• Title/Summary/Keyword: CODE

Search Result 18,043, Processing Time 0.034 seconds

A Basic Study on Development of ISM Code Operation Evaluation Model Using AHP (AHP를 이용한 ISM Code 운영평가 모형 개발에 관한 기초적 연구)

  • 신철호;노창균
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.9 no.2
    • /
    • pp.47-52
    • /
    • 2003
  • This study conducted a basic study to develop ISM Code operation evaluation module, which is part of development of Safety Management System(ISM Code) Implementation supporting module. In particular, the significant of this study is that it established AHP operation evaluation analysis process, the design of questionnaire, and the hierarchical structure of operation evaluation model standard, focusing on the development of ISM Code operation evaluation module. Also, this study has its value in the point that it attempted to apply AHP scheme, which is part of the main decision­making in management science field, to develop operation evaluation module.

  • PDF

Discrimination and Comparison of Digital License for Copyright Management of Software Source Code and CRYPTEX Model (소프트웨어 소스 코드의 저작권 관리를 위한 디지털 라이센스의 비교와 분류 그리고 크립텍스 모델)

  • Cha, Byung-Rae;Jung, Young-Kee
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.1
    • /
    • pp.246-258
    • /
    • 2008
  • The software industry is so important to the 21C information society Not only the digital content control but the technology of software source code for the intellectual property is so much mean to international competition. On occurring disputation property of software source code, we have to prove the fact, there is a problem to discriminate the original software source code. In this paper, we make a study of the digital licence prototype for discriminate the original source code. Reserved words of software source code by parsing express to XML file that have hierarchical structure. Then, we can express node pattern and architecture pattern of software source code by tree structure form instead of complex software source code. And we make a simulation of discrimination possibility of digital license and propose CRYPTEX model.

A Transformation from POSIX Based Source Code to OSEK/VDX Source Code Based on API and OIL Translation (API 및 OIL 변환을 이용한 POSIX 기반 코드의 OSEK/VDX 코드로의 변환)

  • Song, Young-Ho;Lee, Tae-Yang;Lee, Jong-Deok;Moon, Chan-Woo;Jeong, Gu-Min;Ahn, Hyun-Sik
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.6
    • /
    • pp.559-565
    • /
    • 2010
  • In this paper, we present a transformation method of source code from a POSIX (Portable Operating System Interface) based source code into an OSEK/VDX (Offene Systeme und deren Schnittstellen fur die Elektronik in Kraftfahrzeugen/Vehicle Distributed eXecutive) source code. As the electronic parts of automobile systems increase, the use of embedded software in automobile systems is also growing. Accordingly, many electronic systems are designed in automobile system with OSEK/VDX. Otherwise, one of the major problems of embedded software would be portability to other OS's. To enhance the portability and interoperability of embedded software, we propose a source code transformation method from POSIX to OSEK/VDX based on API (Application Programming Interface) translation method. Considering the characteristics of the OSEK/VDX which uses OIL (OSEK/VDX Implementation Language) standard, transformation process is performed with source code transformation and OIL code generation. For the validity of the proposed method, the transformation experiment is given using Micro-C OS II and OSEK/VDX with XC167CI micro-controller.

A Real Code Genetic Algorithm for Optimum Design (실수형 Genetic-Algorithm에 의한 최적 설계)

  • 양영순;김기화
    • Computational Structural Engineering
    • /
    • v.8 no.2
    • /
    • pp.123-132
    • /
    • 1995
  • Genetic Algorithms(GA), which are based on the theory of natural evolution, have been evaluated highly for their robust performances. Traditional GA has mostly used binary code for representing design variable. The binary code GA has many difficulties to solve optimization problems with continuous design variables because of its large computer core memory size, inefficiency of its computing time, and its bad performance on local search. In this paper, a real code GA is proposed for dealing with the above problems. So, new crossover and mutation processes of GA are developed to use continuous design variables directly. The results of read code GA are compared with those of binary code GA for several single and multiple objective optimization problems. As a result of comparisons, it is found that the performance of the real code GA is better than that of the binary code GA, and concluded that the real code GA developed here can be used for the general optimization problem.

  • PDF

A Study on the Prescriptions of American Codes for Straw Bale Structures and the Legislation Direction of Korean Straw Bale Code (미국 짚단벽구조 법규 분석 및 국내의 법제화 방향 연구)

  • Kim, Jeong-Gyu
    • KIEAE Journal
    • /
    • v.9 no.2
    • /
    • pp.91-98
    • /
    • 2009
  • The purpose of this study is analyzing the prescriptions of American codes for straw bale structures and proposing the legislation direction of Korean building code. The process of this study is as follows: (1) To set up the legislation direction of straw bale code of Korea, this study investigated the current state and features of straw bale houses in Korea, and looked into the worldwide status of straw bale codes and permitting. (2) To provide basic data for the legislation of Korean straw bale code or guideline, this study analyzed American codes for straw bale structures like the Tucson/Pima County Arizona Building Code Appendix Chapter 72 - Straw-Bale Structures, California State Guidelines for Straw-Bale Structures, New Mexico Standards for Non-load Bearing Baled Straw Construction, Oregon State Residential Code Appendix M - Straw-Bale Structures and so on. The analysis items are the scope of rule application, material specifications, requirements for straw bale walls/foundations and construction requirements. (3) On the base of analysis of American straw bale codes, this study proposed the legislation process and direction of Korean straw bale code and guideline.

