• Title/Summary/Keyword: Call Control

Search Result 680, Processing Time 0.025 seconds

Static Type Inference Based on Static Single Assignment for Bytecode (바이트코드를 위한 정적 단일 배정문 기반의 정적 타입 추론)

  • Kim Ji-Min;Kim Ki-Tea;Kim Je-Min;Yoo Weon-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.87-96
    • /
    • 2006
  • Although bytecode has many good features, it has slow execution speed and it is not an ideal representation for program analysis or optimization. For analysises and optimizations. bytecode must be translated to a Static Single Assignment Form(SSA Form) But when bytecode is translated a SSA Form it has lost type informations of son variables. For resolving these problem in this paper, we create extended control flow graph on bytecode. Also we convert the control flow graph to SSA Form for static analysis. Calculation about many informations such as dominator, immediate dominator. dominance frontier. ${\phi}$-Function. renaming are required to convert to SSA Form. To obtain appropriate type for generated SSA Form, we proceed the followings. First. we construct call graph and derivation graph of classes. And the we collect information associated with each node. After finding equivalence nodes and constructing Strongly Connected Component based on the collected informations. we assign type to each node.

  • PDF

Hippocratic XML Databases: A Model and Access Control Mechanism (히포크라테스 XML 데이터베이스: 모델 및 액세스 통제 방법)

  • Lee Jae-Gil;Han Wook-Shin;Whang Kyu-Young
    • Journal of KIISE:Databases
    • /
    • v.31 no.6
    • /
    • pp.684-698
    • /
    • 2004
  • The Hippocratic database model recently proposed by Agrawal et al. incorporates privacy protection capabilities into relational databases. Since the Hippocratic database is based on the relational database, it needs extensions to be adapted for XML databases. In this paper, we propose the Hippocratic XML database model, an extension of the Hippocratic database model for XML databases and present an efficient access control mechanism under this model. In contrast to relational data, XML data have tree-like hierarchies. Thus, in order to manage these hierarchies of XML data, we extend and formally define such concepts presented in the Hippocratic database model as privacy preferences, privacy policies, privacy authorizations, and usage purposes of data records. Next, we present a new mechanism, which we call the authorization index, that is used in the access control mechanism. This authorization index, which is Implemented using a multi-dimensional index, allows us to efficiently search authorizations implied by the authorization granted on the nearest ancestor using the nearest neighbor search technique. Using synthetic and real data, we have performed extensive experiments comparing query processing time with those of existing access control mechanisms. The results show that the proposed access control mechanism improves the wall clock time by up to 13.6 times over the top-down access control strategy and by up to 20.3 times over the bottom-up access control strategy The major contributions of our paper are 1) extending the Hippocratic database model into the Hippocratic XML database model and 2) proposing an efficient across control mechanism that uses the authorization index and nearest neighbor search technique under this model.

Intelligent Modelling Techniques Using the Neuro-Fuzzy Logic Control in ATM Traffic Controller (ATM 트랙픽 제어기에서 신경망-퍼지 논리 제어를 이용한 지능형 모델링 기법)

  • 이배호;김광희
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.4B
    • /
    • pp.683-691
    • /
    • 2000
  • In this paper, we proposed the cell multiplexer using Hopfield neural network and the bandwidth predictor using the backpropagation neural network in order to make an accurate call setup decision. The cell multiplexer controls heterogeneous traffic and the bandwidth predictor estimates minimum bandwidth which satisfies traffic's QoS and maximizes throughput in network. Also, a novel connection admission controller decides on connection setup using the predicted bandwidth from bandwidth predictor and available bandwidth in networks. And then, we proposed a fuzzy traffic policer, when traffic sources violate the contract, takes an appropriate action and aim proved traffic shaper, which controls burstness which is one of key characteristics in multimedia traffic. We simulated the proposed controller. Simulation results show that the proposed controller outperforms existing controller.

  • PDF

A Study on the ISDN Telephone User-Network Interface -Part 1: A Study on the Implementation of A Circuit Switching Emulator for ISDN- (ISDN용 전화가입자 - 망 간 접속에 관한 연구 -제 1 부 : ISDN용 회선 교환 Emulator구성에 관한 연구-)

  • 박영덕;장진상;김영철;조규섭;박병철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.12 no.1
    • /
    • pp.60-70
    • /
    • 1987
  • Recently the tendency of the network system development rapidly progresses toward ISDN that intergrates all presetn-day communication networks and services into a single, universal network set up on the basis of the exisiting telephone network. For this reason many countries pay worldwide attention to the researches about ISDN, especially to the researches about the exchange and the ISDN user-network interface which is one of the most important parts of network system. This paper is the first part of the two-par papers describing the ISDN user-network interface. in this paper, after surveying the architecture of ISDN exchange recommended by CCITT, the general architecture of the ISDN exchage is proposed, Based on this architecture, the switching emulator is implemented, and the necessary conditions of the ISDN exchage(LAPO, CCP etc) are also studied.

