• Title/Summary/Keyword: key block

Search Result 695, Processing Time 0.028 seconds

A novel AC-DC switching technology without inductors (인덕터를 사용하지 않는 새로운 AC-DC 변환 방식)

  • Yoon, Jin-Han;Cha, Hyeong-Woo;Lee, Man-Seop;Cho, Young-Chang
    • Proceedings of the KIPE Conference
    • /
    • 2007.07a
    • /
    • pp.138-140
    • /
    • 2007
  • A novel AC-DC switching technology is suggested without inductors for one-chip semiconductor. The suggested converter consists of a rectifier diodes, AC source level detector, switching control, detector of over-current and voltage, feedback controller and switching block, The key technology of the proposed AC-DC converting methode is detecting of the low level voltage for AC voltage, power control transistor and rectifying of DC level. The measurement results with commercial devices show that the converter has power efficiency of 66.5% for DC 12V 0.24A and the standby power is 49.58mW at AC 110V.

  • PDF

Wave Overtopping Characteristics of Rubble Mound Revetment and Wave Absorbing Revetment (사석 경사제 및 소파블록 경사제 호안의 월파특성)

  • Lee, Won;Park, Jin-Ho;Cho, Yong-Sik
    • 한국방재학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.443-445
    • /
    • 2008
  • Determination of allowable overtopping rate for coastal structure is a key point to determine the application of background of coastal structure while considering safety and economic efficiency. Thus, the accurate estimation of overtopping rate against coastal structure is essential. In general, estimation of overtopping against the coastal structure is based on an empirical formula or hydraulic experiment. In this study, we investigate the behavior of overtopping for rubble mound coastal structure with rubble armor stone and wave dissipating block using hydraulics experiment, and domestic or foreign design standard.

  • PDF

A Study on a Simulation Model to Analyze the Availability of a SoS (복합시스템 가용도 분석을 위한 시뮬레이션 모델 연구)

  • Kim, Hye-Lyeong;Kim, Ui-Hwan;Choi, Sang-Yeong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1049-1057
    • /
    • 2011
  • Today, most weapon systems operate as component systems of SoS(System of Systems) and they produce synergy effects in the battle field by interoperating. In addition, the acquisition issues on weapon systems have expanded into SoS context including sustainment analysis. Availability is the sustainment KPP(Key Performance Parameter) of weapon systems. In this paper, a simulation model is proposed to analyze the availability of SoS. The simulation model consists of 5 modules: Mission and Task, System, System RBD, Maintenance system and a simulation engine. Then it was implemented and applied to a SoS. As a result of the application, the simulation model could be applied for analyzing the availability of the SoS and provided information about critical tasks and risky component systems to complete the given mission of the SoS.

Influence of fracture characters on flow distribution under different Reynold numbers

  • Wang, Jing;Li, Shu-Cai;Li, Li-Ping;Gao, Cheng-Lu
    • Geomechanics and Engineering
    • /
    • v.14 no.2
    • /
    • pp.187-193
    • /
    • 2018
  • Water inrush through the destruction of water resisting rock mass structure was divided into direct water inrush, key block water inrush and splitting water inrush. In the direct water inrush, the Reynolds numbers has a significant effect on the distribution of the water flow and vortex occurred in the large Reynolds numbers. The permeability coefficient of the fracture is much larger than the rock, and the difference is between 104 and 107 times. The traditional theory and methods are not considering the effect of inertia force. In the position of the cross fracture, the distribution of water flow can only be linearly distributed according to the fracture opening degree. With the increase of Reynolds number, the relationship between water flow distribution and fracture opening is studied by Semtex.

Design of a RS(23,17) Reed-Solomon Decoder (RS(23,17) 리드-솔로몬 복호기 설계)

  • Kang, Sung-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2286-2292
    • /
    • 2008
  • In this paper, we design a RS(23,17) decoder for MB-OFDM(Multiband-Orthogonal Frequency Division Multiplexing) system, in which Modified Euclidean(ME) algorithm is adopted for key equation solver block. The proposed decoder has been optimized for MB-OFDM system so that it has less latency and hardware complexity. Additionally, we have implemented the proposed decoder using Verilog HDL and synthesized with Samsung 65nm library. From synthesis results, it can operate at clock frequency of 250MHz, and gate count is 20,710.

