• 제목/요약/키워드: Source Code Analysis

검색결과 441건 처리시간 0.027초

고속으로 입수하는 물체의 입수 거동 해석 (Numerical Analysis of Water Entry Behavior of the High Speed)

  • 김영우;박원규;김찬수
    • 한국전산유체공학회:학술대회논문집
    • /
    • 한국전산유체공학회 1998년도 추계 학술대회논문집
    • /
    • pp.167-174
    • /
    • 1998
  • The numerical methodology for simulating water entry behaviors of the high-speed bodies has been developed. Since the present method assumed the impact occurs within a very short time interval, the viscous effects do not have enough time to play a significant role in the impact forces, that is, the flow around a water-entry object was assumed as an incompressible potential flow and is solved by the source panel method. The elements fully submerged into the water are routinely teated, but the elements intersected by the effective planar free surface are redefined and reorganized to be amenable to the source panel method. To validate the present code, it has been applied to the ogive model and compared with experimental data. Good agreement has been obtained. The water entry behavior of the bouncing phenomena from the free surface has been also simulated using the impact forces and two degree of freedom dynamic equation. Physically, acceptable results have been obtained.

  • PDF

고층 건물에 인접한 방음벽의 삽입손실에 관한 연구 (A Study of Barrier Insertion Loss Near a High Rise Building)

  • 진병주;김현실;김상렬
    • 소음진동
    • /
    • 제10권1호
    • /
    • pp.49-56
    • /
    • 2000
  • In this paper performance of the noise barrier which is 53 m long and 6m high, and is located between the high rise apartment and road, is studied by using experimental and analytic method. The insertion loss is measured by using the direct method in accordance with the ISO code, while theoretical prediction is based on Muradali and Fyfe's method (Applied Acoustics, Vol. 53, 49~75, 1998). In addition to the diffraction at the top of the barrier, the waves are reflected infinite times between the building and the barrier, which is equivalent to replacing the building by the infinite series of the image receiver points. In two-dimensional study, the prediction of the insertion loss results in significantly overestimated values compared with the measurement. However three-dimensional analysis shows reasonable agreements, where traffic noise is assumed as incoherent line source and the length of the source is larger than that of the barrier.

  • PDF

Shielding analyses supporting the Lithium loop design and safety assessments in IFMIF-DONES

  • Gediminas Stankunas ;Yuefeng Qiu ;Francesco Saverio Nitti ;Juan Carlos Marugan
    • Nuclear Engineering and Technology
    • /
    • 제55권4호
    • /
    • pp.1210-1217
    • /
    • 2023
  • The assessment of radiation fields in the lithium loop pipes and dump tank during the operation were performed for International Fusion Materials Irradiation Facility - DEMO-Oriented NEutron Source (IFMIF-DONES) in order to obtain the radiation dose-rate maps in the component surroundings. Variance reduction techniques such as weight window mesh (produced with the ADVANTG code) were applied to bring the statistical uncertainty down to a reasonable level. The biological dose was given in the study, and potential shielding optimization is suggested and more thoroughly evaluated. The MCNP Monte Carlo was used to simulate a gamma particle transport for radiation shielding purposes for the current Li Systems' design. In addition, the shielding efficiency was identified for the Impurity Control System components and the dump tank. The analysis reported in this paper takes into account the radiation decay source from and activated corrosion products (ACPs), which is created by d-Li interaction. As a consequence, the radiation (resulting from ACPs and Be-7) shielding calculations have been carried out for safety considerations.

A Python-based educational software tool for visualizing bioinformatics alignment algorithms

  • Elis Khatizah;Hee-Jo Nam;Hyun-Seok Park
    • Genomics & Informatics
    • /
    • 제21권1호
    • /
    • pp.15.1-15.4
    • /
    • 2023
  • Bioinformatics education can be defined as the teaching and learning of how to use software tools, along with mathematical and statistical analysis, to solve biological problems. Although many resources are available, most students still struggle to understand even the simplest sequence alignment algorithms. Applying visualizations to these topics benefits both lecturers and students. Unfortunately, educational software for visualizing step-by-step processes in the user experience of sequence alignment algorithms is rare. In this article, an educational visualization tool for biological sequence alignment is presented, and the source code is released in order to encourage the collaborative power of open-source software, with the expectation of further contributions from the community in the future. Two different modules are integrated to enable a student to investigate the characteristics of alignment algorithms.

