• 제목/요약/키워드: Analysis of key

검색결과 9,972건 처리시간 0.049초

Parallelization and application of SACOS for whole core thermal-hydraulic analysis

  • Gui, Minyang;Tian, Wenxi;Wu, Di;Chen, Ronghua;Wang, Mingjun;Su, G.H.
    • Nuclear Engineering and Technology
    • /
    • 제53권12호
    • /
    • pp.3902-3909
    • /
    • 2021
  • SACOS series of subchannel analysis codes have been developed by XJTU-NuTheL for many years and are being used for the thermal-hydraulic safety analysis of various reactor cores. To achieve fine whole core pin-level analysis, the input preprocessing and parallel capabilities of the code have been developed in this study. Preprocessing is suitable for modeling rectangular and hexagonal assemblies with less error-prone input; parallelization is established based on the domain decomposition method with the hybrid of MPI and OpenMP. For domain decomposition, a more flexible method has been proposed which can determine the appropriate task division of the core domain according to the number of processors of the server. By performing the calculation time evaluation for the several PWR assembly problems, the code parallelization has been successfully verified with different number of processors. Subsequent analysis results for rectangular- and hexagonal-assembly core imply that the code can be used to model and perform pin-level core safety analysis with acceptable computational efficiency.

Current Evidence on the Association between rs3757318 of C6orf97 and Breast Cancer Risk: a Meta-Analysis

  • Hong, Yuan;Chen, Xue-Qin;Li, Jiao-Yuan;Liu, Cheng;Shen, Na;Zhu, Bei-Bei;Gong, Jing;Chen, Wei
    • Asian Pacific Journal of Cancer Prevention
    • /
    • 제15권19호
    • /
    • pp.8051-8055
    • /
    • 2014
  • Background: A common genetic variant rs3757318, located in intron of C6orf97, was firstly identified to be associated with breast cancer (BC) risk by a genome-wide association (GWA) study. However, subsequent validation studies with different ethnicities have yielded conflicting results. Materials and Methods: We performed a meta-analysis to synthesize all available data for evaluating the precise effect of this variant on BC susceptibility. Results: A total of 8 articles containing 11 studies with 62,891 cases and 65,635 controls were included in this meta-analysis. When compared to the G allele, the rs3757318-A allele was significantly associated with BC risk with the pooled OR of 1.21 (95% CI=1.15 - 1.29, P<0.001) but with obvious between-study heterogeneity (P=0.040). Stratified analysis suggested that diversity of ethnicity along with control source may explain part of the heterogeneity. Similarly, significant associations were also identified in heterozygote, homozygote, dominant and recessive genetic models. Sensitivity and publication bias analyses indicated robust stability of our results. Conclusions: Our present meta-analysis demonstrated that the variant rs3757318 is associated with increased BC risk. Nevertheless, further studies are needed to clarify the underlying biological mechanisms.

능동적 공격자 환경에서의 자체인증 공개키에 기반한 키 분배 프로토콜의 안전성 분석 (The Security analysis of Self-certified public key based Key agreement protocols against Active Attacks)

  • 양형규
    • 한국통신학회논문지
    • /
    • 제30권1C호
    • /
    • pp.25-34
    • /
    • 2005
  • Girault는 자체 인증 공개키(self-certified public key)의 개념과 함께 이를 사용한 키 분배 프로토롤을 제안하였고 후에 Rueppel과 Oorschot는 이를 변형한 프로토콜들을 제안하였다. 자체인증 공개키에 기반한 키 분배 프로토콜은 사용자가 자신의 비밀키를 직접 선택하므로 개인식별 정보에 기반한 방식의 문제점으로 지적되었던 신뢰센터가 임의의 사용자로 위장할 수 있는 문제를 해결할 수 있고, 또한 메모리와 계산량을 감소시킬 수 있다는 장점이 있다. 그러나, 키 분배 프로토콜의 안전성에 대한 구체적인 증명은 아직까지 미흡한 실정이다. 본 논문에서는 지금까지 제안된 자체인증 공개키에 기반한 키분배 프로토콜에 대한 능동적 공격자 환경에서의 구체적인 안전성 분석을 수행하고자 한다. 본 논문에서 고려하는 공격은 active impersonation 공격, key-compromise impersonation 공격, forward secrecy, known key secuity이며, 안전성 증명에는 수학적 귀착 이론을 이용한다.

