• Title/Summary/Keyword: Integrated Protection

Search Result 502, Processing Time 0.025 seconds

Required Capacity Assessment of Energy Storage System for Relieving Operation Condition of SPS Using Generator Acceleration Energy (발전기 가속에너지를 이용한 고장파급방지장치 운전조건 완화용 전기저장장치 적정용량 산정방안)

  • Song, Seung-Heon;Choi, Woo-Yeong;Gwon, Han-Na;Kook, Kyung Soo
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.68 no.1
    • /
    • pp.1-7
    • /
    • 2019
  • Due to the highly concentrated power plants integrated through the limited transmission lines in Korea, a Special Protection System(SPS) has been applied to stabilize the power systems by instantly tripping the pre-determined generators in a large-scaled power plant when a fault occurs on the drawing transmission lines. Moreover, power outputs of those generators are constrained to avoid any activation of Under Frequency Load Shedding(UFLS) even after those generators are tripped by SPS action. For this, this paper proposes a method for calculating the required capacity of Energy Storage System(ESS) expected to relieve the operating constraints to generators using its fast response for controlling power system frequency. The proposed method uses the generator acceleration energy to derive the stable condition during the SPS action. In addition, its effectiveness is verified by the case studies adopting actual SPS operations in Korean power systems.

A Study on the Realities and Preventive Countermeasures of Child Abuse Committed by Biological Parents by information analysis.

  • Ryu, Chae-Hyoung;Yoon, Hyun-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.5
    • /
    • pp.171-177
    • /
    • 2019
  • In this paper, we analyze the current phenomenon of child abuse crimes based on the information gathered by the National Child Protection Agency. The purpose of this paper is to diagnose the seriousness of child abuse by biological parents based on the analyzed information and propose measures against it. Comprehensive and integrated measures are needed for child abuse committed by biological parents due to abuse concealment, continuity of damage, and inactive national intervention by considering punishment on attackers through national intervention, fundamental in-depth psychological counseling, therapeutic care, promoting recovery of victims, and ultimately continuous and regular management and monitoring as a long-terms measure. To do so, developing customized and individual educational programs and make them obligations can be first presented to identify child abuse in advance and build up preventive systems based on the principle of family preservation. In addition, problems should be addressed at a fundamental level by performing various and active therapeutic treatments such as psychological treatment, mental treatment, or drug treatment gradually and through phases for biological parents who commit child abuse and contributing to recovering the relationship. Furthermore, proper protection and treatment service should be provided to children victimized by abuse by extending professional children care facilities and adopting the professional family commission system as measures by separating family.

The Secure Chip for Software Illegal Copy Protection (소프트웨어 불법복제방지를 위한 보안칩)

  • 오명신;한승조
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.4
    • /
    • pp.87-98
    • /
    • 2002
  • Software has been developed very fast as information has become important value. Illegal software copy has been the main problem of developing software business. Recently used protecting lock system for software copy has not guaranteed perfectly from easily cracked-defense system. This paper, therefore, proposes 96-bit block cipher with 112-bit length to replace a DES(Data Encryption Standard) algorithm. Security chip by ASIC(Application Specific Integrated Circuit) security module is presented for software copy protection. Then, an auto block protecting algorithm is designed for the security chip. Finally, controlling driver and library are built for the security chip.

Optimal Bayesian MCMC based fire brigade non-suppression probability model considering uncertainty of parameters