RADIOLOGICAL CHARACTERISTICS OF DECOMMISSIONING WASTE FROM A CANDU REACTOR

  • Cho, Dong-Keun;Choi, Heui-Joo;Ahmed, Rizwan;Heo, Gyun-Young
    • Nuclear Engineering and Technology
    • /
    • 제43권6호
    • /
    • pp.583-592
    • /
    • 2011
  • The radiological characteristics for waste classification were assessed for neutron-activated decommissioning wastes from a CANDU reactor. The MCNP/ORIGEN2 code system was used for the source term analysis. The neutron flux and activation cross-section library for each structural component generated by MCNP simulation were used in the radionuclide buildup calculation in ORIGEN2. The specific activities of the relevant radionuclides in the activated metal waste were compared with the specified limits of the specific activities listed in the Korean standard and 10 CFR 61. The time-average full-core model of Wolsong Unit 1 was used as the neutron source for activation of in-core and ex-core structural components. The approximated levels of the neutron flux and cross-section, irradiated fuel composition, and a geometry simplification revealing good reliability in a previous study were used in the source term calculation as well. The results revealed the radioactivity, decay heat, hazard index, mass, and solid volume for the activated decommissioning waste to be $1.04{\times}10^{16}$ Bq, $2.09{\times}10^3$ W, $5.31{\times}10^{14}\;m^3$-water, $4.69{\times}10^5$ kg, and $7.38{\times}10^1\;m^3$, respectively. According to both Korean and US standards, the activated waste of the pressure tubes, calandria tubes, reactivity devices, and reactivity device supporters was greater than Class C, which should be disposed of in a deep geological disposal repository, whereas the side structural components were classified as low- and intermediate-level waste, which can be disposed of in a land disposal repository. Finally, this study confirmed that, regardless of the cooling time of the waste, 15% of the decommissioning waste cannot be disposed of in a land disposal repository. It is expected that the source terms and waste classification evaluated through this study can be widely used to establish a decommissioning/disposal strategy and fuel cycle analysis for CANDU reactors.

프로그램 소스코드 취약성 분석에 관한 연구 (A Study on the Analysis of Vulnerabilities in the Program Source Code)

  • 하경휘;최진우;우종우;김홍철;박상서
    • 한국사이버테러정보전학회:학술대회논문집
    • /
    • 한국사이버테러정보전학회 2004년도 제1회 춘계학술발표대회
    • /
    • pp.3-8
    • /
    • 2004
  • 최근의 침해 사례를 보면 공격자들이 순수 공격 기술이나 네트워크 구성의 결함을 이용하기 보다는 시스템 상에서 구동 중인 프로그램들, 특히 서비스를 위한 프로세스들이 개발 당시에 가지는 근본적인 취약성을 이용한다. 따라서 보안 관리자들은 공격에 이용되는 취약성을 보완하기 위해 많은 노력과 시간을 투자해야만 하며, 동시에 개발자들 또한 계속된 프로그램 수정 작업으로 인한 부담이 커지고 있는 실정이다. 이러한 문제점을 해결하기 위해서는 우선적으로 소스 코드 내에 잠재되어 있는 취약한 함수들에 대한 분석이 있어야 한다. 본 논문에서는 프로그램의 표준 C 함수에 관련된 취약성과 Win32 API 함수의 취약성에 대하여 분석하고, 그 결과를 기반으로 소스 코드의 취약성을 검사하기 위한 자동화 도구를 제안한다.

  • PDF

상용 및 오픈소스 CFD 코드를 이용한 EFD-CFD 워크샵 Case 3 해석 (CFD Analysis of EFD-CFD Workshop Case 3 using Commercial and Open Source CFD codes)

  • 김종록
    • 한국항공우주학회지
    • /
    • 제45권3호
    • /
    • pp.241-251
    • /
    • 2017
  • EFD-CFD 워크샵 중 Case3인 RAE Wing A 형상에 대해 전산유체역학 해석을 수행하였다. 해석자로 3개의 상용 CFD 해석 코드(Star-CCM+, Fluent, CFX)와 오픈 소스 CFD 코드(SU2)를 사용하였다. 격자는 상용 격자 생성 코드인 Pointwise를 이용하여 격자의 수에 따라 4가지를 생성하였다. 마하수 0.4, 0.8에서 는 받음각 2도, 마하수 0.9에서 받음각 1도에서 해석하였다. coarse격자부터 fine 격자까지는 압력계수 곡선과 수직력 계수는 비슷한 결과를 보였으나 항력 계수에서는 차이가 있었다. Star-CCM+과 Fluent의 해석에서 차분법의 차수가 높을수록 충격파의 위치를 앞으로 예측하였다. 수렴에 다다르는 계산시간은 Fluent, Star-CCM+, CFX의 순으로 나타났고 SU2는 이에 비해 수렴하는데 많은 시간이 들었다.

