• Title/Summary/Keyword: Data Flow Control

Search Result 1,276, Processing Time 0.031 seconds

Constructing Software Structure Graph through Progressive Execution (점진적 실행을 통한 소프트웨어의 구조 그래프 생성)

  • Lee, Hye-Ryun;Shin, Seung-Hun;Choi, Kyung-Hee;Jung, Gi-Hyun;Park, Seung-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.7
    • /
    • pp.111-123
    • /
    • 2013
  • To verify software vulnerability, the method of conjecturing software structure and then testing the software based on the conjectured structure has been highlighted. To utilize the method, an efficient way to conjecture software structure is required. The popular graph and tree methods such as DFG(Data Flow Graph), CFG(Control Flow Graph) and CFA(Control Flow Automata) have a serious drawback. That is, they cannot express software in a hierarchical fashion. In this paper, we propose a method to overcome the drawback. The proposed method applies various input data to a binary code, generate CFG's based on the code output and construct a HCFG (Hierarchical Control Flow Graph) to express the generated CFG's in a hierarchical structure. The components required for HCFG and progressive algorithm to construct HCFG are also proposed. The proposed method is verified through constructing the software architecture of an open SMTP(Simple Mail Transfer Protocol) server program. The structure generated by the proposed method and the real program structure are compared and analyzed.

Analysis of Debris Flow Disaster Area according to Location Change of Check Dam using Kanako-2D (Kanako-2D를 이용한 사방댐 위치 변화에 따른 토석류 피해지 분석)

  • Kim, Young Hwan;Jun, Kye-Won
    • Journal of the Korean Society of Safety
    • /
    • v.33 no.1
    • /
    • pp.128-134
    • /
    • 2018
  • With the increase in frequency of typhoons and heavy rains following the climate change, the scale of damage from the calamities in the mountainous areas has been growing larger and larger, which is different from the past. For the case of Korea where 64% of land is consisted of the mountainous areas, establishment of the check dams has been drastically increased after 2000 in order to reduce the damages from the debris flow. However, due to the lack of data on scale, location and kind of check dams established for reducing the damages in debris flow, the measures to prevent damages based on experience and subjective basis have to be relied on. Under this study, the high-precision DEM data was structured by using the terrestrial LiDAR in the Jecheon area where the debris flow damage occurred in July 2009. And, from the numerical models of the debris flow, Kanako-2D that is available to reflect the erosion and deposition action was applied to install the erosion control facilities (water channel, check dam) and analyzed the effect of reducing the debris flow shown in the downstream.After installing the erosion control facilities, most of debris flow moves along the water channel to reduce the area to expand the debris flow, and after installing the check dam, the flow depth and flux of the debris flow were reduced along with the erosion. However, as a result of analyzing the diffusion area, flow depth, erosion and deposition volume of the debris flow generated from the deposition part after modifying the location of the check dams with the damages occurring on private residences and agricultural land located on the upstream area, the highest reduction effect was shown when the check dam is installed in the maximal discharge points.

A strategy for effectively applying a control flow obfuscation to programs (제어 흐름 난독화를 효과적으로 수행하기 위한 전략)

  • Kim, Jung-Il;Lee, Eun-Joo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.6
    • /
    • pp.41-50
    • /
    • 2011
  • Code obfuscation has been proposed to protect codes in a program from malicious software reverse engineering. It converts a program into an equivalent one that is more difficult to understand the program. Code obfuscation has been classified into various obfuscation technique such as layout, data, control, by obfuscating goals. In those obfuscation techniques, control obfuscation is intended to complicate the control flow in a program to protect abstract information of control flow. For protecting control flow in a program, various control obfuscation transformation techniques have been proposed. However, strategies for effectively applying a control flow obfuscation to program have not been proposed yet. In this paper, we proposed a obfuscation strategy that effectively applies a control flow obfuscation transformation to a program. We conducted experiment to show that the proposed obfuscation strategy is useful for applying a control flow transformation to a program.

