• Title/Summary/Keyword: Model-checking

Search Result 569, Processing Time 0.023 seconds

Requirements Redundancy and Inconsistency Analysis for Use Case Modeling (유스케이스 모델링을 위한 요구사항 중복 및 불일치 분석)

  • 최진재;황선영
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.7
    • /
    • pp.869-882
    • /
    • 2004
  • This paper proposes an effective method to create logically consistent and structured requirement model by applying consistency control approach of the formal method to the use-case modeling. This method integrates the multi-perspective scattered requirement segments that may overlap and conflict each other into a structured requirement model. The model structure can be analyzed based on context goal and concerned area overlap analysis. The model consistency can be achieved by using specification overlap-based consistency checking method as an integration vehicle. An experimental application to case study shows that the Proposed method can successfully identify requirement overlaps and inconsistency. It can also transfer multi-viewpoint requirement segments into a consistently integrated use-case model to clarify software behaviors and functionality This method helps users to enhance capability to identify specification inconsistency in the use-case modeling at the early stage of software engineering development. The proposed approach can also facilitate communication between users and developers to ensure customer satisfaction.

Performance Evaluation of DiffServ Networks Considering Self-Similar Traffic Characteristics (자기유사 트래픽 특성을 고려한 차등서비스 망의 성능 평가)

  • Park, Jeong-Sook;Jeon, Yong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.344-355
    • /
    • 2008
  • In this paper, we are dealing with the problems of performance evaluation of Differentiated Services(DiffServ) networks. For successful performance evaluation, the ability to accurately represent "real" traffic on the network by suitable traffic models is an essential ingredient. Many research results on the nature of real traffic measurements demonstrated LRD(long-range dependence) property for the Internet traffic including Web, TELNET, and P2P traffic. The LRD can be effectively represented by self-similarity. In this paper, we design and implement self-similar traffic generator using the aggregated On/Off source model, based on the analysis of the On-Off source model, FFT-FGN(Fast Fourier Transform-Fractional Gaussian Noise) model, and RMD(Random Midpoint Displacement) model. We confirmed the self-similarity of our generated traffic by checking the packet inter-arrival time of TCPdump data. Further we applied the implemented traffic generator to the performance evaluation of DiffServ networks and observed the effect of performance to the a value of the On/Off model, and performance of EF/BE class traffic by CBQ.

A Study on Social Intuitionist Model of Haidt in Mathematical Problem Solving (수학문제해결 측면에서의 Haidt의 사회적 직관주의 모델에 관한 고찰)

  • Choi, Kyounga;Kang, Moonbong
    • Journal of Educational Research in Mathematics
    • /
    • v.26 no.3
    • /
    • pp.565-581
    • /
    • 2016
  • Intuition in the mathematical problem solving has been stressed the importance with the logic because intuition is the cognition that give significant clue or idea to problem solving. Fischbein classified intuition by the origin; primary intuition and secondary intuition And he said the role of the personal experience and school education. Through these precedent research, we can understand the social influence. This study attempt to investigate social intuition model of Haidt, moral psychologist that has surfaced social property of intuition in terms of the mathematical problem solving. The major suggestions in problem solving and the education of intuition are followed. First, I can find the social property of intuition in the mathematical problem solving. Second, It is possible to make the mathematical problem solving model by transforming the social intuitionist model. Third, the role of teacher is important to give the meaningful experience for intuition to their students. Fourth, for reducing the errors caused by the coerciveness and globality of intuition, we need the education of checking their own intuition. In other words, we need intuition education emphasized on metacognition.

A Study on the Method of Checking the Level of Information Security Management Using Security Maturity Model (보안성숙도 모델을 활용한 정보보호 관리수준 점검방법에 관한 연구)

  • Lee, Sang-kyu;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1585-1594
    • /
    • 2018
  • In recent years The importance of information security management for securing information collection and analysis, production and distribution is increasing. Companies are assured of confidence in information security through authentication of information Security Management System. However, level assessment and use of domains that make up the management system is limited. On the other hand, the security maturity model is able to diagnose the level of information protection of the enterprise step by step. It is also possible to judge the area to be improved urgently. It is a tool to support goal setting according to the characteristics and level of company. In this paper, C2M2, which is an example of security maturity model, is compared and analyzed with Korea Information Security Management System certification. Benchmark the model to check the level of information security management and derive the priority among the items that constitute the detailed area of information security measures of ISMS certification. It also look at ways to check the level of information security management step by step.

