• Title/Summary/Keyword: source static

Search Result 411, Processing Time 0.027 seconds

A Source Static Correction Algorithm in Crosswell Tomography (시추공 탄성파 자료의 송신기 정보정 알고리즘)

  • Ji Jun
    • Geophysics and Geophysical Exploration
    • /
    • v.5 no.3
    • /
    • pp.193-198
    • /
    • 2002
  • In crosswell ray tomography, the resultant velocity structure could be affected by source static, first-arrival-time picking errors, convergence to a local minimum due to an inappropriate initial velocity model and etc. In the paper, I propose an algorithm that automatically correct the souce static among these error-prone factors. The algorithm automatically corrects source static using the picking times' differences along the source direction. The application of the algorithm to real data produces a quite satisfactory result. Tile algorithm seems to be helpful for users to apply the souce static correction consistently and to acquire accurate velocity structure.

A study on the elimination of static electricity by use of beta radiation source (Beta 방사선원을 이용한 정전기 제거법에 대한 고찰)

  • 임용규
    • 전기의세계
    • /
    • v.14 no.3
    • /
    • pp.28-33
    • /
    • 1965
  • This experiment is based on "the feasible improvement studies for an eliminating device of the static electricity which applies the ionizing effect of beta radiation." In order to accomplish this object, the following problems were necessarily considered to investigate and to determine. The efficiency of the elimination of static electricity was determined by means of measuring the ion current between electrically charged plates with micro-ammeter. The effects of various factors, i.e., the distance between charged plate and radiation source, the activity of radiation source, the electric otential and the area of the charged plate, the shape of the source housing, the lining of backscattering material (Pb) on the source housing surface and blowing of ionized air, on the static electricity eliminating efficiency were studied. The beta radiation sources used in this experiment were S$^{35}$ and Sr$^{90}$ -Y$^{90}$ . It was revealed that ion current increased with source activity, the electric potential and area of the plates, the lead (Pb) lining on the surface of the source housing and the velocity of the ionized air blowing. As one could expect the S$^{35}$ was more effective to increase the ion current since it is known to be a higher specific ionization source than Sr$^{90}$ -Y$^{90}$ . The detailed result and performance of the eliminating device of the static electricity are described here.ibed here.

  • PDF

Control System Design for Self-Commutated Static Var Compensator (전압원인버터방식 송전용 무효전력보상기의 제어시스템 설계)

  • 한병문
    • Proceedings of the KIPE Conference
    • /
    • 1996.06a
    • /
    • pp.89-92
    • /
    • 1996
  • This paper describes a detailed simulation model of the static condenser (STATCON) to analyze the dynamic interaction with the ac transmission line. The static condenser was represented by a 12-pulse voltage-source inverter sharing an energy storage dc capacitor. The voltage-source inverter consists of two 6-pulse bridges modeled with ideal gate-turn-off switches. The control system for the static condenser was designed through a mathematical model deduced from the equivalent circuit. Simulation results show that the conceived model is very effective to analyze the dynamic interaction between the static condenser and the ac transmission system.

  • PDF

Priority Analysis for Software Functions Using Social Network Analysis and DEA(Data Envelopment Analysis) (사회연결망 분석과 자료포락분석 기법을 이용한 소프트웨어 함수 우선순위 분석 연구)

  • Huh, Sang Moo;Kim, Woo Je
    • Journal of Information Technology Services
    • /
    • v.17 no.3
    • /
    • pp.171-189
    • /
    • 2018
  • To remove software defects and improve performance of software, many developers perform code inspections and use static analysis tools. A code inspection is an activity that is performed manually to detect software defects in the developed source. However, there is no clear criterion which source codes are inspected. A static analysis tool can automatically detect software defects by analyzing the source codes without running the source codes. However, it has disadvantage that analyzes only the codes in the functions without analyzing the relations among source functions. The functions in the source codes are interconnected and formed a social network. Functions that occupy critical locations in a network can be important enough to affect the overall quality. Whereas, a static analysis tool merely suggests which functions were called several times. In this study, the core functions will be elicited by using social network analysis and DEA (Data Envelopment Analysis) for CUBRID open database sources. In addition, we will suggest clear criteria for selecting the target sources for code inspection and will suggest ways to find core functions to minimize defects and improve performance.

A Source Code Cross-site Scripting Vulnerability Detection Method

  • Mu Chen;Lu Chen;Zhipeng Shao;Zaojian Dai;Nige Li;Xingjie Huang;Qian Dang;Xinjian Zhao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1689-1705
    • /
    • 2023
  • To deal with the potential XSS vulnerabilities in the source code of the power communication network, an XSS vulnerability detection method combining the static analysis method with the dynamic testing method is proposed. The static analysis method aims to analyze the structure and content of the source code. We construct a set of feature expressions to match malignant content and set a "variable conversion" method to analyze the data flow of the code that implements interactive functions. The static analysis method explores the vulnerabilities existing in the source code structure and code content. Dynamic testing aims to simulate network attacks to reflect whether there are vulnerabilities in web pages. We construct many attack vectors and implemented the test in the Selenium tool. Due to the combination of the two analysis methods, XSS vulnerability discovery research could be conducted from two aspects: "white-box testing" and "black-box testing". Tests show that this method can effectively detect XSS vulnerabilities in the source code of the power communication network.

