• Title/Summary/Keyword: Source Code Analysis

Search Result 437, Processing Time 0.022 seconds

a Study on Heat Source Equations for the Prediction of Weld Shape in Laser Micro-welding (미세 레이저 용접에서 용융부 형상예측을 위한 열원의 방정식에 관한 연구)

  • 장원석;나석주
    • Journal of Welding and Joining
    • /
    • v.18 no.4
    • /
    • pp.76-81
    • /
    • 2000
  • In this research, various heat source equations that have been proposed in previous study were calculated and compared with new model in various laser parameters. This is to treat the problem of predicting, by numerical analysis, the thermo-mechanical behaviors of laser spot welding for thin stainless steel plates. A finite element code, ABAQUS is used for the heat transfer analysis with a three-dimensional plane assumption. Experimental studies if the laser spot welding have also bee conducted to validate the numerical models presented. The results suggest that temperature profiles and weld dimensions are varied according to the heat source of the laser beam. For this reason, it is essential to incorporate an accurate description of the heat source.

  • PDF

Application Consideration of Machine Learning Techniques in Satellite Systems

  • Jin-keun Hong
    • International journal of advanced smart convergence
    • /
    • v.13 no.2
    • /
    • pp.48-60
    • /
    • 2024
  • With the exponential growth of satellite data utilization, machine learning has become pivotal in enhancing innovation and cybersecurity in satellite systems. This paper investigates the role of machine learning techniques in identifying and mitigating vulnerabilities and code smells within satellite software. We explore satellite system architecture and survey applications like vulnerability analysis, source code refactoring, and security flaw detection, emphasizing feature extraction methodologies such as Abstract Syntax Trees (AST) and Control Flow Graphs (CFG). We present practical examples of feature extraction and training models using machine learning techniques like Random Forests, Support Vector Machines, and Gradient Boosting. Additionally, we review open-access satellite datasets and address prevalent code smells through systematic refactoring solutions. By integrating continuous code review and refactoring into satellite software development, this research aims to improve maintainability, scalability, and cybersecurity, providing novel insights for the advancement of satellite software development and security. The value of this paper lies in its focus on addressing the identification of vulnerabilities and resolution of code smells in satellite software. In terms of the authors' contributions, we detail methods for applying machine learning to identify potential vulnerabilities and code smells in satellite software. Furthermore, the study presents techniques for feature extraction and model training, utilizing Abstract Syntax Trees (AST) and Control Flow Graphs (CFG) to extract relevant features for machine learning training. Regarding the results, we discuss the analysis of vulnerabilities, the identification of code smells, maintenance, and security enhancement through practical examples. This underscores the significant improvement in the maintainability and scalability of satellite software through continuous code review and refactoring.

Similarity Evaluation and Analysis of Source Code Materials for SOC System in IoT Devices (사물인터넷 디바이스의 집적회로 목적물과 소스코드의 유사성 분석 및 동일성)

  • Kim, Do-Hyeun;Lee, Kyu-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.55-62
    • /
    • 2019
  • The needs for small size and low power consumption of information devices is being implemented with SOC technology that implements the program on a single chip in Internet of Thing. Copyright disputes due to piracy are increasing in semiconductor chips as well, arising from disputes in the chip implementation of the design house and chip implementation by the illegal use of the source code. However, since the final chip implementation is made in the design house, it is difficult to protect the copyright. In this paper, we deal with the analysis method for extracting similarity and the criteria for setting similarity judgment in the dispute of source code written in HDL language. Especially, the chip which is manufactured based on the same specification will be divided into the same configuration and the code type.

