• Title/Summary/Keyword: security characteristic

Search Result 446, Processing Time 0.027 seconds

Power System Security Control Method for Quench Characteristic of High-Temperature Superconducting Cable (초전도 케이블의 퀜치 특성에 대한 계통안전성 제어방식)

  • Lee, Geun-Joon;Hwang, Si-Dol;Lee, Jeong-Phil;Kim, Chang-Hyun;Park, Hye-Chul
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2004.11a
    • /
    • pp.375-380
    • /
    • 2004
  • This paper presents the basic quench protection idea for the HTS(High-Temperature Superconducting) cable. In Korea power system, the transfer capability of transmission line is limited by the voltage stability, and HTS cable could be one of the countermeasure to solve the transfer limit as its higher current capacity and lower impedance[1]. However, the quench characteristic of HTS cable makes HTS cable to loss its superconductivity, and therefore change the impedance of the line and power system operating condition dramatically. This pheonominum threats not only HTS cable safety but also power system security, therefore a proper protection scheme and security control counterplan have to be established before HTS cable implementation. In this paper, the quench characteristics of HTS cable for the fault current based on heat balance equation was established and a proper protection method by FCL(Fault Current Limiter) was suggested.

  • PDF

IMPLEMENTATION ISSUES FOR ARITHMETIC OVER EXTENSION FIELDS OF CHARACTERISTIC ODD

  • Oh, Sang-Ho;Kim, Chang-Han;Kim, Yong-Tae;Park, Young-Ho
    • Communications of the Korean Mathematical Society
    • /
    • v.18 no.1
    • /
    • pp.159-168
    • /
    • 2003
  • In this paper we discuss the Construction Of 3 new extension field of characteristic odd and analyze the complexity of arithmetic operations over such a field. Also we show that it is suitable for Elliptic Curve Cryptosystems(ECC) and Digital Signature Algorithm(DSA, 〔7〕) as an underlying field. In particular, our digital signature scheme is at least twice as efficient as DSA.

An improved method of multiplication on Elliptic Curve Cryptosystems over Small Fields of Odd Characteristic (홀수 표수 확장체위의 타원곡선 고속연산)

  • 김용호;박영호;이상진;임종인
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.139-143
    • /
    • 2001
  • 본 논문은 작은 홀수 표수를 갖는 유한체에서 정의된 타원곡선의 스칼라 곱 연산속도를 향상시키는 새로운 방법을 소개한다. 본 논문에서 제안하는 알고리즘은 스칼라의 프로베니우스 자기준동형 (Frobenius endomorphsim) 확장길이를 줄이는 최근의 방법들을 개선한 방법이다.

  • PDF

RECURRENCE AND STABILITY OF POINTS IN DISCRETE FLOWS

  • KOO, KI-SHIK
    • Journal of applied mathematics & informatics
    • /
    • v.37 no.3_4
    • /
    • pp.251-257
    • /
    • 2019
  • We study the orbit behaviours of recurrent, uniformly recurrent and Poisson stable points. we give conditons that a point is to be recurrent or uniformly recurrent by analyzing the behaviours of their orbits. Also, we study dynamical properties of equicontinuous points and points of characteristic $0^+$.

Power System Security Control Method for Quench Characteristic of High-Temperature Superconducting Cable (초전도 케이블의 Quench 특성에 대한 계통안전성 제어방식)

  • Lee, Geun-Joon;Hwang, Si-Dol
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.19 no.6
    • /
    • pp.29-35
    • /
    • 2005
  • This paper presents the basic quench protection idea for the HTS(High-Temperature Superconducting) cable. In Korea power system, the transfer capability of transmission line is limited by the voltage stability, HTS cable could be one of the countermeasure to enhance the transfer limit with its higher current capacity and lower impedance[1]. However, the quench characteristic makes not only HTS cable to loss its superconductivity, but also change the impedance of the transmission line and power system operating condition dramatically. This pheonominum threats HTS cable safety as well as power system security, therefore a proper protection scheme and security control counterplan have to be established before HTS cable implementation. In this paper, the quench characteristics of HTS cable for the fault current based on heat balance equation was established and a proper protection method regarding conventional protection system was suggested.

