• 제목/요약/키워드: network protection system

검색결과 545건 처리시간 0.028초

On-line Estimation of DNB Protection Limit via a Fuzzy Neural Network

  • Na, Man-Gyun
    • Nuclear Engineering and Technology
    • /
    • 제30권3호
    • /
    • pp.222-234
    • /
    • 1998
  • The Westinghouse OT$\Delta$T DNB protection logic heavily restricts the operation region by applying the same logic for a full range of operating pressure in order to maintain its simplicity. In this work, a fuzzy neural network method is used to estimate the DNB protection limit using the measured average temperature and pressure of a reactor core. Fuzzy system parameters are optimized by a hybrid learning method. This algorithm uses a gradient descent algorithm to optimize the antecedent parameters and a least-squares algorithm to solve the consequent parameters. The proposed method is applied to Yonggwang 3&4 nuclear power plants and the proposed method has 5.99 percent larger thermal margin than the conventional OT$\Delta$T trip logic. This simple algorithm provides a good information for the nuclear power plant operation and diagnosis by estimating the DNB protection limit each time step.

  • PDF

Power Allocation in Heterogeneous Networks: Limited Spectrum-Sensing Ability and Combined Protection

  • Ma, Yuehuai;Xu, Youyun;Zhang, Dongmei
    • Journal of Communications and Networks
    • /
    • 제13권4호
    • /
    • pp.360-366
    • /
    • 2011
  • In this paper, we investigate the problem of power allocation in a heterogeneous network that is composed of a pair of cognitive users (CUs) and an infrastructure-based primary network. Since CUs have only limited effective spectrum-sensing ability and primary users (PUs) are not active all the time in all locations and licensed bands, we set up a new multi-area model to characterize the heterogeneous network. A novel combined interference-avoidance policy corresponding to different PU-appearance situations is introduced to protect the primary network from unacceptable disturbance and to increase the spectrum secondary-reuse efficiency. We use dual decomposition to transform the original power allocation problem into a two-layer optimization problem. We propose a low-complexity joint power-optimizing method to maximize the transmission rate between CUs, taking into account both the individual power-transmission constraints and the combined interference power constraint of the PUs. Numerical results show that for various values of the system parameters, the proposed joint optimization method with combined PU protection is significantly better than the opportunistic spectrum access mode and other heuristic approaches.

Comparative Study on Water Hammer for Pump Station in High Pressurized Pipes in Kuwait

  • Shim, Kyu Dae;Kang, Yong Suk;Choung, Joon Yeon;Abdellatif, Mohamed;Kim, Dong Kyun
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2017년도 학술발표회
    • /
    • pp.265-269
    • /
    • 2017
  • Because of abrupt changes for velocity in water, transient flow is occurred in practical life. To reduce and avoid the high or low pressure of pipe network system, various surge protection facilities are used to prevent the risk in pipe network system. Especially, we focused on study not only preventing positive and negative pressure but also selecting adequate equipment for high pressurized pipelines. Several critical cases were considered by undertaking a steady state hydraulic study and transient dynamic simulation and we suggested that the surge vessel of various surge protection system was recommended to control high and low pressures on pipeline system in perspective.

  • PDF

그룹웨어시스템상의 악성트래픽 차단 네트워크구조 설계방법 (A Study on Methodology for Protection of Malicious Traffic in Groupware Network System)

  • 노시춘;방기천
    • 디지털콘텐츠학회 논문지
    • /
    • 제8권1호
    • /
    • pp.69-76
    • /
    • 2007
  • 그룹웨어시스템 악성트래픽 차단이란 인트라넷 시스템상에서 악성트래픽의 확산과 유통을 차단하는 방법이다. 그룹웨어시스템 악성트래픽 차단방식은 전통적 구조에서 차단하지 못했던 다양한 경로와 유형의 유해트래픽을 그룹웨어 내부경로상에서 차단함으로써 보안처리 및 트래픽 과부하를 경감시킨다. 제안된 그룹웨어 시스템 방역을 시행할 경우 내부 게이트웨이와 연결된 Backbone Switch의 CPU상에 는 부하율에 큰 변화가 나타났다. 내부 게이트웨이 설치전 트래픽 급증에따라 상승하던 CPU 부하는 내부게이트웨이 설치후 상당수준 감소되었다. 이젓은 형태를 알 수 없는 다량의 유해 트래픽이 내부 네트워크를 통과하고 있음을 보여주는 것이며 평상시 네트워크 환경이 얼마나 많은 악성트래픽의 위협에 직면해있는지를 보여주는 것이다. 백본 스위치의 CPU 사용율은 일간 평균 17% 수준을 유지하다가 내부 게이트웨이 상에서 유해 트래픽을 제거한 후는 4% 로서 10% 정도 축소됨으로써 본 연구에서 제안한 내부게이트웨이 방역의 효율성을 입증해준다.

  • PDF

유비쿼터스 센싱 네트워크 환경 하에서 정보 프라이버시의 보호 기술과 영역에 관한 연구 (상황인식시스템과 개인정보를 중심으로) (A study on protection technology and scope about information Privacy in ubiquitous Sensing Network Environment (A focus on context awareness system and personal information))

  • 강장묵;방기천
    • 디지털콘텐츠학회 논문지
    • /
    • 제7권4호
    • /
    • pp.301-308
    • /
    • 2006
  • 유비쿼터스 시대를 앞당길 기술로는 USN, RFID, Homenetwork 등이 있다. 이와 같은 기술들은 상황인식 시스템을 구현하게 된다. 상황을 인식한다는 것은 사람, 사물, 환경이 실시간으로 정보를 유선 및 무선으로 제공할 수 있는 환경을 뜻한다. 따라서 개인정보, 정보 프라이버시, 광의의 프라이버시가 심각한 위협에 직면할 것이다. 본 연구는 USN 환경 하에서 상황 인식 시스템이 가지고 있는 개인정보의 위협을 분석하고 이를 보호할 수 있는 기술들을 제시하였다. 각 기술들은 보호의 영역들을 세분화 시킨 정보 프라이버시에 적용할 수 있는 기술들이다. 본 연구를 통하여 정보 프라이버시의 개념적 재해석과 기술적 제시를 통한 통찰력과 종합적 해결 방안을 기대해본다.

