• Title/Summary/Keyword: adaptive protection

Search Result 157, Processing Time 0.032 seconds

A Study on Adaptive Protection Algorithm of Overcurrent Relay for DG-Connected Power System (분산전원 연계 계통을 위한 과전류 계전기 적응 제어형 보호 알고리즘 연구)

  • Sung, Byung-Chul;Park, Jung-Wook
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.748-749
    • /
    • 2011
  • 중앙 집중적이고 단방향 특성을 갖는 현재의 전력망에 대하여 신재생 에너지와 에너지 저장장치를 중심으로 하는 다양한 분산 전원의 도입에 따른 독립적 운영을 특징으로 하는 스마트 그리드로의 변화는 기존 전력망의 보호 동작에도 변화를 필요로 하게 된다. 이러한 분산전원의 연계와 스마트 그리드의 도입은 사고전류의 크기와 방향의 변화는 물론 양방향 계통에 의한 동작 변화가 발생하게 된다. 따라서 본 논문에서는 이러한 문제를 해결하기 위한 보호 알고리즘을 제시하였다. 배전계통에서 일반적으로 이용되는 과전류 계전기 (Overcurrent Relay, OCR)에 대하여 제안된 알고리즘의 적용을 통해 분산전원 도입을 비롯한 전력계통 상태 변화에 능동적으로 대응하여 보호협조가 유지될 수 있도록 하였다. 또한, 제시된 알고리즘의 성능 검증을 위하여 PSCAD/EMTDC를 이용한 시뮬레이션을 수행하였다.

  • PDF

An Adaptive Watermarking Technique for Copyright Protection of Digital Images (디지털 영상물의 저작권 보호를 위한 적응 워터마크 기법)

  • Park, Kang-Seo;Lee, Byoung-Yeol;Chung, Tae-Yun;Park, Sang-Hui
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.51 no.3
    • /
    • pp.108-111
    • /
    • 2002
  • This paper proposes an new water mark embedding and extraction technique which extends the direct sequence spread spectrum technique. The proposed technique approximates the complexity of image and block in spatial domain using Laplacian filtering and watermark is adaptively embedded in the mid-frequency DCT components. Local parity bits are attached to higher-frequency DCT components and they are used to detect extraction errors and correct those errors. In extraction process the proposed method boosts the higher frequency components of image and extracts the watermark by demodulation and this information is verified and adjusted by parity bits. Experimental results show it is invisible and robust to several external attacks.

DWT based Digital Image Watermarking using Labview Machine Vision (DWT기반 Labview Machine Vision을 이용한 디지털 이미지 워터마킹)

  • Kim, Hyoung-Gwon;Song, Yun-Jae;Ahn, Tae-Chon
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.198-200
    • /
    • 2005
  • Recently, intellectual property problem caused by illegal copy or circulation of digital contents with computer and advance of network. it will lose producer's desire and cause economic losses. so we need to demand ownership protection technology for prevent illegal copy without an owner consent and protect ownership with effect. in this paper, we change digital image at frequency domain and choose a factor choosing frequency area with human perceptibility. we inserted repetitive and adaptive watermark on the whole image by Labview Machine Vision. watermark inserted into the high frequency concentrated textual area with Wavelet Transform and then reduced damage of image by human visual feature after inserted watermark

  • PDF

A New Digital Watermarking for Architectural Design Drawing Using LINES and ARCs Based on Vertex (건축설계도면상에서 꼭지점에 기반한 LINE과 ARC를 이용한 디지털 워터마킹)

  • Jang, Bong-Ju;Moon, Kwang-Seok;Young Huh;Kwon, Ki-Ryong
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.247-250
    • /
    • 2003
  • This paper proposed to digital watermarking technique for architectural drawing using LINES and ARCs based on vertex in CAD system to prevent infringement of copyright from unlawfulness reproductions and distribution. After extract LINES and ARCs from designed drawing, we embed watermarks using adaptive algorithm in each characteristics. Watermarks robust to various attacks like as geometrical transformation as being embedded in LINE's length and ARC's angle information. Also, the proposed method satisfies enough transparency about watermarked drawing because have suitable embedding strength to each component. By experimental result, we confirmed robustness and invisibility of embedded watermarks in several conversions of architectural design drawing.

  • PDF

Pulse Doppler Radar Signal Processor Development for Main Battle Tank Using High Speed Multi-DSP (고속 Multi-DSP를 이용한 전차 탑재 펄스 도플러 레이더 신호 처리기 개발)

  • Park, Gyu-Churl;Ha, Jong-Soo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.20 no.11
    • /
    • pp.1171-1177
    • /
    • 2009
  • A missile warning radar is an essential sensor for active protection system to detect antitank missile in all weather environments. This paper introduces missile warning radar for main battle tank and presents the results of the design and implementation of the radar signal processor using high speed multi-DSP. The key algorithms include adaptive CF AR, weighted linear fitting algorithm, S/W tracking capability, and threat decision and present test result.

