• Title/Summary/Keyword: Model checking

Search Result 569, Processing Time 0.026 seconds

Deadlock Detection of Software System Using UML State Machine Diagram (UML State Machine Diagram을 이용한 소프트웨어 시스템의 데드락 탐지)

  • Min, Hyun-Seok
    • Journal of Convergence Society for SMB
    • /
    • v.1 no.1
    • /
    • pp.75-83
    • /
    • 2011
  • Unified Modeling Language (UML) is widely accepted in industry and particularly UML State Machine Diagram is popular for describing the dynamic behavior of classes. This paper discusses deadlock detection of System using UML State Machine Diagram. Since a State Machine Diagram is used for indivisual class' behavior, all the State Machine Diagrams of the classes in the system are combined to make a big system-wide State Machine Diagram to describe system behavior. Generally this system-wide State Machine Diagram is very complex and contains invalid state and transitions. To make it a usable and valid State Machine Diagram, synchronization and externalization are applied. The reduced State Machine Diagram can be used for describing system behavior thus conventional model-checking technique can be applied. This paper shows how deadlock detection of system can be applied with simple examples. All the procedures can be automatically done in the tool.

  • PDF

Verification of a Function-based Security Authentication Protocol for Implantable Medical Devices (함수 기반의 체내 삽입장치용 보안 인증프로토콜 검증)

  • Bae, WooSik;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.249-254
    • /
    • 2014
  • Recent advancement of USN technology has lent itself to the evolving communication technology for implantable devices in the field of medical service. The wireless transmission section for communication between implantable medical devices and patients is a cause of concern over invasion of privacy, resulting from external attackers' hacking and thus leakage of private medical information. In addition, any attempt to manipulate patients' medical information could end up in serious medical issues. The present study proposes an authentication protocol safe against intruders' attacks when RFID/USN technology is applied to implantable medical devices. Being safe against spoofing, information exposure and eavesdropping attacks, the proposed protocol is based on hash-function operation and adopts session keys and random numbers to prevent re-encryption. This paper verifies the security of the proposed protocol using the formal verification tool, Casper/FDR.

Decentralized LTL Specifications for Ensuring Quality of Interaction-centralized System (상호 작용 중심 시스템의 품질 확보를 위한 LTL 분산 명세)

  • Kwon, Ryoungkwo;Kwon, Gihwon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.5
    • /
    • pp.169-178
    • /
    • 2014
  • In this paper, we present a research utilizing decentralized LTL specifications for ensuring a quality for interaction-centralized system. In this system, for ensuring the quality, we need to validate interactions between modules of the system and then we should check whether the system achieves the expected requirements. This task remains difficult and labor-intensive and requires an expert. In this paper, we present a method to assist such a task. First of all, the requirements of the system is written as multiple LTL specifications. Interactions between modules mean that behaviors of one module are related with other one's behavior. We generate the automaton model fully achieving specification through GR(1) synthesis. And we simulate them using the simulator based on the software agent for checking behaviors of the system. Finally, we validate the whole system whether it achieves given requirements.

Verification of a Communication Method Secure against Attacks Using Convergence Hash Functions in Inter-vehicular Secure Communication (차량간 보안 통신에서 융합 해시함수를 이용하여 공격에 안전한 통신방법 검증)

  • Lee, Sang-Jun;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.297-302
    • /
    • 2015
  • The increase in applying IT to vehicles has given birth to smart cars or connected cars. As smarts cars become connected with external network systems, threats to communication security are on the rise. With simulation test results supporting such threats to Convergence security in vehicular communication, concerns are raised over relevant vulnerabilities, while an increasing number of studies on secure vehicular communication are published. Hacking attacks against vehicles are more dangerous than other types of hacking attempts because such attacks may threaten drivers' lives and cause social instability. This paper designed a Convergence security protocol for inter-vehicle and intra-vehicle communication using a hash function, nonce, public keys, time stamps and passwords. The proposed protocol was tested with a formal verification tool, Casper/FDR, and found secure and safe against external attacks.

