• 제목/요약/키워드: Violation

검색결과 858건 처리시간 0.028초

스마트그리드 개인정보보호를 위한 미터링 데이터 비식별화 방안 연구 (A Study on Metering Data De-identification Method for Smart Grid Privacy Protection)

  • 이동혁;박남제
    • 정보보호학회논문지
    • /
    • 제26권6호
    • /
    • pp.1593-1603
    • /
    • 2016
  • 스마트그리드 환경에서는 기존 전력망과 정보통신기술이 접목됨에 따라 다양한 보안 위협 요소가 존재한다. 특히, 스마트 미터링 데이터는 사용자의 생활 패턴, 사용 기기 등 다양한 정보를 노출하며, 심각한 개인정보 침해로 이어질 수 있으므로 미터링 데이터에 적합한 비식별화 알고리즘이 필요한 상황이다. 따라서 본 논문에서는 미터링 데이터에 대한 새로운 비식별화 방안을 제안하였다. 제안한 방법은 시간정보와 수치정보를 각각 비식별화 데이터로 처리하여 해당 데이터만으로는 패턴 정보를 분석할 수 없도록 하였다. 또한, 통계처리 및 가용성을 위하여 비식별화된 상태에서도 데이터베이스에서 직접 범위검색, 집계처리 등의 질의가 가능하다는 장점을 가진다.

배전운영 시스템에서 상시개방 연계 스위치 투입에 의한 루프 운전 중 구간전압 계산 방법 (Section Voltage Calculation while a Loop Operation by Tie-Switch Close in a Distribution Management System)

  • 서정수;임일형;박종호;신용학;최면송
    • 전기학회논문지
    • /
    • 제65권3호
    • /
    • pp.397-403
    • /
    • 2016
  • Generally, an electrical distribution configuration is a radial system with one-way current in a distribution management system (DMS). All feeders in a DMS have tie-switches to make radial system. Sometimes, DMS should change a tie-switch for operation. In that case, the tie-switch has to be closed first; then a switch is opened as another tie-switch in order to prevent blackout for customers. At the moment when the tie-switch is closed, distribution system is operated in a loop state, not radial. Before the loop operation, DMS operator has to check any expected events for stable distribution system operation; and the most important event is a mis-operation of a protection relay. In addition, DMS operator should check voltage profile violation but a calculation method of section voltages had not been used. Thus, this paper proposes a calculation method of section voltages at a loop operation in a DMS. The proposed calculation algorithm is verified by Matlap Simulink.

배전운영 시스템에서의 ZeroMQ와 알람 정보를 이용한 운영기능 관리 시스템 (Application Management System with ZeroMQ and Alarms in Distribution Management System)

  • 김필석;강호영;임일형;박종호;신용학
    • 전기학회논문지
    • /
    • 제64권8호
    • /
    • pp.1161-1167
    • /
    • 2015
  • Distribution Management System(DMS) ienhancing distribution automation system-based operation efficiency is an optimized system by various operational applications in a distribution network. DMS employs various applications like topology reconfiguration, volt/var control, and restoration at events such as overload, voltage violation, and a fault in a distribution system. An operation efficiency to employ multi-applications as restoration with short-term load forecasting is higher than a performance by a single application; and the applications are accomplished by an operator’s control. Applications’ combination is determined by various alarm information which means critical issues in order to operate a distribution system. Thus, this paper proposes an application management system which can configure application combination, control applications depending on alarm information and check their performance condition. The proposed application management system can be customized by operator easily and have high operation efficiency and reliability because it is worked by reviewed alarm information from operator.

낙관적 2단계 완료 규약에서 트랜잭션 상태전이를 기반으로 한 전역 트랜잭션 관 리 규약 (Management Protocols of Global Transaction Based on Transaction State Transitions in an Optimistic 2-phase Commit Protocol)

