• Title/Summary/Keyword: network protection system

Search Result 546, Processing Time 0.035 seconds

A Study on the Auto-Reclose Dead lime Control using Neural Network based On-line Transient Stability Assessment (신경회로망을 이용한 On-line 과도안정도 평가에 의한 자동재폐로 무전압 시간제어 연구)

  • Kim, Il-Dong;Park, Jong-Keun
    • Proceedings of the KIEE Conference
    • /
    • 1995.11a
    • /
    • pp.131-136
    • /
    • 1995
  • This paper presents a functional ability improvement of auto-reclosing relay in the power transmission line protection. When the high speed auto-reclosing is successful, Auto-reclosing is practically valuable to improve the transient stability limit of a power system, but it is fail due to surviving fault, both electrical and mechanical stresses can result on the transformers and turbine-generator. It is true that the longer dead time of the reclosing relay gives the higher rate of successful reclosing, On the other hand, the power system does not always need high speed reclosing because of enough stability margin. This paper proposed "stability margin based dead time reclosing" in order to decrease not only the rate of unsuccessful reclosing, but the possibility of the harmful stress also. On-line transient stability assessment using artificial neural network, for implementing the proposed scheme, has studied and tested with resonable results.

  • PDF

Implementation of network-based video surveillance system (영상을 이용한 네트워크 기반 감시 시스템 구현)

  • Lee, Ji-Hoon;Kim, Sun-Hyeng
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.510-512
    • /
    • 2015
  • Recently, people fear is growing because of the various crimes that may occur when you go out. The growing is interest in security systems for the protection of an individual's property. In this paper, to establish a single central server based on the home network when intruders access to city, such as image processing values obtained through the IP camera and distance values disciplined use an ultrasonic sensor the user for an attacker city that will connect to the server the surveillance system provides the information that is received and implemented.

  • PDF

Evaluation of Efficiency for Grounding System on the Electrified Railways (전기철도 급전시스템의 매설접지 방식 유용성 평가)

  • 창상훈;한문섭;이장무;이형수;김정훈
    • Proceedings of the KSR Conference
    • /
    • 2000.05a
    • /
    • pp.86-92
    • /
    • 2000
  • Recently, the Korea National Railways (KNR) is undertaking a program of electrification of the existing railway routes. In order to implement the ongoing plan, KNR authorized a preliminary engineering study of its electrical systems. This effort included a comprehensive analysis of new grounding networks. The new grounding system runs in parallel with the rails and is connected to all metal structures such as rails, overhead protection wires and substation grounding grids etc., creating an equipotential ground network. This paper presents a study on coupling levels that can disturb signaling and telecommunications in adoption of the new grounding network The simulation for the study is carried out using Matlab software, Several different scenarios are analyzed, including the load condition and a few fault conditions with different fault locations. The induced potentials on the communication cables are computed. The effect of the buried ground wires is also analyzed by comparing the results with and without the presence of the ground wires, The results presented in the paper can be used as a reference for estimating coupling levels in similar rail systems.

  • PDF

A Framework of Managing Supply Chain Disruption Risks Using Network Reliability

  • Ohmori, Shunichi;Yoshimoto, Kazuho
    • Industrial Engineering and Management Systems
    • /
    • v.12 no.2
    • /
    • pp.103-111
    • /
    • 2013
  • This paper discusses how to manage supply chain disruption risks from natural disasters or other low-likelihood-high-impact risk drivers. After the catastrophic earthquake in Eastern Japan and the severe flood in Thailand, most companies have been attempting to re-establish the business continuity plan to prevent their supply chain from disruption. However, the challenges for managers and individual risks are often interrelated, and thus, actions that mitigate one risk can end up being no contribution as a whole. In this paper, we describe a framework for assessing how much impact individual mitigation strategies have on the entire supply chain protection against disruption, using network reliability. We propose three categories of risk-mitigation approaches: Stabilization, Absorption, and Duplication. We analyze the situation under which each of these strategies is the best suitable. With a clear understanding of relations between these mitigation strategies and the entire supply chain risks, managers can select effective risk-reduction approaches to their supply chain.

Regional Level of Inclusive Development

  • Shashyna, Maryna V.;Butko, Mykola P.;Tulchynska, Svitlana O.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.133-138
    • /
    • 2021
  • The concept of inclusive development provides equal opportunities for all participants in access to the labor market and resource allocation. This concept emphasizes the equality of human capital, the ecological state of the environment, social protection and food security. This concept is fundamentally different from the standard perception of economic growth, because it has broader goals than simply increasing incomes and GDP. It rejects the position that positive results are an automatic consequence of growth; here the basic condition is human development and increase of its well-being, reduction of poverty. Therefore, it is not the result of distribution that becomes primary, but the involvement in the process of social reproduction. An alternative system of characterization of the country's position according to the resulting indicator of the Inclusive Development Index was presented at the World Economic Forum in Davos. In this research the methodical development of the system of estimation of the index of inclusive development for regions of the NUTS 4 level of the European classification is resulted.

