• Title/Summary/Keyword: source code level

Search Result 157, Processing Time 0.027 seconds

High performance 3D pin-by-pin neutron diffusion calculation based on 2D/1D decoupling method for accurate pin power estimation

  • Yoon, Jooil;Lee, Hyun Chul;Joo, Han Gyu;Kim, Hyeong Seog
    • Nuclear Engineering and Technology
    • /
    • v.53 no.11
    • /
    • pp.3543-3562
    • /
    • 2021
  • The methods and performance of a 3D pin-by-pin neutronics code based on the 2D/1D decoupling method are presented. The code was newly developed as an effort to achieve enhanced accuracy and high calculation performance that are sufficient for the use in practical nuclear design analyses. From the 3D diffusion-based finite difference method (FDM) formulation, decoupled planar formulations are established by treating pre-determined axial leakage as a source term. The decoupled axial problems are formulated with the radial leakage source term. To accelerate the pin-by-pin calculation, the two-level coarse mesh finite difference (CMFD) formulation, which consists of the multigroup node-wise CMFD and the two-group assembly-wise CMFD is implemented. To enhance the accuracy, both the discontinuity factor method and the super-homogenization (SPH) factor method are examined for pin-wise cross-section homogenization. The parallelization is achieved with the OpenMP package. The accuracy and performance of the pin-by-pin calculations are assessed with the VERA and APR1400 benchmark problems. It is demonstrated that pin-by-pin 2D/1D alternating calculations within the two-level 3D CMFD framework yield accurate solutions in about 30 s for the typical commercial core problems, on a parallel platform employing 32 threads.

Interfacing between MAAP and MACCS to perform radiological consequence analysis

  • Kim, Sung-yeop;Lee, Keo-hyoung;Park, Soo-Yong;Han, Seok-Jung;Ahn, Kwang-Il;Hwang, Seok-Won
    • Nuclear Engineering and Technology
    • /
    • v.54 no.4
    • /
    • pp.1516-1525
    • /
    • 2022
  • Interfacing the output of severe accident analysis with the input of radiological consequence analysis is an important and mandatory procedure at the beginning of Level 3 PSA. Such interfacing between the severe accident analysis code MELCOR and MACCS, one of the most commonly used consequence analysis codes, is relatively tractable since they share the same chemical groups, and the related interfacing software, MelMACCS, has already been developed. However, the linking between MAAP, another frequently used code for severe accident analyses, and MACCS has difficulties because MAAP employs a different chemical grouping method than MACCS historically did. More specifically, MAAP groups by chemical compound, while MACCS groups by chemical element. An appropriate interfacing method between MAAP and MACCS has therefore long been requested by users. This study suggests a way of extracting relevant information from MAAP results and providing proper source term information to MACCS by an appropriate treatment. Various parameters are covered in terms of magnitude and manner of release in this study, and special treatment is made for a bypass scenario. It is expected that the suggested approach will provide an important contribution as a guide to interface MAAP and MACCS when performing radiological consequence analyses.

Goal-oriented multi-collision source algorithm for discrete ordinates transport calculation

  • Wang, Xinyu;Zhang, Bin;Chen, Yixue
    • Nuclear Engineering and Technology
    • /
    • v.54 no.7
    • /
    • pp.2625-2634
    • /
    • 2022
  • Discretization errors are extremely challenging conundrums of discrete ordinates calculations for radiation transport problems with void regions. In previous work, we have presented a multi-collision source method (MCS) to overcome discretization errors, but the efficiency needs to be improved. This paper proposes a goal-oriented algorithm for the MCS method to adaptively determine the partitioning of the geometry and dynamically change the angular quadrature in remaining iterations. The importance factor based on the adjoint transport calculation obtains the response function to get a problem-dependent, goal-oriented spatial decomposition. The difference in the scalar fluxes from one high-order quadrature set to a lower one provides the error estimation as a driving force behind the dynamic quadrature. The goal-oriented algorithm allows optimizing by using ray-tracing technology or high-order quadrature sets in the first few iterations and arranging the integration order of the remaining iterations from high to low. The algorithm has been implemented in the 3D transport code ARES and was tested on the Kobayashi benchmarks. The numerical results show a reduction in computation time on these problems for the same desired level of accuracy as compared to the standard ARES code, and it has clear advantages over the traditional MCS method in solving radiation transport problems with reflective boundary conditions.

