• Title/Summary/Keyword: Symbolic method

Search Result 383, Processing Time 0.032 seconds

DECOMPOSITION FORMULAS FOR THE GENERALIZID HYPERGEOMETRIC 4F3 FUNCTION

  • Hasanov, Anvar;Turaev, Mamasali;Choi, June-Sang
    • Honam Mathematical Journal
    • /
    • v.32 no.1
    • /
    • pp.1-16
    • /
    • 2010
  • By using the generalized operator method given by Burchnall and Chaundy in 1940, the authors present one-dimensional inverse pairs of symbolic operators. Many operator identities involving these pairs of symbolic operators are rst constructed. By means of these operator identities, 11 decomposition formulas for the generalized hypergeometric $_4F_3$ function are then given. Furthermore, the integral representations associated with generalized hypergeometric functions are also presented.

A Symbolic Layout Generator for CMOS Standard Cells Using Artificial Intelligence Approach (인공지능 기법을 이용한 CMOS 표준셀의 심볼릭 레이아웃 발생기)

  • 유종근;이문기
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.24 no.6
    • /
    • pp.1080-1086
    • /
    • 1987
  • SLAGEN, a system for symbolic cell layout based on artificial intelligence approach, takes as input a transistor connection description of CMOS standard cells and environment information, and outputs a symbolic layout description. SLAGEN performas transistor grouping by a heuristic search method, in order to minimize the number of separations, and then performs group reordering and transistor reordering with an eye toward minimizing routing. Next, SLAGEN creates a rough initial routing in order to guarantee functionality and correctness, and then improve the initial routing by a rule-based approach.

  • PDF

The Study on Symbolic Color and Costume of The Seven Days Buddha in Thailand (태국 칠일불(七日佛)의 상징색채와 복식)

  • Soh, Hwang Oak;Kim, Da Min
    • Journal of the Korean Society of Costume
    • /
    • v.64 no.8
    • /
    • pp.179-190
    • /
    • 2014
  • In traditional costume, colors have been used to express the religion, society, culture, custom, and other aspects of a country. This is mainly due to color being the most conspicuous visual factor of a costume. In Thailand, there is a symbolic color for each day of the week, and the purpose of this study is to contribute to deeper understanding of the Thailand culture in regards to color and its costumes. The study method is as follows: literatures and photos were researched for social and religious background of the seven days Buddha history, which was the source of the color a day culture, symbols and significance of each Buddha were studied and precedent studies were reviewed. The study attempted to investigate the effect of the symbolic color on costumes as it passed down from generations. Originally, the symbolic colors of seven days Buddha in Thailand was a religious component that was exclusive to the upper class. However, it has expanded to the lower classes today. Currently, it obtains an aspect of health and wealth gospel for oneself or others as well as being used to express individual personality because people regard certain color as their symbolic color.

A Study of Formativeness in the Western Symbolic Icons of Evil (서양 악의 상징물에 나타난 조형성 연구)

  • Lee, Young hwa
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.127-135
    • /
    • 2018
  • Men are ambivalent since they have good and evil at the same time. To concretize this evil further, men created symbolic icons of evil with formative elements by giving shape to it. Thus, this researcher would investigate and analyze the concept of evil and the formativeness appearing when the essence of humans' evil is expressed as symbolic icons. For this purpose, items for the classification of formativeness were constructed, and questionnaires were prepared to draw the results of an analysis as follows. As for the type of composition, symbolic icons of evil were expressed by pictures or signs, rather than letters. The objects of expression were characters and animals in myths. As for the layout, most were expressed in a radial shape. As for the method of description, most were in the forms of simplicity and complexity, and as for the outer form, most were circles. It was noted that the symbolic icons in which items with these types of composition had high scores, were drawn, used and developed in formative relations with each other.

Input File Based Dynamic Symbolic Execution Method for Software Safety Verification (소프트웨어 안전성 검증을 위한 입력 파일 기반 동적 기호 실행 방법)

  • Park, Sunghyun;Kang, Sangyong;Kim, Hwisung;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.811-820
    • /
    • 2017
  • Software automatic technology research recently focuses not only on generating a single path test-case, but also on finding an optimized path to reach the vulnerability through various test-cases. Although Dynamic Symbolic Execution (DSE) technology is popular among these automatic technologies, most DSE technology researches apply only to Linux binaries or specific modules themselves. However, most software are vulnerable based on input files. Therefore, this paper proposes an input file based dynamic symbolic execution method for software vulnerability verification. As a result of applying it to three kinds of actual binary software, it was possible to create a test-case effectively reaching the corresponding point through the proposed method. This demonstrates that DSE technology can be used to automate the analysis of actual software.

A Study on the Real-Time Analysis of a 6×6 Autonomous Vehicle (6×6 자율주행 차량의 실시간 해석을 위한 연구)

  • Cho, Du-Ho;Lee, Jung-Han;Yi, Ki-Chang;Yoo, Wan-Suk
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.33 no.12
    • /
    • pp.1433-1441
    • /
    • 2009
  • In multibody dynamic analysis, one of the most important problems is to reduce computation times for real-time simulation. This paper presents the derivation procedure of equations of motion of a 6${\times}$6 autonomous vehicle in terms of chassis local coordinates which do not require coordinates transformation matrix to enhance efficiency for real-time dynamic analysis. Also, equations of motion are derived using the VT(velocity transformation) technique and symbolic computation method coded by MATLAB. The Jacobian matrix of the equations of motion of a system is derived from symbolic operations to apply the implicit integration method. The analysis results were compared with ADAMS results to verify the accuracy and approve the feasibility of real time analysis.

