• Title/Summary/Keyword: key value

Search Result 2,482, Processing Time 0.026 seconds

Pretension process control based on cable force observation values for prestressed space grid structures

  • Zhou, Zhen;Meng, Shao-Ping;Wu, Jing
    • Structural Engineering and Mechanics
    • /
    • v.34 no.6
    • /
    • pp.739-753
    • /
    • 2010
  • Pointing to the design requirement of prestressed space grid structure being the target cable force, the pretension scheme decision analysis method is studied when there's great difference between structural actual state and the analytical model. Based on recursive formulation of cable forces, the simulative recursive system for pretension process is established from the systematic viewpoint, including four kinds of parameters, i.e., system initial value (structural initial state), system input value (tensioning control force scheme), system state parameters (influence matrix of cable forces), system output value (pretension accomplishment). The system controllability depends on the system state parameters. Based on cable force observation values, the influence matrix for system state parameters can be calculated, making the system controllable. Next, the pretension scheme decision method based on cable force observation values can be formed on the basis of iterative calculation for recursive system. In this way, the tensioning control force scheme that can meet the design requirement when next cyclic supplemental tension finished is obtained. Engineering example analysis results show that the proposed method in this paper can reduce a lot of cyclic tensioning work and meanwhile the design requirement can be met.

Task failure resilience technique for improving the performance of MapReduce in Hadoop

  • Kavitha, C;Anita, X
    • ETRI Journal
    • /
    • v.42 no.5
    • /
    • pp.748-760
    • /
    • 2020
  • MapReduce is a framework that can process huge datasets in parallel and distributed computing environments. However, a single machine failure during the runtime of MapReduce tasks can increase completion time by 50%. MapReduce handles task failures by restarting the failed task and re-computing all input data from scratch, regardless of how much data had already been processed. To solve this issue, we need the computed key-value pairs to persist in a storage system to avoid re-computing them during the restarting process. In this paper, the task failure resilience (TFR) technique is proposed, which allows the execution of a failed task to continue from the point it was interrupted without having to redo all the work. Amazon ElastiCache for Redis is used as a non-volatile cache for the key-value pairs. We measured the performance of TFR by running different Hadoop benchmarking suites. TFR was implemented using the Hadoop software framework, and the experimental results showed significant performance improvements when compared with the performance of the default Hadoop implementation.

Design wind speed prediction suitable for different parent sample distributions

  • Zhao, Lin;Hu, Xiaonong;Ge, Yaojun
    • Wind and Structures
    • /
    • v.33 no.6
    • /
    • pp.423-435
    • /
    • 2021
  • Although existing algorithms can predict wind speed using historical observation data, for engineering feasibility, most use moment methods and probability density functions to estimate fitted parameters. However, extreme wind speed prediction accuracy for long-term return periods is not always dependent on how the optimized frequency distribution curves are obtained; long-term return periods emphasize general distribution effects rather than marginal distributions, which are closely related to potential extreme values. Moreover, there are different wind speed parent sample types; how to theoretically select the proper extreme value distribution is uncertain. The influence of different sampling time intervals has not been evaluated in the fitting process. To overcome these shortcomings, updated steps are introduced, involving parameter sensitivity analysis for different sampling time intervals. The extreme value prediction accuracy of unknown parent samples is also discussed. Probability analysis of mean wind is combined with estimation of the probability plot correlation coefficient and the maximum likelihood method; an iterative estimation algorithm is proposed. With the updated steps and comparison using a Monte Carlo simulation, a fitting policy suitable for different parent distributions is proposed; its feasibility is demonstrated in extreme wind speed evaluations at Longhua and Chuansha meteorological stations in Shanghai, China.

A Secure Key Predistribution Scheme for WSN Using Elliptic Curve Cryptography

  • Rajendiran, Kishore;Sankararajan, Radha;Palaniappan, Ramasamy
    • ETRI Journal
    • /
    • v.33 no.5
    • /
    • pp.791-801
    • /
    • 2011
  • Security in wireless sensor networks (WSNs) is an upcoming research field which is quite different from traditional network security mechanisms. Many applications are dependent on the secure operation of a WSN, and have serious effects if the network is disrupted. Therefore, it is necessary to protect communication between sensor nodes. Key management plays an essential role in achieving security in WSNs. To achieve security, various key predistribution schemes have been proposed in the literature. A secure key management technique in WSN is a real challenging task. In this paper, a novel approach to the above problem by making use of elliptic curve cryptography (ECC) is presented. In the proposed scheme, a seed key, which is a distinct point in an elliptic curve, is assigned to each sensor node prior to its deployment. The private key ring for each sensor node is generated using the point doubling mathematical operation over the seed key. When two nodes share a common private key, then a link is established between these two nodes. By suitably choosing the value of the prime field and key ring size, the probability of two nodes sharing the same private key could be increased. The performance is evaluated in terms of connectivity and resilience against node capture. The results show that the performance is better for the proposed scheme with ECC compared to the other basic schemes.

