• Title/Summary/Keyword: formal verification

Search Result 200, Processing Time 0.027 seconds

Dynamic Decision Making using Social Context based on Ontology (상황 온톨로지를 이용한 동적 의사결정시스템)

  • Kim, Hyun-Woo;Sohn, M.-Ye;Lee, Hyun-Jung
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.3
    • /
    • pp.43-61
    • /
    • 2011
  • In this research, we propose a dynamic decision making using social context based on ontology. Dynamic adaptation is adopted for the high qualified decision making, which is defined as creation of proper information using contexts depending on decision maker's state of affairs in ubiquitous computing environment. Thereby, the context for the dynamic adaptation is classified as a static, dynamic and social context. Static context contains personal explicit information like demographic data. Dynamic context like weather or traffic information is provided by external information service provider. Finally, social context implies much more implicit knowledge such as social relationship than the other two-type context, but it is not easy to extract any implied tacit knowledge as well as generalized rules from the information. So, it was not easy for the social context to apply into dynamic adaptation. In this light, we tried the social context into the dynamic adaptation to generate context-appropriate personalized information. It is necessary to build modeling methodology to adopt dynamic adaptation using the context. The proposed context modeling used ontology and cases which are best to represent tacit and unstructured knowledge such as social context. Case-based reasoning and constraint satisfaction problem is applied into the dynamic decision making system for the dynamic adaption. Case-based reasoning is used case to represent the context including social, dynamic and static and to extract personalized knowledge from the personalized case-base. Constraint satisfaction problem is used when the selected case through the case-based reasoning needs dynamic adaptation, since it is usual to adapt the selected case because context can be changed timely according to environment status. The case-base reasoning adopts problem context for effective representation of static, dynamic and social context, which use a case structure with index and solution and problem ontology of decision maker. The case is stored in case-base as a repository of a decision maker's personal experience and knowledge. The constraint satisfaction problem use solution ontology which is extracted from collective intelligence which is generalized from solutions of decision makers. The solution ontology is retrieved to find proper solution depending on the decision maker's context when it is necessary. At the same time, dynamic adaptation is applied to adapt the selected case using solution ontology. The decision making process is comprised of following steps. First, whenever the system aware new context, the system converses the context into problem context ontology with case structure. Any context is defined by a case with a formal knowledge representation structure. Thereby, social context as implicit knowledge is also represented a formal form like a case. In addition, for the context modeling, ontology is also adopted. Second, we select a proper case as a decision making solution from decision maker's personal case-base. We convince that the selected case should be the best case depending on context related to decision maker's current status as well as decision maker's requirements. However, it is possible to change the environment and context around the decision maker and it is necessary to adapt the selected case. Third, if the selected case is not available or the decision maker doesn't satisfy according to the newly arrived context, then constraint satisfaction problem and solution ontology is applied to derive new solution for the decision maker. The constraint satisfaction problem uses to the previously selected case to adopt and solution ontology. The verification of the proposed methodology is processed by searching a meeting place according to the decision maker's requirements and context, the extracted solution shows the satisfaction depending on meeting purpose.

Process Development and Verification for Construction VE Object Selection of Performance-Oriented (성능중심의 건설VE 대상 선정 프로세스 개발 및 검증)

  • Kim, Soo-Yong;Yang, Jin-Kook
    • Korean Journal of Construction Engineering and Management
    • /
    • v.13 no.4
    • /
    • pp.25-32
    • /
    • 2012
  • The current VE activity is recognizing the VE object selection in job-plan simply as formal procedure. Therefore, many problems are happening in the process of selecting VE object during the preparatory stage. As a result of trying to analysis problems through literature review and expert interview, the problems were surveyed such as the lack of connectivity between preparatory stage and analytical stage, the temporal cost-based restrictions, and lack of recognition in VE team members in the existing method of selecting subjects centering on the high-cost field. Accordingly, this study suggested the improved method of selecting VE objects in order to solve this problem in the stage of selecting VE objects. An improvement method of selecting VE objects is what selects the secondary VE subjects by applying again Fish-Bone diagram and Worth technique based on the primary VE objects, which were selected by the conventional technique of selecting objects in the high-cost field. To verify effectiveness in the proposed improvement method, it tried to apply it to the actual case of the road construction VE project. As result of, the improvement method was analyzed to be considerably effective in comparison with the existing selection method of VE objects. Therefore, the Improvement method will contribute to increasing the VE performance.