IIoT processing analysis model for improving efficiency and processing time through characteristic analysis by production product (생산제품별 특성 분석을 통한 효율성 및 처리시간 향상을 위한 IIoT 처리 분석 모델)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.397-404
    • /
    • 2022
  • Recently, in the industrial field, various studies are being conducted on converging IIoT devices that combine low-power processes and network cards into industrial sites to improve production efficiency and reduce costs. In this paper, we propose a processing model that can efficiently manage products produced by attaching IIoT sensor information to infrastructure built in industrial sites. The proposed model creates production data using IIoT data collection, preprocessing, characteristic generation, and labels to detect abnormally processed sensing information in real time by checking sensing information of products produced by IIoT at regular intervals. In particular, the proposed model can easily process IIoT data by performing tracking and monitoring so that product information produced in industrial sites can be processed in real time. In addition, since the proposed model is operated based on the existing production environment, the connection with the existing system is smooth.

A Modeling Methodology for Analysis of Dynamic Systems Using Heuristic Search and Design of Interface for CRM (휴리스틱 탐색을 통한 동적시스템 분석을 위한 모델링 방법과 CRM 위한 인터페이스 설계)

  • Jeon, Jin-Ho;Lee, Gye-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.179-187
    • /
    • 2009
  • Most real world systems contain a series of dynamic and complex phenomena. One of common methods to understand these systems is to build a model and analyze the behavior of them. A two-step methodology comprised of clustering and then model creation is proposed for the analysis on time series data. An interface is designed for CRM(Customer Relationship Management) that provides user with 1:1 customized information using system modeling. It was confirmed from experiments that better clustering would be derived from model based approach than similarity based one. Clustering is followed by model creation over the clustered groups, by which future direction of time series data movement could be predicted. The effectiveness of the method was validated by checking how similarly predicted values from the models move together with real data such as stock prices.

The Assessment Model of the Embedded Software Process Suitable for Korean Defense Industry (국방사업 특성을 고려한 무기체계 임베디드 소프트웨어 프로세스 평가모델(MND-ESPAM))

  • Kwon, Kyeong-Yong;Yang, Hae-Sul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.271-281
    • /
    • 2009
  • In this paper, we propose the enhanced Assessment Model of the Embedded Software Process(MND-ESPAM) which is suitable for the development work of weapons in Korea. In 2008. We developed the MND-ESPAM which is the assessment criteria of software process, but this model is inefficient to apply to Korean military area. Therefore, we elicit and analyze the problems of MND-ESPAM through tow methods. One is to research on the actual condition of the domestic defense industry about software process management. And the other is to apply MND-ESPAM to the defense companies acquiring CMMI level. In order to overcome these problems elicited above, we provide solutions to make MND-ESPAM linked with Software Development Process Guide of Defense Acquisition Program Administration(DAPA) and to systematically strengthen testing activities and to reduce the number of process areas. The proposed model was proved by two objective methods such as checking the coverage with CMMI and whether it is satisfied or not by modified requirements ISO/IEC 14598-3. At last, experts in the field of software process confirmed the effect of MND-ESPAM through applying MND-ESPAM to the defense industry company.

