• Title/Summary/Keyword: Key account

Search Result 526, Processing Time 0.023 seconds

A modified modal perturbation method for vibration characteristics of non-prismatic Timoshenko beams

  • Pan, Danguang;Chen, Genda;Lou, Menglin
    • Structural Engineering and Mechanics
    • /
    • v.40 no.5
    • /
    • pp.689-703
    • /
    • 2011
  • A new perturbation method is introduced to study the undamped free vibration of a non-prismatic Timoshenko beam for its natural frequencies and vibration modes. For simplicity, the natural modes of vibration of its corresponding prismatic Euler-Bernoulli beam with the same length and boundary conditions are used as Ritz base functions with necessary modifications to account for shear strain in the Timoshenko beam. The new method can transform two coupled partial differential equations governing the transverse vibration of the non-prismatic Timoshenko beam into a set of nonlinear algebraic equations. It significantly simplifies the solution process and is applicable to non-prismatic beams with various boundary conditions. Three examples indicated that the new method is more accurate than the previous perturbation methods. It successfully takes into account the effect of shear deformation of Timoshenko beams particularly at the free end of cantilever structures.

Mobile IPv6 Session Key Distribution Method At Radius-based AAAv6 System

  • Lee Hae Dong;Choi Doo Ho;Kim Hyun Gon
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.581-584
    • /
    • 2004
  • Currently, there are many subscriber access networks: PSTN, ADSL, Cellular Network, IMT200 and so on. To these service providers that provide above network service, it is important that they authenticate and authorize legal subscribers and account for their usage. At present, There exist the several protocols that Support AAA(Authentication, Authorization and Accounting) service : RADIUS, Diameter, TACACS+. Nowadays, RADIUS has used for AAA service widely. It has been extended to support other access network environment. So, we extend RADIUS to support environment of Mobile IPv6. Mobile IPv6 uses IPsec as a security mechanism, basically. But, IPsec is a heavy security technology for small, portable, mobile device. Especially, it is serious at IKE, the subset of IPsec. IKE is a key distribution protocol that distributes the key to the endpoints of IPsec. In t:lis paper, we extend RADIUS to support environment of Mobile IPv6 and simplify the IKE phase of IPsec by AAA system distributing the keys by using its security communication channel. Namely, we propose the key distribution method for IPsec SA establishment between mobile node and home agent. The suggested method was anticipated to be effective at low-power, low computing deyice. Finally, end users feel the faster authentication.

  • PDF

Size-dependent dynamic stability of a FG polymer microbeam reinforced by graphene oxides

  • Wang, Yuewu;Xie, Ke;Fu, Tairan
    • Structural Engineering and Mechanics
    • /
    • v.73 no.6
    • /
    • pp.685-698
    • /
    • 2020
  • The dynamic stability of a functionally graded polymer microbeam reinforced by graphene oxides subjected to a periodic axial force is investigated. The microbeam is assumed to rest on an elastic substrate and is subjected to various immovable boundary restraints. The weight fraction of graphene oxides nanofillers is graded across the beam thickness. The effective Young's modulus of the functionally graded graphene oxides reinforced composite (FG-GORC) was determined using modified Halpin-Tsai model, with the mixture rule used to evaluate the effective Poisson's ratio and the mass density. An improved third order shear deformation theory (TSDT) is used in conjunction with the Chebyshev polynomial-based Ritz method to derive the Mathieu-Hill equations for dynamic stability of the FG-GORC microbeam, in which the scale effect is taken into account based on modified couple stress theory. Then, the Mathieu-Hill equation was solved using Bolotin's method to predict the principle unstable regions of the FG-GORC microbeams. The numerical results show the effects of the small scale, the graphene oxides nanofillers as well as the elastic substrate on the dynamic stability behaviors of the FG-GORC microbeams.

Reliability Evaluation of Power System Operations Considering Time-Varying Features of Components

  • Hu, Bo;Zheng, Ying;Yang, Hejun;Xia, Yun
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.4
    • /
    • pp.1422-1431
    • /
    • 2015
  • The reliability of power system components can be affected by a numbers of factors such as the health level of components, external environment and operation environment of power systems. These factors also affect the electrical parameters of power system components for example the thermal capacity of a transmission element. The relationship of component reliability and power system is, therefore, a complex nonlinear function related to the above-mentioned factors. Traditional approaches for reliability assessment of power systems do not take the influence of these factors into account. The assessment results could not, therefore, reflect the short-term trend of the system reliability performance considering the influence of the key factors and provide the system dispatchers with enough information to make decent operational decisions. This paper discusses some of these important operational issues from the perspective of power system reliability. The discussions include operational reliability of power systems, reliability influence models for main performance parameters of components, time-varying reliability models of components, and a reliability assessment algorithm for power system operations considering the time-varying characteristic of various parameters. The significance of these discussions and applications of the proposed techniques are illustrated by case study results using the IEEE-RTS.

