• Title/Summary/Keyword: secure constraints

Search Result 97, Processing Time 0.03 seconds

UPFC Device: Optimal Location and Parameter Setting to Reduce Losses in Electric-Power Systems Using a Genetic-algorithm Method

  • Mezaache, Mohamed;Chikhi, Khaled;Fetha, Cherif
    • Transactions on Electrical and Electronic Materials
    • /
    • v.17 no.1
    • /
    • pp.1-6
    • /
    • 2016
  • Ensuring the secure operation of power systems has become an important and critical matter during the present time, along with the development of large, complex and load-increasing systems. Security constraints such as the thermal limits of transmission lines and bus-voltage limits must be satisfied under all of a system’s operational conditions. An alternative solution to improve the security of a power system is the employment of Flexible Alternating-Current Transmission Systems (FACTS). FACTS devices can reduce the flows of heavily loaded lines, maintain the bus voltages at desired levels, and improve the stability of a power network. The Unified Power Flow Controller (UPFC) is a versatile FACTS device that can independently or simultaneously control the active power, the reactive power and the bus voltage; however, to achieve such functionality, it is very important to determine the optimal location of the UPFC device, with the appropriate parameter setting, in the power system. In this paper, a genetic algorithm (GA) method is applied to determine the optimal location of the UPFC device in a network for the enhancement of the power-system loadability and the minimization of the active power loss in the transmission line. To verify our approach, simulations were performed on the IEEE 14 Bus, 30 Bus, and 57 Bus test systems. The proposed work was implemented in the MATLAB platform.

A Study on an Improving Contingency Constrained Pre-Dispatch Algorithm in a Competitive Electricity Market (경쟁적 전력시장에서 송전선로 상정사고를 고려한 선행급전 알고리즘 개선에 관한 연구)

  • Kim, Kwang-Mo;Shin, Hye-Kyeong;Kang, Dong-Ju;Han, Seok-Man;Chung, Koo-Hyung;H.Kim, Bal-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.806-807
    • /
    • 2007
  • Systematic studies on the dispatch scheduling algorithm and related constraints can enhance the effectiveness of electricity market operation. When System Operator (SO) establishes a dispatch schedule, the bid information should be preserved in the schedule as much as possible. In this paper, we introduce a new type of sensitivity factor called Line Outage Impact Factor (LOIF) to screen a transmission line causing the most severe outage when scheduling the dispatch. This screening can assure the stable system operation and make an efficient feedback between the SO and market participants. We propose a transmission line contingency constrained Pre-dispatch algorithm using sensitivity indices in a suitable Pre-dispatch scheduling. The proposed algorithm has been tested on sample system and the results show more secure operation against critical contingencies.

  • PDF

Efficient Data Publishing Method for Protecting Sensitive Information by Data Inference (데이터 추론에 의한 민감한 정보를 보호하기 위한 효율적인 데이터 출판 방법)

  • Ko, Hye-Kyeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.9
    • /
    • pp.217-222
    • /
    • 2016
  • Recent research on integrated and peer-to-peer databases has produced new methods for handling various types of shared-group and process data. This paper with data publishing, where the publisher needs to specify certain sensitive information that should be protected. The proposed method cannot infer the user's sensitive information is leaked by XML constraints. In addition, the proposed secure framework uses encrypt to prevent the leakage of sensitive information from authorized users. In this framework, each node of sensitive data in an eXtensible Markup Language (XML) document is encrypted separately. All of the encrypted data are moved from their original document, and are bundled with an encrypted structure index. Our experiments show that the proposed framework prevents information being leaked via data inference.

A Comparative Analysis on the Arrangement of Rules of the Origin of Steel Products in Korea's Major FTAs (우리나라 주요 FTA의 철강재 원산지 규정 협상에 대한 비교 분석)

  • Lee, Seoung-Taek
    • Korea Trade Review
    • /
    • v.44 no.5
    • /
    • pp.127-142
    • /
    • 2019
  • As Korea's steel industry exports 38 percent of its total steel production, the future management environment of the steel industry will change depending on the outcome of the FTA negotiations. The overall industrial structure of the domestic steel industry depends on the rules of origin, which are directly linked to the effect of concessionary tariffs. Therefore, negotiations on rules of origin are as important as tariff liberalization for Korea's steel industry. Korea's cold-rolled and plated companies are expected to be negatively affected as the country of origin standards of steel products have not considered the steel production processes in Korea. In future FTA talks, the country of origin rules should be agreed on a change of tariff classification basis. This result would secure a stable export market through increased predictability of steelmakers and reduce the risk of increased costs of oil and intangible products. In addition, the government should consider the structure of domestic supply and demand so that it does not impose constraints on the change of tariff classification. Finally, participants in the negotiations should consider the opinions of the domestic steel industry.

