• Title/Summary/Keyword: network protection system

Search Result 546, Processing Time 0.029 seconds

Distributed fiber-optic sensor network for the over temperature protection relay of electric power systems (전력설비 보호를 위한 온도계전기용 광섬유 분배센서)

  • Park, Hyoung-Jun;Lee, June-Ho;Song, Min-Ho
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2006.05a
    • /
    • pp.86-90
    • /
    • 2006
  • We prosed a distributed fiber-optic sensor system with 10 fiber Bragg gratings, for over temperature protection relay in power systems. We applied Gaussian line-fitting algorithm to compensate the distortion effects in the wavelength-scanned Farby-Perot filter demodulation scheme. Compared with the highest-peak-detection method, the proposed algorithm was proved to minimize the random errors of distorted PD profiles. From experimental results, the overall measurement error was within 1 % compared with the reference thermocouple and the linearity error was less than 0.37 %.

  • PDF

Calculation Scheme of Interference between Low Earth Orbit Satellite System and Terrestrial System (저궤도 위성시스템과 지상시스템의 간섭 계산 기법)

  • Gam, Hye-Mi;Oh, Dae-Sub;Ahn, Do-Seob
    • Journal of Satellite, Information and Communications
    • /
    • v.4 no.2
    • /
    • pp.46-51
    • /
    • 2009
  • This paper addresses the calculation method of the interference produced between the LEO(Low Earth Orbit) satellite constellation and Terrestrial system operating in the same frequency and area. We describes the procedure used in the numerical computation of the statistics of the total interference produced by interference system. The presented results are applied for mutual protection of LEO satellite constellation and FS system during system design phase.

  • PDF

Dynamic behavior control of a collective autonomous mobile robots using artificial immune networks (인공면역네트워크에 의한 자율이동로봇군의 동적 행동 제어)

  • 이동욱;심귀보
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1997.10a
    • /
    • pp.124-127
    • /
    • 1997
  • In this paper, we propose a method of cooperative control based on immune system in distributed autonomous robotic system(DARS). Immune system is living body's self-protection and self-maintenance system. Thus these features can be applied to decision making of optimal swarm behavior in dynamically changing environment. For the purpose of applying immune system to DARS, a robot is regarded as a B lymphocyte(B cell), each environmental condition as an antigen, and a behavior strategy as an antibody respectively. The executing process of proposed method is as follows. When the environmental condition changes, a robot selects an appropriate behavior strategy. And its behavior strategy is simulated and suppressed by other robot using communication. Finally much simulated strategy is adopted as a swarm behavior strategy. This control scheme is based on clonal selection and idiotopic network hypothesis. And it is used for decision making of optimal swarm strategy.

  • PDF

The Status of National Logistics Information System and The Future of Railway Logistics Information System (국가물류정보화 현황과 철도물류정보화 발전방향)

  • Kim, Dong-Hee;Ahn, Kyoung-Lim
    • Journal of the Korea Safety Management & Science
    • /
    • v.10 no.3
    • /
    • pp.227-235
    • /
    • 2008
  • Recently, as change in global logistics environment, various issues have been presenting. These issues are including the pursuit of low cost-high added value, the realization of sustainable logistics system, the protection of environment, and the development of ubiquitous techniques. To cope with these environment changes and improve the national logistics system, the government have carried out various logistics policies and pushed ahead development of national logistics information network. But still, from a view-point of national logistics, there are several inefficient elements such as information connection and utilization, code/data standardization. In this paper, the survey result of global logistics environment change, logistics policy of a developed countries, domestic logistics policy and information system status will be presented. And from these status, suggestive points are mentioned. Finally the status of railway logistics information and future developments are presented.

Design and Implimentation of Intrusion Detection System on Contents Security (컨텐츠 보안 침입 탐지 시스템 설계 및 구현)

  • Kim, Young Sun;Seo, Choon Weon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.164-168
    • /
    • 2015
  • As Internet use is widespread advertising through the Web, shopping, banking, etc. As the various services offered by the network, the need for Web security is increasing. A security system for the protection of information assets and systems against various types of external hacking threats and unlawful intrusion will require. Intrusion Detection Tool of the paper web will have is to increase the security level, to prevent the loss of resources and labor spent by the individual monitoring of the web. Security intrusion detection system analyzes the cause of the problem of the security vulnerability and exposure of the information on the Web. Using a monitor to determine a fast support of security is to design a security system for the purpose of protecting the information security vulnerability and exposure information.

