• Title/Summary/Keyword: Formal validation method

Search Result 17, Processing Time 0.019 seconds

Validation of ebXML BPSS Instances Based on Semantic Constraints (의미제약 기반의 ebXML BPSS 사례 검증)

  • Kim, Hyoung-Do;Kim, Jong-Woo
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.4
    • /
    • pp.1-18
    • /
    • 2005
  • In ebXML, a representative framework for electronic commerce, a BPS (Business Process Specification) should be finally defined as an instance of XML-version BPSS for the configuration of B2B (Business to Business) runtime systems . In order to define the instance more complete and consistent, it is required to validate all the semantic constraints on the instance . Due to the limitations of XML Schema constructs, however, current XML-version BPSS fails to specify formal semantic constraints completely. This paper presents how to find, express and reuse BPSS semantic constraints that could not be explicitly defined in the XML-version BPSS. The method facilitates the validation of XML-version BPSS instances easily with some useful guides for fixing violations of semantic constraints. Furthermore, B2B business processes can be standardized and applied more efficiently and effectively.

  • PDF

M&S Verification, Validation and Accreditation Research Direction Considering the Characteristics of Defense M&S (국방 M&S의 특징 분석과 이를 통한 VV&A 방향)

  • Kim, Junghoon;Jeong, Seungmin;Hwang, Illhoe;Cho, Hyunju;Kim, Daeyoung;Jang, Young Jae
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.39 no.6
    • /
    • pp.486-497
    • /
    • 2013
  • In this paper, we first present an in-depth survey of the research on Verification, Validation and Accreditation (VV&A) applied in various areas. Then we introduce the characteristics of the military and defense Modeling and Simulation (M&S) and propose the direction of method for VV&A with the identified characteristics. The M&S has been widely used in many different applications in the military and defense area including training, analysis, and acquisition. Methods and processes of VV&A have been proposed by researchers and M&S practitioners to guarantee the correctness of the M&S. The idea of applying the formal credibility assessment in VV&A is originated from the Software Engineering Reliability Test and Systems Engineering Development Process. However, the current VV&A techniques and processes proposed in the research community have not utilized the military-and-defense specific characteristics. We identify the characteristics and issues that can be found in the military and defense M&S. Then propose the direction of techniques and methods for VV&A considering the characteristics and issues. Also, possible research direction on the development of VV&A is proposed.

Development of a Visual Simulation Tool for Object Behavior Chart based on LOTOS Formalism (객체행위챠트를 위한 LOTOS 정형기법 기반 시각적 시뮬레이션 도구의 개발)

  • Lee, Gwang-Yong;O, Yeong-Bae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.5
    • /
    • pp.595-610
    • /
    • 1999
  • This paper presents a visual simulation tool for verification and validation(V&V) of design implications of the Object Behavior Chart developed in accordance with the existing real-time object's behavior design method. This tool can simulates the dynamic interactions using the executable simulation machine, that is EFSM(Extended Finite State Machine) and can detect various logical and temporal errors in the visual object behavior charts before a concrete implementation is made. For this, a LOTOS prototype specification is automatically generated from the visual Object Behavior Chart, and is translated into an EFSM. This system is implemented in Visual C++ version 4.2 and currently runs on PC Windows 95 environment. For simulation purpose, LOTOS was chosen because of it's excellence in specifying communication protocols. Our research contributes to the support tools for seamlessly integrating methodology-based graphical models and formal-based simulation techniques, and also contributes to the automated V&V of the Visual Models.

ToyLotos/Ada : Object-Behavior Simulation System for Developing a Real-time Ada Software (ToyLotos/Ada : 실시간 Ada 소프트웨어 개발을 위한 객체행위 시뮬레이션 시스템)

  • Lee, Gwang-Yong;O, Yeong-Bae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.7
    • /
    • pp.1789-1804
    • /
    • 1999
  • This paper presents a simulation-based system for verification and validation(V&V) of design implication of the Visual Real-time Object Model which is produced by existing object's behavior design method. This system can simulate the dynamic interactions using the executable Ada simulation machine, and can detect various logical and temporal problems in the visual real-time object model prior to the real implementation of the application systems. Also, the system can generate the Ada prototype code from the validated specification. This system is implemented by Visual C++ version 4.2. For simulation, this system is using the Ada language because Ada's real-time expression capabilities such as concurrent processes, rendezvous, temporal behavior expression, and etc, are competent compared to other languages. This work contributes to a tightly coupling of methodology-based visual models and formal-based simulation systems, and also contributes to a realization of automated specification V&V.

