• Title/Summary/Keyword: information Protection

Search Result 4,519, Processing Time 0.031 seconds

Characteristics of the Electric Fields Produced by Multiple Lightning Return Strokes (다중 낙뢰에 의해서 발생한 전장 파형의 특성)

  • 이복희;정동철;이동문
    • The Transactions of the Korean Institute of Electrical Engineers C
    • /
    • v.53 no.6
    • /
    • pp.330-336
    • /
    • 2004
  • In this work, in order to obtain the detailed information about lightning electromagnetic pulses, the electric fields radiated from multiple lightning return strokes were measured and analyzed statistically. The electric field measuring system consists of a hemisphere antenna of 30cm in diameter, integrator and data acquisition device, and its frequency bandwidth ranges from 200Hz to 1.56MHz, and the sensitivity is 0.96㎷/V/m. The electric field signals are digitized every 200ns with the transient signal analyzer having the resolution of 12-bit and the recording length of 5 kilowords and are registered at personal computer. As a result, the electric fields produced by the first return stroke begin with a slow initial part or front, which starts just after or during the last stepped leader. On the average the rise times of the electric fields for the positive first, second and third strokes are 4.21${\mu}\textrm{s}$, 3.94${\mu}\textrm{s}$ and 2.75${\mu}\textrm{s}$, respectively, and those for the negative first, second and third strokes are 3.46${\mu}\textrm{s}$, 3.15${\mu}\textrm{s}$ and 2.79${\mu}\textrm{s}$, respectively. The zero-crossing times of the electric fields for first return strokes range from about 10 to 80${\mu}\textrm{s}$. The mean zero-crossing times for subsequent return strokes are shorter than those for first lightning return strokes.

ELF 3D Magnetic Field and Eddy Current Calculation of Human Body Around Transmission Lines (송전선로 주변의 3차원 자기장 및 인체 유도 와전류 계산)

  • Myeong, Seong-Ho;Lee, Dong-Il;Sin, Gu-Yong;Han, In-Su;Park, Jong-Geun
    • The Transactions of the Korean Institute of Electrical Engineers C
    • /
    • v.51 no.10
    • /
    • pp.485-491
    • /
    • 2002
  • Since Wertheimer and Leeper reported possible adverse health effects of magnetic field in 1979, worldwide researches on this issue have been conducted. More recently, the U.S. Congress instructed the NIEHS (National Institute of Environmental Health Sciences), NIH (National Institute of Health) and DOE (Department of Energy) to direct and manage EMF RAPID (Electric and Magnetic Fields Research and Public Information Dissemination) program aimed at providing scientific evidence to clarify the potential for health risks from exposure to extremely low frequency electric and magnetic fields(ELF-EMF). Although they concluded that the scientific evidence suggesting adverse health risks of ELF-EMF is weak, the exposure to ELF-EMF cannot be recognized as entirely safe. Therefore, the purpose of this article is to describe magnetic field 3-D calculation and to evluate eddy current of human body compare to international guide line recognized one of the basic problems. In open boundary problem, Magnetic field using FEM is not advantageous in the point of the division of area and the proposition of the fictitious boundary. Therefore, we induced the analytic equation of magnetic field calculations so but the finite line segment based on Biot-Savarts law Also, Eddy currents induced due to ELF-EMF magnetic field are computed. To calculate induced currents, impedance method is used in this paper, An example model of human head with resolution of 1.27cm is used. In this paper, We evaluate the magnetic field and eddy current of human head around 765 kV transmission lines compare to international guide line.

An Improvement of Digital Distance Relaying Algorithm on Underground Transmission Cables (지중송전케이블룡 디지털 거리계전 알고리즘 개선)

  • Ha, Che-Ung;Lee, Jong-Beom
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.49 no.12
    • /
    • pp.595-601
    • /
    • 2000
  • This paper describes the improvement method of distance relaying algorithm for the underground transmission cables. Distance relaying algorithms have been mainly developing to protect the overhead transmission lines than the underground cables. If the cable systems are directly protected using distance relaying algorithm developed for overhead line without any improvement, there will be really occurred many misoperation in cable systems, because the cable systems consist of the conductor, the sheath, several grounding method, cable cover protection units(CCPUs), and grounding wire. Accordingly, the complicated phenomena are occurred, if there is a fault in cable systems. Therefore, to develope a correct distance relaying algorithm, such cable characteristics should be taken into account. This paper presents the process to improve distance relaying algorithm which is now used. REal cable system was selected to establish modeling in EMTP and ATP Draw. It was discovered through the detailed simulation during the fault that the large error existed between impedance measured at the relay point and real impedance is due to the resistance of grounding wire in each grounding method. And also compensation factor obtained by the simulation is proposed in this paper. It is proved that the factor proposed can fairly improve the accuracy of impedance at the relay point. It is evaluated that the protective ability will be really much improved, if the algorithm proposed in this paper is applied for cable systems of utility.

