• Title/Summary/Keyword: key-code

Search Result 662, Processing Time 0.03 seconds

The effect of radial cracks on tunnel stability

  • Zhou, Lei;Zhu, Zheming;Liu, Bang;Fan, Yong
    • Geomechanics and Engineering
    • /
    • v.15 no.2
    • /
    • pp.721-728
    • /
    • 2018
  • The surrounding rock mass contains cracks and joints which are distributed randomly around tunnels, and in the process of tunnel blasting excavation, radial cracks could also be induced in the surrounding rock mass. In order to clearly understand the impact of radial cracks on tunnel stability, tunnel model tests and finite element numerical analysis were implemented in this paper. Two kinds of materials: cement mortar and sandstone, were used to make tunnel models, which were loaded vertically and confined horizontally. The tunnel failure pattern was simulated by using RFPA2D code, and the Tresca stresses and the stress intensity factors were calculated by using ABAQUS code, which were applied to the analysis of tunnel model test results. The numerical results generally agree with the model test results, and the mode II stress intensity factors calculated by ABAQUS code can well explain the model test results. It can be seen that for tunnels with a radial crack emanating from three points on tunnel edge, i.e., the middle point between tunnel spandrel and its top with a dip angle $45^{\circ}$, the tunnel foot with a dip angle $127^{\circ}$, and the tunnel spandrel with $135^{\circ}$ with tunnel wall, the tunnel model strength is about a half of the regular tunnel model strength, and the corresponding tunnel stability decreases largely.

Polar coded cooperative with Plotkin construction and quasi-uniform puncturing based on MIMO antennas in half duplex wireless relay network

  • Jiangli Zeng;Sanya Liu
    • ETRI Journal
    • /
    • v.46 no.2
    • /
    • pp.175-183
    • /
    • 2024
  • Recently, polar code has attracted the attention of many scholars and has been developed as a code technology in coded-cooperative communication. We propose a polar code scheme based on Plotkin structure and quasi-uniform punching (PC-QUP). Then we apply the PC-QUP to coded-cooperative scenario and built to a new coded-cooperative scheme, which is called PCC-QUP scheme. The coded-cooperative scheme based on polar code is studied on the aspects of codeword construction and performance optimization. Further, we apply the proposed schemes to space-time block coding (STBC) to explore the performance of the scheme. Monte Carlo simulation results show that the proposed cooperative PCC-QUP-STBC scheme can obtain a lower bit error ratio (BER) than its corresponding noncooperative scheme.

Security of Image Information using Steganography and QR Code in IoT (IoT에서 스테가노그라피와 QR 코드를 이용한 영상 정보의 보안)

  • Im, Yong-Soon;Kang, Eun-Young;Park, Jae-Pyo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.31-37
    • /
    • 2015
  • The security of the image information is very important in many areas of the IoT(Internet of Things), and study a number of ways to display the security (copyright, etc.). In this paper, information of image that is used by the IoT is converted to a DCT(Discrete Cosine Transform) and QC(Quantization Coefficient). And watermark (message) is to create a new encoded message(WMQR) through a QR Code. QC and WMQR applies LSB steganography techniques, can get the security (copyright, etc.) of image information. LSB steganographic techniques may be inserted according to a message (Watermark) to determine the location (Secret Key). The encoded image is sent to the recipient via the Internet. The reverse process can be obtained image and a QR code, a watermark (Message). A method for extracting a watermark from the security of the image information is coded using only the image and Secret Key, through the DCT and quantization process, so obtained by separating the watermark (Message) for the image. In this paper, we were able to improve the security of the method of image information, the image quality of the image by the simulations (PSNR), in turn, benefits were also normalized correlation (NC) and security.

Key Technology for Food-Safety Traceability Based on a Combined Two-Dimensional Code

  • Zhonghua Li;Xinghua Sun;Ting Yan;Dong Yang;Guiliang Feng
    • Journal of Information Processing Systems
    • /
    • v.19 no.2
    • /
    • pp.139-148
    • /
    • 2023
  • Current food-traceability platforms suffer from problems such as inconsistent traceability standards, a lack of public credibility, and slow access to data. In this work, a combined code and identification method was designed that can achieve more secure product traceability using the dual anti-counterfeiting technology of a QR code and a hidden code. When the QR code is blurry, the hidden code can still be used to effectively identify food information. Based on this combined code, a food-safety traceability platform was developed. The platform follows unified encoding standards and provides standardized interfaces. Based on this innovation, the platform not only can serve individual food-traceability systems development, but also connect existing traceability systems. These will help to solve the problems such as non-standard traceability content, inconsistent processes, and incompatible system software. The experimental results show that the combined code has higher accuracy. The food-safety traceability platform based on the combined code improves the safety of the traceability process and the integrity of the traceability information. The innovation of this paper is invoking the combined code united the QR code's rapidity and the hidden code's reliability, developing a platform that uses a unified coding standard and provides a standardized interface to resolve the differences between multi-food-traceability systems. Among similar systems, it is the only one that has been connected to the national QR code identification platform. The project has made profits and has significant economic and social benefits.

