• Title/Summary/Keyword: Multi-code

Search Result 1,214, Processing Time 0.03 seconds

AEGIS: AN ADVANCED LATTICE PHYSICS CODE FOR LIGHT WATER REACTOR ANALYSES

  • Yamamoto, Akio;Endo, Tomohiro;Tabuchi, Masato;Sugimura, Naoki;Ushio, Tadashi;Mori, Masaaki;Tatsumi, Masahiro;Ohoka, Yasunori
    • Nuclear Engineering and Technology
    • /
    • v.42 no.5
    • /
    • pp.500-519
    • /
    • 2010
  • AEGIS is a lattice physics code incorporating the latest advances in lattice physics computation, innovative calculation models and efficient numerical algorithms and is mainly used for light water reactor analyses. Though the primary objective of the AEGIS code is the preparation of a cross section set for SCOPE2 that is a three-dimensional pin-by-pin core analysis code, the AEGIS code can handle not only a fuel assembly but also multi-assemblies and a whole core geometry in two-dimensional geometry. The present paper summarizes the major calculation models and part of the verification/validation efforts related to the AEGIS code.

DEVELOPMENT AND PRELIMINARY ASSESSMENT OF A THREE-DIMENSIONAL THERMAL HYDRAULICS CODE, CUPID

  • Jeong, Jae-Jun;Yoon, Han-Young;Park, Ik-Kyu;Cho, Hyoung-Kyu;Lee, Hee-Dong
    • Nuclear Engineering and Technology
    • /
    • v.42 no.3
    • /
    • pp.279-296
    • /
    • 2010
  • For the analysis of transient two-phase flows in nuclear reactor components, a three-dimensional thermal hydraulics code, named CUPID, has been developed. The CUPID code adopts a two-fluid, three-field model for two-phase flows, and the governing equations were solved over unstructured grids, which are very useful for the analysis of flows in complicated geometries. To obtain numerical solutions, the semi-implicit numerical method for the REALP5 code was modified for an application to unstructured grids, and it has been further improved for enhanced accuracy and fast running. For the verification of the CUPID code, a set of conceptual problems and experiments were simulated. This paper presents the flow model, the numerical solution method, and the results of the preliminary assessment.

Code Generation and Optimization for the Flow-based Network Processor based on LLVM

  • Lee, SangHee;Lee, Hokyoon;Kim, Seon Wook;Heo, Hwanjo;Park, Jongdae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.42-45
    • /
    • 2012
  • A network processor (NP) is an application-specific instruction-set processor for fast and efficient packet processing. There are many issues in compiler's code generation and optimization due to NP's hardware constraints and special hardware support. In this paper, we describe in detail how to resolve the issues. Our compiler was developed on LLVM 3.0 and the NP target was our in-house network processor which consists of 32 64-bit RISC processors and supports multi-context with special hardware structures. Our compiler incurs only 9.36% code size overhead over hand-written code while satisfying QoS, and the generated code was tested on a real packet processing hardware, called S20 for code verification and performance evaluation.

A Study of Multiple Compression for Malicious Code Execution and Concealment (악성코드 실행과 은닉을 위한 다중 압축 연구)

  • Yi, Jeong-Hoon;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.299-302
    • /
    • 2010
  • Recently, the malicious code is not easily detectable in the vaccine for the virus, malicious code as a compressed file by modulation pattern is the tendency to delay. Among the many antivirus engines on the market a compressed file that can be modulated by malicious code, and test whether the pattern will need to know. We cover a multi-compressed files, malicious code modulated secreted by examining patterns of test engine is being detected is through a computer simulation. Analysis of secreted activities of malicious code and infect the host file tampering with the system driver files and registry, it gets registered is analyzed. this study will contribute hidden malicious code inspection and enhance vaccine efficacy in reducing the damage caused by malicious code.

