• Title/Summary/Keyword: Link Protection

Search Result 149, Processing Time 0.026 seconds

Development of power system stabilization program using optimization method (최적화 기법이 적용된 전력계통 안정화 시스템 개발)

  • Ahn, Chang-Han;Baek, Young-Sik
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.64 no.3
    • /
    • pp.370-374
    • /
    • 2015
  • Various protective equiptments are used for the power system control and protection. Numerous facilities are monitored at the same time in real time and introduction of optimization method and analysis of the method are required for generation control and facility management considering the demand fluctuations. However, the existing system analysis programs are difficult to link with the other sw and there are some problems with user convenience. To solve these problems the present conditions of the system are figured out in real time and the equipment insert method was estimated by optimization method, and the system that showed the system analysis program is developed. PSS/E has been used as system anlysis program for stabilizing system development which applied the optimization. method and Python language is applied in order to link the input and output values with the DB automatically. Lastly, DLL of matlab has been made included in C++ for solving the objective function using opmization method.By linking this to DB, power flow was calculated in PSS/E and the result was represented by Intouch screen.

Current Limiting and Interrupting Operation of Hybrid Self-Excited Type Superconducting DCCB

  • Choi, S.J.;Lim, S.H.
    • Progress in Superconductivity and Cryogenics
    • /
    • v.20 no.4
    • /
    • pp.55-59
    • /
    • 2018
  • Currently, the development of industry makes needs larger electric supply. Providers must consider the efficiency about losses and reliability of the system. In this case, DC power system can save electrical energy; long-distance transmission line losses. Relevance to switch technology with a voltage-source converter (VSC) in AC-DC conversion system have been researched. But, protection device of DC-link against fault current is still needed to study much. VSC DC power system is vulnerable to DC-cable short-circuit and ground faults, because DC-link has a huge size of capacitor filter which releases extremely large current during DC faults. Furthermore, DC has a fatal flaw that current zero crossing is nonexistence. To interrupt the DC, several methods which make a zero crossing is used; parallel connecting self-excited series LC circuit with main switch, LC circuit with power electronic device called hybrid DC circuit breaker. Meanwhile, self-excited oscillator needs a huge size capacitor that produces big oscillation current which makes zero crossing. This capacitor has a quite effective on the price of DCCB. In this paper, hybrid self-excited type superconducting DCCB which are using AC circuit breaker system is studied by simulation tool PSCAD/EMTDC.

A Study of Routing and Signaling Extensions of GMPLS for QoS Provision in NGN (NGN에서 QoS 제공을 위한 GMPLS의 라우팅 및 시그널링 화장 연구)

  • 장석기;박광채
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.5
    • /
    • pp.925-933
    • /
    • 2003
  • Network is expected to be developed into optical Internet network collected IP layer and optical layer, but GMPLS is risen at the transitional evolution stage because of the present technology level. GMPLS that MPLS is extended and generalized is able to support not only the packet switching device but also the devices which perform switching in time, wavelength, and space domain. To implement the common control plane to these various switching types, GMPLS extends the existing MPLS signaling and routing protocol. In this paper, we describe the overview of GMPLS technology, and then we will refer to the OSPF(Open Shortest Path First), which was used to exchange the status information of link, as the plan of routing extension to exchange the information of various link type, bandwidth, link protection type etc. And also, we describe the definition of new protocol, so called, LMP that is a signaling protocol for solving complex problem which manages hundreds and thousands of links between two nodes. And we will examine and analyze the plan of signaling protocol extension to apply signaling protocol RSVP-TE(Resource Reservation Protocol) for traffic engineering in MPLS to network, and the message objects and formats associated with modified RSVP.

A Study on the Efficient Countermeasure of the Serious Accidents Punishment Act in the Small Businesses: On the Basis of the Serious Industrial Accidents (소규모 사업장의 중대재해처벌법 효율적 대응방안 연구 - 중대산업재해 중심)

  • Lee, Byoung-Lim;Choi, Yu-Jung;Yoo, Sam-Yeol;Choi, Jae-Wook
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.3
    • /
    • pp.507-519
    • /
    • 2022
  • Purpose: This study propose efficient and practical measures to comply with the duty to secure safety and health of the Serious Accidents Punishment Act at small businesses. Method: Based on literature review and previous studies, a plan to comply with the Serious Accidents Punishment Act was reviewed by the link with the safety and health management system and using the process approach method, etc. Result: It was confirmed that if the safety and health management system is faithfully implemented, it is possible to comply with the duty to secure safety and health under the Serious Accidents Punishment Act. In addition, a methodology for fulfilling and inspecting the duty to secure safety and health was presented. Conclusion: If the safety and health management system is operated actively by utilizing the process approach and implementation inspection checklist, it is judged that it will be possible to comply with the Serious Accidents Punishment Act as well as to continuously improve the safety and health management system.