Quality Visualization of Quality Metric Indicators based on Table Normalization of Static Code Building Information (정적 코드 내부 정보의 테이블 정규화를 통한 품질 메트릭 지표들의 가시화를 위한 추출 메커니즘)

  • Chansol Park;So Young Moon;R. Young Chul Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.5
    • /
    • pp.199-206
    • /
    • 2023
  • The current software becomes the huge size of source codes. Therefore it is increasing the importance and necessity of static analysis for high-quality product. With static analysis of the code, it needs to identify the defect and complexity of the code. Through visualizing these problems, we make it guild for developers and stakeholders to understand these problems in the source codes. Our previous visualization research focused only on the process of storing information of the results of static analysis into the Database tables, querying the calculations for quality indicators (CK Metrics, Coupling, Number of function calls, Bad-smell), and then finally visualizing the extracted information. This approach has some limitations in that it takes a lot of time and space to analyze a code using information extracted from it through static analysis. That is since the tables are not normalized, it may occur to spend space and time when the tables(classes, functions, attributes, Etc.) are joined to extract information inside the code. To solve these problems, we propose a regularized design of the database tables, an extraction mechanism for quality metric indicators inside the code, and then a visualization with the extracted quality indicators on the code. Through this mechanism, we expect that the code visualization process will be optimized and that developers will be able to guide the modules that need refactoring. In the future, we will conduct learning of some parts of this process.

A Study of Action Research Analysis Methods Model of Backdoor Behavior based on Operating Mechanism Diagnosis (동작 메커니즘 진단을 기반으로 한 백도어(backdoor) 행동분석 방법 모델 연구)

  • Na, SangYeob;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.17-24
    • /
    • 2014
  • Form of backdoor penetration attacks "trapdoor" penetration points to bypass the security features and allow direct access to the data. Backdoor without modifying the source code is available, and even code generation can also be modified after compilation. This approach by rewriting the compiler when you compile the source code to insert a specific area in the back door can be due to the use of the method. Defense operations and the basic structure of the backdoor or off depending on the nature of the damage area can be a little different way. This study is based on the diagnosis of a back door operating mechanism acting backdoor analysis methods derived. Research purposes in advance of the attack patterns of malicious code can respond in a way that is intended to be developed. If we identify the structures of backdoor and the infections patterns through the analysis, in the future we can secure the useful information about malicious behaviors corresponding to hacking attacks.

A design of the PSDG based semantic slicing model for software maintenance (소프트웨어의 유지보수를 위한 PSDG기반 의미분할모형의 설계)

  • Yeo, Ho-Young;Lee, Kee-O;Rhew, Sung-Yul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.8
    • /
    • pp.2041-2049
    • /
    • 1998
  • This paper suggests a technique for program segmentation and maintenance using PSDG(Post-State Dependency Graph) that improves the quality of a software by identifying and detecting defects in already fixed source code. A program segmentation is performed by utilizing source code analysis which combines the measures of static, dynamic and semantic slicing when we need understandability of defect in programs for corrective maintanence. It provides users with a segmental principle to split a program by tracing state dependency of a source code with the graph, and clustering and highlighting, Through a modeling of the PSDG, elimination of ineffective program deadcode and generalization of related program segments arc possible, Additionally, it can be correlated with other design modeb as STD(State Transition Diagram), also be used as design documents.

  • PDF

A Comparative Analysis of Domestic and Foreign Standards to Improve the Performance of Zone Smoke Control System (거실 제연설비 성능 개선을 위한 국내·외 기준 비교 분석에 관한 연구)

  • Huh, Ye-Rim;Kim, Yoon-Seong;Kim, Hye-won;Jin, Seung-Hyeon;Kwon, Young-Jin
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2022.04a
    • /
    • pp.83-84
    • /
    • 2022
  • In Korea, smoke control measures through NFSC 501 are proposed to reduce human casualties caused by smoke in the event of a fire. However, as a result of investigating and analyzing domestic and foreign standards, it was found that domestic regulations do not set fire source, but simply set smoke emissions by floor area or height of smoke boundary. Foreign regulations set fire source. Therefore, it is judged that it is necessary to review whether the current domestic regulations can be applied in the event of an actual building fire. So, this paper aims to identify the differences in domestic and foreign standards through investigation and analysis of related standards for fire zone smoke control system in each country and use them as basic data to improve the performance of zone smoke control system.

