• Title/Summary/Keyword: 2 step protection system

Search Result 44, Processing Time 0.024 seconds

A Study on the Transient Phenomenon Protection System Development for Fire Alarm System Control Unit (화재 수신기용 과도현상 보호시스템 개발에 관한 연구)

  • Lee, Dong-Myung
    • Fire Science and Engineering
    • /
    • v.23 no.2
    • /
    • pp.55-61
    • /
    • 2009
  • This study has been carried on the transient phenomenon protection system to become fire alarm system control unit of high reliance which can be protected from transient phenomena for surge or transient overvoltage, and constructed engineering base that can develop transient phenomenon protection system by proving performance of protection system in a experimental. This study developed 1 step and 2 step protection system that can be protected from transient phenomenon with process thesis and theory for development of transient phenomenon protection system. It established engineering data construction and a source technology that can develop transient phenomenon protection system as gets satisfied result and test with all performance condition that present in fire protection law and connection regulation.

A Study on Trouble and Arrangement of the Ground-Fault Protection for 2 Step Voltage Distribution System of Premises (2 Step 이상 운용 고객의 구내배전계통 지락보호시스템 구성 현황 및 문제점 검토)

  • Im, Jin-Sung;Shin, Myoung-Ho
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.10
    • /
    • pp.73-77
    • /
    • 2010
  • Most accidents occurred in power receiving & transforming facility are ground fault. The quality of power supply is deteriorated since the ground fault is not detected promptly. This paper analyzes the problems about system-grounding type of 2 step power receiving & transforming facility, arrangement of protection relaying scheme and ground-fault protection system of ungrounded system. Then, this paper presents the arranging scheme of system-grounding type to improve power supply reliability.

Improved Coordination Method for Back-up Protection Schemes Based on IEC 61850 (IEC 61850 기반 후비보호계전시스템 보호협조 개선방안)

  • Kim, Hyung-Kyu;Kang, Sang-Hee
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.1
    • /
    • pp.43-49
    • /
    • 2011
  • A distance relay scheme is commonly used for backup protection. This scheme, called a step distance protection, is comprised of 3 steps for graded zones having different operating time. As for the conventional step distance protection scheme, Zone 2 can exceed the ordinary coverage excessively in case of a transformer protection relay especially. In this case, there can be overlapped protection area from a backup protection relay and, therefore, malfunctions can occur when any fault occurs in the overlapped protection area. Distance relays and overcurrent relays are used for backup protection generally, and both relays have normally this problem, the maloperation, caused by a fault in the overlapped protection area. Corresponding to an IEEE standard, this problem can be solved with the modification of the operating time. On the other hand, in Korea, zones are modified to cope with this problem in some specific conditions. These two methods may not be obvious to handle this problem correctly because these methods, modifying the common rules, can cause another coordination problem. To overcome this problem clearly, this paper describes an improved backup protection coordination scheme using an IEC 61850-based distance relay for transformer backup protection. IEC 61850-based IED(Intelligent Electronic Device) and the network system based on the kernel 2.6 LINUX are realized to verify the proposed method. And laboratory tests to estimate the communication time show that the proposed coordination method is reliable enough for the improved backup protection scheme.

Development of Asynchronous Blocking Algorithm through Asynchronous Case Study of Steam Turbine Generator (스팀터빈 발전기 비동기 투입 사례연구를 통한 비동기 방지 알고리즘 개발)

  • Lee, Jong-Hweon
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.10
    • /
    • pp.1542-1547
    • /
    • 2012
  • Asynchronous phenomenon occurs on the synchronous generators under power system when a generator's amplitude of electromagnetic force, phase angle, frequency and waveform etc become different from those of other synchronous generators which can follow instantly varying speed of turbine. Because the amplitude of electromagnetic force, phase frequency and waveform differ from those of other generators with which are to be put into parallel operation due to the change of excitation condition for load sharing and the sharing load change, if reactive current in the internal circuit circulates among generators, the efficiency varies and the stator winding of generators are overheated by resistance loss. When calculation method of protection settings and logic for protection of generator asynchronization will be recommended, a distance relay scheme is commonly used for backup protection. This scheme, called a step distance protection, is comprised of 3 steps for graded zones having different operating time. As for the conventional step distance protection scheme, zone 2 can exceed the ordinary coverage excessively in case of a transformer protection relay especially. In this case, there can be overlapped protection area from a backup protection relay and, therefore, malfunctions can occur when any fault occurs in the overlapped protection area. Distance relays and overcurrent relays are used for backup protection generally, and both relays have normally this problem, the maloperation, caused by a fault in the overlapped protection area. Corresponding to an IEEE standard, this problem can be solved with the modification of the operating time. On the other hand, in Korea, zones are modified to cope with this problem in some specific conditions. These two methods may not be obvious to handle this problem correctly because these methods, modifying the common rules, can cause another coordination problem. To overcome asynchronizing protection, this paper describes an improved backup protection coordination scheme using a new logic that will be suggested.