  • 신동천
    • 한국정보처리학회논문지
    • /
    • 제3권6호
    • /
    • pp.1365-1374
    • /
    • 1996
  • 분산 환경하에서 전역 트랜잭션의 원자성을 보장하기 위해 보편적으로 사용하는 2단계 완료규약(2PC)의 블록킹 현상을 완화하기 위해 낙관적 2PC를 사용할 수 있다. 낙관적 2PC는 보상 트랜잭션을 사용하여 트랜잭션의 원자성을 의미적으로 보장하게 되지만 보상 트랜잭션의 특성으로 인하여 전역 직렬성(global serializability)을 위 배할 수 있다. 본 논문에서는, 전역 트랜잭션의 상태전이 분석을 통하여 전역 직렬성 을 보장하는 올바른 전역 트랜잭션 관리 규약들을 제안한다. 제안된 규약들은 한 전 역 트랜잭션의 실행을 결정하기 전에 동시에 실행되는 다른 전역 트랜잭션들의 상태 를 검사하여 이 결과에 따라 전역 트랜잭션의 실행을 지연시킴으로써 전역직렬성을 보장한다.

  • PDF

불확실한 날씨 상태를 고려한 확률론적 방법의 총 송전용량 평가 (Assessment of Probabilistic Total Transfer Capability Considering Uncertainty of Weather)

  • 박진욱;김규호;신동준;송경빈;김진오
    • 대한전기학회논문지:전력기술부문A
    • /
    • 제55권1호
    • /
    • pp.45-51
    • /
    • 2006
  • This paper proposes a method to evaluate the Total Transfer Capability (TTC) by considering uncertainty of weather conditions. TTC is limited not only by the violation of system thermal and voltage limits, but also restricted by transient stability limit. Impact of the contingency on the power system performance could not be addressed in a deterministic way because of the random nature of the system equipment outage and the increase of outage probability according to the weather conditions. For these reasons, probabilistic approach is necessary to realize evaluation of the TTC. This method uses a sequential Monte Carlo simulation (MCS). In sequential simulation, the chronological behavior of the system is simulated by sampling sequence of the system operating states based on the probability distribution of the component state duration. Therefore, MCS is used to accomplish the probabilistic calculation of the TTC with consideration of the weather conditions.

A Study on Cognition about Copyright of Digital Works

  • Lee, Yong-Whan
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권5호
    • /
    • pp.41-49
    • /
    • 2017
  • Digital works such as computer programs, music, photographs, movies and dramas are copyrighted. Even if there were more than 1,000 violations per year for digital works, the punishment was very weak. Especially copyright infringement by teenager is increasing. This study aims to present the direction of future development through questionnaires on the perception and direction of college students about copyright. 157 college students were surveyed about copyright awareness, perception of detailed legal provisions, cost of monthly expenses, copyright violation, and direction of copyright protection. As a result of the questionnaire survey, awareness was high at 69%, but in detailed law was low at 17.2% and 22.3%. In the future direction of copyright policy, 72.6% of them answered that they should be "strengthened" and "more and more strengthened". In order to protect copyrights, enforcement of crackdowns, public relations activities, expansion of the legal market, and technical protection should be done. In order to do this, copyright-related education for elementary, middle, high school and college students are needed more and it is necessary to expand the legal market where high quality contents are traded. More research is needed on copyright protection technological methods.

Park Tae-hwan v. The Korean Olympic Committee: The Breakdown of Sports Jurisprudence in Korea

  • Phillips, Joe;Lim, Suk-Jun
    • 한국중재학회지:중재연구
    • /
    • 제26권3호
    • /
    • pp.93-119
    • /
    • 2016
  • Park Tae-hwan, the Korean Olympic gold medal swimmer, was suspended for eighteen months by the International Swimming Federation (FINA) in September 2014. Park completed his suspension in March 2016, but the Korea Olympic Committee (KOC), relying on its Article 5.6, then prohibited him from joining the national team for an additional three years for the same doping violation. The KOC's penalty exceeded that provided by the World Anti-Doping Code, which governs the Olympics and most international sports federations, and contravened well-established precedent from the Court of Arbitration for Sport (CAS). The KOC, along with the Korea Swimming Federation, maintained the suspension until decisions by the Seoul Eastern District Court and CAS forced them to retract the penalty. We describe the sports regulations and arbitration decisions governing the Park case, how each side used the law to support their positions, the flaws in the KOC's legal analysis, and the case's resolutions by the Korean court and CAS. Finally, because this legal conflict has damaged the KOC's reputation, created uncertainty over the committee's doping penalties, and undercut the authority of the World Anti-Doping Code and the CAS in Korea, we recommend institutional changes in Korea's sports jurisprudence.

