• Title/Summary/Keyword: execution analysis

Search Result 1,228, Processing Time 0.035 seconds

A Execution Performance Analysis of Applications using Multi-Process Service over GPU (다중 프로세스 서비스를 이용한 GPU 응용 동시 실행 성능 분석)

  • Kim, Se-Jin;Oh, Ji-Sun;Kim, Yoonhee
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.60-67
    • /
    • 2019
  • Graphical Processing Units(GPUs) achieve high performance undertaking from relatively uniformed computation in parallel. The technology related to General Purpose GPU(GPGPU) has been enhanced, which provides concurrent kernel execution of multi and diverse applications at the same time, but it is still limited to support resource sharing or planning. NVIDIA recently introduces Multi-Process Service(MPS), which allows kernels from different applications can be execute concurrently. However, the strength of MPS comes along with the characteristics of applications and the order of their execution. This paper shows the performance analysis of diverse scientific applications in real world. Based on the analysis, we prove that it is important to the identify characteristics of co-run applications, and to schedule multiple applications via profiling to maximize MPS functionality.

An Analysis of Execution Patterns of Weather Forecast Application in Constraints Conditions (제약 조건에서의 예보를 위한 기상 응용의 실행 패턴 분석)

  • Oh, Jisun;Kim, Yoonhee
    • KNOM Review
    • /
    • v.22 no.3
    • /
    • pp.25-30
    • /
    • 2019
  • For meteorological applications, meaningful results must be derived and provided within time and resource limits. Forecasts through numerous historical data are time-consuming and still have resource limitations in the case of disaster safety-related analyses/predictions such as local typhoon forecasts. Suitable forecasts should be provided without any problems caused by limited physical environmental conditions and when results are to be drawn under time constraints, such as typhoon forecasts and forecast services for flooded areas by road. In this paper, we analyze the application of weather and climate forecasting to provide a suitable forecasting service in both temporal and resource conditions. Through the analysis of execution time according to mesh sizes, it was confirmed that a mesh adjustment can cope with the case of the temporal constraint. In addition, by analyzing the execution time through memory resource control, we confirmed the minimum resource condition that does not affect the performance and the resource usage pattern of the application through the swap and mlock analysis.

Static Type Assignment for SSA Form in CTOC

  • Kim, Ki-Tae;Yoo, Weon-Hee
    • Journal of Information Processing Systems
    • /
    • v.3 no.1
    • /
    • pp.26-32
    • /
    • 2007
  • Although the Java bytecode has numerous advantages, it also has certain shortcomings such as its slow execution speed and difficulty of analysis. In order to overcome such disadvantages, a bytecode analysis and optimization must be performed. The control flow of the bytecode should be analyzed; next, information is required regarding where the variables are defined and used to conduct a dataflow analysis and optimization. There may be cases where variables with an identical name contain different values at different locations during execution, according to the value assigned to a given variable in each location. Therefore, in order to statically determine the value and type, the variables must be separated according to allocation. In order to achieve this, variables can be expressed using a static single assignment form. After transformation into a static single assignment form, the type information of each node expressed by each variable and expression must be configured to perform a static analysis and optimization. Based on the basic type information, this paper proposes a method for finding the related equivalent nodes, setting nodes with strong connection components, and efficiently assigning each node type.

Case of slope stability in weathered metamorphic rock (풍화된 변성암 사면의 안정대책 사례)

  • Kim, Jae-Hong;Park, Chal-Sook;Jeon, Je-Sung;Hong, Won-Pho
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2008.03a
    • /
    • pp.1400-1405
    • /
    • 2008
  • Execute surface of the earth geological survey for stability analysis of stealing cutting sides and investigated wide area nature of soil structure. Inflected DIPS that measure discontinuity's direction that develop to slope and is slope stability a wide use program for Stereographic Projection Method analysis that utilize geometrical correlation of stealing four sides and discontinuity surface. It is principle that angle of internal friction that is basis element of stability estimation applies direct shear test result on joint side, Examination is impossible by case execution, suppose by 30 angles that apply more conservatively in base rock slope sides usually and achieved analysis. When analyze, consider discontinuity's various adult that develop in research slope, after conduct first each discontinuity different assay falling into fault, joint, executed stability estimation which synthesize whole discontinuity data. When ailment element is recognized as analysis result, wished to present stability countermeasure way of most suitable to take into account of execution, stability, economic performance.

  • PDF

A Study on Termination Analysis for Rule Compiler (규칙 컴파일러를 위한 종료 분석 연구)

  • Gang, Byeong-Geuk;Hwang, Jeong-Hui;Sin, Ye-Ho;Ryu, Geun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.823-834
    • /
    • 2001
  • In the active databases, whenever an event occurs, active rules with the matching event specifications are triggered automatically, its action will be executed. Because these rules may in turn trigger other rules including themselves, the set of rules may be executing each other indefinitely. These problem can be solved by rule termination analysis, and it is efficient for the rule termination to execute in compile time of rule. In this paper we not only design rule compiler with rule termination analyzer, but also propose its execution model and algorithm. The completeness of proposed model is verified by algorithm formalization of rule termination analysis.

