• Title/Summary/Keyword: Source Code Analysis

Search Result 440, Processing Time 0.026 seconds

Assessment of Estuary Reservoir Water Quality According to Upstream Pollutant Management Using Watershed-Reservoir Linkage Model (유역-호소 연계모형을 이용한 상류 오염원 관리에 따른 담수호 수질영향평가)

  • Kim, Seokhyeon;Hwang, Soonho;Kim, Sinae;Lee, Hyunji;Jun, Sang Min;Kang, Moon Seong
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.64 no.6
    • /
    • pp.1-12
    • /
    • 2022
  • Estuary reservoirs were artificial reservoir with seawalls built at the exit points of rivers. Although many water resources can be saved, it is difficult to manage due to the large influx of pollutants. To manage this, it is necessary to analyze watersheds and reservoirs through accurate modeling. Therefore, in this study, we linked the Hydrological Simulation Program-FORTRAN (HSPF), Environmental Fluid Dynamics Code (EFDC), and Water quality Analysis Simulation Program (WASP) models to simulate the hydrology and water quality of the watershed and the water level and quality of estuary lakes. As a result of applying the linked model in stream, R2 0.7 or more was satisfied for the watershed runoff except for one point. In addition, the water quality satisfies all within 15% of PBIAS. In reservoir, R2 0.72 was satisfied for water level and the water quality was within 15% of T-N and T-P. Through the modeling system, We applied upstream pollutant management scenarios to analyze changes in water quality in estuary reservoirs. Three pollution source management were applied as scenarios, the improvement of effluent water quality from the sewage treatment plant and the livestock waste treatment plant was effective in improving the quality of the reservoir water, while the artificial wetland had little effect. Water quality improvement was confirmed as a measure against upstream pollutants, but it was insufficient to achieve agricultural water quality, so additional reservoir management is required.

A Study on eGovFrame Security Analysis and Countermeasures (eGovFrame 보안 분석 및 대응 방안에 관한 연구)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.21 no.3
    • /
    • pp.181-188
    • /
    • 2023
  • The e-Government standard framework provides overall technologies such as reuse of common components for web environment development such as domestic government/public institutions, connection of standard modules, and resolution of dependencies. However, in a standardized development environment, there is a possibility of updating old versions according to core versions and leakage of personal and confidential information due to hacking or computer viruses. This study directly analyzes security vulnerabilities focusing on websites that operate eGovFrame in Korea. As a result of analyzing/classifying vulnerabilities at the internal programming language source code level, five items associated with representative security vulnerabilities could be extracted again. As a countermeasure against this, the security settings and functions through the 2 steps (1st and 2nd steps) and security policy will be explained. This study aims to improve the security function of the e-government framework and contribute to the vitalization of the service.

Management of Reliability and Delivery for Software Object Material (소프트웨어 목적물의 전달체계 분석과 신뢰성 검증)

  • Kim, Do-Hyeun;Lee, Kyu-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.51-57
    • /
    • 2019
  • On increasing illegal software copyright, the need for similarity analysis is now rising. The reliability of object material are becoming important when it's moving from developer to evaluation experts. Object material as a comparison data, is the important data to the evaluation expert which is delivered from agencies such as courts and police stations. The object material is submitted at first to the Copyright Commission and then delivered to the evaluation expert with safe. However, if the similarity result is not satisfied to the both side, they will claim to the reliability of the object material such as source code modification or revision etc. Software objects is produced in a file format and are recognized as being able to be modified. Therefore, the reliability to the object material is studied in various ways, and a forensic is proposed as one method. This study showed the suggestion to keep reliability of the object material through the actual evaluation cases.

Response Analysis of Data Acquired by Marine Loop Electromagnetic System Using Three-Dimensional Modeling Based on Integral Equation (적분방정식 기반의 3차원 모델링을 이용한 소형 루프형 해양 전자탐사 자료의 반응 분석)

  • Ko, Hwicheol;Park, In Hwa;Lee, Seong Kon
    • Geophysics and Geophysical Exploration
    • /
    • v.17 no.1
    • /
    • pp.21-27
    • /
    • 2014
  • We analyzed response patterns of test field data acquired with new small loop electromagnetic (EM) system using three-dimensional (3D) electromagnetic modeling code. The size and shape of a conductor was adopted as experimental parameters for EM modeling to understand influencing factors of the response patterns due to a metallic object on the seafloor. Obtaining the responses for four models of difference sizes and shapes through 3D EM modeling, we confirmed that the shape of the object have a more critical factor on the response pattern than size. We also calculated "ppm" values with respect to different altitudes of the sensor and source frequencies. The modeling results show that the consistency of sensor altitude is important and imaginary part of ppm response is more sensitive than real part. We also visualized the contour map of the real and imaginary part of ppm value as a function of frequency and altitude so that we can estimate proper altitude for source frequency band of our survey system. The results of this paper are anticipated to give proper parameters in survey construction for seafloor massive sulfide deposit.

