• Title/Summary/Keyword: execution function

Search Result 367, Processing Time 0.026 seconds

Distance Functions to Detect Changes in Data Streams

  • Bud Ulziitugs;Lim, Jong-Tae
    • Journal of Information Processing Systems
    • /
    • v.2 no.1
    • /
    • pp.44-47
    • /
    • 2006
  • One of the critical issues in a sensor network concerns the detection of changes in data streams. Recently presented change detection schemes primarily use a sliding window model to detect changes. In such a model, a distance function is used to compare two sliding windows. Therefore, the performance of the change detection scheme is greatly influenced by the distance function. With regard to sensor nodes, however, energy consumption constitutes a critical design concern because the change detection scheme is implemented in a sensor node, which is a small battery-powered device. In this paper, we present a comparative study of various distance functions in terms of execution time, energy consumption, and detecting accuracy through simulation of speech signal data. The simulation result demonstrates that the Euclidean distance function has the highest performance while consuming a low amount of power. We believe our work is the first attempt to undertake a comparative study of distance functions in terms of execution time, energy consumption, and accuracy detection.

A Novel Instruction Set for Packet Processing of Network ASIP (패킷 프로세싱을 위한 새로운 명령어 셋에 관한 연구)

  • Chung, Won-Young;Lee, Jung-Hee;Lee, Yong-Surk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9B
    • /
    • pp.939-946
    • /
    • 2009
  • In this paper, we propose a new network ASIP(Application Specific Instruction-set Processor) which was designed for simulation models by a machine descriptions language LISA(Language for Instruction Set Architecture). This network ASIP is aimed for an exclusive engine undertaking packet processing in a router. To achieve the purpose, we added a new necessary instruction set for processing a general ASIP based on MIPS(Microprocessor without Interlock Pipeline Stages) architecture in high speed. The new instructions can be divided into two groups: a classification instruction group and a modification instruction group, and each group is to be processed by its own functional unit in an execution stage. The functional unit was optimized for area and speed through Verilog HDL, and the result after synthesis was compared with the area and operation delay time. Moreownr, it was allocated to the Macro function ana low-level standardized programming language C using CKF(Compiler Known Function). Consequently, we verified performance improvement achieved by analysis and comparison of execution cycles of application programs.

Development of Paradigm for Measuring Prospective Memory Function (미래기억 기능을 측정하기 위한 패러다임의 고안)

  • Park, Ji-Won;Kwon, Yong-Hyun;Kim, Hyun-Jung
    • Physical Therapy Korea
    • /
    • v.12 no.3
    • /
    • pp.67-73
    • /
    • 2005
  • Prospective memory (PM) is related to remember to carry out a previously intented behaviour. The purpose of this study was to develop a paradigm for measuring PM function to diagnosis in mild cognitive impairment 1 or brain injury in patients 2. among brain injured patients Thirty-eight normal healthy subjects participated in current study. The paradigm was composed of four conditions: a baseline and three intention conditions (expectation, execution 1 and 2). In the expectation condition, subjects were asked to make a new response to intented stimuli during ongoing task, but the intented stimuli never occurred. In the execution 1 (one type of expected stimulus) and 2 (two types of expected stimuli), the intended stimuli did occur in 20% of trials. The reaction time and error rate were calculated in each condition. Repeated measures using ANOVA of subject's mean reaction times (RTs) and mean error rates (ERs) showed main effects of conditions during ongoing task. The comparison of PM tasks in executive condition 1 and 2 also showed significance in RTs and ERs. This paradigm reflects sufficiently the performance of prospective memory function during ongoing task in normal individuals. Thus, we suggest that the paradigm will be helpful to study neural network of PM function using brain imaging techniques and diagnosis of PM dysfunction.

  • PDF

A Coverage-Based Software Reliability Growth Model for Imperfect Fault Detection and Repeated Construct Execution (불완전 결함 발견과 구문 반복 실행을 고려한 커버리지 기반 신뢰성 성장 모형)

  • Park, Joong-Yang;Park, Jae-Heung;Kim, Young-Soon
    • The KIPS Transactions:PartD
    • /
    • v.11D no.6
    • /
    • pp.1287-1294
    • /
    • 2004
  • Recently relationships between reliability measures and the coverage have been developed for evaluation of software reliability. Particularly the mean value function of the coverage-based software reliability growth model is important because of its key role in rep-resenting the software reliability growth. In this paper, we first review the problems of the existing mean value functions with respect to the assumptions on which they are based. Then a new mean value function is proposed. The new mean value function is developed for a general testing environment in which imperfect fault detection and repeated construct execution are allowed. Finally performance of the proposed model is empirically evaluated by applying it to a real data set.

TDX-1A System Start-Up (TDX-1A 시스팀 시동)

  • Kim, Gwan-Joong;Lee, Byung-Sun;Kim, Young-Si
    • Proceedings of the KIEE Conference
    • /
    • 1987.07b
    • /
    • pp.1003-1007
    • /
    • 1987
  • The system start-up function of TDX-1A that should be executed during installation or emergency has been designed to meet requirements of the distributed real time control system. It is performed in a centralized manner by the dedicated processor according to the maintenance and administration mechanism of the system. Upon execution, it provides information on the system state for the ESS personal. In additions, it protects the loss the charging and statistics data, and minimizes the effect on the customer service. This paper describes the design concept of the system startup function and its implementation method and also calculates its the execution time.

