• Title/Summary/Keyword: Model Checking Tool

Search Result 54, Processing Time 0.022 seconds

Verification of Deployment Algorithms in Wireless Mobile Sensor Networks using SPIN (SPIN을 이용한 무선 이동 센서 네트워크의 배치 알고리즘 검증)

  • Oh Dong-Jin;Park Jae-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.13D no.3 s.106
    • /
    • pp.391-398
    • /
    • 2006
  • This paper verifies deployment algorithms in wireless sensor networks using SPIN, a widely used model checking tool. In this paper, two deployment algorithms, DSSA(Distributed Self Spreading Algorithm) and TBDA(Tree Based Deployment Algorithm), are verified to check their stability against oscillation as well as energy consumption that is an important factor in wireless sensor networks.

Causal Factors Affecting Mobile Banking Services Acceptance by Customers in Thailand

  • NAVAVONGSATHIAN, Ampol;VONGCHAVALITKUL, Busaya;LIMSARUN, Tanakorn
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.11
    • /
    • pp.421-428
    • /
    • 2020
  • The study investigates the causal factors affecting mobile banking services acceptance by customers in Thailand. This study employs quantitative research methodology and non-probability sampling to draw 400 mobile banking users from the population who are the mobile banking users of commercial banks in Thailand. The online questionnaires were used as a research tool to collect data with the Cronbach's alpha coefficient as 0.931. By using the structural equation model to analyze data, the results have shown that service quality, perceived usefulness, perceived ease-of-use, safety in use, and social factors influenced mobile banking services acceptance by customers in Thailand.By checking the harmony with the statistics χ2 = 108.618, df. = 86, χ2/df. = 1.263, p-value = .050, CMIN/DF =1.263, GFI = .989, AGFI=.962, TLI= .962, CFI = .976, RMSEA = .037,along with testing the weight factor. In conclusion, the research model was found to be harmonious with the empirical data at the significance level 0.05. The findings of this study suggest that the commercial banks should apply this research to understand the acceptance behavior of mobile banking users, also to determining marketing strategies, identifying opportunities and creating a competitive advantage for their services in the future.

Development of a CAD/CAM System for the Die Having Complex Geometric Solid Shape - for Rotary Blade as an Example - (자유곡면물체(自由曲面物體)의 금형설계(金型設計) 및 제작(製作)의 자동화(自動化)를 위한 CAD/DAM - 로우터리 경운(耕耘)날을 중심(中心)으로 -)

  • Kim, Soung Rai;Kim, Ki Dae
    • Korean Journal of Agricultural Science
    • /
    • v.22 no.1
    • /
    • pp.11-23
    • /
    • 1995
  • The CAD/CAM system for the manufacturing automation is the newest technology in mechanical engineering area and becomes the important research subject nowadays. Most of all hardwares and softwares for the CAD/CAM system used in the our manufacturing companies such as automobile company are developed by the foreign country and the purchasing price of them is very expensive but their applicability to a certain area is very limited. This study was conducted to develope a CAD/CAM system for the design and the automatic manufacturing of the iron pattern shaped with 3 - dimensional free curved surface, and to test its applicability to the design and the manufacturing of the rotary blade. The results obtained from the study are as follow; 1. The CAD system which can process graphic procedures from the free curved surface shaped data was developed with personal computer. 2. The CAM main program was developed. This main program could produce CL data from CAD data file by checking the tool interference according to the cutting mode. 3. The sub. program which can simulate the tool trace from the CL data was developed. 4. The post processor for the Deckel FP2NC NC milling machine from CL data file was developed and the sub program could transmit NC program through modem to NC milling machine was developed. 5. The developed CAM system seemed to be applicable to any other system. Because the measuring results of the cross sectional thickness of the plastic model from the manufacturing iron pattern by the system showed that this system could properly check the tool interference. 6. In took 75~90 hours to manufacture two iron patterns of rotary blade. For the sake of convenience in applying to the other systems, this system was developed in BASIC and FORTRAN computer language and minimum portion of machine language as possible.

