• 제목/요약/키워드: key block

Search Result 695, Processing Time 0.025 seconds

Vibration Reduction Evaluation of Jacket Structure by applying Precast Concrete Block and Suction pile (Precast Concrete Block 및 Suction pile을 적용한 Jacket 구조물의 진동저감 효과 평가)

  • Lee, Sung-Jin;Kyung, Kab-Soo;Ryu, Seong-Jin;Jeong, Ji-Young;Park, Jin-Eun
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.28 no.4
    • /
    • pp.375-384
    • /
    • 2015
  • Recently, construction sites of offshore wind power tend to move from shallow water to deep water. From this tendency, the research on the support structure of offshore wind power in deep water will be a key issue. In this study, precast concrete block and suction pile are applied to existing jacket structure. In order to reduce the vibration of this structure, the tuned liquid damper is also applied in the precast concrete block. The applicability of the suggested jacket structure is evaluated by finite element analysis. And the vibration tends to decrease about 5%, when the tuned liquid damper is applied.

An Integrated Cryptographic Processor Supporting ARIA/AES Block Ciphers and Whirlpool Hash Function (ARIA/AES 블록암호와 Whirlpool 해시함수를 지원하는 통합 크립토 프로세서 설계)

  • Kim, Ki-Bbeum;Shin, Kyung-Wook
    • Journal of IKEEE
    • /
    • v.22 no.1
    • /
    • pp.38-45
    • /
    • 2018
  • An integrated cryptographic processor that efficiently integrates ARIA, AES block ciphers and Whirlpool hash function into a single hardware architecture is described. Based on the algorithm characteristics of ARIA, AES, and Whirlpool, we optimized the design so that the hardware resources of the substitution layer and the diffusion layer were shared. The round block was designed to operate in a time-division manner for the round transformation and the round key expansion of the Whirlpool hash, resulting in a lightweight hardware implementation. The hardware operation of the integrated ARIA-AES-Whirlpool crypto-processor was verified by Virtex5 FPGA implementation, and it occupied 68,531 gate equivalents (GEs) with a 0.18um CMOS cell library. When operating at 80 MHz clock frequency, it was estimated that the throughputs of ARIA, AES block ciphers, and Whirlpool hash were 602~787 Mbps, 682~930 Mbps, and 512 Mbps, respectively.

Design of a Real-time Algorithm Using Block-DCT for the Recognition of Speed Limit Signs (Block-DCT를 이용한 속도 제한 표지판 실시간 인식 알고리듬의 설계)

  • Han, Seung-Wha;Cho, Han-Min;Kim, Kwang-Soo;Hwang, Sun-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1574-1585
    • /
    • 2011
  • This paper proposes a real-time algorithm for speed limit sign recognition for advanced safety vehicle system. The proposed algorithm uses Block-DCT in extracting features from a given ROI(Region Of Interest) instead of using entire pixel values as in previous works. The proposed algorithm chooses parts of the DCT coefficients according to the proposed discriminant factor, uses correlation coefficients and variances among ROIs from training samples to reduce amount of arithmetic operations without performance degradation in classification process. The algorithm recognizes the speed limit signs using the information obtained during training process by calculating LDA and Mahalanobis Distance. To increase the hit rate of recognition, it uses accumulated classification results computed for a sequence of frames. Experimental results show that the hit rate of recognition for sequential frames reaches up to 100 %. When compared with previous works, numbers of multiply and add operations are reduced by 69.3 % and 67.9 %, respectively. Start after striking space key 2 times.

Key-hole Technique in Treatment of A-C Dislocation - Preliminary Report - (Key-hole 술식을 이용한 급성 견봉쇄골관절 탈구의 치료-예비보고-)

  • Choi Chang-Hyuk;Kwun Koing-Woo;Kim Shin-Kun;Lee Sang-Wook;Yun Young-Jun
    • Clinics in Shoulder and Elbow
    • /
    • v.2 no.1
    • /
    • pp.8-13
    • /
    • 1999
  • The results of the operative treatment of the Grade III acromioclavicular joint injury is defined by the durability of the reduced joint and free of exertional pain. Several surgical techniques have been applied to reduce and stabilize the joints effectively. Resection of clavicular lateral end and subacromial decompression also could be applied to prevent post-operative arthritic change. Biomechanical studies reveals the role of clavicular elevation and rotation to achieve more than 90 degrees of elevation. It also serves as a attachment site of deltoid and trapezius muscle. The stability and mobility of the both acromioclavicular and coracoclavicular joint are important to get full functional recovery. We modified the methods of coracoacromial ligament transfer described by Weaver-Dunn and by Shoji et a!. to pre­vent pullout of the transferred ligament and to get more improved functional results. Main technical point was harvesting full thickness bone block and fix it through the key-hole to reduce pull out angle.

  • PDF

Research on the Inter-harmonics Equivalent Impedance of Series Hybrid Active Power Filter

  • Jian-gong, Zhang;Jian-ben, Liu;Shao-jun, Dai;Qiao-fu, Chen;Jun-jia, He
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.5
    • /
    • pp.2062-2069
    • /
    • 2015
  • In the series hybrid active power filter (SHAPF) with magnetic flux compensation (MFC), the system current oscillate in the experimental results when adding the same phase harmonic current command in current control block. This condition endangers the security of the SHAPF. Taking the digit period average arithmetic as example, this paper explains the inter-harmonics current oscillation in the experiment. The conclusion is that the SHAPF is unstable to the inter-harmonics current in theory. Limited by the capacity of the inverter, the system current and the inverter output current do not increase to infinite. At last, some methods are proposed to solve this problem. From the practical viewpoint, the voltage feed-forward control is easy to achieve. It can suppress the current oscillation problems, and also improve the filtering effect. The feasibility of the methods is validated by both the emulation and experiment results.

