Model Checking Processes Specified In Join-Calculus Algebra
Sławomir Piotr Maludziński
2014-01-01
Full Text Available This article presents a model checking tool used to verify concurrent systems specified in join-calculus algebra. The temporal properties of systems under verification are expressed in CTL logic. Join-calculus algebra with its operational semantics defined by the chemical abstract machine serves as the basic method for the specification of concurrent systems and their synchronization mechanisms, and allows the examination of more complex systems.
Model Checking Processes Specified In Join-Calculus Algebra
Sławomir Piotr Maludziński; Grzegorz Dobrowolski
2014-01-01
This article presents a model checking tool used to verify concurrent systems specified in join-calculus algebra. The temporal properties of systems under verification are expressed in CTL logic. Join-calculus algebra with its operational semantics defined by the chemical abstract machine serves as the basic method for the specification of concurrent systems and their synchronization mechanisms, and allows the examination of more complex systems.
Analysis of DIRAC's behavior using model checking with process algebra
DIRAC is the grid solution developed to support LHCb production activities as well as user data analysis. It consists of distributed services and agents delivering the workload to the grid resources. Services maintain database back-ends to store dynamic state information of entities such as jobs, queues, staging requests, etc. Agents use polling to check and possibly react to changes in the system state. Each agent's logic is relatively simple; the main complexity lies in their cooperation. Agents run concurrently, and collaborate using the databases as shared memory. The databases can be accessed directly by the agents if running locally or through a DIRAC service interface if necessary. This shared-memory model causes entities to occasionally get into inconsistent states. Tracing and fixing such problems becomes formidable due to the inherent parallelism present. We propose more rigorous methods to cope with this. Model checking is one such technique for analysis of an abstract model of a system. Unlike conventional testing, it allows full control over the parallel processes execution, and supports exhaustive state-space exploration. We used the mCRL2 language and toolset to model the behavior of two related DIRAC subsystems: the workload and storage management system. Based on process algebra, mCRL2 allows defining custom data types as well as functions over these. This makes it suitable for modeling the data manipulations made by DIRAC's agents. By visualizing the state space and replaying scenarios with the toolkit's simulator, we have detected race-conditions and deadlocks in these systems, which, in several cases, were confirmed to occur in the reality. Several properties of interest were formulated and verified with the tool. Our future direction is automating the translation from DIRAC to a formal model.
Analysis of DIRAC's behavior using model checking with process algebra
Remenska, Daniela; Templon, Jeff; Willemse, Tim; Bal, Henri; Verstoep, Kees; Fokkink, Wan; Charpentier, Philippe; Graciani Diaz, Ricardo; Lanciotti, Elisa; Roiser, Stefan; Ciba, Krzysztof
2012-12-01
DIRAC is the grid solution developed to support LHCb production activities as well as user data analysis. It consists of distributed services and agents delivering the workload to the grid resources. Services maintain database back-ends to store dynamic state information of entities such as jobs, queues, staging requests, etc. Agents use polling to check and possibly react to changes in the system state. Each agent's logic is relatively simple; the main complexity lies in their cooperation. Agents run concurrently, and collaborate using the databases as shared memory. The databases can be accessed directly by the agents if running locally or through a DIRAC service interface if necessary. This shared-memory model causes entities to occasionally get into inconsistent states. Tracing and fixing such problems becomes formidable due to the inherent parallelism present. We propose more rigorous methods to cope with this. Model checking is one such technique for analysis of an abstract model of a system. Unlike conventional testing, it allows full control over the parallel processes execution, and supports exhaustive state-space exploration. We used the mCRL2 language and toolset to model the behavior of two related DIRAC subsystems: the workload and storage management system. Based on process algebra, mCRL2 allows defining custom data types as well as functions over these. This makes it suitable for modeling the data manipulations made by DIRAC's agents. By visualizing the state space and replaying scenarios with the toolkit's simulator, we have detected race-conditions and deadlocks in these systems, which, in several cases, were confirmed to occur in the reality. Several properties of interest were formulated and verified with the tool. Our future direction is automating the translation from DIRAC to a formal model.
Optimizing algebraic petri net model checking by slicing
Khan, Yasir Imtiaz; Risoldi, Matteo
2013-01-01
High-level Petri nets make models more concise and read- able as compared to low-level Petri nets. However, usual verification techniques such as state space analysis remain an open challenge for both because of state space explosion. The contribution of this paper is to propose an approach for property based reduction of the state space of Algebraic Petri nets (a variant of high-level Petri nets). To achieve the objective, we propose a slicing algorithm for Algebraic Petri ...
Model Checking Process Algebra of Communicating Resources for Real-time Systems
Boudjadar, Jalil; Kim, Jin Hyun; Larsen, Kim Guldstrand;
2014-01-01
This paper presents a new process algebra, called PACOR, for real-time systems which deals with resource constrained timed behavior as an improved version of the ACSR algebra. We define PACOR as a Process Algebra of Communicating Resources which allows to express preemptiveness, urgent ness and...... original semantics of PACOR and enables the verification of PACOR systems using symbolic model checking in UPPAAL and statistical model checking UPPAAL SMC. Finally we provide an example to illustrate system specification in PACOR, translation and verification....
Model checking process algebra of communicating resources for real-time systems
Boudjadar, Jalil; Kim, Jin Hyun; Larsen, Kim Guldstrand;
2014-01-01
This paper presents a new process algebra, called PACoR, for real-time systems which deals with resource- constrained timed behavior as an improved version of the ACSR algebra. We define PACoR as a Process Algebra of Communicating Resources which allows to explicitly express preemptiveness...... preserves the original semantics of PACoR and enables the verification of PACoR systems using symbolic model checking in Uppaal and statistical model checking UppaalSMC. Finally we provide an example to illustrate system specification in PACoR, translation and verification....
Analysis of DIRAC's behavior using model checking with process algebra
Remenska, Daniela; Willemse, Tim; Bal, Henri; Verstoep, Kees; Fokkink, Wan; Charpentier, Philippe; Diaz, Ricardo Graciani; Lanciotti, Elisa; Roiser, Stefan; Ciba, Krzysztof
2012-01-01
DIRAC is the grid solution developed to support LHCb production activities as well as user data analysis. It consists of distributed services and agents delivering the workload to the grid resources. Services maintain database back-ends to store dynamic state information of entities such as jobs, queues, staging requests, etc. Agents use polling to check and possibly react to changes in the system state. Each agent's logic is relatively simple, the main complexity lies in their cooperation. Agents run concurrently, and collaborate using the databases as shared memory. The databases can be accessed directly by the agents if running locally or through a DIRAC service interface if necessary. This shared-memory model causes entities to occasionally get into inconsistent states. Tracing and fixing such problems becomes formidable due to the inherent parallelism present. We propose more rigorous methods to cope with this. Model checking is one such technique for analysis of an abstract model of a system. Unlike con...
LHCb: Analysing DIRAC's Behavior using Model Checking with Process Algebra
Remenska, Daniela
2012-01-01
DIRAC is the Grid solution designed to support LHCb production activities as well as user data analysis. Based on a service-oriented architecture, DIRAC consists of many cooperating distributed services and agents delivering the workload to the Grid resources. Services accept requests from agents and running jobs, while agents run as light-weight components, fulfilling specific goals. Services maintain database back-ends to store dynamic state information of entities such as jobs, queues, staging requests, etc. Agents use polling to check for changes in the service states, and react to these accordingly. A characteristic of DIRAC's architecture is the relatively low complexity in the logic of each agent; the main source of complexity lies in their cooperation. These agents run concurrently, and communicate using the services' databases as a shared memory for synchronizing the state transitions. Although much effort is invested in making DIRAC reliable, entities occasionally get into inconsistent states, leadi...
Model composition in model checking
Felscher, Ingo
2014-01-01
Model-checking allows one to formally check properties of systems: these properties are modeled as logic formulas and the systems as structures like transition systems. These transition systems are often composed, i.e., they arise in form of products or sums. The composition technique allows us to deduce the truth of a formula in the composed system from "interface information": the truth of formulas for the component systems and information in which components which of these formulas hold. W...
Zhi-Hong Tao; Cong-Hua Zhou; Zhong Chen; Li-Fu Wang
2007-01-01
Bounded Model Checking has been recently introduced as an efficient verification method for reactive systems.This technique reduces model checking of linear temporal logic to propositional satisfiability.In this paper we first present how quantified Boolean decision procedures can replace BDDs.We introduce a bounded model checking procedure for temporal logic CTL* which reduces model checking to the satisfiability of quantified Boolean formulas.Our new technique avoids the space blow up of BDDs, and extends the concept of bounded model checking.