유비쿼터스 컴퓨팅 환경에서 RFID보안 기술에 대한 연구 (A Study on the RFID Security Technologies in Ubiquitous Computing Environment)

  • 방기천
    • 디지털콘텐츠학회 논문지
    • /
    • 제6권4호
    • /
    • pp.267-272
    • /
    • 2005
  • 유비쿼터스 컴퓨팅 환경은 미래 생활을 대변하는 새로운 패러다임으로 IT와 개인 생활에 많은 변화를 일으킬 것으로 기대된다. 그러나 유비쿼터스 컴퓨팅 환경은 방대한 정보를 언제 어디서든 획득할 수 있고, 공유할 수 있어서 보안위협 및 개인의 프라이버시 침해와 같은 역기능의 문제가 심화되고 있는 추세이다. 본 논문에서는 유비쿼터스 컴퓨팅 환경에서 RFID 기술 도입에 따른 역기능을 최소화하기 위한 방안에 대해 연구하였다. 본 논문에서는 유비쿼터스 컴퓨팅 환경의 중요한 부분인 RFID시스템에서 발생할 수 있는 보안 및 프라이버시 위험요인들과 보안 요구사항에 대해 알아보았다. 그리고 이러한 위험요인에 대해 현재 진행되고 있는 기술적 해결방법들을 살펴보았다.

  • PDF

Against the Asymmetric CP- V2 Analysis of Old English

  • Yoon, Hee-Cheol
    • 한국영어학회지:영어학
    • /
    • 제4권2호
    • /
    • pp.117-149
    • /
    • 2004
  • The paper is to argue against the asymmetric CP-V2 analysis of Old English, according to which finite verbs invariably undergo movement into a clause-final T within subordinate clauses and reach the functional head C within main clauses. The asymmetric CP-V2 analysis, first of all, faces difficulty in explaining a wide range of post-verbal elements within subordinate clauses. To resolve the problem, the analysis has to abandon the obligatoriness of V-to-T movement or introduce various types of extraposition whose status is dubious as a legitimate syntactic operation. Obligatory V-to-T movement in Old English lacks conceptual justification as well. Crosslinguistic evidence reveals that morphological richness in verbal inflection cannot entail overt verb movement. Moreover, the operation is always string-vacuous under the asymmetric CP- V2 analysis and has no effect at the interfaces, in violation of the principle of economy. The distribution of Old English finite verbs in main clauses also undermines the asymmetric CP-V2 analysis. Conceptually speaking, a proper syntactic trigger cannot be confirmed to motivate obligatory verb movement to C. The operation not only gets little support from nominative Case marking, the distribution of expletives, or complementizer agreement but also requires the unconvincing stipulation that expletives as well as sentence-initial subjects result from string-vacuous topicalization. Finally, textual evidence testifies that Old English sometimes permits non-V2 ordering patterns, many of which remain unexplained under the asymmetric CP-V2 analysis.

  • PDF

인지 무선통신 네트워크의 보안 문제 연구 (A Study of Security Issues of Cognitive Radio Network)

  • 문상국
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2011년도 추계학술대회
    • /
    • pp.662-665
    • /
    • 2011
  • 인지 무선통신 네트워크는 현재까지 폭넓은 커뮤니티 중심의 오픈소스의 형식으로 연구되고 있으며, 프로그램이 가능한 플랫폼 기반의 연구 성과라는 생각에 대한 잠재적인 기대치는 매우 높다. 하지만, 이러한 무선 플랫폼의 확산과 지원하는 소프트웨어의 오픈소스적인 특성 또한 그 위험성이 매우 높다고 할 수 있다. 사용자간 (peer-to-peer) 소프트웨어가 한 때 오용되었던 것처럼, 개별 프로그래머가 저렴하고 쉽게 널리 보급할 수 있는 인지 무선통신 플랫폼을 개발하여 대중적으로 악용할 수 있는 가능성이 매우 큰 것이다. 이렇게 되면 차세대 무선 통신의 새로운 연구로 얻을 수 있는 이익 보다 인지 무선통신 디바이스를 재프로그래밍하여 통신법규를 어기거나 적대적으로 악용할 수 있는 부정적인 영향이 오히려 심각해 질 수 있다. 본 고에서는 이러한 인지 무선통신 네트워크의 보안 문제를 살펴보고, 효과적인 대체방안에 대하여 분석하였다.

  • PDF