• 제목/요약/키워드: Entropy generation number

Search Result 21, Processing Time 0.03 seconds

Heat Transfer and Pressure Drop of Cross-flow Heat Exchanger on Modules Variation (직교류 열교환기의 모듈수에 따른 열전달 및 압력강하 특성)

  • Kim, Jong-Min;Kim, Jinsu;Yu, Byeonghun;Kum, Sungmin;Lee, Chang-Eon;Lee, Seungro
    • Journal of Energy Engineering
    • /
    • v.22 no.2
    • /
    • pp.120-127
    • /
    • 2013
  • This study investigated the characteristics of heat transfer and pressure drop for cross-flow heat exchanger of premixed combustion system. The premixed burner was in front of a heat exchanger, and the number of heat exchanger modules was changed to investigate the characteristics of NOx and CO emissions with various equivalence ratios. In addition, the effectiveness, entropy generation and pressure drop were calculated by various number of heat exchanger modules and the performance of heat exchanger was analyzed by the exergy loss.

An Effective Feature Generation Method for Distributed Denial of Service Attack Detection using Entropy (엔트로피를 이용한 분산 서비스 거부 공격 탐지에 효과적인 특징 생성 방법 연구)

  • Kim, Tae-Hun;Seo, Ki-Taek;Lee, Young-Hoon;Lim, Jong-In;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.63-73
    • /
    • 2010
  • Malicious bot programs, the source of distributed denial of service attack, are widespread and the number of PCs which were infected by malicious bot program are increasing geometrically thesedays. The continuous distributed denial of service attacks are happened constantly through these bot PCs and some financial incident cases have found lately. Therefore researches to response distributed denial of service attack are necessary so we propose an effective feature generation method for distributed denial of service attack detection using entropy. In this paper, we apply our method to both the DARPA 2000 datasets and also the distributed denial of service attack datasets that we composed and generated ourself in general university. And then we evaluate how the proposed method is useful through classification using bayesian network classifier.

A Study on the Establishment of Entropy Source Model Using Quantum Characteristic-Based Chips (양자 특성 기반 칩을 활용한 엔트로피 소스 모델 수립 방법에 관한 연구)

  • Kim, Dae-Hyung;Kim, Jubin;Ji, Dong-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.140-142
    • /
    • 2021
  • Mobile communication technology after 5th generation requires high speed, hyper-connection, and low latency communication. In order to meet technical requirements for secure hyper-connectivity, low-spec IoT devices that are considered the end of IoT services must also be able to provide the same level of security as high-spec servers. For the purpose of performing these security functions, it is required for cryptographic keys to have the necessary degree of stability in cryptographic algorithms. Cryptographic keys are usually generated from cryptographic random number generators. At this time, good noise sources are needed to generate random numbers, and hardware random number generators such as TRNG are used because it is difficult for the low-spec device environment to obtain sufficient noise sources. In this paper we used the chip which is based on quantum characteristics where the decay of radioactive isotopes is unpredictable, and we presented a variety of methods (TRNG) obtaining an entropy source in the form of binary-bit series. In addition, we conducted the NIST SP 800-90B test for the entropy of output values generated by each TRNG to compare the amount of entropy with each method.

  • PDF

Randomized Block Size (RBS) Model for Secure Data Storage in Distributed Server

  • Sinha, Keshav;Paul, Partha;Amritanjali, Amritanjali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4508-4530
    • /
    • 2021
  • Today distributed data storage service are being widely used. However lack of proper means of security makes the user data vulnerable. In this work, we propose a Randomized Block Size (RBS) model for secure data storage in distributed environments. The model work with multifold block sizes encrypted with the Chinese Remainder Theorem-based RSA (C-RSA) technique for end-to-end security of multimedia data. The proposed RBS model has a key generation phase (KGP) for constructing asymmetric keys, and a rand generation phase (RGP) for applying optimal asymmetric encryption padding (OAEP) to the original message. The experimental results obtained with text and image files show that the post encryption file size is not much affected, and data is efficiently encrypted while storing at the distributed storage server (DSS). The parameters such as ciphertext size, encryption time, and throughput have been considered for performance evaluation, whereas statistical analysis like similarity measurement, correlation coefficient, histogram, and entropy analysis uses to check image pixels deviation. The number of pixels change rate (NPCR) and unified averaged changed intensity (UACI) were used to check the strength of the proposed encryption technique. The proposed model is robust with high resilience against eavesdropping, insider attack, and chosen-plaintext attack.

