Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Seon-Keun Lee"'
Publikováno v:
Applied Sciences, Vol 14, Iss 16, p 7348 (2024)
This paper explores the combination of a data mining-based state evaluation method for electrical equipment in substations, analyzing the effectiveness and accuracy. First, a Gaussian mixture model is applied to fit all raw data of electrical equipme
Externí odkaz:
https://doaj.org/article/c47735722d7a4fcdbc7258600b688ebc
Publikováno v:
Energies, Vol 17, Iss 14, p 3455 (2024)
A smart grid protection system based on phasor information at circuit breakers is proposed in this paper. Phasor data for fault diagnosis is obtained from phasor measurement units or intelligent electronic devices installed near circuit breakers, wit
Externí odkaz:
https://doaj.org/article/d26152cd41794f6c915337bd2a6fd55d
Autor:
Ang Dong, Seon-Keun Lee
Publikováno v:
Energies, Vol 17, Iss 13, p 3251 (2024)
In response to challenges such as voltage limit violations, excessive currents, and power imbalances caused by the integration of distributed photovoltaic (distributed PV) systems into the distribution network, this study proposes at two-level optimi
Externí odkaz:
https://doaj.org/article/cc6abed8594746ca8d0e8fe477493bf0
Autor:
Seon-Keun Lee
Publikováno v:
Journal of the Korea Academia-Industrial cooperation Society. 12:2754-2759
With information communications and RFID/USN environments merged wire/wireless networks are generalized. In this viewpoint, WAP is used by communication protocol for the data communication in the field of wireless environment. WTLS developed for the
Autor:
Seon-Keun Lee
Publikováno v:
Journal of the Korea Academia-Industrial cooperation Society. 12:2713-2717
To transmit data from straggling sensors in water-processing basic industries etc., used Binary-CDMA system has safety voluntarily. But Binary-CDMA is necessity that react very sensitively in environment change as defense about hacking and cracking o
Autor:
Seon-Keun Lee
Publikováno v:
Journal of the Korea Academia-Industrial cooperation Society. 12:2311-2316
With development of information communications and network environments security importance to the informations deepen as time goes. In this viewpoint, cryptosystem is developing but proportionally cracking and hacking technology is developing. There
Autor:
Seon-Keun Lee
Publikováno v:
Journal of the Korea Society of Computer and Information. 16:143-151
Plaintext and key are independent in the existing block cipher. Also, encryption/decryption is performed by using structural features. Therefore, the external environment of suggested mixed cryptographic algorithm is identical with the existing ones,
Autor:
Seon-Keun Lee, Sun-Yeob Kim
Publikováno v:
Convergence and Hybrid Information Technology ISBN: 9783642241055
ICHIT (2)
ICHIT (2)
Creation of RFID/USN environment has increased very rapidly due to activation of ubiquitous. Security environment suitable for RFID/USN environment, however, failed to comply with the speed of security thread increase in reality. Therefore, this thes
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::730f021f9dae318767425a20ce2d85ce
https://doi.org/10.1007/978-3-642-24106-2_30
https://doi.org/10.1007/978-3-642-24106-2_30
Autor:
Seon-Keun Lee, Sun-Yeob Kim
Publikováno v:
Communications in Computer and Information Science ISBN: 9783642271793
FGIT-GDC
FGIT-GDC
With the widespread use of embedded system based ubiquitous system, there is a rapid increase of the RFID/USN environment.. However, the security for the RFID/USN environment has been far behind the speed of rising security threats. In this regard, t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::adf85011e42594c80964181d8d4d1045
https://doi.org/10.1007/978-3-642-27180-9_15
https://doi.org/10.1007/978-3-642-27180-9_15
Publikováno v:
Convergence and Hybrid Information Technology ISBN: 9783642241055
ICHIT (2)
ICHIT (2)
Since most cryptographic systems are PCI type, it is not suitable for users except experts to handle security system. In particular, most security programs used have not been verified against crack and are exposed to attack of virus or hacker. In thi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b1e2017c39da8340fc18f9c8a3671eee
https://doi.org/10.1007/978-3-642-24106-2_24
https://doi.org/10.1007/978-3-642-24106-2_24