A Study on a Variable P box Generation Using a DES Key Expansion (DES 키 확장을 이용한 가변 P box 생성에 관한 연구)

  • Lee, Jun
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.287-292
    • /
    • 2011
  • Using an expanded DES key, we suggest a block cipher algorithm to generate and to use a variable P box. We also present an efficient way for the implementation of variable P box at each round. Using counter examples on Differential Cryptanalysis(DC) and Linear Cryptanalysis(LC), we show that the suggested algorithm is strong enough to overcome those attacks. Compared with the real key bits of triple DES(3DES), the new algorithm is much safer in the points of the exhaustive attack. The results of computer simulations show that the new algorithm is almost 3 times faster than 3DES regarding the cipher process time.

Direct Current Control Method Based On One Cycle Controller for Double-Frequency Buck Converters

  • Luo, Quanming;Zhi, Shubo;Lu, Weiguo;Zhou, Luowei
    • Journal of Power Electronics
    • /
    • v.12 no.3
    • /
    • pp.410-417
    • /
    • 2012
  • In this paper, a direct current control method based on a one-cycle controller (DCOCC) for double frequency buck converters (DF buck) is proposed. This control method can make the average current through the high frequency and low frequency inductors of a DF buck converter equal. This is similar to the average current control method. However, the design of the loop compensator is much easier when compared with the average current control. Since the average current though the high frequency and low frequency inductors is equivalent, the current stress of the high frequency switches and the switch losses are minimized. Therefore, the efficiency of the DF buck converter is improved. Firstly, the operation principle of DCOCC is described, then the small signal models of a one cycle controller and a DF buck converter are presented based on the state space average method. Eventually, a system block diagram of the DCOCC controlled DF buck is established and the compensator is designed. Finally, simulation and experiment results are given to verify the correction of the theory analysis.

Experimental investigation on multi-mode vortex-induced vibration control of stay cable installed with pounding tuned mass dampers

  • Liu, Min;Yang, Wenhan;Chen, Wenli;Li, Hui
    • Smart Structures and Systems
    • /
    • v.23 no.6
    • /
    • pp.579-587
    • /
    • 2019
  • In this paper, pounding tuned mass dampers (PTMDs) were designed to mitigate the multi-mode vortex-induced vibration (VIV) of stay cable utilizing the viscous-elastic material's energy-dissipated ability. The PTMD device consists of a cantilever metal rod beam, a metal mass block and a specially designed damping element covered with viscous-elastic material layer. Wind-tunnel experiment on VIV of stay cable model was set up to validate the effectiveness of the PTMD on multi-mode VIV mitigation of stay cable. By analyzing and comparing testing results of all testing cases, it could be verified that the PTMD with viscous-elastic pounding boundary can obviously mitigate the VIV amplitude of the stay cable. Moreover, the installed location and the design parameters of the PTMD device based on the controlled modes of the primary stay cable, would have a certain extent suppression on the other modal vibration of the stay cable, which means that the designed PTMDs are effective among a large band of frequency for the multi-mode VIV control of the stay cable.

Related-Key Rectangle Attacks on Reduced Rounds of SHACAL-1 (SHACAL-1의 축소 라운드에 대한 연관키 Rectangle 공격)

  • 김종성;김구일;홍석희;이상진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.57-68
    • /
    • 2004
  • The rectangle attack and the related-key attack on block ciphers are well-known to be very powerful. In this paper we combine the rectangle attack with the related-key attack. Using this combined attack we can attack the SHACAL-1 cipher with 512-bit keys up to 59 out of its 80 rounds. Our 59-round attack requires a data complexity of $2^{149.72}$ chosen plaintexts and a time complexity of $2^{498.30}$ encryptions, which is faster than exhaustive search.

MRU-Net: A remote sensing image segmentation network for enhanced edge contour Detection

  • Jing Han;Weiyu Wang;Yuqi Lin;Xueqiang LYU
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.12
    • /
    • pp.3364-3382
    • /
    • 2023
  • Remote sensing image segmentation plays an important role in realizing intelligent city construction. The current mainstream segmentation networks effectively improve the segmentation effect of remote sensing images by deeply mining the rich texture and semantic features of images. But there are still some problems such as rough results of small target region segmentation and poor edge contour segmentation. To overcome these three challenges, we propose an improved semantic segmentation model, referred to as MRU-Net, which adopts the U-Net architecture as its backbone. Firstly, the convolutional layer is replaced by BasicBlock structure in U-Net network to extract features, then the activation function is replaced to reduce the computational load of model in the network. Secondly, a hybrid multi-scale recognition module is added in the encoder to improve the accuracy of image segmentation of small targets and edge parts. Finally, test on Massachusetts Buildings Dataset and WHU Dataset the experimental results show that compared with the original network the ACC, mIoU and F1 value are improved, and the imposed network shows good robustness and portability in different datasets.