Academic literature on the topic 'SIMER (Computer program)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SIMER (Computer program).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "SIMER (Computer program)"

1

Coşkun, Aysun, and Ümit Bostancı. "Evaluation of the most preferred operating systems on computers in terms of vulnerabilitiesBilgisayarlarda en çok tercih edilen işletim sistemlerinin güvenlik açıklıkları açısından değerlendirilmesi." Journal of Human Sciences 13, no. 3 (November 12, 2016): 4545. http://dx.doi.org/10.14687/jhs.v13i3.4128.

Full text
Abstract:
Because it is one of the most fundamental programsrunning on the computer, operating systems, are known to provide security infrastructure for other programs and services that run on computer. Unless any precautions are taken against vulnerabilities on the operating system, the system becomes eligible to be exploited, it paves the way to achieve the target of attackers. Hence, remediation of vulnerabilities on the operating system is evaluated to be extremely significant. In this study,a new database was created by questioning vulnerabilities existing in the most widely used operating systems on desktop and laptop computers from National Vulnerability Database of the US and CVEDETAILS databases. With regard to these vulnerabilities, CVSS scoring system which is used for scoring them created by FIRST was examined, in the light of the of re-scoring of identified vulnerabilities, the analysis of security of the operating systems was done with quantitative methods. One of the most important element of cyber security, fundementals of vulnerabilities, and role in the exploitation of the vulnerabilities of the computers were explained. In this study recently occured cyber security incidents because of vulnerabilities were also examined, and information about vulnerabilities allowing attack in these events was collected. Consequently, considering hosting the vulnerabilities, it is aimed to assess the availability of the operating systems in terms of security. ÖzetBilgisayar üzerinde çalışan en temel programlardan biri olması sebebiyle işletim sistemlerinin bilgisayar üzerinde çalışan diğer programlara ve servislere güvenlik altyapısı sağladığı bilinmektedir. İşletim sistemi üzerindeki güvenlik açıklıklarına karşı gereken önlemler alınmaz ise, sistem istismar edilmeye uygun hale gelmekte, bu durum saldırganların hedeflerine ulaşması için zemin hazırlamaktadır. Bu sebeple, işletim sistemlerinin üzerindeki güvenlik açıklıklarının kapatılmasının son derece önemli olduğu değerlendirilmektedir. Bu çalışmada bilgisayarlarda en çok kullanılan işletim sistemlerinde var olan güvenlik açıklıkları ABD’nin Ulusal Açıklık Veritabanı ve CVEDETAILS veritabanlarından sorgulanarak yeni bir veritabanı oluşturulmuştur. Toplanan açıklıklarla ilgili olarak FIRST tarafından oluşturulmuş CVSS puanlama sistemiyle yapılan puanlamalar incelenmiş, tespit edilen açıklıkların yeniden puanlamaları yapılarak çıkan sonuçlar ışığında işletim sistemlerinin güvenlik açısından analizi nicel yöntemlerle yapılmıştır. Siber güvenliğin en önemli unsurlarından birisi olan güvenlik açıklıklarıyla ilgili temel hususlar ile açıklıkların bilgisayarların istismar edilmesindeki rolü ortaya konulmuştur. Çalışmada ayrıca; yakın geçmişte açıklıklar kullanılarak gerçekleştirilen siber güvenlik olayları incelenmiş, bu olaylarda saldırıya imkan sağlayan açıklıklarla ilgili bilgiler toplanmıştır. Sonuçta, barındırdığı açıklıklar dikkate alındığında, işletim sistemlerinin kullanılabilirliğinin güvenlik açısından değerlendirmesi hedeflenmektedir.
APA, Harvard, Vancouver, ISO, and other styles
2

Tobita, Y., Sa Kondo, H. Yamano, K. Morita, W. Maschek, P. Coste, and T. Cadiou. "The Development of SIMMER-III, An Advanced Computer Program for LMFR Safety Analysis, and Its Application to Sodium Experiments." Nuclear Technology 153, no. 3 (March 2006): 245–55. http://dx.doi.org/10.13182/nt06-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Soni, Soni, Afdhil Hafid, and Didik Sudyana. "ANALISIS KESADARAN MAHASISWA UMRI TERKAIT PENGGUNAAN TEKNOLOGI & MEDIA SOSIAL TERHADAP BAHAYA CYBERCRIME." JURNAL FASILKOM 9, no. 3 (November 14, 2019): 28–34. http://dx.doi.org/10.37859/jf.v9i3.1664.

