• Title/Summary/Keyword: Share of Code

Search Result 85, Processing Time 0.025 seconds

REVIEW ON OPENFOAM - AN OPEN SOURCE SOFTWARE (Source 공개 코드 OpenFOAM에 대한 리뷰)

  • Park, J.K.;Kang, K.H.
    • Journal of computational fluids engineering
    • /
    • v.15 no.3
    • /
    • pp.46-53
    • /
    • 2010
  • Recently, several open source codes for computational fluid dynamics (CFD) have been introduced and are spreading fast. Our group has chosen the OpenFOAM as a platform to develop our own in-house code. In this brief review, we would like to share the information on the codes and what we have experienced so far. We introduce several features of OpenFOAM, which include the performance compared with commercial packages, estimation for current user population, and our own prospect for future improvement in performance and growth in user population. In addition, we briefly introduce our experience gained in embedding the level set method into the OpenFOAM.

INTRODUCTION TO OPENFOAM: OPEN SOURCE SOFTWARE (Source 공개 코드 OpenFOAM 소개)

  • Park, J.K.;Kang, K.H.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2010.05a
    • /
    • pp.431-436
    • /
    • 2010
  • Recently, several open source codes for computational fluid dynamics (CFD) have been emerged and are spreading fast. Our group has chosen OpenFOAM as a platform to develop our own in-house code. In this paper, we would like to share the information on the codes and what we have experienced so far. We introduce several features of OpenFOAM, which include the performance compared with commercial packages, estimation for current user population and our own prospect for future improvement in performance and growth in user population. In addition, we briefly introduce our experience gained in embedding the level set method into the OpenFOAM.

  • PDF

How to Detect and Block Ransomware with File Extension Management in MacOS (MacOS에서 파일확장자 관리를 통한 랜섬웨어 탐지 및 차단 방법)

  • Youn, Jung-moo;Ryu, Jae-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.251-258
    • /
    • 2017
  • Most malware, including Ransomware, is built for the Windows operating system. This is because it is more harmful to target an operating system with a high share. But in recent years, MacOS's operating system share has steadily increased. As people become more and more used, the number of malicious code running on the MacOS operating system is increasing. Ransomware has been known to Korea since 2015, and damage cases are gradually increasing. MacOS is no longer free from Ransomware, as Ransomware for MacOS was discovered in March 2016. In order to cope with future Ransomware, this paper used Ransomware's modified file extension to detect Ransomware. We have studied how to detect and block Ransomware processes by distinguishing between extensions changed by the user and extensions changed by the Ransomware process.

A Static Analysis Technique for Android Apps Written with Xamarin (자마린으로 개발된 안드로이드 앱의 정적 분석 연구)

  • Lim, Kyeong-hwan;Kim, Gyu-sik;Shim, Jae-woo;Cho, Seong-je
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.643-653
    • /
    • 2018
  • Xamarin is a representative cross-platform development framework that allows developers to write mobile apps in C# for multiple mobile platforms, such as Android, iOS, or Windows Phone. Using Xamarin, mobile app developers can reuse existing C# code and share significant code across multiple platforms, reducing development time and maintenance costs. Meanwhile, malware authors can also use Xamarin to spread malicious apps on more platforms, minimizing the time and cost of malicious app creation. In order to cope with this problem, it is necessary to analyze and detect malware written with Xamarin. However, little studies have been conducted on static analysis methods of the apps written in Xamarin. In this paper, we examine the structure of Android apps written with Xamarin and propose a static analysis technique for the apps. We also demonstrate how to statically reverse-engineer apps that have been transformed using code obfuscation. Because the Android apps written with Xamarin consists of Java bytecode, C# based DLL libraries, and C/C++ based native libraries, we have studied static reverse engineering techniques for these different types of code.

Towards Designing Efficient Lightweight Ciphers for Internet of Things

  • Tausif, Muhammad;Ferzund, Javed;Jabbar, Sohail;Shahzadi, Raheela
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.4006-4024
    • /
    • 2017
  • Internet of Things (IoT) will transform our daily life by making different aspects of life smart like smart home, smart workplace, smart health and smart city etc. IoT is based on network of physical objects equipped with sensors and actuators that can gather and share data with other objects or humans. Secure communication is required for successful working of IoT. In this paper, a total of 13 lightweight cryptographic algorithms are evaluated based on their implementation results on 8-bit, 16-bit, and 32-bit microcontrollers and their appropriateness is examined for resource-constrained scenarios like IoT. These algorithms are analysed by dissecting them into their logical and structural elements. This paper tries to investigate the relationships between the structural elements of an algorithm and its performance. Association rule mining is used to find association patterns among the constituent elements of the selected ciphers and their performance. Interesting results are found on the type of element used to improve the cipher in terms of code size, RAM requirement and execution time. This paper will serve as a guideline for cryptographic designers to design improved ciphers for resource constrained environments like IoT.

The Crack Control of Fiber Net Reinforced RC Slab (섬유망을 이용한 RC슬래브의 균열제어)

  • Bae, Ju-Seong;Kim, Kyoung-Soo;Kim, Nam-Wook;Kim, Chul-Min
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.6 no.2
    • /
    • pp.225-231
    • /
    • 2002
  • Severe cracks on Reinforced Concrete (RC) structures caused by structural displacement can be often one of the main reasons for the degradation of tensile and flexural rigidities of RC structures and for the deterioration of durability and serviceability of RC structures through accelerated steel corrosion. These combined factors adversely affect the performance of RC concrete, leading to shortened life time of RC structures. In consideration of these problems, we conducted 3 point bending experiments by employing three different types of concrete specimens: fiber-net reinforced concrete (FNRC), polypropylene-fiber reinforced concrete (PFRC), and plain concrete (PC). FNRC is well known for its strong corrosion resistance, light self-weight, and excellent tensile strength, while PFRC is known to be effective in crack control. FNRC was found to have the best first and final crack resistances followed by PFRC and PC, as evidenced by the highest initial crack load and the smallest final crack width, respectively. The FNRC specimens with various tensile strength of fiber net exhibited greater ultimate strengths than those for PFRC and PC. Furthermore, the crack widths of FNRC specimens were smaller than those calculated by the crack-width estimation equation of the KCI and ACI code. Therefore, we conclude that fiber net reinforcement is effective not only on crack control, but also on loading share.

