• Title/Summary/Keyword: File Protection

Search Result 121, Processing Time 0.027 seconds

A Study on SCOTT Transformer Protection Relay Malfunction Case and Improvement Methodology (스코트 변압기 보호계전기 오동작 사례분석 및 개선방안 고찰)

  • Lee, Jong-Hwa;Lho, Young-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.394-399
    • /
    • 2017
  • In Korean AC power railway substations, SCOTT winding transformers are under operation to have a single phase power supply together with a phase angle of $90^{\circ}$ on the secondary side of the main transformer. In the case of an internal fault of the transformer, the transformer protection relay should be cut off on the primary side, the transformer should be inoperative to the external fault of the transformer or to the normal train operation. Reducing the malfunction of the relay through an exact fault determination is very important for securing a stable power system and improving its reliability. The main transformers are protected using Buchholtz's relay and a differential relay as the internal fault detection devices, but there are some cases of the main transformer operation under the deactivation of this protection function due to a malfunction of the differential relay. In this paper, the characteristics of the SCOTT transformer and differential relay as well as the malfunctioning of the protection relays are presented. The modeling of the SCOTT transformer protection relay was accomplished by the power system analysis program and the Comtrade file from 'A substation', which was used as the input data for the fault wave, and the harmonics were analyzed to determine if the relay operates or not. In addition, an improvement plan for malfunctioning cases through wave form analysis is suggested.

The Study of Response Model & Mechanism Against Windows Kernel Compromises (Windows 커널 공격기법의 대응 모델 및 메커니즘에 관한 연구)

  • Kim, Jae-Myong;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.1-12
    • /
    • 2006
  • Malicious codes have been widely documented and detected in information security breach occurrences of Microsoft Windows platform. Legacy information security systems are particularly vulnerable to breaches, due to Window kernel-based malicious codes, that penetrate existing protection and remain undetected. To date there has not been enough quality study into and information sharing about Windows kernel and inner code mechanisms, and this is the core reason for the success of these codes into entering systems and remaining undetected. This paper focus on classification and formalization of type target and mechanism of various Windows kernel-based attacks, and will present suggestions for effective response methodologies in the categories of, "Kernel memory protection", "Process & driver protection" and "File system & registry protection". An effective Windows kernel protection system will be presented through the collection and analysis of Windows kernel and inside mechanisms, and through suggestions for the implementation methodologies of unreleased and new Windows kernel protection skill. Results presented in this paper will explain that the suggested system be highly effective and has more accurate for intrusion detection ratios, then the current legacy security systems (i.e., virus vaccines and Windows IPS, etc) intrusion detection ratios. So, It is expected that the suggested system provides a good solution to prevent IT infrastructure from complicated and intelligent Windows kernel attacks.

  • PDF

Development of KML conversion technology of ENCs (전자해도의 KML 변환기술 개발)

  • Oh, Se-Woong;Park, Jong-Min;Lee, Moon-Jin;Ko, Hyun-Joo
    • Journal of Navigation and Port Research
    • /
    • v.35 no.1
    • /
    • pp.9-15
    • /
    • 2011
  • IMO adopt the revision of SOLAS convention on requirement systems for ECDIS and considered an ECDIS as the major system for E-Navigation strategy on marine transportation safety and environment protection. ENC(Electronic Navigational Chart) as the base map of ECDIS is considered as a principal information infrastructure that is essential for navigation tasks. Because ENCs are not easy to utilize for being encoded according to ISO/IEC 8211 file format, used for navigational purpose mainly, it's required to utilize in parts of Marine GIS and various marine application. In this paper, we developed KML conversion technology for ENC application. In details, we analyzed data model and encoding method of ENC, schema structure and data file of KML. Based on this results, we developed the program of KML conversion of ENCs.