The Processed Radish Extract Melanogenesis in Humans and Induces Anti-Photoaging Effects in Ultraviolet B-Induced Hairless Mouse Model

  • Kim, Hyun-Kyoung
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.125-136
    • /
    • 2019
  • The radish skin and radish greens are an edible part of the radish. But they are removed before eating the radish and used as a byproduct or an animal feed material because of their tough and rough texture. Melanin is a pigment that gives colour to our skin. But increased production of melanin can turn into benign or malignant tumours. These days due to global warming, the amount of Ultra violet (UVB) rays has been extensively increased with sunlight. Due to this, a phenomenon called exogenous photo aging is widely observed for all skin colour and types. As a result of this phenomenon, a set of enzymes called matrix metalloproteinases (MMP's) that serves as degradation enzymes for extracellular matrix proteins mainly collagen is increased, causing depletion in collagen and resulting in early wrinkles formation. Therefore in our study we used the murine melanoma cell line B16/F10 to study the melanogenesis inhibition by Heated radish extract (HRE) in vitro and we used HRM-2 hair less mice exposed to artificial UVB for checking the efficacy of Heated radish extract in vivo. Furthermore, we prepared a 3% Heated radish extract (HRE) cream and checked its effects on human skin. Our results have clearly demonstrated that Heated radish extract (HRE) have potently suppressed the tyrosinase activity and melanin production in B16/F10 cells. It had also reduced the expression of components involved in melanin production pathway both transcriptionally and transitionally. In in vivo studies, HRE had potently suppressed the expression of MMP's and reduced the wrinkle formation and inhibited collagen degradation. Moreover, on human skin, ginseng cream increased the resilience, skin moisture and enhanced the skin tone. Therefore in light of these findings, we conclude that HRE is an excellent skin whitening and antiaging product.

Seismic Performance Evaluation of a Mid-rise General Hospital Building (중층 종합병원 건물의 내진성능평가)

  • Kim, Taewan;Chu, Yurim;Kim, Seung Rae
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.21 no.5
    • /
    • pp.245-254
    • /
    • 2017
  • The building which are essential for disaster recovery is classified as a special seismic use group. Especially, achievement of seismic performance is very important for the hospital, so the hospital should be able to maintain its function during and right after an earthquake without significant damage on both structural and non-structural elements. Therefore, this study aimed at checking the seismic performance of a hospital building, but which was limited to structural elements. For the goal, a plan with a configuration of general hospitals in Korea was selected and designed by two different seismic-force-resisting systems. In analytical modeling, the shear behavior of the wall was represented by three inelastic properties as well as elastic. Nonlinear dynamic analyses were conducted to evaluate the performance of structural members. The result showed that the performance of shear walls in the hospital buildings was not satisfied regardless of the seismic-force-resisting systems, while the demands on the beams and columns did not exceed the capacities. This is the result of only considering the shear of the wall as the force-controlled action. When the shear of the wall was modeled as inelastic, the walls were yielded in shear, and as the result, the demands for frames were increased. However, the increase did not exceed the capacities of the frames members. Consequently, since the performance of walls is significant to determine the seismic performance of a hospital building, it will be essential to establish a definite method of modeling shear behavior of walls and judging their performance.

Development of a CAD/CAM System for the Die Having Complex Geometric Solid Shape - for Rotary Blade as an Example - (자유곡면물체(自由曲面物體)의 금형설계(金型設計) 및 제작(製作)의 자동화(自動化)를 위한 CAD/DAM - 로우터리 경운(耕耘)날을 중심(中心)으로 -)

