• Title/Summary/Keyword: Instruction Duplication

Search Result 7, Processing Time 0.025 seconds

Soft Error Detection for VLIW Architectures with a Variable Length Execution Set (Variable Length Execution Set을 지원하는 VLIW 아키텍처를 위한 소프트 에러 검출 기법)

  • Lee, Jongwon;Cho, Doosan;Paek, Yunheung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.3
    • /
    • pp.111-116
    • /
    • 2013
  • With technology scaling, soft error rate has greatly increased in embedded systems. Due to high performance and low power consumption, VLIW (Very Long Instruction Word) architectures have been widely used in embedded systems and thus many researches have been studied to improve the reliability of a system by duplicating instructions in VLIW architectures. However, existing studies have ignored the feature, called VLES (Variable Length Execution Set), which is adopted in most modern VLIW architectures to reduce code size. In this paper, we propose how to support instruction duplication in VLIW architecture with VLES. Our experimental results demonstrate that a VLIW architecture with VLES shows 64% code size decrement on average at the cost of about 4% additional cell area as compared to the case of a VLIW architecture without VLES when instruction duplication is applied to both architectures. Also, it is shown that the case with VLES does not cause extra execution time compared to the case without VLES.

Chiron-2 Architecture Based Score Processing System for Web-Based Education (웹 기반 학습을 위한 Chiron-2 아키텍처기반의 성적처리 시스템)

  • Jeong Hwa-Young
    • Journal of Internet Computing and Services
    • /
    • v.6 no.4
    • /
    • pp.1-7
    • /
    • 2005
  • Web-Based instruction system implemented according to CGI based process-oriented. But, in case of system development, theses method is able to take inefficiency with duplication of program code. Also, ofter the development, it takes difficult on the operation and management. In this research, I implement Web-based score processing system by component composition. Applied component model is Java Beans and composition method is to use Chiron-2 architecture. By this method, this research shows the high efficiency - not only structural advance but also low value of cyclomatic complex that measure a maintenance.

  • PDF

A Study on Common Interface providing among Heterogeneous Terminal in Ubiquitous (유비쿼터스 환경에서 이기종 단말기 간의 공통 인터페이스 제공에 관한 연구)

  • Park, Jung-Yeon
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2006.11a
    • /
    • pp.391-394
    • /
    • 2006
  • This paper deals with the method will be able to support a common interface softly for the different with each other operating system users in next generation ubiquitous network. To controls in proxy servers that data portion be able to use commonly such as each different instruction, metaphor, image based on operating system, icons, it will be able to increases the efficiency of bandwidth use and minimizes a duplication transmission data from inside the bandwidth which is limited. Also it will be able to do method of common user interface provision to support seamless connectivity with each different network devices in the next generation.

  • PDF

A Code Block Cipher Method to Protect Application Programs From Reverse Engineering (응용프로그램 역분석 방지를 위한 코드블록 암호화 방법)

  • Jung, Dong-Woo;Kim, Hyong-Shik;Park, Joong-Gil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.85-96
    • /
    • 2008
  • One of the typical methods to prevent tampering and reverse engineering on executable codes is to encrypt them. This paper proposes a code block cipher method based on key chaining to encrypt the code. The block cipher by key chaining has been known to be inadequate for encrypting the code with control transfer, even though the key chaining has advantage of hiding the keys in blocks and making the individual keys different from block to block. This paper proposes a block transformation and duplication method to apply the block cipher by key chaining to the executable codes with control transfer instructions, and shows the idea works with the MIPS instruction set.

Similarity Detection in Object Codes and Design of Its Tool (목적 코드에서 유사도 검출과 그 도구의 설계)

  • Yoo, Jang-Hee
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.1-8
    • /
    • 2020
  • The similarity detection to plagiarism or duplication of computer programs requires a different type of analysis methods and tools according to the programming language used in the implementation and the sort of code to be analyzed. In recent years, the similarity appraisal for the object code in the embedded system, which requires a considerable resource along with a more complicated procedure and advanced skill compared to the source code, is increasing. In this study, we described a method for analyzing the similarity of functional units in the assembly language through the conversion of object code using the reverse engineering approach, such as the reverse assembly technique to the object code. The instruction and operand table for comparing the similarity is generated by using the syntax analysis of the code in assembly language, and a tool for detecting the similarity is designed.