A Secure, Hierarchical and Clustered Multipath Routing Protocol for Homogenous Wireless Sensor Networks: Based on the Numerical Taxonomy Technique

  • Hossein Jadidoleslamy
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.121-136
    • /
    • 2023
  • Wireless Sensor Networks (WSNs) have many potential applications and unique challenges. Some problems of WSNs are: severe resources' constraints, low reliability and fault tolerant, low throughput, low scalability, low Quality of Service (QoS) and insecure operational environments. One significant solution against mentioned problems is hierarchical and clustering-based multipath routing. But, existent algorithms have many weaknesses such as: high overhead, security vulnerabilities, address-centric, low-scalability, permanent usage of optimal paths and severe resources' consumption. As a result, this paper is proposed an energy-aware, congestion-aware, location-based, data-centric, scalable, hierarchical and clustering-based multipath routing algorithm based on Numerical Taxonomy technique for homogenous WSNs. Finally, performance of the proposed algorithm has been compared with performance of LEACH routing algorithm; results of simulations and statistical-mathematical analysis are showing the proposed algorithm has been improved in terms of parameters like balanced resources' consumption such as energy and bandwidth, throughput, reliability and fault tolerant, accuracy, QoS such as average rate of packet delivery and WSNs' lifetime.

An Approach to Generation Monitoring Module using UML Model (UML모델을 이용한 모니터링 모듈 생성 방법)

  • Park, Jeong-Min;Jeong, Ok-Ran
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.9
    • /
    • pp.57-68
    • /
    • 2011
  • Self-healing is an approach to evaluating constraints defined in target system and to applying an appropriate strategy when violating the constrains. Today, the computing environment is very complex, so researches that endow a system with the self-healing's ability that recognizes problem arising in a target system are being an important issues. However, most of the existing researches are that self-healing developers need much effort and time to analyze and model constraints. Thus, in order to improve these problems, this paper proposes the method that automatically generates monitoring module by using UML models for self-healing. The approach proposes: 1) defining system knowledge required for self-healing from UML model, 2) process for generating monitor, by using monitor generated, and process for monitoring the problems. Through these, we can reduce the efforts of self-healing developers to analyze target system, and secure monitoring scope based on information of system knowledge. Also we can minimize the efforts to develop the monitoring environment automatically. to evaluate the proposed approach, we apply proposed approach to ATM prototype system for qualitative result, and perform quantitative evaluation through video conference system in our existing research.

Study on Improvement of Weil Pairing IBE for Secret Document Distribution (기밀문서유통을 위한 Weil Pairing IBE 개선 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.59-71
    • /
    • 2012
  • PKI-based public key scheme is outstanding in terms of authenticity and privacy. Nevertheless its application brings big burden due to the certificate/key management. It is difficult to apply it to limited computing devices in WSN because of its high encryption complexity. The Bilinear Pairing emerged from the original IBE to eliminate the certificate, is a future significant cryptosystem as based on the DDH(Decisional DH) algorithm which is significant in terms of computation and secure enough for authentication, as well as secure and faster. The practical EC Weil Pairing presents that its encryption algorithm is simple and it satisfies IND/NM security constraints against CCA. The Random Oracle Model based IBE PKG is appropriate to the structure of our target system with one secret file server in the operational perspective. Our work proposes modification of the Weil Pairing as proper to the closed network for secret file distribution[2]. First we proposed the improved one computing both encryption and message/user authentication as fast as O(DES) level, in which our scheme satisfies privacy, authenticity and integrity. Secondly as using the public key ID as effective as PKI, our improved IBE variant reduces the key exposure risk.

