• Title/Summary/Keyword: Source Code

Search Result 1,246, Processing Time 0.029 seconds

Construction of a Toolkit for Customizing a PDM Framework (PDM 프레임워크 재 정의 도구 구축)

  • Kim, Jeong-Ah
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.1
    • /
    • pp.38-47
    • /
    • 2001
  • PDM is an integrated solution for managing various kinds of document and information for a whole life~cycle of product management. PDM system spans a huge and complex area and requires so many efforts and budgets for development. A framework has been considered a promising way to improve productivity by reusing the software architecture, not just one part of the design or just source code. This was the reaSon why we developed PDM (Product Data Management) framework. Framework can reduce the time and efforts to develop a new PDM application. However, it also requires supporting environment since a framework is a big set of classes where their interactions are so complex. With this supporting environment, it is easy to understand the framework at a glance and easy to identify what hot spots to be refined to meet new requirements. In this paper, a new framework-supporting reuse environment based on the meta-repository was constructed for easy and convenient reuse.

  • PDF

Large Eddy Simulation of Rectangular Open-Channel Flow using OpenFOAM (OpenFOAM을 이용한 직사각형 개수로 흐름의 LES)

  • Ban, Chaewoong;Choi, Sung-Uk
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.34 no.3
    • /
    • pp.833-840
    • /
    • 2014
  • This study presents numerical simulation of turbulent flows in a rectangular open-channel that has a width-to-depth ratio of 2 using the source code provided by OpenFOAM. Large eddy simulations are carried out by solving the filtered continuity and momentum equations numerically. For the non-isotropic residual stress term, Smagorinsky's (1963) model is used. The flow in the open-channel whose width-to-depth ratio is 2, from experiment of Tominaga et al. (1989), is simulated numerically. Simulation results are compared with measured data by Tominga et al. (1989) and Nezu and Rodi (1985) and with LES data by Shi et al. (1999). Comparisons revealed that the model simulates the mean flow and turbulence statistics well. Specifically, the model reproduced the inner secondary currents located at the corner of sidewall and free surface successfully. In addition, the vortical component of turbulence intensity shows bulged contours towards the bottom edge.

Implementation of CCSDS Telecommand Decryptor in Geostationary Communications Satellite (정지궤도 통신위성의 CCSDS 원격명령 암호복호기 구현)

  • Kim,Jung-Pyo;Gu,Cheol-Hoe;Choe,Jae-Dong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.31 no.10
    • /
    • pp.89-96
    • /
    • 2003
  • In this paper, a CCSDS(Consultative Committee for Space Data Systems) telecommand(TC) decryptor for the security of geostationary communications satellite was implemented. For the confidentiality of CCSDS TC datalink security, Option-A which implements the security services below the transfer sublayer was selected. Also CFB(Cipher Feedback) operation mode of DES(Data Encryption Standard) was used for the encryption of 56-bit data bits in 64-bit codeblock. To verify Decryptor function, the DES CFB logic implemented on A54SX32 FPGA(Field Programmable Gate Array) was integrated with interface and control logics in a PCB(Printed Circuit Board). Using a function test PC, the encrypted codeblocks were generated, transferred into the decryptor, decrypted, and the decrypted codeblocks were transmitted to the function test PC, and then compared with the source codeblocks. Through LED(Light Emitting Diode) ON operation by driving the relay related to Op-code decoded and the comparison between the codeblock output waveforms measured and those simulated, the telecommand decryptor function was verified.

