• Title/Summary/Keyword: flow graph

Search Result 337, Processing Time 0.027 seconds

Implementation of Loop Peeling in CTOC (CTOC에서 루프 벗기기 구현)

  • Kim, Ki-Tae;Kim, Je-Min;Yoo, Weon-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.27-35
    • /
    • 2008
  • The CTOC framework was implemented to efficiently perform analysis and optimization of the Java bytecode that is often being used lately. In order to analyze and optimize the bytecode from the CTOC, the eCFG was first generated. Due to the bytecode characteristics of difficult analysis, the existing bytecode was expanded to be suitable for control flow analysis. and the control flow graph was drawn. We called eCFG(extended Control Flow Graph). Furthermore, the eCFG was converted into the SSA Form for a static analysis. Many loops were found in the conversion program. The previous CTOC performed conversion directly into the SSA Form without processing the loops. However, processing the loops prior to the SSA Form conversion allows more efficient generation of the SSA Form. This paper examines the process of finding the loops prior to converting the eCFG into the SSA Form In order to efficiently process the loops, and exhibits the procedures for generating the loop tree.

  • PDF

A Study on Flow Characteristics with the Installed Location Change of Mechanical Deflector (기계적 편향판 설치위치의 변화에 따른 유동특성에 대한 연구)

  • Kim, Kyoung-Ryun;Park, Jong-Ho
    • The KSFM Journal of Fluid Machinery
    • /
    • v.18 no.5
    • /
    • pp.49-53
    • /
    • 2015
  • Thrust vector control is the method which generates the side force and roll moment by controlling exhausted gas directly in a rocket nozzle. TVC is classified by mechanical and fluid dynamic methods. Mechanical methods can change the flow direction by several objects installed in a rocket nozzle exhaust such as tapered ramp tabs and jet vane. Fluid dynamic methods control the flight direction with the injection of secondary gaseous flows into the rocket nozzle. The tapered ramp tabs of mechanical methods are used in this paper. They installed at the rear in the rocket nozzle could be freely moved along axial and radial direction on the mounting ring to provide the mass flow rate which is injected from the rocket nozzle. TVC of the tapered ramp tabs has the potential to produce both large axial thrust and high lateral force. We have conducted the experimental research and flow analysis of ramp tabs to show the performance and the structural integrity of the TVC. The experiments are carried out with the supersonic cold flow system and the schlieren graph. This paper provides to analyze the location of normal shock wave and distribution of surface pressure on the region enclosed by the tapered ramp tabs.

FMS에서의 Deadlock 탐지와 방지에 관한 연구

  • Lim, Dong-Sun
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.20 no.1
    • /
    • pp.53-69
    • /
    • 1994
  • Deadlock in flexible manufacturing systems (FMS) which refers to the stop state of job flow in the system can be commonly occurred in operating FMS. This state mainly due to bad movements of jobs and commonly job routings should be avoided to maximize the utilization of high-capital resources in this study, the deadlock generated from the conflict between flow objects competing to occupy space resources in FMS is investigated. Capacity Designated Directed Graph (CDG) is constructed to represent the space resources and flow object routings. From the characteristics of CDG, an algorithm for the detection of the deadlock possibility is proposed. Finally two deadlock avoidance rule are proposed and implemented in the control on Automated Guided Vehicle system in an FMS.

  • PDF

Design & Implementation of Extractor for Design Sequence of DB tables using Data Flow Diagrams (자료흐름도를 사용한 테이블 설계순서 추출기의 설계 및 구현)

  • Lim, Eun-Ki
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.3
    • /
    • pp.43-49
    • /
    • 2012
  • Information obtained from DFD(Data Flow Diagram) are very important in system maintenance, because most legacy systems are analyzed using DFD in structured analysis. In our thesis, we design and implement an extractor for design sequence of database tables using DFD. Our extractor gets DFDs as input data, transform them into a directed graph, and extract design sequence of DB tables. We show practicality of our extractor by applying it to a s/w system in operation.

A Study of Ceramic Injection Molding of Watch Case Composed of $ZrO_2$ Powder

  • Kwak, T.S.
    • Proceedings of the Korean Powder Metallurgy Institute Conference
    • /
    • 2006.09a
    • /
    • pp.505-506
    • /
    • 2006
  • This study is focused on the manufacturing technique of powder injection molding of watch case made from zirconia powder. A series of computer simulation processes were applied to the prediction of the flow pattern in the inside of the mould and defects as weld-line. The material properties of melted feedstock, including the PVT graph and thermal viscosity flowage properties were measured to obtain the input data to be used in a computer simulation. Also, a molding experiment was conducted and the results of the experiment showed a good agreement with the simulation results for flow pattern and weld line location. On the other hand, gravity and inertia effects have an influence on the velocity of the melt front because of the high density of ceramic powder particles during powder injection molding in comparison with polymer's injection molding process. In the experiment, the position of the melt front was compared with the upper gate and lower gate positions. The gravity and inertia effect could be confirmed in the experimental results.

  • PDF

A Code Mapping Technique Considering With Data Copying Flow On Coarse-Grained Reconfigurable Array Architectures (재구성형 어레이 아키텍처에서 데이터 복사 흐름을 고려한 코드 매핑 기법)

  • Cho, Doosan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1632-1634
    • /
    • 2010
  • 고성능 재구성형 어레이 아키텍처는 애플리케이션에 내재된 병렬성을 충분히 활용하도록 풍부한 하드웨어 리소스로 구성되어 있다. 이러한 하드웨어 리소스는 소프트웨어 파이프라이닝 기반 코드할당 기법을 통하여 사용된다. 이러한 코드할당 기법은 기존의 소프트웨어 파이프라이닝 기법에 FPGA 에서의 라우팅 & 위치선정기법이 연결된 형식으로 구성된다. 이러한 기존의 연구들은 데이터 흐름 (data flow)을 단순한 형태로 가정하여 개발되었다. 따라서 루프 코드 펼침 (loop unrolling)에 따라서 발생되는 데이터 복사에 의한 흐름 (copy flow)은 코드 매핑할 때 고려하지 않기 때문에 소프트웨어 파이프라이닝 적용시 네트웍 리소스의 중복사용으로 인한 데이터 충돌문제(data congestion)로 Minimum Initiation Interval (MII)증가에 따르는 성능 저하가 발생할 수 있다. 본 연구에서는 다양한 데이터 복사 흐름까지 고려하도록 데이터 의존도 그래프 (Data Dependence Graph, DDG)를 확장하여 스케쥴링 단계에서 데이터 충돌 지연에 의한 MII 증가를 방지하여 최적의 시스템 성능을 얻도록 코드 할당 기법을 개발하였다.

Detecting TOCTOU Race Condition on UNIX Kernel Based File System through Binary Analysis (바이너리 분석을 통한 UNIX 커널 기반 File System의 TOCTOU Race Condition 탐지)

  • Lee, SeokWon;Jin, Wen-Hui;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.701-713
    • /
    • 2021
  • Race Condition is a vulnerability in which two or more processes input or manipulate a common resource at the same time, resulting in unintended results. This vulnerability can lead to problems such as denial of service, elevation of privilege. When a vulnerability occurs in software, the relevant information is documented, but often the cause of the vulnerability or the source code is not disclosed. In this case, analysis at the binary level is necessary to detect the vulnerability. This paper aims to detect the Time-Of-Check Time-Of-Use (TOCTOU) Race Condition vulnerability of UNIX kernel-based File System at the binary level. So far, various detection techniques of static/dynamic analysis techniques have been studied for the vulnerability. Existing vulnerability detection tools using static analysis detect through source code analysis, and there are currently few studies conducted at the binary level. In this paper, we propose a method for detecting TOCTOU Race Condition in File System based on Control Flow Graph and Call Graph through Binary Analysis Platform (BAP), a binary static analysis tool.

Static Analysis Based on Backward Control Flow Graph Generation Method Model for Program Analysis (프로그램 분석을 위한 정적분석 기반 역추적 제어흐름그래프 생성 방안 모델)

  • Park, Sunghyun;Kim, Yeonsu;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1039-1048
    • /
    • 2019
  • Symbolic execution, an automatic search method for vulnerability verification, has been technically improved over the last few years. However, it is still not practical to analyze the program using only the symbolic execution itself. One of the biggest reasons is that because of the path explosion problem that occurs during program analysis, there is not enough memory, and you can not find the solution of all paths in the program using symbolic execution. Thus, it is practical for the analyst to construct a path for symbolic execution to a target with vulnerability rather than solving all paths. In this paper, we propose a static analysis - based backward CFG(Control Flow Graph) generation technique that can be used in symbolic execution for program analysis. With the creation of a backward CFG, an analyst can select potential vulnerable points, and the backward path generated from that point can be used for future symbolic execution. We conducted experiments with Linux binaries(x86), and indeed showed that potential vulnerability selection and backward CFG path generation were possible in a variety of binary situations.

Implementation of fluid flow measuring and warning alarm system using an WeMos and an fluid flow sensor (WeMos와 유량 센서를 이용한 유속 모니터링 및 경보 알림 시스템 구현)

  • Yoo, Moonsung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.139-143
    • /
    • 2019
  • Measurement of flow rate is required in various fields. Water meters are often used at home, and flow meters are used in water and sewage plants, petrochemical industries and so on.. A system is needed to monitor the flow rate in real time and notify immediately when flow rate is abnormal. Recently, with the development of the IoT it is possible to construct such devices at low cost. WeMos can be programmed with Arduino IDE as a mini wifii IoT module. The flow sensor can output a digital pulse proportional to the flow rate. In this paper, we developed the flow monitoring and warning system using WeMos and IoT technology. When the system operates, it calculates the flow rate, sends the value as JSON format to the server, monitors the flow rate as graph from the remote with the smartphone. We also implement the system to promptly send alert message to the smart phone using Pushbullet when the flow rate is abnormal.

Knowledge graph-based knowledge map for efficient expression and inference of associated knowledge (연관지식의 효율적인 표현 및 추론이 가능한 지식그래프 기반 지식지도)

  • Yoo, Keedong
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.4
    • /
    • pp.49-71
    • /
    • 2021
  • Users who intend to utilize knowledge to actively solve given problems proceed their jobs with cross- and sequential exploration of associated knowledge related each other in terms of certain criteria, such as content relevance. A knowledge map is the diagram or taxonomy overviewing status of currently managed knowledge in a knowledge-base, and supports users' knowledge exploration based on certain relationships between knowledge. A knowledge map, therefore, must be expressed in a networked form by linking related knowledge based on certain types of relationships, and should be implemented by deploying proper technologies or tools specialized in defining and inferring them. To meet this end, this study suggests a methodology for developing the knowledge graph-based knowledge map using the Graph DB known to exhibit proper functionality in expressing and inferring relationships between entities and their relationships stored in a knowledge-base. Procedures of the proposed methodology are modeling graph data, creating nodes, properties, relationships, and composing knowledge networks by combining identified links between knowledge. Among various Graph DBs, the Neo4j is used in this study for its high credibility and applicability through wide and various application cases. To examine the validity of the proposed methodology, a knowledge graph-based knowledge map is implemented deploying the Graph DB, and a performance comparison test is performed, by applying previous research's data to check whether this study's knowledge map can yield the same level of performance as the previous one did. Previous research's case is concerned with building a process-based knowledge map using the ontology technology, which identifies links between related knowledge based on the sequences of tasks producing or being activated by knowledge. In other words, since a task not only is activated by knowledge as an input but also produces knowledge as an output, input and output knowledge are linked as a flow by the task. Also since a business process is composed of affiliated tasks to fulfill the purpose of the process, the knowledge networks within a business process can be concluded by the sequences of the tasks composing the process. Therefore, using the Neo4j, considered process, task, and knowledge as well as the relationships among them are defined as nodes and relationships so that knowledge links can be identified based on the sequences of tasks. The resultant knowledge network by aggregating identified knowledge links is the knowledge map equipping functionality as a knowledge graph, and therefore its performance needs to be tested whether it meets the level of previous research's validation results. The performance test examines two aspects, the correctness of knowledge links and the possibility of inferring new types of knowledge: the former is examined using 7 questions, and the latter is checked by extracting two new-typed knowledge. As a result, the knowledge map constructed through the proposed methodology has showed the same level of performance as the previous one, and processed knowledge definition as well as knowledge relationship inference in a more efficient manner. Furthermore, comparing to the previous research's ontology-based approach, this study's Graph DB-based approach has also showed more beneficial functionality in intensively managing only the knowledge of interest, dynamically defining knowledge and relationships by reflecting various meanings from situations to purposes, agilely inferring knowledge and relationships through Cypher-based query, and easily creating a new relationship by aggregating existing ones, etc. This study's artifacts can be applied to implement the user-friendly function of knowledge exploration reflecting user's cognitive process toward associated knowledge, and can further underpin the development of an intelligent knowledge-base expanding autonomously through the discovery of new knowledge and their relationships by inference. This study, moreover than these, has an instant effect on implementing the networked knowledge map essential to satisfying contemporary users eagerly excavating the way to find proper knowledge to use.