• Title/Summary/Keyword: Differential analysis

Search Result 4,492, Processing Time 0.035 seconds

Development of a DDA+PGA-combined non-destructive active interrogation system in "Active-N"

  • Kazuyoshi Furutaka;Akira Ohzu;Yosuke Toh
    • Nuclear Engineering and Technology
    • /
    • v.55 no.11
    • /
    • pp.4002-4018
    • /
    • 2023
  • An integrated neutron interrogation system has been developed for non-destructive assay of highly-radioactive special nuclear materials, to accumulate knowledge of the method through developing and using it. The system combines a differential die-away (DDA) measurement system for the quantification of nuclear materials and a prompt gamma-ray analysis (PGA) system for the detection of neutron poisons which disturb the DDA measurements; a common D-T neutron generator is used. A special care has been taken for the selection of materials to reduce the background gamma rays produced by the interrogation neutrons. A series of measurements were performed to test the basic performance of the system. The results show that the DDA system can quantify plutonium of as small as 20 mg and it is not affected by intense neutron background up to 1.57 × 107 s-1 and gamma ray of 4.43 × 1010 s-1. The gamma-ray background counting rate at the PGA detector was reduced down to 3.9 × 103 s-1 even with the use of the D-T neutron generator. The test measurements show that the PGA system is capable of detecting 0.783 g of boron and about 86.8 g of gadolinium in 30 min.

A Study on Creating WBC-AES Dummy LUT as a Countermeasure against DCA (차분 계산 분석 대응을 위한 WBC-AES Dummy LUT 생성 방안 연구)

  • Minyeong Choi;Byoungjin Seok;Seunghee Seo;Changhoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.363-374
    • /
    • 2023
  • A white-box environment refers to a situation where the internal information of an algorithm is disclosed. The AES white-box encryption was first announced in 2002, and in 2016, a side-channel analysis for white-box encryption called Differential Computation Analysis (DCA) was proposed. DCA analysis is a powerful side-channel attack technique that uses the memory information of white-box encryption as side-channel information to find the key. Although various countermeasure studies against DCA have been published domestically and internationally, there were no evaluated or analyzed results from experiments applying the hiding technique using dummy operations to DCA analysis. Therefore, in this paper, we insert LU T-shaped dummy operations into the WBC-AES algorithm proposed by S. Chow in 2002 and quantitatively evaluate the degree of change in DCA analysis response depending on the size of the dummy. Compared to the DCA analysis proposed in 2016, which recovers a total of 16 bytes of the key, the countermeasure proposed in this paper was unable to recover up to 11 bytes of the key as the size of the dummy decreased, resulting in a maximum decrease in attack performance of about 68.8%, which is about 31.2% lower than the existing attack performance. The countermeasure proposed in this paper confirms that the attack performance significantly decreases as smaller dummy sizes are inserted and can be applied in various fields.

Theoretical Study of Hydration of Zeolite NaA (제올라이트 NaA의 수화에 관한 이론적 연구)

  • Kyoung Tai No;Mu Shik Jhon
    • Journal of the Korean Chemical Society
    • /
    • v.23 no.6
    • /
    • pp.374-384
    • /
    • 1979
  • Hydration scheme and hydration energy are determined in ${\alpha}$ cage of zeolite NaA. The selectivity between Na(1) and Na(2) is determined from energy calculation. The waters in ${\alpha}$ cage form a distorted dodecahedral cage. The average binding energies of water(1), water(2) and water(3) are -29.847, -25.344 and -15.888 kcal/mole respectively. The positions of oxygens of hydrated waters are in good agreement with the X-ray data. The heat of immersion curve is also obtained. This result is in good agreement with the differential heat of sorption curve obtained from differential thermal analysis. It is concluded that theoretical method provides considerable uses in the determination and understanding of the hydration and interaction energy of zeolites sorbate binding.

