• Title/Summary/Keyword: Address time

Search Result 1,621, Processing Time 0.028 seconds

An Optimal ILP Algorithm of Memory Access Variable Storage for DSP in Embedded System (임베디드 시스템에서 DSP를 위한 메모리 접근 변수 저장의 최적화 ILP 알고리즘)

  • Chang, Jeong-Uk;Lin, Chi-Ho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.2
    • /
    • pp.59-66
    • /
    • 2013
  • In this paper, we proposed an optimal ILP algorithm on memory address code generation for DSP in embedded system. This paper using 0-1 ILP formulations DSP address generation units should minimize the memory variable data layout. We identify the possibility of the memory assignment of variable based on the constraints condition, and register the address code which a variable instructs in the program pointer. If the process sequence of the program is declared to the program pointer, then we apply the auto-in/decrement mode about the address code of the relevant variable. And we minimize the loads on the address registers to optimize the data layout of the variable. In this paper, in order to prove the effectiveness of the proposed algorithm, FICO Xpress-MP Modeling Tools were applied to the benchmark. The result that we apply a benchmark, an optimal memory layout of the proposed algorithm then the general declarative order memory on the address/modify register to reduce the number of loads, and reduced access to the address code. Therefor, we proved to reduce the execution time of programs.

A Study of Internet Address Collision Detection Method (인터넷 주소 충돌 감지에 관한 연구)

  • 위선정;임영희;이태헌;박기홍
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.545-547
    • /
    • 2004
  • Currently possibility of the change of seal computer it increases geometrical progression and the general individuals the knowledge which is special regarding the ip are using the flow child blood which it Provides without from the isp enterprise. But most of the case peon of the school which uses the fixation child blood or the company because is not the knowledge against a TCP/IP address is not oneself at deliberation or real income and it will use the TCP/IP address of the different user and the network whole it will paralyze, the original user will not be able to use the network and it makes. With information where address information where the network administrator present time after data base anger one uses address information of the civil official objective personal computers and network systems of the watch inside in the dictionary is stored will be same from the dissertation which it sees hereupon and the web which it will yell it leads and packet it detects, the use of the TCP/IP address which goes wrong in the user and it notifies the method which is the possibility of closing the paralysis of the network system which it follows in the IP address fringe land due to a deliberation or a real income to sleep it presents it does.

  • PDF

Vehicles Auto Collision Detection & Avoidance Protocol

  • Almutairi, Mubarak;Muneer, Kashif;Ur Rehman, Aqeel
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.107-112
    • /
    • 2022
  • The automotive industry is motivated to provide more and more amenities to its customers. The industry is taking advantage of artificial intelligence by increasing different sensors and gadgets in vehicles machoism is forward collision warning, at the same time road accidents are also increasing which is another concern to address. So there is an urgent need to provide an A.I based system to avoid such incidents which can be address by using artificial intelligence and global positioning system. Automotive/smart vehicles protection has become a major study of research for customers, government and also automotive industry engineers In this study a two layered novel hypothetical approach is proposed which include in-time vehicle/obstacle detection with auto warning mechanism for collision detection & avoidance and later in a case of an accident manifestation GPS & video camera based alerts system and interrupt generation to nearby ambulance or rescue-services units for in-time driver rescue.

TECHNOLOGIES FOR REDUCING POWER CONSUMPTION OF PDPS IN PIONEER

  • Uchidoi, Masataka
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.159-163
    • /
    • 2004
  • We have introduced fourth generation PDPs last year. The performance of these PDPs is the highest level among TV displays. At the same time the power consumption of them has reached to the lowest level among FPDs (Flat Panel Displays). High panel luminous efficacy and low address power are necessary for the reduction of total power consumption. Following technologies have been developed and applied to the fourth generation PDPs. High panel luminous efficacy: T-shape electrode, waffle rib structure, high Xe content gas Low address power; CLEAR driving method, etc.

  • PDF

Implementation of New MOD System Using On-demand Multicasting Technique (주문형 멀티캐스팅 기법을 사용한 새로운 MOD 시스템의 구현)

  • Kim, Young-Jung;Hwang, Tae-June;Kwon, Ki-Seop;Kim, Ik-Soo
    • The KIPS Transactions:PartB
    • /
    • v.10B no.7
    • /
    • pp.847-852
    • /
    • 2003
  • This paper implements MOD system using multicast delivery. Conventional system provide server-based system in multicast delivery but implemented system provides on-demand client-based multicast system. The scheduler aggregates clients' request and it generate multcast group addresses and port numbers according to requested video items and service request time. Then it transmits immediately multicast address to MOD server and client who request service. And then MOD server transmits requested streams with a multicast group address and the client joins the group automatically. The scheduler assigns the same multicast group address when other clients request an identical video within the same scheduling duration. The system can reduce load of server and support many clients at the same time.