  • Kim, Sunghyun;Lee, Sungsu
    • Nuclear Engineering and Technology
    • /
    • v.54 no.8
    • /
    • pp.2941-2959
    • /
    • 2022
  • The fire brigade non-suppression probability model is a major factor that should be considered in evaluating fire-induced risk through fire probabilistic risk assessment (PRA), and also uncertainty is a critical consideration in support of risk-informed performance-based (RIPB) fire protection decision-making. This study developed an optimal integrated probabilistic fire brigade non-suppression model considering uncertainty of parameters based on the Bayesian Markov Chain Monte Carlo (MCMC) approach on electrical fire which is one of the most risk significant contributors. The result shows that the log-normal probability model with a location parameter (µ) of 2.063 and a scale parameter (σ) of 1.879 is best fitting to the actual fire experience data. It gives optimal model adequacy performance with Bayesian information criterion (BIC) of -1601.766, residual sum of squares (RSS) of 2.51E-04, and mean squared error (MSE) of 2.08E-06. This optimal log-normal model shows the better performance of the model adequacy than the exponential probability model suggested in the current fire PRA methodology, with a decrease of 17.3% in BIC, 85.3% in RSS, and 85.3% in MSE. The outcomes of this study are expected to contribute to the improvement and securement of fire PRA realism in the support of decision-making for RIPB fire protection programs.

Improving the Linkage System between the Police and Social Welfare Agencies for Effective Response to Domestic Violence and Child Abuse in South Korea

  • Nam Young-Hee
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.2
    • /
    • pp.299-308
    • /
    • 2024
  • This study aims to explore improvement measures for the linkage system between the police and social welfare agencies in responding to domestic violence and child abuse issues in South Korea by comparing and analyzing the current systems in South Korea, the United States, and the United Kingdom. Despite the legal and institutional foundations for victim protection and perpetrator correction in each country, the effectiveness of actual cooperation faces several limitations. In South Korea, the level of cooperation is insufficient due to the lack of information sharing, role conflicts, and ambiguity of cooperation procedures. The United States and the United Kingdom operate more systematic cooperation programs, showing notable achievements in mental health crisis intervention and domestic violence response. To improve the linkage system in South Korea, this study proposes the following measures: (1) developing a clear cooperation protocol, (2) conducting regular education and training programs, (3) establishing an integrated information system, and (4) strengthening the victim-centered approach. Implementing these measures will contribute to more effective responses to domestic violence and child abuse issues, ultimately leading to a healthier and safer society by reducing social costs through victim protection and perpetrator correction.

Case Study on the Mitigation of Dangerous Slope Considering the Value of Geoheritage (지질유산 가치를 고려한 위험비탈면 보존 방안 사례 연구)

  • Jeong, Jun-Ho;Kim, Seung-Hyun;Park, Byung-suk;Woo, Yong-Hoon;Kang, Yun-seok;Koo, Ho-bon;Son, Moon
    • The Journal of Engineering Geology
    • /
    • v.30 no.1
    • /
    • pp.71-84
    • /
    • 2020
  • Various geological structures are found on the slope of Bangnim district in Pyeongchang, Gangwon-do, based on the Paleozoic Joseon Supergroup Limestone. The recumbent fold observed on the slope is a very rare geological structure that has not been found in Korea, and has important academic value in exploring the formation process of the Paleozoic geological structures in the Gangwon region. In this study, discussed the geological value of the geological structure observed on the slope of the road, and studied the management method of rockfall problem slopes. The state of development of recumbent folds has conservation value in geological scarcity and specificity. Preservation management measures should be prepared through the protection of slopes and measures to reduce of rockfall risks as geoheritage with an important value in geology science and education. Furthermore, it is expected to be preserved and utilized as a geopark.

A Study on the 3D-Puzzle Security Policy in Integrated Security System Network (통합보안 시스템 망 내 3차원-Puzzle 보안정책에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.4
    • /
    • pp.425-434
    • /
    • 2010
  • This study shows a limit to attacks that the prevention system, which is used as the mutual third aggressive packet path between open heterogeneous networks and applies prevention techniques according to the trace like IP tracking and attack methods, can prevent. Therefore, the study aims to learn information of constant attack routing protocol and of the path in network, the target of attack and build a database by encapsulating networks information routing protocol operates in order to prevent source attack paths. In addition, the study is conducted to divide network routing protocols developed from the process of dividing the various attack characters and prevent various attacks. This study is meaningful in that it analyzes attack path network and attacks of each routing protocol and secure exact mechanism for prevention by means of 3D-Puzzle, Path, and Cube of the integrated security system which is an implementation method of integrated information protection for access network defense.

