• Title/Summary/Keyword: source code

Search Result 1,246, Processing Time 0.025 seconds

Neutron Calibration Field of a Bare 252Cf Source in Vietnam

  • Le, Thiem Ngoc;Tran, Hoai-Nam;Nguyen, Khai Tuan;Trinh, Giap Van
    • Nuclear Engineering and Technology
    • /
    • v.49 no.1
    • /
    • pp.277-284
    • /
    • 2017
  • This paper presents the establishment and characterization of a neutron calibration field using a bare $^{252}Cf$ source of low neutron source strength in Vietnam. The characterization of the field in terms of neutron flux spectra and neutron ambient dose equivalent rates were performed by Monte Carlo simulations using the MCNP5 code. The anisotropy effect of the source was also investigated. The neutron ambient dose equivalent rates at three reference distances of 75, 125, and 150 cm from the source were calculated and compared with the measurements using the Aloka TPS-451C neutron survey meters. The discrepancy between the calculated and measured values is found to be about 10%. To separate the scattered and the direct components from the total neutron flux spectra, an in-house shadow cone of 10% borated polyethylene was used. The shielding efficiency of the shadow cone was estimated using the MCNP5 code. The results confirmed that the shielding efficiency of the shadow cone is acceptable.

Pre/Post processor for structural analysis simulation integration with open source solver (Calculix, Code_Aster) (오픈소스 솔버(Calculix, Code_Aster)를 통합한 구조해석 시뮬레이션 전·후처리기 개발)

  • Seo, Dong-Woo;Kim, Jae-Sung;Kim, Myung-Il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.9
    • /
    • pp.425-435
    • /
    • 2017
  • Structural analysis is used not only for large enterprises, but also for small and medium sized ones, as a necessary procedure for strengthening the certification process for product delivery and shortening the time in the process from concept design to detailed design. Open-source solvers that can be used atlow cost differ from commercial solvers. If there is a problem with the input data, such as with the grid, errors or failures can occur in the calculation step. In this paper, we propose a pre- and post-processor that can be easily applied to the analysis of mechanical structural problems by using the existing structural analysis open source solver (Caculix, Code_Aster). In particular, we propose algorithms for analyzing different types of data using open source solvers in order to extract and generate accurate information,such as 3D models, grids and simulation conditions, and develop and apply information analysis. In addition, to improve the accuracy of open source solvers and to prevent errors, we created a grid that matches the solver characteristics and developed an automatic healing function for the grid model. Finally, to verify the accuracy of the system, the verification and utilization results are compared with the software used.

A Study on the Improvement of Source Code Static Analysis Using Machine Learning (기계학습을 이용한 소스코드 정적 분석 개선에 관한 연구)

  • Park, Yang-Hwan;Choi, Jin-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1131-1139
    • /
    • 2020
  • The static analysis of the source code is to find the remaining security weaknesses for a wide range of source codes. The static analysis tool is used to check the result, and the static analysis expert performs spying and false detection analysis on the result. In this process, the amount of analysis is large and the rate of false positives is high, so a lot of time and effort is required, and a method of efficient analysis is required. In addition, it is rare for experts to analyze only the source code of the line where the defect occurred when performing positive/false detection analysis. Depending on the type of defect, the surrounding source code is analyzed together and the final analysis result is delivered. In order to solve the difficulty of experts discriminating positive and false positives using these static analysis tools, this paper proposes a method of determining whether or not the security weakness found by the static analysis tools is a spy detection through artificial intelligence rather than an expert. In addition, the optimal size was confirmed through an experiment to see how the size of the training data (source code around the defects) used for such machine learning affects the performance. This result is expected to help the static analysis expert's job of classifying positive and false positives after static analysis.

Which Code Changes Should You Review First?: A Code Review Tool to Summarize and Prioritize Important Software Changes

  • Song, Myoungkyu;Kwon, Young-Woo
    • Journal of Multimedia Information System
    • /
    • v.4 no.4
    • /
    • pp.255-262
    • /
    • 2017
  • In recent software development, repetitive code fragments (i.e., clones) are common due to the copy-and-paste programming practice, the framework-based development, or the reuse of same design patterns. Such similar code fragments are likely to introduce more bugs but are easily disregarded by a code reviewer or a programmer. In this paper, we present a code review tool to help code reviewers identify important code changes written by other programmers and recommend which changes need to be reviewed first. Specifically, to identify important code changes, our approach detects code clones across revisions and investigates them. Then, to help a code reviewer, our approach ranks the identified changes in accordance with several software quality metrics and statistics on those clones and changes. Furthermore, our approach allows the code reviewer to express their preferences during code review time. As a result, the code reviewer who has little knowledge of a code base can reduce his or her effort by reviewing the most significant changes that require an instant attention. To evaluate our approach, we integrated our approach with a modern IDE (e.g., Eclipse) as a plugin and then analyzed two third-party open source projects. The experimental results indicate that our approach can improve code reviewer's productivity.