Some Universal Characteristics of Intertidal Bacterial Diversity as Revealed by 16S rRNA Gene-Based PCR Clone Analysis

  • Shuang, J.L.;Liu, C.H.;An, S.Q.;Xing, Y.;Zheng, G.Q.;Shen, Y.F.
    • Journal of Microbiology and Biotechnology
    • /
    • 제16권12호
    • /
    • pp.1882-1889
    • /
    • 2006
  • A 16S rDNA clone library was generated to investigate the bacterial diversity in intertidal sediment from the coast of the Yellow Sea, P. R. China. A total of 102 clones were sequenced and grouped into 73 OTUs using a phylogenetic approach. The sequenced clones fell into 11 bacterial lineages: Proteobacteria, Bacteroidetes, Planctomycetes, Chloroflexi, Acidobacteria, Actinobacteria, Firmicutes, Spirochaetes, and candidate divisions of BRCl, OP3, and OP1l. Based on a phylogenetic analysis of these bacteria, together with the ten most closely related sequences deposited in the GenBank, it was concluded that intertidal bacteria are most likely derived from marine bacteria with a remarkable diversity, and some are particularly abundant in intertidal sediment.

RFID 연구 논문에 대한 주제어 분석 (A Keyword analysis on the RFID research papers)

  • 양병학
    • 대한안전경영과학회지
    • /
    • 제14권3호
    • /
    • pp.221-227
    • /
    • 2012
  • This research is a key words analysis on Radio Frequency Identification. Key words were collected from Korean research papers in the electronic library DBpia. 700 papers published from 2001 to 2011 were included. The number of collected key words is 1460. The trend of publishing research papers was increased rapidly from 2005, reached peak at 2009 and decreased after 2010. Majority of key words were related to hardware, information technology and standardization. Selected 128 key words were analyzed and clustered by social network analysis to find a relationship among key words on RFID.

해밍 웨이트 누출 기반 ARIA 키 확장 SPA (A Simple Power Analysis Attack on ARIA Key Expansion Based on Hamming Weight Leakage)

  • 박애선;한동국;최준
    • 정보보호학회논문지
    • /
    • 제25권6호
    • /
    • pp.1319-1326
    • /
    • 2015
  • AES, ARIA와 같은 대칭키 암호 알고리즘은 각 라운드 마다 사용되는 라운드 키를 키 확장 메커니즘을 통해 생성한다. 이러한 키 확장 메커니즘이 실행 될 때 소비되는 전력은, 비밀키에 대한 정보를 보유하고 있다는 점에 기인하여, 소수의 전력 파형을 이용한 단순전력분석으로 비밀키의 후보를 현저하게 감소시킬 수 있는 취약점이 존재한다. 그러므로, 이러한 공격에 대한 연구 분석을 통해, 정보 누출을 막을 수 있는 대응방법의 연구가 시급한 실정이다. 국제 표준 암호인 AES의 키 확장 SPA에 대한 연구는 2002년 이후 현재까지 진행되고 있으나, 국내에서 많은 분야에 응용되고 있는 국내 표준 암호 알고리즘 ARIA에 대한 키 확장 SPA 연구의 진행은 미흡하다. 이에 본 논문에서는, 마스킹이 적용되어 있지 않은 ARIA-128 버전 8비트 구현시 키 확장 SPA 공격 시나리오를 제안하고, 실험을 통해 ARIA가 해밍 웨이트 누출 기반 키 확장 SPA 공격에 취약함을 보인다.

