• Title/Summary/Keyword: network protection system

Search Result 545, Processing Time 0.03 seconds

The Development of Application Programs for Optimal Feeder Operation Through Distribution Automatic System

  • Ha, Bok-Nam;Seol, Ieel-Ho;Jeong, Mi-Ae
    • KIEE International Transactions on Power Engineering
    • /
    • v.4A no.1
    • /
    • pp.42-47
    • /
    • 2004
  • This paper presents the various application programs for the Distribution Automation System (DAS) of the Korea Electric Power Corporation (KEPCO)'s distribution system. These programs are developed to allow for optimal operation in the areas of feeder automation, relay coordination, loss minimization and so on. They are single line diagram auto creation programs for the feeder, service restoration program, protection coordination program, data error detection program, and optimal network reconfiguration program. The details of these programs are presented for validity and effectiveness.

A Syudy on the Detection of High Impedance Faults using Wavelet Transforms and Neural Network (웨이브렛 변환과 신경망 학습을 이용한 고저항 지락사고 검출에 관한 연구)

  • 홍대승;배영철;전상영;임화영
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.459-462
    • /
    • 2000
  • The analysis of distribution line faults is essential to the proper protection of power system. A high impedance fault(HIF) dose not make enough current to cause conventional protective device operating. so it is well hon that undesirable operating conditions and certain types of faults on electric distribution feeders cannot be detected by using conventional protection system. In this paper, we prove that the nature of the high impedance faults is indeed a deterministic chaos, not a random motion Algorithms for estimating Lyapunov spectrum and the largest Lyapunov exponent are applied to various fault currents detections in order to evaluate the orbital instability peculiar to deterministic chaos dynamically, and fractal dimensions of fault currents which represent geometrical self-similarity are calculated. Wavelet transform analysis is applied the time-scale information to fault signal. Time-scale representation of high impedance faults can detect easily and localize correctly the fault waveform.

  • PDF

An Audit Model for Information Protection in Smartwork (스마트워크 기반의 정보보호 감리 모형)

  • Han, Ki-Joon;Kim, Dong-Soo;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.229-239
    • /
    • 2014
  • Smartwork technology, using teleworking, smartwork centers and mobile terminal, provides a flexible work environments without constraints of time and space. Smartwork system to increase the work efficiency has the information protection threats according to their convenience. Thus, in order to build smartwork, it is proper to provide information protection audit to help ensure the information protection. In this paper, we have proposed an infortaion protection audit model at the practical and technical level for building a smartwork environment. We were classified as a terminal, network and server area for information protection, and derived a professional information protection check items. Further, by establishing a smartwork information protection audit time to map ISMS control items, we have proposed an audit model so that it is possible to improve the security and efficiency. It also verified whether the proposed model is suitable or not by doing a survey if deduced audit domain and check items correspond with the purpose of the smartwork information protection audit to auditors and IT specialists. As the result, this study was 97% satisfaction out of 13 check items.

Improving Personal Data Protection in IoT Environments (사물인터넷(IoT) 환경에서 개인정보보호 강화를 위한 제도 개선 방안)

  • Lee, Ae Ri;Son, Soomin;Kim, Hyun Jin;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.995-1012
    • /
    • 2016
  • In Internet of Things (IoT) environments, devices or sensors everywhere can automatically collect data without the individual awareness, further combine and share data using ubiquitous network, and thus the development of IoT raises new challenges in respect of personal data protection and privacy. This study aims to identify main issues related to data protection in the IoT and propose adequate measures. We analyzed the types of personal data controllers and processors in IoT and figured out the issues regarding the processing of personal data and the rights to privacy of data subject. Accordingly, we suggested the institutional ways (e.g., establishment of user-friendly notice and flexible consent system, re-identification risk monitoring system, data protection in cross-border transfer, and user education) to improve the situation of personal data protection in IoT and finally proposed the improvement tasks to carry out first based on the degree of urgency and importance.

A Interoperable Digital Content Protection System Based on DMP (DMP 기반의 상호운용 가능한 디지털 콘텐츠 보호 시스템)

  • Hao, Ri-Ming;Choi, Bong-Kyu;Yoon, Hwa-Mok;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.626-629
    • /
    • 2007
  • The digital content was supplied quickly with advancement of video compressive technique and the network. Simultaneously illegal copy and diffuse via Internet, it was caused to necessitate the intellectual property right protection of the digital content. With this background, Various standardization groups and content provision enterprises developed the solution for a digital content protection. But the problem which lack interoperability is appeared, cause of independent development among other equipment. To find solution about this, MPEG(Moving Picture Experts Group) has progressed standardization against IPMP (Intellectual Property Management and Protection) techniques which are possible interoperability. In spite of it, with reason why insufficient function, DMP(Digital Media Project) standard was presented with the alternative against this. In this paper, we analyze MPEG IPMP standards and DMP ToolPack concepts to compare between them, and through these, designed and implemented digital content protection system which possible interoperability.

