http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Development of minor and medium energy in the Kyrgyz Republic
Alisherov E.T 한국로고스경영학회 2009 한국로고스경영학회 학술발표대회논문집 Vol.2009 No.7월
The Kyrgyz Republic possesses 2 % of power resources of the Central Asia and 30 % of hydropower resources from which the tenth part is mastered only. The minor and medium hydroelectric power stations that will allow electrifying more widely the areas kept away from power supply systems оmzонноzо animal industries and mountain agriculture, small industrial and social objects, especially in remote areas can bring the considerable contribution to development of power supply sources of republic. For realization of prospects of development of minor and medium water-power engineering, an effective utilization of hydropower resources of the small rivers in Kyrgyzstan, attraction of investors to building new is necessary, for reconstruction operating and to restoration of the written off minar and medium hydroelectric power stations, their operation and management, for formation of market relations and the competitive environment in electropower branch. The decision of variety of organizational-technical actions is necessary. Development of minor and medium water-power engineering demands the decision of a wide complex of research questions which concern: ? Studying of hydrological modes of the small rivers and waler currents, consequences of influence of minor and medium hydroelectric power stations on an environment: ? Problems of operation of hydraulic engineering constructions of minor and medium hydroelectric power stations, especially, in mountain and foothill areas: The problem ol realization of detailed studying of a hydroenergy potent of the small rivers in Kyrgyz Republic on all its areas is actual. By results of researches it is necessary In develop the Scheme of development of minor and medium water-power engineering in Kyrgyz Republic, providing power development of resources of the small rivers and water currents, with definition of building new and restoration before existing minor and medium hydroelectric power stations. It is necessary to notice that realisation of operative measures on restoration before existing minor and medium hydroelectric power stations. and also acceleration of development of a hydroenergy potential of the small rivers of the Kyrgyz Republic will allow to solve a number of large problems. they are: ? To lower intensity of fuel and energy balance, to improve its structure. ? To lower financial expenses for energy carriers; ? To create additional workplaces, and, finally, to raise a standard af living, comfort of a life of the population; ? To provide reliability of an electrical supply of household consumers. ? To lower social intensity in a society that has important value now.
Secure SCADA Network Technology and Methods
Farkhod Alisherov,Seung-Hwan Jeon,Tai-hoon Kim 한국정보기술학회 2010 Proceedings of KIIT Conference Vol.2010 No.-
The loss of integrity or of availability of data has the potential to adversely affect power utility core operations. The overall security concern facing the designers and operators of SCADA and, more generally, of industrial control systems typically originates either from malicious threat agents attempting to disrupt the control system operation, e.g. to create a power outage, or it originates from inadvertent actions, equipment failure, or similar. Electric utilities require secure network and control system. This paper illustrates solutions for control networks and equipment, SCADA data and communications.
Farkhod Alisherov,Haeng-kon Kim 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
Ethical hacking is obviously a very controversial area with prosecution under the Computer Misuse Act only a stone's throw away if you overstep the mark and hack into a system or any mobile device without categorical authorisation from the relevant person(s). [1While everyone is concerned about penetration testing methodologies, and/or penetration testing certification, it is also important to consider a policy that should be followed by both the tester and the client to reduce financial and confidencial disparaties, and to bring conformity to the operations between the both parties, so this research suggests a policy that should be followed by penetration testers and clients of the penetration tests.
Considerations for Penetration Testing Policy Establishment
Farkhod Alisherov 보안공학연구지원센터 2008 보안공학연구논문지 Vol.5 No.5
Ethical hacking is obviously a very controversial area with prosecution under the Computer Misuse Act only a stone's throw away if you overstep the mark and hack into a system or any mobile device without categorical authorization from the relevant person(s). While everyone is concerned about penetration testing methodologies, and/or penetration testing certification, it is also important to consider a policy that should be followed by both the tester and the client to reduce financial and confidential disparities, and to bring conformity to the operations between the both parties, so this research suggests a policy that should be followed by penetration testers and clients of the penetration tests.
Farkhod Alisherov,Min-kyu Choi,Tai-hoon Kim 한국정보기술학회 2009 Proceedings of KIIT Conference Vol.2009 No.-
With the familiarization of the penetration testing, more and more companies look for professionals in penetration testing to perform a penetration test. While professional skills are required in order for the test to be effective, certification of the penetration tester or penetration team is required and is more and more demanded. This paper suggests a methodology in choosing a penetration tester or a penetration testing team, and a brief certification listing is given.
Farkhod Alisherov(박호드 알리셀로브),Min-kyu Choi(최민규),Maricel O. Balitanas(마리셀 발리타나스),Tai-hoon Kim(김태훈) 한국멀티미디어학회 2009 한국멀티미디어학회 학술발표논문집 Vol.2009 No.1
The integration of SCADA systems with technologies such as the Internet and wireless network means that security became an important issue for these systems. While physical security has always been a priority for such systems, the new threat is that of cyber or electronic attacks. Such attacks can come from a manyof sources ranging from hackers to terrorists, employees or contractors. This research shows issues due to which SCADA systems are at risk and some suggestions, which need to be considered to protect your SCADA system.