• Title/Summary/Keyword: Source Code Analysis

Search Result 440, Processing Time 0.034 seconds

Theoretical simulation on evolution of suspended sodium combustion aerosols characteristics in a closed chamber

  • Narayanam, Sujatha Pavan;Kumar, Amit;Pujala, Usha;Subramanian, V.;Srinivas, C.V.;Venkatesan, R.;Athmalingam, S.;Venkatraman, B.
    • Nuclear Engineering and Technology
    • /
    • v.54 no.6
    • /
    • pp.2077-2083
    • /
    • 2022
  • In the unlikely event of core disruptive accident in sodium cooled fast reactors, the reactor containment building would be bottled up with sodium and fission product aerosols. The behavior of these aerosols is crucial to estimate the in-containment source term as a part of nuclear reactor safety analysis. In this work, the evolution of sodium aerosol characteristics (mass concentration and size) is simulated using HAARM-S code. The code is based on the method of moments to solve the integro-differential equation. The code is updated to FORTRAN-77 and run in Microsoft FORTRAN PowerStation 4.0 (on Desktop). The sodium aerosol characteristics simulated by HAARM-S code are compared with the measured values at Aerosol Test Facility. The maximum deviation between measured and simulated mass concentrations is 30% at initial period (up to 60 min) and around 50% in the later period. In addition, the influence of humidity on aerosol size growth for two different aerosol mass concentrations is studied. The measured and simulated growth factors of aerosol size (ratio of saturated size to initial size) are found to be matched at reasonable extent. Since sodium is highly reactive with atmospheric constituents, the aerosol growth factor depends on the hygroscopic growth, chemical transformation and density variations besides coagulation. Further, there is a scope for the improvement of the code to estimate the aerosol dynamics in confined environment.

Propagation of radiation source uncertainties in spent fuel cask shielding calculations

  • Ebiwonjumi, Bamidele;Mai, Nhan Nguyen Trong;Lee, Hyun Chul;Lee, Deokjung
    • Nuclear Engineering and Technology
    • /
    • v.54 no.8
    • /
    • pp.3073-3084
    • /
    • 2022
  • The propagation of radiation source uncertainties in spent nuclear fuel (SNF) cask shielding calculations is presented in this paper. The uncertainty propagation employs the depletion and source term outputs of the deterministic code STREAM as input to the transport simulation of the Monte Carlo (MC) codes MCS and MCNP6. The uncertainties of dose rate coming from two sources: nuclear data and modeling parameters, are quantified. The nuclear data uncertainties are obtained from the stochastic sampling of the cross-section covariance and perturbed fission product yields. Uncertainties induced by perturbed modeling parameters consider the design parameters and operating conditions. Uncertainties coming from the two sources result in perturbed depleted nuclide inventories and radiation source terms which are then propagated to the dose rate on the cask surface. The uncertainty analysis results show that the neutron and secondary photon dose have uncertainties which are dominated by the cross section and modeling parameters, while the fission yields have relatively insignificant effect. Besides, the primary photon dose is mostly influenced by the fission yield and modeling parameters, while the cross-section data have a relatively negligible effect. Moreover, the neutron, secondary photon, and primary photon dose can have uncertainties up to about 13%, 14%, and 6%, respectively.

Open Source Software Security Issues and Applying a Secure Coding Scheme (오픈 소스의 소프트웨어 보안 문제 및 시큐어 코딩 적용방안)

  • Kim, Byoungkuk
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.8
    • /
    • pp.487-491
    • /
    • 2017
  • Open source software allows the users to freely use, copy, distribute and modify source code without any particular limitations, and this offers the advantages of low entry cost, fast and flexible development, compatibility, reliability and safety. The emergence of many useful open source projects has the advantage of achieving high levels of output with lower costs and time commitment for software development. However, this also increases the risks caused by the security vulnerabilities of the used open source software. There is still no separate process to verify security in using open source software. In this paper, we analyze the security weakness in open source and propose a secure coding scheme in adopting open source, which is known to be highly reliable from a security point of view.

