• Title/Summary/Keyword: Source key

Search Result 1,106, Processing Time 0.046 seconds

Double Line Voltage Synthesis Strategy for Three-to-Five Phase Direct Matrix Converters

  • Wang, Rutian;Zhao, Yanfeng;Mu, Xingjun;Wang, Weiquan
    • Journal of Power Electronics
    • /
    • v.18 no.1
    • /
    • pp.81-91
    • /
    • 2018
  • This paper proposes a double line voltage synthesis (DLVS) strategy for three-to-five phase direct matrix converters. In the proposed strategy, the input and expected output voltages are divided into 6 segments and 10 segments, respectively. In addition, in order to obtain the maximum voltage transfer ratio (VTR), the input line voltages and "source key" should be selected reasonably according to different combinations of input and output segments. Then, the corresponding duty ratios are calculated to determine the switch sequences in different segment combinations. The output voltages and currents are still sinusoidal and symmetrical with little lower order harmonics under unbalanced or distorted input voltages by using this strategy. In addition, the common mode voltage (CMV) can be suppressed by rearranging some of the switching states. This strategy is analyzed and studied by a simulation model established in MATLAB/Simulink and an experimental platform, which is controlled by a DSP and FPGA. Simulation and experimental results verify the feasibility and validity of the proposed DLVS strategy.

A Gaussian process-based response surface method for structural reliability analysis

  • Su, Guoshao;Jiang, Jianqing;Yu, Bo;Xiao, Yilong
    • Structural Engineering and Mechanics
    • /
    • v.56 no.4
    • /
    • pp.549-567
    • /
    • 2015
  • A first-order moment method (FORM) reliability analysis is commonly used for structural stability analysis. It requires the values and partial derivatives of the performance to function with respect to the random variables for the design. These calculations can be cumbersome when the performance functions are implicit. A Gaussian process (GP)-based response surface is adopted in this study to approximate the limit state function. By using a trained GP model, a large number of values and partial derivatives of the performance functions can be obtained for conventional reliability analysis with a FORM, thereby reducing the number of stability analysis calculations. This dynamic renewed knowledge source can provide great assistance in improving the predictive capacity of GP during the iterative process, particularly from the view of machine learning. An iterative algorithm is therefore proposed to improve the precision of GP approximation around the design point by constantly adding new design points to the initial training set. Examples are provided to illustrate the GP-based response surface for both structural and non-structural reliability analyses. The results show that the proposed approach is applicable to structural reliability analyses that involve implicit performance functions and structural response evaluations that entail time-consuming finite element analyses.

An Fingerprint Authentication Model of ERM System using Private Key Escrow Management Server (개인키 위탁관리 서버를 이용한 전자의무기록 지문인증 모델)

  • Lee, Yong-Joon;Jeon, Taeyeol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.6
    • /
    • pp.1-8
    • /
    • 2019
  • Medical information is an important personal information for patients, and it must be protected. In particular, when medical personnel approach electronic medical records, authentication for enhanced security is essential. However, the existing public certificate-based certification model did not reflect the security characteristics of the electronic medical record(EMR) due to problems such as personal key management and authority delegation. In this study, we propose a fingerprint recognition-based authentication model with enhanced security to solve problems in the approach of the existing electronic medical record system. The proposed authentication model is an EMR system based on fingerprint recognition using PEMS (Private-key Escrow Management Server), which is applied with the private key commission protocol and the private key withdrawal protocol, enabling the problem of personal key management and authority delegation to be resolved at source. The performance experiment of the proposed certification model confirmed that the performance time was improved compared to the existing public certificate-based authentication, and the user's convenience was increased by recognizing fingerprints by replacing the electronic signature password.

Radionuclide identification method for NaI low-count gamma-ray spectra using artificial neural network

  • Qi, Sheng;Wang, Shanqiang;Chen, Ye;Zhang, Kun;Ai, Xianyun;Li, Jinglun;Fan, Haijun;Zhao, Hui
    • Nuclear Engineering and Technology
    • /
    • v.54 no.1
    • /
    • pp.269-274
    • /
    • 2022
  • An artificial neural network (ANN) that identifies radionuclides from low-count gamma spectra of a NaI scintillator is proposed. The ANN was trained and tested using simulated spectra. 14 target nuclides were considered corresponding to the requisite radionuclide library of a radionuclide identification device mentioned in IEC 62327-2017. The network shows an average identification accuracy of 98.63% on the validation dataset, with the gross counts in each spectrum Nc = 100~10000 and the signal to noise ratio SNR = 0.05-1. Most of the false predictions come from nuclides with low branching ratio and/or similar decay energies. If the Nc>1000 and SNR>0.3, which is defined as the minimum identifiable condition, the averaged identification accuracy is 99.87%. Even when the source and the detector are covered with lead bricks and the response function of the detector thus varies, the ANN which was trained using non-shielding spectra still shows high accuracy as long as the minimum identifiable condition is satisfied. Among all the considered nuclides, only the identification accuracy of 235U is seriously affected by the shielding. Identification of other nuclides shows high accuracy even the shielding condition is changed, which indicates that the ANN has good generalization performance.

