• Title/Summary/Keyword: Code Library

Search Result 321, Processing Time 0.028 seconds

Analysis of the CREOLE experiment on the reactivity temperature coefficient of the UO2 light water moderated lattices using Monte Carlo transport calculations and ENDF/B-VII.1 nuclear data library

  • El Ouahdani, S.;Erradi, L.;Boukhal, H.;Chakir, E.;El Bardouni, T.;Boulaich, Y.;Ahmed, A.
    • Nuclear Engineering and Technology
    • /
    • v.52 no.6
    • /
    • pp.1120-1130
    • /
    • 2020
  • The CREOLE experiment performed In the EOLE critical facility located In the Nuclear Center of CADARACHE - CEA have allowed us to get interesting and complete experimental information on the temperature effects in the light water reactor lattices. To analyze these experiments with accuracy an elaborate calculation scheme using the Monte Carlo method implemented in the MCNP6.1 code and the ENDF/B-VII.1 cross section library has been developed. We have used the ENDF/B-VII.1 data provided with the MCNP6.1.1 version in ACE format and the Makxsf utility to handle the data in the specific temperatures not available in the MCNP6.1.1 original library. The main purpose of this analysis is the qualification of the ENDF/B-VII.1 nuclear data for the prediction of the Reactivity Temperature Coefficient while ensuring the ability of the MCNP6.1 system to model such a complex experiment as CREOLE. We have analyzed the case of UO2 lattice with 1166 ppm of boron in ordinary water moderator in specified temperatures. A detailed comparison of the calculated effective multiplication factors with the reference ones [1] in room temperature presented in this work shows a good agreement demonstrating the validation of our 3D calculation model. The discrepancies between calculations and the differential measurements of the Reactivity Temperature Coefficient for the analyzed configuration are relatively small: the maximum discrepancy doesn't exceed 1,1 pcm/℃. In addition to the analysis of direct differential measurements of the reactivity temperature coefficient performed in the poisoned UO2 lattice configuration, we have also analyzed integral measurements in UO2 clean lattice configuration using equivalency of the integral temperature reactivity worth with the driver core fuel reactivity worth and soluble boron reactivity worth. In this case both of the ENDF/B-VII.1 and JENDL.4 libraries were used in our analysis and the obtained results are very similar.

CFI Approach to Defend against GOT Overwrite Attacks (CFI(Control Flow Integrity) 적용을 통한 GOT(Global Offset Table) 변조 공격 방지 방안 연구)

  • Jeong, Seunghoon;Hwang, Jaejoon;Kwon, Hyukjin;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.179-190
    • /
    • 2020
  • In the Unix-like system environment, the GOT overwrite attack is one of the traditional control flow hijacking techniques for exploiting software privileges. Several techniques have been proposed to defend against the GOT overwrite attack, and among them, the Full Relro(Relocation Read only) technique, which blocks GOT overwrites at runtime by arranging the GOT section as read-only in the program startup, has been known as the most effective defense technique. However, it entails loading delay, which limits its application to a program sensitive to startup performance, and it is not currently applied to the library due to problems including a chain loading delay problem caused by nested library dependency. Also, many compilers, including LLVM, do not apply the Full Relro technique by default, so runtime programs are still vulnerable to GOT attacks. In this paper, we propose a GOT protection scheme using the Control Flow Integrity(CFI) technique, which is currently recognized as the most suitable technique for defense against code reuse attacks. We implemented this scheme based on LLVM and applied it to the binutils-gdb program group to evaluate security, performance and compatibility. The GOT protection scheme with CFI is difficult to bypass, fast, and compatible with existing library programs.

A Study on the Users Perception about the Future of Libraries in the era of the 4th Industrial Revolution: Comparing with Librarians (4차 산업혁명 시대 도서관의 미래상에 대한 이용자 인식조사 - 사서와의 비교를 통해 -)

  • Gang, Ju-Yeon;Park, Tae-Yeon;Kim, Geon;Lee, Jeong Min;Oh, Hyo-Jung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.29 no.1
    • /
    • pp.125-152
    • /
    • 2018
  • This study examined users' awareness to establish futurity of libraries and to propose strategies in the era of the $4^{th}$ Industrial Revolution. For this purpose, the awareness survey was conducted of users, and the survey consisted of questions about the awareness of the $4^{th}$ Industrial Revolution, the current state of using technologies and devices of the $4^{th}$ Industrial Revolution, and the futurity of libraries of the $4^{th}$ Industrial Revolution. The results are as follows: First, users were interested in the $4^{th}$ industrial Revolution, but they thought that new technologies are poorly adopted in the libraries. Second, users were most frequently using mobile phone, QR code, and Beacon. Especially, mobile phone was a most frequently used device in the libraries. However, users were not satisfied with technologies and devices provided by the libraries. Third, users expected the $4^{th}$ Industrial Revolution have a positive influence on future of libraries, but they were worried about losses of opportunities and jobs. Forth, users agreed with necessity of new technologies of the $4^{th}$ Industrial Revolution for libraries services. They wanted application of the technologies, expecially, in online services. Ultimately, this study suggested some meaningful insights and strategies through comparative analysis of the above findings and librarians' awareness survey results.

