• Title/Summary/Keyword: Information propagation

Search Result 2,175, Processing Time 0.036 seconds

Copy Propagation in CTOC (CTOC에서 복사 전파)

  • Kim, Ki-Tae;Kim, Je-Min;Yoo, Won-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.1-8
    • /
    • 2007
  • Although the Java bytecode has numerous advantages. there ate also shortcomings such as slow execution speed and difficulty in analysis. Therefore. in order for the Java class file to be effectively executed under the execution environment such as the network, it is necessary to convert it into optimized code. We implements CTOC. CTOC generated CFG using the existing bytecode then created the SSA Form for analysis and optimization. However. due to insertion or the ${\phi}$-function in the process of conversion into the SSA Form, the number of nodes increased. As a means of reducing the number of nodes, we performed copy propagation, which is an optimization method applicable to the SSA form. Copy propagation is the process of a value of a variable being topied to another variable. There are cases where conversion due to copy propagation alone does not yield significant effects. However, when variables are not used in the later optimization stages, copy propagation provides a means for eliminating the copy statement for the corresponding variable, making it an important step. This paper shows the copy propagation to obtain a more optimized code in SSA Form.

  • PDF

Time Domain Response of Random Electromagnetic Signals for Electromagnetic Topology Analysis Technique

  • Han, Jung-hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.2
    • /
    • pp.135-144
    • /
    • 2022
  • Electromagnetic topology (EMT) technique is a method to analyze each component of the electromagnetic propagation environment and combine them in the form of a network in order to effectively model the complex propagation environment. In a typical commercial communication channel model, since the propagation environment is complex and difficult to predict, a probabilistic propagation channel model that utilizes an average solution, although with low accuracy, is used. However, modeling techniques using EMT technique are considered for application of propagation and coupling analysis of threat electromagnetic waves such as electromagnetic pulses, radio wave models used in electronic warfare, local communication channel models used in 5G and 6G communications that require relatively high accuracy electromagnetic wave propagation characteristics. This paper describes the effective implementation method, algorithm, and program implementation of the electromagnetic topology (EMT) method analyzed in the frequency domain. Also, a method of deriving a response in the time domain to an arbitrary applied signal source with respect to the EMT analysis result in the frequency domain will be discussed.

A Probabilistic Model of Damage Propagation based on the Markov Process (마코프 프로세스에 기반한 확률적 피해 파급 모델)

  • Kim Young-Gab;Baek Young-Kyo;In Hoh-Peter;Baik Doo-Kwon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.8
    • /
    • pp.524-535
    • /
    • 2006
  • With rapid development of Internet technology, business management in an organization or an enterprise depends on Internet-based technology for the most part. Furthermore, as dependency and cohesiveness of network in the communication facilities are increasing, cyber attacks have been increased against vulnerable resource in the information system. Hence, to protect private information and computer resource, research for damage propagation is required in this situation. However the proposed traditional models present just mechanism for risk management, or are able to be applied to the specified threats such as virus or worm. Therefore, we propose the probabilistic model of damage propagation based on the Markov process, which can be applied to diverse threats in the information systems. Using the proposed model in this paper, we can predict the occurrence probability and occurrence frequency for each threats in the entire system.

Recognition of a New Car Plate using Color Information and Error Back-propagation Neural Network Algorithms (컬러 정보와 오류역전파 신경망 알고리즘을 이용한 신차량 번호판 인식)

  • Lee, Jong-Hee;Kim, Jin-Whan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.5
    • /
    • pp.471-476
    • /
    • 2010
  • In this paper, we propose an effective method that recognizes the vehicle license plate using RGB color information and back-propagation neural network algorithm. First, the image of the vehicle license plate is adjusted by the Mean of Blue values in the vehicle plate and two candidate areas of Red and Green region are classified by calculating the differences of pixel values and the final Green area is searched by back-propagation algorithm. Second, our method detects the area of the vehicle plate using the frequence of the horizontal and the vertical histogram. Finally, each of codes are detected by an edge detection algorithm and are recognized by error back-propagation algorithm. In order to evaluate the performance of our proposed extraction and recognition method, we have run experiments on a new car plates. Experimental results showed that the proposed license plate extraction is better than that of existing HSI information model and the overall recognition was effective.