The Association between having a Usual Source of Care and Adherence to Medicines in Patients with Chronic Diseases (만성질환자의 상용치료원 이용과 복약순응도 간의 관계)

  • Jung, Youn;Byeon, Jinok
    • Korean Journal of Clinical Pharmacy
    • /
    • v.26 no.2
    • /
    • pp.128-136
    • /
    • 2016
  • Objective: This study was to explore the association between having a usual source of care and adherence to medicines in patient with chronic diseases. Methods: The 2012 Korea Health Panel was used as a data source. We analyzed 4,418 respondents that were diagnosed with chronic diseases and utilized health care services. Non-adherence to medication, a dependent variable, was defined as "not taking the medicines that were prescribed for treating chronic disease" or "not following the direction for medication". Whether having a usual source of care or not was used as a key independent variable, which was defined as having a regular site or a regular doctor for medical test, treatment, and consultation. Sex, age, education level, marital status, income, the type of health insurance, the number of chronic disease and CCI (Charlson Comorbidity Index) were included as covariates in the analysis. We conducted a multivariate logistic regression. Results: Totally, 30 percent of respondents reported to experience non-adherence to medication. Having a usual source of care was significantly associated with lower non-adherence to medication regardless its type, which is a regular doctor (OR=0.61, 95% CI=0.53-0.70) or a regular site (OR=0.67, 95% CI=0.58-0.78). Furthermore, having a usual source of care was associated with both of medication persistence (OR=0.66, 95% CI=0.54-0.81) and compliance (OR=0.65, 95% CI=0.56-0.76). Conclusion: Our results showed the possibility that usual source of care is able to conduct a positive role in improving adherence to medication with better management of chronic disease.

Research on Reduction and Recycling of Food Waste by Separating Raw Food Waste and Earth Worm Composting in the Apartment (공동주택의 음식물 생쓰레기 분리배출과 지렁이퇴비화를 이용한 음식물쓰레기 감량 및 자원화 모델 연구)

  • Choi, Kwang-Soo
    • Journal of Environmental Science International
    • /
    • v.20 no.1
    • /
    • pp.137-146
    • /
    • 2011
  • In this research, food waste source reduction model for apartment was investigated. In spite of prohibition of direct landfill of food waste and continuous efforts made by government and local government, food waste production increases steadily. Recycling ratio of the food waste increases every year, but its products have many problems like low quality, stability, salt, odor etc. Household occupies 63.3% of whole food waste production and this is subject to be a key factor to control food waste. We surveyed S apartment in Kwangju city as a model case, in which administrative office and women's association adopted clean plate eating, separation of raw food waste and earth worm composting as a series of method for source reduction and recycling inside the apartment. With the help of residents' participation and practice, food waste production decreased 15.6% from 0.31 g/capita/day in 2007 to 0.26 g/capita/day in 2009 (domestic average 0.30 g/capita/day). Separation of raw food waste and its composting using earth worm were very effective, and were subject to resolve the problems of present food waste treatment technologies. And earth worm composting was very useful in environmental, economical, societal and educational aspects. Instead of economical incentive, educational programs about food value, environmental problem and critical method for food waste separation were more effective for promotion of source reduction. From the analyses on the process and success factors in this model, we could conclude that leader's role was one of the key factors for the settlement of source reduction, and that was to understand the seriousness of the food waste and to seek solution, to test techniques, and to practice by oneself. Furthermore, networking and collaboration among residents, local government, NGO and local press promoted residents' participation, and it was through various education and investigation. Finally, source reduction and self recycling model of food waste in the apartment, that applies separating raw food waste and earth worm composting based on the collaboration among residents, local government, NGO, and local press, should be disseminated, and environmental policy also should be changed to make it possible.

