• Title/Summary/Keyword: electric power infrastructures

Search Result 32, Processing Time 0.023 seconds

Evaluation of Voltage Sag and Unbalance due to the System Connection of Electric Vehicles on Distribution System

  • Lee, Soon-Jeong;Kim, Jun-Hyeok;Kim, Doo-Ung;Go, Hyo-Sang;Kim, Chul-Hwan;Kim, Eung-Sang;Kim, Seul-Ki
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.2
    • /
    • pp.452-460
    • /
    • 2014
  • Due to increased concerns for rising oil prices and environmental problems, various solutions have been proposed for solving energy problems through tightening environmental regulations such as those regarding $CO_2$ reduction. Among them, Electrical Vehicles (EVs) are evaluated to be the most realistic and effective approach. Accordingly, research and development on EVs and charging infrastructures are mainly proceeding in developed countries. Since EVs operate using electric energy form a battery, they must be connected to the power system to charge the battery. If many EVs are connected during a short time, power quality problems can occur such as voltage sag, voltage unbalance and harmonics which are generated from power electronics devices. Therefore, when EVs are charged, it is necessary to analyze the effect of power quality on the distribution system, because EVs will gradually replace gasoline vehicles, and the number of EVs will be increased. In this paper, a battery for EVs and a PWM converter are modeled using an ElectroMagnetic Transient Program (EMTP). The voltage sag and unbalance are evaluated when EVs are connected to the distribution system of the Korea Electric Power Corporation (KEPCO). The simulation results are compared with IEEE standards.

Oversea IP Ranges Blocking for Security Enhancement of Critical Infrastructures with Cyber Threats Analysis in Electric Industry (전력분야 사이버 위협 분석 및 기반시설 보안 강화를 위한 해외 IP 대역 차단 방안 연구)

  • Han, Choong-Hee;Park, Soon-Tai;Lee, Sang-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.401-415
    • /
    • 2019
  • Recently, there has been a lot of studies and efforts to strengthen the stability of critical infrastructures against increasing cyber attacks to critical infrastructures. In this thesis, I defined what cyber threats are, after showing you various definitions about what cyber threats are and what the types are. After studying about significant cyber threats from China, I showed you the realities of cyber threats with the analysis about starting points, types of cyber threats, ratios of attacks and so on. At last, I defined guidelines about unnecessary oversea IP range blocking. Also, I proposed unnecessary oversea IP range blocking methodologies with per information system and per network system. Furthermore, I proposed blocking characteristics per security equipment and security operation improvement and blocking effects and service process to normal oversea users.

Study on drawing up the integration method between combined information communication network design and information management system for Transportation-Power-Infrastructures on the electric vehicle (전기자동차 교통-전력-시설 통합 정보통신 네트워크 설계 및 정보관리시스템 간 연계 방안 수립에 관한 연구)

  • Choi, Yoon-Gun;Hwang, Tae-Hong;Kim, Geon-Gook
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.5
    • /
    • pp.60-70
    • /
    • 2011
  • Vehicle location detection and wireless communication method have be designed along the same lines as GPS, CDMA and WLAN, which is based upon the selecting factors such as state-of-art technology trend, accuracy, stability, and economic feasibility, in order to select the optimum method of information communication networks for integrated "Transportation-Power-Facilities" on the electric bus. In addition, the key features of each alternative for an efficient linkage have been review and the integration methodology for linking among Transportation Charging Center, Transportation(ITS, BIS) Center and smart Grid Center has been drawn up based on a technical level of difficulty of each alternative, political and administrative difficulties, and expense justification.

