• Title/Summary/Keyword: Processor Trace

Search Result 39, Processing Time 0.026 seconds

A Design on the Rhino XR-3 Robot Controller Using TMS320c31 (TMS320c31을 이용한 Rhino XR-3 로봇 제어기 설계)

  • Park, Won-Ki;Lee, Kwae-Hi
    • Proceedings of the KIEE Conference
    • /
    • 1998.11b
    • /
    • pp.564-566
    • /
    • 1998
  • A robot manipulator is a nonlinear time varying MIMO system. Therefore, when a robot manipulator operates at high speeds, the performance of pursuing its trace becomes worse due to the increased nonlinearity of system. Several nonlinear control methods are introduced for solving this problem. But, these methods need a large amount of calculations, so it is necessary to use the controller equipped with a faster and more efficient processing ability. In this paper, we designed the Rhino XR-3 Robot Controller which controls five joints concurrently. To reduce the size of the controller and to control 6 dc-servo motors in real time, we use the TMS320c31, the high-speed digital signal processor.

  • PDF

Development of Debugging Tool for LEON3-based Embedded Systems (LEON3 기반 임베디드 시스템을 위한 디버깅 도구 개발)

  • Ryu, Sang-Moon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.4
    • /
    • pp.474-479
    • /
    • 2014
  • LEON3 is a 32-bit synthesizable processor based on the SPARC V8. It can be connected to AMBA 2.0 bus and has a 7- stage pipeline, IEEE-754 FPU and 256[KB] cache. It can be easily implemented using FPGA and used for a SoC design. DSU which comes with LEON3 can be used to control and monitor the operation of LEON3. And DSU makes it easy to set a debugging environment for the development of both hardware and software for an embedded systems based on LEON3. This paper presents the summary of the debugging tool for LEON3 based embedded systems. The debugging tool can initialize the target hardware, find out how the target hardware is configured, load application code to a specified memory space and run that application code. To provide users a debugging environment, it can set breakpoints and control the operation of LEON3 correspondingly. And function call trace is one of key functions of the debugging tool.

Design and Implementation of Preprocessing Part for Dynamic Code Analysis (동적 코드 분석을 위한 전처리부 설계 및 구현)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.37-41
    • /
    • 2019
  • Recently, due to the appearance of various types of malware, the existing static analysis exposes many limitations. Static analysis means analyzing the structure of a code or program with source code or object code without actually executing the (malicious) code. On the other hand, dynamic analysis in the field of information security generally refers to a form that directly executes and analyzes (malware) code, and compares and examines and analyzes the state before and after execution of (malware) code to grasp the execution flow of the program. However, dynamic analysis required analyzing huge amounts of data and logs, and it was difficult to actually store all execution flows. In this paper, we propose and implement a preprocessor architecture of a system that performs malware detection and real-time multi-dynamic analysis based on 2nd generation PT in Windows environment (Windows 10 R5 and above).

An On-chip Cache and Main Memory Compression System Optimized by Considering the Compression rate Distribution of Compressed Blocks (압축블록의 압축률 분포를 고려해 설계한 내장캐시 및 주 메모리 압축시스템)

  • Yim, Keun-Soo;Lee, Jang-Soo;Hong, In-Pyo;Kim, Ji-Hong;Kim, Shin-Dug;Lee, Yong-Surk;Koh, Kern
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.125-134
    • /
    • 2004
  • Recently, an on-chip compressed cache system was presented to alleviate the processor-memory Performance gap by reducing on-chip cache miss rate and expanding memory bandwidth. This research Presents an extended on-chip compressed cache system which also significantly expands main memory capacity. Several techniques are attempted to expand main memory capacity, on-chip cache capacity, and memory bandwidth as well as reduce decompression time and metadata size. To evaluate the performance of our proposed system over existing systems, we use execution-driven simulation method by modifying a superscalar microprocessor simulator. Our experimental methodology has higher accuracy than previous trace-driven simulation method. The simulation results show that our proposed system reduces execution time by 4-23% compared with conventional memory system without considering the benefits obtained from main memory expansion. The expansion rates of data and code areas of main memory are 57-120% and 27-36%, respectively.

