SKINNY-64-64 is a lightweight block cipher with a 64-bit block length and key length,and it is mainly used on the Internet of Things(IoT).Currently,faults can be injected into cryptographic devices by attackers in a v...SKINNY-64-64 is a lightweight block cipher with a 64-bit block length and key length,and it is mainly used on the Internet of Things(IoT).Currently,faults can be injected into cryptographic devices by attackers in a variety of ways,but it is still difficult to achieve a precisely located fault attacks at a low cost,whereas a Hardware Trojan(HT)can realize this.Temperature,as a physical quantity incidental to the operation of a cryptographic device,is easily overlooked.In this paper,a temperature-triggered HT(THT)is designed,which,when activated,causes a specific bit of the intermediate state of the SKINNY-64-64 to be flipped.Further,in this paper,a THT-based algebraic fault analysis(THT-AFA)method is proposed.To demonstrate the effectiveness of the method,experiments on algebraic fault analysis(AFA)and THT-AFA have been carried out on SKINNY-64-64.In the THT-AFA for SKINNY-64-64,it is only required to activate the THT 3 times to obtain the master key with a 100%success rate,and the average time for the attack is 64.57 s.However,when performing AFA on this cipher,we provide a relation-ship between the number of different faults and the residual entropy of the key.In comparison,our proposed THT-AFA method has better performance in terms of attack efficiency.To the best of our knowledge,this is the first HT attack on SKINNY-64-64.展开更多
This paper firstly introduces the common faults of traveling transmission system of shuttle car.Secondly,by analyzing the characteristics of shuttle car structure,the layout of traveling transmission system and the co...This paper firstly introduces the common faults of traveling transmission system of shuttle car.Secondly,by analyzing the characteristics of shuttle car structure,the layout of traveling transmission system and the common faults on shuttle car,this paper concludes that"internal holding torque"is the main cause of faults.Finally,this paper proposes a corresponding optimization design scheme to reduce the impact of"internal torque",and calculates the relevant results through the finite element simulation analysis method.Through these analyses and calculations,it is shown that the method can effectively reduce the probability of failure of traveling transmission system of shuttle car.展开更多
Substitution permutation network (SPN) is one important structure of block cipher cryptosystems. Prior work has shown different fault analyses on SPN. The formalization of fault analysis of both attack and protect on ...Substitution permutation network (SPN) is one important structure of block cipher cryptosystems. Prior work has shown different fault analyses on SPN. The formalization of fault analysis of both attack and protect on SPN have been given. The overhead and time tolerance of fault detection have been discussed. The pseudo-blinding method to detect fault attack is introduced, and the balance of the security, overhead and time tolerance based on the evaluation could be made.展开更多
Due to the strong attacking ability, fast speed, simple implementation and other characteristics, differential fault analysis has become an important method to evaluate the security of cryptosystem in the Internet of ...Due to the strong attacking ability, fast speed, simple implementation and other characteristics, differential fault analysis has become an important method to evaluate the security of cryptosystem in the Internet of Things. As one of the AES finalists, the Serpent is a 128-bit Substitution-Permutation Network(SPN) cryptosystem. It has 32 rounds with the variable key length between 0 and 256 bits, which is flexible to provide security in the Internet of Things. On the basis of the byte-oriented model and the differential analysis, we propose an effective differential fault attack on the Serpent cryptosystem. Mathematical analysis and simulating experiment show that the attack could recover its secret key by introducing 48 faulty ciphertexts. The result in this study describes that the Serpent is vulnerable to differential fault analysis in detail. It will be beneficial to the analysis of the same type of other iterated cryptosystems.展开更多
The behavior of matrix converter(MC) drive systems under the condition of MC short-circuit faults is comprehensively investigated. Two isolation strategies using semiconductors and high speed fuses(HSFs) for MC short-...The behavior of matrix converter(MC) drive systems under the condition of MC short-circuit faults is comprehensively investigated. Two isolation strategies using semiconductors and high speed fuses(HSFs) for MC short-circuit faults are examined and their performances are compared. The behavior of MC drive systems during the fuse action time under different operating conditions is explored. The feasibility of fault-tolerant operation during the fuse action time is also studied. The basic selection laws for the HSFs and the requirements for the passive components of the MC drive system from the point view of short-circuit faults are also discussed. Simulation results are used to demonstrate the feasibility of the proposed isolation strategies.展开更多