Ritter, Patricia [Centro de Estudios Científicos (CECs),Avenida Arturo Prat 514, Valdivia (Chile); Sämann, Christian [Maxwell Institute for Mathematical Sciences,Department of Mathematics, Heriot-Watt University,Colin Maclaurin Building, Riccarton, Edinburgh EH14 4AS (United Kingdom)
2014-04-09
In this paper, we begin the study of zero-dimensional field theories with fields taking values in a semistrict Lie 2-algebra. These theories contain the IKKT matrix model and various M-brane related models as special cases. They feature solutions that can be interpreted as quantized 2-plectic manifolds. In particular, we find solutions corresponding to quantizations of ℝ{sup 3}, S{sup 3} and a five-dimensional Hpp-wave. Moreover, by expanding a certain class of Lie 2-algebra models around the solution corresponding to quantized ℝ{sup 3}, we obtain higher BF-theory on this quantized space.
In this paper, we begin the study of zero-dimensional field theories with fields taking values in a semistrict Lie 2-algebra. These theories contain the IKKT matrix model and various M-brane related models as special cases. They feature solutions that can be interpreted as quantized 2-plectic manifolds. In particular, we find solutions corresponding to quantizations of ℝ3, S3 and a five-dimensional Hpp-wave. Moreover, by expanding a certain class of Lie 2-algebra models around the solution corresponding to quantized ℝ3, we obtain higher BF-theory on this quantized space
Compositional and Quantitative Model Checking
Larsen, Kim Guldstrand
This paper gives a survey of a composition model checking methodology and its succesfull instantiation to the model checking of networks of finite-state, timed, hybrid and probabilistic systems with respect; to suitable quantitative versions of the modal mu-calculus [Koz82]. The method is based on...
Model Checking as Static Analysis
Zhang, Fuyuan
properties which can predict safe approximations to program behaviors. In this thesis, we have developed several static analysis based techniques to solve model checking problems, aiming at showing the link between static analysis and model checking. We focus on logical approaches to static analysis......Both model checking and static analysis are prominent approaches to detecting software errors. Model Checking is a successful formal method for verifying properties specified in temporal logics with respect to transition systems. Static analysis is also a powerful method for validating program...... multi-valued setting, and we therefore obtain a multivalued analysis for temporal properties specied by CTL formulas. In particular, we have shown that the three-valued CTL model checking problem over Kripke modal transition systems can be exactly encoded in three-valued ALFP. Last, we come back to two...
Checking Model Transformation Refinement
Büttner, Fabian; Egea, Marina; Guerra, Esther; Lara, Juan De
2013-01-01
The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-642-38883-5_15 Proceedings of 6th International Conference, ICMT 2013, Budapest, Hungary, June 18-19, 2013 Refinement is a central notion in computer science, meaning that some artefact S can be safely replaced by a refinement R, which preserves S’s properties. Having available techniques and tools to check transformation refinement would enable (a) the reasoning on whether a transformation correctly impl...
MODEL IDENTIFICATION AND COMPUTER ALGEBRA.
Bollen, Kenneth A; Bauldry, Shawn
2010-10-01
Multiequation models that contain observed or latent variables are common in the social sciences. To determine whether unique parameter values exist for such models, one needs to assess model identification. In practice analysts rely on empirical checks that evaluate the singularity of the information matrix evaluated at sample estimates of parameters. The discrepancy between estimates and population values, the limitations of numerical assessments of ranks, and the difference between local and global identification make this practice less than perfect. In this paper we outline how to use computer algebra systems (CAS) to determine the local and global identification of multiequation models with or without latent variables. We demonstrate a symbolic CAS approach to local identification and develop a CAS approach to obtain explicit algebraic solutions for each of the model parameters. We illustrate the procedures with several examples, including a new proof of the identification of a model for handling missing data using auxiliary variables. We present an identification procedure for Structural Equation Models that makes use of CAS and that is a useful complement to current methods. PMID:21769158
Model Checking Algorithms for CTMDPs
Buchholz, Peter; Hahn, Ernst Moritz; Hermanns, Holger;
2011-01-01
Continuous Stochastic Logic (CSL) can be interpreted over continuoustime Markov decision processes (CTMDPs) to specify quantitative properties of stochastic systems that allow some external control. Model checking CSL formulae over CTMDPs requires then the computation of optimal control strategie...
Advances in Probabilistic Model Checking
Kwiatkowska, Marta; Parker, David
2012-01-01
Probabilistic model checking is an automated verification method that aims to establish the correctness of probabilistic systems. Probability may arise, for example, due to failures of unreliable components, communication across lossy media, or through the use of randomisation in distributed protocols. Probabilistic model checking enables a range of exhaustive, quantitative analyses of properties such as "the probability of a message being delivered within 5ms is at least 0.89". In the last t...
Model checking PSL safety properties
Launiainen, Tuomas
2009-01-01
Model checking is a modern, efficient approach to gaining confidence of the correctness of complex systems. It outperforms conventional testing methods especially in cases where a high degree of confidence in the correctness of the system is required, or when the test runs of the system are difficult to reproduce accurately. In model checking the system is verified against a specification that is expressed in a formal specification language. The main challenges are that the process requires q...
Jansen, D.N.
2002-01-01
The logic ATCTL is a convenient logic to specify properties with actions and real-time. It is intended as a property language for Lightweight UML models [12], which consist mainly of simplified class diagrams and statecharts. ATCTL combines two known extensions of CTL, namely ACTL and TCTL. The reas
Direct Model Checking Matrix Algorithm
Zhi-Hong Tao; Hans Kleine Büning; Li-Fu Wang
2006-01-01
During the last decade, Model Checking has proven its efficacy and power in circuit design, network protocol analysis and bug hunting. Recent research on automatic verification has shown that no single model-checking technique has the edge over all others in all application areas. So, it is very difficult to determine which technique is the most suitable for a given model. It is thus sensible to apply different techniques to the same model. However, this is a very tedious and time-consuming task, for each algorithm uses its own description language. Applying Model Checking in software design and verification has been proved very difficult. Software architectures (SA) are engineering artifacts that provide high-level and abstract descriptions of complex software systems. In this paper a Direct Model Checking (DMC) method based on Kripke Structure and Matrix Algorithm is provided. Combined and integrated with domain specific software architecture description languages (ADLs), DMC can be used for computing consistency and other critical properties.
Observable Algebra in Field Algebra of G-spin Models
蒋立宁
2003-01-01
Field algebra of G-spin models can provide the simplest examples of lattice field theory exhibiting quantum symmetry. Let D(G) be the double algebra of a finite group G and D(H), a sub-algebra of D(G) determined by subgroup H of G. This paper gives concrete generators and the structure of the observable algebra AH, which is a D(H)-invariant sub-algebra in the field algebra of G-spin models F, and shows that AH is a C*-algebra. The correspondence between H and AH is strictly monotonic. Finally, a duality between D(H) and AH is given via an irreducible vacuum C*-representation of F.
FOUNDATION OF NUCLEAR ALGEBRAIC MODELS
周孝谦
1990-01-01
Based upon Tomonoga-Rowe's many body theory, we find that the algebraic models, including IBM and FDSM are simplest extension of Rowe-Rosensteel's sp(3R).Dynkin-Gruber's subalgebra embedding method is applied to find an appropriate algebra and it's reduction chains conforming to physical requirement. The separated cases sp(6) and so(8) now appear as two branches stemming from the same root D6-O(12). Transitional ease between sp(6) and so(8) is inherently include.
From model checking to model measuring
Henzinger, Thomas A.; Otop, Jan
2013-01-01
We define the model-measuring problem: given a model $M$ and specification~$\\varphi$, what is the maximal distance $\\rho$ such that all models $M'$ within distance $\\rho$ from $M$ satisfy (or violate)~$\\varphi$. The model measuring problem presupposes a distance function on models. We concentrate on automatic distance functions, which are defined by weighted automata. The model-measuring problem subsumes several generalizations of the classical model-checking problem, in particular, qu...
