• Title/Summary/Keyword: 속성 위반

Search Result 13, Processing Time 0.024 seconds

Efficient Counterexample Generation for Safety Violation in Model Checking (모델 체킹에서 안전성 위반에 대한 효율적인 반례 생성)

  • Lee Tae-hoon;Kwon Gi-hwon
    • The KIPS Transactions:PartD
    • /
    • v.12D no.1 s.97
    • /
    • pp.81-90
    • /
    • 2005
  • Given a model and a property, model checking determines whether the model satisfies the property. In case the model does not satisfy the property model checking gives a counterexample which explains where the violation occurs. Since counterexamples are useful for model debugging as well as model understanding, counterexample generation is one of the indispensable components in the model checking tool. This paper presents efficient counterexample generation techniques when a safety property is falsified. These techniques are used to solve Push Push games which consist of 50 games. As a result, all the games are solved with the proposed techniques. However, with the original NuSMV, 42 games are solved but 8 failed. In addition, we obtain $86{\%}$ time improvement and $62{\%}$ space improvement compared to the original NuSMV in solving the game.

"Ceteris paribus" laws as genuine causal laws: Does Fodor himself stay away from what he calls "epiphobia" ? (참 인과적 법칙으로서의 "다른 것들이 같으면의 법칙" : 포돌은 "부수현상공포증"을 실제로 벗어났는가?)

  • 이종왕
    • Proceedings of the Korean Society for Cognitive Science Conference
    • /
    • 2002.05a
    • /
    • pp.183-188
    • /
    • 2002
  • 데이비슨에서부터 시작됐다고 해도 과언이 아닌 것으로 보이는 정신적 속성들의 인과적 힘과 관련된 논의 - 정신인과의 문제를 해결하기 위해서 설정하는 - 는 그가 주장한 이론이 맞이하게 되는 심각한 문제에 해결책을 제시하고자 하는 많은 책학자들의 관심을 불러일으킨다. 그 중의 하나인 포돌도 결국 데이비슨이 주장한 세 가지의 원리들 중에서 중요한 한가지 원리, 즉 정신적인 것들의 무법칙성의 원리, 를 거절하면서 자신의 정신인과 이론을 발전시키고자 한다. 즉 정신적 속성들과 물리적 속성들을 연결시키는 "참 인과의 법칙으로서 다른 것들이 같다면의 법칙"을 정신인과의 현상을 설명하는 그의 설명적 모델로 제시하면서 데이비슨의 문제를 해결하려고 시도한다. 그러나 그가 스케치하는 그런 그림은 인과적 배제의 원리를 명백하게 위반하는 것이다. 설상가상으로 이러한 문제를 벗어나기 위해서 그가 의지하는 수반의 개념도 그 효력은 충분하게 강하지 못한 것으로 드러난다. 이것이 틀리지 않다면 여기서 어떤 딜레마가 일어난다. 만약 정신적 속성들이 아직까지 인과적으로 효력을 가지고 있다면 명백하게 물리적 세계의 인과적 폐쇄의 원리의 위반이 일어난다. 만약 정신적 속성들이 인과적 효력을 가지고 있지 않다면 우리는 여기서 명백히 부수현상론을 보게 된다.

  • PDF

How is the inner contour of objects encoded in visual working memory: evidence from holes (물체 내부 윤곽선의 시각 작업기억 표상: 구멍이 있는 물체를 중심으로)

  • Kim, Sung-Ho
    • Korean Journal of Cognitive Science
    • /
    • v.27 no.3
    • /
    • pp.355-376
    • /
    • 2016
  • We used holes defined by color similarity (Experiment 1) and binocular disparity (Experiment 2) to study how the inner contour of an object (i.e., boundary of a hole in it) is encoded in visual working memory. Many studies in VWM have shown that an object's boundary properties can be integrated with its surface properties via their shared spatial location, yielding an object-based encoding benefit. However, encoding of the hole contours has rarely been tested. We presented objects (squares or circles) containing a bar under a change detection paradigm, and relevant features to be remembered were the color of objects and the orientation of bars (or holes). If the contour of a hole belongs to the surrounding object rather than to the hole itself, the object-based feature binding hypothesis predicts that the shape of it can be integrated with color of an outer object, via their shared spatial location. Thus, in the hole display, change detection performance was expected to better than in the conjunction display where orientation and color features to be remembered were assigned to different parts of a conjunction object, and comparable to that in a single bar display where both orientation and color were assigned into a single bar. However, the results revealed that performance in the hole display did not differ from that in the conjunction display. This suggests that the shape of holes is not automatically encoded together with the surface properties of the outer object via object-based feature binding, but encoded independently from the surrounding object.