PRINCE is a 64-bit lightweight block cipher with a 128-bit key published at ASIACRYPT 2012. Assuming one nibble fault is injected, previous different fault analysis(DFA) on PRINCE adopted the technique from DFA on AES...PRINCE is a 64-bit lightweight block cipher with a 128-bit key published at ASIACRYPT 2012. Assuming one nibble fault is injected, previous different fault analysis(DFA) on PRINCE adopted the technique from DFA on AES and current results are different. This paper aims to make a comprehensive study of algebraic fault analysis(AFA) on PRINCE. How to build the equations for PRINCE and faults are explained. Extensive experiments are conducted. Under nibble-based fault model, AFA with three or four fault injections can succeed within 300 seconds with a very high probability. Under other fault models such as byte-based, half word-based, word-based fault models, the faults become overlapped in the last round and previous DFAs are difficult to work. Our results show that AFA can still succeed to recover the full master key. To evaluate security of PRINCE against fault attacks, we utilize AFA to calculate the reduced entropy of the secret key for given amount of fault injections. The results can interpret and compare the efficiency of previous work. Under nibble-based fault model, the master key of PRINCE can be reduced to 29.69 and 236.10 with 3 and 2 fault injections on average, respectively.展开更多
KLEIN-64 is a lightweight block cipher designed for resource-constrained environment,and it has advantages in software performance and hardware implementation.Recent investigation shows that KLEIN-64 is vulnerable to ...KLEIN-64 is a lightweight block cipher designed for resource-constrained environment,and it has advantages in software performance and hardware implementation.Recent investigation shows that KLEIN-64 is vulnerable to differential fault attack(DFA).In this paper,an improved DFA is performed to KLEIN-64.It is found that the differential propagation path and the distribution of the S-box can be fully utilized to distinguish the correct and wrong keys when a half-byte fault is injected in the 10th round.By analyzing the difference matrix before the last round of S-box,the location of fault injection can be limited to a small range.Thus,this improved analysis can greatly improve the attack efficiency.For the best case,the scale of brute-force attack is only 256.While for the worst case,the scale of brute-force attack is far less than 232 with another half byte fault injection,and the probability for this case is 1/64.Furthermore,the measures for KLEIN-64 in resisting the improved DFA are proposed.展开更多
Considering the actual operating experience of the Daode Wind Farm, this paper analyzes the rea-sons for the fault of the lO-kV switch cabinet. Some technical improvements and management measures, such as implementing...Considering the actual operating experience of the Daode Wind Farm, this paper analyzes the rea-sons for the fault of the lO-kV switch cabinet. Some technical improvements and management measures, such as implementing the anti-accident technical measures, improving the installation and debugging level, and strengthening operation inspection, are proposed.展开更多
CFB boilers have been widely used in China in recent years with their perfect performances in coal adaptability, load variation capability and lower pollutant emission. The No.3 135-MW CFB unit in Lianzhou Power Plant...CFB boilers have been widely used in China in recent years with their perfect performances in coal adaptability, load variation capability and lower pollutant emission. The No.3 135-MW CFB unit in Lianzhou Power Plant is the f irst 440-t/h series CFB unit in Guangdong Province. It f inished 72-hour trial operation in Feb. 2004 and was transferred to trial operation. During the trial operation and the next commercial operation, there were some problems happened in the boiler slag discharging system, seriously affecting the safe and reliable operation and the loading capability. After innovation, these problems have been completely solved. Hopefully the solutions may be used for reference to the units with similar problems.展开更多
Electric power systems usually cover large geographical areas and transmission facilities are continuously increasing. These power systems are exposed to different environmental conditions which may cause faults to oc...Electric power systems usually cover large geographical areas and transmission facilities are continuously increasing. These power systems are exposed to different environmental conditions which may cause faults to occur on the system. Different types of studies are usually done on electric power systems to determine how the system behaves before, during and after a fault condition. The behaviour of variables of interest such as currents, voltage, rotor angle and active and reactive power under fault conditions are studied and observed to help determine possible causes of faults in a power system. The objective of this paper is to investigate a fault that occurred on the 330 kV transmission line between Ruacana power station and Omburu sub-station, the fault caused all the generators at Ruacana power station to trip and consequently caused a blackout at the power station that lasted for 6 h. Preliminary findings showed that the observed fault was an earth fault but the exact type of earth fault was however not known at the time. This research investigation sets out to determine the exact fault that occurred; the most probable cause of the fault, and propose possible solutions to prevent reoccurrence of such a fault. The section of the power network in which the fault occurred was modelled using DigSilent Power Factory software tool, and transient fault analysis was carried out on the model for different fault conditions. Results obtained were then compared with data obtained from NamPower records to ascertain the type of fault.展开更多
