• Title/Summary/Keyword: 지식보호

Search Result 550, Processing Time 0.037 seconds

A Study on Fault Characteristics of DFIG in Distribution Systems Based on the PSCAD/EMTDC (PSCAD/EMTDC를 이용한 풍력발전의 배전계통 사고특성에 관한 연구)

  • Son, Joon-Ho;Kim, Byung-Ki;Jeon, Jin-Taek;Rho, Dae-Seok
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.2
    • /
    • pp.47-56
    • /
    • 2011
  • Korea Ministry of Knowledge Economy has estimated that wind power (WP) will be occupied 37% in 2020 and 42% in 2030 of the new energy sources, and also green energies such as photovoltaic (PV) and WP are expected to be interconnected with the distribution system because of Renewable Portfolio Standard (RPS) starting from 2012. However, when a large scale wind power plant (over 3[MW]) is connected to the traditional distribution system, protective devices (mainly OCR and OCGR of re-closer) will be occurred mal-function problems due to changed fault currents it be caused by Wye-grounded/Delta winding of interconnection transformer and %impedance of WP's turbine. Therefore, when Double-Fed Induction Generator (DFIG) of typical WP's Generator is connected into distribution system, this paper deals with analysis three-phase short, line to line short and a single line ground faults current by using the symmetrical components of fault analysis and PSCAD/EMTDC modeling.

A Study on Textile Design of William Morris (월리엄 모리스의 텍스타일 디자인에 관한 연구)

  • 이경희
    • Archives of design research
    • /
    • v.14 no.2
    • /
    • pp.163-174
    • /
    • 2001
  • William Morris(1834-1896) was the most versatile and talented of all British nineteenth century polymaths. Since his death over one hundred years ago his achievements as an artist, designer, manufacturer, shop-keeper, poet, author, publisher, printer, collector, teacher, conservationist, political activist and environmentalist have influenced the lives and work of people throughout the world. Moris is now best known for his attractive and colorful patterns. The decorating firm of Morris, Marshall, Fault & Company(Morris & Company after 1875) was established in 1861. Over the years it produced works, ranging from stained·glass windows and furniture to tapestries, carpets and printed and woven fabrics, that had great influence on the course of British design. His earliest experiments with the craft were amateurishly worked embroideries made for his own use. Before long, Morris began to produce textiles on a more commercial basis. In order to control production properly, Morris set about learning the various textiles techniques, first dyeing and blockprinting, hand-loom jacquard and eventually, carpet and tapestry weaving. This extraordinary involvement with the practical side of manufacture separated Morris from all other designers of his time and contributed in no small way to his success. Morris's designs for textiles, embroidery, dyeing, woven, carpet and tapestry were commercially produced, that are most universally admired and frequently copied today. These have a timeless quality arising from the designers respect for and knowledge of the technique. Of equal importance was his love of nature, evidence of which can be seen in even the smallest details of each of his patterns.

  • PDF

An Auto-Verification Method of Security Events Based on Empirical Analysis for Advanced Security Monitoring and Response (보안관제 효율성 제고를 위한 실증적 분석 기반 보안이벤트 자동검증 방법)

  • Kim, Kyu-Il;Park, Hark-Soo;Choi, Ji-Yeon;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.507-522
    • /
    • 2014
  • Domestic CERTs are carrying out monitoring and response against cyber attacks using security devices(e.g., IDS, TMS, etc) based on signatures. Particularly, in case of public and research institutes, about 30 security monitoring and response centers are being operated under National Cyber Security Center(NCSC) of National Intelligence Service(NIS). They are mainly using Threat Management System(TMS) for providing security monitoring and response service. Since TMS raises a large amount of security events and most of them are not related to real cyber attacks, security analyst who carries out the security monitoring and response suffers from analyzing all the TMS events and finding out real cyber attacks from them. Also, since the security monitoring and response tasks depend on security analyst's know-how, there is a fatal problem in that they tend to focus on analyzing specific security events, so that it is unable to analyze and respond unknown cyber attacks. Therefore, we propose automated verification method of security events based on their empirical analysis to improve performance of security monitoring and response.

