期刊文献+
共找到86篇文章
< 1 2 5 >
每页显示 20 50 100
Computation Tree Logic Model Checking of Multi-Agent Systems Based on Fuzzy Epistemic Interpreted Systems
1
作者 Xia Li Zhanyou Ma +3 位作者 Zhibao Mian Ziyuan Liu Ruiqi Huang Nana He 《Computers, Materials & Continua》 SCIE EI 2024年第3期4129-4152,共24页
Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as s... Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as safety and liveness,there is still a lack of quantitative and uncertain property verifications for these systems.In uncertain environments,agents must make judicious decisions based on subjective epistemic.To verify epistemic and measurable properties in multi-agent systems,this paper extends fuzzy computation tree logic by introducing epistemic modalities and proposing a new Fuzzy Computation Tree Logic of Knowledge(FCTLK).We represent fuzzy multi-agent systems as distributed knowledge bases with fuzzy epistemic interpreted systems.In addition,we provide a transformation algorithm from fuzzy epistemic interpreted systems to fuzzy Kripke structures,as well as transformation rules from FCTLK formulas to Fuzzy Computation Tree Logic(FCTL)formulas.Accordingly,we transform the FCTLK model checking problem into the FCTL model checking.This enables the verification of FCTLK formulas by using the fuzzy model checking algorithm of FCTL without additional computational overheads.Finally,we present correctness proofs and complexity analyses of the proposed algorithms.Additionally,we further illustrate the practical application of our approach through an example of a train control system. 展开更多
关键词 Model checking multi-agent systems fuzzy epistemic interpreted systems fuzzy computation tree logic transformation algorithm
下载PDF
Completeness of bounded model checking temporal logic of knowledge
2
作者 刘志锋 葛云 +1 位作者 章东 周从华 《Journal of Southeast University(English Edition)》 EI CAS 2010年第3期399-405,共7页
In order to find the completeness threshold which offers a practical method of making bounded model checking complete, the over-approximation for the complete threshold is presented. First, a linear logic of knowledge... In order to find the completeness threshold which offers a practical method of making bounded model checking complete, the over-approximation for the complete threshold is presented. First, a linear logic of knowledge is introduced into the past tense operator, and then a new temporal epistemic logic LTLKP is obtained, so that LTLKP can naturally and precisely describe the system's reliability. Secondly, a set of prior algorithms are designed to calculate the maximal reachable depth and the length of the longest of loop free paths in the structure based on the graph structure theory. Finally, some theorems are proposed to show how to approximate the complete threshold with the diameter and recurrence diameter. The proposed work resolves the completeness threshold problem so that the completeness of bounded model checking can be guaranteed. 展开更多
关键词 bounded model checking temporal logics of knowledge multi-agent system
下载PDF
Intrusion Detection Algorithm Based on Model Checking Interval Temporal Logic 被引量:5
3
作者 朱维军 王忠勇 张海宾 《China Communications》 SCIE CSCD 2011年第3期66-72,共7页
Model checking based on linear temporal logic reduces the false negative rate of misuse detection.However,linear temporal logic formulae cannot be used to describe concurrent attacks and piecewise attacks.So there is ... Model checking based on linear temporal logic reduces the false negative rate of misuse detection.However,linear temporal logic formulae cannot be used to describe concurrent attacks and piecewise attacks.So there is still a high rate of false negatives in detecting these complex attack patterns.To solve this problem,we use interval temporal logic formulae to describe concurrent attacks and piecewise attacks.On this basis,we formalize a novel algorithm for intrusion detection based on model checking interval temporal logic.Compared with the method based on model checking linear temporal logic,the new algorithm can find unknown succinct attacks.The simulation results show that the new method can effectively reduce the false negative rate of concurrent attacks and piecewise attacks. 展开更多
关键词 network security intrusion detection misuse detection interval temporal logic model checking
下载PDF
Capability requirements modeling and verification based on fuzzy ontology 被引量:4
4
作者 Qingchao Dong Zhixue Wang Weixing Zhu Hongyue He 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2012年第1期78-87,共10页
The capability requirements of the command, control, communication, computing, intelligence, surveillance, reconnaissance (C41SR) systems are full of uncertain and vague information, which makes it difficult to mode... The capability requirements of the command, control, communication, computing, intelligence, surveillance, reconnaissance (C41SR) systems are full of uncertain and vague information, which makes it difficult to model the C41SR architecture. The paper presents an approach to modeling the capability requirements with the fuzzy unified modeling language (UML) and building domain ontologies with fuzzy description logic (DL). The UML modeling constructs are extended according to the meta model of Depart- ment of Defense Architecture Framework to improve their domain applicability, the fuzzy modeling mechanism is introduced to model the fuzzy efficiency features of capabilities, and the capability requirement models are converted into ontologies formalized in fuzzy DL so that the model consistency and reasonability can be checked with a DL reasoning system. Finally, a case study of C41SR capability requirements model checking is provided to demonstrate the availability and applicability of the method. 展开更多
关键词 fuzzy ontology fuzzy unified modeling language (UML) fuzzy description logic (DL) model checking.
