• Title/Summary/Keyword: Source Code Analysis

Search Result 440, Processing Time 0.03 seconds

Study on Mechanism of Preventing Application Piracy on the Android Platform (안드로이드 어플리케이션 위변조 방지를 위한 방안 연구)

  • Lee, Kwang-Hyoung;Kim, Jae-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6849-6855
    • /
    • 2014
  • Recently, with the increasing use of smart phones, security issues, such as safety and reliability of the use of the Android application has become a topic to provide services in various forms. An Android application is performed using several important files in the form of an apk file. On the other hand, they may be subject to unauthorized use, such as the loss of rights and privileges due to the insertion of malicious source code of these apk files. This paper examines the Android environment to study ways to define the threats related to the unauthorized use of the application source code, and based on the results of the analysis, to prevent unauthorized use of the application source code. In this paper, a system is provided using a third body to prevent and detect applications that have been counterfeited or forged illegally and installed on Android devices. The application provides services to existing systems that are configured with only the service server that provides users and applications general, This paper proposes the use of a trusted third party for user registration and to verify the integrity of the application, add an institution, and provide a safe application.

ESTIMATION OF THE FISSION PRODUCTS, ACTINIDES AND TRITIUM OF HTR-10

  • Jeong, Hye-Dong;Chang, Soon-Heung
    • Nuclear Engineering and Technology
    • /
    • v.41 no.5
    • /
    • pp.729-738
    • /
    • 2009
  • Given the evolution of High-Temperature Gas-cooled Reactor(HTGR) designs, the source terms for licensing must be developed. There are three potential source terms: fission products, actinides in the fuel and tritium in the coolant. It is necessary to provide first an inventory of the source terms under normal operations. An analysis of source terms has yet to be performed for HTGRs. The previous code, which can estimate the inventory of the source terms for LWRs, cannot be used for HTGRs because the general data of a typical neutron cross-section and flux has not been developed. Thus, this paper uses a combination of the MCNP, ORIGEN, and MONTETEBURNS codes for an estimation of the source terms. A method in which the HTR-10 core is constructed using the unit lattice of a body-centered cubic is developed for core modeling. Based on this modeling method by MCNP, the generation of fission products, actinides and tritium with an increase in the burnup ratio is simulated. The model developed by MCNP appears feasible through a comparison with models developed in previous studies. Continuous fuel management is divided into five periods for the feeding and discharging of fuel pebbles. This discrete fuel management scheme is employed using the MONTEBURNS code. Finally, the work is investigated for 22 isotope fission products of nuclides, 22 actinides in the core, and tritium in the coolant. The activities are mainly distributed within the range of $10^{15}{\sim}10^{17}$ Bq in the equilibrium core of HTR-10. The results appear to be highly probable, and they would be informative when the spent fuel of HTGRs is taken into account. The tritium inventory in the primary coolant is also taken into account without a helium purification system. This article can lay a foundation for future work on analyses of source terms as a platform for safety assessment in HTGRs.

A Plagiarism Detection Technique for Source Codes Considering Data Structures (데이터 구조를 고려한 소스코드 표절 검사 기법)

  • Lee, Kihwa;Kim, Yeoneo;Woo, Gyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.6
    • /
    • pp.189-196
    • /
    • 2014
  • Though the plagiarism is illegal and should be avoided, it still occurs frequently. Particularly, the plagiarism of source codes is more frequently committed than others since it is much easier to copy them because of their digital nature. To prevent code plagiarism, there have been reported a variety of studies. However, previous studies for plagiarism detection techniques on source codes do not consider the data structures although a source code consists both of data structures and algorithms. In this paper, a plagiarism detection technique for source codes considering data structures is proposed. Specifically, the data structures of two source codes are represented as sets of trees and compared with each other using Hungarian Method. To show the usefulness of this technique, an experiment has been performed on 126 source codes submitted as homework results in an object-oriented programming course. When both the data structures and the algorithms of the source codes are considered, the precision and the F-measure score are improved 22.6% and 19.3%, respectively, than those of the case where only the algorithms are considered.