Linear Corrector Overcoming Minimum Distance Limitation for Secure TRNG from (17, 9, 5) Quadratic Residue Code

  • Kim, Young-Sik;Jang, Ji-Woong;Lim, Dae-Woon
    • ETRI Journal
    • /
    • v.32 no.1
    • /
    • pp.93-101
    • /
    • 2010
  • A true random number generator (TRNG) is widely used to generate secure random numbers for encryption, digital signatures, authentication, and so on in crypto-systems. Since TRNG is vulnerable to environmental changes, a deterministic function is normally used to reduce bias and improve the statistical properties of the TRNG output. In this paper, we propose a linear corrector for secure TRNG. The performance of a linear corrector is bounded by the minimum distance of the corresponding linear error correcting code. However, we show that it is possible to construct a linear corrector overcoming the minimum distance limitation. The proposed linear corrector shows better performance in terms of removing bias in that it can enlarge the acceptable bias range of the raw TRNG output. Moreover, it is possible to efficiently implement this linear corrector using only XOR gates, which must have a suitable hardware size for embedded security systems.

A Study on the Diagnosis of Appendicitis using Fuzzy Neural Network (퍼지 신경망을 이용한 맹장염진단에 관한 연구)

  • 박인규;신승중;정광호
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2000.04a
    • /
    • pp.253-257
    • /
    • 2000
  • the objective of this study is to design and evaluate a methodology for diagnosing the appendicitis in a fuzzy neural network that integrates the partition of input space by fuzzy entropy and the generation of fuzzy control rules and learning algorithm. In particular the diagnosis of appendicitis depends on the rule of thumb of the experts such that it associates with the region, the characteristics, the degree of the ache and the potential symptoms. In this scheme the basic idea is to realize the fuzzy rle base and the process of reasoning by neural network and to make the corresponding parameters of the fuzzy control rules be adapted by back propagation learning rule. To eliminate the number of the parameters of the rules, the output of the consequences of the control rules is expressed by the network's connection weights. As a result we obtain a method for reducing the system's complexities. Through computer simulations the effectiveness of the proposed strategy is verified for the diagnosis of appendicitis.

  • PDF

Exergy analysis on the storage performance of the sensible heat storage unit (현열 축열조의 성능에 관한 엑서지 해석)

  • 김시범;권순석
    • Journal of Ocean Engineering and Technology
    • /
    • v.2 no.1
    • /
    • pp.176-182
    • /
    • 1988
  • The exergy analysis on the heat storage performance of the senible heat storage unit which consists of the heat storage material in the concentric annulus and the hot fluid flowing through the inner tube is performed. Heat transfer characteristics which are necessary for the performance of the exergy analysis is obtained from the energy balance equations and the second law of thermodynamics. As the index of heat storage performance, the exergy lossnumber $N_{s}$, and exergy storage ratio from the concepts of the second law of thermodynamics are defined. Results are ovtained for the grometry of the storage unit, the Biot number Bi, ambient temperature $T_{o}$ as parameters. From these results the exergy storage ratio can be considered as the efficiency of the hat storage unit and is introduced as a guide to design.

