• Title/Summary/Keyword: Finite state machine

Search Result 230, Processing Time 0.024 seconds

A Effective Generation of Protocol Test Case Using The Depth-Tree (깊이트리를 이용한 효율적인 프로토콜 시험항목 생성)

  • 허기택;이동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.9
    • /
    • pp.1395-1403
    • /
    • 1993
  • Protocol conformance is crucial to inter-operability and cost effective computer communication. Given a protocol specification, the task of checking whether an inplementation conforms to the specification is called conformance testing. The efficiency and fault coverage of conformance testing are largely dependent on how test cases are chosen. Some states may have more one UIO sequence when the protocol is represented by FSM (Finite State Machine). The length of test sequence can be minimized if the optimal test sequences are chosen. In this paper, we construct the depth-tree to find the maximum overlapping among the test sequence. By using the resulting depth-tree, we generate the minimum-length test sequence. We show the example of the minimum-length test sequence obtained by using the resulting depth-tree.

  • PDF

Design and Implementation of Interoperable Adaptor for Simulators Interoperation using IEEE 1516 HLA/RTI (IEEE 1516 HLA/RTI 기반 연동 시뮬레이션을 위한 연동 어댑터의 설계 및 구현)

  • Hong, Jeong-Hee;Sung, Chang-Ho;Ahn, Jung-Hyun;Kim, Tag-Gon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.1
    • /
    • pp.88-96
    • /
    • 2009
  • Interoperation between heterogeneous simulators employs definition of standard protocols for data exchange and time synchronization among simulators. The High Level Architecture(HLA) is a specification of common services for such interoperation, which is approved as IEEE standard 1516. This paper presents the design and implementation of an interoperable adaptor which supports development of interoperable simulators under the IEEE 1516 HLA/RTI environment. The adaptor, KHLAAdaptor1516, is implemented as a library form which is linked to HLA-compliant simulators. Design of the adaptor employs a protocol conversion method, the model of which is finite state machine. KHLAAdaptor1516 allows developers to separate interoperable adaptors from stand-alone simulators. The interoperable adaptor manages mapping between HLA services and simulation messages for simulator, This separation increases robustness of a federation and reusability of simulators as well as alleviates much effort and time for maintenance.

Test suite generation technique for protocols with nondeterminism (비결정성을 갖는 프로토콜을 위한 시험 스위트 생성방법)

  • 김병식;김우직
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.9
    • /
    • pp.1854-1866
    • /
    • 1997
  • This paper proposes a new test case generation technique for a nondeterministic finite state machine by improving the existing UIO sequence generation method. First, a new conformance relationis defined, which is one of prerequisites for automatic test case generation. Because fof the nondeterministic property of torpocols, the output of the systems under test is not known deterministically to the tester. Therefore, tree-like test case generation method is introduced for adaptive testing, in which the next input is selected after observing the previous output. Since the test cases are generated with regarding the inputs and outputs as separate events and are represented in tree notation, the test cases are easily converted into TTCN, the international standard test suite specification language.

  • PDF

A Primary Permanent-Magnet Linear Motor for Urban Rail Transit

  • Cao, Ruiwu;Cheng, Ming;Mi, Chris;Hua, Wei;Zhao, Wenxiang
    • Journal of international Conference on Electrical Machines and Systems
    • /
    • v.1 no.1
    • /
    • pp.54-60
    • /
    • 2012
  • In this paper, a new permanent-magnet (PM) linear motor is proposed, in which both the magnets and armature windings are placed in the short mover, while the long stator consists of iron core only. Hence, this new PM linear motor can be called a primary permanent-magnet linear motor. It exhibits the advantages of robustness, low cost, high efficiency, high power factor, and high thrust force density. It is especially suitable for long stator applications such as urban rail transit. In this paper, the topology and operation principle of this motor are discussed in detail. The steady-state characteristics including field distributions, flux-linkage, back-EMF, phase inductance and thrust force are investigated. In addition, the technique of skewing stator teeth is adopted to improve the electromagnetic performance. Results from finite element method (FEM) verified the theoretical analysis results.

Road Surface Marking Detection for Sensor Fusion-based Positioning System (센서 융합 기반 정밀 측위를 위한 노면 표시 검출)

  • Kim, Dongsuk;Jung, Hogi
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.22 no.7
    • /
    • pp.107-116
    • /
    • 2014
  • This paper presents camera-based road surface marking detection methods suited to sensor fusion-based positioning system that consists of low-cost GPS (Global Positioning System), INS (Inertial Navigation System), EDM (Extended Digital Map), and vision system. The proposed vision system consists of two parts: lane marking detection and RSM (Road Surface Marking) detection. The lane marking detection provides ROIs (Region of Interest) that are highly likely to contain RSM. The RSM detection generates candidates in the regions and classifies their types. The proposed system focuses on detecting RSM without false detections and performing real time operation. In order to ensure real time operation, the gating varies for lane marking detection and changes detection methods according to the FSM (Finite State Machine) about the driving situation. Also, a single template matching is used to extract features for both lane marking detection and RSM detection, and it is efficiently implemented by horizontal integral image. Further, multiple step verification is performed to minimize false detections.

