• Title/Summary/Keyword: Operation key

Search Result 1,728, Processing Time 0.032 seconds

A Study on Fault Tolerant Digital Controllers for Programmable Electronic Interlocking System(II) (전자연동장치의 안전성 활동에 관한 연구(II))

  • Park, Jae-Young;Lee, Jong-Woo
    • The Transactions of the Korean Institute of Electrical Engineers B
    • /
    • v.55 no.12
    • /
    • pp.667-673
    • /
    • 2006
  • Programmable electronic interlocking system plays key role in railway operation and is closely related to railway accidents, in which the programmable electronic controller of interlocking system may become sources. Redundant digital controllers are adopted as the interlocking controllers to prevent the accidents from the controllers being out of order. The redundant digital controllers being fault tolerant are realized through dual or triplex controllers. In this paper, we calculated safety and availability of the redundant digital controllers using Markov models, demonstrated key part to determine the availability ana the safety.

Development of a Real-Time Restoration System for radially operated 154kV Loop System (154kV 방사상 운전계통에 대한 실시간 고장복구시스템 개발 1(알고리즘))

  • Jung, Jung-Won;Lee, Gi-Won;Park, Kyu-Hyun;Choo, Jin-Boo;Yoon, Yong-Beum
    • Proceedings of the KIEE Conference
    • /
    • 1997.07c
    • /
    • pp.851-853
    • /
    • 1997
  • This paper presents an algorithm for real-time restoration of radially operated 154kV loop system. Restoration procedure consists of 4 procedures; recognition of faults, identification of fault locations, seperation of fault locations and restoration of blackout areas. This algorithm adopts expert's knowledge for safe and accurate operation of the real-time restoration system (APRS: Automatic Power Reconfiguration System).

  • PDF

Compact implementations of Curve Ed448 on low-end IoT platforms

  • Seo, Hwajeong
    • ETRI Journal
    • /
    • v.41 no.6
    • /
    • pp.863-872
    • /
    • 2019
  • Elliptic curve cryptography is a relatively lightweight public-key cryptography method for key generation and digital signature verification. Some lightweight curves (eg, Curve25519 and Curve Ed448) have been adopted by upcoming Transport Layer Security 1.3 (TLS 1.3) to replace the standardized NIST curves. However, the efficient implementation of Curve Ed448 on Internet of Things (IoT) devices remains underexplored. This study is focused on the optimization of the Curve Ed448 implementation on low-end IoT processors (ie, 8-bit AVR and 16-bit MSP processors). In particular, the three-level and two-level subtractive Karatsuba algorithms are adopted for multi-precision multiplication on AVR and MSP processors, respectively, and two-level Karatsuba routines are employed for multi-precision squaring. For modular reduction and finite field inversion, fast reduction and Fermat-based inversion operations are used to mitigate side-channel vulnerabilities. The scalar multiplication operation using the Montgomery ladder algorithm requires only 103 and 73 M clock cycles on AVR and MSP processors.

Inner Evaporative Cooling Wind Power Generator with Non-overlapping Concentrated Windings

  • Li, Wang;Wang, Haifeng
    • Journal of international Conference on Electrical Machines and Systems
    • /
    • v.3 no.1
    • /
    • pp.15-19
    • /
    • 2014
  • As the space of the wind power generator stator end is limited, it is difficult for us to place the inner evaporative cooling system in it. We use the non-overlapping concentrated windings scheme to solve the placing and cooling problem. The characteristic of a 5MW direct-driven permanent magnet generator with non-overlapping concentrated windings were analyzed under no-load, rating-load and short-circuit by (Finite Element Method) FEM for verification of design. We studied the connection methods of the stator windings and designed the end connection member. The heat dissipation of the stator end was simulated by FEM, the result showed that the end cooling could satisfy the wind generator operation needs. These results show that the direct-driven permanent magnet wind power generators with non-overlapping concentrated windings and inner evaporative cooling system can solve the cooling problem of wind power generator, and obtain good performance at the same time.

Application of KPI based on Coupling Model Design in Medium and Small Manufacturers (중소 제조업의 융합모형 설계에 따른 핵심성과지표 적용 사례)

  • Park, Kook-Je;Lee, Woon-Seek;Hwang, Gun-Yong
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.31 no.1
    • /
    • pp.66-73
    • /
    • 2008
  • It is important to manage quality and safety of a product for coping with fast-paced world effectively. This paper demonstrates an integrated model between ISO 9001 Quality Management System and Product Safety Management System. And the paper presents a method which decides key performance indicators (KPI) to be concentrated on the effectiveness of system operation. A case study shows an process for industry to implement the developed methodology.

