Results 1 to 10 of about 86,687 (279)

SERPENT/SUBCHANFLOW COUPLED CALCULATIONS FOR A VVER CORE AT HOT FULL POWER [PDF]

open access: yesEPJ Web of Conferences, 2021
An increasing interest on the development of highly accurate methodologies in reactor physics is nowadays observed, mainly stimulated by the availability of vast computational resources.
Ferraro Diego   +7 more
doaj   +1 more source

BENCHMARKING OF THE SERPENT 2 MONTE CARLO CODE FOR FUSION NEUTRONICS APPLICATIONS [PDF]

open access: yesEPJ Web of Conferences, 2021
Analyses of radiation fields resulting from a deuterium-tritium (DT) plasma in fusion devices is a critical input to the design and validation of many aspects of the reactor design, including, shielding, material lifetime and remote maintenance ...
Valentine A.   +3 more
doaj   +1 more source

Image Encryption Using Block Cipher Based Serpent Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2016
In an encryption scheme, the message or information, referred to as plaintext, is encrypted using an encryption algorithm, generating cipher textthat can only be read if decrypted.A proposal algorithm forimages protectionis depending on the block cipher ...
Yossra Hussain Ali   +1 more
doaj   +1 more source

Kinematika dan Antarmuka Robot SCARA Serpent

open access: yesJurnal Elkomika, 2020
ABSTRAK Penelitian ini menyajikan kendali pergerakan posisi dari robot SCARA Serpent menggunakan persamaan kinematika dan antarmuka berbasis Processing IDE. Antarmuka bertujuan untuk memudahkan dalam pengendalian robot SCARA Serpent dan mendapatkan data
AFRIZAL MAYUB   +3 more
doaj   +1 more source

Folklore Motif of the Mythical Lover in the Ancient and Early- Medieval Japanese Literature [PDF]

open access: yesStudia Litterarum, 2019
Japanese folk culture put great emphasis on the cult of the serpent since the ancient times. This cult found reflection in ancient mythological texts, folklore narratives, and folk customs and rituals.
Anastasya R. Sadokova
doaj   +1 more source

John Keats’in Lamia Şiiri ve Yaşar Kemal’in Yılanı Öldürseler Romanında Eril Kolektif Bakış, Kem Göz ve Yılan [PDF]

open access: yesFolklor/Edebiyat, 2020
The gaze is not only an act of seeing but also a collective control and oppressive mechanism used for suppressing deviations from the standard social norm.
Fırat Karadaş
doaj   +1 more source

An Improvement of Serpent Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2005
An improvement to Serpent algorithm will be proposed . Serpent algorithm is a Feistel network , iterating a simple encryption function 32 times . The block size is 256 bits , and the key can be any length up to 256 bytes .
Saleh Al - Karaawy, Ashwaq Hashim
doaj   +1 more source

Securing IoT Devices against Differential-Linear (DL) Attack Used on Serpent Algorithm

open access: yesFuture Internet, 2022
Cryptographic algorithms installed on Internet of Things (IoT) devices suffer many attacks. Some of these attacks include the differential linear attack (DL).
Khumbelo Muthavhine, Mbuyu Sumbwanyambe
doaj   +1 more source

Differential roles of the Drosophila EMT-inducing transcription factors Snail and Serpent in driving primary tumour growth. [PDF]

open access: yesPLoS Genetics, 2018
Several transcription factors have been identified that activate an epithelial-to-mesenchymal transition (EMT), which endows cells with the capacity to break through basement membranes and migrate away from their site of origin.
Kyra Campbell   +3 more
doaj   +1 more source

TRANSIENT CALCULATIONS OF SPERT III EXPERIMENTS [PDF]

open access: yesEPJ Web of Conferences, 2021
Cold-startup and hot-standby reactivity accident tests conducted at the SPERT III E-core research reactor are analysed with the coupled neutron-kinetic/thermal-hydraulic code system DYN3D-ATHLET.
Pautz Andreas, Zwermann Winfried
doaj   +1 more source

Home - About - Disclaimer - Privacy