• Title/Summary/Keyword: High Order Scheme

Search Result 1,113, Processing Time 0.034 seconds

Monte Carlo burnup and its uncertainty propagation analyses for VERA depletion benchmarks by McCARD

  • Park, Ho Jin;Lee, Dong Hyuk;Jeon, Byoung Kyu;Shim, Hyung Jin
    • Nuclear Engineering and Technology
    • /
    • v.50 no.7
    • /
    • pp.1043-1050
    • /
    • 2018
  • For an efficient Monte Carlo (MC) burnup analysis, an accurate high-order depletion scheme to consider the nonlinear flux variation in a coarse burnup-step interval is crucial accompanied with an accurate depletion equation solver. In a Seoul National University MC code, McCARD, the high-order depletion schemes of the quadratic depletion method (QDM) and the linear extrapolation/quadratic interpolation (LEQI) method and a depletion equation solver by the Chebyshev rational approximation method (CRAM) have been newly implemented in addition to the existing constant extrapolation/backward extrapolation (CEBE) method using the matrix exponential method (MEM) solver with substeps. In this paper, the quadratic extrapolation/quadratic interpolation (QEQI) method is proposed as a new high-order depletion scheme. In order to examine the effectiveness of the newly-implemented depletion modules in McCARD, four problems in the VERA depletion benchmarks are solved by CEBE/MEM, CEBE/CRAM, LEQI/MEM, QEQI/MEM, and QDM for gadolinium isotopes. From the comparisons, it is shown that the QEQI/MEM predicts ${k_{inf}}^{\prime}s$ most accurately among the test cases. In addition, statistical uncertainty propagation analyses for a VERA pin cell problem are conducted by the sensitivity and uncertainty and the stochastic sampling methods.

GOPES: Group Order-Preserving Encryption Scheme Supporting Query Processing over Encrypted Data

  • Lee, Hyunjo;Song, Youngho;Chang, Jae-Woo
    • Journal of Information Processing Systems
    • /
    • v.14 no.5
    • /
    • pp.1087-1101
    • /
    • 2018
  • As cloud computing has become a widespread technology, malicious attackers can obtain the private information of users that has leaked from the service provider in the outsourced databases. To resolve the problem, it is necessary to encrypt the database prior to outsourcing it to the service provider. However, the most existing data encryption schemes cannot process a query without decrypting the encrypted databases. Moreover, because the amount of the data is large, it takes too much time to decrypt all the data. For this, Programmable Order-Preserving Secure Index Scheme (POPIS) was proposed to hide the original data while performing query processing without decryption. However, POPIS is weak to both order matching attacks and data count attacks. To overcome the limitations, we propose a group order-preserving data encryption scheme (GOPES) that can support efficient query processing over the encrypted data. Since GOPES can preserve the order of each data group by generating the signatures of the encrypted data, it can provide a high degree of data privacy protection. Finally, it is shown that GOPES is better than the existing POPIS, with respect to both order matching attacks and data count attacks.

A 500MHz 1.1㎱ 32kb SRAM Macro with Selective Bit-line Precharge Scheme (선택적 프리차지 방법을 갖는 500MHz 1.1㎱ 32kb SRAM 마크로 설계)

  • 김세준;장일권곽계달
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.699-702
    • /
    • 1998
  • This paper presents a 500MHz 1.1㎱ 32kb synchronous CMOS SRAM macro using $0.35\mu\textrm{m}$ CMOS technology. In order to operate at high frequency and reduce power dissipation, the designed SRAM macro is realized with optimized decoder, multi-point sense amplifier(MPSA), selective precharge scheme and etc. Optimized decorder and MPSA respectively reduce 50% and 40% of delay time. Also, a selective precharge scheme reduces 80% of power dissipation in that part.

  • PDF

An Interacting Wave Profile of Three Trains of Gravity Waves on Finite Depth by Contraction Method

  • JANG TAEK-SOO
    • Journal of Ocean Engineering and Technology
    • /
    • v.20 no.1 s.68
    • /
    • pp.43-47
    • /
    • 2006
  • Superposition of three wave trains on finite depth is investigated. This paper is focused on how to improve the linear superposition of three waves. This was realized by introducing the scheme. The idea of the scheme is based on a fixed point approach. Application of the scheme to the superposition makes it possible to obtain a wave profile of wave-wave interaction. With the help of FFT, it was possible to analyze high-order nonlinear frequencies for three interacting Stokes' waves on finite depth.

A Distributed Power Optimization Method for CDMA Cellular Mobile Systems Using an Adaptive Search Scheme

  • Lee, Young-Dae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1982-1985
    • /
    • 2003
  • Future cellular networks will mainly be driven by, high quality channels, high band with utilization, low power consumption and efficient network management. For a given channel allocation, the capacity and quality of communication of cellular radio systems using CDMA(Code Division Multiple Access) can be increased by using a transmitter power control scheme to combat the near-far problem. Centralized power control schemes or distributed ones to maximize the minimum signal-to-interference in each user of CDMA wireless network have been investigated. This paper has proposed a distributed power control algorithm, which employs an adaptive search scheme, in order to solve quickly the linear systems of equations for power update in CDMA cellular radio systems. The simulation results show that the proposed scheme has faster convergence rate than the typical bang-bang type of distributed power control algorithm, which has been much used as a reference algorithm in IS-95A and W-CDMA communication network.

