• Title/Summary/Keyword: VAULT

Search Result 218, Processing Time 0.024 seconds

THERMAL AND STRUCTURAL ANALYSIS OF CALANDRIA VESSEL OF A PHWR DURING A SEVERE ACCIDENT

  • Kulkarni, P.P.;Prasad, S.V.;Nayak, A.K.;Vijayan, P.K.
    • Nuclear Engineering and Technology
    • /
    • v.45 no.4
    • /
    • pp.469-476
    • /
    • 2013
  • In a postulated severe core damage accident in a PHWR, multiple failures of core cooling systems may lead to the collapse of pressure tubes and calandria tubes, which may ultimately relocate inside the calandria vessel forming a terminal debris bed. The debris bed, which may reach high temperatures due to the decay heat, is cooled by the moderator in the calandria. With time, the moderator is evaporated and after some time, a hot dry debris bed is formed. The debris bed transfers heat to the calandria vault water which acts as the ultimate heat sink. However, the questions remain: how long would the vault water be an ultimate heat sink, and what would be the failure mode of the calandria vessel if the heat sink capability of the reactor vault water is lost? In the present study, a numerical analysis is performed to evaluate the thermal loads and the stresses in the calandria vessel following the above accident scenario. The heat transfer from the molten corium pool to the surrounding is assumed to be by a combination of radiation, conduction, and convection from the calandria vessel wall to the vault water. From the temperature distribution in the vessel wall, the transient thermal loads have been evaluated. The strain rate and the vessel failure have been evaluated for the above scenario.

Biomechanical Analysis of Tsukahara Vault with Double Salto Backward Piked (도마 츠카하라 몸 접어 뒤로 두 번 돌기의 운동역학적 분석)

  • Lim, Kyu-Chan
    • Korean Journal of Applied Biomechanics
    • /
    • v.14 no.3
    • /
    • pp.135-147
    • /
    • 2004
  • This study was conducted to investigate the technical factors of Lu Yu Fu vault actually performed by three men gymnasts participated in artistic gymnastics competition of 2003 summer Universiade in Daegu through the DLT method of three dimensional cinematography. To analyze these vaults, the instant events of Lu Yu Fu were set in the board touchdown(BTD), the board takeoff(BTO), the horse touchdown(HTD), the horse takeoff(HTO), the peak height(PH), the mat touchdown(MTD) respectively and the phases of that vault were set in the board contact(BC), the preflight(PRF), the horse contact(HC), the postflight(POF), the grounding on mat(GM) respectively After calculating the performance times, the CG displacement velocity, the kinetic energy impulse reaction force moment arm torque at the horse, the released angle piked angle addressed angle, the angular momentum angular velocity of whole body in x axis, and the horizontal displacement between the feet and CG, the following conclusions were reached. To perform the better Lu Yu Fu vault, a gymnast must have the large horizontal velocity of whole body with fast run-up, decrease the duration time and the horizontal vertical displacement of whole body in PRF, have the enough time to judge the correct magnitude and direction of force to brake or push the horse so as to lengthen the HC duration time at any cost. Also it is desirable to increase the horizontal vertical displacement of whole body in POF if possible, maintain the adequate piked position to decrease the angular velocity of whole body in x axis, prepare the grounding on mat previously and delay the release of the hand from the body to keep the angular momentum.

Experimental study on the mechanical response and failure behavior of double-arch tunnels with cavities behind the liner

  • Zhang, Xu;Zhang, Chengping;Min, Bo;Xu, Youjun
    • Geomechanics and Engineering
    • /
    • v.20 no.5
    • /
    • pp.399-410
    • /
    • 2020
  • Cavities often develop behind the vault during the construction of double-arch tunnels, generally in the form of various defects. The study evaluates the impact of cavities behind the vault on the mechanical and failure behaviors of double-arch tunnels. Cavities of the same sizes are introduced at the vault and the shoulder close to the central wall of double-arch tunnels. Physical model tests are performed to investigate the liner stress variation, the earth pressure distribution and the process of progressive failure. Results reveal that the presence of cavities behind the liner causes the re-distribution of the earth pressure and induces stress concentration near the boundaries of cavities, which results in the bending moments in the liner inside the cavity to reverse sign from compression to tension. The liner near the invert becomes the weak region and stress concentration points are created in the outer fiber of the liner at the bottom of the sidewall and central wall. It is suggested that grouting into the foundation soils and backfilling injection should be carried out to ensure the tunnel safety. Changes in the location of cavities significantly impact the failure pattern of the liner close to the vault, e.g., cracks appear in the outer fiber of the liner inside the cavity when a cavity is located at the shoulder close to the central wall, which is different from the case that the cavity locates at the vault, whereas changes in the location of cavities have a little influence on the liner at the bottom of the double-arch tunnels.

A Fingerprint Verification System Based on Fuzzy Vault and Steganography for Smartphone (퍼지볼트와 스테가노그래피를 이용한 스마트폰 지문 인증 시스템)

  • Nam, Han-Sol;Kim, Ae-Young;Lee, Sang-Ho
    • Journal of KIISE
    • /
    • v.42 no.4
    • /
    • pp.419-426
    • /
    • 2015
  • This paper proposes a fingerprint verification system on a fuzzy vault with steganography for a smartphone. While biometric-based authentication can provide strong security, the biometric data must be handled carefully as it cannot be re-enrolled when it is revealed to other people. When the transformed data is used for authentication, the original biometric data can be protected. In this paper, we combine a fingerprint verification system with a fuzzy vault scheme to protect the fingerprint data of a smartphone user. In addition, the transformed data using a fuzzy vault scheme increases the security as it is concealed by the steganography scheme. The result of the experiment using fingerprint databases shows that the proposed scheme provides a high level of convenience and security for authentication of a smartphone having with a fingerprint sensor.