  • PDF

Development of Analyzing Model of Groundwater Table Fluctuation(I): Theory of Model (지하수위 변동 해석모델 개발(I): 모델의 이론)

  • Kim, Nam Won;Kim, Youn Jung;Chung, Il-Moon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.6
    • /
    • pp.2277-2284
    • /
    • 2013
  • In this study, a groundwater table fluctuation method is suggested to predict groundwater level by means of groundwater table fluctuation due to recharge and discharge under unsteady condition. This model analyzes groundwater variation characteristics by using reaction factor related with groundwater flow and specific yield related with recharge. For the test of this model, measured groundwater level at JD Yongdam 1 and JW Konghang for 5 years (2006-2010) were used. At JD Yongdam 1, the estimated specific yield was 0.023, and the estimated reaction factor was 0.039. At JW Konghang, the estimated specific yield was 0.009 and the estimated reaction factor was 0.028, respectively. This model can estimate recharge and saturated parameters, thus it is expected that this model would be the proper tool for checking the parameter of hydrologic model and percolation features.

A Study on the Method of Checking the Level of Information Security Management Using Security Maturity Model (보안성숙도 모델을 활용한 정보보호 관리수준 점검방법에 관한 연구)

  • Lee, Sang-kyu;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1585-1594
    • /
    • 2018
  • In recent years The importance of information security management for securing information collection and analysis, production and distribution is increasing. Companies are assured of confidence in information security through authentication of information Security Management System. However, level assessment and use of domains that make up the management system is limited. On the other hand, the security maturity model is able to diagnose the level of information protection of the enterprise step by step. It is also possible to judge the area to be improved urgently. It is a tool to support goal setting according to the characteristics and level of company. In this paper, C2M2, which is an example of security maturity model, is compared and analyzed with Korea Information Security Management System certification. Benchmark the model to check the level of information security management and derive the priority among the items that constitute the detailed area of information security measures of ISMS certification. It also look at ways to check the level of information security management step by step.

Dynamic Value Chain Modeling of Knowledge Management (지식경영의 동태적 가치사슬 모형 구축)

  • Lee, Young-Chan
    • The Journal of Information Systems
    • /
    • v.17 no.3
    • /
    • pp.205-233
    • /
    • 2008
  • This study suggests the dynamic value chain model, that will be able to not only show changing processes to organization's significant capital by integrating an individual, implicit, and explicit knowledge which affect organizational decision making, but also distinguish the key driver for raising organizational competitive power because it makes possible to analyze sensitivity of performance along with decision making alternatives and policy changes from dynamic view by connecting knowledge management capability, knowledge management activity, and relations with organizational performance with specific strategic map. Recently, a lot of organizations show interest in measuring and evaluating their performance synthetically. In organizations taking knowledge management, they introduce effective value chain model like a dynamic balanced scorecard (DBSC), and therefore they can reflect their knowledge management condition as well as show their changes by checking performance of established vision and strategy periodically. Furthermore, they can ask for their inner members' understanding and participation by communicating with and inspiring their members with awareness that members are one of their group, present a base of benchmarking, and offer significant information for later decision making. The BSC has been a successful framework for measuring an organization's performance in various perspectives through translating an organization's vision and strategy into an interrelated set of key performance indicators and specific actions. The BSC, while having significant strengths over traditional performance measurement methods, however, has its own limitations, due to its static nature, such as overlooking two-way causation between performance indicators and neglecting the impact of delayed feedback flowing from the adoption of new strategies or policy changes. To overcome these limitations, this study employs SD, a methodology for understanding complex systems where dynamic feedback among the interrelated system components significantly impact on the system outcomes. The SD simulation model in the form of DBSC would serve as a useful strategic teaming tool for facilitating an organization's communication process through various scenario analyses as well as predicting the dynamic behavior pattern of their key performance measures over a future time frame. For the demonstration purpose, this study applied the DBSC model to Prototype of Korea manufacturing and service firm.

Formal Specification and Verification for S/KEY Against Dictionary Attack (사전공격 방지를 위한 S/KEY의 정형 명세 및 검증)

  • Kim Il-Gon;Choi Jin-Young
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.9
    • /
    • pp.1218-1225
    • /
    • 2004
  • S/KEY system was proposed to guard against intruder's password replay attack. But S/KEY system has vulnerability that if an attacker derive passphrase from his dictionary file, he can acquire one-time password required for user authentication. In this paper, we propose a correct S/KEY system mixed with EKE to solve the problem. Also, we specify a new S/KEY system with Casper and CSP, verify its secrecy and authentication requirements using FDR model checking tool.

