期刊文献+
共找到23,754篇文章
< 1 2 250 >
每页显示 20 50 100
Computation Tree Logic Model Checking of Multi-Agent Systems Based on Fuzzy Epistemic Interpreted Systems
1
作者 Xia Li Zhanyou Ma +3 位作者 Zhibao Mian Ziyuan Liu Ruiqi Huang Nana He 《Computers, Materials & Continua》 SCIE EI 2024年第3期4129-4152,共24页
Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as s... Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as safety and liveness,there is still a lack of quantitative and uncertain property verifications for these systems.In uncertain environments,agents must make judicious decisions based on subjective epistemic.To verify epistemic and measurable properties in multi-agent systems,this paper extends fuzzy computation tree logic by introducing epistemic modalities and proposing a new Fuzzy Computation Tree Logic of Knowledge(FCTLK).We represent fuzzy multi-agent systems as distributed knowledge bases with fuzzy epistemic interpreted systems.In addition,we provide a transformation algorithm from fuzzy epistemic interpreted systems to fuzzy Kripke structures,as well as transformation rules from FCTLK formulas to Fuzzy Computation Tree Logic(FCTL)formulas.Accordingly,we transform the FCTLK model checking problem into the FCTL model checking.This enables the verification of FCTLK formulas by using the fuzzy model checking algorithm of FCTL without additional computational overheads.Finally,we present correctness proofs and complexity analyses of the proposed algorithms.Additionally,we further illustrate the practical application of our approach through an example of a train control system. 展开更多
关键词 Model checking multi-agent systems fuzzy epistemic interpreted systems fuzzy computation tree logic transformation algorithm
下载PDF
Identifying Counterexamples Without Variability in Software Product Line Model Checking 被引量:1
2
作者 Ling Ding Hongyan Wan +1 位作者 Luokai Hu Yu Chen 《Computers, Materials & Continua》 SCIE EI 2023年第5期2655-2670,共16页
Product detection based on state abstraction technologies in the software product line(SPL)is more complex when compared to a single system.This variability constitutes a new complexity,and the counterexample may be v... Product detection based on state abstraction technologies in the software product line(SPL)is more complex when compared to a single system.This variability constitutes a new complexity,and the counterexample may be valid for some products but spurious for others.In this paper,we found that spurious products are primarily due to the failure states,which correspond to the spurious counterexamples.The violated products correspond to the real counterexamples.Hence,identifying counterexamples is a critical problem in detecting violated products.In our approach,we obtain the violated products through the genuine counterexamples,which have no failure state,to avoid the tedious computation of identifying spurious products dealt with by the existing algorithm.This can be executed in parallel to improve the efficiency further.Experimental results showthat our approach performswell,varying with the growth of the system scale.By analyzing counterexamples in the abstract model,we observed that spurious products occur in the failure state.The approach helps in identifying whether a counterexample is spurious or genuine.The approach also helps to check whether a failure state exists in the counterexample.The performance evaluation shows that the proposed approach helps significantly in improving the efficiency of abstraction-based SPL model checking. 展开更多
关键词 Software product line model checking parallel algorithm
下载PDF
Influence of initial check, information exchange, final accuracy check, reaction information nursing on the psychology of elderly with lung cancer 被引量:2
3
作者 Cui Jiang Jing Ma +1 位作者 Wen He Hai-Ying Zhang 《World Journal of Clinical Cases》 SCIE 2024年第4期737-745,共9页