Fault analysis is a frequently used side-channel attack for cryptanalysis.However,existing fault attack methods usually involve complex fault fusion analysis or computation-intensive statistical analysis of massive fa...Fault analysis is a frequently used side-channel attack for cryptanalysis.However,existing fault attack methods usually involve complex fault fusion analysis or computation-intensive statistical analysis of massive fault traces.In this work,we take a property-based formal verification approach to fault analysis.We derive fine-grained formal models for automatic fault propagation and fusion,which establish a mathematical foundation for precise measurement and formal reasoning of fault effects.We extract the correlations in fault effects in order to create properties for fault verification.We further propose a method for key recovery,by formally checking when the extracted properties can be satisfied with partial keys as the search variables.Experimental results using both unprotected and masked advanced encryption standard(AES)implementations show that our method has a key search complexity of 216,which only requires two correct and faulty ciphertext pairs to determine the secret key,and does not assume knowledge about fault location or pattern.展开更多
With the wide application of power electronized resources(PERs),the amplitude and frequency of voltages show significant time-varying characteristics under asymmetrical faults.As a result,the traditional phasor model,...With the wide application of power electronized resources(PERs),the amplitude and frequency of voltages show significant time-varying characteristics under asymmetrical faults.As a result,the traditional phasor model,impedance model,and symmetrical components method based on the constant amplitude and frequency of voltages are facing great challenges.Hence,a novel asymmetrical fault analysis method based on conjugate vectors is proposed in this paper which can meet the modeling and analysis requirements of the network excited by voltages with time-varying amplitude/frequency.Furthermore,asymmetrical fault characteristics are extracted.As an application,a faulted phase identification(FPI)strategy is proposed based on the fault characteristics.The correctness and superiority of the asymmetrical fault analysis method and FPI strategy are verified in time-domain simulations and a real-time digital simulator.展开更多
Feather weight(FeW)cipher is a lightweight block cipher proposed by Kumar et al.in 2019,which takes 64 bits plaintext as input and produces 64 bits ciphertext.As Kumar et al.said,FeW is a software oriented design with...Feather weight(FeW)cipher is a lightweight block cipher proposed by Kumar et al.in 2019,which takes 64 bits plaintext as input and produces 64 bits ciphertext.As Kumar et al.said,FeW is a software oriented design with the aim of achieving high efficiency in software based environments.It seems that FeW is immune to many cryptographic attacks,like linear,impossible differential,differential and zero correlation attacks.However,in recent work,Xie et al.reassessed the security of FeW.More precisely,they proved that under the differential fault analysis(DFA)on the encryption states,an attacker can completely recover the master secret key.In this paper,we revisit the block cipher FeW and consider the DFA on its key schedule algorithm,which is rather popular cryptanalysis for kinds of block ciphers.In particular,by respectively injected faults into the 30th and 29th round subkeys,one can recover about 55/80~69%bits of master key.Then the brute force searching remaining bits,one can obtain the full master secret key.The simulations and experiment results show that our analysis is practical.展开更多
Based on the structure and working principle of rain sensors in new automatic weather stations,according to the abnormal precipitation records found in the observation business,the possible faults of rain sensors were...Based on the structure and working principle of rain sensors in new automatic weather stations,according to the abnormal precipitation records found in the observation business,the possible faults of rain sensors were analyzed,and treatment methods were discussed. Daily maintenance and management measures were put forward to ensure the normal operation of rain sensors and improve the quality of surface meteorological observation business.展开更多
Expert knowledge is the key to modeling milling fault detection systems based on the belief rule base.The construction of an initial expert knowledge base seriously affects the accuracy and interpretability of the mil...Expert knowledge is the key to modeling milling fault detection systems based on the belief rule base.The construction of an initial expert knowledge base seriously affects the accuracy and interpretability of the milling fault detection model.However,due to the complexity of the milling system structure and the uncertainty of the milling failure index,it is often impossible to construct model expert knowledge effectively.Therefore,a milling system fault detection method based on fault tree analysis and hierarchical BRB(FTBRB)is proposed.Firstly,the proposed method uses a fault tree and hierarchical BRB modeling.Through fault tree analysis(FTA),the logical correspondence between FTA and BRB is sorted out.This can effectively embed the FTA mechanism into the BRB expert knowledge base.The hierarchical BRB model is used to solve the problem of excessive indexes and avoid combinatorial explosion.Secondly,evidence reasoning(ER)is used to ensure the transparency of the model reasoning process.Thirdly,the projection covariance matrix adaptation evolutionary strategies(P-CMA-ES)is used to optimize the model.Finally,this paper verifies the validity model and the method’s feasibility techniques for milling data sets.展开更多