Separation of Kernel Space and User Space in Zephyr Kernel (Zephyr 커널에서 커널 공간과 사용자 공간의 분리 구현)

  • Kim, Eunyoung;Shin, Dongha
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.13 no.4
    • /
    • pp.187-194
    • /
    • 2018
  • The operating system for IoT should have a small memory footprint and provide low power state, real-time, multitasking, various network protocols, and security. Although the Zephyr kernel, an operating system for IoT, released by the Linux Foundation in February 2016, has these features but errors generated by the user code can generate fatal problems in the system because the Zephyr kernel adopts a single-space method that both the user code and kernel code execute in the same space. In this research, we propose a space separation method, which separates kernel space and user space, to solve this problem. The space separation that we propose consists of three modifications in Zephyr kernel. The first is the code separation that kernel code and user code execute in each space while using different stacks. The second is the kernel space protection that generates an exception by using the MPU (Memory Protection Unit) when the user code accesses the kernel space. The third is the SVC based system call that executes the system call using the SVC instruction that generates the exception. In this research, we implemented the space separation in Zephyr v1.8.0 and evaluated safety through abnormal execution of the user code. As the result, the kernel was not crashed by the errors generated by the user code and was normally executed.

Numerical Simulation of High-Velocity Oblique Impacts of Yawed Long Rod Projectile Against Thin-Plate (Yaw 를 가진 긴 관통자와 경사판재의 고속충돌 수치해석)

  • Yoo, Yo-Han
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.26 no.7
    • /
    • pp.1426-1437
    • /
    • 2002
  • Using the Lagrangian explicit time-integration finite element code NET3D which can treat three-dimensional high-velocity impact problems, oblique penetration processes of long rod projectile with yaw against thin plate are simulated. Through the comparison of simulation result with experimental result and other code's computational result, the adaptability and accuracy of NET3D is evaluated under the complex situation in which yaw angle and oblique angle exist simultaneously. Main research contents to be handled in this paper include the followings. First, the accuracy and efficiency estimation of NET3D code result obtained from the oblique penetration simulations of long rod projectile with yaw against thin plate. Second, the effect of increasing impact velocity. Third, the effect of initial yaw for the spaced-plate target. Residual velocities, residual lengths, angular velocities, and final deformed configurations obtained from the NET3D computations are compared with the experimental results and other code's computational results such as Eulerian code MESA and Lagrangian code EPIC. As a result of comparisons, it has been found that NET3D code is superior to EPIC code and MESA code in the prediction capability of residual velocity and residual length of penetrator. The key features obtained from the experiment can be successfully reproduced through NET3D simulations. Throughout the study, the applicability and accuracy of NET3D as a metallic armor system design tool is verified.

A Study on the Introduction of Maritime Security System(ISPS Code) (해상보안체제(ISPS Code)의 도입 방향에 관한 연구)

  • 노창균
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.9 no.1
    • /
    • pp.33-40
    • /
    • 2003
  • This paper is intended as an investigation of introduction of Maritime Security System. In the last few years, several articles have been devoted to the study of ISPS Code(International Code for the Security of Ships and of Port Facilities). The Diplomatic Conference on Maritime Security held in London in December 2002 adopted new provisions in the International Convention for the Safety of Life at Sea, 1974 and this ISPS Code to enhance maritime security. These new requirements form the international framework through which ships and port facilities can co-operate to detect and deter acts which threaten security in the maritime transport sector. Accordingly, the purpose of this paper is to suggest an introduction, if Maritime Security System and understanding of ISPS Code.

  • PDF

Bar-Code Shape UHF RFID Tag Antenna (바코드 모양의 UHF RFID 태그 안테나 설계)

  • Jeon, Byung-Don;Chung, You-Chung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.1
    • /
    • pp.131-134
    • /
    • 2012
  • A bar-code shape UHF RFID tag antenna is designed and fabricated with silver conductive ink. It can be recognize by both bar-code scanner and RFID reader. The bar-code shape is taken from a general box of a product, and the product code of the bar-code is used for the antenna design. The tag antenna is fabricated with silver conductive ink using a T-matching structure. The designed tag antenna is satisfied with bar-code system and RFID system simultaneously. The input reflection coefficient characteristics and the reading range pattern are measured. The peak reading range is about 111 cm, which is long enough.

Aerodynamic Simulation of Korea next generation high speed train using open source CFD code (오픈 소스 CFD 코드를 이용한 차세대 고속열차 공력 해석)

  • Kim, B.Y.;Gill, J.H.;Kwon, H.B.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2011.05a
    • /
    • pp.327-330
    • /
    • 2011
  • CFD simulation is widely used in various industries, universities and research centers. In Korea most of the researchers use foreign commercial S/W packages especially in industries. But commercial CFD packages have some problems as limit to source code and very high license foe. So from several years ago open source CFD code has been widely spread as an alternative. But in Korea there are a few users of open source code. Insufficiency of performance validation as for accuracy, robustness, convenience and parallel speed-up is important obstacles of open source code. So we tested some validation cases as to incompressible external aerodynamics and internal flaws and now are doing compressible flaws. As the first stage of compressible flow validation, we simulated Korea next generation high speed train(HEMU). It's running condition is 400km/hr and maximum Mach number reaches up to 0.4. With the high speed train we tested accuracy, robustness and parallel performance of open source CFD code OpenFOAM Because there isn't experimental data we compared results with widely used commercial code. When use $1^{st}$ order upwind scheme aerodynamic forces are very similar to commercial code. But using $2^{nd}$ order upwind scheme there was some discrepancy. The reason of the difference is not clear yet. Mesh manipulation, domain decomposition, post-processing and robustness are satisfactory. Paralle lperformance is similar to commercial code.

  • PDF