• 제목/요약/키워드: Key Technology

검색결과 9,621건 처리시간 0.031초

Convergence study of traditional 2D/1D coupling method for k-eigenvalue neutron transport problems with Fourier analysis

  • Boran Kong ;Kaijie Zhu ;Han Zhang ;Chen Hao ;Jiong Guo ;Fu Li
    • Nuclear Engineering and Technology
    • /
    • 제55권4호
    • /
    • pp.1350-1364
    • /
    • 2023
  • 2D/1D coupling method is an important neutron transport calculation method due to its high accuracy and relatively low computation cost. However, 2D/1D coupling method may diverge especially in small axial mesh size. To analyze the convergence behavior of 2D/1D coupling method, a Fourier analysis for k-eigenvalue neutron transport problems is implemented. The analysis results present the divergence problem of 2D/1D coupling method in small axial mesh size. Several common attempts are made to solve the divergence problem, which are to increase the number of inner iterations of the 2D or 1D calculation, and two times 1D calculations per outer iteration. However, these attempts only could improve the convergence rate but cannot deal with the divergence problem of 2D/1D coupling method thoroughly. Moreover, the choice of axial solvers, such as DGFEM SN and traditional SN, and its effect on the convergence behavior are also discussed. The results show that the choice of axial solver is a key point for the convergence of 2D/1D method. The DGFEM SN based 2D/1D method could converge within a wide range of optical thickness region, which is superior to that of traditional SN method.

Performance Analysis of Spiral Axicon Wavefront Coding Imaging System for Laser Protection

  • Haoqi Luo;Yangliang Li;Junyu Zhang;Hao Zhang;Yunlong Wu;Qing Ye
    • Current Optics and Photonics
    • /
    • 제8권4호
    • /
    • pp.355-365
    • /
    • 2024
  • Wavefront coding (WFC) imaging systems can redistribute the energy of an interference laser spot on an image plane sensor by wavefront phase modulation and reduce the peak intensity, realizing laser protection while maintaining imaging functionality by leveraging algorithmic post-processing. In this paper, a spiral axicon WFC imaging system is proposed, and the performance for laser protection is investigated by constructing a laser transmission model. An Airy disk on an image plane sensor is refactored into a symmetrical hollow ring by a spiral axicon phase mask, and the maximum intensity can be reduced to lower than 1% and single-pixel power to 1.2%. The spiral axicon phase mask exhibits strong robustness to the position of the interference laser source and can effectively reduce the risk of sensor damage for an almost arbitrary lase propagation distance. Moreover, we revealed that there is a sensor hazard distance for both conventional and WFC imaging systems where the maximum single-pixel power reaches a peak value under irradiation of a power-fixed laser source. Our findings can offer guidance for the anti-laser reinforcement design of photoelectric imaging systems, thereby enhancing the adaptability of imaging systems in a complex laser environment. The laser blinding-resistant imaging system has potential applications in security monitoring, autonomous driving, and intense-laser-pulse experiments.

Identity Based Proxy Re-encryption Scheme under LWE

  • Yin, Wei;Wen, Qiaoyan;Li, Wenmin;Zhang, Hua;Jin, Zheng Ping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권12호
    • /
    • pp.6116-6132
    • /
    • 2017
  • The proxy re-encryption allows an intermediate proxy to convert a ciphertext for Alice into a ciphertext for Bob without seeing the original message and leaking out relevant information. Unlike many prior identity based proxy re-encryption schemes which are based on the number theoretic assumptions such as large integer factorization and discrete logarithm problem. In this paper, we first propose a novel identity based proxy re-encryption scheme which is based on the hardness of standard Learning With Error(LWE) problem and is CPA secure in the standard model. This scheme can be reduced to the worst-case lattice hard problem that is able to resist attacks from quantum algorithm. The key step in our construction is that the challenger how to answer the private query under a known trapdoor matrix. Our scheme enjoys properties of the non-interactivity, unidirectionality, anonymous and so on. In this paper, we utilize primitives include G-trapdoor for lattice and sample algorithms to realize simple and efficient re-encryption.

