키워드: Security transmission

검색결과 871건 처리시간 0.027초

송전계통 안전도 제약조건을 반영한 급전계획 알고리즘 개발에 관한 연구 (An Approach for Optimal Dispatch Scheduling Incorporating Transmission Security Constraints)

  • 정구형;김발호
    • 대한전기학회논문지:전력기술부문A
    • /
    • 제54권12호
    • /
    • pp.597-602
    • /
    • 2005
  • The introduction of competition in electricity market emphasizes the importance of sufficient transmission capacities to guarantee various electricity transactions. Therefore, when dispatch scheduling, transmission security constraints should be considered for the economic and stable electric power system operation. In this paper, we propose an optimal dispatch scheduling algorithm incorporating transmission security constraints. For solving these constraints, the dispatch scheduling problem is decomposed into a master problem to calculate a general optimal power flow (OPF) without transmission security constraints and several subproblems to inspect the feasibility of OPF solution under various transmission line contingencies. If a dispatch schedule given by the master problem violates transmission security constraints, then an additional constraint is imposed to the master problem. Through these iteration processes between the master problem and subproblems, an optimal dispatch schedule reflecting the post-contingency rescheduling is derived. Moreover, since interruptible loads can positively participate as generators in the competitive electricity market, we consider these interruptible loads active control variables. Numerical example demonstrates efficiency of the proposed algorithm.

전술통신 환경에서 전송 성능 분석 및 보안 정책 (The Transmission Performance Analysis and Security Policy in Tactical Communication Environment)

  • 홍진근
    • 디지털융복합연구
    • /
    • 제11권12호
    • /
    • pp.303-309
    • /
    • 2013
  • 본 논문에서는 미군 전술통신 운용환경과 정책, 전술링크에서 보안정책 및 전달성능을 분석하였다. 운용환경에서는 운용통신 메시지와 반자동 전투력을 지원하는 프레임워크, 링크계층의 SINCGARS 사양을 살펴보았고, 전술 보안정책에서 COMSEC 정책과 응용계층 보안을 분석하였다. 또한 전술 통신환경에서 전송 성능 및 보안 동기 검출 측면에서 분석하였다. 전술링크와 COMSEC 보안정책은 AFKDMS, AKMS, RBECS, KIV-7/HSB 암호디바이스와 같은 측면에서 분석하였다.

E-Discovery를 위한 디지털 증거 전송시스템에 대한 연구 (A Study on Digital Evidence Transmission System for E-Discovery)

  • 이창훈;백승조;김태완;임종인
    • 정보보호학회논문지
    • /
    • 제18권5호
    • /
    • pp.171-180
    • /
    • 2008
  • 2006년 12월 미국의 민사소송규칙(FRCP) 개정으로 e-discovery(전자증거개시) 제도가 시행되고 있으나, 이 제도는 디지털 증거의 관리와 제출과정에서 발생할 수 있는 과도한 비용과 시간의 낭비와 같은 다양한 문제점들을 가지고 있다. 현재 e-discovery 제도의 국내 도입 논의가 진행되고 있는 상황에서 본 논문에서는 e-discovery의 절차 중 디지털 증거를 소송상대방에게 제출하는 production 단계에서 발생할 수 있는 민감한 자료 유출, 읽기 불가능, 위 변조 및 손상 등과 같은 문제점에 대해 살펴보고, 이 문제점들을 해결하고 비용과 시간의 낭비를 최소화 할 수 있는 안전한 온라인 디지털 증거 전송 시스템을 제안한다.

A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data

  • Lin, Weiwei;Yang, Chaofan;Zhang, Zeqing;Xue, Xingsi;Haga, Reiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권12호
    • /
    • pp.4531-4544
    • /
    • 2021
  • Because the traditional network information security vulnerability risk assessment method does not set the weight, it is easy for security personnel to fail to evaluate the value of information security vulnerability risk according to the calculation value of network centrality, resulting in poor evaluation effect. Therefore, based on the network security data element feature system, this study designed a quantitative assessment method of network information security vulnerability detection risk under single transmission state. In the case of single transmission state, the multi-dimensional analysis of network information security vulnerability is carried out by using the analysis model. On this basis, the weight is set, and the intrinsic attribute value of information security vulnerability is quantified by using the qualitative method. In order to comprehensively evaluate information security vulnerability, the efficacy coefficient method is used to transform information security vulnerability associated risk, and the information security vulnerability risk value is obtained, so as to realize the quantitative evaluation of network information security vulnerability detection under single transmission state. The calculated values of network centrality of the traditional method and the proposed method are tested respectively, and the evaluation of the two methods is evaluated according to the calculated results. The experimental results show that the proposed method can be used to calculate the network centrality value in the complex information security vulnerability space network, and the output evaluation result has a high signal-to-noise ratio, and the evaluation effect is obviously better than the traditional method.

Application of SA-SVM Incremental Algorithm in GIS PD Pattern Recognition

  • Tang, Ju;Zhuo, Ran;Wang, DiBo;Wu, JianRong;Zhang, XiaoXing
    • Journal of Electrical Engineering and Technology
    • /
    • 제11권1호
    • /
    • pp.192-199
    • /
    • 2016
  • With changes in insulated defects, the environment, and so on, new partial discharge (PD) data are highly different from the original samples. It leads to a decrease in on-line recognition rate. The UHF signal and pulse current signal of four kinds of typical artificial defect models in gas insulated switchgear (GIS) are obtained simultaneously by experiment. The relationship map of ultra-high frequency (UHF) cumulative energy and its corresponding apparent discharge of four kinds of typical artificial defect models are plotted. UHF cumulative energy and its corresponding apparent discharge are used as inputs. The support vector machine (SVM) incremental method is constructed. Examples show that the PD SVM incremental method based on simulated annealing (SA) effectively speeds up the data update rate and improves the adaptability of the classifier compared with the original method, in that the total sample is constituted by the old and new data. The PD SVM incremental method is a better pattern recognition technology for PD on-line monitoring.

