• Title/Summary/Keyword: Execution Ratio

Search Result 138, Processing Time 0.03 seconds

Design and Implementation of a Scalable Real-Time Sensor Node Platform (확장성 및 실시간성을 고려한 실시간 센서 노드 플랫폼의 설계 및 구현)

  • Jung, Kyung-Hoon;Kim, Byoung-Hoon;Lee, Dong-Geon;Kim, Chang-Soo;Tak, Sung-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8B
    • /
    • pp.509-520
    • /
    • 2007
  • In this paper, we propose a real-time sensor node platform that guarantees the real-time scheduling of periodic and aperiodic tasks through a multitask-based software decomposition technique. Since existing sensor networking operation systems available in literature are not capable of supporting the real-time scheduling of periodic and aperiodic tasks, the preemption of aperiodic task with high priority can block periodic tasks, and so periodic tasks are likely to miss their deadlines. This paper presents a comprehensive evaluation of how to structure periodic or aperiodic task decomposition in real-time sensor-networking platforms as regard to guaranteeing the deadlines of all the periodic tasks and aiming to providing aperiodic tasks with average good response time. A case study based on real system experiments is conducted to illustrate the application and efficiency of the multitask-based dynamic component execution environment in the sensor node equipped with a low-power 8-bit microcontroller, an IEEE802.15.4 compliant 2.4GHz RF transceiver, and several sensors. It shows that our periodic and aperiodic task decomposition technique yields efficient performance in terms of three significant, objective goals: deadline miss ratio of periodic tasks, average response time of aperiodic tasks, and processor utilization of periodic and aperiodic tasks.

The Limitations of Advance Directive (사전의료지시의 한계)

  • Oh, Se-Hyuk;Jeong, Hwa-Seong
    • The Korean Society of Law and Medicine
    • /
    • v.11 no.2
    • /
    • pp.239-274
    • /
    • 2010
  • Advance directive refers to a description of the treatment method a patient wants to be provided with in case where the person is unconscious or lacks an ability to decision making in a future period or a declaration of intention that delegates and appoints another person who makes a decision regarding a treatment method on behalf of the person. Advance directive is usually a document form, but oral statement is acceptable as well. Advance directive may have a variety of forms though, it basically consists of two basic forms. That is, one is a living will, and the other is a surrogate decision making. Though the importance of advance directive has been emphasized, and the necessity of adopting the system has been strongly argued for so far, the debates on criteria, method, and procedure alike have not yet reached an agreement. It is because even the concept of advance directive is more or less ambiguous, and each specific method has its own theoretical limitations and practical constraints. Thus the inquiries on advance directive raised in the study are summarized as the meaning, practicability, and philosophical foundation of the advance directive. Firstly, the theoretical limitations of Advance directive may be categorized into conceptual and moral limitations. In case of conceptual limitations, authors of advance directives may not be well aware, in advance, of the particular situation in which he or her will experience in the future, and patients may experience the change in his or her values and lack the understanding and information about the future situation due to the changes in treatment methods. In case of moral limitations, a patient has a limited moral autonomy right and self identity that have an impact on his or her preference. Secondly, in case of practical constraints for advance directive, there exist cultural features, low ratio of documentation, as patients themselves admit, and low predictability and stability of patient's own preference regarding life-sustaining care. And the problem of validity and accuracy in proxy's decision making is also raised. Those who administer a living will, especially, may have a difficulty in understanding the directive by a patient, so that the accuracy of execution cannot be secured. In the sense, it is needed to implement a legal device in order to solve such problems. In summary, it is urgently required to understand the limitations and explore desired alternatives to overcome the relevant problems in advance, which must contribute to successfully adopting and effectively operating the advance directive system in Korea.

  • PDF

Design of a Real-time Sensor Node Platform for Efficient Management of Periodic and Aperiodic Tasks (주기 및 비주기 태스크의 효율적인 관리를 위한 실시간 센서 노드 플랫폼의 설계)

  • Kim, Byoung-Hoon;Jung, Kyung-Hoon;Tak, Sung-Woo
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.371-382
    • /
    • 2007
  • In this paper, we propose a real-time sensor node platform that efficiently manages periodic and aperiodic tasks. Since existing sensor node platforms available in literature focus on minimizing the usage of memory and power consumptions, they are not capable of supporting the management of tasks that need their real-time execution and fast average response time. We first analyze how to structure periodic or aperiodic task decomposition in the TinyOS-based sensor node platform as regard to guaranteeing the deadlines of ail the periodic tasks and aiming to providing aperiodic tasks with average good response time. Then we present the application and efficiency of the proposed real-time sensor node platform in the sensor node equipped with a low-power 8-bit microcontroller, an IEEE802.15.4 compliant 2.4GHz RF transceiver, and several sensors. Extensive experiments show that our sensor node platform yields efficient performance in terms of three significant, objective goals: deadline miss ratio of periodic tasks, average response time of aperiodic tasks, and processor utilization of periodic and aperiodic tasks.

