• Title/Summary/Keyword: 정형증명

Search Result 79, Processing Time 0.031 seconds

Formal Verification for Business Rule Safety (비즈니스 룰의 안전성을 위한 증명기법)

  • Shin, Yong-Nyuo;Cha, Ree-Seo;Choi, Jin-Young;Bai, Min-O
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.519-522
    • /
    • 2001
  • 바람직한 비즈니스 룰의 기본은 어디에 어떠한 형태로 구현되더라도 유일하고, 일관적인 모델 이여야 한다는 것이다. 또한 비즈니스 룰 자체의 정립은 의사결정 시스템을 사용함으로써 경영 전략이 바뀌어도 시스템 담당자에게 의뢰할 필요 없이 기획자가 바로 코드 값만 변경시키면 기존의 시스템을 그대로 사용할 수 있을 정도의 유연성을 가지게 된 현실에 비추어 볼 때 매우 요원한 일이다. 즉, 비즈니스 룰은 DRM(Digital Rights Management) 시스템뿐만 아니라 e-CRM을 실현하는 모든 시스템에서 사용되며, 이 비즈니스 룰의 충돌로 인해서 시스템의 작동 여부가 결정될 수 있다. 룰 자체가 자연어로 기술되고 언젠가는 모순을 유발할 가능성이 높기 때문에 먼저 명확한 논리식으로 표현하고 LEGO라는 정형기법 도구를 통해 검증하도록 한다.

  • PDF

Scenario-Driven Verification Method for Completeness and Consistency Checking of UML Object-Oriented Analysis Model (UML 객체지향 분석모델의 완전성 및 일관성 진단을 위한 시나리오기반 검증기법)

  • Jo, Jin-Hyeong;Bae, Du-Hwan
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.3
    • /
    • pp.211-223
    • /
    • 2001
  • 본 논문에서 제안하는 시나리오기반 검증기법의 목적은 UML로 작성된 객체지향 분석모델의 완전성 및 일관성을 진단하는 것이다. 검증기법의 전체 절차는 요구분석을 위한 Use Case 모델링 과정에서 생성되는 Use Case 시나리오와 UML 분석모델로부터 역공학적 방법으로 도출된 객체행위 시나리오와의 상호참조과정 및 시나리오 정보트리 추적과정을 이용하여 단계적으로 수행된다. 본 검증절차를 위하여 우선, UML로 작성된 객체지향 분석모델들은 우선 정형명세언어를 사용하여 Use Case 정형명세로 변환하다. 그 다음에, Use Case 정형명세로부터 해당 Use Case 내의 객체의 정적구조를 표현하는 시나리오 정보트리를 구축하고, Use Case 정형명세 내에 포함되어 있는 객체 동적행위 정보인 메시지 순차에 따라 개별 시나리오흐름을 시나리오 정보트리에 표현한다. 마지막으로 시나리오 정보트리 추적과 시나리오 정보 테이블 참조과정을 중심으로 완전성 및 일관성 검증작업을 수행한다. 즉, 검증하고자 하는 해당 Use Case의 시나리오 정보트리를 이용한 시나리오 추적과정을 통해 생성되는 객체행위 시나리오와 요구분석 과정에서 도출되는 Use Case 시나리오와의 일치여부를 조사하여 분석모델과 사용자 요구사양과의 완전성을 검사한다. 그리고, 시나리오 추적과정을 통해 수집되는 시나리오 관련종보들을 가지고 시나리오 정보 테이블을 작성한 후, 분석과정에서 작성된 클래스 관련정보들의 시나리오 포함 여부를 확인하여 분석모델의 일관성을 검사한다. 한편, 본 논문에서 제안하는 검증기법의 효용성을 증명하기 위해 대학의 수강등록시스템 개발을 위해 UML을 이용해 작성된 분석모델을 특정한 사례로써 적용하여 보았다. 프로세싱 오버헤드 및 메모리와 대역폭 요구량 측면에서 MARS 모델보다 유리함을 알 수 있었다.과는 본 논문에서 제안된 프리페칭 기법이 효율적으로 peak bandwidth를 줄일 수 있다는 것을 나타낸다.ore complicate such a prediction. Although these overestimation sources have been attacked in many existing analysis techniques, we cannot find in the literature any description about questions like which one is most important. Thus, in this paper, we quantitatively analyze the impacts of overestimation sources on the accuracy of the worst case timing analysis. Using the results, we can identify dominant overestimation sources that should be analyzed more accurately to get tighter WCET estimations. To make our method independent of any existing analysis techniques, we use simulation based methodology. We have implemented a MIPS R3000 simulator equipped with several switches, each of which determines the accuracy level of the

