• Title/Summary/Keyword: CFG

Search Result 69, Processing Time 0.021 seconds

A Method to Construct Control Flow Graphs for Java Programs by Decoupling Exception Flow Analysis from Normal Flow Analysis (예외 흐름 분석을 정상 흐름 분석과 분리하여 Java프로그램에 대한 제어 흐름 그래프를 생성하는 방법)

  • 조장우;창병모
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.5
    • /
    • pp.643-650
    • /
    • 2004
  • Control flow graph is used for Performing many Program-analysis techniques, such as data-flow and control-dependence analysis, and software-engineering techniques, such as program slicing and testings. For these analyses to be safe and useful, the CFG should incorporate the exception flows that are induced by exceptions. In previous research to construct control flow graph, normal flows and exception flows are computed at the same time, since these two flows are known to be mutually dependent. By investigating realistic Java programs, we found that the cases when these two flows are mutually dependent rarely happen. So, we can decouple exception flow analysis from normal flow analysis. In this paper we propose an analysis that estimates exception flows. We also propose exception flow graph to represent exception flows. And we show that the control flow graph that accounts for exception flows can be constructed by merging exception flow graph onto normal control flow graph.

Continuous Speech Recognition Using N-gram Language Models Constructed by Iterative Learning (반복학습법에 의해 작성한 N-gram 언어모델을 이용한 연속음성인식에 관한 연구)

  • 오세진;황철준;김범국;정호열;정현열
    • The Journal of the Acoustical Society of Korea
    • /
    • v.19 no.6
    • /
    • pp.62-70
    • /
    • 2000
  • In usual language models(LMs), the probability has been estimated by selecting highly frequent words from a large text side database. However, in case of adopting LMs in a specific task, it is unnecessary to using the general method; constructing it from a large size tent, considering the various kinds of cost. In this paper, we propose a construction method of LMs using a small size text database in order to be used in specific tasks. The proposed method is efficient in increasing the low frequent words by applying same sentences iteratively, for it will robust the occurrence probability of words as well. We carried out continuous speech recognition(CSR) experiments on 200 sentences uttered by 3 speakers using LMs by iterative teaming(IL) in a air flight reservation task. The results indicated that the performance of CSR, using an IL applied LMs, shows an 20.4% increased recognition accuracy compared to those without it. This system, using the IL method, also shows an average of 13.4% higher recognition accuracy than the previous one, which uses context-free grammar(CFG), implying the effectiveness of it.

  • PDF

Improvement of Iterative Algorithm for Live Variable Analysis based on Computation Reordering (사용할 변수의 예측에 사용되는 반복적 알고리즘의 계산순서 재정렬을 통한 수행 속도 개선)

  • Yun Jeong-Han;Han Taisook
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.8
    • /
    • pp.795-807
    • /
    • 2005
  • The classical approaches for computing Live Variable Analysis(LVA) use iterative algorithms across the entire programs based on the Data Flow Analysis framework. In case of Zephyr compiler, average execution time of LVA takes $7\%$ of the compilation time for the benchmark programs. The classical LVA algorithm has many aspects for improvement. The iterative algorithm for LVA scans useless basic blocks and calculates large sets of variables repeatedly. We propose the improvement of Iterative algorithm for LVA based on used variables' upward movement. Our algorithm produces the same result as the previous iterative algorithm. It is based on use-def chain. Reordering of applying the flow equation in DFA reduces the number of visiting basic blocks and redundant flow equation executions, which improves overall processing time. Experimental results say that our algorithm ran reduce $36.4\%\;of\;LVA\;execution\;time\;and\;2.6\%$ of overall computation time in Zephyr compiler with benchmark programs.

