• Title/Summary/Keyword: security strategy

Search Result 964, Processing Time 0.022 seconds

Strategy based PSO for Dynamic Control of UPFC to Enhance Power System Security

  • Mahdad, Belkacem;Bouktir, T.;Srairi, K.
    • Journal of Electrical Engineering and Technology
    • /
    • v.4 no.3
    • /
    • pp.315-322
    • /
    • 2009
  • Penetration and installation of a new dynamic technology known as Flexible AC Transmission Systems (FACTS) in a practical and dynamic network requires and force expert engineer to develop robust and flexible strategy for planning and control. Unified Power Flow Controller (UPFC) is one of the recent and effective FACTS devices designed for multi control operation to enhance the power system security. This paper presents a dynamic strategy based on Particle Swarm Optimization (PSO) for optimal parameters setting of UPFC to enhance the system loadability. Firstly, we perform a multi power flow analysis with load incrementation to construct a global database to determine the initial efficient bounds associated to active power and reactive power target vector. Secondly a PSO technique applied to search the new parameters setting of the UPFC within the initial new active power and reactive power target bounds. The proposed approach is implemented with Matlab program and verified with IEEE 30-Bus test network. The results show that the proposed approach can converge to the near optimum solution with accuracy, and confirm that flexible multi-control of this device coordinated with efficient location enhance the system security of power system by eliminating the overloaded lines and the bus voltage violation.

A New Control Strategy for a Three-Phase PWM Current-Source Rectifier in the Stationary Frame

  • Guo, Qiang;Liu, Heping;Zhang, Yi
    • Journal of Power Electronics
    • /
    • v.15 no.4
    • /
    • pp.994-1005
    • /
    • 2015
  • This paper presents a novel power control strategy for PWM current-source rectifiers (CSRs) in the stationary frame based on the instantaneous power theory. In the proposed control strategy, a virtual resistance based on the capacitor voltage feedback is used to realize the active damping. In addition, the proportional resonant (PR) controller under the two-phase stationary coordinate is designed to track the ac reference current and to avoid the strong coupling brought about by the coordinate transformation. The limitations on improving steady-state performance of the PR controller is investigated and mitigated using a cascaded lead-lag compensator. In the z-domain, a straightforward procedure is developed to analyze and design the control-loop with the help of MATLAB/SISO software tools. In addition, robustness against parameter variations is analyzed. Finally, simulation and experimental results verify the proposed control scheme and design method.

An Electronic Strategy in Innovative Learning Situations and the Design of a Digital Application for Individual Learning to Combat Deviant Intellectual Currents in Light of the Saudi Vision 2030

  • Aisha Bleyhesh, Al-Amri;Khaloud, Zainaddin;Abdulrahman Ahmed, Zahid;Jehan, Sulaimani
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.217-228
    • /
    • 2022
  • The study aimed to build an electronic strategy in innovative learning situations for the role of education in combating intellectual currents. A total of 525 Saudi university faculty members and general education teachers were surveyed using two electronic questionnaires. Arithmetic averages and standard deviations, One-way ANOVA, Scheffé's test, Pearson's correlation coefficient, and Cronbach's alpha stability coefficient were used as statistical methods. The study statistically identifies the differences between the study sample at the level of significance (0.05). and the design of a digital application for individual learning to combat deviant intellectual currents to activate them in light of Saudi Vision 2030 by combining the theoretical academic material and turning it into a learning e-game called (crosswords). The game is equipped with hyper media that supports education with entertainment to direct ideas towards the promotion of identity, the development of values towards moderation and the consolidation of intellectual security. Additionally, the learning e-game represents awareness messages in three short films to activate the role of curricula and intellectual awareness centers to apply realistically, innovatively, and effectively.

Research on Deployment Strategy of Public Key Infrastructure for Developing Country: Focused on Malawi (개도국의 공개키기반구조 도입 전략에 관한 연구: 말라위를 중심으로)

  • Kim, Hyunsung;Choi, Hae-Won
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.45-51
    • /
    • 2016
  • The purpose of this paper is to plan deployment strategy of public key infrastructure for Malawi by considering the information and communication technology status on it. For this, we will review the information communication technology status on developing and least developed countries focused on Malawi and plan deployment strategy of mobile based public key infrastructure. First of all, we extract out security considerations for public key infrastructure, which is efficient for wireless communication, and design a new lightweight public key infrastructure apt to mobile device by considering Malawi's information communication technology status. Especially, the proposed mobile based public key infrastructure uses smartcards for all the processes of certificate. It could guarantee the same security as the wired counter part based on lightweight mobile device.

A Study on Information Security Investment by the Analytic Hierarchy Process (AHP를 이용한 정보보호투자 의사결정에 대한 연구)

  • Kong, Hee-Kyung;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of Information Technology Applications and Management
    • /
    • v.15 no.1
    • /
    • pp.139-152
    • /
    • 2008
  • Recently organizations identify information security as one of essential means for gaining competitive advantage. However, they do not actively increase investment in this area because they consider spending for information security as a cost rather than an investment. This is because organizations don't have a clear understanding of information security objectives which can be achieved through investment, and they don't have criteria for alternatives which can be considered in information security investment decision-making. In this paper we propose to model the decision-making process of information security investment by the AHP (Analytic Hierarchy Process). The results will show that availability is the most important criterion for the decision of information security alternatives, and intrusion detection is the most important information security alternative. We hope that the results of this paper provide a guideline for clear decision-making in information security investment.

