• Title/Summary/Keyword: protection of distribution network

Search Result 137, Processing Time 0.03 seconds

Data-Hiding Method using Digital Watermark in the Public Multimedia Network

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of Information Processing Systems
    • /
    • v.2 no.2
    • /
    • pp.82-87
    • /
    • 2006
  • In spite of the rapid development of the public network, the variety of network-based developments currently raises numerous risks factors regarding copyright violation, the prohibition and distribution of digital media utilization, safe communication, and network security. Among these problems, multimedia data tend to increase in the distributed network environment. Hence, most image information has been transmitted in the form of digitalization. Therefore, the need for multimedia contents protection must be addressed. This paper is focused on possible solutions for multimedia contents security in the public network in order to prevent data modification by non-owners and to ensure safe communication in the distributed network environment. Accordingly, the Orthogonal Forward Wavelet Transform-based Scalable Digital Watermarking technique is proposed in this paper.

A study of communication-based protection coordination for networked distribution system (네트워크 배전계통용 통신기반 보호협조에 관한 연구)

  • Kim, WooHyun;Chae, WooKyu;Hwang, SungWook;Lee, HakJu
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.8 no.1
    • /
    • pp.43-48
    • /
    • 2022
  • Although the distribution system has been structured as complicated as a mesh in the past, the connection points for each line are always kept open, so that it is operated as a radial distribution system (RDS). For RDS, the line utilization rate is determined according to the maximum load on the line, and the utilization rate is usually kept low. In addition, when a fault occurs in the RDS, a power outage of about 3 to 5 minutes occurs until the fault section is separated, and the healthy section is transferred to another line. To improve the disadvantages of the RDS, research on the construction of a networked distribution system (NDS) that linking multiple lines is in progress. Compared to the RDS, the NDS has advantages such as increased facility utilization, load leveling, self-healing, increased capacity connected to distributed generator, and resolution of terminal voltage drop. However, when a fault occurs in the network distribution system, fault current can flow in from all connected lines, and the direction of fault current varies depending on the fault point, so a high-precision fault current direction determination method and high-speed communication are required. Therefore, in this paper, we propose an accurate fault current direction determination method by comparing the peak value polarity of the fault current in the event of a fault, and a communication-based protection coordination method using this method.

LAN-Based Protective Relaying for Interconnect Protection of Dispersed Generators (LAN을 이용한 분산전원 연계 계통의 보호)

  • Jyung, Tae-Young;Baek, Young-Sik
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.3
    • /
    • pp.491-497
    • /
    • 2007
  • As dispersed generators was driven in condition interconnecting with utility, it could cause a variety of new effects to the original distribution system that was running as considered only the one-way power flow. Therefore, the protection devices that is builted in distribution system should be designed to be able to operate with disposing of not only a fault of the generator, but also utility condition. Especially, the fault of the feeder interconnected with Dispersed Generator can cause the islanding phenomenon of open DG(Dispersed Generators). This phenomenon has many problems such as a machinery damage, electricity qualify degradation and a difficulty of the system recovery. In the fault therefore, we must separate Dispersed Generator from the system quickly. In this paper, for the fault classification of the interconnected DG and the outside feeder we judge the fault of the interconnected DG and the outside feeder in HMI through data provided by IED(Intelligent Electronic Device) on the network and decide whether it operates or not by sending the result to each relay.

