• Title/Summary/Keyword: formalism

Search Result 404, Processing Time 0.022 seconds

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

A Review of Organ Dose Calculation Methods and Tools for Patients Undergoing Diagnostic Nuclear Medicine Procedures

  • Choonsik Lee
    • Journal of Radiation Protection and Research
    • /
    • v.49 no.1
    • /
    • pp.1-18
    • /
    • 2024
  • Exponential growth has been observed in nuclear medicine procedures worldwide in the past decades. The considerable increase is attributed to the advance of positron emission tomography and single photon emission computed tomography, as well as the introduction of new radiopharmaceuticals. Although nuclear medicine procedures provide undisputable diagnostic and therapeutic benefits to patients, the substantial increase in radiation exposure to nuclear medicine patients raises concerns about potential adverse health effects and calls for the urgent need to monitor exposure levels. In the current article, model-based internal dosimetry methods were reviewed, focusing on Medical Internal Radiation Dose (MIRD) formalism, biokinetic data, human anatomy models (stylized, voxel, and hybrid computational human phantoms), and energy spectrum data of radionuclides. Key results from many articles on nuclear medicine dosimetry and comparisons of dosimetry quantities based on different types of human anatomy models were summarized. Key characteristics of seven model-based dose calculation tools were tabulated and discussed, including dose quantities, computational human phantoms used for dose calculations, decay data for radionuclides, biokinetic data, and user interface. Lastly, future research needs in nuclear medicine dosimetry were discussed. Model-based internal dosimetry methods were reviewed focusing on MIRD formalism, biokinetic data, human anatomy models, and energy spectrum data of radionuclides. Future research should focus on updating biokinetic data, revising energy transfer quantities for alimentary and gastrointestinal tracts, accounting for body size in nuclear medicine dosimetry, and recalculating dose coefficients based on the latest biokinetic and energy transfer data.

INVESTIGATION OF WAVES PROPAGATING IN ISOTHERMAL PLASMA AROUND DE SITTER BLACK HOLE

  • Hasan, M. Khayrul;Ali, M. Hossain
    • Journal of The Korean Astronomical Society
    • /
    • v.42 no.5
    • /
    • pp.107-123
    • /
    • 2009
  • We investigate the wave properties for isothermal plasma state around to the de Sitter black hole's horizon using 3+1 split of spacetime. The corresponding Fourier analyzed perturbed perfect GRMHD equations are used to obtain the complex dispersion relations. We obtain the real values of the wave number k, from these relations, which are used to evaluate the quantities like phase and group velocities etc. These have been analyzed graphically in the neighborhood of the horizon.

The Formalism of Object-Oriented EA Model (객체 중심 측면 모델의 형식론)

  • 오선영;백두권
    • Proceedings of the Korea Database Society Conference
    • /
    • 1994.09a
    • /
    • pp.235-253
    • /
    • 1994
  • 기존의 데이타 모델 및 설계 방법론들은 실세계의 데이타 객체에 대해 고정된 한 측면의 모델 표현만을 허용하기 때문에 여러 측면으로 관측이 가능한 실세계 객체들의 표현에 어려움을 갖는다. 본 논문에서는 객체의 측면 개념을 제공하는 객체 중심 측면 모델(OOAM : Object-Oriented EA Model)의 기본 개념을 보여주고 OOAM에 의해 구축되는 데이타베이스 스키마의 시맨틱을 분석하고 서술하기 위해 OOAM을 형식적으로 정의하였다. 먼저 데이타베이스 설계 과정에서 필요한 공리들을 설정하고 OOAM을 intension과 extension으로 각각 정의한 후 그들 사이의 관계를 정의하였다.

  • PDF

A Framework for Intelligent Data Interpretation System in Organizational Computing

  • Jung, Chul-Yong
    • Korean Management Science Review
    • /
    • v.15 no.2
    • /
    • pp.177-200
    • /
    • 1998
  • One of organization's generic functions is the interpretation of events to carry out decision-making activities. In intelligent Data Interpretation System(IDIS), Interpreting is computationally modeled as classification of new data into categories having similar features. We define the Extensional Object Model(ExOM) as a formalism for IDIS. In ExOM, objects and categories are loosely coupled to provide flexibility for both object description and category definition in data gathering and interpretation process. Objects are classified inductively based on exemplars of categories as well as deductively based on category structures.

  • PDF

A Survey on Formal Verification Methods (소프트웨어 신뢰성 향상을 위한 정형기법)

  • 주운기;이충호;김중배
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2003.11a
    • /
    • pp.297-300
    • /
    • 2003
  • This paper considers formal verification methods for enhancing software reliability. The formal method verifies that a software is correctly implemented according to its specification by using a mathematical formalism. This paper presents a partial survey on the formal methods and discusses possible applications for the improved software implementation. Finally, some topics are remarked as further studies.

  • PDF

FLUORESCENCE DEPOLARIZATION IN DIFFERENT MOLECULAR SYSTEMS

  • Kim, Hack-Jin;Kang, Tai-Jong
    • Journal of Photoscience
    • /
    • v.1 no.1
    • /
    • pp.75-82
    • /
    • 1994
  • General features of the fluorescence depolarization are briefly reviewed. Molecular rotations and electronic excitation transports are considered to account for the fluorescence depolarization. Various molecular systems studied by the fluorescence depolarization are described. The FiSrster theory which forms a basis for the energy transfer is revisited. Several theoretical treatments for the fluorescence depolarization in liquid and solid phases such as classical hydrodynamics, probability distribution function, Green's function formalism, molecular dynamics simulation and Monte Carlo methods are introduced.

  • PDF

Proof in Mathematics Education

  • Lee, Joong-Kwoen
    • Research in Mathematical Education
    • /
    • v.7 no.1
    • /
    • pp.1-10
    • /
    • 2003
  • This research reviewed literatures on proof in mathematics education. Several views of proof can be classified (and identified) such as psychological approach (Platonism, empiricism), structural approach (logicism, formalism, intuitionism) and social approach (ontology, axiomatic systems). All these views of proof are valuable in mathematics education society. The concept of proof can be found in the form of analytic knowledge not of constructive knowledge. Human beings developed their knowledge in the sequence of constructive knowledge to analytic knowledge. Therefore, in mathematics education, the curriculum of mathematics should involve the process of cognitive knowledge development.

  • PDF

Soft computing with neural networks for engineering applications: Fundamental issues and adaptive approaches

  • Ghaboussi, Jamshid;Wu, Xiping
    • Structural Engineering and Mechanics
    • /
    • v.6 no.8
    • /
    • pp.955-969
    • /
    • 1998
  • Engineering problems are inherently imprecision tolerant. Biologically inspired soft computing methods are emerging as ideal tools for constructing intelligent engineering systems which employ approximate reasoning and exhibit imprecision tolerance. They also offer built-in mechanisms for dealing with uncertainty. The fundamental issues associated with engineering applications of the emerging soft computing methods are discussed, with emphasis on neural networks. A formalism for neural network representation is presented and recent developments on adaptive modeling of neural networks, specifically nested adaptive neural networks for constitutive modeling are discussed.