• Title/Summary/Keyword: Operation key

Search Result 1,745, Processing Time 0.028 seconds

Implementation of Instruction-Level Disassembler Based on Power Consumption Traces Using CNN (CNN을 이용한 소비 전력 파형 기반 명령어 수준 역어셈블러 구현)

  • Bae, Daehyeon;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.527-536
    • /
    • 2020
  • It has been found that an attacker can extract the secret key embedded in a security device and recover the operation instruction using power consumption traces which are some kind of side channel information. Many profiling-based side channel attacks based on a deep learning model such as MLP(Multi-Layer Perceptron) method are recently researched. In this paper, we implemented a disassembler for operation instruction set used in the micro-controller AVR XMEGA128-D4. After measuring the template traces on each instruction, we automatically made the pre-processing process and classified the operation instruction set using a deep learning model CNN. As an experimental result, we showed that all instructions are classified with 87.5% accuracy and some core instructions used frequently in device operation are with 99.6% respectively.

Development of optimal process planning algorithm considered Exit Burr minimization on Face Milling (Face Milling에서 Exit Burr의 최소화를 고려한 최적 가공 계획 알고리즘의 개발)

  • 김지환;김영진;고성림;김용현;박대흠
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2003.06a
    • /
    • pp.1816-1819
    • /
    • 2003
  • As a result of milling operation, we expect to have burr at the outward edge of workpiece. Also, it causes undesirable problems such as deburring cost, low quality of machined surface, and bottleneck in manufacturing process. Though it is impossible to totally remove burr in machining, it is necessary to plan a machining process that minimizes the occurrence of burr. In this paper, a scheme is proposed which identifies the tool path of the milling operation with minimum burr. In the previous research, a Burr Expert System was developed where the feature identification, the cutting condition identification, and the analysis on exit burr formation are the key steps in the program. The Burr Expert System predicts which portion of workpiece would have the exit burr in advance so that we can calculate the burr length of each milling operation. Here, the critical angle determines whether the burr analyzed is an exit burr or not. So the burr minimization scheme becomes to minimize the burr with critical angle. By iterating all the possible tool paths in certain milling operation, we can identify the tool path with minimum burr.

  • PDF

Digital Ratio Differential Relaying for Main Protection of Large Generator (대형 발전기 주보호를 위한 디지털 비율차동 계전기법)

  • Park, Chul-Won;Ban, Yu-Hyeon
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.61 no.1
    • /
    • pp.35-40
    • /
    • 2012
  • An AC generator is an important component in producing an electric power and so it requires highly reliable protection relays to minimize the possibility of demage occurring under fault conditions. It is a need for research of digital generator protection system(DGPS) for the next-generation ECMS and an efficient operation of protection control system in power station. However, most of protection and control system used in power plants have been still imported as turn-key and operated in domestic. This may cause the lack of the correct understanding on the protection systems and methods, and thus have difficulties in optimal operation. In this paper, presented ratio differential relaying(RDR) is main protective element in generator protection IED. The fault detection technique, operation zone and setting value of the RDR were studied and, compared with two of the fault detection algorithm. For evaluation performance of the RDR, the data obtained from ATPDraw5.7p4 modeling was used. The proposed methods are shown to be able to rapidly identify internal fault and did not operate a miss-operation for all the external fault.

PROLONGATION OF THE BOR-60 REACTOR OPERATION

  • IZHUTOV, ALEXEY L.;KRASHENINNIKOV, YURI M.;ZHEMKOV, IGOR Y.;VARIVTSEV, ARTEM V.;NABOISHCHIKOV, YURI V.;NEUSTROEV, VICTOR S.;SHAMARDIN, VALENTIN K.
    • Nuclear Engineering and Technology
    • /
    • v.47 no.3
    • /
    • pp.253-259
    • /
    • 2015
  • The fast neutron reactor BOR-60 is one of the key experimental facilities worldwide to perform large-scale tests of fuel, absorbing, and structural materials for advanced reactors. The BOR-60 reactor was put into operation in December 1969, and by the end of 2014 it had been operating on power for ~265,000 hours. BOR-60 still demonstrates potential capabilities to extend the lifetime of sodium-cooled fast reactors. The BOR-60 lifetime should have expired at the end of 2014. Over the past few years, a great scope of work has been performed to justify the possibility of extending its lifetime. The work included inspection of the equipment conditions, calculations and experimental research on operating parameters and the conditions of nonremovable components, investigation of the structural material samples after their long-term operation under irradiation, etc. Based on the results of the work performed, the residual lifetime was evaluated and the reactor operator made a decision to extend the lifetime period of the BOR-60 reactor. After considering both a set of documents about the reactor conditions and the positive decision of independent experts, the Regulatory Authority of the Russian Federation extended the BOR-60 operating license up to 2020.