Design of LFSR Multipliers for Public-key Cryptosystem (공개키 암호 시스템을 위한 LFSR 곱셈기 설계)

  • 이진호;김현성
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.9 no.1
    • /
    • pp.43-48
    • /
    • 2004
  • This paper presents new architectures based on the linear feedback shia resister architecture over GF(2m). First we design a modular multiplier and a modular squarer, then propose an architecture by combing the multiplier and the squarer. All architectures use an irreducible AOP (All One Polynomial) as a modulus, which has the properties of all coefficients with '1'. The proposed architectures have lower hardware complexity than previous architectures. They could be. Therefore it is useful for implementing the exponentiation architecture, which is the con operation in public-key cryptosystems.

  • PDF

A Design for a Zigbee Security System in the Customer Side Environment of Jeju Smart Grid Field Test (제주 스마트그리드 실증단지 수용가 환경에서 Zigbee 보안 체계 설계)

  • Lee, Myung-Hoon;Son, Sung-Yong
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.8
    • /
    • pp.1186-1192
    • /
    • 2012
  • In Jeju Smart Grid field test, Zigbee technology is being used as one of customer side solutions for AMI. Although Zigbee networks that provides effective connectivity and control among devices are advantages in ease of implementation and use, the data can be exposed to cyber attacks such as eavesdrop, unauthorized data dissemination and forgery. Currently authentication and confidentiality services are provided with the network and link keys generated based on public key pairs that are pre-installed in offline. However, the network is vulnerable once a hacker intrudes into a local network because operation and management policies for the generated keys are not well-established yet. In this paper, the vulnerability of the Zigbee security system in the customer side environment of Jeju Smart Grid field test is analyzed. Then, two-way authentication with the unique identifiers of devices and user-specific group management policies are proposed to resolve the vulnerability.

Study and Practice on New Generation Digital-City Oriented 3D Digital Map

  • He, Xiaozhao;Li, Qi;Cheng, Jicheng
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.914-916
    • /
    • 2003
  • Most current 3D digital maps are 2.5 dimension models based on DEM, which can only be recognized, browsed and operated by a special software, far from meeting the needs of a modern digital city (global) with the distributed, isomerous and multiple application on the real 3D representation and open sharing models. In this paper, a new generation digital city oriented 3D digital map is studied. Firstly, a real 3D digital map representation is presented. And then, some key techniques and methods for browser-based 3D digital map’s representation, display and operation are introduced, which can realized the open sharing of 3D map in distributed, isomerous and multiple application environment. Furthermore, the scale driving technique of proposed 3D digital map is also studied. And currently, some developments based on some of the above methods are being carried to provide key and general platform for other application software’s development.

  • PDF

Security Method for Approval Process of Payment System (지불시스템의 승인단계에서 보안방안)

  • 임인채;위장현
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.7 no.4
    • /
    • pp.59-65
    • /
    • 2002
  • Payment systems in EC need confidentiality, integrity, non-repudiation. All transactions between cardholders and merchants must be authorized by a payment gateway in SET protocol. RSA secret key operation which requires heavy computation takes the most part of the time for payment authorization. For the reason, a heavy traffic of payment authorization requests from merchants causes the payment gateway to execute excessive RSA secret key operations, which may cause the bottleneck of the whole system. To resolve this problem, One-Time Password technique is applied to payment authorization step of the SET protocol.

  • PDF

Device to Device Communications Architectures and Cross-Layer Evaluation Frameworks

  • Aldabbagh, Ghadah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.152-161
    • /
    • 2021
  • The paper focuses on Device-to-device (D2D) Architectures evaluation frameworks. D2D communication and discovery can improve spectrum usage efficiency and optimize the tradeoffs between throughput and energy consumption. The target operation modes involve both indirect communication between two nodes via a base station or the direct communication among proximal nodes, enabling use cases that can support communications out of cellular coverage, as well as low end-end delay requirements. The paper will present the architectural evolution of D2D networks within 3GPP standardization and will highlight key network functionalities and signaling protocols. It will also identify key analytical and simulation models that can be used to assess the performance and energy efficiency of resource allocation strategies, and it will present a suitable cross-layer integrated framework.