An Embedded System Design of Collusion Attack Prevention for Multimedia Content Protection on Ubiquitous Network Environment (유비쿼터스 네트워크 환경의 멀티미디어 콘텐츠 보호를 위한 공모공격 방지 임베디드 시스템 설계)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.1
    • /
    • pp.15-21
    • /
    • 2010
  • This paper proposes the multimedia fingerprinting code insertion algorithm when video content is distributed in P2P environment, and designs the collusion codebook SRP(Small RISC Processor) embedded system for the collusion attack prevention. In the implemented system, it is detecting the fingerprinting code inserted in the video content of the client user in which it requests an upload to the web server and in which if it is certified content then transmitted to the streaming server then the implemented system allowed to distribute in P2P network. On the contrary, if it detects the collusion code, than the implemented system blocks to transmit the video content to the streaming server and discontinues to distribute in P2P network. And also it traces the colluders who generate the collusion code and participates in the collusion attack. The collusion code of the averaging attack is generated with 10% of BIBD code v. Based on the generated collusion code, the codebook is designed. As a result, when the insert quantity of the fingerprinting code is 0.15% upper in bitplane 0~3 of the Y(luminance) element of I-frame at the video compression of ASF for a streaming service and MP4 for an offline offer of video content, the correlation coefficient of the inserted original code and the detected code is above 0.15. At the correlation coefficient is above 0.1 then the detection ratio of the collusion code is 38%, and is above 0.2 then the trace ratio of the colluder is 20%.

Peducing the Overhead of Virtual Address Translation Process (가상주소 변환 과정에 대한 부담의 줄임)

  • U, Jong-Jeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.1
    • /
    • pp.118-126
    • /
    • 1996
  • Memory hierarchy is a useful mechanism for improving the memory access speed and making the program space larger by layering the memories and separating program spaces from memory spaces. However, it needs at least two memory accesses for each data reference : a TLB(Translation Lookaside Buffer) access for the address translation and a data cache access for the desired data. If the cache size increases to the multiplication of page size and the cache associativity, it is difficult to access the TLB with the cache in parallel, thereby making longer the critical timing path in the processor. To achieve such parallel accesses, we present the hybrid mapped TLB which combines a direct mapped TLB with a very small fully-associative mapped TLB. The former can reduce the TLB access time. while the latter removes the conflict misses from the former. The trace-driven simulation shows that under given workloads the proposed TLB is effective even when a fully-associative mapped TLB with only four entries is added because the effects of its increased misses are offset by its speed benefits.

  • PDF

Development of a CAD/CAM System for the Die Having Complex Geometric Solid Shape - for Rotary Blade as an Example - (자유곡면물체(自由曲面物體)의 금형설계(金型設計) 및 제작(製作)의 자동화(自動化)를 위한 CAD/DAM - 로우터리 경운(耕耘)날을 중심(中心)으로 -)

  • Kim, Soung Rai;Kim, Ki Dae
    • Korean Journal of Agricultural Science
    • /
    • v.22 no.1
    • /
    • pp.11-23
    • /
    • 1995
  • The CAD/CAM system for the manufacturing automation is the newest technology in mechanical engineering area and becomes the important research subject nowadays. Most of all hardwares and softwares for the CAD/CAM system used in the our manufacturing companies such as automobile company are developed by the foreign country and the purchasing price of them is very expensive but their applicability to a certain area is very limited. This study was conducted to develope a CAD/CAM system for the design and the automatic manufacturing of the iron pattern shaped with 3 - dimensional free curved surface, and to test its applicability to the design and the manufacturing of the rotary blade. The results obtained from the study are as follow; 1. The CAD system which can process graphic procedures from the free curved surface shaped data was developed with personal computer. 2. The CAM main program was developed. This main program could produce CL data from CAD data file by checking the tool interference according to the cutting mode. 3. The sub. program which can simulate the tool trace from the CL data was developed. 4. The post processor for the Deckel FP2NC NC milling machine from CL data file was developed and the sub program could transmit NC program through modem to NC milling machine was developed. 5. The developed CAM system seemed to be applicable to any other system. Because the measuring results of the cross sectional thickness of the plastic model from the manufacturing iron pattern by the system showed that this system could properly check the tool interference. 6. In took 75~90 hours to manufacture two iron patterns of rotary blade. For the sake of convenience in applying to the other systems, this system was developed in BASIC and FORTRAN computer language and minimum portion of machine language as possible.