Full text
Abstract:
Abstract Students are one of the many users of technology and the internet. Based on data from the Association of Indonesian Internet Service Providers, it states that as many as 100% of student respondents stated using the internet every day. So that the potential for students to become victims of cyber crime continues to increase. This is because many internet users are not careful in using it. Cyber ​​crimes that often occur include identity theft, kidnapping, online fraud, burglary and so forth. During this time many users who write their personal identity on social media, not even a few who post about the location they visit. Then many students are fond of using free wifi. Cyber​​crime will not occur if there is vigilance and caution from its users. Students should be able to realize the negative effects of cyberspace. For this reason, an analysis is needed regarding the presence of social media users. In this research, analysis of student awareness in the informatics engineering study program, computer science faculty, Muhammadiyah University of Riau to find out how much the level of student awareness about the dangers of cybercrime is based on the social media and user awareness categories. From the results of the study, it was concluded that students of the Department of Informatics had a fairly good level of awareness. This is evidenced from the average results obtained in the social media category, 83.4% of students have a fairly good awareness while the average user awareness category of 72.7%. However, the university, faculty and study programs must still provide assistance, education or outreach to those who do not have a good level of vigilance because there are still a few percent who still do not have a good level of vigilance. Keywords: cybercrime, students, awareness, social media, internet Abstrak Mahasiswa merupakan salah satu pengguna teknologi dan internet yang cukup banyak. Berdasarkan data dari Asosiasi Penyedia Jasa Internet Indonesia, menyebutkan bahwa sebanyak 100% responden dari mahasiswa menyatakan menggunakan internet setiap harinya. Sehingga potensi mahasiswa menjadi korban kejahatan siber pun terus meningkat. Hal ini disebabkan karena banyak pengguna internet yang tidak berhati-hati dalam menggunakannya. Kejahatan cyber yang sering terjadi diantaranya adalah pencurian identitas, pembulian, penipuan online, perampokan dan lain sebagainya. Selama ini banyak pengguna yang menuliskan identitas pribadinya di media social, bahkan tidak sedikit yang memposting tentang lokasi yang mereka kunjungi. Kemudian banyak mahasiswa yang gemar menggunakan wifi gratis. Kejahatan cyber tidak akan terjadi jika ada kewaspadaan dan kehati-hati dari para penggunanya. Seharusnya para mahasiswa dapat menyadari dampak negatif dari dunia maya. Untuk itu perlu dilakukan analisis terkait kesadaarn pengguna media sosial. Dalam penelitian ini, analisis kesadaran mahasiswa di program studi teknik informatika, fakultas ilmu komputer, universitas muhammadiyah riau untuk mengetahui seberapa besar tingkat kesadaran mahasiswa tentang bahaya cybercrime didasarkan pada kategori media sosial dan kesadaran pengguna. Dari hasil penelitian, disimpulkan bahwa mahasiswa Jurusan Teknik Informatika memiliki tingkat kesadaran yang cukup baik. Hal ini dibuktikan dari hasil rata-rata yang diperoleh pada kategori media sosial, 83,4% mahasiswa mempunyai kesadaran yang cukup baik sedangkan pada kategori kesadaran pengguna rata-rata sebanyak 72,7%. Namun pihak universitas, fakultas dan juga program studi tetap harus memberikan pendampingan, edukasi ataupun sosialisasi bagi yang belum memiliki tingkat kewaspadaan yang baik karena masih ada beberapa persen masih masih belum mempunyai tingkat kewaspadaan yang baik. Kata kunci: cybercrime, mahasiswa, kesadaran, media social, internet
APA, Harvard, Vancouver, ISO, and other styles
4

Chitpin, Justin G., Aseel Awdeh, and Theodore J. Perkins. "RECAP reveals the true statistical significance of ChIP-seq peak calls." Bioinformatics 35, no. 19 (March 1, 2019): 3592–98. http://dx.doi.org/10.1093/bioinformatics/btz150.