  • PDF

Simulation of ECT Bobbin Coil Probe Signals to Determine Optimum Coil Gap

  • Kong, Young-Bae;Song, Sung-Jin;Kim, Chang-Hwan;Yu, Hyung-Ju;Nam, Min-Woo;Jee, Dong-Hyun;Lee, Hee-Jong
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.26 no.6
    • /
    • pp.403-410
    • /
    • 2006
  • Eddy current testing (ECT) signals produced by a differential bobbin coil probe vary according to probe design parameters such as the number of turns, geometry and coil gap size. In the present study, the characteristics of a differential bobbin coil probe signals are investigated by numerical simulation in order to determine the optimum coil gap. For verification of numerical simulation accuracy, a specially designed bobbin probe of which the coil gap can be adjusted is fabricated and a series of experiments to acquire signals from two kinds of standard tubes with the variation in coil gap is performed. Then, the experimental signals are compared to the simulation results. Based on this investigation, a decision on the optimum range of coil gap is made. The theoretically predicted signals agree very well to the experimental signals. In fact, this excellent agreement demonstrates a high potential of the simulation as a design optimization tool for ECT bobbin probes.

Transition State Characterization of the Low- to Physiological-Temperature Nondenaturational Conformational Change in Bovine Adenosine Deaminase by Slow Scan Rate Differential Scanning Calorimetry

  • Bodnar, Melissa A.;Britt, B. Mark
    • BMB Reports
    • /
    • v.39 no.2
    • /
    • pp.167-170
    • /
    • 2006
  • Bovine adenosine deaminase undergoes a nondenaturational conformational change at $29^{\circ}C$ upon heating which is characterized by a large increase in heat capacity. We have determined the transition state thermodynamics of the conformational change using a novel application of differential scanning calorimetry (DSC) which employs very slow scan rates. DSC scans at the conventional, and arbitrary, scan rate of $1^{\circ}C/min$ show no evidence of the transition. Scan rates from 0.030 to $0.20^{\circ}C/min$ reveal the transition indicating it is under kinetic control. The transition temperature $T_t$ and the transition temperature interval ${\Delta}T$ increase with scan rate. A first order rate constant $k_1$ is calculated at each $T_t$ from $k_1\;=\;r_{scan}/{\Delta}T$, where $r_{scan}$ is the scan rate, and an Arrhenius plot is constructed. Standard transition state analysis reveals an activation free energy ${\Delta}G^{\neq}$ of 88.1 kJ/mole and suggests that the conformational change has an unfolding quality that appears to be on the direct path to the physiological-temperature conformer.

Post-buckling analysis of piles by perturbation method

  • Zhao, M.H.;He, W.;Li, Q.S.
    • Structural Engineering and Mechanics
    • /
    • v.35 no.2
    • /
    • pp.191-203
    • /
    • 2010
  • To investigate the critical buckling load and post-buckling behavior of an axially loaded pile entirely embedded in soil, the non-linear large deflection differential equation for a pinned pile, based on the Winkler-model and the discretionary distribution function of the foundation coefficient along pile shaft, was established by energy method. Assuming that the deflection function was a power series of some perturbation parameter according to the boundary condition and load in the pile, the non-linear large deflection differential equation was transformed to a series of linear differential equations by using perturbation approach. By taking the perturbation parameter at middle deflection, the higher-order asymptotic solution of load-deflection was then found. Effect of ratios of soil depth to pile length, and ratios of pile stiffness to soil stiffness on the critical buckling load and performance of piles (entirely embedded and partially embedded) after flexural buckling were analyzed. Results show that the buckling load capacity increases as the ratios of pile stiffness to soil stiffness increasing. The pile performance will be more stable when ratios of soil depth to pile length, and soil stiffness to pile stiffness decrease.

A Design and Analysis of the Block Cipher Circle-g Using the Modified Feistel Structure (변형된 Feistel 구조를 이용한 Circle-g의 설계와 분석)

  • 임웅택;전문석
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.3
    • /
    • pp.405-414
    • /
    • 2004
  • In this paper, we designed a 128-bits block cipher, Circle-g, which has 18-rounds modified Feistel structure and analyzed its secureness by the differential cryptanalysis and linear cryptanalysis. We could have full diffusion effect from the two rounds of the Circle-g. Because of the strong diffusion effect of the F-function of the algorithm, we could get a 9-rounds DC characteristic with probability 2^{-144} and a 12-rounds LC characteristic with probability 2^{-144}. For the Circle-g with 128-bit key, there is no shortcut attack, which is more efficient than the exhaustive key search, for more than 12 rounds of the algorithm.