Numerical simulation of 3-D probabilistic trajectory of plate-type wind-borne debris

  • Huang, Peng;Wang, Feng;Fu, Anmin;Gu, Ming
    • Wind and Structures
    • /
    • v.22 no.1
    • /
    • pp.17-41
    • /
    • 2016
  • To address the uncertainty of the flight trajectories caused by the turbulence and gustiness of the wind field over the roof and in the wake of a building, a 3-D probabilistic trajectory model of flat-type wind-borne debris is developed in this study. The core of this methodology is a 6 degree-of-freedom deterministic model, derived from the governing equations of motion of the debris, and a Monte Carlo simulation engine used to account for the uncertainty resulting from vertical and lateral gust wind velocity components. The influence of several parameters, including initial wind speed, time step, gust sampling frequency, number of Monte Carlo simulations, and the extreme gust factor, on the accuracy of the proposed model is examined. For the purpose of validation and calibration, the simulated results from the 3-D probabilistic trajectory model are compared against the available wind tunnel test data. Results show that the maximum relative error between the simulated and wind tunnel test results of the average longitudinal position is about 20%, implying that the probabilistic model provides a reliable and effective means to predict the 3-D flight of the plate-type wind-borne debris.

A Study on the Secure Authentication Method using SIP in the VoIP System (VoIP 시스템에서 SIP를 이용한 보안 인증기법에 관한 연구)

  • Lee, Young Gu;Kim, Jeong Jai;Park, Chan Kil
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.31-39
    • /
    • 2011
  • VoIP service uses packet network of ip-based because that has eavesdropping, interception, illegal user as vulnerable elements. In addition, PSTN of existing telephone network is subordinate line but VoIP service using the ip packet provide mobility. so The user authentication and VoIP user's account service using VoIP has emerged as a problem. To solve the vulnerability of SIP, when you use VoIP services with SIP, this paper has made it possible to authenticate user's terminal by using proxy server and proxy server by using authentication server. In conclusion, sender and receiver are mutually authenticated. In the mutual authentication process, the new session key is distributed after exchanging for the key between sender and receiver. It is proposed to minimize of service delay while the additional authentication. The new session key is able to authenticate about abnormal messages on the phone. This paper has made it possible to solve the vulnerability of existing SIP authentication by using mutual authentication between user and proxy server and suggest efficient VoIP service which simplify authentication procedures through key distribution after authentication.

An Efficient Protocol for the Cross Certification Path Validation (경로기반 상호인증을 위한 효율적 프로토콜)

  • 김홍석;박세현
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.217-220
    • /
    • 2000
  • With the expansion of E-commerce, Public Key Infrastructure (PKI) solutions are requited to resolve Internet security problems. But the certification mechanism for each organization has been independently developed under its own circumstances, so the cooperation of heterogeneous certification mechanisms must be carefully taken into account. In this paper, we propose an efficient protocol for the cross certification based on the path validation. The proposed “cross certification gateway” provides flexibility and convenience with the initial establishment protocol for the cross certification among different certification domains.

  • PDF

Lichen Genus Porina in Vietnam

  • Joshi, Santosh;Upreti, Dalip K.;Hur, Jae-Seoun
    • The Korean Journal of Mycology
    • /
    • v.47 no.4
    • /
    • pp.303-311
    • /
    • 2019
  • An identification key to twenty-nine species of Porina known from Vietnam is provided. In addition, new records of Porina eminentior, P. meridionalis and P. nuculastrum are described from the protected rain forests in southern Vietnam. A detailed taxonomic account of the newly reported species is provided and supported by its ecology, distribution, and illustrations.

UAV Autopilot Design under External Disturbances

  • Eun, Youn-Ju;Hyochoong Bang;Tahk, Min-Jea
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.40.3-40
    • /
    • 2002
  • Unmanned Aerial Vehicle(UAV) needs autonomous flight capability to accomplish various mission objectives. For this objective, the autopilot is a key element in the UAV system design. The principal goal of autopilot is to guide the aircraft under varying external disturbances throughout the mission phases. The external disturbances include gravity effect, wind gust, and other unexpected obstacles. The gust affects the aircraft flight performance to a significant extent. UAV's low speed, light weight, and the absence of human judgment makes un predictable gust more dangerous. Autopilot design in general takes the gust effect into account to satisfy flight performance requirement. In this study..

  • PDF

Risk of High Temperatures on Rice Production in China: Observation, Simulation and Prediction

  • Tao, Fulu;Shi, Wenjiao
    • Proceedings of The Korean Society of Agricultural and Forest Meteorology Conference
    • /
    • 2016.09a
    • /
    • pp.44-48
    • /
    • 2016
  • Extreme temperature impacts on field crop are of key concern and increasingly assessed, however the studies have seldom taken into account the automatic adaptations such as shifts in planting dates, phenological dynamics and cultivars. In this present study, trial data on rice phenology, agro-meteorological hazards and yields during 1981-2009 at 120 national agro-meteorological experiment stations were used. The detailed data provide us a unique opportunity to quantify extreme temperature impacts on rice yield more precisely and in a setting with automatic adaptations.

  • PDF