• Title/Summary/Keyword: Key-point

검색결과 1,839건 처리시간 0.035초

Development of seismic collapse capacity spectra for structures with deteriorating properties

  • Shu, Zhan;Li, Shuang;Gao, Mengmeng;Yuan, Zhenwei
    • Earthquakes and Structures
    • /
    • 제12권3호
    • /
    • pp.297-307
    • /
    • 2017
  • Evaluation on the sidesway seismic collapse capacity of the widely used low- and medium-height structures is meaningful. These structures with such type of collapse are recognized that behave as inelastic deteriorating single-degree-of-freedom (SDOF) systems. To incorporate the deteriorating effects, the hysteretic loop of the nonlinear SDOF structural model is represented by a tri-linear force-displacement relationship. The concept of collapse capacity spectra are adopted, where the incremental dynamic analysis is performed to check the collapse point and a normalized ground motion intensity measure corresponding to the collapse point is used to define the collapse capacity. With a large amount of earthquake ground motions, a systematic parameter study, i.e., the influences of various ground motion parameters (site condition, magnitude, distance to rupture, and near-fault effect) as well as various structural parameters (damping, ductility, degrading stiffness, pinching behavior, accumulated damage, unloading stiffness, and P-delta effect) on the structural collapse capacity has been performed. The analytical formulas for the collapse capacity spectra considering above influences have been presented so as to quickly predict the structural collapse capacities.

A Probabilistic Approach to Small Signal Stability Analysis of Power Systems with Correlated Wind Sources

  • Yue, Hao;Li, Gengyin;Zhou, Ming
    • Journal of Electrical Engineering and Technology
    • /
    • 제8권6호
    • /
    • pp.1605-1614
    • /
    • 2013
  • This paper presents a probabilistic methodology for small signal stability analysis of power system with correlated wind sources. The approach considers not only the stochastic characteristics of wind speeds which are treated as random variables with Weibull distributions, while also the wind speed spatial correlations which are characterized by a correlation matrix. The approach based on the 2m+1 point estimate method and Cornish Fisher expansion, the orthogonal transformation technique is used to deal with the correlation of wind farms. A case study is carried out on IEEE New England system and the probabilistic indexes for eigenvalue analysis are computed from the statistical processing of the obtained results. The accuracy and efficiency of the proposed method are confirmed by comparing with the results of Monte Carlo simulation. The numerical results indicate that the proposed method can actually capture the probabilistic characteristics of mode properties of the power systems with correlated wind sources and the consideration of spatial correlation has influence on the probability of system small signal stability.

Optimal Harvest-Use-Store Design for Delay-Constrained Energy Harvesting Wireless Communications

  • Yuan, Fangchao;Jin, Shi;Wong, Kai-Kit;Zhang, Q.T.;Zhu, Hongbo
    • Journal of Communications and Networks
    • /
    • 제18권6호
    • /
    • pp.902-912
    • /
    • 2016
  • Recent advances in energy harvesting (EH) technology have motivated the adoption of rechargeable mobile devices for communications. In this paper, we consider a point-to-point (P2P) wireless communication system in which an EH transmitter with a non-ideal rechargeable battery is required to send a given fixed number of bits to the receiver before they expire according to a preset delay constraint. Due to the possible energy loss in the storage process, the harvest-use-and-store (HUS) architecture is adopted. We characterize the properties of the optimal solutions, for additive white Gaussian channels (AWGNs) and then block-fading channels, that maximize the energy efficiency (i.e., battery residual) subject to a given rate requirement. Interestingly, it is shown that the optimal solution has a water-filling interpretation with double thresholds and that both thresholds are monotonic. Based on this, we investigate the optimal double-threshold based allocation policy and devise an algorithm to achieve the solution. Numerical results are provided to validate the theoretical analysis and to compare the optimal solutions with existing schemes.