  • PDF

HMM-based Music Identification System for Copyright Protection (저작권 보호를 위한 HMM기반의 음악 식별 시스템)

  • Kim, Hee-Dong;Kim, Do-Hyun;Kim, Ji-Hwan
    • Phonetics and Speech Sciences
    • /
    • v.1 no.1
    • /
    • pp.63-67
    • /
    • 2009
  • In this paper, in order to protect music copyrights, we propose a music identification system which is scalable to the number of pieces of registered music and robust to signal-level variations of registered music. For its implementation, we define the new concepts of 'music word' and 'music phoneme' as recognition units to construct 'music acoustic models'. Then, with these concepts, we apply the HMM-based framework used in continuous speech recognition to identify the music. Each music file is transformed to a sequence of 39-dimensional vectors. This sequence of vectors is represented as ordered states with Gaussian mixtures. These ordered states are trained using Baum-Welch re-estimation method. Music files with a suspicious copyright are also transformed to a sequence of vectors. Then, the most probable music file is identified using Viterbi algorithm through the music identification network. We implemented a music identification system for 1,000 MP3 music files and tested this system with variations in terms of MP3 bit rate and music speed rate. Our proposed music identification system demonstrates robust performance to signal variations. In addition, scalability of this system is independent of the number of registered music files, since our system is based on HMM method.

  • PDF

An Agent System Protection Mechanism for Secure Action of Mobile Agent in Open Network Systems (Open Network 시스템에서 이동에이전트의 안전한 역할 수행을 위한 에이전트 보호메커니즘)

  • Jung, Chang-Ryul;Yoon, Hong-Sang;Koh, Jin-Gwang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.371-378
    • /
    • 2002
  • In the resent years, the term mobile agent is probably one of the most overused words in many appliable areas of distributed open systems as electronic commerce and electronic data interchange, and it has very different meanings in the area of artificial intelligence, network management, or distributed systems. However, the use of mobile agent adds significant problems, primarily in the area of EC/EDI. Therefore it is very important to control the roaming agents to keep one's privacy or property in distributed open networks. The surge in secure intranets for commercial applications provides a robust, secure environment to which trading partners can increasingly entrust their interactions to some mobile agents. In this paper, we introduce a mechanism to protect mobile agent itself from the malicious server he is visiting and also we introduce a mechanism to protect vital resources of the open systems as internet.

Rule Protecting Scheme for Snort

  • Son, Hyeong-Seo;Lee, Sung-Woon;Kim, Hyun-Sung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.259-262
    • /
    • 2005
  • This paper addresses the problem of protecting security policies in security mechanisms, such as the detection policy of an Intrusion Detection System. Unauthorized disclosure of such information might reveal the fundamental principles and methods for the protection of the whole network. In order to avoid this risk, we suggest two schemes for protecting security policies in Snort using the symmetric cryptosystem, Triple-DES.

  • PDF

Korean Railway Modernization (국가철도망 구축에 따른 한국철도의 현대화 방안에 관한 연구)

  • Kim Hyun-Woong
    • Proceedings of the KSR Conference
    • /
    • 2005.05a
    • /
    • pp.1101-1104
    • /
    • 2005
  • The overall objectives for Korean railway system of the future are speedup, capacity management, increase safety, environmental protection. and enhancement efficiency. To achieve these, interconnection within the railway system must be optimised and designed on a customer-friendly basis. This principles applies to both passenger and freight traffic. for which cost-effective and time-efficient facilities must be provided. As the result. Korean railway network modernization is based on seeking out optimum conditions for improving railway business.

  • PDF

PROTECTION OF CUTANEOUS NEURONS BY A NEW PEPTIDOMIMETIC ENDOWED WITH NEUROTROPHIC AND ANTI-APOPTOTIC PROPERTIES

  • Imbert, I.;Nicolay, J.F.
    • Proceedings of the SCSK Conference
    • /
    • 2003.09a
    • /
    • pp.161-161
    • /
    • 2003
  • The cutaneous network of unmyelinated nerve fibers is extremely dense, and closely interacts with the many cell types present in dermis and epidermis, including keratinocytes, fibroblasts, Langerhans cells, and melanocytes. Cell communication involves various neuroendocrine factors, with cell differentiating and proliferative activities, or inflammatory properties. Thus, nervous cells in the skin not only create a sensory system connected to the central nervous system, but also mediate many of the biological activities of the skin.(omitted)

  • PDF