• 제목/요약/키워드: network protection system

검색결과 546건 처리시간 0.025초

Elman Network를 이용한 거리계전기법의 신뢰성 향상 (An Improvement of Distance Relay Technique Reliability using Elman Network)

  • 정호성;이종주;신명철;이복구;박철원;장성익
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2000년도 하계학술대회 논문집 A
    • /
    • pp.212-214
    • /
    • 2000
  • The distance relay technique used for transmission line protection operates overreach and underreach to the self protection region because the power system becomes complex and fault conditions are different. To solve these problems, this paper describes new technique to set the reliable self protection lesion. The trip region of the quadrilateral distance relay is set by training of multi layer recurrent elman network. The proposed network is able to reach the trip zone for the fault impedance, fault initial angle and source impedance variance correctly.

  • PDF

The Personal Data Protection Mechanism in the European Union

  • Syroid, Tetiana L.;Kaganovska, Tetiana Y.;Shamraieva, Valentyna M.;Perederiі, Оlexander S.;Titov, Ievgen B.;Varunts, Larysa D.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.113-120
    • /
    • 2021
  • The adoption of the General Data Protection Regulation (EU) 2016/679 transformed approaches and concepts to the implementation of the personal data protection mechanism in the European Union. Within the EU, almost all countries have adapted a new protection mechanism, which requires a study of the specifics of its use. The article intends to assess the legal provisions of the current mechanism of personal data protection in the EU. The author studied the mechanism of personal data protection under the General Data Protection Regulation (EU) 2016/679 (GDPR) based on the concept of contextual integrity and analysis of EU legislation on personal data protection. The scientific publications for 2016-2020 were reviewed for the formation of ideas of a new personal data protection mechanism in the EU, informative and transparent analysis of legal provisions. The article notes that the personal data privacy and protection is increasing, there is an ongoing unification of the legal status of personal data protection and the formation of a digital market for dissemination, exchange, control, and supervision of data. Cross-border cooperation is part of the personal data protection mechanism. The author proved that the GDPR has changed approach to personal data protection: the emphasis is now shifting to the formation of a digital market, where the EU's role in ensuring regulation is crucial. The article identifies the emergence of a new protectionist legal system and strengthening of legal provisions regarding privacy. This legal system needs unification and harmonization in accordance with national legislation, is territorially fragmented and differentiated within the EU.

A Special Protection Scheme Against a Local Low-Voltage Problem and Zone 3 Protection in the KEPCO System

  • Yun, Ki-Seob;Lee, Byong-Jun;Song, Hwa-Chang
    • Journal of Electrical Engineering and Technology
    • /
    • 제2권3호
    • /
    • pp.294-299
    • /
    • 2007
  • This paper presents a special protection scheme, which was established in the KEPCO (Korea Electric Power Corporation) system, against a critically low voltage profile in a part of the system after a double-circuit tower outage. Without establishing the scheme, the outage triggers the operation of a zone 3 relay and trips the component. This sequence of events possibly leads to a blackout of the local system. The scheme consists of an inter-substation communication network using PITR (Protective Integrated Transmitter and Receiver) for acquisition of the substations' data, and under-voltage load shedding devices. This paper describes the procedure for determining the load shedding in the scheme and the experiences of the implementation.

분산 전원 계통 연계용 보호 IED 설계를 위한 실험 연구 (Experimental Research for Design of Distributed Power System Protection IED)

  • 한철완;오성남;윤기돈;김갑일;손영익
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2005년도 심포지엄 논문집 정보 및 제어부문
    • /
    • pp.90-92
    • /
    • 2005
  • In this paper, we design a digital protection IED(Intelligent Electric Device) for a distributed power system in connection with power grid. The device can measure various elements for protection and communicate with another devices through network. The protection IED is composed of specific function modules: signal process module which converts analog signal from PT and CT handle algorithm to digital one; communication module for connection with another IEDs; input/output module for user-interfaces; main control module for control the whole modules. A general purpose DSP board with TMS320C2812 is used in the IED. Experiments with the power system simulator DOBLE have been made to verily the proposed hardware system.

  • PDF

유비쿼터스 환경을 위한 소방시스템 (Fire Protection System for Ubiquitous Environment)

  • 강원찬;김남오;민완기;신석두;김영동
    • 전기학회논문지P
    • /
    • 제54권3호
    • /
    • pp.141-147
    • /
    • 2005
  • In this paper, We are going to propose the fire protection system with using CAN(Controller Area Network). The larger, higher and deeper buildings are, the more dangerous people are when fire happens. We should be aware of the problems of prior fire protection system. Therefore, we construct embedded system based on CAN communication that is capable of N:N communication, and build independent fire protection system. If the fire is occurred on the building, the problem is that how fast we can detect the fire and put off it by using available system. this is major factor that reduces damage of our wealth. therefore in this studies We would like to design more stable system than current system. this system that is based on CAN communication which is available N:N communication constructs and is designed to compensate for each fault so that our aim is to reduce the line of system and cost of installation and to suppose future type fire protection system. We are simulated by NIST FDS(Fire Dynamics Simulator) to prove the efficiency of this system.