Real Fuzzy Vault for Protecting Face Template (얼굴인식 템플릿 보호를 위한 Real Fuzzy Vault)

  • Lee, Dae-Jong;Song, Chang-Kyu;Park, Sung-Moo;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.2
    • /
    • pp.113-119
    • /
    • 2013
  • Face recognition techniques have been widely used for various areas including criminal identification due to their capability of easy implementing and user friendly interface. However, they have some drawbacks related to individual's privacy in case that his or her face information is divulged to illegal users. So, this paper proposed a novel method for protecting face template based on the real fuzzy vault. This proposed method has some advantages of regenerating a new face template when a registered face template is disclosed. Through implementing and testing the proposed method, we showed its validity and usefulness.

Hardware Implementation of the Fuzzy Fingerprint Vault System (지문 퍼지볼트 시스템의 하드웨어 구현)

  • Lim, Sung-Jin;Chae, Seung-Hoon;Pan, Sung-Bum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.15-21
    • /
    • 2010
  • The user authentication using fingerprint information not only provides the convenience but also high security. However, the fingerprint information for user authentication can cause serious problems when it has been compromised. It cannot change like passwords, because the user only has ten fingers on two hands. Recently, there is an increasing research of the fuzzy fingerprint vault system to protect fingerprint information. The research on the problem of fingerprint alignment using geometric hashing technique carried out. This paper proposes the hardware architecture fuzzy fingerprint vault system based on geometric hashing. The proposed architecture consists of software and hardware module. The hardware module has charge of matching between enrollment hash table and verification hash table. Based on the experimental results, the execution time of the proposed system with 36 real minutiae is 0.2 second when 100 chaff minutiae, 0.53 second when 400 chaff minutiae.

Robust Fuzzy Fingerprint Vault System against Correlation Attack (상관관계 공격에 강인한 지문퍼지볼트 시스템)

  • Moon, Dae-Sung;Chae, Seung-Hoon;Chung, Yong-Wha;Kim, Sung-Young;Kim, Jeong-Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.13-25
    • /
    • 2011
  • Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. The fuzzy fingerprint vault system is one of the most popular solutions for protecting the fingerprint template stored in the database. Recently, however, this system is very susceptible to a correlation attack that finds the real minutiae using multiple fingerprint vaults enrolled for different applications. To solve this problem, we propose a robust fuzzy fingerprint vault system against the correlation attack. In this paper, we add chaff minutiae based on the relative information of minutiae such as direction, coordinate instead of adding randomly. Also, our proposed approach allow to add multiple chaff minutiae within tolerance box for enhanced security level. Experimental results show that the proposed approach can protect the correlation attack and achieve enhanced verification accuracy.

Development and Growth of the Normal Cranial Vault : An Embryologic Review

  • Jin, Sung-Won;Sim, Ki-Bum;Kim, Sang-Dae
    • Journal of Korean Neurosurgical Society
    • /
    • v.59 no.3
    • /
    • pp.192-196
    • /
    • 2016
  • Understanding the development of a skull deformity requires an understanding of the normal morphogenesis of the cranium. Craniosynostosis is the premature, pathologic ossification of one or more cranial sutures leading to skull deformities. A review of the English medical literature using textbooks and standard search engines was performed to gather information about the prenatal development and growth of the cranial vault of the neurocranium. A process of morphogenic sequencing begins during prenatal development and growth, continues postnatally, and contributes to the basis for the differential manner of growth of cranial vault bones. This improved knowledge might facilitate comprehension of the pathophysiology of craniosynostosis.

An Improved Cancelable Fingerprint Template Encryption System Research

  • Wang, Feng;Han, Bo;Niu, Lei;Wang, Ya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2237-2253
    • /
    • 2017
  • For the existing security problem based on Fuzzy Vault algorithm, we propose a cancelable fingerprint template encryption scheme in this paper. The main idea is to firstly construct an irreversible transformation function, and then apply the function to transform the original template and template information is stored after conversion. Experimental results show it effectively prevents the attack from fingerprint template data and improves security of the system by using minutiae descriptor to encrypt abscissa of the vault. The experiment uses public FVC2004 fingerprint database to test, result shows that although the recognition rate of the proposed algorithm is slightly lower than the original program, but the improved algorithm security and complexity are better, and therefore the proposed algorithm is feasible in general.

Improved Security for Fuzzy Fingerprint Vault Using Secret Sharing over a Security Token and a Server (비밀분산 기법을 이용한 보안토큰 기반 지문 퍼지볼트의 보안성 향상 방법)

  • Choi, Han-Na;Lee, Sung-Ju;Moon, Dae-Sung;Choi, Woo-Yong;Chung, Yong-Wha;Pan, Sung-Bum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.63-70
    • /
    • 2009
  • Recently, in the security token based authentication system, there is an increasing trend of using fingerprint for the token holder verification, instead of passwords. However, the security of the fingerprint data is particularly important as the possible compromise of the data will be permanent. In this paper, we propose an approach for secure fingerprint verification by distributing both the secret and the computation based on the fuzzy vault(a cryptographic construct which has been proposed for crypto-biometric systems). That is, a user fingerprint template which is applied to the fuzzy vault is divided into two parts, and each part is stored into a security token and a server, respectively. At distributing the fingerprint template, we consider both the security level and the verification accuracy. Then, the geometric hashing technique is applied to solve the fingerprint alignment problem, and this computation is also distributed over the combination of the security token and the server in the form of the challenge-response. Finally, the polynomial can be reconstructed from the accumulated real points from both the security token and the server. Based on the experimental results, we confirm that our proposed approach can perform the fuzzy vault-based fingerprint verification more securely on a combination of a security token and a server without significant degradation of the verification accuracy.