• Title/Summary/Keyword: Analysis of key

Search Result 10,052, Processing Time 0.035 seconds

Analysis and Correction of Through-bolt End-region Overheating and Breakdown Failure in a Large Tubular Hydro-generator

  • Zhou, Zhi-ting;Fan, Zhen-nan;Li, Jian-fu;Wen, Kun;Zhang, Bide;Wang, Tao;Xia, Yan-kun;Sun, Zhang;Yao, Bing
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.6
    • /
    • pp.2292-2300
    • /
    • 2018
  • A field-circuit coupling model of a typical faulty generator is established to correct through-bolt end-region overheating and breakdown failure in a tubular hydro-generator. Using the model, eddy current loss and electromagnetic forces on through bolts under normal and failure conditions are analyzed and compared and the natural frequency of a through bolt is determined. Based on the analysis results, the causative mechanism of failure is revealed and targeted improvement design measures are proposed. The numerical results are found to be consistent with the actual fault characteristics, validating the design measure improvements. The results are useful in improving the design and manufacturing standards and enhancing the operational reliability of large tubular hydro-generators.

The Complete Genome Sequence of Southern rice black-streaked dwarf virus Isolated from Vietnam

  • Dinh, Thi-Sau;Zhou, Cuiji;Cao, Xiuling;Han, Chenggui;Yu, Jialin;Li, Dawei;Zhang, Yongliang
    • The Plant Pathology Journal
    • /
    • v.28 no.4
    • /
    • pp.428-432
    • /
    • 2012
  • We determined the complete genome sequence of a Vietnamese isolate of Southern rice black-streaked dwarf virus (SRBSDV). Whole genome comparisons and phylogenetic analysis showed that the genome of the Vietnamese isolate shared high nucleotide sequence identities of over 97.5% with those of the reported Chinese isolates, confirming a common origin of them. Moreover, the greatest divergence between different SRBSDV isolates was found in the segments S1, S3, S4 and S6, which differs from the sequence alignment results between SRBSDV and Rice black streaked dwarf virus (RBSDV), implying that SRBSDV evolved in a unique way independent of RBSDV. This is the first report of a complete nucleotide sequence of SRBSDV from Vietnam and our data provides new clues for further understanding of molecular variation and epidemiology of SRBSDV in Southeast Asia.

A comparative study of three collocation point methods for odd order stochastic response surface method

  • Li, Dian-Qing;Jiang, Shui-Hua;Cheng, Yong-Gang;Zhou, Chuang-Bing
    • Structural Engineering and Mechanics
    • /
    • v.45 no.5
    • /
    • pp.595-611
    • /
    • 2013
  • This paper aims to compare three collocation point methods associated with the odd order stochastic response surface method (SRSM) in a systematical and quantitative way. The SRSM with the Hermite polynomial chaos is briefly introduced first. Then, three collocation point methods, namely the point method, the root method and the without origin method underlying the odd order SRSMs are highlighted. Three examples are presented to demonstrate the accuracy and efficiency of the three methods. The results indicate that the condition that the Hermite polynomial information matrix evaluated at the collocation points has a full rank should be satisfied to yield reliability results with a sufficient accuracy. The point method and the without origin method are much more efficient than the root method, especially for the reliability problems involving a large number of random variables or requiring complex finite element analysis. The without origin method can also produce sufficiently accurate reliability results in comparison with the point and root methods. Therefore, the origin often used as a collocation point is not absolutely necessary. The odd order SRSMs with the point method and the without origin method are recommended for the reliability analysis due to their computational accuracy and efficiency. The order of SRSM has a significant influence on the results associated with the three collocation point methods. For normal random variables, the SRSM with an order equaling or exceeding the order of a performance function can produce reliability results with a sufficient accuracy. The order of SRSM should significantly exceed the order of the performance function involving strongly non-normal random variables.

Threats Analysis and Mobile Key Recovery for Internet of Things (IoT 환경에서의 보안위협 분석과 모바일 키 복구)

  • Lee, Yunjung;Park, Yongjoon;Kim, Chul Soo;Lee, Bongkyu
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.5
    • /
    • pp.918-923
    • /
    • 2016
  • IoT should be considered security risk environments such as various platforms and services including smart devices that can be mounted on household electric appliances, healthcare, car, and heterogeneous networks that are connected to the Internet, cloud services and mobile Apps.. In this paper, we provide analysis of new security threats, caused by open-platform of IoT and sensors via the Internet. Also, we present the key recovery mechanism that is applied to IoT. It results to have compatibility with given research, reduces network overhead, and performs key recovery without depending on key escrow agencies or authorized party.

CFD/RELAP5 coupling analysis of the ISP No. 43 boron dilution experiment

  • Ye, Linrong;Yu, Hao;Wang, Mingjun;Wang, Qianglong;Tian, Wenxi;Qiu, Suizheng;Su, G.H.
    • Nuclear Engineering and Technology
    • /
    • v.54 no.1
    • /
    • pp.97-109
    • /
    • 2022
  • Multi-dimensional coupling analysis is a research hot spot in nuclear reactor thermal hydraulic study and both the full-scale system transient response and local key three-dimensional thermal hydraulic phenomenon could be obtained simultaneously, which can achieve the balance between efficiency and accuracy in the numerical simulation of nuclear reactor. A one-dimensional to three-dimensional (1D-3D) coupling platform for the nuclear reactor multi-dimensional analysis is developed by XJTU-NuTheL (Nuclear Thermal-hydraulic Laboratory at Xi'an Jiaotong University) based on the CFD code Fluent and system code RELAP5 through the Dynamic Link Library (DLL) technology and Fluent user-defined functions (UDF). In this paper, the International Standard Problem (ISP) No. 43 is selected as the benchmark and the rapid boron dilution transient in the nuclear reactor is studied with the coupling code. The code validation is conducted first and the numerical simulation results show good agreement with the experimental data. The three-dimensional flow and temperature fields in the downcomer are analyzed in detail during the transient scenarios. The strong reverse flow is observed beneath the inlet cold leg, causing the de-borated water slug to mainly diffuse in the circumferential direction. The deviations between the experimental data and the transients predicted by the coupling code are also discussed.

