• Title/Summary/Keyword: Analysis of Key

Search Result 9,869, Processing Time 0.033 seconds

Parallelization and application of SACOS for whole core thermal-hydraulic analysis

  • Gui, Minyang;Tian, Wenxi;Wu, Di;Chen, Ronghua;Wang, Mingjun;Su, G.H.
    • Nuclear Engineering and Technology
    • /
    • v.53 no.12
    • /
    • pp.3902-3909
    • /
    • 2021
  • SACOS series of subchannel analysis codes have been developed by XJTU-NuTheL for many years and are being used for the thermal-hydraulic safety analysis of various reactor cores. To achieve fine whole core pin-level analysis, the input preprocessing and parallel capabilities of the code have been developed in this study. Preprocessing is suitable for modeling rectangular and hexagonal assemblies with less error-prone input; parallelization is established based on the domain decomposition method with the hybrid of MPI and OpenMP. For domain decomposition, a more flexible method has been proposed which can determine the appropriate task division of the core domain according to the number of processors of the server. By performing the calculation time evaluation for the several PWR assembly problems, the code parallelization has been successfully verified with different number of processors. Subsequent analysis results for rectangular- and hexagonal-assembly core imply that the code can be used to model and perform pin-level core safety analysis with acceptable computational efficiency.

Current Evidence on the Association between rs3757318 of C6orf97 and Breast Cancer Risk: a Meta-Analysis

  • Hong, Yuan;Chen, Xue-Qin;Li, Jiao-Yuan;Liu, Cheng;Shen, Na;Zhu, Bei-Bei;Gong, Jing;Chen, Wei
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.19
    • /
    • pp.8051-8055
    • /
    • 2014
  • Background: A common genetic variant rs3757318, located in intron of C6orf97, was firstly identified to be associated with breast cancer (BC) risk by a genome-wide association (GWA) study. However, subsequent validation studies with different ethnicities have yielded conflicting results. Materials and Methods: We performed a meta-analysis to synthesize all available data for evaluating the precise effect of this variant on BC susceptibility. Results: A total of 8 articles containing 11 studies with 62,891 cases and 65,635 controls were included in this meta-analysis. When compared to the G allele, the rs3757318-A allele was significantly associated with BC risk with the pooled OR of 1.21 (95% CI=1.15 - 1.29, P<0.001) but with obvious between-study heterogeneity (P=0.040). Stratified analysis suggested that diversity of ethnicity along with control source may explain part of the heterogeneity. Similarly, significant associations were also identified in heterozygote, homozygote, dominant and recessive genetic models. Sensitivity and publication bias analyses indicated robust stability of our results. Conclusions: Our present meta-analysis demonstrated that the variant rs3757318 is associated with increased BC risk. Nevertheless, further studies are needed to clarify the underlying biological mechanisms.

The Security analysis of Self-certified public key based Key agreement protocols against Active Attacks (능동적 공격자 환경에서의 자체인증 공개키에 기반한 키 분배 프로토콜의 안전성 분석)

  • Yang HyungKyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1C
    • /
    • pp.25-34
    • /
    • 2005
  • Girault proposed a key agreement protocol based on his new idea of self-certified public key. Later Rueppel and Oorschot showed variants of the Girault scheme. All of these key agreement protocols inherit positive features of self-certified public key so that they can provide higher security and smaller communication overhead than key agreement protocols not based on self-certified public key. Even with such novel features, rigorous security analysis of these protocols has not been made clear yet. In this paper, we give rigorous security analysis of key agreement protocols based on self-certified public key. We use reduction among functions for security analysis and consider several kinds of active attacker models such as active impersonation attack, key-compromise impersonation attack, forward secrecy and known key security.

Some Universal Characteristics of Intertidal Bacterial Diversity as Revealed by 16S rRNA Gene-Based PCR Clone Analysis

  • Shuang, J.L.;Liu, C.H.;An, S.Q.;Xing, Y.;Zheng, G.Q.;Shen, Y.F.
    • Journal of Microbiology and Biotechnology
    • /
    • v.16 no.12
    • /
    • pp.1882-1889
    • /
    • 2006
  • A 16S rDNA clone library was generated to investigate the bacterial diversity in intertidal sediment from the coast of the Yellow Sea, P. R. China. A total of 102 clones were sequenced and grouped into 73 OTUs using a phylogenetic approach. The sequenced clones fell into 11 bacterial lineages: Proteobacteria, Bacteroidetes, Planctomycetes, Chloroflexi, Acidobacteria, Actinobacteria, Firmicutes, Spirochaetes, and candidate divisions of BRCl, OP3, and OP1l. Based on a phylogenetic analysis of these bacteria, together with the ten most closely related sequences deposited in the GenBank, it was concluded that intertidal bacteria are most likely derived from marine bacteria with a remarkable diversity, and some are particularly abundant in intertidal sediment.

A Keyword analysis on the RFID research papers (RFID 연구 논문에 대한 주제어 분석)

  • Yang, Byoung-Hak
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.3
    • /
    • pp.221-227
    • /
    • 2012
  • This research is a key words analysis on Radio Frequency Identification. Key words were collected from Korean research papers in the electronic library DBpia. 700 papers published from 2001 to 2011 were included. The number of collected key words is 1460. The trend of publishing research papers was increased rapidly from 2005, reached peak at 2009 and decreased after 2010. Majority of key words were related to hardware, information technology and standardization. Selected 128 key words were analyzed and clustered by social network analysis to find a relationship among key words on RFID.

