• Title/Summary/Keyword: reliable key distribution

Search Result 53, Processing Time 0.028 seconds

Strain demand prediction of buried steel pipeline at strike-slip fault crossings: A surrogate model approach

  • Xie, Junyao;Zhang, Lu;Zheng, Qian;Liu, Xiaoben;Dubljevic, Stevan;Zhang, Hong
    • Earthquakes and Structures
    • /
    • v.20 no.1
    • /
    • pp.109-122
    • /
    • 2021
  • Significant progress in the oil and gas industry advances the application of pipeline into an intelligent era, which poses rigorous requirements on pipeline safety, reliability, and maintainability, especially when crossing seismic zones. In general, strike-slip faults are prone to induce large deformation leading to local buckling and global rupture eventually. To evaluate the performance and safety of pipelines in this situation, numerical simulations are proved to be a relatively accurate and reliable technique based on the built-in physical models and advanced grid technology. However, the computational cost is prohibitive, so one has to wait for a long time to attain a calculation result for complex large-scale pipelines. In this manuscript, an efficient and accurate surrogate model based on machine learning is proposed for strain demand prediction of buried X80 pipelines subjected to strike-slip faults. Specifically, the support vector regression model serves as a surrogate model to learn the high-dimensional nonlinear relationship which maps multiple input variables, including pipe geometries, internal pressures, and strike-slip displacements, to output variables (namely tensile strains and compressive strains). The effectiveness and efficiency of the proposed method are validated by numerical studies considering different effects caused by structural sizes, internal pressure, and strike-slip movements.

A Copula method for modeling the intensity characteristic of geotechnical strata of roof based on small sample test data

  • Jiazeng Cao;Tao Wang;Mao Sheng;Yingying Huang;Guoqing Zhou
    • Geomechanics and Engineering
    • /
    • v.36 no.6
    • /
    • pp.601-618
    • /
    • 2024
  • The joint probability distribution of uncertain geomechanical parameters of geotechnical strata is a crucial aspect in constructing the reliability functional function for roof structures. However, due to the limited number of on-site exploration and test data samples, it is challenging to conduct a scientifically reliable analysis of roof geotechnical strata. This study proposes a Copula method based on small sample exploration and test data to construct the intensity characteristics of roof geotechnical strata. Firstly, the theory of multidimensional copula is systematically introduced, especially the construction of four-dimensional Gaussian copula. Secondly, data from measurements of 176 groups of geomechanical parameters of roof geotechnical strata in 31 coal mines in China are collected. The goodness of fit and simulation error of the four-dimensional Gaussian Copula constructed using the Pearson method, Kendall method, and Spearman methods are analyzed. Finally, the fitting effects of positive and negative correlation coefficients under different copula functions are discussed respectively. The results demonstrate that the established multidimensional Gaussian Copula joint distribution model can scientifically represent the uncertainty of geomechanical parameters in roof geotechnical strata. It provides an important theoretical basis for the study of reliability functional functions for roof structures. Different construction methods for multidimensional Gaussian Copula yield varying simulation effects. The Kendall method exhibits the best fit in constructing correlations of geotechnical parameters. For the bivariate Copula fitting ability of uncertain parameters in roof geotechnical strata, when the correlation is strong, Gaussian Copula demonstrates the best fit, and other Copula functions also show remarkable fitting ability in the region of fixed correlation parameters. The research results can offer valuable reference for the stability analysis of roof geotechnical engineering.

A New Fuzzy Key Generation Method Based on PHY-Layer Fingerprints in Mobile Cognitive Radio Networks

  • Gao, Ning;Jing, Xiaojun;Sun, Songlin;Mu, Junsheng;Lu, Xiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3414-3434
    • /
    • 2016
  • Classical key generation is complicated to update and key distribution generally requires fixed infrastructures. In order to eliminate these restrictions researchers have focused much attention on physical-layer (PHY-layer) based key generation methods. In this paper, we present a PHY-layer fingerprints based fuzzy key generation scheme, which works to prevent primary user emulation (PUE) attacks and spectrum sensing data falsification (SSDF) attacks, with multi-node collaborative defense strategies. We also propose two algorithms, the EA algorithm and the TA algorithm, to defend against eavesdropping attacks and tampering attacks in mobile cognitive radio networks (CRNs). We give security analyses of these algorithms in both the spatial and temporal domains, and prove the upper bound of the entropy loss in theory. We present a simulation result based on a MIMO-OFDM communication system which shows that the channel response characteristics received by legitimates tend to be consistent and phase characteristics are much more robust for key generation in mobile CRNs. In addition, NIST statistical tests show that the generated key in our proposed approach is secure and reliable.