Design on Protection and Authentication System of IPTV Contents using HSI Watermark (HSI 워터마크를 이용한 IPTV 콘텐츠 보호 및 인증 시스템 설계)

  • Kim, Dae-Jin;Choi, Hong-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.55-62
    • /
    • 2010
  • While the broadband network and multimedia technologies have been developing, the commercial market of digital contents also has been widely spreading with recently starting IPTV. As the IPTV services are getting to be generalized and popularized, the contents illicit copying and distribution of copyright meterials tends to draw more attentions. So we need a right service system that can protect contents and copyright using watermark inserting. Until now, the conventional protection and authentication system is taking advantages of merits both in CAS and DRM. But this system can not protect the contents when acquiring them from TV output using A/D convertor. So we apply watermark method using HSI color space against contents illicit copying. And for distribution of copyright materials. we compound unique settop ID and copyrighter's ID to make new ID that is watermark. When inserting watermark, we use the watermark for copyright protection and authentication. So we can protect copyright and identify last settop's user in illicit distribution. we design download based IPTV contents protection and authentication system using HSI watermark method.

A Syudy on the Detection of High Impedance Faults using Wavelet Transforms and Neural Network (웨이브렛 변환과 신경망 학습을 이용한 고저항 지락사고 검출에 관한 연구)

  • 홍대승;배영철;전상영;임화영
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.459-462
    • /
    • 2000
  • The analysis of distribution line faults is essential to the proper protection of power system. A high impedance fault(HIF) dose not make enough current to cause conventional protective device operating. so it is well hon that undesirable operating conditions and certain types of faults on electric distribution feeders cannot be detected by using conventional protection system. In this paper, we prove that the nature of the high impedance faults is indeed a deterministic chaos, not a random motion Algorithms for estimating Lyapunov spectrum and the largest Lyapunov exponent are applied to various fault currents detections in order to evaluate the orbital instability peculiar to deterministic chaos dynamically, and fractal dimensions of fault currents which represent geometrical self-similarity are calculated. Wavelet transform analysis is applied the time-scale information to fault signal. Time-scale representation of high impedance faults can detect easily and localize correctly the fault waveform.

  • PDF

Study on Personal Information Protection Behavior in Social Network Service Using Health Belief Model (건강신념모델을 이용한 소셜네트워크서비스에서의 개인정보보호행위에 관한 연구)

  • Shin, Se-mi;Kim, Seong-jun;Kwon, Do-soon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1619-1637
    • /
    • 2016
  • With wide distribution of smart phones and development of mobile network, social network service (SNS) is displaying remarkable growth rates. Users build new social relations by sharing their interests, which brings surging growth to the SNS based on the combination between the strength of expanding the place for communication and distribution of smart phones featured with easy portability. This study is designed to understand impact factors of SNS on users in Korea and to conduct empirical research on casual relationship between the factors above and the factors affecting personal information behavior through the privacy protection and self-efficacy. In order to accomplish the objective above, the study presented a research model applied with key variables of the Health Belief Model (HBM) predicting behaviors capable of recognizing and preventing individual diseases in the field of health communication. To perform empirical verification on the research model of this study, a survey was conducted upon college students at N university located in Chungcheongnam-do and K university in rural area, who have experiences using the SNS. Through this survey, a total of 186 samples were collected, and path analysis was performed in order to analyze the relationship between the factors. Based on the findings from the survey, first, variables Perceived probability, Perceived severity, Perceived impairment of the HBM, key factors of personal information protection behavior on the SNS, were found to exhibit negative relationship with self-efficacy, and Perceived probability, Perceived benefit, Perceived impairment were found to exhibit negative relationship with privacy protection. But the above, Perceived severity showed positive relationship with privacy protection, and Perceived benefit and self-efficacy also displayed positive relationship. Second, although self-efficacy, a parameter, showed positive relationship with privacy protection, it demonstrated negative relationship with personal information protection behavior. Lastly, privacy protection exhibited positive relationship with personal information protection behavior. By presenting theoretical model reflected with characteristics of prevention based on these findings above unlike previous studies on personal information protection using technologies threatening personal information, this study is to provide theoretical and operational foundation capable of offering explanations how to predict personal information protection behavior on the SNS in the future.

