• Title/Summary/Keyword: Model-checking

Search Result 569, Processing Time 0.024 seconds

Optimal Measuring Point Selection Method of Indoor Temperature using CFD Analysis (CFD 해석을 이용한 실내 온도 최적 측정 위치 선정 방법)

  • Lee, Min-Goo;Jung, Kyung-Kwon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.7
    • /
    • pp.1559-1566
    • /
    • 2012
  • This paper proposed the method to find out the optimal sensing point of temperature in test-bed with the sensor of temperature, such as real residence. We selected optimal locations by checking temperature change which was simulated by the means of CFD (Computational Fluid Dynamics) and the variation of air flow. We made 3-dimensional model of the testbed using DesignBuilder software, and ran the CFD. We selected the optimum temperature measurement location of 1.5 m height from the floor and low temperature variation. The experiments were conducted 30 temperature and humidity sensors in real place. After that, we confirmed the results of temperature change.

Identification of Feasible Scaled Teleoperation Region Based on Scaling Factors and Sampling Rates

  • Hwang, Dal-Yeon;Blake Hannaford;Park, Hyoukryeol
    • Journal of Mechanical Science and Technology
    • /
    • v.15 no.1
    • /
    • pp.1-9
    • /
    • 2001
  • The recent spread of scaled telemanipulation into microsurgery and the nano-world increasingly requires the identification of the possible operation region as a main system specification. A teleoperation system is a complex cascaded system since the human operator, master, slave, and communication are involved bilaterally. Hence, a small time delay inside a master and slave system can be critical to the overall system stability even without communication time delay. In this paper we derive an upper bound of the scaling product of position and force by using Llewellyns unconditional stability. This bound can be used for checking the validity of the designed bilateral controller. Time delay from the sample and hold of computer control and its effects on stability of scaled teleoperation are modeled and simulated based on the transfer function of the teleoperation system. The feasible operation region in terms of position and force scaling decreases sharply as the sampling rate decreases and time delays inside the master and slave increase.

  • PDF

Clinical Decision Making Development of Clinical Physical Therapists under the Fee for Service and the Prescription of Physician

  • Lee, In-Hee;Lee, Hye Young
    • The Journal of Korean Physical Therapy
    • /
    • v.24 no.3
    • /
    • pp.171-180
    • /
    • 2012
  • Purpose: The purpose of this study was to investigate the clinical decision making (CDM) development process throughout the comparison between novice and expert physical therapist as well as develop a CDM model for physical therapists under the fee-for-service (FFS) and physicians' prescriptions. Methods: Purposive sampling techniques were used to select 10 clinical physical therapists paired into five groups (each pair consisted of 1 novice and 1 expert physical therapist). The coding schemes were extracted from interviews and through within- and across-case analyses, cases were summarized. The reliability of coding schemes was confirmed by checking of case summaries by the participants. Results: Novice and expert physical therapists were influenced by two themes, internalized theme and external forces or information. Novice clinicians depended more on external forces or information. Although clinicians should care patients under the FFS and physician's prescription, expert clinicians were more likely to rely on internalized knowledge. Conclusion: The findings of the present study may be used by educators or association officials enhance CDM abilities and knowledge pools of student or novices as well as develop a guide to suitable novices or students under the specific context limiting the development of their CDM.

Performance Analysis on Income Generation Works in Comprehensive Rural Village Development Project by Their Implementation (농촌마을종합개발사업의 공동소득사업 성과분석)

  • Yang, Won-Sik;Choi, Soo-Myung
    • Journal of Korean Society of Rural Planning
    • /
    • v.19 no.1
    • /
    • pp.55-70
    • /
    • 2013
  • Since 2004, Ministry for Food, Agriculture, Forestry and Fisheries(MIFAFF) has been carrying out comprehensive rural village development project as the core one of Rural Area Development Schemes in Korea. Up to now, 56 projects had been completed after having with 5-year plan implementation period, on which it is possible to try post-project evaluation works. This study aims to propose a rational income-generation works model of comprehensive rural village development project, based on fulfillment checking results of their statutory stepwise working procedures specified in the project guidelines and their interim/post project performance analysis results in 56 project areas above mentioned. In comprehensive rural village development project, income-generation works generally have both quantitative and qualitative effects to rural communities; the former is focussed on income increasement of villagers, while the latter on community revitalization through job creation and spill-over effects of other linked community activities. So, the research works of this study focussed on these two comprehensive effects above mentioned.

RPFuzzer: A Framework for Discovering Router Protocols Vulnerabilities Based on Fuzzing

  • Wang, Zhiqiang;Zhang, Yuqing;Liu, Qixu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.1989-2009
    • /
    • 2013
  • How to discover router vulnerabilities effectively and automatically is a critical problem to ensure network and information security. Previous research on router security is mostly about the technology of exploiting known flaws of routers. Fuzzing is a famous automated vulnerability finding technology; however, traditional Fuzzing tools are designed for testing network applications or other software. These tools are not or partly not suitable for testing routers. This paper designs a framework of discovering router protocol vulnerabilities, and proposes a mathematical model Two-stage Fuzzing Test Cases Generator(TFTCG) that improves previous methods to generate test cases. We have developed a tool called RPFuzzer based on TFTCG. RPFuzzer monitors routers by sending normal packets, keeping watch on CPU utilization and checking system logs, which can detect DoS, router reboot and so on. RPFuzzer' debugger based on modified Dynamips, which can record register values when an exception occurs. Finally, we experiment on the SNMP protocol, find 8 vulnerabilities, of which there are five unreleased vulnerabilities. The experiment has proved the effectiveness of RPFuzzer.