BACKGROUND As one of the fatal diseases with high incidence,lung cancer has seriously endangered public health and safety.Elderly patients usually have poor self-care and are more likely to show a series of psychologi... BACKGROUND As one of the fatal diseases with high incidence,lung cancer has seriously endangered public health and safety.Elderly patients usually have poor self-care and are more likely to show a series of psychological problems.AIM To investigate the effectiveness of the initial check,information exchange,final accuracy check,reaction(IIFAR)information care model on the mental health status of elderly patients with lung cancer.METHODS This study is a single-centre study.We randomly recruited 60 elderly patients with lung cancer who attended our hospital from January 2021 to January 2022.These elderly patients with lung cancer were randomly divided into two groups,with the control group taking the conventional propaganda and education and the observation group taking the IIFAR information care model based on the conventional care protocol.The differences in psychological distress,anxiety and depression,life quality,fatigue,and the locus of control in psychology were compared between these two groups,and the causes of psychological distress were analyzed.RESULTS After the intervention,Distress Thermometer,Hospital Anxiety and Depression Scale(HADS)for anxiety and the HADS for depression,Revised Piper’s Fatigue Scale,and Chance Health Locus of Control scores were lower in the observation group compared to the pre-intervention period in the same group and were significantly lower in the observation group compared to those of the control group(P<0.05).After the intervention,Quality of Life Questionnaire Core 30(QLQ-C30),Internal Health Locus of Control,and Powerful Others Health Locus of Control scores were significantly higher in the observation and the control groups compared to the pre-intervention period in their same group,and QLQ-C30 scores were significantly higher in the observation group compared to those of the control group(P<0.05).CONCLUSION The IIFAR information care model can help elderly patients with lung cancer by reducing their anxiety and depression,psychological distress,and fatigue,improving their tendencies on the locus of control in psychology,and enhancing their life qualities. 展开更多
关键词 Initial check information exchange final accuracy check reaction information care model Lung cancer Mental health
下载PDF
Review of Software Model-Checking Techniques for Dealing with Error Detection in Program Codes
4
作者 Ednah Olubunmi Aliyu 《Journal of Software Engineering and Applications》 2023年第6期170-192,共23页
Debugging software code has been a challenge for software developers since the early days of computer programming. A simple need, because the world is run by software. So perhaps the biggest engineering challenge is f... Debugging software code has been a challenge for software developers since the early days of computer programming. A simple need, because the world is run by software. So perhaps the biggest engineering challenge is finding ways to make software more reliable. This review provides an overview of techniques developed over time in the field of software model checking to solve the problem of detecting errors in program code. In addition, the challenges posed by this technology are discussed and ways to mitigate them in future research and applications are proposed. A comprehensive examination of the various model verification methods used to detect program code errors is intended to lay the foundation for future research in this area. 展开更多
关键词 Software Model checking Symbolic Execution State Explosion ABSTRACTION Test Case Generations
下载PDF
Completeness of bounded model checking temporal logic of knowledge
5
作者 刘志锋 葛云 +1 位作者 章东 周从华 《Journal of Southeast University(English Edition)》 EI CAS 2010年第3期399-405,共7页
In order to find the completeness threshold which offers a practical method of making bounded model checking complete, the over-approximation for the complete threshold is presented. First, a linear logic of knowledge... In order to find the completeness threshold which offers a practical method of making bounded model checking complete, the over-approximation for the complete threshold is presented. First, a linear logic of knowledge is introduced into the past tense operator, and then a new temporal epistemic logic LTLKP is obtained, so that LTLKP can naturally and precisely describe the system's reliability. Secondly, a set of prior algorithms are designed to calculate the maximal reachable depth and the length of the longest of loop free paths in the structure based on the graph structure theory. Finally, some theorems are proposed to show how to approximate the complete threshold with the diameter and recurrence diameter. The proposed work resolves the completeness threshold problem so that the completeness of bounded model checking can be guaranteed. 展开更多
关键词 bounded model checking temporal logics of knowledge multi-agent system
下载PDF