A Concept Analysis of Prisoner Corrrection (수형자 교정에 대한 개념분석)

  • Jung, Hyun-Ok;Han, Seung-Woo
    • Journal of Digital Convergence
    • /
    • v.16 no.10
    • /
    • pp.357-366
    • /
    • 2018
  • The purpose of this study is to provide data for the development of a nursing intervention program by analyzing the concept of prisoner correction. From April 1st, 2016, to July 30th, the research literature on all domestic and international prisoner correction from 2011 to 2015 were searched using PubMed and NDSL RISS. 37 documents were analyzed according to conceptual analysis method procedures by Walker and Avant. In order to promote a positive attitude toward life through internal reflection of prisoner correction, individual characteristics for improvements in problem solving abilities, social adaptation abilities, re-socialization and the protection of the people and society to inmates displaying anti-social and moral behaviors that violated the law. The purpose of this study was to establish a desirable direction for prisoner correction, and provide a theoretical basis for the development of a nursing intervention program.

A Role-Based Access Control Model of Managed Objects in Distributed System Environments (분산시스템 환경에서 관리 객체에 대한 역할기반 접근제어 모델)

  • Choi Eun-Bok
    • Journal of Internet Computing and Services
    • /
    • v.4 no.1
    • /
    • pp.75-86
    • /
    • 2003
  • In this paper, we extended hierarchial structure of managed object class to support Role-Based Access Control, and described constraint conditions that have support dynamic temporal function as well as statical temporal function established by management process. And we defined about violation notifications should report to manager when rules violate constraint conditions. Also we presented system architecture that support RBAC with MIB(Management Information Base) of ITU-T recommendation. By access control enforcement and decision function, constraint conditions and activated translation procedure of each roles are described, our system presents dynamic temporal property systematically.

  • PDF

The Protection of XML Documents Using the DTD Digital Signature (DTD 전자서명을 이용한 XML 문서 보호)

  • Hong, Seong-Pyo;Lee, Cheol-Seung;Lee, Jong-Eun;Moon, Jung-Hwan;Lee, Joon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2149-2152
    • /
    • 2003
  • 전자상거래에 관련된 데이터 교환이 인터넷 상에서 쉽고 원활하게 이루어질 수 있도록 하는 어플리케이션에 적합한 언어로 평가받고 있는 XML은 문서의 데이터 포맷 표현을 향상시키는데 중점을 두고 만들어졌기 때문에 문서 변조 및 데이터 삭제 등의 공격에 취약한 문제점을 가지고 있다 이러한 문제점에 대한 해결책으로 XML 전자 서명, XML 암호화 기법, XML 접근 제어와 같은 다양한 해결책이 제시되었지만 XML 암호화로 인한 구조적인 XML 유효성 위반 문제 및 DTD 공격에 대한 해결책 부재 등의 문제점이 해결되지 않고 있다. 본 연구에서는 XML 문서에만 전자서명을 첨부하는 것이 아니라. DTD에 전자 서명을 첨부하는 방법을 제안하였다. 먼저 DTD파일을 끝까지 읽으면서 파싱을 하고 여기서 추출되는 엘리먼트나 속성, 엔티티들을 해시테이블에 저장한다. 파싱이 종료되면 해시 테이블을 읽어 들여서 메시지 다이제스트를 수행한다. 수행 후 이를 개인 키와 합성하여 전자 서명을 생성한다.

