• Title/Summary/Keyword: Code checking

Search Result 130, Processing Time 0.025 seconds

CFD Code Development for a Two-phase Flow with an Interfacial Area Transport Equation (계면면적 수송방정식을 적용한 이상유동 해석코드 개발)

  • Bae, B.U.;Yoon, H.Y.;Euh, D.J.;Song, C.H.;Park, G.C.
    • Proceedings of the KSME Conference
    • /
    • 2007.05b
    • /
    • pp.2696-2701
    • /
    • 2007
  • For the analysis of a two-phase flow, the interaction between two phases such as the interfacial momentum or heat transfer is proportional to the interfacial area. So the interfacial area concentration (IAC) is one of the most important parameters governing the behavior of each phase. This study focuses on the development of a computational fluid dynamics (CFD) code for investigating a boiling flow with a one-group IAC transport equation. It was based on the two-fluid model and governing equations were calculated by SMAC algorithm. For checking the robustness of the developed code, the experiment of a subcooled boiling in a vertical annulus channel was analyzed to validate the capability of the IAC transport equation. As the results, the developed code was confirmed to have the capability in predicting multi-dimensional phenomena of vapor generation and propagation in a subcooled boiling.

  • PDF

Establishment of Cosmetic Raw Material Weighing and Bulk Manufacturing Management System Using Bar Code, QR Code and Database (바코드, 큐알코드와 데이터베이스를 활용한 화장품 원료 칭량 및 벌크제조 관리시스템 구축)

  • Lee, Chung-Hee;Bae, Jun-Tae;Hong, Jin-Tae
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.45 no.3
    • /
    • pp.277-285
    • /
    • 2019
  • In this study, effective cosmetic raw material weighing and bulk manufacturing management system were constructed by using bar code or quick response code (QR code) and database. Raw material labels and weighing labels for bulk manufacturing were published in web environment using the information entered in the database using ScriptX, a print component of Medi&Co. By checking the weighing and manufacturing process by using scanner, tablet and PC, it was possible to remarkably improve the product error caused by erroneous amount or misapplication which is the most cause of error in the production of cosmetic bulk. In conclusion, applying a database that utilizes bar code and QR code to cosmetics manufacturing can reduce the various problems in the process, thereby improving quality control and productivity of cosmetics.

CodeAnt : Code Slicing Tool for Effective Software Verification (CodeAnt : 소프트웨어 검증 효율 향상을 위한 코드 슬라이싱 도구)

  • Park, Mingyu;Kim, Dongwoo;Choi, Yunja
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.1
    • /
    • pp.1-8
    • /
    • 2015
  • Safety critical systems require exhaustive verification of safety properties, because even a single corner-case fault can cause a critical safety failure. However, existing verification approaches are too costly in terms of time and computational resource required, making it hard to be applied in practice. In this paper, we implemented a tool for minimizing the size of the verification target w.r.t. verification properties to check, based on program slicing technique[1]. The efficacy of program slicing using our tool is demonstrated in a case study with a verification target Trampoline[3], which is an open source automotive operating system compliant with OSEK/VDX[2]. Experiments have shown enhanced performance in verification, with a 71% reduction in the size of the code.

Behavior of lightweight aggregate concrete-encased composite columns

  • Al-Shahari, Abbas M.;Hunaiti, Yasser M.;Ghazaleh, Bassam Abu
    • Steel and Composite Structures
    • /
    • v.3 no.2
    • /
    • pp.97-110
    • /
    • 2003
  • An experimental study was conducted to investigate the behavior of eccentric lightweight aggregate concrete-encased composite columns. This study aims at verifying the validity of such type of concrete in composite construction and checking the adequacy of the AISC-LRFD and the British Bridge Code BS 5400 specifications in predicting the column strength. Sixteen full-scale pin ended columns subjected to uniaxial bending about the major axis in symmetrical single curvature were tested.

Interference Check for Reactor In-Core Instrumentation Guide Tube Routing (원자로 노내계측기 안내관의 배열을 위한 간섭검증)

  • Cho, Duk-Sang
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.3 no.3
    • /
    • pp.201-207
    • /
    • 2000
  • In this study, methodologies for checking the interference between in-core instrumentation (ICI) guide tubes for routing of ICI guide tubes in the reactor coolant system of typical Pressurized Water Reactor under cold and normal operation (NOP) conditions are presented. The closest points of ICI guide tubes under cold condition are calculated by using minimize technique and are used as data for NOP analysis. Movements of ICI guide tubes under NOP condition are performed by the commercial computer code, SUPERPIPE.