DC fault protection is the key technique for the development of the DC distribution and transmission system. This paper analyzes the transient characteristics of DC faults in a modular multilevel converter(MMC) based ...DC fault protection is the key technique for the development of the DC distribution and transmission system. This paper analyzes the transient characteristics of DC faults in a modular multilevel converter(MMC) based DC system combining with the numerical method. Meanwhile,lots of simulation tests based on MATLAB/Simulink are carried out to verify the correctness of the theoretical analysis. Finally, the technological difficulties of and requirements for the protection and isolation are discussed to provide the theoretical foundation for the design of dc fault protection strategy.展开更多
As more electric utilities and transmission system operators move toward the smart grid concept,robust fault analysis has become increasingly complex.This paper proposes a methodology for the detection,classification,...As more electric utilities and transmission system operators move toward the smart grid concept,robust fault analysis has become increasingly complex.This paper proposes a methodology for the detection,classification,and localization of transmission line faults using Synchrophasor measurements.The technique involves the extraction of phasors from the instantaneous three-phase voltages and currents at each bus in the system which are then decomposed into their symmetrical components.These components are sent to the phasor data concentrator(PDC)for real-time fault analysis,which is completed within 2–3 cycles after fault inception.The advantages of this technique are its accuracy and speed,so that fault information may be appropriately communicated to facilitate system restoration.The proposed algorithm is independent of the transmission system topology and displays high accuracy in its results,even with varying parameters such as fault distance,fault inception angle and fault impedance.The proposed algorithm is validated using a three-bus system as well as the Western System Coordinating Council(WSCC)nine bus system.The proposed algorithm is shown to accurately detect the faulted line and classify the fault in all the test cases presented.展开更多
This paper presents an approximate algorithm based on simulated annealing to achieve the maximum probability of the minimal cut sets for a fault tree. Near optimal minimal cut sets and important sequence of the basic ...This paper presents an approximate algorithm based on simulated annealing to achieve the maximum probability of the minimal cut sets for a fault tree. Near optimal minimal cut sets and important sequence of the basic events are also solved by the method. Computer simulations show that the algorithm performs very well.展开更多
Epidemic hemorrhagic fever has been an ongoing threat to laboratory personnel involved in animal care and use. Laboratory transmissions and severe infections occurred over the past twenty years, even though the standa...Epidemic hemorrhagic fever has been an ongoing threat to laboratory personnel involved in animal care and use. Laboratory transmissions and severe infections occurred over the past twenty years, even though the standards and regulations for laboratory biosafety have been issued, upgraded, and implemented in China. Therefore, there is an urgent need to identify risk factors and to seek effective preventive measures that can curb the incidences of epidemic hemorrhagic fever among laboratory personnel. In the present study, we reviewed literature that relevant to animals laboratory-acquired hemorrhagic fever infections reported from 1995 to 2015, and analyzed these incidences using fault tree analysis (FTA).展开更多
Based on wavelet packet decomposition (WPD) algorithm and Teager energy operator (TEO), a novel gearbox fault detection and diagnosis method is proposed. Its process is expatiated after the principles of WPD and T...Based on wavelet packet decomposition (WPD) algorithm and Teager energy operator (TEO), a novel gearbox fault detection and diagnosis method is proposed. Its process is expatiated after the principles of WPD and TEO modulation are introduced respectively. The preprocessed sigaaal is interpolated with the cubic spline function, then expanded over the selected basis wavelets. Grouping its wavelet packet components of the signal based on the minimum entropy criterion, the interpolated signal can be decomposed into its dominant components with nearly distinct fault frequency contents. To extract the demodulation information of each dominant component, TEO is used. The performance of the proposed method is assessed by means of several tests on vibration signals collected from the gearbox mounted on a heavy truck. It is proved that hybrid WPD-TEO method is effective and robust for detecting and diagnosing localized gearbox faults.展开更多
基金supported in part by the Natural Science Foundation of Heilongjiang Province of China(Grant No.LH2022F053)in part by the Scientific and technological development project of the central government guiding local(Grant No.SBZY2021E076)+2 种基金in part by the PostdoctoralResearch Fund Project of Heilongjiang Province of China(Grant No.LBH-Q21195)in part by the Fundamental Research Funds of Heilongjiang Provincial Universities of China(Grant No.145209146)in part by the National Natural Science Foundation of China(NSFC)(Grant No.61501275).
