• Title/Summary/Keyword: Violation

Search Result 858, Processing Time 0.032 seconds

A Study on Metering Data De-identification Method for Smart Grid Privacy Protection (스마트그리드 개인정보보호를 위한 미터링 데이터 비식별화 방안 연구)

  • Lee, Donghyeok;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1593-1603
    • /
    • 2016
  • In the smart grid environment, there are various security threats. In particular, exposure of smart meter data can lead to serious privacy violation. In this paper, we propose a method for de-identification method of metering data. The proposed method is to de-identify the time data and the numeric data, respectively. Therefore, it can't analyze the pattern information from the metering data. In addition, there is an advantage that the query is available, such as the range of search in the database for statistical analysis.

Section Voltage Calculation while a Loop Operation by Tie-Switch Close in a Distribution Management System (배전운영 시스템에서 상시개방 연계 스위치 투입에 의한 루프 운전 중 구간전압 계산 방법)

  • Seo, Jeong-Soo;Lim, Il-Hyung;Park, Jong-Ho;Shin, Yonh-Hak;Choi, Myeon-Song
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.3
    • /
    • pp.397-403
    • /
    • 2016
  • Generally, an electrical distribution configuration is a radial system with one-way current in a distribution management system (DMS). All feeders in a DMS have tie-switches to make radial system. Sometimes, DMS should change a tie-switch for operation. In that case, the tie-switch has to be closed first; then a switch is opened as another tie-switch in order to prevent blackout for customers. At the moment when the tie-switch is closed, distribution system is operated in a loop state, not radial. Before the loop operation, DMS operator has to check any expected events for stable distribution system operation; and the most important event is a mis-operation of a protection relay. In addition, DMS operator should check voltage profile violation but a calculation method of section voltages had not been used. Thus, this paper proposes a calculation method of section voltages at a loop operation in a DMS. The proposed calculation algorithm is verified by Matlap Simulink.

Application Management System with ZeroMQ and Alarms in Distribution Management System (배전운영 시스템에서의 ZeroMQ와 알람 정보를 이용한 운영기능 관리 시스템)

  • Kim, Pil-Seok;Kang, Ho-Young;Lim, Il-Hyung;Park, Jong-Ho;Shin, Yong-Hak
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.64 no.8
    • /
    • pp.1161-1167
    • /
    • 2015
  • Distribution Management System(DMS) ienhancing distribution automation system-based operation efficiency is an optimized system by various operational applications in a distribution network. DMS employs various applications like topology reconfiguration, volt/var control, and restoration at events such as overload, voltage violation, and a fault in a distribution system. An operation efficiency to employ multi-applications as restoration with short-term load forecasting is higher than a performance by a single application; and the applications are accomplished by an operator’s control. Applications’ combination is determined by various alarm information which means critical issues in order to operate a distribution system. Thus, this paper proposes an application management system which can configure application combination, control applications depending on alarm information and check their performance condition. The proposed application management system can be customized by operator easily and have high operation efficiency and reliability because it is worked by reviewed alarm information from operator.

Management Protocols of Global Transaction Based on Transaction State Transitions in an Optimistic 2-phase Commit Protocol (낙관적 2단계 완료 규약에서 트랜잭션 상태전이를 기반으로 한 전역 트랜잭션 관 리 규약)

  • Sin, Dong-Cheon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.6
    • /
    • pp.1365-1374
    • /
    • 1996
  • To alleviate the blocking inherent in 2-phase commit protocol(2PC) that is widely used to ensure the atomicity of global transactions in distributed environments, an optimistic 2PC can be used. Under the optimistic 2PC, compensation transactions are introduced to ensure the atomicity of transactions, which may result in the violation of global serializability due to the properties of compensation, transactions. In this paper, we propose several valid management protocols for global transactions to ensure the global serializability through the analysis of transaction of state transitions. To determine the execution of one global transaction, the proposed protocols check the sates of other concurrent global transactions. According to the result, execution of the global transaction may be delayed to ensure the global serializability.

  • PDF

Assessment of Probabilistic Total Transfer Capability Considering Uncertainty of Weather (불확실한 날씨 상태를 고려한 확률론적 방법의 총 송전용량 평가)

  • Park Jin-Wook;Kim Kyu-Ho;Shin Dong-Jun;Song Kyung-Bin;Kim Jin-O
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.55 no.1
    • /
    • pp.45-51
    • /
    • 2006
  • This paper proposes a method to evaluate the Total Transfer Capability (TTC) by considering uncertainty of weather conditions. TTC is limited not only by the violation of system thermal and voltage limits, but also restricted by transient stability limit. Impact of the contingency on the power system performance could not be addressed in a deterministic way because of the random nature of the system equipment outage and the increase of outage probability according to the weather conditions. For these reasons, probabilistic approach is necessary to realize evaluation of the TTC. This method uses a sequential Monte Carlo simulation (MCS). In sequential simulation, the chronological behavior of the system is simulated by sampling sequence of the system operating states based on the probability distribution of the component state duration. Therefore, MCS is used to accomplish the probabilistic calculation of the TTC with consideration of the weather conditions.