A Study on the Effect of Containment Filtered Venting System to Off-site under Severe Accident (중대사고시 격납건물여과배기계통(CFVS)적용으로 인한 사고영향과 결과 고찰)

  • Jeon, Ju Young;Kwon, Tae-Eun;Lee, Jai-Ki
    • Journal of Radiation Protection and Research
    • /
    • v.40 no.4
    • /
    • pp.244-251
    • /
    • 2015
  • The containment filtered venting system reduces the range of the contamination area around the nuclear power plant by strengthening the integrity of the containment building. In this study, the probabilistic assessment code MACCS2 was used to assess the effect of the CFVS to off-site. The accident source term was selected from a Probabilistic Safety Analysis report of SHINKORI 1&2 Nuclear Power Plant. The three source term categories from 19 STC were chosen to evaluate the effective dose and thyroid dose of residents around the power plant and the dose with CFVS and without CFVS were compared. The dose was calculated according to the distance from the nuclear power plant, so the damage scale based on the distance that exceeds the IAEA criteria for effective dose (100 mSv per 7 days) and thyroid dose (50 mSv per 7 days) were compared. The effective dose reduction rates of the STC-3, STC-4, STC-6 were about 95-99% in the whole range (0~35 km), 96-98% for the thyroid dose. There are similar results between effective dose and thyroid dose. After applying the CFVS, the damage scale that exceeds the effective dose criteria was about 1 km (mean). Especially, the STC-4 damage scale was decreased from 26 km (mean) to 1.2 km (mean) significantly. The damage scale that exceed the thyroid dose criteria was decreased to 2~3 km (mean). The STC-4 damage scale was also decreased significantly as compared to STC-3, STC-6 in terms of effective dose.

SHIELDING ANALYSIS OF DUAL PURPOSE CASKS FOR SPENT NUCLEAR FUEL UNDER NORMAL STORAGE CONDITIONS

  • Ko, Jae-Hun;Park, Jea-Ho;Jung, In-Soo;Lee, Gang-Uk;Baeg, Chang-Yeal;Kim, Tae-Man
    • Nuclear Engineering and Technology
    • /
    • v.46 no.4
    • /
    • pp.547-556
    • /
    • 2014
  • Korea expects a shortage in storage capacity for spent fuels at reactor sites. Therefore, a need for more metal and/or concrete casks for storage systems is anticipated for either the reactor site or away from the reactor for interim storage. For the purpose of interim storage and transportation, a dual purpose metal cask that can load 21 spent fuel assemblies is being developed by Korea Radioactive Waste Management Corporation (KRMC) in Korea. At first the gamma and neutron flux for the design basis fuel were determined assuming in-core environment (the temperature, pressure, etc. of the moderator, boron, cladding, $UO_2$ pellets) in which the design basis fuel is loaded, as input data. The evaluation simulated burnup up to 45,000 MWD/MTU and decay during ten years of cooling using the SAS2H/OGIGEN-S module of the SCALE5.1 system. The results from the source term evaluation were used as input data for the final shielding evaluation utilizing the MCNP Code, which yielded the effective dose rate. The design of the cask is based on the safety requirements for normal storage conditions under 10 CFR Part 72. A radiation shielding analysis of the metal storage cask optimized for loading 21 design basis fuels was performed for two cases; one for a single cask and the other for a $2{\times}10$ cask array. For the single cask, dose rates at the external surface of the metal cask, 1m and 2m away from the cask surface, were evaluated. For the $2{\times}10$ cask array, dose rates at the center point of the array and at the center of the casks' height were evaluated. The results of the shielding analysis for the single cask show that dose rates were considerably higher at the lower side (from the bottom of the cask to the bottom of the neutron shielding) of the cask, at over 2mSv/hr at the external surface of the cask. However, this is not considered to be a significant issue since additional shielding will be installed at the storage facility. The shielding analysis results for the $2{\times}10$ cask array showed exponential decrease with distance off the sources. The controlled area boundary was calculated to be approximately 280m from the array, with a dose rate of 25mrem/yr. Actual dose rates within the controlled area boundary will be lower than 25mrem/yr, due to the decay of radioactivity of spent fuel in storage.

CNVDAT: A Copy Number Variation Detection and Analysis Tool for Next-generation Sequencing Data (CNVDAT : 차세대 시퀀싱 데이터를 위한 유전체 단위 반복 변이 검출 및 분석 도구)

  • Kang, Inho;Kong, Jinhwa;Shin, JaeMoon;Lee, UnJoo;Yoon, Jeehee
    • Journal of KIISE:Databases
    • /
    • v.41 no.4
    • /
    • pp.249-255
    • /
    • 2014
  • Copy number variations(CNVs) are a recently recognized class of human structural variations and are associated with a variety of human diseases, including cancer. To find important cancer genes, researchers identify novel CNVs in patients with a particular cancer and analyze large amounts of genomic and clinical data. We present a tool called CNVDAT which is able to detect CNVs from NGS data and systematically analyze the genomic and clinical data associated with variations. CNVDAT consists of two modules, CNV Detection Engine and Sequence Analyser. CNV Detection Engine extracts CNVs by using the multi-resolution system of scale-space filtering, enabling the detection of the types and the exact locations of CNVs of all sizes even when the coverage level of read data is low. Sequence Analyser is a user-friendly program to view and compare variation regions between tumor and matched normal samples. It also provides a complete analysis function of refGene and OMIM data and makes it possible to discover CNV-gene-phenotype relationships. CNVDAT source code is freely available from http://dblab.hallym.ac.kr/CNVDAT/.

