• Title/Summary/Keyword: Real-time Execution

Search Result 541, Processing Time 0.026 seconds

Mining High Utility Sequential Patterns Using Sequence Utility Lists (시퀀스 유틸리티 리스트를 사용하여 높은 유틸리티 순차 패턴 탐사 기법)

  • Park, Jong Soo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.2
    • /
    • pp.51-62
    • /
    • 2018
  • High utility sequential pattern (HUSP) mining has been considered as an important research topic in data mining. Although some algorithms have been proposed for this topic, they incur the problem of producing a large search space for HUSPs. The tighter utility upper bound of a sequence can prune more unpromising patterns early in the search space. In this paper, we propose a sequence expected utility (SEU) as a new utility upper bound of each sequence, which is the maximum expected utility of a sequence and all its descendant sequences. A sequence utility list for each pattern is used as a new data structure to maintain essential information for mining HUSPs. We devise an algorithm, high sequence utility list-span (HSUL-Span), to identify HUSPs by employing SEU. Experimental results on both synthetic and real datasets from different domains show that HSUL-Span generates considerably less candidate patterns and outperforms other algorithms in terms of execution time.

Development of a Remote Rendering System using Direct3D API (Direct3D API의 원격 실시간 실행 시스템 개발)

  • Lim, Choong-Gyoo
    • Journal of Korea Game Society
    • /
    • v.14 no.5
    • /
    • pp.117-126
    • /
    • 2014
  • There are various kinds of applications if one can develop a remote execution system using for legacy 3D APIs. It can be used in implementing a cloud gaming service based on the real-time video streaming technology. Or, it can also be used in implementing a GPU virtualization for simultaneously rendering of many different 3D applications. The OpenGL API consists of independent global functions while the Direct3D API consists of Microsoft COM-based interfaces and their member functions, which makes the implementation of remote rendering system more difficult. The purpose of the paper is to show the applicability of the technology to any legacy 3D API by successfully designing and implementing a remote rendering system using the Direct3D API. It applies the implementation to a sample Direct3D application and also performs a few experimentations to show the technical feasibility.

Research of Interopaeration Simulation between War Game Simulator and Communication Effect Simulator using HLA/RTI (HLA/RTI를 이용한 워게임 시뮬레이터와 통신 효과 시뮬레이터의 연동 시뮬레이션 연구)

  • Kim, Deok-Su;Bae, Jang Won;Park, Soo Bum;Kim, Tag Gon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.1
    • /
    • pp.46-54
    • /
    • 2015
  • Wargame simulators are widely used in the field of defence modeling and simulation. Because of increasing importance of communication effects on the warfare, the war game simulator is also required to reflect communication effects. One way to satisfy the requirement is the interoperation simulation between war game simulator and communication effect simulators. This paper shows the application of interoperation simulation between war game and communication effect simulators using HLA(High-Level Architecture)/RTI(RunTime Infrastructure). The war game simulator mainly deal with the engagement of troops and the troops communicate each other at the mission execution level. In the other hand, The communication effect simulator perform communication actions between the troops in the engineering level. Using the interoperation simulation, we can reflect the communication effects on the war game simulation. We show various applications of the interoperation simulation with the point of the war game and communication effect simulator. with a case study, we explain the interoperation simulation improves the reality and fidelity of the war game simulator and how the interoperation simulation can be applied to developing doctrines and real communication system.

H-IMA : IMA based Hybrid Platform Architecture for Improving Portability of Flight Software (H-IMA : 비행 소프트웨어의 이식성 향상을 위한 IMA 기반의 혼합형 플랫폼 아키텍처)

  • Seo, Yongjin;Yun, Sangpil;Joe, Hyunwoo;Kwon, Cheolsoon;Kim, Hyungshin;Kim, Hyeon Soo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.1
    • /
    • pp.7-18
    • /
    • 2014
  • Flight software operated on the on-board computers in the satellite has requirements such as real-time and high reliability. These requirements make dependency between the flight software and operating environments. Further, whenever a new system is built, such problem drives that all flight software are redeveloped. Thus, the dependency between them should be removed. And the work can be achieved by improving the portability of the flight software. In this paper, we propose a platform architecture based on the IMA architecture. The platform architecture is a hybrid one built by blending two kinds of realizations of the IMA architecture in order to maximize portability. In addition, we implement a prototype system and analyze the execution results of the system to justify the proposed architecture. The proposed architecture enables us to remove the dependency between fight software and operating environments.

Instruction Level Resource Usage Analysis Method for Embedded Systems (임베디드 시스템에서 명령어 기반의 자원 사용 분석 방법)

  • Cho, Jae-hwang;Jung, Hun;Shin, Dong-Ha;Son, Sung-Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.436-439
    • /
    • 2005
  • As mobile computers and embedded systems are becoming popular recently, we need to study how to utilize the resources such as power, space, CPU clocks, and memory efficiently. In traditional embedded system development, we were interested in resource usage based on hardware but, as software is becoming more important, we need to study how to analyze the resource usage based on software. In this research, we propose a new method called 'Instruction Level Resource Usage Analysis Method' and implement it as a resource usage analysis tool called 'I-Debugger'. I-Debugger is constructed on three layers: debugging layer which controls the execution of software on instruction level, statistic layer which gathers real-time data and convert to useful information, and analysis layer which generate useful information to specific applications. We have applied the debugger to some simple problem and found that our method is useful in developing resource efficient embedded systems.

