• Title/Summary/Keyword: 통신 오류

Search Result 1,836, Processing Time 0.034 seconds

PinMemcheck: Pin-Based Memory Leakage Detection Tool for Mobile Device Development (PinMemcheck: 이동통신 기기 개발을 위한 Pin 기반의 메모리 오류 검출 도구(道具))

  • Jo, Kyong-Jin;Kim, Seon-Wook
    • The KIPS Transactions:PartA
    • /
    • v.18A no.2
    • /
    • pp.61-68
    • /
    • 2011
  • Memory error debugging is one of the most critical processes in improving software quality. However, due to the extensive time consumed to debug, the enhancement often leads to a huge bottle neck in the development process of mobile devices. Most of the existing memory error detection tools are based on static error detection; however, the tools cannot be used in mobile devices due to their use of large working memory. Therefore, it is challenging for mobile device vendors to deliver high quality mobile devices to the market in time. In this paper, we introduce "PinMemcheck", a pin-based memory error detection tool, which detects all potential memory errors within $1.5{\times}$ execution time overhead compared with that of a baseline configuration by applying the Pin's binary instrumentation process and a simple data structure.

Analysis of Checkpointing Model with Instantaneous Error Detection (즉각적 오류 감지가 가능한 경우의 체크포인팅 모형 분석)

  • Lee, Yutae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.1
    • /
    • pp.170-175
    • /
    • 2022
  • Reactive failure management techniques are required to mitigate the impact of errors in high performance computing. Checkpoint is the standard recovery technique for coping with errors. An application employing checkpoints periodically saves its state, so that when an error occurs while some task is executing, the application is rolled back to its last checkpointed task and resumes execution from that task onward. In this paper, assuming the time-to-errors are independent each other and generally distributed, we analyze the checkpointing model with instantaneous error detection. The conventional assumption that two or more errors do not take place between two consecutive checkpoints is removed. Given the checkpointing time, down-time, and recovery time, we derive the reliability of the checkpointing model. When the time-to-error follows an exponential distribution, we obtain the optimal checkpointing interval to achieve the maximum reliability.

오류정정부호를 이용한 실용적 분산 비디오 부호화 기술

  • Kim, Jong-Hwan;Kim, Sang-Hyo
    • Information and Communications Magazine
    • /
    • v.32 no.6
    • /
    • pp.9-15
    • /
    • 2015
  • 오류정정부호를 이용한 분산 비디오 부호화 기술에 대하여 소개한다. 먼저 분산 소스 부호화 기술을 소개하고, 이것이 어떻게 비디오 부호화에 실용적인 터보부호와 LDPC부호를 이용하여 구현되었는지 설명한다.

A 3G-324M System Adaptive to Bit Errors in Wireless Network Environments (무선 네트워크 환경에서 오류에 적응적인 3G-324M 시스템)

  • Seol Jae-Woo;Lee Ho-Cheol;Park Sung-Yong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06a
    • /
    • pp.340-342
    • /
    • 2006
  • 기존의 멀티미디어 통신 프로토콜은 무선 네트워크 환경에서의 많은 오류에 대한 고려를 하지 않기 때문에 데이터의 손실이 커지고 신뢰성이 보장하기 위한 방법의 사용으로 인해 오버헤드가 커지는 문제가 있다. 3G-324M 프로토콜은 이러한 무선 네트워크 환경에서 멀티미디어 통신 시 사용되는 프로토콜이다. 하지만 오류 발생이 기변적으로 변하는 상황에 대해서 적절칩 대처하지 못하는 단점이 있다. 본 논문에서는 기존의 3G-324M 프로토콜을 확장하여, 무선 네트워크라는 오류 발생이 많은 상황에서 이러한 단점을 적절히 대처할 수 있는 프로토콜 설계 요소 및 그와 관련된 구현 방법에 관해 논한다. 제안한 방법을 검증하기 위해 프로토콜에 수신된 데이터의 오류를 예측하는 모듈을 추가해 오류 발생 정도를 예측하고 송신하는 데이터를 이러한 상황에 적절하게 대처해 송신할 수 있도록 하였고 그에 따른 테스트 결과를 살펴본다.

  • PDF

An Error Control Line Code Based on an Extended Hamming Code (확대 Hamming 부호를 이용한 오류제어선로부호)

  • 김정구;정창기;이수인;주언경
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.5
    • /
    • pp.912-919
    • /
    • 1994
  • A new error control line code based on an extended Hamming code is proposed and its performance is analyzed in this paper. The proposed code is capable of single error correction and double error detection since its minimum Hamming distance is 4. In addition, the error detection capability can be oncreased due to the redundancy bit used for line coding. As a result, the proposed code shows lower code rate, but better spectral characteristics in low frequency region and lower residual bit error rate than the conventional error correction line code using Hamming (7, 4) code.