A secure and effective scheme providing comprehensive forward security to LTE/SAE X2 handover key management

  • Sun, Bangyi;Chu, Jianfeng;Hu, Liang;Li, Hongtu;Shi, Guangkun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권9호
    • /
    • pp.4609-4623
    • /
    • 2017
  • The commercialization of LTE/SAE technologies has begun a new era in which data can be transmitted at remarkably high rates. The security of the LTE/SAE network, however, remains problematic. The forward security in LTE/SAE X2 handover key management can be threatened by key compromise and de-synchronization attacks as base station in public spaces can be compromised. This study was conducted to address the lack of forward key security in X2 handover key management in scenarios in which an adversary controls a legal base station. We developed the proposed X2 handover key management by changing the parameter in the renewing step and adding a verification step. We compare the security and performance of our proposal with other similar schemes. Our enhancement scheme ensures forward separation security accompanied by favorable signal and computation load performance.

Microwave Signal Spectrum Broadening System Based on Time Compression

  • Kong, Menglong;Tan, Zhongwei;Niu, Hui;Li, Hongbo;Gao, Hongpei
    • Current Optics and Photonics
    • /
    • 제4권4호
    • /
    • pp.310-316
    • /
    • 2020
  • We propose and experimentally demonstrate an all-optical radio frequency (RF) spectrum broadening system based on time compression. By utilizing the procedure of dispersion compensation values, the frequency domain is broadened by compressing the linear chirp optical pulse which has been multiplexed by the radio frequency. A detailed mathematical description elucidates that the time compression is a very preferred scheme for spectrum broadening. We also report experimental results to prove this method, magnification factor at 2.7, 8 and 11 have been tested with different dispersion values of fiber, the experimental results agree well with the theoretical results. The proposed system is flexible and the magnification factor is determined by the dispersion values, the proposed scheme is a linear system. In addition, the influence of key parameters, for instance optical bandwidth and the sideband suppression ratio (SSR), are discussed. Magnification factor 11 of the proposed system is demonstrated.

Creep of stainless steel under heat flux cyclic loading (500-1000℃) with different mechanical preloads in a vacuum environment using 3D-DIC

  • Su, Yong;Pan, Zhiwei;Peng, Yongpei;Huang, Shenghong;Zhang, Qingchuan
    • Smart Structures and Systems
    • /
    • 제24권6호
    • /
    • pp.759-768
    • /
    • 2019
  • In nuclear fusion reactors, the key structural component (i.e., the plasma-facing component) undergoes high heat flux cyclic loading. To ensure the safety of fusion reactors, an experimental study on the temperature-induced creep of stainless steel under heat flux cyclic loading was performed in the present work. The strains were measured using a stereo digital image correlation technique (3D-DIC). The influence of the heat haze was eliminated, owing to the use of a vacuum environment. The specimen underwent heat flux cycles ($500^{\circ}C-1000^{\circ}C$) with different mechanical preloads (0 kN, 10 kN, 30 kN, and 50 kN). The results revealed that, for a relatively large preload (for example, 50 kN), a single temperature cycle can induce a residual strain of up to $15000{\mu}{\varepsilon}$.

개인키 업데이트가 가능한 공개키 기반 공모자 추적 암호 알고리즘 (A Public Key Traitor Tracing Scheme with Key-update Method)

  • 이문식
    • 한국군사과학기술학회지
    • /
    • 제15권1호
    • /
    • pp.46-56
    • /
    • 2012
  • Traitor Tracing schemes are broadcast encryption systems where at least one of the traitors who were implicated in the construction of a pirate decoder can be traced. This traceability is required in various contents delivery system like satellite broadcast, DMB, pay-TV, DVD and so on. In this paper, we propose a public key traitor tracing scheme with key-update method. If the system manager can update a secret key which is stored in an authorized decode, it makes a pirate decoder useless by updating a secret key A pirate decoder which cannot update a secret key does not decrypt contents in next session or during tracing a traitor, this scheme has merits which will make a pirate decoder useless, therefore this scheme raises the security to a higher level.

