• Title/Summary/Keyword: key block

Search Result 695, Processing Time 0.029 seconds

Experimental investigation and design method of the general anchorage zone in the ring beam of prestressed concrete containment vessels

  • Chang Wu;Tao Chen;Yanli Su;Tianyun Lan;Shaoping Meng
    • Nuclear Engineering and Technology
    • /
    • v.56 no.2
    • /
    • pp.485-497
    • /
    • 2024
  • Ring beam is the main anchorage zone of the tendons in the nuclear power prestressed concrete containment vessel (PCCV). Its safety is crucial and has a great influence on the overall performance of PCCV. In this paper, two half-scale ring beams were tested to investigate the mechanical performance of the anchorage zone in the PCCV under multidirectional pressure. The effect of working condition with different tension sequences was investigated. Additionally, a half axisymmetric plane model of the containment was established by the finite element simulation to further predict the experimental responses and propose the local reinforcement design in the anchorage zone of the ring beam. The results showed that the ultimate load of the specimens under both working conditions was greater than the nominal ultimate tensile force. The original reinforcement design could meet the bearing capacity requirements, but there was still room for optimization. The ring beam was generally under pressure in the anchorage area, while the splitting force appeared in the under-anchor area, and the spalling force appeared in the corner area of the tooth block, which could be targeted for local strengthening design.

A Selective Encryption/Decryption Method of Sensitive Music Usage History Information on Theme, Background and Signal Music Blockchain Network

  • Youngmo Kim;Byeongchan Park;Seok-Yoon Kim
    • Journal of Web Engineering
    • /
    • v.21 no.4
    • /
    • pp.1265-1282
    • /
    • 2022
  • The theme, background, and signal music usage history information consists of general information such as music information, platform information, and music usage information, and sensitive information such as rights management information, music usage permission range, and contract information. If sensitive information among these is disclosed, disputes such as trade secrets and infringement of personal information protection between companies or between companies and individuals may arise. We propose a selective encryption/decryption method to secure the confidentiality, integrity, reliability and non-repudiation of sensitive music usage history information used in the theme, background, and signal music blockchain environment. In the proposed method, a monitoring company encrypts sensitive information using a secret key for usage history information, which is combined with general information, and digitally signs it using a private key to register it in a block. A trust group can view and access the information at the time of inquiry by verifying the digital signature with the public key of the monitoring company and then can decrypt the sensitive information using the private key.

The Design of Beam Forming Module for Active Phased Array Antenna System (능동위상배열안테나용 수신 빔 성형모듈 설계)

  • 정영배;엄순영;전순익;채종석
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.14 no.1
    • /
    • pp.62-67
    • /
    • 2003
  • This paper is concerned with the design of the beam forming module that is a key unit of the active phased array antenna(APAA) system for mobile satellite communications. This module includes two blocks for main signal and tracking signal. Main signal block has the role of transmitting input signal from phased array antenna to tracking signal block. And, tracking signal block executes main roles, beam forming of tracking signal and electronic beam control. The several electrical performances of this module, phase characteristics and linear gain, etc., agreed with specifications needed fur APAA, and for more clear verification of the performances, the satellite communication test of the APAA including the modules was accomplished in the outdoors.

Research/Development Trend and Technical Enablers of Trajectory-based Operations in Air Traffic Management (항공교통관리 궤적기반운용 연구 개발 동향 및 요소기술)

  • Eun, Yeonju;Jeon, Daekeun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.43 no.4
    • /
    • pp.349-358
    • /
    • 2015
  • The research and development trend of Trajectory-based Operations(TBO), which is considered as a key concept of future Air Traffic Management(ATM), is presented in this paper. The operational concepts of TBO in ASBU(Aviation System Block Upgrade) from ICAO(International Civil Aviation Organization) have been summarized, and the detailed operational concepts and procedures, which can be realized in the near future, are described through the investigations of operational concept development and related research/development activities of TBO in USA and Europe. The technical enablers, which have been identified based on understanding of TBO operational concepts, are introduced, and related research/development status of each technical enabler has been presented.

A Direction-Adaptive Watermarking Technique Based on 2DCT in the Buyer-Seller Watermarking Protocol (구매자-판매자 워터마킹 프로토콜상에서 DCT 기반의 방향성 적응 워터마킹)

  • Seong, Teak-Young;Kwon, Ki-Chang;Lee, Suk-Hwan;Kwon, Ki-Ryong;Woo, Chong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.7
    • /
    • pp.778-786
    • /
    • 2014
  • Buyer-seller watermarking protocol is one of the copyright protection techniques which combine a cryptographic protocol used in electronic commerce with a digital wetermarking scheme aiming at proving the ownership of multimedia contents and preventing the illegal reproduction and redistribution of digital contents. In this paper, it is proposed a new watermarking scheme in an encrypted domain in an image that is based on the block-DCT framework. In order to implement watermarking scheme in a public-key cryptosystem, it is divided that frequency coefficients exist as real number into integer and decimal layer. And the decimal layer is modified integer type through integral-processing. Also, for robustness and invisibility required in watermarking scheme, it is designed a direction-adaptive watermarking scheme based on locally edge-properties of each block in an image through analyzing distribution property of the frequency coefficients in a block using JND threshold.

