• Title/Summary/Keyword: execution process

Search Result 1,013, Processing Time 0.026 seconds

A Checkpoint and Recovery Facility for the Fault-Tolerant Process on Linux Environment (리눅스 환경에서 결함 허용 프로세스를 위한 검사점 및 복구 도구)

  • Rim Seong-Rak;Kim Sin-Ho
    • The KIPS Transactions:PartA
    • /
    • v.11A no.5
    • /
    • pp.313-318
    • /
    • 2004
  • In this paper, we suggest a checkpoint and recovery facility for the fault-tolerable process which is expected to be executed for a long time. The basic concept of the suggested facility is to allow the process to be executed continuously, when the process was stopped due to a System fault, by storing the execution status of the process periodically and recovering the execution status prior to the fault was occurred. In the suggested facility, it does not need to modify the source code for the fault-tolerable process. It was designed for the user to specify directly the file name and the checkpoint frequency, and two system calls(save, recover) were added. finally, it was implemented on the Linux environment(kernel 2.4.18) for checking the feasibility.

Bytecode Simulator for Analyzing Java Programs (자바프로그램 분석을 위한 바이트코드 시뮬레이터)

  • Kim, Doo-Woo;Jung, Min-Soo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.7
    • /
    • pp.2086-2094
    • /
    • 2000
  • It is not easy to analyze object-oriented programs, including those in Java, Because the control flows of he program is not visible to the users. The users, however, can utilize class files to trace the process of execution, since a lot of information related on control flow are store in the control flows. A Java virtual machine can then execute the bytecods included in classfiles. It means that understanding the execution process of the bytecodes leads users to comprehend and analyze source programs in Java. We design and implement a visual tool for bytecode execution that is an efficient and powerful tool to understand and analyze source programs in Java. It can aid users to thoroughly grasp not only the structure of a program but also the flow of controls among objects.

  • PDF

A Joint Allocation Algorithm of Computing and Communication Resources Based on Reinforcement Learning in MEC System

  • Liu, Qinghua;Li, Qingping
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.721-736
    • /
    • 2021
  • For the mobile edge computing (MEC) system supporting dense network, a joint allocation algorithm of computing and communication resources based on reinforcement learning is proposed. The energy consumption of task execution is defined as the maximum energy consumption of each user's task execution in the system. Considering the constraints of task unloading, power allocation, transmission rate and calculation resource allocation, the problem of joint task unloading and resource allocation is modeled as a problem of maximum task execution energy consumption minimization. As a mixed integer nonlinear programming problem, it is difficult to be directly solve by traditional optimization methods. This paper uses reinforcement learning algorithm to solve this problem. Then, the Markov decision-making process and the theoretical basis of reinforcement learning are introduced to provide a theoretical basis for the algorithm simulation experiment. Based on the algorithm of reinforcement learning and joint allocation of communication resources, the joint optimization of data task unloading and power control strategy is carried out for each terminal device, and the local computing model and task unloading model are built. The simulation results show that the total task computation cost of the proposed algorithm is 5%-10% less than that of the two comparison algorithms under the same task input. At the same time, the total task computation cost of the proposed algorithm is more than 5% less than that of the two new comparison algorithms.

Enhancing Mobile Platform Security with Virtualization Technologies (가상화를 이용한 모바일 플랫폼 보안성 향상 기술)

  • Kim, Jung-Han;Kim, Jee-Hong;Shin, Eun-Hwan;Eom, Young-Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.201-212
    • /
    • 2011
  • Smartphone devices are widely used because of recent improvements in hardware device, network infrastructure, and emergences in open mobile platforms. These changes provide various advantages and cause security problems. One of the solutions to prevent these problems is that applying of the virtualization technology to mobile environment ha., attracted attention. In this paper, we proposed the virtualization technology which is based on security-enhanced mobile platform scheme, for secure mobile environment based on the secure execution and process concealing technology.

Consecutive Design VE Process Emphasized on Follow-up Activities (Follow-up 활동을 강조한 연속적 설계VE 프로세스)

  • Yang, Jin Kook;Moon, Sung Woo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.29 no.2D
    • /
    • pp.235-244
    • /
    • 2009
  • Design Value Engineering (VE) has become an import part of the daily design process since it has been introduced in the construction industry. Design VE is usually conducted in the general and execution design stages respectively. In order to increase the effectiveness of the VE process, the outcome from the general design VE activities should be integrated into execution design. The outcome from the execution design should be used again for construction. In this study, a consecutive VE process model has been presented as a way to improve the current practice of design VE activities in the construction industry. In the presented model, follow-up activities are emphasized to increase values from the life-cycle perspective of a construction project. The model was tested in a case study of an actual design VE process. The result of the study demonstrates that the model can: 1) effectively incorporate owners requirements; 2) assist decision making in selecting better construction; 3) increase the interface between general and execution design stages; and 4) trace the value flow more efficiently. Overall, the study results indicates that a the consecutive VE process model can be effectively applied when construction project are contracted for the life-cycle management of construction projects.