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

A Study on the Development of Cyberpolice Volunteer System Using the Collective Intellectual Network (집단지성 네트워크형 사이버폴리스 자원봉사시스템 구축에 관한 연구)

  • Kim, Doo-Hyun;Park, Sung-Joon;Na, Gi-Sung
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.59-85
    • /
    • 2019
  • In the reality that the boundary between the real world and the virtual world disappears with the 4th Industrial Revolution, cyber crimes that occur beyond time and space have clear limitations in fulfilling their duties only with the police force of government organizations established under the real law system. The research method of this thesis is based on the literature research and the experience of security work. The purpose of this paper is to establish a social system where collective intelligence of each social field can participate voluntarily to respond to cyber crimes occurring beyond the time and space before the law and institutionalization. In addition, the social system in which collective intelligence in each social sector can participate voluntarily was established to define crime types in cyberspace in real time and to prevent crimes defined by the people themselves and the counter-measures had been proposed in order to form social consensus. First, it is necessary to establish a collective intelligent network-type cyberpolice volunteer system. The organization consists of professors of security and security related departments at universities nationwide, retired public officials from the National Intelligence Service, the National Police Agency, and the National Emergency Management Agency, security companies and the organizations, civilian investigators, security & guard, firefighting, police, transportation, intelligence, security, national security, and research experts. Second, private sector regulation should be established newly under the Security Business Act. Third, the safety guard of the collective intelligent cyberpolice volunteer system for the stability of the people's lives should strengthen volunteer work. Fourth, research lessons and legal countermeasures against cybercrime in advanced countries should be introduced. Fifth, the Act on the Protection of Personal Information, the Act on Promotion of Information and Communication Network Utilization and Information Protection, the Act on the Utilization and Protection of Credit Information, and the Special Act on the Materials and Parts Industry should be amended. Sixth, police officers should develop cybercrime awareness skills for proactive prevention activities.

A Database of Simple Sequence Repeat (SSR) Marker-Based DNA Profiles of Citrus and Related Cultivars and Germplasm (SSR Marker를 이용한 감귤속 품종 및 유전자원에 대한 DNA Profile Data Base 구축)

  • Hong, Jee-Hwa;Chae, Chi-Won;Choi, Keun-Jin;Kwon, Yong-Sham
    • Horticultural Science & Technology
    • /
    • v.34 no.1
    • /
    • pp.142-153
    • /
    • 2016
  • The present study investigated identification of cultivars through phylogenetic analysis of 108 Citrus varieties and related cultivars using simple sequence repeat (SSR) markers. Two hundred three SSR primer pairs were used to detect polymorphic markers among 8 Citrus cultivars consisting of 4 mandarins, 1 orange, 1 tangor, 1 tangelo, and 1 pumelo. Eighteen SSR primer pairs were reproducible and showed highly polymorphic alleles. These markers were applied to assess genetic variations of the 108 varieties. Each marker detected 5-14 alleles, with an average of 9.28. The polymorphism information content varied from 0.417 to 0.791 with an average of 0.706. Cluster analysis with SSR markers resulted in 13 major groups reflecting cultivar types and pedigree information. Twelve orange cultivars in the $I-1^{st}$ sub-cluster and 23 mandarin cultivars in the $II-1^{st}$ sub-cluster, respectively, were not discriminated using the SSR markers. This could be due to narrow genetic backgrounds originated through bud mutation or nucellars seedlings. The SSR profile database of Citrus cultivars will be useful as a tool for protection of plant breeders' intellectual property rights in addition to assessing genetic diversity in Citrus cultivars and germplasms.

The Effects of Environmental Education Program using Action Learning on the Environmental Literacy and Self-efficacy of Elementary Students (액션러닝을 활용한 환경교육 프로그램이 초등학생의 환경소양과 자기효능감에 미치는 영향)

  • Jin Jeon;Keum Hyun So
    • Journal of Science Education
    • /
    • v.47 no.2
    • /
    • pp.139-153
    • /
    • 2023
  • This study aimed to investigate the effect of environmental education programs using action learning on elementary school students' environmental literacy and self-efficacy. To this end, an environmental education program using action learning was applied to 22 sixth graders of 'A' Elementary School in Busan. The results of this study were as follows. First, environmental education programs using action learning were effective in improving the environmental literacy of elementary school students. After implementing the environmental education program using action learning, students' environmental values, cognitive, and procedural ability changed positively. Environmental issues awareness and ecological knowledge improved, and there was a significant increase in environmental behavior and environmental function. Second, environmental education programs using action learning were effective in enhancing the self-efficacy of elementary school students. After implementing environmental education programs using action learning, students' confidence in problem solving and their ability to judge their behaviors improved. Third, elementary school students showed active participation and interest when conducting environmental education programs using action learning. Students have become open to protecting the environment when they find problems, devise solutions, and practice them. After reflection, it was confirmed that students' immersion and satisfaction in class were high as a solution was reached, leading to efforts to sell items they did not use and donate profits to environmental protection organizations.