  • PDF

Diagnosis and Treatment of Brown Tumor (Brown 종양의 진단 및 치료)

  • Cho, Yong Jin;Cho, Yung Min;Na, Seung Min;Jung, Sung-Taek
    • Journal of the Korean Orthopaedic Association
    • /
    • v.55 no.1
    • /
    • pp.54-61
    • /
    • 2020
  • Purpose: Brown tumor is a tumor-like disease that can occur as a linked disease of hyperparathyroidism which can causes osteoporosis, osteitis fibrosa cystica, pathologic fractures. Brown tumor has been reported as a case report, but there is no comprehensive report on the exact diagnosis and principle of management for osseous lesion. The purpose of this study is to report the treatment and results of osseous lesions through 5 cases. Materials and Methods: From February 2004 to May 2015, five cases of Brown tumor were diagnosed in Chosun University Hospital and Chonnam National University Hospital orthopedic department. Medical records and radiographs were reviewed retrospectively. Parathyroid tumors were surgically removed, and surgical treatment and observation were performed for orthopedic osseous lesions. Results: The mean length of the long axis of the symptomatic osseous lesion was 6.2 cm (4.5-9.0 cm). An average of 7.6 (range, 3 to 14) of high uptake osseous lesion showed in whole body bone scan. The absolute value, T-score and Z-score of the vertebrae and proximal femur were adequate for diagnosis of osteoporosis using dual energy X-ray absorptiometry bone mineral density at diagnosis and recovered to normal at the last follow-up. In laboratory tests, serum concentrations of total calcium, ionized calcium, inorganic phosphorus, serum alkaline phosphatase, and parathyroid hormone were helpful to diagnosis and normalized upon successful removal of parathyroid adenoma or cancer. Conclusion: For accurate diagnosis of Brown tumor, it should be accompanied by systemic examination as well as clinical symptoms, laboratory tests and radiologic examination for osseous lesions. And a good prognosis can be expected if the hyperparathyroidism is treated together with the comprehensive treatment of osseous lesions.

Efficacy of Unilateral Biportal Endoscopic Decompression in Lumbar Foraminal Stenosis (요추 추간공 협착증에서 일측성 양방향 내시경적 측부 추간공 감압술의 효과)

  • Lee, Ji-Min;Woo, Young-Ha;Yoo, Seong-Ho;Kim, Young-Jun;Seo, Jin-Hyuk;Bae, Hyuk
    • Journal of the Korean Orthopaedic Association
    • /
    • v.55 no.5
    • /
    • pp.411-417
    • /
    • 2020
  • Purpose: This paper reports the short-term clinical and radiological results of unilateral biportal endoscopic decompression (UBE) to prove its efficacy. Materials and Methods: Twenty patients who received unilateral biportal endoscopic far-lateral decompression (UBEFLD) were analyzed statistically using the visual analogue scale (VAS), modified Macnab criteria and Oswestry Disability Index (ODI) clinically. Radiologically, their intervertebral angle (IVA), percentage slip, disc height index (DHI) and foraminal height index (FHI) were analyzed pre- and postoperatively. Results: The VAS scores were 6.20 preoperatively, which improved to 2.05, 1.75 and 1.45 at postoperative one month, three months and one year, respectively (p<0.001). The modified macnab criteria in both the good or excellent category was 70.0%, 80.0% and 85.0% at postoperative one month, three months and one year, respectively (p=0.034). The ODI improved from 59.8% preoperatively to 35.8%, 33.2%, and 17.1% at postoperative one month, three months, and one year, respectively (p<0.001). The IVA was increased 0.40±0.88 after a surgery (p=0.057). Percentage slip was increased 0.19% after surgery (p=0.134). The DHI changed from 0.49 preoperatively to 0.62 postoperatively (p=0.359), and the FHI changed from 0.71 preoperatively to 0.79 postoperatively (p<0.001). Conclusion: UBEFLD displayed satisfactory results. Such a result highlights the potential of UBEFLD as an excellent alternative to spinal fusion or microscopic surgery.

