• Title/Summary/Keyword: Transient security

Search Result 53, Processing Time 0.025 seconds

Modeling of Unified Power Flow Controllers Using a Current Injection Method for Transient Stability Analysis (전류 주입형 방식의 UPFC 모델을 이용한 과도 안정도 해석)

  • Kim, Chon-Hoe;Park, Jung-Soo;Jang, Gil-Soo;Son, Kwang-M.;Kim, Tae-Kyun
    • Proceedings of the KIEE Conference
    • /
    • 2005.07a
    • /
    • pp.332-334
    • /
    • 2005
  • This paper presents a dynamic simulation of the unified power flow controller (UPFC) using a current injection method. Flexible AC Transmission System (FACTS) devices give more flexibility of control for security and economic operation of power systems. Diffculties of modeling UPFC in the conventional dynamic simulation programs arise from the fact that the injected voltage by the series inverter is superimposed on the shunt inverter side voltage. A solution can be a current injection method, in which a serial part of UPFC is converted to a parallel equivalent circuit using source transformation, and two current sources affect each other at every time step. To verify efficiency of this method, the proposed model is applied for the transient analysis of an example power system.

  • PDF

A Electrical Characteristic Simulation and Test for the Steady and Transient State in the 22.9kV HTS Cable Distribution System. (22-9kV배전계통에 대한 초전도케이블의 정상 및 과도상태에 대한 전기적 특성 시험 및 시뮬레이션 결과 검토)

  • Lee, Geun-Joon;Hwnag, Si-Dol;Yang, Byeong-Mo;Lee, Hyun-Chul
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.12
    • /
    • pp.2316-2321
    • /
    • 2009
  • With rapid development of world economics, electricity demand in metropolitan area has been increased dramatically. HTS(High Temperature Superconducting) cable is one of most promising technology to solve the bottleneck of electric network. However, HTS cable is not considered as matured technology yet to power system planners because of its different characteristics with conventional metal conductors. This paper suggests the comparison results of HTS cable simulation and experiment on steady state operation, also give the simulation results on transient characteristics of HTS cable components. This results could devote not only to discuss the security of HTS cable operation, but also to design power system oriented HTS cable.

Korean Power System Security Analysis Using Benchmark Systems

  • Cho Yoon-Sung;Jang Gilsoo
    • KIEE International Transactions on Power Engineering
    • /
    • v.5A no.3
    • /
    • pp.207-213
    • /
    • 2005
  • This paper deals with the development of benchmark systems based on the Korea Electric Power Corporation (KEPCO) system. A novel procedure for constructing a dynamic equivalent system of the KEPCO system is proposed. By using such a system, various scenarios can be simulated and compared with the original system. The results of the simulation show the benefits of the proposed equivalent system and its validity is confirmed by applying it to the KEPCO system.

Discrimination of Arcing Faults from Normal Distribution Disturbances by Wave form Distortion Analysis

  • Kim, C. J.
    • Journal of Electrical Engineering and information Science
    • /
    • v.1 no.2
    • /
    • pp.52-57
    • /
    • 1996
  • Detection of arcing high impedance faults has been a perplexing in the power distribution protection. Transient analysis of distribution disturbances for fault discrimination from other normal events is important for a secure protection of the power system. A simple parameter of wave form distortion quantification is used to analyze the behaviors of arcing faults and normal distribution disturbances. Theoretical perspectives of the transients were studied and actual disturbances were examined. From this investigation, a discrimination guideline based on the revised crest factor is developed. The discrimination method has a high potential to enhance the reliability and security for the distribution system protection.

  • PDF

Contribution of ERP/EEG Measurements for Monitoring of Neurological Disorders

  • Lamia Bouafif;Cherif Adnen
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.59-66
    • /
    • 2024
  • Measurable electrophysiological changes in the scalp are frequently linked to brain activities. These progressions are called related evoked potentials (ERP), which are transient electrical responses recorded by electroencephalography (EEG) in light of tactile, mental, or motor enhancements. This painless strategy is gradually being used as a conclusion and clinical help. In this article, we will talk about the main ways to monitor brain activities in people with neurological diseases like Alzheimer's disease by analyzing EEG signals using ERP. We will also talk about how this method helps to detect the disease at an early stage.

Fast and Secure 2-Way Handshake Mechanism using Sequence Number in Wireless LAN (순번을 이용한 고속의 안전한 무선 랜 2-Way 핸드쉐이크 기법)

  • Lim, Jeong-Mi
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.9
    • /
    • pp.1323-1332
    • /
    • 2009
  • In this paper, we analyze security weakness of 4-Way Handshake in IEEE 802.11i and propose fast and secure 2-Way Handshake mechanism. Compute PTK(Pairwise Transient Key) using sequence number instead of random numbers in order to protect Replay attack and DoS attack. Also, proposed 2-Way Handshake mechanism can mutual authenticate between mobile station and access point and derive PTK using modified Re-association Request and Re-association Response frames. And, compare with others which are fast and secure Handoff mechanisms.

