• Title/Summary/Keyword: secure operating system

Search Result 236, Processing Time 0.025 seconds

DIRECT COMPUTATION OF MARGINAL OPERATING CONDITIONS FOR VOLTAGE COLLAPSE

  • Lee, Kyung-Jae;Jung, Tay-Ho
    • Proceedings of the KIEE Conference
    • /
    • 1989.07a
    • /
    • pp.195-201
    • /
    • 1989
  • Voltage collapse is a serious concern to the electirc utility industry. It is common to associate steady-state stability with the ability of the transmission system to transport real power and to associate voltage collapse with the inability to provide reactive power at the necessary locations within the system. An algorithm to directly calculate the critical point of system voltage collapse was presented by the authors. The method (based on the ordinary power flow equations and explicit requirement of singularity of the Jacobian matrix) is basically one degree of freedom with proper load distribution factors. This paper suggests a modified algorithm to increase the degree of freedom, introducing the nonlinear programming technique. The objective function is a distance measure between the present operating point and the closest voltage collapse point. Knowledge of the distance and the most vulnarable bus from the voltage collapse point of view may be used as a useful index for the secure system operation.

  • PDF

A Study on the Facility Installation for Safety Operation of Urban Transit (도시철도의 안전운행을 위한 시설물 설치에 관한 연구)

  • Lee, Woo-Dong
    • Proceedings of the KIEE Conference
    • /
    • 2003.07b
    • /
    • pp.1323-1325
    • /
    • 2003
  • In field of Urban transit safely, It must be not only secured vehicle but also every areas like power, signal, communication, track, tunnel, operating facilities. Likewise it is very important not only hardware system like vehicles, facilities but also software system like action of engine driver, duty officer. In other to secure safety of hardware, soft ware, it is very important systemic process. In Korea, Many operating companies neglect to invest in safely and ignore technical development about safety because of management. Safely was considered in subway system and many studies were accomplished about safety in subway system in advanced county like U.K, USA. Hence, in this paper, Conditions and improvement of minimum considerable hardware and software are proposed for safe operation in Urban transit.

  • PDF

Rotordynamic Design and Analysis of the Rotor-Bearing System of a 600HP Gear Driven Turbo-Compressor (600HP급 기어구동형 터보 공기압축기 회전체계의 동역학적 설계 및 해석)

  • 최상규;김영철;권병수
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 1997.10a
    • /
    • pp.50-57
    • /
    • 1997
  • A 600HP class high-speed gear driven 3-stage turbo-compressor (IGCC : Integrally Geared Centrifugal Compressor) driven by a 3600 rpm AC induction motor has been designed, of which low speed pinion runs at 35000 rpm and high speed pinion at 50000 rpm nominally. Due to its high speed operation, the system requires very reliable bearing selection and design as well as accurate rotordynamic analysis and prediction of its dynamic behavior to secure the operating reliability. Rotordaynamic analyses of the IGCC rotor-bearing system predicted that the low speed pinion rotor mounted on 5-pad tilting pad bearings has two critical speeds before its design speed and high speed pinion rotor only one critical speed, and estimated critical speeds of both pinion shafts are away from the continuous operating speed enough to satisfy the corresponding API requirement. The forced response analysis with API specified maximum allowable unbalances also showed that unbalance responses are small enough for smooth operation of the system.

  • PDF

Automatic Encryption Method within Kernel Level using Various Access Control Policy in UNIX system (유닉스 시스템에서 다양한 접근제어 정책을 이용한 커널 수준의 자동 암호화 기법)

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.387-396
    • /
    • 2003
  • Many studies have been done on secure kernel and encryption filesystem for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policy like ACL, MAC, RBAC and so on, but cannot protect user or system data from stealing backup media or disk itself. In addition to access control policy, there are many studies on encryption filesystem that encrypt file data within system level. However few studies have been done on combining access control policy and encryption filesystem. In this paper we proposed a new encryption filesystem that provides a transparency to the user by integrating encryption service into virtual filesystem layer within secure kernel that has various access control policies. Proposed encryption filesystem can provide a simple encryption key management architecture by using encryption keys based on classes of MAC policy and overcome a limit of physical data security of access control policy for stealing.

The Role of Electronic Trade Specialized Service Provider under Global Trade Environment

  • Lee, Bong Soo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.60
    • /
    • pp.235-255
    • /
    • 2013
  • This thesis examines the problems faced in the electronic trade specialized service provider for which improvements are necessary, and suggests various ways of overcoming those problems. First, from the legal aspect, it is necessary to clarify the scope of duties as well as to expand the threshold for entrance and business areas through the amendment of related laws. Second, from the operating aspect, the e-trade specialized service provider should be able to provide convenient work spaces through user-centered interface by connecting, integrating, automating and simplifying various services scattered around through the establishment of an operating system. Third, from the institutional aspect, trade firms should be able to perform e-trade duties without difficulties by specializing and increasing the size of the e-trade specialized service provider system and strengthening job competence. For this, it is required to improve legal registration requirements to enhance the reliability of the e-trade specialized service provider system and secure its financial capacity.

