• Title/Summary/Keyword: non-success probability

Search Result 15, Processing Time 0.024 seconds

Use of Dynamic Reliability Method in Assessing Accident Management Strategy

  • Jae, Moosung
    • International Journal of Reliability and Applications
    • /
    • v.2 no.1
    • /
    • pp.27-36
    • /
    • 2001
  • This Paper proposes a new methodology for assessing the reliability of an accident management, which Is based on the reliability physics and the scheme to generate dynamic event tree. The methodology consists of 3 main steps: screening; uncertainty propagation; and probability estimation. Sensitivity analysis is used for screening the variables of significance. Latin Hypercube sampling technique and MAAP code are used for uncertainty propagation, and the dynamic event tree generation method is used for the estimation of non-success probability of implementing an accident management strategy. This approach is applied in assessing the non-success probability of implementing a cavity flooding strategy, which is to supply water into the reactor cavity using emergency fire systems during the sequence of station blackout at the reference plant.

  • PDF

Performance Analysis of Follower Noise Jamming Considering Tracking Parameters against Frequency Hopping Signals (추적 파라미터를 고려한 주파수 도약신호 추적 잡음 재밍의 성능 분석)

  • Lee, Chi-Ho;Jo, Sung-Jin;Ryu, Jeong-Ho
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.3
    • /
    • pp.67-75
    • /
    • 2008
  • In this paper, we analyze the performance of Follower Noise Jamming(FNJ) considering three practical tracking parameters such as tracking bandwidth, tracking time and tracking success probability. The performance of FNJ is compared with that of Partial-Band Noise Jamming(PBNJ) in terms of Symbol Error Rate(SER) at the communication receiver under the assumed typical operation model. It is observed that the performance of FNJ is non-linearly dependent on the tracking bandwidth, the tracking time and the tracking success probability. As we can easily expect, it is also observed that the performance of FNJ is better than that of the PBNJ. Finally, it is shown that, for a fixed tracking bandwidth, the combinations of the required tracking time and the tracking success probability which satisfy a certain required SER.

Cryptanalysis of the Authentication in ACORN

  • Shi, Tairong;Guan, Jie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4060-4075
    • /
    • 2019
  • ACORN is an authenticated encryption algorithm proposed as a candidate in the currently ongoing CAESAR competition. ACORN has a good performance on security and efficiency which has been a third-round candidate. This paper mainly concentrates on the security of ACORN under the forgery attack and the non-repudiation of ACORN. Firstly, we analyze the differential properties of the feedback function in ACRON are analyzed. By taking advantage of these properties, the forgery attacks on round-reduced ACORN are proposed with a success probability higher than $2^{-128}$ when the number of finalization rounds is less than 87. Moreover, the non-repudiation of ACRON in the nonce-reuse setting is analyzed. The known collision can be used to deny the authenticated message with probability $2^{-120}$. This paper demonstrates that ACORN cannot generate the non-repudiation completely. We believe it is an undesirable property indeed.

DISTRIBUTIONS OF PATTERNS OF TWO FAILURES SEPARATED BY SUCCESS RUNS OF LENGTH $\textit{k}$

  • Sen, Kanwar;Goyal, Babita
    • Journal of the Korean Statistical Society
    • /
    • v.33 no.1
    • /
    • pp.35-58
    • /
    • 2004
  • For fixed positive integers and $\textit{k}\;(n\;{\geq}\;{\textit{k}}\;+\;2)$, the exact probability distributions of non-overlapping and overlapping patterns of two failures separated by (i) exactly $textsc{k}$ successes, (ii) at least $\textit{k}$ successes and (iii) at most $\textit{k}$ successes have been obtained for Bernoulli independent and Markov dependent trials by using combinatorial technique. The waiting time distributions for the first occurrence and the $r^{th}$ (r > 1) occurrence of the patterns have also been obtained.

