• Title/Summary/Keyword: real and formal

Search Result 196, Processing Time 0.03 seconds

Complex number on textbooks and Analysis on understanding state of students (교과서에 표현된 복소수와 이에 대한 학생들의 이해 실태 분석)

  • Park, Seon-Ho;Pyo, Sung-Soo
    • The Mathematical Education
    • /
    • v.51 no.1
    • /
    • pp.1-19
    • /
    • 2012
  • In this study, contents of 'the 2007 revised curriculum handbook' and 16 kinds of mathematics textbooks were analyzed first. The purpose of this study is to examine the understanding state of students at general high schools by making questionnaires to survey the understanding state on contents of chapter of complex number based on above analysis. Results of research can be summarized as follows. First, the content of chapter of complex number in textbook was not logically organized. In the introduction of imaginary number unit, two kinds of marks were presented without any reason and it has led to two kinds of notation of negative square root. There was no explanation of difference between delimiter symbol and operator symbol at all. The concepts were presented as definition without logical explanations. Second, students who learned with textbook in which problems were pointed out above did not have concept of complex number for granted, and recognized it as expansion of operation of set of real numbers. It meant that they were confused of operation of complex numbers and did not form the image about number system itself of complex number. Implications from this study can be obtained as follows. First, as we came over to the 7th curriculum, the contents of chapter of complex number were too abbreviated to have the logical configuration of chapter in order to remove the burden for learning. Therefore, the quantitative expansion and logical configuration fit to the level for high school students corresponding to the formal operating stage are required for correct configuration of contents of chapter. Second, teachers realize the importance of chapter of complex number and reconstruct the contents of chapter to let students think conceptually and logically.

A Sense of Place of Kindergartens as Existential Space in which Children and Teachers Experience (유아와 교사가 경험하는 실존적 공간으로서 유치원의 장소성)

  • Kwon, Sun-Young
    • Journal of Digital Convergence
    • /
    • v.16 no.1
    • /
    • pp.35-45
    • /
    • 2018
  • The purpose of this study is to explore the meaning of place that is formed by children experiencing the space of kindergarten existentially. For this purpose, the indoor and outdoor spaces of kindergarten, which is a real place where infants experience, are selected as the study observation category. In order to carry out the research, video recording was done focusing on children's free choice activity time and outdoor play through infant observation and non - formal interview. As a result of research, it is found that the place nature of kindergarten as an existential space experienced by infant and teacher as a space that is formed in experience and relation, place as a common production space of play, place as a space where education and life coexist, It was shown that it represents a special space created by experienced kindergarten, and a space characteristic as a space shared by communication. The place of kindergarten has a relationship with the existential experiences of infants, suggesting that teachers need a reinterpretation of space.

Development of a Visual Simulation Tool for Object Behavior Chart based on LOTOS Formalism (객체행위챠트를 위한 LOTOS 정형기법 기반 시각적 시뮬레이션 도구의 개발)

  • Lee, Gwang-Yong;O, Yeong-Bae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.5
    • /
    • pp.595-610
    • /
    • 1999
  • This paper presents a visual simulation tool for verification and validation(V&V) of design implications of the Object Behavior Chart developed in accordance with the existing real-time object's behavior design method. This tool can simulates the dynamic interactions using the executable simulation machine, that is EFSM(Extended Finite State Machine) and can detect various logical and temporal errors in the visual object behavior charts before a concrete implementation is made. For this, a LOTOS prototype specification is automatically generated from the visual Object Behavior Chart, and is translated into an EFSM. This system is implemented in Visual C++ version 4.2 and currently runs on PC Windows 95 environment. For simulation purpose, LOTOS was chosen because of it's excellence in specifying communication protocols. Our research contributes to the support tools for seamlessly integrating methodology-based graphical models and formal-based simulation techniques, and also contributes to the automated V&V of the Visual Models.