Optimal-synchronous Parallel Simulation for Large-scale Sensor Network (대규모 센서 네트워크를 위한 최적-동기식 병렬 시뮬레이션)

  • Kim, Bang-Hyun;Kim, Jong-Hyun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.5
    • /
    • pp.199-212
    • /
    • 2008
  • Software simulation has been widely used for the design and application development of a large-scale wireless sensor network. The degree of details of the simulation must be high to verify the behavior of the network and to estimate its execution time and power consumption of an application program as accurately as possible. But, as the degree of details becomes higher, the simulation time increases. Moreover, as the number of sensor nodes increases, the time tends to be extremely long. We propose an optimal-synchronous parallel discrete-event simulation method to shorten the time in a large-scale sensor network simulation. In this method, sensor nodes are partitioned into subsets, and each PC that is interconnected with others through a network is in charge of simulating one of the subsets. Results of experiments using the parallel simulator developed in this study show that, in the case of the large number of sensor nodes, the speedup tends to approach the square of the number of PCs participating in the simulation. In such a case, the ratio of the overhead due to parallel simulation to the total simulation time is so small that it can be ignored. Therefore, as long as PCs are available, the number of sensor nodes to be simulated is not limited. In addition, our parallel simulation environment can be constructed easily at the low cost because PCs interconnected through LAN are used without change.

An Adaptive Information Hiding Technique of JPEG2000-based Image using Chaotic System (카오스 시스템을 이용한 JPEG2000-기반 영상의 적응적 정보 은닉 기술)

  • 김수민;서영호;김동욱
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.4
    • /
    • pp.9-21
    • /
    • 2004
  • In this paper, we proposed the image hiding method which decreases calculation amount by encrypt partial data using discrete wavelet transform and linear scale quantization which were adopted as the main technique for frequency transform in JPEG2000 standard. Also we used the chaotic system which has smaller calculation amount than other encryption algorithms and then dramatically decreased calculation amount. This method operates encryption process between quantization and entropy coding for preserving compression ratio of images and uses the subband selection method and the random changing method using the chaotic system. For ciphering the quantization index we use a novel image encryption algerian of cyclically shifted in the right or left direction and encrypts two quantization assignment method (Top-down/Reflection code), made change of data less. Also, suggested encryption method to JPEG2000 progressive transmission. The experiments have been performed with the proposed methods implemented in software for about 500 images. consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. It has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.

A New Demosaicking Algorithm for Honeycomb CFA CCD by Utilizing Color Filter Characteristics (Honeycomb CFA 구조를 갖는 CCD 이미지센서의 필터특성을 고려한 디모자이킹 알고리즘의 개발 및 검증)

  • Seo, Joo-Hyun;Jeong, Yong-Jin
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.48 no.3
    • /
    • pp.62-70
    • /
    • 2011
  • Nowadays image sensor is an essential component in many multimedia devices, and it is covered by a color filter array to filter out specific color components at each pixel. We need a certain algorithm to combine those color components reconstructed a full color image from incomplete color samples output from an image sensor, which is called a demosaicking process. Most existing demosaicking algorithms are developed for ideal image sensors, but they do not work well for the practical cases because of dissimilar characteristics of each sensor. In this paper, we propose a new demosaicking algorithm in which the color filter characteristics are fully utilized to generate a good image. To demonstrate significance of our algorithm, we used a commerically available sensor, CBN385B, which is a sort of Honeycomb-style CFA(Color Filter Array) CCD image sensor. As a performance metric of the algorithm, PSNR(Peak Signal to Noise Ratio) and RGB distribution of the output image are used. We first implemented our algorithm in C-language for simulation on various input images. As a result, we could obtain much enhanced images whose PSNR was improved by 4~8 dB compared to the commonly idealized approaches, and we also could remove the inclined red property which was an unique characteristics of the image sensor(CBN385B).Then we implemented it in hardware to overcome its problem of computational complexity which made it operate slow in software. The hardware was verified on Spartan-3E FPGA(Field Programable Gate Array) to give almost the same performance as software, but in much faster execution time. The total logic gate count is 45K, and it handles 25 image frmaes per second.

Elementary Teachers' Epistemological Beliefs and Practice on Convergent Science Teaching: Survey and Self-Study (융합적 과학수업에 대한 초등교사의 인식론적 신념과 실행 -조사연구 및 자기연구-)

