Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (2)

Search Parameters:
Keywords = Improved Odd–Even–Prime

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
25 pages, 983 KB  
Article
Improved-Odd-Even-Prime Reconfiguration to Enhance the Output Power of Rectangular Photovoltaic Array under Partial Shading Conditions
by Dileep Katiki, Chandrasekhar Yammani and Surender Reddy Salkuti
Electronics 2023, 12(2), 427; https://doi.org/10.3390/electronics12020427 - 13 Jan 2023
Cited by 13 | Viewed by 2386
Abstract
The output power of a PV (photovoltaic) array decreases due to the partial shading condition (PSC). If one or more PV modules receives less irradiance compared to other PV modules in a PV array then it is called PSC. To enhance the output [...] Read more.
The output power of a PV (photovoltaic) array decreases due to the partial shading condition (PSC). If one or more PV modules receives less irradiance compared to other PV modules in a PV array then it is called PSC. To enhance the output power of PV array under PSC, Sudoku, and Optimal Sudoku Reconfiguration techniques are available in the literature for perfect squared PV arrays, such as 4 × 4, 9 × 9, and 16 × 16. Odd–Even and Odd–Even–Prime reconfigurations are available for rectangular PV arrays. To enhance the output power of rectangular PV array further, this paper proposed a new reconfiguration technique called Improved Odd–Even–Prime reconfiguration. To validate the proposed method, two PV arrays 9 × 9 and 8 × 9 have been implemented. Full article
Show Figures

Figure 1

38 pages, 506 KB  
Article
New Bounds and a Generalization for Share Conversion for 3-Server PIR
by Anat Paskin-Cherniavsky and Olga Nissenbaum
Entropy 2022, 24(4), 497; https://doi.org/10.3390/e24040497 - 1 Apr 2022
Cited by 3 | Viewed by 2292
Abstract
Private Information Retrieval (PIR) protocols, which allow the client to obtain data from servers without revealing its request, have many applications such as anonymous communication, media streaming, blockchain security, advertisement, etc. Multi-server PIR protocols, where the database is replicated among the non-colluding servers, [...] Read more.
Private Information Retrieval (PIR) protocols, which allow the client to obtain data from servers without revealing its request, have many applications such as anonymous communication, media streaming, blockchain security, advertisement, etc. Multi-server PIR protocols, where the database is replicated among the non-colluding servers, provide high efficiency in the information-theoretic setting. Beimel et al. in CCC 12’ (further referred to as BIKO) put forward a paradigm for constructing multi-server PIR, capturing several previous constructions for k3 servers, as well as improving the best-known share complexity for 3-server PIR. A key component there is a share conversion scheme from corresponding linear three-party secret sharing schemes with respect to a certain type of “modified universal” relation. In a useful particular instantiation of the paradigm, they used a share conversion from (2,3)-CNF over Zm to three-additive sharing over Zpβ for primes p1,p2,p where p1p2 and m=p1·p2, and the relation is modified universal relation CSm. They reduced the question of the existence of the share conversion for a triple (p1,p2,p) to the (in)solvability of a certain linear system over Zp, and provided an efficient (in m,logp) construction of such a sharing scheme. Unfortunately, the size of the system is Θ(m2) which entails the infeasibility of a direct solution for big m’s in practice. Paskin-Cherniavsky and Schmerler in 2019 proved the existence of the conversion for the case of odd p1, p2 when p=p1, obtaining in this way infinitely many parameters for which the conversion exists, but also for infinitely many of them it remained open. In this work, using some algebraic techniques from the work of Paskin-Cherniavsky and Schmerler, we prove the existence of the conversion for even m’s in case p=2 (we computed β in this case) and the absence of the conversion for even m’s in case p>2. This does not improve the concrete efficiency of 3-server PIR; however, our result is promising in a broader context of constructing PIR through composition techniques with k3 servers, using the relation CSm where m has more than two prime divisors. Another our suggestion about 3-server PIR is that it’s possible to achieve a shorter server’s response using the relation CSm for extended SmSm. By computer search, in BIKO framework we found several such sets for small m’s which result in share conversion from (2,3)-CNF over Zm to 3-additive secret sharing over Zpβ, where β>0 is several times less than β, which implies several times shorter server’s response. We also suggest that such extended sets Sm can result in better PIR due to the potential existence of matching vector families with the higher Vapnik-Chervonenkis dimension. Full article
(This article belongs to the Special Issue Recent Advances in Information-Theoretic Cryptography)
Back to TopTop