期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
On the use of formal methods to model and verify neuronal archetypes
1
作者 Elisabetta DE MARIA Abdorrahim BAHRAMI +4 位作者 Thibaud L'YVONNET Amy FELTY Daniel GAFFÉ Annie RESSOUCHE Franck GRAMMONT 《Frontiers of Computer Science》 SCIE EI CSCD 2022年第3期101-122,共22页
Having a formal model of neural networks can greatly help in understanding and verifying their properties,behavior,and response to external factors such as disease and medicine.In this paper,we adopt a formal model to... Having a formal model of neural networks can greatly help in understanding and verifying their properties,behavior,and response to external factors such as disease and medicine.In this paper,we adopt a formal model to represent neurons,some neuronal graphs,and their composition.Some specific neuronal graphs are known for having biologically relevant structures and behaviors and we call them archetypes.These archetypes are supposed to be the basis of typical instances of neuronal information processing.In this paper we study six fundamental archetypes(simple series,series with multiple outputs,parallel composition,negative loop,inhibition of a behavior,and contralateral inhibition),and we consider two ways to couple two archetypes:(i)connecting the output(s)of the first archetype to the input(s)of the second archetype and(ii)nesting the first archetype within the second one.We report and compare two key approaches to the formal modeling and verification of the proposed neuronal archetypes and some selected couplings.The first approach exploits the synchronous programming language Lustre to encode archetypes and their couplings,and to express properties concerning their dynamic behavior.These properties are verified thanks to the use of model checkers.The second approach relies on a theorem prover,the Coq Proof Assistant,to prove dynamic properties of neurons and archetypes. 展开更多
关键词 neuronal networks leaky integrate and fire modeling synchronous languages model checking theorem proving LUSTRE COQ formal methods
原文传递
Formal methods, statistical debugging and exploratory analysis in support of system development: Towards a verification and validation calculator tool
2
作者 Saikou Y.Diallo Ross Gore +1 位作者 Christopher J.Lynch Jose J.Padilla 《International Journal of Modeling, Simulation, and Scientific Computing》 EI 2016年第1期120-141,共22页
In this paper,we propose an approach to formally verify and rigorously validate a simulation system against the specification of the real system.We implement the approach in a verification and validation calculator to... In this paper,we propose an approach to formally verify and rigorously validate a simulation system against the specification of the real system.We implement the approach in a verification and validation calculator tool that takes as input a set of statements that capture the requirements,internal conditions of the system and expected outputs of the real system and produces as output whether the simulation satisfies the requirements,faithfully represents the internal conditions of the system and produces the expected outputs.We provide a use case to show how subject matter experts can apply the tool. 展开更多
关键词 Verification and validation formal methods modeling and simulation
原文传递
MF2-DMTD: A Formalism and Game-Based Reasoning Framework for Optimized Drone-Type Moving Target Defense
3
作者 Sang Seo Jaeyeon Lee +2 位作者 Byeongjin Kim Woojin Lee Dohoon Kim 《Computers, Materials & Continua》 SCIE EI 2023年第11期2595-2628,共34页
Moving-target-defense(MTD)fundamentally avoids an illegal initial compromise by asymmetrically increasing the uncertainty as the attack surface of the observable defender changes depending on spatial-temporal mutation... Moving-target-defense(MTD)fundamentally avoids an illegal initial compromise by asymmetrically increasing the uncertainty as the attack surface of the observable defender changes depending on spatial-temporal mutations.However,the existing naive MTD studies were conducted focusing only on wired network mutations.And these cases have also been no formal research on wireless aircraft domains with attributes that are extremely unfavorable to embedded system operations,such as hostility,mobility,and dependency.Therefore,to solve these conceptual limitations,this study proposes normalized drone-type MTD that maximizes defender superiority by mutating the unique fingerprints of wireless drones and that optimizes the period-based mutation principle to adaptively secure the sustainability of drone operations.In addition,this study also specifies MF2-DMTD(model-checkingbased formal framework for drone-type MTD),a formal framework that adopts model-checking and zero-sum game,for attack-defense simulation and performance evaluation of drone-type MTD.Subsequently,by applying the proposed models,the optimization of deceptive defense performance of drone-type MTD for each mutation period also additionally achieves through mixed-integer quadratic constrained programming(MIQCP)and multiobjective optimization-based Pareto frontier.As a result,the optimal mutation cycles in drone-type MTD were derived as(65,120,85)for each control-mobility,telecommunication,and payload component configured inside the drone.And the optimal MTD cycles for each swarming cluster,ground control station(GCS),and zone service provider(ZSP)deployed outside the drone were also additionally calculated as(70,60,85),respectively.To the best of these authors’knowledge,this study is the first to calculate the deceptive efficiency and functional continuity of the MTD against drones and to normalize the trade-off according to a sensitivity analysis with the optimum. 展开更多