Type and Component of Fashion Brand Concepts (패션 브랜드 컨셉의 유형 및 구성 요소 분석)

  • Kim, Saehee
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.38 no.4
    • /
    • pp.495-505
    • /
    • 2014
  • This study investigated the type of fashion brand concepts and derived the components of fashion brand concepts. A total of 125 brand concept texts of women's wear brands were collected from "2012/2013 Korea Fashion Brand Annual" (S. M. Kim, 2012). A qualitative research method was employed. To investigate the types of fashion brand concepts, the texts were classified into three types such as functional, symbolic, and experiential concepts, and four complex types such as functional/symbolic, functional/experiential, symbolic/experiential, and functional/symbolic/experiential concepts. Open coding and axial coding provided the components of fashion brand concepts. The results were as follows. First, an investigation of the types of fashion brand concepts indicated differences in the types of fashion brand concepts and the types of general product brand concepts. One content of a fashion brand concept could be interpreted as more than two concept types; consequently, many fashion brand concepts did not fit the notion of the types of general product brand concept. Most fashion brand concepts simultaneously encompassed more than two types of brand concepts at once. Second, the components of fashion brand concepts consisted of 55 subjects, 7 sub-categories (physical/intrinsic product characteristics, symbolic/conceptual product characteristics, target demographics, target consumer behavior, brand capability, brand values, and brand management/marketing) and 3 categories (product, target consumer, and brand).

A Study of Analysis on Abstract Symbolism Expression in Korean Contemporary Protestant Church Main Chapel Design - Focus on the Protestant Church was built after 2000 - (한국 현대 개신교회 대예배실 디자인의 추상적 상징성 표현 분석 연구 - 2000년 이후 건축된 개신교회를 중심으로 -)

  • Kim, Jung-Tae;Choi, Sang-Hun
    • Korean Institute of Interior Design Journal
    • /
    • v.21 no.4
    • /
    • pp.3-11
    • /
    • 2012
  • The purpose of the study was to find out design problems of grand chapel of the Protestant church and to set analysis frame based on theoretical study on abstract symbolism and investigate cases and to give reference of abstract symbolism expression of design of the chapel. The findings were as follow: Introduction of the light was found to be the most outstanding among abstract symbolic factors, and metaphor was commonly used to express abstract symbols. First, 1) Introduction of the light was found to be the most outstanding at application of abstract symbolic factor of modern Protestant church to be the highest among pastors, office bearers, believers and non-Christians. 2) The metaphor was found to be the most noticeable among abstract symbolic expressions. Second, the findings of questionnaire survey was: The findings of questionnaire of not only abstract symbolic expression factor but also symbolic expression method was not to cognize ideas of pastor, office bearers, believers and designers often. This was because abstract symbolism was made from point of view of designers. Therefore, abstract symbolic expression factors of grand chapel of modern Protestant church, for instance, effective introduction of the light, light quoting the Bible sayings, material, color and shapes, etc should be used with metaphor and symmetry to give Christians value of symbol and to hide meaning of symbolic values to non-Christians who do not know contents of the Bible.

  • PDF

A DoS Detection Method Based on Composition Self-Similarity

  • Jian-Qi, Zhu;Feng, Fu;Kim, Chong-Kwon;Ke-Xin, Yin;Yan-Heng, Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.5
    • /
    • pp.1463-1478
    • /
    • 2012
  • Based on the theory of local-world network, the composition self-similarity (CSS) of network traffic is presented for the first time in this paper for the study of DoS detection. We propose the concept of composition distribution graph and design the relative operations. The $(R/S)^d$ algorithm is designed for calculating the Hurst parameter. Based on composition distribution graph and Kullback Leibler (KL) divergence, we propose the composition self-similarity anomaly detection (CSSD) method for the detection of DoS attacks. We evaluate the effectiveness of the proposed method. Compared to other entropy based anomaly detection methods, our method is more accurate and with higher sensitivity in the detection of DoS attacks.

An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit (심볼릭 링크 공격 취약성 검출을 위한 분석 기법)

  • Joo, Seong-Yong;Ahn, Joon-Seon;Jo, Jang-Wu
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.45-52
    • /
    • 2008
  • In this paper we define a vulnerable code to symbolic link exploit and propose a technique to detect this using program analysis. The existing methods to solve symbolic link exploit is for protecting it, on accessing a temporary file they should perform an investigation whether the file is attacked by symbolic link exploit. If programmers miss the investigation, the program may be revealed to symbolic link exploit. Because our technique detects all the vulnerable codes to symbolic link exploit, it helps programmers keep the program safety. Our technique add two type qualifiers to the existing type system to analyze vulnerable codes to symbolic link exploit, it detects the vulnerable codes using type checking including the added type qualifiers. Our technique detects all the vulnerable codes to symbolic link exploit automatically, it has the advantage of saving costs of modifying and of overviewing all codes because programmers apply the methods protecting symbolic link exploit to only the detected codes as vulnerable. We experiment our analyzer with widely used programs. In our experiments only a portion of all the function fopen() is analyzed as the vulnerabilities to symbolic link exploit. It shows that our technique is useful to diminish modifying codes.