• Title/Summary/Keyword: Formal Modeling

Search Result 184, Processing Time 0.028 seconds

A Study on Application Methods of Knit Design for Manufacturers using CAD System (캐드를 이용한 니트디자인의 생산업체 활용 방안)

  • Yang, Kyung-Ae
    • Korean Journal of Human Ecology
    • /
    • v.8 no.1
    • /
    • pp.165-178
    • /
    • 1999
  • Knitwears it was only for the innerwear, but which has become more available for sportswear and highly valuable formal-dresses for women's apparel and is set a trend toward high value-added products worldwide. Also the industry connected knitwears is more widely applicative than woven industry and is running on the well founded basement for the small enterprises. This study notes that what problems are caused and which utilities can be expected when we design knitwears by Primavision and Texpia CAD system considered the programs for development of domestic knitwears industry. There are much various benefits for designing knitwears from CAD system as shortening working hours, convenience, accuracy, quality control and productivity. It doesn't depend on designer's technique, sense and experiences, but provides, through building the design accuracy, chance to have a precise communication with buyers to be satisfied with the multiplicity, uniqueness and high-quality resulting from reducing the mistake on the operation. But there are some problems for using CAD design system those are no selections for the form, type and thickness of the yarn. Even though it is knitted by the same gauge, the texture conditions show complete difference if the form and thickness is different with. The gauge control without regarding those ought to be improved and the yarn designing function should be appended like in a tektite design. And the CAD design system can not reflect the variables of operating knitting machine and needle. The CAD design system provides the manufacturers with merits those they can change the colors easily to select which one appeals to the customer and check the effects of producing and modeling on monitor. But, in the each producing progress, there are still problems to reduce the practical steps, so intensive care is required of each part.

  • PDF

Evaluation of International BIM Standard Contracts to establish BIM Copyrights and Operational Protocols in Korea (국제 BIM 표준계약서 분석을 통한 국내 BIM 저작권 보호 및 운용 체계 수립에 관한 연구)

  • Koo, Bonsang;Shin, Byungjin
    • Korean Journal of Construction Engineering and Management
    • /
    • v.17 no.6
    • /
    • pp.24-30
    • /
    • 2016
  • Building Information Modeling, and its associated work practices, requires project participants to share not only 3D geometric data, but also information in the model that may be considered proprietary and even trade secrets. Thus protection of intellectual property, or BIM copyrights, must be in place for participants to share proprietary information among project stakeholders. Currently Korea does not have adequate copyright laws or mechanisms to provide such protection. This research examined three BIM copyright legal documents, namely U.S.' ConsensusDOCS 301, AIA Document E203/G202, and U.K.'s CIC BIM Protocol to determine how copyright protection is realized, and to formulate appropriate stipulations within the Korean construction context. The resultant requirements include stipulating ownership at to the BIM originator, adopting a license-sublicense scheme, employing a federated model, and use of a formal model delivey table to allocate responsibilities. Given Korea's adoption stage, liability should be minimal, and license revocation should be allowed if payments are not met. The three BIM legal documents focus on practical measures that allow participants to customize requirements for individual projects, and such conventions should be emulated in Korea.

Specification and Analysis of System Properties by using Petri nets (페트리 네트를 이용한 시스템 속성의 명세 및 분석)

  • Lee, Woo-Jin
    • The KIPS Transactions:PartD
    • /
    • v.11D no.1
    • /
    • pp.115-122
    • /
    • 2004
  • Software system modeling has a goal for finding and solving system's problems by describing and analyzing system model in formal notations. Petri nets, as graphical formalism, have been used in describing and analyzing the software systems such as parallel systems, real-time system, and protocols. In the analysis of Petri nets, general system properties such as deadlock and liveness are analyzed by the reachability analysis. On the other side, specific properties such as functional requirements and constraints are checked by model-checking. However, since these analysis methods are based on enumeration of ail possible states, there nay be state explosion problem, which means that system states exponentially increase as the size of system is larger. In this paper, we propose a new method for mechanically checking system properties with avoiding state explosion problem. At first, system properties are described in property nets then the system model and the property net are composed and analyzed. In the compositional analysis, system parts irrelevant to the specific property are reduced to minimize the analysis domain of the system. And it is possible to mechanically check whether a specific property is satisfied or not.