关键词 Moving-target-defense(MTD) DRONE formal methods game theory
下载PDF
Graphical Transformation of OWL Ontologies to Event-B Formal Models
4
作者 Eman H.Alkhammash 《Computers, Materials & Continua》 SCIE EI 2022年第2期3733-3750,共18页
Formal methods use mathematical models to develop systems.Ontologies are formal specifications that provide reusable domain knowledge representations.Ontologies have been successfully used in several data-driven appli... Formal methods use mathematical models to develop systems.Ontologies are formal specifications that provide reusable domain knowledge representations.Ontologies have been successfully used in several data-driven applications,including data analysis.However,the creation of formal models from informal requirements demands skill and effort.Ambiguity,inconsistency,imprecision,and incompleteness are major problems in informal requirements.To solve these problems,it is necessary to have methods and approaches for supporting the mapping of requirements to formal specifications.The purpose of this paper is to present an approach that addresses this challenge by using theWeb Ontology Language(OWL)to construct Event-B formal models and support data analysis.Our approach reduces the burden of working with the formal notations of OWL ontologies and Event-B models and aims to analyze domain knowledge and construct Event-B models from OWL ontologies using visual diagrams.The idea is based on the transformation of OntoGraf diagrams of OWL ontologies to UML-B diagrams for the purpose of bridging the gap between OWL ontologies and Event-B models.Visual data exploration assists with both data analysis and the development of Event-B formal models.To manage complexity,Event-B supports stepwise refinement to allow each requirement to be introduced at themost appropriate stage in the development process.UML-B supports refinement,so we also introduce an approach that allows us to divide and layer OntoGraf diagrams. 展开更多
关键词 Data analysis OWL ontologies event-B formal method REFINEMENT requirements OntoGraf
下载PDF
A Comparative Typological Study of Italian and Georgian Jargon Words
5
作者 Nikoloz Esakia 《Sino-US English Teaching》 2022年第6期220-229,共10页
Italian youth speak their own language.The language used by youth can be considered a special language.Italian youth language has different functions.The functions which should be distinguished are:entertainment,expre... Italian youth speak their own language.The language used by youth can be considered a special language.Italian youth language has different functions.The functions which should be distinguished are:entertainment,expression,identity,and secrecy.Today,jargon has the function of entertainment more than that of secrecy.In Georgia,jargon has always been considered a foul and vulgar language.Georgian jargon words are less common than Italian ones.Georgian jargon has become popular recently.The material reviewed in the paper includes 2,700 items taken from dictionaries and the Internet.We divided them into two thematic groups:(1)related to everyday life;and(2)related to vicious aspects of life.The first group includes topics,such as money,work,the police,and youth discourse.The second group includes theft,drugs,sex life,and alcohol.The aim of this paper is to conduct a comparative study of groups of jargon identified as a result of thematic classification,in terms of methods of word formation.The study will allow us to identify semantic and formal methods of jargon word formation applied in these two unrelated languages,as well as similarities and differences between Italian and Georgian jargon words and phraseological units. 展开更多
关键词 youth language JARGON thematic classification semantic and formal methods word formation
下载PDF
Survey of Smart Contract Technology and Application Based on Blockchain 被引量:2
6
作者 Somboun Tern 《Open Journal of Applied Sciences》 2021年第10期1135-1148,共14页