Factors Affecting Industry 4.0 Adoption in the Curriculum of University Students in Ho Chi Minh City

  • NGUYEN, Xuan Truong;NGUYEN, Thanh Toan
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.10
    • /
    • pp.303-313
    • /
    • 2020
  • This study investigates the factors affecting Industry 4.0 adoption in the curriculum of university students in Ho Chi Minh City, Vietnam. Universities need to respond to the changing faces of Industry 4.0 and, hence, Education 4.0. A mixed method including both qualitative and quantitative methodologies was utilized. An in-depth interview was carried out for exploring, reviewing, and testing content validity of constructs and measurement items. The pilot study was conducted with 120 respondents. The conceptual model and hypotheses were developed using data collected by a questionnaire survey distributed to 584 respondents by both electronic and paper forms with non-probability and convenience sampling techniques. The result of structural equation modeling showed that occupation relevance, skills, facility conditions, and social influence impacted on the intermediates variables, namely, relevance advantage, perceived usefulness, behavioral intention-to-use, and actual use. The independent variables are occupation relevance, skills, facility conditions, and social influence. They impact actual use through mediating constructs such as relevance advantage, perceived usefulness, and behavioral intention-to-use. The findings suggest that universities and students' efforts aimed at increasing the factors' perceptions of adoption of Industry 4.0 will contribute to implementation success, where success is defined as effectual usage of Industry 4.0.

A Novel Hitting Frequency Point Collision Avoidance Method for Wireless Dual-Channel Networks

  • Quan, Hou-De;Du, Chuan-Bao;Cui, Pei-Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.941-955
    • /
    • 2015
  • In dual-channel networks (DCNs), all frequency hopping (FH) sequences used for data channels are chosen from the original FH sequence used for the control channel by shifting different initial phases. As the number of data channels increases, the hitting frequency point problem becomes considerably serious because DCNs is non-orthogonal synchronization network and FH sequences are non-orthogonal. The increasing severity of the hitting frequency point problem consequently reduces the resource utilization efficiency. To solve this problem, we propose a novel hitting frequency point collision avoidance method, which consists of a sequence-selection strategy called sliding correlation (SC) and a collision avoidance strategy called keeping silent on hitting frequency point (KSHF). SC is used to find the optimal phase-shifted FH sequence with the minimum number of hitting frequency points for a new data channel. The hitting frequency points and their locations in this optimal sequence are also derived for KSHF according to SC strategy. In KSHF, the transceivers transmit or receive symbol information not on the hitting frequency point, but on the next frequency point during the next FH period. Analytical and simulation results demonstrate that unlike the traditional method, the proposed method can effectively reduce the number of hitting frequency points and improve the efficiency of the code resource utilization.

Performance Analysis of the HIPERLAN Channel Access Control Protocol (고속 무선 근거리 통신망(HIPERLAN) 채널접근제어 프로토콜의 성능분석)

  • Hyun, Young-Guen;Lee, Jong-Kyu
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.1
    • /
    • pp.22-29
    • /
    • 2000
  • In this paper, we analyzed the performance of EY-NPMA(Elimination Yield-Non-preemptive Priority Multiple Access) protocol-channel access control protocol of HIPERLAN(HIgh PErformance Radio Local Area Network) type 1 specification, adopted as european high speed wireless LAN standard by ETSI(European Telecommunication Standards Institute). We established a system model for EY-NPMA protocol analysis, analyzed success probability in a channel access cycle, and derived expressions for the average length of contention phase. Using a M/G/1 model, we approximated the normalized delay, and throughput, and we evaluated these results by simulations.

  • PDF

Emerging Roles of Human Prostatic Acid Phosphatase

  • Kong, Hoon Young;Byun, Jonghoe
    • Biomolecules & Therapeutics
    • /
    • v.21 no.1
    • /
    • pp.10-20
    • /
    • 2013
  • Prostate cancer is one of the most prevalent non-skin related cancers. It is the second leading cause of cancer deaths among males in most Western countries. If prostate cancer is diagnosed in its early stages, there is a higher probability that it will be completely cured. Prostatic acid phosphatase (PAP) is a non-specific phosphomonoesterase synthesized in prostate epithelial cells and its level proportionally increases with prostate cancer progression. PAP was the biochemical diagnostic mainstay for prostate cancer until the introduction of prostate-specific antigen (PSA) which improved the detection of early-stage prostate cancer and largely displaced PAP. Recently, however, there is a renewed interest in PAP because of its usefulness in prognosticating intermediate to high-risk prostate cancers and its success in the immunotherapy of prostate cancer. Although PAP is believed to be a key regulator of prostate cell growth, its exact role in normal prostate as well as detailed molecular mechanism of PAP regulation is still unclear. Here, many different aspects of PAP in prostate cancer are revisited and its emerging roles in other environment are discussed.

