• Title/Summary/Keyword: Program Codes

Search Result 367, Processing Time 0.023 seconds

Application of Best Estimate Approach for Modelling of QUENCH-03 and QUENCH-06 Experiments

  • Kaliatka, Tadas;Kaliatka, Algirdas;Vileiniskis, Virginijus
    • Nuclear Engineering and Technology
    • /
    • v.48 no.2
    • /
    • pp.419-433
    • /
    • 2016
  • One of the important severe accident management measures in the Light Water Reactors is water injection to the reactor core. The related phenomena are investigated by performing experiments and computer simulations. One of the most widely known is the QUENCH test-program. A number of analyses on QUENCH tests have also been performed by different computer codes for code validation and improvements. Unfortunately, any deterministic computer simulation is not free from the uncertainties. To receive the realistic calculation results, the best estimate computer codes should be used for the calculation with combination of uncertainty and sensitivity analysis of calculation results. In this article, the QUENCH-03 and QUENCH-06 experiments are modelled using ASTEC and RELAP/SCDAPSIM codes. For the uncertainty and sensitivity analysis, SUSA3.5 and SUNSET tools were used. The article demonstrates that applying the best estimate approach, it is possible to develop basic QUENCH input deck and to develop the two sets of input parameters, covering maximal and minimal ranges of uncertainties. These allow simulating different (but with the same nature) tests, receiving calculation results with the evaluated range of uncertainties.

Development of a Database Program for the Management of Railroad Slopes (철도사면관리 프로그램 개발)

  • 송원경;한공창;천대성;신희순;신민호
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2000.11a
    • /
    • pp.151-158
    • /
    • 2000
  • A database program, named SLOPMAN, was developed to collect all the information on the slopes with potential hazard around railroad and to setup the effective management system. SLOPMAN is composed of three modules: data control, search and analysis. The program is able to store both text and image data and operated with tabs for the users' ability and convenience. Drop-down menu is equipped to reduce errors and the number of key strokes when inputting data. Searching data is made by codes automatically given to slopes or key words. In the analysis module, RMR and SMR values can be obtained to estimate the stability of slopes.

  • PDF

Study of matching user operation name and operation classification code (ICD-9-CM) (Through OCS program use facilitation at operating room) (사용자 수술명과 수술분류 code (ICD-9-CM) 일치율 향상에 관한 연구 (수술실 OCS program 사용 활성화를 통하여))

  • Choi, Hyang-Ha;Kim, Mi-Young;Kim, Do-Jin;Yu, Ji-Won;Chang, Jung-Hwa;Park, Su-Jung;Park, Jae-Sung
    • Quality Improvement in Health Care
    • /
    • v.12 no.1
    • /
    • pp.104-112
    • /
    • 2006
  • Background : The necessity of unify and standardize codes used at hospital has been emphasized since OCS (Order Communicating System) was adopted. Therefore, the purpose of this study were to standardize operation code by continuous training of the ICD-9-CM code that is used as standard code in OCS program at operating room. Method : In 400 operation data, operation code entered in OCS program at operating room was compared to operation name recorded in medical record. In addition, a matching rate between input data of operation code by medical record department and computing input data of operation code in 3,710 cases was compared for each department. User operation name and operation code were matched and major diagnosis by operation department and operation name were also matched. Results : User operation name was reflected in operation classification code in detail, and operation code entered on user was registered. Input rate and matching rate of operation code were gradually improved after improvement activity. In particular, a matching rate was high at ophthalmology where operation name is segmented. Plastic surgery and orthopedics with a lot of emergency operation and comprehensive operation name show low input rates. Conclusions : As the medical field makes progress in computerlization, awareness of information exchange and sharing becomes higher. Among codes to classified medical institution, codes related to surgical operation are all different by user of hospital and department. Computerlization and standardization is essential. And when efforts of standardization continue in alliance with individual hospital and institution, initiative of preparing medical policy data at a national level will be accelerated.

  • PDF

Research on Malicious code hidden website detection method through WhiteList-based Malicious code Behavior Analysis (WhiteList 기반의 악성코드 행위분석을 통한 악성코드 은닉 웹사이트 탐지 방안 연구)

  • Ha, Jung-Woo;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.61-75
    • /
    • 2011
  • Recently, there is significant increasing of massive attacks, which try to infect PCs that visit websites containing pre-implanted malicious code. When visiting the websites, these hidden malicious codes can gain monetary profit or can send various cyber attacks such as BOTNET for DDoS attacks, personal information theft and, etc. Also, this kind of malicious activities is continuously increasing, and their evasion techniques become professional and intellectual. So far, the current signature-based detection to detect websites, which contain malicious codes has a limitation to prevent internet users from being exposed to malicious codes. Since, it is impossible to detect with only blacklist when an attacker changes the string in the malicious codes proactively. In this paper, we propose a novel approach that can detect unknown malicious code, which is not well detected by a signature-based detection. Our method can detect new malicious codes even though the codes' signatures are not in the pattern database of Anti-Virus program. Moreover, our method can overcome various obfuscation techniques such as the frequent change of the included redirection URL in the malicious codes. Finally, we confirm that our proposed system shows better detection performance rather than MC-Finder, which adopts pattern matching, Google's crawling based malware site detection, and McAfee.