Geometric structure and electronic behavior of Rh decorating effect on zigzag CNTs (n=7-12): A DFT study

  • Cui, Hao;Zhang, Xiaoxing;Zhou, Yongjian;Zhang, Jun
    • Carbon letters
    • /
    • 제26권
    • /
    • pp.61-65
    • /
    • 2018
  • Comprehensive calculations of the Rh decoration effect on zigzag CNTs with n ranging from 7 to 12 were conducted in this work to understand the effect of Rh doping on geometric structures and electronic behaviors upon metallic and semiconducting CNTs. The obtained results indicated that Rh dopant not only contributes to the deformation of C-C bonds on the sidewall of CNTs, but also transforms the electron distribution of related complexes, thereby leading to a remarkable increase of the conductivity of pure CNTs given the emerged novel state within the energy gap for metallic CNTs and the narrowed energy gap for semiconducting CNTs. Our calculations will be meaningful for exploiting novel CNT-based materials with better sensitivity to electrons and higher electrical conductivity compared with pure CNTs.

Computationally Efficient 2-D DOA Estimation Using Two Parallel Uniform Linear Arrays

  • Cao, Hailin;Yang, Lisheng;Tan, Xiaoheng;Yang, Shizhong
    • ETRI Journal
    • /
    • 제31권6호
    • /
    • pp.806-808
    • /
    • 2009
  • A new computationally efficient algorithm-based propagator method for two-dimensional (2-D) direction-of-arrival (DOA) estimation is proposed, which uses two parallel uniform linear arrays. The algorithm takes advantage of the special structure of the array which enables 2-D DOA estimation without pair matching. Simulation results show that the proposed algorithm achieves very accurate estimation at a computational cost 4 dB lower than that of standard methods.

Suppression of Glow Corona on Streamer and Influence of Thin Wire on its Inception

  • Sima, Wenxia;Fan, Shuochao;Yang, Qing;Wang, Qi
    • Journal of Electrical Engineering and Technology
    • /
    • 제10권4호
    • /
    • pp.1759-1764
    • /
    • 2015
  • Glow corona is a kind of streamer-free corona that can suppress upward leaders in transmission lines. Thus, it has good application potential in lightning protection. This paper investigates its corona characteristics. The suppression characteristic of glow corona on streamer is studied in air gap under negative DC voltage by wrapping thin wires on the electrode. The effect of thin wire winding patterns on the gap breakdown voltage is analyzed. Results are considered to be attributed to the inception condition of glow corona. Thus an inception test of glow corona is also conducted, and the inception voltage is obtained. Results show that the inception voltage decreases with short winding pitch. Thus an investigation on the inception of glow corona influenced by thin wire is conducted, and an influential factor is proposed to evaluate the influence. The inception regular of thin wire glow corona presented in this paper has certain reference value for the application of glow corona in transmission lines.

An Approach to Optimal Dispatch Scheduling Incorporating Transmission Security Constraints

  • Chung, Koo-Hyung;Kang, Dong-Joo;Kim, Balho H.;Kim, Tai-Hoon;Oh, Tae-Kyoo
    • Journal of Electrical Engineering and Technology
    • /
    • 제3권2호
    • /
    • pp.199-206
    • /
    • 2008
  • The introduction of competition in electricity markets emphasizes the importance of sufficient transmission capacities to guarantee effective power transactions. Therefore, for the economic and stable electric power system operation, transmission security constrains should be incorporated into the dispatch scheduling problem. With the intent to solve this problem, we decompose a dispatch scheduling problem into a master problem(MP) and several subproblems(SPs) using Benders decomposition. The MP solves a general optimal power flow(OPF) problem while the SPs inspect the feasibility of OPF solution under respective transmission line contingencies. If a dispatch scheduling solution given by the MP violates transmission security constraints, then additional constraints corresponding to the violations are imposed to the MP. Through this iterative process between the MP and SPs, we derive an optimal dispatch schedule incorporating the post-contingency corrective rescheduling. In addition, we consider interruptible loads as active control variables since the interruptible loads can participate as generators in competitive electricity markets. Numerical examples demonstrate the efficiency of the proposed algorithm.

Secure Cluster Selection in Autonomous Vehicular Networks

  • Mohammed, Alkhathami
    • International Journal of Computer Science & Network Security
    • /
    • 제23권1호
    • /
    • pp.11-16
    • /
    • 2023
  • Vehicular networks are part of the next generation wireless and smart Intelligent Transportation Systems (ITS). In the future, autonomous vehicles will be an integral part of ITS and will provide safe and reliable traveling features to the users. The reliability and security of data transmission in vehicular networks has been a challenging task. To manage data transmission in vehicular networks, road networks are divided into clusters and a cluster head is selected to handle the data. The selection of cluster heads is a challenge as vehicles are mobile and their connectivity is dynamically changing. In this paper, a novel secure cluster head selection algorithm is proposed for secure and reliable data sharing. The idea is to use the secrecy rate of each vehicle in the cluster and adaptively select the most secure vehicle as the cluster head. Simulation results show that the proposed scheme improves the reliability and security of the transmission significantly.