文摘SKINNY-64-64 is a lightweight block cipher with a 64-bit block length and key length,and it is mainly used on the Internet of Things(IoT).Currently,faults can be injected into cryptographic devices by attackers in a variety of ways,but it is still difficult to achieve a precisely located fault attacks at a low cost,whereas a Hardware Trojan(HT)can realize this.Temperature,as a physical quantity incidental to the operation of a cryptographic device,is easily overlooked.In this paper,a temperature-triggered HT(THT)is designed,which,when activated,causes a specific bit of the intermediate state of the SKINNY-64-64 to be flipped.Further,in this paper,a THT-based algebraic fault analysis(THT-AFA)method is proposed.To demonstrate the effectiveness of the method,experiments on algebraic fault analysis(AFA)and THT-AFA have been carried out on SKINNY-64-64.In the THT-AFA for SKINNY-64-64,it is only required to activate the THT 3 times to obtain the master key with a 100%success rate,and the average time for the attack is 64.57 s.However,when performing AFA on this cipher,we provide a relation-ship between the number of different faults and the residual entropy of the key.In comparison,our proposed THT-AFA method has better performance in terms of attack efficiency.To the best of our knowledge,this is the first HT attack on SKINNY-64-64.
基金supported by the Key Project of China Coal Technology and Engineering Group(No.2020-2-TD-ZD003).
文摘This paper firstly introduces the common faults of traveling transmission system of shuttle car.Secondly,by analyzing the characteristics of shuttle car structure,the layout of traveling transmission system and the common faults on shuttle car,this paper concludes that"internal holding torque"is the main cause of faults.Finally,this paper proposes a corresponding optimization design scheme to reduce the impact of"internal torque",and calculates the relevant results through the finite element simulation analysis method.Through these analyses and calculations,it is shown that the method can effectively reduce the probability of failure of traveling transmission system of shuttle car.
基金National Natural Science Foundation ofChina(No.60573031)Foundation of Na-tional Laboratory for Modern Communica-tions(No.51436060205JW0305)Founda-tion of Senior Visiting Scholarship of Fu-dan University
文摘Substitution permutation network (SPN) is one important structure of block cipher cryptosystems. Prior work has shown different fault analyses on SPN. The formalization of fault analysis of both attack and protect on SPN have been given. The overhead and time tolerance of fault detection have been discussed. The pseudo-blinding method to detect fault attack is introduced, and the balance of the security, overhead and time tolerance based on the evaluation could be made.
基金supported by the National Natural Science Foundation of China under Grant No.61003278,No.61073150 and No.61202371Innovation Program of Shanghai Municipal Education Commission under Grant No.14ZZ066+5 种基金the open research fund of State Key Laboratory of Information Securitythe Opening Project of Shanghai Key Laboratory of Integrate Administration Technologies for Information Securitythe Fundamental Research Funds for the Central Universities,National Key Basic Research Program of China under Grant No.2013CB338004China Postdoctoral Science Foundation under Grant No.2012M521829Shanghai Postdoctoral Research Funding Program under Grant No.12R21414500the National Social Science Foundation of China under Grant No.13CFX054
文摘Due to the strong attacking ability, fast speed, simple implementation and other characteristics, differential fault analysis has become an important method to evaluate the security of cryptosystem in the Internet of Things. As one of the AES finalists, the Serpent is a 128-bit Substitution-Permutation Network(SPN) cryptosystem. It has 32 rounds with the variable key length between 0 and 256 bits, which is flexible to provide security in the Internet of Things. On the basis of the byte-oriented model and the differential analysis, we propose an effective differential fault attack on the Serpent cryptosystem. Mathematical analysis and simulating experiment show that the attack could recover its secret key by introducing 48 faulty ciphertexts. The result in this study describes that the Serpent is vulnerable to differential fault analysis in detail. It will be beneficial to the analysis of the same type of other iterated cryptosystems.
