• Title/Summary/Keyword: Key Constraints

Search Result 316, Processing Time 0.02 seconds

A Novel IPT System Based on Dual Coupled Primary Tracks for High Power Applications

  • Li, Yong;Mai, Ruikun;Lu, Liwen;He, Zhengyou
    • Journal of Power Electronics
    • /
    • v.16 no.1
    • /
    • pp.111-120
    • /
    • 2016
  • Generally, a single phase H-bridge converter feeding a single primary track is employed in conventional inductive power transfer systems. However, these systems may not be suitable for some high power applications due to the constraints of the semiconductor switches and the cost. To resolve this problem, a novel dual coupled primary tracks IPT system consisting of two high frequency resonant inverters feeding the tracks is presented in this paper. The primary tracks are wound around an E-shape ferrite core in parallel which enhances the magnetic flux around the tracks. The mutual inductance of the coupled tracks is utilized to achieve adjustable power sharing between the inverters by configuring the additional resonant capacitors. The total transfer power can be continuously regulated by altering the pulse width of the inverters' output voltage with the phase shift control approach. In addition, the system's efficiency and the control strategy are provided to analyze the characteristic of the proposed IPT system. An experimental setup with total power of 1.4kW is employed to verify the proposed system under power ratios of 1:1 and 1:2 with a transfer efficiency up to 88.7%. The results verify the performance of the proposed system.

DPW-RRM: Random Routing Mutation Defense Method Based on Dynamic Path Weight

  • Hui Jin;Zhaoyang Li;Ruiqin Hu;Jinglei Tan;Hongqi Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3163-3181
    • /
    • 2023
  • Eavesdropping attacks have seriously threatened network security. Attackers could eavesdrop on target nodes and link to steal confidential data. In the traditional network architecture, the static routing path and the important nodes determined by the nature of network topology provide a great convenience for eavesdropping attacks. To resist monitoring attacks, this paper proposes a random routing mutation defense method based on dynamic path weight (DPW-RRM). It utilizes network centrality indicators to determine important nodes in the network topology and reduces the probability of important nodes in path selection, thereby distributing traffic to multiple communication paths, achieving the purpose of increasing the difficulty and cost of eavesdropping attacks. In addition, it dynamically adjusts the weight of the routing path through network state constraints to avoid link congestion and improve the availability of routing mutation. Experimental data shows that DPW-RRM could not only guarantee the normal algorithmic overhead, communication delay, and CPU load of the network, but also effectively resist eavesdropping attacks.

Many-objective joint optimization for dependency-aware task offloading and service caching in mobile edge computing

  • Xiangyu Shi;Zhixia Zhang;Zhihua Cui;Xingjuan Cai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1238-1259
    • /
    • 2024
  • Previous studies on joint optimization of computation offloading and service caching policies in Mobile Edge Computing (MEC) have often neglected the impact of dependency-aware subtasks, edge server resource constraints, and multiple users on policy formulation. To remedy this deficiency, this paper proposes a many-objective joint optimization dependency-aware task offloading and service caching model (MaJDTOSC). MaJDTOSC considers the impact of dependencies between subtasks on the joint optimization problem of task offloading and service caching in multi-user, resource-constrained MEC scenarios, and takes the task completion time, energy consumption, subtask hit rate, load variability, and storage resource utilization as optimization objectives. Meanwhile, in order to better solve MaJDTOSC, a many-objective evolutionary algorithm TSMSNSGAIII based on a three-stage mating selection strategy is proposed. Simulation results show that TSMSNSGAIII exhibits an excellent and stable performance in solving MaJDTOSC with different number of users setting and can converge faster. Therefore, it is believed that TSMSNSGAIII can provide appropriate sub-task offloading and service caching strategies in multi-user and resource-constrained MEC scenarios, which can greatly improve the system offloading efficiency and enhance the user experience.

Security-Enhanced Key Establishment Scheme for Key Infection (Key Infection의 보안성 향상을 위한 개선된 키 설정 방법)

  • Hwang Young-Sik;Han Seung-Wan;Nam Taek-Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.24-31
    • /
    • 2006
  • Traditional security mechanisms do not work well in the sensor network area due to the sensor's resource constraints. Therefore security issues are challenging problems on realization of the sensor network. Among them, the key establishment is one of the most important and challenging security primitives which establish initial associations between two nodes for secure communications. Recently, R. Anderson et al. proposed one of the promising key establishment schemes for commodity sensor network called Key Infection. However, key infection has an intrinsic vulnerability that there are some areas where adversaries can eavesdrop on the transferred key information at initial key establishment time. Therefore, in this paper, we propose a security-enhanced key establishment scheme for key infection by suggesting a mechanism which effectively reduces the vulnerable areas. The proposed security mechanism uses other neighbor nodes' additional key information to establish pair-wise key at the initial key establishment time. By using the additional key information, we can establish security-enhanced key establishment, since the vulnerable area is decreased than the key infection's. We also evaluate our scheme by comparing it with key infection using logical and mathematical analysis.

