• Title/Summary/Keyword: Key block analysis method

Search Result 59, Processing Time 0.025 seconds

Application of a Distinct Element Method in the Analyses of Rock Avalanche and Tunnel Stability in Blocky Rock Masses (암반사태와 블록성 암반내 터널의 안정성 해석을 위한 개별요소법의 적용성)

  • 문현구
    • Tunnel and Underground Space
    • /
    • v.2 no.2
    • /
    • pp.212-223
    • /
    • 1992
  • The distinct element method(DEM) si well suited to the kinematic analysis of blocky rock masses. Two distinctive problems, a rock avalache and tunnel in jointed rock masses, are chosen to apply the DEM which is based on perfectly rigid behaviour of blocks. Investigated for both problems are the effects of the input parameters such as contact stiffnesses, friction coefficient and damping property. Using various types of models of the avalanche and tunne, an extensive parametric study is done to gain experiences in the method, and then to alleviate difficulties in determining parameter values suitable for a given problem. The coefficient of frictio has significant effects on all aspects of avalanche motion(travel distance, velocity and travel time), while the stiffnesses affect the rebounding and jumping motions after collision. The motion predicted by the models having single and mutiple blocks agrees well to the observations reported on the actual avalache. For the tunnel problem, the behaviour of the key block in an example tunnel is compared by testing values of the input parameters. The stability of the tunnel is dependent primarily on the friction coefficient, while the stiffness and damping properties influence the block velocity. The kinematic stability of a tunnel for underground unclear waste repository is analyzed using the joint geometry data(orientation, spacing and persistence) occurred in a tailrace tunnel. Allowing a small deviation to the mean orientation results in different modes of failure of the rock blocks around the tunnel. Of all parameters tested, the most important to the stability of the tunnel in blocky rock masses are the geometry of the blocks generated by mapping the joint and tunnel surfaces in 3-dimensions and also the friction coefficient of the joints particularly for the stability of the side walls.

  • PDF

A Study on Key Protection Method based on WhiteBox Cipher in Block Chain Environment (블록체인 환경에서 화이트박스 암호기반 키 보호 기법에 관한 연구)

  • Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.10
    • /
    • pp.9-15
    • /
    • 2019
  • Recently, in the field of next-generation e-commerce and finance, interest in blockchain-based technologies such as Bitcoin and Ethereum is great. Although the security of blockchain technology is known to be secure, hacking incidents / accidents related to cryptocurrencies are being issued. The main causes were vulnerabilities in the external environment, such as taking over login sessions on cryptocurrency wallets, exposing private keys due to malware infection, and using simple passwords. However, private key management recommends general methods such as utilizing a dedicated application or local backup and physical archiving through document printing. In this paper, we propose a white box password-based private key protection scheme. As a result of safety and performance analysis, we strengthened the security against vulnerability of private key exposure and proved the processing efficiency of existing protocol.

A Study on the Reasonable Application Method of Steel Fiber Reinforced Shotcrete in NATM Tunnel (NATM 터널에서 합리적인 강섬유보강 숏크리트 적용방안에 관한 연구)

  • Seok, Chongken;Ahn, Taebong
    • Journal of the Korean GEO-environmental Society
    • /
    • v.15 no.9
    • /
    • pp.19-28
    • /
    • 2014
  • Recently, the proportion of long tunnel has increased for efficient use of land due to limited land area, driving convenience and high speed. RMR and Q-System of empirical methods has been mainly used for tunnel support design in domestic. Although shotcrete is the key to NATM tunnel, the related studies are insufficient. So, steel fiber reinforced shotcrete is applied to II~V grade rocks on domestic and foreign applications. And same amount of shotcrete is equally applied to tunnel roof and wall regardless of the applied rock load. Shotcrete is applied excessively rather than the original proposed value of RMR and Q-System. Thus, this study is to reevaluate the application part of plain shotcrete and steel fiber reinforced shotcrete of tunnel in Daebo granite, and to propose the reasonable application method of steel fiber reinforced shotcrete. Field test and numerical back analysis using measurements were performed to verify stability. According to results, if RMR values are the upper class in the III grade, it can be designed in accordance with upper grade. In addition, if rock condition is good as a mountain tunnel in Daebo granite, it can be applied for plain shotcrete to III grade rocks because there is also no stability problems. And although steel fiber reinforced shotcrete is applied only crown of the tunnel in IV grade rocks, it is possible to secure stability for falling rock by key-block.

