• Title/Summary/Keyword: level of protection

Search Result 2,241, Processing Time 0.027 seconds

Parametric Evaluation Method of Protectability in a Distribution System (파라메터 관점에서의 배전계통 보호도 평가방법)

  • Cho, P.S.;Hyun, S.H.;Lim, S.I.;Lee, S.J.;Lee, D.S.;Waldemar, Waldemar
    • Proceedings of the KIEE Conference
    • /
    • 2002.11b
    • /
    • pp.241-243
    • /
    • 2002
  • Recently, great efforts are concentrated on the autonomous, adaptive protection schemes with advanced artificial intelligence and digital technology. It is highly required for a next generation protective system not only to detect and to clear a fault, but also to fit itself to the changing environment. In this paper it is suggested an evaluation method for the protection ability of a protective system in a distributed system. The suggested method is of bottom-up scheme, in other words, protection ability is estimated from the lowest level of parameters in each protective devices to the highest level of the whole protective system. This feature makes it possible to evaluate the protection ability either for the protective device(or a system), or for a protected system. And, in addition, it is enabled that the protectability concept can be applied in the design stage of a protective system for a distribution network. The proposed method is applied to a simple distributed network to show its effectiveness.

  • PDF

Intrusion Response and Recovery System Using a File System Image Backup (파일시스템 이미지 백업을 이용한 침입대응 및 파일복구 시스템)

  • Lee Jae-Kwang;Lim Jung-Mok
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.5
    • /
    • pp.182-190
    • /
    • 2005
  • As computers and Internet become popular, many corporations and countries are using information protection system and security network to protect their informations and resources in internet. But the Intrusional possibilities are increases in open network environments such as the Internet. Even though many security systems were developed, the implementation of these systems are mostly application level not kernel level. Also many file protection systems were developed, but they aren't used widely because of their inconvenience in usage. In this paper, we implement a kernel module to support a file protection function using Loadable Kernel Module (LKM) on Linux. When a system is damaged due to intrusion, the file system are easily recovered through periodical file system image backup.

  • PDF

A Study on Exploring Factors Influencing Military Security Level (Based on the Theory of Planned Behavior, Deterrence and Protection Motivation) (군(軍) 보안수준에 미치는 영향요인 탐색에 관한 연구 (계획 행동이론, 억제이론, 보호 동기 이론을 중심으로))

  • Jong-Hyoun Kim;Sang-Jun Ahn
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.3-9
    • /
    • 2022
  • Recently, as the environment of the 4th industrial revolution has arrived, the opening, sharing and convergence of data are actively being achieved in any organization. However, the opening and sharing of data inevitably leads to security vulnerability and there is ambivalence that is a threat that can affect the existence of an organization operated in the 4th industrial revolution environment. Especially security issues in the organization of the military can be a threat to the state, not the military itself, so it is always necessary to maintain a high level of security discipline. In this paper, 14 variables were selected through structural equation model applying theory of planned behavior, deterrence and protection motivation to find out the security level development measures by extracting factors that can affect security level. As a result, the theory of planned behavior that the security knowledge embodied through the usual security regulation education and evaluation affects the behavior was adopted, and the theory of deterrence and protection motivation showed the significance of the rejection level. In addition, it was confirmed that the variables that have the greatest impact on the military security level through the measured values of the three-year security audit were commanders and mental security. In conclusion, in order to improve the security level, it is suggested that security education, definite reward and punishment, and security system upgrading should be firmly established and mental security posture should be secured.

Experimental Study on the Characteristics of Protection Materials for Explosive Demolition of Reinforced Concrete Column (철근콘크리트 기둥 발파해체를 위한 방호재 특성에 대한 실험적 연구)

  • 류창하;박용원;김양균
    • Tunnel and Underground Space
    • /
    • v.6 no.3
    • /
    • pp.260-266
    • /
    • 1996
  • Safety concern is one of the most important parameters in the design of explosive building demolition. Laboratory experiments were performed to investigate the failure behaviour of concrete columns and the effects of protection materials. Fourteen reinforced columns with two sizes were constructed and the effects of protection materials were tested for two kinds of materials: non woven fabrics and wire net. The results showed that control of gas effects is a key to the control of flying chips. It was recommended to use both wire net and non woven fabrics as primary and secondary protection materials. Such protection method was successfully applied to the explosive demolition of 16 and 17-strory apartment buildings.and the results of a simulation on a model tunneling workings using diesel equipments are introduced. In case of typical model of tunneling face, the gas concentration of human height is about one third of roof concentration and right side half of the tunnel shows better environment than left half. NOx concentration of workings can be estimated about 0.45ppm which is much lower than permissible level(5 ppm).

  • PDF

The Intertemporal Enforcement Strategies of Copyright Protection : An Analysis of Information Goods in the Presence of File-Sharing Networks

  • Kim, Jong-Woon
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.3
    • /
    • pp.1-15
    • /
    • 2009
  • The paper analyzes a copyright owning firm's incentive to enforce its copyright in the presence of file-sharing networks. I devise a two-period model where a copyright owner sells two different versions of a creator's information good, and show that the firm's overall profits are enhanced by a strategy of differential inter-temporal enforcement of the copyright protection, compared to strategies of no enforcement or full enforcement in both periods. If the firm enforces no copyright protection in the first period, the low-valuation consumers may make and consume copies that are imperfect substitutes for the original information good. If there is a significant increase in the willingness-to-pay of some low-valuation consumers after they experience the information good, the firm can extract the increased consumer surplus by enforcing a positive level of copyright protection in the second period. Social welfare, however, is maximized in the case of no enforcement.