下载PDF
Model Checking-Based Testing of Web Applications 被引量:2
5
作者 ZENG Hongwei MIAO Huaikou 《Wuhan University Journal of Natural Sciences》 CAS 2007年第5期922-926,共5页
A formal model representing the navigation behavior of a Web application as the Kripke structure is proposed and an approach that applies model checking to test case generation is presented. The Object Relation Diagra... A formal model representing the navigation behavior of a Web application as the Kripke structure is proposed and an approach that applies model checking to test case generation is presented. The Object Relation Diagram as the object model is employed to describe the object structure of a Web application design and can be translated into the behavior model. A key problem of model checking-based test generation for a Web application is how to construct a set of trap properties that intend to cause the violations of model checking against the behavior model and output of counterexamples used to construct the test sequences. We give an algorithm that derives trap properties from the object model with respect to node and edge coverage criteria. 展开更多
关键词 Web application test generation model checking consistency relation
下载PDF
Model Checking Workflow Net Based on Petri Net 被引量:2
6
作者 ZHOU Conghua CHEN Zhenyu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1297-1301,共5页
The soundness is a very important criterion for the correctness of the workflow. Specifying the soundness with Computation Tree Logic (CTL) allows us to verify the soundness with symbolic model checkers. Therefore t... The soundness is a very important criterion for the correctness of the workflow. Specifying the soundness with Computation Tree Logic (CTL) allows us to verify the soundness with symbolic model checkers. Therefore the state explosion problem in verifying soundness can be overcome efficiently. When the property is not satisfied by the system, model checking can give a counter-example, which can guide us to correct the workflow. In addition, relaxed soundness is another important criterion for the workflow. We also prove that Computation Tree Logic * (CTL * ) can be used to character the relaxed soundness of the workflow. 展开更多
关键词 model checking computation tree logic (CTL *) Petri nets WORKFLOW
下载PDF
Identifying Counterexamples Without Variability in Software Product Line Model Checking 被引量:2
7
作者 Ling Ding Hongyan Wan +1 位作者 Luokai Hu Yu Chen 《Computers, Materials & Continua》 SCIE EI 2023年第5期2655-2670,共16页
Product detection based on state abstraction technologies in the software product line(SPL)is more complex when compared to a single system.This variability constitutes a new complexity,and the counterexample may be v... Product detection based on state abstraction technologies in the software product line(SPL)is more complex when compared to a single system.This variability constitutes a new complexity,and the counterexample may be valid for some products but spurious for others.In this paper,we found that spurious products are primarily due to the failure states,which correspond to the spurious counterexamples.The violated products correspond to the real counterexamples.Hence,identifying counterexamples is a critical problem in detecting violated products.In our approach,we obtain the violated products through the genuine counterexamples,which have no failure state,to avoid the tedious computation of identifying spurious products dealt with by the existing algorithm.This can be executed in parallel to improve the efficiency further.Experimental results showthat our approach performswell,varying with the growth of the system scale.By analyzing counterexamples in the abstract model,we observed that spurious products occur in the failure state.The approach helps in identifying whether a counterexample is spurious or genuine.The approach also helps to check whether a failure state exists in the counterexample.The performance evaluation shows that the proposed approach helps significantly in improving the efficiency of abstraction-based SPL model checking. 展开更多
关键词 Software product line model checking parallel algorithm
下载PDF
Automatic Verification of Biochemical Network Using Model Checking Method
8
作者 Jinkyung Kim Younghee Lee Il Moon 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2008年第1期90-94,共5页