  • PDF

The Study of Checking Source Code Vulnerability on the assembly language level (어셈블리 언어 수준에서의 소스코드 보안취약점 점검방법에 관한 연구)

  • 박현미;이병권;박정현;이형봉
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.102-110
    • /
    • 2001
  • 대부분의 해킹 공격은 공격 대상 프로그램의 소스코드 보안취약점에 의해서 발생하지만 프로그램 개발시에 소스코드 보안성에 대해서는 고려되지 않았다. 이러한 문제점으로 인하여 해킹 공격의 근본적인 원인을 해결할 수 없었다. 본 논문에서는 취약점의 원인이 되는 코드를 컴파일시 생성된 어셈블리 코드 수준에서 탐지하는 방법을 제시하고자 한다. 취약한 코드를 컴파일러 수준에서 점검하는 것보다 어셈블리 코드 수준에서 점검하는 것은 어느 정도의 메모리 영역까지 점검할 수 있어 더 정확하다.

  • PDF

Dynamic Analysis based on AOP for Checking Security Vulnerability (보안 취약점 검사를 위한 AOP 기반의 동적 분석)

  • Seo, Kwang-Ik;Choi, Eun-Man
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.10
    • /
    • pp.773-778
    • /
    • 2010
  • OWASP announced most of vulnerabilities result from the data injection by user in 2010 after 2007. Because the contaminated input data is determined at runtime, those data should be checked dynamically. To analyze data and its flow at runtime, dynamic analysis method usually inserts instrument into source code. Intermediate code insertion makes it difficult to manage and extend the code so that the instrument code would be spreaded out according to increase of analysis coverage and volume of code under analysis. In addition, the coupling gets strong between instrument modules and target modules. Therefore developers will struggle against modify or extend the analysis code as instrument. To solve these problem, this paper defines vulnerabilities as a concern using AOP, and suggest the flexible and extensible analysis method to insertion and deletion without increase of coupling.

Detection of invalidated sanity checks caused by undefined behaviors (정의되지 않은 행동에 의한 안전성 검사 무효화 탐지 기법)

  • Lee, JongHyup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.215-219
    • /
    • 2014
  • C programming language has undefined behaviors, which cause unintended execution of a program. When a programmer adds sanity checks without caring about undefined behaviors, compilers may misunderstand and invalidate the sanity checks. Thus, we propose an automated system to detect invalidated sanity checks by marking sanity checks in source code and checking the marks in binary code.

Fatigue Characteristics of Precast Concrete Bridge Decks under Wheel Load Condition (윤하중조건에서의 프리캐스트 콘크리트 바닥판 피로특성)

  • Joo, Bong-Chul;Park, Hung-Seok;Kim, Young-Jin;Song, Jae-Joon
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2006.05a
    • /
    • pp.394-397
    • /
    • 2006
  • For checking fatigue safety and endurance of precast concrete deck and loop joint system in the steel plate girder composite bridge, the test composite bridge model was made for the fatigue experiment by the wheel load machine. The fatigue tests of 1,000,000 cycles were implemented according to wheel load condition of DB24 rear axle of Korea Highway Design Code. From the test results, the loop joint system for the precast deck has a sufficient flexural capacity. Although a little lower longitudinal continuity capacity is evaluated than general sound cast-in-place RC bridge deck, there is no problem about the safety. The overall fatigue level of safety defined by the code is satisfied.

  • PDF

Design of A Reed-Solomon Code Decoder for Compact Disc Player using Microprogramming Method (마이크로프로그래밍 방식을 이용한 CDP용 Reed-Solomon 부호의 복호기 설계)

  • 김태용;김재균
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.10
    • /
    • pp.1495-1507
    • /
    • 1993
  • In this paper, an implementation of RS (Reed-Solomon) code decoder for CDP (Compact Disc Player) using microprogramming method is presented. In this decoding strategy, the equations composed of Newton's identities are used for computing the coefficients of the error locator polynomial and for checking the number of erasures in C2(outer code). Also, in C2 decoding the values of erasures are computed from syndromes and the results of C1(inner code) decoding. We pulled up the error correctability by correcting 4 erasures or less. The decoder contains an arithmetic logic unit over GF(28) for error correcting and a decoding controller with programming ROM, and also microinstructions. Microinstructions are used for an implementation of a decoding algorithm for RS code. As a result, it can be easily modified for upgrade or other applications by changing the programming ROM only. The decoder is implemented by the Logic Level Modeling of Verilog HDL. In the decoder, each microinstruction has 14 bits( = 1 word), and the size of the programming ROM is 360 words. The number of the maximum clock-cycle for decoding both C1 and C2 is 424.

  • PDF