  • PDF

배전자동화 시스템의 서비스 향상을 위한 P2P 기반의 분산형 통신망 구조 (A Distributed Communication Architecture Based on the Peer-to-Peer Model for Enhancing Distribution Automation System Services)

  • 임일형;홍석원;최면송;이승재;하복남
    • 전기학회논문지
    • /
    • 제56권3호
    • /
    • pp.443-450
    • /
    • 2007
  • We overview the current distribution automation system in Korea and point out the limitations of the distribution services which can be provided by the current system. In this paper we propose a new distribution system architecture which is based on the peer-to-peer communication model. In this decentralized architecture the intelligent FRTUS can initiate data transmission without any interruption of a central server, and can exchange data with other FRTUS as peers. In order to support the peer-based distribution system, we specify the requirements for new communication network and suggest a way of improving the current distribution network where we adapt an intelligent module for protection and restoration, called MASX, and utilize the open communication network protocols. We also show how the new architecture can enhance major distribution services such as protection, automatic restoration, and equipment management.

전자무역의 베이지안 네트워크 개선방안에 관한 연구 (A Study on the Improvement of Bayesian networks in e-Trade)

  • 정분도
    • 통상정보연구
    • /
    • 제9권3호
    • /
    • pp.305-320
    • /
    • 2007
  • With expanded use of B2B(between enterprises), B2G(between enterprises and government) and EDI(Electronic Data Interchange), and increased amount of available network information and information protection threat, as it was judged that security can not be perfectly assured only with security technology such as electronic signature/authorization and access control, Bayesian networks have been developed for protection of information. Therefore, this study speculates Bayesian networks system, centering on ERP(Enterprise Resource Planning). The Bayesian networks system is one of the methods to resolve uncertainty in electronic data interchange and is applied to overcome uncertainty of abnormal invasion detection in ERP. Bayesian networks are applied to construct profiling for system call and network data, and simulate against abnormal invasion detection. The host-based abnormal invasion detection system in electronic trade analyses system call, applies Bayesian probability values, and constructs normal behavior profile to detect abnormal behaviors. This study assumes before and after of delivery behavior of the electronic document through Bayesian probability value and expresses before and after of the delivery behavior or events based on Bayesian networks. Therefore, profiling process using Bayesian networks can be applied for abnormal invasion detection based on host and network. In respect to transmission and reception of electronic documents, we need further studies on standards that classify abnormal invasion of various patterns in ERP and evaluate them by Bayesian probability values, and on classification of B2B invasion pattern genealogy to effectively detect deformed abnormal invasion patterns.

  • PDF

Rationalization of Network Segregation for Continuity of Financial Services Following COVID-19

  • Choi, Manyong;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권11호
    • /
    • pp.4163-4183
    • /
    • 2021
  • As measures for protecting users and ensuring security of electronic financial transactions, such as online banking, financial institutions in South Korea have implemented network segregation policies. However, a revision of such domain-centered standardized network segregation policies has been increasingly requested because of: 1) increased demand for remote work due to changes resulting from COVID-19 pandemic; and 2) the difficulty of applying new technologies of fintech companies based on information and communications technologies (ICTs) such as cloud services. Therefore, in this study, problems of the remote work environment arising from the network segregation policy currently applied to the financial sector in South Korea and those from the application of new ICTs such as fintech technology have been investigated. In addition, internal network protection policies of foreign financial sectors, such as those of the United States, United Kingdom, European Union, and Russia, and internal network protection policies of non-financial sectors, such as control systems, have been analyzed. As measures for the effective improvement of the current network segregation policy, we propose a policy change from domain-based to data-centric network segregation. Furthermore, to resolve threats of hacking at remote work, recently emerging as a global problem due to COVID-19 pandemic, a standard model for remote work system development applicable to financial companies and a reinforced terminal security model are presented, and an alternative control method applicable when network segregation is not applied is proposed.

DISTRIBUTED CONTROL SYSTEM FOR KSTAR ICRF HEATING

  • Wang, Son-Jong;Kwak, Jong-Gu;Bae, Young-Dug;Kim, Sung-Kyu;Hwang, Churl-Kew
    • Nuclear Engineering and Technology
    • /
    • 제41권6호
    • /
    • pp.807-812
    • /
    • 2009
  • An ICRF discharge cleaning and a fast wave electron heating experiment were performed. For automated operation and providing the diagnostics of the ICRF system, the ICRF local network was designed and implemented. This internal network provides monitoring, RF protection, remote control, and RF diagnostics. All the functions of the control system were realized by customized DSP units. The DSP units were tied by a local network in parallel. Owing to the distributed feature of the control system, the ICRF local control system is quite flexible to maintain. Developing the subsystem is a more effective approach compared to developing a large controller that governs the entire system. During the first experimental campaign of the KSTAR tokamak, the control system operated as expected without any major problems that would affect the tokamak operation. The transmitter was protected from harmful over-voltage events through reliable operation of the system.