Heteroscedasticity checks for regression models
无
2001-01-01
For checking on heteroscedasticity in regression models, a unified approach is proposed to constructing test statistics in parametric and nonparametric regression models. For nonparametric regression, the test is not affected sensitively by the choice of smoothing parameters which are involved in estimation of the nonparametric regression function. The limiting null distribution of the test statistic remains the same in a wide range of the smoothing parameters. When the covariate is one-dimensional, the tests are, under some conditions, asymptotically distribution-free. In the high-dimensional cases, the validity of bootstrap approximations is investigated. It is shown that a variant of the wild bootstrap is consistent while the classical bootstrap is not in the general case, but is applicable if some extra assumption on conditional variance of the squared error is imposed. A simulation study is performed to provide evidence of how the tests work and compare with tests that have appeared in the literature. The approach may readily be extended to handle partial linear, and linear autoregressive models.
Heteroscedasticity checks for regression models
ZHU; Lixing
2001-01-01
［1］Carroll, R. J., Ruppert, D., Transformation and Weighting in Regression, New York: Chapman and Hall, 1988.［2］Cook, R. D., Weisberg, S., Diagnostics for heteroscedasticity in regression, Biometrika, 1988, 70: 1—10.［3］Davidian, M., Carroll, R. J., Variance function estimation, J. Amer. Statist. Assoc., 1987, 82: 1079—1091.［4］Bickel, P., Using residuals robustly I: Tests for heteroscedasticity, Ann. Statist., 1978, 6: 266—291.［5］Carroll, R. J., Ruppert, D., On robust tests for heteroscedasticity, Ann. Statist., 1981, 9: 205—209.［6］Eubank, R. L., Thomas, W., Detecting heteroscedasticity in nonparametric regression, J. Roy. Statist. Soc., Ser. B, 1993, 55: 145—155.［7］Diblasi, A., Bowman, A., Testing for constant variance in a linear model, Statist. and Probab. Letters, 1997, 33: 95—103.［8］Dette, H., Munk, A., Testing heteoscedasticity in nonparametric regression, J. R. Statist. Soc. B, 1998, 60: 693—708.［9］Müller, H. G., Zhao, P. L., On a semi-parametric variance function model and a test for heteroscedasticity, Ann. Statist., 1995, 23: 946—967.［10］Stute, W., Manteiga, G., Quindimil, M. P., Bootstrap approximations in model checks for regression, J. Amer. Statist. Asso., 1998, 93: 141—149.［11］Stute, W., Thies, G., Zhu, L. X., Model checks for regression: An innovation approach, Ann. Statist., 1998, 26: 1916—1939.［12］Shorack, G. R., Wellner, J. A., Empirical Processes with Applications to Statistics, New York: Wiley, 1986.［13］Efron, B., Bootstrap methods: Another look at the jackknife, Ann. Statist., 1979, 7: 1—26.［14］Wu, C. F. J., Jackknife, bootstrap and other re-sampling methods in regression analysis, Ann. Statist., 1986, 14: 1261—1295.［15］H rdle, W., Mammen, E., Comparing non-parametric versus parametric regression fits, Ann. Statist., 1993, 21: 1926—1947.［16］Liu, R. Y., Bootstrap procedures under some non-i.i.d. models, Ann. Statist., 1988, 16: 1696—1708.［17
Shashidhar, K C; Catthoor, Francky; Janssens, Gerda
2011-01-01
Development of energy and performance-efficient embedded software is increasingly relying on application of complex transformations on the critical parts of the source code. Designers applying such nontrivial source code transformations are often faced with the problem of ensuring functional equivalence of the original and transformed programs. Currently they have to rely on incomplete and time-consuming simulation. Formal automatic verification of the transformed program against the original is instead desirable. This calls for equivalence checking tools similar to the ones available for comparing digital circuits. We present such a tool to compare array-intensive programs related through a combination of important global transformations like expression propagations, loop and algebraic transformations. When the transformed program fails to pass the equivalence check, the tool provides specific feedback on the possible locations of errors.
The model checking fingerprints of CTL operators
Krebs, Andreas; Meier, Arne; Mundhenk, Martin
2015-01-01
The aim of this study is to understand the inherent expressive power of CTL operators. We investigate the complexity of model checking for all CTL fragments with one CTL operator and arbitrary Boolean operators. This gives us a fingerprint of each CTL operator. The comparison between the fingerprints yields a hierarchy of the operators that mirrors their strength with respect to model checking.
Program Analysis as Model Checking
Olesen, Mads Chr.
of an abstract interpretation. For the generalisation to lattice automata to have benefit it is important that efficient tools exist. This thesis presents multi-core tools for efficient and scalable reachability and Büchi emptiness checking of timed/lattice automata. Finally, a number of case studies...... overapproximation of the hardware is needed; the case of identifying timing anomalous hardware for which such abstractions are hard to find is considered....
Engineering Abstractions in Model Checking and Testing
Achenbach, Michael; Ostermann, Klaus
2009-01-01
Abstractions are used in model checking to tackle problems like state space explosion or modeling of IO. The application of these abstractions in real software development processes, however, lacks engineering support. This is one reason why model checking is not widely used in practice yet and testing is still state of the art in falsification. We show how user-defined abstractions can be integrated into a Java PathFinder setting with tools like AspectJ or Javassist and discuss implicati...
MODEL IDENTIFICATION AND COMPUTER ALGEBRA
Bollen, Kenneth A.; Bauldry, Shawn
2010-01-01
Multiequation models that contain observed or latent variables are common in the social sciences. To determine whether unique parameter values exist for such models, one needs to assess model identification. In practice analysts rely on empirical checks that evaluate the singularity of the information matrix evaluated at sample estimates of parameters. The discrepancy between estimates and population values, the limitations of numerical assessments of ranks, and the difference between local a...
Matrix algebra for linear models
Gruber, Marvin H J
2013-01-01
Matrix methods have evolved from a tool for expressing statistical problems to an indispensable part of the development, understanding, and use of various types of complex statistical analyses. This evolution has made matrix methods a vital part of statistical education. Traditionally, matrix methods are taught in courses on everything from regression analysis to stochastic processes, thus creating a fractured view of the topic. Matrix Algebra for Linear Models offers readers a unique, unified view of matrix analysis theory (where and when necessary), methods, and their applications. Written f
Bethe algebra of Gaudin model, Calogero-Moser space and Cherednik algebra
Mukhin, E.; Tarasov, V.; Varchenko, A.
2009-01-01
We identify the Bethe algebra of the Gaudin model associated to gl(N) acting on a suitable representation with the center of the rational Cherednik algebra and with the algebra of regular functions on the Calogero-Moser space.
Model Checking Discounted Temporal Properties
Alfaro, de Luca; Faella, Marco; Henzinger, Thomas A.; Majumdar, Rupak; Stoelinga, Mariëlle
2004-01-01
Temporal logic is two-valued: formulas are interpreted as either true or false. When applied to the analysis of stochastic systems, or systems with imprecise formal models, temporal logic is therefore fragile: even small changes in the model can lead to opposite truth values for a specification. We
Model Checking Discounted Temporal Properties
Alfaro, de Luca; Faella, Marco; Henzinger, Thomas A.; Majumdar, Rupak; Stoelinga, Mariëlle
2005-01-01
Temporal logic is two-valued: formulas are interpreted as either true or false. When applied to the analysis of stochastic systems, or systems with imprecise formal models, temporal logic is therefore fragile: even small changes in the model can lead to opposite truth values for a specification. We
Model Checking Implantable Cardioverter Defibrillators
Abbas, Houssam; Jang, Kuk Jin; Jiang, Zhihao; Mangharam, Rahul
2015-01-01
Ventricular Fibrillation is a disorganized electrical excitation of the heart that results in inadequate blood flow to the body. It usually ends in death within seconds. The most common way to treat the symptoms of fibrillation is to implant a medical device, known as an Implantable Cardioverter Defibrillator (ICD), in the patient's body. Model-based verification can supply rigorous proofs of safety and efficacy. In this paper, we build a hybrid system model of the human heart+ICD closed loop...
Graded CTL Model Checking for Test Generation
Napoli, Margherita
2011-01-01
Recently there has been a great attention from the scientific community towards the use of the model-checking technique as a tool for test generation in the simulation field. This paper aims to provide a useful mean to get more insights along these lines. By applying recent results in the field of graded temporal logics, we present a new efficient model-checking algorithm for Hierarchical Finite State Machines (HSM), a well established symbolism long and widely used for representing hierarchical models of discrete systems. Performing model-checking against specifications expressed using graded temporal logics has the peculiarity of returning more counterexamples within a unique run. We think that this can greatly improve the efficacy of automatically getting test cases. In particular we verify two different models of HSM against branching time temporal properties.
