• Title/Summary/Keyword: Key Change

Search Result 1,926, Processing Time 0.034 seconds

Molecular dynamics study of liquid sodium film evaporation and condensation by Lennard-Jones potential

  • Wang, Zetao;Guo, Kailun;Wang, Chenglong;Zhang, Dalin;Tian, Wenxi;Qiu, Suizheng;Su, Guanghui
    • Nuclear Engineering and Technology
    • /
    • v.54 no.8
    • /
    • pp.3117-3129
    • /
    • 2022
  • Deeply understanding the phase change of thin liquid sodium film inside wick pore is very important for further studying high-temperature sodium heat pipe's heat transfer. For the first time, the evaporation and condensation of thin liquid sodium film are investigated by the Lennard-Jones potential of molecular dynamics. Based on the startup and normal operation of the sodium heat pipe, three different cases are simulated. First, the equilibrium is achieved and the Mass Accommodation Coefficients of the three cases are 0.3886, 0.2119, 0.2615 respectively. Secondly, the non-equilibrium is built. The change of liquid film thickness, the number of gas atoms, the net evaporation flux (Jnet), the heat transfer coefficient (h) at the liquid-gas interface are acquired. Results indicate that the magnitude of the Jnet and the h increase with the basic equilibrium temperature. In 520-600 K (the startup of the heat pipe), the h has approached 5-6 W m-2 K-1 while liquid film thickness is in 11-13 nm. The fact shows that during the initial startup of the sodium heat pipe, the thermal resistance at the liquid-gas interface can't be negligible. This work is the complement and extension for macroscopic investigation of heat transfer inside sodium heat pipe. It can provide a reference for further numerical simulation and optimal design of the sodium heat pipe in the future.

CKGS: A Way Of Compressed Key Guessing Space to Reduce Ghost Peaks

  • Li, Di;Li, Lang;Ou, Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.1047-1062
    • /
    • 2022
  • Differential power analysis (DPA) is disturbed by ghost peaks. There is a phenomenon that the mean absolute difference (MAD) value of the wrong key is higher than the correct key. We propose a compressed key guessing space (CKGS) scheme to solve this problem and analyze the AES algorithm. The DPA based on this scheme is named CKGS-DPA. Unlike traditional DPA, the CKGS-DPA uses two power leakage points for a combined attack. The first power leakage point is used to determine the key candidate interval, and the second is used for the final attack. First, we study the law of MAD values distribution when the attack point is AddRoundKey and explain why this point is not suitable for DPA. According to this law, we modify the selection function to change the distribution of MAD values. Then a key-related value screening algorithm is proposed to obtain key information. Finally, we construct two key candidate intervals of size 16 and reduce the key guessing space of the SubBytes attack from 256 to 32. Simulation experimental results show that CKGS-DPA reduces the power traces demand by 25% compared with DPA. Experiments performed on the ASCAD dataset show that CKGS-DPA reduces the power traces demand by at least 41% compared with DPA.

Thoughts on Climate Change Education In Korea (우리나라 기후 변화 교육의 방향에 관한 고찰)

  • Kim, Chan-Kook;Choi, Don-Hyung
    • Hwankyungkyoyuk
    • /
    • v.23 no.1
    • /
    • pp.1-12
    • /
    • 2010
  • Facing the issue of global climate change, it is important for environmental educators to prepare a person who is able to understand of, communicate about, and make informed decisions on the climate change. Climate change education is to help learners understand of human influence on climate and climate's influence on them and society. This study was conducted in a way to discuss how climate change education could be implemented in Korean context. For this purpose, several documents and research articles on climate change education and communication were analyzed: Climate literacy, guidelines for K-12 global climate change education, and guidelines for effective climate change communication and message and so on. Many of the documents emphasize age appropriateness, positive thinking, participation and empowerment in climate change education while suggesting not to burden young learners with fears. Some documents such as the climate literacy suggest key concepts and/or essential principles of climate change education. Based upon the analysis, several considerations to incorporate the concepts in climate change into educational programs were suggested for further discussions.

  • PDF

A Secure Multicast Key Distribution Protocol (안전한 멀티캐스트 키분배 프로토콜)

  • 조현호;박영호;이경현
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.152-156
    • /
    • 2001
  • In this paper we propose a secure multicast key distribution protocol using OFT(One-way Function Trees). The proposed protocol is a hybrid scheme of DKMP(Distributed Key Management Protocol) that guarantees all group member's participation for generating a group key, and CKMP(Centralized Key Management Protocol) that makes it easy to manage group key and design a protocol. Since the proposed protocol also computes group key using only hash function and bitwise-XOR, computational overhead ran be reduced. Hence it is suitably and efficiently adaptive to dynamic multicast environment that membership change event frequently occurs.

  • PDF

The Monitoring System for Informing the Change of Contents on the Web Sites (웹 사이트 컨텐츠 변경 모니터링 시스템)

  • 김원중;조이기;손철수
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.4
    • /
    • pp.505-512
    • /
    • 2002
  • Fast spreading of web made we get easily the vast amount of information all over the world, but quantity of great information on the Internet space is giving much troubles to recognize change of information that users are interested soon justly. That is, users must connect and examine one by one to relevant site to detect change of web documents that changes from time to time. Therefore, the development of Robot which accomplish Information change monitoring function that sense automatically changed contents and inform to user is required. In this paper, we designed and implemented Web site contents change monitoring system, which notify-automatically the change of Web documents to users through alarm or E-mail if user defines target URL to do monitoring, monitoring condition, monitoring period etc. And we presented the method that structure and classify Web Documents to semantic units using HTML Tag. Also, we introduced the concept of virtual key to manage position of word to watch some change efficiently.

