• Title/Summary/Keyword: protection technique.

Search Result 910, Processing Time 0.03 seconds

Frequency Estimation Method using Recursive Discrete Wavelet Transform for Fault Disturbance Recorder (FDR를 위한 RDWT에 의한 주파수 추정 기법)

  • Park, Chul-Won;Ban, Yu-Hyeon
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.8
    • /
    • pp.1492-1501
    • /
    • 2011
  • A wide-area protection intelligent technique has been used to improve a reliability in power systems and to prevent a blackout. Nowadays, voltage and current phasor estimation has been executed by GPS-based synchronized PMU, which has become an important way of wide-area blackout protection for the prevention of expending faults in power systems. As this technique has the difficulties in collecting and sharing of information, there have been used a FNET method for the wide-area intelligent protection. This technique is very useful for the prediction of the inception fault and for the prevention of fault propagation with accurate monitoring frequency and frequency deviation. It consists of FDRs and IMS. It is well known that FNET can detect the dynamic behavior of system and obtain the real-time frequency information. Therefore, FDRs must adopt a optimal frequency estimation method that is robust to noise and fault. In this paper, we present comparative studies for the frequency estimation method using IRDWT(improved recursive discrete wavelet transform), for the frequency estimation method using FRDWT(fast recursive discrete wavelet transform). we used the Republic of Korea 345kV power system modeling data by EMTP-RV. The user-defined arbitrary waveforms were used in order to evaluate the performance of the proposed two kinds of RDWT. Also, the frequency variation data in various range, both large range and small range, were used for simulation. The simulation results showed that the proposed frequency estimation technique using FRDWT can be the optimal frequency measurement method applied to FDRs.

Video Copyright Protection through Watermarking of Wavelet Transform based on the Frequency (주파수기반 웨이브릿 변환의 워터마킹을 통한 동영상 저작권 보호에 관한 연구)

  • Han, Mi-Ja;Kim, Dan-Hwan;Jung, Chang-Ryul;Jeong, Byeong-Yeol;Lee, Sung-Keun;Koh, Jin-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.535-539
    • /
    • 2008
  • With the advancement which development and information communication of the computer is quick about lower with multimedia technical diffusion of network base the necessity the use of the digital image technique which is various regarding the protection of sharp increasing multimedia contents raised its head in the social whole. The copyright protection against a multimedia data hazard the authentication techniques it will be able to confirm the content authentication, ownership authentication, illegal copy of the image which stands is demanded. confronts to the water marking technique of existing and the researches the fact that against a picture is most. In this paper, It does not damage the video data. As inserts copyright information and it protects the copyright. It is with a copyright protection which leads the wavelet transform which is a watermark of frequency base from visual system viewpoint in the human being center with it proposes the watermarking technique against a forgery prevention.

  • PDF

A GIS Technology for Growndwater Protection (수자원 관리와 보호를 위한 GIS활용연구)

  • 김윤종;성익환;김원영;유일현;박준동
    • The Journal of Engineering Geology
    • /
    • v.3 no.3
    • /
    • pp.253-266
    • /
    • 1993
  • GIS technique was applied for ffie work of water supply protection, and GIS rnaps were produced by this technique in Cheong-ju area. They are actual runoff rnap and regional groundwater protection map. The digital database was estabilished for creation of these maps in EGIS(Environmental Geologic information system). A lot of environmental, hydrological and geotedmical data relating to the area were collected from various sources, and used along with the results of the field investigation and laboratorv works in the interpretation of environmental geologic characteristics of the area. These special maps can be applied in the establishment of water supply protection and regional land use planning. For instant, the actaal runoff rnap is very linportant for hydrologic study, and groundwater protection map for susceptibility to groundwater contamination in the area. Actual runoff of the study area was calculated about 148mm using the method of SCS(Soil Consrevation Service) in GIS. The GIS technique was effective in watershed analysis and water balance study.

  • PDF

Test Data Selection Technique to Detect Interaction Faults in Embedded System (내장형 시스템의 상호작용 오류 감지를 위한 테스트 데이타 선정 기법)

  • 성아영;최병주
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.12
    • /
    • pp.1149-1157
    • /
    • 2003
  • As an Embedded system combining hardware and software gets more complicated, the importance of the embedded software test increases. Especially, it is mandatory to test the embedded software in the system which has high safety level. In embedded system, it is necessary to develop a test technique to detect faults in interaction between hardware and software. In this paper, we propose a test data selection technique using a fault injection technique for the faults in interaction between hardware and software in embedded system and we apply our technique to the Digital Plant Protection System and analyze effectiveness of the proposed technique through experiments.