A Study on WDM hybrid OPS(Optical Protection Socket) in CPN(Customer Premises Network) (광가입자망에서 WDM 하이브리드 광절체 시스템에 관한 연구)

  • Kim, Chung-Lae;Eom, Jin-Seob
    • Journal of Industrial Technology
    • /
    • v.15
    • /
    • pp.113-122
    • /
    • 1995
  • By integrating WDM to OPS unit which plays an important role for the reliability of CPN, we made it possible to provide CATV, VOD, and high-speed data services simultaneously and to meet the requirements for new services in the future. For the design of optimal system, the link analysis of power budget has been performed. Also, the prototyped system has been tested with STM-1 level signals to confirm functions such as transmission, distribution, and protection. The results proved that when occurred out-of-order or recovery of ONU, the system did the pertinent switching with minimum loss for high-speed data services. Also for video distribution services, the system has distributed STM-1 level signals successfully.

  • PDF

An Adaptive Reclosing Technique Considering the Distributed Generation (분산전원을 고려한 적응적 재폐로 기법)

  • Seo, Hun-Chul;Kim, Chul-Hwan;Yeo, Sang-Min
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.2
    • /
    • pp.227-232
    • /
    • 2007
  • The autoreclosing is applied to power system for maintaining system stability and continuity of supply. Developments on distributed generation(DG) grows significantly by environmental issues and economical issues. If the DG is connected to distribution system, the DG influences the technical aspects such as power quality, protection and stability. It causes the challenges to protection, especially to reclosing. In order to achieve reliability and safety of the distribution system, the rules and guidelines suggest that the DG units should be rapidly disconnected from the network before the reclosing. If the DG is disconnected whenever the fault occurs, it cannot be utilized effectively. This paper presents the adaptive reclosing algorithm considering the DG. The algorithm consists of angle oscillation's judgment, EEEAC(Emergency Expanded Equal-Area Criterion), calculation of optimal reclosing time and re-connection algorithm. The simulation is implemented for the DG technology by using EMTP MODELS. The simulation results show that the transient stability is maintained and the DG is protected against disturbance.

Network intrusion detection method based on matrix factorization of their time and frequency representations

  • Chountasis, Spiros;Pappas, Dimitrios;Sklavounos, Dimitris
    • ETRI Journal
    • /
    • v.43 no.1
    • /
    • pp.152-162
    • /
    • 2021
  • In the last few years, detection has become a powerful methodology for network protection and security. This paper presents a new detection scheme for data recorded over a computer network. This approach is applicable to the broad scientific field of information security, including intrusion detection and prevention. The proposed method employs bidimensional (time-frequency) data representations of the forms of the short-time Fourier transform, as well as the Wigner distribution. Moreover, the method applies matrix factorization using singular value decomposition and principal component analysis of the two-dimensional data representation matrices to detect intrusions. The current scheme was evaluated using numerous tests on network activities, which were recorded and presented in the KDD-NSL and UNSW-NB15 datasets. The efficiency and robustness of the technique have been experimentally proved.

Field Applicability of Design Methodologies for Groundwater Quality Monitoring Network

  • Lee, Sang-Il
    • Korean Journal of Hydrosciences
    • /
    • v.10
    • /
    • pp.47-58
    • /
    • 1999
  • Protection of groundwater resources from contamination has been of increasing concern throughout the past decades. In practice, however, groundwater monitoring is performed based on the experience and intuition of experts or on the convenience. In dealing with groundwater contamination, we need to know what contaminants have the potential to threat the water quality and the distribution and concentration of the plumes. Monitoring of the subsurface environment through remote geophysical techniques or direct sampling from wells can provide such information. Once known, the plume can be properly menaged. Evaluation of existing methodologies for groundwater monitoring network design revealed that one should select an appropriate design method based on the purpose of the network and the avaliability of field information. Integer programming approach, one of the general purpose network design tools, and a cost-to-go function evaluation approach for special purpose network design were tested for field applicability. For the same contaminated aquifer, two approaches resulted in different well locations. The amount of information, however, was about the same.

  • PDF