The Development of a Computer-Assisted HACCP Program for the Microbiological Quality Assurance in Hospital Foodservice Operations (병원급식의 미생물적 품질보증을 위한 HACCP 전산프로그램의 개발)

  • Kwak, Tong-Kyung;Ryu, Kyung;Choi, Seong-Kyung
    • Journal of the Korean Society of Food Culture
    • /
    • v.11 no.1
    • /
    • pp.107-121
    • /
    • 1996
  • This study was carried out to develop the computer-assisted Hazard Analysis and Critical Control Point (HACCP) program for a systematic approach to the identification, assessment and control of hazards for foodservice manager to assure the microbiological quality of food in hospital foodservice operations. Sanitation practices were surveyed and analyzed in the dietetic department of 4 hospitals. Among them, one 762-bed general hospital was selected as standard model to develop computer-assisted HACCP program. All data base files and processing programs were created by using Foxpro package for easy access of HACCP concept. HACCP program was developed based on the methods suggested by NACMCF, IAMFES and Bryan. This program consisted of two parts: the pre-stage for HACCP study and the implementation stage of the HACCP system. 1. Pre-stage for HACCP study includes the selection of menu item, the development of the HACCP recipe, the construction of a product flow diagram, and printing the HACCP recipe and a product flow diagram. A menu item for HACCP study can be selected from the menu item lists classified by cooking methods. HACCP recipe includes ingredients, their amount and cooking procedure. A flow diagram is constructed based on the HACCP recipe. The HACCP recipe and a product flow diagram are printed out. 2. Implementation of HACCP study includes the identification of microbiological hazards, the determination of critical control points, the establishment of control methods of each hazard, and the complementation of data base file. Potentially hazardous ingredients are determined and microbiological hazards are identified in each phase of the product flow. Critical control points (CCPs) are identified by applying CCP decision trees for ingredients and each process stage. After hazards and CCPs are identified, criteria, monitoring system, corrective action plan, record-keeping system and verification methods are established. When the HACCP study is complemented, HACCP study result forms are printed out. HACCP data base file can be either added, corrected or deleted.

  • PDF

Application of Lookup Table Technique with PID Controller for East Flow Ratio Response

  • Klaynil, P.;Pannil, P.;Chaikla, A.;Julsereewong, P.;Tirasesth, K.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.504-504
    • /
    • 2000
  • The flow ratio in the industrial process is usually accomplished by using PID controller with series type ratio. But always the large overshoot and a long rise time may be achieved from this conventional control. These problems are involved to the inexact flow ratio control. In order to avoid this poor performance. the paper presents a designing of the two controller modes for the flow ratio plants. This proposed controller combine the lookup table technique and the well-known PID controller to obtain the fast response and low overshoot of flow ratio control. The PID controller mode will be operated when the flow ratio reaches the preset value while the lookup table technique mode is applied for initial operation. The data in tile table is calculated by the valve sizing equation and convened to the valve position control signal. The experimental results show that the transient and steady state responses of the control systems using the proposed technique can be efficiently obtained when compared with tile conventional controller.

  • PDF

Implementation & Application of Instrumentation System on Performance Evaluation for Korea-Radio Train Control System (통신기반 열차제어시스템 성능평가용 계측시스템 구현 및 적용)

  • Lee, Jae-Ho;Lee, Kang-Mi;Park, Pyoung-Sik
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.12
    • /
    • pp.1777-1783
    • /
    • 2013
  • This study aims to implement an instrumentation system measuring and analysing real-time data of information flow between respective subunits composing train control system as the performance evaluation method for wireless communication based urban railway train control system under development for a Korean model. It analyses system functional requirements regarding subsystems composing wireless communication based train control system and test items for functions presented in each specification and examines data and measurement point for measuring according to test items in order to implement an instrumentation system. And, it clearly defines requirements of an instrumentation system to avoid malfunction or error in operation of train control system. It reviews data processing method and display method for effective analysis of data flow between respective subunits with measured data, designs and makes an instrumentation system. Ultimately, it applies to a performance test of train control system and makes sure an instrumentation system in normal working order.

