• Title/Summary/Keyword: flow graph

Search Result 337, Processing Time 0.025 seconds

Network analysis by signal-flow graph (Signal-flow graph에 의한 회로분석)

  • Hyung Kap Kim
    • 전기의세계
    • /
    • v.17 no.2
    • /
    • pp.11-15
    • /
    • 1968
  • One of the most important methods used in the modern analysis of linear networks and systems is the signal flow graph technique, first introduced by S.J. Mason in 1953. In essence, the signal-flow graph technique is a graphical method of solving a set of simultaneous. It can, therefore, be regarded as an alternative to the substitution method or the conventional matrix method. Since a flow-graph is the pictorial representation of a set of equations, it has an obvious advantage, i.e., it describes the flow of signals from one point of a system to another. Thus it provides cause-and-effect relationship between signals. And it often significantly reduces the work involved, and also yields an easy, systematic manipulation of variables of interest. Mason's formula is very powerful, but it is applicable only when the desired quantity is the transmission gain between the source node and sink node. In this paper, author summarizes the signal-flow graph technique, and stipulates three rules for conversion of an arbitrary nonsource node into a source node. Then heuses the conversion rules to obtain various quantities, i.e., networks gains, functions and parameters, through simple graphical manipulations.

  • PDF

A Method to Construct Control Flow Graphs for Java Programs by Decoupling Exception Flow Analysis from Normal Flow Analysis (예외 흐름 분석을 정상 흐름 분석과 분리하여 Java프로그램에 대한 제어 흐름 그래프를 생성하는 방법)

  • 조장우;창병모
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.5
    • /
    • pp.643-650
    • /
    • 2004
  • Control flow graph is used for Performing many Program-analysis techniques, such as data-flow and control-dependence analysis, and software-engineering techniques, such as program slicing and testings. For these analyses to be safe and useful, the CFG should incorporate the exception flows that are induced by exceptions. In previous research to construct control flow graph, normal flows and exception flows are computed at the same time, since these two flows are known to be mutually dependent. By investigating realistic Java programs, we found that the cases when these two flows are mutually dependent rarely happen. So, we can decouple exception flow analysis from normal flow analysis. In this paper we propose an analysis that estimates exception flows. We also propose exception flow graph to represent exception flows. And we show that the control flow graph that accounts for exception flows can be constructed by merging exception flow graph onto normal control flow graph.

A Representation for Multithreaded Data-parallel Programs : PCFG(Parallel Control Flow Graph) (다중스레드 데이타 병렬 프로그램의 표현 : PCFG(Parallel Control Flow Graph))

  • 김정환
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.12
    • /
    • pp.655-664
    • /
    • 2002
  • In many data-parallel applications massive parallelism can be easily extracted through data distribution. But it often causes very long communication latency. This paper shows that task parallelism, which is extracted from data-parallel programs, can be exploited to hide such communication latency Unlike the most previous researches over exploitation of task parallelism which has not been considered together with data parallelism, this paper describes exploitation of task parallelism in the context of data parallelism. PCFG(Parallel Control Flow Graph) is proposed to represent a multithreaded program consisting of a few task threads each of which can include a few data-parallel loops. It is also described how a PCFG is constructed from a source data-parallel program through HDG(Hierarchical Dependence Graph) and how the multithreaded program can be constructed from the PCFG.

Implementation of Effective Dominator Trees Using Eager Reduction Algorithm and Delay Reduction Algorithm (순차감축 알고리즘과 지연감축 알고리즘을 이용한 효과적인 지배자 트리의 구현)

  • Lee, Dae-Sik
    • Journal of Internet Computing and Services
    • /
    • v.6 no.6
    • /
    • pp.117-125
    • /
    • 2005
  • The dominator tree presents the dominance frontier from directed graph to the tree. we present the effective algorithm for constructing the dominator tree from arbitrary directed graph. The reducible flow graph was reduced to dominator tree after dominator calculation. And the irreducible flow graph was constructed to dominator-join graph using join-edge information of information table. For reducing the dominator tree from dominator-join graph, we implement the effective sequency reducible algorithm and delay reducible algorithm. As a result of implementation, we can see that the delay reducible algorithm takes less execution time than the sequency reducible algorithm. Therefore, we can reduce the flow graph to dominator tree effectively.

  • PDF

Constructing Software Structure Graph through Progressive Execution (점진적 실행을 통한 소프트웨어의 구조 그래프 생성)

  • Lee, Hye-Ryun;Shin, Seung-Hun;Choi, Kyung-Hee;Jung, Gi-Hyun;Park, Seung-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.7
    • /
    • pp.111-123
    • /
    • 2013
  • To verify software vulnerability, the method of conjecturing software structure and then testing the software based on the conjectured structure has been highlighted. To utilize the method, an efficient way to conjecture software structure is required. The popular graph and tree methods such as DFG(Data Flow Graph), CFG(Control Flow Graph) and CFA(Control Flow Automata) have a serious drawback. That is, they cannot express software in a hierarchical fashion. In this paper, we propose a method to overcome the drawback. The proposed method applies various input data to a binary code, generate CFG's based on the code output and construct a HCFG (Hierarchical Control Flow Graph) to express the generated CFG's in a hierarchical structure. The components required for HCFG and progressive algorithm to construct HCFG are also proposed. The proposed method is verified through constructing the software architecture of an open SMTP(Simple Mail Transfer Protocol) server program. The structure generated by the proposed method and the real program structure are compared and analyzed.

