• Title/Summary/Keyword: counter example analysis

Search Result 17, Processing Time 0.024 seconds

MOdel-based KERnel Testing (MOKERT) Framework (모델기반의 커널 테스팅 프레이뭐크)

  • Kim, Moon-Zoo;Hong, Shin
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.7
    • /
    • pp.523-530
    • /
    • 2009
  • Despite the growing need for customized operating system kernels for embedded devices, kernel development continues to suffer from insufficient reliability and high testing cost for several reasons such as the high complexity of the kernel code. To alleviate these difficulties, this study proposes the MOdel-based KERnel Testing (MOKERT) framework for detection of concurrency bugs in the kernel. MOKERT translates a given C program into a corresponding Promela model, and then tries to find a counter example with regard to a given requirement property, If found, MOKERT executes that counter example on the real kernel code to check whether the counter example is a false alarm or not, The MOKERT framework was applied to the Linux proc file system and confirmed that the bug reported in a ChangeLog actually caused a data race problem, In addition, a new data race bug in the Linux proc file system was found, which causes kernel panic.

Cluster Analysis Algorithms Based on the Gradient Descent Procedure of a Fuzzy Objective Function

  • Rhee, Hyun-Sook;Oh, Kyung-Whan
    • Journal of Electrical Engineering and information Science
    • /
    • v.2 no.6
    • /
    • pp.191-196
    • /
    • 1997
  • Fuzzy clustering has been playing an important role in solving many problems. Fuzzy c-Means(FCM) algorithm is most frequently used for fuzzy clustering. But some fixed point of FCM algorithm, know as Tucker's counter example, is not a reasonable solution. Moreover, FCM algorithm is impossible to perform the on-line learning since it is basically a batch learning scheme. This paper presents unsupervised learning networks as an attempt to improve shortcomings of the conventional clustering algorithm. This model integrates optimization function of FCM algorithm into unsupervised learning networks. The learning rule of the proposed scheme is a result of formal derivation based on the gradient descent procedure of a fuzzy objective function. Using the result of formal derivation, two algorithms of fuzzy cluster analysis, the batch learning version and on-line learning version, are devised. They are tested on several data sets and compared with FCM. The experimental results show that the proposed algorithms find out the reasonable solution on Tucker's counter example.

  • PDF

Analysis on Students' Abilities of Proof in Middle School (중학교 학생의 증명 능력 분석)

  • 서동엽
    • Journal of Educational Research in Mathematics
    • /
    • v.9 no.1
    • /
    • pp.183-203
    • /
    • 1999
  • In this study, we analysed the constituents of proof and examined into the reasons why the students have trouble in learning the proof, and proposed directions for improving the teaming and teaching of proof. Through the reviews of the related literatures and the analyses of textbooks, the constituents of proof in the level of middle grades in our country are divided into two major categories 'Constituents related to the construction of reasoning' and 'Constituents related to the meaning of proof. 'The former includes the inference rules(simplification, conjunction, modus ponens, and hypothetical syllogism), symbolization, distinguishing between definition and property, use of the appropriate diagrams, application of the basic principles, variety and completeness in checking, reading and using the basic components of geometric figures to prove, translating symbols into literary compositions, disproof using counter example, and proof of equations. The latter includes the inferences, implication, separation of assumption and conclusion, distinguishing implication from equivalence, a theorem has no exceptions, necessity for proof of obvious propositions, and generality of proof. The results from three types of examinations; analysis of the textbooks, interview, writing test, are summarized as following. The hypothetical syllogism that builds the main structure of proofs is not taught in middle grades explicitly, so students have more difficulty in understanding other types of syllogisms than the AAA type of categorical syllogisms. Most of students do not distinguish definition from property well, so they find difficulty in symbolizing, separating assumption from conclusion, or use of the appropriate diagrams. The basic symbols and principles are taught in the first year of the middle school and students use them in proving theorems after about one year. That could be a cause that the students do not allow the exact names of the principles and can not apply correct principles. Textbooks do not describe clearly about counter example, but they contain some problems to solve only by using counter examples. Students have thought that one counter example is sufficient to disprove a false proposition, but in fact, they do not prefer to use it. Textbooks contain some problems to prove equations, A=B. Proving those equations, however, students do not perceive that writing equation A=B, the conclusion of the proof, in the first line and deforming the both sides of it are incorrect. Furthermore, students prefer it to developing A to B. Most of constituents related to the meaning of proof are mentioned very simply or never in textbooks, so many students do not know them. Especially, they accept the result of experiments or measurements as proof and prefer them to logical proof stated in textbooks.