This study focuses on automatic searching and verifying methods for the teachability, transition logics and hierarchical structure in all possible paths of biological processes using model checking. The automatic sear... This study focuses on automatic searching and verifying methods for the teachability, transition logics and hierarchical structure in all possible paths of biological processes using model checking. The automatic search and verification for alternative paths within complex and large networks in biological process can provide a considerable amount of solutions, which is difficult to handle manually. Model checking is an automatic method for verifying if a circuit or a condition, expressed as a concurrent transition system, satisfies a set of properties expressed in a temporal logic, such as computational tree logic (CTL). This article represents that model checking is feasible in biochemical network verification and it shows certain advantages over simulation for querying and searching of special behavioral properties in biochemical processes. 展开更多
关键词 automatic verification path networks biological process model checking computational tree logic
下载PDF
Abstract Model Checking for Web Services
9
作者 QIAN Junyan CAI Guoyong GU Tianlong ZHAO Lingzhong 《Wuhan University Journal of Natural Sciences》 CAS 2008年第4期466-470,共5页
Web-services are highly distributed programs, and concurrent software is notoriously error-prone. Model checking is a powerful technique to find bugs in concurrent systems. However, the existing model checkers have no... Web-services are highly distributed programs, and concurrent software is notoriously error-prone. Model checking is a powerful technique to find bugs in concurrent systems. However, the existing model checkers have no enough ability to support for the programming languages and communication mechanisms used for Web services. We propose to use Kripke structures as means of modeling Web service. This paper presents an automated way to extract formal models from programs implementing Web services using predicate abstraction for abstract model checking. The abstract models are checked by means of a model checker that implements automatic abstraction refinement. These results enable the verification of the applications that implement Web services. 展开更多
关键词 Web-services model checking predicate abstraction hypertext preprocessor
下载PDF
UML statechart based rigorous modeling of real-time system
10
作者 赖明志 尤晋元 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第1期74-80,共7页
Rigorous modeling could ensure correctness and could verify a reduced cost in embedded real-time system development for models. Software methods are needed for rigorous modeling of embedded real-time systems. PVS is a... Rigorous modeling could ensure correctness and could verify a reduced cost in embedded real-time system development for models. Software methods are needed for rigorous modeling of embedded real-time systems. PVS is a formal method with precise syntax and semantics defined. System modeled by PVS specification could be verified by tools. Combining the widely used UML with PVS, this paper provides a novel modeling and verification approach for embedded real-time systems. In this approach, we provide 1) a time-extended UML statechart for modeling dynamic behavior of an embedded real-time system; 2) an approach to capture timed automata based semantics from a timed statechart; and 3) an algorithm to generate a finite state model expressed in PVS specification for model checking. The benefits of our approach include flexibility and user friendliness in modeling, extendability in formalization and verification content, and better performance. Time constraints are modeled and verified and is a highlight of this paper. 展开更多
关键词 embedded real-time system UML statechart PVS timed automata model checking
下载PDF
Generating test case specifications of web service composition using model checking
11
作者 钱铃莉 陈怡海 《Journal of Shanghai University(English Edition)》 CAS 2011年第5期409-414,共6页
Model checking techniques have been widely used in verifying web service compositions to ensure the trustworthi- ness. However, little research has focused on testing web services. Based on the research of model check... Model checking techniques have been widely used in verifying web service compositions to ensure the trustworthi- ness. However, little research has focused on testing web services. Based on the research of model checking techniques~ we propose a model checking based approach for testing web service composition which is described by using the web services choreography description language (WS-CDL). According to worldwide web consortium (W3C) candidate recommendation, the WS-CDL specification provides a language for characterizing interactions between distinct web services using XML. Since the behaviors of web service composition are asynchronous, distributed, low-coupled and platform independent, we employ the guarded automata (GA) model for specifying the composition described in WS-CDL and using the simple promela interpreter (SPIN) model checker for detecting the collaborations of web services. Test cases can be transformed from counterexamples generated by SPIN using adequacy criteria. In this paper we apply the transition coverage criterion for generating counterex- amples. To illustrate our approach, we set "E-commerce service system" as an example for demonstrating how test cases can be generated using SPIN for compositions specified in WS-CDL. 展开更多
