• Title/Summary/Keyword: Program Source Code

Search Result 192, Processing Time 0.033 seconds

A Study on the Development of Educational Programs for LNG Bunkering in Consideration of the Safety System

  • Han, Se-Hyun;Yun, Yong-Sup;Kim, Jong-Su;Lee, Young-Chan
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.22 no.3
    • /
    • pp.268-277
    • /
    • 2016
  • This paper aims at presenting bunkering educational programs for LNG fueled ship taking into consideration existing similar education programs and safety systems at the international level in order to enhance both seafarers' and vessels' safety. Heavy fuel oil has typically been used as fuel of ship propulsion. The competitiveness of the fuel oil is recently getting weak in terms of cost and environmental aspects. Liquefied natural gas is introduced for ship propulsion in the maritime field as a new energy source replacing heavy fuel oil. In order to prepare for installation and operation of LNG fueled propulsion ship on board, International Maritime Organization has discussed this subject for about 10 years. As a result of the discussion on such ships in IMO, the International Code of Safety for Ships Using Gases or Other Low-Flash-Point Fuels entered into force on the year 2015. International organizations and several countries therefore drives actively entire researches and other businesses with a view to providing equipment and system of LNG bunkering. The systems are divided into ship-to-ship transfer, terminal / pipeline-to-ship transfer and truck-to-ship transfer. By adopting transfer system of LNG bunkering, many human resources will be needed in these areas on scene as well as on managing, operating, trading, finance, design of LNG bunkering industries. LNG bunkering is just in the beginning stage. Hence, this paper reviews and proposes professional educational programs of LNG bunkering in consideration of technical aspects of the safety system of LNG bunkering based on the types of bunkering systems.

Design of Open Framework Module for ASP Development System (ASP 시스템 개발을 위한 오픈 프레임워크 모듈)

  • Kwon, Young-Oh;Kim, Tae-Gan;Lee, Se-Hoon;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.2
    • /
    • pp.133-141
    • /
    • 2009
  • This paper propose an expanded ASP exclusive development framework method. We applied a module to the suggested method which suit to develope ASP. Proposed method is a kind of module, which manages MVC develope methodology and treats Query and ASP information as a XML. It has flexibility which meets the client's request quickly. Using inherited base model which previously exist in template source, developer only concerned with development methodology so that they can reduce development time and reinforce a integrity of system. We proposed these improvements as a framework. Experimental results validate our scheme, showing a fewer number of files and a better flexibility than other development method, and also about 29% of program code has been reduced.

Algorithm for Functional and Declarative Language in Parallel Machine (Parallel Machine에 있어서의 Functional, Declarative 언어의 Algorithm)

  • Kim, Jin-Su
    • The Journal of Natural Sciences
    • /
    • v.5 no.2
    • /
    • pp.39-43
    • /
    • 1992
  • Detection of parallelism by a compiler is very desirable from a user's point of view. However, even the most sophisticated techniques to detect parallelism trip on trivial impediments, such as conditionals, function calls, and input/output statements, fail to detect most of the parallelism present in a program. Some parallelizing compilers provide feedback to the user when they have difficulty in deciding about parallel execution. Under these circumstances, a programmer has to restructure the source code to aid the detection of parallelism. But, functional and declarative languages can be said to offer many advantages in this context. Functional programs are easier to reason about because their output is determinate, that is, independent of the order of evaluation. However, functional languages traditionally have lacked good facilities for manipulating arrays and matrices. In this paper, a declarative language called Id has been proposed as a solution to some of these problems.

  • PDF

Estimating Completeness of Cancer Registration in Iran with Capture-Recapture Methods