Secret Key Generation Using Reciprocity in Ultra-wideband Outdoor Wireless Channels

  • Huang, Jing Jing;Jiang, Ting
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.524-539
    • /
    • 2014
  • To investigate schemes of secret key generation from Ultra-wideband (UWB) channel, we study a statistical characterization of UWB outdoor channel for a campus playground scenario based on extensive measurements. Moreover, an efficient secret key generation mechanism exploiting multipath relative delay is developed, and verification of this algorithm is conducted in UWB Line-of-sight (LOS) outdoor channels. For the first time, we compare key-mismatch probability of UWB indoor and outdoor environments. Simulation results demonstrate that the number of multipath proportionally affects key generation rate and key-mismatch probability. In comparison to the conventional method using received signal strength (RSS) as a common random source, our mechanism achieves better performance in terms of common secret bit generation. Simultaneously, security analysis indicates that the proposed scheme can still guarantee security even in the sparse outdoor physical environment free of many reflectors.

HRKT: A Hierarchical Route Key Tree based Group Key Management for Wireless Sensor Networks

  • Jiang, Rong;Luo, Jun;Wang, Xiaoping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.2042-2060
    • /
    • 2013
  • In wireless sensor networks (WSNs), energy efficiency is one of the most essential design considerations, since sensor nodes are resource constrained. Group communication can reduce WSNs communication overhead by sending a message to multiple nodes in one packet. In this paper, in order to simultaneously resolve the transmission security and scalability in WSNs group communications, we propose a hierarchical cluster-based secure and scalable group key management scheme, called HRKT, based on logic key tree and route key tree structure. The HRKT scheme divides the group key into cluster head key and cluster key. The cluster head generates a route key tree according to the route topology of the cluster. This hierarchical key structure facilitates local secure communications taking advantage of the fact that the nodes at a contiguous place usually communicate with each other more frequently. In HRKT scheme, the key updates are confined in a cluster, so the cost of the key updates is reduced efficiently, especially in the case of massive membership changes. The security analysis shows that the HRKT scheme meets the requirements of group communication. In addition, performance simulation results also demonstrate its efficiency in terms of low storage and flexibility when membership changes massively.

New decoupled wavelet bases for multiresolution structural analysis

  • Wang, Youming;Chen, Xuefeng;He, Yumin;He, Zhengjia
    • Structural Engineering and Mechanics
    • /
    • v.35 no.2
    • /
    • pp.175-190
    • /
    • 2010
  • One of the intractable problems in multiresolution structural analysis is the decoupling computation between scales, which can be realized by the operator-orthogonal wavelets based on the lifting scheme. The multiresolution finite element space is described and the formulation of multiresolution finite element models for structural problems is discussed. Various operator-orthogonal wavelets are constructed by the lifting scheme according to the operators of multiresolution finite element models. A dynamic multiresolution algorithm using operator-orthogonal wavelets is proposed to solve structural problems. Numerical examples demonstrate that the lifting scheme is a flexible and efficient tool to construct operator-orthogonal wavelets for multiresolution structural analysis with high convergence rate.

Optical Asymmetric Cryptography Modifying the RSA Public-key Protocol

  • Jeon, Seok Hee;Gil, Sang Keun
    • Current Optics and Photonics
    • /
    • v.4 no.2
    • /
    • pp.103-114
    • /
    • 2020
  • A new optical asymmetric cryptosystem is proposed by modifying the asymmetric RSA public-key protocol required in a cryptosystem. The proposed asymmetric public-key algorithm can be optically implemented by combining a two-step quadrature phase-shifting digital holographic encryption method with the modified RSA public-key algorithm; then two pairs of public-private keys are used to encrypt and decrypt the plaintext. Public keys and ciphertexts are digital holograms that are Fourier-transform holograms, and are recorded on CCDs with 256-gray-level quantized intensities in the optical architecture. The plaintext can only be decrypted by the private keys, which are acquired by the corresponding asymmetric public-key-generation algorithm. Schematically, the proposed optical architecture has the advantage of producing a complicated, asymmetric public-key cryptosystem that can enhance security strength compared to the conventional electronic RSA public-key cryptosystem. Numerical simulations are carried out to demonstrate the validity and effectiveness of the proposed method, by evaluating decryption performance and analysis. The proposed method shows feasibility for application to an asymmetric public-key cryptosystem.

Secure Key Distribution Protocol for ZigBee Wireless Sensor Network (ZigBee 무선 센서 네트워크에서의 안전한 키 분배 프로토콜)

  • Oh, Su-Min;Choi, Soo-Kyeong;Kwon, Ye-Jin;Park, Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.745-759
    • /
    • 2012
  • It is shown in this paper that Yuksel-Nielson's key distribution scheme is not secure against key de-synchronization attack even though their scheme supplement ZigBee-2007 specification's security problems. Furthermore, a new key distribution scheme is proposed, which is the one to fix the security weakness of Yuksel-Nielson's scheme, as well as its security and performance analysis to verify its effectiveness.