• Title/Summary/Keyword: 전자대응수단

Search Result 65, Processing Time 0.027 seconds

The Development of Electronic Transformer for 245kV GIS (245kV GIS용 전자식변성기 개발)

  • Kim, Young-Min;Kim, Min-Soo;Kim, Jung-Bae;Lee, Hahk-Sung
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.373-374
    • /
    • 2008
  • 지금까지 변전소나 발전소에서 전류, 전압을 계측하는 수단으로서 주로 철심과 권선으로 구성되어진 변류기(CT), 계기용 변압기(PT)가 사용되어져 왔다. 최근, 2차측의 계측기나 보호 Relay의 Digital 화가 진전되어져 있다. 또한, Digital Network로 총합한 Intelligent 변전소가 시범적으로 구축되어짐에 따라 Digital Network에 대응한 초고압용 신형 CT, VD가 요구되어지고 있다. 상기와 같은 요구로 인해 당사에서는 기존의 CT.PT의 단점을 보완할 수 있는 245kV GIS용 로고스키코일형 CT와 Capacitive Voltage Divider를 개발 중에 있으며, 센서 자체의 특성시험에서 IEC 60044-7, 8 1Class 기준을 만족하는 특성을 얻을 수 있었다. 이러한 신형 CT.VD의 적용으로 종래의 CT.PT가 차지하는 공간이 필요 없게 되어 컴팩트한 GIS의 구조가 가능하게 될 것이다.

  • PDF

A Study on inhabitants self-help scheme via sociotechnology for disaster safety of the smart city - Mainly on lessons of Kamaisi-city in Japan (스마트시티의 재난안전을 위한 사회기술기반의 주민 자조(自助) 방안 고찰 - 일본 가마이시시(釜石市) 교훈을 중심으로)

  • Chang, Hye-Jung;Kim, Do-Nyun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.4
    • /
    • pp.388-403
    • /
    • 2016
  • On July 5, 2016, offshore magnitude 5.0 earthquake, Ulsan, Republic of Korea can anxiety not safe in the earthquake. The gas smell that occurred in Busan on July 20, 2016 did not understand a cause and spread by the ghost story for the earthquake to a citizen. Thus correct information about the disaster is important to the smart city and the quick correspondence for damage inhabitants and the community has an influence on the disaster resilience. This study is targeted for damage inhabitants, and it clarifies the importance of the evocation model of anxiety about the disaster in the smart city with social technology. In the case of the Great East Japan Earthquake, consider the self-help contents of Kamaishi-city inhabitants deeply and find out a proper application method. As a means of disaster response and recovery, suggest that the inhabitants and community will be able to practice self-help measures.

A Risk Analysis Methodology for Information Systems Security Management (정보시스템 보안관리를 위한 위험분석 방법론)

  • 이문구
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.6
    • /
    • pp.13-22
    • /
    • 2004
  • This study proposes a risk analysis methodology for information system security management in which the complexity on the procedure that the existing risk analysis methodology is reduced to the least. The proposed risk analysis methodology is composed of 3 phases as follows: beforehand processing phase, counter measure setting phase, post processing phase. The basic risk analysis phase is a basic security management phase in which fixed items are checked when the information security system is not yet established or a means for the minimum security control is necessary for a short period of time. In the detailed risk analysis phase, elements of asset a vulnerability, and threat are analysed, and using a risk degree production table produced from these elements, the risk degree is classified into 13 cases. In regard to the risk, the 13 types of risk degree will execute physical, administrative, and technical measures through ways such as accepting, rejecting, reducing, and transferring. Also, an evaluation on a remaining risk of information system is performed through a penetration test, and security policy set up and post management phase is to be carried out.

A Study on Amplification DRDoS Attacks and Defenses (DRDoS 증폭 공격 기법과 방어 기술 연구)

  • Choi, Hyunsang;Park, Hyundo;Lee, Heejo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.5
    • /
    • pp.429-437
    • /
    • 2015
  • DDoS attacks have been used for paralyzing popular Internet services. Especially, amplification attacks have grown dramatically in recent years. Defending against amplification attacks is challenging since the attacks usually generate extremely hugh amount of traffic and attack traffic is coming from legitimate servers, which is hard to differentiate from normal traffic. Moreover, some of protocols used by amplification attacks are widely adopted in IoT devices so that the number of servers susceptible to amplification attacks will continue to increase. This paper studies on the analysis of amplification attack mechanisms in detail and proposes defense methodologies for scenarios where attackers, abused servers or victims are in a monitoring network.

Design of A Spammail Control Model Based on Hierarchical Policy (정책기반의 계층적 스팸메일 제어모델 설계)

  • Lee Yong-Zhen;Baek Seung-Ho;Park Nam-Kyu;Lee Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.143-151
    • /
    • 2005
  • As the internet and I-commerce have been developing. a novel method for marketing is needed. A new advertisement using E-mail is becoming popular, because it has characteristics with low costs and relative efficiency. However. as the spam mails are increasing rapidly, mail service companies and users are deeply damaged in their mind and economically. In this paper, we design a hierarchical spam mail blocking policy through cooperation of all the participants-user, administrator, ISP to cut off the spam mail efficiently and Propose an efficient model to block and manage the spam mails based on the Policy. Also we prove the efficiencies and effectiveness of the proposed model through evaluation process .

