• Title/Summary/Keyword: Symmetric Scheme

Search Result 235, Processing Time 0.029 seconds

A Modified Charge Balancing Scheme for Cascaded H-Bridge Multilevel Inverter

  • Raj, Nithin;G, Jagadanand;George, Saly
    • Journal of Power Electronics
    • /
    • v.16 no.6
    • /
    • pp.2067-2075
    • /
    • 2016
  • Cascaded H-bridge multilevel inverters are currently used because it enables the integration of various sources, such as batteries, ultracapacitors, photovoltaic array and fuel cells in a single system. Conventional modulation schemes for multilevel inverters have concentrated mainly on the generation of a low harmonic output voltage, which results in less effective utilization of connected sources. Less effective utilization leads to a difference in the charging/discharging of sources, causing unsteady voltages over a long period of operation and a reduction in the lifetime of the sources. Hence, a charge balance control scheme has to be incorporated along with the modulation scheme to overcome these issues. In this paper, a new approach for charge balancing in symmetric cascaded H-bridge multilevel inverter that enables almost 100% charge balancing of sources is presented. The proposed method achieves charge balancing without any additional stages or complex circuit or considerable computational requirement. The validity of the proposed method is verified through simulation and experiments.

An Authentication Scheme for Filtering Injected Bogus Data in Sensor Networks (센서 네트워크 내의 위조된 데이터 삽입 공격 방지를 위한 인증 방법)

  • Cho, Kwan-Tae;Kim, Young-Ho;Lee, Dong-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.14C no.5
    • /
    • pp.389-394
    • /
    • 2007
  • Recently, a location-based threshold-endorsement(LTE) scheme is proposed to thwart bogus data injection attacks. The scheme exhibits much greater filtering power than earlier symmetric schemes and results in enhanced energy savings. In this paper, we show that LTE has fatal vulnerabilities. We also propose an improved scheme that mitigates the weakness and thereby achieves the original claims without lessening remarkable filtering power intended in LTE.

Performance Analysis for Weaker Channel User in Non-Uniform Source SSC NOMA with Novel BTS

  • Chung, Kyuhyuk
    • International journal of advanced smart convergence
    • /
    • v.11 no.1
    • /
    • pp.36-41
    • /
    • 2022
  • Recently, to improve the performance of the strongest channel gain user in non-orthogonal multiple access (NOMA) with a non-uniform source and symmetric superposition coding (SSC), a novel bit-to-symbol (BTS) mapping have been proposed. However, only the performance of the user with the stronger channel gain was analyzed. Thus, we compare the bit-error rate (BER) of the new BTS scheme with that of uniform sources, especially for the user with weakest channel gain. First, we show that the performance of the novel BTS scheme for the user with weakest channel gain also improves, compared to that of the uniform sources. Furthermore, the signal-to-noise (SNR) gain of the new BTS scheme over the uniform sourcesis calculated. As a consequence, the novel BTS scheme would improve the performance of the user with weakest channel gain as well as that with the stronger channel gain for SSC NOMA with a non-uniform source.

Numerical Simulation of In-Cylinder Flow for the Axi-symmetric Model Engine by Low Reynolds Number k-ε Turbulence Model (저레이놀즈수 k-ε 난류모형에 의한 축대칭 모형기관 실린더내 유동의 수치해석)

  • Kim, W.K.;Choi, Y.D.
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.2 no.1
    • /
    • pp.38-50
    • /
    • 1994
  • To improve the efficiency of internal combustion engines, it is necessary to understand mixed air-fuel in-cylinder flow processes accurately at intake and compression strokes. There is experimental and numerical methods to analyse in-cylinder flow process. In numerical method, standard $k-{\varepsilon}$ model with wall function was mostly adopted in in-cylinder flow process. But this type model was not efficiently predicted in the near wall region. Therefore in the present study, low Reynolds number $k-{\varepsilon}$ model was adopted near the cylinder wall and standard $k-{\varepsilon}$ model in other region. Also QUICK scheme was used for convective difference scheme. This study takes axisymmetric reciprocating model engine motored at 200rpm with a centrally located valve, incorporated 60 degree seat angie, and flat piston surface excluding inlet port. Because in-cylinder flow processes are undergoing unsteady and compressible, averaged cylinder pressure and inlet velocity at arbitrary crank angle are determined from thermodynamic analytic method and incylinder states at that crank angle are iteratively determined from the numerical analytic method.

  • PDF

Finite Volume Method for Two-Dimensional Unsteady Flow in Open Channel (開水路에서의 2次元 不定流 解析를 위한 有限體積法)

  • Lee, Jin-Hee;Kim, Kyung-Tak;Sim, Myung-Pil
    • Water for future
    • /
    • v.29 no.5
    • /
    • pp.173-184
    • /
    • 1996
  • In this study, a two-dimensional shallow-water equation was used to develop the mathematical model for computing water levels and flow distribution. In the discretization equations, based on the finite volume method (FVM), the third order Runge-Kutta method and the third order upwind scheme were introduced to handle the unsteady and vconvective terms in the governing equations. To determine the accuracy of the developed model, it was applied to the rectangular horizontal channel in a frictionless flow. The water depth and velocity obtained by the numerical model were found to agree closely with the exact solution. The model was also applied to the rectangular channel with both the symmetric and the non symmetric constriction. The velocity distribution of the flow and the propagation of the flood wave were simulated and the results well described the flow characteristics.