Measurement and analysis of indoor corridor propagation path loss in 5G frequency band (5G 주파수 대역에서의 실내 복도 전파 경로손실 측정 및 분석)

  • Kim, Hyeong Jung;Choi, Dong-You
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.688-693
    • /
    • 2022
  • In this paper, channel propagation path loss was measured in building corridors for frequency bands of 3.7 GHz and 28 GHz, which are used in 5G mobile communication, and compared and analyzed with CI (Close-In) and FI (Floating-Intercept) channel models. To measure the propagation path loss, the measurement was performed while moving the receiver (Rx) from the transmitter (Tx) by 10 m. As a result of the measurement, the PLE (Path Loss Exponent) values of the CI model at 3.7 GHz and 28 GHz were 1.5293 and 1.7795, respectively, and the standard deviations were analyzed as 9.1606 and 8.5803, respectively. In the FI model, 𝛼 values were 79.5269 and 70.2012, 𝛽 values were -0.6082 and 1.2517, respectively, and the standard deviations were 5.8113 and 4.4810, respectively. In the analysis results through the CI model and the FI model, the standard deviation of the FI model is smaller than that of the CI model, so it can be seen that the FI model is similar to the actual measurement result.

Stereo Matching with Efficeient Belief Propagation Using Edge Detection (엣지 정보를 이용한 개선된 BP 기반의 스테레오 정합)

  • Choi, Jung-Hun;Na, In-Tae;Jeong, Hong
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.931-932
    • /
    • 2008
  • An implementation of modified stereo matching using efficient belief propagation(BP) algorithm is presented in this paper. Edges of the image were found using conventional edge detection algorithms. Resulting edge information is used to suppress propagation of wrong probabilistic information. Proposed method can effectively reduce errors that incurred by ambiguous scene properties.

  • PDF

A new WDM/TDM protocol for very high speed optical networks (고속광통신망용 새로운 WDM/TDM 프로토콜)

  • 이상록;이성근;박진우
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.33A no.2
    • /
    • pp.50-58
    • /
    • 1996
  • This paper proposes the channel-access protocol suitable to a very high speed photonic WDM network with star configuration, which can provide a high channel utilization and insensitivity to the propagation delay. The proposed protocol employs a control channel and a simple status table to deal with the propagation delay which has been a major limiting factor in the performance of the very high speed optical communication networks. The control channel transmits control information in order to reserve access on data channels, and each node constitutes a status table after the reception of control pckets which holds information about the availbility of destination node and data channel. The proposed protocol is insensitive to the propagation delay time by removing necessity of the retransmission and by allowing parallel transmission of control packet and data packets. It is proved in analysis and discrete event simulation that the proposed protocol is superior in throughput and mean delay, especially at the high load conditions compared to the existing high speed channel-access protocols.

  • PDF

Error-detection-coding-aided iterative hard decision interference cancellation for MIMO systems with HARQ

  • Park, Sangjoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1016-1030
    • /
    • 2018
  • In this paper, an error-detection-coding-aided iterative hard decision interference cancellation (EDC-IHIC) scheme for multiple-input multiple-output systems employing hybrid automatic repeat request (HARQ) for multi-packet transmission is developed and investigated. In the EDC-IHIC scheme, only packets identified as error-free by the EDC are submitted to the interference cancellation (IC) stage for cancellation from the received signals. Therefore, the possibility of error propagation, including inter-transmission error propagation, can be eliminated using EDC-IHIC. Because EDC must be implemented in systems that employ HARQ to determine packet retransmission, error propagation can be prevented without the need for additional redundancy. The results of simulations conducted herein verify that the EDC-IHIC scheme outperforms conventional hard decision IC schemes in terms of the packet error rate in various environments.

A Thinning Algorithm by the Fire Front' Propagation and WPTA Algorithm for the Character Recognition (문자인식을 위한 불 전파와 WPTA 알고리즘에 의한 세선화 알고리즘)

  • 원남식;남인길
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.9 no.1
    • /
    • pp.63-68
    • /
    • 2004
  • This paper is the study about the thinning algorithm by the fire front' propagation and WPTA available for the recognition of various characters. The proposed algorithm can extract the skeleton of a character almost similar to the original pattern by using the depth value representing depth information of each pixel. In this paper we proposed the new thinning algorithm, implemented it, and showed execution results.

  • PDF

An Improved Belief Propagation Decoding for LT Codes (LT 부호를 위한 개선된 BP 복호)

  • Cheong, Ho-Young
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.7 no.4
    • /
    • pp.223-228
    • /
    • 2014
  • It is known that a belief propagation algorithm is a fast decoding scheme for LT codes but it require a large overhead, especially for a short block length LT codes. In this paper an improved belief decoding algorithm using searching method for degree-1 packets is proposed for a small overhead. The proposed decoding scheme shows the desirable performance in terms of overhead while guaranteeing the same computational complexity with respect to the conventional BP decoding scheme.