Comparison of the Effects of Straight and Twisted Heat Trace Installations Based on Three-dimensional Unsteady Heat Transfer (열선의 직선시공과 감기시공의 동파방지 효과 비교를 위한 3차원 비정상 수치해석)

  • Choi, Myoung-Young;Jeon, Byoung-Jin;Choi, Hyoung-Gwon
    • Fire Science and Engineering
    • /
    • v.30 no.1
    • /
    • pp.49-56
    • /
    • 2016
  • This paper numerically examines, straight and twisted electrical heat trace installations for their anti-freezing effects on water inside a pipe. The unsteady incompressible Navier-Stokes equations coupled with an energy equation were solved to compare the two installation methods. The heat conduction of the pipe with a heat source interacts with the natural convection of the water, and the conjugate heat transfer was considered using a commercial code (ANSYS-FLUENT) based on a SIMPLE-type algorithm. Numerical experiments, were done to investigate the isotherms and the vector fields in the water region to extract the evolutions of the minimum and maximum temperatures of the water inside the pipe. There was no substantial difference in the anti-freezing effects between the straight and twisted. Therefore, the straight installation is recommended after considering the damage and short circuit behavior of the electrical heat trace.

Understanding Phytosanitary Irradiation Treatment of Pineapple Using Monte Carlo Simulation

  • Kim, Jongsoon;Kwon, Soon-Hong;Chung, Sung-Won;Kwon, Soon-Goo;Park, Jong-Min;Choi, Won-Sik
    • Journal of Biosystems Engineering
    • /
    • v.38 no.2
    • /
    • pp.87-94
    • /
    • 2013
  • Purpose: Pineapple is now the third most important tropical fruit in world production after banana and citrus. Phytosanitary irradiation is recognized as a promising alternative treatment to chemical fumigation. However, most of the phytosanitary irradiation studies have dealt with physiochemical properties and its efficacy. Accurate dose calculation is crucial for ensuring proper process control in phytosanitary irradiation. The objective of this study was to optimize phytosanitary irradiation treatment of pineapple in various radiation sources using Monte Carlo simulation. Methods: 3-D geometry and component densities of the pineapple, extracted from CT scan data, were entered into a radiation transport Monte Carlo code (MCNP5) to obtain simulated dose distribution. Radiation energy used for simulation were 2 MeV (low-energy) and 10 MeV (high-energy) for electron beams, 1.25 MeV for gamma-rays, and 5 MeV for X-rays. Results: For low-energy electron beam simulation, electrons penetrated up to 0.75 cm from the pineapple skin, which is good for controlling insect eggs laid just below the fruit surface. For high-energy electron beam simulation, electrons penetrated up to 4.5 cm and the irradiation area occupied 60.2% of the whole area at single-side irradiation and 90.6% at double-side irradiation. For a single-side only gamma- and X-ray source simulation, the entire pineapple was irradiated and dose uniformity ratios (Dmax/Dmin) were 2.23 and 2.19, respectively. Even though both sources had all greater penetrating capability, the X-ray treatment is safer and the gamma-ray treatment is more widely used due to their availability. Conclusions: These results are invaluable for optimizing phytosanitary irradiation treatment planning of pineapple.

Automated Generation of Wrapper to Test Components (컴포넌트 테스트를 위한 래퍼의 자동 생성에 관한 연구)

  • Song, Ho-Jin;Choi, Eun-Man
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.8
    • /
    • pp.704-716
    • /
    • 2005
  • Assembling new software systems from Prepared components is an attractive alternative to traditional software development method to reduce development cost and schedule dramatically. However, if separately developed components are tested, integrated and verified with unreasonable effort and high cost, it would not be an effective way to software development. Components are not distributed in the shape of white-box source code so that should be hard to validate and test in new application environment. For solving this problem, built-in tester components are suggested to check the contract-compliance of their server components. If components have various and complex function, built-in tester should be heavy and unflexible to test in composition of components. This paper suggests enhancing automated wrapper technique which substitutes with built-in tester components and shows the usability of the wrapper by design and implementation. Component testing in this way reduces the cost and effort associated with preparation of component testing and makes the various test experiments in components assembly.

