• Title/Summary/Keyword: Code Insertion

Search Result 65, Processing Time 0.026 seconds

Analysis of High Burnup Fuel Behavior Under Rod Ejection Accident in the Westinghouse-Designed 950 MWe PWR

  • Chan Bock Lee;Byung Oh Cho
    • Nuclear Engineering and Technology
    • /
    • v.30 no.3
    • /
    • pp.273-286
    • /
    • 1998
  • As there has arisen a concern that failure of the high burnup fuel under the reactivity-insertion accident(RIA) may occur at the energy lower than the expected, fuel behavior under the rod ejection accident in a typical Westinghouse-designed 950 MWe PWR was analyzed by using the three dimensional nodal transient neutronics code, PANBOX2 and the transient fuel rod performance analysis code, FRAP-T6. Fuel failure criteria versus the burnup was conservatively derived taking into account available test data and the possible fuel failure mechanisms. The high burnup and longer cycle length fuel loading scheme of a peak rod turnup of 68 MWD/kgU was selected for the analysis. Except three dimensional core neutronics calculation, the analysis used the same core conditions and assumptions as the conventional zero dimensional analysis. Results of three dimensional analysis showed that the peak fuel enthalpy during the rod ejection accident is less than one third of that calculated by the conventional zero dimensional analysis methodology and the fraction of fuel failure in the core is less than 4 %. Therefore, it can be said that the current design limit of less than 10 percent fuel failure and maintaining the core coolable geometry would be adequately satisfied under the rod ejection accident, even though the conservative fuel failure criteria derived from the test data are applied.

  • PDF

Prolog Tailoring Technique on Epilog Tailored Procedures (에필로그 테일러된 프로시저를 위한 프롤로그 테일러링 기법)

  • Jhi, Yoon-Chan;Kim, Ki-Chang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.5
    • /
    • pp.1345-1356
    • /
    • 1998
  • Prolog tailoring technique, an optimization method to improve the execution speed of a procedure, is proposed in this paper. When a procedure is frequently and repeatedly called and the machine has a lot of callee-saved registers, optimizing prolog and epilog can become an important step of optimization. Epilg tailoring supported by IBM XL C Compiler has been known to improve procedure's execution speed by reducing register restore instructions on execution paths, but no algorithms for prolog tailoring has been proposed yet. The prolog generated by the prolog tailoring algorithm proposed in this paper executes considerably smaller number of register save instructions at run-time. This means the total number of instructions to be executed is decreased resulting in an improvement on the procedure's execution speed. To maintain the correctness of code, prolog code should not be inserted inside diamond structures of loop structures. This paper proposes a prolog tailoring technique which generates register save instructions at the best position in a control flow graph while not allowing the insertion of any prolog code inside diamond structures of loop structures.

  • PDF

Analysis of AMR Compressed Bit Stream for Insertion of Voice Data in QR Code (QR 코드에 음성 데이터 삽입을 위한 AMR 압축 비트열 분석)

  • Oh, Eun-ju;Cho, Hyun-ji;Jung, Hyeon-ah;Bae, Joung-eun;Yoo, Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.490-492
    • /
    • 2018
  • This paper presents an analysis of the AMR speech data as a basic work to study the technique of inputting and transmitting AMR voice data which is widely used in the public cell phone. AMR consists of HEADER and Speech Data, and it is transmitted in bit format and has 8 bit-rate modes in total. HEADER contains mode information of Speech Data, and the length of Speech Data differs depending on the mode. We chose the best mode which is best to input into QR code and analyzed that mode. It is a goal to show a higher compression ratio for voice data by the analysis and experiments. This analysis shows improvement in that it can transmit voice data more effectively.