基金Project(50807002) supported by the National Natural Science Foundation of ChinaProject(SKLD10KM05) supported by Opening Fund of State Key Laboratory of Power System and Generation EquipmentsProject(201206025007) supported by the National Scholarship Fund,China
文摘The behavior of matrix converter(MC) drive systems under the condition of MC short-circuit faults is comprehensively investigated. Two isolation strategies using semiconductors and high speed fuses(HSFs) for MC short-circuit faults are examined and their performances are compared. The behavior of MC drive systems during the fuse action time under different operating conditions is explored. The feasibility of fault-tolerant operation during the fuse action time is also studied. The basic selection laws for the HSFs and the requirements for the passive components of the MC drive system from the point view of short-circuit faults are also discussed. Simulation results are used to demonstrate the feasibility of the proposed isolation strategies.
基金supported in part by the Major State Basic Research Development Program (973 Plan) of China under thegrant 2013CB338004the National Natural Science Foundation of China under the grants 61173191, 61271124, 61272491, 61309021, 61472357+1 种基金by the Zhejiang Provincial Natural Science Foundation of China under the grant LY13F010001by the Fundamental Research Funds for the Central Universities under the grant 2015QNA5005
文摘PRINCE is a 64-bit lightweight block cipher with a 128-bit key published at ASIACRYPT 2012. Assuming one nibble fault is injected, previous different fault analysis(DFA) on PRINCE adopted the technique from DFA on AES and current results are different. This paper aims to make a comprehensive study of algebraic fault analysis(AFA) on PRINCE. How to build the equations for PRINCE and faults are explained. Extensive experiments are conducted. Under nibble-based fault model, AFA with three or four fault injections can succeed within 300 seconds with a very high probability. Under other fault models such as byte-based, half word-based, word-based fault models, the faults become overlapped in the last round and previous DFAs are difficult to work. Our results show that AFA can still succeed to recover the full master key. To evaluate security of PRINCE against fault attacks, we utilize AFA to calculate the reduced entropy of the secret key for given amount of fault injections. The results can interpret and compare the efficiency of previous work. Under nibble-based fault model, the master key of PRINCE can be reduced to 29.69 and 236.10 with 3 and 2 fault injections on average, respectively.
基金This work was supported in part by project supported by National Natural Science Foundation of China(Grant Nos.U1936115,61572182).
文摘KLEIN-64 is a lightweight block cipher designed for resource-constrained environment,and it has advantages in software performance and hardware implementation.Recent investigation shows that KLEIN-64 is vulnerable to differential fault attack(DFA).In this paper,an improved DFA is performed to KLEIN-64.It is found that the differential propagation path and the distribution of the S-box can be fully utilized to distinguish the correct and wrong keys when a half-byte fault is injected in the 10th round.By analyzing the difference matrix before the last round of S-box,the location of fault injection can be limited to a small range.Thus,this improved analysis can greatly improve the attack efficiency.For the best case,the scale of brute-force attack is only 256.While for the worst case,the scale of brute-force attack is far less than 232 with another half byte fault injection,and the probability for this case is 1/64.Furthermore,the measures for KLEIN-64 in resisting the improved DFA are proposed.
文摘Considering the actual operating experience of the Daode Wind Farm, this paper analyzes the rea-sons for the fault of the lO-kV switch cabinet. Some technical improvements and management measures, such as implementing the anti-accident technical measures, improving the installation and debugging level, and strengthening operation inspection, are proposed.
文摘CFB boilers have been widely used in China in recent years with their perfect performances in coal adaptability, load variation capability and lower pollutant emission. The No.3 135-MW CFB unit in Lianzhou Power Plant is the f irst 440-t/h series CFB unit in Guangdong Province. It f inished 72-hour trial operation in Feb. 2004 and was transferred to trial operation. During the trial operation and the next commercial operation, there were some problems happened in the boiler slag discharging system, seriously affecting the safe and reliable operation and the loading capability. After innovation, these problems have been completely solved. Hopefully the solutions may be used for reference to the units with similar problems.
文摘Electric power systems usually cover large geographical areas and transmission facilities are continuously increasing. These power systems are exposed to different environmental conditions which may cause faults to occur on the system. Different types of studies are usually done on electric power systems to determine how the system behaves before, during and after a fault condition. The behaviour of variables of interest such as currents, voltage, rotor angle and active and reactive power under fault conditions are studied and observed to help determine possible causes of faults in a power system. The objective of this paper is to investigate a fault that occurred on the 330 kV transmission line between Ruacana power station and Omburu sub-station, the fault caused all the generators at Ruacana power station to trip and consequently caused a blackout at the power station that lasted for 6 h. Preliminary findings showed that the observed fault was an earth fault but the exact type of earth fault was however not known at the time. This research investigation sets out to determine the exact fault that occurred; the most probable cause of the fault, and propose possible solutions to prevent reoccurrence of such a fault. The section of the power network in which the fault occurred was modelled using DigSilent Power Factory software tool, and transient fault analysis was carried out on the model for different fault conditions. Results obtained were then compared with data obtained from NamPower records to ascertain the type of fault.