  • Lee, Sooah;Jhun, Youngseok
    • Journal of The Korean Association For Science Education
    • /
    • v.40 no.4
    • /
    • pp.359-374
    • /
    • 2020
  • This study is a complex type consisting of survey study and self-study. The former investigated elementary teachers' epistemological beliefs on convergence knowledge and teaching. As a representative of the result of survey study I, as a teacher as well as a researcher, was the participant of the self-study, which investigated my epistemological belief on convergence knowledge and teaching and my execution of convergent science teaching based on family resemblance of mathematics, science, and physical education. A set of open-ended written questionnaires was administered to 28 elementary teachers. Participating teachers considered convergent teaching as discipline-using or multi-disciplinary teaching. They also have epistemological beliefs in which they conceived convergence knowledge as aggregation of diverse disciplinary knowledge and students could get it through their own problem solving processes. As a teacher and researcher I have similar epistemological belief as the other teachers. During the self-study, I tried to apply convergence knowledge system based on the family resemblance analysis among math, science, and PE to my teaching. Inter-disciplinary approach to convergence teaching was not easy for me to conduct. Mathematical units, ratio and rate were linked to science concept of velocity so that it was effective to converge two disciplines. Moreover PE offered specific context where the concepts of math and science were connected convergently so that PE facilitated inter-disciplinary convergent teaching. The gaps between my epistemological belief and inter-disciplinary convergence knowledge based on family resemblance and the cases of how to bridge the gap by my experience were discussed.

An Overrun Control Method and its Synthesis Method for Real-Time Systems with Probabilistic Timing Constraints (확률적인 시간 제약 조건을 갖는 실시간 시스템을 위한 과실행 제어 및 합성 기법)

  • Kim, Kang-Hee;Hwang, Ho-Young
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.5
    • /
    • pp.243-254
    • /
    • 2005
  • Soft real-time applications such as multimedia feature highly variable processor requirements and probabilistic guarantees on deadline misses, meaning that each task in the application meets its deadline with a given probability. Thus, for such soft real-time applications, a system designer may want to improve the system utilization by allocating to each task a processor time less than its worst-case requirement, as long as the imposed probabilistic timing constraint is met. In this case, however, we have to address how to schedule jobs of a task that require more than (or, overrun) the allocated processor time to the task. In this paper, to address the overrun problem, we propose an overrun control method, which probabilistically controls the execution of overrunning jobs. The proposed overrun control method probabilistically allows overrunning jobs to complete for better system utilization, and also probabilistically prevents the overrunning jobs from completing so that the required probabilistic timing constraint for each task can be met. In the paper, we show that the proposed method outperforms previous methods proposed in the literature in terms of the overall deadline miss ratio, and that it is possible to synthesize the scheduling parameters of our method so that all tasks can meet the given probabilistic timing constraints.

A Encryption Technique of JPEG2000 Image Using 3-Dimensional Chaotic Cat Map (3차원 카오스 캣맵을 이용한 JPEG2000 영상의 암호화 기술)

  • Choi, Hyun-Jun;Kim, Soo-Min;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.5 s.305
    • /
    • pp.173-180
    • /
    • 2005
  • In this paper, we proposed the image hiding method which decreases calculation amount by encrypt partial data using discrete wavelet transform(DWT) and linear scale quantization which were adopted as the main technique for frequency transform in JPEG2000 standard. Also we used the chaotic system and cat map which has smaller calculation amount than other encryption algorithms and then dramatically decreased calculation amount. This method operates encryption process between quantization and entropy coding for preserving compression ratio of images and uses the subband selection method. Also, suggested encryption method to JPEG2000 progressive transmission. The experiments have been performed with the Proposed methods implemented in software for about 500 images. Consequently, we are sure that the proposed is efficient image encryption methods to acquire the high encryption effect with small amount of encryption. It has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas.

A Performance Improvement of Linux TCP/IP Stack based on Flow-Level Parallelism in a Multi-Core System (멀티코어 시스템에서 흐름 수준 병렬처리에 기반한 리눅스 TCP/IP 스택의 성능 개선)

  • Kwon, Hui-Ung;Jung, Hyung-Jin;Kwak, Hu-Keun;Kim, Young-Jong;Chung, Kyu-Sik
    • The KIPS Transactions:PartA
    • /
    • v.16A no.2
    • /
    • pp.113-124
    • /
    • 2009
  • With increasing multicore system, much effort has been put on the performance improvement of its application. Because multicore system has multiple processing devices in one system, its processing power increases compared to the single core system. However in many cases the advantages of multicore can not be exploited fully because the existing software and hardware were designed to be suitable for single core. When the existing software runs on multicore, its performance improvement is limited by the bottleneck of sharing resources and the inefficient use of cache memory on multicore. Therefore, according as the number of core increases, it doesn't show performance improvement and shows performance drop in the worst case. In this paper we propose a method of performance improvement of multicore system by applying Flow-Level Parallelism to the existing TCP/IP network application and operating system. The proposed method sets up the execution environment so that each core unit operates independently as much as possible in network application, TCP/IP stack on operating system, device driver, and network interface. Moreover it distributes network traffics to each core unit through L2 switch. The proposed method allows to minimize the sharing of application data, data structure, socket, device driver, and network interface between each core. Also it allows to minimize the competition among cores to take resources and increase the hit ratio of cache. We implemented the proposed methods with 8 core system and performed experiment. Experimental results show that network access speed and bandwidth increase linearly according to the number of core.