Development of School Health Nursing Phenomena in Korea by Retrospective Method of ICNP (ICNP의 후향적 개발방법에 의한 한국의 학교간호현상)

  • Kim, Young-Im;Young, Soon-Ok;Wang, Myoung-Ja;Kim, Chung-Nam;Kim, Hyeon-Suk;Park, Tae-Nam;Chung, Mi-Ja;Hyun, Hye-Jin
    • Research in Community and Public Health Nursing
    • /
    • v.13 no.4
    • /
    • pp.595-607
    • /
    • 2002
  • The objectives of this study were to identify the phenomena of school health nursing at schools in Korea and to contribute to building a school health domain of International Classification for Nursing Practice. A retrospective method was used in this study to develop ICNP during the period from July to October 200l. The procedure of the study involved choosing nursing phenomena using preliminary terms from the reports on the field of school health nursing practice documented by nursing students in 10 different nursing colleges. The detail procedures of the study were as follows. 1) Choosing nursing phenomena by using preliminary terms 2) Choosing the characteristics of school health nursing practice from the selected nursing phenomena 3) In order to make a consensus regarding the appropriate characteristics of phenomena. 15 study group members re-categorized the nursing phenomena through 5 times of cyber meetings and 3 times of formal meetings. 4) To verify each characteristic, 5 community nursing faculties and 25 school health nurses participated in the procedure to give scores on nursing characteristics. 5) Classification of the definite nursing phenomena and characteristics. Following the 5 step procedures, school health nursing phenomena were categorized into human and environmental domains. Human domains were classified into human behavioral and functional domains. Environmental domains were classified into physical and psychosocial domains. The essential characteristics of each phenomena were selected when it obtains the mean score of 3.0 or over at the related characteristics. The human behavioral domain consisted of 7 phenomena including risk for spinal disorder, inadequate dietary habit, inadequate weight control, smoking and substance abuse, inadequate stress management, inadequate sex related coping strategies and inadequate accident management. The human functional domain consisted of 6 phenomena including inadequate eye care and visual management, risk for respiratory disorder, inadequate dental health care, inappropriate infectious disease control, risk for gastrointestinal disorder, and lack of sexual identity. The physical environmental domain consisted of 6 phenomena including risk for incident at inside classroom, risk for incident at outside classroom, risk for incident around school, risk for exposure to hazardous facilities around school. inadequate garbage and disposal management, and inadequate physical environment for learning. The psychosocial domain included impaired social interaction at school. Each phenomenon was composed of 2 to 8 characteristics and all phenomena will include a total number of 85 characteristics. The phenomena of school health nursing in Korea partially confirmed school health architecture of ICNP. Further study on verification of school health nursing phenomena in Korea needs to be done to support the findings of this study through review of literature on nursing classifications or field studies.

  • PDF

A Study on the NCS based Curriculum for Educating Information Security Manpower (정보보호 산업분야 신규 인력 양성을 위한 NCS 기반 교육과정 설계에 관한 연구)

  • Song, Jeong-Ho;Kim, Hwang-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.537-544
    • /
    • 2016
  • National Competency Standards (NCS) need to be introduced to train newly hired staff and to gradually improve employees' work performance in the information security industry. In particular, the introduction of a new NCS curriculum for new hires is important in order to retain and efficiently manage professionals in the information security field. However, the legacy NCS is not clearly designed for the information security field. So a formal curriculum has been suggested for institutions training the information security workforce. Therefore, this study establishes a competency unit based on the types of personnel, their duties, and required knowledge. To select the competency unit, this study reviewed prior research to understand the required skills and work knowledge, and reviewed recruitment-based NCS that public agencies and public and private companies have carried out, including them in the study. The selected competency unit was classified into a required competency unit and an elective competency unit based on the importance of the duties and the demands of training. Through a verification process for the new, licensed career path model in the NCS information and communications field, this study suggests updated NCS competency units and required courses to provide an appropriate NCS curriculum for newly hired employees in the information security industry.

