• Title/Summary/Keyword: Security Techniques

Search Result 1,571, Processing Time 0.028 seconds

Comparison of Optimization Algorithms for Available Transfer Capability Assessment in Interconnected Systems (연계계통에서 가용송전용량 평가를 위한 최적화 알고리즘의 비교)

  • Kim, Kyu-Ho;Song, Kyung-Bin
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.55 no.12
    • /
    • pp.549-554
    • /
    • 2006
  • Available transfer capability(ATC) is an important indicator of the usable amount of transmission capacity accessible by several parties for commercial trading in power transaction activities. This paper deals with an application of optimization technique for available transfer capability(ATC) calculation and analyzes the results of ATC by considering several constraints. Especially several optimization techniques are used to solve the ATC problem with state-steady security constraints. The results are compared with that of repeat power flow(RPF), sequential quadratic programming(SQP) and linear programming(LP). The proposed method is applied to 10 machines 39 buses model systems to show its effectiveness.

Study of Eye Blinking to Improve Face Recognition for Screen Unlock on Mobile Devices

  • Chu, Chung-Hua;Feng, Yu-Kai
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.2
    • /
    • pp.953-960
    • /
    • 2018
  • In recently, eye blink recognition, and face recognition are very popular and promising techniques. In some cases, people can use the photos and face masks to hack mobile security systems, so we propose an eye blinking detection, which finds eyes through the proportion of human face. The proposed method detects the movements of eyeball and the number of eye blinking to improve face recognition for screen unlock on the mobile devices. Experimental results show that our method is efficient and robust for the screen unlock on the mobile devices.

Design and Analysis of the GOST Encryption Algorithm (GOST 암호화 알고리즘의 구현 및 분석)

  • 류승석;정연모
    • Journal of the Korea Society for Simulation
    • /
    • v.9 no.2
    • /
    • pp.15-25
    • /
    • 2000
  • Since data security problems are very important in the information age, cryptographic algorithms for encryption and decryption have been studied for a long time. The GOST(Gosudarstvennyi Standard or Government Standard) algorithm as a data encryption algorithm with a 256-bit key is a 64-bit block algorithm developed in the former Soviet Union. In this paper, we describe how to design an encryption chip based on the GOST algorithm. In addition, the GOST algorithm is compared with the DES(Data Encryption Standard) algorithm, which has been used as a conventional data encryption algorithm, in modeling techniques and their performance. The GOST algorithm whose key size is relatively longer than that of the DES algorithm has been expanded to get better performance, modeled in VHDL, and simulated for implementation with an CPLD chip.

  • PDF

Hybrid Fuzzy Adaptive Wiener Filtering with Optimization for Intrusion Detection

  • Sujendran, Revathi;Arunachalam, Malathi
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.502-511
    • /
    • 2015
  • Intrusion detection plays a key role in detecting attacks over networks, and due to the increasing usage of Internet services, several security threats arise. Though an intrusion detection system (IDS) detects attacks efficiently, it also generates a large number of false alerts, which makes it difficult for a system administrator to identify attacks. This paper proposes automatic fuzzy rule generation combined with a Wiener filter to identify attacks. Further, to optimize the results, simplified swarm optimization is used. After training a large dataset, various fuzzy rules are generated automatically for testing, and a Wiener filter is used to filter out attacks that act as noisy data, which improves the accuracy of the detection. By combining automatic fuzzy rule generation with a Wiener filter, an IDS can handle intrusion detection more efficiently. Experimental results, which are based on collected live network data, are discussed and show that the proposed method provides a competitively high detection rate and a reduced false alarm rate in comparison with other existing machine learning techniques.

A Design of WBAN Data Integration System for the HL7-based patient management

  • Hwang, Chigon;Shin, Hyoyoung;Lee, Jongyong;Jung, Kyedong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.1
    • /
    • pp.66-69
    • /
    • 2015
  • Recently with the development of IT technology, the medical technology have been developed in various ways. Among them, WBAN can check the state of the patient in real time. However, the data generated by these techniques have a problem that they have heterogeneous properties depending on the type of sensors and devices. In this paper, we proposed a method using meta repository as a way to provide the sensing data of WBAN for the health care system by integrating along the HL7 standard item.