  • PDF

Secure biometric information delivery scheme of implantable device using code-division multiplexing method (코드 분할 다중화 방식을 이용한 체내삽입장치의 안전한 생체 정보 전달 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.14 no.3
    • /
    • pp.235-241
    • /
    • 2016
  • Among recent issues emerging in the areas related to the society, health has received the most attention. In this paper, for a patient unable to do self-care because of worsened diseases, a biological information transfer method is proposed by which the disease information can be securely managed, by attaching an implantable device into the body. Our method object of the invention is to prevent a third party from illegally intercepting and interfering with the biological information attached to the insertion device in the body. In the proposed technique to improve the safety of the patient between the hospital and physician by assigning each code to the biometric information of the patient in order to prevent a third party tapping and interfering. In addition, our method is assigned a code necessary for encoding in advance to confirm the biological information between the patient and the hospital (doctor) in a manner dividing the bio-information code. In particular, the proposed technique makes a third party unable to illegally tap or interfere in, by previously generating a code used for encoding so that it can be stored in the database of the hospital, which not only decreased hospital care time to 6.9%, but also increased work efficiency rate up to 12.7%.

An Image Management System of Frame Unit on a Hand-held Device Environments (휴대장치 환경을 위한 프레임 단위의 영상 데이터 관리 시스템)

  • Choi, Jun-Hyeog;Yoon, Kyung-Bae;Han, Seung-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.29-36
    • /
    • 2008
  • This paper proposes algorithm for the system that can search for an image of a frame unit, and we implement it. A system already inserts in images after generating the cord that mechanical decoding and identification are possible. We are independent of an external noise in a frame unit, and a system to propose at these papers can search for an image recorded by search condition to include recording date, recording time, a recording place or filming course etc. This system is composed by image insertion wealth to insert data to an image to data image code generation wealth, a frame generating data image code you apply a code generation rule to be fixed in order to express to a price to have continued like data entry wealth, GPS locator values and direction price receiving an image signal, image decoding signals and an image search signal to include search condition, and to have continuity from users each of an image. Also, image decoding we decipher about the noise that was already added from the outsides in a telerecording process, a copy process or storage processes inserted in images by real time, and searching image information by search condition. Consequently we implement decoder, and provide the early system that you use, and we easily insert data code among images. and we can search. and maximization can get precision regarding an image search and use satisfaction as we use algorithm to propose at these papers.

  • PDF

Error Detection and Correction of Prefix Codes using Bidirectionally Decodable bit Streams (양방향 디코딩이 가능한 비트열을 이용한 앞자리 부호의 오차 검출과 정정)

  • Park, Sang-Ho
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.129-134
    • /
    • 2007
  • This paper proposes multiple burst error detection and correction scheme for transmission of Huffman coded string. We use bidirectionally decodable codes and introduce insertion of forbidden symbol to find errors. Additional bits are added to original bit streams to correct errors. The total file size id increased but it can detect errors and recover errors real time.

  • PDF

Cryptographic Traces for the Protection of Mobile Agent Execution (이동 에이전트 실행 보호를 위한 암호학적 추적 방안)

  • Shin, Weon;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.3
    • /
    • pp.71-78
    • /
    • 2001
  • In this paper, we describe the vulnerabilities against mobile agent and analyze existing schemes to cope with them. Also we propose a new scheme which protects the executed information by mobile agent and simultaneously traces the executions of mobile agent. The proposed scheme provides non-repudiation between participations for the executions of mobile agent, forward integrity against modification and protection against code insertion or deletion attack.