A Study on Cognition about Copyright of Digital Works

  • Lee, Yong-Whan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.5
    • /
    • pp.41-49
    • /
    • 2017
  • Digital works such as computer programs, music, photographs, movies and dramas are copyrighted. Even if there were more than 1,000 violations per year for digital works, the punishment was very weak. Especially copyright infringement by teenager is increasing. This study aims to present the direction of future development through questionnaires on the perception and direction of college students about copyright. 157 college students were surveyed about copyright awareness, perception of detailed legal provisions, cost of monthly expenses, copyright violation, and direction of copyright protection. As a result of the questionnaire survey, awareness was high at 69%, but in detailed law was low at 17.2% and 22.3%. In the future direction of copyright policy, 72.6% of them answered that they should be "strengthened" and "more and more strengthened". In order to protect copyrights, enforcement of crackdowns, public relations activities, expansion of the legal market, and technical protection should be done. In order to do this, copyright-related education for elementary, middle, high school and college students are needed more and it is necessary to expand the legal market where high quality contents are traded. More research is needed on copyright protection technological methods.

Park Tae-hwan v. The Korean Olympic Committee: The Breakdown of Sports Jurisprudence in Korea

  • Phillips, Joe;Lim, Suk-Jun
    • Journal of Arbitration Studies
    • /
    • v.26 no.3
    • /
    • pp.93-119
    • /
    • 2016
  • Park Tae-hwan, the Korean Olympic gold medal swimmer, was suspended for eighteen months by the International Swimming Federation (FINA) in September 2014. Park completed his suspension in March 2016, but the Korea Olympic Committee (KOC), relying on its Article 5.6, then prohibited him from joining the national team for an additional three years for the same doping violation. The KOC's penalty exceeded that provided by the World Anti-Doping Code, which governs the Olympics and most international sports federations, and contravened well-established precedent from the Court of Arbitration for Sport (CAS). The KOC, along with the Korea Swimming Federation, maintained the suspension until decisions by the Seoul Eastern District Court and CAS forced them to retract the penalty. We describe the sports regulations and arbitration decisions governing the Park case, how each side used the law to support their positions, the flaws in the KOC's legal analysis, and the case's resolutions by the Korean court and CAS. Finally, because this legal conflict has damaged the KOC's reputation, created uncertainty over the committee's doping penalties, and undercut the authority of the World Anti-Doping Code and the CAS in Korea, we recommend institutional changes in Korea's sports jurisprudence.

A Study on the RFID Security Technologies in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 RFID보안 기술에 대한 연구)

  • Bang Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.6 no.4
    • /
    • pp.267-272
    • /
    • 2005
  • The ubiquitous computing environment is a new paradigm that represents the future life and is expected to bring about great changes in IT and in the lives of individuals. However, since a good deal of information can be easily obtained and shared in the ubiquitous computing environment, problems such as a security threat and infringement of privacy are getting serious. The present study is intended to explore some ways to minimize such problems by introducing RFID technology in the ubiquitous computing environment. This study also examines the causes of violation of security and privacy that might occur in the RFID system and requirement for security. In addition it seeks possible technical solutions to those causes.

  • PDF

Against the Asymmetric CP- V2 Analysis of Old English

  • Yoon, Hee-Cheol
    • Korean Journal of English Language and Linguistics
    • /
    • v.4 no.2
    • /
    • pp.117-149
    • /
    • 2004
  • The paper is to argue against the asymmetric CP-V2 analysis of Old English, according to which finite verbs invariably undergo movement into a clause-final T within subordinate clauses and reach the functional head C within main clauses. The asymmetric CP-V2 analysis, first of all, faces difficulty in explaining a wide range of post-verbal elements within subordinate clauses. To resolve the problem, the analysis has to abandon the obligatoriness of V-to-T movement or introduce various types of extraposition whose status is dubious as a legitimate syntactic operation. Obligatory V-to-T movement in Old English lacks conceptual justification as well. Crosslinguistic evidence reveals that morphological richness in verbal inflection cannot entail overt verb movement. Moreover, the operation is always string-vacuous under the asymmetric CP- V2 analysis and has no effect at the interfaces, in violation of the principle of economy. The distribution of Old English finite verbs in main clauses also undermines the asymmetric CP-V2 analysis. Conceptually speaking, a proper syntactic trigger cannot be confirmed to motivate obligatory verb movement to C. The operation not only gets little support from nominative Case marking, the distribution of expletives, or complementizer agreement but also requires the unconvincing stipulation that expletives as well as sentence-initial subjects result from string-vacuous topicalization. Finally, textual evidence testifies that Old English sometimes permits non-V2 ordering patterns, many of which remain unexplained under the asymmetric CP-V2 analysis.

  • PDF

A Study of Security Issues of Cognitive Radio Network (인지 무선통신 네트워크의 보안 문제 연구)

  • Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.662-665
    • /
    • 2011
  • The cognitive radio (CR) network has been studied in the form of open source by vast number of communities, and the potential expectation is very high since the CR is based on reprogrammable platform. However, this characteristics of open-source software take high risk as well. As the peer-to-peer software has been abused, so high is the chance that the CR network can be abused public wide. Consequently, the benefit from the study of next-generation wireless network can be at risk because of the negative impact of violation of communication law or abusing the CR. In this contribution, we analyze the issues and the problems of the CR and discuss an efficient measure against security attacks.

  • PDF