• Title/Summary/Keyword: Partial Key

Search Result 410, Processing Time 0.04 seconds

FRACTIONAL PARTIAL DIFFERENTIAL EQUATIONS AND MODIFIED RIEMANN-LIOUVILLE DERIVATIVE NEW METHODS FOR SOLUTION

  • Jumarie, Guy
    • Journal of applied mathematics & informatics
    • /
    • v.24 no.1_2
    • /
    • pp.31-48
    • /
    • 2007
  • The paper deals with the solution of some fractional partial differential equations obtained by substituting modified Riemann-Liouville derivatives for the customary derivatives. This derivative is introduced to avoid using the so-called Caputo fractional derivative which, at the extreme, says that, if you want to get the first derivative of a function you must before have at hand its second derivative. Firstly, one gives a brief background on the fractional Taylor series of nondifferentiable functions and its consequence on the derivative chain rule. Then one considers linear fractional partial differential equations with constant coefficients, and one shows how, in some instances, one can obtain their solutions on bypassing the use of Fourier transform and/or Laplace transform. Later one develops a Lagrange method via characteristics for some linear fractional differential equations with nonconstant coefficients, and involving fractional derivatives of only one order. The key is the fractional Taylor series of non differentiable function $f(x+h)=E_{\alpha}(h^{\alpha}{D_x^{\alpha})f(x)$.

Feature Extraction of Partial Discharge for Stator Winding of High Voltage Motor (고압전동기 고정자권선의 부분방전 특징추출)

  • Park, Jae-Jun;Kim, Hee-Dong;Lee, Dong-Yoon
    • Proceedings of the KIEE Conference
    • /
    • 2004.11a
    • /
    • pp.112-116
    • /
    • 2004
  • On-line monitoring of fault discharge is an important approach for indicating the condition of electrical insulation of stator winding in high voltage motor. In this paper, several key aspects of on-line monitoring system are discussed, involving the characteristics of fault discharge of stator winding in high voltage motor, spectrum analysis of four simulation fault signals, feature extraction of internal fault discharge from apply voltage to breakdown. The study of the partial discharge activities allows to highlight the ageing stage in the winding fault under test. During the life of the winding insulation fault, the shape of PD signal change relating to the ageing stage. The ageing of stator winding insulation fault of high voltage motor is investigated based on the characteristics of partial discharge pulse distribution and statistical parameters, such as maximum, skewness and kurtosis using discrete wavelet transform coefficients.

  • PDF

Quorum-based Key Management Scheme in Wireless Sensor Networks

  • Wuu, Lih-Chyau;Hung, Chi-Hsiang;Chang, Chia-Ming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2442-2454
    • /
    • 2012
  • To ensure the security of wireless sensor networks, it is important to have a robust key management scheme. In this paper, we propose a Quorum-based key management scheme. A specific sensor, called as key distribution server (KDS), generates a key matrix and establishes a quorum system from the key matrix. The quorum system is a set system of subsets that the intersection of any two subsets is non-empty. In our scheme, each sensor is assigned a subset of the quorum system as its pre-distributed keys. Whenever any two sensors need a shared key, they exchange their IDs, and then each sensor by itself finds a common key from its assigned subset. A shared key is then generated by the two sensors individually based on the common key. By our scheme, no key is needed to be refreshed as a sensor leaves the network. Upon a sensor joining the network, the KDS broadcasts a message containing the joining sensor ID. After receiving the broadcast message, each sensor updates the key which is in common with the new joining one. Only XOR and hash operations are required to be executed during key update process, and each sensor needs to update one key only. Furthermore, if multiple sensors would like to have a secure group communication, the KDS broadcasts a message containing the partial information of a group key, and then each sensor in the group by itself is able to restore the group key by using the secret sharing technique without cooperating with other sensors in the group.

A Study on the Private Key Backup and Restoration using Biometric Information in Blockchain Environment

  • Seungjin, Han
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.3
    • /
    • pp.59-65
    • /
    • 2023
  • As research on blockchain applications in various fields is actively increasing, management of private keys that prove users of blockchain has become important. If you lose your private key, you lose all your data. In order to solve this problem, previously, blockchain wallets, private key recovery using partial information, and private key recovery through distributed storage have been proposed. In this paper, we propose a safe private key backup and recovery method using Shamir's Secrete Sharing (SSS) scheme and biometric information, and evaluate its safety. In this paper, we propose a safe private key backup and recovery method using Shamir's Secrete Sharing (SSS) scheme and biometric information, and evaluate its safety against robustness during message exchange, replay attack, man-in-the-middle attack and forgery and tampering attack.

Certificateless Public Key Encryption Revisited: Security Model and Construction (무인증서 공개키 암호 기법의 재고: 안전성 모델 및 설계)

  • Kim, Songyi;Park, Seunghwan;Lee, Kwangsu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1109-1122
    • /
    • 2016
  • Certificateless public key cryptography is a technique that can solve the certificate management problem of a public key cryptosystem and clear the key escrow issue of ID-based cryptography using the public key in user ID. Although the studies were actively in progress, many existing schemes have been designed without taking into account the safety of the secret value with the decryption key exposure attacks. If previous secret values and decryption keys are exposed after replacing public key, a valid private key can be calculated by obtaining the partial private key corresponding to user's ID. In this paper, we propose a new security model which ensures the security against the key exposure attacks and show that several certificateless public key encryption schemes are insecure in the proposed security model. In addition, we design a certificateless public key encryption scheme to be secure in the proposed security model and prove it based on the DBDH(Decisional Bilinear Diffie-Hellman) assumption.

