scheme analysis
Recently Published Documents


TOTAL DOCUMENTS

90
(FIVE YEARS 24)

H-INDEX

10
(FIVE YEARS 2)

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Chun-Hung Ko ◽  
Shun Tang ◽  
Yucheng Shen

Education has improved the ideological style of society, improved people’s spiritual quality, and improved people’s lifestyle, provided sincere principles for people’s enthusiasm, and provided goals and political power for people’s ideals and contemporary thinking. Thinking diagrams are a teaching method that helps people sort out their ideas and solve difficult problems and can clearly connect the relationships between various concepts. This article is intended to explore the auxiliary effects of case analysis and thinking in psychological education in the context of mobile new systems. Through a series of research methods such as literature research method, action research method, mathematical statistics method, etc., finally 110 elementary and middle school students with psychological problems in a city conducted an experimental survey, and SPSS software was used to analyze and research the statistical results. The experimental results of this article show that psychological teachers use mental icons to provide psychological counseling to students with psychological problems. The success rate of counseling can be increased by 5–10%. It can be seen that an effective method of thinking diagram education can promote the better development of students, and it can also help more teenagers with psychological problems to get rid of psychological barriers.


2021 ◽  
Vol 2131 (3) ◽  
pp. 032105
Author(s):  
V Gera ◽  
R Mosyagin ◽  
E Kalmykov ◽  
V Pudikov

Abstract In the publication the authors solve the problem of forming the optimal volume of control actions to maintain the technical systems (TS) service availability. To achieve the desired result the analysis of the TS as a service object was carried out. As a result of the analysis the system elements with a level of reliability below the required level are assigned to a separate group for which the maintenance modes are formed later, their actual state being taken into account. Namely, the decision is made what work on these elements can perform and what forces and means of the technical support system will be required for their operation. To form a list of necessary operations, the functional scheme analysis of the TS considered is carried out, during the analysis the functional as well as degradation characteristics of the system elements are determined as well as the significance (weight) of each element in the system. The analysis of the functional scheme of the TS is performed by using the functional-topological method.


Author(s):  
Nungky Prameswari ◽  
Anand Bannet Ganesen ◽  
Falah Kharisma Nuraziz ◽  
Jihad Furqani ◽  
Arwindra Rizqiawan ◽  
...  

<span lang="EN-US">This paper proposes a control method for new simplified cascade multiphase direct current-direct current (DC-DC) buck power converters used for low-voltage large-current applications such as cathodic protection. To control the proposed converter, a proportional-integral (PI) controller is used to regulate the output current of the converter. The control scheme analysis is carried out by linearizing the small-signal model of the proposed converter to form the output current transfer functions. This transfer function will be analyzed by using phase and gain margin approach to obtain the control parameters (Kp, Ki, and Ti). Simulation and experiment results are included to show the validity of the proposed concept.</span>


Author(s):  
Adrian Silveira ◽  
Gustavo Betarte ◽  
Maximiliano Cristia ◽  
Carlos Luna
Keyword(s):  

Author(s):  
Claude Carlet ◽  
Sylvain Guilley ◽  
Sihem Mesnager

In some practical enciphering frameworks, operational constraints may require that a secret key be embedded into the cryptographic algorithm. Such implementations are referred to as White-Box Cryptography (WBC). One technique consists of the algorithm’s tabulation specialized for its key, followed by obfuscating the resulting tables. The obfuscation consists of the application of invertible diffusion and confusion layers at the interface between tables so that the analysis of input/output does not provide exploitable information about the concealed key material.Several such protections have been proposed in the past and already cryptanalyzed thanks to a complete WBC scheme analysis. In this article, we study a particular pattern for local protection (which can be leveraged for robust WBC); we formalize it as DIBO (for Diffused-Input-Blocked-Output). This notion has been explored (albeit without having been nicknamed DIBO) in previous works. However, we notice that guidelines to adequately select the invertible diffusion ∅and the blocked bijections B were missing. Therefore, all choices for ∅ and B were assumed as suitable. Actually, we show that most configurations can be attacked, and we even give mathematical proof for the attack. The cryptanalysis tool is the number of zeros in a Walsh-Hadamard spectrum. This “spectral distinguisher” improves on top of the previously known one (Sasdrich, Moradi, Güneysu, at FSE 2016). However, we show that such an attack does not work always (even if it works most of the time).Therefore, on the defense side, we give a straightforward rationale for the WBC implementations to be secure against such spectral attacks: the random diffusion part ∅ shall be selected such that the rank of each restriction to bytes is full. In AES’s case, this seldom happens if ∅ is selected at random as a linear bijection of F322. Thus, specific care shall be taken. Notice that the entropy of the resulting ∅ (suitable for WBC against spectral attacks) is still sufficient to design acceptable WBC schemes.


Author(s):  
Hristo Metev ◽  
Kalin Krumov ◽  
Ali Gitan

Using the systematic approach, the possible basing schemes of the workpieces in the machining attachments have been discovered and systematized with a view to their use in automated design. The analysis shows that the use of the proposed systematization in computer-aided design is significantly more rational, since the structure reflects the sequence of choice of the optimal basing scheme - analysis of the theoretical basing scheme, analysis of the geometry of the workpiece, formation of the possible list of the basing schemes. An analysis was performed with the help of which the criteria for geometric compatibility were revealed, allowing to make a choice of a basing scheme, satisfying the geometric shape of the workpiece. An algorithm for selection of locators has been developed. The development is part of a system for automated design of fixtures for locating of workpieces during machining. 


Sign in / Sign up

Export Citation Format

Share Document