  • PDF

Design of Digital Fingerprinting Scheme for Multi-purchase

  • Choi, Jae-Gwi;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.12
    • /
    • pp.1708-1718
    • /
    • 2004
  • In this paper, we are concerned with a digital fingerprinting scheme for multi-purchase where a buyer wants to buy more than a digital content. If we apply previous schemes to multi-purchase protocol, the number of execution of registration step and decryption key should be increased in proportion to that of digital contents to be purchased in order to keep unlinkability. More worse, most of fingerprinting schemes in the literature are based on either secure multi-party computation or general zero-knowledge proofs with very high computational complexity. These high complexities complicate materialization of fingerprinting protocol more and more. In this paper, we propose a multi-purchase fingerprinting scheme with lower computational complexity. In the proposed scheme, a buyer executes just one-time registration step regardless of the number of contents to be purchased. The number of decryption key is constant and independent of the number of contents to be purchased. We can also reduce the computational costs of buyers by introducing a concept of proxy-based fingerprinting protocol.

  • PDF

A Performance Study on Congestion Control Schemes for the Broadband Communication Networks (광대역통신망에서 폭주제어 방식에 대한 성능연구)

  • Doo-yeong Park
    • The Journal of Engineering Research
    • /
    • v.6 no.2
    • /
    • pp.39-46
    • /
    • 2004
  • In this paper, we carry out a performance study related to the Broadband Network. For this network, it has been proposed to use the leaky bucket as a way of controlling congestion within the network. On the top of leaky bucket type rate based congestion control scheme for high speed networks, a user will typically operate an error control scheme for retransmitting lost and erroneous packets. We propose a performance model in order to study the interaction between a user's error control scheme and the leaky bucket congestion control scheme for high speed networks. Simulation results show that parameters such as the window size and the token generation rate in the leaky bucket are key factors affecting the end-to-end delay.

  • PDF

Study on the Improvement of the Convective Differencing Scheme for the High-Accuracy and Stable Resolution of the Numerical Solution (수치해의 정확성과 안정성이 보장되는 대류항 미분법 개선에 관한 연구)

  • 신종근;최영돈
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.16 no.6
    • /
    • pp.1179-1194
    • /
    • 1992
  • QUICKER scheme has several attractive properties. However, under highly convective conditions, it produces overshoots and possibly some oscillations on each side of steps in the dependent variable when the flow is convected at an angle oblique to the grid line. Fortunately, it is possible to modify the QUICKER scheme using non-linear and linear functional relationship. Details of the development of polynomial upwinding scheme are given in this paper, where it is seen that this non-linear scheme has also third order accuracy. This polynomial upwinding scheme is used as the basis for the SHARPER and SMARTER schemes. Another revised scheme was developed by partial modification of QUICKER scheme using CDS and UPWIND schemes(QUICKUP). These revised schemes are tested at the well known bench mark flows, Two-Dimensional Pure Convection Flows in Oblique-Step, Lid Driven Cavity Flows and Buoyancy Driven Cavity Flows. For pure convection oblique step flow test problem, QUICKUP, SMARTER and SHARPER schemes remain absolutely monotonic without overshoot and oscillation. QUICKUP scheme is more accurate than any other scheme in their relative accuracy. In high Reynolds number Lid Driven Cavity Flow, SMARTER and SHARPER schemes retain lower computational cost than QUICKER and QUICKUP schemes, but computed velocity values in the revised schemes produced less predicted values than QUICKER scheme which is strongly effected by overshoot and undershoot values. Also, in Buoyancy Driven Cavity Flow, SMARTER, SHARPER and QUICKUP schemes give acceptable results.

Unsteady Aerodynamic characteristics at High Angle of Attack around Two Dimensional NACA0012 Airfoil (고 받음각 2차원 NACA0012 에어포일 주위의 비정상 공기역학적 특성)

  • Yoo, Jae-Kyeong;Kim, Jae-Soo
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2011.05a
    • /
    • pp.414-419
    • /
    • 2011
  • Missile am fighter aircraft have been challenged by low restoring nose-down pitching moment at high angle of attach. The consequence of weak nose-down pitching moment can be resulting in a deep stall condition. Especially, the pressure oscillation has a huge effect on noise generation, structure damage, aerodynamic performance and safety, because the flow has strong unsteadiness at high angle of attack. In this paper, the unsteady aerodynamics coefficients were analyzed at high angle of attack up to 60 degrees around two dimensional NACA0012 airfoil. The two dimensional unsteady compressible Navier-Stokes equation with a LES turbulent model was calculated by OHOC (Optimized High-Order Compact) scheme. The flow conditions are Mach number of 0.3 and Reynolds number of $10^5$. The lift, drag, pressure distribution, etc. are analyzed according to the angle of attack. The results at a low angle of attack are compared with other results before a stall condition. From a certain high angle of attack, the strong vortex formed by the leading edge are flowing downstream as like Karman vortex around a circular cylinder. Unsteady velocity field, periodic vortex shedding, the unsteady pressure distribution on the airfoil surface, and the acoustic fields are analyzed. The effects of these unsteady characteristics in the aerodynamic coefficients are analyzed.

  • PDF

Proper Numerical Scheme to Solve the Flow Past a Circular Cylinder with Time and Grid Size Variations (시간과 격자 크기 변화에 따른 원주후류해석의 경제적 수치기법)

  • Maeng, Joo-Sung;Kim, Yong-Dae;Choi, IL-Kon
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.24 no.5
    • /
    • pp.652-659
    • /
    • 2000
  • The purpose of this study is to present the most effective numerical scheme to calculate the unsteady flows. In order to calculate the flow quantities of flow past a circular cylinder, Three-time level and five convective schemes are applied to unsteady and convective terms, respectively. The values obtained are compared with those from the existing experimental and numerical studies. At Reynolds numbers up to 160, time intervals can be expanded 10 times of Implicit Euler scheme using Three-time level method, and it is found that QUICK and CUI schemes work much stable than others even if less grid density conditions. The combination of Three-time level and QUICK scheme gives high resolutions for laminar unsteady problems with PC level.