基金supported by the National Key R&D Program of China(No.2021YFB3100901)the National Natural Science Foundation of China(Nos.62074131 and 62004176).
文摘Fault analysis is a frequently used side-channel attack for cryptanalysis.However,existing fault attack methods usually involve complex fault fusion analysis or computation-intensive statistical analysis of massive fault traces.In this work,we take a property-based formal verification approach to fault analysis.We derive fine-grained formal models for automatic fault propagation and fusion,which establish a mathematical foundation for precise measurement and formal reasoning of fault effects.We extract the correlations in fault effects in order to create properties for fault verification.We further propose a method for key recovery,by formally checking when the extracted properties can be satisfied with partial keys as the search variables.Experimental results using both unprotected and masked advanced encryption standard(AES)implementations show that our method has a key search complexity of 216,which only requires two correct and faulty ciphertext pairs to determine the secret key,and does not assume knowledge about fault location or pattern.
基金supported in part by the National Natural Science Foundation of China(52107096)in part by the Young Elite Scientists Sponsorship Program by CAST(2021QNRC001)in part by the National Science Foundation for Distinguished Young Scholars of China(52225704).
文摘With the wide application of power electronized resources(PERs),the amplitude and frequency of voltages show significant time-varying characteristics under asymmetrical faults.As a result,the traditional phasor model,impedance model,and symmetrical components method based on the constant amplitude and frequency of voltages are facing great challenges.Hence,a novel asymmetrical fault analysis method based on conjugate vectors is proposed in this paper which can meet the modeling and analysis requirements of the network excited by voltages with time-varying amplitude/frequency.Furthermore,asymmetrical fault characteristics are extracted.As an application,a faulted phase identification(FPI)strategy is proposed based on the fault characteristics.The correctness and superiority of the asymmetrical fault analysis method and FPI strategy are verified in time-domain simulations and a real-time digital simulator.
基金supported in part by the Foundation of State Key Laboratory of Information Security under Grant 2021-MS-04in part by the Natural Science Foundation of Shaanxi Province under grant 2022-JM-365.
文摘Feather weight(FeW)cipher is a lightweight block cipher proposed by Kumar et al.in 2019,which takes 64 bits plaintext as input and produces 64 bits ciphertext.As Kumar et al.said,FeW is a software oriented design with the aim of achieving high efficiency in software based environments.It seems that FeW is immune to many cryptographic attacks,like linear,impossible differential,differential and zero correlation attacks.However,in recent work,Xie et al.reassessed the security of FeW.More precisely,they proved that under the differential fault analysis(DFA)on the encryption states,an attacker can completely recover the master secret key.In this paper,we revisit the block cipher FeW and consider the DFA on its key schedule algorithm,which is rather popular cryptanalysis for kinds of block ciphers.In particular,by respectively injected faults into the 30th and 29th round subkeys,one can recover about 55/80~69%bits of master key.Then the brute force searching remaining bits,one can obtain the full master secret key.The simulations and experiment results show that our analysis is practical.
文摘Based on the structure and working principle of rain sensors in new automatic weather stations,according to the abnormal precipitation records found in the observation business,the possible faults of rain sensors were analyzed,and treatment methods were discussed. Daily maintenance and management measures were put forward to ensure the normal operation of rain sensors and improve the quality of surface meteorological observation business.
基金This work was supported in part by the Natural Science Foundation of China under Grant 62203461 and Grant 62203365in part by the Postdoctoral Science Foundation of China under Grant No.2020M683736+3 种基金in part by the Teaching reform project of higher education in Heilongjiang Province under Grant Nos.SJGY20210456 and SJGY20210457in part by the Natural Science Foundation of Heilongjiang Province of China under Grant No.LH2021F038in part by the graduate academic innovation project of Harbin Normal University under Grant Nos.HSDSSCX2022-17,HSDSSCX2022-18 andHSDSSCX2022-19in part by the Foreign Expert Project of Heilongjiang Province under Grant No.GZ20220131.