Engineering Abstractions in Model Checking and Testing
Achenbach, Michael; Ostermann, Klaus
2009-01-01
Abstractions are used in model checking to tackle problems like state space explosion or modeling of IO. The application of these abstractions in real software development processes, however, lacks engineering support. This is one reason why model checking is not widely used in practice yet and...... testing is still state of the art in falsification. We show how user-defined abstractions can be integrated into a Java PathFinder setting with tools like AspectJ or Javassist and discuss implications of remaining weaknesses of these tools. We believe that a principled engineering approach to designing...
A PSL Bounded Model Checking Method
YU Lei; ZHAO Zongtao
2012-01-01
SAT-based bounded model checking （BMC） is introduced as an important complementary technique to OBDD-based symbolic model checking, and is an efficient verification method for parallel and reactive systems. However, until now the properties verified by bounded model checking are very finite. Temporal logic PSL is a property specification language （IEEE-1850） describing parallel systems and is divided into two parts, i.e. the linear time logic FL and the branch time logic OBE. In this paper, the specification checked by BMC is extended to PSL and its algorithm is also proposed. Firstly, define the bounded semantics of PSL, and then reduce the bounded semantics into SAT by translating PSL specification formula and the state transition relation of the system to the propositional formula A and B, respectively. Finally, verify the satisfiability of the conjunction propositional formula of A and B. The algorithm results in the translation of the existential model checking of the temporal logic PSL into the satisfiability problem of propositional formula. An example of a queue controlling circuit is used to interpret detailedly the executing procedure of the algorithm.
A Metric Encoding for Bounded Model Checking
Pradella, Matteo; Morzenti, Angelo; San Pietro, Pierluigi
In Bounded Model Checking, both the system model and the checked property are translated into a Boolean formula to be analyzed by a SAT-solver. We introduce a new encoding technique which is particularly optimized for managing quantitative future and past metric temporal operators, typically found in properties of hard real time systems. The encoding is simple and intuitive in principle, but it is made more complex by the presence, typical of the Bounded Model Checking technique, of backward and forward loops used to represent an ultimately periodic infinite domain by a finite structure. We report and comment on the new encoding technique and on an extensive set of experiments carried out to assess its feasibility and effectiveness.
Statistical Model Checking for Biological Systems
David, Alexandre; Larsen, Kim Guldstrand; Legay, Axel;
2014-01-01
Statistical Model Checking (SMC) is a highly scalable simulation-based verification approach for testing and estimating the probability that a stochastic system satisfies a given linear temporal property. The technique has been applied to (discrete and continuous time) Markov chains, stochastic...
Using chemical organization theory for model checking
Kaleta, Christoph; Richter, Stephan; Dittrich, Peter
2009-01-01
Motivation: The increasing number and complexity of biomodels makes automatic procedures for checking the models' properties and quality necessary. Approaches like elementary mode analysis, flux balance analysis, deficiency analysis and chemical organization theory (OT) require only the stoichiometric structure of the reaction network for derivation of valuable information. In formalisms like Systems Biology Markup Language (SBML), however, information about the stoichiometric coefficients re...
Efficient CSL Model Checking Using Stratification
Zhang, Lijun; Jansen, David N.; Nielson, Flemming; Hermanns, Holger
2012-01-01
For continuous-time Markov chains, the model-checking problem with respect to continuous-time stochastic logic (CSL) has been introduced and shown to be decidable by Aziz, Sanwal, Singhal and Brayton in 1996 [ 1, 2]. Their proof can be turned into an approximation algorithm with worse than...
Automata-Based CSL Model Checking
Zhang, Lijun; Jansen, David N.; Nielson, Flemming; Hermanns, Holger
For continuous-time Markov chains, the model-checking problem with respect to continuous-time stochastic logic (CSL) has been introduced and shown to be decidable by Aziz, Sanwal, Singhal and Brayton in 1996. The presented decision procedure, however, has exponential complexity. In this paper, we...
Statistical Model Checking for Stochastic Hybrid Systems
David, Alexandre; Du, Dehui; Larsen, Kim Guldstrand; Legay, Axel; Mikučionis, Marius; Poulsen, Danny Bøgsted; Sedwards, Sean
This paper presents novel extensions and applications of the UPPAAL-SMC model checker. The extensions allow for statistical model checking of stochastic hybrid systems. We show how our race-based stochastic semantics extends to networks of hybrid systems, and indicate the integration technique...... applied for implementing this semantics in the UPPAAL-SMC simulation engine. We report on two applications of the resulting tool-set coming from systems biology and energy aware buildings....
An algebraic model of software evolution
Keller, Benjamin J.d
1990-01-01
A model of the software evolution process, called the Abstraction Refinement Model, is described which builds on the algebraic influence of the Laws of Programming and the transformational Draco Paradigm. The result is an algebraic structure consisting of the states of the software product (system descriptions) ordered by a relation of relative correctness with transformations defined between the system descriptions. This structure is interpreted as the software evolution space, ...
Howard, Y; Gravell, A; Ferreira, C; Augusto, J C
2011-01-01
Trace analysis can be a useful way to discover problems in a program under test. Rather than writing a special purpose trace analysis tool, this paper proposes that traces can usefully be analysed by checking them against a formal model using a standard model-checker or else an animator for executable specifications. These techniques are illustrated using a Travel Agent case study implemented in J2EE. We added trace beans to this code that write trace information to a database. The traces are then extracted and converted into a form suitable for analysis by Spin, a popular model-checker, and Pro-B, a model-checker and animator for the B notation. This illustrates the technique, and also the fact that such a system can have a variety of models, in different notations, that capture different features. These experiments have demonstrated that model-based trace-checking is feasible. Future work is focussed on scaling up the approach to larger systems by increasing the level of automation.
Model Checking over Paraconsistent Temporal Logic
CHEN Dong-huo; WANG Lin-zhang; CUI Jia-lin
2008-01-01
Classical logic cannot be used to effectively reason about concurrent systems with inconsistencies (inconsistencies often occur, especially in the early stage of the development, when large and complex concurrent systems are developed). In this paper, we propose the use of a guasi-classical temporal logic (QCTL) for supporting the verification of temporal properties of such systems even where the consistent model is not available. Our models are paraKripke structures ( extended standard Kripke structures), in which both a formula and its negation are satisfied in a same state, and properties to be verified are expressed by QCTL with paraKripke structures semantics. We introduce a novel notion of paraKripke models, which grasps the paraconsistent character of the entailment relation of QCTL. Furthermore, we explore the methodology of model checking over QCTL, and describe the detailed algorithm of implementing QCTL model checker. In the sequel, a simple example is presented, showing how to exploit the proposed model checking technique to verify the temporal properties of inconsistent concurrent systems.
Statistical Model Checking of Rich Models and Properties
Poulsen, Danny Bøgsted
undecidability issues for the traditional model checking approaches. Statistical model checking has proven itself a valuable supplement to model checking and this thesis is concerned with extending this software validation technique to stochastic hybrid systems. The thesis consists of two parts: the first part...... motivates why existing model checking technology should be supplemented by new techniques. It also contains a brief introduction to probability theory and concepts covered by the six papers making up the second part. The first two papers are concerned with developing online monitoring techniques for...... systems. The fifth paper shows how stochastic hybrid automata are useful for modelling biological systems and the final paper is concerned with showing how statistical model checking is efficiently distributed. In parallel with developing the theory contained in the papers, a substantial part of this work...
SAT-Based Model Checking without Unrolling
Bradley, Aaron R.
A new form of SAT-based symbolic model checking is described. Instead of unrolling the transition relation, it incrementally generates clauses that are inductive relative to (and augment) stepwise approximate reachability information. In this way, the algorithm gradually refines the property, eventually producing either an inductive strengthening of the property or a counterexample trace. Our experimental studies show that induction is a powerful tool for generalizing the unreachability of given error states: it can refine away many states at once, and it is effective at focusing the proof search on aspects of the transition system relevant to the property. Furthermore, the incremental structure of the algorithm lends itself to a parallel implementation.
Distributed Parametric and Statistical Model Checking
Peter Bulychev
2011-10-01
Full Text Available Statistical Model Checking (SMC is a trade-off between testing and formal verification. The core idea of the approach is to conduct some simulations of the system and verify if they satisfy some given property. In this paper we show that SMC is easily parallelizable on a master/slaves architecture by introducing a series of algorithms that scale almost linearly with respect to the number of slave computers. Our approach has been implemented in the UPPAAL SMC toolset and applied on non-trivial case studies.
Stoutemyer, D. R.