Structural Equation Modeling Using R: Mediation/Moderation Effect Analysis and Multiple-Group Analysis (R을 이용한 구조방정식모델링: 매개효과분석/조절효과분석 및 다중집단분석)

  • Kwahk, Kee-Young
    • Knowledge Management Research
    • /
    • v.20 no.2
    • /
    • pp.1-24
    • /
    • 2019
  • This tutorial introduces procedures and methods for performing structural equation modeling using R. To do this, we present advanced analysis methods based on structural equation model such as mediation effect analysis, moderation effect analysis, moderated mediation effect analysis, and multiple-group analysis with R program code using R lavaan package that supports structural equation modeling. R is flexible and scalable, unlike traditional commercial statistical packages. Therefore, new analytical techniques are likely to be implemented ahead of any other statistical package. From this point of view, R will be a very appropriate choice for applying new analytical techniques or advanced techniques that researchers need. Considering that various studies in the social sciences are applying structural equations modeling techniques and increasing interest in open source R, this tutorial is expected to be useful for researchers who are looking for alternatives to existing commercial statistical packages.

Comparison of Path Exploration and Model Checking Techniques for Checking Automotive API Call Safety (차량전장용 소프트웨어의 API 제약사항 위배여부 탐지를 위한 실행경로 탐색방법과 모델검증 방법의 비교)

  • Kim, Dongwoo;Choi, Yunja
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.12
    • /
    • pp.615-622
    • /
    • 2016
  • Automotive control software can be a source of critical safety issues when developers do not comply system constraints. However, a violation is difficult to identify in complicated source code if not supported by an automated verification tool. This paper introduces two possible approaches that check whether an automotive control software complies API call constraints to compare their performance and effectiveness. One method statically analyzes the source code and explores all possible execution paths, and the other utilizes a model checker to monitor constraint violations for a given set of constraint automata. We have implemented both approaches and performed a series of experiments showing that the approach with model-checking finds constraint violations more accurately and scales better.

Three-Dimensional Noise Analysis of an Axial-Flow Fan using Computational Aero-Acoustics (공력음향학을 이용한 축류홴의 삼차원 소음 해석)

  • Kim, Joo-Hyung;Kim, Jin-Hyuk;Shin, Seungyeol;Kim, Kwang-Yong;Lee, Seungbae
    • The KSFM Journal of Fluid Machinery
    • /
    • v.15 no.5
    • /
    • pp.48-53
    • /
    • 2012
  • This paper presents a systematic procedure for three-dimensional noise analysis of an axial-flow fan by using computational aero-acoustics based on Ffowcs Williams-Hawkings equation. Flow-fields of a basic fan model are simulated by solving three-dimensional, unsteady, Reynolds-averaged Navier-Stokes equations using the commercial code ANSYS CFX 11.0. Starting with steady flow results, unsteady flow analysis is performed to extract the fluctuating pressures in the time domain at specified local points on the blade surface of the axial flow fan. The perturbed density wave by rotating blades reaches at the observer position, which is simulated by an in-house noise prediction software based on Ffowcs Williams-Hawkings equation. The detailed far-field noise signatures from the axial-flow fan are analyzed in terms of source types, field characteristics, and interpolation schemes.