关键词 model-based testing web services choregraphy description language (WS-CDL) model checking simple promela interpreter (SPIN) test cases
下载PDF
Rigorous Modeling of Real-time System Based on UML and PVS
12
作者 赖明志 尤晋元 《Journal of Donghua University(English Edition)》 EI CAS 2005年第1期16-21,共6页
Rigorous modeling could improve the correctness and reduce cost in embedded real-time system development for models could be verified. Tools are needed for rigorous modeling of embedded real-time system. UML is an ind... Rigorous modeling could improve the correctness and reduce cost in embedded real-time system development for models could be verified. Tools are needed for rigorous modeling of embedded real-time system. UML is an industrial standard modeling language which provides a powerful expressi-veness, intuitive and easy to use interface to model. UML is widely accepted by software developer. However, for lack of precisely defined semantics, especially on the dynamic diagrams, UML model is hard to be verified. PVS is a general formal method which provides a high-order logic specification language and integrated with model checking and theorem proving tools. Combining the widely used UML with PVS, this paper provides a novel modeling and verification approach for embedded real-time system. In this approach, we provide 1) a timed extended UML statechart for modeling dynamic behavior of an embedded real-time system; 2) an approach to capture timed automata based semantics from timed statechart; and 3) an algorithm to generate a finite state model expressed in PVS specification for model checking. The benefits of our approach include flexible and friendly in modeling, extendable in forma-lization and verification content, and better performance. Time constraints are modeled and verified and it’s a highlight of this paper. 展开更多
关键词 Embedded Real-time System UML Statechart PVS Timed Automata Model checking.
下载PDF
Model Checking over Paraconsistent Temporal Logic
13
作者 陈冬火 王林章 崔家林 《Journal of Donghua University(English Edition)》 EI CAS 2008年第5期571-580,共10页
Classical logic cannot be used to effectively reason about concurrent systems with inconsistencies (inconsistencies often occur, especially in the early stage of the development, when large and complex concurrent syst... Classical logic cannot be used to effectively reason about concurrent systems with inconsistencies (inconsistencies often occur, especially in the early stage of the development, when large and complex concurrent systems are developed). In this paper, we propose the use of a guasi-classical temporal logic (QCTL) for supporting the verification of temporal properties of such systems even where the consistent model is not available. Our models are paraKripke structures (extended standard Kripke structures), in which both a formula and its negation are satisfied in a same state, and properties to be verified are expressed by QCTL with paraKripke structures semantics. We introduce a novel notion of paraKripke models, which grasps the paraconsistent character of the entailment relation of QCTL. Furthermore, we explore the methodology of model checking over QCTL, and describe the detailed algorithm of implementing QCTL model checker. In the sequel, a simple example is presented, showing how to exploit the proposed model checking technique to verify the temporal properties of inconsistent concurrent systems. 展开更多
关键词 INCONSISTENCY concurrent systems paraconsistent temporal logic model checking
下载PDF
Model checking web services choreography in process analysis toolkit
14
作者 许东 雷州 +1 位作者 李卫民 张博锋 《Journal of Shanghai University(English Edition)》 2010年第1期45-49,共5页
Web service (WS) is an emerging software technology, especially acting an important role in cloud computing. The WS choreography description language (WS-CDL) is the standard for modeling the observable behavior o... Web service (WS) is an emerging software technology, especially acting an important role in cloud computing. The WS choreography description language (WS-CDL) is the standard for modeling the observable behavior of WS composition across multiple participants from a global point of view. However, it lacks of a formal semantics and could easily lead to misunderstanding and different implementations. In this paper, the WS-CDL based specifications are formally extracted in a communicating sequential process supporting a formal approach to checking WS models. In addition, formalisms and model checking are explicitly illustrated through a simple but non-trivial example with the help of model checker process analysis toolkit (PAT). 展开更多
