• 제목/요약/키워드: counter example analysis

검색결과 17건 처리시간 0.023초

모델기반의 커널 테스팅 프레이뭐크 (MOdel-based KERnel Testing (MOKERT) Framework)

  • 김문주;홍신
    • 한국정보과학회논문지:소프트웨어및응용
    • /
    • 제36권7호
    • /
    • pp.523-530
    • /
    • 2009
  • 최근 내장형 시스템이 점점 많은 분야에 사용되며, 시스템에 특화된 운영체제 커널에 대한 필요성이 커지고 있다. 하지만, 커널 개발은 코드의 복잡성 등의 이유로 말미암아 테스팅에 큰 비용이 소요됨에도 불구하고, 높은 신뢰성을 달성하기가 어려운 실정이다. 이러한 커널 개발 및 테스팅의 어려움을 극복하기 위해, 운영체제 커널의 동시성 오류 검출을 지원하는 모델 기반의 커널 테스팅 (MOKERT) 프레임워크를 제안한다. MOKERT 프레임워크는 주어진 C 프로그램을 Promela 정형 명세 모델로 변환하고 나서 Spin 모델검증기를 사용하여 검증하고, 검증반례가 생성된 경우, 이 검증반례를 실제 커널 코드에서 실행을 시켜서 진위를 확인한다. 본 연구에서는 MOKERT 프레임워크를 리눅스 proc파일시스템에 적용하여, ChangeLog에 보고된 오류가 실제로 자원경쟁문제를 일으킴을 확인하였을 뿐만 아니라, 커널 패닉을 일으키는 새로운 오류도 발견하였다.

Cluster Analysis Algorithms Based on the Gradient Descent Procedure of a Fuzzy Objective Function

  • Rhee, Hyun-Sook;Oh, Kyung-Whan
    • Journal of Electrical Engineering and information Science
    • /
    • 제2권6호
    • /
    • pp.191-196
    • /
    • 1997
  • Fuzzy clustering has been playing an important role in solving many problems. Fuzzy c-Means(FCM) algorithm is most frequently used for fuzzy clustering. But some fixed point of FCM algorithm, know as Tucker's counter example, is not a reasonable solution. Moreover, FCM algorithm is impossible to perform the on-line learning since it is basically a batch learning scheme. This paper presents unsupervised learning networks as an attempt to improve shortcomings of the conventional clustering algorithm. This model integrates optimization function of FCM algorithm into unsupervised learning networks. The learning rule of the proposed scheme is a result of formal derivation based on the gradient descent procedure of a fuzzy objective function. Using the result of formal derivation, two algorithms of fuzzy cluster analysis, the batch learning version and on-line learning version, are devised. They are tested on several data sets and compared with FCM. The experimental results show that the proposed algorithms find out the reasonable solution on Tucker's counter example.

  • PDF

중학교 학생의 증명 능력 분석 (Analysis on Students' Abilities of Proof in Middle School)

  • 서동엽
    • 대한수학교육학회지:수학교육학연구
    • /
    • 제9권1호
    • /
    • pp.183-203
    • /
    • 1999
  • In this study, we analysed the constituents of proof and examined into the reasons why the students have trouble in learning the proof, and proposed directions for improving the teaming and teaching of proof. Through the reviews of the related literatures and the analyses of textbooks, the constituents of proof in the level of middle grades in our country are divided into two major categories 'Constituents related to the construction of reasoning' and 'Constituents related to the meaning of proof. 'The former includes the inference rules(simplification, conjunction, modus ponens, and hypothetical syllogism), symbolization, distinguishing between definition and property, use of the appropriate diagrams, application of the basic principles, variety and completeness in checking, reading and using the basic components of geometric figures to prove, translating symbols into literary compositions, disproof using counter example, and proof of equations. The latter includes the inferences, implication, separation of assumption and conclusion, distinguishing implication from equivalence, a theorem has no exceptions, necessity for proof of obvious propositions, and generality of proof. The results from three types of examinations; analysis of the textbooks, interview, writing test, are summarized as following. The hypothetical syllogism that builds the main structure of proofs is not taught in middle grades explicitly, so students have more difficulty in understanding other types of syllogisms than the AAA type of categorical syllogisms. Most of students do not distinguish definition from property well, so they find difficulty in symbolizing, separating assumption from conclusion, or use of the appropriate diagrams. The basic symbols and principles are taught in the first year of the middle school and students use them in proving theorems after about one year. That could be a cause that the students do not allow the exact names of the principles and can not apply correct principles. Textbooks do not describe clearly about counter example, but they contain some problems to solve only by using counter examples. Students have thought that one counter example is sufficient to disprove a false proposition, but in fact, they do not prefer to use it. Textbooks contain some problems to prove equations, A=B. Proving those equations, however, students do not perceive that writing equation A=B, the conclusion of the proof, in the first line and deforming the both sides of it are incorrect. Furthermore, students prefer it to developing A to B. Most of constituents related to the meaning of proof are mentioned very simply or never in textbooks, so many students do not know them. Especially, they accept the result of experiments or measurements as proof and prefer them to logical proof stated in textbooks.