A Role of Bio-production Robots in Precision Farming Model of Japan

  • Shibusawa S.
    • Agricultural and Biosystems Engineering
    • /
    • v.5 no.1
    • /
    • pp.1-4
    • /
    • 2004
  • Community-based precision farming is a new concept of agricultural systems, which leads to organize groups of wise farmers and technology platforms in Japan. The wisdom farmers create a rational farming system to manage hierarchical variability: variability in farmers' community as well as variability of within-field and between-field. The technology platform develops and provides three key-technologies: mapping technology, variable-rate technology, and decision support systems available for rural constraints. Advancement of bio-production robots leads precision farming to the next level, where two technological innovations: how to produce and manage information-oriented fields and information-added products, can be attained.

  • PDF

Structural Disambiguation of Korean Adverbs Based on Correlative Relation and Morphological Context

  • Seo, Young-Ae;Park, Sang-Kyu;Choi, Key-Sun
    • ETRI Journal
    • /
    • v.28 no.6
    • /
    • pp.803-806
    • /
    • 2006
  • This letter addresses a structural disambiguation method for Korean adverbs based on the correlative relation constraints between adverbs and modifiees, and the morphological context information of sentences. Using the proposed method, we improved the dependency parsing accuracy of adverbs from 79.2 to 89%. The experimental result shows that the proposed method is especially expert in parsing adverbs which can modify multiple word classes or have a long distance dependency relation to their modifiees.

  • PDF

A Novel Fuzzy Morphology, Part I : Definitins

  • Yonggwan Won;Lee, Bae-Ho
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1995.10b
    • /
    • pp.45-51
    • /
    • 1995
  • A novel definition for fuzzy mathematical morphology is described The generalized-mean operator plays the key role for this definition. Several hard constraints for standard generalized-mean have been eliminated. Complete mathematical description for obtaining fuzzy erosion and dilation is provided. The definitions are well suited for neural network implementation. Therefore, the parameters for the fuzzy definition can be optimized using neural network learning paradigm.

  • PDF

Plat-Based Key Pre-Distribution Scheme in Sensor Network (센서네트워크에서 평면 그리드 기반의 키 선 분배 기법)

  • Maeng, Young-Jae;Mohaisen, Abedelaziz;Lee, Kyung-Hee;Nyang, Dae-Hun
    • The KIPS Transactions:PartC
    • /
    • v.15C no.1
    • /
    • pp.1-8
    • /
    • 2008
  • The security of wireless sensor networks is a challenging research area where the resources constraints are a bottleneck for any successful security design. Due to their computational feasibility, symmetric key algorithms that require key pre-distribution are more desirable for use in these networks. In the pre-distribution scheme, keys or keying materials are assigned to each node prior deployment to guarantee a secure communication within the entire network. Though several works are introduced on this issue, yet the connectivity and resiliency are imperfectly handled. In this paper, we revisit the grid based key pre-distribution scheme aiming to improve the connectivity, introduce a higher resiliency level, simplify the logic of key establishment and maintain same level of used of resources usage. The core of our modification relies on introducing the novel plat-based polynomial assignment and key establishment mechanism. To demonstrate the advantageous properties of our scheme over the revisited one, details of consumed resources, resulting connectivity, security and comparisons with relevant works are introduced.

Applications and Key Technologies of Biomimetic Underwater Robot for Naval Operations (생체모방형 수중로봇의 해양작전 운용개념 및 핵심소요기술)

  • Lee, Ki-Young
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.2
    • /
    • pp.189-200
    • /
    • 2015
  • This paper gives an overview on the some potential applications and key technologies of biomimetic underwater robot for naval operations. Unlike most manned underwater naval systems, biomimetic underwater robots can be especially useful in near-land or harbour areas due to their ability to operate in shallow water effectively. Biomimetic underwater robot provide advantages in reaching locations that would be difficult or too dangerous for a manned vehicle to reach, as well as providing a level of autonomy that can remove the requirement for dedicated human operator support. Using multiple or schools of underwater robots would provide increased flexibility for navigation, communication and surveillance ability. And it alleviate some of the restrictions associated with speed and endurance design constraints.

Optimal Shunt Compensation for Improving Voltage Stability and Transfer Capability in Metropolitan Area of the Korean Power System

  • Choi, YunHyuk;Lee, Byongjun;Kim, TaeKyun
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.4
    • /
    • pp.1502-1507
    • /
    • 2015
  • This paper deals with shunt compensation to eliminate voltage violation and enhance transfer capability, which is motivated towards implementation in the Korean power system. The optimal shunt compensation algorithm has demonstrated its effectiveness in terms of voltage accuracy and reducing the number of actions of reactive power compensating devices. The main shunt compensation devices are capacitor and reactor. Effects of control devices are evaluated by cost computations. The control objective at present is to keep the voltage profile of a key bus within constraints with minimum switching cost. A robust control strategy is proposed to make the control feasible and optimal for a set of power-flow cases that may occurs important event from system. Case studies with metropolitan area of the Korean power system are presented to illustrate the method.