  • Mohammadi, Gohar;Akbari, Mohammad Esmaeil;Mehrabi, Yadolah;Motlagh, Ali Ghanbari;Pour, Elham Partovi;Roshandel, Gholamreza;Khosravi, Ardasheir
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.sup3
    • /
    • pp.93-99
    • /
    • 2016
  • Completeness is an important indicator of data quality in cancer registry programs. This study aimed to estimate the completeness of registered cases in a population based cancer registry program implemented in five provinces of Iran. Capture-recapture methods were used to estimate the number of cases that may have been missed and to estimate rates of completeness for different categories of age, year, and sex. The data used for this study were obtained from three sources: 1) National Pathology Database; 2) National Hospital Discharge Database; and 3) National Death Registry Database. The three sources were linked and duplicates were identified based on first name, last name, father's names, and date of birth, ICD code, and case's residency address using Microsoft Excel. Removing duplicates, the three sources reported a total of 35,643 cases from March 2008 to March 2011. Running many different multivariate models of capture-recapture and controlling for source dependencies revealed an overall under-reporting of 49% in all five registries combined. The estimated completeness differed based on age, sex, and year. The overall completeness was higher for males than females (71.2% for males and 59.9% for females). Younger age had lower rates of completeness compared to older age (38.1% for <40 years, 55.4% for 40-60 years, and 76.7 for >60 years). The results of this study indicated a moderate to severe (depending on the age, sex and year) degree of completeness in the population based cancer registration of Iran.

Software Similarity Detection Using Highly Credible Dynamic API Sequences (신뢰성 높은 동적 API 시퀀스를 이용한 소프트웨어 유사성 검사)

  • Park, Seongsoo;Han, Hwansoo
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1067-1072
    • /
    • 2016
  • Software birthmarks, which are unique characteristics of the software, are used to detect software plagiarism or software similarity. Generally, software birthmarks are divided into static birthmarks or dynamic birthmarks, which have evident pros and cons depending on the extraction method. In this paper, we propose a method for extracting the API sequence birthmarks using a dynamic analysis and similarity detection between the executable codes. Dynamic birthmarks based on API sequences extract API functions during the execution of programs. The extracted API sequences often include all the API functions called from the start to the end of the program. Meanwhile, our dynamic birthmark scheme extracts the API functions only called directly from the executable code. Then, it uses a sequence alignment algorithm to calculate the similarity metric effectively. We evaluate the birthmark with several open source software programs to verify its reliability and credibility. Our dynamic birthmark scheme based on the extracted API sequence can be utilized in a similarity test of executable codes.

A COMPARISON STUDY OF SPACE RADIATION DOSE ANALYSIS PROGRAMS: SPENVIS SECTORING TOOL AND SIGMA II

  • Chae Jongwon
    • Bulletin of the Korean Space Science Society
    • /
    • 2004.10b
    • /
    • pp.347-350
    • /
    • 2004
  • A space radiation analysis has been used to evaluate an ability of electronic equipment boxes or spacecrafts to endure various radiation effects, so it helps design thicknesses of structure and allocate components to meet the radiation requirements. A comparison study of space radiation dose analysis programs SPENVIS Sectoring Tool (SST) and SIGMA II is conducted through some structure cases, simple sphere shell, box and representative satellite configurations. The results and a discussion of comparison will be given. A general comparison will be shown for understanding those programs. The both programs use the same strategy, solid angle sectoring with ray-tracing method to produce an approximate dose at points in representative simple and complex models of spacecraft structures. Also the particle environment data corresponding to mission specification and radiation transport data are used as input data. But there are distinctions between them. The specification of geometry model and its input scheme, the assignment of dose point and the numbers, the prerequisite programs and ways of representing results will be discussed. SST is a web-based interactive program for sectoring analysis of complex geometries. It may be useful for a preliminary dose assessment with user-friendly interfaces and a package approach. SIGMA II is able to obtain from RSICC (Radiation Safety Information Computational Center) as a FOR-TRAN 77 source code. It may be suitable for either parametric preliminary design or detailed final design, e.g. a manned flight or radiation-sensitive component configuration design. It needs some debugs, recompiling and a tedious work to make geometrical quadric surfaces for actual spacecraft configuration, and has poor documentation. It is recommend to vist RSICC homepage and GEANT4/SSAT homepage.

  • PDF

Analysis on the creep response of bolted rock using bolted burgers model

  • Zhao, Tong-Bin;Zhang, Yu-Bao;Zhang, Qian-Qing;Tan, Yun-Liang
    • Geomechanics and Engineering
    • /
    • v.14 no.2
    • /
    • pp.141-149
    • /
    • 2018
  • In this paper, the creep behavior of bolted rock was analyzed by using the unconfined creep tests and the numerical results. Based on the test results, the Bolted Burgers creep model (B-B model) was proposed to clarify the creep mechanism of rock mass due to rock bolts. As to the simulation of the creep behaviour of bolted rock, a new user-defined incremental iterative format of the B-B model was established and the open-source $FLAC^{3D}$ code was written by using the object-oriented language (C++). To check the reliability of the present B-B creep constitutive model program, a numerical model of a tunnel with buried depth of 1000 m was established to analyze the creep response of the tunnel with the B-B model support, the non-support and the bolt element support. The simulation results show that the present B-B model is consistent with the calculated results of the inherent bolt element in $FLAC^{3D}$, and the convergence deformation can be more effectively controlled when the proposed B-B model is used in the $FLAC^{3D}$ software. The big advantage of the present B-B creep model secondarily developed in the $FLAC^{3D}$ software is the high computational efficiency.