해체 부지 선량평가모텔의 주요 핵종에 대한 Key parameter 분석 (Key Parameters Analysis of Important Radionuclides in Dose Evaluation Model of Decommissioning Site)

  • 임용규;김학수;손중권;박경록;강기두;김경덕;정찬우
    • 한국방사성폐기물학회:학술대회논문집
    • /
    • 한국방사성폐기물학회 2004년도 학술논문집
    • /
    • pp.52-57
    • /
    • 2004
  • 해체부지 선량평가 모델의 주요 핵종에 대한 key parameter를 분석하기 위하여 민감도 분석을 수행하였다. 본 연구에서 민감도 분석을 수행하기 위한 주요 가정 사항으로서 피폭시나리오는 가장 보수적인 resident farmer를 그리고 방사성핵종의 오염 정도는 0.037 Bq/g로 하였다. 분석결과, 감마 방출 핵종인 Cs-137과 Co-60의 경우에는 오염지역의 면적과 거주관련 변수(외부감마차폐인자와 실내 거주시간분율), C-14 핵종의 경우에는 환경변수와 불포화층의 수문학적 변수가, Sr-90 핵종의 경우에는 오염지역의 토양 밀도가 선량에 미치는 영향이 큰 parameter로 확인되었다.

  • PDF

Phylogenetic Analysis of Ruminant Theileria spp. from China Based on 28S Ribosomal RNA Gene

  • Gou, Huitian;Guan, Guiquan;Ma, Miling;Liu, Aihong;Liu, Zhijie;Xu, Zongke;Ren, Qiaoyun;Li, Youquan;Yang, Jifei;Chen, Ze;Yin, Hong;Luo, Jianxun
    • Parasites, Hosts and Diseases
    • /
    • 제51권5호
    • /
    • pp.511-517
    • /
    • 2013
  • Species identification using DNA sequences is the basis for DNA taxonomy. In this study, we sequenced the ribosomal large-subunit RNA gene sequences (3,037-3,061 bp) in length of 13 Chinese Theileria stocks that were infective to cattle and sheep. The complete 28S rRNA gene is relatively difficult to amplify and its conserved region is not important for phylogenetic study. Therefore, we selected the D2-D3 region from the complete 28S rRNA sequences for phylogenetic analysis. Our analyses of 28S rRNA gene sequences showed that the 28S rRNA was useful as a phylogenetic marker for analyzing the relationships among Theileria spp. in ruminants. In addition, the D2-D3 region was a short segment that could be used instead of the whole 28S rRNA sequence during the phylogenetic analysis of Theileria, and it may be an ideal DNA barcode.

Key Account Management: Towards a Multidimensional Definition

  • Ahmmed, Kawsar;Noor, Nor Azila Mohd.
    • Asian Journal of Business Environment
    • /
    • 제2권1호
    • /
    • pp.5-13
    • /
    • 2012
  • The aim of this paper is to propose an integrative definition of key account management (KAM) at the organizational level through a content analysis of the existing definitions of KAM available in the business literatures. A representative pool of definitions of key account management was generated through literature review from twenty three journals that covers the divergence of name variety like global account management, strategic account management, national account management, international key account management, key client management, major account management, key customers management and key account management. Relating to the definition of key account management various attributes are identified through content analysis and according to the relevance, profile for each attributes are developed. On the basis of these attributes a diagrammatic and textual definition is proposed that covers the different standpoints and aspects of key account management approach and captures its essence as well. Eventually, several strategic implications are derived that create the field for further empirical investigation.

  • PDF

대한안전경영과학회지의 연구 주제에 대한 사회 연결망 분석 (A Social network analysis on the research subjects in Journal of Korean Safety Management and Science)

  • 양병학
    • 대한안전경영과학회지
    • /
    • 제15권2호
    • /
    • pp.161-166
    • /
    • 2013
  • The purpose of this research is to analyse the research subject in journal of Korean safety management and sciences. Total 1850 key words in 560 papers were analysed by the Pajek system which is one of well known social network analysis tool. Key words trend from 2008 to 2012 was examined. Then the relationship among each key words was visualized. There were five key words group which strongly connected among key words. The degree centrality, between centrality, proximity prestige on each key words were calculated to verify influence degree to other key words.