• Title/Summary/Keyword: Source Code

Search Result 1,246, Processing Time 0.022 seconds

An Evaluation on the Radiation Shielding of the Radwaste Drum Assay Facility (방사성폐기물드럼 핵종재고량 평가시설 구축에 따른 방사선차폐 영향평가)

  • Ji, Young-Yong;Kwak, Kyung-Kil;Hong, Dae-Seok;Shon, Jong-Sik
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.10 no.2
    • /
    • pp.117-123
    • /
    • 2012
  • In order to dispose of the LILW(low and intermediate level radioactive waste) stored at KAERI, the radwaste drum assay system will be introduced to evaluate the radioisotopes inventory of stored drums. At present, the construction project of the dedicated assay facility to operate it and carry out routine maintenance of that equipment has been conducting at the radwaste treatment facility. Since that facility will be constructed in front of a 1st radwaste storage facility as well as the radwaste drums to be assayed and the transmission source in the radwaste drum assay system are in that facility, they could act as the radioactive sources and then, would affect the dose rate at the inside and the outside of the facility. Therefore, the radiation shielding should be evaluated through the concrete wall near to the radioactive sources whether the wall thickness is sufficient against the regulations. In this study, the radiation safety for the concrete wall around the radiation controlled area in the radwaste drum assay facility was evaluated by the MCNP code. From the evaluation results, the thickness of those concrete walls which are under consideration of about 30 cm was enough to shield the radiation from the radioactive sources.

Numerical Study on Roughness Effect for Axi-symmetry Submerged Body in High Reynolds Number (고 레이놀즈 수에서의 축대칭 몰수체의 거칠기에 대한 수치연구)

  • Joung, Tae-Hwan;Song, Hyung-Do;Yum, Jong-Gil;Song, Seongjin;Park, Sunho
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.2
    • /
    • pp.246-252
    • /
    • 2018
  • In this paper, the friction drag force of 3D submerged body is investigated by considering the surface roughness, the first grid height, and the Reynolds number using open CFD source code, OpenFOAM 4.0. A procedure for estimating drag components by CFD code is set up and suggested in this study. In the 3D submerged body, because of the form factor in the 3D computations, the friction resistance with the small roughness of $12{\mu}m$ obtains different result with the smooth wall. As the Reynolds number increased, the boundary layer becomes thinner and the fiction resistance tends to decrease. In the computations for the effect of y+, the friction resistance and wall shear stress are excessively predicted when the y+ value deviates from the log layer. This is presumably because the boundary layer becomes thicker and the turbulence energy is excessively predicted in the nose due to the increase in y+ value. As the roughness increases, the boundary layer becomes thicker and the turbulence kinetic energy on the surface increases. From this study, the drag estimation method, considering the roughness by numerical analysis for ships or offshore structures, can be provided by using the suggested the y+ value and surface roughness with wall function.

Improvement of Received Optical Power Sensitivity in Asymmetric 2.5Gbps/1.2Gbps Passive Optical Network with Inverse Return to Zero(RZ) coded Downstream and NRZ upstream re-modulation (역 RZ 부호로 코딩된 하향신호의 재변조를 이용한 비대칭 2.5Gbps/622Mbps 수동 광가입자 망에서의 수신 감도의 개선)

  • Park, Sang-Jo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.3
    • /
    • pp.65-72
    • /
    • 2010
  • We propose the asymmetric 2.5Gbps/622Mbps PON(Passive Optical Network) in order to reduce the bandwith of filter at receiver with inverse RZ(Return to Zero) code coded downstream and NRZ(Non Return to Zero) upstream re-modulation. I theoretically analyze BER(Bit Error Rate) performance and the power sensitivity with the optimal threshold level by performing simulation with MATLAB according to the types of downstream data. The results have shown that the optimal threshold level at the optical receiver could be saturated at 0.33 as the optical received power increase more than -26dBm to keep $10^{-12}$ of BER to a minimum. Also the power sensitivity is more improved by about 3dB by fixing the threshold level at 0.33 than the conventional receiver. The proposed system can be a useful technology for optical access networks with asymmetric upstream and downstream data rates because the optical receiver can be used without controlling threshold levels and that does not require a light source in optical network unit (ONU) and its control circuits in the optical line termination (OLT).

Implementation of Hypervisor for Virtualizing uC/OS-II Real Time Kernel (uC/OS-II 실시간 커널의 가상화를 위한 하이퍼바이저 구현)

  • Shin, Dong-Ha;Kim, Ji-Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.103-112
    • /
    • 2007
  • In this paper, we implement a hypervisor that runs multiple uC/OS-II real-time kernels on one microprocessor. The hypervisor virtualizes microprocessor and memory that are main resources managed by uC/OS-II kernel. Microprocessor is virtualized by controlling interrupts that uC/OS-II real-time kernel handles and memory is virtualized by partitioning physical memory. The hypervisor consists of three components: interrupt control routines that virtualize timer interrupt and software interrupt, a startup code that initializes the hypervisor and uC/OS-II kernels, and an API that provides communication between two kernels. The original uC/OS-II kernel needs to be modified slightly in source-code level to run on the hypervisor. We performed a real-time test and an independent computation test on Jupiter 32-bit EISC microprocessor and showed that the virtualized kernels run without problem. The result of our research can reduce the hardware cost, the system space and weight, and system power consumption when the hypervisor is applied in embedded applications that require many embedded microprocessors.