  • PDF

Design of the Secure File System Module in the Operating System (운영체제에서의 보안 파일 시스템 모듈 설계)

  • Mun, Ji-Hun;Jang, Seung-Ju
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05a
    • /
    • pp.423-426
    • /
    • 2003
  • 본 논문에서는 외부의 접속을 파악하고 운영체제의 파일 시스템 레벨에서 보안 기능을 제공할 수 있는 커널 모듈을 구현한다. 네트워크를 통한 통제를 뚫고 침입해오더라도 파일 시스템에 저장 된 데이터를 읽을 수 없다면 내부의 중요한 자료 유출은 방지할 수 있을 것이다. 구현한 보안 파일 시스템 모듈은 운영체제의 동적 적재 모듈을 사용하여 커널 레벨에서 보안 기능을 제공할 수 있도록 구현하였다. 보안 모듈에서 제공하는 기능은 파일 및 디렉토리의 암호화 및 복호화하는 기능을 가지고 있다.

  • PDF

The Control of Parallel Operation for Static UPSs (Static UPS 병렬운전 제어)

  • Kim, D.U.;Kim, Y.P.;Shin, H.J.;Baek, B.S.;Ryu, S.P.;Min, B.G.
    • Proceedings of the KIEE Conference
    • /
    • 1998.07f
    • /
    • pp.2048-2050
    • /
    • 1998
  • An uninterruptible power supply(UPS) with parallel operation is used to increase the power capacity of the system or to secure higher reliability at critical loads. In the parallel operating system composed of the multiple UPSs, load-sharing, i.e. current balance control between them is key technique. Because of its low impedance and quick response characteristics, inverter output current changes very rapidly and thereby easily researches an overload condition. The difference between total load current divided by number of operating inverters and its own current is detected as unbalanced current. Then frequency and voltage are controlled to minimize the active component and the reactive component. A good performance of the proposed load-sharing technique is verified by experiments in the parallel operating system with two 40kVA UPSs.

  • PDF

A Study on the Effect of Pair Check Cooperative Learning in Operating System Class

  • Shin, Woochang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.104-110
    • /
    • 2020
  • In the 4th Industrial Revolution, the competitiveness of the software industry is important, and as a solution to fundamentally secure the competitiveness of the software industry, education classes should be provided to educate high quality software personnel in educational institutions. Despite this social situation, software-related classes in universities are largely composed of competitive or individual learning structures. Cooperative learning is a learning model that can complement the problems of competitive and individual learning. Cooperative learning is more effective in improving academic achievement than individual or competitive learning. In addition, most learners have the advantage of having a more desirable self-image by having a successful experience. In this paper, we apply a pair check model, which is a type of cooperative learning, in operating system classes. In addition, the class procedure and instruction plan are designed to apply the pair check model. We analyze the test results to analyze the performance of the cooperative learning model.

A Trend of Security Kernel Development foe Protection of Critical Information Infrastructure (정보통신 기반구조 보호를 위한 보안 커널 개발 동향)

  • 이정효;이철원;박정호;이홍섭
    • Review of KIISC
    • /
    • v.8 no.4
    • /
    • pp.63-76
    • /
    • 1998
  • 미국을 비롯한 정보보호 기술 선진국에서는 일반 기업은 물론 정부 차원에서 안전한 운영체제(Secure Operating System) 개발에 적극적으로 나서고 있다. 운영체제 기술 발전의 흐름에 따라 안전한 운영체제 또한 기존의 IK(Integrated Kernel)방식도다는 MK(Micro Kernel)방식으로 DTOS(Distriibuted Trusted Operating System) 프로토타입(protorype)구현을 끝으로 종료된 Synergy연구 과제의 후속으로 현재 Flask 프로젝트가 진행 중이다. Flask커널 역시 이러한 MK를 기반으로 하고 있으며 현재 Flask 보안 커널 개발 프로젝트는 Flux연구 과제의 주요 주제 중 하나로 진행중이다. DTOS연구 과제의 명맥을 잇는 Flask젝트는 보안 커널에 대한 적극적이고 지속적인 미국 정부차원의 노력인 것이다. 본 논문에서는 주요 정보통신 기반 구조의 보호를 위한 보안 커널 (Security Kernel) 개발 동향을 파악하기 위해 현재 미국에서 진행중인 보안커널 개발 동향 및 연구 내용에 대해 분석한다.

  • PDF

Technique to Secure Stable Bandwidth in Overlay Structured Network by Using Multi-Hour (Overlay 구조의 Network 에서 Multi-Hour를 이용한 안정적 대역폭 확보 기법)

  • Ahn, Sung-Won;Yoo, Hyuck
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06d
    • /
    • pp.170-175
    • /
    • 2008
  • 모든 Network는 대역폭의 한계성을 갖고 있다. Overlay 구조의 Network 또한 예외는 아니다. 이러한 Network 대역폭 자원의 한계성은 Network를 이용한 많은 통신에 있어서 심한 Traffic 을 형성하고 그로 인한 낮은 대역폭을 제공해준다. 이에 대한 해결책으로 Multi-Hour Ability 를 적용할 수 있다. 우리가 살아가는 환경은 서로 다른 시간대가 존재하며, 그로 인한 생활패턴에 따라 Network를 이용하는 정도 또한 시간대별로 다르다. 이 논문에서는 라우팅이 자유로운 Overlay Network를 통해 Multi-Hour Ability를 적용하여 Network에 발생한 Traffic 을 완화시키고, 잉여 대역폭을 효과적으로 사용하며, 보다 안정적인 대역폭 확보를 통해 성능 향상을 할 수 있다는 것을 보인다.

  • PDF