• Title/Summary/Keyword: 정형 검증

Search Result 423, Processing Time 0.025 seconds

A Machine Learning Based Facility Error Pattern Extraction Framework for Smart Manufacturing (스마트제조를 위한 머신러닝 기반의 설비 오류 발생 패턴 도출 프레임워크)

  • Yun, Joonseo;An, Hyeontae;Choi, Yerim
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.2
    • /
    • pp.97-110
    • /
    • 2018
  • With the advent of the 4-th industrial revolution, manufacturing companies have increasing interests in the realization of smart manufacturing by utilizing their accumulated facilities data. However, most previous research dealt with the structured data such as sensor signals, and only a little focused on the unstructured data such as text, which actually comprises a large portion of the accumulated data. Therefore, we propose an association rule mining based facility error pattern extraction framework, where text data written by operators are analyzed. Specifically, phrases were extracted and utilized as a unit for text data analysis since a word, which normally used as a unit for text data analysis, is unable to deliver the technical meanings of facility errors. Performances of the proposed framework were evaluated by addressing a real-world case, and it is expected that the productivity of manufacturing companies will be enhanced by adopting the proposed framework.

A Study on the Wind-Induced Response Characteristics of Freeform Shaped Tall Building using FSI Analysis (FSI 해석에 의한 비정형 초고층 빌딩의 풍응답 특성에 관한 연구)

  • Park, Sung Chul;Kim, Hyo Jin;Han, Sang Eul
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.27 no.4
    • /
    • pp.223-230
    • /
    • 2014
  • In this paper, the wind-induced response characteristics of freeform shaped tall building is studied by using FSI analysis. The analytical models are twist shaped ones at representing type of atypical tall building, and this study focused on the relationship between twist angle and wind acceleration. Firstly, 1-way FSI analysis is performed, so maximum lateral displacement of the analytical model for 100 years return period wind speed is calculated, then the elastic modulus of a structure that satisfies the constraints condition is evaluated. And 2-way FSI analysis is carried out. so acceleration of the analytical model for the evaluated modulus of elasticity and arbitrary density is predicted through time history analysis. The basic model is a set of a square shape, height is 400m, slenderness ratio is 8, and twist model is rotated at square model from 0 to 90 degrees at intervals of 15 degrees and from 90 to 360 degrees at intervals of 90 degrees. According to the result of predicting wind acceleration by the shape of each model, the wind vibration effect of square shape model is confirmed to be sensitive more than a twist shape ones.

Calculus of Communicating Systems Domain in PtolemyII (PtolemyII의 CCS 도메인)

  • 황혜정;김윤정;남기혁;김일곤;최진영
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.5_6
    • /
    • pp.335-346
    • /
    • 2004
  • PtolemyII is an environment that supports heterogeneous modeling and design of concurrent systems such as embedded system. PtolemyII has several Domains which are physical rules to determine the way of communicating between components. PtolemyII has 11 domains such as PetriNet, Timed Multitasking, SR etc. Components of System can be specified using appropriate domains for their properties. Communicating Sequential Processes(CSP) is implemented as formally designed CSP domain, in PtolemyII. But CCS didn't be implemented as a domain. It is a kind of Process Algebra language which can be used for specifying and verifying concurrent systems formally. Thus, in this paper we implemented CCS domain. And that permitted developers using PtolemyII to use the same modeling pattern used in PtolemyII and to make system specifications in the base of the formal semantics of CCS. This caused the diversity of PtolemyII domains and the power of expression was improved. This paper will explain the structure of CCS domain implemented in PtolemyII and the way of implementing it.

A Conceptual Architecture and its Experimental Validation of CCTV-Video Object Activitization for Tangible Assets of Experts' Visual Knowledge in Smart Factories (고숙련자 공장작업지식 자산화를 위한 CCTV-동영상 객체능동화의 개념적 아키텍처와 실험적 검증)

  • Eun-Bi Cho;Dinh-Lam Pham;Kyung-Hee Sun;Kwanghoon Pio Kim
    • Journal of Internet Computing and Services
    • /
    • v.25 no.2
    • /
    • pp.101-111
    • /
    • 2024
  • In this paper, we propose a concpetual architecture and its implementation approach for contextualizing unstructured CCTV-video frame data into structured XML-video textual data by using the deep-learning neural network models and frameworks. Conclusively, through the conceptual architecture and the implementation approach proposed in this paper, we can eventually realize and implement the so-called sharable working and experiencing knowledge management platforms to be adopted to smart factories in various industries.