A Study on the Interface Circuit Creation Algorithm using the Flow Chart (흐름도를 이용한 인터페이스 회로 생성 알고리즘에 관한 연구)

  • 우경환;이천희
    • Journal of the Korea Society for Simulation
    • /
    • v.10 no.1
    • /
    • pp.25-34
    • /
    • 2001
  • In this paper, we describe the generation method of interface logic which replace between IP & IP handshaking signal with asynchronous logic circuit. Especially, we suggest the new asynchronous sequential "Waveform to VHDL" code creation algorithm by flow chart conversion : Wave2VHDL - if only mixed asynchronous timing waveform is presented the level type input and pulse type input for handshaking, we convert waveform to flowchart and then replace with VHDL code according to converted flowchart. Also, we confirmed that asynchronous electronic circuits are created by applying extracted VHDL source code from suggest algorithm to conventional domestic/abroad CAD Tool, Finally, we assured the simulation result and the suggest timing diagram are identical.

  • PDF

Performance Based Design of Passive Fire Protection Using Consequence Analysis (사고 영향 분석을 이용한 성능위주의 내화설계)

  • Han, Dong-Hoon;Lee, Jong-Ho
    • Journal of the Korean Society of Safety
    • /
    • v.19 no.1
    • /
    • pp.102-107
    • /
    • 2004
  • Performance based design is a recent evolutionary step in the process of designing fire protection systems. In essence, it is a logical design process resulting in a solution that achieves a specified performance. Sometimes the prescriptive solutions presented in various codes and standards are too expensive or inflexible. Often the solutions do not and enables optimization of a solution for cost and function. In this study, performance based design was carried out to determine the extent of passive fire protection for oil terminal facilities. The results of performance based design were compared with those of prescriptive code based design. Performance based design is not always more economic than prescriptive code based design but provides more reliable and effective design that is fit for the purpose.

Quality Management Model for Process Performance Level and Development Technology (프로세스 이행 수준과 개발 기술 품질 관리 모델)

  • Park, J.H.;Park, Y.S.;Jung, H.T.;Kim, S.H.
    • Electronics and Telecommunications Trends
    • /
    • v.32 no.6
    • /
    • pp.105-115
    • /
    • 2017
  • This paper describes a project - based quality management model that identifies development technologies and codes while at the same time verifying the ability to implement processes that are essential in R & D projects. In order to verify the process implemented in the R & D project implementation, there are review, checking points, and evaluating methods the process performance levels for five processes such as defining requirements which is the beginning stage of system development, testing process which is the completion stage of system development, and project management and peer review process for project management and support in the proposed project-based quality management model. For development technology and code validation, the model included the documented test cases for each requirement by the developer in the requirements definition stage, debugging and testing in the design and implementation stages, static analysis and open source licence verification procedure, and system environment. After applying the model in SW development R&D project for evaluating the process performance, and verifying the development technology and the code, the developers responded that the improvement in the development technique and the code, and upgrade of process performance level for project are more than 10%.

A study on Dirty Pipe Linux vulnerability

  • Tanwar, Saurav;Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.17-21
    • /
    • 2022
  • In this study, we wanted to examine the new vulnerability 'Dirty Pipe' that is founded in Linux kernel. how it's exploited and what is the limitation, where it's existed, and overcome techniques and analysis of the Linux kernel package. The study of the method used the hmark[1] program to check the vulnerabilities. Hmark is a whitebox testing tool that helps to analyze the vulnerability based on static whitebox testing and automated verification. For this purpose of our study, we analyzed Linux kernel code that is downloaded from an open-source website. Then by analyzing the hmark tool results, we identified in which file of the kernel it exists, cvss level, statistically depicted vulnerabilities on graph which is easy to understand. Furthermore, we will talk about some software we can use to analyze a vulnerability and how hmark software works. In the case of the Dirty Pipe vulnerability in Linux allows non-privileged users to execute malicious code capable of a host of destructive actions including installing backdoors into the system, injecting code into scripts, altering binaries used by elevated programs, and creating unauthorized user profiles. This bug is being tracked as CVE-2022-0847 and has been termed "Dirty Pipe"[2] since it bears a close resemblance to Dirty Cow[3], and easily exploitable Linux vulnerability from 2016 which granted a bad actor an identical level of privileges and powers.