ICFGO : UI Concealing and Dummy Flow Insertion Method for Inter-Procedural Control Flow Graph Obfuscation (ICFGO : Inter-Procedural Control Flow Graph 난독화를 위한 UI 은닉 및 Dummy Flow 삽입 기법)

  • Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.493-501
    • /
    • 2020
  • For the obfuscation of Flow Analysis on the Android operating system, the size of the Flow Graph can be large enough to make analysis difficult. To this end, a library in the form of aar was implemented so that it could be inserted into the application in the form of an external library. The library is designed to have up to five child nodes from the entry point in the dummy code, and for each depth has 2n+1 numbers of methods from 100 to 900 for each node, so it consists of a total of 2,500 entry points. In addition, entry points consist of a total of 150 views in XML, each of which is connected via asynchronous interface. Thus, the process of creating a Inter-procedural Control Flow Graph has a maximum of 14,175E+11 additional cases. As a result of applying this to application, the Inter Procedure Control Flow Analysis too generates an average of 10,931 edges and 3,015 nodes with an average graph size increase of 36.64%. In addition, in the APK analyzing process showed that up to average 76.33MB of overhead, but only 0.88MB of execution overhead in the user's ART environment.

A study of collection evaluation using conspectus methodology (컨스펙터스방법을 이용한 장서평가연구)

  • 박진희
    • Journal of the Korean Society for information Management
    • /
    • v.15 no.2
    • /
    • pp.163-191
    • /
    • 1998
  • The im of the present study is to introduce and develop the concept and theory of conspectus for the first time in Korea, and to propose a new evaluation model for book collection by actually applying the developed methodology to the collection of a special library dedicated to Biblical Studies. Conspectus is a standardized and objective evaluation method that classifies the main collection according to the division, category, subject, and then gives each collection ots appropriate collection level code by analyzing the classified collection in terms of three different dimensions, which are Current Collection Level(CL), Acquisition Commitment Level(AC), and Collection Goal Level(GL). To evaluate the collection of the sample library, shelflist analysis, list checking, acquisition data in ordering process by their main subject, and survey of its users have been carried out, and all of their results ahve been indicated in terms of eleven collection level codes developed by WLN Conspectus. T e collection of sample library was evaluated as '3cW' for CL, '4W' for AC, and '4W' for GL when the Conspectus methodology was applied for evaluation. This study could be utilized as an collection evaluation model for theological libraries, and become a basis to bring about more active cooperative collection development among related libraries.

  • PDF

Research on text mining based malware analysis technology using string information (문자열 정보를 활용한 텍스트 마이닝 기반 악성코드 분석 기술 연구)

  • Ha, Ji-hee;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.45-55
    • /
    • 2020
  • Due to the development of information and communication technology, the number of new / variant malicious codes is increasing rapidly every year, and various types of malicious codes are spreading due to the development of Internet of things and cloud computing technology. In this paper, we propose a malware analysis method based on string information that can be used regardless of operating system environment and represents library call information related to malicious behavior. Attackers can easily create malware using existing code or by using automated authoring tools, and the generated malware operates in a similar way to existing malware. Since most of the strings that can be extracted from malicious code are composed of information closely related to malicious behavior, it is processed by weighting data features using text mining based method to extract them as effective features for malware analysis. Based on the processed data, a model is constructed using various machine learning algorithms to perform experiments on detection of malicious status and classification of malicious groups. Data has been compared and verified against all files used on Windows and Linux operating systems. The accuracy of malicious detection is about 93.5%, the accuracy of group classification is about 90%. The proposed technique has a wide range of applications because it is relatively simple, fast, and operating system independent as a single model because it is not necessary to build a model for each group when classifying malicious groups. In addition, since the string information is extracted through static analysis, it can be processed faster than the analysis method that directly executes the code.

An Open API Proxy Server System for Widget Services (위젯 서비스를 위한 오픈 API 프록시 서버 시스템)

  • Ahn, Byung-Hyun;Lee, Hyuk-Joon;Choi, Yong-Hoon;Chung, Young-Uk
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.9
    • /
    • pp.918-926
    • /
    • 2010
  • A widget is a small application running by the users' favorite services, so they are provided with web contents without explicitly visiting the web site. Although widgets can be easily implemented with Open APIs, only a few web sites provide them because of refactoring the structures of web resource to supply Open APIs to the widget developers. This paper presents an Open API Proxy Server System for widget services. The system consists of two components: an Open API Source Code Generator and an Open API Proxy Server. The Open API Source Code Generator provides a Graphical User Interface (GUI) for users to generate the Open APIs of user's choice and sends the Open API source code generation request to the Open API Proxy Server. The Open API Proxy Server using the HTML Table Processing Library receives the HTML web page from web site and extracts useful information from the target HTML table. The proxy server converts the extracted data into the corresponding XML document which becomes available through the Open API. We verify the operation of the proposed system through experiments with the HTML tables in the example web sites.

