• Title/Summary/Keyword: source code level

Search Result 158, Processing Time 0.02 seconds

Performance Improvements of SCAM Climate Model using LAPACK BLAS Library (SCAM 기상모델의 성능향상을 위한 LAPACK BLAS 라이브러리의 활용)

  • Dae-Yeong Shin;Ye-Rin Cho;Sung-Wook Chung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.1
    • /
    • pp.33-40
    • /
    • 2023
  • With the development of supercomputing technology and hardware technology, numerical computation methods are also being advanced. Accordingly, improved weather prediction becomes possible. In this paper, we propose to apply the LAPACK(Linear Algebra PACKage) BLAS(Basic Linear Algebra Subprograms) library to the linear algebraic numerical computation part within the source code to improve the performance of the cumulative parametric code, Unicon(A Unified Convection Scheme), which is included in SCAM(Single-Columns Atmospheric Model, simplified version of CESM(Community Earth System Model)) and performs standby operations. In order to analyze this, an overall execution structure diagram of SCAM was presented and a test was conducted in the relevant execution environment. Compared to the existing source code, the SCOPY function achieved 0.4053% performance improvement, the DSCAL function 0.7812%, and the DDOT function 0.0469%, and all of them showed a 0.8537% performance improvement. This means that the LAPACK BLAS application method, a library for high-density linear algebra operations proposed in this paper, can improve performance without additional hardware intervention in the same CPU environment.

Shielding analyses supporting the Lithium loop design and safety assessments in IFMIF-DONES

  • Gediminas Stankunas ;Yuefeng Qiu ;Francesco Saverio Nitti ;Juan Carlos Marugan
    • Nuclear Engineering and Technology
    • /
    • v.55 no.4
    • /
    • pp.1210-1217
    • /
    • 2023
  • The assessment of radiation fields in the lithium loop pipes and dump tank during the operation were performed for International Fusion Materials Irradiation Facility - DEMO-Oriented NEutron Source (IFMIF-DONES) in order to obtain the radiation dose-rate maps in the component surroundings. Variance reduction techniques such as weight window mesh (produced with the ADVANTG code) were applied to bring the statistical uncertainty down to a reasonable level. The biological dose was given in the study, and potential shielding optimization is suggested and more thoroughly evaluated. The MCNP Monte Carlo was used to simulate a gamma particle transport for radiation shielding purposes for the current Li Systems' design. In addition, the shielding efficiency was identified for the Impurity Control System components and the dump tank. The analysis reported in this paper takes into account the radiation decay source from and activated corrosion products (ACPs), which is created by d-Li interaction. As a consequence, the radiation (resulting from ACPs and Be-7) shielding calculations have been carried out for safety considerations.

Transformation Method for a State Machine to Increase Code Coverage (코드 커버리지를 높이기 위한 상태 머신 변환 방법)

  • Yoon, YoungDong;Choi, HyunJae;Chae, HeungSeok
    • Journal of KIISE
    • /
    • v.43 no.9
    • /
    • pp.953-962
    • /
    • 2016
  • Model-based testing is a technique for performing the test by using a model that represents the behavior of the system as a system specification. Industrial domains such as automotive, military/aerospace, medical, railway and nuclear power generation require model-based testing and code coverage-based testing to improve the quality of software. Despite the fact that both model-based testing and code coverage-based testing are required, difficulty in achieving a high coverage using model-based testing caused by the abstraction level difference between the test model and the source code, results in the need for performing model-based testing separately. In this study, to overcome the limitations of the existing model-based testing, we proposed the state machine transformation method to effectively improve the code coverage using the protocol state machine, one of the typical modeling methods is used as the test model in model-based testing, as the test model. In addition, we performed a case study of both systems and analyzed the effectiveness of the proposed method.

Design and Implementation of Framework for Static Execution Flow Trace of Binary Codes (이진 코드의 정적 실행 흐름 추적을 위한 프레임워크 설계 및 구현)

  • Baek, Yeong-Tae;Kim, Ki-Tae;Jun, Sang-Pyo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.6
    • /
    • pp.51-59
    • /
    • 2011
  • In domestic, the binary code analysis technology is insufficient. In general, an executable file that is installed on your computer without the source code into an executable binary files is given only the most dangerous, or because it is unknown if the action is to occur. In this paper, static program analysis at the binary level to perform the design and implementation framework. In this paper, we create a control flow graph. We use the graph of the function call and determine whether dangerous. Through Framework, analysis of binary files is easy.

A Study on the VHDL Code Generation Algorithm by the Asynchronous Sequential Waveform Flow Chart Conversion (비동기 순차회로 파형의 흐름도 변환에 의한 VHDL 코드 생성 알고리즘에 관한 연구)

  • 우경환;이용희;임태영;이천희
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2001.05a
    • /
    • pp.82-87
    • /
    • 2001
  • In this paper we described the generation method of interface logic which can be replace between IP and IP handshaking signal with asynchronous logic circuit. Especially, we suggest the new \"Waveform Conversion Algorithm : Wave2VHDL\", if only mixed asynchronous timing waveform suggested which level type input and pulse type input for handshaking, we can convert waveform to flowchart and then replaced with VHDL code according to converted flowchart. Also, we assure that asynchronous electronic circuits for IP interface are generated by applying extracted VHDL source code from suggested algorithm to conventional domestic/abroad CAD Tool, and then we proved that coincidence simulation result and suggested timing diagram.g diagram.