A Study on Durability Improvement of Breech Block for 30mm Automatic Gun (30mm 자동포용 폐쇄기의 내구성 향상에 관한 연구)

  • Park, Young Min;Kim, Sung Hoon;Noh, Sang Wan;Kim, Sung Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.47-53
    • /
    • 2020
  • The purpose of this study was to increase product reliability by improving the durability of the breech block for a 30mm Automatic Gun. The breech block is a key component of a gun that functions as chambering, closing, and extracting. The breech block requires high reliability, which needs to be improved because cracks of a breech block can occur early in operation. Cause analysis confirmed that the crack is caused by repeated impacts. Therefore, the following improvement measures were studied, and the effects were demonstrated using a firing test. The energy of impact absorption was increased by changing the material, and the stress concentration was mitigated by increasing the value of R. In addition, the fatigue life was increased by adding Shot-peening, deleting chromium plating, and changing the forging method. The firing test did not show firing trouble for up to 5,000 rounds. The start timing of the crack was delayed, and the depth was small. Therefore, the improved product was more durable than the existing product. This study can be used as a useful reference when assessing the improvement of the durability of similar products, life study, and criteria for crack acceptance.

A New Approach for Image Encryption Based on Cyclic Rotations and Multiple Blockwise Diffusions Using Pomeau-Manneville and Sin Maps

  • Hanchinamani, Gururaj;Kulakarni, Linganagouda
    • Journal of Computing Science and Engineering
    • /
    • v.8 no.4
    • /
    • pp.187-198
    • /
    • 2014
  • In this paper an efficient image encryption scheme based on cyclic rotations and multiple blockwise diffusions with two chaotic maps is proposed. A Sin map is used to generate round keys for the encryption/decryption process. A Pomeau-Manneville map is used to generate chaotic values for permutation, pixel value rotation and diffusion operations. The encryption scheme is composed of three stages: permutation, pixel value rotation and diffusion. The permutation stage performs four operations on the image: row shuffling, column shuffling, cyclic rotation of all the rows and cyclic rotation of all the columns. This stage reduces the correlation significantly among neighboring pixels. The second stage performs circular rotation of pixel values twice by scanning the image horizontally and vertically. The amount of rotation is based on $M{\times}N$ chaotic values. The last stage performs the diffusion four times by scanning the image in four different ways: block of $8{\times}8$ pixels, block of $16{\times}16$ pixels, principal diagonally, and secondary diagonally. Each of the above four diffusions performs the diffusion in two directions (forwards and backwards) with two previously diffused pixels and two chaotic values. This stage makes the scheme resistant to differential attacks. The security and performance of the proposed method is analyzed systematically by using the key space, entropy, statistical, differential and performance analysis. The experimental results confirm that the proposed method is computationally efficient with high security.

MILP-Aided Division Property and Integral Attack on Lightweight Block Cipher PIPO (경량 블록 암호 PIPO의 MILP-Aided 디비전 프로퍼티 분석 및 인테그랄 공격)

  • Kim, Jeseong;Kim, Seonggyeom;Kim, Sunyeop;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.875-888
    • /
    • 2021
  • In this paper, we search integral distinguishers of lightweight block cipher PIPO and propose a key recovery attack on 8-round PIPO-64/128 with the obtained 6-round distinguishers. The lightweight block cipher PIPO proposed in ICISC 2020 is designed to provide the efficient implementation of high-order masking for side-channel attack resistance. In the proposal, various attacks such as differential and linear cryptanalyses were applied to show the sufficient security strength. However, the designers leave integral attack to be conducted and only show that it is unlikely for PIPO to have integral distinguishers longer than 5-round PIPO without further analysis on Division Property. In this paper, we search integral distinguishers of PIPO using a MILP-aided Division Property search method. Our search can show that there exist 6-round integral distinguishers, which is different from what the designers insist. We also consider linear operation on input and output of distinguisher, respectively, and manage to obtain totally 136 6-round integral distinguishers. Finally, we present an 8-round PIPO-64/128 key recovery attack with time complexity 2124.5849 and memory complexity of 293 with four 6-round integral distinguishers among the entire obtained distinguishers.