  • PDF

A Study on the Estimation of User′s Psychological Carrying Capacity in Mt. Chi-ak National Park Campsite (치악산국립공원 야영장의 이용자의 심리적 수용능력 추정에 관한 연구)

  • 권영선;이경재;송근준
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.16 no.1
    • /
    • pp.1-12
    • /
    • 1988
  • ^x This study was executed to measure the user's psychological carrying capacity in the National Park Campsite in the district of Temple Ku- Ryong as a model of analysis, which is made socio - psychological approach. The results are as follows ; 1. Since this Place hart a beautiful scenery and some cultural assets prosperties and lies near the metroplitan area, 67.5% of the user come from the district, such as Seoul, Inchon, Kyong - Ki Do, and the purpose of camping is to appease their stress and to promote friendly relationship one another. 2. Since most of the campers(86%) didn't recognize the injury of the natural environment, the enlightment movement and the public information for the protection of natural environment are urgent. And they thought that the good campsite is located near the stream(43.6%) or a quiet place(33.4%). 3. As the space per a man increase, the degree of their satisfactions showed the tendency to increase. The user's satisfaction were analyzed by three statistic methods, correlation, multiple regression and factor analysis. Affecting factors to the user's psychology by the varimax varimax rotated factor analysis were classified physical arts ecological satisfaction. 4. The carrying capacity of the campsite by the degree of psychological satisfaction of the user was measured. The result was that the proper space for one user campsite was 35m$^2$ 5. The 58% of the informants said that they root disturbed by the overcrowding in the campsite. But most of the users thought that it was not good to control the number of the users. And the 67.3% of the respondents answered that the best method was that we control the number of the users by order of arrival if we have to control it.

  • PDF

A Vulnerability Analysis of Intrusion Tolerance System using Self-healing Mechanism (자가치유 메커니즘을 활용한 침입감내시스템의 취약성 분석)

  • Park, Bum-Joo;Park, Kie-Jin;Kim, Sung-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.7
    • /
    • pp.333-340
    • /
    • 2005
  • One of the most important core technologies required for the design of the ITS (Intrusion Tolerance System) that performs continuously minimal essential services even when the network-based computer system is partially compromised because of the external or internal intrusions is the quantitative dependability analysis of the ITS. In this paper, we applied self-healing mechanism, the core technology of autonomic computing to secure the protection power of the ITS. We analyzed a state transition diagram of the ITS composed of a Primary server and a backup server utilizing two factors of self-healing mechanism (fault model and system response) and calculated the availability of ITS through simulation experiments and also performed studies on two cases of vulnerability attack.

Design and Implementation of Mobile Security System for Digital contents Rights Protection in Wireless Internet Environment (무선 인터넷 환경에서 디지털 컨텐츠 저작권 보호를 위한 모바일 보안 시스템의 설계 및 구현)

  • Kim, Hoo-Jong;Na, Seung-Won
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.695-704
    • /
    • 2003
  • As wireless Internet speads widely, circulation of various types of digital contents become active. Therefore, it is necesary to make a mobile-based DRM (Digatal Rights Management) system to protect digital contents from illegal reproduction and to give proper rights to contents users, In this paper, we present a mibile security system, which protects the copyright for digital contents offered throughout the mobile environment. Our security system is focused on presenting mobile-based DRM architecture. Especially, considering mobile device's decrying power, we adopted partial encryption scheme. For this, wecompared and evaluated the performant of each contents encryption scheme (the entire encryption scheme and the partial encription scheme) and proved that a proper DRM system for current wireless devices is the partial encryption system. Our mobile DRM system can be very efficient to protect contents on the wireless Internet environment.

