• Title/Summary/Keyword: protection management

Search Result 2,988, Processing Time 0.032 seconds

Motor Protection and Control with Digital Protective Relays (디지털 보호 계전기를 이용한 모터 보호 및 제어)

  • 이성환;안인석
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.178-178
    • /
    • 2000
  • In this paper, intelligent methods using digital protection relay in power management and control system is developed in order to protect power systems by means of timely fault detection during operation and control at starting for induction motor which have various load environments and capacities in power systems. The digital protective relay was designed with DSP CPU(TMS320C31) to Protect and measure more quickly and precisely. The test result on the basis of KEMCl120 and IEC60255, show that the operation time error of the digital motor protection relay is improved within $\pm$5%. Also, we can control motors at starting according to starting types with simple method as programmable sequence editor. So we can improve the demerits of high cost and much manhour for rework.

  • PDF

Cybersecurity Risk Assessment of a Diverse Protection System Using Attack Trees (공격 트리를 이용한 다양성보호계통 사이버보안 위험 평가)

  • Jung Sungmin;Kim Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.3
    • /
    • pp.25-38
    • /
    • 2023
  • Instrumentation and control systems measure and control various variables of nuclear facilities to operate nuclear power plants safely. A diverse protection system, a representative instrumentation and control system, generates a reactor trip and turbine trip signal by high pressure in a pressurizer and containment to satisfy the design requirements 10CFR50.62. Also, it generates an auxiliary feedwater actuation signal by low water levels in steam generators. Cybersecurity has become more critical as digital technology is gradually applied to solve problems such as performance degradation due to aging of analog equipment, increased maintenance costs, and product discontinuation. This paper analyzed possible cybersecurity threat scenarios in the diverse protection system using attack trees. Based on the analyzed cybersecurity threat scenario, we calculated the probability of attack occurrence and confirmed the cybersecurity risk in connection with the asset value.

A Study on the Enforced Security of Personal Information Outsourcing (개인정보 위탁업무 보안성 강화방안 연구)

  • Son, Tae Hyun;Park, Jung Sun
    • Journal of the Korea Safety Management & Science
    • /
    • v.16 no.3
    • /
    • pp.433-441
    • /
    • 2014
  • Increasing the outsourcing of personal information treatment, the safe management and director for fiduciary is very important. In this paper, under the personal information protection management systems the current situation of fiduciary management and direction was reviewed and the certification system was analysed in terms of availability of the controled items. Under the basis of legal compliance at the time of the Privacy Act, the characteristics of outsourcing type was also analyzed and derived new controled items. As a result of the proposed research, new controled items for fiduciary could be used as a standard for the managing Director.

Proposals On The Designe, Construction, Management Maintenance standardization Method Of Mechanical Field Fire Protection System By NFSC (화재안전기준(NFSC)에 따른 기계분야 소방설비 설계, 시공, 감리 유지관리 업무 표준화 방안에 대한 제안)

  • Kim, Sung-Il;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.19 no.3
    • /
    • pp.11-17
    • /
    • 2017
  • The study seeks to cooperate with the investigation of a fire investigation based on public-private partnership. Fire protection systems provide a wide variety of viewpoints from the perspectives of design, construction, management, maintenance, maintenance and maintenance systems at a particular point in time, construction, management, and maintenance systems. What is controversial is that there are illegal activities such as illegal activities of the Patent Office, misconduct of construction work and unreasonable construction of construction works.As a theoretical framework, the present study identified the four key elements of a successful disaster response system : responsiveness, control, professionalism, and bias.

A Study on the Effect of Firm Internationalization -Focused on the Corporate Social Responsibility- (기업의 국제화에 영향을 주는 요인에 관한 연구 -사회적 책임활동을 중심으로-)

  • Choi, A-Reum;Koo, Jee-Hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.6
    • /
    • pp.109-118
    • /
    • 2016
  • The purpose of this study was to examine the relationship between corporate social responsibility and internationalization. The companies executed the CSR activity using the published index of economic justice (KEJI index) surveyed from 2013 to 2014. A total of 286 companies were included in the study. Results are as follows. First, the degree of internationalization groups showed significant differences. It found that the higher the proportion of international companies showed positively CSR activities. Especially, It found that environmental management and customer protection showed positively performed. Second, environmental management and customer protection showed positive effect on firm internationalization. It found that the higher the proportion of international companies thought environmental management and customer protection activity were more important. This study proposed that CSR activity are very important in firm performance. It showed CSR activities and strategy are presented for sustainable management.

Design & Implementation of License-based Digital Rights Management System (라이센스 기반 디지털 저작권 보호 시스템 설계 및 구현)

  • Jeong, Yeon-Jeong;Yoon, Ki-Song;Ryu, Jae-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.55-62
    • /
    • 2004
  • The web-based technology allows anybody who has access to the Internet to get all kinds of information from the World Wide Web. It brings about issues regarding intellectual property and copyright threats. After content is downloaded, no further protection is provided on the content that has been accessed. DRM (Digital Right Management) technologies came out to ensure the protection of copyrighted content and information. In this paper, we propose architecture of license-based digital rights management system for protection of contents and principles' rights such as contents creators, providers, distributors, and uses in contents distribution value-chain over Internet. This system makes on-line processing of all value-chain from creator to purchaser possible, compared with existing DRM products only supporting only limited distribution between distributor and purchaser.

The Standardization Modeling concerning Organizational Composition and a Management System for the Protection of Personal Information (개인정보 보호를 위한 조직구성과 관리체계에 관한 표준화 모델링)

  • Seo, Woo Seok;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.33-39
    • /
    • 2012
  • Since the passing of the Personal Information Act in March 2011 and its initial introduction in September, over the one year to date diverse security devices and solutions have been flowing into the market to enable observance of the relevant laws. Beginning with security consulting, corporations and institutions have focused on technology-based business in order to enable observance of those laws competitively in accordance with 6-step key procedures including proposal, materialization, introduction, construction, implementation, and execution. However there has not been any investment in human resources in the field of education such as technology education and policy education relative to the most important human resources field nor investment in professionals in the organization for the protection of personal information or in human resources for operating and managing IT infrastructure for actual entire personal information such as special sub-organizations. In this situation, as one process of attracting change from the nature of the technology-based security market toward a professional human resource-based security infrastructure market, it is necessary to conduct research into standardization modeling concerning special organizational composition and a management system for the protection of personal information.

Advance Reservation Framework with Protection Management for Virtual Circuit Services (가상회선 서비스를 위해 보호 관리 기능을 갖는 사전 예약 프레임워크)

  • Lim, Huhnkuk;Lee, Kyungmin;Cha, Youngwook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.11
    • /
    • pp.902-910
    • /
    • 2013
  • The most representative research network in Korea, KREONET, has developed DynamicKL, an advance reservation based Network Service Agent (NSA) for user driven virtual circuit services. DynamicKL provides reservation, provisioning, release, termination, and inquiry web services for network resources by using an open standard network service interface (NSI), as well as web services for network resources by using a GUI interface. In addition, it has the RICE interface to support a protection management function per VC for virtual circuits and reservations. In this article, a protection management per VC for provisioned VCs and reservations is addressed in the DynamicKL framework, as a contribution to the VC protection management issue, which results in more manageable and reliable VC services compared to other advance reservation frameworks. An administrator can detect successful or unsuccessful VC protections in the event of a primary link failure and successful or unsuccessful VC retrievals after a primary link repair, by using RICE.