  • PDF

Real-Time DSP Implementation of IMT-2000 Speech Coding Algorithm (IMT-2000 음성부호화 알고리즘의 실시간 DSP 구현)

  • Seo, Jeong-Uk;Gwon, Hong-Seok;Park, Man-Ho;Bae, Geon-Seong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.38 no.3
    • /
    • pp.304-315
    • /
    • 2001
  • In this paper, we peformed the real-time implementation of AMR(Adaptive Multi-Rate) speech coding algorithm which is adopted for IMT-2000 service using TMS320C6201, i.e., a Texas Instrument´s fixed-point DSP. With the ANSI C source code released from ETSI, optimization is performed to make it run in real-time with memory as small as possible using the C compiler and assembly language. Implemented AMR speech codec has the size of 32.06 kWords program memory, 9.75 kWords data RAM memory, and 19.89 kWords data ROM memory. And, The time required for processing one frame of 20 ms length speech data is about 4.38 ms, and it is short enough for real-time operation. It is verified that the decoded result of the implemented speech codec on the DSP is identical with the PC simulation result using ANSI C code for test sequences. Also, actual sound input/output test using microphone and speaker demonstrates its proper real-time operation without distortions or delays.

  • PDF

A Comparison Study on Severe Accident Risks Between PWR and PHWR Plants (가압 경수로 및 가압중수로형 원자력 발전소의 중대사고 리스크 비교 평가)

  • Jeong, Jong-Tae;Kim, Tae-Woon;Ha, Jae-Joo
    • Journal of Radiation Protection and Research
    • /
    • v.29 no.3
    • /
    • pp.187-196
    • /
    • 2004
  • The health effects resulting from severe accidents of typical 1,000MWe KSNP(Korea Standard Nuclear Plant) PWR and typical 600MWe CANDU(CANada Deuterium Uranium) plants were estimated and compared. The population distribution of the site extending to 80km for both site were considered. The releaese fraction for various source term categories(STC) and core inventories were used in the estimation of the health effects risks by using the MACCS2(MELCOR Accident Consequence Code System2) code. Individuals are assumed to evacuate beyond 16km from the site. The health effects considered in this comparative study are early and cancer fatality risk, and the results are presented as CCDF(Complementary Cumulative Distribution Function) curves considering the occurrence probability of each STC's. According to the results, the early and cancer fatality risks of PHWR plants we lower than those of PWR plants. This is attributed the fact that the amount of radioactive mateials that released to the atmosphere resulting from the postulated severe accidents of PHWR plants are smaller than that of PWR plants. And, the dominating initiating event of STC that shows maximum early and cancer fatality risk is SGTR(Steam Generator Tube Rupture) for both plants. Therefore, the appropriated actions must be taken to reduce the occurrence probability and the amounts of radioactive materials released to the environment in order to protect the public for both PWR and PHWR plants.

Variation Characteristics of Wave Field around Three-Dimensional Low-Crested Structure (3차원저천단구조물(LCS) 주변에서 파동장의 변동특성)

  • Lee, Jun Hyeong;Bae, Ju Hyun;An, Sung Wook;Lee, Kwang Ho;Kim, Do Sam
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.31 no.3
    • /
    • pp.180-198
    • /
    • 2019
  • In recent years, countries like Europe and Japan have been involved in many researches on the Low-Crested Structure (LCS) which is the method to protect beach erosion and it is regarded as an alternative to the submerged breakwaters, and compiled its results and released the design manual. In the past, studies on LCS have focused on two-dimensional wave transmission and calculating required weight of armor units, and these were mainly examined and discussed based on experiments. In this study, three-dimensional numerical analysis is performed on permeable LCS. The open-source CFD code olaFlow based on the Navier-Stokes momentum equations is applied to the numerical analysis, which is a strongly nonlinear analysis method that enables breaking and turbulence analysis. As a result, the distribution characteristics of the LCS such as water level, water flow, and turbulent kinetic energy were examined and discussed, then they were carefully compared and examined in the case of submerged breakwaters. The study results indicate that there is a difference between the flow patterns of longshore current near the shoreline, the spatial distribution of longshore and on-offshore directions of mean turbulent kinetic energy in case of submerged breakwaters and LCS. It is predicted that the difference in these results leads to the difference in sand movement.