Development of a Holographic Interferometric Tomography System and Its Application to Three-Dimensional Natural Convection (홀로그래피 간섭 토모그래피 개발 및 3차원 자연대류 열전달에의 적용)

  • Lee, Soo-Man;Kang, Min-Gu;Cha, Dong-Jin;Joo, Won-Jong;Kang, Bo-Seon
    • Proceedings of the KSME Conference
    • /
    • 2003.04a
    • /
    • pp.1609-1614
    • /
    • 2003
  • In this study, a practical holographic interferometric tomography system, which is instantaneous and non-contact for measuring three dimensional flow field, was developed. The system consists of holographic recording/reconstruction system, fringe analysis code and computational tomography code and it is developed with Gill environment for general users. The developed system was applied to three-dimensional natural convection from a discrete flush-mounted circular heat source on the bottom of a cubic enclosure. The heat source was located at the off-center of the bottom plate so that three-dimensional temperature field can be achieved. A set of multi-directional holographic interferograms was recorded by employing a double-reference beam, double-exposure holographic technique. Optical pathlength data were extracted from the recorded interferometric data and finally three dimensional temperature field inside the cube was reconstructed.

  • PDF

A Full Utilization of Space-time Block Code in Cooperative Communications (협력 통신에서 시공간부호의 최대 사용 효율)

  • Tin, Luu Quoc;Kong, Hyung-Yun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.2A
    • /
    • pp.115-120
    • /
    • 2008
  • We propose a cooperative transmission scheme that uses Hurwitz-Radon space-time code for the relays which help the source to transmit signals to the destination, the full utilization here is that the destination utilizes the broadcast symbols from the source. We present the 2 transmit antennas case in detail because of its simplicity and high data rate. Analysis and simulations show that the proposed scheme achieves full diversity order of 3. The maximum likelihood receiver is also derived and the combining scheme is shown to be very simple.

A Method of Object Identification from Procedural Programs (절차적 프로그램으로부터의 객체 추출 방법론)

  • Jin, Yun-Suk;Ma, Pyeong-Su;Sin, Gyu-Sang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.10
    • /
    • pp.2693-2706
    • /
    • 1999
  • Reengineering to object-oriented system is needed to maintain the system and satisfy requirements of structure change. Target systems which should be reengineered to object-oriented system are difficult to change because these systems have no design document or their design document is inconsistent of source code. Using design document to identifying objects for these systems is improper. There are several researches which identify objects through procedural source code analysis. In this paper, we propose automatic object identification method based on clustering of VTFG(Variable-Type-Function Graph) which represents relations among variables, types, and functions. VTFG includes relations among variables, types, and functions that may be basis of objects, and weights of these relations. By clustering related variables, types, and functions using their weights, our method overcomes limit of existing researches which identify too big objects or objects excluding many functions. The method proposed in this paper minimizes user's interaction through automatic object identification and make it easy to reenginner procedural system to object-oriented system.

  • PDF

A Study on the Three-Dimensional Heat Flow Analysis in the Laser Welding for Deep Penetration (레이저 심 용입 용저에서 3차원 열유동 해석에 관한 연구)

  • 이규태;김재웅
    • Journal of Welding and Joining
    • /
    • v.18 no.3
    • /
    • pp.76-82
    • /
    • 2000
  • In this study, three-dimensional heat flow in laser beam welding for deep penetration was analyzed by using F.E.M common code, and then the results were compared with the experimental data. The models for analysis are full penetration welds and are made at three different laser powers (6, 9.9, 4.5 kW) with two different welding speeds (5.8mm/s, 5mm/s). The characteristics of thermal absorption by the workpiece during deep penetration laser welding can be represented by a combination of line heat source through the workpiece and distributed heat source at the top surface due to the plasma plume above the top surface. This gives an insight into the way in which the beam interacts with the material being welded. The analyses performed with the combined heat source models show comparatively good agreement between the experimental and calculated melt temperature isotherm, i.e, the fusion zone boundary. The results are used to explain the "nail head" appearance of fusion zone, which is quite common in laser beam welds.eam welds.