일반화된 Diffie-Hellman 키이분배방식의 안정성 분석 (On Security Analysis of Generalized Diffie-Hellman Key Distribution Systems)

  • 이필중;임채훈
    • 한국통신학회논문지
    • /
    • 제16권7호
    • /
    • pp.575-597
    • /
    • 1991
  • 본 논문에서는 과용 암호시스템을 위한 키이관리 방법으로 1976년 Diffie와 hellman이 처음 제안한 유한체상에서 이진대수 문제의 어려움에 바탕을 둔 공개키이분배 방식의 각종변형들에 대해 그들의 안전성을 중점적으로 분석하여 보다 안전한 시스템을 설계하거나 설계한 시스템을 분석하는데 필요한 체계적인 접근법을 제시하고자 한다. 키이분배 방식에서 가능한 공개방법들을 분류하여 그들에 의해 깨어질 수 있는 시스템들을 기존방식이나 정보이론적 접근법, 그리고 프로토콜 분석법등을 소개하고 이들을 각종 DH KDS의 변형들에 적용하여 그 안전성 여부를 검토한다.

  • PDF

무선 LAN에서 Inter-Access Point Protocol을 이용한 안전한 핸드오버 (Secure Handover Using Inter-Access Point Protocol in Wireless LAN)

  • DaeHun Nyang
    • 정보보호학회논문지
    • /
    • 제13권6호
    • /
    • pp.107-112
    • /
    • 2003
  • IEEE 802.11 네트웍에서 핸드오버는 반복되는 인증 및 키교환 절차를 요구하며, 이는 seamless 무선랜 서비스를 제공하는데 있어 큰 방해요소가 된다. 이 논문에서는 IEEE 802.11f를 이용한 빠른 키교환 및 인증 방법을 제안한다. 특히, IEEE 802.11i의 4-way 핸드쉐이크를 표준에 벗어나지 않게 수정하므로써 pre-authentication을 이용했을 때 생길 수 있는 perfect forward secrecy문제를 해결한다. 제안하는 방법은 IEEE 802.11f의 context block과 IEEE 802.11i의 핸드쉐이크만을 이용하며, 핸드오버 시에 AAA 서버와의 통신을 요구하지 않으므로써 효율성을 높였다.

Behaviors of novel sandwich composite beams with normal weight concrete

  • Yan, Jia-Bao;Dong, Xin;Wang, Tao
    • Steel and Composite Structures
    • /
    • 제38권5호
    • /
    • pp.599-615
    • /
    • 2021
  • The ultimate strength behaviour of sandwich composite beams with J-hooks and normal weight concrete (SCSSBJNs) are studied through two-point loading tests on ten full-scale SCSSBJNs. The test results show that the SCSSBJN with different parameters under two-point loads exhibits three types of failure modes, i.e., flexure, shear, and combined shear and flexure mode. SCSSBJN failed in different failure modes exhibits different load-deflection behaviours, and the main difference of these three types of behaviours exist in their last working stages. The influences of thickness of steel faceplate, shear span ratio, concrete core strength, and spacing of J-hooks on structural behaviours of SCSSBJN are discussed and analysed. These test results show that the failure mode of SCSSBJN was sensitive to the thickness of steel faceplate, shear span ratio, and concrete core strength. Theoretical models are developed to estimate the cracking, yielding, and ultimate bending resistance of SCSSBJN as well as its transverse cross-sectional shear resistance. The validations of predictions by these theoretical models proved that they are capable of estimating strengths of novel SCSSBJNs.

M-SIDH 구현 및 성능 평가를 통한 효율성 연구 (Implementing M-SIDH: Performance and Efficiency Evaluation)

  • 김수리;서민혜
    • 정보보호학회논문지
    • /
    • 제33권4호
    • /
    • pp.591-599
    • /
    • 2023
  • 최근 Castryck-Decru에 의해 SIDH 기반 암호가 다항시간 안에 개인키를 복구할 수 있음에 따라 이에 대응하기 위한 여러 방법이 제안되었다. 이 중, Fouotsa 등이 제안한 M-SIDH는 상대방에게 전달하는 torsion point 정보를 마스킹하여 Castryck-Decru 공격에 대응한다. 본 논문에서는 처음으로 C를 이용해 M-SIDH를 구현하였으며, 최적화를 통해 효율성을 평가한다. 본 논문은 M-SIDH의 성능을 확인하기 위해 1024비트 소수를 사용하여 파라미터를 선택하는 방법을 제시하였으며, square-root Velu 공식의 확장체에서의 구현을 통해 M-SIDH를 최적화하였다. 본 논문의 결과 고전 64비트 보안강도를 가지는 MSIDH-1024의 경우 키 교환하는데 대략 1129ms 정도가 필요하다.