Survey on animal welfare problems in Australian exporting live animals (호주산 수출 생축 동물복지에 관한 조사)

  • Jang Seong-Jun
    • Korean Journal of Veterinary Service
    • /
    • v.29 no.2
    • /
    • pp.129-154
    • /
    • 2006
  • Last year, over 800 Australian live cattle were imported, underwent quarantine procedure for one month in the port of Incheon and Busan and distributed to general farm house holds in Gyeongju city, Gyeongbuk province, and Gimhae city, Namhae county, Gyeongnam province. But Hanwoo association took violent actions to prevent from entering the country for fear that the imported live cattle would destroy the 'Hanwoo industry', and in turn leads to the collapse of the industry. In Australia, national animal protection body 'Animals Australia' investigated the level of cruelty involved in this trade and made a report 'The death file'. Australia governments drive to expand Its market for 'live animal exports' and it has resulted in a corresponding increase In casualties associated with the long-haul overseas trade in live livestock animals over the past years. After the stress of transportation, all the surviving cattle and sheep face death on foreign soil, many into countries which have no animal welfare laws or, at best, inadequate laws. They will usually be killed without pre-stunning and often even without adequate restraint facilities. The result is inherent and persistent suffering. West Australian(WA) Police acting on behalf of the West Australian Government and the Office of the WA State Solicitor have laid animal cruelty charges against a leading WA live export company for breaching the WA Animal Welfare Act. With the aim of eventually substituting it for the live sheep trade, the Senate Select Committee on Animal Welfare (SCCAW) recommended that the Federal Government 'promote and encourage the expansion of the refrigerated sheep meat trade to the Middle East and other countries'. Animal welfare standards have been improved time after time, there is another incident, another public outcry, another inquiry and more assurances.

The Processing Method of Stream Data in the Small-size Operating System (소규모 운영체제에서의 스트림데이터 처리기법)

  • Kim, Jin-Deog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.871-874
    • /
    • 2007
  • Stream data need a efficient data management with high reliability and real time processing. The characteristics of these data are a large volume, a short report interval and asynchronous report time. The typical queries of these systems consist of the current query to search the latest signal value, the snapshot query to search the signal value of a past time, the historical query to search the signal value of a past time to current. This paper proposes the efficient method to manage the above signals by using a file structured database in QNX operating systems. The query model to accommodate various query for stream data is proposed. The proposed methods are applied to reactive protection system to verify their usefulness. The COM(Cabinet Operator Module) based on the QNX employs file database that adopts a delta version and a buffering method for the resource limit of a small storage and a low computing power.

  • PDF

Constitutional Protection for the Secrecy of Wire Communication and Freedom of News Reporting on Public Affairs (공적 인물의 통신비밀보호와 공적 관심사에 대한 언론보도의 자유: '안기부 X파일' 사건에 대한 서울고법 2006노1725판결을 중심으로)

  • Lee, Seung-Sun
    • Korean journal of communication and information
    • /
    • v.38
    • /
    • pp.211-244
    • /
    • 2007
  • Article 17 and 18 of the Korean Constitution respectively prescribe the violation of individual's right to privacy and the secrecy of wire communication. Meanwhile, Article 20 of the Criminal Code provides that an act which is conducted within the ambit of laws or pursuant to accepted business practices or which does not violate the social norms shall not be punishable. In 1999, the Constitutional Court held that media reports on public matters of public figures must be given strong constitutional protection, and treated differently from reports on private matters of private figures. In accordance with the decision, the Supreme Court has expanded the scope of constitutional guarantee of freedom of expression since 2002. This study analyzes the issue of media liability for publication of illegally intercepted wire communication by a third person. Particularly, it reviews Seoul High Court's ruling on 'X-file scandal' which disclosed intercepted wire communications between notable public figures regarding a slush fund for a presidential candidate. In the light of this analysis, the study concludes that the media reporting of the intercepted communication does not violate social norms of Article 20, and therefore it is entitled to a constitutional privilege.

  • PDF

A Study on Quantitative Security Assessment after Privacy Vulnerability Analysis of PC (PC의 개인정보보호 취약점 분석과 정량화된 보안진단 연구)

  • Seo, Mi-Sook;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.456-460
    • /
    • 2012
  • Privacy Protection Act of 30 March 2012 was performed. In general, personal information management to enhance security in the DB server has a security system but, PC for the protection of the privacy and security vulnerability analysis is needed to research on self-diagnosis. In this paper, from a PC to search information relating to privacy and enhance security by encrypting and for delete file delete recovery impossible. In pc found vulnerability analysis is Check user accounts, Checking shared folders ,Services firewall check, Screen savers, Automatic patch update Is checked. After the analysis and quantification of the vulnerability checks through the expression, enhanced security by creating a checklist for the show, PC security management, server management by semi-hwahayeo activates. In this paper the PC privacy and PC security enhancements a economic damage and of the and Will contribute to reduce complaints.