文摘Expert knowledge is the key to modeling milling fault detection systems based on the belief rule base.The construction of an initial expert knowledge base seriously affects the accuracy and interpretability of the milling fault detection model.However,due to the complexity of the milling system structure and the uncertainty of the milling failure index,it is often impossible to construct model expert knowledge effectively.Therefore,a milling system fault detection method based on fault tree analysis and hierarchical BRB(FTBRB)is proposed.Firstly,the proposed method uses a fault tree and hierarchical BRB modeling.Through fault tree analysis(FTA),the logical correspondence between FTA and BRB is sorted out.This can effectively embed the FTA mechanism into the BRB expert knowledge base.The hierarchical BRB model is used to solve the problem of excessive indexes and avoid combinatorial explosion.Secondly,evidence reasoning(ER)is used to ensure the transparency of the model reasoning process.Thirdly,the projection covariance matrix adaptation evolutionary strategies(P-CMA-ES)is used to optimize the model.Finally,this paper verifies the validity model and the method’s feasibility techniques for milling data sets.
基金supported by the National High Technology Research and Development Program of China(863 Program)(No.2015AA050101)the National Science Fund for Excellent Young Scholars(No.51422703)
文摘DC fault protection is the key technique for the development of the DC distribution and transmission system. This paper analyzes the transient characteristics of DC faults in a modular multilevel converter(MMC) based DC system combining with the numerical method. Meanwhile,lots of simulation tests based on MATLAB/Simulink are carried out to verify the correctness of the theoretical analysis. Finally, the technological difficulties of and requirements for the protection and isolation are discussed to provide the theoretical foundation for the design of dc fault protection strategy.
文摘As more electric utilities and transmission system operators move toward the smart grid concept,robust fault analysis has become increasingly complex.This paper proposes a methodology for the detection,classification,and localization of transmission line faults using Synchrophasor measurements.The technique involves the extraction of phasors from the instantaneous three-phase voltages and currents at each bus in the system which are then decomposed into their symmetrical components.These components are sent to the phasor data concentrator(PDC)for real-time fault analysis,which is completed within 2–3 cycles after fault inception.The advantages of this technique are its accuracy and speed,so that fault information may be appropriately communicated to facilitate system restoration.The proposed algorithm is independent of the transmission system topology and displays high accuracy in its results,even with varying parameters such as fault distance,fault inception angle and fault impedance.The proposed algorithm is validated using a three-bus system as well as the Western System Coordinating Council(WSCC)nine bus system.The proposed algorithm is shown to accurately detect the faulted line and classify the fault in all the test cases presented.
文摘This paper presents an approximate algorithm based on simulated annealing to achieve the maximum probability of the minimal cut sets for a fault tree. Near optimal minimal cut sets and important sequence of the basic events are also solved by the method. Computer simulations show that the algorithm performs very well.
基金supported by Special Fund for Health Sector of China[Grant No.201302006]
文摘Epidemic hemorrhagic fever has been an ongoing threat to laboratory personnel involved in animal care and use. Laboratory transmissions and severe infections occurred over the past twenty years, even though the standards and regulations for laboratory biosafety have been issued, upgraded, and implemented in China. Therefore, there is an urgent need to identify risk factors and to seek effective preventive measures that can curb the incidences of epidemic hemorrhagic fever among laboratory personnel. In the present study, we reviewed literature that relevant to animals laboratory-acquired hemorrhagic fever infections reported from 1995 to 2015, and analyzed these incidences using fault tree analysis (FTA).
基金This project is supported by National Natural Science Foundation of China (No.50605065)Natural Science Foundation Project of CQ CSTC (No.2007BB2142)
文摘Based on wavelet packet decomposition (WPD) algorithm and Teager energy operator (TEO), a novel gearbox fault detection and diagnosis method is proposed. Its process is expatiated after the principles of WPD and TEO modulation are introduced respectively. The preprocessed sigaaal is interpolated with the cubic spline function, then expanded over the selected basis wavelets. Grouping its wavelet packet components of the signal based on the minimum entropy criterion, the interpolated signal can be decomposed into its dominant components with nearly distinct fault frequency contents. To extract the demodulation information of each dominant component, TEO is used. The performance of the proposed method is assessed by means of several tests on vibration signals collected from the gearbox mounted on a heavy truck. It is proved that hybrid WPD-TEO method is effective and robust for detecting and diagnosing localized gearbox faults.