Effect of Corticosterone Administration on Small Intestinal Weight and Expression of Small Intestinal Nutrient Transporter mRNA of Broiler Chickens

  • Hu, X.F.;Guo, Yuming;Huang, B.Y.;Zhang, L.B.;Bun, S.;Liu, D.;Long, F.Y.;Li, J.H.;Yang, X.;Jiao, P.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • 제23권2호
    • /
    • pp.175-181
    • /
    • 2010
  • The effects of corticosterone (CORT) administration on the weight of small intestine and the expression of nutrient transporter mRNA in the small intestine of broiler chickens (Gallus gallus domesticus) were investigated. One hundred and eight sevenday-old birds were randomly divided into two equal groups comprising a control group (CTRL) and an experimental group (CORT). CTRL birds were fed a basal diet and the CORT birds were fed a basal diet containing 30 mg corticosterone/kg from d 8 to 21. At 21 d of age, average daily feed intake (ADFI), serum corticosterone level, small intestinal absolute wet weight and relative weight, and relative abundance of SGLT1, CaBP-D28k, PepT1 mRNA in the duodenum and L-FABP mRNA in the jejunum were determined. The results showed that serum corticosterone level, liver weight and small intestinal relative weight (small intestinal wet weight/body weight) of CORT chickens were about 30.15%, 26.72% and 42.20% higher, respectively, than in the CTRL group (p<0.05). CORT birds had relative mRNA abundance of CaBP-D28k and PepT1 in the duodenum, and L-FABP in the jejunum which was 1.77, 1.37 and 1.94 fold higher, respectively, than in the CTRL group (p<0.05); the relative abundance of SGLT1 was 1.67 fold higher than in the CTRL group (p = 0.097). ADFI, small intestinal wet weight and length in CORT-treated broiler chickens was about 29.11%, 31.12% and 12.35% lower, respectively, than in the CTRL group (p<0.05). In conclusion, corticosterone administration lowered the wet weight but increased the relative weight of the small intestine and the expression of intestinal nutrient transporter mRNA of broiler chickens.

Application of SA-SVM Incremental Algorithm in GIS PD Pattern Recognition

  • Tang, Ju;Zhuo, Ran;Wang, DiBo;Wu, JianRong;Zhang, XiaoXing
    • Journal of Electrical Engineering and Technology
    • /
    • 제11권1호
    • /
    • pp.192-199
    • /
    • 2016
  • With changes in insulated defects, the environment, and so on, new partial discharge (PD) data are highly different from the original samples. It leads to a decrease in on-line recognition rate. The UHF signal and pulse current signal of four kinds of typical artificial defect models in gas insulated switchgear (GIS) are obtained simultaneously by experiment. The relationship map of ultra-high frequency (UHF) cumulative energy and its corresponding apparent discharge of four kinds of typical artificial defect models are plotted. UHF cumulative energy and its corresponding apparent discharge are used as inputs. The support vector machine (SVM) incremental method is constructed. Examples show that the PD SVM incremental method based on simulated annealing (SA) effectively speeds up the data update rate and improves the adaptability of the classifier compared with the original method, in that the total sample is constituted by the old and new data. The PD SVM incremental method is a better pattern recognition technology for PD on-line monitoring.

Microstructure and Properties of Er-SiOX Films Synthesized by ion Beam Assisted Deposition

  • Duan, Gao-Song;Zheng, Shu-Qing;Zhang, Xiao-Juan;Qing Yu;Wang Liang
    • Journal of Korean Vacuum Science & Technology
    • /
    • 제6권2호
    • /
    • pp.101-104
    • /
    • 2002
  • Er doped SiOx films have been synthesized by ion beam assisted deposition (IBAD). The morphology and microstructure of films and their annealing behaviors have been examined by using scanning electron microscopy and x-ray diffraction. The composition and properties of films have been systematically investigated.

  • PDF