Intermediate-Representation Translation Techniques to Improve Vulnerability Analysis Efficiency for Binary Files in Embedded Devices (임베디드 기기 바이너리 취약점 분석 효율성 제고를 위한 중간어 변환 기술)

  • Jeoung, Byeoung Ho;Kim, Yong Hyuk;Bae, Sung il;Im, Eul Gyu
    • Smart Media Journal
    • /
    • v.7 no.1
    • /
    • pp.37-44
    • /
    • 2018
  • Utilizing sequence control and numerical computing, embedded devices are used in a variety of automated systems, including those at industrial sites, in accordance with their control program. Since embedded devices are used as a control system in corporate industrial complexes, nuclear power plants and public transport infrastructure nowadays, deliberate attacks on them can cause significant economic and social damages. Most attacks aimed at embedded devices are data-coded, code-modulated, and control-programmed. The control programs for industry-automated embedded devices are designed to represent circuit structures, unlike common programming languages, and most industrial automation control programs are designed with a graphical language, LAD, which is difficult to process static analysis. Because of these characteristics, the vulnerability analysis and security related studies for industry automation control programs have only progressed up to the formal verification, real-time monitoring levels. Furthermore, the static analysis of industrial automation control programs, which can detect vulnerabilities in advance and prepare for attacks, stays poorly researched. Therefore, this study suggests a method to present a discussion on an industry automation control program designed to represent the circuit structure to increase the efficiency of static analysis of embedded industrial automation programs. It also proposes a medium term translation technology exploiting LLVM IR to comprehensively analyze the industrial automation control programs of various manufacturers. By using LLVM IR, it is possible to perform integrated analysis on dynamic analysis. In this study, a prototype program that converts to a logical expression type of medium language was developed with regards to the S company's control program in order to verify our method.

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.

Abstraction of Models with State Projections In Model Checking (모델 체킹에서 상태 투영을 이용한 모델의 추상화)

  • Kwon, Gi-Hwon
    • The KIPS Transactions:PartD
    • /
    • v.11D no.6
    • /
    • pp.1295-1300
    • /
    • 2004
  • Although model checking has gained its popularity as one of the most effective approaches to the formal verification, it has to deal with the state explosion problem to be widely used in industry. In order to mitigate the problem, this paper proposes an ion technique to obtain a reduced model M' from a given original model M. Our technique Identifies the set of necessary variables for model checking and projects the state space onto them. The model M' is smaller in both size and behavior than the original model M, written M'$\leq$M. Since the result of reachability analysis with M' is preserved in M, we can do reachability analysis with model checking using M' instead of M. The abstraction technique is applied to Push Push games, and two model checkers - Cadence SMV and NuSMV - are used to solve the games. As a result, most of unsolved games with the usual model checking are solved with the ion technique. In addition, ion shows that there is much of time and space improvement. With Cadence SMV, there is 87% time improvement and 79% space one. And there is 83% time improvement and 56% space one with NuSMV.