Warning Classification Method Based On Artificial Neural Network Using Topics of Source Code (소스코드 주제를 이용한 인공신경망 기반 경고 분류 방법)

  • Lee, Jung-Been
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.11
    • /
    • pp.273-280
    • /
    • 2020
  • Automatic Static Analysis Tools help developers to quickly find potential defects in source code with less effort. However, the tools reports a large number of false positive warnings which do not have to fix. In our study, we proposed an artificial neural network-based warning classification method using topic models of source code blocks. We collect revisions for fixing bugs from software change management (SCM) system and extract code blocks modified by developers. In deep learning stage, topic distribution values of the code blocks and the binary data that present the warning removal in the blocks are used as input and target data in an simple artificial neural network, respectively. In our experimental results, our warning classification model based on neural network shows very high performance to predict label of warnings such as true or false positive.

Performance Improvement of Cumulus Parameterization Code by Unicon Optimization Scheme (Unicon Optimization 기법을 이용한 적운모수화 코드 성능 향상)

  • Lee, Chang-Hyun;kim, Min-gyu;Shin, Dae-Yeong;Cho, Ye-Rin;Yeom, Gi-Hun;Chung, Sung-Wook
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.2
    • /
    • pp.124-133
    • /
    • 2022
  • With the development of hardware technology and the advancement of numerical model methods, more precise weather forecasts can be carried out. In this paper, we propose a Unicon Optimization scheme combining Loop Vectorization, Dependency Vectorization, and Code Modernization to optimize and increase Maintainability the Unicon source contained in SCAM, a simplified version of CESM, and present an overall SCAM structure. This paper tested the unicorn optimization scheme in the SCAM structure, and compared to the existing source code, the loop vectorization resulted in a performance improvement of 3.086% and the dependency vectorization of 0.4572%. And in the case of Unicorn Optimization, which applied all of these, the performance improvement was 3.457% compared to the existing source code. This proves that the Unicorn Optimization technique proposed in this paper provides excellent performance.

Some Structural Analysis of HAN GEUL Information Source and its Application to the Improved Coding Methed (한국어 정보원의 구조분석과 Code의 개선)

  • Lee, Ju-Geun;Park, Jong-Uk;Kim, Chang-Seon
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.15 no.2
    • /
    • pp.1-7
    • /
    • 1978
  • In this paper, a preliminary structural analysis of the information source of HANGEUL is performed statistically. And the results of the analysis are utilized to a KS HAHGEUL code, improving its transmission rate of 14%, on the basis of probability rankings of the fundamental HANGEUL elements. Forthermore Some problems about KS code, a coding method for the HAHGEUL information processing, as well as data entry are realized.

  • PDF

Automatic ray-code generation for efficient ray tracing (효율적인 파선추적을 위한 파선코드 자동 생성에 관한 연구)

  • 이희일
    • Proceedings of the Earthquake Engineering Society of Korea Conference
    • /
    • 2000.04a
    • /
    • pp.55-62
    • /
    • 2000
  • In constructing a synthetic seismogram using ray-tracing method a suite of ray-code is required to obtain a realistic seismogram which is similar to the actual seismogram or earthquake record under consideration. An infinite number of rays exist for any arbitrarily located source and receiver. One select only a finite number of such rays in computing a synthetic seismogram so their selection becomes important to the validity of the seismogram being generated. Missing certain important rays or an inappropriate selection of ray-codes in tracing rays may result in wrong interpretation of the earthquake record or seismogram. Automatic ray-code generation will eliminate such problems. In this study we have developed an efficient algorithm, with which one can generate systemastically all the ray-codes connecting source and receiver arbitrarily located. The result of this work will helpful in analysing multiple reflections in seismic data processing as well as simulating Lg wave and multiply reflected or converted phases in earthquake study.

  • PDF

Development of the Lighting System Design Code for Computer Vision (컴퓨터 비전용 조명 시스템 설계 코드 개발)

  • Ahn, In-Mo;Lee, Kee-Sang
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.51 no.11
    • /
    • pp.514-520
    • /
    • 2002
  • n industrial computer vision systems, the image quality is dependent on the parameters such as light source, illumination method, optics, and surface properties. Most of them are related with the lighting system, which is designed in heuristic based on the designer's experimental knowledge. In this paper, a design code by which the optimal lighting method and light source for computer vision systems can be found are suggested based on experimental results. The design coed is applied to the design of the lighting system for the transistor marking inspection system, and the overall performance of the machine vision system with the lighting system show the effectiveness of the proposed design code.

Error Recovery Script of Immunity Debugger for C# .NET Applications

  • Shinde, Rupali;Choi, Min;Lee, Su-Hyun
    • Journal of Information Processing Systems
    • /
    • v.15 no.6
    • /
    • pp.1438-1448
    • /
    • 2019
  • We present a new technique, called VED (very effective debugging), for detecting and correcting division by zero errors for all types of .NET application. We use applications written in C# because C# applications are distributed through the internet and its executable format is used extensively. A tool called Immunity Debugger is used to reverse engineer executable code to get binaries of source code. With this technique, we demonstrate integer division by zero errors, the location of the error causing assembly language code, as well as error recovery done according to user preference. This technique can be extended to work for other programming languages in addition to C#. VED can work on different platforms such as Linux. This technique is simple to implement and economical because all the software used here are open source. Our aims are to simplify the maintenance process and to reduce the cost of the software development life cycle.