A Simple Power Analysis Attack on ARIA Key Expansion Based on Hamming Weight Leakage (해밍 웨이트 누출 기반 ARIA 키 확장 SPA)

  • Park, Aesun;Han, Dong-Guk;Choi, Jun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1319-1326
    • /
    • 2015
  • The symmetric key encryption algorithms, such as the AES or the ARIA, generate round keys by the key expansion mechanism. While the algorithm is executed, key expansion mechanism emits information about the secret key by the power consumption. The vulnerability exists that can reduce significantly the candidate of the secret key by the simple power analysis attack using a small number of the power traces. Therefore, we'll have to study about the attack and the countermeasure to prevent information leakage. While a simple power analysis attack on the AES key expansion has been studied since 2002, ARIA is insufficient. This paper presents a simple power analysis attack on 8-bit implementations of the ARIA-128 key expansion. The presented attack efficiently utilizes this information leakage to substantially reduce the key space that needs to be considered in a brute-force search for the secret key. We show that ARIA is vulnerable to a SPA attack based on hamming weight leakage.

Key Parameters Analysis of Important Radionuclides in Dose Evaluation Model of Decommissioning Site (해체 부지 선량평가모텔의 주요 핵종에 대한 Key parameter 분석)

  • 임용규;김학수;손중권;박경록;강기두;김경덕;정찬우
    • Proceedings of the Korean Radioactive Waste Society Conference
    • /
    • 2004.06a
    • /
    • pp.52-57
    • /
    • 2004
  • In order to analyze key parameters of important radionuclides in dose evaluation model of decommissioning site, a sensitivity analysis was performed. This analysis assumed a resident farmer for an exposure scenario and 0.037Bq/g for the concentration of radionuclides. As a result of sensitivity analysis, the key parameters of radionuclides considered were the area of contaminated zone, external gamma shielding factor and indoor time fraction for Cs-137 and Co-60. The key parameters for C-14 were the environmental parameters and hydrological parameters of unsaturated zone. Also, the key parameter for Sr-90 was the density of contaminated zone.

  • PDF

Phylogenetic Analysis of Ruminant Theileria spp. from China Based on 28S Ribosomal RNA Gene

  • Gou, Huitian;Guan, Guiquan;Ma, Miling;Liu, Aihong;Liu, Zhijie;Xu, Zongke;Ren, Qiaoyun;Li, Youquan;Yang, Jifei;Chen, Ze;Yin, Hong;Luo, Jianxun
    • Parasites, Hosts and Diseases
    • /
    • v.51 no.5
    • /
    • pp.511-517
    • /
    • 2013
  • Species identification using DNA sequences is the basis for DNA taxonomy. In this study, we sequenced the ribosomal large-subunit RNA gene sequences (3,037-3,061 bp) in length of 13 Chinese Theileria stocks that were infective to cattle and sheep. The complete 28S rRNA gene is relatively difficult to amplify and its conserved region is not important for phylogenetic study. Therefore, we selected the D2-D3 region from the complete 28S rRNA sequences for phylogenetic analysis. Our analyses of 28S rRNA gene sequences showed that the 28S rRNA was useful as a phylogenetic marker for analyzing the relationships among Theileria spp. in ruminants. In addition, the D2-D3 region was a short segment that could be used instead of the whole 28S rRNA sequence during the phylogenetic analysis of Theileria, and it may be an ideal DNA barcode.

Key Account Management: Towards a Multidimensional Definition

  • Ahmmed, Kawsar;Noor, Nor Azila Mohd.
    • Asian Journal of Business Environment
    • /
    • v.2 no.1
    • /
    • pp.5-13
    • /
    • 2012
  • The aim of this paper is to propose an integrative definition of key account management (KAM) at the organizational level through a content analysis of the existing definitions of KAM available in the business literatures. A representative pool of definitions of key account management was generated through literature review from twenty three journals that covers the divergence of name variety like global account management, strategic account management, national account management, international key account management, key client management, major account management, key customers management and key account management. Relating to the definition of key account management various attributes are identified through content analysis and according to the relevance, profile for each attributes are developed. On the basis of these attributes a diagrammatic and textual definition is proposed that covers the different standpoints and aspects of key account management approach and captures its essence as well. Eventually, several strategic implications are derived that create the field for further empirical investigation.

  • PDF

A Social network analysis on the research subjects in Journal of Korean Safety Management and Science (대한안전경영과학회지의 연구 주제에 대한 사회 연결망 분석)

  • Yang, Byoung-Hak
    • Journal of the Korea Safety Management & Science
    • /
    • v.15 no.2
    • /
    • pp.161-166
    • /
    • 2013
  • The purpose of this research is to analyse the research subject in journal of Korean safety management and sciences. Total 1850 key words in 560 papers were analysed by the Pajek system which is one of well known social network analysis tool. Key words trend from 2008 to 2012 was examined. Then the relationship among each key words was visualized. There were five key words group which strongly connected among key words. The degree centrality, between centrality, proximity prestige on each key words were calculated to verify influence degree to other key words.