• Title/Summary/Keyword: Source Code Analysis

Search Result 437, Processing Time 0.035 seconds

The Study on the Aeroacoustic Characteristics of an Axial Fan for an Air-Conditioner (공기조화기 축류팬의 공력소음 특성 연구)

  • Lee, Soo-Young;Han, Jae-Oh;Kim, Tae-Hun;Lee, Jai-Kwon;Jeon, Wan-Ho
    • 유체기계공업학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.205-208
    • /
    • 2006
  • This paper proposes a new computational aeroacoustics method for an axial fan analysis. The major aeroacoustic noise source of an outdoor air-conditioner is the axial fan. It was revealed that the dominant noise source is the aerodynamic interactions between the rotating blade and stationary orifice. Many researches were focused on the fan only case. However, it does not fit to a real outdoor unit of air-conditioner. Especially, the inlet part of the axial fan of real system case is complex and not uniform. So, in order to identify the dominant noise source of axial fan, full outdoor unit analysis is important. Transient CFD analysis of full system was performed by commercial CFD code - SC/Tetra. Dominant noise source of the system was calculated by commercial CFN code - FlowNoise. The results show that not only BPF peaks but also broadband noise are similar to the measured data.

  • PDF

Domain Analysis of Device Drivers Using Code Clone Detection Method

  • Ma, Yu-Seung;Woo, Duk-Kyun
    • ETRI Journal
    • /
    • v.30 no.3
    • /
    • pp.394-402
    • /
    • 2008
  • Domain analysis is the process of analyzing related software systems in a domain to find their common and variable parts. In the case of device drivers, they are highly suitable for domain analysis because device drivers of the same domain are implemented similarly for each device and each system that they support. Considering this characteristic, this paper introduces a new approach to the domain analysis of device drivers. Our method uses a code clone detection technique to extract similarity among device drivers of the same domain. To examine the applicability of our method, we investigated whole device drivers of a Linux source. Results showed that many reusable similar codes can be discerned by the code clone detection method. We also investigated if our method is applicable to other kernel sources. However, the results show that the code clone detection method is not useful for the domain analysis of all kernel sources. That is, the applicability of the code clone detection method to domain analysis is a peculiar feature of device drivers.

  • PDF

Pre/Post processor for structural analysis simulation integration with open source solver (Calculix, Code_Aster) (오픈소스 솔버(Calculix, Code_Aster)를 통합한 구조해석 시뮬레이션 전·후처리기 개발)

  • Seo, Dong-Woo;Kim, Jae-Sung;Kim, Myung-Il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.9
    • /
    • pp.425-435
    • /
    • 2017
  • Structural analysis is used not only for large enterprises, but also for small and medium sized ones, as a necessary procedure for strengthening the certification process for product delivery and shortening the time in the process from concept design to detailed design. Open-source solvers that can be used atlow cost differ from commercial solvers. If there is a problem with the input data, such as with the grid, errors or failures can occur in the calculation step. In this paper, we propose a pre- and post-processor that can be easily applied to the analysis of mechanical structural problems by using the existing structural analysis open source solver (Caculix, Code_Aster). In particular, we propose algorithms for analyzing different types of data using open source solvers in order to extract and generate accurate information,such as 3D models, grids and simulation conditions, and develop and apply information analysis. In addition, to improve the accuracy of open source solvers and to prevent errors, we created a grid that matches the solver characteristics and developed an automatic healing function for the grid model. Finally, to verify the accuracy of the system, the verification and utilization results are compared with the software used.

Analysis of Detection Ability Impact of Clang Static Analysis Tool by Source Code Obfuscation Technique (소스 코드 난독화 기법에 의한 Clang 정적 분석 도구의 성능 영향 분석)

  • Jin, Hongjoo;Park, Moon Chan;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.605-615
    • /
    • 2018
  • Due to the rapid growth of the Internet of Things market, the use of the C/C++ language, which is the most widely used language in embedded systems, is also increasing. To improve the quality of code in the C/C++ language and reduce development costs, it is better to use static analysis, a software verification technique that can be performed in the first half of the software development life cycle. Many programs use static analysis to verify software safety and many static analysis tools are being used and studied. In this paper, we use Clang static analysis tool to check security weakness detection performance of verified test code. In addition, we compared the static analysis results of the test codes applied with the source obfuscation techniques, layout obfuscation, data obfuscation, and control flow obfuscation techniques, and the static analysis results of the original test codes, Analyze the detection ability impact of the Clang static analysis tool.

Some Structural Analysis of HAN GEUL Information Source and its Application to the Improved Coding Methed (한국어 정보원의 구조분석과 Code의 개선)

  • Lee, Ju-Geun;Park, Jong-Uk;Kim, Chang-Seon
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.15 no.2
    • /
    • pp.1-7
    • /
    • 1978
  • In this paper, a preliminary structural analysis of the information source of HANGEUL is performed statistically. And the results of the analysis are utilized to a KS HAHGEUL code, improving its transmission rate of 14%, on the basis of probability rankings of the fundamental HANGEUL elements. Forthermore Some problems about KS code, a coding method for the HAHGEUL information processing, as well as data entry are realized.