Numerical Analysis of Surface Discharge due to Particles Attached to the GIS spacer (GIS 스페이서에 파티클 부착시 연면방전과 전계해석)

  • Jang, D.G.;Lee, J.H.;Kwak, H.R.;Park, H.Y.;Kim, Y.C.
    • Proceedings of the KIEE Conference
    • /
    • 2003.07c
    • /
    • pp.1788-1790
    • /
    • 2003
  • GIS is a typical power equipment with higher reliability. It is compact and safe because all the energized parts are enclosed by a sealed cylindrical tank which is filled with $SF_6$. Generally gas insulated power equipments like GIS are designed to have sufficient electrical strength to prevent partial discharges under normal operating condition. Despite of the careful processes in manufacturing, transporting and assembling, voids or particles can be created, resulting in partial discharges at electrically weak points. The key factors causing partial discharges in GIS are; particles, voids in solid insulation, protrusions, poor contact of metal components, etc. The particle can be attached on; spacers, electrodes, internal wall of the GIS tank. It also moves in GIS freely. Most of partial discharges are likely to occur when particles are attached to spacers. In this paper, the electrical characteristics of a surface discharge were investigated under various conditions by using simulation program of FEMLAB.

  • PDF

Isolation and Cloning of Porcine SLC27A2 Gene and Detection of Its Polymorphism Associated with Growth and Carcass Traits

  • Wang, Tao;Liu, Chang;Xiong, Yuan-Zhu;Deng, Chang-Yan;Zuo, Bo;Xie, Hong-Tao;Xu, De-Quan
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.20 no.8
    • /
    • pp.1169-1173
    • /
    • 2007
  • The protein encoded by SLC27A2 gene is an isozyme of long-chain fatty-acid-coenzyme A ligase family, and it converts free long-chain fatty acids into fatty acyl-CoA esters, and thereby plays a key role in lipid biosynthesis and fatty acid degradation. In the present study, SLC27A2 located on human chromosome 15 was selected as candidate gene and we isolated and cloned partial fragments of mRNA sequence and genomic fragments of porcine SLC27A2 gene. The coding region of the gene as determined by alignments shared 90% and 82% identity with human and mouse cDNAs, respectively. Detection in LargeWhite and Meishan breeds showed that a single nucleotide polymorphism (SNP) ($A{\rightarrow}G$) existed in exon 7, which caused corresponding amino acid changed for encoding. In LargeWhite pigs it encoded for Val while in Meishan pigs it encoded for Ile, so we developed the PCR-RFLP genotype method for detection of this polymorphism. Association study in 135 $F_2$ reference family indicated that significant correlation existed between the polymorphism and growth and carcass traits.

Analysis of the thresholds of granular mixtures using the discrete element method

  • Jian, Gong;Jun, Liu
    • Geomechanics and Engineering
    • /
    • v.12 no.4
    • /
    • pp.639-655
    • /
    • 2017
  • The binary mixture consists of two types of granular media with different physical attributes and sizes, which can be characterized by the percentage of large granules by weight (P) and the particle size ratio (${\alpha}$). Researchers determine that two thresholds ($P_S$ and $P_L$) exist for the peak shear strength of binary mixtures, i.e., at $P{\leq}P_S$, the peak shear strength is controlled by the small granules; at $P{\leq}P_L$, the peak shear strength is controlled by the large granules; at $P_S{\leq}P{\leq}P_L$, the peak shear strength is governed by both the large and small granules. However, the thresholds of binary mixtures with different ${\alpha}$ values, and the explanation related to the inner details of binary mixtures to account for why these thresholds exist, require further confirmation. This paper considers the mechanical behavior of binary mixtures with DEM analysis. The thresholds of binary mixtures are found to be strongly related to their coordination numbers $Z_L$ for all values of ${\alpha}$, where $Z_L$ denotes the partial coordination number only between the large particles. The arrangement structure of the large particles is examined when P approaches the thresholds, and a similar arrangement structure of large particles is formed in both 2D and 3D particle systems.

A Study of Effect of SNS News Consumption on Social Engagement and Government Transparency in Cambodia

  • Chhaya, PhalPheaktra;Cho, Wan-Sup;Kwon, Sun-Dong
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.3
    • /
    • pp.19-33
    • /
    • 2015
  • SNS is perceived as an effective tool for sharing news and enabling news content to reach many more users than before. And some users think that SNS is an important source to get news. This study's purpose is to understand the key factors contributing to behavior of news consumption on social network sites in Cambodia and its influence. We identified three key factors including convenience, recency, and variety; however, recency showed less significant effect on news consumption on SNS. Besides the key factors, it also seeks to understand the impact of news consumption on social engagement and government's transparency in Cambodia. The analytical results achieved through the Partial Least Squares (PLS) approach.