Analysis of the Effectiveness of Emergency Response Measures during the Design Basis Accident of the Research Reactor 'HANARO' using MACCS2 Code (MACCS2 코드를 이용한 연구용원자로 '하나로' 설계기준사고시 비상대응조치 효과분석)

  • Lee, Goan-Yup;Kim, Jong-Su;Lee, Hae-Cho;Kim, Bong-Suk
    • Journal of Radiation Protection and Research
    • /
    • v.39 no.2
    • /
    • pp.109-117
    • /
    • 2014
  • Nuclear emergency planning is to plan sheltering, evacuation and iodine prophylaxis for the residents living in the area where the emergency plan is needed, the area is confirmed based on the dose assessment using the source-term through an accident analysis and the data measured from meteorological tower. In this study, the does change before and after protective measures was assessed stochastically based on the one year meteorological data in the condition of the maximum hypothetical accident which can be considered at the research reactor 'HANARO', and the optimized protective measures were derived based on the reference levels defined as a residual dose by ICRP 2007 recommendation which can be applied in a emergency exposure situation. The optimized protective measures for the HANARO in the maximum hypothetical accident were the evacuation to radius 300 m, the sheltering from 300 m to 800 m, the iodine prophylaxis only for the emergency workers under the protective measures for non emergency workers.

Analysis of Technology Association Rules Between CPC Codes of the 'Internet of Things(IoT)' Patent (CPC 코드 기반 사물인터넷(IoT) 특허의 기술 연관성 규칙 분석)

  • Shim, Jaeruen
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.5
    • /
    • pp.493-498
    • /
    • 2019
  • This study deals with the analysis of the technology association rules between CPC codes of the Internet of Things(IoT) patent, the core of the Fourth Industrial Revolution ICT-based technology. The association rules between CPC codes were extracted using R, an open source for data mining. To this end, we analyzed 369 of the 605 patents related to the Internet of Things filed with the Patent Office until July 2019, with a complex CPC code, up to the subclass-level. As a result of the technology association rules, CPC codes with high support were [H04W ${\rightarrow}$ H04L](18.2%), [H04L ${\rightarrow}$ H04W](18.2%), [G06Q ${\rightarrow}$ H04L](17.3%), [H04L ${\rightarrow}$ G06Q](17.3%), [H04W ${\rightarrow}$ G06Q](9.8%), [G06Q ${\rightarrow}$ H04W](9.8%), [G06F ${\rightarrow}$ H04L](7.9%), [H04L ${\rightarrow}$ G06F](7.9%), [G06F ${\rightarrow}$ G06Q](6.2%), [G06Q ${\rightarrow}$ G06F](6.2%). After analyzing the technology interconnection network, the core CPC codes related to technology association rules are G06Q and H04L. The results of this study can be used to predict future patent trends.

Cloning and Transcription Analysis of Sporulation Gene (spo5) in Schizosaccharomyces pombe (Schizosaccharomyces bombe 포자형성 유전자(spo5)의 Cloning 및 전사조절)

  • 김동주
    • The Korean Journal of Food And Nutrition
    • /
    • v.15 no.2
    • /
    • pp.112-118
    • /
    • 2002
  • Sporulation in the fission yeast Schizosaccharomyces pombe has been regarded as an important model of cellular development and differentiation. S. pombe cells proliferate by mitosis and binary fission on growth medium. Deprivation of nutrients especially nitrogen sources, causes the cessation of mitosis and initiates sexual reproduction by matting between two sexually compatible cell types. Meiosis is then followed in a diploid cell in the absence of nitrogen source. DNA fragment complemented with the mutations of sporulation gene was isolated from the S. pombe gene library constructed in the vector, pDB 248' and designated as pDB(spo5)1. We futher analyzed six recombinant plasmids, pDB(spo5)2, pDB(spo5)3, pDB(spo5)4, pDB(spo5)5, pDB (spo5)6, pDB(spo5)7 and found each of these plasmids is able to rescue the spo5-2, spo5-3, spo5-4, spo5-5, spo5-6, spo5-7 mutations, respectively. Mapping of the integrated plasmid into the homologous site of the S. pombe chromosomes demonstrated that pDB(spo5)1, and pDB(spu5)Rl contained the spo5 gene. Transcripts of spo5 gene were analyzed by Northern hybridization. Two transcripts of 3.2 kb and 2.5kb were detected with 5kb Hind Ⅲ fragment containing a part of the spo5 gene as a probe. The small mRNA(2.5kb) appeared only when a wild-type strain was cultured in the absence of nitrogen source in which condition the large mRNA (3.2kb) was produced constitutively. Appearance of a 2.5kb spo5-mRNA depends upon the function of the meil, mei2 and mei3 genes.