A Study on Protection of Generator Asynchronization by Impedance Relaying (임피던스 계전기를 이용한 발전기 비동기 투입 보호 연구)

  • Lee, Jong-Hweon
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.11
    • /
    • pp.2000-2006
    • /
    • 2011
  • Asynchronous phenomenon occurs on the synchronous generators under power system when a generator's amplitude of electromagnetic force, phase angle, frequency and waveform etc become different from those of other synchronous generators which can follow instantly varying speed of turbine. Because the amplitude of electromagnetic force, phase frequency and waveform differ from those of other generators with which are to be put into parallel operation due to the change of excitation condition for load sharing and the sharing load change, if reactive current in the internal circuit circulates among generators, the efficiency varies and the stator winding of generators are overheated by resistance loss. Where calculation method of protection settings and Logic for Protection of Generator Asynchronization will be recommended, A distance relay scheme is commonly used for backup protection. This scheme, called a step distance protection, is comprised of 3 steps for graded zones having different operating time. As for the conventional step distance protection scheme, Zone 2 can exceed the ordinary coverage excessively in case of a transformer protection relay especially. In this case, there can be overlapped protection area from a backup protection relay and, therefore, malfunctions can occur when any fault occurs in the overlapped protection area. Distance relays and overcurrent relays are used for backup protection generally, and both relays have normally this problem, the maloperation, caused by a fault in the overlapped protection area. Corresponding to an IEEE standard, this problem can be solved with the modification of the operating time. On the other hand, in Korea, zones are modified to cope with this problem in some specific conditions. These two methods may not be obvious to handle this problem correctly because these methods, modifying the common rules, can cause another coordination problem. To overcome asynchronizing protection this paper describes an improved backup protection coordination scheme using a new Logic that will be suggested.

A Study on Real Condition Estimation for Fire Protection Safety Management System Builds (소방안전경영시스템 구축을 위한 실태평가에 관한 연구)

  • Kang, Gil-Soo;Choi, Jae-Wook
    • Fire Science and Engineering
    • /
    • v.27 no.2
    • /
    • pp.18-24
    • /
    • 2013
  • Goverment and enterprises have been devoting a lot of dffort in order to prevent the loss of human and property due to a large, diversified fire, explosion, global warming and disasters caused by natural phenomena. But Enterprises came forward and running in the economy priority policy for profit-seeking until now in order to meet the macro purpose of quality improvement of national life and welfare promotion in company with National growth, as a result of lax risk management have had to endure the loss of precious lives and property. According to the '2007 Survey of public safety for the activation of the safety culture' of National Emergency Management Agency [NEMA], a insensitivity of safety in our society was surveyed 'a serious level'. In this study, surveyed need of 'step-by-step fire protection safety management system builds' in order to prevent fire safety accident and improvement of safety awareness level through a systematic management and real condition estimation of not only large business that can control risk management, but also small business that has a big risk to occur accident easily according to small budget and organization.

A Study on the Method of Checking the Level of Information Security Management Using Security Maturity Model (보안성숙도 모델을 활용한 정보보호 관리수준 점검방법에 관한 연구)

  • Lee, Sang-kyu;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1585-1594
    • /
    • 2018
  • In recent years The importance of information security management for securing information collection and analysis, production and distribution is increasing. Companies are assured of confidence in information security through authentication of information Security Management System. However, level assessment and use of domains that make up the management system is limited. On the other hand, the security maturity model is able to diagnose the level of information protection of the enterprise step by step. It is also possible to judge the area to be improved urgently. It is a tool to support goal setting according to the characteristics and level of company. In this paper, C2M2, which is an example of security maturity model, is compared and analyzed with Korea Information Security Management System certification. Benchmark the model to check the level of information security management and derive the priority among the items that constitute the detailed area of information security measures of ISMS certification. It also look at ways to check the level of information security management step by step.