DESIGN OF LSDS FOR ISOTOPIC FISSILE ASSAY IN SPENT FUEL

  • Lee, Yongdeok;Park, Chang Je;Kim, Ho-Dong;Song, Kee Chan
    • Nuclear Engineering and Technology
    • /
    • v.45 no.7
    • /
    • pp.921-928
    • /
    • 2013
  • A future nuclear energy system is being developed at Korea Atomic Energy Research Institute (KAERI), the system involves a Sodium Fast Reactor (SFR) linked with the pyro-process. The pyro-process produces a source material to fabricate a SFR fuel rod. Therefore, an isotopic fissile content assay is very important for fuel rod safety and SFR economics. A new technology for an analysis of isotopic fissile content has been proposed using a lead slowing down spectrometer (LSDS). The new technology has several features for a fissile analysis from spent fuel: direct isotopic fissile assay, no background interference, and no requirement from burnup history information. Several calculations were done on the designed spectrometer geometry: detection sensitivity, neutron energy spectrum analysis, neutron fission characteristics, self shielding analysis, and neutron production mechanism. The spectrum was well organized even at low neutron energy and the threshold fission chamber was a proper choice to get prompt fast fission neutrons. The characteristic fission signature was obtained in slowing down neutron energy from each fissile isotope. Another application of LSDS is for an optimum design of the spent fuel storage, maximization of the burnup credit and provision of the burnup code correction factor. Additionally, an isotopic fissile content assay will contribute to an increase in transparency and credibility for the utilization of spent fuel nuclear material, as internationally demanded.

POSCA: A computer code for fission product plateout and circulating coolant activities within the primary circuit of a high temperature gas-cooled reactor

  • Tak, Nam-il;Lee, Jeong-Hun;Lee, Sung Nam;Jo, Chang Keun
    • Nuclear Engineering and Technology
    • /
    • v.52 no.9
    • /
    • pp.1974-1982
    • /
    • 2020
  • Numerical prediction of fission product plateout and circulating coolant activities under normal operating conditions is crucial in the design of a high temperature gas-cooled reactor (HTGR). The results are used for the maintenance and repair of the components as well as the safety analysis regarding early source terms under loss of coolant accident scenarios. In this work, a new computer code named POSCA (Plate-Out Surface and Circulating Activities) was developed based on a one-dimensional model to evaluate fission product plateout and circulating coolant activities within the primary circuit of a HTGR. The verification and validation of study for the POSCA code was done using available analytical results and two in-pile experiments (i.e., OGL-1 and VAMPYR-1). The results of the POSCA calculations show that POSCA is able to simulate plateout and circulating coolant activities in a HTGR with fast computation and reasonable accuracy.

Analogy-based Reuse of Object Model (아날로지를 기반으로 한 객체모델의 재사용)

  • Bae, Je-Min
    • The KIPS Transactions:PartD
    • /
    • v.14D no.6
    • /
    • pp.665-674
    • /
    • 2007
  • Code reuse in software reuse has several limitations such as difficulties of understanding and retrieval of the reuse code written by other developers. To overcome these problems, it should be possible to reuse the analysis/design information than source code itself. Therefore, this paper present analogical matching techniques for the reuse of object models and patterns. And this paper have suggested the object model and the design patterns as reusable components and the representation techniques to store them. Namely, the contents of the paper are as follows. Analogical matching functions to retrieve analogous components from reusable libraries. And the representation of reusable components to be stored in the library in order to support the analogical matching.

Maximum Stack Memory Usage Estimation Through Target Binary File Analysis in Microcontroller Environment (마이크로컨트롤러 환경에서 타깃 바이너리 파일 분석을 통한 최대 스택 메모리 사용량 예측 기법)

  • Choi, Kiho;Kim, Seongseop;Park, Daejin;Cho, Jeonghun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.3
    • /
    • pp.159-167
    • /
    • 2017
  • Software safety is a key issue in embedded system of automotive and aviation industries. Various software testing approaches have been proposed to achieve software safety like ISO26262 Part 6 in automotive environment. In spite of one of the classic and basic approaches, stack memory is hard to estimating exactly because of uncertainty of target code generated by compiler and complex nested interrupt. In this paper, we propose an approach of analyzing the maximum stack usage statically from target binary code rather than the source code that also allows nested interrupts for determining the exact stack memory size. In our approach, determining maximum stack usage is divided into three steps: data extraction from ELF file, construction of call graph, and consideration of nested interrupt configurations for determining required stack size from the ISR (Interrupt Service Routine). Experimental results of the estimation of the maximum stack usage shows proposed approach is helpful for optimizing stack memory size and checking the stability of the program in the embedded system that especially supports nested interrupts.