Nanostructures in Thin Films of Block Copolymers

  • Russell Thomas P.;Hawker Craig J.
    • Proceedings of the Polymer Society of Korea Conference
    • /
    • 2006.10a
    • /
    • pp.80-80
    • /
    • 2006
  • As the size scale of features continue to shrink in devices, the use of self-assembly, i.e. a "bottom up" approach, for device fabrication becomes increasingly important. Yet, simple self-assembly alone will not be sufficient to meet the increasing demands place on the registry of structures, particularly nanostructured materials. Several criteria are key in the rapid advancement and technology transfer for self-assembling systems. Specifically, the assembly processes must be compatible with current $^{\circ}{\infty}top\;down^{\circ}{\pm}$ approaches, where standard photolithographic processes are used for device fabrication. Secondly, simple routes must be available to induce long-range order, in either two or three dimensions, in a rapid, robust and reliable manner. Thirdly, the in-plane orientation and, therefore, ordering of the structures, must be susceptible to a biasing by an external, macroscopic means in at least one, if not two directions, so that individual elements can be accessed in a reliable manner. Block copolymers, specifically block copolymers having a cylindrical microdomain morphology, are one such material that satisfy many, if not all, of the criteria that will be necessary for device fabrication. Here, we discuss several routes by which these versatile materials can be used to produce arrays of nanoscopic elements that have high aspect ratios (ideal for templating and scaffolding), that exhibit long-range order, that give access to multiple length scale structuring, and that are amenable to being biased by macroscopic features placed on a surface.

  • PDF

Perceptual Decomposition and Sequential Principal Edge Vector Quantization of DCT Coefficients for Image Coding (영상 부호화를 위한 DCT 계수의 시각적 분석 및 순차적 규에지 벡터 양자화)

  • 강동욱;송준석;이충웅
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.32B no.1
    • /
    • pp.64-72
    • /
    • 1995
  • We propose a new image coding method which takes into account both statistical redundancy and perceptual irrelevancy of the DCT coefficients so as to provide a high quality of the reconstructed images with a reduced transmission bit rate First, a block of DCT coefficients are decomposed into 16 subvectors so as for a subvector to convey key information about one of the low-pass or the dirctional filtered images. Then, the most significant subvector is selected as the principal edge of the block and then vector quantized. After that, the residuals of the block are computed and then sequentially quantized through aforementioned procedure until the quantization distortion is smaller than the target distortion. The proposed scheme is good at encoding images with a variety of transmission bit rates, especially at very low bit rate coding. In addition, it is another benifit of the proposed scheme that an image can be quantized with a wide range of the transmission bit rates by simply adapting the stopping criterion of the sequential vector quantizer according to the target distortion of the reconstructed image.

  • PDF

Numerical simulation of an external prestressing technique for prestressed concrete end block

  • Murthy, A. Rama Chandra;Ganapathi, S. Chitra;Saibabu, S.;Lakshmanan, N.;Jayaraman, R.;Senthil, R.
    • Structural Engineering and Mechanics
    • /
    • v.33 no.5
    • /
    • pp.605-619
    • /
    • 2009
  • This paper presents the details of finite element (FE) modeling and analysis of an external prestressing technique to strengthen a prestressed concrete (PSC) end block. Various methods of external prestressing techniques have been discussed. In the proposed technique, transfer of external force is in shear mode on the end block creating a complex stress distribution. The proposed technique is useful when the ends of the PSC girders are not accessible. Finite element modeling issues have been outlined. Brief description about material nonlinearity including key aspects in modeling inelastic behaviour has been provided. Finite element (FE) modeling including material, loading has been explained in depth. FE analysis for linear and nonlinear static analysis has been conducted for varying external loadings. Various responses such as out-of-plane deformation and slip have been computed and compared with the corresponding experimental observations. From the study, it has been observed that the computed slope and slip of the steel bracket under external loading is in good agreement with the corresponding experimental observations.

Differential Fault Analysis on Lightweight Block Cipher LBlock (경량 블록 암호 LBlock에 대한 차분 오류 공격)

  • Jeong, Ki-Tae;Lee, Chang-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.5
    • /
    • pp.871-878
    • /
    • 2012
  • LBlock is a 64-bit ultra-light block cipher suitable for the constrained environments such as wireless sensor network environments. In this paper, we propose a differential fault analysis on LBlock. Based on a random nibble fault model, our attack can recover the secret key of LBlock by using the exhaustive search of $2^{25}$ and five random nibble fault injection on average. It can be simulated on a general PC within a few seconds. This result is superior to known differential fault analytic result on LBlock.

Masking-Based Block Cipher LEA Resistant to Side Channel Attacks (부채널 공격에 대응하는 마스킹 기반의 블록 암호 LEA)

  • Park, Eunsoo;Oh, Soohyun;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1023-1032
    • /
    • 2017
  • When a cryptographic device such as smart card performs an encryption for a plain text, an attacker can extract the secret key in it using side channel information. Especially, many researches found some weaknesses for side channel attack on the lightweight block cipher LEA designed to apply in IoT environments. In this paper, we survey several masking countermeasures to defeat the side channel attack and propose a novel masking conversion method. Even though the proposed Arithmetic-to-Boolean masking conversion method requires storage memory of 256 bytes, it can improve the LEA encryption speed up to 17 percentage compared to the case adopted the previous masking method.