A CASA-Based Dynamic Access Control Scheme for Ubiquitous Environments (유비쿼터스 환경을 위한 CASA 기반의 동적 접근 제어 기법)

  • Kim, Kyoung-Ja;Chang, Tae-Mu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.4
    • /
    • pp.205-211
    • /
    • 2008
  • Conventional context-aware service models permit the access of resources only by user authentication, but the ubiquitous environments where the context information around users is changing frequently require the resource access control according to the rapid changes. This paper proposes a scheme to control access permission of resource dynamically as context information of user changes. Our access control model is based on traditional CASA (Context-Aware Security Architecture), but can restrict the access of the user already has been authorized. With the real-time checking of context information, our scheme gives different access controls according to changes in environmental information, and provides more secure services than conventional context-aware models.

  • PDF

A Study on the Relationship between Primary Dysmenorrhea and Pulse Energy Measured by 3D Blood Pressure Pulse Analyzer (원발성 월경곤란증과 맥의 관련성 연구)

  • Lee, Ji-Yeon;Yoon, Young-Jin
    • The Journal of Korean Obstetrics and Gynecology
    • /
    • v.28 no.4
    • /
    • pp.31-45
    • /
    • 2015
  • Objectives : The purpose of this study is to examine the relationship between the symptoms of primary dysmenorrhea and pulse energy of Chon, Gwan and Cheok. Methods The subjects of this study who had certain range of dysmenorrhea symptom. The degree of dysmenorrhea were assessed by Visual Analog Scale (VAS), Multidimensional Verbal Rating Scale (MVRS), Cox Menstrual Symptom Scale (CMSS) and measured by 3D Blood Pressure Pulse Analyzer(3D-MAC) tests at menstruation start date. Data analysis included descriptive statistics and multiple linear regression using the SPSS/WIN 18.0 program. Results : The induced results are as follows;The induced results are as follows 1. There were no significant relationship between the pulse energy and the sum values of VAS, MVRS and checking part of severity of CMSS. 2. The frequency domain of CMSS were significantly associated with pulse energy. 3. In linear regression models, the model of Left Chon had the especially highest value of explanatory power. (R 2 = 0.517) Conclusions : The pulse energy changes are related to the symptoms of primary dysmenorrhea.

ID-based signcryption with improved security (안전성을 보완한 ID기반 signcryption 기법)

  • Kwak Byeong-Ok;Jeong Yoon-Su;Lee Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.239-251
    • /
    • 2006
  • Zheng's signcryption scheme is a new encryptical scheme of which can save more expense than those of the current signature encryption by using digital signature and symmetric key encryption logically. The current signcryption schemes have a problem that is to be exposed the secret key of the receiver in the case of checking repudiation of origin by the third party. To solve this problem, a solution suggested in this paper is to use multi-purpose ID-based signcryption scheme with anonymity and unlinkability. This solution is safe and more efficient than current signcryption schemes because the suggested scheme keeps the security of the random oracle model as using Weil-pairing in encryption. and follows a formal proof of semantic security of the decisional Diffie-Hellman problem.

  • PDF

Extracting Subsequence of Boolean Variables using SAT-solver (만족가능성 처리기를 이용한 이진 변수 서브시퀀스 추출)

  • Park, Sa-Choun;Kwon, Gi-Hwon
    • The KIPS Transactions:PartD
    • /
    • v.15D no.6
    • /
    • pp.777-784
    • /
    • 2008
  • Recently in the field of model checking, to overcome the state explosion problem, the method of using a SAT-solver is mainly researched. To use a SAT-solver, the system to be verified is translated into CNF and the Boolean cardinality constraint is widely used in translating the system into CNF. In BCC it is dealt with set of boolean variables, but there is no translating method of the sequence among Boolean variables. In this paper, we propose methods for translating the problem, which is extracting a subsequence with length k from a sequence of Boolean variables, into CNF formulas. Through experimental results, we show that our method is more efficient than using only BCC.

Bond behaviors of shape steel embedded in recycled aggregate concrete and recycled aggregate concrete filled in steel tubes

  • Chen, Zongping;Xu, Jinjun;Liang, Ying;Su, Yisheng
    • Steel and Composite Structures
    • /
    • v.17 no.6
    • /
    • pp.929-949
    • /
    • 2014
  • Thirty one push-out tests were carried out in order to investigate the bond behavior between shape steel, steel tube (named steels) and recycled aggregate concrete (RAC), including 11 steel reinforced recycled aggregate concrete (SRRAC) columns, 10 recycled aggregate concrete-filled circular steel tube (RACFCST) columns and 10 recycled aggregate concrete-filled square steel tube (RACFSST) columns. Eleven recycled coarse aggregate (RCA) replacement ratios (i.e., 0%, 10%, 20%, 30%, 40%, 50%, 60%, 70%, 80%, 90% and 100%) were considered for SRRAC specimens, while five RCA replacement ratios (i.e., 0%, 25%, 50%, 75% and 100%), concrete type and length-diameter ratio for recycled aggregate concrete-filled steel tube (RACFST) specimens were designed in this paper. Based on the test results, the influences of all variable parameters on the bond strength between steels and RAC were investigated. It was found that the load-slip curves at the loading end appeared the initial slip earlier than the curves at the free end. In addition, eight practical bond strength models were applied to make checking computations for all the specimens. The theoretical analytical model for interfacial bond shear transmission length in each type of steel-RAC composite columns was established through the mechanical derivation, which can be used to design and evaluate the performance of anchorage zones in steel-RAC composite structures.