An Analysis of Action Learning Process in Education Programs for Senior Officials, Engineers, Chief Executive Officers (고위공직 후보자-엔지니어-최고경영자 교육 프로그램의 액션러닝 프로세스 분석)

  • Jung, Hyun-Kon;Moon, Sung-Han
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.87-104
    • /
    • 2012
  • The purpose of this study was to analyze and present of action learning process in education programs for senior officials, engineers, chief executive officers. The main contents of this study is focused on analysis of orientation activities for each step of action learning process, project selection, analysis of problem clarification, review of data research and analysis, analysis of process for seeking of alternative and selecting execution item, comparison and analysis for the results of execution.

A Flash Memory Swap System for Mobile Computers (모바일 컴퓨터를 위한 플래시 메모리 스왑 시스템)

  • Jeon, Seon-Su;Ryu, Yeon-Seung
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.9
    • /
    • pp.1272-1284
    • /
    • 2010
  • As the mobile computers are becoming powerful and are used like general-purpose computers, operating systems for mobile computers also require swap system functionality that utilizes main memory efficiently. Flash memory is widely used as storage device for mobile computers but current linux swap system does not consider flash memory. Swap system is tightly related with process execution since it stores the contents of process in execution. By taking advantage of this characteristics, in this paper, we study a new linux swap system called PASS(Process-Aware Swap System), which allocates the different flash memory blocks to each process. Trace-driven experimental results show that PASS outperforms existing linux swap system with existing garbage collection schemes in terms of garbage collection cost.

Support of Third Party Logistics Operation based on Business Rules (비즈니스 규칙 기반의 3자 물류 운영 지원)

  • Park, Chulsoon;Bang, Yanghee;Sung, Hongsuk
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.2
    • /
    • pp.137-144
    • /
    • 2017
  • The business process of global third party logistics company is defined as a network of logistics activities which involves the products that are manufactured in the developing countries, such as Vietnam, China and so on, and delivered to North or South American countries via intermediate stopover sites. The third party logistics company usually uses proprietary logistics information system to support the related logistics activities. However, each consignor sometimes may require different business process based on the customer type or characteristics of their products. Therefore, the third party logistics company need to modify their business process to reflect customer's requirements, resulting in the modification of logistic information systems and additional costs. Therefore, a flexible mechanism is required to efficiently support the various types of requirements by the owners of the products. In this paper, first, we figured out various business rules related to third party global logistics activities. Second, we grouped the identified business rules into business processes, objects, relations, dependency, policy, representations, execution, and resources and further into precondition, postcondition, and invariant based on checking point in time. Furthermore, the categorized rules are classified into inter-activity and intra-activity rules based on the execution range. Third, we proposed a rule syntax to describe the defined rules into scripts which are understood by user and information system together. When each activity is executed, the rule manager checks whether there are rules related with the activity execution. Finally, we developed a prototype rule management system to show the feasibility of our proposed methodology and to validate it with an example.

A Study on Implementation of Real-Time Multiprocess Trace Stream Decoder (실시간 다중 프로세스 트레이스 스트림 디코더 구현에 관한 연구)

  • Kim, Hyuncheol;Kim, Youngsoo;Kim, Jonghyun
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.67-73
    • /
    • 2018
  • From a software engineering point of view, tracing is a special form of logging that records program execution information. Tracers using dedicated hardware are often used because of the characteristics of tracers that need to generate and decode huge amounts of data in real time. Intel(R) PT uses proprietary hardware to record all information about software execution on each hardware thread. When the software execution is completed, the PT can process the trace data of the software and reconstruct the correct program flow. The hardware trace program can be integrated into the operating system, but in the case of the window system, the integration is not tight due to problems such as the kernel opening. Also, it is possible to trace only a single process and not provide a way to trace multiple process streams. In this paper, we propose a method to extend existing PT trace program to support multi - process stream traceability in Windows environment in order to overcome these disadvantages.

  • PDF

A Execution Performance Analysis of Applications using Multi-Process Service over GPU (다중 프로세스 서비스를 이용한 GPU 응용 동시 실행 성능 분석)

  • Kim, Se-Jin;Oh, Ji-Sun;Kim, Yoonhee
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.60-67
    • /
    • 2019
  • Graphical Processing Units(GPUs) achieve high performance undertaking from relatively uniformed computation in parallel. The technology related to General Purpose GPU(GPGPU) has been enhanced, which provides concurrent kernel execution of multi and diverse applications at the same time, but it is still limited to support resource sharing or planning. NVIDIA recently introduces Multi-Process Service(MPS), which allows kernels from different applications can be execute concurrently. However, the strength of MPS comes along with the characteristics of applications and the order of their execution. This paper shows the performance analysis of diverse scientific applications in real world. Based on the analysis, we prove that it is important to the identify characteristics of co-run applications, and to schedule multiple applications via profiling to maximize MPS functionality.