• Title/Summary/Keyword: Protection function

Search Result 1,150, Processing Time 0.026 seconds

TECHNICAL REVIEW ON THE LOCALIZED DIGITAL INSTRUMENTATION AND CONTROL SYSTEMS

  • Kwon, Kee-Choon;Lee, Myeong-Soo
    • Nuclear Engineering and Technology
    • /
    • v.41 no.4
    • /
    • pp.447-454
    • /
    • 2009
  • This paper is a technical review of the research and development results of the Korea Nuclear Instrumentation and Control System (KNICS) project and Nu-Tech 2012 program. In these projects man-machine interface system architecture, two digital platforms, and several control and protection systems were developed. One platform is a Programmable Logic Controller (PLC) for a digital safety system and another platform is a Distributed Control System (DCS) for a non-safety control system. With the safety-grade platform PLC, a reactor protection system, an engineered safety feature-component control system, and reactor core protection system were developed. A power control system was developed based on the DCS. A logic alarm cause tracking system was developed as a man-machine interface for APR1400. Also, Integrated Performance Validation Facility (IPVF) was developed for the evaluation of the function and performance of developed I&C systems. The safety-grade platform PLC and the digital safety system obtained approval for the topical report from the Korean regulatory body in February of 2009. A utility and vendor company will determine the suitability of the KNICS and Nu- Tech 2012 products to apply them to the planned nuclear power plants.

Interference Analysis Between Fixed Wireless System and Radar Operating in VHF/UHF Bands with Geographic Information (지리정보에 기반한 VHF/UHF 대역의 고정무선시스템과 레이더 간의 간섭분석)

  • Suh, Kyoung-Whoan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.1
    • /
    • pp.40-47
    • /
    • 2013
  • By virtue of Rec. ITU-R P.1546 and geography information system, interference analysis for the fixed wireless system and radar has been presented based upon the frequency-distance rules with minimum coupling loss, and a comprehensive methodology for assessing interoperability between systems was examined in terms of received signal, protection ratio, frequency dependent rejection. Also to find the antenna gain from a discrimination angle, a useful S-I plane was introduced based on signal and interference vectors derived from the real map with geographic information. To show some computational results, geography information on the map was taken for the given area, and field strength and path profile were illustrated for the radar and fixed wireless system operating at 2.7 GHz, for convenience. In addition the interference effect of receiver was also checked as a function of radar beam direction including protection ratio and frequency dependent rejection. The developed interference analysis can be actually applied to evaluate interoperability for wireless systems in the VHF and UHF bands.

The Influence of Information Asymmetry of Telecommunication Service Websites on Intention for Continuous Usage (통신서비스 웹사이트 정보불균형이 지속이용의도에 미치는 영향)

  • Han, Moon Seung;Lee, John Hearn
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.131-146
    • /
    • 2015
  • The communications market can be characterized for its overflow of users, oligopoly business structure, 24/7 open service, incomplete sales, and operation of core platform function. These characteristics have lead users to continuously make complaints and suffer inconveniences, and thus the concept of user protection has come to receive attention. This study aims to propose solutions through communication channeling between businesses and users, based on website construction from the viewpoint of user protection. In particular, a research model was developed to display how the information symmetry of websites can be influential on the satisfaction, reliability, and continuous intention for using communication services. Total of 14 hypotheses were set to measure a significant degree of variables corelation and eight hypotheses were accepted finally. The analysis results showed that information symmetry of telecommunication service websites had a positive effect on intention for continuous usage. Through the research results, it is expected that communication service businesses will be able to consider important factors when constructing websites. Furthermore, the results are expected to be utilized as for ensuring users' continued usage of their communication services.

THE DEVELOPMENT OF WEB SERVER FOR KOREAN ELECTRICAL DISTRIBUTION-SYSTEM PROTECTION (한국전력 송전 계통보호를 위한 웹 서버 개발)

  • Zhang, Li;Choi, M.S.;Lee, S.J.;Min, B.U.;Kim, S.H.;Oh, S.M.
    • Proceedings of the KIEE Conference
    • /
    • 2003.11a
    • /
    • pp.178-180
    • /
    • 2003
  • Since faults often occur on power system, relay protection has become an important part to protect the equipments of power system efficiently and safely. Database can store the data about the relay protection efficiently, and these data must be shown to users through the web. Proset2000(an overall program system to protect power system) can realize this function in some measure, but it needs to be developed. This paper is about the further development of Proset2000. In this paper, web of Proset2000 is made by ASP programming technology, and users can browse and search the useful data through the web. There are some new functions, such as the summary of setting values, the message board and the management of administrator.

  • PDF

Formation of Cerium Conversion Coatings on AZ31 Magnesium Alloy

  • Fazal, Basit Raza;Moon, Sungmo
    • Journal of the Korean institute of surface engineering
    • /
    • v.49 no.1
    • /
    • pp.1-13
    • /
    • 2016
  • This review deals with one of the surface modification techniques, chemical conversion coating and particularly cerium-based conversion coatings (CeCC) as a promising substitute for chromium and phosphate conversion coating on magnesium and its alloys. The CeCCs are commonly considered environmentally friendly. The effects of surface preparation, coating thickness, bath composition, and e-paint on the corrosion behavior of CeCCs have been studied on the AZ31 magnesium alloy. This review also correlates the coating microstructural, morphological, and chemical characteristics with the processing parameters and corrosion protection. Results showed that the as-deposited coating system consists of a three layer structure (1) a nanocrystalline MgO transition layer in contact with the Mg substrate, (2) a nanocrystalline CeCC layer, and (3) an outer amorphous CeCC layer. The nanocrystalline CeCC layer thickness is a function of immersion time and cerium salt used. The overall corrosion protection was crucially dependent on the presence of coating defects. The corrosion resistance of AZ31 magnesium alloy was better for thinner CeCCs, which can be explained by the presence of fewer and smaller cracks. On the other hand, maximum corrosion protection was achieved when AZ31 magnesium samples with thin CeCCs are e-painted. The e-paint layer further restricts and hinders the movement of chloride and other aggressive ions present in the environment from reaching the magnesium surface.