关键词 model checking web service (WS) communicating sequential processes (CSP)
下载PDF
Review of Software Model-Checking Techniques for Dealing with Error Detection in Program Codes
15
作者 Ednah Olubunmi Aliyu 《Journal of Software Engineering and Applications》 2023年第6期170-192,共23页
Debugging software code has been a challenge for software developers since the early days of computer programming. A simple need, because the world is run by software. So perhaps the biggest engineering challenge is f... Debugging software code has been a challenge for software developers since the early days of computer programming. A simple need, because the world is run by software. So perhaps the biggest engineering challenge is finding ways to make software more reliable. This review provides an overview of techniques developed over time in the field of software model checking to solve the problem of detecting errors in program code. In addition, the challenges posed by this technology are discussed and ways to mitigate them in future research and applications are proposed. A comprehensive examination of the various model verification methods used to detect program code errors is intended to lay the foundation for future research in this area. 展开更多
关键词 Software Model checking Symbolic Execution State Explosion ABSTRACTION Test Case Generations
下载PDF
Influence of initial check, information exchange, final accuracy check, reaction information nursing on the psychology of elderly with lung cancer 被引量:2
16
作者 Cui Jiang Jing Ma +1 位作者 Wen He Hai-Ying Zhang 《World Journal of Clinical Cases》 SCIE 2024年第4期737-745,共9页
BACKGROUND As one of the fatal diseases with high incidence,lung cancer has seriously endangered public health and safety.Elderly patients usually have poor self-care and are more likely to show a series of psychologi... BACKGROUND As one of the fatal diseases with high incidence,lung cancer has seriously endangered public health and safety.Elderly patients usually have poor self-care and are more likely to show a series of psychological problems.AIM To investigate the effectiveness of the initial check,information exchange,final accuracy check,reaction(IIFAR)information care model on the mental health status of elderly patients with lung cancer.METHODS This study is a single-centre study.We randomly recruited 60 elderly patients with lung cancer who attended our hospital from January 2021 to January 2022.These elderly patients with lung cancer were randomly divided into two groups,with the control group taking the conventional propaganda and education and the observation group taking the IIFAR information care model based on the conventional care protocol.The differences in psychological distress,anxiety and depression,life quality,fatigue,and the locus of control in psychology were compared between these two groups,and the causes of psychological distress were analyzed.RESULTS After the intervention,Distress Thermometer,Hospital Anxiety and Depression Scale(HADS)for anxiety and the HADS for depression,Revised Piper’s Fatigue Scale,and Chance Health Locus of Control scores were lower in the observation group compared to the pre-intervention period in the same group and were significantly lower in the observation group compared to those of the control group(P<0.05).After the intervention,Quality of Life Questionnaire Core 30(QLQ-C30),Internal Health Locus of Control,and Powerful Others Health Locus of Control scores were significantly higher in the observation and the control groups compared to the pre-intervention period in their same group,and QLQ-C30 scores were significantly higher in the observation group compared to those of the control group(P<0.05).CONCLUSION The IIFAR information care model can help elderly patients with lung cancer by reducing their anxiety and depression,psychological distress,and fatigue,improving their tendencies on the locus of control in psychology,and enhancing their life qualities. 展开更多
关键词 Initial check information exchange final accuracy check reaction information care model Lung cancer Mental health
下载PDF
Approach to adaptive service matchmaking
17
作者 陈旺虎 韩燕波 +2 位作者 王菁 刘晨 王建武 《Journal of Southeast University(English Edition)》 EI CAS 2007年第3期408-412,共5页