Developing a GUI-based Standalone Application of MATLAB Program for Windows

  • Jeong, Yun-Kyoung;Baek, Jang-Sun
    • Journal of the Korean Data and Information Science Society
    • /
    • v.19 no.2
    • /
    • pp.519-529
    • /
    • 2008
  • Many statisticians have been using object-oriented languages such as S-PLUS, R, and MATLAB to make programs for new data analysis methods. S-PLUS and R are slower in computation as well as in processing large data sets than MATLAB. Recently MATLAB is often used for developing statistical analysis programs owing to its fast computing ability and abundant mathematical algorithm modules. Sometimes it is hard for non-statistician to understand MATLAB programs which are developed by statisticians. Therefore Graphical User Interface(GUI) is needed to facilitate the usage of MATLAB codes. In this paper, we introduce how to develop a GUI for MATLAB codes which is executable on Windows with examples.

  • PDF

The Main Substance and Some Problems of 24 hours Advance Cargo Manifest Declaration Rule (선적 24시간전 적하목록전송규칙(24 Hours Rules)의 주요내용과 문제점)

  • Han, Sang-Hyun;Eom, Kwang-Yeol
    • The Journal of Information Technology
    • /
    • v.8 no.1
    • /
    • pp.95-112
    • /
    • 2005
  • This paper will look into the Main Substance and Some Problems of 24 hours Advance Cargo Manifest Declaration Rule, focuses on the Policy implication of Korea's and counter measures of our parties concerned about 24-hour advance vessel manifest rule. The 24-hour rule requires cargo owners to submit cargo manifest information to U.S. Customs 24 hours before vessel sailing from the final foreign port to a U.S. port. Cargo manifest information must be complete, accurate, and timely. As of February 2, 2003 manifest information can be submitted by paper or electronically. Cargo descriptions must be at a level of detail consistent with Harmonized Tariff Schedule (HTS) codes used by U.S. Customs. HTS codes are 10 digits. Electronic submissions are made via the Automated Manifest System (AMS) run by U.S. Customs.

  • PDF

Experimental Study on Secondary Moment of High-Strength RC Slender Columns under Eccentric Loads (편심을 받는 고강도콘크리트 장주의 2차모멘트에 관한 실험적 연구)

  • 박동규;배성용;이재훈
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 1998.10a
    • /
    • pp.571-576
    • /
    • 1998
  • This paper is a part of a research plan aimed at the verification of basic design rules of high-strength concrete columns. A total of 19 slender column specimens were tested to measure secondary moment and stiffness of eccentrically loaded reinforced concrete tied columns. Main variables included in this test program were concrete compressive strength, steel amount, eccentricity, and slenderness ratio. The concrete compressive strength varied from 356kg/$\textrm{cm}^2$ to 951kg/$\textrm{cm}^2$, the longitudinal steel ratios were between 1.13% and 5.51%, and slenderness ratios were 40 and 61. Calculated moment magnification factors and column stiffness based on design codes are higher than the test results for high axial load under small eccentricity, for higher slenderness ratio, for lower longitudinal steel ratio, and for high-strength concrete. The moment magnification method of the current design codes may provide a very conservative design for high-strength concrete slender column.

  • PDF

A Performance Tuning Technique for Interpretable Java Code by Realtime Class Generation (실시간 클래스 생성에 의한 해석적 자바 코드의 성능 향상 기법)

  • 김윤호
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.7 no.3
    • /
    • pp.81-88
    • /
    • 2002
  • This paper presents a realtime class generation technique for Java performance tuning of enormously repeated codes needing interpreting. Based on interpreted results, a Java source program for a Java class including a method with the corresponding function is generated, compiled, and loaded on the memory. And then and next time, the newly generated method is called for processing the original codes. As the results, overall times of repetition processing is reduced.

  • PDF

A bridge-vessel collision force of steel fender system (강재 충돌방호공의 선박충돌력산정)

  • Lee Gye Hee;Ko Jae Yong;Yu Won Jin
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2003.11a
    • /
    • pp.127-133
    • /
    • 2003
  • In this study, the impact analysis for the steel fender system that designed for protection of collision between vessel and bridge was performed The size of objective collision vessel assumed as 3000 dead weight tonnage(DWT). The impact forces and the impact energies were estimated by formulas of several design codes, and the steel fender system was designed based on the estimated forces and energy. The bow of objective vessel was modeled as rigid body, and bridge substructure was modeled as fixed support. Since, the impact analysis have the dynamic nonlinear features, such as, material nonlinear, large deformation and contact, explicit structural analysis program was used The analysis results presented that the impact forces formulas in codes have the sufficient conservativeness.

  • PDF

Design and Implementation of an EPCglobal TDT 1.0 Compliant Tag Data Translator (EPCglobal TDT 1.0 표준을 따르는 태그 데이터 변환기의 설계와 구현)

  • Kim, Sung-Jin;Song, Ha-Joo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.9
    • /
    • pp.897-900
    • /
    • 2008
  • EPCglobal TDT specifies standards on RFID tag representations and conversion rules among them. According to the rule, more than 200 combinations of code conversions are possible. In this paper, we propose a code generation scheme for developing TDT code conversion program, that imports TDT XML specification and generates conversion codes. The proposed scheme makes it easy to develop and to maintain the conversion codes.