Unsteady Flow Rate Measurement by Using Hydraulic Pipeline Dynamics (유압관로의 동특성을 이용한 비정상 유량계측)

  • 김도태
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 1999.10a
    • /
    • pp.411-416
    • /
    • 1999
  • The measurement of unsteady flow rate is of vital importance to clarify and improve the dynamic characteristics in pipeline, hydraulic components and system. There is also demand for a real time flow sensor of ability to measure unsteady flow rate with high accuracy and fast response to realize feedback control of flow rate in fluid power systems. In this paper, we propose an approach for estimating unsteady flow rate through a pipeline and components under high pressure condition. In the method, unsteady flow rate is estimated by using hydraulic pipeline dynamics and the measured pressure values at two distant points along the pipeline. The distributed parameter model of hydraulic pipeline is applied with consideration of frequency dependent viscosity friction and unsteady velocity distribution at a cross section of a pipeline. By using the self-checking functions of the method, the validity is investigated by comparison with the measured and estimated pressure waveforms at the halfway section on the pipeline. The results show good agreement between the estimated flow rate waveforms and theroetical those under unsteady laminar flow conditions. the method proposed here is useful in estimating unsteady flow rate through an arbitray cross section in hydraulic pipeline and components without installing an instantaneous flowmeter.

  • PDF

A Case Study on Diagnosis and Checking for Machine-Tools with an OAC (개방형 컨트롤러를 갖는 공작기계에 적합한 진단 및 신호점검사례)

  • 김동훈;송준엽;김경돈;김찬봉;김선호;고광식
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2004.10a
    • /
    • pp.292-297
    • /
    • 2004
  • The conventional computerized numerical controller (CNC) of machine tools has been increasingly replaced by a PC-based open architecture CNC (OAC) which is independent of the CNC vendor. The OAC and machine tools with OAC led the convenient environment where it is possible to implement user-defined application programs efficiently within CNC. Tis paper proposes a method of operational fault cause diagnosis which is based on the status of programmable logic controller (PLC) in machine tools with OAC. The operational fault is defined as a disability state occurring during normal operation of machine tools. The faults are occupied by over 70% of all faults and are also unpredictable as most of them occur without any warning. Two diagnosis models, the switching function (SF) and the step switching function (SSF), are propose in order to diagnose the fault cause quickly and exactly. The cause of an occurring fault is logically diagnosed through a fault diagnosis system (FDS) using the diagnosis models. A suitable interface environment between CNC and develope application modules is constructed in order to implement the diagnostic functions in the CNC domain. The diagnosed results were displayed on a CNC monitor for machine operators and provided to a remote site through a web browser. The result of his research could be a model of the fault cause diagnosis and the remote monitoring for machine tools with OAC.

  • PDF

RPFuzzer: A Framework for Discovering Router Protocols Vulnerabilities Based on Fuzzing

  • Wang, Zhiqiang;Zhang, Yuqing;Liu, Qixu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.1989-2009
    • /
    • 2013
  • How to discover router vulnerabilities effectively and automatically is a critical problem to ensure network and information security. Previous research on router security is mostly about the technology of exploiting known flaws of routers. Fuzzing is a famous automated vulnerability finding technology; however, traditional Fuzzing tools are designed for testing network applications or other software. These tools are not or partly not suitable for testing routers. This paper designs a framework of discovering router protocol vulnerabilities, and proposes a mathematical model Two-stage Fuzzing Test Cases Generator(TFTCG) that improves previous methods to generate test cases. We have developed a tool called RPFuzzer based on TFTCG. RPFuzzer monitors routers by sending normal packets, keeping watch on CPU utilization and checking system logs, which can detect DoS, router reboot and so on. RPFuzzer' debugger based on modified Dynamips, which can record register values when an exception occurs. Finally, we experiment on the SNMP protocol, find 8 vulnerabilities, of which there are five unreleased vulnerabilities. The experiment has proved the effectiveness of RPFuzzer.