  • PDF

Development of the Helicopter Noise Prediction Code and its Applications (헬리콥터 소음 예측 코드 개발 및 적용사례)

  • Wie, Seong-Yong;Kim, Do-Hyung;Kang, Hee Jung;Chung, Ki-Hoon;Hwang, Changjeon
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2014.10a
    • /
    • pp.904-910
    • /
    • 2014
  • The Helicopter noise analysis code was developed using Farassat's Formular 1A based on Ffowcs-Williams and Hawkings equation and Lowson's Formula which contains single loading noise source concept. HART-II(Higher harmonic control Aeroacoustic Rotor Test), STAR(Smart-Twisting Active Rotor) and Active-tab Rotor were computed and analyzed by using developed noise code. The results of these rotor noise prediction are explained and its applicability would be mentioned in this paper.

  • PDF

A Combined Procedure of RSM and LHS for Uncertainty Analyses of CsI Release Fraction Under a Hypothetical Severe Accident Sequence of Station Blackout at Younggwang Nuclear Power Plant Using MAAP3.0B Code

  • Han, Seok-Jung;Tak, Nam-Il;Chun, Moon-Hyun
    • Nuclear Engineering and Technology
    • /
    • v.28 no.6
    • /
    • pp.507-521
    • /
    • 1996
  • Quantification of uncertainties in the source term estimations by a large computer code, such as MELCOR and MAAP, is an essential process of the current Probabilistic safety assessment. The main objective of the present study is to investigate the applicability of a combined procedure of the response surface method (RSM) based on input determined from a statistical design and the Latin hypercube sampling (LHS) technique for the uncertainty analysis of CsI release fractions under a Hypothetical severe accident sequence of a station blackout at Younggwang nuclear power plant using MAAP3. OB code as a benchmark problem. On the basis of the results obtained in the present work, the RSM is recommended to be used as a principal tool for an overall uncertainty analysis in source term quantifications, while using the LHS in the calculations of standardized regression coefficients (SRC) and standardized rank regression coefficient (SRRC) to determine the subset of the most important input parameters in the final screening step and to check the cumulative distribution functions obtained by RSM. Verification of the response surface model for its sufficient accuracy is a prerequisite for the reliability of the final results that can be obtained by the combined procedure proposed in the present work.

  • PDF

Development of Galerkin Finite Element Method Three-dimensional Computational Code for the Multigroup Neutron Diffusion Equation with Unstructured Tetrahedron Elements

  • Hosseini, Seyed Abolfazl
    • Nuclear Engineering and Technology
    • /
    • v.48 no.1
    • /
    • pp.43-54
    • /
    • 2016
  • In the present paper, development of the three-dimensional (3D) computational code based on Galerkin finite element method (GFEM) for solving the multigroup forward/adjoint diffusion equation in both rectangular and hexagonal geometries is reported. Linear approximation of shape functions in the GFEM with unstructured tetrahedron elements is used in the calculation. Both criticality and fixed source calculations may be performed using the developed GFEM-3D computational code. An acceptable level of accuracy at a low computational cost is the main advantage of applying the unstructured tetrahedron elements. The unstructured tetrahedron elements generated with Gambit software are used in the GFEM-3D computational code through a developed interface. The forward/adjoint multiplication factor, forward/adjoint flux distribution, and power distribution in the reactor core are calculated using the power iteration method. Criticality calculations are benchmarked against the valid solution of the neutron diffusion equation for International Atomic Energy Agency (IAEA)-3D and Water-Water Energetic Reactor (VVER)-1000 reactor cores. In addition, validation of the calculations against the $P_1$ approximation of the transport theory is investigated in relation to the liquid metal fast breeder reactor benchmark problem. The neutron fixed source calculations are benchmarked through a comparison with the results obtained from similar computational codes. Finally, an analysis of the sensitivity of calculations to the number of elements is performed.