• Title/Summary/Keyword: Time graph

Search Result 938, Processing Time 0.023 seconds

Synthesizing multi-loop control systems with period adjustment and Kernel compilation (주기 조정과 커널 자동 생성을 통한 다중 루프 시스템의 구현)

  • Hong, Seong-Soo;Choi, Chong-Ho;Park, Hong-Seong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.3 no.2
    • /
    • pp.187-196
    • /
    • 1997
  • This paper presents a semi-automatic methodology to synthesize executable digital controller saftware in a multi-loop control system. A digital controller is described by a task graph and end-to-end timing requirements. A task graph denotes the software structure of the controller, and the end-to-end requirements establish timing relationships between external inputs and outputs. Our approach translates the end-to-end requirements into a set of task attributes such as task periods and deadlines using nonlinear optimization techniques. Such attributes are essential for control engineers to implement control programs and schedule them in a control system with limited resources. In current engineering practice, human programmers manually derive those attributes in an ad hoc manner: they often resort to radical over-sampling to safely guarantee the given timing requirements, and thus render the resultant system poorly utilized. After task-specific attributes are derived, the tasks are scheduled on a single CPU and the compiled kernel is synthesized. We illustrate this process with a non-trivial servo motor control system.

  • PDF

Influence of stress level on uniaxial ratcheting effect and ratcheting strain rate in austenitic stainless steel Z2CND18.12N

  • Chen, Xiaohui;Chen, Xu;Chen, Haofeng
    • Steel and Composite Structures
    • /
    • v.27 no.1
    • /
    • pp.89-94
    • /
    • 2018
  • Uniaxial ratcheting behavior of Z2CND18.12N austenitic stainless steel used nuclear power plant piping material was studied. The results indicated that ratcheting strain increased with increasing of stress amplitude under the same mean stress and different stress amplitude, ratcheting strain increased with increasing of mean stress under the same stress amplitude and different mean stress. Based on least square method, a suitable method to arrest ratcheting by loading the materials was proposed, namely determined method of zero ratcheting strain rate. Zero ratcheting strain rate occur under specified mean stress and stress amplitudes. Moreover, three dimensional ratcheting boundary surface graph was established with stress amplitude, mean stress and ratcheting strain rate. This represents a graphical surface zone to study the ratcheting strain rates for various mean stress and stress amplitude combinations. The graph showed the ratcheting behavior under various combinations of mean and amplitude stresses. The graph was also expressed with the help of experimental results of certain sets of mean and stress amplitude conditions. Further, experimentation cost and time can be saved.

Execution of a functional Logic language using the Dataflow Graph Representation (데이터플로우 그래프 표현 방식을 이용한 함수 논리 언어의 실행)

  • Kim, Yong-Jun;Cheon, Suh-Hyun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.9
    • /
    • pp.2435-2446
    • /
    • 1998
  • In this paper. We describe a dataflow model for efficient execution of a functional logic language and a method of translation a functional logic language into a dataflow graph. To explore parallelism and intelligent backtracking, we us model in which clause and function are represented as independent dataflow graph. The node denotes basic actions to be performed when the clause and function are executed. The dataflow mechanism allows an operation to be executed as soon as all its operands are available. Since the operations can never be executed earlier, a dataflow model is an excellent base for increasing execution speed. We did decrease a delay time with concurrent execution of dependency analysis and subgoal.

  • PDF

Body weight, graph of body condition score, distribution of milk production, and use or metabolic profiles test for dairy herd health management (우군 건강관리를 위한 체중측정, 체형 그래프 산유량 분포도, 대사프로필 검색의 활용)

  • 김홍집;은길수;강병선;이재규;김정한;송희종
    • Korean Journal of Veterinary Service
    • /
    • v.24 no.3
    • /
    • pp.279-285
    • /
    • 2001
  • The change of the body condition score(BCS) and milk production graph as days in milk by lactation number show that the productivity of cow is on the increase as increase the lactation number, but the health condition is much worse because of the inappropriate nutrition intake. Metabolic profiles test(MPT) results indicate that the early-lactation for directly after the parturition to the peak production of milk during the total lactation period is the time of the more likely to be exposed to lack of energy, protein, minerals. To solve this problem, the early-lactation cows should be sufficiently supplied the required nutrients and should maximum intake the supplied nutrients not to be suddenly decline body weight and BCS from postparturition to the peak production of milk. To maximize the dry matter intake of a cow, there is have got to improve the management of body weight for heifer's skeletal development and in the dry period which is carelessly deal by mostly farms. This study presents that the use of measurement of body weight, graph of body condition score, distribution of milk production, metabolic profiles test in the monitoring for dairy herd health management is very valuable.

  • PDF

Indexing of XML with B+-tree (B+-tree를 이용한 XML 색인기법)

  • Kwon, Guk-Bong;Hong, Dong-Kweon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.1
    • /
    • pp.94-100
    • /
    • 2006
  • Computing paradigm shift to internet-based one has accelerated the use of XML in diverse applications. This phenomena has made the explosive increases of XML data and it triggered many active researches in maintaining very huge amount of XML data in turn. In this paper we present a persistent graph-based XML indexing lot data-centric XML data. In our approach we use 3 graphs to represent XML indexes and XML data itself. They are schema graph, data graph index. And then we have mapped those graphs to B+-trees the persistency. With our approach we can achieve linear query execution time with the increase of XML sizes.

