• 제목/요약/키워드: Dynamic keys

검색결과 49건 처리시간 0.025초

쉬어키를 가진 면진건축물의 동적해석 (Dynamic Analysis for Base Isolated Structure with Shear Keys)

  • 한덕전;김태호
    • 한국공간구조학회논문집
    • /
    • 제7권1호
    • /
    • pp.45-53
    • /
    • 2007
  • 지진 다발 지역인 일본에서 최근 초고층 건축물에 전단키를 갖는 면진 구조물에 많이 건설되고 있으며 초고층 건축물은 중저층 건축물과 비교하여 고유진동주수가 크기 때문에 지진하중이 작아 지진에 대한 피해가 적다. 지진에 의하여 큰 전단력이 발생할 경우에 전단키를 갖는 면진장치의 전단키는 파괴되고 면진장치가 지진에 거동하게 되며 만약에 퐁하중이 지진하중보다 크다면 전단키를 지진하중에 대하여 설계하는 것이 아니라 풍하중에 의하여 설계하여야 한다. 중진지역인 한국에서도 면진 건축물에 있어서 전단키의 필요성 요구되며 이에 대한 검증이 필요한 실정이다. 본 논문에서는 5층과 15층 면진 건축물에 대하여 전단키를 적용하고 지진해석을 실시하여 그 거동을 비교분석, 면진 건축물에 대한 전단키의 필요성을 알아보았다.

  • PDF

전단키와 있는 다경간 연속교의 지진응답특성 (SEISMIC RESPONSE CHARACTERISTICS OF THE MULTI-SPAN CONTINUOUS GBRIDGE WITH SHEAR KEYS)

  • 이지훈
    • 한국지진공학회:학술대회논문집
    • /
    • 한국지진공학회 1998년도 추계 학술발표회 논문집 Proceedings of EESK Conference-Spring 1998
    • /
    • pp.120-127
    • /
    • 1998
  • This paper deals with the dynamic responses of the multi-span continuous bridge with longitudinal shear keys. It is motivated by a need to understand the effects of longitudinal shear keys which may be used for the reduction of the longitudinal seismic force in continuous bridges. The results show that (1) The force reduction of fixed pier is proportional to the ratio of gap size and elastic maximum displacement of the bridges without shear keys ; (2) The thermal movement has little effect on the response of the continuous bridges with shear keys. Also the simplified equation is proposed to calculate the maximum response of the continuous bridges with longitudinal shear keys. The equation requires only the elastic analysis results of the bridge and the gap size between superstructure and shear keys.

  • PDF

Effects of shear keys on seismic performance of an isolation system

  • Wei, Biao;Li, Chaobin;Jia, Xiaolong;He, Xuhui;Yang, Menggang
    • Smart Structures and Systems
    • /
    • 제24권3호
    • /
    • pp.345-360
    • /
    • 2019
  • The shear keys are set in a seismic isolation system to resist the long-term service loadings, and are cut off to isolate the earthquakes. This paper investigated the influence of shear keys on the seismic performance of a vertical spring-viscous damper-concave Coulomb friction isolation system by an incremental dynamic analysis (IDA) and a performance-based assessment. Results show that the cutting off process of shear keys should be simulated in a numerical analysis to accurately predict the seismic responses of isolation system. Ignoring the cutting off process of shear keys usually leads to untrue seismic responses in a numerical analysis, and many of them are unsafe for the design of isolated structure. And those errors will be increased by increasing the cutting off force of shear keys and decreasing the spring constant of shear keys, especially under a feeble earthquake. The viscous damping action postpones the cutting off time of shear keys during earthquakes, and reduces the seismic isolation efficiency. However, this point can be improved by increasing the spring constant of shear keys.

매트릭스 구성 키보드의 n-키 롤-오버 처리를 위한 소프트웨어 알고리즘에 관한 연구 (A Study on Software algorithm for Processing n-key roll-over at Matrix Keyboard)

  • 전호익;이현창
    • 한국소프트웨어감정평가학회 논문지
    • /
    • 제16권1호
    • /
    • pp.89-94
    • /
    • 2020
  • 본 논문에서는 매트릭스 형태로 구성된 키보드의 다이나믹 스캐닝 검출에 있어 눌리는 키의 수에 제한 없이 모든 키를 감지하는 n-키 롤-오버를 구성할 수 있는 소프트웨어 알고리즘을 제시하였다. 제시한 알고리즘은 컴퓨터 키보드 제어용 마이크로컨트롤러의 타이머 인터럽트를 이용하므로 일정하고 정확한 검출 간격을 얻을 수 있으며, 정확한 디바운스 시간을 부여할 수 있는 장점이 있다. 제시한 알고리즘의 효과를 확인하기 위해 건반 형태로 구성된 장난감 키보드에 마이크로컨트롤러를 접속하고 실험을 진행하였으며, 실험 결과 동시에 눌리는 키의 수에 관계없이 모든 키에 대한 검출이 정확히 이루어짐을 확인하였다.