Analysis of Quadratically Filtered Gradient Algorithm with Application to Channel Equalization (채널 등화기에 응용한 제2차 필터화 경사도 알고리즘의 해석)

  • 김해정;이두수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.1
    • /
    • pp.131-142
    • /
    • 1994
  • This paper analyzes the properties of such algorithm that corresponds to the nonlinear adaptive algorithm with additional update terns, parameterized by the scalar factors ${\alpha}1,\;and\;{\alpha}2$. The analysis of concergence leads to eigenvalues of the transition matrix for the mean filter coefficient vector. Regions in which the algorithm becomes stable are demonstrated. The time constant is derived and the computational complexity of the QFG algorithm is compared with those of the conventional LMS. sign, and LFG algorithm. The properties of convergence in the mean square error is derived and the neccessary condition for the CFG algorithm to be stable is attaned. In the computer simulation a channel equalization is utilized to demonstrate the performance feature of the QFG algorithm. The QFG algorithm has the more computational complexities but the faster convergence speed than LMS and LFG algorithm. Since the QFG algorithm has smoother convergence, it may be useful in case where error bursting is a problem.

  • PDF

Offline Based Ransomware Detection and Analysis Method using Dynamic API Calls Flow Graph (다이나믹 API 호출 흐름 그래프를 이용한 오프라인 기반 랜섬웨어 탐지 및 분석 기술 개발)

  • Kang, Ho-Seok;Kim, Sung-Ryul
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.363-370
    • /
    • 2018
  • Ransomware detection has become a hot topic in computer security for protecting digital contents. Unfortunately, current signature-based and static detection models are often easily evadable by compress, and encryption. For overcoming the lack of these detection approach, we have proposed the dynamic ransomware detection system using data mining techniques such as RF, SVM, SL and NB algorithms. We monitor the actual behaviors of software to generate API calls flow graphs. Thereafter, data normalization and feature selection were applied to select informative features. We improved this analysis process. Finally, the data mining algorithms were used for building the detection model for judging whether the software is benign software or ransomware. We conduct our experiment using more suitable real ransomware samples. and it's results show that our proposed system can be more effective to improve the performance for ransomware detection.

Preparation and Characteristics of Poly(phenylene ether)s in Various Reaction Conditions (다양한 반응조건에 따른 폴리페닐렌에테르의 중합 특성)

  • Park, Jong-Hyun;Kim, Nam-Cheol;Kim, Yong-Tae;Nam, Sung-Woo;Kim, Young-Jun;Kim, Ji-Heung
    • Polymer(Korea)
    • /
    • v.35 no.3
    • /
    • pp.244-248
    • /
    • 2011
  • Poly(2,6-dimethyl-1,4-phenylene ether) (PPE) was synthesized by oxidative polymerization using various Cu(I)-amine catalyst system. The effects of catalyst/monomer ratio, different amine ligand, and the content of 2,4,6-trimethylphenol (TMP) additive on the polymer yield and molecular weight were investigated by using gel permeation chromatography. The catalytic activity of various Cu-amine systems on the 2,S-dimethylphenol (DMP) polymerization was monitored and compared each other through oxygen-uptake experiment. In addition, the effect of catalyst removal using aqueous EDTA on the thermal stability of the prepared polymer was elucidated by thermogravimetric analysis.

Static Type Inference Based on Static Single Assignment for Bytecode (바이트코드를 위한 정적 단일 배정문 기반의 정적 타입 추론)

  • Kim Ji-Min;Kim Ki-Tea;Kim Je-Min;Yoo Weon-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.87-96
    • /
    • 2006
  • Although bytecode has many good features, it has slow execution speed and it is not an ideal representation for program analysis or optimization. For analysises and optimizations. bytecode must be translated to a Static Single Assignment Form(SSA Form) But when bytecode is translated a SSA Form it has lost type informations of son variables. For resolving these problem in this paper, we create extended control flow graph on bytecode. Also we convert the control flow graph to SSA Form for static analysis. Calculation about many informations such as dominator, immediate dominator. dominance frontier. ${\phi}$-Function. renaming are required to convert to SSA Form. To obtain appropriate type for generated SSA Form, we proceed the followings. First. we construct call graph and derivation graph of classes. And the we collect information associated with each node. After finding equivalence nodes and constructing Strongly Connected Component based on the collected informations. we assign type to each node.

