• Title/Summary/Keyword: Source Code Analysis

Search Result 443, Processing Time 0.028 seconds

Comparative analysis of turbulence models in hydraulic jumps

  • Lobosco, Raquel J.;da Fonseca, David O.;Jannuzzia, Graziella M.F.;Costa, Necesio G.
    • Coupled systems mechanics
    • /
    • v.8 no.4
    • /
    • pp.339-350
    • /
    • 2019
  • A numerical simulation of the incompressible multiphase hydraulic jump flow was performed to compare the interface prediction through the use of the three RANS turbulence models: $k-{\varepsilon}$, $RNGk-{\varepsilon}$ and SST $k-{\omega}$. A three dimensional no submerged hydraulic jump and a two dimensional submerged hydraulic jump were modeled. Both the geometry and the mesh were created using the open source Gmsh code. The project's geometry consists of a rectangular channel with length and height differences between the two dimensional and three dimensional simulations. Uniform hexahedral cells were used for the mesh. Three refining meshes were constructed to allow to verify simulation convergence. The Volume of Fluid (abbr. VOF) method was used for treatment of the air-water surface. The turbulence models were evaluated in three distinct set up configurations to provide a greater accuracy in the flow representation. In the two-dimensional analysis of a submerged hydraulic jump simulation, the turbulence model RNG RNG $k-{\varepsilon}$ provided a better interface adjust with the experimental results than the model $k-{\varepsilon}$ and SST $k-{\omega}$. In the three-dimensional simulation of a no-submerged hydraulic jump the k-# showed better results than the SST $k-{\omega}$ and RNG $k-{\varepsilon}$ capturing the height and length of the ledge with a better fit with the experimental results.

Numerical Modeling for the Identification of Fouling Layer in Track Ballast Ground (자갈도상 지반에서의 파울링층 식별을 위한 수치해석연구)

  • Go, Gyu-Hyun;Lee, Sung-Jin
    • Journal of the Korean Geotechnical Society
    • /
    • v.37 no.9
    • /
    • pp.13-24
    • /
    • 2021
  • Recently, attempts have been made to detect fouling patterns in the ground using Ground Penetrating Radar (GPR) during the maintenance of gravel ballast railway tracks. However, dealing with GPR signal data obtained with a large amount of noise in a site where complex ground conditions are mixed, often depends on the experience of experts, and there are many difficulties in precise analysis. Therefore, in this study, a numerical modeling technique that can quantitatively simulate the GPR signal characteristics according to the degree of fouling of the gravel ballast material was proposed using python-based open-source code gprMax and RSA (Random sequential Absorption) algorithm. To confirm the accuracy of the simulation model, model tests were manufactured and the results were compared to each other. In addition, the identification of the fouling layer in the model test and analysis by various test conditions was evaluated and the results were analyzed.

Real-time Phishing Site Detection Method (피싱사이트 실시간 탐지 기법)

  • Sa, Joon-Ho;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.819-825
    • /
    • 2012
  • Nowadays many phishing sites contain HTTP links to victim web-site's contents such as images, bulletin board etc. to make the phishing sites look more real and similar to the victim web-site. We introduce a real-time phishing site detection system which makes use of the characteristic that the phishing sites' URLs flow into the victim web-site via the HTTP referer header field when the phishing site is visited. The detection system is designed to adopt an out-of-path network configuration to minimize effect on the running system, and a phishing site source code analysis technique to alert administrators in real-time when phishing site is detected. The detection system was installed on a company's web-site which had been targeted for phishing. As result, the detection system detected 40 phishing sites in 6 days of test period.

Verification Methods for Vulnerabilities of Airborne Object-Oriented Software (항공용 객체지향 소프트웨어에 대한 취약점 검증 방안)

  • Jang, Jeong-hoon;Kim, Sung-su;Lee, Ji-hyun
    • Journal of Aerospace System Engineering
    • /
    • v.16 no.2
    • /
    • pp.13-24
    • /
    • 2022
  • As the scale of airborne system software increases, the use of OOT (Object-Oriented Technology) is increasing for functional expansion, efficient development, and code reuse, but the verification method for airborne object-oriented software is conducted from the perspective of the existing procedure-oriented program. The purpose of this paper was to analyze the characteristics of OOT and the vulnerabilities derived from the functional characteristics of OOT, and present a verification method applicable to each software development process (Design, Coding and Testing) to ensure the functional safety integrity of aviation software to which OOT is applied. Additionally, we analyzed the meaning of the static analysis results among the step-by-step verification measures proposed by applying LDRA, a static analysis automation tool, to PX4, an open source used to implement flight control software.