Symmetric-Invariant Boundary Image Matching Based on Time-Series Data (시계열 데이터 기반의 대칭-불변 윤곽선 이미지 매칭)

  • Lee, Sanghun;Bang, Junsang;Moon, Seongwoo;Moon, Yang-Sae
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.10
    • /
    • pp.431-438
    • /
    • 2015
  • In this paper we address the symmetric-invariant problem in boundary image matching. Supporting symmetric transformation is an important factor in boundary image matching to get more intuitive and more accurate matching results. However, the previous boundary image matching handled rotation transformation only without considering symmetric transformation. In this paper, we propose symmetric-invariant boundary image matching which supports the symmetric transformation as well as the rotation transformation. For this, we define the concept of image symmetry and formally prove that rotation-invariant matching of using a symmetric image always returns the same result for every symmetric angle. For efficient symmetric transformation, we also present how to efficiently extract the symmetric time-series from an image boundary. Finally, we formally prove that our symmetric-invariant matching produces the same result for two approaches: one is using the time-series extracted from the symmetric image; another is using the time-series directly obtained from the original image time-series by symmetric transformation. Experimental results show that the proposed symmetric-invariant boundary image matching obtains more accurate and intuitive results than the previous rotation-invariant boundary image matching. These results mean that our symmetric-invariant solution is an excellent approach that solves the image symmetry problem in time-series domain.

Inter-device Mutual authentication and Formal Verification in M2M Environment (M2M 환경에서 장치간 상호 인증 및 정형검증)

  • Bae, WooSik
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.219-223
    • /
    • 2014
  • In line with the advanced wireless communication technology, M2M (Machine-to-Machine) communication has drawn attention in industry. M2M communication features are installed and operated in the fields where human accessibility is highly limited such as disaster, safety, construction, health and welfare, climate, environment, logistics, culture, defense, medical care, agriculture and stockbreeding. In M2M communication, machine replaces people for automatic communication and countermeasures as part of unmanned information management and machine operation. Wireless M2M inter-device communication is likely to be exposed to intruders' attacks, causing security issues, which warrants proper security measures including cross-authentication of whether devices are legitimate. Therefore, research on multiple security protocols has been conducted. The present study applied SessionKey, HashFunction and Nonce to address security issues in M2M communication and proposed a safe protocol with reinforced security properties. Notably, unlike most previous studies arguing for the security of certain protocols based on mathematical theorem proving, the present study used the formal verification with Casper/FDR to prove the safety of the proposed protocol. In short, the proposed protocol was found to be safe and secure.

Verification of Safety in a RFID Security Authentication Protocol Using Session and Public Keys (세션키 및 공개키를 이용한 RFID 보안 인증 프로토콜의 안전성 검증)

  • Bae, Woo Sik;Lee, Jong Yun
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.325-332
    • /
    • 2012
  • Due to its communication vulnerability resulting in a range of problems, e.g. eavesdropping, information exposure, traffic analysis and spoofing, RFID system becomes the target of attackers. Accordingly, many investigators have proposed various protocols to the extent of theorem proving or verification as the implementation is challenging. This paper thus proposes a safe RFID security protocol using public keys, session keys, hashes, XORs, and random numbers. Timestamps and hashes are applied to the most vulnerable section between readers and tags to detect attacks in attack signals with time difference. Also, to prevent tag information from being exposed in the last session, hash operation is adopted before communication. Finally, in this paper, we designed a RFID security protocol using public and session keys applicable to real systems and verified the security of the proposed protocol with a differentiated formal verification technique.