  • PDF

Lakatos 방법론을 통한 초등학교 6학년 학생들의 수학적 사고 (The Analysis of the 6th Grade Students' Mathematical Thinking on the Application of Lakatos' Methodology)

  • 정미혜;이광호;심재방
    • 한국수학교육학회지시리즈C:초등수학교육
    • /
    • 제16권1호
    • /
    • pp.21-33
    • /
    • 2013
  • 본 연구는 초등학교 6학년 학생들을 대상으로 Lakatos방법론을 적용한 수업에서 나타나는 수학적 사고를 구체적으로 분석하고, 이 수업에서의 교사의 역할을 살펴봄으로써 Lakatos 방법론과 관련하여 교수 학습 방향에 대한 시사점을 찾고자 하였다. 문제 상황제시, 본래의 추측 제안, 본래의 추측 검사, 추측의 개선 단계에 따라 8차시 수업을 실시하였고 수업 촬영 비디오, 심층면담 기록, 문서 자료 등 수집된 자료를 바탕으로 분석하였다. 분석 결과 각 단계에 따라 관찰, 비교 등과 같은 기초적인 사고 기능으로부터 다른 추측을 제안하는 창의적 사고까지 다양한 수학적 사고가 도출되었다.

SAT를 이용한 정보흐름의 안전성 분석 (Security Analysis of Information Flow using SAT)

  • 김제민;고훈준
    • 디지털융복합연구
    • /
    • 제14권6호
    • /
    • pp.253-261
    • /
    • 2016
  • PC 와 모바일 기기에 있는 다양한 프로그램을 이용하여 인터넷을 이용하는 사람들이 늘어날수록 프로그램에서 개인정보 등이 유출될 가능성은 매우 높아지고 있다. 따라서 인터넷을 사용하는 프로그램에서 정보흐름의 안전성 분석을 한 후에 개인정보의 유출이 없는 안전한 프로그램을 사용해야 한다. 정보흐름의 안전성 분석은 프로그램 내에서 정보의 흐름이 안전한지 분석하는 방법으로 정보흐름이 안전하면 개인정보 유출이 없고 안전하지 않으면 개인정보 유출이 발생할 수 있다. 본 논문에서는 SAT 해결기를 활용하여 정보흐름 분석을 수행하는 방법을 제시한다. 이 방법은 보안 수준이 설정된 변수를 포함하는 프로그램을 제어와 정보흐름을 나타내는 명제 논리식으로 변환하고, SAT 해결기를 이용해 명제 논리식으로부터 만족가능성 여부를 판단한다. 판단된 결과를 통해 프로그램에서 정보흐름이 안전한지 알 수 있으며, 안전하지 않은 경우 반례를 생성하여 어느 부분에서 안전하지 않은 지 알 수 있다.

Aerodynamic stabilization of central stabilizers for box girder suspension bridges

  • Ge, Yaojun;Zou, Xiaojie;Yang, Yongxin
    • Wind and Structures
    • /
    • 제12권4호
    • /
    • pp.285-298
    • /
    • 2009
  • For long-span suspension bridges with their intrinsic limit in flutter, some counter measures, for example, central stabilizers, should be adopted to improve aerodynamic stability to meet with the appropriate wind resistance requirements. The present paper introduces aerodynamic stabilization for long-span suspension bridges with box girders by using central stabilizers based on Xihoumen Bridge with the main span of 1650 m. The aerodynamic stabilization study covers experimental investigation of sectional model testing, comprehensive evaluation of three central stabilizers and theoretical analysis of stabilizing mechanism related to flutter derivatives, aerodynamic damping and degree participation.

