• Title/Summary/Keyword: HELP code

Search Result 301, Processing Time 0.024 seconds

An analysis of bolted opening structure and development of analysis expert system using ANSYS (원자력 주기기용 볼트 개폐구조물의 해석과 ANSYS를 이용한 전용 해석 프로그램의 개발)

  • Jeon, Seong-Mun;Seo, Ui-Gwon;Sim, Hyeon-Bo;Kim, Tae-Hwan;Lee, Bu-Yun
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.22 no.4
    • /
    • pp.731-742
    • /
    • 1998
  • Bolted opening structures is widely applied for class 1 machinery of nuclear plant with strict design requirement. As the shape of the bolted opening structure is non-axisymmetric due to the existence of stud bolts although it is almost axi-symmetric, 3D analysis is required to satisfy such kind of design requirements. Because as much as possible trial computations are need to get an optimal design condition in the limited period of basic design, an easy and fast analysis tool is useful in the design stage. In the paper, a transformation technique of non-axisymmetric problem into quasi-axisymmetric has been proposed based on the general purpose commercial code ANSYS. Both the pre-processor which incorporates the technique and prepares data and post-processor which prepares arranged results from the huge output of commercial code have been developed to help the design engineers.

A Study on the Roll Damping of Two-Dimensional Cylinders (2차원 주상체의 횡요감쇠에 대한 연구)

  • Yuck Rae H.;Lee Dong H.;Choi Hang S.;Jin Young M.;Bang Chang S.
    • Proceedings of the KSME Conference
    • /
    • 2002.08a
    • /
    • pp.197-200
    • /
    • 2002
  • In this paper, roll damping coefficients for a non-conventional cross section, which is herein named as 'step' model, are investigated numerically and experimentally. Experiments are extensively carried out to estimate the roll damping coefficients. Numerical estimations are also made with the help of numerical codes. For convenience, the roll damping is divided into wave-making component and viscous component. The wave-making component is determined using a potential code and the viscous component using a viscous flow code, in which the fluid domain is taken as unbounded. In order to validate the present approach, a typical cross section with bilge is considered and our results are compared with published data. The comparison shows a good agreement qualitatively. For the step model, numerical results are compared well with experimental data besides some quantitative discrepancies at a certain range of frequency. It is thought that the discrepancy might be caused by the ignorance of the free surface in viscous computations. It is found in the case of the step model that not only the viscous component but also the wave component increases considerably compared to the section with bilge.

  • PDF

AIT: A method for operating system kernel function call graph generation with a virtualization technique

  • Jiao, Longlong;Luo, Senlin;Liu, Wangtong;Pan, Limin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2084-2100
    • /
    • 2020
  • Operating system (OS) kernel function call graphs have been widely used in OS analysis and defense. However, most existing methods and tools for generating function call graphs are designed for application programs, and cannot be used for generating OS kernel function call graphs. This paper proposes a virtualization-based call graph generation method called Acquire in Trap (AIT). When target kernel functions are called, AIT dynamically initiates a system trap with the help of a virtualization technique. It then analyzes and records the calling relationships for trap handling by traversing the kernel stacks and the code space. Our experimental results show that the proposed method is feasible for both Linux and Windows OSs, including 32 and 64-bit versions, with high recall and precision rates. AIT is independent of the source code, compiler and OS kernel architecture, and is a universal method for generating OS kernel function call graphs.

Analysis on Spatial Sampling and Implementation for Primal Trees (Primal Tree의 공간 분할 샘플링 분석 및 구현)

  • Park, Taejung
    • Journal of Digital Contents Society
    • /
    • v.15 no.3
    • /
    • pp.347-355
    • /
    • 2014
  • The general octree structure is common for various applications including computer graphics, geometry information analysis and query. Unfortunately, the general octree approach causes duplicated sample data and discrepancy between sampling and representation positions when applied to sample continuous spatial information, for example, signed distance fields. To address these issues, some researchers introduced the dual octree. In this paper, the weakness of the dual octree approach will be illustrated by focusing on the fact that the dual octree cannot access some specific continuous zones asymptotically. This paper shows that the primal tree presented by Lefebvre and Hoppe can solve all the problems above. Also, this paper presents a three-dimensional primal tree traversal algorithm based the Morton codes which will help to parallelize the primal tree method.

Shielding Design of Shipping Cask for 4 PWR Spent Fuel Assemblies (PWR집합체 4개 장전용 수송용기의 차폐설계)

  • Kang, Hee-Yung;Yoon, Jung-Hyoun;Seo, Ki-Seog;Ro, Seung-Gy;Park, Byung-Il
    • Nuclear Engineering and Technology
    • /
    • v.20 no.1
    • /
    • pp.65-70
    • /
    • 1988
  • A Shielding analysis of the shipping cask designed conceptually, of which shielding material are lead and resin, for containing 4 PWR spent fuel assemblies, has been made with the help of a computer code, ANISN. The shielding materials being used in the cask have been selected and arranged to minimize cask weight while maintaining an overall shielding effectiveness. Radiation source terms have been calculated by means of ORIGIN-2 code under the assumptions of 38,000 MWD/MTU burnup and 3-year cooling time. A calculation of gamma-ray and neutron dose rates on the cask surface and 1m from the surface has been done. It is revealed that the total dose rates under the normal transport and hypothetical accident conditions meet the standards specified.