Full text
Abstract:
Abstract Motivation Chromatin Immunopreciptation (ChIP)-seq is used extensively to identify sites of transcription factor binding or regions of epigenetic modifications to the genome. A key step in ChIP-seq analysis is peak calling, where genomic regions enriched for ChIP versus control reads are identified. Many programs have been designed to solve this task, but nearly all fall into the statistical trap of using the data twice—once to determine candidate enriched regions, and again to assess enrichment by classical statistical hypothesis testing. This double use of the data invalidates the statistical significance assigned to enriched regions, thus the true significance or reliability of peak calls remains unknown. Results Using simulated and real ChIP-seq data, we show that three well-known peak callers, MACS, SICER and diffReps, output biased P-values and false discovery rate estimates that can be many orders of magnitude too optimistic. We propose a wrapper algorithm, RECAP, that uses resampling of ChIP-seq and control data to estimate a monotone transform correcting for biases built into peak calling algorithms. When applied to null hypothesis data, where there is no enrichment between ChIP-seq and control, P-values recalibrated by RECAP are approximately uniformly distributed. On data where there is genuine enrichment, RECAP P-values give a better estimate of the true statistical significance of candidate peaks and better false discovery rate estimates, which correlate better with empirical reproducibility. RECAP is a powerful new tool for assessing the true statistical significance of ChIP-seq peak calls. Availability and implementation The RECAP software is available through www.perkinslab.ca or on github at https://github.com/theodorejperkins/RECAP. Supplementary information Supplementary data are available at Bioinformatics online.
APA, Harvard, Vancouver, ISO, and other styles
5

Tobita, Y., S. A. Kondo, H. Yamano, K. Morita, W. Maschek, P. Coste, and T. Cadiou. "The Development of SIMMER-III, an Advanced Computer Program for LMFR Safety Analysis, and Its Application to Sodium Experiments." ChemInform 37, no. 41 (October 10, 2006). http://dx.doi.org/10.1002/chin.200641271.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "SIMER (Computer program)"

1

Armstrong, Alasdair, Brian Campbell, Ben Simner, Christopher Pulte, and Peter Sewell. "Isla: Integrating Full-Scale ISA Semantics and Axiomatic Concurrency Models." In Computer Aided Verification, 303–16. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81685-8_14.

Full text
Abstract:
AbstractArchitecture specifications such as Armv8-A and RISC-V are the ultimate foundation for software verification and the correctness criteria for hardware verification. They should define the allowed sequential and relaxed-memory concurrency behaviour of programs, but hitherto there has been no integration of full-scale instruction-set architecture (ISA) semantics with axiomatic concurrency models, either in mathematics or in tools. These ISA semantics can be surprisingly large and intricate, e.g. 100k+ lines for Armv8-A. In this paper we present a tool, Isla, for computing the allowed behaviours of concurrent litmus tests with respect to full-scale ISA definitions, in Sail, and arbitrary axiomatic relaxed-memory concurrency models, in the Cat language. It is based on a generic symbolic engine for Sail ISA specifications, which should be valuable also for other verification tasks. We equip the tool with a web interface to make it widely accessible, and illustrate and evaluate it for Armv8-A and RISC-V. By using full-scale and authoritative ISA semantics, this lets one evaluate litmus tests using arbitrary user instructions with high confidence. Moreover, because these ISA specifications give detailed and validated definitions of the sequential aspects of systems functionality, as used by hypervisors and operating systems, e.g. instruction fetch, exceptions, and address translation, our tool provides a basis for developing concurrency semantics for these. We demonstrate this for the Armv8-A instruction-fetch model and self-modifying code examples of Simner et al.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "SIMER (Computer program)"

1

Yamano, Hidemasa, and Yoshiharu Tobita. "SIMMER-III Code Assessment for Material Expansion Dynamics During Core Disruptive Accidents in Sodium-Cooled Fast Reactors." In 2014 22nd International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/icone22-30281.

