• Title/Summary/Keyword: Agent Protection

Search Result 455, Processing Time 0.028 seconds

An Experimental Study on the Development of Soft Ground Firming Agent Using EAF Reduction Slag (전기로 환원 슬래그를 이용한 연약지반 고화재 개발에 관한 실험적 연구)

  • Lee, Kang-Seok;Lee, Yoon-Kyu;Choi, Jae-Seok;Han, Man-Hae
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2010.09a
    • /
    • pp.998-1001
    • /
    • 2010
  • Most firming agent used in Korea is cement-firming agent. Cement-firming agent absorb water for combination, and then it makes ettringite. Through this chemical process, soft ground is firmed by cement-firming agent. Although most cement-firming agent used in Korea made from CSA, it relies on imports. Therefore, the development of soft ground firming agent using new materials is required. In this study, we suggested that EAF reduction slag not used for anything in the steel industry is available for material of soft ground firming agent. If EAF reduction slag is used in soft ground firming agent, it will be possible to solve the problem with treatment of slag and improvement of soft ground.

  • PDF

Agent-based Colored Petri Net Modeling of Grid Information Flows : Modeling of Wide Area Protection System (에이전트 기반 컬러 페트리 넷을 이용한 전력 계통의 정보 흐름 모델링: 광역 보호 시스템에의 적용)

  • Park, Byung-Sung;Hur, Kyeon
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.7
    • /
    • pp.1347-1353
    • /
    • 2011
  • While most of the existing protection schemes have been designed with local information around individual components, these local schemes are not considered capable of protecting the modern electric power gird with growing complexity. Recent blackouts in North America and Europe have renewed the emphasis on coordinated protection and control actions to avoid systemwide blackouts, utilizing all of the available grid information. Thus, this paper proposes a new methodology, Agent-based Colored Petri Net (ACPN) modeling for systematically representing, modeling and analyzing information flows and interactions among the entities of the electric power grid. The paper demonstrates its efficacy and accuracy by investigating an ACPN model of a wide area protection system for a typical power grid. The proposed modeling and analysis schemes may further provide a framework to help assure reliability and interoperability of diverse smart grid components.

Design and Implementation of Dynamic Digital Rights Management System Based on Agent (에이전트 기반의 동적 디지털저작권관리 시스템 설계 및 구현)

  • Lee, Yong-Hyo;Hwang, Dae-Jun
    • The KIPS Transactions:PartD
    • /
    • v.8D no.5
    • /
    • pp.613-622
    • /
    • 2001
  • As logistic environment of digital resources is rapidly changing, protection of the intellectual property for digital resources has been recognized as one of important issues. Digital Rights Management (DRM) has taken much interests from ISP, authors and publishers of digital content as an integrated approach to create a reliable environment for access and the use of digital resource. In this paper we proposed a dynamic digital rights management system based on adaptive agent theory (ARPA : Adaptive Resource Protection Agent) to address problems facing contemporary DRM approaches : static rights management problem solving and strengthened monitoring/tracking system. We introduced a dynamic mission control scheme to realize dynamic digital rights management. We incorporated adaptive agent theory to implement on-and off-line tracking and protection. Through the implementation of protype system, the process, the process dynamic digital rights protection will be demonstrated.

  • PDF

Investigation on the Properties of Mortar U sing Chloride Attack Protection Agent (염해방지제 사용에 따른 모르타르의 특성 검토)

  • Bae, Jun-Young;Kim, Jong-Back;Lee, Keon-Ho;Cho, Sung-Hyun;Kim, Kyoung-Min;Park, Sang-Joon
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2009.05a
    • /
    • pp.297-298
    • /
    • 2009
  • In this paper, it was to investigate different types of mortar properties using a chloride attack protection agent by evaluating mixing ratio of this particular agent, including 3% increments. The results showed that the compressive strength and chloride ion penetration resistance of mortar by using chloride attack protection agent were improved than non-added mortar.

  • PDF

Mobile Agent Protection Scheme through Execution Tracing of Agent Code and Status (에이전트 코드와 상태 추적을 통한 이동에이전트의 보호 기법)

  • 정창렬;고진광
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7C
    • /
    • pp.743-750
    • /
    • 2003
  • With the expansion of computer technology the mobility of a mobile agent code having the flexibility in the dispersive computer situation is used to set up the applications distributed on the Internet. As it also has the ability to transmit the mobile code of a mobile agent and to receive it from a far-off host, the executive circumstances of the host system in which an agent is executed have to access to an agent code and the executive state capable of executing an agent code. Therefore, it is difficult to prevent the forgery, the alteration and the wrong execution of an agent from a malicious host. This dissertation suggests the mechanism which can protect an agent from the malicious action through the executive pursuit of a code-named mobile agent. The security of this mechanism is verified through the protective process of a mobile agent in this mechanism.

Cryptographic Traces for the Protection of Mobile Agent Execution (이동 에이전트 실행 보호를 위한 암호학적 추적 방안)

  • Shin, Weon;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.3
    • /
    • pp.71-78
    • /
    • 2001
  • In this paper, we describe the vulnerabilities against mobile agent and analyze existing schemes to cope with them. Also we propose a new scheme which protects the executed information by mobile agent and simultaneously traces the executions of mobile agent. The proposed scheme provides non-repudiation between participations for the executions of mobile agent, forward integrity against modification and protection against code insertion or deletion attack.

Study on Chemical-Biological Protection Performance of the CHEONGUNG's Integrated Protection Unit (천궁체계 교전/사격통제소용 종합식보호장치의 화생방호성능 평가 연구)

  • Shim, Woo-Sup;Ryu, Sam-Gon;Kwon, Tae-Geun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.1
    • /
    • pp.75-80
    • /
    • 2012
  • The integrated protection unit of CHEONGUNG is composed of chemical-biological equipment and air conditioner equiped heating element. The protection capabilities against chemical-biological agent were measured by using simulant agents such as n-Hexane, KM5 Screening Smokes and CS agent. The experimental test results with simulant agents verify the protective performance of the integrated protection unit.

An Agent System Protection Mechanism for Secure Action of Mobile Agent in Open Network Systems (Open Network 시스템에서 이동에이전트의 안전한 역할 수행을 위한 에이전트 보호메커니즘)

  • Jung, Chang-Ryul;Yoon, Hong-Sang;Koh, Jin-Gwang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.371-378
    • /
    • 2002
  • In the resent years, the term mobile agent is probably one of the most overused words in many appliable areas of distributed open systems as electronic commerce and electronic data interchange, and it has very different meanings in the area of artificial intelligence, network management, or distributed systems. However, the use of mobile agent adds significant problems, primarily in the area of EC/EDI. Therefore it is very important to control the roaming agents to keep one's privacy or property in distributed open networks. The surge in secure intranets for commercial applications provides a robust, secure environment to which trading partners can increasingly entrust their interactions to some mobile agents. In this paper, we introduce a mechanism to protect mobile agent itself from the malicious server he is visiting and also we introduce a mechanism to protect vital resources of the open systems as internet.