Protection protocol for the contents rights intrusion (컨텐츠 유통 권리 침해 방지를 위한 프로토콜)

  • 김태우;이형우
    • Convergence Security Journal
    • /
    • v.3 no.1
    • /
    • pp.59-72
    • /
    • 2003
  • Recently, the studies of contents protection technique are getting popular in the field of internet DRM(Digital Right Management). But, authentication process of digital contents is different from each implementation. Also, protection technique for the contents rights intrusion adapts each other methodologies. We survey the modeling and system of DRM such as DOI, INDECS, MPEG-21, XrML, and OPIMA standard in this paper.

  • PDF

Distributed generation protection technique to minimize the outage section (정전구간 최소화를 위한 방향과전류계전기 기반 분산전원 보호 방법)

  • Kang Yongcheol;Lee Byungeun;Kim Eunsuk;Hwang Taekeun;Lee Jihoon;Cha Sunhee;Park Jongmin;Jung Taeyoung
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.80-82
    • /
    • 2005
  • Distributed generation (IX;) plays an important role in the power system nowadays. Over-current relay, widely used in the DG protection, causes a wide outage section and long time delay. This paper proposes a DG protection technique to minimize the outage section. The proposed method uses three directional over-current relays with delay, which are connected to the point of common coupling. The method can minimize the outage section.

  • PDF

Distributed generation protection technique to minimize the outage section (정전구간 최소화를 위한 분산전원 보호)

  • Kang, Yong-Cheol;Lee, Byung-Eun;Jin, Enshu;Hwang, Tae-Keun;Lee, Ji-Hoon;Cha, Sun-Hee;Park, Jong-Min;Zheng, Tai-Ying
    • Proceedings of the KIEE Conference
    • /
    • 2005.07a
    • /
    • pp.450-452
    • /
    • 2005
  • Distributed generation (DG) plays an important role in the power system nowadays. Over-current relay, widely used in the DG protection, causes a wide outage section and long time delay. This paper proposes a DG protection technique to minimize the outage section. The proposed method uses three directional over-current relays with time delay, which are connected to the point of common coupling. The method can minimize the outage section.

  • PDF

Electromagnetic Field Analysis on Surge Response of 500 kV EHV Single Circuit Transmission Tower in Lightning Protection System using Neural Networks

  • Jaipradidtham, Chamni
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1637-1640
    • /
    • 2005
  • This paper presents a technique for electromagnetic field analysis on surge response due to Mid-span back-flashovers effects in lightning protection system of 500 kV EHV single circuit transmission tower by the neural networks method. These analyses are based on modeling lightning return stroke as well as on coupling the electromagnetic fields of the stroke channel to the line. The ground conductivity influences both the electric field as well as the coupling mechanism and hence the magnitude and wave shape of the induced voltage. The technique can be used to analyzed the corona voltage effect, the effective of stroke to the span tower, the surge impedance of transmission lines. The maximum voltage from flashovers effects in the lines. The model is compatible with general electromagnetic transients programs such as the ATP-EMTP. The simulation results show that this study analyses for time-domain with those produced by a cascade multi-section model, the surge impedance of a full-sized tower hit directly by a lightning stroke is discussed.

  • PDF

Removable Logo Watermarking Technique (제거 가능한 로고 워터마킹 기법)

  • Cho, Dong-Joon;Choi, Hyuk
    • The KIPS Transactions:PartD
    • /
    • v.15D no.6
    • /
    • pp.857-860
    • /
    • 2008
  • In this paper, we propose a removable logo watermarking technique for copyright protection of digital image. Then, visible logo is inserted into digital image to protect copyright, and the information removed by the logo is embedded by a new quantization watermarking. In a legal usage, the image can be reconstructed without logo after watermarking detection process. Experiment results show that the proposed method maintains high image quality in both watermarked images and reconstructed images, and is practical and effective in protection of image copyright.

A Study on Invisibility Improvement of Watermarking Image (워터마킹 영상의 비가시성 개선에 관한 연구)

  • Min, Hye-Lan;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.910-913
    • /
    • 2005
  • The use of digital imaging technique and digital contents based on internet has grown rapidly for last several years, and the needs of digital image protection become more important. For the purpose of copyright protection on digital image, the verification of authentication techniques like content authentication, ownership authentication, illegal copy and etc are needed. Digital watermarking, the invisible encryption technique to insert digital watermark into image, the sophisticated perceptual information should be used for providing transparency and robustness of images on watermarking process. In this paper, we implement the algorithm for preventing forged attack, ownership protection and authentication by transforming the wavelet algorithms in frequency domain in terms of human visual system.

  • PDF