  • PDF

Post-earthquake warning for Vrancea seismic source based on code spectral acceleration exceedance

  • Balan, Stefan F.;Tiganescu, Alexandru;Apostol, Bogdan F.;Danet, Anton
    • Earthquakes and Structures
    • /
    • v.17 no.4
    • /
    • pp.365-372
    • /
    • 2019
  • Post-earthquake crisis management is a key capability for a country to be able to recover after a major seismic event. Instrumental seismic data transmitted and processed in a very short time can contribute to better management of the emergency and can give insights on the earthquake's impact on a specific area. Romania is a country with a high seismic hazard, mostly due to the Vrancea intermediate-depth earthquakes. The elastic acceleration response spectrum of a seismic motion provides important information on the level of maximum acceleration the buildings were subjected to. Based on new data analysis and knowledge advancements, the acceleration elastic response spectrum for horizontal ground components recommended by the Romanian seismic codes has been evolving over the last six decades. This study aims to propose a framework for post-earthquake warning based on code spectrum exceedances. A comprehensive background analysis was undertaken using strong motion data from previous earthquakes corroborated with observational damage, to prove the method's applicability. Moreover, a case-study for two densely populated Romanian cities (Focsani and Bucharest) is presented, using data from a $5.5M_W$ earthquake (October 28, 2018) and considering the evolution of the three generations of code-based spectral levels for the two cities. Data recorded in free-field and in buildings were analyzed and has confirmed that no structural damage occurred within the two cities. For future strong seismic events, this tool can provide useful information on the effect of the earthquake on structures in the most exposed areas.

WACFI: Code Instrumentation Technique for Protection of Indirect Call in WebAssembly (WACFI: 웹 어셈블리에서의 간접호출 명령어 보호를 위한 코드 계측 기술)

  • Chang, Yoonsoo;Kim, Youngju;Kwon, Donghyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.753-762
    • /
    • 2021
  • WebAssembly(WASM) is a low-level instruction format that can be run in a web environment. Since WASM has a excellent performance, various web applications use webassembly. However, according to our security analysis WASM has a security pitfall related to control flow integrity (CFI) for indirect calls. To address the problem in this paper we propose a new code instrumentation scheme to protect indirect calls, named WACFI. Specifically WACFI enhances a CFI technique for indirect call in WASM based on source code anlysis and binary instrumentation. To test the feasibility of WACFI, we applied WACFI to a sound-encoding application. According to our experimental results WACFI only adds 2.75% overhead on the execution time while protecting indirect calls safely.

A Study on Recovery of Design Information Using A Reverse Engineering (역공학 기법을 적용한 설계정보의 회복에 관한 연구)

  • 서민호
    • Journal of the Korea Society of Computer and Information
    • /
    • v.1 no.1
    • /
    • pp.105-128
    • /
    • 1996
  • The maintenance cost accounts for over a half of all software costs. Maintenance tools can be used to reduce It. All other maintenance techniques. reverse engineering Is a process of analyzing source code to extract design information and to create representation of it In another form or at the higher level of abstraction. In this thesis. we propose a method to extract the call relationships among programs. the logic structure In program and the data flow of programs iron COBOL source Programs using reverse engineering. We also present a method to generate the structure chart of programs and modules. The structure chart generated from source code provides very important information to understand programs In details. The structure chart modified will be more helpful the maintainer to understand programs when he analyzes them later or others analyze them.

  • PDF

Verification of MCNP/ORIGEN-2 Model and Preliminary Radiation Source Term Evaluation of Wolsung Unit 1 (월성 1호기 MCNP/ORIGEN-2 모델 검증 및 예비 선원항 계산)

  • Noh, Kyoungho;Hah, Chang Joo
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.13 no.1
    • /
    • pp.21-34
    • /
    • 2015
  • Source term analysis should be carried out to prepare the decommissioning of the nuclear power plant. In the planning phase of decommissioning, the classification of decommissioning wastes and the cost evaluation are performed based on the results of source term analysis. In this study, the verification of MCNP/ORIGEN-2 model is carried out for preliminary source term calculation for Wolsung Unit 1. The inventories of actinide nuclides and fission products in fuel bundles with different burn-up were obtained by the depletion calculation of MCNPX code modelling the single channel. Two factors affecting the accuracy of source terms were investigated. First, the neutron spectrum effect on neutron induced activation calculation was reflected in one-group microscopic cross-sections of relevant radio-isotopes using the results of MCNP simulation, and the activation source terms calculated by ORIGEN-2 using the neutron spectrum corrected library were compared with the results of the original ORIGEN-2 library (CANDUNAU.LIB) in ORIGEN-2 code package. Second, operation history effect on activation calculation was also investigated. The source terms on both pressure tubes and calandria tubes replaced in 2010 and calandria tank were evaluated using MCNP/ORIGEN-2 with the neutron spectrum corrected library if the decommissioning wastes can be classified as a low level waste.

Multi-unit Level 2 probabilistic safety assessment: Approaches and their application to a six-unit nuclear power plant site

  • Cho, Jaehyun;Han, Sang Hoon;Kim, Dong-San;Lim, Ho-Gon
    • Nuclear Engineering and Technology
    • /
    • v.50 no.8
    • /
    • pp.1234-1245
    • /
    • 2018
  • The risk of multi-unit nuclear power plants (NPPs) at a site has received considerable critical attention recently. However, current probabilistic safety assessment (PSA) procedures and computer code do not support multi-unit PSA because the traditional PSA structure is mostly used for the quantification of single-unit NPP risk. In this study, the main purpose is to develop a multi-unit Level 2 PSA method and apply it to full-power operating six-unit OPR1000. Multi-unit Level 2 PSA method consists of three steps: (1) development of single-unit Level 2 PSA; (2) extracting the mapping data from plant damage state to source term category; and (3) combining multi-unit Level 1 PSA results and mapping fractions. By applying developed multi-unit Level 2 PSA method into six-unit OPR1000, site containment failure probabilities in case of loss of ultimate heat sink, loss of off-site power, tsunami, and seismic event were quantified.