• Title/Summary/Keyword: protection system

Search Result 5,936, Processing Time 0.033 seconds

A study on An Optimal Protection System for Power Distribution Networks by Applying Multi-Agent System (Multy-agent system을 애용한 배전계통 최적 보호시스템 연구)

  • Jung, K.H.;Min, B.W.;Lee, S.J.;Choi, M.S.;Kang, S.H.
    • Proceedings of the KIEE Conference
    • /
    • 2003.07a
    • /
    • pp.299-301
    • /
    • 2003
  • In this paper, a protection system using Multi-Agent concept for power distribution network is proposed. Multi agent system consist of Feeder agent, OCR(Over Current Relay) agent, Recloser agent and Switch agent. An agent calculates and corrects its parameter by itself through communication with neighboring agents and its own intelligence algorithm. Simulations in a simple distribution network show the effectiveness of the suggested protection system. Multi-Agent System, protection of distribution network, Communication.

  • PDF

A Study on Implementation of Multi-Function Prototype IED H/W for Generator Protection (발전기 보호용 다기능 IED 시제품 H/W 구현에 관한 연구)

  • Kim, Yoon-Sang;An, Tae-Pung;Park, Chul-Won
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.27 no.12
    • /
    • pp.74-80
    • /
    • 2013
  • Generator faults does not happen more often than the transmission and substation facility faults. However, impacts on the power system by generator faults are very large. In order to minimize the impact of generator faults, generator protection and control system with high reliability is required. Most of the generator relay in generator protection and control system of large power plant of Korea is operated by imports from abroad. Accordingly, in order to accumulate source technology and increase the import substitution effect, localization of multi-function generator protection IED is being developed. This paper deals with the implementation of a multi-function prototype IED H/W, which can be command and data exchange through communication for measuring, monitoring, protection and control. And the IED specification, various relay elements, measurement elements, communication functions, module function, and test system for the prototype IED H/W are described.

Preventing disaster system of the subaqueous tunnel under the Han river in the Bundang railway (분당선 한강 하저터널의 방재시스템)

  • Kim Yong-Il;Hwang Nak-Yeon;Yoon Young-Hoon;Jie Hong-Keun;Jang Sung-Wook;Kim Dong-Hyun
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.308-327
    • /
    • 2004
  • As use of tunnels and subways increase there also are accidents proportionate to it. Daegu Subway Station fire, Hongjimoon tunnel fire led people to be conscious of disaster protection and as a result, there is a trend to adopt standards for fire protection. Accordingly, this thesis is focused on investigating various fire and water protection related issues for subaqueous tunnel under Ran river. The thesis developed evacuation and disaster prevention plan as fire level increases and have identified the suitability of disaster prevention through evacuation and fire simulation, countermeasure of a water leakage during construction and operation considering the subaqueous tunnel. And we selected EPB shield TBM equipment considering the ground condition and effect of boring hole, and accomplished reasonable water protection design through setting goals using event-tree method, as well as examining model test of boring hole and flooding in heavy rain. Also included structured total system consist of water leakage sensing system, water protection gate, pumping system and fire protection system to respond systematically in emergency.

  • PDF

A Study about False Alarm of Automatic Fire Detection System (자동화재 탐지설비의 비화재보 감소방안)

  • Lee, Jong-Hwa;Lee, Chun-Ha;Kim, Shi-Kuk;Kong, Ha-Sung
    • Journal of the Korea Safety Management & Science
    • /
    • v.13 no.1
    • /
    • pp.41-49
    • /
    • 2011
  • The automatic fire detection system is an important facility installed with focusing on minimizing the damage from a fire. This paper presents in the followings as the methods to reduce the false alarm of the automatic fire detection system; first, to prepare for legal standard so that revised legal standard can be applied to the fire fighting property prior to revision; second, to introduce the performance based fire detection protection design in the law based fire protection design; third, to maintain the wiring of worn-out detector; forth, to introduce an evaluation system to the education for the fire warden; fifth, to extend the standard of MTBF(meantime between failure) of the detector; sixth, to extend of installing the analog type detector; seventh, to improve the structure of reset switch.

A Protection Circuit for the Power Supply of a Gas Discharge Lamp

  • Kim, Ho-Sung;Kim, Jong-Hyun;Baek, Ju-Won;Yoo, Dong-Wook;Jung, Hye-Man;Kim, Hee-Je
    • Journal of Power Electronics
    • /
    • v.10 no.6
    • /
    • pp.777-783
    • /
    • 2010
  • In order to drive gas discharge lamps, DC-AC converters with a LCC resonant tank, whose output voltage is adjusted by a variable frequency control are frequently used. However, when they are activated by varying the operating frequency, converters are frequently damaged by unstable operation, due to the rising and falling of the operating frequency near the resonant frequency. To solve this problem, a simple protection circuit for the power supply of a gas discharge lamp is proposed in this paper. This circuit senses the primary current of the main transformer. Using this protection circuit, the operating frequency of the lamp driving inverter system is kept close to and on the right side of the resonant frequency and the inverter is always operated in the ZVS condition. The resulting stable variable frequency operation allows various gas discharge lamps to be tested without the risk of damaging the main switches, because the protection circuit can protect the power MOSFETs of bridge converters from abnormal conditions. The validity and effectiveness of the proposed protection circuit are verified through the experimental results.

