• Title/Summary/Keyword: Code Metrics

Search Result 76, Processing Time 0.028 seconds

Axial capacity of FRP reinforced concrete columns: Empirical, neural and tree based methods

  • Saha Dauji
    • Structural Engineering and Mechanics
    • /
    • v.89 no.3
    • /
    • pp.283-300
    • /
    • 2024
  • Machine learning (ML) models based on artificial neural network (ANN) and decision tree (DT) were developed for estimation of axial capacity of concrete columns reinforced with fiber reinforced polymer (FRP) bars. Between the design codes, the Canadian code provides better formulation compared to the Australian or American code. For empirical models based on elastic modulus of FRP, Hadhood et al. (2017) model performed best. Whereas for empirical models based on tensile strength of FRP, as well as all empirical models, Raza et al. (2021) was adjudged superior. However, compared to the empirical models, all ML models exhibited superior performance according to all five performance metrics considered. The performance of ANN and DT models were comparable in general. Under the present setup, inclusion of the transverse reinforcement information did not improve the accuracy of estimation with either ANN or DT. With selective use of inputs, and a much simpler ANN architecture (4-3-1) compared to that reported in literature (Raza et al. 2020: 6-11-11-1), marginal improvement in correlation could be achieved. The metrics for the best model from the study was a correlation of 0.94, absolute errors between 420 kN to 530 kN, and the range being 0.39 to 0.51 for relative errors. Though much superior performance could be obtained using ANN/DT models over empirical models, further work towards improving accuracy of the estimation is indicated before design of FRP reinforced concrete columns using ML may be considered for design codes.

Coverage metrics for high-level events in behavioral model verification (동작적 모델 검증의 상위 레벨 사건에 대한 검출률 측정법)

  • Kim, Kang-Chul;Im, Chang-Gyun;Ryu, Jae-Hung;Han, Suk-Bung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.3
    • /
    • pp.496-502
    • /
    • 2006
  • The complexity of IC has rapidly increased as VLSI fabrication technology has grown up quickly. This paper proposes verification methods for data conflicts and protocol between IPs for SoC with coverage metrics. The high-level events is defined to cooperation between blocks or process statement in HDL, or a sequence of performing a job compared to low-level event. They are classified into two categories, resource conflicts and protocol or specification-dependent conflicts. And two coverage metrics used for code coverage in low-level event are proposed to verify the hish-level events. The events of resource conflicts can be detected by using statement coverage metric if global signal or variable has flags in a testbench program, and protocol-dependent events can be checked by data flow metric or path metric.

Performance Evaluation of Frame Synchronization Using Pilot Patterns in W-CDMA System (W-CDMA 시스템의 파일럿 패턴을 이용한 프레임 동기 성능 분석)

  • Song Young-Joon;Kim Han-Mook
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.17 no.3 s.106
    • /
    • pp.272-279
    • /
    • 2006
  • In this paper, we evaluate the performance of frame synchronization words of pilot bit patterns which are used for the channel estimation and frame synchronization confirmation in W-CDMA(Wide band Code Division Multiple Access) system. W-CDMA system also uses compressed mode to make measurements from another frequency without a full dual receiver terminal. It is confirmed by using computer simulation that the proposed frame synchronization words also maintain the frame synchronization property in the compressed mode by using the complementary mapping relationship of preferred pair ROC(Receiver Operating Characteristic) curves with probability of detection and false alarm are used to analized the performance of the proposed frame synchronization words by using the various detection metrics such as LLRT(Log Likelyhood Ratio Test), GLRT(Generalied Likelyhood Ratio Test), soft and hard correlation tests in AWGN and Rayleigh fading channels. It is expected that the research results fer the performance of pilot bit patterns of this paper can be useful reference for the design and implementation of frame synchronization in 3rd generation W-CDMA system.

AJFCode: An Approach for Full Aspect-Oriented Code Generation from Reusable Aspect Models

  • Mehmood, Abid;Jawawi, Dayang N.A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.1973-1993
    • /
    • 2022
  • Model-driven engineering (MDE) and aspect-oriented software development (AOSD) contribute to the common goal of development of high-quality code in reduced time. To complement each approach with the benefits of the other, various methods of integration of the two approaches were proposed in the past. Aspect-oriented code generation, which targets obtaining aspect-oriented code directly from aspect models, offers some unique advantages over the other integration approaches. However, the existing aspect-oriented code generation approaches do not comprehensively address all aspects of a model-driven code generation system, such as a textual representation of graphical models, conceptual mapping, and incorporation of behavioral diagrams. These problems limit the worth of generated code, especially in practical use. Here, we propose AJFCode, an approach for aspect-oriented model-driven code generation, which comprehensively addresses the various aspects including the graphical models and their text-based representation, mapping between visual model elements and code, and the behavioral code generation. Experiments are conducted to compare the maintainability and reusability characteristics of the aspect-oriented code generated using the AJFCode with the most comprehensive object-oriented code generation approach. AJFCode performs well in terms of all metrics related to maintainability and reusability of code. However, the most significant improvement is noticed in the separation of concerns, coupling, and cohesion. For instance, AJFCode yields significant improvement in concern diffusion over operations (19 vs 51), coupling between components (0 vs 6), and lack of cohesion in operations (5 vs 9) for one of the experimented concerns.