An Analysis of an Elementary Math Class Program for Gifted Students and Its Current Status (초등수학 영재학급의 운영 실태 및 프로그램 분석)

  • Kim, Sang Mi;Choi, Chang Woo
    • Education of Primary School Mathematics
    • /
    • v.20 no.1
    • /
    • pp.37-52
    • /
    • 2017
  • The purpose of this thesis is to analyze the current status of a program for an elementary math class for gifted students in Daegu and to propose a remedy. The main results of this thesis are as follows. First, goals of the gifted class and the basic operation direction were satisfactory, however plans for parent training programs and self evaluation of the classes were not presented. Therefore, it needs when and how to do for specific plan of gifted class evaluation and parent training programs. Second, The annual instruction plan has been restricted to the subject matter education and field trips and has not included specific teaching methods in accordance with the contents of learning program. The management of gifted classes, therefore, requires not only the subject matter education and field trips but also output presentations, leadership programs, voluntary activities, events and camps which promote the integral development of gifted students. Third, there is no duplication of content to another grade, and various activities did not cover the whole scope of math topics(eg. number and operation, geometry, measurement, pattern) equally. In accordance with elementary mathematics characteristics, teachers should equally distribute time in whole range of mathematics while they teach students in the class because it is critical to discover gifted students throughout the whole curriculum of elementary mathematics. Fourth, as there are insufficient support and operational lack of material development, several types of programs are not utilized and balanced. It is necessary for teachers to try to find the type of teaching methods in accordance with the circumstances and content, so that students can experience several types of programs. If through this study, we can improve the development, management and quality of gifted math programs, it would further the development of gifted education.

A Study on Major Safety Problems and Improvement Measures of Personal Mobility (개인형 이동장치의 안전 주요 문제점 및 개선방안 연구)

  • Kang, Seung Shik;Kang, Seong Kyung
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.1
    • /
    • pp.202-217
    • /
    • 2022
  • Purpose: The recent increased use of Personal Mobility (PM) has been accompanied by a rise in the annual number of accidents. Accordingly, the safety requirements for PM use are being strengthened, but the laws/systems, infrastructure, and management systems remain insufficient for fostering a safe environment. Therefore, this study comprehensively searches the main problems and improvement methods through a review of previous studies that are related to PM. Then the priorities according to the importance of the improvement methods are presented through the Delphi survey. Method: The research method is mainly composed of a literature study and an expert survey (Delphi survey). Prior research and improvement cases (local governments, government departments, companies, etc.) are reviewed to derive problems and improvements, and a problem/improvement classification table is created based on keywords. Based on the classification contents, an expert survey is conducted to derive a priority improvement plan. Result: The PM-related problems were in 'non-compliance with traffic laws, lack of knowledge, inexperienced operation, and lack of safety awareness' in relation to human factors, and 'device characteristics, road-drivable space, road facilities, parking facilities' in relation to physical factors. 'Management/supervision, product management, user management, education/training' as administrative factors and legal factors are divided into 'absence/sufficiency of law, confusion/duplication, reduced effectiveness'. Improvement tasks related to this include 'PM education/public relations, parking/return, road improvement, PM registration/management, insurance, safety standards, traffic standards, PM device safety, PM supplementary facilities, enforcement/management, dedicated organization, service providers, management system, and related laws/institutional improvement', and 42 detailed tasks are derived for these 14 core tasks. The results for the importance evaluation of detailed tasks show that the tasks with a high overall average for the evaluation items of cost, time, effect, urgency, and feasibility were 'strengthening crackdown/instruction activities, education publicity/campaign, truancy PM management, and clarification of traffic rules'. Conclusion: The PM market is experiencing gradual growth based on shared services and a safe environment for PM use must be ensured along with industrial revitalization. In this respect, this study seeks out the major problems and improvement plans related to PM from a comprehensive point of view and prioritizes the necessary improvement measures. Therefore, it can serve as a basis of data for future policy establishment. In the future, in-depth data supplementation will be required for each key improvement area for practical policy application.