공개키 암호 구현을 위한 경량 하드웨어 가속기 (A Lightweight Hardware Accelerator for Public-Key Cryptography)

  • 성병윤;신경욱
    • 한국정보통신학회논문지
    • /
    • 제23권12호
    • /
    • pp.1609-1617
    • /
    • 2019
  • ECC (Elliptic Curve Cryptography)와 RSA를 기반으로 하는 다양한 공개키 암호 프로토콜 구현을 지원하는 하드웨어 가속기 설계에 관해 기술한다. NIST 표준으로 정의된 소수체 상의 5가지 타원곡선과 3가지 키길이의 RSA를 지원하며 또한, 4가지 타원곡선 점 연산과 6가지 모듈러 연산을 지원하도록 설계되어 ECC와 RSA 기반 다양한 공개키 암호 프로토콜의 하드웨어 구현에 응용될 수 있다. 저면적 구현을 위해 내부 유한체 연산회로는 32 비트의 데이터 패스로 설계되었으며, 워드 기반 몽고메리 곱셈 알고리듬, 타원곡선 점 연산을 위해서는 자코비안 좌표계, 그리고 모듈러 곱의 역원 연산을 위해서는 페르마 소정리를 적용하였다. 설계된 하드웨어 가속기를 FPGA 디바이스에 구현하여 EC-DH 키교환 프로토콜과 RSA 암호·복호 둥작을 구현하여 하드웨어 동작을 검증하였다. 180-nm CMOS 표준 셀 라이브러리로 합성한 결과, 50 MHz 클록 주파수에서 20,800 등가게이트와 28 kbit의 RAM으로 구현되었으며, Virtex-5 FPGA 디바이스에서 1,503 슬라이스와 2개의 BRAM으로 구현되었다.

Autonomous exploration for radioactive sources localization based on radiation field reconstruction

  • Xulin Hu;Junling Wang;Jianwen Huo;Ying Zhou;Yunlei Guo;Li Hu
    • Nuclear Engineering and Technology
    • /
    • 제56권4호
    • /
    • pp.1153-1164
    • /
    • 2024
  • In recent years, unmanned ground vehicles (UGVs) have been used to search for lost or stolen radioactive sources to avoid radiation exposure for operators. To achieve autonomous localization of radioactive sources, the UGVs must have the ability to automatically determine the next radiation measurement location instead of following a predefined path. Also, the radiation field of radioactive sources has to be reconstructed or inverted utilizing discrete measurements to obtain the radiation intensity distribution in the area of interest. In this study, we propose an effective source localization framework and method, in which UGVs are able to autonomously explore in the radiation area to determine the location of radioactive sources through an iterative process: path planning, radiation field reconstruction and estimation of source location. In the search process, the next radiation measurement point of the UGVs is fully predicted by the design path planning algorithm. After obtaining the measurement points and their radiation measurements, the radiation field of radioactive sources is reconstructed by the Gaussian process regression (GPR) model based on machine learning method. Based on the reconstructed radiation field, the locations of radioactive sources can be determined by the peak analysis method. The proposed method is verified through extensive simulation experiments, and the real source localization experiment on a Cs-137 point source shows that the proposed method can accurately locate the radioactive source with an error of approximately 0.30 m. The experimental results reveal the important practicality of our proposed method for source autonomous localization tasks.

전자상거래를 위한 NPC 암호 알고리즘 설계 (The Design of NPC Encryption Algorithms for Electronic Commerce)

  • 김재각;전문석
    • 한국전자거래학회지
    • /
    • 제6권2호
    • /
    • pp.159-166
    • /
    • 2001
  • EC(Electronic Commerce) is increasing with high speed based on the expansion of Internet. EC which is done through Internet has strong point like independence from time and space, On the contrary, it also has weak point like security problem because anybody can access easily to the system due to open network attribute of Internet. Therefore, we need the solutions that protect the security problem for safe and useful U activity, One of these solutions is the implementation of strong cipher algorithm. NPC(Non-Polynomial Complete) cipher algorithm proposed in this paper is good for the security and it overcome the limit of current 64bits cipher algorithm using 256bits key for input output and encryption key, Moreover, it is designed for the increase of calculation complexity and probability calculation by adapting more complex design for subkey generation regarded as one of important element effected to encryption.

  • PDF