A Takagi-Sugeno fuzzy power-distribution method for a prototypical advanced reactor considering pump degradation

  • Yuan, Yue;Coble, Jamie
    • Nuclear Engineering and Technology
    • /
    • v.49 no.5
    • /
    • pp.905-913
    • /
    • 2017
  • Advanced reactor designs often feature longer operating cycles between refueling and new concepts of operation beyond traditional baseload electricity production. Owing to this increased complexity, traditional proportional-integral control may not be sufficient across all potential operating regimes. The prototypical advanced reactor (PAR) design features two independent reactor modules, each connected to a single dedicated steam generator that feeds a common balance of plant for electricity generation and process heat applications. In the current research, the PAR is expected to operate in a load-following manner to produce electricity to meet grid demand over a 24-hour period. Over the operational lifetime of the PAR system, primary and intermediate sodium pumps are expected to degrade in performance. The independent operation of the two reactor modules in the PAR may allow the system to continue operating under degraded pump performance by shifting the power production between reactor modules in order to meet overall load demands. This paper proposes a Takagi-Sugeno (T-S) fuzzy logic-based power distribution system. Two T-S fuzzy power distribution controllers have been designed and tested. Simulation shows that the devised T-S fuzzy controllers provide improved performance over traditional controls during daily load-following operation under different levels of pump degradation.

Transition Control of Standby and Operation Modes of Wireless Charging System for Inspection Robots

  • Liu, Han;Tan, Linlin;Huang, Xueliang;Czarkowski, Dariusz
    • Journal of Power Electronics
    • /
    • v.19 no.3
    • /
    • pp.691-701
    • /
    • 2019
  • To solve the problems in the contact charging of inspection robots, a wireless charging system for inspection robots and a control strategy are introduced in this paper. Circuit models of a wireless power system with a compound compensation circuit and a three-phase Class-D resonant inverter are set up based on circuit theory. An output voltage control method based on the equal spread regulation of the phase difference between adjacent phases and the parameter correction method in the primary compound compensation circuit are proposed. The dynamic characteristics of the key parameters varying with the secondary coil position are obtained to further investigate the adaptive location scheme during the access and exit processes of moving robots. Combining the output voltage control method and the adaptive location scheme, a transition control strategy for the standby and operation modes of the wireless charging systems for inspection robots is put forward to realize the system characteristics including the low standby power in the standby mode and the high receiving power in the operation mode. Finally, experiments are designed and conducted to verify the correctness of the theoretical research.

Investigation of neural network-based cathode potential monitoring to support nuclear safeguards of electrorefining in pyroprocessing

  • Jung, Young-Eun;Ahn, Seong-Kyu;Yim, Man-Sung
    • Nuclear Engineering and Technology
    • /
    • v.54 no.2
    • /
    • pp.644-652
    • /
    • 2022
  • During the pyroprocessing operation, various signals can be collected by process monitoring (PM). These signals are utilized to diagnose process states. In this study, feasibility of using PM for nuclear safeguards of electrorefining operation was examined based on the use of machine learning for detecting off-normal operations. The off-normal operation, in this study, is defined as co-deposition of key elements through reduction on cathode. The monitored process signal selected for PM was cathode potential. The necessary data were produced through electrodeposition experiments in a laboratory molten salt system. Model-based cathodic surface area data were also generated and used to support model development. Computer models for classification were developed using a series of recurrent neural network architectures. The concept of transfer learning was also employed by combining pre-training and fine-tuning to minimize data requirement for training. The resulting models were found to classify the normal and the off-normal operation states with a 95% accuracy. With the availability of more process data, the approach is expected to have higher reliability.