A Process Algebra for Modeling Secure Movements of Distributed Mobile Processes (분산 이동 프로세스 이동의 안전성 모델링을 위한 프로세스 대수)

  • Choe, Yeongbok;Lee, Moonkun
    • Journal of KIISE
    • /
    • v.43 no.3
    • /
    • pp.314-326
    • /
    • 2016
  • Some process algebras were applied to enterprise business modelling for formal specification and verification. ${\pi}$-calculus and mobile ambient can be considered for the distributed and mobile, especially to represent the movements of distributed real-time business processes. However there are some limitations to model the movements: 1) ${\pi}$-calculus passes the name of port for indirect movements, and 2) mobile ambient uses ambient to synchronize asynchronous movements forcefully. As a solution to the limitations, this paper presents a new process algebra, called ${\delta}$-calculus, to specify direct and synchronous movements of business processes over geo-temporal space. Any violation of safety or security of the systems caused by the movements can be indicated by the properties of the movements: synchrony, priority and deadline. A tool, called SAVE, was developed on ADOxx metamodelling platform to demonstrate the concept.

Social Cognitive Theory and Medical Education: How Social Interactions Can Inform Learning (사회인지이론과 의학교육: 어떻게 사회적 상호작용을 통해 학습이 일어나는가)

  • Kim, Hae Won
    • Korean Medical Education Review
    • /
    • v.22 no.2
    • /
    • pp.67-76
    • /
    • 2020
  • The structures and processes of medical education have changed little since the publication of Flexner's report, which stressed the scientific orientation of medical education and the curricular structure of 2 years of formal knowledge education and 2 years of clinical experience. However, the previous perspectives on medical education are facing challenges, and these call for new pedagogy and theories on which to base medical education practice. Considering that social dimensions of learning have been emphasized in practice, perspectives that integrate these aspects are needed. Among the various learning theories, social cognitive theory refers to the theoretical framework which contends that learning occurs within interactions with others and environments. From a social cognitive standpoint, learning through observation is a critical component in human functioning. Indeed, observational learning has particular significance in medical education in that it provides the context for which the importance and meaning of role models can be understood. In addition, as theoretical constructs such as self-efficacy and outcome expectations allow us to establish an effective learning environment, exploring the concepts of the theory could be beneficial to medical education practice. In this context, the present review article aims to provide a glimpse of the fundamental assumptions and theoretical concepts of social cognitive theory and discusses the implications the theory has on teaching and learning. Further, a review of previous studies could help explain how the theory has informed medical education practice. Finally, the author will conclude with the implications and limitations of applying social cognitive theory in medical education.

The Methodology for Performance Prediction in Architectural Design Stage of Software using Queuing Network Model (큐잉 네트웍 모델을 이용한 소프트웨어 아키텍처 설계 단계에서의 성능 예측 방법론)

  • Youn, Hyun-Sang;Jang, Su-Hyeon;Lee, Eun-Seok
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.8
    • /
    • pp.689-696
    • /
    • 2007
  • It is important issue for software architects to estimate performance of software in the early phase of the development process due to the need to verify non-functional requirements and estimation of performance in various stages of architectural design. In order to analyze performance of software, there are many approaches to translate software architecture represented by Unified Modeling Language, into analytical models. However, in the development of agent-based systems, these approaches ignore or simplify the crucial details of the underlying performance of the agent platform. In this paper, we propose performance prediction methodology for agent based system using formal semantic descriptions, and then, we transform the descriptions into queuing network model which model reflects performance of hardware and software platform. We prove the accuracy of proposed methodology using prototype implementation. The accuracy is summarized at 80%.

