• Title/Summary/Keyword: One time Key

Search Result 1,294, Processing Time 0.028 seconds

Multivariable Optimal Control of a Direct AC/AC Converter under Rotating dq Frames

  • Wan, Yun;Liu, Steven;Jiang, Jianguo
    • Journal of Power Electronics
    • /
    • v.13 no.3
    • /
    • pp.419-428
    • /
    • 2013
  • The modular multilevel cascade converter (MMCC) is a new family of multilevel power converters with modular realization and a cascaded pattern for submodules. The MMCC family can be classified by basic configurations and submodule types. One member of this family, the Hexverter, is configured as Double-Delta Full-Bridge (DDFB). It is a novel multilevel AC/AC converter with direct power conversion and comparatively fewer required components. It is appropriate for connecting two three-phase systems with different frequencies and driving an AC motor directly from a utility grid. This paper presents the dq model of a Hexverter with both of its AC systems by state-space representation, which then simplifies the continuous time-varying model into a periodic discrete time-invariant one. Then a generalized multivariable optimal control strategy for regulating the Hexverter's independent currents is developed. The resulting control structure can be adapted to other MMCCs and is flexible enough to include other control criterion while guaranteeing the original controller performance. The modeling method and control design are verified by simulation results.

An Efficient and Reliable Authentication Protocol for Password-based Systems (패스워드 기반 시스템을 위한 효율적이고 안전한 인증 프로토콜의 설계 및 검증)

  • 권태경;강명호;송주석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.2
    • /
    • pp.27-42
    • /
    • 1997
  • We propose a new authentication and key distribution protocol which is efficient and reliable for password-based systems. Various guessing attacks have been detected in applying conventional protocols to the password-based systems and additional overheads have been made in refined protocols to defeat those attacks. Using a one-time pad and a strong hash function, our proposed protocol promotes reliability and efficiency. Compared with other protocols, our protocol is secure against various protocol attacks including guessing attacks. In addition, this protocol is efficient in reducing communication and computation costs.

Study of one chip SEED block cipher (SEED 블록 암호 알고리즘의 단일 칩 연구)

  • 신종호;강준우
    • Proceedings of the IEEK Conference
    • /
    • 2000.06b
    • /
    • pp.165-168
    • /
    • 2000
  • A hardware architecture to implement the SEED block cipher algorithm into one chip is described. Each functional unit is designed with VHDL hardware description language and synthesis tools. The designed hardware receives a 128-bit block of plain text input and a 128-bit key, and generates a 128-bit cipher block after 16-round operations after 8 clocks. The encryption time is within 20 nsec.

  • PDF

Mechanical analysis for prestressed concrete containment vessels under loss of coolant accident

  • Zhou, Zhen;Wu, Chang;Meng, Shao-ping;Wu, Jing
    • Computers and Concrete
    • /
    • v.14 no.2
    • /
    • pp.127-143
    • /
    • 2014
  • LOCA (Loss Of Coolant Accident) is one of the most important utmost accidents for Prestressed Concrete Containment Vessel (PCCV) due to its coupled effect of high temperature and inner pressure. In this paper, heat conduction analysis is used to obtain the LOCA temperature distribution of PCCV. Then the elastic internal force of PCCV under LOCA temperature is analyzed by using both simplified theoretical method and FEM (finite element methods) method. Considering the coupled effect of LOCA temperature, a nonlinear elasto-plasitic analysis is conducted for PCCV under utmost internal pressure considering three failure criteria. Results show that the LOCA temperature distribution is strongly nonlinear along the shell thickness at the early time; the moment result of simplified analysis is well coincident with the one of numerical analysis at weak constraint area; while in the strong constrained area, the value of moments and membrane forces fluctuate dramatically; the simplified and numerical analysis both show that the maximum moment occurs at 6hrs after LOCA.; the strain of PCCV under LOCA temperature is larger than the one of no temperature under elasto-plastic analysis; the LOCA temperature of 6hrs has the greatest influence on the ultimate bearing capacity with 8.43% decrease for failure criteria 1 and 2.65% decrease for failure criteria 3.

Dirt Roads vs. High Speed Train: Opinion Towards ROI Value of Thailand's Transportation Infrastructure Development

  • Boonwattanopas, Nattawadee
    • Asian Journal for Public Opinion Research
    • /
    • v.3 no.1
    • /
    • pp.22-39
    • /
    • 2015
  • This research is a qualitative based study by using data gleaned from documentary analysis and in-depth interviews of 10 potential stakeholders were involved in the proposed high-speed train project in Thailand. Many perspectives from key informants revealed that this project would bring Thailand sustainable development in the future due to the fact that it is supposed to be an environmentally friendly mode of transportation and timesaving for passengers. Key informants who tend to have negative opinions towards the project feel apprehension due to the huge monetary investment during a time of monetary crisis. However, there was one complaint that the high-speed train is harmful to the environment surrounding the proposed area of this project. Several key informants agreed that ticket fares must be in between the cost of a bus ticket and airfare.