A Survey on Current Status and Introduction of Single Institutional Review Board (IRB) in Korea (국내 Single IRB 현황 및 도입에 대한 설문조사 연구)

  • Park, Sinyoung;Noh, Yang Hee;Cho, Su jin;Shim, Kyu Young;Park, Eun Young;Kim, Jin Seok
    • The Journal of KAIRB
    • /
    • v.2 no.1
    • /
    • pp.6-22
    • /
    • 2020
  • Purpose: Clinical studies require institutional review board (IRB) approval based on the ethical principle and regulations. While the number of clinical studies has been increased and diversified, duplicated IRB review for multi-center studies has become a major issue. Therefore, single IRB system has been suggested in revised Common Rule. This study aimed to identify and assess the current status of single IRB in Korea and the anticipated needs of single IRB from researchers and IRB member or administrators. Methods: We developed 14 questions including perceived advantages and disadvantages of single IRB, and anticipated problems. The online survey collected opinions on single IRB from researchers, IRB members and IRB administrators. We also interviewed five IRB administrators who have an experience of single IRB. Results: A total of 80 responses were analyzed in this study. Although efficiencies were suggested for the advantages of single IRB in terms of reducing burden of duplicated review, respondents also perceived that the different review criteria between single IRB and each IRB would be a major hurdle for adopting single IRB system. Therefore, the standardization of standard of procedures (SOP) and the standardization of IRB submission materials should be preceded. According to the small group experiences of single IRB in Korea, we also observed the similar anticipated problems of single IRB. Conclusion: Single IRB system has many advantages for conducting multi-center trial. However, many specialists still have a lot of concerns about introducing a single IRB system in Korea. Therefore, a gradual, step-by-step process for conducting a single IRB system in Korea will be needed. Many studies for improving currently suggested single IRB system and the improvement of awareness about the essential of single IRB system would be needed.

  • PDF

A Study of Effective Privacy Protection System on High Concurrent Transaction Database System (동시 트랜잭션이 많은 데이터베이스에서 효과적인 개인정보보호 시스템 연구)

  • Kang, Ji-Won
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.107-113
    • /
    • 2012
  • Recently, according to the establishment of personal information protection Act, the public and private organizations are taking a step to protect personal information rights and interests by employing the technical methods such as the access control mechanism, cryptography, etc. The result of the personal information leakage causes a serious damage for the organization image and also has to face with the responsibility by law. However, applying access control and cryptographic approach on the personal information item for every connection to large database system causes significant performance degradation in a large database system. In this paper, we designed and implemented the light weight system using JVM (Java Virtual Machine) for the Oracle DBMS environment which the concurrent transaction occurs many, thereby the proposed system provides the minimum impact on the system performance and meets the need of personal information protection. The proposed system was validated on the personal information protection system which sits on a 'A' public organization's portal site and personnel information management system.

Quantifications of Intensity-Modulated Radiation Therapy Plan Complexities in Magnetic Resonance Image Guided Radiotherapy Systems

  • Chun, Minsoo;Kwon, Ohyun;Park, Jong Min;Kim, Jung-in
    • Journal of Radiation Protection and Research
    • /
    • v.46 no.2
    • /
    • pp.48-57
    • /
    • 2021
  • Background: In this study, the complexities of step-and-shoot intensity-modulated radiation therapy (IMRT) plans in magnetic resonance-guided radiation therapy systems were evaluated. Materials and Methods: Overall, 194 verification plans from the abdomen, prostate, and breast sites were collected using a 60Co-based ViewRay radiotherapy system (ViewRay Inc., Cleveland, OH, USA). Various plan complexity metrics (PCMs) were calculated for each verification plan, including the modulation complexity score (MCS), plan-averaged beam area (PA), plan-averaged beam irregularity, plan-averaged edge (PE), plan-averaged beam modulation, number of segments, average area among all segments (AA/Seg), and total beam-on time (TBT). The plan deliverability was quantified in terms of gamma passing rates (GPRs) with a 1 mm/2% criterion, and the Pearson correlation coefficients between GPRs and various PCMs were analyzed. Results and Discussion: For the abdomen, prostate, and breast groups, the average GPRs with the 1 mm/2% criterion were 77.8 ± 6.0%, 79.8 ± 4.9%, and 84.7 ± 7.3%; PCMs were 0.263, 0.271, and 0.386; PAs were 15.001, 18.779, and 35.683; PEs were 1.575, 1.444, and 1.028; AA/Segs were 15.37, 19.89, and 36.64; and TBTs were 18.86, 19.33, and 5.91 minutes, respectively. The various PCMs, i.e., MCS, PA, PE, AA/Seg, and TBT, showed statistically significant Pearson correlation coefficients of 0.416, 0.627, -0.541, 0.635, and -0.397, respectively, with GPRs. Conclusion: The area-related metrics exhibited strong correlations with GPRs. Moreover, the AA/Seg metric can be used to estimate the IMRT plan accuracy without beam delivery in the 60Co-based ViewRay radiotherapy system.