High Performance Hardware Implementation of the 128-bit SEED Cryptography Algorithm (128비트 SEED 암호 알고리즘의 고속처리를 위한 하드웨어 구현)

  • 전신우;정용진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.1
    • /
    • pp.13-23
    • /
    • 2001
  • This paper implemented into hardware SEED which is the KOREA standard 128-bit block cipher. First, at the respect of hardware implementation, we compared and analyzed SEED with AES finalist algorithms - MARS, RC6, RIJNDAEL, SERPENT, TWOFISH, which are secret key block encryption algorithms. The encryption of SEED is faster than MARS, RC6, TWOFISH, but is as five times slow as RIJNDAEL which is the fastest. We propose a SEED hardware architecture which improves the encryption speed. We divided one round into three parts, J1 function block, J2 function block J3 function block including key mixing block, because SEED repeatedly executes the same operation 16 times, then we pipelined one round into three parts, J1 function block, J2 function block, J3 function block including key mixing block, because SEED repeatedly executes the same operation 16 times, then we pipelined it to make it more faster. G-function is implemented more easily by xoring four extended 4 byte SS-boxes. We tested it using ALTERA FPGA with Verilog HDL. If the design is synthesized with 0.5 um Samsung standard cell library, encryption of ECB and decryption of ECB, CBC, CFB, which can be pipelined would take 50 clock cycles to encrypt 384-bit plaintext, and hence we have 745.6 Mbps assuming 97.1 MHz clock frequency. Encryption of CBC, OFB, CFB and decryption of OFB, which cannot be pipelined have 258.9 Mbps under same condition.

Application of Near-Infrared Fluorescence Imaging with Indocyanine Green in Totally Laparoscopic Distal Gastrectomy

  • Liu, Maoxing;Xing, Jiadi;Xu, Kai;Yuan, Peng;Cui, Ming;Zhang, Chenghai;Yang, Hong;Yao, Zhendan;Zhang, Nan;Tan, Fei;Su, Xiangqian
    • Journal of Gastric Cancer
    • /
    • v.20 no.3
    • /
    • pp.290-299
    • /
    • 2020
  • Purpose: Recently, totally laparoscopic gastrectomy has been gradually accepted by surgeons worldwide for gastric cancer treatment. Complete dissection of the lymph nodes and the establishment of the surgical margin are the most important considerations for curative gastric cancer surgery. Previous studies have demonstrated that indocyanine green (ICG)-traced laparoscopic gastrectomy significantly improves the completeness of lymph node dissection. However, it remains difficult to identify the tumor location intraoperatively for gastric cancers that are staged ≤T3. Here, we investigated the feasibility of ICG fluorescence for lymph node mapping and tumor localization during totally laparoscopic distal gastrectomy. Materials and Methods: Preoperative and perioperative data from consecutive patients with gastric cancer who underwent a totally laparoscopic distal gastrectomy were collected and analyzed. The patients were categorized into the ICG (n=61) or the non-ICG (n=75) group based on whether preoperative endoscopic mucosal ICG injection was performed. Results: The ICG group had a shorter operation time and less intraoperative blood loss. Moreover, significantly more lymph nodes were harvested in the ICG group than the non-ICG group. No pathologically positive margin was found and there was no significant difference in either the proximal or distal surgical margins between the 2 groups. Conclusions: Near-infrared fluorescence imaging with ICG can be successfully used in totally laparoscopic distal gastrectomy, and it contributes to both the completeness of D2 lymph node dissection and confirmation of the gastric transection line. Well-designed prospective randomized studies are needed in the future to fully validate our findings.

An Efficient Key Management Protocol for Wireless Sensor and Actor Networks (무선 센서 및 액터 네트워크를 위한 효율적인 키관리 프로토콜)

  • Kim, Wan-Ju;Nam, Kil-Hyun;Lee, Soo-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.7
    • /
    • pp.540-544
    • /
    • 2007
  • Researches on Sensor Network has become much more active and is currently being applied to many different fields. However since sensor network is limited to only collecting and reporting information regarding a certain event, and requires human intervention with that given information, it is often difficult to react to an event or situation immediately and proactively. To overcome this kind of limitation, Wireless Sensor and Actor Networks (WSANs) with immediate-response Actor Nodes has been proposed which adds greater mobility and activity to exisiting sensor networks. Although WSANs shares many common grounds with sensor networks, it is difficult to apply exisiting security technologies due to the fact that WSAN contains Actor Nodes that are resource-independent and mobile. This research therefore seeks to demonstrate ways to provide security, integrity and authentication services for WSAN's secure operation, by separating networks into hierarchcial structure by each node's abilities and providing different encryption key-based secure protocols for each level of hierarchy: Pair-wise Key, Node Key, and Region Key for sensor levels, and Public Key for actor levels.