  • PDF

Analysis of the Productivity and Effects of Administration Information System: Focused on KONEPS(Korea Online E-Procurement System) (행정업무시스템의 생산성 및 효과 분석: 나라장터 중심으로)

  • Kim, Hun-Hee;Oh, Changsuk
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.123-136
    • /
    • 2017
  • The evaluation and analysis method of information system (IS) is studied from the system perspective, the user perspective, and the management viewpoint. The detailed analysis method performs qualitative evaluation by user questionnaire or expert opinion. In this study, Measures the productivity and the effect of building administrative information systems. In the previous study, qualitative productivity and universal effect indicators were used, but in this study, quantitative productivity indicators and indicators specific to administrative complaints were selected. KONEPS, an administrative service system, used electronic contract records and information recorded in the intermediate process. The information was converted into the number of days, and the productivity based on the input manpower was calculated. The effect analysis analyzed the questionnaire related to civil affairs, which is the goal of the administrative work system. Each factor was divided into reflective structural variable and formal structural variable, and internal consistency and multi-collinearity were diagnosed. In order to verify the model, the influence of the work was set as a hypothesis, the reliability was verified according to the descriptive statistics method, the influence was measured through the regression analysis, and the model was analyzed by the multiple regression model path coefficient. Model validation methods are Chi-square (df, p), RMR, GFI, AGFI, NFI, CFI and GFI as indicators according to CFA.

Improvement of a Verified Secure Key Distribution Protocol Between RFID and Readers (RFID와 리더간의 안전성이 검증된 키 분배 프로토콜의 개선)

  • Bae, Woo-Sik;Lee, Jong-Yun
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.331-338
    • /
    • 2011
  • The RFID system includes a section of wireless communication between the readers and the tags. Because of its vulnerability in terms of security, this part is always targeted by attackers and causes various security problems including the leakage of secret and the invasion of privacy. In response to these problems, various protocols have been proposed, but because many of them have been hardly implementable they have been limited to theoretical description and theorem proving without the accurate verification of their safety. Thus, this study tested whether the protocol proposed by Kenji et al. satisfies security requirements, and identified its vulnerabilities such as the exposure of IDs and messages. In addition, we proposed an improved RFID security protocol that reduced the number of public keys and random numbers. As one of its main characteristics, the proposed protocol was designed to avoid unnecessary calculations and to remove vulnerabilities in terms of security. In order to develop and verify a safe protocol, we tested the protocol using Casper and FDR(Failure Divergence Refinements) and confirmed that the proposed protocol is safe in terms of security. Furthermore, the academic contributions of this study are summarized as follows. First, this study tested the safety of a security protocol through model checking, going beyond theorem proving. Second, this study suggested a more effective method for protocol development through verification using FDR.

Genome-wide association study for the interaction between BMR and BMI in obese Korean women including overweight

  • Lee, Myoungsook;Kwon, Dae Young;Kim, Myung-Sunny;Choi, Chong Ran;Park, Mi-Young;Kim, Ae-jung
    • Nutrition Research and Practice
    • /
    • v.10 no.1
    • /
    • pp.115-124
    • /
    • 2016
  • BACKGROUND/OBJECTIVES: This is the first study to identify common genetic factors associated with the basal metabolic rate (BMR) and body mass index (BMI) in obese Korean women including overweight. This will be a basic study for future research of obese gene-BMR interaction. SUBJECTS/METHODS: The experimental design was 2 by 2 with variables of BMR and BMI. A genome-wide association study (GWAS) of single nucleotide polymorphisms (SNPs) was conducted in the overweight and obesity (BMI > $23kg/m^2$) compared to the normality, and in women with low BMR (< 1426.3 kcal/day) compared to high BMR. A total of 140 SNPs reached formal genome-wide statistical significance in this study (P < $1{\times}10^{-4}$). Surveys to estimate energy intake using 24-h recall method for three days and questionnaires for family history, a medical examination, and physical activities were conducted. RESULTS: We found that two NRG3 gene SNPs in the 10q23.1 chromosomal region were highly associated with BMR (rs10786764; $P=8.0{\times}10^{-7}$, rs1040675; $2.3{\times}10^{-6}$) and BMI (rs10786764; $P=2.5{\times}10^{-5}$, rs10786764; $6.57{\times}10^{-5}$). The other genes related to BMI (HSD52, TMA16, MARCH1, NRG1, NRXN3, and STK4) yielded P < $10{\times}10^{-4}$. Five new loci associated with BMR and BMI, including NRG3, OR8U8, BCL2L2-PABPN1, PABPN1, and SLC22A17 were identified in obese Korean women (P < $1{\times}10^{-4}$). In the questionnaire investigation, significant differences were found in the number of starvation periods per week, family history of stomach cancer, coffee intake, and trial of weight control in each group. CONCLUSION: We discovered several common BMR- and BMI-related genes using GWAS. Although most of these newly established loci were not previously associated with obesity, they may provide new insights into body weight regulation. Our findings of five common genes associated with BMR and BMI in Koreans will serve as a reference for replication and validation of future studies on the metabolic rate.