• Title/Summary/Keyword: Control/data flow graph

Search Result 43, Processing Time 0.031 seconds

Unified Design Methodology and Verification Platform for Giga-scale System on Chip (기가 스케일 SoC를 위한 통합 설계 방법론 및 검증 플랫폼)

  • Kim, Jeong-Hun
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.2
    • /
    • pp.106-114
    • /
    • 2010
  • We proposed an unified design methodology and verification platform for giga-scale System on Chip (SoC). According to the growth of VLSI integration, the existing RTL design methodology has a limitation of a production gap because a design complexity increases. A verification methodology need an evolution to overcome a verification gap. The proposed platform includes a high level synthesis, and we develop a power-aware verification platform for low power design and verification automation using it's results. We developed a verification automation and power-aware verification methodology based on control and data flow graph (CDFG) and an abstract level language and RTL. The verification platform includes self-checking and the coverage driven verification methodology. Especially, the number of the random vector decreases minimum 5.75 times with the constrained random vector algorithm which is developed for the power-aware verification. This platform can verify a low power design with a general logic simulator using a power and power cell modeling method. This unified design and verification platform allow automatically to verify, design and synthesis the giga-scale design from the system level to RTL level in the whole design flow.

A Study on the Factors Affecting the Use and Satisfaction of Internet Ticketing Systems (인터넷 티켓팅 시스템의 사용과 만족에 영향을 미치는 요인)

  • Woo, Sung-Hwa;Kim, Kyung-Kyu;Chang, Hang-Bae;Shin, Ho-Kyoung
    • Asia pacific journal of information systems
    • /
    • v.17 no.3
    • /
    • pp.1-24
    • /
    • 2007
  • With the development of information technology (IT), various information systems (IS) such as Web-based systems and mobile systems have appeared utilizing different technologies. However, recent studies on IS use and user satisfaction rarely account for technological differences among IS and environmental characteristics where IS are intended to be used. The purpose of this research is to investigate the determinants of the use of Web-based ticketing systems for cultural activities and to empirically validate their relationships. Environmental psychology suggests that human beings respond to external stimuli from environments with their emotions, and their emotional states influence human actions, e.g., IS use in this research. Applying environmental psychology to the use of Web-based systems in the culture and entertainment industry, we propose that web site characteristics first influence a user's internal state of mind (i.e., flow) and then the flow state influences the IS use. Studies related to the state of flow collectively affirm the key role played by the flow construct in shaping individual attitudes and behaviors toward IS. Users' flow states are captured by their shopping enjoyment, perceived behavioral control, and the level of concentration on the IS use. Referring to social presence theory, we have included such web site characteristics as content quality, context of web site, and community quality. In our research model, a second order construct is utilized to represent web site quality, because flow theory suggests that holistic experiences with web-based systems (rather than individual characteristics of the web site) are important in explaining the IS use. Further, we have included trust as another important factor influencing the IS use since business transactions on the web encompass higher uncertainty comparing to offline transactions. In order to test our hypotheses, we have conducted an online survey which results in 1,141 valid responses in the final sample. The data were collected from respondents who have experiences in Internet ticketing systems. Although it was a convenient sample, the sample represents a wide variety of user demographics. Validity and reliability of the research instrument were tested and research hypotheses were examined using PLS Graph 3.0. The results indicate that web site characteristics significantly influence the level of user concentration, user's enjoyment in shopping, and perceived behavioral control. Further, the use of Internet ticketing systems is influenced by users' flow states and trust in the web channel. User satisfaction is turned out to be affected by the use of Internet ticketing systems. Unlike extant research on the relationship between web site characteristics and its use, our study has found that, in the culture and entertainment industry, the impact of web site characteristics on IS use is mediated by a user's flow state. This finding has a practical implication that web site design should include as many features that enhance shopping enjoyment and concentration. Other practical implications of these findings and future research implications are also discussed.