  • PDF

The Analysis of the 6th Grade Students' Mathematical Thinking on the Application of Lakatos' Methodology (Lakatos 방법론을 통한 초등학교 6학년 학생들의 수학적 사고)

  • Jung, Mi Hye;Lee, Kwangho;Sim, Jaebang
    • Education of Primary School Mathematics
    • /
    • v.16 no.1
    • /
    • pp.21-33
    • /
    • 2013
  • In this study, We analyzed the mathematical thinking of sixth grade students showed mathematics lessons through the application of Lakatos' methodology and search for the role of their teachers in this lessons. We supposed to find the solution to the way of teaching-learning regarding the Lakatos' methodology for the elementary school level. According to the stages of presenting a problem situation, suggesting an initial conjecture, examining the conjecture, and improving the conjecture, we had lessons 8 times that are applied to Lakato's methodology. We gathered and analyzed data from lessons and interviews recording videotapes, documents for this study. The participants showed a lot of mathematical thinking. They understood the problem situation with the skill of fundamental thinking and suggested the initial conjecture by the skill of developmental thinking and they found a counter-example to be able to rebut the initial conjecture by critical thinking. Correcting the conjecture not to have counter-example, they drew developmental thinking and made their thinking generalize.

Security Analysis of Information Flow using SAT (SAT를 이용한 정보흐름의 안전성 분석)

  • Kim, Je-Min;Kouh, Hoon-Joon
    • Journal of Digital Convergence
    • /
    • v.14 no.6
    • /
    • pp.253-261
    • /
    • 2016
  • As many people use internet through the various programs of PC and mobile devices, the possibility of private data leak is increasing. A program should be used after checking security of information flow. Security analysis of information flow is a method that analyzes security of information flow in program. If the information flow is secure, there is no leakage of personal information. If the information flow not secure, there may be a leakage of personal information. This paper proposes a method of analyzing information flow that facilitates SAT solver. The method translates a program that includes variables where security level is set into propositional formula representing control and information flow. The satisfiability of the formula translated is determined by using SAT solver. The security of program is represented through the result. Counter-example is generated if the program is not secure.

Aerodynamic stabilization of central stabilizers for box girder suspension bridges

  • Ge, Yaojun;Zou, Xiaojie;Yang, Yongxin
    • Wind and Structures
    • /
    • v.12 no.4
    • /
    • pp.285-298
    • /
    • 2009
  • For long-span suspension bridges with their intrinsic limit in flutter, some counter measures, for example, central stabilizers, should be adopted to improve aerodynamic stability to meet with the appropriate wind resistance requirements. The present paper introduces aerodynamic stabilization for long-span suspension bridges with box girders by using central stabilizers based on Xihoumen Bridge with the main span of 1650 m. The aerodynamic stabilization study covers experimental investigation of sectional model testing, comprehensive evaluation of three central stabilizers and theoretical analysis of stabilizing mechanism related to flutter derivatives, aerodynamic damping and degree participation.

An Analysis on the Examples of Polygons in the 1st Grade Middle School Mathematics Textbooks (중학교 1학년 교과서에서 다각형에 관한 예 분석)

  • Lee, JiHye;Son, HuiRim;Kim, SeongKyeong
    • School Mathematics
    • /
    • v.15 no.4
    • /
    • pp.743-758
    • /
    • 2013
  • This paper analyses the examples of polygons taken in the 1st grade middle school mathematics textbooks. We analysed generic examples, non-examples and counter-examples represented in these textbooks. And also we classified and analysed with examples of the concept and the application of a procedure. We analysed the differences of methods among these textbooks representing the same concepts or procedures. The findings from the analysis showed that these textbooks mostly make use of generic examples. The examples of concept and procedure vary depending upon the textbooks. Also, many textbooks haven't properly represented various positions and figures of polygons. Textbooks need to represent various and appropriate examples in order to expand the example space of the students.