  • PDF

A Study on Adopting Symmetric Control System in Active Suspension Equipment (능동 서스펜션 장치에의 대칭제어시스템 적용에 관한 연구)

  • Park Jung-Hyen;Kim Soon-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.4
    • /
    • pp.769-774
    • /
    • 2006
  • This paper proposed a theoretic numerical modelling in control system design to analyze active suspension equipment by adopting minimum phase system theory. Recent in the field of suspension system design it is general to adopt active control scheme for stiffness and damping, and connection with other vehicle stability control equipment is also intricate, it is required for control system scheme to design more robust, higher response and precision control equipment. Transfer matrices of system with collocated sensors and actuators are symmetric. The symmetry is independent of the entities of mass, damping, or stiffness matrices, and is a non parametric nature. From this point of view, symmetric robust control system is analyzed and designed in this paper. Numerical example is shown for validity of robust control system design.

Comparisons of Parallel Preconditioners for the Computation of Interior Eigenvalues by the Minimization of Rayleigh Quotient (레이레이 계수의 최소화에 의한 내부고유치 계산을 위한 병렬준비행렬들의 비교)

  • Ma, Sang-back;Jang, Ho-Jong
    • The KIPS Transactions:PartA
    • /
    • v.10A no.2
    • /
    • pp.137-140
    • /
    • 2003
  • Recently, CG (Conjugate Gradient) scheme for the optimization of the Rayleigh quotient has been proven a very attractive and promising technique for interior eigenvalues for the following eigenvalue problem, Ax=λx (1) The given matrix A is assummed to be large and sparse, and symmetric. Also, the method is very amenable to parallel computations. A proper choice of the preconditioner significantly improves the convergence of the CG scheme. We compare the parallel preconditioners for the computation of the interior eigenvalues of a symmetric matrix by CG-type method. The considered preconditioners are Point-SSOR, ILU (0) in the multi-coloring order, and Multi-Color Block SSOR (Symmetric Succesive OverRelaxation). We conducted our experiments on the CRAY­T3E with 128 nodes. The MPI (Message Passing Interface) library was adopted for the interprocessor communications. The test matrices are up to $512{\times}512$ in dimensions and were created from the discretizations of the elliptic PDE. All things considered the MC-BSSOR seems to be most robust preconditioner.

Optimum Inner and Outer Code Rates for Concatenated Codes in Gaussian Binary Symmetric Channels (가우시안 이진 대칭 채널에서 쇄상부호의 최적 내.외 부호율에 관한 연구)

  • Lee, Ye Hoon
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.2
    • /
    • pp.110-113
    • /
    • 2014
  • In this paper, we address a problem of finding the optimum inner and outer code rates for a concatenated code in Gaussian binary symmetric channels. Clearly, as the inner code rate decreases, the error detection capability of the inner code increases. However, decreasing the inner code rate implies a decrease in error-correction capability of the outer code when overall code rate is fixed. With this notion in mind, we examine the optimum distribution of redundancy on the outer and inner codes to achieve a maximum performance gain in the concatenated coding scheme. Our analysis shows that the maximum coding gain can be obtained when the inner code rate is maximized and the outer code rate is minimized under the constraint of total code rate is fixed.

A New Public Key Encryption Scheme based on Layered Cellular Automata

  • Zhang, Xing;Lu, Rongxing;Zhang, Hong;Xu, Chungen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3572-3590
    • /
    • 2014
  • Cellular automata (CA) based cryptosystem has been studied for almost three decades, yet most of previously reported researches focus on the symmetric key encryption schemes. Up to now, few CA based public key encryption scheme has been proposed. To fill the gap, in this paper, we propose a new public key encryption scheme based on layered cellular automata (LCA). Specifically, in the proposed scheme, based on the T-shaped neighborhood structure, we combine four one-dimensional reversible CAs (set as the private key) to form the transition rules of a two-dimension CA, where the two-dimension CA is set as the corresponding public key. Based on the hardness assumption of the Decisional Dependent CA problem in LCA, we formally prove the proposed scheme is indistinguishably secure against the chosen-plaintext attack (IND-CPA). In addition, we also use a numeric example to demonstrate its feasibility. Finally, analysis of key space and time efficiency are also carried out along with RSA-1024, and the simulation results demonstrate that our proposed scheme is more efficient.

Communication Pattern Based Key Establishment Scheme in Heterogeneous Wireless Sensor Networks

  • Kim, Daehee;Kim, Dongwan;An, Sunshin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1249-1272
    • /
    • 2016
  • In this paper, we propose a symmetric key establishment scheme for wireless sensor networks which tries to minimize the resource usage while satisfying the security requirements. This is accomplished by taking advantage of the communication pattern of wireless sensor networks and adopting heterogeneous wireless sensor networks. By considering the unique communication pattern of wireless sensor networks due to the nature of information gathering from the physical world, the number of keys to be established is minimized and, consequently, the overhead spent for establishing keys decreases. With heterogeneous wireless sensor networks, we can build a hybrid scheme where a small number of powerful nodes do more works than a large number of resource-constrained nodes to provide enhanced security service such as broadcast authentication and reduce the burden of resource-limited nodes. In addition, an on-demand key establishment scheme is introduced to support extra communications and optimize the resource usage. Our performance analysis shows that the proposed scheme is very efficient and highly scalable in terms of storage, communication and computation overhead. Furthermore, our proposed scheme not only satisfies the security requirements but also provides resilience to several attacks.