Full text
Abstract:
The sodium-cooled fast reactor (SFR) severe accident analysis computer code SIMMER-III has been developed and assessed comprehensively and systematically in a code assessment (verification and validation) program which consists of a two-step effort: Phase 1 for fundamental or separate-effect assessment of individual code models; and Phase 2 for integral assessment of key physical phenomena relevant to SFR safety. This paper describes the achievement of the code assessment on material expansion dynamics in the framework of the Phase 2 assessment program. Detailed descriptions are given for two representative experimental analyses (VECTORS and OMEGA), which are intended to validate high speed multi-phase flow dynamics in pin bundle structure and large vapor bubble expansion dynamics into a coolant pool, respectively. Through the assessment program, the SIMMER-III code has proved to be basically valid both numerically and physically, with current applicability to integral reactor safety calculations.
APA, Harvard, Vancouver, ISO, and other styles
2

Shirakawa, Noriyuki, Yasushi Uehara, Masanori Naitoh, Hidetoshi Okada, Yuichi Yamamoto, and Seiichi Koshizuka. "Next Generation Safety Analysis Methods for SFRs—(5) Structural Mechanics Models of COMPASS Code and Verification Analyses." In 17th International Conference on Nuclear Engineering. ASMEDC, 2009. http://dx.doi.org/10.1115/icone17-75532.

Full text
Abstract:
A five-year research project started in FY2005 (Japanese Fiscal Year, hereafter) to develop a code based on the Moving Particle Semi-implicit (MPS) method for detailed analysis of core disruptive accidents (CDAs) in sodium-cooled fast reactors (SFRs). The code is named COMPASS (Computer Code with Moving Particle Semi-implicit for Reactor Safety Analysis). CDAs have been almost exclusively analyzed with SIMMER-III [2], which is a two-dimensional multi-component multi-phase Eulerian fluid-dynamics code, coupled with fuel pin model and neutronics model. The COMPASS has been developed to play a role complementary to SIMMER-III in temporal and spatial scale viewpoint; COMPASS for mesoscopic using a small window cut off from SIMMER-III for macroscopic. We presented the project’s outline and the verification analyses of elastic structural mechanics module of the COMPASS in ICONE16 [1]. The COMPASS solves physical phenomena in CDAs coupling fluid dynamics and structural dynamics with phase changes, that is vaporization/condensation and melting/ freezing. The phase changes are based on nonequilibrium heat transfer-limited model and all “phase change paths” considered in SIMMER-III are implemented [20]. In FY2007, the elastoplastic model including thermal expansion and fracture are formulated in terms of MPS method and implemented in the COMPASS, where the model adopts the von Mises type yield condition and the maximum principal stress as fracture condition. To cope with large computing time, “stiffness reduction approximation” was developed and successfully implemented in the COMPASS besides parallelization effort. Verification problems are set to be suitable for analyses of SCARABEE tests, EAGLE tests and hypothetical CDAs in real plants so that they are suggesting issues to be solved by improving the models and calculation algorithms. The main objective of SCARABEE-N in-pile tests was to study the consequences of a hypothetical total instantaneous blockage (TIB) at the entrance of a liquid-metal reactor subassembly at full power [21]. The main objectives of the EAGLE program consisting of in-pile tests using IGR (Impulse Graphite Reactor) and out-of-pile tests at NNC/RK are; 1) to demonstrate effectiveness of special design concepts to eliminate the re-criticality issue, and 2) to acquire basic information on early-phase relocation of molten-core materials toward cold regions surrounding the core, which would be applicable to various core design concepts [22, 23]. In this paper, the formulations and the results of functional verification of elastoplastic models in CDA conditions will be presented.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "SIMER (Computer program)"

1

Bohl, W. R., and L. B. Luck. SIMMER-II: A computer program for LMFBR disrupted core analysis. Office of Scientific and Technical Information (OSTI), June 1990. http://dx.doi.org/10.2172/6851447.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography