• Title/Summary/Keyword: execution methods

Search Result 656, Processing Time 0.024 seconds

Design and Implementation of Intermediate Code Translator for Native Code Generation from Bytecode (바이트코드로부터 네이티브 코드 생성을 위한 중간 코드 변환기의 설계 및 구현)

  • 고광만
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.3
    • /
    • pp.342-350
    • /
    • 2002
  • The execution speed is not an important factor for Java programming language when implementing small size application program which is executed on the web browser, but it becomes a serious limitation when the huge-size programs are implemented. To overcome this problem, the various research is conducted for translating the Bytecode into the target code which can be implemented in the specific processor by using classical compiling methods. In this research, we have designed and realized an intermediate code translator for the native code generation system with which we can directly generate i386 code from Bytecode to improve the execution speed of Java application programs. The intermediate code translator generates the register-based intermediate code from *.class files which are the intermediate code of Java.

  • PDF

A Study on Operational Status of the Six Sigma Action in Manufacturing Industry (제조부문의 6시그마 활동 운영 실태에 관한 연구)

  • Mun, JeOk;Yoon, SungPil
    • Journal of Korean Society for Quality Management
    • /
    • v.45 no.1
    • /
    • pp.1-10
    • /
    • 2017
  • Purpose: Most enterprises adopt six sigma acts to maximize the business performance with raising the executiveness for the project improvements in each parts. But there are little studies about six sigma actual operations in manufacturing whether the six sigma improvements that have injected a lot of budget, efforts, labours and time are run properly. Methods: This study select 31 interviewees who have MBB or BB from 5 large enterprises running six sigma over 10 years and 5 SMEs running six sigma over 5 years to understand and review the operational status of six sigma actions in manufacturing industry and to secure representativeness. This study identify the operational status of six sigma actions and key factors enhancing or impeding execution of six sigma projects through face-to-face interviews and online surveys by e-mail. Results: This study figured out the operational status of six sigma actions and key factors enhancing or impeding execution of six sigma projects. We used SPSS 16.0 for the reliability and the validity of survey data. Conclusion: There can be a lot of different factors that affect six sigma project improvements besides the key factors from this study. More study need to think of the organization characteristics and the basic conditions and to remedy the unreasonable points and defects rather than following foreign companies and enterprises.

A Study on the Leakage Interception Work in the Irrigation Canal Founding on the Sandy Gravel or the Porous Soil (모래자갈과 누수성 토질을 기반으로하는 용수로의 누수방지에 대한 연구)

  • 강신업
    • Magazine of the Korean Society of Agricultural Engineers
    • /
    • v.12 no.2
    • /
    • pp.1965-1970
    • /
    • 1970
  • The experiment was carried out in order to improve the leakage stopping work in the irrigation canal founding on the porous soil. But the experiment had many problems to be studied more owing to the insufficient time and facilities. The results obtained are summarized as follows; 1. Polyethylene film is estimated not to make strength decrease owing to buring in the subsoil, but to make owing to the sunlight. 2. Coated nylon shows the tendency to deteriorate strength when it is buried in the earth or exposed to the sun for long time, but leakage is all but impermeability generally. 3. Leakage loss rates for one hour show some differences in the canal to be full with water in accordance with operating methods, that is, the clay lining section is 12.6%, the coated nylon lining section is 1.7%, the polyethylene film lining section is 1.3%, respectively. 4. Leakage quantities per wetted perimeter unit area show $3.556cc/cm^2/hr$. in the clay lining section, $1.574cc/cm^2/hr$. in the coated nylon section, $0.695cc/cm^2/hr$. in the polyethylene film lining section, respectively. 5. When the construction fund make the clay lining section as a standard, the polyethylene film section is 92.1%, the coated nylon section is 174.2%, respectively. But, the unit cost of execution may be low when the polyethylene film and the coated nylon will enable to mass-produce for the purpose of execution.

  • PDF

State Space Exploration of Concurrent Systems with Minimal Visit History (최소방문 기록을 이용한 병행 시스템의 상태 공간 순회 기법)

  • Lee, Jung-Sun;Choi, Yun-Ja;Lee, Woo-Jin
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.9
    • /
    • pp.669-675
    • /
    • 2010
  • For detecting requirement errors in early system development phase, the behaviors of a system should be described in formal methods and be analyzed with analysis techniques such as reachability analysis and cycle detection. However, since they are usually based on explicit exploration of system state space, state explosion problem may be occurred when a system becomes complex. That is, the memory and execution time for exploration exponentially increase due to a huge state space. In this paper, we analyze the fundamental causes of this problem in concurrent systems and explore the state space without composing concurrent state spaces for reducing the memory requirement for exploration. Also our new technique keeps a visited history minimally for reducing execution time. Finally we represent experimental results which show the efficiency of our technique.

Research on Registry Analysis based Malware Detection Method (Registry 분석을 통한 악성코드 감염여부 탐지 방법 연구)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.5
    • /
    • pp.37-43
    • /
    • 2017
  • A registry is a hierarchy database which is designed to store information necessary for operating system and application programs in Windows operating system, and it is involved in all activities such as booting, logging, service execution, application execution, and user behavior. Digital forensic is widely used. In recent years, malicious codes have penetrated into systems in a way that is not recognized by the user, and valuable information is leaked or stolen, causing financial damages. Therefore, this study proposes a method to detect malicious code by using a shareware application without using expensive digital forensic program, so as to analysis hacking methods and prevent hacking damage in advance.