Analysis and Design of High Efficiency Feedforward Amplifier Using Distributed Element Negative Group Delay Circuit (분산 소자 형태의 마이너스 군지연 회로를 이용한 고효율 피드포워드 증폭기의 분석 및 설계)

  • Choi, Heung-Jae;Kim, Young-Gyu;Shim, Sung-Un;Jeong, Yong-Chae;Kim, Chul-Dong
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.6
    • /
    • pp.681-689
    • /
    • 2010
  • We will demonstrate a novel topology for the feedforward amplifier. This amplifier does not use a delay element thus providing an efficiency enhancement and a size reduction by employing a distributed element negative group delay circuit. The insertion loss of the delay element in the conventional feedforward amplifier seriously degrades the efficiency. Usually, a high power co-axial cable or a delay line filter is utilized for a low loss, but the insertion loss, cost and size of the delay element still acts as a bottleneck. The proposed negative group delay circuit removes the necessity of the delay element required for a broadband signal suppression loop. With the fabricated 2-stage distributed element negative group delay circuit with -9 ns of total group delay, a 0.2 dB of insertion loss, and a 30 MHz of bandwidth for a wideband code division multiple access downlink band, the feedforward amplifier with the proposed topology experimentally achieved a 19.4 % power added efficiency and a -53.2 dBc adjacent channel leakage ratio with a 44 dBm average output power.

Design and Implementation of a Dynamic Instrumentation Framework based on Light-weight Dynamic Binary Translation (경량 동적 코드 변환 기법을 이용한 동적 인스트루멘테이션 기법 설계 및 구현)

  • Kim, Jeehong;Lee, Dongwoo;Kim, Inhyeok;Eom, Young Ik
    • Journal of KIISE
    • /
    • v.41 no.11
    • /
    • pp.892-899
    • /
    • 2014
  • Dynamic binary instrumentation is a code insertion technique for debugging a program without scattering its execution flow, while the program is running. Most dynamic instrumentations are implemented using dynamic binary translation techniques. Existing studies translated program codes dynamically by parsing the machine code stream to intermediate representation (IR) and then applying compilation techniques for IRs. However, they have high overhead during translation, which is a major cause of difficulty in applying the dynamic binary translation technique to the program which requires high responsiveness. In this paper, we introduce a light-weight dynamic binary instrumentation framework based on a novel dynamic binary translation technique which has low overhead while translating the program code. In order to reduce the translation overhead, our approach adopts a tabular-based address translation and exploits a translation bypassing scheme, which stores the translated address of a frequently called library function in advance. It then accesses the translated address and executes function codes without code translation when calling the function. Our experiment results demonstrated that the proposed approach outperforms the prior dynamic binary translation techniques from 2% up to 65%.

Application case for phase III of UAM-LWR benchmark: Uncertainty propagation of thermal-hydraulic macroscopic parameters

  • Mesado, C.;Miro, R.;Verdu, G.
    • Nuclear Engineering and Technology
    • /
    • v.52 no.8
    • /
    • pp.1626-1637
    • /
    • 2020
  • This work covers an important point of the benchmark released by the expert group on Uncertainty Analysis in Modeling of Light Water Reactors. This ambitious benchmark aims to determine the uncertainty in light water reactors systems and processes in all stages of calculation, with emphasis on multi-physics (coupled) and multi-scale simulations. The Gesellschaft für Anlagen und Reaktorsicherheit methodology is used to propagate the thermal-hydraulic uncertainty of macroscopic parameters through TRACE5.0p3/PARCSv3.0 coupled code. The main innovative points achieved in this work are i) a new thermal-hydraulic model is developed with a highly-accurate 3D core discretization plus an iterative process is presented to adjust the 3D bypass flow, ii) a control rod insertion occurrence -which data is obtained from a real PWR test- is used as a transient simulation, iii) two approaches are used for the propagation process: maximum response where the uncertainty and sensitivity analysis is performed for the maximum absolute response and index dependent where the uncertainty and sensitivity analysis is performed at each time step, and iv) RESTING MATLAB code is developed to automate the model generation process and, then, propagate the thermal-hydraulic uncertainty. The input uncertainty information is found in related literature or, if not found, defined based on expert judgment. This paper, first, presents the Gesellschaft für Anlagen und Reaktorsicherheit methodology to propagate the uncertainty in thermal-hydraulic macroscopic parameters and, then, shows the results when the methodology is applied to a PWR reactor.