• Title/Summary/Keyword: Key Generation

Search Result 1,450, Processing Time 0.03 seconds

Probabilistic Power Flow Studies Incorporating Correlations of PV Generation for Distribution Networks

  • Ren, Zhouyang;Yan, Wei;Zhao, Xia;Zhao, Xueqian;Yu, Juan
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.2
    • /
    • pp.461-470
    • /
    • 2014
  • This paper presents a probabilistic power flow (PPF) analysis method for distribution network incorporating the randomness and correlation of photovoltaic (PV) generation. Based on the multivariate kernel density estimation theory, the probabilistic model of PV generation is proposed without any assumption of theoretical parametric distribution, which can accurately capture not only the randomness but also the correlation of PV resources at adjacent locations. The PPF method is developed by combining the proposed PV model and Monte Carlo technique to evaluate the influence of the randomness and correlation of PV generation on the performance of distribution networks. The historical power output data of three neighboring PV generators in Oregon, USA, and 34-bus/69-bus radial distribution networks are used to demonstrate the correctness, effectiveness, and application of the proposed PV model and PPF method.

Combination Key Generation Scheme Robust to Updates of Personal Information (결합키 생성항목의 갱신에 강건한 결합키 생성 기법)

  • Jang, Hobin;Noh, Geontae;Jeong, Ik Rae;Chun, Ji Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.915-932
    • /
    • 2022
  • According to the Personal Information Protection Act and Pseudonymization Guidelines, the mapping is processed to the hash value of the combination key generation items including Salt value when different combination applicants wish to combine. Example of combination key generation items may include personal information like name, phone number, date of birth, address, and so on. Also, due to the properties of the hash functions, when different applicants store their items in exactly the same form, the combination can proceed without any problems. However, this method is vulnerable to combination in scenarios such as address changing and renaming, which occur due to different database update times of combination applicants. Therefore, we propose a privacy preserving combination key generation scheme robust to updates of items used to generate combination key even in scenarios such as address changing and renaming, based on the thresholds through probabilistic record linkage, and it can contribute to the development of domestic Big Data and Artificial Intelligence business.

Design and Performance Analysis of Queue-based Group Diffie-Hellman Protocol (QGDH)

  • Hong, Sunghyuck;Lee, Sungjin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.149-165
    • /
    • 2013
  • Current group key agreement protocols, which are often tree-based, have unnecessary delays that are caused when members with low-performance computer systems join a group key computation process. These delays are caused by the computations necessary to balance a key tree after membership changes. An alternate approach to group key generation that reduces delays is the dynamic prioritizing mechanism of queue-based group key generation. We propose an efficient group key agreement protocol and present the results of performance evaluation tests of this protocol. The queue-based approach that we propose is scalable and requires less computational overhead than conventional tree-based protocols.

Secure Private Key Revocation Scheme in Anonymous Cluster -Based MANETs

  • Park, YoHan;Park, YoungHo
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.4
    • /
    • pp.499-505
    • /
    • 2015
  • Security supports are a significant factor in the design of mobile ad hoc networks. In the dynamic topology where the node changes frequently, private key generation and revocation for newly joining and leaving nodes must be considered. In addition, the identities of individual nodes must be protected as well in mobile networks to avoid personal privacy concerns. This paper proposes ID-based private key revocation scheme and non-interactive key agreement scheme in anonymous MANETs. The proposed scheme provides the user privacy using pseudonyms and private key generation and revocation schemes with consideration of dynamic user changes. Therefore, our schemes can be applied in dynamic and privacy-preserving MANETs which are helpful to share multimedia data.

Design and Performance Analysis of Queue-based Group Diffie-Hellman Protocol (QGDH)

  • Hong, Sunghyuck;Lee, Sungjin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1737-1753
    • /
    • 2013
  • Current group key agreement protocols, which are often tree-based, have unnecessary delays that are caused when members with low-performance computer systems join a group key computation process. These delays are caused by the computations necessary to balance a key tree after membership changes. An alternate approach to group key generation that reduces delays is the dynamic prioritizing mechanism of queue-based group key generation. We propose an efficient group key agreement protocol and present the results of performance evaluation tests of this protocol. The queue-based approach that we propose is scalable and requires less computational overhead than conventional tree-based protocols.