A Simple Seismic Vulnerability Sorting Method for Electric Power Utility Tunnels (전력구의 간편 지진취약도 선별법)

  • Kang, Choonghyun;Huh, Jungwon;Park, Inn-Joon;Hwang, Kyeong Min;Jang, Jung Bum
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.22 no.5
    • /
    • pp.110-118
    • /
    • 2018
  • Due to recent earthquakes, there is a growing awareness that Korea is not a safe zone for earthquakes any more. Therefore, the review of various aspects of the seismic safety of the infrastructures are being carried out. Because of the characteristics of the underground structure buried in the ground, the electric power utility tunnels must be considered not only for the inertia and load capacity of the structure itself but also the characteristics of the surrounding soils. An extensive and accurate numerical analysis is inevitably required in order to consider the interaction with the ground, but it is difficult to apply the soil-structure interaction analyses, which generally requires high cost and extensive time, to all electric power utility tunnel structures. In this study, the major design variables including soil characteristics are considered as independent variables, and the seismic safety factor, which is the result of the numerical analysis, is considered as a dependent variable. Thus, a method is proposed to select vulnerable electric power utility tunnels with low seismic safety factor while excluding costly and time-consuming numerical analyses through the direct correlation analysis between independent and dependent variables. Equations of boundary limits were derived based on the distribution of the seismic safety factor and the cover depth and rebar amounts with high correlation relationship. Consequently, a very efficient and simple approach is proposed to select vulnerable electric power utility tunnels without intensive numerical analyses. Among the 108 electric power utility tunnels that were investigated in this paper, 30% were screened as fragile structures, and it is confirmed that the screening method is valid by checking the safety factors of the fragile structure. The approach is relatively very simple to use and easy to expand, and can be conveniently applied to additional data to be obtained in the future.

Symmetric Encryption Application to Cyber Security of KEPCO SCADA Network (SCADA 시스템 정보보안들 위한 대칭키 암호 적용)

  • Kang, Dong-Joo;Kim, Hak-Man
    • Proceedings of the KIEE Conference
    • /
    • 2007.11b
    • /
    • pp.291-293
    • /
    • 2007
  • SCADA (Supervisory Control and Data Acquisition) SCADA refers to the combination of telemetry and data acquisition [1]. SCADA system has been used for remote measurement and control on the critical infrastructures as well as modem industrial facilities. Electric Power system is a representative system using SCADA network for its communication. Integration between many networks and increasing threatens of terrorism have made the potential risk by cyber attacks real and bigger in power system. Recently, many researching efforts have been made on SCADA network for improving its security. In general aspect, there are already several ways to secure the system like encryption, firewall, authentication, etc. In this paper, we focus on symmetric encryption method and propose the proper key distribution method to reflect the unique characteristics of SCADA network communication.

  • PDF

Design of Idle-time Measurement System for Data Spoofing Detection (데이터 스푸핑 탐지를 위한 유휴 시간 측정 시스템 설계)

  • Jung, Sung-Mo;Song, Jae-Gu;Kim, Tai-Hoon;So, Yo-Hwan;Kim, Seok-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.1
    • /
    • pp.151-158
    • /
    • 2010
  • The industrial foundation of the inside and outside of a country has brought significant damages due to attacks from hackers. Especially, if the national primary core infrastructures(like electric power, dam, railroad, atomic energy, etc.) has been significantly damaged, it can be directly linked not only to economic problems but also to people's lives. These national primary core infrastructures usually constitute SCADA system using Modbus RS486 communication. Because of this characteristic, SCADA system has RTU master and slave linked to RJ11 cables to directly pass commands. RJ11 is possible in data spoofing using physical connection because the transmission range of RJ11 has a wide bandwidth(almost 1km). Hence, this paper designed an idle-time measurement system for SCADA system for emerging security improvement in the national primary core infrastructures.

Integrated Building Energy Supply System : An Overview of Technical Trends for Gas Engine Driven Combined Heat and Power System (가스엔진 구동 건물에너지 통합 공급시스템 개발을 위한 기술동향 사례연구)

  • Park, Beungyong;Jeong, Yongdae;Shin, Hyunchul;Cho, Jinkyun
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.29 no.11
    • /
    • pp.612-620
    • /
    • 2017
  • Power consumption in Southeast Asia is steadily increasing due to industrialization and the effects of hot and humid climates. However, there are not enough energy generation facilities and infrastructures to meet the growing demand because it is difficult to secure the construction and operation costs of the transmission and distribution systems. This study aims to develop a gas engine driven heat pump system that supplies heating, cooling and electric power to buildings. This system, besides its normal function to produce heat, has the capacity to generate electricity on a household level. This paper investigates similar cases overseas before developing the system. Through the investigation of commercialized similar systems, the level of technology and market trend of development system were identified. Features and specifications of commercial and industrial systems will be used for system development.