A Study on Reliability Flow Diagram Development of Chemical Process Using Directed Graph Analysis Methodology (유향그래프 분석기법을 이용한 화학공정의 신뢰도흐름도 개발에 관한 연구)

  • Byun, Yoon Sup;Hwang, Kyu Suk
    • Journal of the Korean Institute of Gas
    • /
    • v.16 no.6
    • /
    • pp.41-47
    • /
    • 2012
  • There are PFD(Process Flow Diagram) and P&ID(Piping and Instrument Diagram) for designing and managing chemical process efficiently. They provide the operation condition and equipment specifications of chemical process, but they do not provide the reliability of chemical process. Therefore, in this study, Reliability Flow Diagram(RFD) which provide the cycle and time of preventive maintenance has been developed using Directed Graph Analysis methodology. Directed Graph Analysis methodology is capable of assessing the reliability of chemical process. It models chemical process into Directed Graph with nodes and arcs and assesses the reliability of normal operation of chemical process by assessing Directed Graph sequential. In this paper, the chemical process reliability transition according to operation time was assessed. And then, Reliability Flow Diagram has been developed by inserting the result into P&ID. Like PFD and P&ID, Reliability Flow Diagram provide valuable and useful information for the design and management of chemical process.

Sanitary sewer flow characteristics through a depth-velocity scatter graph analysis (수위-유속 분산 그래프를 통한 하수흐름 특성 분석)

  • Son, Jooyoung;Oh, Jeill
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.28 no.6
    • /
    • pp.647-655
    • /
    • 2014
  • To perform long-term sewer monitoring, It is important to understand the nature of the wastewater flow that occurs at the point on early stage of the monitor and to prevent in advance a problem which may caused. We can infer the flow properties and external factors by analyzing the scatter graph obtained from the measured data flow rate monitoring data since an field external factor affecting the sewage flow is reflected in the flow rate monitoring data. In this study, Selecting the three points having various external factors, and we Inferred the sewer flow characteristics from depth-velocity scatter graph and determined the analysis equation for the dry-weather flow rate data. At the'point 1' expected non-pressure flow, we were able to see the drawdown effect caused by the free fall in the manhole section. At the'point 2', existed weir and sediments, there was backwater effect caused by them, and each of size calculated from the scatter graph analysis were 400 mm and 130 mm. At the'Point 3', there is specific flow pattern that is coming from flood wave propagation generated by the pump station at upstream. In common, adequate equations to explain the dry weather flow data are flume equation and modified manning equation(SS method), and the equations had compatibility for explaining the data because all of $R^2$ values are over 0.95.

Analysis on Signal Flow Graph of Slotted LIne (Slotted Line의 Signal Flow Graph 해석)

  • 박기수
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.6 no.3
    • /
    • pp.8-11
    • /
    • 1969
  • In the precision measurement of the voltage standing wave ratio (VSWR) or reflection coefficient by means of the slotted line technique, one of the important factors is the maximum error due to the discontinuities and multi-reflection in the slotted line. Particularly, this error becomes a critical factor when the VSWR or the reflection coefficient to be measured is very small. In this paper, the exact expression of this error is obtained by means of the Signal flow graph method.

  • PDF

ICFGO : UI Concealing and Dummy Flow Insertion Method for Inter-Procedural Control Flow Graph Obfuscation (ICFGO : Inter-Procedural Control Flow Graph 난독화를 위한 UI 은닉 및 Dummy Flow 삽입 기법)

  • Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.493-501
    • /
    • 2020
  • For the obfuscation of Flow Analysis on the Android operating system, the size of the Flow Graph can be large enough to make analysis difficult. To this end, a library in the form of aar was implemented so that it could be inserted into the application in the form of an external library. The library is designed to have up to five child nodes from the entry point in the dummy code, and for each depth has 2n+1 numbers of methods from 100 to 900 for each node, so it consists of a total of 2,500 entry points. In addition, entry points consist of a total of 150 views in XML, each of which is connected via asynchronous interface. Thus, the process of creating a Inter-procedural Control Flow Graph has a maximum of 14,175E+11 additional cases. As a result of applying this to application, the Inter Procedure Control Flow Analysis too generates an average of 10,931 edges and 3,015 nodes with an average graph size increase of 36.64%. In addition, in the APK analyzing process showed that up to average 76.33MB of overhead, but only 0.88MB of execution overhead in the user's ART environment.

Performance analysis of packet transmission for a Signal Flow Graph based time-varying channel over a Wireless Network (무선 네트워크 time-varying 채널 상에서 Signal Flow Graph를 이용한 패킷 전송 성능 분석)

  • Kim, Sang-Yang;Park, Hong-Seong
    • Proceedings of the KIEE Conference
    • /
    • 2004.05a
    • /
    • pp.65-67
    • /
    • 2004
  • Change of state of Channel between two wireless terminals which is caused by noise and multiple environmental conditions for happens frequently from the Wireles Network. So, When it is like that planning a wireless network protocol or performance analysis, it follows to change of state of time-varying channel and packet the analysis against a transmission efficiency is necessary. In this paper, analyzes transmission time of a packet and a packet in a time-varying and packet based Wireless Network. To reflecte the feature of the time-varying channel, we use a Signal Flow Graph model. From the model the mean of transmission time and the mean of queue length of the packet are analyzed in terms of the packet distribution function, the packet transmission service time, and the PER of the time-varying channel.

  • PDF