국방 네트워크 환경에서 ATT&CK 기반 취약점 완화 체계 구축 방안 (Vulnerability Mitigation System Construction Method Based on ATT&CK in M ilitary Internal Network Environment)

  • 안광현;이한희;박원형;강지원
    • 융합보안논문지
    • /
    • 제20권4호
    • /
    • pp.135-141
    • /
    • 2020
  • 국방부는 주기적인 사이버방호 훈련을 실시함에 따라 사이버작전의 전력과 역량을 보강하고 있다. 하지만 적 사이버공격 능력 수준을 고려할 때 군의 사이버방호 능력 수준은 현저히 낮으며 군용 네트워크망에 대한 사이버위협을 대응할 수 있는 보호대책과 대응체계가 명확하게 설계되어 있지 않아 민·관의 사이버보안 능력 수준에도 못 미치고 있는 실태이다. 따라서 본 논문에서는 국내·외 사이버보안 프레임워크를 참조하여 국방 네트워크망 취약점 완화 체계를 구축할 수 있는 요소로 군 특수성을 지닌 군 내부망 주요 위협 정보 및 국방정보시스템 보안 요구사항을 파악하고, 공격자의 의도파악과 전술, 기법 및 절차 정보(ATT&CK)를 적용하여 국방 네트워크 환경에 대한 사이버공격을 효율적으로 보호 해주는 군 내부망 취약점 완화 체계 구축 방안을 제안한다.

개인정보 손해배상책임 보장제도의 쟁점과 과제 (Issues and Tasks of Personal Information Protection Liability Insurance)

  • 이수연;권헌영
    • 한국IT서비스학회지
    • /
    • 제19권1호
    • /
    • pp.37-53
    • /
    • 2020
  • Today, our society is exposed to cyber threats, such as the leakage of personal information, as various systems are connected and operated organically with the development of information and communication technology. With the impact of these cyber risks, we are experiencing damage from the virtual world to the physical world. As the number of cases of damage caused by cyber attacks has continued to rise, social voices have risen that the government needs to manage cyber risks. Thus, information and telecommunication service providers are now mandatory to have insurance against personal information protection due to amendment of "the Act on Promotion of Information and Communication Network Utilization and Information Protection". However, the insurance management system has not been properly prepared, with information and communication service providers selecting the service operators based on sales volume rather than selecting them based on the type and amount of personal information they store and manage. In order for the personal information protection liability insurance system to be used more effectively in line with the legislative purpose, effective countermeasures such as cooperation with the government and related organizations and provision of benefits for insured companies should be prepared. Thus, the author of this study discuss the current status of personal information protection liability insurance system and the issues raised in the operation of the system. Based on the results of this analysis, the authors propsoe tasks and plans to establish an effective personal information protection liability insurance system.

WDM 기반 2-OLT 구조를 이용한 PON 시스템 보호 및 절체 (Protection/Restoration of PON Systems Using WDM based 2-OLT Structure)

  • ;박영일
    • 한국통신학회논문지
    • /
    • 제37B권12호
    • /
    • pp.1168-1173
    • /
    • 2012
  • 본 연구에서는 2개의 OLT를 이용한 PON 보호/절체에 관해 제안하였다. 본 제안된 방식을 이용하면 고장 상황에서도 가입자 영역에 서비스를 지속적으로 할 수 있고, 정상적인 동작을 수행할 수 있게 된다. 기존 보호/절체 방식과의 차이점은 제안된 방식의 경우 두 OLT에 다른 파장을 적용함으로써 정상 상태에서 두 OLT를 모두 사용하여 이용 효율을 높인다는 점이다. 보호 모드에서는 Shared-bandwidth 할당 방식을 적용함으로써 효율을 극대화하였다. 성능 분석을 통해 제안된 시스템이 효율적으로 이더넷 기반 PON 시스템의 신뢰성을 높일 수 있음을 확인하였다.

Forecasting Fish Communities in River Networks

  • Rashleigh, Brenda;White, Denis;Ebersole, Joe L.;Barber, Craig;Boxall, George;Brookes, Allen
    • 생태와환경
    • /
    • 제45권2호
    • /
    • pp.150-157
    • /
    • 2012
  • Fish communities in river networks provide significant ecosystem services that will likely decline under future land use and climate change. We developed a model that simulates the consequences to multiple populations of one or more fish species-a meta-community-from multiple stressors across a river network. The model is spatially-explicit and age-structured, with three components: habitat suitability; population dynamics, including species interactions; and movement across a spatial network. Although this model is simple, it can form the basis of fisheries assessments and may be incorporated into an integrated modeling system for watershed management and prediction.

Criminal And Legal Protection Of Information Relations

  • Manzhai, Oleksandr;Kuryliuk, Yurii;Miroshnykov, Ivan;Syiploki, Mykola;Vazhynskyi, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • 제22권5호
    • /
    • pp.284-288
    • /
    • 2022
  • The article analyzes the regulations of current criminal law, which ensures the protection and protection of information relations, offers the optimal model of the system of norms of the Criminal Code of Ukraine, which establishes liability for violation of information. The subject of the article is protected information, which should include information or data, the procedure for access to and distribution of which, regardless of the method of submission, storage or organization, are subject to legal regulation in accordance with laws and regulations. For the purposes of criminal law, information as an object of criminal law protection should be classified on the following grounds: depending on the content: personal or family secrets; information constituting a state secret; data included in the official secret; information that constitutes a professional secret; information that constitutes a commercial, tax, banking secret, and, depending on the medium - documented and undocumented.