  • PDF

A Fast Contingency Screening Algorithm for On-line Transient Security Assessment Based on Stability Index

  • Nam, Hae-Kon;Kim, Yong-Hak;Song, Sung-Geun;Kim, Yong-Gu
    • KIEE International Transactions on Power Engineering
    • /
    • v.2A no.4
    • /
    • pp.131-135
    • /
    • 2002
  • This paper describes a new ultra-fast contingency screening algorithm for on-line TSA without time simulation. All machines are represented in a classical model and the stability index is defined as the ratio between acceleration power during a fault and deceleration power after clearing the fault. Critical clustering of machines is done based on the stability index, and the power-angle curve of the critical machines is drawn assuming that the angles of the critical machines increase uniformly, while those of the non-critical ones remain constant. Finally, the critical clearing time (CCT) is computed using the power-angle curve. The proposed algorithm is tested on the KEPCO system comprised of 900-bus and 230-machines. The CCT values computed with the screening algorithm are in good agreement with those computed using the detailed model and the SIME method. The computation time for screening about 270 contingencies is 17 seconds with 1.2 GHz PC.

The bubble problem of the plasma facing material: A finite element study

  • Kang, Xiaoyan;Cheng, Xiyue;Deng, Shuiquan
    • Nuclear Engineering and Technology
    • /
    • v.52 no.10
    • /
    • pp.2290-2298
    • /
    • 2020
  • The damage of first wall material in fusion reactor due to the bubbles caused by plasma has been studied by introducing a relation between the von Mises equivalent stress and the temperature field. The locations and shapes of the bubbles and the synergetic effect between the different bubbles under steady operational conditions have been studied using the finite elements method. Under transient heat loads, plastic deformations have been found to occur, and are significantly enhanced by the presence of the bubbles. The calculated concentration locations of von Mises equivalent stress are well consistent with the observed crack positions of the tungsten surface in many test experiments. Our simulations show that the damage of the bubbles is not severe enough to lead to catastrophic failure of the tungsten armor; however, it can cause local and gradual detachment of tungsten surface, which provides a reasonable explanation for the observed pits and rough or hairy surface morphology etc. Considering the transient heat loads, the lower bound of the security thickness of the tungsten tile is estimated to be greater than 2 mm.

Application of Wavelet-Based RF Fingerprinting to Enhance Wireless Network Security

  • Klein, Randall W.;Temple, Michael A.;Mendenhall, Michael J.
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.544-555
    • /
    • 2009
  • This work continues a trend of developments aimed at exploiting the physical layer of the open systems interconnection (OSI) model to enhance wireless network security. The goal is to augment activity occurring across other OSI layers and provide improved safeguards against unauthorized access. Relative to intrusion detection and anti-spoofing, this paper provides details for a proof-of-concept investigation involving "air monitor" applications where physical equipment constraints are not overly restrictive. In this case, RF fingerprinting is emerging as a viable security measure for providing device-specific identification (manufacturer, model, and/or serial number). RF fingerprint features can be extracted from various regions of collected bursts, the detection of which has been extensively researched. Given reliable burst detection, the near-term challenge is to find robust fingerprint features to improve device distinguishability. This is addressed here using wavelet domain (WD) RF fingerprinting based on dual-tree complex wavelet transform (DT-$\mathbb{C}WT$) features extracted from the non-transient preamble response of OFDM-based 802.11a signals. Intra-manufacturer classification performance is evaluated using four like-model Cisco devices with dissimilar serial numbers. WD fingerprinting effectiveness is demonstrated using Fisher-based multiple discriminant analysis (MDA) with maximum likelihood (ML) classification. The effects of varying channel SNR, burst detection error and dissimilar SNRs for MDA/ML training and classification are considered. Relative to time domain (TD) RF fingerprinting, WD fingerprinting with DT-$\mathbb{C}WT$ features emerged as the superior alternative for all scenarios at SNRs below 20 dB while achieving performance gains of up to 8 dB at 80% classification accuracy.

A Snoop-Based Kernel Introspection System against Address Translation Redirection Attack (메모리 주소 변환 공격을 탐지하기 위한 Snoop기반의 커널 검사 시스템)

  • Kim, Donguk;Kim, Jihoon;Park, Jinbum;Kim, Jinmok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1151-1160
    • /
    • 2016
  • A TrustZone-based rootkit detecting solution using a secure timer ensures the integrity of monitoring system, because ARM TrustZone technology provides isolated environments from a monitored OS against intercepting and modifying invoke commands. However, it is vulnerable to transient attack due to periodic monitoring. Also, Address Translation Redirection Attack (ATRA) cannot be detected, because the monitoring is operated by using the physical address of memory. To ameliorate this problem, we propose a snoop-based kernel introspection system. The proposed system can monitor a kernel memory in real-time by using a snooper, and detect memory-bound ATRA by introspecting kernel pages every context switch of processes. Experimental results show that the proposed system successfully protects the kernel memory without incurring any significant performance penalty in run-time.