Improving Extensibility of DEVS Simulation Environment with Model Base by using Event Control Model Templates (이벤트 제어 모델 템플릿을 사용한 모델 라이브러리 기반 DEVS 시뮬레이션 환경의 확장성 개선)

  • Kwon, Se Jung;Lee, Jun Hee;Choi, Changbeom;Kim, Tag Gon
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.1
    • /
    • pp.91-99
    • /
    • 2018
  • Discrete event simulation environments often need to be modified because additional questions to systems may become apparent while observing the simulation results repeatedly. It leads to increasing development budget and depreciating the effectiveness of the environment. To avoid the modifications and to generate the altered results, this paper applies an Event Control Model (ECM) with control functions that modulate, delete and generate the events at the simulation time. In addition, this paper suggests an easier approach for domain-users, who do not want to program at source code level, by using ECM templates. The simulators with the ECMs can have better extensibility because it becomes more adaptable to possibly unanticipated changes. It prevents increasing development costs due to modifications or development of new models by M&S experts, and it provides a new alternative step to domain users. To support the effectiveness of this approach, this paper describes a relevant example, which is composed of an initial simulation model based on our empirical studies. It will show that there exist the uncountable benefits because the existing simulator is reused by domain users without new projects.

Design of a Condition-based Maintenance Policy Using a Surrogate Variable (대용변수를 이용한 상태기반 보전정책의 설계)

  • Kwon, Hyuck Moo;Hong, Sung Hoon;Lee, Min Koo
    • Journal of Korean Society for Quality Management
    • /
    • v.49 no.3
    • /
    • pp.299-312
    • /
    • 2021
  • Purpose: We provide a condition-based maintenance policy where a surrogate variable is used for monitoring system performance. We constructed a risk function by taking into account the risk and losses accompanied with erroneous decisions. Methods: Assuming a unique degradation process for the performance variable and its specific relationship with the surrogate variable, the maintenance policy is determined. A risk function is developed on the basis of producer's and consumer's risks accompanied with each decision. With a strategic safety factor considered, the optimal threshold value for the surrogate variable is determined based on the risk function. Results: The condition-based maintenance is analyzed from the point of risk. With an assumed safety consideration, the optimal threshold value of the surrogate variable is provided for taking a maintenance action. The optimal solution cannot be obtained in a closed form. An illustrative numerical example and solution is provided with a source code of R program. Conclusion: The study can be applied to situation where a sensor signal is issued if the system performance begins to degrade gradually and reaches eventually its functional failure. The study can be extended to the case where two or more performance variables are connected to a same surrogate variable. Also estimation of the distribution parameters and risk coefficients should be further studied.

Verification Methods for Vulnerabilities of Airborne Object-Oriented Software (항공용 객체지향 소프트웨어에 대한 취약점 검증 방안)

  • Jang, Jeong-hoon;Kim, Sung-su;Lee, Ji-hyun
    • Journal of Aerospace System Engineering
    • /
    • v.16 no.2
    • /
    • pp.13-24
    • /
    • 2022
  • As the scale of airborne system software increases, the use of OOT (Object-Oriented Technology) is increasing for functional expansion, efficient development, and code reuse, but the verification method for airborne object-oriented software is conducted from the perspective of the existing procedure-oriented program. The purpose of this paper was to analyze the characteristics of OOT and the vulnerabilities derived from the functional characteristics of OOT, and present a verification method applicable to each software development process (Design, Coding and Testing) to ensure the functional safety integrity of aviation software to which OOT is applied. Additionally, we analyzed the meaning of the static analysis results among the step-by-step verification measures proposed by applying LDRA, a static analysis automation tool, to PX4, an open source used to implement flight control software.