정보시스템 주요 관리항목에 대한 국제 비교 연구 - 우리나라와 미국을 중심으로 -

  • Kim, Hyo-Seok;Kim, Jae-Jeon
    • Asia pacific journal of information systems
    • /
    • v.6 no.2
    • /
    • pp.171-200
    • /
    • 1996
  • Information Systems(IS) departments face many challenges in today's rapidly changing environment. One approach to understanding the challenges by IS departments is to survey IS managers in order to elicit their key issues. The study compares and contrasts the major findings of key information systems management issues in Korea and United States. It examines the key concerns of IS managers on these areas focusing on identifying and explaining regional similarities and differences. IS managers in Korea and United States show a reasonable level of agreement on the most critical issues they face. In some of the issues the differences are found and possible reasons for these differences are discussed. The study concludes by suggesting an evolution model that can explain the changing nature of the IS issues across time and nations.

  • PDF

A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments

  • Ra, Gyeong-Jin;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.892-905
    • /
    • 2018
  • In smart home environment, certificate based signature technology is being studied by communication with Internet of Things(IoT) device. However, block - chain technology has attracted much attention because of the problems such as single - point error and management overhead of the trust server. Among them, Keyless Signature Infrastructure(KSI) provides integrity by configuring user authentication and global timestamp of distributed server into block chain by using hash-based one-time key. In this paper, we provide confidentiality by applying group key and key management based on multi - solution chain. In addition, we propose a smart home environment that can reduce the storage space by using Extended Merkle Tree and secure and efficient KSI-based authentication and communication with enhanced security strength.

Extending the Password-based Authentication Protocol K1P (패스워드 기반 인증 프로토콜 K1P의 확장)

  • 권태경;송주석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.7
    • /
    • pp.1851-1859
    • /
    • 1998
  • We summarize the password-based authetication protocol K1P which was introduced in our easlier papers [1,2] and then propose three more extended protocols. These protocols preserve a design concept of K1P, i.e., security and efficiency, and canbe used for various purposes. They are a One-time key K1P, a Client public key K1P, and an Exponential key exchange K1P.

  • PDF

Blackboard Scheduler Control Knowledge for Recursive Heuristic Classification

  • Park, Young-Tack
    • Journal of Intelligence and Information Systems
    • /
    • v.1 no.1
    • /
    • pp.61-72
    • /
    • 1995
  • Dynamic and explicit ordering of strategies is a key process in modeling knowledge-level problem-solving behavior. This paper addressed the important problem of howl to make the scheduler more knowledge-intensive in a way that facilitates the acquisition, integration, and maintenance of the scheduler control knowledge. The solution a, pp.oach described in this paper involved formulating the scheduler task as a heuristic classification problem, and then implementing it as a classification expert system. By doing this, the wide spectrum of known methods of acquiring, refining, and maintaining the knowledge of a classification expert system are a, pp.icable to the scheduler control knowledge. One important innovation of this research is that of recursive heuristic classification : this paper demonstrates that it is possible to formulate and solve a key subcomponent of heuristic classification as heuristic classification problem. Another key innovation is the creation of a method of dynamic heuristic classification : the classification alternatives that are selected among are dynamically generated in real-time and then evidence is gathered for and aginst these alternatives. In contrast, the normal model of heuristic classification is that of structured selection between a set of preenumerated fixed alternatives.

  • PDF

Energy-Saving Oriented On/Off Strategies in Heterogeneous Networks : an Asynchronous Approach with Dynamic Traffic Variations

  • Tang, Lun;Wang, Weili;Chen, Qianbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5449-5464
    • /
    • 2018
  • Recent works have validated the possibility of reducing the energy consumption in wireless heterogeneous networks, achieved by switching on/off some base stations (BSs) dynamically. In this paper, to realize energy conservation, the discrete time Markov Decision Process (DTMDP) is developed to match up the BS switching operations with the traffic load variations. Then, an asynchronous decision-making algorithm, which is based on the Bellman equation and the on/off priorities of the BSs, is firstly put forward and proved to be optimal in this paper. Through reducing the state and action space during one decision, the proposed asynchronous algorithm can avoid the "curse of dimensionality" occurred in DTMDP frequently. Finally, numerical simulations are conducted to validate the effectiveness and advantages of the proposed asynchronous on/off strategies.