• Title/Summary/Keyword: Program Codes

Search Result 367, Processing Time 0.022 seconds

Reducing False Alarms in Schizophrenic Parallel Synchronizer Detection for Esterel (Esterel에서 동기장치 중복사용 문제 검출시 과잉 경보 줄이기)

  • Yun, Jeong-Han;Kim, Chul-Joo;Kim, Seong-Gun;Han, Tai-Sook
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.8
    • /
    • pp.647-652
    • /
    • 2010
  • Esterel is an imperative synchronous language well-adapted to control-intensive systems. When an Esterel program is translated to a circuit, the synchronizer of a parallel statement may be executed more than once in a clock; the synchronizer is called schizophrenic. Existing compilers cure the problems of schizophrenic parallel synchronizers using logic duplications. This paper proposes the conditions under which a synchronizer causes no problem in circuits when it is executed more than once in a clock. In addition we design a detection algorithm based on those conditions. Our algorithm detects schizophrenic parallel synchronizers that have to be duplicated in Esterel source codes so that compilers can save the size of synthesized circuits

Architecture and Development Activities of the Full Engine Simulation Program (엔진 통합설계/해석 시스템의 구성과 개발동향)

  • Jin, Sang-Wook;Kim, Kui-Soon;Ahn, Iee-Ki;Yang, Soo-Seok;Choi, Jeong-Yeol
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.11 no.4
    • /
    • pp.26-37
    • /
    • 2007
  • A virtual engine test based on "Numerical test cell" can extremely reduce the time and cost for the development of a hardware by coupling multidisciplinary analysis. This paper introduces the development activities of full engine simulation programs in U.S.A. and Europe, with the their related techniques(the engineering models, the simulation environment and high performance computing) based on the NPSS(Numerical Propulsion System Simulation). NASA Glenn research conte. leads the development efforts of NPSS by assembling the current codes and improving their Auctions. VIVACE(Value Improvement through a Virtual Aeronautical Collaborative Enterprise), a consortium of universities, research centers and companies in Europe, is developing the PROOSIS(PRopulsion Object Oriented Simulation Software). The capability for the domestic development is also estimated by surveying the current status.

Development of an Integrated Power Market Simulator for the Korean Electricity Market

  • Hur Jin;Kang Dong-Joo;Moon Young-Hwan
    • KIEE International Transactions on Power Engineering
    • /
    • v.5A no.4
    • /
    • pp.416-424
    • /
    • 2005
  • At present, the Korean electricity industry is undergoing restructuring and the Cost Based-generation Pool (CBP) market is being operated in preparation of a Two Way Bidding Pool (TWBP) market. In deregulated electricity industries, an integrated power market simulator is one of the tools that can be used by market participants and market operators analyzing market behaviors and studying market structures and market codes. In this regard, it is very important to develop an electricity market simulator that reflects market code providing a market operation mechanism. This paper presents the development of an integrated market simulator, called the Power Exchange Simulator (PEXSIM), which is designed to imitate the Korean electricity market considering the various features of the market operating mechanism such as uniform price and constrained on/off payment. The PEXSIM is developed in VB.NET and composed of five modules whose titles are M-SIM, P-SIM, O-SIM, T-SIM and G-SIM interfacing the Access database program. To verify the features and the performance of the PEXSIM, a small Two Way bidding market with a 12-bus system and a One Way bidding market for generator competition will be presented for the electricity market simulations using PEXSIM.

A Study on the Implementation of Automation Network for Power Utility using UCA and Fieldbus (UCA와 필드버스를 이용한 전력 설비 자동화 통신망 구축 방안 연구)

  • Choe, In-Ho;Hwang, In-Hwi;Hong, Seung-Ho
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.49 no.6
    • /
    • pp.287-298
    • /
    • 2000
  • The UCA is a standard-based approach to utility communications which provides for wide scale integration of functional areas including customer interface, distribution, transmission, power plant, control center, and corporate information systems. Field devices in the power facilities require real-time communications, and they must be interconnected into fieldbus. This study introduces a method of implementing gateway that interfaces UCA and fieldbus. In this study, PROFIBUS and FOUNDATION Fieldbus are selected as candidate fieldbus protocols. Protocol interface in the gateway can be accomplished by mapping objects and services of UCA and fieldbus. MOst of the UCAs CASM objects and services are directly mapped into those of the application and user layers of fieldbus. However, some CASM services are not supported in the application and user layers of fieldbus. This study presents the method of implementing those services. In order to show that the implementation of interface is possible, this study presents pseudo-codes of interface program that maps the objects and services of UCA and fieldbus.

  • PDF

Optimal CNF Encoding for Representing Adjacency in Boolean Cardinality Constraints (이진 기수 조건에서 인접성 표현을 위한 최적화된 CNF 변환)

  • Park, Sa-Choun;Kwon, Gi-Hwon
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.11
    • /
    • pp.661-670
    • /
    • 2008
  • In some applications of software engineering such as the verification of software model or embedded program, SAT solver is used. To practical use a SAT solver, a problem is encoded to a CNF formula, but because the formula has lower expressiveness than software models or source codes, optimal CNF encoding is required. In this paper, we propose optimal encoding techniques for the problem of "Selecting adjacent $k{\leq}n$ among n objects," Through experimental results we show the proposed constraint is efficient and correct to solve Japanese puzzle. As we know, this paper is the first study about CNF encoding for adjacency in BCC.