An Example of Machine Vision Applied in Printing Quality Checking——Research on the Checking of Printing Quality by Image Processing 被引量:5
6
作者 唐万有 王文凤 《微计算机信息》 北大核心 2008年第6期45-47,共3页
The traditional printing checking method always uses printing control strips,but the results are not very well in repeatability and stability. In this paper,the checking methods for printing quality basing on image ar... The traditional printing checking method always uses printing control strips,but the results are not very well in repeatability and stability. In this paper,the checking methods for printing quality basing on image are taken as research objects. On the base of the traditional checking methods of printing quality,combining the method and theory of digital image processing with printing theory in the new domain of image quality checking,it constitute the checking system of printing quality by image processing,and expound the theory design and the model of this system. This is an application of machine vision. It uses the high resolution industrial CCD(Charge Coupled Device) colorful camera. It can display the real-time photographs on the monitor,and input the video signal to the image gathering card,and then the image data transmits through the computer PCI bus to the memory. At the same time,the system carries on processing and data analysis. This method is proved by experiments. The experiments are mainly about the data conversion of image and ink limit show of printing. 展开更多
关键词 机器视觉 印刷质量检测 图像处理 数据转换 墨量显示
下载PDF
基于Model Checking的系统脆弱性分析 被引量:4
7
作者 黄光华 段川 蒋凡 《计算机工程》 EI CAS CSCD 北大核心 2005年第4期148-151,共4页
基于规则的脆弱性分析技术依赖于对系统组件间关系的经验知识,系统复杂性、竞态条件、隐含假设等因素,使规则的生成异常困难。该文提出了采用NuSMV作为Model Checking执行机验证系统安全行为模型的脆弱性分析方法,并详细描述了对两个模... 基于规则的脆弱性分析技术依赖于对系统组件间关系的经验知识,系统复杂性、竞态条件、隐含假设等因素,使规则的生成异常困难。该文提出了采用NuSMV作为Model Checking执行机验证系统安全行为模型的脆弱性分析方法,并详细描述了对两个模型实例进行验证的过程。结果显示,这种方法具有识别已知和未知脆弱性的能力。 展开更多
关键词 脆弱性 MODEL checking NUSMV
下载PDF
DIAGNOSTIC CHECKING FOR TIME SERIES MODELS USING NONPARAMETRIC APPROACH
8
作者 钟登华 尼伯伦丁 《Transactions of Tianjin University》 EI CAS 1997年第1期45-49,共5页
In time series modeling, the residuals are often checked for white noise and normality. In practice, the useful tests are Ljung Box test. Mcleod Li test and Lin Mudholkar test. In this paper, we present a nonparame... In time series modeling, the residuals are often checked for white noise and normality. In practice, the useful tests are Ljung Box test. Mcleod Li test and Lin Mudholkar test. In this paper, we present a nonparametric approach for checking the residuals of time series models. This approach is based on the maximal correlation coefficient ρ 2 * between the residuals and time t . The basic idea is to use the bootstrap to form the null distribution of the statistic ρ 2 * under the null hypothesis H 0:ρ 2 * =0. For calculating ρ 2 * , we proposes a ρ algorithm, analogous to ACE procedure. Power study shows this approach is more powerful than Ljung Box test. Meanwhile, some numerical results and two examples are reported in this paper. 展开更多
关键词 BOOTSTRAP diagnostic checking nonparametric approach time series white noise ρ algorithm
下载PDF
层厚对使用CT/SIM Check模体联合iQA软件检测CT模拟机的影响
9
作者 时飞跃 程龙 +3 位作者 王敏 秦伟 赵环宇 魏晓为 《中国医疗设备》 2023年第7期17-22,共6页
目的探讨层厚大小对使用CT/SIM Check模体联合iQA软件检测放疗CT模拟机数据结果的影响。方法对1台西门子Sensation Open CT模拟机,使用6种放疗扫描协议扫描1套CT/SIM Check模体,扫描完成后重建1.5、2、3、4和5 mm共5种层厚的CT图像序列... 目的探讨层厚大小对使用CT/SIM Check模体联合iQA软件检测放疗CT模拟机数据结果的影响。方法对1台西门子Sensation Open CT模拟机,使用6种放疗扫描协议扫描1套CT/SIM Check模体,扫描完成后重建1.5、2、3、4和5 mm共5种层厚的CT图像序列。使用iQA软件对这些CT图像序列进行自动分析并生成报表,对报表上的质控数据结果进行分析和比较。结果通过对报表数据进行分析,得到了6种扫描协议和5种层厚情形下22种参数的质控数据,对5种不同层厚的数据计算得到了相应的四分位数间距值。由数据结果可见,HU均一性和插件4内标准差的数据随层厚的增加而减小;扫描中心纵向坐标的数值随层厚的增加有下降的趋势;线宽比-灵敏度截面的数据随层厚的增加而变大。结论使用CT/SIM Check模体联合iQA软件检测CT模拟机,层厚对HU均一性、插件4内标准差、扫描中心纵向坐标和线宽比-灵敏度截面的质控数据结果有较大影响,对其他参数的数据也有不同程度的影响。本研究为物理师使用CT/SIM Check模体联合iQA软件检测放疗CT模拟机的质控工作,提供了有益的数据参考。 展开更多
关键词 CT模拟机 质控 CT/SIM check模体 iQA软件 层厚
下载PDF
An Extended Ontology Model and Ontology Checking Based on Description Logics 被引量:8
10
作者 王洪伟 蒋馥 吴家春 《Journal of Shanghai Jiaotong university(Science)》 EI 2004年第1期34-41,共8页
