• Title/Summary/Keyword: model semantics

Search Result 184, Processing Time 0.03 seconds

Inclusive and Exclusive or Interpretation for Indefinite Deductive Databases (불명확 연역 데이터베이스를 위한 포괄적 및 배타적 or 해석)

  • Seok, Yun-Yeong;Jeon, Jong-Hun
    • The KIPS Transactions:PartD
    • /
    • v.9D no.2
    • /
    • pp.243-250
    • /
    • 2002
  • In order to properly interpret and process or operators in deductive databases including indefinite clauses, we propose to use Lasez′s Strong Model Semantics(LSMS) which is reasonably simple yet powerful enough to support both exclusive and inclusive interpretations. Conventional semantics either fail to support both interpretations or simply too complex. Therefore, in this paper we study advantages and difficulties of representing indefinite information, and as for the solution to difficulties, we show how LSMS can be used to support both inclusive or and exclusive or interpretations. We also investigate and analyze it′s properties and show how it semantically differs from others. We believe that LSMS is the only "reasonably simple" semantics that supports both inclusive and exclusive interpretations.

A Semantics for KADS Model of Expertise (KADS 지식 모델의 의미론)

  • 전윤재
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.19 no.2
    • /
    • pp.57-73
    • /
    • 1994
  • KADS is currently a best known methodology for expert system development is Europe. KADS world sees the expert system development as a modeling activity and uses models to control complexity of the development process. Four layers KADS expertise model is used to describe expert knowledge. But this expertise model in high abstraction level is conceptual and not formalized. This paper has formalized KADS expertise model using set theory and mathematical semantics combined in order to reduce the ambiguity of informal models of expertise, provide a precise means of communication about the model of expertise and point out incompleteness and inconsistency of the model of expertise. Instead of first order predicate calculs, set theory and mathematical semantics are used because they are a more general and have compositive quality.

  • PDF

A Study on the Effects of a Virtual-Users Model Computing the Semantics of Spaces for the Operation and Understanding of Human Behavior Simulation of Architecture-Major Students (공간의 의미를 연산하는 가상 사용자 모델이 건축설계 전공학생들의 인간행동 시뮬레이션 운용과 이해도에 미치는 효과에 관한 연구)

  • Hong, Seung-Wan
    • Journal of KIBIM
    • /
    • v.6 no.3
    • /
    • pp.34-41
    • /
    • 2016
  • The previous studies argue that using the semantic properties of BIM objects is efficient for simulating the behaviors of autonomous, computer agents, called virtual-users, but such assumption is not proven via evidence-based research approaches. Hence, this present study aims to investigate the empirical effects of a human behavior simulation model equipped the semantics of spaces on the architecture-major students' operation and understanding of the simulation system, compared to a typical path-finding model. To achieve the aim, this study analyzed the survey and interview data, collected in the authentic design projects. The analysis indicates that (1) using a simulation model equipped the semantics of spaces helps the students' operation of the simulation, and (2) it also aids understanding the relationship between the variables of spaces and virtual-users (${\alpha}=0.74$). In addition, the qualitative data inform that the advantages of the simulation model that computes the semantics of spaces stem in the automatic behavioral changes of massive numbers of virtual-users, and efficient detection and activation on the what-if situations. The analysis also reveals that the simulation model has shortcomings in orchestrating the complex data structure between the semantics properties of spaces and virtual-users under multi-sequential scenarios. The results of this study contribute to develop a future design system combining BIM with human behavior simulation.

Definition of Step Semantics for Hierarchical State Machine based on Flattening (평탄화를 이용한 계층형 상태 기계의 단계 의미 정의)

  • Park, Sa-Choun;Kwon, Gi-Hwon;Ha, Soon-Hoi
    • The KIPS Transactions:PartD
    • /
    • v.12D no.6 s.102
    • /
    • pp.863-868
    • /
    • 2005
  • Hardware and software codesign framework called PeaCE(Ptolemy extension as a Codesign Environment) was developed. It allows to express both data flow and control flow which is described as fFSM which extends traditional finite state machine. While the fFSM model provides lots of syntactic constructs for describing control flow, it has a lack of their formality and then difficulties in verifying the specification. In order to define the formal semantics of the fFSM, in this paper, firstly the hierarchical structure in the model is flattened and then the step semantics is defined. As a result, some important bugs such as race condition, ambiguous transition, and circulartransition can be formally detected in the model.

A multilingual grammar model of honorification: using the HPSG and MRS formalism

  • Song, Sanghoun
    • Language and Information
    • /
    • v.20 no.1
    • /
    • pp.25-49
    • /
    • 2016
  • Honorific forms express the speaker's social attitude to others and also indicate the social ranks and level of intimacy of the participants in the discourse. In a cross-linguistic perspective of grammar engineering, modelling honorification has been regarded as a key strategy for improving language processing applications. Using the HPSG and MRS formalism, this article provides a multilingual grammar model of honorification. The present study incorporates the honorific information into the Meaning Representation System (MRS) via Individual Constraints (ICONS), and then conducts an evaluation to see if the model contributes to semantics-based language processing.