  • PDF

Fault Diagnosis in the CA Analyzer and Fault Detection of the Input Sequence (CA 분석기의 오류진단과 오류가 있는 입력수열의 오류탐지)

  • Cho, Sung-Jin;Kwon, Min-Jeong;Yim, Ji-Mi;Kim, Jin-Gyoung;Park, Young-Gyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2129-2139
    • /
    • 2009
  • In this paper, we diagnose the fault in the CA analyzer by setting up the initial value such that the final test signature is a constant regardless of the circuit being tested. This method makes the CA test procedure short and clear. In addition, we detect the fault of the faulty input sequence by using the inverse matrix of the CA state transition matrix.

An Empirical Study on Sunk-Cost Fallacy under the Two-Part Tarriff (이부요금제하에서의 매몰비용오류에 관한 실증연구)

  • Lee, Sang-Woo;Ko, Chang-Youl;Choi, Sun-Me;Park, Joon-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.10B
    • /
    • pp.1192-1199
    • /
    • 2011
  • The purpose of this paper is to test empirically whether the sunk cost fallacy occurres or not under the two-part tarriff and to give the desirable rate-making for minimizing sunk cost fallacy. According to the results of analysis highly paid monthly fee makes more traffics over the level of optimal consumption because of sunk cost fallacy. Therefore monthly fee reduction will cause the optimal consumption that is near the solution of their own utility function.

The Effective Combined Error Control Method for SCTP based on Multimedia Characteristics Information (멀티미디어 특성 정보에 기초한 SCTP의 효율적 통합 오류 제어 기법)

  • Choi, Won-keun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.2
    • /
    • pp.151-156
    • /
    • 2017
  • Communication performance requirements are described as QoS parameters in multimedia communication Protocols including SCTP. One of the important QoS parameters is the reliability of the transfer. As a QoS parameter, the reliability defines error detection, report and correction mechanisms. Including SCTP, conventional error control mechanisms, however, do not consider the integrated viewpoint of multimedia data. In this paper, I have designed and proposed the multimedia oriented error control method based on multimedia characteristics. The proposed scheme should have the reduction effect of the communication resources such as frame buffer, procesing power and bandwidth as well as satisfy the requirements of users.

Recovering Corrupted Motion Vectors Using Edge Direction (경계 방향성을 이용한 손상된 움직임 벡터의 복원 기법)

  • 박정윤;이창우
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.11A
    • /
    • pp.1880-1888
    • /
    • 2001
  • In wireless communication systems, transmission errors degrade the reconstructed image quality severely. Among various techniques which reduce the degradation, the error concealment technique yields good performance without overheads and the modification of the encoder. In this paper, we have proposed the technique for recovering the corrupted motion vector using the edge direction of blocks which surround the corrupted block, when the video information is compressed by H.263 standard. We uses the property that each object in video sequences shows the same motion. For the estimation of edge directions, the first AC coefficients of blocks are used. Extensive simulation results show that the proposed technique yields good performance with a reduced computational complexity.

  • PDF

Exact Bit Error Probability of Opportunistic Decode-and-Forward Cooperative System with Multiple Interferers (다중 사용자 간섭이 존재하는 복호 후 전송 협력통신 시스템의 비트오류율 분석)

  • Kim, Sung-Il;Heo, Jun
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2011.11a
    • /
    • pp.82-85
    • /
    • 2011
  • 본 논문에서는 다중 사용자 간섭이 존재하는 복호 후 전송 협력통신 시스템의 비트오류율에 대해 기술한다. 최근 공간 다이버시티를 위한 협력통신 시스템에 관한 연구가 활발히 진행되고 있고 모바일 사용자의 수와 요구가 점점 증가하고 있는 추세이다. 한정된 자원 및 공간에서 모바일 사용자가 증가함에 따라 사용자 간의 간섭현상이 더욱 빈번하게 나타나게 되는데 이는 무선통신 시스템의 중요한 문제 중 하나이다. 따라서 릴레이 (Relay) 기반 협력통신 시스템에서도 일반적인 무선통신 시스템과 같이 다중 사용자 간섭을 고려하는 것이 필요하다고 볼 수 있다. 본 논문에서는 다중 릴레이 기반 복호 후 전송(Decode-and-Forward) 프로토콜에서 릴레이 및 목적노드에 다중 간섭이 존재하는 경우의 비트오류율에 대해 분석한다.

  • PDF