  • PDF

The effect of sensitive and non-sensitive parameters on DCGL in probability analysis for decommissioning of nuclear facilities

  • Hyung-Woo Seo;Hyein Kim
    • Nuclear Engineering and Technology
    • /
    • v.55 no.10
    • /
    • pp.3559-3570
    • /
    • 2023
  • In the decommissioning of nuclear facilities, Derived Concentration Guideline Level (DCGL) derivation is necessary for the release of the facility after the site remediation, which also needs to be implemented in the stage of establishing a decommissioning planning. In order to derive DCGL, the dose assessment for the receptors can be conducted from residual radioactivity by using RESRAD code. When performing sensitivity analysis on probabilistic parameters, secondary evaluation is performed by assigning a single value for parameters classified as sensitive. However, several options may arise in the handling of nonsensitive parameters. Therefore, we compared the results of the first execution of RESRAD applying probabilistic parameters for each scenario with the results of the second execution applying a single value to sensitive parameters among the probabilistic parameters. In addition, we analyzed the effect of setting options for non-sensitive parameters. As a result, the effect on DCGL were different depending on the application scenario, the target radionuclides, and the input parameter selections. In terms of the overall evaluation period, the DCGL graph of the default option was generally shown as the most conservative except for some radionuclides. However, it will not necessarily be given priority in the aspect of the need to reflect site characteristics. The reason for selecting a probabilistic parameter is the availability of the parameter and the uncertainty of applying a single value. Therefore, as an alternative, it can be consistently applied to distribution as an option for non-sensitive parameters after sensitivity analysis.

Icefex: Protocol Format Extraction from IL-based Concolic Execution

  • Pan, Fan;Wu, Li-Fa;Hong, Zheng;Li, Hua-Bo;Lai, Hai-Guang;Zheng, Chen-Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.3
    • /
    • pp.576-599
    • /
    • 2013
  • Protocol reverse engineering is useful for many security applications, including intelligent fuzzing, intrusion detection and fingerprint generation. Since manual reverse engineering is a time-consuming and tedious process, a number of automatic techniques have been proposed. However, the accuracy of these techniques is limited due to the complexity of binary instructions, and the derived formats have missed constraints that are critical for security applications. In this paper, we propose a new approach for protocol format extraction. Our approach reasons about only the evaluation behavior of a program on the input message from concolic execution, and enables field identification and constraint inference with high accuracy. Moreover, it performs binary analysis with low complexity by reducing modern instruction sets to BIL, a small, well-specified and architecture-independent language. We have implemented our approach into a system called Icefex and evaluated it over real-world implementations of DNS, eDonkey, FTP, HTTP and McAfee ePO protocols. Experimental results show that our approach is more accurate and effective at extracting protocol formats than other approaches.

Controller Scheduling and Performance Analysis for Multi-Motor Control (다중 모터 제어를 위한 제어기 스케쥴링 및 성능 분석)

  • Kwon, Jae-Min;Lee, Kyung-Jung;Ahn, Hyun-Sik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.71-77
    • /
    • 2015
  • In this paper, we propose a scheduling method for signal measurement and control algorithm execution in a multi-motor drive controller. The multi-motor controller which is used for vehicle control receives position/velocity command and performs position/velocity control and current control. Internal resource allocation and control algorithm execution timing are very important when one microcontroller is used for multi-motor drives. The control performance of the velocity control system is verified by varying ADC(Analog to Digital Converter) conversion timing and algorithm execution timing using real experiments.

Research on Correlation between Innovative Activities & Development Strategies of New Product and Development Performance in Taiwan's High-tech Companies

  • Chung, Yi-Chan;Tsai, Chih-Hung;Deng, Wei-Jaw;Chen, Wen-Chin
    • International Journal of Quality Innovation
    • /
    • v.7 no.2
    • /
    • pp.157-172
    • /
    • 2006
  • Due to the advancement of technology and rapidly changing environment of the market, the life cycle of high-tech products is becoming shorter. The enterprise must constantly innovate and select correct development strategy of new product in order to respond to customers' demands for upgrading operational performance of industry. Development of new product is the critical activity for enterprise's survival and growth. This research focuses on the effects of Taiwan high-tech companies' introduction of innovative activity and development strategy of new product on development performance of new product for analysis and exploration. The result findings reveal that: (1) High execution degree of innovative activity has positive effect on the implementation of development strategy of new product; (2) The companies with better implementation of development strategy of new product reveal better development performance; (3) The companies with higher degree of execution of innovative activity and better execution of development strategy of new product reveal better development performance of new product.

SoC Virtual Platform with Secure Key Generation Module for Embedded Secure Devices

  • Seung-Ho Lim;Hyeok-Jin Lim;Seong-Cheon Park
    • Journal of Information Processing Systems
    • /
    • v.20 no.1
    • /
    • pp.116-130
    • /
    • 2024
  • In the Internet-of-Things (IoT) or blockchain-based network systems, secure keys may be stored in individual devices; thus, individual devices should protect data by performing secure operations on the data transmitted and received over networks. Typically, secure functions, such as a physical unclonable function (PUF) and fully homomorphic encryption (FHE), are useful for generating safe keys and distributing data in a network. However, to provide these functions in embedded devices for IoT or blockchain systems, proper inspection is required for designing and implementing embedded system-on-chip (SoC) modules through overhead and performance analysis. In this paper, a virtual platform (SoC VP) was developed that includes a secure key generation module with a PUF and FHE. The SoC VP platform was implemented using SystemC, which enables the execution and verification of various aspects of the secure key generation module at the electronic system level and analyzes the system-level execution time, memory footprint, and performance, such as randomness and uniqueness. We experimentally verified the secure key generation module, and estimated the execution of the PUF key and FHE encryption based on the unit time of each module.