A remote device authentication scheme in M2M communications (M2M 통신에서 원격장치 인증 기법)

  • Lee, Song-Hee;Park, Nam-Sup;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.309-316
    • /
    • 2013
  • Machine-to-machine (M2M) communication occurs when devices exchange information independent of human intervention. Prominent among the technical challenges to M2M communication are security issues, such as eavesdropping, spoofing, modification, and privacy violation. Hence, it is very important to establish secure communication. In this paper, we propose a remote authentication scheme, based on dynamic ID, which provides secure communication while avoiding exposure of data through authentication between the M2M domain and the network domain in the M2M architecture. We then prove the correctness and security of the proposed scheme using a logic-based formal method.

Formal Analysis of Authentication System based on Password using Smart Card (스마트카드를 이용한 패스워드 기반 인증시스템 정형분석)

  • Kim, Hyun-Seok;Kim, Ju-Bae;Jeong, Yeon-Oh;Han, Keun-Hee;Chai, Jin-Young
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.4
    • /
    • pp.304-310
    • /
    • 2009
  • Due to widely use of internet, a lot of users frequently access into remote server in distributed computing environment. However, transmitting the information using vulnerable channel without authentication security system can be exposed to replay attack, offline password attack, and impersonation attack. According to this possibility, there is research about authentication protocol to prevent these hostile attacks using smart card. In this paper, we analyze vulnerability of user authentication system based on password and propose modified user authentication system.

Monitoring and Checking Concurrent Java Programs with HDTL (HDTL을 이용한 병렬 자바 프로그램의 모니터 링과 검사)

  • Cho, Seung-Mo;Kim, Hyung-Ho;Cha, Sung-Deok;Bae, Doo-Hwan
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.5
    • /
    • pp.345-354
    • /
    • 2002
  • There have been many researches about monitoring and checking the implementations during run-time using formal requirement specification. They usually adopt temporal logics or their extensions to specify the requirements for the implementations. However, most of the systems fail to support the specification of requirements fir dynamic systems - systems whore components are created and removed during run-time. Unlike analysis or design models, most actual implementations are dynamic, so the notion of instances should be employed in the property specification language. In this paper, we show how we can monitor and check Java programs using our temporal logic for dynamic systems (HDTL). We suggest a framework in which the execution of Java programs are monitored and chocked against given HDTL requirements.

Formal Specification and Verification for S/KEY Against Dictionary Attack (사전공격 방지를 위한 S/KEY의 정형 명세 및 검증)

  • Kim Il-Gon;Choi Jin-Young
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.9
    • /
    • pp.1218-1225
    • /
    • 2004
  • S/KEY system was proposed to guard against intruder's password replay attack. But S/KEY system has vulnerability that if an attacker derive passphrase from his dictionary file, he can acquire one-time password required for user authentication. In this paper, we propose a correct S/KEY system mixed with EKE to solve the problem. Also, we specify a new S/KEY system with Casper and CSP, verify its secrecy and authentication requirements using FDR model checking tool.

An Action-based LTS Bounded Model Checker for Analyzing Concurrency (병행성 분석을 위한 액션 기반의 LTS 바운드 모델 체커)

  • Park, Sa-Choun;Kwon, Gi-Hwon
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.9
    • /
    • pp.529-537
    • /
    • 2008
  • Since concurrent software is hard to debug, the verification of such systems inevitably needs automatic tools which support exhaustive searching. Bounded Model Checking (BMC) is one of them. Within a bound k, BMC exhaustively check some errors in execution traces of the given system. In this paper, we introduce the tool that performs BMC for LTS, modeling language for concurrent programs. In this tool, a property is described by a FLTL formula, which is suitable to present the property with actions in a LTS model. To experiment with existential model checkers and out tool, we compare and analysis the performance of the developed tool and others.

Automatic Translations for Model Checking of LD Programs (LD 프로그램의 모델 체킹을 위한 자동변환)

  • Kwon, Min-Hyuk;Shin, Seung-Cheol
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.2
    • /
    • pp.201-206
    • /
    • 2010
  • PLCs are special purpose microcontrollers used in most automatic control systems such as plants, embedded systems, and intelligent buildings. LD is one of the most popular languages among PLC languages. For now LD programs are mainly verified by simulation and testing which has a lot of limitation. This paper describes how to translate a given LD program into an input of a model checker so that LD program is verified by model checking. We define formal semantics of LD programs and SMV models and specify a formal definition of the translation function which preserves semantics between LD programs and SMV models.