  • PDF

Missing Children Policy in Korea: A Legislative Model for Korean Code Adam Alert (한국형 코드아담제도 도입을 위한 입법모델 연구)

  • Lee, Sung Yong;Kim, Hakkyong
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.12
    • /
    • pp.179-191
    • /
    • 2012
  • In 2003, the US Congress enacted the Code Adam Act of 2003. The Act was so-named in memory of six-year-old Adam Walsh, who was abducted from a Sears department store in Florida and was later found murdered in 1981. According to the Act, the designated authority for a public building must establish procedures for locating a child missing in a federal facility in the USA. In this context, the study basically aims to propose a legislative model for a missing children policy in Korean multi-use facilities, critically analyzing the US Code Adam Act. Unlike the Act, the proposed Korean bill requires all multi-use facilities beyond a certain size, including private buildings, to arrange a feasible missing child procedure on their own premises. The bill can impose an administrative fine on facilities which don't have the procedure in place, and further can make the list of the facilities known to the public. In order to encourage voluntary participation from the private sector, the bill finally suggests the Voluntary Certification Scheme through which participating business can take advantage of the certification logo commercially.

Implementation of a G,723.1 Annex A Using a High Performance DSP (고성능 DSP를 이용한 G.723.1 Annex A 구현)

  • 최용수;강태익
    • The Journal of the Acoustical Society of Korea
    • /
    • v.21 no.7
    • /
    • pp.648-655
    • /
    • 2002
  • This paper describes implementation of a multi-channel G.723.1 Annex A (G.723.1A) focused on code optimization using a high performance general purpose Digital Signal Processor (DSP), To implement a multi-channel G.723.1A functional complexities of the ITU-T G.723.1A fixed-point C-code are measures an analyzed. Then we sort and optimize C functions in complexity order. In parallel with optimization, we verify the bit-exactness of the optimized code using the ITU-T test vectors. Using only internal memory, the optimized code can perform full-duplex 17 channel processing. In addition, we further increase the number of available channels per DSP into 22 using fast codebook search algorithms, referred to as bit -compatible optimization.

A Golden Coded-Spatial Modulation MIMO System (골든 부호 기반의 공간 변조 다중 안테나 시스템)

  • Park, Myung Chul;Han, Dong Seog
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.10
    • /
    • pp.31-40
    • /
    • 2013
  • In this paper, the spatial modulation (SM) multi-input multi-output (MIMO) system is proposed for indoor wireless local area networks (WLANs) with improved spectral efficiency. SM is suitable for high speed WLANs with avoiding the inter channel interference (ICI). Only one transmit antenna is activated in SM at each symbol interval. Therefore, it fails to attain the maximum coding gain of MIMO. The space time block code (STBC)-SM MIMO system can attain the maximum diversity gain at the expense of spectral efficiency. The proposed Golden-SM MIMO system uses the Golden code to improve the coding gain and spectral efficiency at the same time. The Golden code is adapted for STBC-SM and it makes the new code book for transmission symbols. The performance of the proposed system is compared with the conventional systems with computer simulations.

A Method for Automatic Detection of Character Encoding of Multi Language Document File (다중 언어로 작성된 문서 파일에 적용된 문자 인코딩 자동 인식 기법)

  • Seo, Min Ji;Kim, Myung Ho
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.4
    • /
    • pp.170-177
    • /
    • 2016
  • Character encoding is a method for changing a document to a binary document file using the code table for storage in a computer. When people decode a binary document file in a computer to be read, they must know the code table applied to the file at the encoding stage in order to get the original document. Identifying the code table used for encoding the file is thus an essential part of decoding. In this paper, we propose a method for detecting the character code of the given binary document file automatically. The method uses many techniques to increase the detection rate, such as a character code range detection, escape character detection, character code characteristic detection, and commonly used word detection. The commonly used word detection method uses multiple word database, which means this method can achieve a much higher detection rate for multi-language files as compared with other methods. If the proportion of language is 20% less than in the document, the conventional method has about 50% encoding recognition. In the case of the proposed method, regardless of the proportion of language, there is up to 96% encoding recognition.