Vulnerability analysis for AppLock Application (AppLock 정보 은닉 앱에 대한 취약점 분석)

  • Hong, Pyo-gil;Kim, Dohyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.845-853
    • /
    • 2022
  • As the memory capacity of smartphone increases, the type and amount of privacy stored in the smartphone is also increasing. but recently there is an increasing possibility that various personal information such as photos and videos of smartphones may be leaked due to malicious apps by malicious attackers or other people such as repair technicians. This paper analyzed and studied the security and vulnerability of these vault apps by analyzing the cryptography algorithm and data protection function. We analyzed 5.3.7(June 13, 2022) and 3.3.2(December 30, 2020) versions of AppLock, the most downloaded information-hidding apps registered with Google Play, and found various vulnerabilities. In the case of access control, there was a vulnerability in that values for encrypting patterns entered by users were hardcoded into plain text in the source code, and encrypted pattern values were stored in xml files. In addition, in the case of the vault function, there was a vulnerability in that the files and log files for storing in the vault were not encrypted.

Radiation Shielding Analysis on The Spent Fuel Storage Facility for the Extended Fuel Cycle (장주기(長週期) 핵연료(核燃料) 저장시설(貯藏施設)에서의 방사선차폐해석(放射線遮蔽解析))

  • Lee, Tae-Young;Ha, Chung-Woo;Yook, Chong-Chul
    • Journal of Radiation Protection and Research
    • /
    • v.9 no.2
    • /
    • pp.90-96
    • /
    • 1984
  • Estimated dose rates in spent fuel pool storage with the extended fuel cycle core management were reviewed and compared with design limit after calculation with the aid of DLC-23/CASK(22 n, 18 g) nuclear data and ANISN code. Radioactivity and gamma spectrum within spent fuel assemblies were calculated with ORIGEN code by extended fuel cycle model. In the calculation of dose rate, the fuel pool geometry was assumed to be infinite slab. Also, composition materials and radiation source within assemblies which are being stored in pool storage were assumed to be uniformly distributed throughout all the assemblies. As a result of culculation of dose rate from stored assemblies and waterborne radionuclides in pool water, the calculated dose rates appear to be lower than design basis limit under normal condition as well as abnormal condition.

  • PDF

Numerical Study on Roughness Effect for Axi-symmetry Submerged Body in High Reynolds Number (고 레이놀즈 수에서의 축대칭 몰수체의 거칠기에 대한 수치연구)

  • Joung, Tae-Hwan;Song, Hyung-Do;Yum, Jong-Gil;Song, Seongjin;Park, Sunho
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.2
    • /
    • pp.246-252
    • /
    • 2018
  • In this paper, the friction drag force of 3D submerged body is investigated by considering the surface roughness, the first grid height, and the Reynolds number using open CFD source code, OpenFOAM 4.0. A procedure for estimating drag components by CFD code is set up and suggested in this study. In the 3D submerged body, because of the form factor in the 3D computations, the friction resistance with the small roughness of $12{\mu}m$ obtains different result with the smooth wall. As the Reynolds number increased, the boundary layer becomes thinner and the fiction resistance tends to decrease. In the computations for the effect of y+, the friction resistance and wall shear stress are excessively predicted when the y+ value deviates from the log layer. This is presumably because the boundary layer becomes thicker and the turbulence energy is excessively predicted in the nose due to the increase in y+ value. As the roughness increases, the boundary layer becomes thicker and the turbulence kinetic energy on the surface increases. From this study, the drag estimation method, considering the roughness by numerical analysis for ships or offshore structures, can be provided by using the suggested the y+ value and surface roughness with wall function.