IEEE 802.22 WG에서의 CR응용: WRAN MAC설계

  • Go Gwang-Jin;Hwang Seong-Hyeon;Song Myeong-Seon;Kim Chang-Ju;Gang Beop-Ju
    • The Proceeding of the Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.17 no.2 s.58
    • /
    • pp.38-49
    • /
    • 2006
  • In order to increase the spectrum efficiency, recently, there is the number of studies for CR technology. For instance, IEEE 802.22 WRAN(Wireless Regional Area Network) WG considered the CR technology as a solution of WRAN system to serve the high speed internet service(1.5 Mbps down stream and 384 kbps up stream) in 100 km overall coverage and 54 MHz-746 MHz band. Basically, in MAC point of view, the WRAN system have been standardizing based on the IEEE 802.16 MAC layer features such as Data transmission method, QoS provision and Bandwidth request schemes. Additionally, the WRAN system further include CR nature functions such as incumbent user protection, self coexistence which would be importantly considered. Also, the inherent WRAN functions are added such as channel bonding and fractional bandwidth usage. This paper mainly explained frame structure, IU protection, self coexistence which are key functions of WRAN system. Finally, in this paper, we expressed a prospect of IEEE 802.22 WRAN standardization.

Smart IoT Hardware Control System using Secure Mobile Messenger (모바일 메신저를 이용한 스마트 IoT 하드웨어 제어 시스템)

  • Lee, Sang-Hyeong;Kim, Dong-Hyun;Lee, Hae-Yeoun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2232-2239
    • /
    • 2016
  • IoT industry has been highlighted in the domestic and foreign country. Since most IoT systems operate separate servers in Internet to control IoT hardwares, there exists the possibility of security problems. Also, IoT systems in markets use their own hardware controllers and devices. As a result, there are many limitations in adding new sensors or devices and using applications to access hardware controllers. To solve these problems, we have developed a novel IoT hardware control system based on a mobile messenger. For the security, we have adopted a secure mobile messenger, Telegram, which has its own security protection. Also, it can improve the easy of the usage without any installation of specific applications. For the enhancement of the system accessibility, the proposed IoT system supports various network protocols. As a result, there are many possibility to include various functions in the system. Finally, our IoT system can analyze the collected information from sensors to provide useful information to the users. Through the experiment, we show that the proposed IoT system can perform well.

Analysis of a Fault Characteristics in the Power Network with Distributed Generators (분산전원 연계 배전계통의 사고 특성 분석)

  • Jang, Sung-Il;Park, Je-Young;Choi, Jeong-Hwan;Jeong, Jong-Chan;Kim, Kwang-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2002.11b
    • /
    • pp.65-68
    • /
    • 2002
  • Distributed Generators (DG) are rapidly increasing and most of them are interconnected with distribution network to supply power into the network. Therefore, DG may make significant impacts on distribution system operation. protection, and control with respect to the voltage regulation, voltage flicker, harmonics, fault current levels, the losses of the network, etc. These impacts would be demerits for both of DG and distribution networks. And the operation of DG may be influenced by the abnormal grid condition such as disturbances occurred in the neighboring distribution feeders as well as the feeder directly connected with DG. This paper describes the influence of fault occurred in the interconnected power network on the DG operation and the impact of DG on the network load during the interruptions of utility power.

  • PDF

A Building Method of Infrastructure Efficiency under Ad Hoc-based on Network Infrastructure for Medical Information System (Ad Hoc 기반 의료정보시스템의 네트워크 보안 효율성구조 Infrastructure 설계방법)

  • Noh, Si-Choon;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.91-98
    • /
    • 2011
  • Medical information system based on ad hoc network designed for general information systems and information networks have different security requirements. Malicious code infiltration and security features are performed on same medical information network architecture along the route. Security domain of medical information systems is the ground of penetration and defense performed over the network architecture and it is also the traffic handling areas separated by a concept of differentiated group. Ad hoc-based medical information systems in the network security domain, set some standards about what should be the methodology of this study. In this paper, medical information system network configuration, the determining factor based on the security domain, the structure selection criteria and blocking positionings are presented according to the traffic route configuration. If you apply this methodology designed to increase security, efficiency can be possible. Health information systems in accordance with the security domain areas requires differentiated protection needs of the security mechanism that is proposed by this study.

A Study for Protocol for Heterogeneous Interface in Sensor Networks within Water Restore Facilities (수질복원시설물 내 센서 네트워크 이기종간 인터페이스용 프로토콜에 관한 연구)

  • Kim, Chan;Shin, Jaekwon;Cha, Jaesang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.5
    • /
    • pp.255-260
    • /
    • 2012
  • Currently, the management system of wastewater treatment facility has magnified due to the stringent regulations for the protection of the environment. However, wastewater treatment system is insufficient in wastewater quality monitoring technology in specialized. Above all it aim one-to-one data transmission instead of one-to-n data transmission through sensor and network. And then, it lack compatibility toward communication system between different. Mainly it has observed detecting system of manual system. In this paper, we studied protocol technology about efficient data transmission between sensor and integration interface of water quality detecting interface for automated sensor network integration interface in water restoration facility. Therefore, we proved the possibility of efficient data transmission from communication system of different type through monitoring implementation of sensor network integration interface.