  • Kim, Soung Rai;Kim, Ki Dae
    • Korean Journal of Agricultural Science
    • /
    • v.22 no.1
    • /
    • pp.11-23
    • /
    • 1995
  • The CAD/CAM system for the manufacturing automation is the newest technology in mechanical engineering area and becomes the important research subject nowadays. Most of all hardwares and softwares for the CAD/CAM system used in the our manufacturing companies such as automobile company are developed by the foreign country and the purchasing price of them is very expensive but their applicability to a certain area is very limited. This study was conducted to develope a CAD/CAM system for the design and the automatic manufacturing of the iron pattern shaped with 3 - dimensional free curved surface, and to test its applicability to the design and the manufacturing of the rotary blade. The results obtained from the study are as follow; 1. The CAD system which can process graphic procedures from the free curved surface shaped data was developed with personal computer. 2. The CAM main program was developed. This main program could produce CL data from CAD data file by checking the tool interference according to the cutting mode. 3. The sub. program which can simulate the tool trace from the CL data was developed. 4. The post processor for the Deckel FP2NC NC milling machine from CL data file was developed and the sub program could transmit NC program through modem to NC milling machine was developed. 5. The developed CAM system seemed to be applicable to any other system. Because the measuring results of the cross sectional thickness of the plastic model from the manufacturing iron pattern by the system showed that this system could properly check the tool interference. 6. In took 75~90 hours to manufacture two iron patterns of rotary blade. For the sake of convenience in applying to the other systems, this system was developed in BASIC and FORTRAN computer language and minimum portion of machine language as possible.

  • PDF

Structural and Job Analysis for Core Competency of Aircraft Maintenance Crew Using Fuzzy Theory (퍼지이론을 이용한 항공기 정비사 핵심역량 구조 및 업무분석)

  • Choi, Ssang-Yong;Hwang, Seung-Gook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.6
    • /
    • pp.607-614
    • /
    • 2015
  • In this paper, structural analysis for the 16 core competencies of aircraft maintenance crew using FSM is carried out for the purpose of improving the capability of aircraft maintenance. As a result, the three groups of layers are composed of the 3 top layers, 3 middle layers and 10 lowest layers. These results make it possible to grasp the impact and importance. In addition, the core competency of aircraft maintenance crew can improve the maintenance quality and productivity through working on the spot. In this viewpoint, fuzzy relational matrix, which is used as a basis for evaluating the work, can be obtained from the data of the 100 aircraft maintenance crew for core competencies. In this paper, the efficiency of this model is shown by utilizing the 100 modeling data and the 67 checking data.

A Study of Attitude Control and Stability Analysis Using D-Decomposition Stability Area Technique for Launch Vehicle (안정성 영역(Stability Area) 판별법을 이용한 발사체 자세제어 이득 설계 및 자세 안정성 분석)

  • Park, Yong-Kyu;Sun, Byung-Chan;Roh, Woong-Rae;Oh, Choong-Seok
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.37 no.6
    • /
    • pp.537-544
    • /
    • 2009
  • This paper concerns analysis technique on determining of attitude control gain in the low frequency region using stability area. The stability area is defined by the D-Decomposition method, which was designed by Neimark. In this paper, it is introduced D-Decomposition method from reference paper and design attitude control gain of generic launch vehicle during first stage flight phase. For selecting PD control gain, it is considered the system parameter uncertainty about whole first-stage flight phase, represented the stability area boundary on each case. After deciding the PD control gain using stability area method, it is applied to launch vehicle linear model, and checking the stability margin requirement, frequency response characteristics.

Meta-Validation for Consistency between UML Structural Diagram and Behavioral Diagram (UML 구조 다이어그램과 행위 다이어그램의 일관성 메타검증)

  • 하일규;강병욱
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.12
    • /
    • pp.1158-1171
    • /
    • 2003
  • The UML is a widely accepted standard in object-oriented modeling. As the UML is semantically rich, we can describe in detail the system that will be developed, but we cannot guarantee the correctness and consistency of the designed model. Therefore, it is important to minimize the error by verifying user models in an early stage. In this paper, we propose a method for verifying the consistency of UML structural diagrams and behavioral diagrams using OCL verification rules and meta-metamodel. The consistency is a nature for checking whether the structural diagrams and behavioral diagrams are coherently designed according to a specific requirement. First we build meta-metamodels of the structural diagram and behavioral diagram that are described with the UML diagrams and the related elements, we derive rules for verifying the consistency from each meta-metamodels, and then formally specify with the language such as OCL for automatic verification. Finally, we verify the usefulness of the rule through a case study.