  • PDF

Survey on Phishing using Malicious Code in Internet Banking (인터넷 뱅킹에서 악성코드를 이용한 피싱에 관한 연구)

  • Kim, Ji Hyun;Lee, Dong-hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.753-756
    • /
    • 2012
  • The type of phishing changes rapidly and also threat model changes very fastly Accordingly, frauds develop new methods of attacks to avoid the counterparts. Recently, the type of phishing in internet banking is developing specifically. In this paper, to help encounter for it, we first review the meaning of phishing and the types of attacks in phishing in the second chapter,and in the third chapter, we will analyze phishing which is using malicious code in internet banking,and in the fourth chapter, we will describe the conclusion of this paper.

  • PDF

Research on the Investigation of ΔV (Delta-V) for the Quality Improvement of Korean In-Depth Accident Study (KIDAS) Database (한국형 실사고 심층조사 데이터베이스 질향상을 위한 차량속도(ΔV) 측정방법에 관한 연구)

  • Choo, Yeon Il;Lee, Kang Hyun;Kong, Joon Seok;Lee, Hee Young;Jeon, Joon Ho;Park, Jong Jin;Kim, Sang Chul
    • Journal of Auto-vehicle Safety Association
    • /
    • v.12 no.2
    • /
    • pp.40-46
    • /
    • 2020
  • Modern traffic accidents are a complex occurrence. Various indicators are needed to analyze traffic accidents. Countries that have been investigating traffic accidents for a long time accumulate various data to analyze traffic accidents. The Korean In-Depth Accident Study (KIDAS) database collected damaged vehicles and severity of injury caused by Collision Deformation Classification code (CDC code), Abbreviated Injury Scale (AIS), and Injury Severity Score (ISS). As a result of the investigation, data relating to the injuries of the occupants can be easily obtained, but it was difficult to analyze human severity based on the information of the damaged vehicle. This study suggests a method to measure the speed change at the time of an accident, which is one of the most important indicators in the vehicle crash database, to help advance KIDAS research.

An Android Birthmark based on API k-gram (API k-gram 기반의 안드로이드 버스마크)

  • Park, Heewan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.4
    • /
    • pp.177-180
    • /
    • 2013
  • A software birthmark means inherent characteristics that can be used to identify a program. Because the software birthmark is difficult to remove by simple program transformation, it can be used to detect code theft. In this paper, we propose a birthmark technique based on API k-gram of Android applications. Android SDK provides various libraries that help programmers to develop application easily. In order to use Android SDK, we have to use API method calls. The API call instructions are hard to be replaced or removed, so they can be a inherent characteristics of an application. To show the effectiveness of the proposed birthmark, we compared it with previous birthmarks and evaluated it with open source applications. From the experiments, we verified that the credibility and resilience of our birthmark is higher than previous birthmarks.

Implementation of functional expansion tally method and order selection strategy in Monte Carlo code RMC

  • Wang, Zhenyu;Liu, Shichang;She, Ding;Su, Yang;Chen, Yixue
    • Nuclear Engineering and Technology
    • /
    • v.53 no.2
    • /
    • pp.430-438
    • /
    • 2021
  • The spatial distribution of neutron flux or reaction rate was calculated by cell or mesh tally in traditional Monte Carlo simulation. However, either cell or mesh tally leads to the increase of memory consumption and simulation time. In this paper, the function expansion tally (FET) method was developed in Reactor Monte Carlo code RMC to solve this problem. The FET method was applied to the tallies of neutron flux distributions of uranium block and PWR fuel rod models. Legendre polynomials were used in the axial direction, while Zernike polynomials were used in the radial direction. The results of flux, calculation time and memory consumption of different expansion orders were investigated, and compared with the mesh tally. Results showed that the continuous distribution of flux can be obtained by FET method. The flux distributions were consistent with that of mesh tally, while the memory consumption and simulation time can be effectively reduced. Finally, the convergence analysis of coefficients of polynomials were performed, and the selection strategy of FET order was proposed based on the statistics uncertainty of the coefficients. The proposed method can help to determine the order of FET, which was meaningful for the efficiency and accuracy of FET method.

Study on Selftest Requirements in Cryptographic Module Validation Program with FIPS-OpenSSL Source Code Analysis (FIPS-OpenSSL 코드 분석을 통한 암호모듈 자가시험 보안요구사항 분석)

  • Seo, Seog Chung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.985-996
    • /
    • 2019
  • This paper analyzes the source code of FIPS-OpenSSL cryptographic module approved as FIPS cryptographic module in USA and shows how the selftest requirements are implemented as software cryptographic library with respect to pre-operational test and conditional tests. Even though FIPS-OpenSSL follows FIPS 140-2 standard, lots of security requirements are similar between FIPS 140-2 and Korean cryptographic module validation standards. Therefore, analysis from this paper contributes to help Korean cryptographic module vendors develop correct and secure selftest functions on their own cryptographic modules, which results in reducing the test period.