A Study on the Improvement of the Consultations on Amendment in Environmental Impact Assessment of Industrial Complex Development (산업단지 조성사업의 환경영향평가 변경협의 개선방안 연구)

  • Joo, Yong-Joon;Sagong, Hee
    • Journal of Environmental Impact Assessment
    • /
    • v.31 no.3
    • /
    • pp.129-140
    • /
    • 2022
  • Environmental impact assessment on development projects is a process in which various stakeholders derive consultations by reflecting project characteristics and regional environmental status, and implementation of consultations is a prerequisite for securing sustainability of the local environment. The business plan can be changed to respond to changes in social and environmental conditions. And the business plan for which the environmental impact assessment consultation has been completed, it can be changed as a systematically prepared procedure (called Consultations on Amendment). As a result of investigating and analyzing the current status and major changes in the development project, Consultations on Amendment in industrial complexes were the most common, and the environmental impact is increasing accordingly. As the results of the analysis of operational status and the case studies, the main causes of Consultations on Amendment in industrial complex can be summarized into three categories: (1) formal demand forecasting for tenant industries, (2) excessive omission and simplification of administrative procedures under the Special Act, and (3) the use of an expedient change consultation system to facilitate environmental impact assessment consultation and shorten the period. This study proposes the following three measures to prevent the deterioration of the environmental impact assessment function due to frequent consultations on industrial complex changes; (1) Ensuring residents' participation procedures for Consultations on Amendment that changes important matters, (2) Reasonable revision of the "Simplification of Industrial Complex Procedures Act" to enhance the feasibility of industrial complex development plans and locations, (3) Development of evaluation criteria and methods for verification of real demand for objective demand management for industrial complexes, and (4) Preparation of a review guideline for Consultations on Amendment.

Development of a Web-based Presentation Attitude Correction Program Centered on Analyzing Facial Features of Videos through Coordinate Calculation (좌표계산을 통해 동영상의 안면 특징점 분석을 중심으로 한 웹 기반 발표 태도 교정 프로그램 개발)

  • Kwon, Kihyeon;An, Suho;Park, Chan Jung
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.2
    • /
    • pp.10-21
    • /
    • 2022
  • In order to improve formal presentation attitudes such as presentation of job interviews and presentation of project results at the company, there are few automated methods other than observation by colleagues or professors. In previous studies, it was reported that the speaker's stable speech and gaze processing affect the delivery power in the presentation. Also, there are studies that show that proper feedback on one's presentation has the effect of increasing the presenter's ability to present. In this paper, considering the positive aspects of correction, we developed a program that intelligently corrects the wrong presentation habits and attitudes of college students through facial analysis of videos and analyzed the proposed program's performance. The proposed program was developed through web-based verification of the use of redundant words and facial recognition and textualization of the presentation contents. To this end, an artificial intelligence model for classification was developed, and after extracting the video object, facial feature points were recognized based on the coordinates. Then, using 4000 facial data, the performance of the algorithm in this paper was compared and analyzed with the case of facial recognition using a Teachable Machine. Use the program to help presenters by correcting their presentation attitude.

Analysis of the Effectiveness of Big Data-Based Six Sigma Methodology: Focus on DX SS (빅데이터 기반 6시그마 방법론의 유효성 분석: DX SS를 중심으로)

  • Kim Jung Hyuk;Kim Yoon Ki
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.13 no.1
    • /
    • pp.1-16
    • /
    • 2024
  • Over recent years, 6 Sigma has become a key methodology in manufacturing for quality improvement and cost reduction. However, challenges have arisen due to the difficulty in analyzing large-scale data generated by smart factories and its traditional, formal application. To address these limitations, a big data-based 6 Sigma approach has been developed, integrating the strengths of 6 Sigma and big data analysis, including statistical verification, mathematical optimization, interpretability, and machine learning. Despite its potential, the practical impact of this big data-based 6 Sigma on manufacturing processes and management performance has not been adequately verified, leading to its limited reliability and underutilization in practice. This study investigates the efficiency impact of DX SS, a big data-based 6 Sigma, on manufacturing processes, and identifies key success policies for its effective introduction and implementation in enterprises. The study highlights the importance of involving all executives and employees and researching key success policies, as demonstrated by cases where methodology implementation failed due to incorrect policies. This research aims to assist manufacturing companies in achieving successful outcomes by actively adopting and utilizing the methodologies presented.