  • PDF

Can Ultrasound be Used to Differentiate Tubular Adenomas of Breast from Fibroadenomas or Carcinoma?

  • Fu, Ying;Miao, Li-Ying;Ge, Hui-Yu;Mei, Fang;Wang, Jin-Rui
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.3
    • /
    • pp.1269-1274
    • /
    • 2014
  • Breast tubular adenomas are rare benign breast tumors and detailed descriptions of their sonographic appearance are necessary for differential diagnosis from fibroadenomas or breast cancers. This study investigated twenty-one histology-proved tubular adenomas in 17 patients and also included 48 fibroadenomas in 35 patients as a control group. There was no significant difference between the two groups with clinical presentation, which was age, tumor location, tumor number (p>0.05). Statistic analysis showed three significant factors in the differential diagnosis of tubular adenomas and fibroadenomas, including macro-lobulation (p=0.01), "tiny branch like" patterns (p=0.001) and vascularity (p=0.02). Other ultrasonographic features such as echogenicity, border, uniformity of echotexture, posterior acoustic enhancement, lateral wall shadowing were of no clinical significance (p>0.05). Calcifications were seen in three tubular adenomas which were different from those of carcinomas. Although tubular adenomas have some typical characteristics on sonography, surgery and core needle biopsy are still needed for complex cases to exclude progress to malignancy.

An Efficient Image Encryption Scheme Based on Quintuple Encryption Using Gumowski-Mira and Tent Maps

  • Hanchinamani, Gururaj;Kulkarni, Linganagouda
    • International Journal of Contents
    • /
    • v.11 no.4
    • /
    • pp.56-69
    • /
    • 2015
  • This paper proposes an efficient image encryption scheme based on quintuple encryption using two chaotic maps. The encryption process is realized with quintuple encryption by calling the encrypt(E) and decrypt(D) functions five times with five different keys in the form EDEEE. The decryption process is accomplished in the reverse direction by invoking the encrypt and decrypt functions in the form DDDED. The keys for the quintuple encryption/decryption processes are generated by using a Tent map. The chaotic values for the encrypt/decrypt operations are generated by using a Gumowski-Mira map. The encrypt function E is composed of three stages: permutation, pixel value rotation and diffusion. The permutation stage scrambles all the rows and columns to chaotically generated positions. This stage reduces the correlation radically among the neighboring pixels. The pixel value rotation stage circularly rotates all the pixels either left or right, and the amount of rotation is based on chaotic values. The last stage performs the diffusion four times by scanning the image in four different directions: Horizontally, Vertically, Principal diagonally and Secondary diagonally. Each of the four diffusion steps performs the diffusion in two directions (forward and backward) with two previously diffused pixels and two chaotic values. This stage ensures the resistance against the differential attacks. The security and performance of the proposed method is investigated thoroughly by using key space, statistical, differential, entropy and performance analysis. The experimental results confirm that the proposed scheme is computationally fast with security intact.

Study on Properties of Interior Ballistics According to Ignition-Gas Injections (점화제 주입에 따른 강내탄도 성능해석)

  • Jang, Jin-Sung;Sung, Hyung-Gun;Lee, Sang-Bok;Roh, Tae-Seong;Choi, Dong-Whan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.1
    • /
    • pp.22-29
    • /
    • 2011
  • Using the numerical code for the interior ballistics, the performance of the interior ballistics with the characteristic of the ignition-gas injections has been investigated. The ignition gas has been assumed to be injected into the chamber with 3 cases. As the results of analysis, when the ignition-gas has been injected into all chamber area, the pressure distributions of the chamber of the interior ballistics have been uniform and the differential pressure has been stable. The ignition-gas has been injected into the partial area of the chamber, however, the pressure distributions and the differential pressure have been unstable. The case using the longer ignition injector, therefore, seems to be more suitable to improve the stability of the interior ballistics.