Mutual Information Applied to Anomaly Detection

  • Kopylova, Yuliya;Buell, Duncan A.;Huang, Chin-Tser;Janies, Jeff
    • Journal of Communications and Networks
    • /
    • v.10 no.1
    • /
    • pp.89-97
    • /
    • 2008
  • Anomaly detection systems playa significant role in protection mechanism against attacks launched on a network. The greatest challenge in designing systems detecting anomalous exploits is defining what to measure. Effective yet simple, Shannon entropy metrics have been successfully used to detect specific types of malicious traffic in a number of commercially available IDS's. We believe that Renyi entropy measures can also adequately describe the characteristics of a network as a whole as well as detect abnormal traces in the observed traffic. In addition, Renyi entropy metrics might boost sensitivity of the methods when disambiguating certain anomalous patterns. In this paper we describe our efforts to understand how Renyi mutual information can be applied to anomaly detection as an offline computation. An initial analysis has been performed to determine how well fast spreading worms (Slammer, Code Red, and Welchia) can be detected using our technique. We use both synthetic and real data audits to illustrate the potentials of our method and provide a tentative explanation of the results.

Improved Differential Detection Scheme of Space Time Trellis Coded MDPSK For MIMO (MIMO에서 시공간 부호화된 MDPSK의 성능을 향상시키기 위한 차동 검파 시스템)

  • Kim, Chong-Il;Lee, Ho-Jin;Yoo, Hang-Youal;Kim, Jin-Yong;Kim, Seung-Youal
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.164-167
    • /
    • 2005
  • Recently, STC techniques have been considered to be candidate to support multimedia services in the next generation mobile radio communications and have been developed the many communications systems in order to achieve the high data rates. In this paper, we propose the Trellis-Coded Differential Space Time Modulation system with multiple symbol detection. The Trellis-code performs the set partition with unitary group codes. The Viterbi decoder containing new branch metrics is introduced in order to improve the bit error rate (BER) in the differential detection of the unitary differential space time modulation. Also, we describe the Viterbi algorithm in order to use this branch metrics. Our study shows that such a Viterbi decoder improves BER performance without sacrificing bandwidth and power efficiency.

  • PDF

POSET METRICS ADMITTING ASSOCIATION SCHEMES AND A NEW PROOF OF MACWILLIAMS IDENTITY

  • Oh, Dong Yeol
    • Journal of the Korean Mathematical Society
    • /
    • v.50 no.5
    • /
    • pp.917-931
    • /
    • 2013
  • It is known that being hierarchical is a necessary and sufficient condition for a poset to admit MacWilliams identity. In this paper, we completely characterize the structures of posets which have an association scheme structure whose relations are indexed by the poset distance between the points in the space. We also derive an explicit formula for the eigenmatrices of association schemes induced by such posets. By using the result of Delsarte which generalizes the MacWilliams identity for linear codes, we give a new proof of the MacWilliams identity for hierarchical linear poset codes.

Performance Analysis of Embedded Applications (임베디드 응용 프로그램 성능 분석)

  • 김선욱;오재근;한영선;최홍욱;김철우
    • Proceedings of the IEEK Conference
    • /
    • 2003.07d
    • /
    • pp.1355-1358
    • /
    • 2003
  • This paper presents performance analysis of the embedded application, called EEMBC consisting of 5 categories and total 34 applications. We measured various performance metrics, such as code sizes, TLP(Thread Level Parallelism) using OpenMP API and ILP(Instruction Level Parallelism) on ARM-modeled SimpleScalar in detail. We show that the embedded applications have the similar characteristics as integer applications to deliver low ILP and TLP in our environment. They have many small loops, which result in large instruction overhead in TLP and loop control overhead in ILP.

  • PDF

Effective code static analysis and visualization based on Normalization of internal code information (코드 내부 정보의 정규화 기반 효율적인 코드 정적 분석 및 가시화)

  • Park, Chansol;Jeon, Byungkook;Kim, R. Young Chul
    • Annual Conference of KIPS
    • /
    • 2022.11a
    • /
    • pp.85-87
    • /
    • 2022
  • 고품질 코드를 위한 정적 분석은 아직도 매우 필요한 영역이며, 또한 코드의 가시화는 개발자들에게 코드의 복잡한 모듈에 대한 가이드에 필요하다. 기존의 코드 가시화는 정적 분석의 코드 내부 정보들을 DB 테이블화 및 품질 지표(CK Metrics, Coupling, # function Calls, Bed smell) 질의어화, 그리고 추출된 정보를 가시화하는 것에만 초점을 두었다. 문제는 코드 내부 정보(Class, method, parameters, etc) 테이블들에 대한 join 연산 시 엄청난 시간과 리소스가 소모된다. 이 문제를 해결하기 위해, 우리는 테이블 설계의 정규화를 제안한다. 또한 필요한 품질 지표의 질의를 통해 코드 내부 정보 추출하여 데이터 및 제어 복잡 모듈을 식별하여 refactoring 를 가이드 한다. 앞으로는 이 부분의 AI learning 을 통해 bad/good program 을 식별을 기대한다.

A GQM Approach to Evaluation of the Quality of SmartThings Applications Using Static Analysis

  • Chang, Byeong-Mo;Son, Janine Cassandra;Choi, Kwanghoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2354-2376
    • /
    • 2020
  • SmartThings is one of the most popular open platforms for home automation IoT solutions that allows users to create their own applications called SmartApps for personal use or for public distribution. The nature of openness demands high standards on the quality of SmartApps, but there have been few studies that have evaluated this thoroughly yet. As part of software quality practice, code reviews are responsible for detecting violations of coding standards and ensuring that best practices are followed. The purpose of this research is to propose systematically designed quality metrics under the well-known Goal/Question/Metric methodology and to evaluate the quality of SmartApps through automatic code reviews using a static analysis. We first organize our static analysis rules by following the GQM methodology, and then we apply the rules to real-world SmartApps to analyze and evaluate them. A study of 105 officially published and 74 community-created real-world SmartApps found a high ratio of violations in both types of SmartApps, and of all violations, security violations were most common. Our static analysis tool can effectively inspect reliability, maintainability, and security violations. The results of the automatic code review indicate the common violations among SmartApps.