  • PDF

A Study on the Cacti-based Network Traffic Monitoring System Using Libpcap (Libpcap를 이용한 Cacti기반 네트워크 트래픽 모니터링 시스템)

  • Huang, Xiao;Ban, Tae-Hak;Ham, Jong-Wan;Jeong, Sun-Chul;Jung, Heo-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.643-645
    • /
    • 2011
  • For network is growing at a rapid rate, network environment is more complex. The technology of using network traffic to monitor our network in real-time is developed. Cacti is a representative monitoring tool which based on RRDTool(Round Robin Database tool), SNMP(Simple Network Management Protocol). In this paper, it show you how to develop a system which based on Cacti and Libpcap to monitor our monitored objects. At this system, using Libpcap to capture network traffic packets, analyze these packets and then turn out in Cacti in graphical form. So as to achieve monitoring system. This system's execution is efficient and the management is easy and the results are accurate, so it can be widely utilized in the future.

  • PDF

An Efficient Method to Find Accurate Spot-matching Patterns in Protein 2-DE Image Analysis (단백질 2-DE 이미지 분석에서 정확한 스팟 매칭 패턴 검색을 위한 효과적인 방법)

  • Jin, Yan-Hua;Lee, Won-Suk
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.5
    • /
    • pp.551-555
    • /
    • 2010
  • In protein 2-DE image analysis, the accuracy of spot-matching operation which identifies the spot of the same protein in each 2-DE gel image is intensively influenced by the errors caused by the various experimental conditions. This paper proposes an efficient method to find more accurate spot-matching patterns based on multiple reference gel images in spot-matching pattern analysis in protein 2-DE image analysis. Additionally, in order to improve the reduce the execution time which is increased exponentially along with the increasing number of gel images, a "partition then extension" framework is used to find spot-matching pattern of long length and of higher accuracy. In the experiments on real 2-DE images of human liver tissue are used to confirm the accuracy and the efficiency of the proposed algorithm.

Development of Mobile Performance Management System Using Real-Time Monitoring Method (실시간 모니터링 기법을 이용한 모바일 성능 관리 시스템 개발)

  • Jeong, Taeg-Won;Lee, Chul-Han;Lee, Chong-Deuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1894-1902
    • /
    • 2009
  • As the spread of LBS(Location Based Service), MDT(Mobile Data Terminal) and PDA (Personal Digital Assistant) services using mobile terminals, various systems are under development to to manage the performance of these services. This paper describes a mobile performance management system which is implemented to test the performance of mobility between the user and the terminal or between the terminal and the mobile server automatically in the mobile-user field. The system has four modules: scenario management module, MDT monitoring, LBS monitoring, and PDA monitoring. The scenario management module manages the performance by monitoring all modules. The LBS monitoring module monitors LBS call attempt stage, call connecting stage, and LBS test for established connection. Thus, the LBS monitoring module manages the performance for every stage of the call. The MDT monitoring module monitors the performance according to the input command and the PDA monitoring module monitors according to the input from the set up and the execution menu.

Low-Energy Intra-Task Voltage Scheduling using Static Timing Analysis (정적 시간 분석을 이용한 저전력 태스크내 전압 스케줄링)

  • Sin, Dong-Gun;Kim, Ji-Hong;Lee, Seong-Su
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.28 no.11
    • /
    • pp.561-572
    • /
    • 2001
  • Since energy consumption of CMOS circuits has a quadratic dependency on the supply voltage, lowering the supply voltage is the most effective way of reducing energy consumption. We propose an intra-task voltage scheduling algorithm for low-energy hard real-time applications. Based on a static timing analysis technique, the proposed algorithm controls the supply voltage within an individual task boundary. By fully exploiting all the slack times, as scheduled program by the proposed algorithm always complete its execution near the deadline, thus achieving a high energy reduction ratio. In order to validate the effectiveness of the proposed algorithm, we built a software tool that automatically converts a DVS-unaware program into an equivalent low-energy program. Experimental results show that the low-energy version of an MPEG-4 encoder/decoder (converted by the software tool) consumes less than 7~25% of the original program running on a fixed-voltage system with a power-down mode.

  • PDF

An Enhancement Scheme of Dynamic Analysis for Evasive Android Malware (분석 회피 기능을 갖는 안드로이드 악성코드 동적 분석 기능 향상 기법)

  • Ahn, Jinung;Yoon, Hongsun;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.519-529
    • /
    • 2019
  • Nowadays, intelligent Android malware applies anti-analysis techniques to hide malicious behaviors and make it difficult for anti-virus vendors to detect its presence. Malware can use background components to hide harmful operations, use activity-alias to get around with automation script, or wipe the logcat to avoid forensics. During our study, several static analysis tools can not extract these hidden components like main activity, and dynamic analysis tools also have problem with code coverage due to partial execution of android malware. In this paper, we design and implement a system to analyze intelligent malware that uses anti-analysis techniques to improve detection rate of evasive malware. It extracts the hidden components of malware, runs background components like service, and generates all the intent events defined in the app. We also implemented a real-time logging system that uses modified logcat to block deleting logs from malware. As a result, we improve detection rate from 70.9% to 89.6% comparing other container based dynamic analysis platform with proposed system.