중학교 1학년 교과서에서 다각형에 관한 예 분석 (An Analysis on the Examples of Polygons in the 1st Grade Middle School Mathematics Textbooks)

  • 이지혜;손희림;김성경
    • 대한수학교육학회지:학교수학
    • /
    • 제15권4호
    • /
    • pp.743-758
    • /
    • 2013
  • 본 연구는 2009 개정교육과정 중학교 1학년 교과서 13종을 대상으로 다각형에 관한 예를 분석하여 교과서에서 예를 어떻게 제시하고 있는지 살펴보고자 하였다. 교과서의 예를 일반적인 예, 비예, 반례라는 하나의 관점과 개념의 예와 절차 적용의 예라는 다른 관점으로 분류하고 사례를 분석하였다. 그리고 같은 개념이나 절차와 관련된 예를 제시할 때 교과서에 따라 어떤 방법으로 제시하고 있는가를 분석하였다. 그 결과 교과서에 제시되는 예는 일반적인 예에 편중되어 있었고, 개념의 예와 절차 적용의 예도 교과서에 따라 제시된 비율의 편차가 큰 편이었다. 또한 여러 교과서에서 다각형의 배치나 모양을 다양하게 제시하지 못하고 있었다. 학생들의 예 공간을 확장시키기 위해서 교과서에서는 적절하고 다양한 예를 제시할 필요가 있다.

  • PDF

Analysis of Cybercrime Investigation Problems in the Cloud Environment

  • Khachatryan, Grigor
    • International Journal of Computer Science & Network Security
    • /
    • 제22권7호
    • /
    • pp.315-319
    • /
    • 2022
  • Cloud computing has emerged to be the most effective headway for investigating crime especially cybercrime in this modern world. Even as we move towards an information technology-controlled world, it is important to note that when innovations are made, some negative implications also come with it, and an example of this is these criminal activities that involve technology, network devices, and networking that have emerged as a result of web improvements. These criminal activities are the ones that have been termed cybercrime. It is because of these increased criminal activities that organizations have come up with different strategies that they use to counter these crimes, and one of them is carrying out investigations using the cloud environment. A cloud environment has been defined as the use of web-based applications that are used for software installation and data stored in computers. This paper examines problems that are a result of cybercrime investigation in the cloud environment. Through analysis of the two components in play; cybercrime and cloud environment, we will be able to understand what are the problems that are encountered when carrying out investigations in cloud forensics. Through the use of secondary research, this paper found out that most problems are associated with technical and legal channels that are involved in carrying out these investigations. Investigator's mistakes when extracting pieces of evidence form the most crucial problems that take a lead when it comes to cybercrime investigation in the cloud environment. This paper not only flags out the challenges that are associated with cybercrime investigation in cloud environments but also offer recommendations and suggested solutions that can be used to counter the problems in question here. Through a proposed model to perform forensics investigations, this paper discusses new methodologies solutions, and developments for performing cybercrime investigations in the cloud environment.

A Risk-based System Analysis Model for Improving the Performance of Financial Solutions

  • Lee, Jong Yun;Kim, Jong Soo;Kim, Tai Suk
    • 한국멀티미디어학회논문지
    • /
    • 제18권11호
    • /
    • pp.1367-1374
    • /
    • 2015
  • In this paper, we propose a model which can prioritize the performance improvement work by analyzing the major risks and their influence, which can cause performance degradation in the system and show an example of a performance improvement using this model. In presentation-tier, as a result of log data analysis before and after the performance improvement of key processes which handle financial transactions, this model brought the CPU utilization and memory enhancement in the performance improvement work of the financial system which was carried out by applying the proposed model. It has been confirmed that the entire end-user can be accommodated. In the web-tier, the available memory increased by 200MB and we were able to improve the server restart(Recycling) that was sustained in the existing system. In the business logic-tier, we have been able to see better figures after performance improvements through the graph which analyzes the log collected with the key performance counters such as CPU%, Batch Requests/sec. In the data-tier, it has been confirmed that CPU usage and standby operation were reduced and the throughput was found to increase.

A Study on Algorithm Selection and Comparison for Improving the Performance of an Artificial Intelligence Product Recognition Automatic Payment System

  • Kim, Heeyoung;Kim, Dongmin;Ryu, Gihwan;Hong, Hotak
    • International Journal of Advanced Culture Technology
    • /
    • 제10권1호
    • /
    • pp.230-235
    • /
    • 2022
  • This study is to select an optimal object detection algorithm for designing a self-checkout counter to improve the inconvenience of payment systems for products without existing barcodes. To this end, a performance comparison analysis of YOLO v2, Tiny YOLO v2, and the latest YOLO v5 among deep learning-based object detection algorithms was performed to derive results. In this paper, performance comparison was conducted by forming learning data as an example of 'donut' in a bakery store, and the performance result of YOLO v5 was the highest at 96.9% of mAP. Therefore, YOLO v5 was selected as the artificial intelligence object detection algorithm to be applied in this paper. As a result of performance analysis, when the optimal threshold was set for each donut, the precision and reproduction rate of all donuts exceeded 0.85, and the majority of donuts showed excellent recognition performance of 0.90 or more. We expect that the results of this paper will be helpful as the fundamental data for the development of an automatic payment system using AI self-service technology that is highly usable in the non-face-to-face era.