Process Development to Form Net-Shape Nosing Shells by the Backward Tracing Scheme of the Rigid-Plastic FEM and Its Experimental Confirmation (강-소성 유한요소법의 역추적기법을 이용한 정밀정형 쉘 노우징 부품의 성형공정 개발과 실험적 증명)

  • Kim, Sang-Hyeon;Lee, Jin-Hui;Im, Hak-Jin
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.20 no.7
    • /
    • pp.2118-2133
    • /
    • 1996
  • A preform is designed by the backward tracing scheme of the rigid-plastic finite element method(FEM) for net-shape shell nosing components without machining after forming. The current process of the shell nosing requires cost-consuming machining to produce final products. Here, the backward tracing scheme of the rigid-plastic FEM, a novel method for preform design of metal forming processes, derives a sound preform for net-shape shell nosing product. The current process is simulated by the rigid-plastic finite element analysis to check the metal flow involved in the forming with a trial preform and its modified preform. The two preforms are found to be inadequate for net-shape shell nosing product. The first application of the back ward tracing scheme derives a preform producing a not-shape shell nosing product. The first application of the backward tracing scheme derives a preform producing a net-shape product numerically, but it is difficult to be formed economically as a preform. Thus an improved preform is designed by the badkward tracing scheme, which is suitable for net-shape manufacturing of the shell nosing components in view of economy of production and forming characteristics of the product. The preform in the current process and a modified preform are confirmed by a series of experiments and the results give the same deformation with the numerical ones. Finally the newly designed preform by the FEM was experimentally proved to be adequate in obtaining net-shape products.

Concurrency Control for Global Transaction Management in Integrated Heterogeneous Database System (이질형 통합 데이타베이스 시스템의 전역 트랜잭션을 위한 병행수행 제어기법)

  • Lee, Gyu-Ung
    • The KIPS Transactions:PartD
    • /
    • v.8D no.5
    • /
    • pp.473-482
    • /
    • 2001
  • Integrated heterogeneous database systems provide the unified interface for users and applications today in order to access the underlying diverse data sources located in different sites. The multiple heterogeneous data sources have the different and specialized data structures and transaction processing capabilities. Because of local autonomy, the local system does not have the capability of cooperation to control the global transaction. Hence designing the global transaction manager with supporting the global serializability is difficult task. To resolve the well-known indirect conflict, we define the global transaction model by using the characteristics of global integrity constraints. And then we propose the site-locking operation and its protocol to manage the global transaction. The correctness and analysis of our site-locking protocol is proved and performance gain over the related other methods is also estimated in this paper.

  • PDF

Effects of Taping Therapy on Lower Extremities Discomfort and Fatigue in Nurses (테이핑요법이 간호사의 하지불편감 및 피로에 미치는 효과)

  • Kang, Mi Ae
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.12
    • /
    • pp.491-498
    • /
    • 2021
  • This study is presented as evidence for developing a health education program to prevent lower extermity circulatory system problems among nurses's health problem by identifying the effects of taping therapy on lower extermites discomfort and fatigue for nurses who stand for long periods of time. The study method is a similar experimental study using a nonequivalent control group pretest-posttest design in which taping therapy was applied to female nurses who work day shifts for 5 consecutive days in an orthopedic surgery ward. Data collection was from November 2 to December 18, 2020, and a total of 60 nurses, 30 in the experimental group and 30 in the control group, were recruited from two orthopedic surgery hospitals located in B city. The data were analyzed by chi-square test, t-test and paired t-test using the SPSS WIN 22.0 program. As a result of the study, the experimental group had lower extermities discomfort(t=-1.27, p=<.001) and fatigue score(t=-0.60, p=<.001) than the control group, and it was confirmed that there was a statistically significant effect. It has been proven that taping therapy is a very effective nursing intervention.