A Study on Systematic Classification for External Prestressing Method (외부 강선 보강의 체계적 분류 연구)

  • 한만엽;박영훈
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2002.05a
    • /
    • pp.411-416
    • /
    • 2002
  • With a rapid industrialization, repair and strengthening methods for a damaged bridges are raised a head in face of safety and reduction of physical distribution costs of bridges. Above all, external prestressing method has the high adaptability for concrete structures and the reliable effect of strengthening. Innovative ideas for bridges strengthening were considered along with established methods. That methods are identified, described. However there is not a systematic and categorized manual for external prestressing method. This study will provide a systematic and reliable manual with investigating the arrangement shape of cable and characteristics of brackets. And the key result of this study is an extensive compilation, which can be used by practicing engineers, of the most effective techniques for strengthening existing bridges.

  • PDF

Research on the Issuing and Management Model of Certificates based on Clustering Using Threshold Cryptography in Mobile Ad Hoc Networking (이동 Ad Hoc 네트워킹에서 Threshold Cryptography를 적용한 클러스터 기반의 인증서 생성 및 관리 모델연구)

  • Park, Bae-Hyo;Lee, Jae-Il;Hahn, Gene-Beck;Nyang, Dae-Hun
    • Journal of Information Technology Services
    • /
    • v.3 no.2
    • /
    • pp.119-127
    • /
    • 2004
  • A mobile ad hoc network(MANET) is a network where a set of mobile devices communicate among themselves using wireless transmission without the support of a fixed network infrastructure. The use of wireless links makes MANET susceptible to attack. Eavesdroppers can access secret information, violating network confidentiality, and compromised nodes can launch attack from within a network. Therefore, the security for MANET depends on using the cryptographic key, which can make the network reliable. In addition, because MANET has a lot of mobile devices, the authentication scheme utilizing only the symmetric key cryptography can not support a wide range of device authentication. Thereby, PKI based device authentication technique in the Ad Hoc network is essential and the paper will utilize the concept of PKI. Especially, this paper is focused on the key management technique of PKI technologies that can offer the advantage of the key distribution, authentication, and non-reputation, and the issuing and managing technique of certificates based on clustering using Threshold Cryptography for secure communication in MANET.

Research on Line Overload Emergency Control Strategy Based on the Source-Load Synergy Coefficient

  • Ma, Jing;Kang, Wenbo;Thorp, James S.
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.3
    • /
    • pp.1079-1088
    • /
    • 2018
  • A line overload emergency control strategy based on the source-load synergy coefficient is proposed in this paper. First, the definition of the source-load synergy coefficient is introduced. When line overload is detected, the source-load branch synergy coefficient and source-load distribution synergy coefficient are calculated according to the real-time operation mode of the system. Second, the generator tripping and load shedding control node set is determined according to the source-load branch synergy coefficient. And then, according to the line overload condition, the control quantity of each control node is determined using the Double Fitness Particle Swarm Optimization (DFPSO), with minimum system economic loss as the objective function. Thus load shedding for the overloaded line could be realized. On this basis, in order to guarantee continuous and reliable power supply, on the condition that no new line overload is caused, some of the untripped generators are selected according to the source-load distribution synergy coefficient to increase power output. Thus power supply could be restored to some of the shedded loads, and the economic loss caused by emergency control could be minimized. Simulation tests on the IEEE 10-machine 39-bus system verify the effectiveness and feasibility of the proposed strategy.