Ontology is defined as an explicit specification of a conceptualization. In this paper, an extended ontology model was constructed using description logics, which is a 5-tuples including term set, individual set, term... Ontology is defined as an explicit specification of a conceptualization. In this paper, an extended ontology model was constructed using description logics, which is a 5-tuples including term set, individual set, term definition set, instantiation assertion set and term restriction set. Based on the extended model, the issue on ontology checking was studied with the conclusion that the four kinds of term checking, including term satisfiability checking, term subsumption checking, term equivalence checking and term disjointness checking, can be reduced to the satisfiability checking, and satisfiability checking can be transformed into instantiation consistence checking. 展开更多
关键词 ONTOLOGY description logics ontology checking term checking instantiation checking
下载PDF
Intrusion Detection Algorithm Based on Model Checking Interval Temporal Logic 被引量:5
11
作者 朱维军 王忠勇 张海宾 《China Communications》 SCIE CSCD 2011年第3期66-72,共7页
Model checking based on linear temporal logic reduces the false negative rate of misuse detection.However,linear temporal logic formulae cannot be used to describe concurrent attacks and piecewise attacks.So there is ... Model checking based on linear temporal logic reduces the false negative rate of misuse detection.However,linear temporal logic formulae cannot be used to describe concurrent attacks and piecewise attacks.So there is still a high rate of false negatives in detecting these complex attack patterns.To solve this problem,we use interval temporal logic formulae to describe concurrent attacks and piecewise attacks.On this basis,we formalize a novel algorithm for intrusion detection based on model checking interval temporal logic.Compared with the method based on model checking linear temporal logic,the new algorithm can find unknown succinct attacks.The simulation results show that the new method can effectively reduce the false negative rate of concurrent attacks and piecewise attacks. 展开更多
关键词 network security intrusion detection misuse detection interval temporal logic model checking
下载PDF
Model Checking-Based Testing of Web Applications 被引量:2
12
作者 ZENG Hongwei MIAO Huaikou 《Wuhan University Journal of Natural Sciences》 CAS 2007年第5期922-926,共5页
A formal model representing the navigation behavior of a Web application as the Kripke structure is proposed and an approach that applies model checking to test case generation is presented. The Object Relation Diagra... A formal model representing the navigation behavior of a Web application as the Kripke structure is proposed and an approach that applies model checking to test case generation is presented. The Object Relation Diagram as the object model is employed to describe the object structure of a Web application design and can be translated into the behavior model. A key problem of model checking-based test generation for a Web application is how to construct a set of trap properties that intend to cause the violations of model checking against the behavior model and output of counterexamples used to construct the test sequences. We give an algorithm that derives trap properties from the object model with respect to node and edge coverage criteria. 展开更多
关键词 Web application test generation model checking consistency relation
下载PDF
Model Checking Workflow Net Based on Petri Net 被引量:2
13
作者 ZHOU Conghua CHEN Zhenyu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1297-1301,共5页
The soundness is a very important criterion for the correctness of the workflow. Specifying the soundness with Computation Tree Logic (CTL) allows us to verify the soundness with symbolic model checkers. Therefore t... The soundness is a very important criterion for the correctness of the workflow. Specifying the soundness with Computation Tree Logic (CTL) allows us to verify the soundness with symbolic model checkers. Therefore the state explosion problem in verifying soundness can be overcome efficiently. When the property is not satisfied by the system, model checking can give a counter-example, which can guide us to correct the workflow. In addition, relaxed soundness is another important criterion for the workflow. We also prove that Computation Tree Logic * (CTL * ) can be used to character the relaxed soundness of the workflow. 展开更多
关键词 model checking computation tree logic (CTL *) Petri nets WORKFLOW
下载PDF
Probabilistic Model Checking-Based Survivability Analysis in Vehicle-to-Vehicle Networks 被引量:1
14
作者 Li Jin Guoan Zhang Jue Wang 《China Communications》 SCIE CSCD 2018年第1期118-127,共10页