  • PDF

Effects of CO-OP Interventions on Affected Upper Extremity Use, Execution Function and Occupational Performance in Patients With Stroke (CO-OP 중재 적용이 뇌졸중 환자의 상지 기능과 실행기능 및 작업 수행 증진에 미치는 영향)

  • Kim, Gyeong-Sil;Kim, Hee
    • Therapeutic Science for Rehabilitation
    • /
    • v.10 no.2
    • /
    • pp.141-150
    • /
    • 2021
  • Objective : In this study, the upper extremity use, executive function, and occupational performance effects of cognitive orientation to daily occupational performance (CO-OP) interventions for patients with stroke were assessed. Methods : The study was designed as a single-group pre-post test with 20 sessions. The participants were five hospitalized patients with stroke who were present in a rehabilitation setting, and their onsets were more than 3 months previously. Outcomes were measured using the Canadian Occupation Performance Measure (COPM), Performance Quality Rating Scale (PQRS), Executive Function performance Test - Korean version (EFPT-K), and Motor Activity Log (MAL). The Wilcoxon signed-rank test was conducted to determine the difference between the pre-and-post of CO-OP interventions. The statistical significance level was p<.05. Results : The upper extremity function showed significant changes and the execution function showed significant changes in preparation, sequencing, judgment and safety, and closing, except for items to be started. The performance of the task also showed significant changes. Conclusion : Through 20 sessions of CO-OP interventions, especially in patients with chronic stroke, the upper extremity function, execution function, and task performance were improved. We found that CO-OP intervention had a positive effect on the improvement of detailed task elements as well as the performance of tasks overall, in patients with stroke.

Development of Log-Based Testing Framework for Unit Testing of Embedded Software (임베디드 소프트웨어의 단위 테스팅을 위한 로그 기반 테스팅 프레임워크 개발)

  • Ryu, Hodong;Jeong, Sooyong;Lee, Woo Jin;Kim, Hwangsoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.419-424
    • /
    • 2015
  • As Internet of Things (IoT) is recently serviced in several fields, the reliability and safety issues for IoT embedded systems are emerged. During the development of embedded systems, it is not easy to build the virtual execution environment and to test the developing version. Therefore, it is difficult to ensure its reliability due to lack of unit testing. In this paper, we propose a log-based unit testing framework for embedded software, which performs on real target board by extracting information of function execution. And, according to execution paths, duplicated logs are eliminated to keep a minimal log size. As a result, during system testing, testers can efficiently decide whether the executed paths of each function are correctly performed or not.

Integrity Guarantee Scheme of Mobile Agents through Authentication of Digital Signature with TTS (TTS기반에서 디지털 서명의 실행 인증을 통한 에이전트의 무결성 보장 기법)

  • Jung Chang-Ryul;Yoon Hong-Sang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6C
    • /
    • pp.651-657
    • /
    • 2006
  • This paper propose the technique for the execution authentication of digital signature with TTS(traceable trust server) to guarantee the safe execution of mobile agents. That is to say, it is focused on improving the processing speed of systems and the traffic of network which are problems in the existing studies. The digital signature is used to guarantee the efficient and safe execution and the integrity of mobile agents. The certificate of it is chained with synthesis function, cryptographic algorithm based on public key, and hash function. And white hosts can be protected against the threat of being used maliciously. Then, we prove the efficiency of system overhead and the traffic of network by the analysis. In case the certificate chain of a digital signature is used, the safe execution of mobile agents can be protected against attackers that wish to insert a newly created certificate after cutting off the chain after striking space key 2 times.

Determination of Optimal Checkpoint Interval for Real-time Control Tasks Considering Performance Index Function (성능 함수를 고려한 실시간 제어 테스크에서의 최적 체크 포인터 구간 선정)

  • Kwak, Seong-Woo;Jung, Young-Joo
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.5
    • /
    • pp.875-880
    • /
    • 2008
  • In this paper, a novel method to determine the optimal checkpoint interval for real-time control task is proposed considering its performance degradation according to tasks's execution time. The control task in this paper has a specific sampling period shorter than its deadline. Control performance is degraded as the control task execution time is prolonged across the sampling period and eventually zero when reached to the deadline. A new performance index is defined to represent the performance variation due to the extension of task execution time accompanying rollback fault recovery. The procedure to find the optimal checkpoint interval is addressed and several simulation examples are presented.

Feature Based Tool Path Planning and Modification for STEP-NC (STEP-NC의 피쳐 기반 공구경로 생성 및 갱신)

  • 조정훈;서석환
    • Korean Journal of Computational Design and Engineering
    • /
    • v.4 no.4
    • /
    • pp.295-311
    • /
    • 1999
  • An increasing attention is paid to STEP-NC, the next generation CNC controller interfacing STEP-compatible data. In this paper, we first propose an Architecture for the STEP-NC (called FBCC: Feature Baled CNC Controller) accepting feature code compatible with STEP-data, and executing NC motion feature by feature while monitoring the execution status. The main thrust of the paper has been to develop an automatic on-line tool path generation and modification scheme for milling operation. The tool path it generated iota each feature by decomposing into a finite number of primitive features. The key function in the new scheme is haw to accommodate unexpected execution results. In our scheme, the too1 path plinker is designed to have a tracing capability iota the tool path execution so that a new path can be generated from the point where the operation is stopped. An illustrative example is included to show the capability of the developed algorithm.

  • PDF