A Secure Decentralized Storage Scheme of Private Information in Blockchain Environments

  • Han, Seungjin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.1
    • /
    • pp.111-116
    • /
    • 2018
  • Recently, IoT and Big Data dealing with voluminous and complex sensitive information is one of the key issues in the era of the 4th industrial revolution. There have been a lot of studies to store the collected and processed sensitive information safely in storage data. Especially biometric information, if it is leaked and becomes identity theft, is hard to be corrected and results in serious event. To fix the problem, methods such as FIDO or KFTC have been proposed. In this paper, we propose a modified method of TTAK.KO-12.0098 according to the environment of this paper and propose a method of safely storing the generated disposable template in a block chain. We show that our method is better by comparing the existing method and the security analysis.

LSB Image Steganography Based on Blocks Matrix Determinant Method

  • Shehzad, Danish;Dag, Tamer
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3778-3793
    • /
    • 2019
  • Image steganography is one of the key types of steganography where a message to be sent is hidden inside the cover image. The most commonly used techniques for image steganography rely on LSB steganography. In this paper, a novel image steganography technique based on blocks matrix determinant method is proposed. Under this method, a cover image is divided into blocks of size $2{\times}2$ pixels and the determinant of each block is calculated. The comparison of the determinant values and corresponding data bits yields a delicate way for the embedment of data bits. The main aim of the proposed technique is to ensure concealment of secret data inside an image without affecting the cover image quality. When the proposed steganography method is compared with other existing LSB steganography methods, it is observed that it not only provides higher PSNR, lower MSE but also guarantees better quality of the stego image.

Research of fast point cloud registration method in construction error analysis of hull blocks

  • Wang, Ji;Huo, Shilin;Liu, Yujun;Li, Rui;Liu, Zhongchi
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.12 no.1
    • /
    • pp.605-616
    • /
    • 2020
  • The construction quality control of hull blocks is of great significance for shipbuilding. The total station device is predominantly employed in traditional applications, but suffers from long measurement time, high labor intensity and scarcity of data points. In this paper, the Terrestrial Laser Scanning (TLS) device is utilized to obtain an efficient and accurate comprehensive construction information of hull blocks. To address the registration problem which is the most important issue in comparing the measurement point cloud and the design model, an automatic registration approach is presented. Furthermore, to compare the data acquired by TLS device and sparse point sets obtained by total station device, a method for key point extraction is introduced. Experimental results indicate that the proposed approach is fast and accurate, and that applying TLS to control the construction quality of hull blocks is reliable and feasible.

An analysis on the security of the 3GPP MAC algorithm (3GPP MAC 알고리즘 안전성 분석)

  • 홍도원;신상욱;강주성;이옥연
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.2
    • /
    • pp.59-65
    • /
    • 2001
  • 3GPP proposed a variant CBC-MAC based on the block cipher KASUMI to provide the data integrity over a radio access link. We have studied deeply the Knudsen and Mitchell\`s attack. In this paper we proposed a definite performing algorithm of the Knudsen and Mitchell\`s alack and compute the success probability and complexity of that algorithm. Moreover We also analyze a security of 3GPP-MAC comparing with the original CBC-MAC.

Synthesis and $BK_{ca}$-channel Opening Activity of Substituted l0-H-Benzo[4-5]furo[3,2-b]indole-carboxylic acids

  • Gormemis, Ahmet-Erkam;Soo, Ha-Tal;Park, Chul-Seung;Kim, Yong-Chul
    • Proceedings of the PSK Conference
    • /
    • 2003.10b
    • /
    • pp.188.2-188.2
    • /
    • 2003
  • Large-conductance $Ca^{2+}$ activated potassium channels $(BK_{ca})$ are widely distributed and play key roles in various cell functions. In nerve cells, B $K_{ca}$ channels shorten the duration of action potentials and block $Ca^{2+}$ entry thereby repolarizing excitable cells after excitation. $(BK_{ca})$ channel opening has been postulated to confer neuroprotection during stroke and has attracted attention as a means for therapeutic intervention in asthma, hypertension, convulsion, and traumatic brain injury. (omitted)

  • PDF