Probabilistic model checking has been widely applied to quantitative analysis of stochastic systems, e.g., analyzing the performance, reliability and survivability of computer and communication systems. In this paper,... Probabilistic model checking has been widely applied to quantitative analysis of stochastic systems, e.g., analyzing the performance, reliability and survivability of computer and communication systems. In this paper, we extend the application of probabilistic model checking to the vehicle to vehicle(V2V) networks. We first develop a continuous-time Markov chain(CTMC) model for the considered V2V network, after that, the PRISM language is adopted to describe the CTMC model, and continuous-time stochastic logic is used to describe the objective survivability properties. In the analysis, two typical failures are considered, namely the node failure and the link failure, respectively induced by external malicious attacks on a target V2V node, and interrupt in a communication link. Considering these failures, their impacts on the network survivability are demonstrated. It is shown that with increasing failure strength, the network survivability is reduced. On the other hand, the network survivability can be improved with increasing repair rate. The proposed probabilistic model checking-based approach can be effectively used in survivability analysis for the V2V networks, moreover, it is anticipated that the approach can be conveniently extended to other networks. 展开更多
关键词 V2V SURVIVABILITY ANALYSIS prob-abilistic MODEL checking PRISM
下载PDF
A New Design and Implementation of an Attendance Checking Node for Coal Mines 被引量:4
15
作者 XIA Shi-xiong QIAO Da-lei CHEN Dai ZHOU Yong 《Journal of China University of Mining and Technology》 EI 2007年第2期193-196,共4页
A novel design and implementation of an attendance checking node for coal mines based on the CAN bus is presented in this paper. Hardware circuits and programming methods for the attendance checking node are discussed... A novel design and implementation of an attendance checking node for coal mines based on the CAN bus is presented in this paper. Hardware circuits and programming methods for the attendance checking node are discussed,including the single-chip computer with CAN controller AT89C51CC03,the CAN bus transceiver TJA1050,the large capacity DataFlash memory,the real-time clock DS1302,the voice chip ISD2560 and the card-reading circuit in Wie-gand format. All the extended hardware satisfies the requirements for intrinsically safe circuits (GB3836.4-2000) and intrinsically safe authentication promoted by the national explosion-proof institute. Further,the software programming methods for the CAN controller (AT89C51CC03) and the implementation of the CAN communications protocol are presented as well. 展开更多
关键词 CAN bus attendance checking node wiegand message passing
下载PDF
Spatial Topology Rule Checking Algorithm of Linear Entity Based on Quadtree 被引量:1
16
作者 Shunping ZHOU Shaohuai CHEN Bo WAN 《Journal of Geographic Information System》 2009年第1期1-4,共4页
Spatial topology rule is the primary method to insure the consistency and validity of spatial topology relation in GIS software. Topology rule can be divided into three categories according to geographic entity’s geo... Spatial topology rule is the primary method to insure the consistency and validity of spatial topology relation in GIS software. Topology rule can be divided into three categories according to geographic entity’s geometric shape: point topology rule, line topology rule and polygon topology rule. At first, this paper summarizes the various linear geographic entities’ topological relations which have practical application, then designs a series of linear entity topology rules detailedly. Based on these rules, this paper proposes a topology rule checking algorithm using quadtree, which is designed on the basis of MAPGIS7.4 spatial data model. The algorithm has already been applied to MAPGIS platform and gained good effects. 展开更多
关键词 LINEAR ENTITY TOPOLOGY RULE RULE check QUADTREE
下载PDF
Significance of three step prescription checking by pharmacists 被引量:1
17
作者 Mikako Shimone Daisuke Nagano +6 位作者 Asami Matsushita Junko Tsukamoto Yu Yanai Akiko Kaneta Kyoko Obayashi Takuya Araki Koujirou Yamamoto 《Asian Journal of Pharmaceutical Sciences》 SCIE CAS 2016年第1期213-214,共2页
