• Title/Summary/Keyword: Code distribution

Search Result 1,268, Processing Time 0.025 seconds

Determination of energy resolution for a NaI(Tl) detector modeled with FLUKA code

  • Demir, Nilgun;Kuluozturk, Zehra Nur
    • Nuclear Engineering and Technology
    • /
    • v.53 no.11
    • /
    • pp.3759-3763
    • /
    • 2021
  • In this study, 3" × 3" NaI(Tl) detector, which is widely used in gamma spectroscopy, was modeled with FLUKA code, and calculations required to determine the detector's energy resolution were reported. Photon beams with isotropic distribution with 59, 81, 302, 356, 511, 662, 835, 1173, 1275, and 1332 keV energy were used as radiation sources. The photon pulse height distribution of the NaI(Tl) without influence of its energy resolution obtained with FLUKA code has been converted into a real NaI(Tl) response function, using the necessary conversion process. The photon pulse height distribution simulated in the conversion process was analyzed using the ROOT data analysis framework. The statistical errors of the simulated data were found in the range of 0.2-1.1%. When the results, obtained with FLUKA and ROOT, are compared with the literature data, it is seen that the results are in good agreement with them. Thus, the applicability of this procedure has been demonstrated for the other energy values mentioned.

MONTE-CARLO SIMULATION OF THE DUST SCATTERING (먼지 산란의 몬테카를로 시뮬레이션)

  • Seon, Kwang-Il
    • Publications of The Korean Astronomical Society
    • /
    • v.24 no.1
    • /
    • pp.43-51
    • /
    • 2009
  • We present a Monte-Carlo simulation code, which solves the problem of dust-scattering in interstellar dust clouds with arbitrary light source distribution and dust density structure, and calculate the surface brightness distribution. The method is very flexible and can be applied to radiative transfer problems occurring not only in a single dust cloud, but also in extragalactic dust environment. We compare, for performance test, the result of Monte-Carlo simulation with the well-known analytic approximation for a spherically symmetric homogeneous cloud. We find that the Code approximation gives a very accurate result.

The multigroup library processing method for coupled neutron and photon heating calculation of fast reactor

  • Teng Zhang;Xubo Ma;Kui Hu;GuanQun Jia
    • Nuclear Engineering and Technology
    • /
    • v.56 no.4
    • /
    • pp.1204-1212
    • /
    • 2024
  • To accurately calculate the heating distribution of the fast reactor, a neutron-photon library in MATXS format named Knight-B7.1-1968n × 94γ was processed based on the ENDF/B-VII.1 library for ultrafine groups. The neutron cross-section processing code MGGC2.0 was used to generate few-group neutron cross sections in ISOTXS format. Additionally, the self-developed photon cross-section processing code NGAMMA was utilized to generate photon libraries for neutron-photon coupled heating calculations, including photo-atom cross sections for the ISOTXS format, prompt photon production cross sections, and kinetic energy release in materials (KERMA) factors for neutrons and photons, and the self-shielding effect from the capture and fission cross sections of neutron to photon have been taken into account when the photon source generated by neutron is calculated. The interface code GSORCAL was developed to generate the photon source distribution and interface with the DIF3D code to calculate the neutron-photon coupling heating distribution of the fast reactor core. The neutron-photon coupled heating calculation route was verified using the ZPPR-9 benchmark and the RBEC-M benchmark, and the results of the coupled heating calculations were analyzed in comparison with those obtained from the Monte Carlo code MCNP. The calculations show that the library was accurately processed, and the results of the fast reactor neutron-photon coupled heating calculations agree well with those obtained from MCNP.

Performance Evaluation of Non-Coherent Detection Based Cyclic Code-Shift Keying (비동기 검파 기반 순환 부호 편이 변조 방식의 성능 분석)

  • Baek, Seung-Min;Park, Su-Won;Chung, Young-Uk
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.6
    • /
    • pp.42-48
    • /
    • 2010
  • Joint Tactical Information Distribution System (JTIDS) uses cyclic code shift keying (CCSK) for baseband symbol modulation, in which 5-bit information is mapped to one of thirty two 32-chip sequences. It is a kind of direct sequence based spread spectrum communication. In this paper, the performance of non-coherent detection of CCSK using non-orthogonal 32-chip sequence is evaluated. And a 32-chip sequence with better performance is also proposed and compared with the conventional one.