1977-01-01
The computer algebra language MACSYMA enables the programmer to include symbolic physical units in computer calculations, and features automatic detection of dimensionally-inhomogeneous formulas and conversion of inconsistent units in a dimensionally homogeneous formula. Some examples illustrate these features.
Workflow Fault Tree Generation Through Model Checking
Herbert, Luke Thomas; Sharp, Robin
2014-01-01
probabilistic structure of the system being modelled. From these calculations, a comprehensive fault tree is generated. Further, we show that annotating the model with rewards (data) allows the expected mean values of reward structures to be calculated at points of failure....... with probabilistic non-deterministic branching. We present an algorithm that allows for exhaustive generation of possible error states that could arise in execution of the model, where the generated error states allow for both fail-stop behaviour and continued system execution. We employ stochastic...... model checking to calculate the probabilities of reaching each non-error system state. Each generated error state is assigned a variable indicating its individual probability of occurrence. Our method can determine the probability of combined faults occurring, while accounting for the basic...
Model Checking JAVA Programs Using Java Pathfinder
Havelund, Klaus; Pressburger, Thomas
2000-01-01
This paper describes a translator called JAVA PATHFINDER from JAVA to PROMELA, the "programming language" of the SPIN model checker. The purpose is to establish a framework for verification and debugging of JAVA programs based on model checking. This work should be seen in a broader attempt to make formal methods applicable "in the loop" of programming within NASA's areas such as space, aviation, and robotics. Our main goal is to create automated formal methods such that programmers themselves can apply these in their daily work (in the loop) without the need for specialists to manually reformulate a program into a different notation in order to analyze the program. This work is a continuation of an effort to formally verify, using SPIN, a multi-threaded operating system programmed in Lisp for the Deep-Space 1 spacecraft, and of previous work in applying existing model checkers and theorem provers to real applications.
Model Checking Is Static Analysis of Modal Logic
Nielson, Flemming; Nielson, Hanne Riis
2010-01-01
it can give an exact characterisation of the semantics of formulae in a modal logic. This shows that model checking can be performed by means of state-of-the-art approaches to static analysis and allow us to conclude that the problems of model checking and static analysis are reducible to each other....... In terms of computational complexity we show that model checking by means of static analysis gives the same complexity bounds as are known for traditional approaches to model checking....
Solving stochastic epidemiological models using computer algebra
Hincapie, Doracelly; Ospina, Juan
2011-06-01
Mathematical modeling in Epidemiology is an important tool to understand the ways under which the diseases are transmitted and controlled. The mathematical modeling can be implemented via deterministic or stochastic models. Deterministic models are based on short systems of non-linear ordinary differential equations and the stochastic models are based on very large systems of linear differential equations. Deterministic models admit complete, rigorous and automatic analysis of stability both local and global from which is possible to derive the algebraic expressions for the basic reproductive number and the corresponding epidemic thresholds using computer algebra software. Stochastic models are more difficult to treat and the analysis of their properties requires complicated considerations in statistical mathematics. In this work we propose to use computer algebra software with the aim to solve epidemic stochastic models such as the SIR model and the carrier-borne model. Specifically we use Maple to solve these stochastic models in the case of small groups and we obtain results that do not appear in standard textbooks or in the books updated on stochastic models in epidemiology. From our results we derive expressions which coincide with those obtained in the classical texts using advanced procedures in mathematical statistics. Our algorithms can be extended for other stochastic models in epidemiology and this shows the power of computer algebra software not only for analysis of deterministic models but also for the analysis of stochastic models. We also perform numerical simulations with our algebraic results and we made estimations for the basic parameters as the basic reproductive rate and the stochastic threshold theorem. We claim that our algorithms and results are important tools to control the diseases in a globalized world.
Probabilistic Model--Checking of Quantum Protocols
Gay, S; Papanikolaou, N; Gay, Simon; Nagarajan, Rajagopal; Papanikolaou, Nikolaos
2005-01-01
We establish fundamental and general techniques for formal verification of quantum protocols. Quantum protocols are novel communication schemes involving the use of quantum-mechanical phenomena for representation, storage and transmission of data. As opposed to quantum computers, quantum communication systems can and have been implemented using present-day technology; therefore, the ability to model and analyse such systems rigorously is of primary importance. While current analyses of quantum protocols use a traditional mathematical approach and require considerable understanding of the underlying physics, we argue that automated verification techniques provide an elegant alternative. We demonstrate these techniques through the use of PRISM, a probabilistic model-checking tool. Our approach is conceptually simpler than existing proofs, and allows us to disambiguate protocol definitions and assess their properties. It also facilitates detailed analyses of actual implemented systems. We illustrate our techniqu...
Model Checking of Boolean Process Models
Schneider, Christoph; Wehler, Joachim
2011-01-01
In the field of Business Process Management formal models for the control flow of business processes have been designed since more than 15 years. Which methods are best suited to verify the bulk of these models? The first step is to select a formal language which fixes the semantics of the models. We adopt the language of Boolean systems as reference language for Boolean process models. Boolean systems form a simple subclass of coloured Petri nets. Their characteristics are low tokens to mode...
Tomino, Dan
2010-01-01
1-loop vacuum energies of (fuzzy) spacetimes from a supersymmetric reduced model with Filippov 3-algebra are discussed. A_{2,2} algebra, Nambu-Poisson algebra in flat spacetime, and a Lorentzian 3-algebra are examined as 3-algebras.
Probabilistic and hybrid model checking deployments for wireless sensor networks
In the early stages of system development, model checking is a good practice for examining the WSNs (Wireless Sensor Networks). Model checking involves verifying a system's properties based on the system's finite state model. For varying applications like computers and wireless communication prior to expensive simulations, model checking has become a vital requirement in order to investigate the performance and reliability. In this paper for the first time, we are presenting probabilistic and hybrid model checking tools which are being implemented to analyse and verify the WSN applications and their examples. Here we are categorizing the model checking tools and presenting how they have been used for the investigation of various behaviours of WSN solutions. Consequently, this paper helps readers/researchers to choose the appropriate model checking tool and to get benefited in shape of validating their solutions. The paper has also highlighted the problems of existing model checking tools within WSN domain. (author)
Conformant Planning via Symbolic Model Checking
Cimatti, A; 10.1613/jair.774
2011-01-01
We tackle the problem of planning in nondeterministic domains, by presenting a new approach to conformant planning. Conformant planning is the problem of finding a sequence of actions that is guaranteed to achieve the goal despite the nondeterminism of the domain. Our approach is based on the representation of the planning domain as a finite state automaton. We use Symbolic Model Checking techniques, in particular Binary Decision Diagrams, to compactly represent and efficiently search the automaton. In this paper we make the following contributions. First, we present a general planning algorithm for conformant planning, which applies to fully nondeterministic domains, with uncertainty in the initial condition and in action effects. The algorithm is based on a breadth-first, backward search, and returns conformant plans of minimal length, if a solution to the planning problem exists, otherwise it terminates concluding that the problem admits no conformant solution. Second, we provide a symbolic representation ...
A process algebra model of QED
Sulis, William
2016-03-01
The process algebra approach to quantum mechanics posits a finite, discrete, determinate ontology of primitive events which are generated by processes (in the sense of Whitehead). In this ontology, primitive events serve as elements of an emergent space-time and of emergent fundamental particles and fields. Each process generates a set of primitive elements, using only local information, causally propagated as a discrete wave, forming a causal space termed a causal tapestry. Each causal tapestry forms a discrete and finite sampling of an emergent causal manifold (space-time) M and emergent wave function. Interactions between processes are described by a process algebra which possesses 8 commutative operations (sums and products) together with a non-commutative concatenation operator (transitions). The process algebra possesses a representation via nondeterministic combinatorial games. The process algebra connects to quantum mechanics through the set valued process and configuration space covering maps, which associate each causal tapestry with sets of wave functions over M. Probabilities emerge from interactions between processes. The process algebra model has been shown to reproduce many features of the theory of non-relativistic scalar particles to a high degree of accuracy, without paradox or divergences. This paper extends the approach to a semi-classical form of quantum electrodynamics.
Using Model Checking to Validate AI Planner Domain Models
Penix, John; Pecheur, Charles; Havelund, Klaus
1999-01-01
This report describes an investigation into using model checking to assist validation of domain models for the HSTS planner. The planner models are specified using a qualitative temporal interval logic with quantitative duration constraints. We conducted several experiments to translate the domain modeling language into the SMV, Spin and Murphi model checkers. This allowed a direct comparison of how the different systems would support specific types of validation tasks. The preliminary results indicate that model checking is useful for finding faults in models that may not be easily identified by generating test plans.