The Relationship between Clinical Consultation and Worker's Job Satisfaction

  • Sae-Mi SUH;Seong-Gon KIM
    • The Journal of Industrial Distribution & Business
    • /
    • v.15 no.7
    • /
    • pp.29-37
    • /
    • 2024
  • Purpose: The primary objective of this study is to explore the relationship between clinical consultation and job satisfaction among healthcare workers. Specific objectives include: (1) Identifying the key components of clinical consultation that influence job satisfaction. (2) Analyzing the relationship between clinical consultation and job satisfaction among healthcare workers. (3) Providing insights and recommendations for improving job satisfaction through enhanced clinical consultation practices. Research design, data and methodology: This research uses a systematic literature review research methodology to analyze the correlation between clinical consultation and job satisfaction among healthcare workers. Systematic literature reviews are a reliable and reproducible approach of searching for, selecting, appraising and synthesizing the relevant literature on the topic under consideration. Results: The findings of the present research presents the positive relationships between clinical consultation and job satisfaction, emphasizing four main consultation factors to maximize clinical effects. The four key consultation factors as follows: (1) Emotional Support, (2) Professional Development, (3) Feedback, (4) Peer Interaction. Conclusions: All in all, the results of the present research will be useful for healthcare managers and policy makers in terms of promoting mechanisms for increasing job satisfaction which will positively impact organizational staffs' and organizational clients' well-being.

A Key Recovery Mechanism for Reliable Group Key Management (신뢰성 있는 그룹키 관리를 위한 키 복구 메커니즘)

  • 조태남;김상희;이상호;채기준;박원주;나재훈
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.705-713
    • /
    • 2003
  • For group security to protect group data or to charge, group keys should be updated via key update messages when the membership of group changes. If we lose these messages, it is not possible to decrypt the group data and so this is why the recovery of lost keys is very significant. Any message lost during a certain member is logged off can not be recovered in real-time. Saving all messages and resending them by KDC (Key Distribution Center) not only requests large saving spaces, but also causes to transmit and decrypt unnecessary keys. This paper analyzes the problem of the loss of key update messages along with other problems that may arise during member login procedure, and also gives an efficient method for recovering group keys and auxiliary keys. This method provides that group keys and auxiliary keys can be recovered and sent effectively using information stored in key-tree. The group key generation method presented in this paper is simple and enable us to recover any group key without storing. It also eliminates the transmissions and decryptions of useless auxiliary keys.

Lattice based Microstructure Evolution Model for Monte Carlo Finite Element Analysis of Polycrystalline Materials (격자식 미세구조 성장 모델을 이용한 다결정 박막 소재의 유한 요소 해석)

  • 최재환;김한성;이준기;나경환
    • Transactions of Materials Processing
    • /
    • v.13 no.3
    • /
    • pp.248-252
    • /
    • 2004
  • The mechanical properties of polycrystalline thin-films, critical for Micro-Electro-Mechanical Systems (MEMS) components, are known to have the size effect and the scatter in the length scale of microns by the numbers of intensive investigation by experiments and simulations. So, the consideration of the microstructure is essential to cover these length scale effects. The lattice based stochastic model for the microstructure evolution is used to simulate the actual microstructure, and the fast and reliable algorithm is described in this paper. The kinetics parameters, which are the key parameters for the microstructure evolution based on the nucleation and growth mechanism, are extracted from the given micrograph of a polycrystalline material by an inverse method. And the method is verified by the comparison of the quantitative measures, the number of grains and the grain size distribution, for the actual and simulated microstructures. Finite element mesh is then generated on this lattice based microstructure by the developed code. And the statistical finite element analysis is accomplished for selected microstructure.

Wireless Security Transmission Using Algorithm of Multiple-Key Exchange (다중 키 교환 알고리즘을 이용한 무선 보안 전송 기법)

  • Ryu, Dong-Ju;Kim, Gwang-Hyun;Noh, Bong-Nam
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.807-810
    • /
    • 2005
  • Constructed network test environment of wireless base for confidentiality guarantee of data and safe transmission that is transmited at Mobile node of Wireless Network environment in this paper. And, progressed research about IKEv2's Multiple-Key Exchange mechanism for efficient security transmission that use IPSec that is built-in to basis to IPv6 of Mobile environment. Have several key to single terminal to solve that is seam at hand off packet transmission process of Mobile Node in Wireless Network and Re-setting for Key and Re-exchange problem that happen frequently and studied technology that move. Key exchange protocol that is used for an experiment loads basically in MIPv6 and used IKEv2 protocol that is used for management and distribution of reliable encryption key between both end. Using network simulator of SSFNet(Scalable Simulation Framework Network Models) in this paper Key exchange delay value of IKEv2's security transmission analyzing comparison Performance measure and studied about problem and improvement way accordingly.

  • PDF