Privacy Protection and RFID(Radio Frequency IDentification) (RFID와 프라이버시 보호)

  • Lee, Cheol-Ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.443-446
    • /
    • 2006
  • RFID is the core of realizing ubiquitous environment. This is expected to improve economical effect through related industry revitalization, make-work, and so on, in the future, and to be linked to social see-through enhancement via national life change. However unchecked RFID use lets retailers collect unprecedented huge information and they link it to customer information database, so the voice of worry to bring about a result of trampling down consumer privacy doesn't make a negligible situation. Although RFID system is spreaded out socially, the servicing of law and system is not accomplished to protect individuals from personal information violation threat. At the same time, in ubiquitous computing environment, to protect individual information efficiently, from the step of planning and deciding this technology system, constitutional law, norm, the basic legal rights of the people, and so forth is to be considered. The objective of the research is to persent the privacy protection from the viewpoints of law on RFID.

  • PDF

ATM Network Survivability Enhancement Scheme using Disjoint VP Groups (분리 VP 그룹을 이용한 ATM 망 생존도 향상 방안)

  • Lee, Gil-Heung;Choe, Yong-Hun;Park, Won-Seo;Lee, Jae-Yong;Lee, Sang-Bae
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.8
    • /
    • pp.949-956
    • /
    • 1999
  • 이 논문에서는 ATM (Asynchronous Transfer Mode) 방식의 초고속망의 장애 발생 시 이용자 연결의 QoS (Quality of Service)를 고려하여 복구할 수 있게 하는 보호 망 설계 방안을 제시한다. 제시한 설계 방안에 기초한 비용과 복구 특성을 분석과 모의 실험을 통해 알아본다. 제안하는 망에서의 복구는 분리 VP 그룹 (Disjoint Virtual Path Group, DVPG) 을 사용하는 상태 독립적 (State- independent) 방식으로 복구된다. ATM 망의 운용 및 보호 VP 할당과 용량 배정 문제를 정의하고 이를 바탕으로 최소의 비용을 갖는 VP 망을 설계한다. 망의 고장 시 기존 노드간의 VP 연결은 미리 할당된 링크 또는 노드 분리 보호 VP 경로를 따라 간단한 복구 알고리즘에 의해 빠르게 복구된다. QoS의 고려는 추가 비용을 필요로 하지만 정확한 이용자 연결의 복구를 실현하며, 분리 VP 그룹의 적용은 비용을 상승시키지만, 빠른 복구와 복수의 고장에 대처할 수 있는 방안이 된다.Abstract A cost evaluation of protection scheme for VP-based ATM network is presented here and its related characteristics are evaluated. The proposed and evaluated scheme is a state-independent restoration scheme using a disjoint path group. For fast and simple restoration of failed connections, link disjoint or node disjoint VP groups (DVPG) were utilized in this paper. A VP assignment and capacity planning problem is formulated. When failure occurs, the failed working VPs are switched to the protection VPs of disjoint path groups with a simple restoration scheme. And, cost evaluation and restoration characteristics are presented. The consideration of multiple QoS (Quality of Service) levels and disjoint path group protection scheme require additional network cost but acquire fit and fast restoration.

Explosive loading of multi storey RC buildings: Dynamic response and progressive collapse