  • PDF

6TALK : Implementation of NAT-PT/SIIT and enhanced ALG

  • 이주철;호용근;신명기;김형준
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.701-705
    • /
    • 2002
  • This paper describes implementation of IPv6-IPv4 transition toolbox named as 6TALK(IPv6 TrAansLator of Krv6) and some scenarios using 6TALK which enables IPv6 island to connect other IPv6 island or IPv4 island seamlessly. 6TALK implements some transition mechanisms suggested in NGTrans Working Group of IETF. Those mechanisms are composed of basic mechanism, tunneling, and applied mechanism such as DSTM. 6TALK provides functions which enable IPv6 network at the edge of existing network to communicate with IPv4 network by using these transition mechanisms. As major transition mechanisms in 6TALK we adopt NAT-PT/SIIT and DSTM/DSTM options and as implementation environment we use Linux Kernel 2.4.18 and Netfilter framework. Software modules implemented in Linux kernel was ported to hardware box using Motorola MPC 8260 processor. The transition mechanisms used in 6TALK are the ones predicted to be used in initial transition step to IPv6.

  • PDF

Studies on Estimation of Fish Abundance Using an Echo Sounder ( 1 ) - Experimental Verification of the Theory for Estimating Fish Density- (어군탐지기에 의한 어군량 추정에 관한 기초적 연구 ( 1 ) - 어군량추정이론의 검증실험 -)

  • 이대재
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.27 no.1
    • /
    • pp.1-12
    • /
    • 1991
  • An experiment has been carefully designed and performed to verify the theory for the echointergration technique of estimating the density of fish school by the use of steel spheres in a laboratory tank. The spheres used to simulate a fish school were randomly distributed throughout the insonified volume to produce the acoustic echoes similar to those scattered from real fish schools. The backscattered echoes were measured as a function of target density at tow frequencies of 50kHz and 200kHz. Data acquisition, processing and analysis were performed by means of the microcomputer-based sonar-echo processor including a FFT analyzer. Acoustic scattering characteristics of a 36cm mackerel was investigated by measuring fish echoes with frequencies ranging from 47.8kHz to 52.0kHz. The fluctuation of bottom echoes caused by the effects of fish-school attenuation and multiple scattering which occurred in dense aggregations of fishes was also examined by analyzing the echograms of sardine schools obtained by a 50kHz telesounder in the set-net's bagnet, and the echograms obtained by a scientific echo sounder of 50kHz in the East China Sea, respectively. The results obtained can be summarized as follows: 1. The measured and the calculated echo shapes on the steel sphere used to simulate a fish school were in close agreement. 2. The waveform and amplitude of echo signals by a mackerel without swimbladder fluctuated irregularly with the measuring frequency. 3. When a collection of 30 targets/m super(3) lied the shadow region behind another collection of 5 targets/m super(3), the mean losses in echo energy for the 30 targets/m super(3) were about -0.4dB at 50kHz and about -0.2dB at 200kHz, respectively. 4. In the echograms obtained in the East China Sea, the bottom echoes fluctuated remarkably when the dense aggregations of fish appeared between transducer and seabed. Especially, in the case of the echograms of sardine school obtained in a set-net's bagnet, the disappearance of bottom echoes and the lengthening of the echo trace by fish aggregations were observed. Then the mean density of the sardine school was estimated as 36 fish/m super(3). It suggests that when the distribution density of fishes in oceans is greater than this density, the effects of fish-school attenuation and multiple scattering must be taken into account as a possible source of error in fish abundance estimates. 5. The relationship between mean backscattering strength (, dB) and target density ($\rho$, No./m super(3)) were expressed by the equations: =-46.2+13.7 Log($\rho$) at 50kHz and =-43.9+13.4 Log($\rho$) at 200kHz. 6. The difference between the experimentally derived number and the actual number of targets gradually decreased with an increase in the target density and was within 20% when the density was 30 targets/m super(3). From these results, we concluded that when the number of targets in the insonified volume is large, the validity of the echo-integration technique of estimating the density of fish schools could be expected.

  • PDF