• Title/Summary/Keyword: Model-checking

Search Result 569, Processing Time 0.025 seconds

A Junk Mail Checking Model using Fuzzy Relational Products (퍼지관계곱을 이용한 내용기반 정크메일 분류 모델)

  • Park, Jeong-Seon;Kim, Chang-Min;Kim, Yong-Gi
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.10
    • /
    • pp.726-735
    • /
    • 2002
  • E-mail service has been a general method for communication as internet is widely used instead of post mails. Many companies have invested in e-mail advertisement as e-mail service is spread. E-mail advertisement has an advantage that it can consider personal characters. A lot of e-mail users have been given e-mails that they did not want to receive because their e-mail addresses were opened out to companies on internet. Therefore, they need junk mail checking systems and several e-mail service providers have supported junk mail filters. However, the junk mail filters can check the junk mail with constraint because they don't check the junk degree of mails by the contents of e-mail. This paper suggests a content-based junk mail checking model using fuzzy relational products. The process of the junk mail checking model using fuzzy relational products is as following: (1) analyzes semantic relation between junk words-base and e-mails, (2) checks the junk degree of the e-mail using the semantic relation, (3) checks the mails with SVJ(Standard Value of Junk) if those are junk mail or non-junk mail. The efficiency of the proposed technique is proved by comparing the junk degree of the e-mail and the number of junk mails that was checked by e-mail users and checked by the proposed junk mail checking model.

Development of the Program Checking the Constructible Possibility of Prestressed Concrete Box Girder Bridges (PSC 박스 거더교의 시공성 검사 프로그램 개발)

  • 김병석;김영진;강재윤;한석희
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 1998.10b
    • /
    • pp.701-705
    • /
    • 1998
  • The objective of this study is to develop the practical program which can check the constructible possibility of prestressed concrete box girder bridges for design. Checking constructible possibility is defined as checking the interference of each elements in a PSC box girder bridge and computing the distances of each elements. To check the constructible possibility of a PSC box girder bride, bridge must be modelled using solid in three dimension. By using a 3 dimensional solid modeling system, engineers can get the photo realistic 3D viewing images of the bridge and produce FEM analytic model of it. Users can manipulate their drawings easier and take off quantity of the whole structure and its elements as well as check the constructible possibility of their PSC box girder bridges.

  • PDF

A Study on the Transformation of Two Dimensional Geodetic Coordinates between Bessel and WGS84 Ellipsoids by UTM Projection (UTM투영에 의한 Bessel과 WGS84 타원체간의 2차원 측지좌표변환 연구)

  • 이용창;강준묵
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.16 no.2
    • /
    • pp.149-158
    • /
    • 1998
  • The aim of this paper is to propose the technique of the two dimensional geodetic coordinates conversion between WGS84 and Bessel spheroids by the two-dimensional affine transformation modeling based on the UTM plane coordinates without the local geoid model which is essential to three dimensional coordinates conversion. Area of approximately $25\times{11}$ square km in the city of Inchon was selected as the test area. The transformation parameters were determined using the eleven triangulation control points in test area. And then, those paraneters were applied to the fifteen cadastral control points which selected as checking points for precision checking of transformation parameters. The average and standard deviations of the absolute values of the conversion residuals of checking points in latitude/longitude and N/E(UTM) and/or x/y(TM) are $\pm0.006"$$\pm0.013"$ and $\pm{17cm/}\pm{30cm}$ respectively. Also, coefficients for 7-parameters, 3-parameters and UTM model transformation computed according as sizes of transformed area, and then the transformed characteristics of checking points according to transformation methods analyzed synthetically.hetically.

  • PDF

Specification and Analysis of System Properties by using Petri nets (페트리 네트를 이용한 시스템 속성의 명세 및 분석)

  • Lee, Woo-Jin
    • The KIPS Transactions:PartD
    • /
    • v.11D no.1
    • /
    • pp.115-122
    • /
    • 2004
  • Software system modeling has a goal for finding and solving system's problems by describing and analyzing system model in formal notations. Petri nets, as graphical formalism, have been used in describing and analyzing the software systems such as parallel systems, real-time system, and protocols. In the analysis of Petri nets, general system properties such as deadlock and liveness are analyzed by the reachability analysis. On the other side, specific properties such as functional requirements and constraints are checked by model-checking. However, since these analysis methods are based on enumeration of ail possible states, there nay be state explosion problem, which means that system states exponentially increase as the size of system is larger. In this paper, we propose a new method for mechanically checking system properties with avoiding state explosion problem. At first, system properties are described in property nets then the system model and the property net are composed and analyzed. In the compositional analysis, system parts irrelevant to the specific property are reduced to minimize the analysis domain of the system. And it is possible to mechanically check whether a specific property is satisfied or not.