  • PDF

GOTHIC-3D APPLICABILITY TO HYDROGEN COMBUSTION ANALYSIS

  • LEE JUNG-JAE;LEE JIN-YONG;PARK GOON-CHERL;LEE BYUNG-CHUL;YOO HOJONG;KIM HYEONG-TAEK;OH SEUNG-JONG
    • Nuclear Engineering and Technology
    • /
    • v.37 no.3
    • /
    • pp.265-272
    • /
    • 2005
  • Severe accidents in nuclear power plants can cause hydrogen-generating chemical reactions, which create the danger of hydrogen combustion and thus threaten containment integrity. For containment analyses, a three-dimensional mechanistic code, GOTHIC-3D has been applied near source compartments to predict whether or not highly reactive gas mixtures can form during an accident with the hydrogen mitigation system working. To assess the code applicability to hydrogen combustion analysis, this paper presents the numerical calculation results of GOTHIC-3D for various hydrogen combustion experiments, including FLAME, LSVCTF, and SNU-2D. In this study, a technical base for the modeling oflarge- and small-scale facilities was introduced through sensitivity studies on cell size and bum modeling parameters. Use of a turbulent bum option of the eddy dissipation concept enabled scale-free applications. Lowering the bum parameter values for the flame thickness and the bum temperature limit resulted in a larger flame velocity. When applied to hydrogen combustion analysis, this study revealed that the GOTHIC-3D code is generally able to predict the combustion phenomena with its default bum modeling parameters for large-scale facilities. However, the code needs further modifications of its bum modeling parameters to be applied to either small-scale facilities or extremely fast transients.

Development of Analysis and Visualization Tool for Java Source Code Changes using Reverse Engineering Technique (역공학을 이용한 자바 소스 코드의 변화량 분석 및 시각화 도구 개발)

  • Kwon, Jin-Wook;Choi, Yun-Ja;Lee, Woo-Jin
    • The KIPS Transactions:PartD
    • /
    • v.19D no.1
    • /
    • pp.39-48
    • /
    • 2012
  • In order to quickly understand which changes of source codes have been made and to perform effective maintenance of a system, it is important to visualize the changed parts. Although there are many works for analyzing software changes, there are few works for visualizing both of the change types and change quantifications for Java based systems. In this paper, we propose a change analysis technique based on class diagram and provide a change visualization technique by using change quantification information. In order to check the structural changes in source codes, source codes are transformed to class diagrams by reverse engineering methods. On the class diagrams, the changes are analyzed and quantified by numbers. Based on the change quantification, the changes are visualized on the class diagram by color spectrum. By using visualization techniques, maintainers can easily recognize the code changes to reduce the cost and time of maintenance.

A Study on the Operating Characteristics by Heat Flow Analysis of HYPER Beam Window (HYPER 빔창의 열수력 해석에 의한 운전특성에 관한 연구)

  • Song, Min-Geun;Choi, Jin-Ho;Ju, Eun-Sun;Song, Tae-Young
    • Proceedings of the KSME Conference
    • /
    • 2001.06d
    • /
    • pp.915-920
    • /
    • 2001
  • A spent fuel problem has prevented the nuclear power from claiming to be a completely clean energy source. The nuclear transmutation technology to incinerate the long lived radioactive nuclides and produce energy during the incineration process is believed to be one or the best solutions. HYPER(Hybrid Power Extraction Reactor) is the accelerator driven transmutation system which is being developed by KAERI(Korea Atomic Energy Research Institute). Some major feature of HYPER have been developed and employed. On-power fueling concepts are employed to keep system power constant with minimum variation of accelerator power. A hollow cylinder-type metal fuel is designed for the on-line refueling concept. Lead-bismuth(Pb-Bi) is adopted as a coolant and Spallation target material. HYPER is a subcritical reactor which needs an external neutron source. 1GeV proton beam is irradiated to Lead-bismuth(Pb-Bi) target inside HYPER, and spallation neutrons are produced. When proton beams are irradiated, much heat is also deposited in the Pb-Bi target and beam window which separates Pb-Bi and accelerator vacuum. Therfore, an effective cooling is needed for HYPER target. In this paper, we performed the thermal-hydraulic analysis of HYPER target using FLUENT code, and also calculated thermal and mechanical stress of the beam window using ANSYS code.

  • PDF