Sigma-models and Homotopy Algebras
Zeitlin, Anton M
2015-01-01
We review the relation between homotopy algebras of conformal field theory and geometric structures arising in sigma models. In particular we formulate conformal invariance conditions, which in the quasi-classical limit are Einstein equations with extra fields, as generalized Maurer-Cartan equations.
Fusion algebras of logarithmic minimal models
Rasmussen, Joergen; Pearce, Paul A [Department of Mathematics and Statistics, University of Melbourne, Parkville, Victoria 3010 (Australia)
2007-11-09
We present explicit conjectures for the chiral fusion algebras of the logarithmic minimal models LM(p,p') considering Virasoro representations with no enlarged or extended symmetry algebra. The generators of fusion are countably infinite in number but the ensuing fusion rules are quasi-rational in the sense that the fusion of a finite number of representations decomposes into a finite direct sum of representations. The fusion rules are commutative, associative and exhibit an sl(2) structure but require so-called Kac representations which are typically reducible yet indecomposable representations of rank 1. In particular, the identity of the fundamental fusion algebra p {ne} 1 is a reducible yet indecomposable Kac representation of rank 1. We make detailed comparisons of our fusion rules with the results of Gaberdiel and Kausch for p = 1 and with Eberle and Flohr for (p, p') = (2, 5) corresponding to the logarithmic Yang-Lee model. In the latter case, we confirm the appearance of indecomposable representations of rank 3. We also find that closure of a fundamental fusion algebra is achieved without the introduction of indecomposable representations of rank higher than 3. The conjectured fusion rules are supported, within our lattice approach, by extensive numerical studies of the associated integrable lattice models. Details of our lattice findings and numerical results will be presented elsewhere. The agreement of our fusion rules with the previous fusion rules lends considerable support for the identification of the logarithmic minimal models LM(p,p') with the augmented c{sub p,p'} (minimal) models defined algebraically.
An algebraic approach to the Hubbard model
de Leeuw, Marius
2015-01-01
We study the algebraic structure of an integrable Hubbard-Shastry type lattice model associated with the centrally extended su(2|2) superalgebra. This superalgebra underlies Beisert's AdS/CFT worldsheet R-matrix and Shastry's R-matrix. The considered model specializes to the one-dimensional Hubbard model in a certain limit. We demonstrate that Yangian symmetries of the R-matrix specialize to the Yangian symmetry of the Hubbard model found by Korepin and Uglov. Moreover, we show that the Hubbard model Hamiltonian has an algebraic interpretation as the so-called secret symmetry. We also discuss Yangian symmetries of the A and B models introduced by Frolov and Quinn.
Phase transitions in algebraic cluster models
We study the phase transitions of two algebraic cluster models, which have similar interactions, but differ from each other in their model spaces. The semimicroscopical model incorporates the Pauli exclusion principle, while the phenomenological one does not. The appearance of the quasidynamical SU(3) symmetry is also investigated in the presence of an explicitly symmetry-breaking interaction. Examples of binary cluster configurations with two, one, or zero closed-shell clusters are studied
Analyzing Interoperability of Protocols Using Model Checking
WUPeng
2005-01-01
In practical terms, protocol interoperability testing is still laborious and error-prone with little effect, even for those products that have passed conformance testing. Deadlock and unsymmetrical data communication are familiar in interoperability testing, and it is always very hard to trace their causes. The previous work has not provided a coherent way to analyze why the interoperability was broken among protocol implementations under test. In this paper, an alternative approach is presented to analyzing these problems from a viewpoint of implementation structures. Sequential and concurrent structures are both representative implementation structures, especially in event-driven development model. Our research mainly discusses the influence of sequential and concurrent structures on interoperability, with two instructive conclusions: (a) a sequential structure may lead to deadlock; (b) a concurrent structure may lead to unsymmetrical data communication. Therefore, implementation structures carry weight on interoperability, which may not gain much attention before. To some extent, they are decisive on the result of interoperability testing. Moreover, a concurrent structure with a sound task-scheduling strategy may contribute to the interoperability of a protocol implementation. Herein model checking technique is introduced into interoperability analysis for the first time. As the paper shows, it is an effective way to validate developers' selections on implementation structures or strategies.
Abstraction and Model Checking in the PEPA Plug-in for Eclipse
Smith, Michael James Andrew
2010-01-01
The stochastic process algebra PEPA is a widely used language for performance modelling, and a large part of its success is due to the rich tool support that is available. As a compositional Markovian formalism, however, it suffers from the state space explosion problem, where even small models can...... lead to very large Markov chains. One way of analysing such models is to use abstraction - constructing a smaller model that bounds the properties of the original. We present an extension to the PEPA plug-in for Eclipse that enables abstracting and model checking of PEPA models. This implements two new...
Checking for normality in linear mixed models
WU Ping; ZHU LiXing; FANG Yun
2012-01-01
Linear mixed models are popularly used to fit continuous longitudinal data,and the random effects are commonly assumed to have normal distribution.However,this assumption needs to be tested so that further analysis can be proceeded well.In this paper,we consider the Baringhaus-Henze-Epps-Pulley (BHEP) tests,which are based on an empirical characteristic function.Differing from their case,we consider the normality checking for the random effects which are unobservable and the test should be based on their predictors.The test is consistent against global alternatives,and is sensitive to the local alternatives converging to the null at a certain rate arbitrarily close to 1/(√)n where n is sample size.Furthermore,to overcome the problem that the limiting null distribution of the test is not tractable,we suggest a new method:use a conditional Monte Carlo test (CMCT) to approximate the null distribution,and then to simulate p-values.The test is compared with existing methods,the power is examined,and several examples are applied to illustrate the usefulness of our test in the analysis of longitudinal data.
Modelling Chinese Smart Grid : A stochastic model checking case study
Yuksel, E.; Nielson, H.R.; Nielson, F. (Technical Univ. of Denmark. DTU Informatics, Kgs. Lyngby (Denmark)); Zhu, H. (East China Normal Univ. (China)); Huang, H. (Wuxi SensingNet Industrialization Research Institute (China))
2012-07-01
In this document, we consider a specific Chinese Smart Grid implementation and try to address the verification problem for certain quantitative properties including performance and battery consumption. We employ stochastic model checking approach and present our modelling and analysis study using PRISM model checker. (Author)
Verifying Multi-Agent Systems via Unbounded Model Checking
Kacprzak, M.; Lomuscio, A.; Lasica, T.; Penczek, W.; Szreter, M.
2004-01-01
We present an approach to the problem of verification of epistemic properties in multi-agent systems by means of symbolic model checking. In particular, it is shown how to extend the technique of unbounded model checking from a purely temporal setting to a temporal-epistemic one. In order to achieve this, we base our discussion on interpreted systems semantics, a popular semantics used in multi-agent systems literature. We give details of the technique and show how it can be applied to the well known train, gate and controller problem. Keywords: model checking, unbounded model checking, multi-agent systems
Tabak, John
2004-01-01
Looking closely at algebra, its historical development, and its many useful applications, Algebra examines in detail the question of why this type of math is so important that it arose in different cultures at different times. The book also discusses the relationship between algebra and geometry, shows the progress of thought throughout the centuries, and offers biographical data on the key figures. Concise and comprehensive text accompanied by many illustrations presents the ideas and historical development of algebra, showcasing the relevance and evolution of this branch of mathematics.
A Method for Model Checking Feature Interactions
Pedersen, Thomas; Le Guilly, Thibaut; Ravn, Anders Peter; Skou, Arne Joachim
This paper presents a method to check for feature interactions in a system assembled from independently developed concurrent processes as found in many reactive systems. The method combines and refines existing definitions and adds a set of activities. The activities describe how to populate the ...
Algebraic analysis of a model of two-dimensional gravity
Frolov, A M; Kuzmin, S V
2009-01-01
An algebraic analysis of the Hamiltonian formulation of the model two-dimensional gravity is performed. The crucial fact is an exact coincidence of the Poisson brackets algebra of the secondary constraints of this Hamiltonian formulation with the SO(2,1)-algebra. The eigenvectors of the canonical Hamiltonian $H_{c}$ are obtained and explicitly written in closed form.
Graph model of the Heisenberg-Weyl algebra
Blasiak, P.; Horzela, A.; Duchamp, G. H. E.; Penson, K. A.; Solomon, A. I.