The Effect of Saingheylyunbooemgami Extract to Revover Function of Stratum Corneum on Mice Model after Atopic Dermatitis Elicitation. (生血潤膚飮加味方이 아토피 피부염을 유발한 동물모델의 각질층 기능회복에 미치는 영향)

  • Lee, Hyun-woo;Ku, Young-hui;Choi, In-hwa
    • The Journal of Korean Medicine Ophthalmology and Otolaryngology and Dermatology
    • /
    • v.16 no.1
    • /
    • pp.112-129
    • /
    • 2003
  • Introduction and Objectives : Applying the saingheylyunbooemgami(SY) extract on to the atopic dermatitis(AD) is to study change of external dermal formation, change of leukocytes in vasculature, change of lipid formation in stratum corneum and distribution of ceramide and this study is done through forcing injury to rat's back skin which are lipid protect formation in stratum corneum. Materials and Methods : The AD which caused intentionally using the external application on the rat's back skin was used the SY. The change of leukocytes in vasculature has been identified through optima 5.2 and student t-test and the results were made into dermal foramtion graph. Results : After dispensing SY extract into the AD, the dermal injury was decreased, Especially, recover of lipid protection formation which include lipid and ceramide in stratum corneum is suppressing acute inflammation that some factors are PKC, TNF-${\alpha}$, lL-12B which controled the secretion of relating inflammatory cytokine, also went onto decrease of angiogenesis, and the decrese of degranulated mast cell. In addition, the decrease of epithelial injury also caused the growth of cell to decrease in stratum basale and cytoclasis. In the vasculature. the leukocytes were also decreased and it could relate to decrease AD. Conclusions : Thus. SY has effect on AD suppressing the dermal injury through recovering of lipid protection formation in stratum corneum.

  • PDF

Protection of Information Sovereignty as an Important Component of the Political Function of the State

  • Zadorozhnia, Halyna;Mykhtunenko, Viktoriia;Kovalenko, Hanna;Kuryliuk, Yurii;Yurchenko, Liubov;Maslennykova, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.151-154
    • /
    • 2021
  • State information policy is an important component of foreign and domestic policy of the country and covers all spheres of society. The rapid development of the information sphere is accompanied by the emergence of fundamentally new threats to the interests of the individual, society, state and its national security. The article considers the components of the state information policy to ensure information security of the country and identifies the main activities of public authorities in this area. Internal and external information threats to the national security of Ukraine and ways to guarantee the information security of the country are analyzed. Information security is seen as a component of national security, as well as a global problem of information protection, information space, information sovereignty of the country and information support of government decisions. Approaches to ensure the process of continuity of the information security system of the state in order to monitor new threats, identify risks and levels of their intensity are proposed.

A Rule Protecting Scheme with Symmetric Cryptosystem for Intrusion Detection System (암호화 기법을 적용한 침입 탐지 시스템의 룰 보호 기법)

  • Son Hyung-Seo;Kim Hyun-Sung;Bu Ki-Dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.3-13
    • /
    • 2004
  • Kvarnstrom et al. ${in}^{[10]}$ proposed a rule protection scheme by using one-way hash function to protect rules in security systems over ubiquitous environment. Son et at. ${in}^{[5-6]}$ also prooposed a rule protection scheme for Snort, which is one of the most common IDS. These schemes provide security only for the header information but not for its contents. To solve this problem, this paper presents a scheme based on the symmetric cryptosystem over Snort not only for the header information but also contents. This paper uses the key management based on PCMCIA security module proposed ${by}^{[12]}$ for the symmetric cryptosystem. Our scheme could be adjusted to other security systems, which use the rule based detection.

A Study on the Criminal Threat and Privacy Protection with a Proxy Service (프록시 서비스를 통한 범죄 위협과 프라이버시 보호에 관한 연구)

  • Kang, Shin-Beom;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.317-326
    • /
    • 2012
  • Internet service provider is able to collect personal information to prevent the violations of the rights of service providers and customers using internet. But there are still many debates going on between a personal privacy and a regulation. Proxy servers are used in various technical purposes include bypass access. Although the proxy server users are increasing but there are not any proper institutional mechanisms and regulations to protect users. In this study, we discuss the two sides of a proxy service includes its privacy protection function and the cyber-crime threat and propose supplementary measures to mediate between the interests of public and private.

A Study on the Light Weight Hand Lamp for Explosion-Proof Type (휴대형 방폭등의 경량화 연구)

  • Choi, Sang-Won
    • Journal of the Korean Society of Safety
    • /
    • v.28 no.2
    • /
    • pp.31-36
    • /
    • 2013
  • For lighting of dark and hazardous workplace such as compartment of ships under construction, workers should use hand lamps of explosion-proof type. However, the heavy weight of such lamps has prevented most impatient workers from using such types of lamps extensively. In this paper, we developed a light weight hand lamp of intrinsic safety type which reduced the weight a lot while maintaining or improving the lighting and explosion-proof function. We made a prototype which consisted of lamp fixture and high frequency power supply. Testing results show that the hand lamp meets well all the explosion-proof testing requirements of the Korea Occupational Safety and Health Agency. And more, we surveyed the explosion protection technology of a light weight hand lamp, and suggested the advantage/disadvantage to apply lighting of hand lamp about economical aspect.