Fragility curves for the typical multi-span simply supported bridges in northern Pakistan

  • Waseem, Muhammad;Spacone, Enrico
    • Structural Engineering and Mechanics
    • /
    • 제64권2호
    • /
    • pp.213-223
    • /
    • 2017
  • Bridges are lifeline and integral components of transportation system that are susceptible to seismic actions, their vulnerability assessment is essential for seismic risk assessment and mitigation. The vulnerability assessment of bridges common in Pakistan is very important as it is seismically very active region and the available code for the seismic design of bridges is obsolete. This research presents seismic vulnerability assessment of three real case simply supported multi-span reinforced concrete bridges commonly found in northern Pakistan, having one, two and three bents with circular piers. The vulnerability assessment is carried through the non-linear dynamic time history analyses for the derivation of fragility curves. Finite element based numerical models of the bridges were developed in MIDAS CIVIL (2015) and analyzed through with non-linear dynamic and incremental dynamic analyses, using a suite of bridge-specific natural spectrum compatible ground motion records. Seismic responses of shear key, bearing pad, expansion joint and pier components of each bridges were recorded during analysis and retrieved for performance based analysis. Fragility curves were developed for the bearing pads, shear key, expansion joint and pier of the bridges that first reach ultimate limit state. Dynamic analysis and the derived fragility curves show that ultimate limit state of bearing pads, shear keys and expansion joints of the bridges exceed first, followed by the piers ultimate limit state for all the three bridges. Mean collapse capacities computed for all the components indicated that bearing pads, expansion joints, and shear keys exceed the ultimate limit state at lowest seismic intensities.

Solving the Discrete Logarithm Problem for Ephemeral Keys in Chang and Chang Password Key Exchange Protocol

  • Padmavathy, R.;Bhagvati, Chakravarthy
    • Journal of Information Processing Systems
    • /
    • 제6권3호
    • /
    • pp.335-346
    • /
    • 2010
  • The present study investigates the difficulty of solving the mathematical problem, namely the DLP (Discrete Logarithm Problem) for ephemeral keys. The DLP is the basis for many public key cryptosystems. The ephemeral keys are used in such systems to ensure security. The DLP defined on a prime field $Z^*_p of random prime is considered in the present study. The most effective method to solve the DLP is the ICM (Index Calculus Method). In the present study, an efficient way of computing the DLP for ephemeral keys by using a new variant of the ICM when the factors of p-1 are known and small is proposed. The ICM has two steps, a pre-computation and an individual logarithm computation. The pre-computation step is to compute the logarithms of a subset of a group and the individual logarithm step is to find the DLP using the precomputed logarithms. Since the ephemeral keys are dynamic and change for every session, once the logarithms of a subset of a group are known, the DLP for the ephemeral key can be obtained using the individual logarithm step. Therefore, an efficient way of solving the individual logarithm step based on the newly proposed precomputation method is presented and the performance is analyzed using a comprehensive set of experiments. The ephemeral keys are also solved by using other methods, which are efficient on random primes, such as the Pohlig-Hellman method, the Van Oorschot method and the traditional individual logarithm step. The results are compared with the newly proposed individual logarithm step of the ICM. Also, the DLP of ephemeral keys used in a popular password key exchange protocol known as Chang and Chang are computed and reported to launch key recovery attack.