Exploiting Thread-Level Parallelism in Lockstep Execution by Partially Duplicating a Single Pipeline

  • Oh, Jaeg-Eun;Hwang, Seok-Joong;Nguyen, Huong Giang;Kim, A-Reum;Kim, Seon-Wook;Kim, Chul-Woo;Kim, Jong-Kook
    • ETRI Journal
    • /
    • v.30 no.4
    • /
    • pp.576-586
    • /
    • 2008
  • In most parallel loops of embedded applications, every iteration executes the exact same sequence of instructions while manipulating different data. This fact motivates a new compiler-hardware orchestrated execution framework in which all parallel threads share one fetch unit and one decode unit but have their own execution, memory, and write-back units. This resource sharing enables parallel threads to execute in lockstep with minimal hardware extension and compiler support. Our proposed architecture, called multithreaded lockstep execution processor (MLEP), is a compromise between the single-instruction multiple-data (SIMD) and symmetric multithreading/chip multiprocessor (SMT/CMP) solutions. The proposed approach is more favorable than a typical SIMD execution in terms of degree of parallelism, range of applicability, and code generation, and can save more power and chip area than the SMT/CMP approach without significant performance degradation. For the architecture verification, we extend a commercial 32-bit embedded core AE32000C and synthesize it on Xilinx FPGA. Compared to the original architecture, our approach is 13.5% faster with a 2-way MLEP and 33.7% faster with a 4-way MLEP in EEMBC benchmarks which are automatically parallelized by the Intel compiler.

  • PDF

A JTAG Protection Method for Mobile Application Processors (모바일 애플리케이션 프로세서의 JTAG 보안 기법)

  • Lim, Min-Soo;Park, Bong-Il;Won, Dong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.4
    • /
    • pp.706-714
    • /
    • 2008
  • In this paper, we suggest a practical and flexible system architecture for JTAG(Joint Test Action Group) protection of application processors. From the view point of security, the debugging function through JTAG port can be abused by malicious users, so the internal structures and important information of application processors, and the sensitive information of devices connected to an application processor can be leak. This paper suggests a system architecture that disables computing power of computers used to attack processors to reveal important information. For this, a user authentication method is used to improve security strength by checking the integrity of boot code that is stored at boot memory, on booting time. Moreover for user authorization, we share hard wired secret key cryptography modules designed for functional operation instead of hardwired public key cryptography modules designed for only JTAG protection; this methodology allows developers to design application processors in a cost and power effective way. Our experiment shows that the security strength can be improved up to $2^{160}{\times}0.6$second when using 160-bit secure hash algorithm.

Social Media Mining Toolkit (SMMT)

  • Tekumalla, Ramya;Banda, Juan M.
    • Genomics & Informatics
    • /
    • v.18 no.2
    • /
    • pp.16.1-16.5
    • /
    • 2020
  • There has been a dramatic increase in the popularity of utilizing social media data for research purposes within the biomedical community. In PubMed alone, there have been nearly 2,500 publication entries since 2014 that deal with analyzing social media data from Twitter and Reddit. However, the vast majority of those works do not share their code or data for replicating their studies. With minimal exceptions, the few that do, place the burden on the researcher to figure out how to fetch the data, how to best format their data, and how to create automatic and manual annotations on the acquired data. In order to address this pressing issue, we introduce the Social Media Mining Toolkit (SMMT), a suite of tools aimed to encapsulate the cumbersome details of acquiring, preprocessing, annotating and standardizing social media data. The purpose of our toolkit is for researchers to focus on answering research questions, and not the technical aspects of using social media data. By using a standard toolkit, researchers will be able to acquire, use, and release data in a consistent way that is transparent for everybody using the toolkit, hence, simplifying research reproducibility and accessibility in the social media domain.

Performance Analysis of Uplink Cognitive Radio Transmission based on Overloaded MC-DS-CDMA

  • Sundararajan, Mohandass;Govindaswamy, Umamaheswari
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.4
    • /
    • pp.181-190
    • /
    • 2014
  • This paper reports a cognitive radio network architecture based on overloaded multicarrier direct sequence code division multiple access (O-MC-DS-CDMA). The O-MC-DSCDMA technique combines CDMA with a multicarrier modulation technique to overcome the channel fading effects. In this technique, secondary users are enabled to share the available bandwidth with the existing primary users. Two sets of orthogonal Gold codes are used to support the primary and secondary users simultaneously. The orthogonality between the spreading codes is lost due to the non-zero cross correlation between the codes and the timing synchronization error in the uplink transmission, which causes interference between primary and secondary users. This paper proposes two modified hybrid parallel/successive interference cancellation techniques for primary and secondary user base station receivers with multiple antennas to suppress the interference among users. Interference among the same group of users is cancelled by parallel interference cancellation and the interference among groups is cancelled using successive interference cancellation. The simulation results confirmed that the proposed modified interference cancellation techniques show better BER performance over conventional interference cancellation techniques.