An Ensemble Cascading Extremely Randomized Trees Framework for Short-Term Traffic Flow Prediction

  • Zhang, Fan;Bai, Jing;Li, Xiaoyu;Pei, Changxing;Havyarimana, Vincent
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1975-1988
    • /
    • 2019
  • Short-term traffic flow prediction plays an important role in intelligent transportation systems (ITS) in areas such as transportation management, traffic control and guidance. For short-term traffic flow regression predictions, the main challenge stems from the non-stationary property of traffic flow data. In this paper, we design an ensemble cascading prediction framework based on extremely randomized trees (extra-trees) using a boosting technique called EET to predict the short-term traffic flow under non-stationary environments. Extra-trees is a tree-based ensemble method. It essentially consists of strongly randomizing both the attribute and cut-point choices while splitting a tree node. This mechanism reduces the variance of the model and is, therefore, more suitable for traffic flow regression prediction in non-stationary environments. Moreover, the extra-trees algorithm uses boosting ensemble technique averaging to improve the predictive accuracy and control overfitting. To the best of our knowledge, this is the first time that extra-trees have been used as fundamental building blocks in boosting committee machines. The proposed approach involves predicting 5 min in advance using real-time traffic flow data in the context of inherently considering temporal and spatial correlations. Experiments demonstrate that the proposed method achieves higher accuracy and lower variance and computational complexity when compared to the existing methods.

An Implementation of Network Processor Protocol Converter and flow Control using FPGA (FPGA를 이용한 Network Processor용 Protocol 변환장치의 구현 및 흐름제어)

  • Bang, Jin-Min;Cho, Jun-Dong;Kim, Austin S.
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.397-400
    • /
    • 2006
  • Recent trend on high speed packet processing for providing multiple internet services is to use network processor instead of being implemented by legacy ASIC or FPGA. Most frequently used network processor interface is the SPI4.2. This paper address the data-rate conversion interface device between SPI4.2 and SPI3/CSIX, implemented using XILINX XC2VP40 FPGA. Furthermore, we address the methodology and necessity of flow control occurred due to the data rate difference between 10Gbps and 3.2 Gbps.

  • PDF

Development of an Algorithm to Measure the Road Traffic Data Using Video Camera

  • Kim, Hie-Sik;Kim, Jin-Man
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.95.2-95
    • /
    • 2002
  • 1. Introduction of Camera Detection system Camera Detection system is an equipment that can detect realtime traffic information by image processing techniques. This information can be used to analyze and control road traffic flow. It is also used as a method to detect and control traffic flow for ITS(Intelligent Transportation System). Traffic information includes speed, head way, traffic flow, occupation time and length of queue. There are many detection systems for traffic data. But video detection system can detect multiple lanes with only one camera and collect various traffic information. So it is thought to be the most efficient method of all detection system. Though the...

  • PDF

Extraction Transformation Transportation (ETT) system Design and implementation for extracting heterogeneous Data on Data Warehouse (데이터웨어하우스에서 이질적 형태를 가진 데이터의 추출을 위한 Extraction Transformation Transportation(ETT) 시스템 설계 및 구현)

  • 여성주;왕지남
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.24 no.67
    • /
    • pp.49-60
    • /
    • 2001
  • Data warehouse(DW) manages all information in a Enterprise and also offers the specific information to users. However, it might be difficult to develope an effective DW system due to varieties in computing facilities, data base, and operating systems. The heterogeneous system environments make it harder to extract data and to provide proper information to usesr in real time. Also commonly occurred is data inconsistency of non-integrated legacy system, which requires an effective and efficient data extraction flow control as well as data cleansing. We design the integrated automatic ETT(Extraction Transformation Transportation) system to control data extraction flow and suggest implementation methodology. Detail analysis and design are given to specify the proposed ETT approach with a real implementation.

  • PDF