Development of Fully Integrated Broadband MMIC Chip Set Employing CSP(Chip Size Package) for K/Ka Band Applications (CSP(Chip Size Package)를 이용한 완전집적화 K/Ka 밴드 광대역 MMIC Chip Set 개발)

  • Yun Young
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.16 no.1 s.92
    • /
    • pp.102-112
    • /
    • 2005
  • In this work, we developed fully integrated broadband MMIC chip set employing CSP(Chip Size Package) for K/Ka band applications. By utilizing an ACF for the RF-CSP, the fabrication process for the packaged amplifier MMIC could be simplified and made cost effective. $STO(SrTi_{3})$ capacitors were employed to integrate the DC biasing components on the MMIC, and LC parallel circuits were employed for DC feed and ESD protection. A pre-matching technique and RC parallel circuit were used to achieve a broadband matching and good stability fer the amplifier MMIC in K/Ka band. The amplifier CSP MMIC exhibited good RF performance over a wide frequency range in K/Ka band. This work is the first report of a fully integrated CSP amplifier MMIC successfully operating in the K/Ka band.

Healthcare Work and Organizational Interventions to Prevent Work-related Stress in Brindisi, Italy

  • d'Ettorre, Gabriele;Greco, Mariarita
    • Safety and Health at Work
    • /
    • v.6 no.1
    • /
    • pp.35-38
    • /
    • 2015
  • Background: Organizational changes that involve healthcare hospital departments and care services of health districts, and ongoing technological innovations and developments in society increasingly expose healthcare workers (HCWs) to work-related stress (WRS). Minimizing occupational exposure to stress requires effective risk stress assessment and management programs. Methods: The authors conducted an integrated analysis of stress sentinel indicators, an integrated analysis of objective stress factors of occupational context and content areas, and an integrated analysis between nurses and physicians of hospital departments and care services of health districts in accordance with a multidimensional validated tool developed in Italy by the National Network for the Prevention of Work-Related Psychosocial Disorders. The purpose of this retrospective observational study was to detect and analyze in different work settings the level of WRS resulting from organizational changes implemented by hospital healthcare departments and care services of health districts in a sample of their employees. Results: The findings of the study showed that hospital HCWs seemed to incur a medium level risk of WRS that was principally the result of work context factors. The implementation of improvement interventions focused on team development, safety training programs, and adopting an ethics code for HCWs, and it effectively and significantly reduced the level of WRS risk in the workplace. Conclusion: In this study HCW resulted to be exposed to occupational stress factors susceptible to reduction. Stress management programs aimed to improve work context factors associated with occupational stress are required to minimize the impact of WRS on workers.

The Validity Analysis of SDN/NFV Military application (SDN/NFV의 군 적용 타당성 분석)

  • Jang, Ji-Hee;Kwon, Tae-Uk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.4
    • /
    • pp.687-694
    • /
    • 2020
  • SDN and NFV are next-generation network technologies, and cloud, such as data centers, campuses, and large companies, has been established, or is actively applied by service-oriented communication companies. In particular, the Defense Integrated Data Center will be a prime example for military applications. In order for the Defense Integrated Data Center (DIDC) to become an intelligent center, it is accelerating the promotion of the "Smart Defense Integrated Data Center", which applied the latest information and communication technology (ICT). At the time of the establishment of DIDC, it plans to start building infrastructure such as cloud services at around 30% level, and expand D-Cloud to 75% through 'Cloud First'. In addition, the introduction of SDN/NFV will reduce the operation cost and manpower of DIDC, strengthen the ability to efficiently use information resources and cyber information protection systems, and increase flexibility and agility in using each system to improve efficiency in defense management in the future. Therefore, we will discuss the justification and expected effects of SDN/NFV introduction, focusing on DIDC.