A Comparative Study on Effective One-Group Cross-Sections of ORIGEN and FISPACT to Calculate Nuclide Inventory for Decommissioning Nuclear Power Plant

  • Cha, Gilyong;Kim, Soonyoung;Lee, Minhye;Kim, Minchul;Kim, Hyunmin
    • Journal of Radiation Protection and Research
    • /
    • v.47 no.2
    • /
    • pp.99-106
    • /
    • 2022
  • Background: The radionuclide inventory calculation codes such as ORIGEN and FISPACT collapse neutron reaction libraries with energy spectra and generate an effective one-group cross-section. Since the nuclear cross-section data, energy group (g) structure, and other input details used by the two codes are different, there may be differences in each code's activation inventory calculation results. In this study, the calculation results of neutron-induced activation inventory using ORIGEN and FISPACT were compared and analyzed regarding radioactive waste classification and worker exposure during nuclear decommissioning. Materials and Methods: Two neutron spectra were used to obtain the comparison results: Watt fission spectrum and thermalized energy spectrum. The effective one-group cross-sections were generated for each type of energy group structure provided in ORIGEN and FISPACT. Then, the effective one-group cross-sections were analyzed by focusing on 59Ni, 63Ni, 94Nb, 60Co, 152Eu, and 154Eu, which are the main radionuclides of stainless steel, carbon steel, zircalloy, and concrete for decommissioning nuclear power plant (NPP). Results and Discussion: As a result of the analysis, 154Eu and 59Ni may be overestimated or underestimated depending on the code selection by up to 30%, because the cross-section library used for each code is different. When ORIGEN-44g, -49g, and -238g structures are selected, the differences of the calculation results of effective one-group cross-section according to group structure selection were less than 1% for the six nuclides applied in this study, and when FISPACT-69g, -172g, and -315g were applied, the difference was less than 1%, too. Conclusion: ORIGEN and FISPACT codes can be applied to activation calculations with their own built-in energy group structures for decommissioning NPP. Since the differences in calculation results may occur depending on the selection of codes and energy group structures, it is appropriate to properly select the energy group structure according to the accuracy required in the calculation and the characteristics of the problem.

Study on the Period of the Use of Datong-li in Korea

  • Lee, Ki-Won;Ahn, Young-Sook;Mihn, Byeong-Hee;Lim, Young-Ryan
    • Journal of Astronomy and Space Sciences
    • /
    • v.27 no.1
    • /
    • pp.55-68
    • /
    • 2010
  • It has been generally known that Datong-li (a Chinese calendar in the Ming dynasty) was first introduced into Korea in the nineteenth reign of King Gongmin (1370) of the Goryeo dynasty and lasted to the third reign of King Hyeojong (1652) of the Joseon dynasty. This understanding is based on the records of Goryeo-sa (History of the Goryeo dynasty) and of Seoungwan-ji (Official book of Seoungwan)/Jeungbomunheon-bigo (Explanatory Notes of Library Document). To verify the period of the use of Datong-li in Korea, we develop a Fortran code to calculate the calendar day by Datong-li and also investigate historical literatures and extant almanacs. As a result, we find the possibility that Datong-li had been in use since 1389 at least. However, we cannot confirm whether Datong-li was first enforced in 1370 or not. On the other hand, we confirm that Datong-li was used until 1653 and reintroduced during the period from 1667 to 1669. Also, we find that previous studies had some errors in the sexagenary cycle of the real first day of a month. We think that this study will contribute to understanding the calendrical history of the Joseon dynasty.

Parallelization of sheet forming analysis program using MPI (MPI를 이용한 판재성형해석 프로그램의 병렬화)

  • Kim, Eui-Joong;Suh, Yeong-Sung
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.22 no.1
    • /
    • pp.132-141
    • /
    • 1998
  • A parallel version of sheet forming analysis program was developed. This version is compatible with any parallel computers which support MPI that is one of the most recent and popular message passing libraries. For this purpose, SERI-SFA, a vector version which runs on Cray Y-MP C90, a sequential vector computer, was used as a source code. For the sake of the effectiveness of the work, the parallelization was focused on the selected part after checking the rank of CPU consumed from the exemplary calculation on Cray Y-MP C90. The subroutines associated with contact algorithm was selected as targe parts. For this work, MPI was used as a message passing library. For the performance verification, an oil pan and an S-rail forming simulation were carried out. The performance check was carried out by the kernel and total CPU time along with theoretical performance using Amdahl's Law. The results showed some performance improvement within the limit of the selective paralellization.