A Study on the Deterioration Process of 22kV Power Cables in Operation (운전 중인 상태에 있는 22kV 전송선로 케이블의 열화 과정해석에 대한 연구)

  • Lee, Kwan-Woo;Um, Kee-Hong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.127-133
    • /
    • 2013
  • As an essential part of current industrial society, electric power energy is contantaly increasing in pace with the development of science and technology. In order to meet the demand of electric power, power facilities which take care of the higher voltage and bigger capacity is required. To produce and supply electric power on a sound basis the electric facilities should operate with reliability. To prevent disasters in advance, the high quality facilities should be manufactured, and a constant management should be done. When the power facilities cause accidents, the result is huge national deficits. Since the power facilities play a pivotal role in the key industry of national infrastructures of they should operate for a long time in maintaining a stable state, and the accidents can be prevented in advance. The lifetime of a power cable is considered to be 30 years at the time of manufacture, but in real fields, accidents of cable occur 8-12 years from the start of operation, resulting in a heavy loss of properties. In this paper, we will show that we have found out the cause and process of the deterioration of 22kV cable systems in operation. The result is that the process of deterioration does not follow the Weibull distribution only ; but rather, after the heat deterioration the Weibull distributed deterioration comes, then the cable is destroyed due to the partial discharge resulting from the Weibull distributed deterioration.

Magneto-Mechano-Triboelectric Generator Enabled by Ferromagnetic-Ferroelectric Composite (강자성-강유전성 복합체를 활용한 자기-기계-마찰전기 변환 발전소자)

  • Yeseul Lim;Geon-Tae Hwang
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.37 no.1
    • /
    • pp.112-117
    • /
    • 2024
  • The Internet of Things (IoT) device is a key component for Industry 4.0, which is the network in homes, factories, buildings, and infrastructures to monitor and control the systems. To demonstrate the IoT network, batteries are widely utilized as power sources, and the batteries inevitably require repeated replacement due to their limited capacity. Magneto-mechano-electric (MME) generators are one of the candidate to develop self-powered IoT systems since MME generators can harvest electricity from stray alternating current (AC) magnetic fields arising from electric power cables. Herein, we report a magneto-mechano-triboelectric generator enabled by a ferromagnetic-ferroelectric composite. In the triboelectric nylon matrix, a ferromagnetic carbonyl iron powder (CIP) was introduced to induce magnetic force near the AC magnetic field for MME harvesting. Additionally, a ferroelectric ceramic powder was also added to the MME composite material to enhance the charge-trapping capability during triboelectric harvesting. The final ferromagnetic-ferroelectric composite-based MME triboelectric harvester can generate an open-circuit voltage and a short-circuit current of 110 V and 8 μA, respectively, which were enough to turn on a light emitting diode (LED) and charge a capacitor. These results verify the feasibility of the MME triboelectric generator for not only harvesting electricity from an AC magnetic field but also for various self-powered IoT applications.

Key Distribution Process for Encryption of SCADA Communication using Game Theory applied Multiagent System

  • Kim, Hak-Man;Kang, Dong-Joo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.23 no.11
    • /
    • pp.34-43
    • /
    • 2009
  • SCADA (Supervisory Control and Data Acquisition) system has been used for remote measurement and control on the critical infrastructures as well as modem industrial facilities. As cyber attacks increase on communication networks, SCADA network has been also exposed to cyber security problems. Especially, SCADA systems of energy industry such as electric power, gas and oil are vulnerable to targeted cyber attack and terrorism Recently, many research efforts to solve the problems have made progress on SCADA network security. In this paper, flexible key distribution concept is proposed for improving the security of SCADA network using Multiagent System (MAS).