$H_{\infty}$ filter for flexure deformation and lever arm effect compensation in M/S INS integration

  • Liu, Xixiang;Xu, Xiaosu;Wang, Lihui;Li, Yinyin;Liu, Yiting
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.6 no.3
    • /
    • pp.626-637
    • /
    • 2014
  • On ship, especially on large ship, the flexure deformation between Master (M)/Slave (S) Inertial Navigation System (INS) is a key factor which determines the accuracy of the integrated system of M/S INS. In engineering this flexure deformation will be increased with the added ship size. In the M/S INS integrated system, the attitude error between MINS and SINS cannot really reflect the misalignment angle change of SINS due to the flexure deformation. At the same time, the flexure deformation will bring the change of the lever arm size, which further induces the uncertainty of lever arm velocity, resulting in the velocity matching error. To solve this problem, a $H_{\infty}$ algorithm is proposed, in which the attitude and velocity matching error caused by deformation is considered as measurement noise with limited energy, and measurement noise will be restrained by the robustness of $H_{\infty}$ filter. Based on the classical "attitude plus velocity" matching method, the progress of M/S INS information fusion is simulated and compared by using three kinds of schemes, which are known and unknown flexure deformation with standard Kalman filter, and unknown flexure deformation with $H_{\infty}$ filter, respectively. Simulation results indicate that $H_{\infty}$ filter can effectively improve the accuracy of information fusion when flexure deformation is unknown but non-ignorable.

Research on key management for supervisory control and data acquisition system (원격 감시 제어시스템에서 키 관리 방안 연구)

  • Lee, Keonjik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.4
    • /
    • pp.29-42
    • /
    • 2020
  • SCADA (Supervisory Control and Data Acquisition) systems for remote monitoring, data acquisition and control are applied to major industrial infrastructures including power, water and railroad. Recently, there are many researches on key management scheme for secure communication due to change to the open network environment. These systems are located at far distances and are connected to the main control center through various types of communication methods. Due to the nature of these systems, they are becoming the significant targets of cyber attack. We propose an efficient key management scheme which is established on ID-based cryptosystem without an expensive computation on MTU (Master Terminal Unit), Sub-MTU, and RTU (Remote Terminal Unit). The proposed method is secure and effective in key management among multiple legitimate devices.

Comparison of Piano Key and Rectangular Labyrinth Weir Discharge Efficiency

  • Anh Tuan Le
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.39-39
    • /
    • 2023
  • Nonlinear weirs, such as labyrinth and piano key weirs, are suitable methods to handle increased flood flows that may be expected due to climate change. Although specific physical models are considered to be an effective way of investigating fluid flows, simply conducting physical model tests is insufficient to fully comprehend the hydraulic and discharge characteristics of non-linear weirs. In this study, computational fluid dynamics algorithms have been used extensively to investigate complex flow physics instead of relying on reduced scale models. The discharge capacity of the piano key weir and the rectangular labyrinth weir is compared using a three-dimensional numerical model, which is validated by the available experimental data. The results confirm that piano key weir is more efficient than the rectangular labyrinth weir for a wide range of head water ratios. By analyzing the contribution of discharge over inlet, outlet and sidewall crests, the factor that make the piano key weir superior to the rectangular weir is the sidewall discharge.

  • PDF

The Stabilizing Role of Cyclodextrins on Keggin Phosphotungstic Acid by Complexation Unveiled by Electrospray Mass Spectrometry

  • Fan, YanXuan;Zhang, Yan;Jia, QiaoDi;Cao, Jie;Wu, WenJie
    • Mass Spectrometry Letters
    • /
    • v.6 no.1
    • /
    • pp.13-16
    • /
    • 2015
  • This study demonstrated the stabilizing role of a cyclodextrin on Keggin $[PW_{12}O_{40}]^{3-}$ via hydrogen bonding complexation unveiled by ESI-MS. The distinctive fragmentation pathways of the $\{PW_{12}\}/{\gamma}$-CD complexes from that of discrete $[PW_{12}O_{40}]^{3-}$ showed that the so-called "weak" non-covalent interactions can effectively change the dissociation chemistry of POM in the gas phase. The influence of different types of solvents and organic additives such as ${\gamma}$-CD on the stability of Keggin $[PW_{12}O_{40}]^{3-}$ was also addressed firstly by ESI-MS.

Design of Multicast Group Key Management Protocol for Information Security in PIM_SM (PIM-SM 정보 보안을 위한 멀티캐스트 그룹 키 관리 프로토콜 설계)

  • 홍종준
    • Journal of Internet Computing and Services
    • /
    • v.3 no.5
    • /
    • pp.87-94
    • /
    • 2002
  • This paper proposes a group key management protocol for a secure of all the multcast user in PIM-SM multicast group communication. Each subgroup manager gives a secure key to it's own transmitter and the transmitter compress the data with it's own secure key from the subgroup manager, Before the transmitter send the data to receiver, the transmitter prepares to encrypt a user's service by sending a encryption key to the receiver though the secure channel. after checking the user's validity through the secure channel, As the transmitter sending a data after then, the architecture is designed that the receiver will decode the received data with the transmitter's group key, Therefore, transmission time is shortened because there is no need to data translation by the group key on data sending and the data transmition is possible without new key distribution at path change to shortest path of the router characteristic.

  • PDF