A Study on Secure Routing Technique using Trust Value and Key in MANET (신뢰도와 키를 이용한 보안 라우팅 기법에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.69-77
    • /
    • 2015
  • MANET is composed of only the mobile nodes have a limited transmission range. The dynamic topology by the frequent movement of nodes makes routing difficult and is also cause exposed to security vulnerabilities. In this paper, we propose the security routing technique consisted of mechanism of two steps in order to respond effectively to attack by the modification of the routing information and transmit secure data. The hierarchical structure is used and the authentication node that issues the key of the nodes within each cluster is elected in this proposed method. The authentication node manages key issues and issued information for encrypting the routing information from the source node. The reliability value for each node is managed to routing trust table in order to secure data transmission. In the first step, the route discovery is performed using this after the routing information is encrypted using the key issued by the authentication node. In the second step, the average reliability value of the node in the found path is calculated. And the safety of the data transmission is improved after the average reliability value selects the highest path. The improved performance of the proposed method in this paper was confirmed through comparative experiments with CBSR and SEER. It was confirmed a better performance in the transmission delay, the amount of the control packet, and the packet transmission success ratio.

An OpenFlow User-Switch Remapping Approach for DDoS Defense

  • Wei, Qiang;Wu, Zehui;Ren, Kalei;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4529-4548
    • /
    • 2016
  • DDoS attacks have had a devastating effect on the Internet, which can cause millions of dollars of damage within hours or even minutes. In this paper we propose a practical dynamic defense approach that overcomes the shortage of static defense mechanisms. Our approach employs a group of SDN-based proxy switches to relay data flow between users and servers. By substituting backup proxy switches for attacked ones and reassigning suspect users onto the new proxy switches, innocent users are isolated and saved from malicious attackers through a sequence of remapping process. In order to improve the speed of attacker segregation, we have designed and implemented an efficient greedy algorithm which has been demonstrated to have little influence on legitimate traffic. Simulations, which were then performed with the open source controller Ryu, show that our approach is effective in alleviating DDoS attacks and quarantining the attackers by numerable remapping process. The simulations also demonstrate that our dynamic defense imposes little effect on legitimate users, and the overhead introduced by remapping procedure is acceptable.

Adaptive Cooperation for Bidirectional Communication in Cognitive Radio Networks

  • Gao, Yuan;Zhu, Changping;Deng, Zhixiang;Tang, Yibin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1279-1300
    • /
    • 2017
  • In the interweave cognitive networks, the interference from the primary user degrades the performance of the cognitive user transmissions. In this paper, we propose an adaptive cooperation scheme in the interweave cognitive networks to improve the performance of the cognitive user transmissions. In the proposed scheme for the bidirectional communication of two end-source cognitive users, the bidirectional communication is completed through the non-relay direct transmission, the one-way relaying cooperation transmission, and the two-way relaying cooperation transmission depending on the limited feedback from the end-sources. For the performance analysis of the proposed scheme, we derive the outage probability and the finite-SNR diversity multiplexing tradeoff (f-DMT) in a closed form, considering the imperfect spectrum sensing, the interference from the primary user, and the power allocation between the relay and the end-sources. The results show that compared with the direct transmissions (DT), the pure one-way relaying transmissions (POWRT), and the pure two-way relaying transmissions (PTWRT), the proposed scheme has better outage performance. In terms of the f-DMT, the proposed scheme outperforms the full cooperation transmissions of the POWRT and PTWRT.

A Dynamic Defense Using Client Puzzle for Identity-Forgery Attack on the South-Bound of Software Defined Networks

  • Wu, Zehui;Wei, Qiang;Ren, Kailei;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.846-864
    • /
    • 2017
  • Software Defined Network (SDN) realizes management and control over the underlying forwarding device, along with acquisition and analysis of network topology and flow characters through south bridge protocol. Data path Identification (DPID) is the unique identity for managing the underlying device, so forged DPID can be used to attack the link of underlying forwarding devices, as well as carry out DoS over the upper-level controller. This paper proposes a dynamic defense method based on Client-Puzzle model, in which the controller achieves dynamic management over requests from forwarding devices through generating questions with multi-level difficulty. This method can rapidly reduce network load, and at the same time separate attack flow from legal flow, enabling the controller to provide continuous service for legal visit. We conduct experiments on open-source SDN controllers like Fluid and Ryu, the result of which verifies feasibility of this defense method. The experimental result also shows that when cost of controller and forwarding device increases by about 2%-5%, the cost of attacker's CPU increases by near 90%, which greatly raises the attack difficulty for attackers.