블록 암호알고리즘을 위한, 추적불가능한 동적 키를 갖는 연산모드 (A Mode for Block Ciphers, with Untraceable Dynamic Keys)

  • 김윤정;조유근
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 1999년도 가을 학술발표논문집 Vol.26 No.2 (3)
    • /
    • pp.285-287
    • /
    • 1999
  • 블록 암호알고리즘에 대한 기존의 연산 모드들(ECB 또는 CBC 등)은, 각 블록에 대하여 동일한 키로 암호화를 수행한다. 이것은 침입자가 한번의 암호 요청만을 수행하여 많은 수의 평문/암호문 쌍을 얻을 수 있게 함으로써 차분해독법 등의 공격에는 안전성을 제공하지 않는다. 본 논문에서는 블록 암호 알고리즘을 위한 새로운 모드를 제안하는데, 이 모드에서는 암호화되는 각각의 블록이 서로 다른 키로 암호화되도록 함으로써 블록의 개수가 많아짐에 따라 안전성 면에서 상당한 이득을 얻게 된다. 각 블록을 위한 서로 다른 키를 생성하는 것이 추가 연산을 필요로 하지만, 제안하는 모드를 DES에 적용한 TDK(a mode for DEA with unTraceable Dynamic Keys)의 수행 시간을 pentium과 sun sparc 상에서 측정해 본 결과 ECB 모드와 거의 유사함을 알 수 있었다.

  • PDF

스털링 엔진용 스크롤 팽창기의 동적 거동해석 (Dynamic analysis on the scroll expander for Stirling engine)

  • 김성준;김우영;김현진
    • 대한설비공학회:학술대회논문집
    • /
    • 대한설비공학회 2008년도 하계학술발표대회 논문집
    • /
    • pp.177-183
    • /
    • 2008
  • For 10 kW-class Stirling engine using scroll expander and scroll compressor, considerations on thermal expansion of the fixed and orbiting scroll members of the scroll expander due to high gas temperature at the expander inlet has resulted in adopting of the keys between the fixed scroll and main frame for the fixed scroll side and spring type insertion between the orbiting scroll base plate and supporting holders for orbiting scroll side. Dynamic analysis on the fixed and orbiting scroll members and the shafts of the scroll expander showed that using of these devices for complying thermal expansion caused large variations of the forces acting on the fixed scroll keys and on the power transmitting shafts and also on the shaft bearings.

  • PDF

SPCBC: A Secure Parallel Cipher Block Chaining Mode of Operation based on logistic Chaotic Map

  • El-Semary, Aly M.;Azim, Mohamed Mostafa A.;Diab, Hossam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권7호
    • /
    • pp.3608-3628
    • /
    • 2017
  • Several block cipher modes of operation have been proposed in the literature to protect sensitive information. However, different security analysis models have been presented for attacking them. The analysis indicated that most of the current modes of operation are vulnerable to several attacks such as known plaintext and chosen plaintext/cipher-text attacks. Therefore, this paper proposes a secure block cipher mode of operation to thwart such attacks. In general, the proposed mode combines one-time chain keys with each plaintext before its encryption. The challenge of the proposed mode is the generation of the chain keys. The proposed mode employs the logistic map together with a nonce to dynamically generate a unique set of chain keys for every plaintext. Utilizing the logistic map assures the dynamic behavior while employing the nonce guarantees the uniqueness of the chain keys even if the same message is encrypted again. In this way, the proposed mode called SPCBC can resist the most powerful attacks including the known plaintext and chosen plaintext/cipher-text attacks. In addition, the SPCBC mode improves encryption time performance through supporting parallelized implementation. Finally, the security analysis and experimental results demonstrate that the proposed mode is robust compared to the current modes of operation.

(2,4)-트리를 이용한 그룹키 관리 (Group Key Management using (2,4)-Tree)

  • 조태남;이상호
    • 정보보호학회논문지
    • /
    • 제11권4호
    • /
    • pp.77-89
    • /
    • 2001
  • 통신 기술의 발달로 최근 원격화상회의나 다중 사용자 게임 등 그룹 중심의 응용이나 서비스가 증가하고 있다. 그러한 정보에 대한 접근제어의 수단으로서 그룹 구성원들이 하나의 그룹키를 공유하여 비밀통신을 하는데, 규모가 크고 동적인 그룹인 경우에는 효율적인 그룹키 갱신 방법이 매우 중요하다. 본 논문에서는 구성원의 가입 및 탈퇴시 발생하는 키갱신의 효율성을 높이기 위하여 높이 균형 트리인 (2,4)-트리를 이용하여 키-트리를 구성하였다. 특히, CBT (Core Based Tree)를 이용하여 네트웍 구성 정보를 유지하도록 하고 이를 키-트리 구성에 반영하도록 함으로써, 네트웍 장애 및 복구로 발생하는 일부 그룹의 분할과 병합 시에도 효율적으로 키갱신을 수행할 수 있는 방안을 제시하였다.