A Fundamental Research for Technology area of SCM in Korean Nuclear Power Plant Construction (원전건설 공급망관리 기술영역 도출을 위한 기초연구)

  • Park, Hang-Soon;Kim, Woo-Jung;Chong, Young-Whan;Won, Seo-Kyung
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2013.05a
    • /
    • pp.268-270
    • /
    • 2013
  • The construction project can be defined as a network combined between elements which are engineering, procurement, construction, start-up, and has a plenty of subjects and partners. For the successful project management in construction industry, it is necessary to adopt various management methods, such as lean production, information network system, SCM(Supply Chain Management), which can increase the efficiency of project management. During recent years, even though various management techniques have been applied, the SCM system has not formulated in construction industry. Especially, the Nuclear Power Plant Construction which requires high regulations of the safety and security has not applied SCM. Therefore, this study aimed to propose technology area of SCM in Korean Nuclear Power Plant Construction.

  • PDF

Secure and Robust Metering in the Web Advertising

  • Kim, Soon-Seok
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.1
    • /
    • pp.68-72
    • /
    • 2007
  • In this paper, we present robust and secure metering scheme to measure the number of interactions between clients and servers in the web, especially the web advertising. In most cases the web advertising is consists of advertisers, clients, servers, and an audit agency. The metering scheme should always be secure against fraud attempts by servers which maliciously try to inate the number of their visits and against clients that attempt to disrupt the metering process. We propose robust and secure metering scheme based on cryptographic techniques. By analyzing the proposed scheme we show that our scheme is more robust and secure than the previous schemes [1,2,4,5].

Power Transformer Diagnosis Using a Modified Self Organizing Map

  • Lee J. P.;Ji P. S.;Lim J. Y.;Kim S. S.
    • KIEE International Transactions on Power Engineering
    • /
    • v.5A no.1
    • /
    • pp.40-45
    • /
    • 2005
  • Substation facilities have become extremely large and complex parts of electric power systems. The development of condition monitoring and diagnosis techniques has been a very significant factor in the improvement of substation transformer security. This paper presents a method to analyze the cause, the degree, and the aging process power transformers by the Self Organizing Map (SOM) method. Dissolved gas data were non-linearly transformed by the sigmoid function in SOM that works much the same way as the human decision making process. The potential for failure and the degree of aging of normal transformers are identified by using the proposed quantitative criterion. Furthermore, transformer aging is monitored by the proposed criterion for a set of transformers. To demonstrate the validity of the proposed method, a case study is performed and its results are presented.

The Development of Web Browsed Electronic Document Interchanges System (초고속정보통신망상에서 웹 기반의 전자문서교환(EDI) 시스템 구현)

  • Kim, Nak-Hyun;Roh, Myung-Ho
    • IE interfaces
    • /
    • v.13 no.2
    • /
    • pp.258-265
    • /
    • 2000
  • EDI(Electronic Data Interchange) allows the exchange of business information and computer-processable data in a standard, structured format electronically between organizational entities. EDI handles the restructuring of a business document into the standard format so that it can be transmitted from one computer to another. This paper identifies features and technologies of web browsed electronic document exchange system as follows 1) the fundamental technologies that consists of the EDI technologies, the Internet/Web technologies, the security/authentication techniques, and the XML implementation technologies. 2) the functions that consists of the document standards, transfer technology of the document, encryption and authentication 3) the implemented Web-EDI systems that consists of document generation module, encryption and authentication module, transfer module, acknowledgement module, administration module. In this paper, the Web-based EDI system implemented from the researched technologies will be installed on the EDI servers owned by corporate customers and enable the exchange of documents between each installed companies.

  • PDF

The Design and Implementation of Simulated Threat Generator based on MITRE ATT&CK for Cyber Warfare Training (사이버전 훈련을 위한 ATT&CK 기반 모의 위협 발생기 설계 및 구현)

  • Hong, Suyoun;Kim, Kwangsoo;Kim, Taekyu
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.6
    • /
    • pp.797-805
    • /
    • 2019
  • Threats targeting cyberspace are becoming more intelligent and increasing day by day. To cope with such cyber threats, it is essential to improve the coping ability of system security officers. In this paper, we propose a simulated threat generator that automatically generates cyber threats for cyber defense training. The proposed Simulated Threat Generator is designed with MITRE ATT & CK(Adversarial Tactics, Techniques and Common Knowledge) framework to easily add an evolving cyber threat and select the next threat based on the threat execution result.