Feasibility Study on Integration of SSR Correction into Network RTK to Provide More Robust Service

  • Lim, Cheol-Soon;Park, Byungwoon;Kim, Dong-Uk;Kee, Chang-Don;Park, Kwan-Dong;Seo, Seungwoo;So, Hyoungmin;Park, Junpyo
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.7 no.4
    • /
    • pp.295-305
    • /
    • 2018
  • Network RTK is a highly practical technology that can provide high positioning accuracy at levels between cm~dm regardless of user location in the network by extending the available range of RTK using reference station network. In particular, unlike other carrier-based positioning techniques such as PPP, users are able to acquire high-accuracy positions within a short initialization time of a few or tens of seconds, which increases its value as a future navigation system. However, corrections must be continuously received to maintain a high level of positioning accuracy, and when a time delay of more than 30 seconds occurs, the accuracy may be reduced to the code-based positioning level of meters. In case of SSR, which is currently in the process of standardization for PPP service, the corrections by each error source are transmitted in different transmission intervals, and the rate of change of each correction is transmitted together to compensate the time delay. Using these features of SSR correction is expected to reduce the performance degradation even if users do not receive the network RTK corrections for more than 30 seconds. In this paper, the simulation data were generated from 5 domestic reference stations in Gunwi, Yeongdoek, Daegu, Gimcheon, and Yecheon, and the network RTK and SSR corrections were generated for the corresponding data and applied to the simulation data from Cheongsong reference station, assumed as the user. As a result of the experiment assuming 30 seconds of missing data, the positioning performance compensating for time delay by SSR was analyzed to be horizontal RMS (about 5 cm) and vertical RMS (about 8 cm), and the 95% error was 8.7 cm horizontal and 1cm vertical. This is a significant amount when compared to the horizontal and vertical RMS of 0.3 cm and 0.6 cm, respectively, for Network RTK without time delay for the same data, but is considerably smaller compared to the 0.5 ~ 1 m accuracy level of DGPS or SBAS. Therefore, maintaining Network RTK mode using SSR rather than switching to code-based DGPS or SBAS mode due to failure to receive the network RTK corrections for 30 seconds is considered to be favorable in terms of maintaining position accuracy and recovering performance by quickly resolving the integer ambiguity when the communication channel is recovered.

Numerical Study on Towing Stability of LNG Bunkering Barge in Calm Water (LNG 벙커링 바지의 정수 중 예인안정성에 관한 수치연구)

  • Oh, Seung-Hoon;Jung, Dong-Ho;Jung, Jae-Hwan;Hwang, Sung-Chul;Cho, Seok-Kyu;Sung, Hong-Gun
    • Journal of Navigation and Port Research
    • /
    • v.43 no.3
    • /
    • pp.143-152
    • /
    • 2019
  • In this paper, the towing stability of the LNG bunker barge was estimated. Currently, LNG bunkering barge is being developed for the bunkering of LNG (Liquefied Natural Gas), an eco-friendly energy source. Since the LNG bunkering barge assumes the form of a towed ship connected to the tow line, the towing stability of the LNG bunker barge is crucial f not only for the safety of the LNG bunker barge but also the neighboring sailing vessels. In the initial stages, a numerical code for towing simulation was developed to estimate the towing stability of the LNG bunkering barge. The MMG (Maneuvering Mathematical modeling Group) model was applied to the equations of motion while the empirical formula was applied to the maneuvering coefficients for use in the initial design stage. To validate the developed numerical code, it was compared with published calculation and model test results. Towing simulations were done based on the changing skeg area and the towing position of the LNG bunkering barge using the developed numerical codes. As a result, the suitability of the designed stern skeg area was confirmed.

Research on the Classification Model of Similarity Malware using Fuzzy Hash (퍼지해시를 이용한 유사 악성코드 분류모델에 관한 연구)

  • Park, Changwook;Chung, Hyunji;Seo, Kwangseok;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1325-1336
    • /
    • 2012
  • In the past about 10 different kinds of malicious code were found in one day on the average. However, the number of malicious codes that are found has rapidly increased reachingover 55,000 during the last 10 year. A large number of malicious codes, however, are not new kinds of malicious codes but most of them are new variants of the existing malicious codes as same functions are newly added into the existing malicious codes, or the existing malicious codes are modified to evade anti-virus detection. To deal with a lot of malicious codes including new malicious codes and variants of the existing malicious codes, we need to compare the malicious codes in the past and the similarity and classify the new malicious codes and the variants of the existing malicious codes. A former calculation method of the similarity on the existing malicious codes compare external factors of IPs, URLs, API, Strings, etc or source code levels. The former calculation method of the similarity takes time due to the number of malicious codes and comparable factors on the increase, and it leads to employing fuzzy hashing to reduce the amount of calculation. The existing fuzzy hashing, however, has some limitations, and it causes come problems to the former calculation of the similarity. Therefore, this research paper has suggested a new comparison method for malicious codes to improve performance of the calculation of the similarity using fuzzy hashing and also a classification method employing the new comparison method.