2007-01-01
We consider an algebraic formulation of Quantum Theory and develop a combinatorial model of the Heisenberg-Weyl algebra structure. It is shown that by lifting this structure to the richer algebra of graph operator calculus, we gain a simple interpretation involving, for example, the natural composition of graphs. This provides a deeper insight into the algebraic structure of Quantum Theory and sheds light on the intrinsic combinatorial underpinning of its abstract formalism.
Graph model of the Heisenberg-Weyl algebra
We consider an algebraic formulation of Quantum Theory and develop a combinatorial model of the Heisenberg-Weyl algebra structure. It is shown that by lifting this structure to the richer algebra of graph operator calculus, we gain a simple interpretation involving, for example, the natural composition of graphs. This provides a deeper insight into the algebraic structure of Quantum Theory and sheds light on the intrinsic combinatorial underpinning of its abstract formalism.
Phase transitions in algebraic cluster models
Complete text of publication follows. There has been much interest recently in phase transitions in various nuclear systems. The phases are defined as (local) minima of the potential energy surface (PES) defined in terms of parameters characterizing the nuclear system. Phase transitions occur when some relevant parameter is changed gradually and the system moves from one phase to another one. In the analysis of such systems the key questions are the number of phases and the order of phase transition between them. Algebraic nuclear structure models are especially interesting from the phase transition point of view, because the different phases may be characterized by different symmetries of the system. Much work has been done recently on models based on the interacting boson approximation (IBA). In these studies the potential energy surface is constructed from the algebraic Hamiltonian by its geometric mapping using the coherent state formalism. Inspired by these studies we performed a similar analysis of a family of algebraic cluster models based on the semimicroscopic algebraic cluster model (SACM). This model has two dynamical symmetries: the SU(3) and SO(4) limits are believed to correspond to vibration around a spherical equilibrium shape and static dipole deformation, respectively. The semimicroscopic nature of this model is reflected by the fact that a fully antisymmetrized microscopic model space is combined with a phenomenologic Hamiltonian that describes excitations of the (typically) two-cluster system. The microscopic model space is necessary to take into account the Pauli exclusion principle acting between the nucleons of the closely interacting clusters. In practice this means that the number of excitation quanta in the relative motion of the clusters has to exceed a certain number n0 characterizing the system. This is clearly a novelty with respect to other algebraic models, and it complicates the formalism considerably. We thus introduced as a
无
2004-01-01
Through most of Greek history, mathematicians concentrated on geometry, although Euclid considered the theory of numbers. The Greek mathematician Diophantus (3rd century),however, presented problems that had to be solved by what we would today call algebra. His book is thus the first algebra text.
Modeling Environment for Component Model Checking from Hierarchical Architecture
Pařízek, P.; Plášil, František
2007-01-01
Roč. 182, - (2007), s. 139-153. ISSN 1571-0661 R&D Projects: GA ČR GA201/06/0770 Institutional research plan: CEZ:AV0Z10300504 Keywords : software components * behavior protocols * environment model checking * hierarchical component architecture Subject RIV: JC - Computer Hardware ; Software
Quantum spin models and extended conformal algebras
Honecker, A
1995-01-01
First, an algebraic criterion for integrability is discussed -the so-called `superintegrability'- and some results on the classification of superintegrable quantum spin Hamiltonians based on sl(2) are obtained. Next, the massive phases of the Z_n-chiral Potts quantum spin chain (a model that violates parity) are studied in detail. It is shown that the excitation spectrum of the massive high-temperature phase can be explained in terms of n-1 fundamental quasiparticles. We compute correlation functions from a perturbative and numerical evaluation of the groundstate for the Z_3-chain. In addition to an exponential decay we observe an oscillating contribution. The oscillation length seems to be related to the asymmetry of the dispersion relations. We show that this relation is exact at special values of the parameters for general Z_n using a form factor expansion. Finally, we discuss several aspects of extended conformal algebras (W-algebras). We observe an analogy between boundary conditions for Z_n-spin chains ...
Flanders, Harley
1975-01-01
Algebra presents the essentials of algebra with some applications. The emphasis is on practical skills, problem solving, and computational techniques. Topics covered range from equations and inequalities to functions and graphs, polynomial and rational functions, and exponentials and logarithms. Trigonometric functions and complex numbers are also considered, together with exponentials and logarithms.Comprised of eight chapters, this book begins with a discussion on the fundamentals of algebra, each topic explained, illustrated, and accompanied by an ample set of exercises. The proper use of a
Algebraic model theory for languages without equality
Elgueta Montó, Raimon
1994-01-01
In our opinion, it is fair to distinguish two separate branches in the origins of model theory. The first one, the model theory of first-order logic, can be traced back to the pioneering work of L. Lowenheim, T. Skolem, K. Gödel, A. Tarski and A.I. MaI 'cev, published before the mid 30's. This branch was put forward during the 40s' and 50s’ by several authors, including A. Tarski, L. Henkin, A. Robinson, J. Los. Their contribution, however, was rather influenced by modern algebra, a disciplin...
Implementing Model-Check for Employee and Management Satisfaction
Jones, Corey; LaPha, Steven
2013-01-01
This presentation will discuss methods to which ModelCheck can be implemented to not only improve model quality, but also satisfy both employees and management through different sets of quality checks. This approach allows a standard set of modeling practices to be upheld throughout a company, with minimal interaction required by the end user. The presenter will demonstrate how to create multiple ModelCheck standards, preventing users from evading the system, and how it can improve the quality of drawings and models.
Kimura, Yusuke
2015-07-01
It has been understood that correlation functions of multi-trace operators in SYM can be neatly computed using the group algebra of symmetric groups or walled Brauer algebras. On the other hand, such algebras have been known to construct 2D topological field theories (TFTs). After reviewing the construction of 2D TFTs based on symmetric groups, we construct 2D TFTs based on walled Brauer algebras. In the construction, the introduction of a dual basis manifests a similarity between the two theories. We next construct a class of 2D field theories whose physical operators have the same symmetry as multi-trace operators constructed from some matrices. Such field theories correspond to non-commutative Frobenius algebras. A matrix structure arises as a consequence of the noncommutativity. Correlation functions of the Gaussian complex multi-matrix models can be translated into correlation functions of the two-dimensional field theories.
Application of non-commutative algebra to a soluble fermionic model
We explore the properties of the non-commutative Grassmann algebra to obtain the high-temperature expansion of the grand canonical partition function for self-interacting fermionic systems. As an application, we consider the anharmonic fermionic oscillator, the simplest model in Quantum Mechanics with self-interacting fermions that is exactly soluble. The knowledge of the exact expression for its grand canonical partition function enables us to check the β-expansion obtained using our Grassmann-algebra-based technique. (Copyright (c) 1999 Elsevier Science B.V., Amsterdam. All rights reserved.)
Efficient Checking of Individual Rewards Properties in Markov Population Models
Bortolussi, Luca; Hillston, Jane
2015-01-01
In recent years fluid approaches to the analysis of Markov populations models have been demonstrated to have great pragmatic value. Initially developed to estimate the behaviour of the system in terms of the expected values of population counts, the fluid approach has subsequently been extended to more sophisticated interrogations of models through its embedding within model checking procedures. In this paper we extend recent work on checking CSL properties of individual agents within a Marko...
Isovectorial pairing in solvable and algebraic models
Schematic interactions are useful to gain some insight in the behavior of very complicated systems such as the atomic nuclei. Prototypical examples are, in this context, the pairing interaction and the quadrupole interaction of the Elliot model. In this contribution the interplay between isovectorial pairing, spin-orbit, and quadrupole terms in a harmonic oscillator shell (the so-called pairing-plus-quadrupole model) is studied by algebraic methods. The ability of this model to provide a realistic description of N = Z even-even nuclei in the fp-shell is illustrated with 44Ti. Our calculations which derive from schematic and simple terms confirm earlier conclusions obtained by using realistic interactions: the SU(3) symmetry of the quadrupole term is broken mainly by the spin-orbit term, but the energies depends strongly on pairing.
Dynamic State Space Partitioning for External Memory Model Checking
Evangelista, Sami; Kristensen, Lars Michael
2009-01-01
We describe a dynamic partitioning scheme usable by model checking techniques that divide the state space into partitions, such as most external memory and distributed model checking algorithms. The goal of the scheme is to reduce the number of transitions that link states belonging to different...... partitions, and thereby limit the amount of disk access and network communication. We report on several experiments made with our verification platform ASAP that implements the dynamic partitioning scheme proposed in this paper....