Object Oriented Spatial Data Model using Geographic Relationship Role (지리 관계 역할을 이용한 객체 지향 공간 데이터 모델)

  • Lee, Hong-Ro
    • Journal of Internet Computing and Services
    • /
    • v.1 no.1
    • /
    • pp.47-62
    • /
    • 2000
  • Geographic Information System(GIS) deal with data which can potentially be useful for a wida range of applications. However, the information needs of each application usually vary, specially in resolution, detail level, and representation style, as defined in the modeling phase of the geographic database design. To be able to deal with such diverse needs, the GIS must after features that allow multiple representations for each geographic entity of phenomenon. This paper addresses the problem of formal definition of the objects and their relationships on geographical information systems. The geographical data is divided in two main classes: geo-objects and geo-fields, which describe discrete and continuous representations of spatial reality. I will study the classes and the roles of relationships over geo-fields, geo-objects and nongeo-objects. Therefore, this paper will contribute the efficient design of geographical class hierarchy schema by means of formalizing attribute-domains of classes.

  • PDF

Study of the information processing model in a way of product design method (제품디자인 방법에서의 정보 처리 모델 연구)

  • 조성근
    • Archives of design research
    • /
    • v.16 no.1
    • /
    • pp.289-296
    • /
    • 2003
  • The thesis is a study of the information model for the information collection and systematization in the way of product design. In the past, the design was made by the designers hands, worked with the material directly, but today's product design, the material diverted to information, can be considered as it is made essentially through information collection and systematization processing. If the product design is considered the information processing, usually it means a qualitative change of the product design information, not a quantitative change of the information theory. A focus of the study is to grope for a way of changing the subject to information, dealing with when the product design intends to purposes, not the material, When a way of the product design was discussed to solve the problems rationally, in the past, if it is considered as quantitative, qualitative and organic methods and modeling as their means based on the process model, [analysis-generalization-estimation], are formal ism, the way of product design as information is that the product direction as a substance should go through the design information processing, making an alternative plan with the information model cycling to natural order. Because success or failure of the product design in the future depends on information as material.

  • PDF

Feature Configuration Verification Using JESS Rule-based System (JESS 규칙 기반 시스템을 이용한 특성 구성 검증)

  • Choi, Seung-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.135-144
    • /
    • 2007
  • Feature models are widely used in domain engineering phase of software product lines development to model the common and variable concepts among products. From the feature model, the feature configurations are generated by selecting the features to be included in target product. The feature configuration represents the requirements for the specific product to be implemented. Although there are a lot of researches on how to build and use the feature models and feature configurations, the researches on the formal semantics and reasoning of them are rather inactive. This paper proposes the feature configuration verification approach based on JESS, java-based rule-base system. The Graph Product Line, a standard problem for evaluating the software product line technologies, is used throughout the paper to illustrate this approach. The approach in this paper has advantage of presenting the exact reason causing inconsistency in the feature configuration. In addition, this approach should be easily applied into other software product lines development environments because JESS system can be easily integrated with Java language.

  • PDF

Method Decoder for Low-Cost RFID Tags

  • Juels, Ari
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.47-52
    • /
    • 2008
  • A radio-frequency identification(RFID) tag is a small, inexpensive microchip that emits an identifier in response to a query from a nearby reader. The price of these tags promises to drop to the range of $0.05 per unit in the next several years, offering a viable and powerful replacement for barcodes. The challenge in providing security for low-cost RFID tags is that they are computationally weak devices, unable to perform even basic symmetric-key cryptographic operations. Security researchers often therefore assume that good privacy protection in RFID tags is unattainable. In this paper, we explore a notion of minimalist cryptography suitable for RFID tags. We consider the type of security obtainable in RFID devices with a small amount of rewritable memory, but very limited computing capability. Our aim is to show that standard cryptography is not necessary as a starting point for improving security of very weak RFID devices. Our contribution is threefold: 1. We propose a new formal security model for authentication and privacy in RFID tags. This model takes into account the natural computational limitations and the likely attack scenarios for RFID tags in real-world settings. It represents a useful divergence from standard cryptographic security modeling, and thus a new view of practical formalization of minimal security requirements for low-cost RFID-tag security. 2. We describe protocol that provably achieves the properties of authentication and privacy in RFID tags in our proposed model, and in a good practical sense. Our proposed protocol involves no computationally intensive cryptographic operations, and relatively little storage. 3. Of particular practical interest, we describe some reduced-functionality variants of our protocol. We show, for instance, how static pseudonyms may considerably enhance security against eavesdropping in low-cost RFID tags. Our most basic static-pseudonym proposals require virtually no increase in existing RFID tag resources.

  • PDF