Verification of Safety in a RFID Security Authentication Protocol Using Session and Public Keys (세션키 및 공개키를 이용한 RFID 보안 인증 프로토콜의 안전성 검증)

  • Bae, Woo Sik;Lee, Jong Yun
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.325-332
    • /
    • 2012
  • Due to its communication vulnerability resulting in a range of problems, e.g. eavesdropping, information exposure, traffic analysis and spoofing, RFID system becomes the target of attackers. Accordingly, many investigators have proposed various protocols to the extent of theorem proving or verification as the implementation is challenging. This paper thus proposes a safe RFID security protocol using public keys, session keys, hashes, XORs, and random numbers. Timestamps and hashes are applied to the most vulnerable section between readers and tags to detect attacks in attack signals with time difference. Also, to prevent tag information from being exposed in the last session, hash operation is adopted before communication. Finally, in this paper, we designed a RFID security protocol using public and session keys applicable to real systems and verified the security of the proposed protocol with a differentiated formal verification technique.

Application of Probabilistic Health Risk Analysis in Life Cycle Assessment -Part I : Life Cycle Assessment for Environmental Load of Chemical Products using Probabilistic Health Risk Analysis : A Case Study (전과정평가에 있어 확률론적 건강영향분석기법 적용 -Part II : 화학제품의 환경부하 전과정평가에 있어 건강영향분석 모의사례연구)

  • Park, Jae-Sung;Choi, Kwang-Soo
    • Journal of Environmental Impact Assessment
    • /
    • v.9 no.3
    • /
    • pp.203-214
    • /
    • 2000
  • Health risk assessment is applied to streamlining LCA(Life Cycle Assessment) using Monte carlo simulation for probabilistic/stochastic exposure and risk distribution analysis caused by data variability and uncertainty. A case study was carried out to find benefits of this application. BTC(Benzene, Trichloroethylene, Carbon tetrachloride mixture alias) personal exposure cases were assumed as production worker(in workplace), manager(in office) and business man(outdoor). These cases were different from occupational retention time and exposure concentration for BTC consumption pattern. The result of cancer risk in these 3 scenario cases were estimated as $1.72E-4{\pm}1.2E+0$(production worker; case A), $9.62E-5{\pm}1.44E-5$(manger; case B), $6.90E-5{\pm}1.16E+0$(business man; case C), respectively. Portions of over acceptable risk 1.00E-4(assumed standard) were 99.85%, 38.89% and 0.61%, respectively. Estimated BTC risk was log-normal pattern, but some of distributions did not have any formal patterns. Except first impact factor(BTC emission quantity), sensitivity analysis showed that main effective factor was retention time in their occupational exposure sites. This case study is a good example to cover that LCA with probabilistic risk analysis tool can supply various significant information such as statistical distribution including personal/environmental exposure level, daily time activity pattern and individual susceptibility. Further research is needed for investigating real data of these input variables and personal exposure concentration and application of this study methodology.

  • PDF

Automatic SDL to Embedded C Code Generation Considering ${\mu}C/OS-II$ OS Environment (${\mu}C/OS-II$ 운영체제환경을 고려한 SDL 명세로부터의 내장형 C 코드 자동 생성)

  • Kwak, Sang-Hoon;Lee, Jeong-Gun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.45-55
    • /
    • 2008
  • Due to the increasing complexity of embedded system design, automatic code generation of embedded software and hardware-software co-design methodologies are gaining great interest from industries and academia. Such an automatic design methodologies are always demanding a formal system specification languages for defining designer's idea clearly and precisely. In this paper, we propose automatic embedded C code generation from SDL (Specification and Description Language, ITU-T recommended the SDL as a standard system description language) with considering a real-time uC/OS-II operating system. Our automatic embedded C code generator is expected to provide a fast specification, verification and performance evaluation platform for embedded software designs.

  • PDF

Design and Specification of a Low-Level Control Software for an FMC Using Supervisory Control Theory

  • Kim, Sang-Kyun;Park, Jong-Hun;Park, Namkyu;Park, Jin-Woo
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.20 no.2
    • /
    • pp.159-178
    • /
    • 1995
  • Supervisory control is an approach based on formal language. it is used to model and control discrete event systems in which each discrete event process is represented as an automation. A supervisor is a generator that switches control patterns in such a way that a given discrete evenet process behaves in obedience to various constraints. A flexible manufacturing cell (FMC) is one of discrete evenet systems. Functions necessary for the operation of an FMC are characterized by operational components and informational compoments. The operational components can be modeled using the finite state machines and the informational components can be modeled using the abstract formalism which describes supporting operations of the cell controller. In this paper, we addressed function required for FMC control specification, software engineering aspects on FMC control based on supervisory control, a concept of event queue for resolving synchronization problem, and complexity reduction. Based on the mathematical model of an FMC. we synthesized the controller by integrating a supervisor for FMC with control specification that specifies event-driven operation of the cell controller. The proposed control scheme is stable mathematically so that the system always behaves on a controlled way even under the existence of uncontrollable events. Furthermore, using an event queue concept, we can solve a synchronization problem caused by the violation of instantaneity assumption of supervisory control theory in real life situation. And also, we can propotype a control software rapidly due to the modularity of the proposed control scheme.