To make service matchmaking more adaptive to various service requests and diverse web services, an adaptive approach-ASMA is proposed to service matchmaking based on temporal logic model-checking. The approach is base... To make service matchmaking more adaptive to various service requests and diverse web services, an adaptive approach-ASMA is proposed to service matchmaking based on temporal logic model-checking. The approach is based on the proposed abstract service model, ASM-TL, which addresses some important constraints for identifying capabilities of web services, such as service inner constraints and invocation constraints, and also has a virtual process model for describing service behavioral properties. By treating service requests as temporal logic conditions and web services as temporal models, ASMA does service matchmaking through model checking. Therefore, ASMA makes service matchmaking more accurate and more adaptive to the variety of service requests and the diversity of web services. The approach has been applied to the problem solving environment (PSE) for bioinformatics research. Applications show that the approach is suitable for dynamic environments. 展开更多
关键词 service matchmaking service model model checking temporal logic
下载PDF
TESTING THE ADEQUACY OF GARCH-TYPE MODELS IN TIME SERIES 被引量:1
18
作者 吴鑑洪 朱力行 《Acta Mathematica Scientia》 SCIE CSCD 2009年第2期327-340,共14页
In this article a new approach for checking the adequacy of GARCH-type models in time series was proposed. The resulted tests involve weight functions, which provide them with the flexibility in choosing scores to enh... In this article a new approach for checking the adequacy of GARCH-type models in time series was proposed. The resulted tests involve weight functions, which provide them with the flexibility in choosing scores to enhance power performance. The choice of weight functions and the power properties of the tests are studied. For a large number of alternatives, asymptotically distribution-free maximin test is constructed. The tests are asymptotically chi-squared under the null hypothesis and easy to implement. Simulation results indicate that the tests perform well. 展开更多
关键词 GARCH-type models maximin test model diagnostic checking score type test
下载PDF
An Intrusion Detection Algorithm for Wireless Networks Based on ASDL 被引量:1
19
作者 Weijun Zhu Miaolei Deng Qinglei Zhou 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2018年第1期92-107,共16页
Wireless networks are more vulnerable to cyberattacks than cable networks. Compared with the misuse intrusion detection techniques based on pattern matching, the techniques based on model checking(MC) have a series of... Wireless networks are more vulnerable to cyberattacks than cable networks. Compared with the misuse intrusion detection techniques based on pattern matching, the techniques based on model checking(MC) have a series of comparative advantages. However, the temporal logics employed in the existing latter techniques cannot express conveniently the complex attacks with synchronization phenomenon. To address this problem, we formalize a novel temporal logic language called attack signature description language(ASDL). On the basis of it, we put forward an ASDL model checking algorithm. Furthermore, we use ASDL programs, which can be considered as temporal logic formulas,to describe attack signatures, and employ other ASDL programs to create an audit log. As a result, the ASDL model checking algorithm can be presented for automatically verifying whether or not the latter programs satisfy the formulas, that is, whether or not the audit log coincides with the attack signatures. Thus,an intrusion detection algorithm based on ASDL is obtained. The case studies and simulations show that the new method can find coordinated chop-chop attacks. 展开更多
关键词 Attack signature description language(ASDL) intrusion detection(ID) model checking(MC) temporal logic
下载PDF
DYNAMICS MODEL AND SIMULATION OF FLAT VALVE SYSTEM OF INTERNAL COMBUSTION WATER PUMP 被引量:39
20
作者 Zhang Hongxin Zhang Tiezhu +2 位作者 Wang Yushun Zhao Hong Huo Wei 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2005年第3期411-414,共4页
The dynamics differential equations are constructed, and the initial conditions are also given. Simulation shows the following conclusions: The water pressure in cylinder has great instantaneous pulsation and phase s... The dynamics differential equations are constructed, and the initial conditions are also given. Simulation shows the following conclusions: The water pressure in cylinder has great instantaneous pulsation and phase step when outlet valve or inlet valve opens, but is more gently in other time; The volume efficiency is influenced by the output pressure slightly, and decreases as the working rotational speed increases; When the inherent frequency of the valves is integer multiple of the working frequency, the volume efficiency of system will decrease evidently. 展开更多
关键词 Check valve Simulation Dynamics model Internal combustion water pump(ICWP)
下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部