High Step-Down Multiple-Output LED Driver with the Current Auto-Balance Characteristic

  • Luo, Quanming;Zhu, Binxin;Lu, Weiguo;Zhou, Luowei
    • Journal of Power Electronics
    • /
    • v.12 no.4
    • /
    • pp.519-527
    • /
    • 2012
  • A high step-down multiple-output LED driver is proposed in this paper. Firstly, the derivation of the driver with dual-output is presented and its operation principle and steady state performance are analyzed in detail. Secondly, a high step-down N-channel LED driver is proposed and its current auto-balance characteristic and step-down ratio are analyzed. Finally, an experimental prototype is built and the experimental results are given. The theoretical analysis and experimental results show that the proposed driver has the following virtues: First, if load balancing is achieved, the voltage gain is 1/N that of a Buck driver, where N is the number of channels. Second, each output automatically has an equal output current, without requiring more current close-loop control circuits than a Buck driver. Last, the voltage stresses of the switches and diodes are lower than those of a Buck driver, meaning that lower voltage switches and diodes can be used, and a higher efficiency can be expected.

Characteristic Classification and Correlational Analysis of Source-level Vulnerabilities in Linux Kernel (소스 레벨 리눅스 커널 취약점에 대한 특성 분류 및 상관성 분석)

  • Ko Kwangsun;Jang In-Sook;Kang Yong-hyeog;Lee Jin-Seok;Eom Young Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.3
    • /
    • pp.91-101
    • /
    • 2005
  • Although the studies on the analysis and classification of source-level vulnerabilities in operating systems are not direct and positive solutions to the exploits with which the host systems are attacked, It is important in that those studies can give elementary technologies in the development of security mechanisms. But, whereas Linux systems are widely used in Internet and intra-net environments recently, the information on the basic and fundamental vulnerabilities inherent in Linux systems has not been studied enough. In this paper, we propose characteristic classification and correlational analyses on the source-level vulnerabilities in Linux kernel that are opened to the public and listed in the SecurityFocus site for 6 years from 1999 to 2004. This study may contribute to expect the types of attacks, analyze the characteristics of the attacks abusing vulnerabilities, and verify the modules of the kernel that have critical vulnerabilities.

Computer Security Incident Inspection and Response based on Digital Forensics in Windows10 environment (윈도우10 환경의 디지털 포렌식 기반 침해사고 진단 및 대응)

  • HyunWoo Kim;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.4
    • /
    • pp.35-49
    • /
    • 2023
  • Recently, real-time cyber threats are constantly occurring for various reasons. Most companies have the characteristic of digitizing important internal information and storing it centrally, so it can be said that the impact is very high when an Computer Security Incident occurs. All electronic device information collected and analyzed in the process of responding to an Computer Security Incident has the characteristic of being subject to change at any time. Submission of related evidence is required in future investigations and courts. At this time, the basic principles of digital forensics, such as the principle of integrity and the principle of chain of custody, must be followed to ensure legitimacy and accuracy of the evidence. In this paper, we propose a digital forensic-based Computer Security Incident Inspection and Response procedure in the Windows 10 environment to secure the legitimacy and accuracy of digital evidence collected and analyzed when an intrusion occurs, prevent intrusion in advance, and quickly recognize it.

  • PDF

Design and Implementation of Information Security System to Prevent Leakage of Drawing Information (설계정보 유출방지를 위한 정보보안시스템 설계 및 구현)

  • Chang, H.B.;Lee, H.S.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.11 no.5
    • /
    • pp.327-334
    • /
    • 2006
  • Recently, security incidents are growing rapidly in which internal employees let the drawing leak out to competitors or other countries. This type of security incidents has a characteristic that it occurs less frequently than other types of security incidents such as network or server security incident, but the damage is a lot more serious. The existing information security technologies to prevent internal information from being leaked out are only applicable to general documents(office documents, web pages and image files in which data are encrypted one by one). However, architectural drawings made up of collection of files with various formats(extensions) have problems with the process speed of en(de) cryption and accuracy, so the developments of security technologies by new methods are required. In this study, we design and develop a security technology based on work area with which users can protect the leakage of critical information in the kernel level while maintaining their work environment when they have to use sharing information that cannot be managed by the unit of file. As a result, we developed the "Virtual Secure Disk" which allows only authorized users and applications to have an access to drawings, and have verified its security by applying it to the actual company.

A Study on Contents Security Method Based on a Content Delivery Network (CDN 환경에서 콘텐츠 보안 방법 연구)

  • Kim, Jeom-Goo;Kim, Tae-Eun
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.51-56
    • /
    • 2008
  • Is caused by with growth etc. of the digital contents circulation market which leads suddenly accommodates in order to control the network traffic which increases and the researches which are various are being advanced the explosive evidence and a electronic transaction of the Internet user. The present paper protects a digital contents and a copyright from CDN system environments which will appear the center of new network service with the plan for the dispersive DRM system of CDN bases plans. Respect this dispersion DRM package formats which provide a stronger security characteristic in the contents which is stored the operational process of the dispersive DRM system for to be defined, CDN system and of existing interoperability they present.

  • PDF