Deformation analyses during subway shield excavation considering stiffness influences of underground structures

  • Zhang, Zhi-guo;Zhao, Qi-hua;Zhang, Meng-xi
    • Geomechanics and Engineering
    • /
    • v.11 no.1
    • /
    • pp.117-139
    • /
    • 2016
  • Previous studies for soil movements induced by tunneling have primarily focused on the free soil displacements. However, the stiffness of existing structures is expected to alter tunneling-induced ground movements, the sheltering influences for underground structures should be included. Furthermore, minimal attention has been given to the settings for the shield machine's operation parameters during the process of tunnels crossing above and below existing tunnels. Based on the Shanghai railway project, the soil movements induced by an earth pressure balance (EPB) shield considering the sheltering effects of existing tunnels are presented by the simplified theoretical method, the three-dimensional finite element (3D FE) simulation method, and the in-situ monitoring method. The deformation prediction of existing tunnels during complex traversing process is also presented. In addition, the deformation controlling safety measurements are carried out simultaneously to obtain the settings for the shield propulsion parameters, including earth pressure for cutting open, synchronized grouting, propulsion speed, and cutter head torque. It appears that the sheltering effects of underground structures have a great influence on ground movements caused by tunneling. The error obtained by the previous simplified methods based on the free soil displacements cannot be dismissed when encountering many existing structures.

Two-Pathway Model for Enhancement of Protocol Reverse Engineering

  • Goo, Young-Hoon;Shim, Kyu-Seok;Baek, Ui-Jun;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4310-4330
    • /
    • 2020
  • With the continuous emergence of new applications and cyberattacks and their frequent updates, the need for automatic protocol reverse engineering is gaining recognition. Although several methods for automatic protocol reverse engineering have been proposed, each method still faces major limitations in extracting clear specifications and in its universal application. In order to overcome such limitations, we propose an automatic protocol reverse engineering method using a two-pathway model based on a contiguous sequential pattern (CSP) algorithm. By using this model, the method can infer both command-oriented protocols and non-command-oriented protocols clearly and in detail. The proposed method infers all the key elements of the protocol, which are syntax, semantics, and finite state machine (FSM), and extracts clear syntax by defining fine-grained field types and three types of format: field format, message format, and flow format. We evaluated the efficacy of the proposed method over two non-command-oriented protocols and three command-oriented protocols: the former are HTTP and DNS, and the latter are FTP, SMTP, and POP3. The experimental results show that this method can reverse engineer with high coverage and correctness rates, more than 98.5% and 99.1% respectively, and be general for both command-oriented and non-command-oriented protocols.

Analysis of hash functions based on cellular automata (셀룰러 오토마타 기반 해쉬 함수 분석)

  • Jeong Kitae;Lee Jesang;Chang Donghoon;Sung Jaechul;Lee Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.111-123
    • /
    • 2004
  • A hash function is a function that takes bit strings of arbitrary length to bit string of fixed length. A cellular automata is a finite state machine and has the property of generating pseudorandom numbers efficiently by combinational logics of neighbour cells. In [1] and [7], hash functions based on cellular automata which can be implemented efficiently in hardware were proposed. In this paper, we show that we can find collisions of these hash functions with probability 0.46875 and 0.5 respectively.

Test Case Generation Method of a Service using Message Flow (메시지 흐름을 이용한 서비스의 테스트 케이스 생성 기법)

  • Lee, SeungHoon;Kang, DongSu;Song, Chee-Yang;Baik, Doo-Kwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.420-423
    • /
    • 2009
  • SOA는 최근 급부상한 패러다임으로 개발단위의 상태 변화가 사라지고, 데이터 흐름 중심이 아닌 메시지 흐름 중심으로 변하는 등의 기존 전통적 개발방법들과 차이점을 가지고 있다. 이러한 변화는 상태 변화를 표기하는 FSM(Finite State Machine)을 사용할 수 없다는 문제점을 가져왔고, 따라서 새로운 테스트 케이스 생성방법이 필요하게 되었다. 본 논문에서는 이러한 문제점을 해결하기 위해 메시지 흐름을 이용하여 서비스의 테스트 케이스를 생성하는 기법을 제안한다. BPM(Business Process Modeling)을 사용하여 단순한 그래프로 만들고 기존의 단순 비순환 그래프를 만드는 기법을 적용하여 테스트 시퀀스를 만든다. 그리고 테스트 시퀀스마다 순차 다이어그램을 만들고 메시지 흐름을 추출하여 테스트 케이스를 완성한다. 이 기법을 통해 웹서비스 뿐만 아니라 일반적인 서비스에 대한 테스트 케이스 생성을 가능하게 하며, 모델링 재사용을 통해 테스트 케이스 생성에 소요되는 추가 비용을 감소 시킬 수 있다.

A vibration-based approach for detecting arch dam damage using RBF neural networks and Jaya algorithms

  • Ali Zar;Zahoor Hussain;Muhammad Akbar;Bassam A. Tayeh;Zhibin Lin
    • Smart Structures and Systems
    • /
    • v.32 no.5
    • /
    • pp.319-338
    • /
    • 2023
  • The study presents a new hybrid data-driven method by combining radial basis functions neural networks (RBF-NN) with the Jaya algorithm (JA) to provide effective structural health monitoring of arch dams. The novelty of this approach lies in that only one user-defined parameter is required and thus can increase its effectiveness and efficiency, as compared to other machine learning techniques that often require processing a large amount of training and testing model parameters and hyper-parameters, with high time-consuming. This approach seeks rapid damage detection in arch dams under dynamic conditions, to prevent potential disasters, by utilizing the RBF-NNN to seamlessly integrate the dynamic elastic modulus (DEM) and modal parameters (such as natural frequency and mode shape) as damage indicators. To determine the dynamic characteristics of the arch dam, the JA sequentially optimizes an objective function rooted in vibration-based data sets. Two case studies of hyperbolic concrete arch dams were carefully designed using finite element simulation to demonstrate the effectiveness of the RBF-NN model, in conjunction with the Jaya algorithm. The testing results demonstrated that the proposed methods could exhibit significant computational time-savings, while effectively detecting damage in arch dam structures with complex nonlinearities. Furthermore, despite training data contaminated with a high level of noise, the RBF-NN and JA fusion remained the robustness, with high accuracy.