  • PDF

Necessity and adequacy of near-source factors for seismically isolated buildings

  • Saifullah, Muhammad Khalid;Alhan, Cenk
    • Earthquakes and Structures
    • /
    • v.12 no.1
    • /
    • pp.91-108
    • /
    • 2017
  • Superstructures and isolation systems of seismically isolated buildings located close to active faults may observe increased seismic demands resulting from long-period and high-amplitude velocity and displacement pulses existent in near-fault ground motions as their fundamental periods may be close to or coincident with these near-fault pulse periods. In order to take these effects into account, the 1997 Uniform Building Code (UBC97) has specified near-source factors that scale up the design spectrum depending on the closest distance to the fault, the soil type at the site, and the properties of the seismic source. Although UBC97 has been superseded by the 2015 International Building Code in the U.S.A., UBC97 near-source factors are still frequently referred in the design of seismically isolated buildings around the world. Therefore it is deemed necessary and thus set as the aim of this study to assess the necessity and the adequacy of near-source factors for seismically isolated buildings. Benchmark buildings of different heights with isolation systems of different properties are used in comparing seismic responses obtained via time history analyses using a large number of historical earthquakes with those obtained from spectral analyses using the amplified spectrums established through UBC97 near-source factors. Results show that near-source factors are necessary but inadequate for superstructure responses and somewhat unconservative for base displacement response.

A spent nuclear fuel source term calculation code BESNA with a new modified predictor-corrector scheme

  • Duy Long Ta ;Ser Gi Hong ;Dae Sik Yook
    • Nuclear Engineering and Technology
    • /
    • v.54 no.12
    • /
    • pp.4722-4730
    • /
    • 2022
  • This paper introduces a new point depletion-based source term calculation code named BESNA (Bateman Equation Solver for Nuclear Applications), which is aimed to estimate nuclide inventories and source terms from spent nuclear fuels. The BESNA code employs a new modified CE/CM (Constant Extrapolation - Constant Midpoint) predictor-corrector scheme in depletion calculations for improving computational efficiency. In this modified CE/CM scheme, the decay components leading to the large norm of the depletion matrix are excluded in the corrector, and hence the corrector calculation involves only the reaction components, which can be efficiently solved with the Talyor Expansion Method (TEM). The numerical test shows that the new scheme substantially reduces computing time without loss of accuracy in comparison with the conventional scheme using CRAM (Chebyshev Rational Approximation Method), especially when the substep calculations are applied. The depletion calculation and source term estimation capability of BESNA are verified and validated through several problems, where results from BESNA are compared with those calculated by other codes as well as measured data. The analysis results show the computational efficiency of the new modified scheme and the reliability of BESNA in both isotopic predictions and source term estimations.

Detection of Source Code Security Vulnerabilities Using code2vec Model (code2vec 모델을 활용한 소스 코드 보안 취약점 탐지)

  • Yang, Joon Hyuk;Mo, Ji Hwan;Hong, Sung Moon;Doh, Kyung-Goo
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.45-52
    • /
    • 2020
  • Traditional methods of detecting security vulnerabilities in source-code require a lot of time and effort. If there is good data, the issue could be solved by using the data with machine learning. Thus, this paper proposes a source-code vulnerability detection method based on machine learning. Our method employs the code2vec model that has been used to propose the names of methods, and uses as a data set, Juliet Test Suite that is a collection of common security vulnerabilities. The evaluation shows that our method has high precision of 97.3% and recall rates of 98.6%. And the result of detecting vulnerabilities in open source project shows hopeful potential. In addition, it is expected that further progress can be made through studies covering with vulnerabilities and languages not addressed here.

An automated memory error detection technique using source code analysis in C programs (C언어 기반 프로그램의 소스코드 분석을 이용한 메모리 접근오류 자동검출 기법)

  • Cho, Dae-Wan;Oh, Seung-Uk;Kim, Hyeon-Soo
    • The KIPS Transactions:PartD
    • /
    • v.14D no.6
    • /
    • pp.675-688
    • /
    • 2007
  • Memory access errors are frequently occurred in C programs. A number of tools and research works have been trying to detect the errors automatically. However, they have one or more of the following problems: inability to detect all memory errors, changing the memory allocation mechanism, incompatibility with libraries, and excessive performance overhead. In this paper, we suggest a new method to solve these problems, and then present a result of comparison to the previous research works through the experiments. Our approach consists of two phases. First is to transform source code at compile time through inserting instrumentation into the source code. And second is to detect memory errors at run time with a bitmap that maintains information about memory allocation. Our approach has improved the error detection abilities against the binary code analysis based ones by using the source code analysis technique, and enhanced performance in terms of both space and time, too. In addition, our approach has no problem with respect to compatibility with shared libraries as well as does not need to modify memory allocation mechanism.

Design and Implementation of Preprocessing Part for Dynamic Code Analysis (동적 코드 분석을 위한 전처리부 설계 및 구현)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.37-41
    • /
    • 2019
  • Recently, due to the appearance of various types of malware, the existing static analysis exposes many limitations. Static analysis means analyzing the structure of a code or program with source code or object code without actually executing the (malicious) code. On the other hand, dynamic analysis in the field of information security generally refers to a form that directly executes and analyzes (malware) code, and compares and examines and analyzes the state before and after execution of (malware) code to grasp the execution flow of the program. However, dynamic analysis required analyzing huge amounts of data and logs, and it was difficult to actually store all execution flows. In this paper, we propose and implement a preprocessor architecture of a system that performs malware detection and real-time multi-dynamic analysis based on 2nd generation PT in Windows environment (Windows 10 R5 and above).