http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
An Integrated Three-phase Transformer for Partial Parallel Dual Active Bridge Converter
Jiasheng Huang,Zhe Zhang,Yudi Xiao,Bainan Sun,Michael A.E. Andersen 전력전자학회 2019 ICPE(ISPE)논문집 Vol.2019 No.5
In this paper, an integrated three-phase transformer is utilized in the partial parallel dual active bridge (PPDAB) converter. Due to the symmetrical structure, the flux generated by the primary windings is equally distributed to the three outer legs. Given the same number of turns of the windings in each parallel modules, the ac currents can inherently balance in the parallel modules. In order to enlarge the leakage inductor to serve as the interfacing ac inductor in the PPDAB converter, the coupling between the primary windings and secondary windings is weakened by placing the primary and secondary windings on the center and outer legs, respectively. Compared to the discrete three-phase transformers, the winding loss will also decrease with the proposed structure. A 1kW 400V/50V 500 kHz prototype with an efficiency of 96.72% is built and tested to verify the theoretical analysis.
( Ling Zhao ),( Mingwu Zhang ),( Hua Shen ),( Yudi Zhang ),( Jian Shen ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.2
Outsourcing computation is one of the most important applications in cloud computing, and it has a huge ability to satisfy the demand of data centers. Modular exponentiation computation, broadly used in the cryptographic protocols, has been recognized as one of the most time-consuming calculation operations in cryptosystems. Previously, modular exponentiations can be securely outsourced by using two untrusted cloud servers. In this paper, we present two practical and secure outsourcing modular exponentiations schemes that support only one untrusted cloud server. Explicitly, we make the base and the index blind by putting them into a matrix before send to the cloud server. Our schemes provide better performance in higher efficiency and flexible checkability which support single cloud server. Additionally, there exists another advantage of our schemes that the schemes are proved to be secure and effective without any cryptographic assumptions.