Automatic translation system for hangul's romanization Based on the World Wide Web (웹 기반하의 국어의 로마자 전사 표기 자동 변환 시스템)

  • 김홍섭
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.4
    • /
    • pp.108-114
    • /
    • 2002
  • After automatic translation system for hangul's romanization based on the World Wide Web converting korean-word, sentence, document to Transliteration letters by applying algorithm based phonological principles. even though a user do not know the basic principles of the usage of Korean-to-Romanization notations, It refers to corresponding character table that has been currently adopted the authority's standard proposition for Korean-to-Romanization notation rule concurrently, add to make possible to convert a machinized code as well. It provides font for toggling Korean-English mode, insert-edit mode by assigning ASCII codes and Unicode are hardly used to them. This program could be made in C++ progamming language and Unified Modeling Language to implement various font. font-expanding and condensing. alternative printing.

  • PDF

Resistance Model for Reliability Analysis of Existing Steel Girder Bridges (강거더 교량의 신뢰성해석을 위한 저항모델 개발)

  • Eom, Jun Sik
    • Journal of Applied Reliability
    • /
    • v.13 no.4
    • /
    • pp.241-252
    • /
    • 2013
  • Because of financial and safety concerns, there are needs for more accurate prediction of bridge behavior. Underestimation of the bridge load carrying capacity can have serious economic consequences, as deficient bridges must be repaired or rehabilitated. Therefore, the knowledge of the actual bridge behavior under live load may lead to a more realistic calculation of the load carrying capacity and eventually this may allow for more bridges to remain in service with or without minor repairs. The presented research is focused on the reliability evaluation of the actual load carrying capacity of existing bridges based on the field testing. Seventeen existing bridges were tested under truck load to confirm their adequacy of reliability. The actual response of existing bridge structures under live load is measured. Reliability analysis is performed on the selected representative bridges designed in accordance with AASHTO codes for bridge component (girder). Bridges are first evaluated based on the code specified values and design resistance. However, after the field testing program, it is possible to apply the experimental results into the bridge reliability evaluation procedures. Therefore, the actual response of bridge structures, including unintentional composite action, partial fixity of supports, and contribution of nonstructural members are considered in the bridge reliability evaluation. The girder distribution factors obtained from the tests are also applied in the reliability calculation. The results indicate that the reliability indices of selected bridges can be significantly increased by reducing uncertainties without sacrificing the safety of structures, by including the result of field measurement data into calculation.

Analytical Method to Determine the Dynamic Amplification Factor due to Hanger Cable Rupture of Suspension Bridges (현수교 행어 케이블 파단에 의한 동적확대계수의 해석적 결정법)

  • Na, Hyun Ho;Kim, Yuhee;Shin, Soobong
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.18 no.6
    • /
    • pp.301-308
    • /
    • 2014
  • A suspension bridge is a type of bridge in which the beam is suspended by load-bearing cables. There are two classifications: the self-anchored suspension bridge has the main cable anchored to the bridge girders, and the earth-anchored suspension bridge has the main cable anchored to a large anchorage. Although a suspension bridge is structurally safe, it is prone to be damaged by various actions such as hurricanes, tsunamis and terrorist incidents because its cables are exposed. If damage to a cable eventually leads to the cable rupture, the bridge may collapse. To avoid these accidents, studies on the dynamic behavior of cable bridges due to the cable rupture have been carried out. Design codes specify that the calculated DAF (dynamic amplification factor) should not exceed a certain value. However, it has been difficult to determine DAFs effectively from dynamic analysis, and thus no systematic approach has been suggested. The current study provides a guideline to determine DAFs reliably from the dynamic analysis results and summarizes the results by applying the method to an earth-anchored suspension bridge. In the study, DAFs were calculated at the location of four structural parts, girders, pylons, main cable and hangers, with variations in the rupture time.

Visualization Techniques for Massive Source Code (대용량 소스코드 시각화기법 연구)

  • Seo, Dong-Su
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.4
    • /
    • pp.63-70
    • /
    • 2015
  • Program source code is a set of complex syntactic information which are expressed in text forms, and contains complex logical structures. Structural and logical complexity inside source code become barriers in applying visualization techniques shown in traditional big-data approaches when the volume of source code become over ten-thousand lines of code. This paper suggests a procedure for making visualization of structural characteristics in source code. For this purpose, this paper defines internal data structures as well as inter-procedural relationships among functions. The paper also suggests a means of outlining the structural characteristics of source code by visualizing the source codes with network forms The result of the research work can be used as a means of controling and understanding the massive volume of source code.

Research on Registry Analysis based Malware Detection Method (Registry 분석을 통한 악성코드 감염여부 탐지 방법 연구)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.5
    • /
    • pp.37-43
    • /
    • 2017
  • A registry is a hierarchy database which is designed to store information necessary for operating system and application programs in Windows operating system, and it is involved in all activities such as booting, logging, service execution, application execution, and user behavior. Digital forensic is widely used. In recent years, malicious codes have penetrated into systems in a way that is not recognized by the user, and valuable information is leaked or stolen, causing financial damages. Therefore, this study proposes a method to detect malicious code by using a shareware application without using expensive digital forensic program, so as to analysis hacking methods and prevent hacking damage in advance.