An Action-based LTS Bounded Model Checker for Analyzing Concurrency (병행성 분석을 위한 액션 기반의 LTS 바운드 모델 체커)

  • Park, Sa-Choun;Kwon, Gi-Hwon
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.9
    • /
    • pp.529-537
    • /
    • 2008
  • Since concurrent software is hard to debug, the verification of such systems inevitably needs automatic tools which support exhaustive searching. Bounded Model Checking (BMC) is one of them. Within a bound k, BMC exhaustively check some errors in execution traces of the given system. In this paper, we introduce the tool that performs BMC for LTS, modeling language for concurrent programs. In this tool, a property is described by a FLTL formula, which is suitable to present the property with actions in a LTS model. To experiment with existential model checkers and out tool, we compare and analysis the performance of the developed tool and others.

A Study on Automatic Inspection Algorithm for Moving Object using by Vision System (비전시스템을 이용한 이동물체 자동검사에 관한 연구)

  • Cho, Young Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.1
    • /
    • pp.99-105
    • /
    • 2009
  • Recently the research is much interested in about the inspection system using by computer vision system. In this paper, we deal with shape inspection technique for moving to be long and narrow object on conveyor belt. first, we are acquired for moving object on conveyor belt. then the object segmentation is using by color information for background and object. the object position be calculated by horizontal and a vertical histogram. second, we are checked for two hole in front part, widths and top/bottom side information in middle part, and finally checking for two holes in rear part. The performance of our proposed model is evaluated by experiments, within error of 1㎜, and can be checking to 17 object /min.

Design of Bluetooth baseband System (블루투스 기저대역 시스템 설계)

  • 백은창;조현묵
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.2
    • /
    • pp.206-214
    • /
    • 2002
  • In this paper, it is designed and verified the baseband system that performs various protocol functions of specification of the Bluetooth system. In order to verify the developed circuits, various baseband functions are tested by using the ModelSim simulator. The developed circuits operate at 4MHz main clock. Test suite includes hap selection function, generation of the sync word, error correction(1/3 rate FEC, 2/3 rate FEC), HEC generation/checking, CRC generation/checking, data whitening/dewhitening and packet trans/reception procedure. etc. As a result of the simulation, it is verified that the developed baseband system conform to the specification of the Bluetooth system.

  • PDF

Efficient Model Checking of Asynchronous Systems Exploiting Temporal Order-Based Reduction Method

  • Yamada, Chikatoshi;Nagata, Yasunori;Nakao, Zensho
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1964-1967
    • /
    • 2002
  • Recently design verification have been played an important role in the design of large scale and complex systems. In this article, we especially focus on model checking methods. Behaviors of modeled systems are generally specified by temporal formulas of computation tree logic. However. Users must know well temporal specification because the specification might be complex. We proposed method that temporal formulas are gained inductively and amounts of memory and time are reduced. Finally, we will show verification results using our proposed method.

  • PDF

Formal Verification Network-based Protocol for Railway Signaling Systems

  • Hwang, Jong-Gyu;Lee, Jae-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.354-357
    • /
    • 2004
  • According to the computerization of railway signaling systems, the interface link between the signaling systems has been replaced by the digital communication channel. At the same time, the importance of the communication link is more pronounced than in the past. In this paper, new network-based protocol for Korean railway signaling has designed between CTC and SCADA system, and the overview of designed protocol is briefly represented. Using the informal method for specifying the communication protocol, a little ambiguity may be contained in the protocol. To clear the ambiguity contained in the designed protocol, we use LTS model to design the protocol for this interface link between CTC and SCADA, the LTS is an intermediate model for encoding the operational behavior of processes. And then, we verify automatically and formally the safety and the liveness properties through the model checking method. Especially, the modal ${\mu}$-calculus, which is a highly expressive method of temporal logic that has been applied to the model checking method. It will be expected to increase the safety, reliability and efficiency of maintenance of the signaling systems by using the designed protocol for railway signaling in Korea.

  • PDF

Compositional Safety Analysis for Embedded Systems using the FSM Behavioral Equivalence Algorithm (FSM의 행위 일치 알고리즘을 이용한 임베디드 시스템의 합성적 안전성 분석 기법)

  • Lee, Woo-Jin
    • The KIPS Transactions:PartD
    • /
    • v.14D no.6
    • /
    • pp.633-640
    • /
    • 2007
  • As the embedded systems closely related with our living become complex by interoperating each other via internet, the safety issue of embedded systems begins to appear For checking safety properties of the system interactions, it is necessary to describe the system behaviors in formal methods and provide a systematic safety analysis technique. In this research, the behaviors of an embedded system are described by Labeled Transition Systems(LTS) and its safety properties are checked on the system model. For enhancing the existing compositional safety analysis technique, we perform the safety analysis techniques by checking the behavioral equivalence of the reduced model and a property model after reducing the system model in the viewpoint of the property.