• Title/Summary/Keyword: network protection system

Search Result 553, Processing Time 0.024 seconds

An Improvement of Distance Relay Technique Reliability using Elman Network (Elman Network를 이용한 거리계전기법의 신뢰성 향상)

  • Jung, H.S.;Lee, J.J.;Shin, M.C.;Lee, B.K.;Park, C.W.;Jang, S.I.
    • Proceedings of the KIEE Conference
    • /
    • 2000.07a
    • /
    • pp.212-214
    • /
    • 2000
  • The distance relay technique used for transmission line protection operates overreach and underreach to the self protection region because the power system becomes complex and fault conditions are different. To solve these problems, this paper describes new technique to set the reliable self protection lesion. The trip region of the quadrilateral distance relay is set by training of multi layer recurrent elman network. The proposed network is able to reach the trip zone for the fault impedance, fault initial angle and source impedance variance correctly.

  • PDF

The Personal Data Protection Mechanism in the European Union

  • Syroid, Tetiana L.;Kaganovska, Tetiana Y.;Shamraieva, Valentyna M.;Perederiі, Оlexander S.;Titov, Ievgen B.;Varunts, Larysa D.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.113-120
    • /
    • 2021
  • The adoption of the General Data Protection Regulation (EU) 2016/679 transformed approaches and concepts to the implementation of the personal data protection mechanism in the European Union. Within the EU, almost all countries have adapted a new protection mechanism, which requires a study of the specifics of its use. The article intends to assess the legal provisions of the current mechanism of personal data protection in the EU. The author studied the mechanism of personal data protection under the General Data Protection Regulation (EU) 2016/679 (GDPR) based on the concept of contextual integrity and analysis of EU legislation on personal data protection. The scientific publications for 2016-2020 were reviewed for the formation of ideas of a new personal data protection mechanism in the EU, informative and transparent analysis of legal provisions. The article notes that the personal data privacy and protection is increasing, there is an ongoing unification of the legal status of personal data protection and the formation of a digital market for dissemination, exchange, control, and supervision of data. Cross-border cooperation is part of the personal data protection mechanism. The author proved that the GDPR has changed approach to personal data protection: the emphasis is now shifting to the formation of a digital market, where the EU's role in ensuring regulation is crucial. The article identifies the emergence of a new protectionist legal system and strengthening of legal provisions regarding privacy. This legal system needs unification and harmonization in accordance with national legislation, is territorially fragmented and differentiated within the EU.

A Special Protection Scheme Against a Local Low-Voltage Problem and Zone 3 Protection in the KEPCO System

  • Yun, Ki-Seob;Lee, Byong-Jun;Song, Hwa-Chang
    • Journal of Electrical Engineering and Technology
    • /
    • v.2 no.3
    • /
    • pp.294-299
    • /
    • 2007
  • This paper presents a special protection scheme, which was established in the KEPCO (Korea Electric Power Corporation) system, against a critically low voltage profile in a part of the system after a double-circuit tower outage. Without establishing the scheme, the outage triggers the operation of a zone 3 relay and trips the component. This sequence of events possibly leads to a blackout of the local system. The scheme consists of an inter-substation communication network using PITR (Protective Integrated Transmitter and Receiver) for acquisition of the substations' data, and under-voltage load shedding devices. This paper describes the procedure for determining the load shedding in the scheme and the experiences of the implementation.

Experimental Research for Design of Distributed Power System Protection IED (분산 전원 계통 연계용 보호 IED 설계를 위한 실험 연구)

  • Han, Chul-Wan;Oh, Sung-Nam;Yoon, Ki-Don;Kim, Kab-Il;Son, Young-Ik
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.90-92
    • /
    • 2005
  • In this paper, we design a digital protection IED(Intelligent Electric Device) for a distributed power system in connection with power grid. The device can measure various elements for protection and communicate with another devices through network. The protection IED is composed of specific function modules: signal process module which converts analog signal from PT and CT handle algorithm to digital one; communication module for connection with another IEDs; input/output module for user-interfaces; main control module for control the whole modules. A general purpose DSP board with TMS320C2812 is used in the IED. Experiments with the power system simulator DOBLE have been made to verily the proposed hardware system.

  • PDF

Fire Protection System for Ubiquitous Environment (유비쿼터스 환경을 위한 소방시스템)

  • Kang, Won-Chan;Kim, Nam-Oh;Min, Wan-Ki;Shin, Suck-Doo;Kim, Young-Dong
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.54 no.3
    • /
    • pp.141-147
    • /
    • 2005
  • In this paper, We are going to propose the fire protection system with using CAN(Controller Area Network). The larger, higher and deeper buildings are, the more dangerous people are when fire happens. We should be aware of the problems of prior fire protection system. Therefore, we construct embedded system based on CAN communication that is capable of N:N communication, and build independent fire protection system. If the fire is occurred on the building, the problem is that how fast we can detect the fire and put off it by using available system. this is major factor that reduces damage of our wealth. therefore in this studies We would like to design more stable system than current system. this system that is based on CAN communication which is available N:N communication constructs and is designed to compensate for each fault so that our aim is to reduce the line of system and cost of installation and to suppose future type fire protection system. We are simulated by NIST FDS(Fire Dynamics Simulator) to prove the efficiency of this system.