  • PDF

How to Chase Changing Middle Managers′ Roles in the Informediary Era: Spiral Gap Analysis Model and Star Process

  • Lee, Sang-Gun;Yoo, Sangjin
    • Management Science and Financial Engineering
    • /
    • v.8 no.1
    • /
    • pp.21-38
    • /
    • 2002
  • Rapid advances in information technology(IT) and telecommunication systems impact the number and quality of decision-making in organizations. Specifically, middle mangers must posses or develop the creativity necessary for survival in a constantly changing and volatile business environment. While tradition and conventional wisdom tell us that a middle managers role centers on control and monitoring, todays competitive arena has spun out a new managerial requirement developing and maintaining an innovative attitude. Problematically, most previous research has focused on the issue of changing decision authority (i. e. centralization/decentralization). Moreover, much previous research has also largely ignored environmental changes exposing new roles that middle managers have assumed. This study explores the means of identifying middle managerial roles, managerial possibilities involving the growing popularity of open systems through electronic brainstorming, and an adaptation and development of Diffusion Theory and attempt to counter criticism leveled at the theory's inability to provide an adequate explanation for diffusion of complex organizational technology. This paper develops three ideas: 1) Introducing the 'Chasing Curve' as a theoretical background. 2) Suggesting a new methodology using electronic brainstorming for analyzing the gap between Knowing (the perceived importance of middle managers' roles) and Doing (the degree of current status of middle managers' roles), which we term the 'Spiral Gap Analysis Model'. 3) Identifying a feedback system for minimizing the Knowing - Doing gap, aimed at development of IT strategic priority decision support, which we call this the 'Star Process'.

Mobile Cloud Computing-based Agent Application Model (모바일 클라우드 기반 에이전트 모델)

  • Ahn, Kwang-Min;Lee, Bong-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.608-611
    • /
    • 2012
  • In this paper, a mobile cloud-based agent model is proposed in order to overcome the resource constraints and the difficulties of installing a variety of complex applications in mobile devices. The proposed software architecture overcomes the disadvantages of mobile devices and maximizes usage of cloud services by implementing the function of mobile agent concept. The significant portion of the cloud services is run in the cloud server and the client application implemented in the mobile device can call and control appropriate service from the cloud server. Thus, the inherent weakness of the mobile can be overcome by executing the target applications on cloud nodes.

  • PDF

Fault diagnosis of a logical circuit by use of input grouping method

  • Miyata, Chikara;Kashiwagi, Hiroshi
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10a
    • /
    • pp.279-282
    • /
    • 1996
  • The authors have already proposed a method for grouping of inputs of a logical circuit under test (LCUT) by use of M-sequence correlation. We call this method as input grouping (IG) method. In this paper, the authors propose a new method to estimate the faulty part in the circuit by use of IG when some information on the candidate of faulty part can be obtained beforehand. The relationship between IG and fault probabilities of a LCUT, and undetected fault ratios are investigated for various cases. Especially the investigation was made in case where the IG was calculated by use of n correlation functions (I $G_{inp}$). From the theoretical study and simulation results it is shown that the estimation error ratio of fault probabilities and undetected fault ratio of LCUT are sufficiently small even when only a part of correlation functions are used. It is shown that the number of correlation functions which are to be memorized to calculate IG can be considerably reducible from 2$^{n}$ - 1 to n by use of I $G_{inp}$. So this method would be very useful for a fault diagnosis of actual logic circuit.uit.

  • PDF

A New Approach for Multiple Object Tracking ? Discrete Event based Multiple Object Tracking (DEMOT)

  • Kim, Chi-Ho;You, Bum-Jae;Kim, Hag-Bae;Oh, Sang-Rok
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1134-1139
    • /
    • 2003
  • Tracking is a fundamental technique which is able to be applied to gesture recognition, visual surveillance, tangible agent and so forth. Especially, multiple object tracking has been extensively studied in recent years in order to perform many and more complicated tasks. In this paper, we propose a new approach of multiple object tracking which is based on discrete event. We call this system the DEMOT (Discrete Event based Multiple Object Tracking). This approach is based on the fact that a multiple object tracking can have just four situations - initiation, continuation, termination, and overlapping. Here, initiation, continuation, termination, and overlapping constitute a primary event set and this is based on the change of the number of extracted objects between a previous frame and a current frame. This system reduces computational costs and holds down the identity of all targets. We make experiments for this system with respect to the number of targets, each event, and processing period. We describe experimental results that show the successful multiple object tracking by using our approach.

  • PDF

Bayesian Neural Network with Recurrent Architecture for Time Series Prediction

  • Hong, Chan-Young;Park, Jung-Hun;Yoon, Tae-Sung;Park, Jin-Bae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.631-634
    • /
    • 2004
  • In this paper, the Bayesian recurrent neural network (BRNN) is proposed to predict time series data. Among the various traditional prediction methodologies, a neural network method is considered to be more effective in case of non-linear and non-stationary time series data. A neural network predictor requests proper learning strategy to adjust the network weights, and one need to prepare for non-linear and non-stationary evolution of network weights. The Bayesian neural network in this paper estimates not the single set of weights but the probability distributions of weights. In other words, we sets the weight vector as a state vector of state space method, and estimates its probability distributions in accordance with the Bayesian inference. This approach makes it possible to obtain more exact estimation of the weights. Moreover, in the aspect of network architecture, it is known that the recurrent feedback structure is superior to the feedforward structure for the problem of time series prediction. Therefore, the recurrent network with Bayesian inference, what we call BRNN, is expected to show higher performance than the normal neural network. To verify the performance of the proposed method, the time series data are numerically generated and a neural network predictor is applied on it. As a result, BRNN is proved to show better prediction result than common feedforward Bayesian neural network.

  • PDF

Evaluation of VoIP Service Quality under the Roaming of Mobile Terminals (이동단말의 로밍에 따른 VoIP 서비스 품질 분석)

  • Choi, Dae-Woo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.4
    • /
    • pp.747-752
    • /
    • 2012
  • In this paper we evaluated by simulation the effect of VoIP roaming and data traffic roaming on other VoIP calls. Regardless of MIPv4 or MIPv6, the quality of voice of all VoIP calls falls down quickly to the bottom level after the start of roaming by one voice terminal. That was caused by the excessive retransmission on downlink. Thus it seems that we need a kind of call admission control when we adopt the roaming service on VoIP calls. Data traffic degrades also the voice quality especially at the foreign agent side.