Visible to the public Biblio

Filters: Keyword is Inductors  [Clear All Filters]
Chen, Z., Bai, B., Chen, D., Chai, W..  2018.  Design of Distribution Devices for Smart Grid Based on Magnetically Tunable Nanocomposite. IEEE Transactions on Power Electronics. 33:2083–2099.
This paper designs three distribution devices for the smart grid, which are, respectively, novel transformer with dc bias restraining ability, energy-saving contactor, and controllable reactor with adjustable intrinsic magnetic state based on the magnetically tunable nanocomposite material core. First, the magnetic performance of this magnetic material was analyzed and the magnetic properties processing method was put forward. One kind of nanocomposite which is close to the semihard magnetic state with low coercivity and high remanence was attained. Nanocomposite with four magnetic properties was processed and prepared using the distribution devices design. Second, in order to adjust the magnetic state better, the magnetization and demagnetization control circuit based on the single-phase supply power of rectification and inverter for the nanocomposite magnetic performance adjustment has been designed, which can mutual transform the material's soft and hard magnetic phases. Finally, based on the nanocomposite and the control circuit, a novel power transformer, an energy-saving contactor, and a magnetically controllable reactor were manufactured for the smart grid. The maintained remanence of the nanocomposite core after the magnetization could neutralize the dc bias magnetic flux in the transformer main core without changing the transformer neutral point connection mode, could pull in the contactor movable core instead of the traditional electromagnetic-type fixed core, and could adjust the reactor core saturation degree instead of the traditional electromagnetic coil. The simulation and experimental results verify the correctness of the design, which provides reliable, intelligent, interactive, and energy-saving power equipment for the smart power grids safe operation.
Kim, Seungmin, Kim, Sangwoo, Nam, Ki-haeng, Kim, Seonuk, Kwon, Kook-huei.  2019.  Cyber Security Strategy for Nuclear Power Plant through Vital Digital Assets. 2019 International Conference on Computational Science and Computational Intelligence (CSCI). :224–226.
As nuclear power plant Instrumentation and Control(I&C) systems have turned into digital systems, the possibility of cyber-attacks has increased. To protect the nuclear power plant from cyber-attacks, digital assets are classified and managed as critical digital assets which have safety, security and emergency preparedness functions. However, critical digital assets represent 70-80% of total digital assets, and applying and managing the same security control is inefficient. Therefore, this paper presents the criteria for identifying digital assets that are classified as vital digital assets that can directly affect the serious accidents of nuclear power plants.
Zhao, Z., Lu, W., Ma, J., Li, S., Zhou, L..  2018.  Fast Unloading Transient Recovery of Buck Converters Using Series-Inductor Auxiliary Circuit Based Sequence Switching Control. 2018 IEEE International Power Electronics and Application Conference and Exposition (PEAC). :1-5.

This paper presents a sequence switching control (SSC) scheme for buck converters with a series-inductor auxiliary circuit, aiming at improving the load transient response. During an unloading transient, the series inductor is controlled as a small equivalent inductance so as to achieve a fast transient regulation. While in the steady state, the series inductor behaves as a large inductance to reduce the output current ripple. Furthermore, on the basis of the proposed variable inductance circuit, a SSC control scheme is proposed and implemented in a digital form. With the proposed control scheme the unloading transient event is divided into n+1 sub-periods, and in each sub-period, the capacitor-charge balance principle is used to determine the switching time sequence. Furthermore, its feasibility is validated in experiment with a 12V-3.3V low-voltage high-current synchronous buck converter. Experimental results demonstrate that the voltage overshoot of the proposed SSC scheme has improved more than 74% compared to that of the time-optimal control (TOC) scheme.

Nichols, W., Hawrylak, P. J., Hale, J., Papa, M..  2018.  Methodology to Estimate Attack Graph System State from a Simulation of a Nuclear Research Reactor. 2018 Resilience Week (RWS). :84-87.
Hybrid attack graphs are a powerful tool when analyzing the cybersecurity of a cyber-physical system. However, it is important to ensure that this tool correctly models reality, particularly when modelling safety-critical applications, such as a nuclear reactor. By automatically verifying that a simulation reaches the state predicted by an attack graph by analyzing the final state of the simulation, this verification procedure can be accomplished. As such, a mechanism to estimate if a simulation reaches the expected state in a hybrid attack graph is proposed here for the nuclear reactor domain.
Hill, Z., Nichols, W. M., Papa, M., Hale, J. C., Hawrylak, P. J..  2017.  Verifying Attack Graphs through Simulation. 2017 Resilience Week (RWS). :64–67.

Verifying attacks against cyber physical systems can be a costly and time-consuming process. By using a simulated environment, attacks can be verified quickly and accurately. By combining the simulation of a cyber physical system with a hybrid attack graph, the effects of a series of exploits can be accurately analysed. Furthermore, the use of a simulated environment to verify attacks may uncover new information about the nature of the attacks.

Soo, L. H..  2015.  Comparative analysis of Governmental Countermeasures to cyber attacks. 2015 International Carnahan Conference on Security Technology (ICCST). :1–6.

Sony in United States and KHNP in South Korea were hit by a series of cyberattacks late in 2014 that were blamed on North Korea. U.S. president Obama responded strongly and positively as control tower, and led Sony do not surrender to hacker's demand. U.S government demonstrated retaliatory action against North Korea under the proportional principle, blacklisted 3 North Korean entities and 10 officials. That days, there was the outrage of internet of North Korea. In order to enhance the cyber security response capability, U.S created a new office, CTIIC and encouraged the development of ISAOs, and made Sanctions EO, Information Sharing EO etc. KHNP and the Ministry of Industry rectified incidents itself early period when cyber incident arose, and the situation did not recovered as quickly as desired. S. Korea had not retaliation actions, otherwise called for closer global cooperation against cyber-attacks. To enhance national cyber security and resilience, S. Korea government created the new post of presidential secretary for cyber security and draw up `Strengthening National Cyber Security Posture' initiative.