A Low Power-Driven Data Path Optimization based on Minimizing Switching Activity (스위칭 동작 최소화를 통한 저전력 데이터 경로 최적화)

  • 임세진;조준동
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.36C no.4
    • /
    • pp.17-29
    • /
    • 1999
  • This paper presents a high level synthesis method targeting low power consumption for data-dominated CMOS circuits (e.g., DSP). The high level synthesis is divided into three basic tasks: scheduling, resource and register allocation. For lower power scheduling, we increase the possibility of reusing an input operand of functional units. For a scheduled data flow graph, a compatibility graph for register and resource allocation is formed, and then a special weighted network is then constructed from the compatibility graph and the minimum cost flow algorithm is performed on the network to obtain the minimum power consumption data path assignment. The formulated problem is then solved optimally in polynomial time. This method reduces both the switching activity and the capacitance in synthesized data path. Experimental results show 15% power reduction in benchmark circuits.

  • PDF

A DoS Detection Method Based on Composition Self-Similarity

  • Jian-Qi, Zhu;Feng, Fu;Kim, Chong-Kwon;Ke-Xin, Yin;Yan-Heng, Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.5
    • /
    • pp.1463-1478
    • /
    • 2012
  • Based on the theory of local-world network, the composition self-similarity (CSS) of network traffic is presented for the first time in this paper for the study of DoS detection. We propose the concept of composition distribution graph and design the relative operations. The $(R/S)^d$ algorithm is designed for calculating the Hurst parameter. Based on composition distribution graph and Kullback Leibler (KL) divergence, we propose the composition self-similarity anomaly detection (CSSD) method for the detection of DoS attacks. We evaluate the effectiveness of the proposed method. Compared to other entropy based anomaly detection methods, our method is more accurate and with higher sensitivity in the detection of DoS attacks.

Using Genetic Algorithm for Optimal Security Hardening in Risk Flow Attack Graph

  • Dai, Fangfang;Zheng, Kangfeng;Wu, Bin;Luo, Shoushan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1920-1937
    • /
    • 2015
  • Network environment has been under constant threat from both malicious attackers and inherent vulnerabilities of network infrastructure. Existence of such threats calls for exhaustive vulnerability analyzing to guarantee a secure system. However, due to the diversity of security hazards, analysts have to select from massive alternative hardening strategies, which is laborious and time-consuming. In this paper, we develop an approach to seek for possible hardening strategies and prioritize them to help security analysts to handle the optimal ones. In particular, we apply a Risk Flow Attack Graph (RFAG) to represent network situation and attack scenarios, and analyze them to measure network risk. We also employ a multi-objective genetic algorithm to infer the priority of hardening strategies automatically. Finally, we present some numerical results to show the performance of prioritizing strategies by network risk and hardening cost and illustrate the application of optimal hardening strategy set in typical cases. Our novel approach provides a promising new direction for network and vulnerability analysis to take proper precautions to reduce network risk.

Robust Recognition of 3D Object Using Attributed Relation Graph of Silhouette's (실루엣 기반의 관계그래프 이용한 강인한 3차원 물체 인식)

  • Kim, Dae-Woong;Baek, Kyung-Hwan;Hahn, Hern-Soo
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.25 no.7
    • /
    • pp.103-110
    • /
    • 2008
  • This paper presents a new approach of recognizing a 3D object using a single camera, based on the extended convex hull of its silhouette. It aims at minimizing the DB size and simplifying the processes for matching and feature extraction. For this purpose, two concepts are introduced: extended convex hull and measurable region. Extended convex hull consists of convex curved edges as well as convex polygons. Measurable region is the cluster of the viewing vectors of a camera represented as the points on the orientation sphere from which a specific set of surfaces can be measured. A measurable region is represented by the extended convex hull of the silhouette which can be obtained by viewing the object from the center of the measurable region. Each silhouette is represented by a relation graph where a node describes an edge using its type, length, reality, and components. Experimental results are included to show that the proposed algorithm works efficiently even when the objects are overlapped and partially occluded. The time complexity for searching the object model in the database is O(N) where N is the number of silhouette models.

A Study on Optimal Scheduling with Directed Acyclic Graphs Task onto Multiprocessors (다중프로세서에서 비순환 타스크 그래프의 최적 스케쥴링에 관한 연구)

  • 조민환
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.4
    • /
    • pp.40-46
    • /
    • 1999
  • The task scheduling has an effect on system execution time in a precedence constrained task graph onto the multiprocessor system. This problem is known to be NP-hard. many people made an effort to obtain near optimal schedule. We compared modified critical path schedule with many other methods(CP, MH, DL Swapping) For testing this subject, we created randomly a directed acyclic task graph with many root nodes and terminal nodes simulation result convinced for us that the modified critical path algorithm is superior to the other scheduling algorithm.

  • PDF