Secret of Old Wine : Focused on Decanting (올드 와인의 비밀 : 디캔팅을 중심으로)

  • Kim, Dong-Joon;Choo, Kou-Jin
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.3
    • /
    • pp.27-41
    • /
    • 2019
  • The study tested the old wines of Château Latour 1953 and tried to analyze the differences from the old wines. Even if not the great vintage, the quality change of old wine gives a new flavor, so it requires analysis results from empirical concepts, decanting, and testing. Based on the analysis results, the government wanted to re-evaluate the old wine and give consumers joy and implications for the wine. The wine to be studied is Château Latour 1953 and is an old wine from the French province of Pauillac. Wine blending is known to be 75% of cabernet sauvignon, 20% of melot, 4% of cabernet franc and 1% of petit verdot. The alcohol level is 13% and the test date is July 2-7, 2018(decanting period 5.4 days/15:00 p.m. on July 7). The testing site was a wine cafe in Daegu City, and the tester consisted of one FICB Korean grand commander and one KOV Finland commander and selected Japchae of Korean food as a mariage. The ullage of Chateau Latour 1953 was 3.0cm and was set up for one month for testing. Decanting time was applied to the calculation formula 2018(current year)-1953(vintage year)/12=5.4 days, which was investigated in this study. Aroma smelled of cork, old grapes, tobacco, leaves and leather, the bouquet was identified in five stages, and the testing was analyzed in seven stages.

The Influence of Ethical Leadership and Collaborative Communication on IS Behavior in Organizations: The Role of Trust and Person-Organization Fit (조직 내 정보보안 행동 관련 윤리적 리더십과 협력적 커뮤니케이션의 영향: 신뢰 및 개인-조직 적합성 역할)

  • In-Ho Hwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.3
    • /
    • pp.465-474
    • /
    • 2023
  • As the effective use and strong protection of an organization's information resources are recognized as a condition for the growth of an organization, they are increasing technological and policy investments in IS(information security). However, information exposure can occur from external invasions such as hacking and incidents related to misuse and abuse by insiders. This study proposes a mechanism that considers the organizational environment and individual characteristics from the viewpoint of promoting employees' IS participation activities. In other words, the study presents the complex effects of organizational environmental factors (ethical leadership, IS collaborative communication) and personal factors (person-organization fit) on organization trust and IS voice behavior. We surveyed office workers who asked for IS-related business activities and tested hypotheses using 422 samples. As a result, ethical leadership influenced organization trust through collaborative communication, and organization trust strengthened IS voice behavior by having an interaction effect with person-organization fit. This study suggests direction for establishing an organizational environment for promoting IS-related activities by office workers, so it provides practical implications for organizations with goals related to internal information exposure control.

119 Emergency Medical Technicians' Infection Control Education Status, Stress, and Needs related to Emerging Infectious Diseases

  • Dong-Min Shin;Byung-Jun Cho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.12
    • /
    • pp.201-209
    • /
    • 2023
  • This study investigated to provide basic data for infection control education on new infectious diseases by confirming the level of knowledge, training status, stress, and need for training on new infectious diseases for 119 emergency medical technicians (EMT). This data collection period was a total of 39 days from August 10 to September 18, 2022, and a total of 105 copies were collected. The analysis of this study used the SPSS 25.0 program. As a result of the study, among the 119 paramedics, the gender of the EMT was 54 men (51.4%) and 51 women (48.6%), with more men than women, with 47 people in their 20s (44.8%) and those in their 30s or older. There were 58 people (55.2%), most of whom were in their 30s or older. The highest total work experience was 3 to 5 years (37 people (35.2%)). In the pandemic situation, an attempt was made to check the education status of 119 paramedics on COVID-19 and the need for education on new infectious diseases. As a result of the study, the status of education on COVID-19 was insufficient. The demand for education on new infectious diseases was found to be high. Among 119 emergency responders who are frequently exposed to new infectious diseases, theoretical and practical training in personal protective equipment, stress, including theoretical training, is needed. A theoretical and practical education program on new infectious diseases and personal protective equipment should be developed as a subject for college students before becoming EMT.