• Title/Summary/Keyword: Implementation Phase

Search Result 1,243, Processing Time 0.027 seconds

Implementation of Worst Case Execution Time Analysis Tool For Embedded Software based on XScale Processor (XScale 프로세서 기반의 임베디드 소프트웨어를 위한 최악실행시간 분석도구의 구현)

  • Park, Hyeon-Hui;Choi, Myeong-Su;Yang, Seung-Min;Choi, Yong-Hoon;Lim, Hyung-Taek
    • The KIPS Transactions:PartA
    • /
    • v.12A no.5 s.95
    • /
    • pp.365-374
    • /
    • 2005
  • Schedulability analysis is necessary to build reliable embedded real-time systems. For schedulability analysis, worst-case execution time(WCET) analysis that computes upper bounds of the execution times of tasks, is required indispensably. WCET analysis is done in two phases. The first phase is high-level analysis that analyzes control flow and finds longest paths of the program. The second phase is low-level analysis that computes execution cycles of basic blocks taking into account the hardware architecture. In this thesis, we design and implement integrated WCET analysis tools. We develop the WCET analysis tools for XScale-based system called WATER(WCET Analysis Tool for Embedded Real-time system). WATER consist of high-level flow analyzer and low-level execution time analyzer. Also, We compare real measurement for execution of program with analysis result calculated by WATER.

Design and Implementation of Real-Time Static Locking Protocol for Main-memory Database Systems (주기억장치 데이타베이스 시스템을 위한 실시간 정적 로킹 기법의 설계 및 구현)

  • Kim, Young-Chul;You, Han-Yang;Kim, Jin-Ho;Kim, June;Seo, Sang-Ku
    • Journal of KIISE:Databases
    • /
    • v.29 no.6
    • /
    • pp.464-476
    • /
    • 2002
  • Main-memory database systems which reside entire databases in main memory are suitable for high-performance real-time transaction processing. If two-phase locking(2PL) as concurrency control protocol is used for the transactions accessing main-memory databases, however, the possibility of lock conflict will be low but lock operations become relatively big overhead in total transaction processing time. In this paper, We designed a real-time static locking(RT-SL) protocol which minimizes lock operation overhead and reflects the priority of transactions and we implemented it on a main-memory real-time database system, Mr.RT. We also evaluate and compare its performance with the existing real-time locking protocols based on 2PL such as 2PL-PI and 2PL-HP. The extensive experiments reveal that our RT-SL outperforms the existing ones in most cases.

Implementation of a Fluxgate Sensor using Ferrite Ring Core (페라이트 링 코어를 사용한 fluxgate 센서의 구현)

  • Park, Yong-Woo;Kim, Ki-Uk;Kim, Nam-Ho;Ryu, Ji-Goo
    • Journal of Sensor Science and Technology
    • /
    • v.8 no.6
    • /
    • pp.427-433
    • /
    • 1999
  • In this paper, we have presented an one-axis fluxgate magnetic sensor with ferrite core, excitation, and pick-up coil. This magnetometer is consist of a sensing element, driving circuits for excitation coil and signal processing for detecting second harmonic frequency component which is proportional to the DC magnetic to be measured. The sensor core is excited by a square waveform of voltage through 82 turns of the excitation coil. The second harmonic output of pick-up coil(150 turns) is measured by a FFT spectrum analyzer. This result is compared to output of PSD(phase sensitive detector) unit for detecting a second harmonic component. The measured sensitivity is about 50 V/T at driving frequency of 2 kHz. The nonlinearity of fluxgate magnetic sensor is calculated about 2.0%.

  • PDF

UML Diagrams Repository System for Requirement Analysis (요구분석을 위한 UML 다이어그램 저장관리 시스템)

  • 이성대;박휴찬
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.6
    • /
    • pp.657-668
    • /
    • 2002
  • Software life cycle consists of requirement analysis, design, implementation, and maintenance phases, and the product of each phase has various format. The UML normalizes such products, and the class diagram, use case diagram, activity diagram and collaboration diagram are usually used for the requirement analysis phase. Because most of UML development tools store such diagrams in a file, there nay be some difficulties of information retrieval and co-work among users. To cope with the difficulties, this paper proposes a database supported methodology to store and manage the diagrams produced by the requirement analysis. In this methodology, the constituents of class, use case, activity and collaboration diagram are first analyzed and then transformed in the form of relational fables. The constituents of such diagrams are stored as tables in a database, and can be easily retrieved from the database by using some queries. This database supported methodology provides the concurrent sharing and high reuse of diagrams.

Technical Papers : Development of KOMPSAT-1 Scheduling & Automatic Command Plan Generator ( KSCG ) (기술논문 : 다목적 실용위성 1 호의 임무계획 및 자동 명령계획표 생성기 개발)

  • Kim,Hae-Dong;Choe,Hae-Jin;Kim,Eun-Gyu
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.30 no.1
    • /
    • pp.139-146
    • /
    • 2002
  • This paper describes the devlopment and implementation for the KOMPSAT-1 scheduling & automatic command plan generator(KSCG). Some problems in mission planning and command planning had occurred using the mission & command planning s/w in MAPS(Missin Analysis and Planning Subsystem) during the LEOP(Launch & Early Orbit Phase) & early normal mission phase due to lots of manual input process and non-automatic process. Therefore, the more mission operations for KOMPSAT-1. In order to prevent the development of new one(KSCG) which should reduce the manual process and generate automatically the command plan has been needed. As a result, the mission operations of KOMPSAT-1 has greatly became stable and more effient.