Aspect Mining Process Design Using Abstract Syntax Tree (추상구문트리를 이용한 어스팩트 마이닝 프로세스 설계)

  • Lee, Seung-Hyung;Song, Young-Jae
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.5
    • /
    • pp.75-83
    • /
    • 2011
  • Aspect-oriented programming is the paradigm which extracts crosscutting concern from a system and solves scattering of a function and confusion of a code through software modularization. Existing aspect developing method has a difficult to extract a target area, so it is not easy to apply aspect mining. In an aspect minning, it is necessary a technique that convert existing program refactoring elements to crosscutting area. In the paper, it is suggested an aspect mining technique for extracting crosscutting concern in a system. Using abstract syntax structure specification, extract functional duplicated relation elements. Through Apriori algorithm, it is possible to create a duplicated syntax tree and automatic creation and optimization of a duplicated source module, target of crosscutting area. As a result of applying module of Berkeley Yacc(berbose.c) to mining process, it is confirmed that the length and volume of program has been decreased of 9.47% compared with original module, and it has been decreased of 4.92% in length and 5.11% in volume compared with CCFinder.

Preliminary Analysis of Dose Rate Variation on the Containment Building Wall of Dry Interim Storage Facilities for PWR Spent Nuclear Fuel (경수로 사용후핵연료 건식 중간저장시설의 격납건물 크기에 따른 건물 벽면에서의 방사선량률 추이 예비 분석)

  • Seo, M.H.;Yoon, J.H.;Cha, G.Y.
    • Journal of Radiation Protection and Research
    • /
    • v.38 no.4
    • /
    • pp.189-193
    • /
    • 2013
  • Annual dose on the containment building wall of the interim storage facility at normal condition was calculated to estimate the dose rate transition of the facility of PWR spent nuclear fuel. In this study, source term was generated by ORIGEN-ARP with 4.5 wt% initial enrichment, 45,000 MWd/MTU burnup and 10 years cooling time. Modeling of the storage facility and the containment building and radiation shielding evaluations were conducted by MCNP code depending on the distance between the wall and the facility in the building. In the case of the centralized storage system, the distance required for the annual dose rate limit from 10CFR72 was estimated to be 50 m.

The Analysis of Fire-Driven Flow and Temperature in The Railway Tunnel with Ventilation (환기를 동반한 철도터널 화재 연기유속 및 온도장 해석)

  • Jang, Yong-Jun;Lee, Chang-Hyun;Kim, Hag-Beom;Lee, Woo-Dong
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.1794-1801
    • /
    • 2008
  • Fire-driven flow and temperature distribution in a ventilated tunnel was analyzed by Large Eddy Simulation using FDS code. The simulated tunnel is 182m length, 5.4m wide and 2.4m height. A pool fire was located 112m from tunnel entrance and was taken as a heat source of $0.89m^2$. The heat is assumed to be released uniformly throughout the whole simulated time. The fire strength was 2.76MW and the fuel burnt was octane. The parallel computational method was employed to accelerate the computing time and manage the large grid points which is not possible to handle in the one CPU. The total grid points used were $2.4{\times}10^6$ and 7 CPUs were used to calculate the momentum and energy equations. The simulated results were well compared with the experiments.

  • PDF

A Design and Development of Secure-Coding Check System Based on E-Government Standard Framework for Convergence E-Government Service (융복합 전자정부 서비스를 위한 전자정부 표준프레임워크 기반 시큐어코딩 점검 시스템 설계 및 개발)

  • Kim, Hyungjoo;Kang, Jungho;Kim, Kyounghun;Lee, Jaeseung;Jun, Moonseog
    • Journal of Digital Convergence
    • /
    • v.13 no.3
    • /
    • pp.201-208
    • /
    • 2015
  • Recently computer, smart phone, medical devices, etc has become used in a variety of environments as the application fields of IT products have become diversification. Attack case of abuse of software security vulnerabilities is on the increase as the application fields of software have become diversification. Accordingly, secure coding program is of a varied but history management, updating, API module to be vulnerable to attack. Thus, this paper proposed a materialization of CMS linked system to enable check the vulnerability of the source code to content unit for secure software development, configuration management system that interwork on the transmission module. Implemented an efficient coding system secure way that departmentalized by the function of the program and by analyzing and applying secure coding standards.