The Type Classification and Function Assessment at Small Palustrine Wetland in Rural Areas (농촌지역 소규모 소택형습지의 유형분류 및 기능평가 연구)

  • Son, Jin-Kwan;Kim, Nam-Choon;Kang, Bang-Hun
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.13 no.6
    • /
    • pp.117-131
    • /
    • 2010
  • This study was conducted to utilize as basic information for the construction of conservation and estimation system for Palustrine wetland, which was badly managed and imprudently reclaimed, through the analysis of distribution characteristics and the estimation of conservation value for sample sites (eight wetlands) in rural area. As the result of wetland type classification, these wetlands was classified by 4 types (Permanent freshwater marshes/pools, ponds, Aquaculture ponds, and Seasonally flooded agricultural land) by Ramsar system, 3 types (Emergent Wetland, Aquatic Bed, and Scrub-Shrub Wetland) by NWI (Cowardin) System, 5 types (Farm Pond Depression, Under-flow wetland, Man-made Pond Depression, Abandoned Paddy Fields Wetland, and Reservoir Shore) by National Wetland's Categorical System, and 3 types (Aquatic Bed Wetland, Emergent Wetland, and Forested Wetland) by Lee (2000) System. These results suggest us developing the new type classification system for small Palustrine wetland in Korean rural areas. The score of function assessment (The Modified RAM) for small Palustrine wetlands was high at the wetlands nearby hills and rice paddy fields, and low at those nearby upper fields, which was mainly affected by land-use and vegetation. The functions as 'Flood/Storm Water Storage', 'Runoff Attenuation', 'Water Quality Protection' were resulted by the structural difference of inflow and outlet. Some functions as 'Wetland size', 'Wetland to immediate watershed ratio', 'Presence of boat traffic', 'Maximum water depth', 'Fetch of water's body' of RAM were not appropriate in evaluation of small wetlands in rural area. Which suggest us developing the new function assessment system for small Palustirne wetland in Korean rural areas.

Development of the Data Communication based Future Air Base Defence Operation Model (데이터통신 기반 차세대 기지방어작전 모델 개발)

  • Pyo, Sang-Ho;Kim, Ki-Hyung;Lee, Tae-Gong
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.157-173
    • /
    • 2014
  • As Air Base Defence, Anti-Aircraft Defence and Nuclear-Biological-Chemical Protection model considered as ground operation models in Republic of Korea Air Force are designed as the voice-centered system between participant nodes, there is a problem communicating accurately. In recent years, the military is developing a command and control capability using data communication technology to solve the problem. Therefore, this paper proposes new model to maximize efficiency of performance improvement through the Data Communication-based Future Air Base Defence Model. We refer to a research paper that is related existing and developed new model. and then we really experimented under WiBro Network that is constructed to Air Base for maintenance control. Based on the analysis and the test result of new Air Base Defence Model, we have concluded that the performance improvement effect is reached.

A Three-Layered Ontology View Security Model for Access Control of RDF Ontology (RDF 온톨로지 접근 제어를 위한 3 계층 온톨로지 뷰 보안 모델)

  • Jeong, Dong-Won;Jing, Yixin;Baik, Dook-Kwon
    • Journal of KIISE:Databases
    • /
    • v.35 no.1
    • /
    • pp.29-43
    • /
    • 2008
  • Although RDF ontologies might be expressed in XML tree model, existing methods for protection of XML documents are not suitable for securing RDF ontologies. The graph style and inference feature of RDF demands a new security model development. Driven by this goal, this paper proposes a new query-oriented model for the RDF ontology access control. The proposed model rewrites a user query using a three-layered ontology view. The proposal resolves the problem that the existing approaches should generate inference models depending on inference rules. Accessible ontology concepts and instances which a user can visit are defined as ontology views, and the inference view defined for controling an inference query enables a controlled inference capability for the user. This paper defines the three-layered view and describes algorithms for query rewriting according to the views. An implemented prototype with its system architecture is shown. Finally, the experiment and comparative evaluation result of the proposal and the previous approach is described.

A Spatial Transformation Scheme Supporting Data Privacy and Query Integrity for Outsourced Databases (아웃소싱 데이터베이스에서 데이터 프라이버시 및 질의 무결성을 지원하는 공간 변환 기법)

  • Kim, Hyeong-Il;Song, Young-Ho;Chang, Jaewoo
    • Journal of KIISE
    • /
    • v.42 no.5
    • /
    • pp.652-663
    • /
    • 2015
  • Due to the popularity of location-based services, the amount of generated spatial data in daily life has been dramatically increasing. Therefore, spatial database outsourcing has become popular for data owners to reduce the spatial database management cost. The most important consideration in database outsourcing is meeting the privacy requirements and guarantying the integrity of the query result. However, most of existing database transformation techniques do not support both of the data privacy and integrity of the query result. To solve this problem, we propose a spatial data transformation scheme that utilizes the shearing transformation with rotation shifting. In addition, we described the attack models to measure the data privacy of database transformation schemes. Finally, we demonstrated through the experimental evaluations that our scheme provides high level of data protection against different kinds of attack models, compared to the existing schemes, while guaranteeing the integrity of the query result sets.