Flooding Risk Assessment Using Flooding Characteristic Values (침수특성치를 이용한 침수위험성 평가)

  • Ahn, Jeonghwan;Kim, Kunwoo;Cho, Woncheol
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.3
    • /
    • pp.957-964
    • /
    • 2013
  • This research is on the methodology of flood risk assessment using flooding characteristic values. Necessity of design magnitude for flood control considering floods was judged by plotting peak flow with respect to frequency and duration, and flooding magnitude was defined with 6 flooding characteristic values which were proposed to be significant factors when assessing flooding magnitude. Precipitation data used in the assessment modeling were applied by combining all the possible precipitation events. After overlapping the simulated results with precipitation matrix by flooding characteristic values, contour map was drawn, and Flooding characteristic contour graph for possible rainfall events were suggested in respect of all possible precipitation. Flooding characteristic contour graph for possible rainfall events was confirmed that reducing of damage magnitude of each flood characteristic value was figured out easily. The flood risk assessment methods suggested in this study would be a good reference for urban drainage system design, which only focuses on pipe conduit.

Energy-aware Dalvik Bytecode List Scheduling Technique for Mobile Applications (모바일 어플리케이션을 위한 에너지-인식 달빅 바이트코드 리스트 스케줄링 기술)

  • Ko, Kwang Man
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.5
    • /
    • pp.151-154
    • /
    • 2014
  • An energy of applications had consumed through the complexed inter-action with operating systems, run-time environments, compiler, and applications on various mobile devices. In these days, challenged researches are studying to reduce of energy consumptions that uses energy-oriented high-level and low-level compiler techniques on mobile devices. In this paper, we intented to reduce an energy consumption of Java mobile applications that applied a list instruction scheduling for energy dissipation from dalvik bytecode which extracted Android dex files. Through this works, we can construct the optimized power and energy environment on mobile devices with the limited power supply.

Modified Deep Reinforcement Learning Agent for Dynamic Resource Placement in IoT Network Slicing

  • Ros, Seyha;Tam, Prohim;Kim, Seokhoon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.17-23
    • /
    • 2022
  • Network slicing is a promising paradigm and significant evolution for adjusting the heterogeneous services based on different requirements by placing dynamic virtual network functions (VNF) forwarding graph (VNFFG) and orchestrating service function chaining (SFC) based on criticalities of Quality of Service (QoS) classes. In system architecture, software-defined networks (SDN), network functions virtualization (NFV), and edge computing are used to provide resourceful data view, configurable virtual resources, and control interfaces for developing the modified deep reinforcement learning agent (MDRL-A). In this paper, task requests, tolerable delays, and required resources are differentiated for input state observations to identify the non-critical/critical classes, since each user equipment can execute different QoS application services. We design intelligent slicing for handing the cross-domain resource with MDRL-A in solving network problems and eliminating resource usage. The agent interacts with controllers and orchestrators to manage the flow rule installation and physical resource allocation in NFV infrastructure (NFVI) with the proposed formulation of completion time and criticality criteria. Simulation is conducted in SDN/NFV environment and capturing the QoS performances between conventional and MDRL-A approaches.

Bus and Registor Optimization in Datapath Synthesis (데이터패스 합성에서의 버스와 레지스터의 최적화 기법)

  • Sin, Gwan-Ho;Lee, Geun-Man
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.8
    • /
    • pp.2196-2203
    • /
    • 1999
  • This paper describes the bus scheduling problem and register optimization method in datapath synthesis. Scheduling is process of operation allocation to control steps in order to minimize the cost function under the given circumstances. For that purpose, we propose some formulations to minimize the cost function for bus assignment to get an optimal and minimal cost function in hardware allocations. Especially, bus and register minimization technique are fully considered which are the essential topics in hardware allocation. Register scheduling is done after the operation and bus scheduling. Experiments are done with the DFG model of fifth-order digital ware filter to show its effectiveness. Structural integer programming formulations are used to solve the scheduling problems in order to get the optimal scheduling results in the integer linear programming environment.

  • PDF

System Optimization Technique using Crosscutting Concern (크로스커팅 개념을 이용한 시스템 최적화 기법)

  • Lee, Seunghyung;Yoo, Hyun
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.181-186
    • /
    • 2017
  • The system optimization is a technique that changes the structure of the program in order to extract the duplicated modules without changing the source code, reuse of the extracted module. Structure-oriented development and object-oriented development are efficient at crosscutting concern modular, however can't be modular of crosscutting concept. To apply the crosscutting concept in an existing system, there is a need to a extracting technique for distributed system optimization module within the system. This paper proposes a method for extracting the redundant modules in the completed system. The proposed method extracts elements that overlap over a source code analysis to analyze the data dependency and control dependency. The extracted redundant element is used to program dependency analysis for the system optimization. Duplicated dependency analysis result is converted into a control flow graph, it is possible to produce a minimum crosscutting module. The element extracted by dependency analysis proposes a system optimization method which minimizes the duplicated code within system by setting the crosscutting concern module.