A Monitoring Mechanism for the System-Level Test of Telecommunications Distributed Applications (정보통신 분산 응용의 시스템 차원 시험을 위한 감시 기법)

  • Lee, Han-Young;Min, Byung-Jun;Kim, Mun-Hee;Seo, Dong-Sun;Hur, Wong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.2
    • /
    • pp.339-347
    • /
    • 1996
  • object-oriented programming is used to develop next-generation telecommu- nications services running on the distributed processing environment. In order to test these services efficiently at the system-level during not only in the development phase but also in the operation phase, we define an embedded monitor service within the infrastructure to monitor the operation of the distributed programs, and describe a system-level test mechanism based on the monitor service. By separating the function of monitor server which monitors operations of objects and collects monitored data and that of tester which makes analysis and decides the sequence of test events, the invasive effect of monitoring can be minimized. At the same time, accurate diagnosis on the system can be achieve by exploiting the test mechanism. The mechanism, as a core component for the implementation of real-time fault-tol-erant systems, is applicable to general-purpose distributeded systems as well.

  • PDF

Development and Positioning Accuracy Assessment of Precise Point Positioning Algorithms based on GPS Code-Pseudorange Measurements (GPS 코드의사거리 기반 정밀단독측위(PPP) 알고리즘 개발 및 측위 정확도 평가)

  • Park, Kwan Dong;Kim, Ji Hye;Won, Ji Hye;Kim, Du Sik
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.22 no.1
    • /
    • pp.47-54
    • /
    • 2014
  • Precise Point Positioning (PPP) algorithms using GPS code pseudo-range measurements were developed and their accuracy was validated for the purpose of implementing them on a portable device. The group delay, relativistic effect, and satellite-antenna phase center offset models were applied as fundamental corrections for PPP. GPS satellite orbit and clock offsets were taken from the International GNSS Service official products which were interpolated using the best available algorithms. Tropospheric and ionospheric delays were obtained by applying mapping functions to the outputs from scientific GPS data processing software and Global Ionosphere Maps, respectively. When the developed algorithms were tested for four days of data, the horizontal and vertical positioning accuracies were 0.8-1.6 and 1.6-2.2 meters, respectively. This level of performance is comparable to that of Differential GPS, and further improvements and fine-tuning of this suite of PPP algorithms and its implementation at a portable device should be utilized in a variety of surveying and Location-Based Service applications.

The Position Control of Induction Motor using Reaching Mode Controller and Neural Networks (리칭모드 제어기와 신경 회로망을 이용한 유도전동기의 위치제어)

  • Yang, Oh
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.37 no.3
    • /
    • pp.72-83
    • /
    • 2000
  • This paper presents the implementation of the position control system for 3 phase induction motor using reaching mode controller and neural networks. The reaching mode controller is used to bring the position error and speed error trajectories toward the sliding surface and to train neural networks at the first time. The structure of the reaching mode controller consists of the switch function of sliding surface. And feedforward neural networks approximates the equivalent control input using the reference speed and reference position and actual speed and actual position measured form an encoder and, are tuned on-line. The reaching mode controller and neural networks are applied to the position control system for 3 phase induction motor and, are compared with a PI controller through computer simulation and experiment respectively. The results are illustrated that the output of reaching mode controller is decreased and feedforward neural networks take charge of the main part for the control action, and the proposed controllers show better performance than the PI controller in abrupt load variation and the precise control is possible because the steady state error can be minimized by training neural networks.

  • PDF

Implementation of Wideband Low Noise Down-Converter for Ku-Band Digital Satellite Broadcasting (Ku-대역 광대역 디지탈 위성방송용 저 잡음하향변환기 개발)

  • Hong, Do-Hyeong;Lee, Kyung Bo;Rhee, Young-Chul
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.2
    • /
    • pp.115-122
    • /
    • 2016
  • In this paper, wideband Ku-band downconverter was designed to receiver digital satellite broadcasting. The low-nose downconverter was designed to form four local oscillator frequencies(9.75, 10, 10.75 and 11.3 GHz) representing a low phase noise due to VCO-PLL with respect to input signals of 10.7 to 12.75 GHz and 3-stage low noise amplifier circuit by broadband noise matching, and to select intermediate frequency bands by digital control. The developed low-noise downconverter exhibited the full conversion gain of 64 dB, and the noise figure of low-noise amplifier was 0.7 dB, the P1dB of output signal 15 dBm, and the phase noise -85 dBc@10kHz at the band 1 carrier frequency of 9.75 GHz. The low noise block downconverter(LNB) for wideband digital satellite broadcasting designed in this paper can be used for global satellite broadcasting LNB.

Cost Based Vulnerability Control Method Using Static Analysis Tool (정적 분석 툴을 이용한 비용 기반의 취약점 처리 방안)

  • Lee, Ki Hyun;Kim, Seok Mo;Park, Young B.;Park, Je Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.3
    • /
    • pp.139-144
    • /
    • 2016
  • When, Software is developed, Applying development methods considering security, it is generated the problem of additional cost. These additional costs are caused not consider security in many developing organization. Even though, proceeding the developments, considering security, lack of ways to get the cost of handling the vulnerability throughput within the given cost. In this paper, propose a method for calculating the vulnerability throughput for using a security vulnerability processed cost-effectively. In the proposed method focuses on the implementation phase of the software development phase, leveraging static analysis tools to find security vulnerabilities in CWE TOP25. The found vulnerabilities are define risk, transaction costs, risk costs and defines the processing priority. utilizing the information in the CWE, Calculating a consumed cost in a detected vulnerability processed through a defined priority, and controls the vulnerability throughput in the input cost. When applying the method, it is expected to handle the maximum risk of vulnerability in the input cost.