High-speed Integer Fuzzy Controller without Multiplications

  • Lee Sang-Gu
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.6 no.3
    • /
    • pp.223-231
    • /
    • 2006
  • In high-speed fuzzy control systems applied to intelligent systems such as robot control, one of the most important problems is the improvement of the execution speed of the fuzzy inference. In particular, it is more important to have high-speed operations in the consequent part and the defuzzification stage. To improve the speedup of fuzzy controllers for intelligent systems, this paper presents an integer line mapping algorithm to convert [0, 1] real values of the fuzzy membership functions in the consequent part to a $400{\times}30$ grid of integer values. In addition, this paper presents a method of eliminating the unnecessary operations of the zero items in the defuzzification stage. With this representation, a center of gravity method can be implemented with only integer additions and one integer division. The proposed system is analyzed in the air conditioner control system for execution speed and COG, and applied to the truck backer-upper control system. The proposed system shows a significant increase in speed as compared with conventional methods with minimal error; simulations indicate a speedup of an order of magnitude. This system can be applied to real-time high-speed intelligent systems such as robot arm control.

The Effect of Guanxi on Relationship Performance between Korean Apparel Firms and Chinese Partners (한국 의류업체와 중국 거래업체간의 ??????시(關係)가 관계성과에 미치는 영향)

  • Song Yun-Ah;Ko Eun-Ju
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.30 no.4 s.152
    • /
    • pp.519-530
    • /
    • 2006
  • The purpose of this study was to investigate whether management strategic types and entry strategy moderate the influence of Guanxi on the relationship performance between Korean apparel firms & Chinese partners. For these purposes, three hypotheses were developed and data was collected from 85 Korean apparel firms which have a business relationship with Chinese partners. Data was analyzed with SPSS methods such as frequency, factor analysis, multiple-regression, and hierarchical-regression analysis. The results were as follows: First, 'Prior to Guanxi' and 'Execution of Guanxi', which were sub-factors of Guanxi, influence positively on the relationship performance. And also the influence of 'Prior to Guanxi' was higher than 'Execution of Guanxi' on the relationship performance. Second, the influence of the 'Prior to Guanxi' on the relationship performance was stronger when Defender strategic type was used rather than other types. Third, the influence of the 'Prior to Guanxi' on the relationship performance was stronger when the entry scope of 'Both production & distribution in China' and the entry mode of 'Entry through Agent' were chosen.

Energy-Efficient Multi- Core Scheduling for Real-Time Video Processing (실시간 비디오 처리에 적합한 에너지 효율적인 멀티코어 스케쥴링)

  • Paek, Hyung-Goo;Yeo, Jeong-Mo;Lee, Wan-Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.6
    • /
    • pp.11-20
    • /
    • 2011
  • In this paper, we propose an optimal scheduling scheme that minimizes the energy consumption of a real-time video task on the multi-core platform supporting dynamic voltage and frequency scaling. Exploiting parallel execution on multiple cores for less energy consumption, the propose scheme allocates an appropriate number of cores to the task execution, turns off the power of unused cores, and assigns the lowest clock frequency meeting the deadline. Our experiments show that the proposed scheme saves a significant amount of energy, up to 67% and 89% of energy consumed by two previous methods that execute the task on a single core and on all cores respectively.

DiLO: Direct light detection and ranging odometry based on spherical range images for autonomous driving

  • Han, Seung-Jun;Kang, Jungyu;Min, Kyoung-Wook;Choi, Jungdan
    • ETRI Journal
    • /
    • v.43 no.4
    • /
    • pp.603-616
    • /
    • 2021
  • Over the last few years, autonomous vehicles have progressed very rapidly. The odometry technique that estimates displacement from consecutive sensor inputs is an essential technique for autonomous driving. In this article, we propose a fast, robust, and accurate odometry technique. The proposed technique is light detection and ranging (LiDAR)-based direct odometry, which uses a spherical range image (SRI) that projects a three-dimensional point cloud onto a two-dimensional spherical image plane. Direct odometry is developed in a vision-based method, and a fast execution speed can be expected. However, applying LiDAR data is difficult because of the sparsity. To solve this problem, we propose an SRI generation method and mathematical analysis, two key point sampling methods using SRI to increase precision and robustness, and a fast optimization method. The proposed technique was tested with the KITTI dataset and real environments. Evaluation results yielded a translation error of 0.69%, a rotation error of 0.0031°/m in the KITTI training dataset, and an execution time of 17 ms. The results demonstrated high precision comparable with state-of-the-art and remarkably higher speed than conventional techniques.

The Generation of the Function Calls Graph of an Obfuscated Execution Program Using Dynamic (동적 분석을 이용한 난독화 된 실행 프로그램의 함수 호출 그래프 생성 연구)

  • Se-Beom Cheon;DaeYoub Kim
    • Journal of IKEEE
    • /
    • v.27 no.1
    • /
    • pp.93-102
    • /
    • 2023
  • As one of the techniques for analyzing malicious code, techniques creating a sequence or a graph of function call relationships in an executable program and then analyzing the result are proposed. Such methods generally study function calling in the executable program code through static analysis and organize function call relationships into a sequence or a graph. However, in the case of an obfuscated executable program, it is difficult to analyze the function call relationship only with static analysis because the structure/content of the executable program file is different from the standard structure/content. In this paper, we propose a dynamic analysis method to analyze the function call relationship of an obfuscated execution program. We suggest constructing a function call relationship as a graph using the proposed technique.