Distributed Video Compressive Sensing Reconstruction by Adaptive PCA Sparse Basis and Nonlocal Similarity

  • Wu, Minghu;Zhu, Xiuchang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.8
    • /
    • pp.2851-2865
    • /
    • 2014
  • To improve the rate-distortion performance of distributed video compressive sensing (DVCS), the adaptive sparse basis and nonlocal similarity of video are proposed to jointly reconstruct the video signal in this paper. Due to the lack of motion information between frames and the appearance of some noises in the reference frames, the sparse dictionary, which is constructed using the examples directly extracted from the reference frames, has already not better obtained the sparse representation of the interpolated block. This paper proposes a method to construct the sparse dictionary. Firstly, the example-based data matrix is constructed by using the motion information between frames, and then the principle components analysis (PCA) is used to compute some significant principle components of data matrix. Finally, the sparse dictionary is constructed by these significant principle components. The merit of the proposed sparse dictionary is that it can not only adaptively change in terms of the spatial-temporal characteristics, but also has ability to suppress noises. Besides, considering that the sparse priors cannot preserve the edges and textures of video frames well, the nonlocal similarity regularization term has also been introduced into reconstruction model. Experimental results show that the proposed algorithm can improve the objective and subjective quality of video frame, and achieve the better rate-distortion performance of DVCS system at the cost of a certain computational complexity.

An Improved Side Channel Attack Using Event Information of Subtraction (뺄셈연산의 이벤트 정보를 활용한 향상된 RSA-CRT 부채널분석공격 방법)

  • Park, Jong-Yeon;Han, Dong-Guk;Yi, Okyeon;Kim, Jung-Nyeo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.2
    • /
    • pp.83-92
    • /
    • 2013
  • RSA-CRT is a widely used algorithm that provides high performance implementation of the RSA-signature algorithm. Many previous studies on each operation step have been published to verify the physical leakages of RSA-CRT when used in smart devices. This paper proposes SAED (subtraction algorithm analysis on equidistant data), which extracts sensitive information using the event information of the subtraction operation in a reduction algorithm. SAED is an attack method that uses algorithm-dependent power signal changes. An adversary can extract a key using differential power analysis (DPA) of the subtraction operation. This paper indicates the theoretical rationality of SAED, and shows that its results are better than those of other methods. According to our experiments, only 256 power traces are sufficient to acquire one block of data. We verify that this method is more efficient than those proposed in previously published studies.

The Application of Genetic Algorithm for the Identification of Discontinuity Sets (불연속면 군 분류를 위한 유전자알고리즘의 응용)

  • Sunwoo Choon;Jung Yong-Bok
    • Tunnel and Underground Space
    • /
    • v.15 no.1 s.54
    • /
    • pp.47-54
    • /
    • 2005
  • One of the standard procedures of discontinuity survey is the joint set identification from the population of field orientation data. Discontinuity set identification is fundamental to rock engineering tasks such as rock mass classification, discrete element analysis, key block analysis. and discrete fracture network modeling. Conventionally, manual method using contour plot had been widely used for this task, but this method has some short-comings such as yielding subjective identification results, manual operations, and so on. In this study, the method of discontinuity set identification using genetic algorithm was introduced, but slightly modified to handle the orientation data. Finally, based on the genetic algorithm, we developed a FORTRAN program, Genetic Algorithm based Clustering(GAC) and applied it to two different discontinuity data sets. Genetic Algorithm based Clustering(GAC) was proved to be a fast and efficient method for the discontinuity set identification task. In addition, fitness function based on variance showed more efficient performance in finding the optimal number of clusters when compared with Davis - Bouldin index.

A Comperative Study on Purchase Recognition between Domestic Broadcasting Equipment Demanders and Suppliers (국내방송장비 수요처와 공급자의 구매인식 비교 연구)

  • Yun, Myeongjin;Cho, Yongsuck;Lee, Seonhee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.39-44
    • /
    • 2017
  • In this study, we compared the perception of absolute purchase of equipment for broadcasting equipment purchasing demand according to the rapid change of domestic content production and distribution method, and the degree of information such as technical reliability and system stability of domestic broadcasting equipment perceived by consumer The effects were analyzed through a research model. Due to the lack of existing research data on broadcasting equipment demand, we conducted in depth interviews with surveys of broadcasting equipment and surveys. As a result of analysis, compared to foreign equipments, there are many cases of purchase of domestic equipments, systems, and block purchases. To improve the preference and satisfaction of Korean broadcasting equipment, which is recognized by domestic demand for broadcasting equipment, it is urgent to improve the technical reliability and to develop core key equipment and to expand the demand of domestic equipment limited to small power transmitter antenna and monitor equipment. It is urgent to develop in order to develop overseas and to support the domestic market to secure the domestic market.