  • PDF

Military Issues to Overcome in the 4th Industrial Revolution and the 3rd Offset Strategy (제4차 산업혁명과 제3차 상쇄전략 추진 시 극복해야 될 군사적 이슈)

  • Han, Seung Jo;Shin, Jin
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.145-152
    • /
    • 2019
  • In the era of the 3rd Offset Strategy led by the 4th Industrial Revolution, the use of robots with AI and autonomous abilities is becoming more active in military field. The 3rd Offset Strategy is based on the technology of the 4th Industrial Revolution, and S. Korea is heavily dependent on US military technology and is directly and indirectly influenced by the military revolutionary strategy and the alliance relationship. There are many issues that need to be addressed beyond technical maturity for both strategies to be successfully applied in the military. However, there are few discussions about these limitations in many studies and media reports in comparison with the advantages of the techniques. This research describes robot ethics & technology unbalance, problems of autonomous functions, display fatigue induced by VR/AR/MR, cyber/network security to be solved for successful strategies, also the solutions are addressed.

An Analysis of Iran's Maritime Strategy from a Structural Perspective on Middle East International Relations: Focusing on Defensive Realism (중동 국제관계에 대한 구조적 관점에서의 이란 해양전략에 대한 분석: 방어적 현실주의 관점을 중심으로)

  • Oh, Dongkeon
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.93-117
    • /
    • 2020
  • Four cargo ships were ambushed by bombs in 2019 while navigating in the Strait of Hormuz. It was not clear who attacked those ships, however, many nations including the United States argued that it was Iran due to several reasons. The United States established the maritime collective defense system named International Maritime Security Construct (IMSC) in order to protect the maritime security in the Strait of Hormuz, without disclosure against whom it is aimed. Persian, who uses the Persian language unlike other countries in the Middle East, is the major ethnic group in Iran, and most of them believe Shi'ah Islam while most of the Arabs in the Gulf countries adhere to Sunni Islam. It seems that historic and religious motives caused the bipolar system in the Middle East, however, it is plausible to analyze the system of international affairs in the Middle East via defensive or structural realism. Iran has attempted to maintain its hegemony in the region by supporting Shi'ah muslims in the neighboring countries as well as in the world by using military and economic means. In this context, Iran's maritime strategy is to maintain its maritime hegemony on the Persian Gulf via countering threats and cooperating with friendly navies by using the Islamic Republic of Iran Navy(IRIN) and the Islamic Revolutionary Guard Corps Navy(IRGCN). IRIN acts like other navies in the world: protecting national interest at sea, expending its operational areas to the outer seas, and enhancing cooperation with other navies. Meanwhile, IRGCN plays a role as an asymmetric force at sea. It is composed of small and fast asymmetric assets, which can ambush ships fast and furious. Considering the poor study for Iran's maritime strategy in Korea, analyzing the strategy is meaningful for the Republic of Korea Navy, which has operated the Cheonghae Unit for more than ten years since it has extended its operational area over the Strait of Hormuz. In order not to be drawn into the conflict in the Strait, research on the maritime strategy of Iran and other countries in the Middle East should be started.

  • PDF

The Model to Implement the Cyber Security Policy and Strategy for Azerbaijan Information System (아제르바이잔 정보시스템에 대한 사이버보안 정책과 전략의 실행모델 구축)

  • Aliyeva, Leyla Mehdi;Hwang, Gee-Hyun
    • Journal of Digital Convergence
    • /
    • v.17 no.5
    • /
    • pp.23-31
    • /
    • 2019
  • This study aims to build an AHP model that evaluates the priority of cyber security policies for the Azerbaijan information system. For this, 4 factors were constructed from components of ITU National Interest Model, whereas 5 alternatives were based on the best practices of the eight developed countries leading the cyber security field. Using the questionnaire, 24 security experts evaluated the strategic priority of such factors or alternatives. The analysis results using the AHP software showed that homeland defense and economic well-being were the dominant aspects of cyber security policy, whereas capacity building and infrastructure were the main concern of cyber security elements for Azerbaijan. This study presents the strategic priority of cyber security policies that can be adopted by Azerbaijan government. This study can contribute to developing the national cyber security guide of Azerbaijan.

Decision Making on Standardization Strategy for Personal Information Security Using Importance-Performance Analysis (중요도-수행도 분석을 이용한 개인정보 보호기술 표준화 추진전략)

  • Koo, Kyoung-Cheol;Woo, Hoon-Shik;Jo, In-June
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.33 no.4
    • /
    • pp.145-152
    • /
    • 2010
  • Under limited resources such as budgets and experts, it is necessary to make decisions for promotion strategy of standardization work items in Information and Communication Technologies (ICTs). This paper focuses on a method of setting standardization promotion strategies for each item of personal information security standardization. As a decision making tool, the Importance Performance Anaysis (IPA) is applied and analyzed to the decision processes. The results are showed and illustrated for useful inputs to practical policy making in the field of standardization activities.

Japan's gastrodiplomacy as soft power: global washoku and national food security

  • Farina, Felice
    • Journal of Contemporary Eastern Asia
    • /
    • v.17 no.1
    • /
    • pp.152-167
    • /
    • 2018
  • Until recently, Japanese cuisine was known only for sushi and was still considered exotic outside the archipelago. However, today the number of specialized restaurants which serve other traditional foods is constantly increasing all over the world, making Japanese gastronomy one of the most influential. Japanese government has supported the promotion of national cuisine worldwide in different ways, making washoku (Japanese traditional cuisine) one of the main elements of Japan's soft power and cultural diplomacy. In this paper, I will analyse the connection between Japan's gastrodiplomacy, defined as the use of typical food and dishes as an instrument of soft power, and Japan's food security strategy. I will argue that the strategy of promotion of washoku worldwide is not a mere act of popularization of Japanese food but it is strictly related to the issue of the low self-sufficiency rate of the country, as the main objective of the government is the raise of food export, in order to foster agricultural production and improve self-sufficiency.