Development of Vertical Separated Tubular Steel Pole (종방향 분할형 관형지지물 개발)

  • Lee, Won-kyo;Mun, Sung-Duk;Shin, Kooyong
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.5 no.4
    • /
    • pp.257-262
    • /
    • 2019
  • Lattice steel towers for overhead transmission lines have been replaced by tubular steel poles due to the visual impact of large and complex shape of truss type. Demand for tubular steel poles consisting of a single frame member continues to grow because of its advantages such as visual minimization, architectural appeal and minimal site consumptions. However, there are some constraints on the transportation and construction. As the diameter of tower base has been enlarged, it may exceed minimum height limit required to pass the tunnel in case of land transportation. Also, in a narrow place where it is not easy to secure the installation areas such as mountainous places, there might be some areas wherein it must secure a wide working space so that large vehicles and working cranes will be allowed to enter. In this paper, we presented a vertical separated tubular steel pole, which is a new type of support that can be implemented for general purpose such as mountainous areas or narrow areas to improve the issues raised by breaking away from the conventional design and fabrication methods. Technical approaches for overcoming the limit of the cross-sectional size is to separate and modularize the cross-section of the tubular steel pole designed with a size that cannot be carried or assembled, and to lighten it with a weight capable of being transported and assembled in a narrow space or mountainous area. As a result of this research, it will be possible to enter small and medium sized vehicles in locations where it is restricted to transport by large-sized vehicles. In the case of mountainous areas, it will be possible to divide it into a weight capable of being carried by a helicopter and it will be easy to adjust and fabricate it with individual modules. Furthermore, in order to break away from the traditional construction method, we proposed the equipment that can be applied to the assembly of Tubular Steel Pole without using a large crane in locations where there is no accessible road or in locations wherein large cranes cannot enter. In particular, this paper shows the movable assembling equipment and some methods that are specialized for vertical separated tubular steel pole consisting of members with reduced weight. The proposed assembly equipment is a device for assembling the body of the Tubular Steel Poles. It will be installed inside the support and the modules can be lifted by using the support itself.

A Design of User Authentication Protocol using Biometric in Mobile-cloud Environments (모바일 클라우드 환경에서 생체인식을 이용한 사용자 인증 프로토콜 설계)

  • Kim, Hyung-Uk;Kim, Bumryong;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.1
    • /
    • pp.32-39
    • /
    • 2017
  • Recently, usage of mobile cloud services has been increasing. In particular, beyond the constraints of a single cloud computing service, studies on the multi-cloud have been actively pursued. A user must authenticate multiple cloud service providers to use additional cloud services in a multi-cloud. In previous studies, an authentication method using single sign-on (SSO) was not available in all cloud services. Cloud services will not be available when the SSO server is not available due to malicious attacks, because all authentication is done via the SSO server. Additionally, using a broker, there is a vulnerability that can expose authentication information for the service provider to a user who did not sign up. In this paper, we propose a secure user authentication protocol using biometric authentication that does not expose user information when using additional cloud services. The proposed protocol can use a single biometric authentication for multi-cloud services without storing authentication information in each cloud service. In terms of key stability (to ensure stability through the key agreement process and the key area), by disabling various attack methods, such as man-in-the-middle attacks and replay attacks, we provide secure mobile cloud services.

Flying-Wing Type UAV Design Optimization for Flight Stability Enhancement (전익기형 무인기의 비행 안정성 향상을 위한 형상 최적화 연구)

  • Seong, Dong-gyu;Juliawan, Nadhie;Tyan, Maxim;Kim, Sanho;Lee, Jae-woo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.48 no.10
    • /
    • pp.809-819
    • /
    • 2020
  • In this study, the twist angle and wing planform shapes were selected as design variables and optimized to secure the stability of the flying-wing type UAV. Flying-wing aircraft has no separated fuselage and tails, which has advantages in aerodynamic characteristics and stealth performance, but it is difficult to secure the flight stability. In this paper, the sweep back angle and twist angle were optimized to obtain the lateral stability, the static margin and wing planform shapes were optimized to improve the longitudinal stability of the flying-wing, then effect of the twist angle was confirmed by comparing the stability of the shape with the winglet and the shape with the twist angle. In the optimization formulation, focusing on improving stability, constraints were established, objective functions and design variables were set, then design variable sensitivity analysis was performed using the Sobol method. AVL was used for aerodynamic analysis and stability analysis, and SQP was used for optimization. The CFD analysis of the optimized shape and the simulation of the dynamic stability proved that the twist angle can be applied to the improvement of the lateral stability as well as the stealth performance in the flying-wing instead of the winglet.