A Study on the Effect of the Document Summarization Technique on the Fake News Detection Model (문서 요약 기법이 가짜 뉴스 탐지 모형에 미치는 영향에 관한 연구)

  • Shim, Jae-Seung;Won, Ha-Ram;Ahn, Hyunchul
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.3
    • /
    • pp.201-220
    • /
    • 2019
  • Fake news has emerged as a significant issue over the last few years, igniting discussions and research on how to solve this problem. In particular, studies on automated fact-checking and fake news detection using artificial intelligence and text analysis techniques have drawn attention. Fake news detection research entails a form of document classification; thus, document classification techniques have been widely used in this type of research. However, document summarization techniques have been inconspicuous in this field. At the same time, automatic news summarization services have become popular, and a recent study found that the use of news summarized through abstractive summarization has strengthened the predictive performance of fake news detection models. Therefore, the need to study the integration of document summarization technology in the domestic news data environment has become evident. In order to examine the effect of extractive summarization on the fake news detection model, we first summarized news articles through extractive summarization. Second, we created a summarized news-based detection model. Finally, we compared our model with the full-text-based detection model. The study found that BPN(Back Propagation Neural Network) and SVM(Support Vector Machine) did not exhibit a large difference in performance; however, for DT(Decision Tree), the full-text-based model demonstrated a somewhat better performance. In the case of LR(Logistic Regression), our model exhibited the superior performance. Nonetheless, the results did not show a statistically significant difference between our model and the full-text-based model. Therefore, when the summary is applied, at least the core information of the fake news is preserved, and the LR-based model can confirm the possibility of performance improvement. This study features an experimental application of extractive summarization in fake news detection research by employing various machine-learning algorithms. The study's limitations are, essentially, the relatively small amount of data and the lack of comparison between various summarization technologies. Therefore, an in-depth analysis that applies various analytical techniques to a larger data volume would be helpful in the future.

Synthesizable Interface Verification for Hardware/Software Co-verification (하드웨어/소프트웨어 동시검증을 위한 합성 가능한 인터페이스 검증 기법)

  • Lee, Jae-Ho;Han, Tai-Sook;Yun, Jeong-Han
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.4
    • /
    • pp.323-339
    • /
    • 2010
  • The complexity of embedded systems and the effort to develop them has been rising in proportion with their importance. Also, the heterogeneity of the hardware and software parts in embedded systems makes it more challenging to develop. Errors caused by hardware/software interfaces, especially, account for up to 13 percent of failures with an increasing trend. Therefore, verifying the interface between hardware and software in embedded system is one of the most important research areas. However, current approaches such as co-simulation method and model checking have explicit limitations. In this paper, we propose the synthesizable interface co-verification framework for hardware/software co-design. Firstly, we introduce the separate interface specifications for the heterogeneous components to describe hardware design and software design. Our specifications are expressive enough to describe both. We also provide the transformation rules from the software specification to the hardware specification so that the whole system can be described from the software view. Secondly, we address the solution of verifying the interface of the software and hardware design by adopting and extending existing verification-techniques and extending them. In hardware interface verification, we exploit the model checking technique and provide more efficient verification by closing the hardware design from the assumption of the software behavior which is ensured by software verification step. Lastly, we generate the interface codes such as device APIs, device driver, and device controller from the specification so that verified hardware and software codes can be synthesized without extra efforts.

Development of Hybrid Career Coaching Model and Effect Analysis (하이브리드 진로코칭 모형 개발 및 효과분석)

  • Go, Eun-Hyeon;Park, Hye-Rim;Kim, Do-Hyeon
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.6
    • /
    • pp.43-51
    • /
    • 2015
  • In this paper, we develops the hybrid career coaching model combined the face to face and the E-coaching, and applies students of childhood education for career guidance. The presented hybrid career coaching manages a profile and state information and a remote access between the coach and coachee on Internet. Then, online part of hybrid coaching deals with saving the data, and understand of the situation of the coachee if it is necessary. And face to face part of hybrid coaching have a conversation, the checking, counsel and introspection if the coach needs. Presented hybrid career coaching model has th procedure of 6 steps such like career coaching guidance, self-understanding, career decision-making, establishment of the career execution planning, execution plan and action will inspection and execution result inspection. Proposed hybrid career coaching is possible to understand coachee's current state on the career map, realize the importance of the execution strategy and maximize the efficiency and effectiveness self-regulation capacity.