Vulnerability Mitigation System Construction Method Based on ATT&CK in M ilitary Internal Network Environment (국방 네트워크 환경에서 ATT&CK 기반 취약점 완화 체계 구축 방안)

  • Ahn, Gwang Hyun;Lee, Hanhee;Park, Won Hyung;Kang, Ji Won
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.135-141
    • /
    • 2020
  • The Ministry of National Defense is strengthening the power and capacity of cyber operations as cyber protection training is conducted. However, considering the level of enemy cyber attack capability, the level of cyber defense capability of the ministry of national defense is significantly low and the protection measures and response system for responding to cyber threats to military networks are not clearly designed, falling short of the level of cyber security capabilities of the public and private sectors. Therefore, this paper is to investigate and verify the establishment of a military internal network vulnerability mitigation system that applies the intention of attackers, tactics, techniques and procedures information (ATT&CK Framework), identified military internal network main threat information, and military information system security requirements with military specificity as factors that can establish a defense network vulnerability mitigation system by referring to the domestic and foreign cyber security framework It has the advantage of having.

Issues and Tasks of Personal Information Protection Liability Insurance (개인정보 손해배상책임 보장제도의 쟁점과 과제)

  • Lee, Suyeon;Kwon, Hun-Yeong
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.37-53
    • /
    • 2020
  • Today, our society is exposed to cyber threats, such as the leakage of personal information, as various systems are connected and operated organically with the development of information and communication technology. With the impact of these cyber risks, we are experiencing damage from the virtual world to the physical world. As the number of cases of damage caused by cyber attacks has continued to rise, social voices have risen that the government needs to manage cyber risks. Thus, information and telecommunication service providers are now mandatory to have insurance against personal information protection due to amendment of "the Act on Promotion of Information and Communication Network Utilization and Information Protection". However, the insurance management system has not been properly prepared, with information and communication service providers selecting the service operators based on sales volume rather than selecting them based on the type and amount of personal information they store and manage. In order for the personal information protection liability insurance system to be used more effectively in line with the legislative purpose, effective countermeasures such as cooperation with the government and related organizations and provision of benefits for insured companies should be prepared. Thus, the author of this study discuss the current status of personal information protection liability insurance system and the issues raised in the operation of the system. Based on the results of this analysis, the authors propsoe tasks and plans to establish an effective personal information protection liability insurance system.

Protection/Restoration of PON Systems Using WDM based 2-OLT Structure (WDM 기반 2-OLT 구조를 이용한 PON 시스템 보호 및 절체)

  • Rawshan, Fahmida;Park, Youngil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.12
    • /
    • pp.1168-1173
    • /
    • 2012
  • In this paper, we propose a protection architecture of passive optical network (PON) system by using two optical line terminals (OLTs). Using this scheme, the network can sustain services to access area and restores normal operation in faulty conditions. Unlike existing systems, the proposed one increases the efficiency of the system by operating both OLTs using different wavelengths in normal condition. During protection mode, a Shared-bandwidth allocation scheme is employed to maximize the utilization efficiency. Performance analysis shows that the proposed scheme can provide reliability to Ethernet-based PON system very efficiently.

Forecasting Fish Communities in River Networks

  • Rashleigh, Brenda;White, Denis;Ebersole, Joe L.;Barber, Craig;Boxall, George;Brookes, Allen
    • Korean Journal of Ecology and Environment
    • /
    • v.45 no.2
    • /
    • pp.150-157
    • /
    • 2012
  • Fish communities in river networks provide significant ecosystem services that will likely decline under future land use and climate change. We developed a model that simulates the consequences to multiple populations of one or more fish species-a meta-community-from multiple stressors across a river network. The model is spatially-explicit and age-structured, with three components: habitat suitability; population dynamics, including species interactions; and movement across a spatial network. Although this model is simple, it can form the basis of fisheries assessments and may be incorporated into an integrated modeling system for watershed management and prediction.

Criminal And Legal Protection Of Information Relations

  • Manzhai, Oleksandr;Kuryliuk, Yurii;Miroshnykov, Ivan;Syiploki, Mykola;Vazhynskyi, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.284-288
    • /
    • 2022
  • The article analyzes the regulations of current criminal law, which ensures the protection and protection of information relations, offers the optimal model of the system of norms of the Criminal Code of Ukraine, which establishes liability for violation of information. The subject of the article is protected information, which should include information or data, the procedure for access to and distribution of which, regardless of the method of submission, storage or organization, are subject to legal regulation in accordance with laws and regulations. For the purposes of criminal law, information as an object of criminal law protection should be classified on the following grounds: depending on the content: personal or family secrets; information constituting a state secret; data included in the official secret; information that constitutes a professional secret; information that constitutes a commercial, tax, banking secret, and, depending on the medium - documented and undocumented.