  • PDF

Performance Evaluation of IDS on MANET under Grayhole Attack (그레이홀 공격이 있는 MANET에서 IDS 성능 분석)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.11
    • /
    • pp.1077-1082
    • /
    • 2016
  • IDS can be used as a countermeasure for malicious attacks which cause degrade of network transmission performance by disturbing of MANET routing function. In this paper, effects of IDS for transmission performance on MANET under grayhole attacks which has intrusion objects for a part of transmissions packets, some suggestion for effective IDS will be considered. Computer simulation based on NS-2 is used for performance analysis, performance is measured with VoIP(: Voice over Internet Protocol) as an application service. MOS(: Mean Opinion Score), CCR(: Call Connection Rate) and end-to-end delay is used for performance parameter as standard transmission quality factor for voice transmission.

Information Security Strategy by Risk Factors based on Smart Railway Communications (스마트 철도 통신기반 위험요인에 따른 정보보호 방안)

  • Park, Eun-Kyung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.4
    • /
    • pp.695-702
    • /
    • 2022
  • Smart railway system, which has been actively studied in recent years, is entering the intelligent stage beyond the automation stage based on ICT (Information & Communication Technology) such as communication technology and information technology. ICT technology used in smart railways is generally supported by various information protection technologies as it is vulnerable to information infringement. As a means of high-speed/mass transportation, it is essential to devise an information protection plan for ICT technology that forms the basis for smartening the railway system. Therefore, this paper presents the necessity of step-by-step information protection that measures for smart railway communication by examining potential risk factors of smart railway communication base and considering information protection factors that can respond to them.

Explainable Solar Irradiation Forecasting Based on Conditional Random Forests (조건부 랜덤 포레스트 기반의 설명 가능한 일사량 예측)

  • Moon, Jihoon;Hwang, Eenjun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.323-326
    • /
    • 2020
  • 태양광 발전은 이산화탄소 배출로 인한 기후 변화에 대응하는 주요 수단으로 인식되어 수요와 필요성이 급격하게 증가하고 있다. 최적의 태양광 발전 시스템의 운영을 위해서는 정교한 전력수요 및 태양광 발전량 예측 모델이 요구되며, 온도 및 일사량은 태양광 발전량 예측 모델의 필수적인 입력 변수이다. 하지만, 한국 기상청의 동네예보는 일사량에 관한 예측값을 제공하지 않아 정교한 태양광 발전량 예측 모델을 구축하는 것은 어렵다. 이를 위해 일사량 예측 기법에 관한 많은 연구사례가 보고되고 있지만, 다수의 연구들은 충분한 데이터 셋을 이용하여 일사량 예측 모델을 개발하였다. 초기 태양광 발전 시스템 운영을 위해서는 불충분한 데이터 셋을 이용한 예측 모델 개발이 필요하나 이에 대한 사례는 불충분하다. 본 논문은 실제 태양광 발전 시스템에서 수집된 불충분한 데이터 셋을 이용한 단기 일사량 예측 기법을 제안한다. 먼저, 기상청 동네예보의 다양한 기상 요인들을 이용하여 일사량 예측 모델을 위한 입력 변수를 구성한다. 다음으로, 조건부 랜덤 포레스트를 이용하여 일사량 예측 모델을 구성하며, 설명 가능한 일사량 예측뿐만 아니라 더욱더 많은 데이터 셋을 학습하기 위해 시계열 교차검증을 수행한다. 실험 결과, 제안한 기법은 다른 예측 기법들보다 높은 예측 정확도를 보일 뿐만 아니라 설명 가능한 예측 결과를 제시할 수 있음을 보여준다.

Protection System Against The Infringement of Information Signals in Fiber Communication System (광섬유 통신 시스템의 정보 신호 침해에 대한 보호 시스템)

  • Ugli, Sobirov Asilzoda Alisher;Umaralievich, Nishonov Ilhomjon;Kim, Daeik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.2
    • /
    • pp.219-228
    • /
    • 2022
  • One of the most pressing and demanding issues today in the conditions of widespread transformation and digitalization of spheres of human activity is information security and ensuring the integrity of data. The main research and development in the field of information security is aimed at improving efficiency and rationalization. One of the main means of data transmission and operation of information complexes are fiber-optic systems. To date, there have been incidents of illegal intrusion and theft of information, passing through this type of communication. Thus, today there is a problem associated with insufficient information security in fiber-optic data transmission systems. One of the most effective tools to counter acts of illegal interference in systems are artificial intelligence and cryptographic algorithms of information protection. It is the symbiosis of these two tools that can qualitatively improve the level of information security in fiber-optic data transmission systems. Thus, the authors of this article pursue the goal associated with the description of an innovative system for protecting information from violations in fiber-optic data transmission systems based on the integration of intelligent cryptographic algorithms.

Correlation analysis between COVID-19 cases and emergency alerts service (COVID-19 확진자 수와 긴급재난문자 서비스의 상관관계 분석)

  • Ju, Sang-Lim;Kang, Hyunjoo;Oh, Seung-Hee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.5
    • /
    • pp.1-9
    • /
    • 2021
  • In Korea, various information related to COVID-19 has been provided to the public through an EAM (Emergency Alert Message) service using CBS (Cell Broadcast Service) technology to respond to COVID-19. In particular, local governments have been actively using the EAM service as a major means of responding to COVID-19. However, since excessive use of EAM service has caused the inconvenience of the people rather than the positive effects, the authority to be able to send EAMs has be limited. In this paper, with the purpose of providing primary data for establishing a plan to properly operate EAMs, we compare and analyze the number of EAMs issued and the incidence rate of COVID-19 cases during the period from 2020 to the present. In addition, the monthly EAM usage and incidence rate of COVID-19 cases are compared in detail and correlation analysis is performed for local governments that have issued many EAMs. We expect that the analysis results of this paper will be used as primary data in establishing strategies for EAM service to counteract the prolonged COVID-19.