  • PDF

A Process Algebra for Modeling Secure Movements of Distributed Mobile Processes (분산 이동 프로세스 이동의 안전성 모델링을 위한 프로세스 대수)

  • Choe, Yeongbok;Lee, Moonkun
    • Journal of KIISE
    • /
    • v.43 no.3
    • /
    • pp.314-326
    • /
    • 2016
  • Some process algebras were applied to enterprise business modelling for formal specification and verification. ${\pi}$-calculus and mobile ambient can be considered for the distributed and mobile, especially to represent the movements of distributed real-time business processes. However there are some limitations to model the movements: 1) ${\pi}$-calculus passes the name of port for indirect movements, and 2) mobile ambient uses ambient to synchronize asynchronous movements forcefully. As a solution to the limitations, this paper presents a new process algebra, called ${\delta}$-calculus, to specify direct and synchronous movements of business processes over geo-temporal space. Any violation of safety or security of the systems caused by the movements can be indicated by the properties of the movements: synchrony, priority and deadline. A tool, called SAVE, was developed on ADOxx metamodelling platform to demonstrate the concept.

A Process-driven IoT-object Collaboration Model (프로세스 기반 사물인터넷 객체 협업 모델)

  • Ahn, Hyun;Lee, Yongjoon;Kim, Kwanghoon Pio
    • Journal of Internet Computing and Services
    • /
    • v.15 no.5
    • /
    • pp.9-16
    • /
    • 2014
  • In recent years, the importance of IoT (Internet of Things) is emphasized by information communication technologies and the performance of various smart devices are rapidly developed and applied in the real world. In this paper, we propose a process-driven IoT-object collaboration model to specify and execute a IoT service based on processes. That is, the purpose of this paper is to suggest a formal method in order to describe a IoT service into a group of tasks having execution order and collaboration between IoT-objects in charge of the enactment of a task. Conclusively, through the proposed model, we expect that IoT services will be automatically executed, analyzed, monitored and reused in the process-driven IoT computing environment.

Method Decoder for Low-Cost RFID Tags

  • Juels, Ari
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.47-52
    • /
    • 2008
  • A radio-frequency identification(RFID) tag is a small, inexpensive microchip that emits an identifier in response to a query from a nearby reader. The price of these tags promises to drop to the range of $0.05 per unit in the next several years, offering a viable and powerful replacement for barcodes. The challenge in providing security for low-cost RFID tags is that they are computationally weak devices, unable to perform even basic symmetric-key cryptographic operations. Security researchers often therefore assume that good privacy protection in RFID tags is unattainable. In this paper, we explore a notion of minimalist cryptography suitable for RFID tags. We consider the type of security obtainable in RFID devices with a small amount of rewritable memory, but very limited computing capability. Our aim is to show that standard cryptography is not necessary as a starting point for improving security of very weak RFID devices. Our contribution is threefold: 1. We propose a new formal security model for authentication and privacy in RFID tags. This model takes into account the natural computational limitations and the likely attack scenarios for RFID tags in real-world settings. It represents a useful divergence from standard cryptographic security modeling, and thus a new view of practical formalization of minimal security requirements for low-cost RFID-tag security. 2. We describe protocol that provably achieves the properties of authentication and privacy in RFID tags in our proposed model, and in a good practical sense. Our proposed protocol involves no computationally intensive cryptographic operations, and relatively little storage. 3. Of particular practical interest, we describe some reduced-functionality variants of our protocol. We show, for instance, how static pseudonyms may considerably enhance security against eavesdropping in low-cost RFID tags. Our most basic static-pseudonym proposals require virtually no increase in existing RFID tag resources.

  • PDF