An Efficient Key Distribution for Broadcast Encryption at Embedded Computing Environment (임베디드 컴퓨팅 환경에서 브로드캐스트 암호화를 위한 효율적인 키 분배)

  • Lee, Deok-Gyu;Kim, Tai-Hoon;Yeo, Sang-Soo;Kim, Seok-Soo;Park, Gil-Cheol;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.1
    • /
    • pp.34-45
    • /
    • 2008
  • Broadcast encryption schemes are applied to transmit digital informations of multimedia, software, Pay-TV etc. in public network. User acquires message or session key to use key that broadcaster transmits, broadcaster need process that generation and distribution key in these process. Also, user secession new when join efficient key renewal need. In this paper, introduce about efficient key generation and distribution, key renewal method. The temporary conference environment base structure against an each mobile device wild gap. Without the transmission possible, it follows infrequent location change and with the quality where the key information change flow. Thus, in this paper, in order to apply to the embedded computing environment and the key generation and the efficient key renewal are done when the mobile device is used of the specify space it proposes.

  • PDF

Resonant Tank Design Considerations and Implementation of a LLC Resonant Converter with a Wide Battery Voltage Range

  • Sun, Wenjin;Wu, Hongfei;Hu, Haibing;Xing, Yan
    • Journal of Power Electronics
    • /
    • v.15 no.6
    • /
    • pp.1446-1455
    • /
    • 2015
  • This paper illustrates resonant tank design considerations and the implementation of a LLC resonant converter with a wide battery voltage range based on the fundamental harmonic approximation (FHA) analysis. Unlike the conventional design at zero load, the parameter K (the ratio of the transformer magnetizing inductor Lm to the resonant inductor Lr) of the LLC converter in this paper is designed with two charging points, (Vo_min, Io_max1) and (Vo_max, Io_max2), according to the battery charging strategy. A 2.9kW prototype with an output voltage range of 36V to 72V dc is built to verify the design. It achieves a peak efficiency of 96%.

Control and Implementation of Dual-Stator-Winding Induction Generator for Variable Frequency AC-Generating System

  • Bu, Feifei;Hu, Yuwen;Huang, Wenxin;Shi, Kai
    • Journal of Power Electronics
    • /
    • v.13 no.5
    • /
    • pp.798-805
    • /
    • 2013
  • This paper presents the control and implementation of the dual-stator-winding induction generator for variable frequency AC (VFAC) generating system. This generator has two sets of stator windings embedded into the stator slots. The power winding produces the VFAC power to feed the loads, and the control winding is connected to the static excitation controller to control the generator for output voltage regulation with speed and load variations. On the basis of the idea of power balance, an instantaneous slip frequency control (ISFC) strategy using the information of both the output voltage and the output power is used in this system. A series of experiments is carried out on a 15 kW prototype for verification. Results show that the system has good static and dynamic performance in a wide speed range, which demonstrates that the ISFC strategy is suitable for this system.

Numerical study on heterogeneous behavior of fine particle growth

  • FAN, Fengxian;YANG, Linjun;Yuan, Zhulin;Yan, Jinpei;Jo, Young Min
    • Particle and aerosol research
    • /
    • v.5 no.4
    • /
    • pp.171-178
    • /
    • 2009
  • $PM_{2.5}$ is one of critical air pollutants due to its high absorbability of heavy metallic fumes, PAH and bacillary micro organisms. Such a fine particulate matter is often formed through various nucleation processes including condensation. This study attempts to find the nucleation behaviors of $PM_{2.5}$ arisen from coal power stations using a classical heterogeneous Fletcher's theory. The numerical simulation by C-language could approximate the nucleation process of $PM_{2.5}$ from water vapor, of which approach revealed the required energy for embryo formation and embryo size and nucleation rate. As a result of the calculation, it was found that wetting agents could affect the particle nucleation in vapor condensation. In particular, critical contact angle relates closely with the vapor saturation. Particle condensation could be reduced by lowering the angles. The wetting agents aid to decrease the contact angle and surface tensions, thereby may contribute to save the formation energy.

  • PDF

Implementation of Melody Generation Model Through Weight Adaptation of Music Information Based on Music Transformer (Music Transformer 기반 음악 정보의 가중치 변형을 통한 멜로디 생성 모델 구현)

  • Seunga Cho;Jaeho Lee
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.18 no.5
    • /
    • pp.217-223
    • /
    • 2023
  • In this paper, we propose a new model for the conditional generation of music, considering key and rhythm, fundamental elements of music. MIDI sheet music is converted into a WAV format, which is then transformed into a Mel Spectrogram using the Short-Time Fourier Transform (STFT). Using this information, key and rhythm details are classified by passing through two Convolutional Neural Networks (CNNs), and this information is again fed into the Music Transformer. The key and rhythm details are combined by differentially multiplying the weights and the embedding vectors of the MIDI events. Several experiments are conducted, including a process for determining the optimal weights. This research represents a new effort to integrate essential elements into music generation and explains the detailed structure and operating principles of the model, verifying its effects and potentials through experiments. In this study, the accuracy for rhythm classification reached 94.7%, the accuracy for key classification reached 92.1%, and the Negative Likelihood based on the weights of the embedding vector resulted in 3.01.