  • PDF

Workflow System Modeling using Activity Diagram (액티비티 다이어그램을 이용한 워크플로우 시스템 모델링)

  • Ko Eun-Jung;Lee Sang-Young;Yoo Cheol-Jung;Jang Ok-Bae
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.6
    • /
    • pp.473-485
    • /
    • 2005
  • UML activity diagram is useful to model business process and workflow by reason of its suitability to present dynamic aspect of system. However it Is difficult to present precise semantics which is taken as important in workflow system with the guide provided by OMG to the UML activity diagram. This paper suggests workfolw system modelling methodology by applying ASM semantics to the activity diagram after extending its semantics to correspond to workflow system characteristics. Through the exact definition to formal semactics based on ASM it is possible to effectively model workflow.

Automatic Verification of the Control Flow Model for Effective Embedded Software Design (효과적인 임베디드 소프트웨어 설계를 위한 제어흐름 모델의 자동 검증)

  • Park, Sa-Choun;Kwon, Gi-Hwon;Ha, Soon-Hoi
    • The KIPS Transactions:PartA
    • /
    • v.12A no.7 s.97
    • /
    • pp.563-570
    • /
    • 2005
  • Hardware and software codesign framework called PeaCE(Ptolemy extension as a Cod sign Environment) allows to express both data flow and control flow. To formally verify an fFSM specification which expresses control flow in PeaCE, the step semantics of the model was defined. In this paper, we introduce the automatic verification tool developed by formal semantics of previous work. This tool uses the SMV as inner model checker md, through our tool, users can formally verify some important bugs such as race condition, ambiguous transition, and circulartransition without directly writing logical formulae.

An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive Model and Feedback Mechanism

  • Zhang, Xiao;Wang, Chengqi;Zheng, Zhiming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1785-1801
    • /
    • 2017
  • In recent years, image encryption algorithms have been developed rapidly in order to ensure the security of image transmission. With the assistance of our previous work, this paper proposes a novel chaotic image encryption algorithm based on self-adaptive model and feedback mechanism to enhance the security and improve the efficiency. Different from other existing methods where the permutation is performed by the self-adaptive model, the initial values of iteration are generated in a novel way to make the distribution of initial values more uniform. Unlike the other schemes which is on the strength of the feedback mechanism in the stage of diffusion, the piecewise linear chaotic map is first introduced to produce the intermediate values for the sake of resisting the differential attack. The security and efficiency analysis has been performed. We measure our scheme through comprehensive simulations, considering key sensitivity, key space, encryption speed, and resistance to common attacks, especially differential attack.

Attributed AND-OR Graph : A Semantics for Formal Model Management for Digital Systems Design (Attributed AND-OR Graph : 디지털 시스템 설계에 있어 모델 관리를 위한 정형론)

  • Kim, Jun-Kyoung;Kim, Tag-Gon
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.05a
    • /
    • pp.34-39
    • /
    • 2005
  • The progress of silicon technology enables to implement a highly complex digital system on a given chip area. However, even the modern design environment is not so efficient to catch up with the progress of process technology. Design reuse is a promising approach to designing such a complex system in an efficient way. However, the rigidness and inflexibility of a model has been an obstacle to design reuse. This paper proposes a high-level model management methodology by introducing attributed AND-OR graph(AOG), a (formal semantics for representing the possible structure of a model. Using the formalism enables a designer to extract, extend and reuse the pre-modeled and pre-verified design. A complete process of constructing a cache operational model, extending the model and extracting executable models is exemplified to show effectiveness of the proposed framework.

  • PDF

An Evaluation of an Information Sharing Workflow Using Data Provenance Semantics (데이터 생성의미를 활용한 정보공유구조의 효과성 비교 연구)

  • Lee, Choon Yeul
    • Journal of Digital Convergence
    • /
    • v.11 no.6
    • /
    • pp.175-185
    • /
    • 2013
  • For effective information sharing, data provenance semantics need to be managed effectively. Based on a scheme to represent data provenance semantics, we propose a model to calculate information sharing costs. Information sharing costs are derived from probabilities of type I and type II errors that occur in organizational information sharing, costs related to these errors, and information sharing distances between organizational units which are determined by information sharing workflows. We apply the model to various types of information sharing workflows including departmental information systems, hierarchical information systems, a hub and a stand-alone system. The calculated information sharing costs show that the hub with data standardization is best in information sharing; however without standardization its information sharing cost deteriorates to that of a departmental information system. And, any information sharing workflow is better than a stand-alone system. It is proved that the model is useful in analyzing effectiveness of information sharing workflows and their characteristics.