In many hospitals,prescription checks are conducted by 2 or 3 individual pharmacists at each step of prescription checking,dispensing,and final checking to maintain the safety and efficacy of pharmaceutical therapies ... In many hospitals,prescription checks are conducted by 2 or 3 individual pharmacists at each step of prescription checking,dispensing,and final checking to maintain the safety and efficacy of pharmaceutical therapies in Japan[1,2].In Gunma University Hospital,we also check all prescriptions by 3 pharmacists at each step of dispensing(3 step prescription check system)with the exception of night time.In this study,to assess the significance of our 3 step prescription check system for managing safety of pharmaceutical therapies,we investigated prescriptions that needed the confirmation of questionable points and prescription corrections. 展开更多
关键词 PRESCRIPTION checking Safe management Data analysis Questionable POINTS to PHYSICIANS
下载PDF
Analysis of Security of Quantum Key Distribution Based on Entangled Photon Pairs by Model Checking 被引量:1
18
作者 Surapol Rochanapratishtha Wanchai Pijitrojana 《Journal of Quantum Information Science》 2015年第3期103-108,共6页
Quantum key distribution is a technique to securely distribute a bit string between two parties by using the laws of quantum mechanics. The security of this technique depends on the basis of quantum mechanics rather t... Quantum key distribution is a technique to securely distribute a bit string between two parties by using the laws of quantum mechanics. The security of this technique depends on the basis of quantum mechanics rather than the difficulty of the mathematical calculation as in the classical encoding. Researches in this field have shown that the quantum key distribution will be fully functioning outside the laboratory in a few years. Due to the complexity and the high efficiency of the device, the verification is needed. In this article, we use PRISM to verify the security of the quantum key distribution protocol, which uses the entangled photon based on BB84 protocol. 展开更多
关键词 CRYPTOGRAPHY QUANTUM CRYPTOGRAPHY QUANTUM KEY Distribution Model checking
下载PDF
GPS based checking survey and precise DEM development in Open mine 被引量:1
19
作者 徐爱功 《Journal of Coal Science & Engineering(China)》 2008年第2期291-293,共3页
The checking survey in Open mine is one of the most frequent and important work.It plays the role of forming a connecting link between open mine planning and pro- duction.Traditional checking method has such disadvant... The checking survey in Open mine is one of the most frequent and important work.It plays the role of forming a connecting link between open mine planning and pro- duction.Traditional checking method has such disadvantages as long time consumption, heavy workload,complicated calculating process,and lower automation.Used GPS and GIS technologies to systematically study the core issues of checking survey in open mine. A detail GPS data acquisition coding scheme was presented.Based on the scheme an algorithm used for computer semiautomatic cartography was made.Three methods used for eliminating gross errors from raw data which were needed for creating DEM was dis- cussed.Two algorithms were researched and realized which can be used to create open mine fine DEM model with constrained conditions and to dynamically update the model. The precision analysis and evaluation of the created model were carried out. 展开更多
关键词 checking survey data coding gross error elimination constrained triangle net-work fine DEM model
下载PDF
Abstract Model Checking for Web Services
20
作者 QIAN Junyan CAI Guoyong GU Tianlong ZHAO Lingzhong 《Wuhan University Journal of Natural Sciences》 CAS 2008年第4期466-470,共5页
Web-services are highly distributed programs, and concurrent software is notoriously error-prone. Model checking is a powerful technique to find bugs in concurrent systems. However, the existing model checkers have no... Web-services are highly distributed programs, and concurrent software is notoriously error-prone. Model checking is a powerful technique to find bugs in concurrent systems. However, the existing model checkers have no enough ability to support for the programming languages and communication mechanisms used for Web services. We propose to use Kripke structures as means of modeling Web service. This paper presents an automated way to extract formal models from programs implementing Web services using predicate abstraction for abstract model checking. The abstract models are checked by means of a model checker that implements automatic abstraction refinement. These results enable the verification of the applications that implement Web services. 展开更多
关键词 Web-services model checking predicate abstraction hypertext preprocessor
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部