  • PDF

Fault Current Calculation and Coordination by IEC Standards (IEC 표준에 의한 고장전류 계산과 보호협조)

  • Son, Seok-Geum
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.28 no.12
    • /
    • pp.6-12
    • /
    • 2014
  • The safety and reliability of the power system short-circuit current, the short-circuit current depends on the failure to obtain the objective is to quickly eliminate the breaking capacity of the circuit-breaker selection of the cable, the insulation of electrical equipment and protective relay an important factor in determining the level correction and protective relay selection scheme to be meaningful. Standards used in the domestic circuit breaker is applied to the production of IEC standard, but the American National Standards (ANSI / IEEE) by NEMA specification of the fault current calculations and the application of the asymmetric coefficient Korea. Therefore, in this paper, the IEC 60909 standard IEC breaker fault current calculation method and the method for selection of system configurations reviewed and protection system for reviewing the configuration of various protective relays appropriate correction and the correction value is main protection, back-up protection the equipment so that the period of protection relay coordination to minimize accidents and accident protection to minimize interruptions proposed for cooperation.

Literature Review and Current Trends of Automated Design for Fire Protection Facilities (화재방호 설비 설계 자동화를 위한 선행연구 및 기술 분석)

  • Hong, Sung-Hyup;Choi, Doo Chan;Lee, Kwang Ho
    • Land and Housing Review
    • /
    • v.11 no.4
    • /
    • pp.99-104
    • /
    • 2020
  • This paper presents the recent research developments identified through a review of literature on the application of artificial intelligence in developing automated designs of fire protection facilities. The literature review covered research related to image recognition and applicable neural networks. Firstly, it was found that convolutional neural network (CNN) may be applied to the development of automating the design of fire protection facilities. It requires a high level of object detection accuracy necessitating the classification of each object making up the image. Secondly, to ensure accurate object detection and building information, the data need to be pulled from architectural drawings. Thirdly, by applying image recognition and classification, this can be done by extracting wall and surface information using dimension lines and pixels. All combined, the current review of literature strongly indicates that it is possible to develop automated designs for fire protection utilizing artificial intelligence.

Development of Dynamic Frequency Monitoring Software for Wide-Area Protection Relaying Intelligence (광역 보호계전 지능화를 위한 동적 주파수 모니터링 S/W 개발)

  • Kim, Yoon-Sang;Park, Chul-Won
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.61 no.4
    • /
    • pp.174-179
    • /
    • 2012
  • The social and economic level of damages might be highly increased in the case of wide-area black-outages, because of heavy dependence of electricity. Therefore, the development of a wide-area protection relay intelligence techniques is required to prevent massive power outages and minimize the impact strength at failure. The frequency monitoring and prediction for wide-area protection relaying intelligence has been considered as an important technology. In this paper, a network-based frequency monitoring system developed for wide-area protection relay intelligence is presented. In addition, conventional techniques for frequency estimation are compared, and a method for advanced frequency estimation and measurement to improve the precision is proposed. Finally, an integrated monitoring system called K-FNET(Korea-Frequency Monitoring Network) is implemented based on the GPS and various energy monitoring cases are studied.

An Improved Detection Performance for the Intrusion Detection System based on Windows Kernel (윈도우즈 커널 기반 침입탐지시스템의 탐지 성능 개선)

  • Kim, Eui-Tak;Ryu, Keun Ho
    • Journal of Digital Contents Society
    • /
    • v.19 no.4
    • /
    • pp.711-717
    • /
    • 2018
  • The breakthrough in computer and network has facilitated a variety of information exchange. However, at the same time, malicious users and groups are attacking vulnerable systems. Intrusion Detection System(IDS) detects malicious behaviors through network packet analysis. However, it has a burden of processing a large amount of packets in a short time. Therefore, in order to solve these problem, we propose a network intrusion detection system that operates at kernel level to improve detection performance at user level. In fact, we confirmed that the network intrusion detection system implemented at kernel level improves packet analysis and detection performance.

Protection Coordination Associated with Connection Location of Residual Current Devices and Surge Protective Devices (RCD와 SPD의 접속 위치에 따른 보호협조)

  • Lee, Bok-Hee;Park, Hee-Yeoul;Shin, Gun-Jin;Bae, Gwan-Young;Ryu, Chun-Hyoung;Lee, Kang-Hee
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.27 no.3
    • /
    • pp.100-106
    • /
    • 2013
  • In this paper, in order to analyze lightning impulse response characteristics in combined installations of SPDs and RCDs, surge protection coordination between SPDs and RCDs are experimentally investigated by using the combination wave generator. Six different types of single-phase residual current operated circuit-breakers with integral overcurrent protection for household and similar uses(RCBOs) being present on the domestic market are tested according to KS C IEC 61009-1 standard. As a result, when a class I SPD is located on the source side of an RCBO, all kinds of specimens are able to provide the proper coordination between the SPD and RCBOs without nuisance tripping, unintended operation or damage due to test impulse currents. However, in the case that the class II SPD is located on the load side of RCBOs, a lot of L-N mode injected currents is split into the RCBO, and a few RCBOs are damaged. Coordination between SPDs and RCDs is not valid and a role of SPDs is of no use. When combining SPDs with RCDs, it is necessary to select SPDs and RCDs in consideration of the protection voltage level of metal oxide varistor embedded in RCDs.