Video Watermarking Scheme on H.264/AVC using Selective Block Embedding (선택적 블록 삽입을 통한 H.264/AVC에서의 비디오 워터마킹 방법)

  • Kim, Jung-Min;Choi, Young-Soo;Kim, Hyoung-Joong
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.10 no.2
    • /
    • pp.46-52
    • /
    • 2011
  • This paper presents adaptive spread-spectrum watermarking scheme on the H.264/AVC video. The H.264/AVC has become popular video coding since it's compression performance has been improved greatly. That is why there is not enough space for embedding watermark using the spread-spectrum method. To overcome this problem, we propose selective block embedding scheme. The blocks which don't contain non-zero DCT (Discrete Cosine Transform) coefficients are selected by value. So we have enough space to embed watermarks. Experimental result shows that proposed scheme improves recovery rates of watermark about 12% and reduces distortion of watermarked video.

  • PDF

Implementation of Uniform Deformation Theory in semi-active control of structures using fuzzy controller

  • Mohammadi, Reza Karami;Haghighipour, Fariba
    • Smart Structures and Systems
    • /
    • v.19 no.4
    • /
    • pp.351-360
    • /
    • 2017
  • Protection of structures against natural hazards such as earthquakes has always been a major concern. Semi-active control combines the reliability of passive control and versatility and adaptability of active control. So it has recently become a preferred control method. This paper proposes an algorithm based on Uniform Deformation Theory to mitigate vulnerable buildings using magneto-rheological (MR) damper. Due to the successful performance of fuzzy logic in control of systems and its simplicity and intrinsically robustness, it is used here to regulate MR dampers. The particle swarm optimization (PSO) algorithm is also used as an adaptive method to develop a fuzzy control algorithm that is able to create uniform inter-story drifts. Results show that the proposed algorithm exhibited a desirable performance in reducing both linear and nonlinear seismic responses of structures. Performance of the presented method is indicated in compare with passive-on and passive-off control algorithms.

On Rate-adaptive LDPC-based Cross-layer SVC over Bursty Wireless Channels

  • Cho, Yongju;Cha, Jihun;Radha, Hayder;Seo, Kwang-Deok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2266-2284
    • /
    • 2012
  • Recent studies have indicated that a significant improvement in wireless video throughput can be achieved by Cross Layer Design with Side-information (CLDS) protocols. In this paper, we derive the operational rate of a CLDS protocol operating over a realistic wireless channel. Then, a Rate-Distortion (R-D) empirical model for above-capacity Scalable Video Coding (SVC) is deduced to estimate the loss of video quality incurred under inaccurate rate estimation scenarios. Finally, we develop a novel Unequal Error Protection (UEP) scheme which leverages the characteristics of LDPC codes to reduce the distortion of video quality in case of typically-observed burst wireless errors. The efficacy of the proposed rate adaptation architecture over conventional protocols is demonstrated by realistic video simulations using actual IEEE 802.11b wireless traces.

A Study on the Technique for the Secondary Arc Modeling Using EMTP MODELS (EMTP MODELS를 이용한 2차 아크 모델링 기법에 관한 연구)

  • Ahn, Sang-Pi;Kim, Chul-Hwan;Chae, Young-Moo
    • Proceedings of the KIEE Conference
    • /
    • 1998.07c
    • /
    • pp.1217-1219
    • /
    • 1998
  • For the improvement of an adaptive SPAR(Single-Phase Auto-Reclosure) and novel protection schemes, it is important to simulate arc faults. But, it is difficult to reproduce the real arc behaviour, i.e. the extinction phenomenon exactly by computer simulations due to extremely random behavior of secondary arc. This paper proposes a new computer modeling techniques for the primary and the secondary arc separately, which can be implemented with EMTP MODELS routine, and the performance of the proposed model is simulated on a typical 154 [kV] korean transmission line system.

  • PDF

A Probe Detection based on Private Cloud using BlockChain (블록체인을 적용한 사설 클라우드 기반 침입시도탐지)

  • Lee, Seyul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.2
    • /
    • pp.11-17
    • /
    • 2018
  • IDS/IPS and networked computer systems are playing an increasingly important role in our society. They have been the targets of a malicious attacks that actually turn into intrusions. That is why computer security has become an important concern for network administrators. Recently, various Detection/Prevention System schemes have been proposed based on various technologies. However, the techniques, which have been applied in many systems is useful for existing intrusion patterns on standard-only systems. Therefore, probe detection of private clouds using BlockChain has become a major security protection technology to detection potential attacks. In addition, BlockChain and Probe detection need to take into account the relationship between the various factors. We should develop a new probe detection technology that uses BlockChain to fine new pattern detection probes in cloud service security in the end. In this paper, we propose a probe detection using Fuzzy Cognitive Map(FCM) and Self Adaptive Module(SAM) based on service security using BlockChain technology.