A Study on the Improvement of Source Code Static Analysis Using Machine Learning (기계학습을 이용한 소스코드 정적 분석 개선에 관한 연구)

  • Park, Yang-Hwan;Choi, Jin-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1131-1139
    • /
    • 2020
  • The static analysis of the source code is to find the remaining security weaknesses for a wide range of source codes. The static analysis tool is used to check the result, and the static analysis expert performs spying and false detection analysis on the result. In this process, the amount of analysis is large and the rate of false positives is high, so a lot of time and effort is required, and a method of efficient analysis is required. In addition, it is rare for experts to analyze only the source code of the line where the defect occurred when performing positive/false detection analysis. Depending on the type of defect, the surrounding source code is analyzed together and the final analysis result is delivered. In order to solve the difficulty of experts discriminating positive and false positives using these static analysis tools, this paper proposes a method of determining whether or not the security weakness found by the static analysis tools is a spy detection through artificial intelligence rather than an expert. In addition, the optimal size was confirmed through an experiment to see how the size of the training data (source code around the defects) used for such machine learning affects the performance. This result is expected to help the static analysis expert's job of classifying positive and false positives after static analysis.

Design and Implementation of Portable NMR Probe Magnet

  • Junxia, Gao;Yiming, Zhang;Jiashen, Tian
    • Journal of Magnetics
    • /
    • v.22 no.1
    • /
    • pp.14-22
    • /
    • 2017
  • The NMR's probe consists of the static magnetic field generator (magnetic source) and the RF coil. It is very strict for the homogeneity of the static magnetic field intensity of the magnetic source, so the cost of the magnetic source is more expensive in the entire nuclear magnetic resonance instrument. The magnetic source generally consists of electromagnet, permanent magnet and superconducting magnet. The permanent magnet basically needs not to spend on operation and maintenance and its cost of manufacture is much cheaper than the superconducting magnet. Therefore, the permanent magnet may be the only choice for the static magnetic field device if we want to use the magnetic resonance instrument as an analyzer for production by reducing price. A new probe magnet was developed on the basis of the permanent magnet ring in this paper to provide a technological way for reducing the manufacturing cost, weight and volume of the existing nuclear magnetic resonance instrument (including MRI) probe.

Static Var Compensator Using Current Source PWM Converter (전류형 PWN 콘버어터의 희한 정지형 무효전력 보상장치에 관한연구)

  • 김철우;권순재;김광태
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.39 no.11
    • /
    • pp.1183-1190
    • /
    • 1990
  • In this paper, instantaneous reactive power compensation algorithm is proposed and analyzed. The static Var generator developed in this paper is the current source PWM converter using hysteresis comparator method, which compensates the reactive power by detecting each instantaneous phase voltage and line current, independently. Some aspects on the static Var compensator-such as inductance, capacitance, hysteresis width, and switching frequency, etc.-are discussed. The dynamic performances are examined through digital simulation and experimental test.

  • PDF

Analysis of Detection Ability Impact of Clang Static Analysis Tool by Source Code Obfuscation Technique (소스 코드 난독화 기법에 의한 Clang 정적 분석 도구의 성능 영향 분석)

  • Jin, Hongjoo;Park, Moon Chan;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.605-615
    • /
    • 2018
  • Due to the rapid growth of the Internet of Things market, the use of the C/C++ language, which is the most widely used language in embedded systems, is also increasing. To improve the quality of code in the C/C++ language and reduce development costs, it is better to use static analysis, a software verification technique that can be performed in the first half of the software development life cycle. Many programs use static analysis to verify software safety and many static analysis tools are being used and studied. In this paper, we use Clang static analysis tool to check security weakness detection performance of verified test code. In addition, we compared the static analysis results of the test codes applied with the source obfuscation techniques, layout obfuscation, data obfuscation, and control flow obfuscation techniques, and the static analysis results of the original test codes, Analyze the detection ability impact of the Clang static analysis tool.

A Study on the Design of Security Metrics for Source Code (소스코드의 보안성 메트릭 설계에 관한 연구)

  • Seo, Dong-Su
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.147-155
    • /
    • 2010
  • It has been widely addressed that static analysis techniques can play important role in identifying potential security vulnerability reside in source code. This paper proposes the design and application of security metrics that use both vulnerability information extracted from the static analysis, and significant factors of information that software handles. The security metrics are useful for both developers and evaluators in that the metrics help them identity source code vulnerability in early stage of development. By effectively utilizing the security metrics, evaluators can check the level of source code security, and confirm the final code depending on the characteristics of the source code and the security level of information required.