Development of Galerkin Finite Element Method Three-dimensional Computational Code for the Multigroup Neutron Diffusion Equation with Unstructured Tetrahedron Elements

  • Hosseini, Seyed Abolfazl
    • Nuclear Engineering and Technology
    • /
    • v.48 no.1
    • /
    • pp.43-54
    • /
    • 2016
  • In the present paper, development of the three-dimensional (3D) computational code based on Galerkin finite element method (GFEM) for solving the multigroup forward/adjoint diffusion equation in both rectangular and hexagonal geometries is reported. Linear approximation of shape functions in the GFEM with unstructured tetrahedron elements is used in the calculation. Both criticality and fixed source calculations may be performed using the developed GFEM-3D computational code. An acceptable level of accuracy at a low computational cost is the main advantage of applying the unstructured tetrahedron elements. The unstructured tetrahedron elements generated with Gambit software are used in the GFEM-3D computational code through a developed interface. The forward/adjoint multiplication factor, forward/adjoint flux distribution, and power distribution in the reactor core are calculated using the power iteration method. Criticality calculations are benchmarked against the valid solution of the neutron diffusion equation for International Atomic Energy Agency (IAEA)-3D and Water-Water Energetic Reactor (VVER)-1000 reactor cores. In addition, validation of the calculations against the $P_1$ approximation of the transport theory is investigated in relation to the liquid metal fast breeder reactor benchmark problem. The neutron fixed source calculations are benchmarked through a comparison with the results obtained from similar computational codes. Finally, an analysis of the sensitivity of calculations to the number of elements is performed.

Implementation of the Container ISO Code Recognition System for Real-Time Processing (실시간 처리를 위한 컨테이너 ISO코드 인식시스템의 구현)

  • Choi Tae-Wan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1478-1489
    • /
    • 2006
  • This paper describes system to extract ISO codes in container image. A container ISO code recognition system for real-time processing is made of 5 core parts which are container ISO code detection and image acquisition, ISO code region extraction, individual character extraction, character recognition and database. Among them, the accuracy of ISO code extraction can affect significantly the accuracy of system recognition rate, and also the more exact extraction of ISO code is required in various weather and environment conditions. The proposed system produces binary of the ISO code's template lesions using an adaptive thresholding, extracts candidate regions containing distribution of ISO code, and recognizes ISO codes as detecting a final region through the verifications by using character distribution characteristics of ISO code among the extracted candidates. Experimental results reveal that ISO codes can be efficiently extracted by the proposed method.

Analysis of Sodium Spray Fire Using Gaussian Droplet Size Distribution (Gaussian 액적 크기 분포 함수를 이용한 분무형 화재 현상 해석)

  • Kim, B.H.;Hahn, D.H.;Suh, S.H.
    • Transactions of the Korean hydrogen and new energy society
    • /
    • v.15 no.1
    • /
    • pp.72-81
    • /
    • 2004
  • Study on the analysis of sodium spray fire using Gaussian drop size distribution, which redistributes a droplet spectrum with given mean diameter if its size classes with critical diameter(D>8mm) occur, was carried out. In this case, the oversized droplets were reduced to a stable diameter. Results calculated by the code using Gaussian drop size distribution were in better agreement with AI experimental results than those of NACOM and SPRAY code. The effect of variance on pressure in the test cell appeared greatly by introducing Gaussian function, which could represent various sodium droplet size distribution. The increase of the variance with mean droplet size resulted had an important effect upon the pressure in the test cell.

Automated Link Tracing for Classification of Malicious Websites in Malware Distribution Networks

  • Choi, Sang-Yong;Lim, Chang Gyoon;Kim, Yong-Min
    • Journal of Information Processing Systems
    • /
    • v.15 no.1
    • /
    • pp.100-115
    • /
    • 2019
  • Malicious code distribution on the Internet is one of the most critical Internet-based threats and distribution technology has evolved to bypass detection systems. As a new defense against the detection bypass technology of malicious attackers, this study proposes the automated tracing of malicious websites in a malware distribution network (MDN). The proposed technology extracts automated links and classifies websites into malicious and normal websites based on link structure. Even if attackers use a new distribution technology, website classification is possible as long as the connections are established through automated links. The use of a real web-browser and proxy server enables an adequate response to attackers' perception of analysis environments and evasion technology and prevents analysis environments from being infected by malicious code. The validity and accuracy of the proposed method for classification are verified using 20,000 links, 10,000 each from normal and malicious websites.

A BLOCK CRYPTOGRAPHIC ALGORITHM BASED ON A PRIME CODE (소수 코드를 이용한 블록 암호화 알고리즘)

  • 송문빈;오재곤;정연모
    • Proceedings of the IEEK Conference
    • /
    • 2000.11b
    • /
    • pp.136-139
    • /
    • 2000
  • In this paper, we propose a prime code and a new cryptographic algorithm for encryption and decryption as its application. The characteristics of prime numbers with irregular distribution and uniqueness are used to generate the prime code. Based on the prime code, an encryption algorithm for secret key is presented. Since the algorithm requires simpler operations than existing encryption such as DES, the burden for hardware implementation of the encryption and decryption process is alleviated.

  • PDF