Sensitivity Analysis of Core Neutronic Parameters in Electron Accelerator-driven Subcritical Advanced Liquid Metal Reactor

  • Ebrahimkhani, Marziye;Hassanzadeh, Mostafa;Feghhi, Sayed Amier Hossian;Masti, Darush
    • Nuclear Engineering and Technology
    • /
    • 제48권1호
    • /
    • pp.55-63
    • /
    • 2016
  • Calculation of the core neutronic parameters is one of the key components in all nuclear reactors. In this research, the energy spectrum and spatial distribution of the neutron flux in a uranium target have been calculated. In addition, sensitivity of the core neutronic parameters in accelerator-driven subcritical advanced liquid metal reactors, such as electron beam energy ($E_e$) and source multiplication coefficient ($k_s$), has been investigated. A Monte Carlo code (MCNPX_2.6) has been used to calculate neutronic parameters such as effective multiplication coefficient ($k_{eff}$), net neutron multiplication (M), neutron yield ($Y_{n/e}$), energy constant gain ($G_0$), energy gain (G), importance of neutron source (${\varphi}^*$), axial and radial distributions of neutron flux, and power peaking factor ($P_{max}/P_{ave}$) in two axial and radial directions of the reactor core for four fuel loading patterns. According to the results, safety margin and accelerator current ($I_e$) have been decreased in the highest case of $k_s$, but G and ${\varphi}^*$ have increased by 88.9% and 21.6%, respectively. In addition, for LP1 loading pattern, with increasing $E_e$ from 100 MeV up to 1 GeV, $Y_{n/e}$ and G improved by 91.09% and 10.21%, and $I_e$ and $P_{acc}$ decreased by 91.05% and 10.57%, respectively. The results indicate that placement of the Np-Pu assemblies on the periphery allows for a consistent $k_{eff}$ because the Np-Pu assemblies experience less burn-up.

스마트폰 기반의 QR코드 해석기 성능분석 및 응용개발 (Application Development and Performance Analysis of Smartphone-based QR Code Interpreter)

  • 박찬정;현정석
    • 한국정보통신학회논문지
    • /
    • 제13권10호
    • /
    • pp.2242-2250
    • /
    • 2009
  • 최근 유비쿼터스 시대가 도래함에 따라 서비스 형태가 다양화되고 있다. 모바일 기술의 발전으로 휴대폰의 새로운 기능들이 대두되고 있고 모바일폰을 활용한 유비쿼터스 응용들이 활발히 개발 중이다. 또한 모바일폰과 관련된 여러 응용에서 이차원 바코드의 활용이 증가하고 있다. 이차원 바코드는 지금까지 이력관리를 위해서 주로 사용되다가 모바일폰에 탑재되면서 교육, 관광, 축제 등 홍보를 위한 수단으로 그 영역이 확장되었다. 본 논문에서는 이차원 바코드인 QR코드의 응용영역을 확장하여 오프라인과 온라인을 연동하는 스마트폰 기반의 QR코드 해석기를 개발한다. 또한 트리즈(TRIZ)를 이용하여 성능개선을 위한 요소를 찾아내고 해석기를 개선한다. 본 논문에서 개발한 QR코드 해석기와 오픈 소스 기반의 QR코드 해석기의 성능을 해석이 가능한 QR코드 이미지의 크기, 해석 속도 측면에서 비교하여 본 논문에서 제안한 해석기의 우수성을 입증한다. 마지막으로 QR코드를 이용한 응용으로 u-맵과 u-팜플렛을 소개한다.

VR 기기와 게임 시스템의 정보보증을 위한 VR 위협 분석 (VR Threat Analysis for Information Assurance of VR Device and Game System)

  • 강태운;김휘강
    • 정보보호학회논문지
    • /
    • 제28권2호
    • /
    • pp.437-447
    • /
    • 2018
  • 가상현실(Virtual Reality, VR)은 게임 업계의 새로운 표준이 되고 있다. PokeMon GO는 가상현실 기술을 적용한 대표적인 사례이다. PokeMon GO는 출시 후 다음날 미국에서 가장 많은 iOS App Store 다운로드 수를 기록하였다. 이는 가상현실의 위력을 보여주는 사례이다. 가상현실은 자이로스코프, 가속도, 촉감 센서 등으로 구성되며 사용자가 게임을 깊이 몰입할 수 있게 한다. 새로운 기술이 등장함에 따라 새롭고 다양한 위협요소가 생긴다. 그래서 우리는 가상현실 기술과 게임 시스템에 대한 보안 연구가 필요하다. 본 논문에서 가상현실 기기(Oculus Rift)와 게임 시스템(Quake)의 정보보증을 위해 위협 분석을 진행한다. STRIDE, attack library, attack tree 순서로 체계적으로 분석한다. DREAD를 통해 보안 대책을 제안한다. 또한 VCG(Visual Code Grepper) 도구를 사용하여 소스 코드의 논리 오류 및 취약한 함수를 파악하고 해결 방법을 제안한다.