With the vigorous development of blockchain technology represented by</span><span style="font-family:""> Bitcoin, blockchain technology has gradually surpassed the era of programmable curren... With the vigorous development of blockchain technology represented by</span><span style="font-family:""> Bitcoin, blockchain technology has gradually surpassed the era of programmable currency and entered the era of smart contracts. Smart contracts are event-</span><span style="font-family:""> </span><span style="font-family:"">driven and stateful. With the in-depth development of blockchain technology, smart contracts use protocols and user interfaces to complete all steps of the contract process, allowing users to implement personalized code logic on the blockchain. Contract technology has the characteristics of decentralization, autonomy, observability, verifiability, and information sharing. It can effectively build programmable finance and programmable society, and is widely <span>used in digital payment, financial asset disposal, multi-signature contracts,</span> cloud computing, Internet of Things, sharing economy and other fields. First, it ex<span>plains the basic concepts, full life cycle, basic classification, basic structure, </span>key <span>technologies, development status and main technology platforms of smart</span> contracts;then discusses the application scenarios and development issues of smart contract technology, aiming to provide smart contract technology</span><span style="font-family:"">.</span><span style="font-family:""> The research and development provides reference. 展开更多
关键词 Smart Contract Blockchain Distributed Application formal Method Crowdsale Contract
下载PDF
Specification and Verification of Dynamically Reconfigurable Systems Using Dynamic Linear Hybrid Automata
7
作者 Ryo Yanase Tatsunori Sakai +1 位作者 Makoto Sakai Satoshi Yamane 《Journal of Software Engineering and Applications》 2016年第9期452-478,共27页
A dynamically reconfigurable system can change its configuration during operation, and studies of such systems are being carried out in many fields. In particular, medical technology and aerospace engineering must ens... A dynamically reconfigurable system can change its configuration during operation, and studies of such systems are being carried out in many fields. In particular, medical technology and aerospace engineering must ensure system safety because any defect will have serious consequences. Model checking is a method for verifying system safety. In this paper, we propose the Dynamic Linear Hybrid Automaton (DLHA) specification language and show a method to analyze reachability for a system consisting of several DLHAs. 展开更多
关键词 formal Method Model Checking Hybrid Automata Embedded Systems Dynamically Reconfigurable Systems
下载PDF
Binary Logic State Transition Oriented Formal General Reliability Model 被引量:2
8
作者 周一舟 任羿 +2 位作者 刘林林 马政 王自力 《Journal of Shanghai Jiaotong university(Science)》 EI 2015年第4期482-488,共7页
There were various conventional modeling techniques with varied semantics for system reliability assessment, such as fault trees(FT), Markov process(MP), and Petri nets. However, it is strenuous to construct and to ma... There were various conventional modeling techniques with varied semantics for system reliability assessment, such as fault trees(FT), Markov process(MP), and Petri nets. However, it is strenuous to construct and to maintain models utilizing these formalisms throughout the life cycle of system under development. This paper proposes a unified formal modeling language to build a general reliability model. The method eliminates the gap between the actual system and reliability model and shows details of the system clearly. Furthermore,the model could be transformed into FT and MP through specific rules defined by a formal language to assess system-level reliability. 展开更多
关键词 reliability formal modeling method fault trees(FT) Markov process(MP) general reliability model(GRM)
原文传递
A Formal Method for Developing Algebraic and Numerical Algorithms 被引量:1
9
作者 ZUO Zhengkang SU Wei +3 位作者 LIANG Zanyang HUANG Qing WANG Yuan WANG Changjing 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2021年第2期191-199,共9页
The development of algebraic and numerical algorithms is a kind of complicated creative work and it is difficult to guarantee the correctness of the algorithms. This paper introduces a systematic and unified formal de... The development of algebraic and numerical algorithms is a kind of complicated creative work and it is difficult to guarantee the correctness of the algorithms. This paper introduces a systematic and unified formal development method of algebraic and numerical algorithms. The method implements the complete refinement process from abstract specifications to a concrete executable program. It uses the core idea of partition and recursion for formal derivation and combines the mathematical induction based on strict mathematical logic with Hoare axiom for correctness verification. This development method converts creative work into non-creative work as much as possible while ensuring the correctness of the algorithm, which can not only verify the correctness of the existing algebraic and numerical algorithms but also guide the development of efficient unknown algorithms for such problems. This paper takes the non-recursive implementation of the Extended Euclidean Algorithm and Horner's method as examples. Therefore, the effectiveness and feasibility of this method are further verified. 展开更多
关键词 algebraic and numerical algorithms formal method partition and recursion mathematical induction
原文传递
Confidential computing and related technologies:a critical review
10
作者 Muhammad Usama Sardar Christof Fetzer 《Cybersecurity》 EI CSCD 2023年第4期26-32,共7页