  • PDF

Comparison of Physics Model for 600 MeV Protons and 290 MeV·n-1 Oxygen Ions on Carbon in MCNPX

  • Lee, Arim;Kim, Donghyun;Jung, Nam-Suk;Oh, Joo-Hee;Oranj, Leila Mokhtari;Lee, Hee-Seock
    • Journal of Radiation Protection and Research
    • /
    • v.41 no.2
    • /
    • pp.123-131
    • /
    • 2016
  • Background: With the increase in the number of particle accelerator facilities under either operation or construction, the accurate calculation using Monte Carlo codes become more important in the shielding design and radiation safety evaluation of accelerator facilities. Materials and Methods: The calculations with different physics models were applied in both of cases: using only physics model and using the mix and match method of MCNPX code. The issued conditions were the interactions of 600 MeV proton and $290MeV{\cdot}n^{-1}$ oxygen with a carbon target. Both of cross-section libraries, JENDL High Energy File 2007 (JENDL/HE-2007) and LA150, were tested in this calculation. In the case of oxygen ion interactions, the calculation results using LAQGSM physics model and JENDL/HE-2007 library were compared with D. Satoh's experimental data. Other Monte Carlo calculations using PHITS and FLUKA codes were also carried out for further benchmarking study. Results and Discussion: It was clearly found that the physics models, especially intra-nuclear cascade model, gave a great effect to determine proton-induced secondary neutron spectrum in MCNPX code. The variety of physics models related to heavy ion interactions did not make big difference on the secondary particle productions. Conclusion: The variations of secondary neutron spectra and particle transports depending on various physics models in MCNPX code were studied and the result of this study can be used for the shielding design and radiation safety evaluation.

Design and Implementation of Method Generation based Watermarking Technique for Android Copyright Protection (안드로이드 저작권 보호를 위한 메소드 생성 기반 워터마킹 기법의 설계 및 구현)

  • Park, Heewan
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.1
    • /
    • pp.61-69
    • /
    • 2019
  • As smartphones become widespread, numerous applications are developed and social issues related to software copyright are emerging. Software watermarking is digital watermarking technology applied to software and is a technology that can be used to recognize copyright owners. Generally, Java language is used to develop applications on the Android environment. The Java is an object-oriented language that supports method overloading and overriding. In this paper, we propose and implement a method generation based watermarking technique. As a result of evaluating the overhead due to the watermark, it was confirmed that the increase of the executable file size and the decrease of the execution speed are not large. Using the watermarking technique proposed in this paper, it is expected that copyright information can be verified when illegal copying is suspected or actual program is stolen, and piracy attempts will be prevented in advance.

A Watermarking Algorithm of 3D Mesh Model Using Spherical Parameterization (구면 파라미터기법을 이용한 3차원 메쉬 모델의 워더마킹 알고리즘)

  • Cui, Ji-Zhe;Kim, Jong-Weon;Choi, Jong-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.149-159
    • /
    • 2008
  • In this paper, we propose a blind watermarking algorithm of 3d mesh model using spherical parameterization. Spherical parameterization is a useful method which is applicable to 3D data processing. Especially, orthogonal coordinate can not analyse the feature of the vertex coordination of the 3D mesh model, but this is possible to analyse and process. In this paper, the centroid center of the 3D model was set to the origin of the spherical coordinate, the orthogonal coordinate system was transformed to the spherical coordinate system, and then the spherical parameterization was applied. The watermark was embedded via addition/modification of the vertex after the feature analysis of the geometrical information and topological information. This algorithm is robust against to the typical geometrical attacks such as translation, scaling and rotation. It is also robust to the mesh reordering, file format change, mesh simplification, and smoothing. In this case, the this algorithm can extract the watermark information about $90{\sim}98%$ from the attacked model. This means it can be applicable to the game, virtual reality and rapid prototyping fields.