Modern Management Technologies in the System of Ensuring the Security in the Context of Socio-Economic Development and the Digital Economy

  • Panchenko, Vladimir;Dombrovska, Svitlana;Samchyk, Maksym;Mykhailyk, Nataliia;Chabaniuk, Odarka
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.213-219
    • /
    • 2022
  • The main purpose of the study is to determine the main aspects of the introduction of modern management technologies into the security system in the context of socio-economic development and digitalization of the economy. Socio-economic development and a high level of security include growth in income, labor productivity, production volumes, increased competitiveness, changes in the institutional environment, consciousness, activity, social security, the quality of the education system, healthcare, etc. Despite the root cause of economic development, it is not an end in itself, but a tool for ensuring social development. Gaining access for citizens to education, health care, observance of the principles of equality and justice, ensuring protection are directly dependent on the level of economic well-being, the level of economic potential of the country or regions. The research methodology involved the use of both theoretical and practical methods. As a result of the study, the key elements of the introduction of modern management technologies into the security system in the context of socio-economic development and digitalization of the economy were identified.

A Study on the Watermarketing of Keyframe-Based for copyright Protection of video (동영상의 저작권 보호를 위한 키 프레임 기반의 워터마킹에 관한 연구)

  • Kim, Dan-Hwan;Oh, Moo-Song
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.102-107
    • /
    • 2005
  • With the advancement which development and information communication of the computer is quick about lower with multimedia technical diffusion of network base the necessity the use of the digital image technique which is various regarding the protection of sharp increasing multimedia contents raised its head in the social whole. the copyright protection against a multimedia data hazard the authentication techniques it will be able to confirm the content authentication, ownership authentication, illegal copy of the image which stands is demanded. confronts to the water marking technique of existing and the researches the fact that against a picture is most. In this paper, It does not damage the video data which is a multimedia contents not to be, it inserts copyright information and it protects the right of ownership. It is with a copyright protection which leads the wavelet transform which is a watermark of frequency base from visual system viewpoint in the human being center with it proposes the watermarking technique against a forgery prevention.

Meanings and Tasks of the Three Revised Bills which Ease Regulations on the Use of Personal Information (데이터 3법 개정의 의미와 추후 과제)

  • Kim, Seo-An
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.59-68
    • /
    • 2020
  • In January 2020, the National Assembly passed the revisions of three bills which ease regulations on the use of personal information. The revised laws include the launch of an independent supervisory body, the arrangement of redundant regulations, and regulations for the development of the data economy. This paper analyzes the content and meaning of each law of the Three Revised Bills that Ease Regulations on the Use of Personal Information. And the future challenges outline three aspects: the establishment of a system to ensure the right to informational self-determination of privacy concerns, the establishment of a certification system and the presentation of reasonable guidelines, and the expectation of professional performance by the Personal Information Protection Commission.

A Study on Smart Contract for Personal Information Protection (개인정보보호를 위한 스마트컨트랙트 연구)

  • Kim, Young-Hun
    • Journal of Digital Convergence
    • /
    • v.17 no.3
    • /
    • pp.215-220
    • /
    • 2019
  • The block chain technology is a technique that prevents manipulation of data and ensures integrity and reliability. Ethereum is building a smart contract environment as a type of encryptionenabled system based on block chains. Smart contracts can be implemented when conditions are met, thus increasing confidence in digital data. However, smart contracts that are being tried in various ways are not covered by information security and personal information protection. The structure in which the network participant can view the open transaction ledger is exposed to data or personal information listed in the block chain. In this study, it is possible to manage the data of personal information recorded in the block chain directly. This study is protected personal information by preventing the exposure of personal information and by executing time code, it is possible to erase recorded information after a certain period of time has elapsed. Based on the proposed system in the future, it is necessary to study the additional management techniques of unknown code defects or personal information protection.

Security Analysis and Improvements of Authentication Protocol for Privacy Protection in RFID Systems (프라이버시 보호를 위한 RFID 인증 프로토콜의 안전성 분석과 개선)

  • Kim, Jiye;Won, Dongho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.5
    • /
    • pp.581-591
    • /
    • 2016
  • RFID(Radio Frequency IDentification) is a key technology in ubiquitous computing and is expected to be employed in more fields in the near future. Nevertheless, the RFID system is vulnerable to attacks by eavesdropping or altering of the messages transmitted in wireless channels. In 2013, Oh et al. proposed a mutual authentication protocol between a tag and a reader in RFID systems. Their protocol is designed to resist location tracking for privacy protection. However, all tags and readers use only one network-wide key in their protocol and tags are usually vulnerable to physical attacks. We found that their protocol is still vulnerable to tag/reader impersonation attacks and location tracking if an attacker obtains the network-wide key from a tag. In this paper, we propose a security improved authentication protocol for privacy protection in RFID systems. In addition, we demonstrate that the proposed scheme is efficient in terms of computation and communication costs.