  • PDF

Analysis of Cybercrime Investigation Problems in the Cloud Environment

  • Khachatryan, Grigor
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.315-319
    • /
    • 2022
  • Cloud computing has emerged to be the most effective headway for investigating crime especially cybercrime in this modern world. Even as we move towards an information technology-controlled world, it is important to note that when innovations are made, some negative implications also come with it, and an example of this is these criminal activities that involve technology, network devices, and networking that have emerged as a result of web improvements. These criminal activities are the ones that have been termed cybercrime. It is because of these increased criminal activities that organizations have come up with different strategies that they use to counter these crimes, and one of them is carrying out investigations using the cloud environment. A cloud environment has been defined as the use of web-based applications that are used for software installation and data stored in computers. This paper examines problems that are a result of cybercrime investigation in the cloud environment. Through analysis of the two components in play; cybercrime and cloud environment, we will be able to understand what are the problems that are encountered when carrying out investigations in cloud forensics. Through the use of secondary research, this paper found out that most problems are associated with technical and legal channels that are involved in carrying out these investigations. Investigator's mistakes when extracting pieces of evidence form the most crucial problems that take a lead when it comes to cybercrime investigation in the cloud environment. This paper not only flags out the challenges that are associated with cybercrime investigation in cloud environments but also offer recommendations and suggested solutions that can be used to counter the problems in question here. Through a proposed model to perform forensics investigations, this paper discusses new methodologies solutions, and developments for performing cybercrime investigations in the cloud environment.

A Risk-based System Analysis Model for Improving the Performance of Financial Solutions

  • Lee, Jong Yun;Kim, Jong Soo;Kim, Tai Suk
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.11
    • /
    • pp.1367-1374
    • /
    • 2015
  • In this paper, we propose a model which can prioritize the performance improvement work by analyzing the major risks and their influence, which can cause performance degradation in the system and show an example of a performance improvement using this model. In presentation-tier, as a result of log data analysis before and after the performance improvement of key processes which handle financial transactions, this model brought the CPU utilization and memory enhancement in the performance improvement work of the financial system which was carried out by applying the proposed model. It has been confirmed that the entire end-user can be accommodated. In the web-tier, the available memory increased by 200MB and we were able to improve the server restart(Recycling) that was sustained in the existing system. In the business logic-tier, we have been able to see better figures after performance improvements through the graph which analyzes the log collected with the key performance counters such as CPU%, Batch Requests/sec. In the data-tier, it has been confirmed that CPU usage and standby operation were reduced and the throughput was found to increase.

A Study on Algorithm Selection and Comparison for Improving the Performance of an Artificial Intelligence Product Recognition Automatic Payment System

  • Kim, Heeyoung;Kim, Dongmin;Ryu, Gihwan;Hong, Hotak
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.230-235
    • /
    • 2022
  • This study is to select an optimal object detection algorithm for designing a self-checkout counter to improve the inconvenience of payment systems for products without existing barcodes. To this end, a performance comparison analysis of YOLO v2, Tiny YOLO v2, and the latest YOLO v5 among deep learning-based object detection algorithms was performed to derive results. In this paper, performance comparison was conducted by forming learning data as an example of 'donut' in a bakery store, and the performance result of YOLO v5 was the highest at 96.9% of mAP. Therefore, YOLO v5 was selected as the artificial intelligence object detection algorithm to be applied in this paper. As a result of performance analysis, when the optimal threshold was set for each donut, the precision and reproduction rate of all donuts exceeded 0.85, and the majority of donuts showed excellent recognition performance of 0.90 or more. We expect that the results of this paper will be helpful as the fundamental data for the development of an automatic payment system using AI self-service technology that is highly usable in the non-face-to-face era.