  • PDF

ANALYSIS OF UNSTEADY OSCILLATING FLOW AROUND TWO DIMENSIONAL AIRFOIL AT HIGH ANGLE OF ATTACK (고받음각 2차원 에어포일 주위의 비정상 유동의 진동 특성에 관한 연구)

  • Yoo, J.K.;Kim, J.S.
    • Journal of computational fluids engineering
    • /
    • v.18 no.1
    • /
    • pp.1-6
    • /
    • 2013
  • Missile and fighter aircraft have been challenged by low restoring nose-down pitching moment at high angle of attach. The consequence of weak nose-down pitching moment can be resulting in a deep stall condition. Especially, the pressure oscillation has a huge effect on noise generation, structure damage, aerodynamic performance and safety, because the flow has strong unsteadiness at high angle of attack. In this paper, the unsteady aerodynamics coefficients were analyzed at high angle of attack up to 50 degrees around two dimensional NACA0012 airfoil. The two dimensional unsteady compressible Navier-Stokes equation with a LES turbulent model was calculated by OHOC (Optimized High-Order Compact) scheme. The flow conditions are Mach number of 0.3 and Reynolds number of $10^5$. The lift, drag, pressure, entropy distribution, etc. are analyzed according to the angle of attack. The results of average lift coefficients are compared with other results according to the angle of attack. From a certain high angle of attack, the strong vortex formed by the leading edge are flowing downstream as like Karman vortex around a circular cylinder. The primary and secondary oscillating frequencies are analyzed by the effects of these unsteady aerodynamic characteristics.

NUMERICAL STUDY OF THE HIGH-SPEED BYPASS EFFECT ON THE AERO-THERMAL PERFORMANCE OF A PLATE-FIN TYPE HEAT EXCHANGER (평판-휜 열교환기의 열-수력학적 성능에 대한 고속 바이패스 영향의 수치적 연구)

  • Lee, Jun Seok;Kim, Minsung;Ha, Man Yeong;Min, June Kee
    • Journal of computational fluids engineering
    • /
    • v.22 no.1
    • /
    • pp.67-80
    • /
    • 2017
  • The high-speed bypass effect on the heat exchanger performance has been investigated numerically. The plate-fin type heat exchanger was modeled using two-dimensional porous approximation for the fin region. Governing equations of mass, momentum, and energy equations for compressible turbulent flow were solved using ideal-gas assumption for the air flow. Various bypass-channel height were considered for Mach numbers ranging 0.25-0.65. Due to the existence of the fin in the bypass channel, the main flow tends to turn into the core region of the channel, which results in the distorted velocity profile downstream of the fin region. The boundary layer thickness, displacement thickness, and the momentum thickness showed the variation of mass flow through the fin region. The mass flow variation along the fin region was also shown for various bypass heights and Mach numbers. The volumetric entropy generation was used to assess the loss mechanism inside the bypass duct and the fin region. Finally, the correlations of the friction factor and the Colburn j-factor are summarized.

A Study on the Vulnerability Assessment of Solar Power Generation Facilities Considering Disaster Information (재해정보를 고려한 태양광발전시설의 취약성 평가에 관한 연구)

  • Heejin Pyo
    • Land and Housing Review
    • /
    • v.15 no.2
    • /
    • pp.57-71
    • /
    • 2024
  • This study aims to develop an evaluation method for solar power facilities considering disaster impacts and to analyse the vulnerabilities of existing facilities. Haenam-gun in Jeollanam-do, where the reassessment of existing facilities is urgent, was selected as the study area. To evaluate the vulnerability from a more objective perspective, principal component analysis and entropy methods were utilised. Seven vulnerability assessment indicators were selected: maximum hourly rainfall, maximum wind speed, number of typhoon occurrence days, number of rainfall days lasting more than five days, maximum daily rainfall, impermeable area ratio, and population density. Among these, maximum hourly rainfall, maximum wind speed, maximum daily rainfall, and number of rainfall days lasting more than five days were found to have the highest weights. The overlay of the derived weights showed that the southeastern regions of Haenam-eup and Bukil-myeon were classified as Grade 1 and 2, whereas the northern regions of Hwawon-myeon, Sani-myeon, and Munnae-myeon were classified as Grade 4 and 5, indicating differences in vulnerability. Of the 2,133 facilities evaluated, 91.1% were classified as Grade 3 or higher, indicating a generally favourable condition. However, there were more Grade 1 facilities than Grade 2, highlighting the need for countermeasures. This study is significant in that it evaluates solar power facilities considering urban disaster resilience and is expected to be used as a basic resource for the installation of new facilities or the management and operation of existing ones.