  • PDF

A Decision-Making Model for Handling Personal Information Using Metadata (메타데이터를 활용한 개인정보 처리에 대한 의사결정 모델)

  • Kim, Yang-Ho;Cho, In-Hyun;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.259-273
    • /
    • 2016
  • After realizing through the three large-scale data leakage incidents that intentional or accidental insider jobs are more serious than external intrusions, financial companies in Korea have been taking measures to prevent data leakage from occuring again. But, the IT system architecture reflecting the domestic financial environment is highly complicated and thereby difficult to grasp. It is obvious that despite administrative, physical, and technical controls, insider threats are likely to cause personal data leakage. In this paper, we present a process that based on metadata defines and manages personally identifiable attribute data, and that through inter-table integration identifies personal information broadly and controls access. This process is to decrease the likelihood of violating compliance outlined by the financial supervisory authority, and to reinforce internal controls. We derive and verify a decision-making model that reflects the proposed process.

Analysis of Traffic Crash Severity on Freeway Using Hierarchical Binomial Logistic Model (계층 이항 로지스틱모형에 의한 고속도로 교통사고 심각도 분석)

  • Mun, Sung-Ra;Lee, Young-Ihn
    • International Journal of Highway Engineering
    • /
    • v.13 no.4
    • /
    • pp.199-209
    • /
    • 2011
  • In the study of traffic safety, the analysis on factors affecting crash severity and the understanding about their relationship is important to be planning and execute to improve safety of road and traffic facilities. The purpose of this study is to develop a hierarchical binomial logistic model to identify the significant factors affecting fatal injuries and vehicle damages of traffic crashes on freeway. Two models on death and total vehicle damage are developed. The hierarchical structure of response variable is composed of two level, crash-occupant and crash-vehicle. As a result, we have gotten the crash-level random effect from these hierarchical structure as well as the fixed effect of covariates, namely odds ratio. The crash on the main line and in-out section have greater damage than other facilities. Injuries and vehicle damages are severe in case of traffic violations, centerline invasion and speeding. Also, collision crash and fire occurrence is more severe damaged than other crash types. The surrounding environment of surface conditions by climate and visibility conditions by day and night is a significant factor on crash occurrence. On the orher hand, the geometric condition of road isn't.

Interactive Scheduling System for Distributed Constraint Satisfaction Problem (분산 제약조건 만족 문제에 있어서의 대화형 스케줄링시스템)

  • Kim, Jin-Su
    • The Journal of Engineering Research
    • /
    • v.6 no.1
    • /
    • pp.5-14
    • /
    • 2004
  • Finding a solution to a constraint satisfaction problem requires choosing values for variables so as to satisfy the constraints of the problem. A constraint is simply a logical relation among several unknowns (or variables), each taking a value in a given domain. Conventional constraint-based scheduling systems are not enough to satisfy the all constraints because there are conflicts between them. In this paper, we propose a method for interactive scheduling, which have two major problems: first, it is hard to satisfy concretely all various kinds of constraints, and second, the search space is extremely large and requires a long execution time. To solve the above problems, we introduce the Interactive Scheduling System (ISS) that interacts with the user to exchange suggestions each other. Our system is performed in two steps: knowledge base generation of an initial assignment and iterative improvement with the user(host or internet client) to satisfy the constraints. Applying our system, we actually constructed timetables for our university, where the scheduling time is considerably reduced.

  • PDF

A Design of Policy-Based Composite Web Services QoS Monitoring System (정책 기반의 합성된 웹 서비스 품질 모니터링 시스템의 설계)

  • Yeom, Gwy-Duk;Jeong, Choong-Kyo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.189-197
    • /
    • 2009
  • As the web service technology matures. research is focused on the composite web services that combine individual web services within an enterprise or between enterprises. Quality of service is the critical competitiveness factor in this mature technology stage where there are many services with similar functionalities differing only in some non-functional properties. Monitoring is the key component for the service quality management of a web service. A service quality monitoring system design using a broker is presented in this paper. OWL-S is used to specify the composite service process and a service policy (inputs and outputs of each service, quality attributes and values, etc.) built by WS-Policy is applied to the composite service process. If there is any discrepancy between the service policy and the monitored data, the service provider and the user are notified of it so as to take necessary measures. We have implemented a travel reservation system as an example of the presented design and the experimental results are shown. Average response time was monitored and the timeout policy was applied in the experiment.