An Analysis on the Importance and Performance of Personal Information Protection for the Elderly Welfare Center Employees

  • You, Gil-Jun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.185-191
    • /
    • 2018
  • The purpose of this study is to present effective basic data for business management through analysis of importance and performance of personal information protection of the elderly welfare center workers. For this purpose, the questionnaire on the protection of personal information was reconstructed based on the diagnostic level of the personal information security management level of the public institution and the questionnaire was conducted on 105 employees of the elderly welfare center in Chungbuk area. Based on the responses to the importance and the degree of performance of the personal information protection of the elderly welfare center employees, technical statistics and corresponding sample T-tests were conducted and the importance-performance analysis (IPA) was used. Followings are the results of this study: First, there is a statistically significant difference between the importance and the implementation of the management system for the protection of personal information of the workers in the elderly welfare center, establishment and implementation of protection measures, establishment and implementation of infringement measures. Second, IPA analysis on the protection of personal information of the workers in the elderly welfare center shows that the establishment and implementation of protection measures are the areas to maintain good performance. Third, in IPA analysis of the sub-factors of the personal information protection of the workers in the welfare center of the elderly, in the construction and management of the management system, in performing the role of the personal information protection officer and establishing and implementing protection measures, The factors of prevention of information disclosure and exposure and the safe use and management of personal information processing system were analyzed as areas requiring intensive improvement. This study is meaningful as a basic research that can raise the awareness of the personal information protection of the workers in the elderly welfare center and induce the improvement of the related work.

Analysis of Child protection system from a preventive Perspective : Focusing on the German case (예방적 관점에서 살펴 본 아동학대 대응체계 분석 - 독일 사례를 중심으로 -)

  • Hong, Moonki
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.515-522
    • /
    • 2022
  • This study analyzed the child protection system in Germany from a preventive perspective and attempts to find the applicable implications to Korea. The research method was analyzed in terms of legal, policy and professionalism. The result is as follows. First, Child and Youth Support Act in Germany stipulated a preventive support system to restore the function of the family. Second, according to the Civil Act, it was stipulated that the family court could intervene early. Third, the federal Child Protection Act stipulated community cooperation for thd child protection system. Fourth, the Youth Agency as the general authority made it possible to provide preventive support and intervention at the same time. Firth, qualification standards were specified in the Child and Youth Support Act. Child protection specialists are granted to public officials who have worked for more than three years. The implications are as follows. First, the child protection system, which operates as a child abuse reporting system, should be expanded to a preventive support system. Second, it is necessary to expand monitoring by establishing an early warning system between networks in order to establish a support system for potentially at-risk children. Third, local governments should support children and parents flexibly and comprehensively for dysfunction caused by difficulties at home. Fourth, it is necessary to enact the Child Protection System Cooperation Act for a network cooperation system.

A Derivation of Comprehensive Protection Ratio and Its Applications for Microwave Relay System Networks

  • Suh Kyoung-Whoan
    • Journal of electromagnetic engineering and science
    • /
    • v.6 no.2
    • /
    • pp.103-109
    • /
    • 2006
  • This paper suggests an efficient and comprehensive algorithm of the protection ratio derivation and illustrates some calculated results applicable to the initial planning of frequency coordination in the fixed wireless access networks. The net filter discrimination associated with Tx spectrum mask and overall Rx filter characteristic has been also examined to show the effect of the adjacent channel interference. The calculations for co-channel and adjacent channel protection ratios are performed for the current microwave frequency band of 6.7 GHz including Tx spectrum mask and Rx filter response. According to results, fade margin and co-channel protection ratio reveal 41.4 and 75.2 dB, respectively, for 64-QAM and 60 km at BER $10^{-6}$. It is shown that the net filter discrimination with 40 MHz channel bandwidth provides 28.9 dB at the first adjacent channel, which yields 46.3 dB of adjacent channel protection ratio. In addition, the protection ratio of 38 GHz radio relay system is also reviewed for millimeter wave band applications. The proposed method gives some advantages of an easy and systematic extension for protection ratio calculation and is also applied to frequency coordination in fixed millimeter wave networks.

A Study of Model on File Transfer Using Public-key Cryptography (공개키 암호방식을 이용한 파일전송 모델의 연구)

  • 최진탁;송영재
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.7
    • /
    • pp.545-552
    • /
    • 1990
  • This paper is concerned with the file protection in the file transfer systems. In the existing file transfer systems, passwords are used in the protection but do not provide any data protection and can only provide some protection against unauthorized access. Even provided with this protection, we cannot be free form computer hackers. In order to achieve higher standards of protection for our privacy (protection for data themselves, authentication of senders...) analternative technical system should be developed in using of pulic key cryptography by choosing the public key method (RSA public key) in the file transfer. A new system suggested in the paper can achieve some higher standards of protection for our privacy. We a result thie system will be easily applied to various document handling systems as in the data base.

  • PDF

Improvement Directions Of Related Laws System To Protect U-City Infrastructure Facilities (U-City 기반시설보호를 위한 관련 법제도 정비 방향)

  • Kim, Byeong-Sun;Lee, Jae-Suk;Shin, Dong-Bin
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.19 no.1
    • /
    • pp.45-52
    • /
    • 2011
  • This study aims to provide improvement directions of related laws system to protect U-City infrastructure facilities. For this, the study analyzes oversea infrastructure protection systems and domestic U-City laws system. Then, this indicates problems considering U-City infrastructure protection through Industrial-University-Institute experts' survey. Based on this survey, this study proposes improvement guideline of laws system to protect U-City infrastructure facilities, including enactment the Guideline of U-City Infrastructure Protection, obligation of U-City Infrastructure Protection, revision method of related laws system for protecting intelligent facilities, and Management System of U-City Infrastructure Facilities.