Machine Learning Based Automated Source, Sink Categorization for Hybrid Approach of Privacy Leak Detection (머신러닝 기반의 자동화된 소스 싱크 분류 및 하이브리드 분석을 통한 개인정보 유출 탐지 방법)

  • Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.657-667
    • /
    • 2020
  • The Android framework allows apps to take full advantage of personal information through granting single permission, and does not determine whether the data being leaked is actual personal information. To solve these problems, we propose a tool with static/dynamic analysis. The tool analyzes the Source and Sink used by the target app, to provide users with information on what personal information it used. To achieve this, we extracted the Source and Sink through Control Flow Graph and make sure that it leaks the user's privacy when there is a Source-to-Sink flow. We also used the sensitive permission information provided by Google to obtain information from the sensitive API corresponding to Source and Sink. Finally, our dynamic analysis tool runs the app and hooks information from each sensitive API. In the hooked data, we got information about whether user's personal information is leaked through this app, and delivered to user. In this process, an automated Source/Sink classification model was applied to collect latest Source/Sink information, and the we categorized latest release version of Android(9.0) with 88.5% accuracy. We evaluated our tool on 2,802 APKs, and found 850 APKs that leak personal information.

Development and Application of Siphon Breaker Simulation Program (사이펀 차단기 시뮬레이션 프로그램의 개발 및 활용)

  • Lee, Kwon-Yeong;Kim, Wan-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.346-353
    • /
    • 2016
  • In the design conditions of some research reactors, the siphon phenomenon can cause continuous efflux of water during pipe rupture. A siphon breaker is a safety device that can prevent water efflux effectively. However, the analysis of the siphon breaking is complicated because many variables must be included in the calculation process. For this reason, a simulation program was developed with a user-friendly GUI to analyze the siphon breaking easily. The program was developed by MFC programming using Visual Studio 2012 in Windows 8. After saving the input parameters from a user, the program proceeds with three steps of calculation using fluid mechanics formulas. Bernoulli's equation is used to calculate the velocity, quantity, water level, undershooting, pressure, loss coefficient, and factors related to the two-phase flow. The Chisholm model is used to predict the results from a real-scale experiment. The simulation results are shown in a graph, through which a user can examine the total breaking situation. It is also possible to save all of the resulting data. The program allows a user to easily confirm the status of the siphon breaking and would be helpful in the design of siphon breakers.

Development of Hospice Oriented Medical Record (HOMR) for Cancer Patients (호스피스 암 환자를 위한 의무기록지의 개발)

  • Seng, Jeong-Won;Hong, Sung-Moon;Kim, Si-Wan;Kim, Jeong-A;Park, Joon-Chul;Kim, Su-Hyun;Seo, Min-Jeong;Her, Sin-Hoe;Kim, Hye-Won;Hong, Myung-Ho;Choi, Youn-Seon
    • Journal of Hospice and Palliative Care
    • /
    • v.7 no.1
    • /
    • pp.49-63
    • /
    • 2004
  • Purpose: The Hospice Oriented Medical Record (HOMR) was developed for assessing the pain and symptoms of terminal cancer patients. Methods and Results: The HOMR consists of an instruction for users and 2 assessment pages which include the graph showing vital signs (temperature, blood pressure, pulse, respiration rate and pain score), current problem lists, performance status, laboratory data, pain characteristics and management, sedation score, associated symptoms and drug side effects, etc. Pilot study was performed in the inpatient Hospice Care Unit in Guro Hospital, Korea University Medical Center. Because an one-week progress data was recorded in HOMR as a flow sheet, the patient's condition and pain control status could be seen at a glance. Conclusion: The HOMR is useful for assessing the terminal cancer patients because it is simple and convenient to use. Further research is needed before it can be universally used in the clinical settings.

  • PDF