Decision Making on the Non surgical, Surgical Treatment on Chronic Adult Periodontitis (만성 성인성 치주염 치료시 비외과적, 외과적 방법에 대한 의사결정)

  • Song, Si-Eun;Li, Seung-Won;Cho, Kyoo-Sung;Chai, Jung-Kiu;Kim, Chong-Kwan
    • Journal of Periodontal and Implant Science
    • /
    • v.28 no.4
    • /
    • pp.645-660
    • /
    • 1998
  • The purpose of this study was to make and ascertain a decision making process on the base of patient-oriented utilitarianism in the treatment of patients of chronic adult periodontitis. Fifty subjects were chosen in Yonsei Dental hospital and the other fifty were chosen in Severance dental hospital according to the selection criteria. Fifty four patients agreed in this study. NS group(N=32) was treated with scaling and root planing without any surgical intervention, the other S group(N=22) done with flap operation. During the active treatment and healing time, all patients of both groups were educated about the importance of oral hygiene and controlled every visit to the hospital. When periodontal treatment needed according to the diagnostic results, some patients were subjected to professional tooth cleaning and scaling once every 3 months according to an individually designed oral hygienic protocol. Probing depth was recorded on baseline and 18 months after treatments. A questionnaire composed of 6 kinds(hygienic easiness, hypersensitivity, post treatment comfort, complication, functional comfort, compliance) of questions was delivered to each patient to obtain the subjective evaluation regarding the results of therapy. The decision tree for the treatment of adult periodontal disease was made on the result of 2 kinds of periodontal treatment and patient's ubjective evaluation. The optimal path was calculated by using the success rate of the results as the probability and utility according to relative value and the economic value in the insurance system. The success rate to achieve the diagnostic goal of periodontal treatment as the remaining pocket depth less than 3mm and without BOP was $0.83{\pm}0.12$ by non surgical treatment and $0.82{\pm}0.14$ by surgical treatment without any statistically significant difference. The moderate success rate of more than 4mm probing pocket depth were 0.17 together. The utilities of non-surgical treatment results were 100 for a result with less than 3mm probing pocket depth, 80 for the other results with more than 4mm probing pocket depth, 0 for the extraction. Those of surgical treatment results were the same except 75 for the results with more than 4mm. The pooling results of subjective evaluation by using a questionnaire were 60% for satisfaction level and 40% for no satisfaction level in the patient group receiving nonsurgical treatment and 33% and 67% in the other group receiving surgical treatment. The utilities for 4 satisfaction levels were 100, 75, 60, 50 on the base of that the patient would express the satisfaction level with normal distribution. The optimal path of periodontal treatment was rolled back by timing the utility on terminal node and the success rate, the distributed ratio of patient's satisfaction level. Both results of the calculation was non surgical treatment. Therefore, it can be said that non-surgical treatment may be the optimal path for this decision tree of treatment protocol if the goal of the periodontal treatment is to achieve the remaining probing pocket depth of less than 3mm for adult chronic periodontitis and if the utilitarian philosophy to maximise the expected utility for the patients is advocated.

  • PDF

Deep Learning Assisted Differential Cryptanalysis for the Lightweight Cipher SIMON

  • Tian, Wenqiang;Hu, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.600-616
    • /
    • 2021
  • SIMON and SPECK are two families of lightweight block ciphers that have excellent performance on hardware and software platforms. At CRYPTO 2019, Gohr first introduces the differential cryptanalysis based deep learning on round-reduced SPECK32/64, and finally reduces the remaining security of 11-round SPECK32/64 to roughly 38 bits. In this paper, we are committed to evaluating the safety of SIMON cipher under the neural differential cryptanalysis. We firstly prove theoretically that SIMON is a non-Markov cipher, which means that the results based on conventional differential cryptanalysis may be inaccurate. Then we train a residual neural network to get the 7-, 8-, 9-round neural distinguishers for SIMON32/64. To prove the effectiveness for our distinguishers, we perform the distinguishing attack and key-recovery attack against 15-round SIMON32/64. The results show that the real ciphertexts can be distinguished from random ciphertexts with a probability close to 1 only by 28.7 chosen-plaintext pairs. For the key-recovery attack, the correct key was recovered with a success rate of 23%, and the data complexity and computation complexity are as low as 28 and 220.1 respectively. All the results are better than the existing literature. Furthermore, we briefly discussed the effect of different residual network structures on the training results of neural distinguishers. It is hoped that our findings will provide some reference for future research.