A Numerical Study on Analysis of Low Frequency Aero-acoustic Noise for a HAWT of NREL Phase VI (NREL Phase VI 수평축 풍력터빈의 저주파 공력소음 해석에 관한 수치적 연구)

  • Mo, Jang-Oh;Lee, Young-Ho
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.33 no.8
    • /
    • pp.1170-1179
    • /
    • 2009
  • The purpose of this work is to predict the low frequency aero-acoustic noise generated from the horizontal axis wind turbine, NREL Phase VI for the whole operating conditions of various wind speeds using large eddy simulation and Ffowcs-Williams and Hawkings model provided in the commercial code, FLUENT. Because there is no experimental data about wind turbine noise, we first of all compared aerodynamic performance such as shaft torque and power with experimentally measured value. Performance results show a good agreement with experimental data within about 0.8%. As the wind speed increases, the overall sound pressure level and the sound pressure level by the quadrupole and dipole source show a increasing tendency. Also, sound pressure level is proportional to $r^{-2}$ in the near field and $r^{-1}$ in the far field according to the increase of distance from the center of hub of wind turbine. According to 2 times increase of distance, sound pressure level is reduced by about 6dB.

Performance Analysis for Optimizing Threshold Level Control of a Receiver in Asynchronous 2.5 Gbps/1.2 Gbps Optical Subscriber Network with Inverse Return to Zero(RZ) Coded Downstream and NRZ Upstream Re-modulation

  • Park, Sang-Jo;Kim, Bong-Kyu
    • Journal of the Optical Society of Korea
    • /
    • v.13 no.3
    • /
    • pp.361-366
    • /
    • 2009
  • We propose the performance enhancing method optimization of an asynchronous 2.5 Gbps/1.25 Gbps optical subscriber network with inverse RZ (Return to Zero) coded downstream and NRZ (Non Return to Zero) upstream re-modulation by adjusting threshold level control of a receiver. We theoretically analyze the BER (Bit Error Rate) performance by modeling the occurrence of BER by simulation with MATLAB according to the types of downstream data. The results have shown that the normalized threshold level in an optical receiver could be saturated at 1/3 as the SNR (Signal to Noise Ratio) increases. The needed SNR for obtaining the BER $10^{-9}$ can be reduced by $\sim$5 dB by optimizing the normalized threshold level at 1/3 instead of by using the conventional receiver with threshold level of 0.5. The proposed system can be a useful technology for asynchronous optical access networks with asymmetric upstream and downstream data rates, because the improved minimum receiving power could replace a light source with a source with lower power and lower cost in an OLT (Optical Line Termination).

Design and Development of an Interactive Tool for Developing Multi-platform Software (멀티 플랫폼 소프트웨어 개발을 위한 대화형 도구의 설계 및 구현)

  • 최진우;황선태;우종우
    • Journal of Internet Computing and Services
    • /
    • v.3 no.4
    • /
    • pp.95-102
    • /
    • 2002
  • A continuous development of new hardware and operating systems brings the importance of portable programming, which can be imported into multi-platform environment. Also, the recent development of computer communication technology brings us many choices of accessing into the other platforms, which also becomes a burden for the programmers who should consider developing software fitting into diverse platforms The present GNU system tools creates a part of the source code automatically, and suggests a direction towards a new platform. but the source code must be prepared by the programmer at the source level. In this paper, we describe design and implementation of on interactive tool for developing multi-platform software, The tool is designed to help a programmer to build a portable program for multi-platform, even though the programmer does not know very well about various UNIX platforms, And, the tool uses existing GNU system tools, such as autoconf, autoheader, automake and etc, and is able to insert a portable code into a right position by interacting with a programmer.

  • PDF