A Study on the Calculation of Optimal Compensation Capacity of Reactive Power for Grid Connection of Offshore Wind Farms (해상풍력단지 전력계통 연계를 위한 무효전력 최적 보상용량 계산에 관한 연구)

  • Seong-Min Han;Joo-Hyuk Park;Chang-Hyun Hwang;Chae-Joo Moon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.65-76
    • /
    • 2024
  • With the recent activation of the offshore wind power industry, there has been a development of power plants with a scale exceeding 400MW, comparable to traditional thermal power plants. Renewable energy, characterized by intermittency depending on the energy source, is a prominent feature of modern renewable power generation facilities, which are structured based on controllable inverter technology. As the integration of renewable energy sources into the grid expands, the grid codes for power system connection are progressively becoming more defined, leading to active discussions and evaluations in this area. In this paper, we propose a method for selecting optimal reactive power compensation capacity when multiple offshore wind farms are integrated and connected through a shared interconnection facility to comply with grid codes. Based on the requirements of the grid code, we analyze the reactive power compensation and excessive stability of the 400MW wind power generation site under development in the southwest sea of Jeonbuk. This analysis involves constructing a generation site database using PSS/E (Power System Simulation for Engineering), incorporating turbine layouts and cable data. The study calculates reactive power due to charging current in internal and external network cables and determines the reactive power compensation capacity at the interconnection point. Additionally, static and dynamic stability assessments are conducted by integrating with the power system database.

Data Cleaning and Integration of Multi-year Dietary Survey in the Korea National Health and Nutrition Examination Survey (KNHANES) using Database Normalization Theory (데이터베이스 정규화 이론을 이용한 국민건강영양조사 중 다년도 식이조사 자료 정제 및 통합)

  • Kwon, Namji;Suh, Jihye;Lee, Hunjoo
    • Journal of Environmental Health Sciences
    • /
    • v.43 no.4
    • /
    • pp.298-306
    • /
    • 2017
  • Objectives: Since 1998, the Korea National Health and Nutrition Examination Survey (KNHANES) has been conducted in order to investigate the health and nutritional status of Koreans. The food intake data of individuals in the KNHANES has also been utilized as source dataset for risk assessment of chemicals via food. To improve the reliability of intake estimation and prevent missing data for less-responded foods, the structure of integrated long-standing datasets is significant. However, it is difficult to merge multi-year survey datasets due to ineffective cleaning processes for handling extensive numbers of codes for each food item along with changes in dietary habits over time. Therefore, this study aims at 1) cleaning the process of abnormal data 2) generation of integrated long-standing raw data, and 3) contributing to the production of consistent dietary exposure factors. Methods: Codebooks, the guideline book, and raw intake data from KNHANES V and VI were used for analysis. The violation of the primary key constraint and the $1^{st}-3rd$ normal form in relational database theory were tested for the codebook and the structure of the raw data, respectively. Afterwards, the cleaning process was executed for the raw data by using these integrated codes. Results: Duplication of key records and abnormality in table structures were observed. However, after adjusting according to the suggested method above, the codes were corrected and integrated codes were newly created. Finally, we were able to clean the raw data provided by respondents to the KNHANES survey. Conclusion: The results of this study will contribute to the integration of the multi-year datasets and help improve the data production system by clarifying, testing, and verifying the primary key, integrity of the code, and primitive data structure according to the database normalization theory in the national health data.

A Study on The Reengineering Tool From conventional System into Design Pattern (기존 시스템에서 설계 패턴으로의 재공학 툴에 관한 연구)

  • Kim, Haeng-Kon;Cha, Jung-Eun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.9
    • /
    • pp.2334-2344
    • /
    • 1998
  • Appliciltion systems focusing class units, as component abstraction based on source code, has insufficient benefit of independency and reuse of elements. Only few effects are acquired, because it is only inclined implementation. We need design pattern to represent not only the problem abstraction but also information and relationship between system elements for generic solutions of specific domain Also, it is essential to software reverse engineering to catch the correct system through examming the cxisting system and utilizing the acquired knowledges as reusable resource. Namely, software reverse engineering for extracting the design pattern is very important because it improves the understand ability for system analysis and design through extracting the design structure of object-oriented system, and provides rich and high leIel reusabilitv through grasping the standard idioms and relationships between components. In this paper, we defined the extraction algorithm for design patterns with standardized, packaged and quantitative measlIIul thruugh applying reyerse engineering into existing ubject Olicnted system. And we designed the reengineering toul including reverse engineering for autumatic extractiun of design patterns ami reuse fur retrieval. editing and rebuilding oi design patterns. Also we applied the algorithms into Java applications.

  • PDF