  • PDF

A Context Free Grammar based Algorithm for Generating Playable Transcoding Paths of the Multimedia Presentation with Different End-to-End QoS (종단간 상이한 QoS를 갖는 멀티미디어 연출 재생을 위한 CFG 기반의 변환 경로 생성 알고리즘)

  • Chon, Sung-Mi;Lim, Young-Hwan
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.699-708
    • /
    • 2002
  • Since various terminals and different networks get involved in playing of a multimedia presentation, the case that the presentation QoS at a destination should be different from the QoS of multimedia data at a source occurs frequently. For playing the multimedia presentation, the multimedia data at a source should be transcoded into the multimedia data satisfying the QoS required at the terminal. The problem of generating the transcoding path is that, for a given multimedia presentation, different transcoding paths depending the terminal and networks should be generated. That is, a fixed transcoding path cannot be applied to a multimedia presentation. Instead, whenever the terminal and network to play the presentation get determined, a proper transcoding path should be regenerated automatically. In this paper, the algorithm for generating the transcoding path and the method for checking the playability of the generated path are proposed. The generating algorithm adopted the technique of Context Free Grammar in describing the set of transcoding resources and a user's transcoding rules in order to utilize the well-known compiler techniques. For the playability check, a method of computing the transcoding time and the delay time between data units are proposed. Finally all the proposed methods were implemented in the stream engine, called Transcore and the presentation-authoring tool, called VIP, we had developed. And the test results with a sample scenario were presented at the last.

Analysis of Genetic Polymorphism by Bloodtyping in Jeju Horse (혈액형에 의한 제주말의 유전적 다형성 분석)

  • Cho Gil-Jae
    • Journal of Life Science
    • /
    • v.15 no.6 s.73
    • /
    • pp.972-978
    • /
    • 2005
  • The present study was carried out to investigate the blood markers of Jeju horses. The redcell cypes (blood groups) and blood protein types (biochemical polymorphisms) were tested from 102 Jeju horses by serological and electrophoretc procedure, and their phenotypes and gene frequencies were estimated. The blood group and biochemical polymorphism phenotypes observed with high frequency were $A^{af}\;(27.45\%$), $C^{a}\;(99.02\%$), $K^{-}\;(97.06\%$), $U^{a}\;(62.75\%$), $P^{b}\;(36.27\%$), $Q^{c}\;(47.06\%$), $D^{cgm/dghm}\;(13.73\%$), $D^{adn/cgm}\;(9.80\%$), $D^{ad/cgm}$\;(8.82\%$), $D^{dghm/dghm}(7.84\%$), $D^{cgm/cgm}(7.84\%$), $AL^{B}\;(48.04\%$), $GC^{F}\;(99.02\%$), $AlB^{K}\;(97.06\%$), $ES^{FI}\;(36.27\%$), $TF^{F2}\;(25.49\%$), $HB^{B1}\;(45.10\%$), and $PGD^{F}\;(86.27\%$) in Jeju horses, respectively. Alleles observed with high gene frequency were $A^{af}$ (0.3726), $A^{C}$ (0.2647), $C^{-}$ (0.5050), $K^{-}$ (0.9853), $U^{-}$ (0.6863), $P^{b}$ (0.4657), $Q^{c}$ (0.5294), $D^{cgm}$ (0.3039), $HB^{B1}$(0.6863), $PGD^{F}$ (0.9265), $AL^{B}$ (0.6912), $ALB^{K}$ (0.9852), $GC^{F}$ (0.9950), $ES^{I}$ (0.5000) and $TF^{F2}$ (0.4950) in Jeju horses, and sfecific alleles, $D^{cgm(f)}$ (0.0196), $HB^{A}$ (0.0147), $HB^{A2}$ (0.0196), $ES^{G}$ (0.0441), $ES^{H}$ (0.0098), $TF^{E}$TF'(0.0246), $TF^{H2}$ (0.0049) and $PGD^{D}$ (0.0098) were detected in Jeju horses. These preliminary results present basic information for detecting the genetic markers in Jeju horse. and developing a system for parentage verification and individuals identification in jeju horses.