Keyed learning: An adversarial learning framework-formalization, challenges, and anomaly detection applications

  • Bergadano, Francesco
    • ETRI Journal
    • /
    • v.41 no.5
    • /
    • pp.608-618
    • /
    • 2019
  • We propose a general framework for keyed learning, where a secret key is used as an additional input of an adversarial learning system. We also define models and formal challenges for an adversary who knows the learning algorithm and its input data but has no access to the key value. This adversarial learning framework is subsequently applied to a more specific context of anomaly detection, where the secret key finds additional practical uses and guides the entire learning and alarm-generating procedure.

Design of Keyword Extraction System Using TFIDF (TFIDF를 이용한 키워드 추출 시스템 설계)

  • 이말례;배환국
    • Korean Journal of Cognitive Science
    • /
    • v.13 no.1
    • /
    • pp.1-11
    • /
    • 2002
  • In this paper, a test was performed to determine whether words in Anchor Text were appropriate as key words. As a result of the test. there were proper words of high weighting factor, while some others did not even appear in the text. therefore, were not appropriate as key words. In order to resolve this problem. a new method was proposed to extract key words. Using the proposed method, inappropriate key words can be removed so that new key words be set, and then, ranking becomes possible with the TFIDF value as a weighting factor of the key word. It was verified that the new method has higher accuracy compared to the previous methods.

  • PDF

Improvement of Paillier Probabilistic Plumbic Key Cryptosystem for Efficiency (Paillier의 확률 공개키 암호 방식의 효율적인 개선)

  • 최덕환;조석향;최승복;원동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.8C
    • /
    • pp.756-764
    • /
    • 2003
  • We investigate a probabilistic public key cryptosystem proposed by Paillier. It is based on the discrete logarithmic function and the messages are calculated from the modular product of two those functions, one of which has a fixed value depending on a given public key. The improvement is achieved by a good choice for the public key so that it is possible to get efficient schemes without losing the onewayness and semantic security. Also we suggest the method to get the public key for our schemes.

Optimal Handover Key Refresh Interval in 3GPP LTE/SAE Network (3GPP LTE/SAE 네트워크에서의 핸드오버 키 최적 갱신주기에 관한 연구)

  • Han, Chan-Kyu;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.237-242
    • /
    • 2011
  • LTE/SAE has presented the handover key management to revoke the compromised keys and to isolate corrupted network devices. In this paper, we identify that the handover key management is vulnerable to so-called de-synchronization attacks, which is jeopardizing the forward secrecy of handover key management. We place an emphasis on periodic root key update to minimize the effect of the de-synchronization attacks. An optimal value for the root key update interval is suggested in order to minimize signaling load and ensure security of user traffic.

Key-dependent side-channel cube attack on CRAFT

  • Pang, Kok-An;Abdul-Latip, Shekh Faisal
    • ETRI Journal
    • /
    • v.43 no.2
    • /
    • pp.344-356
    • /
    • 2021
  • CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side-channel cube attacks. We apply side-channel cube attacks to CRAFT with the Hamming weight leakage assumption. We found that the first half of the secret key can be recovered from the Hamming weight leakage after the first round. Next, using the recovered key bits, we continue our attack to recover the second half of the secret key. We show that the set of equations that are solvable varies depending on the value of the key bits. Our result shows that 99.90% of the key space can be fully recovered within a practical time.

A Dynamic Analysis on Value Chain Model of E-Commerce - The Case of Online Book Market - (전자상거래의 가치사슬모형에 관한 동태적 분석 - 온라인 서점시장을 중심으로 -)

  • Lee Young-Chan;Seo Chang-Gab
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2004.05a
    • /
    • pp.316-335
    • /
    • 2004
  • This paper builds a system dynamics model analyzing first mover effect and growth strategy of online retailer, a major segment of B2C e-commerce. The dynamic model in this paper is calibrated to the online book market and Yes24.com as major test cases. The model consists of eight key value chain sectors. Five of these(Users, Site Operations, Human Resources, Financial Accounting, and Fundraising) are internal to the company, and three others(Market, Financial Market, and Relative Performance) are external to the company. With the model, this paper suggests research propositions representing positive feedback loops and negative feedback loops that lead to corporate growth and limits to growth according to dynamic causal relationships among eight key value chain sectors, and simulate these propositions.

  • PDF