SERPENT/SUBCHANFLOW COUPLED CALCULATIONS FOR A VVER CORE AT HOT FULL POWER [PDF]
An increasing interest on the development of highly accurate methodologies in reactor physics is nowadays observed, mainly stimulated by the availability of vast computational resources.
Ferraro Diego +7 more
doaj +1 more source
BENCHMARKING OF THE SERPENT 2 MONTE CARLO CODE FOR FUSION NEUTRONICS APPLICATIONS [PDF]
Analyses of radiation fields resulting from a deuterium-tritium (DT) plasma in fusion devices is a critical input to the design and validation of many aspects of the reactor design, including, shielding, material lifetime and remote maintenance ...
Valentine A. +3 more
doaj +1 more source
Image Encryption Using Block Cipher Based Serpent Algorithm [PDF]
In an encryption scheme, the message or information, referred to as plaintext, is encrypted using an encryption algorithm, generating cipher textthat can only be read if decrypted.A proposal algorithm forimages protectionis depending on the block cipher ...
Yossra Hussain Ali +1 more
doaj +1 more source
Kinematika dan Antarmuka Robot SCARA Serpent
ABSTRAK Penelitian ini menyajikan kendali pergerakan posisi dari robot SCARA Serpent menggunakan persamaan kinematika dan antarmuka berbasis Processing IDE. Antarmuka bertujuan untuk memudahkan dalam pengendalian robot SCARA Serpent dan mendapatkan data
AFRIZAL MAYUB +3 more
doaj +1 more source
Folklore Motif of the Mythical Lover in the Ancient and Early- Medieval Japanese Literature [PDF]
Japanese folk culture put great emphasis on the cult of the serpent since the ancient times. This cult found reflection in ancient mythological texts, folklore narratives, and folk customs and rituals.
Anastasya R. Sadokova
doaj +1 more source
John Keats’in Lamia Şiiri ve Yaşar Kemal’in Yılanı Öldürseler Romanında Eril Kolektif Bakış, Kem Göz ve Yılan [PDF]
The gaze is not only an act of seeing but also a collective control and oppressive mechanism used for suppressing deviations from the standard social norm.
Fırat Karadaş
doaj +1 more source
An Improvement of Serpent Algorithm [PDF]
An improvement to Serpent algorithm will be proposed . Serpent algorithm is a Feistel network , iterating a simple encryption function 32 times . The block size is 256 bits , and the key can be any length up to 256 bytes .
Saleh Al - Karaawy, Ashwaq Hashim
doaj +1 more source
Securing IoT Devices against Differential-Linear (DL) Attack Used on Serpent Algorithm
Cryptographic algorithms installed on Internet of Things (IoT) devices suffer many attacks. Some of these attacks include the differential linear attack (DL).
Khumbelo Muthavhine, Mbuyu Sumbwanyambe
doaj +1 more source
Differential roles of the Drosophila EMT-inducing transcription factors Snail and Serpent in driving primary tumour growth. [PDF]
Several transcription factors have been identified that activate an epithelial-to-mesenchymal transition (EMT), which endows cells with the capacity to break through basement membranes and migrate away from their site of origin.
Kyra Campbell +3 more
doaj +1 more source
TRANSIENT CALCULATIONS OF SPERT III EXPERIMENTS [PDF]
Cold-startup and hot-standby reactivity accident tests conducted at the SPERT III E-core research reactor are analysed with the coupled neutron-kinetic/thermal-hydraulic code system DYN3D-ATHLET.
Pautz Andreas, Zwermann Winfried
doaj +1 more source