  • Weerheijm, J.;Mediavilla, J.;van Doormaal, J.C.A.M.
    • Structural Engineering and Mechanics
    • /
    • v.32 no.2
    • /
    • pp.193-212
    • /
    • 2009
  • The resilience of a city confronted with a terrorist bomb attack is the background of the paper. The resilience strongly depends on vital infrastructure and the physical protection of people. The protection buildings provide in case of an external explosion is one of the important elements in safety assessment. Besides the aspect of protection, buildings facilitate and enable many functions, e.g., offices, data storage, -handling and -transfer, energy supply, banks, shopping malls etc. When a building is damaged, the loss of functions is directly related to the location, amount of damage and the damage level. At TNO Defence, Security and Safety methods are developed to quantify the resilience of city infrastructure systems (Weerheijm et al. 2007b). In this framework, the dynamic response, damage levels and residual bearing capacity of multi-storey RC buildings is studied. The current paper addresses the aspects of dynamic response and progressive collapse, as well as the proposed method to relate the structural damage to a volume-damage parameter, which can be linked to the loss of functionality. After a general introduction to the research programme and progressive collapse, the study of the dynamic response and damage due to blast loading for a single RC element is described. Shock tube experiments on plates are used as a reference to study the possibilities of engineering methods and an explicit finite element code to quantify the response and residual bearing capacity. Next the dynamic response and progressive collapse of a multi storey RC building is studied numerically, using a number of models. Conclusions are drawn on the ability to predict initial blast damage and progressive collapse. Finally the link between the structural damage of a building and its loss of functionality is described, which is essential input for the envisaged method to quantify the resilience of city infrastructure.

Factors to Affect Acceptance of Open Banking from Information Security Perspectives (정보보호 관점에서의 오픈뱅킹 수용도에 대한 영향요인)

  • Go, Jeunghyeun;Lee, Woonboo
    • Journal of Information Technology Services
    • /
    • v.20 no.6
    • /
    • pp.63-81
    • /
    • 2021
  • Joint financial network of Korea Financial Telecommunications and Clearings Institute, which is an essential facility with a natural monopoly, maintained its closedness as monopoly/public utility model, but it has evolved in the form of open banking in order to obtain domestic fintech competitiveness in the rapidly changing digital financial ecosystem such as the acceleration of Big Blur. In accordance with digital transformation strategy of financial institutions, various ICT companies are actively participating in the financial industries, which has been exclusive to banks, through the link technology called Open API. For this reason, there has been a significant change in the financial service supply chain in which ICT companies participate as users. The level of security in the financial service supply chain is determined based on the weakest part of the individual components according to the law of minimum. In addition, there is a perceived risk of personal information and financial information leakage among the main factors that affect users' intention to accept services, and appropriate protective measures against perceived security risks can be a catalyst, which increases the acceptance of open banking. Therefore, this is a study on factors affecting the introduction of open banking to achieve financial innovation by developing an open banking security control model for financial institutions, as a protective measures to user organizations, from the perspectives of cyber financial security and customer information protection, respectively, and surveying financial security experts. It is expected, from this study, that effective information protection measures will be derived to protect the rights and interests of financial customers and will help promote open banking.

A Study of Link Protection in Metro Ethernet Networks (메트로 이더넷 망에서 링크 보호 기술 연구)

  • Ahn Kye-Hyun;Chung Young-Sik;LEE Yoo-Kyoung
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.631-633
    • /
    • 2005
  • 본 논문에서는 MEF(Metro Ethernet Forum) 기술 문서를 기반으로 메트로 이더넷 망을 위한 보호 기술을 소개하고 메트로 이더넷 망을 위한 링크 보호 알고리즘을 설계한다. 제안한 링크 보호 알고리즘은 각 서비스가 요구하는 링크 복구 시간(restoration time)을 고려하여 백업 경로를 미리 설정하는 방법과 장애가 발생한 이후에 우회 경로를 설정하는 방법을 사용한다. 백업 경로를 미리 설정함에 따라 자원의 이용률이 감소하므로 이를 해결하기 위하여 백업 경로 간 자원의 공유 방법을 도입하였으며, 서비스 특성에 따라 복구 경로에서 제한된 QoS를 제공하도록 하여 망의 가용성을 증가시일 수 있다.

  • PDF

A Study on Assumptions for Operational Environment of OS Security Enhancement System

  • Kim, Tai-Hoon;Kim, Min-Chul;Baik, Nam-Kyun;Kim, Jae-Sung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2093-2096
    • /
    • 2003
  • Trusted operating systems (OS) provide the basic security mechanisms and services that allow a computer system to protect, distinguish, and separate classified data. Trusted operating systems have been developed since the early 1980s and began to receive National Security Agency (NSA) evaluation in 1984. The researches about trusted OS are proceeding over the world, and new product type using the loadable security kernel module (LSKM) or dynamic link library (DLL) is being developed. This paper proposes a special type of product using LSKM and specific conditions for operational environment should be assumed.

  • PDF