Design and analysis of a free-piston stirling engine for space nuclear power reactor

  • Dai, Zhiwen;Wang, Chenglong;Zhang, Dalin;Tian, Wenxi;Qiu, Suizheng;Su, G.H.
    • Nuclear Engineering and Technology
    • /
    • v.53 no.2
    • /
    • pp.637-646
    • /
    • 2021
  • The free-piston Stirling engine (FPSE) has been widely used in aerospace owing to its advantages of high efficiency, high reliability, and self-starting ability. In this paper, a 20-kW FPSE is proposed by analyzing the requirements of space nuclear power reactor. A code was developed based on an improved simple analysis method to evaluate the performance of the proposed FPSE. The code is benchmarked with experimental data, and the maximum relative error of the output power is 17.1%. Numerical results show that the output power is 21 kW, which satisfies the design requirements. The results show that: a) reducing the pressure shell's thickness can improve the output power significantly; b) the system efficiency increases with the wire porosity, while the growth of system efficiency decreases when the porosity is higher than 80%, and system efficiency exhibits a linear relationship with the temperatures of the cold and hot sides; c) the system efficiency increases with the compression ratio; the compression ratio increases by 16.7% while the system efficiency increases by 42%. This study can provide valuable theoretical support for the design and analysis of FPSEs for space nuclear power reactors.

Assessment of the severe accident code MIDAC based on FROMA, QUENCH-06&16 experiments

  • Wu, Shihao;Zhang, Yapei;Wang, Dong;Tian, Wenxi;Qiu, Suizheng;Su, G.H.
    • Nuclear Engineering and Technology
    • /
    • v.54 no.2
    • /
    • pp.579-588
    • /
    • 2022
  • In order to meet the needs of domestic reactor severe accident analysis program, a MIDAC (Module Invessel Degraded severe accident Analysis Code) is developed and maintained by Xi'an Jiaotong University. As the accuracy of the calculation results of the analysis program is of great significance for the formulation of severe accident mitigation measures, the article select three experiments to evaluate the updated severe accident models of MIDAC. Among them, QUENCH-06 is the international standard No.45, QUENCH-16 is a test for the analysis of air oxidation, and FROMA is an out-of-pile fuel rod melting experiment recently carried out by Xi'an Jiaotong University. The heating and melting model with lumped parameter method and the steam oxidation model with Cathcart-Pawel and Volchek-Zvonarev correlations combination in MIDAC could better meet the needs of severe accident analysis. Although the influence of nitrogen still need to be further improved, the air oxidation model with NUREG still has the ability to provide guiding significance for engineering practice.

Structural analysis and optimization of large cooling tower subjected to wind loads based on the iteration of pressure

  • Li, Gang;Cao, Wen-Bin
    • Structural Engineering and Mechanics
    • /
    • v.46 no.5
    • /
    • pp.735-753
    • /
    • 2013
  • The wind load is always the dominant load of cooling tower due to its large size, complex geometry and thin-wall structure. At present, when computing the wind-induced response of the large-scale cooling tower, the wind pressure distribution is obtained based on code regulations, wind tunnel test or computational fluid dynamic (CFD) analysis, and then is imposed on the tower structure. However, such method fails to consider the change of the wind load with the deformation of cooling tower, which may result in error of the wind load. In this paper, the analysis of the large cooling tower based on the iterative method for wind pressure is studied, in which the advantages of CFD and finite element method (FEM) are combined in order to improve the accuracy. The comparative study of the results obtained from the code regulations and iterative method is conducted. The results show that with the increase of the mean wind speed, the difference between the methods becomes bigger. On the other hand, based on the design of experiment (DOE), an approximate model is built for the optimal design of the large-scale cooling tower by a two-level optimization strategy, which makes use of code-based design method and the proposed iterative method. The results of the numerical example demonstrate the feasibility and efficiency of the proposed method.

Invariant Biometric Key Extraction based on Iris Code (홍채 코드 기반 생체 고유키 추출에 관한 연구)

  • Lee, Youn-Joo;Lee, Hyung-Gu;Park, Kang-Ryoung;Kim, Jai-Hie
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1011-1014
    • /
    • 2005
  • In this paper, we propose a method that extracts an invariant biometric key in order to apply this biometric key to the crypto-biometric system. This system is a new authentication architecture which can improve the security of current cryptographic system and solve the problem of stored template protection in conventional biometric system, also. To use biometric information as a cryptographic key in crypto-biometric system, same key should be generated from the same person. However, it is difficult to obtain such an invariant biometric key because biometric data is sensitive to surrounding environments. The proposed method solves this problem by clustering Iris Codes obtained by using independent component analysis (ICA).

  • PDF

Performance Comparison of the CELM Encryption Algorithm (CELM 암호화 알고리즘의 성능 비교)

  • 박혜련;이종혁
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.3
    • /
    • pp.481-486
    • /
    • 2002
  • In this paper, we propose CELM(Cascade ELM) to improve stability. We could realize as cascade connected each other key value with N degree equation which has a initial value. And we could know to be improved in stability with the nature of Chaos in simulation result. In efficiency, this CELM algorithm identified sire of encrypted code with size of source code and we could know more efficient than existing RSA and ECC. In speed, CELM took average 0.18㎳ degree to encrypt a file. Although it was slower than DES, it was faster than ECC of RSA.

Development of computational software for flutter reliability analysis of long span bridges

  • Cheng, Jin
    • Wind and Structures
    • /
    • v.15 no.3
    • /
    • pp.209-221
    • /
    • 2012
  • The flutter reliability analysis of long span bridges requires use of a software tool that predicts the uncertainty in a flutter response due to uncertainties in the model formulation and input parameters. Existing flutter analysis numerical codes are not capable of dealing with stochastic uncertainty in the analysis of long span bridges. The goal of the present work is to develop a software tool (FREASB) to enable designers to efficiently and accurately conduct flutter reliability analysis of long span bridges. The FREASB interfaces an open-source Matlab toolbox for structural reliability analysis (FERUM) with a typical deterministic flutter analysis code. The paper presents a brief introduction to the generalized first-order reliability method implemented in FREASB and key steps involved in coupling it with a typical deterministic flutter analysis code. A numerical example concerning flutter reliability analysis of a long span suspension bridge with a main span of 1385 m is presented to demonstrate the application and effectiveness of the methodology and the software.