Study on the Effective Management Plans of Mobilization Security Business which Utilizes NFC (NFC를 활용한 출동경비업무의 효율적 관리방안에 관한 연구)

  • Kim, Min Su;Lee, Dong Hwi;Kim, Kui Nam J.
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.95-100
    • /
    • 2013
  • As the near field communication technology's application scope tends to expand gradually in the various fields, application of mobile-based NFC(Near Field Communication) is increasing in the various types of technologies. The method which reads the URL address and supports access to the web site of the address if you touch the NFC device in the tag(RFID) that the URL address is stored was applied to the unmanned security system. It proposed the effective plan to manage mobilization security business in the aspects of Integrity, Damage, Real-Time, and Speed through comparison and verification of the method with the existing unmanned security system.

Enhanced TDMA based MAC Protocol for Adaptive Data Control in Wireless Sensor Networks

  • Alvi, Ahmad Naseem;Bouk, Safdar Hussain;Ahmed, Syed Hassan;Yaqub, Muhammad Azfar;Javaid, Nadeem;Kim, Dongkyun
    • Journal of Communications and Networks
    • /
    • v.17 no.3
    • /
    • pp.247-255
    • /
    • 2015
  • In this paper, we propose an adaptive time division multiple access based medium access control (MAC) protocol, called bitmap-assisted shortest job first based MAC (BS-MAC), for hierarchical wireless sensor networks (WSNs). The main contribution of BS-MAC is that: (a) It uses small size time slots. (b) The number of those time slots is more than the number of member nodes. (c) Shortest job first (SJF) algorithm to schedule time slots. (d) Short node address (1 byte) to identify members nodes. First two contributions of BS-MAC handle adaptive traffic loads of all members in an efficient manner. The SJF algorithm reduces node's job completion time and to minimize the average packet delay of nodes. The short node address reduces the control overhead and makes the proposed scheme an energy efficient. The simulation results verify that the proposed BS-MAC transmits more data with less delay and energy consumption compared to the existing MAC protocols.

Artificial Neural Network-based Real Time Water Temperature Prediction in the Soyang River (인공신경망 기반 실시간 소양강 수온 예측)

  • Jeong, Karpjoo;Lee, Jonghyun;Lee, Keun Young;Kim, Bomchul
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2084-2093
    • /
    • 2016
  • It is crucial to predict water temperature for aquatic ecosystem studies and management. In this paper, we first address challenging issues in predicting water temperature in a real time manner and propose a distributed computing model to address such issues. Then, we present an Artificial Neural Network (ANN)-based water temperature prediction model developed for the Soyang River and a cyberinfrastructure system called WT-Agabus to run such prediction models in an automated and real time manner. The ANN model is designed to use only weather forecast data (air temperature and rainfall) that can be obtained by invoking the weather forecasting system at Korea Meteorological Administration (KMA) and therefore can facilitate the automated and real time water temperature prediction. This paper also demonstrates how easily and efficiently the real time prediction can be implemented with the WT-Agabus prototype system.

International Benchmarking on Factors Affecting the Number of Country Domain Name (국가도메인 네임 등록 수에 영향을 미치는 요인에 관한 국제 비교)

  • Kim, So-ra;Jun, Hyo-Jung;Kim, Tae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.12
    • /
    • pp.2434-2442
    • /
    • 2015
  • With the arrival of the era of the Internet of Things (IoT), identification of an individual object is gaining significance. Internet address resources such as domain name, IP address, and OID are expected to play the role of an identifier and demand for them is also expected to increase. Accordingly, it becomes important to obtain the Internet address resources. As the Internet address resources market development, Internet address resources at the present time there is a need to gauge whether the potential to develop into industry. For this purpose, we have selected factors affecting the number of country domain name with 18 countries among OECD member countries as research target and carried out a regression analysis.

A Study on Secure Interaction of DHCP Server with DNS Server

  • Ham Young Hwan;Chung Byung Ho;Chung Kyo Il
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.544-548
    • /
    • 2004
  • DHCP(Dynamic Host Configuration Protocol) is a protocol which dynamically allocates an IP address and/or host configuration parameters to a host. The DHCP client's address can be changed dynamically any time. For the possible communication with other system, the DHCP client has to inform its address to the DNS system with dynamic update facility. But the DNS dynamic update has a problem related to the security. So we proposed the efficient mechanism for the secure integration of DHCP and DNS by using DNS security extensions. The system also uses the DNS server as the certificate repository for the storing & retrieval of each other's certificate.

  • PDF