This research critically reviews the definition of confidential computing(CC)and the security comparison of CC with other related technologies by the Confidential Computing Consortium(CCC).We demonstrate that the defi... This research critically reviews the definition of confidential computing(CC)and the security comparison of CC with other related technologies by the Confidential Computing Consortium(CCC).We demonstrate that the definitions by CCC are ambiguous,incomplete and even conflicting.We also demonstrate that the security comparison of CC with other technologies is neither scientific nor fair.We highlight the issues in the definitions and comparisons and provide initial recommendations for fixing the issues.These recommendations are the first step towards more precise definitions and reliable comparisons in the future. 展开更多
关键词 Confidential Computing(CC) Trusted Execution Environment(TEE) Homomorphic Encryption(HE) Trusted Platform Module(TPM) formal methods
原文传递
Extension formulae on almost complex manifolds 被引量:1
11
作者 Jixiang Fu Haisheng Liu 《Science China Mathematics》 SCIE CSCD 2021年第1期45-80,共36页
We give the extension formulae on almost complex manifolds and give decompositions of the extension formulae.As applications,we study(n,0)-forms,the(n,0)-Dolbeault cohomology group and(n,q)-forms on almost complex man... We give the extension formulae on almost complex manifolds and give decompositions of the extension formulae.As applications,we study(n,0)-forms,the(n,0)-Dolbeault cohomology group and(n,q)-forms on almost complex manifolds. 展开更多
关键词 deformations of special structures almost complex structures deformations and infinitesimal methods formal methods deformations
原文传递
Multi-agent system motion planning under temporal logic specifications and control barrier function
12
作者 Xinyuan HUANG Li LI Jie CHEN 《Control Theory and Technology》 EI CSCD 2020年第3期269-278,共10页
In this paper,w e provide a novel scheme to solve the motion planning problem of multi-agent systems under high-level task specifications.First,linear temporal logic is applied to express the global task specification... In this paper,w e provide a novel scheme to solve the motion planning problem of multi-agent systems under high-level task specifications.First,linear temporal logic is applied to express the global task specification.Then an efficient and decentralized algorithm is proposed to decom pose it into local tasks.M oreover,w e use control barrier function to synthesize the local controller for each agent under the linear temporal logic motion plan with safety constraint.Finally,simulation results show the effectiveness and efficiency of our proposed scheme. 展开更多
关键词 Temporal logic multi-agent system formal methods control barrier function
原文传递
Quantitative evaluation of model consistency evolution in compositional service-oriented simulation using a connected hyper-digraph
13
作者 Lin-jun FAN Yun-xiang LING +1 位作者 Xing-tao ZHANG Jun TANG 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2014年第1期1-12,共12页
Appropriate maintenance technologies that facilitate model consistency in distributed simulation systems are relevant but generally unavailable.To resolve this problem,we analyze the main factors that cause model inco... Appropriate maintenance technologies that facilitate model consistency in distributed simulation systems are relevant but generally unavailable.To resolve this problem,we analyze the main factors that cause model inconsistency.The analysis methods used for traditional distributed simulations are mostly empirical and qualitative,and disregard the dynamic characteristics of factor evolution in model operational running.Furthermore,distributed simulation applications(DSAs)are rapidly evolving in terms of large-scale,distributed,service-oriented,compositional,and dynamic features.Such developments present difficulty in the use of traditional analysis methods in DSAs,for the analysis of factorial effects on simulation models.To solve these problems,we construct a dynamic evolution mechanism of model consistency,called the connected model hyper-digraph(CMH).CMH is developed using formal methods that accurately specify the evolutional processes and activities of models(i.e.,self-evolution,interoperability,compositionality,and authenticity).We also develop an algorithm of model consistency evolution(AMCE)based on CMH to quantitatively and dynamically evaluate influencing factors.Experimental results demonstrate that non-combination(33.7%on average)is the most influential factor,non-single-directed understanding(26.6%)is the second most influential,and non-double-directed understanding(5.0%)is the least influential.Unlike previous analysis methods,AMCE provides good feasibility and effectiveness.This research can serve as guidance for designers of consistency maintenance technologies toward achieving a high level of consistency in future DSAs. 展开更多
关键词 Model consistency evolution Factor quantification analysis Connected hyper-digraph formal methods Composi-tional service-oriented simulation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部