Model checking biological systems described using ambient calculus
Mardare, Radu Iulian; Priami, Corrado; Qualia, Paola; Vagin, Oleksander
2005-01-01
Model checking biological systems described using ambient calculus. In Proc. of the second International Workshop on Computational Methods in Systems Biology (CMSB04), Lecture Notes in Bioinformatics 3082:85-103, Springer, 2005.......Model checking biological systems described using ambient calculus. In Proc. of the second International Workshop on Computational Methods in Systems Biology (CMSB04), Lecture Notes in Bioinformatics 3082:85-103, Springer, 2005....
Improved Bounded Model Checking for the Universal Fragment of CTL
Liang Xu; Wei Chen; Yan-Yan Xu; Wen-Hui Zhang
2009-01-01
SAT-based bounded model checking (BMC) has been introduced as a complementary technique to BDD-based symbolic model checking in recent years, and a lot of successful work has been done in this direction. The approach was first introduced by A. Biere et al. in checking linear temporal logic (LTL) formulae and then also adapted to check formulae of the universal fragment of computation tree logic (ACTL) by W. Penczek et al. As the efficiency of model checking is still an important issue, we present an improved BMC approach for ACTL based on Penczek's method. We consider two aspects of the approach. One is reduction of the number of variables and transitions in the k-model by distinguishing the temporal operator EX from the others. The other is simplification of the transformation of formulae by using uniform path encoding instead of a disjunction of all paths needed in the k-model. With these improvements, for an ACTI, formula, the length of the final encoding of the formula in the worst case is reduced. The improved approach is implemented in the tool BMV and is compared with the original one by applying both to two well known examples, mutual exclusion and dining philosophers. The comparison shows the advantages of the improved approach with respect to the efficiency of model checking.
Model Checking-Based Testing of Web Applications
ZENG Hongwei; MIAO Huaikou
2007-01-01
A formal model representing the navigation behavior of a Web application as the Kripke structure is proposed and an approach that applies model checking to test case generation is presented. The Object Relation Diagram as the object model is employed to describe the object structure of a Web application design and can be translated into the behavior model. A key problem of model checking-based test generation for a Web application is how to construct a set of trap properties that intend to cause the violations of model checking against the behavior model and output of counterexamples used to construct the test sequences.We give an algorithm that derives trap properties from the object model with respect to node and edge coverage criteria.
Symmetries of faces models and the double triangle algebra
Trinchero, R
2005-01-01
Symmetries of trigonometric integrable two dimensional statistical face models are considered. The corresponding symmetry operators on the Hilbert space of states of the quantum version of these models define a weak *-Hopf algebra isomorphic to the Ocneanu double triangle algebra(DTA).
Learning Markov Decision Processes for Model Checking
Hua Mao
2012-12-01
Full Text Available Constructing an accurate system model for formal model verification can be both resource demanding and time-consuming. To alleviate this shortcoming, algorithms have been proposed for automatically learning system models based on observed system behaviors. In this paper we extend the algorithm on learning probabilistic automata to reactive systems, where the observed system behavior is in the form of alternating sequences of inputs and outputs. We propose an algorithm for automatically learning a deterministic labeled Markov decision process model from the observed behavior of a reactive system. The proposed learning algorithm is adapted from algorithms for learning deterministic probabilistic finite automata, and extended to include both probabilistic and nondeterministic transitions. The algorithm is empirically analyzed and evaluated by learning system models of slot machines. The evaluation is performed by analyzing the probabilistic linear temporal logic properties of the system as well as by analyzing the schedulers, in particular the optimal schedulers, induced by the learned models.
Learning Markov Decision Processes for Model Checking
Mao, Hua; Chen, Yingke; Jaeger, Manfred;
2012-01-01
Constructing an accurate system model for formal model verification can be both resource demanding and time-consuming. To alleviate this shortcoming, algorithms have been proposed for automatically learning system models based on observed system behaviors. In this paper we extend the algorithm on...... learning probabilistic automata to reactive systems, where the observed system behavior is in the form of alternating sequences of inputs and outputs. We propose an algorithm for automatically learning a deterministic labeled Markov decision process model from the observed behavior of a reactive system....... The proposed learning algorithm is adapted from algorithms for learning deterministic probabilistic finite automata, and extended to include both probabilistic and nondeterministic transitions. The algorithm is empirically analyzed and evaluated by learning system models of slot machines. The...
A spatial operator algebra for manipulator modeling and control
Rodriguez, G.; Jain, A.; Kreutz-Delgado, K.
1991-01-01
A recently developed spatial operator algebra for manipulator modeling, control, and trajectory design is discussed. The elements of this algebra are linear operators whose domain and range spaces consist of forces, moments, velocities, and accelerations. The effect of these operators is equivalent to a spatial recursion along the span of a manipulator. Inversion of operators can be efficiently obtained via techniques of recursive filtering and smoothing. The operator algebra provides a high-level framework for describing the dynamic and kinematic behavior of a manipulator and for control and trajectory design algorithms. The interpretation of expressions within the algebraic framework leads to enhanced conceptual and physical understanding of manipulator dynamics and kinematics.
Linear Parametric Model Checking of Timed Automata
Hune, Tohmas Seidelin; Romijn, Judi; Stoelinga, Mariëlle; Vaandrager, Frits W.
We present an extension of the model checker Uppaal capable of synthesize linear parameter constraints for the correctness of parametric timed automata. The symbolic representation of the (parametric) state-space is shown to be correct. A second contribution of this paper is the identication of a...
Preparing Secondary Mathematics Teachers: A Focus on Modeling in Algebra
Jung, Hyunyi; Mintos, Alexia; Newton, Jill
2015-01-01
This study addressed the opportunities to learn (OTL) modeling in algebra provided to secondary mathematics pre-service teachers (PSTs). To investigate these OTL, we interviewed five instructors of required mathematics and mathematics education courses that had the potential to include opportunities for PSTs to learn algebra at three universities.…
Diagnostic checking for conditional heteroscedasticity models
无
2010-01-01
We suggest the score type tests for goodness-of-fit of conditional heteroscedasticity models in both univariate and multivariate time series.The tests can detect the alternatives converging to the null at a parametric rate.Weight functions are involved in the construction of the tests,which provides us with the flexibility to choose scores,especially under directional alternatives,for enhancing power performance.Furthermore,when the alternatives are not directional,we construct asymptotically distribution-free maximin tests for a large class of alternatives.A possibility to construct score-based omnibus tests is discussed when the alternative is saturated.The power performance is also investigated.A simulation study is carried out and a real data is analyzed.
A Metric Encoding for Bounded Model Checking (extended version)
Pradella, Matteo; Pietro, Pierluigi San
2009-01-01
In Bounded Model Checking both the system model and the checked property are translated into a Boolean formula to be analyzed by a SAT-solver. We introduce a new encoding technique which is particularly optimized for managing quantitative future and past metric temporal operators, typically found in properties of hard real time systems. The encoding is simple and intuitive in principle, but it is made more complex by the presence, typical of the Bounded Model Checking technique, of backward and forward loops used to represent an ultimately periodic infinite domain by a finite structure. We report and comment on the new encoding technique and on an extensive set of experiments carried out to assess its feasibility and effectiveness.
Applied Bounded Model Checking for Interlocking System Designs
Haxthausen, Anne Elisabeth; Peleska, Jan; Pinger, Ralf
2013-01-01
In this article the verification and validation of interlocking systems is investigated. Reviewing both geographical and route-related interlocking, the verification objectives can be structured from a perspective of computer science into (1) verification of static semantics, and (2) verification...... of behavioural (operational) semantics. The former checks that the plant model – that is, the software components reflecting the physical components of the interlocking system – has been set up in an adequate way. The latter investigates trains moving through the network, with the objective to uncover potential...... safety violations. From a formal methods perspective, these verification objectives can be approached by theorem proving, global, or bounded model checking. This article explains the techniques for application of bounded model checking techniques, and discusses their advantages in comparison...
Applied Bounded Model Checking for Interlocking System Designs
Haxthausen, Anne Elisabeth; Peleska, Jan; Pinger, Ralf
2014-01-01
In this paper the verification and validation of interlocking systems is investigated. Reviewing both geographical and route-related interlocking, the verification objectives can be structured from a perspective of computer science into (1) verification of static semantics, and (2) verification of...... behavioural (operational) semantics. The former checks that the plant model – that is, the software components reflecting the physical components of the interlocking system – has been set up in an adequate way. The latter investigates trains moving through the network, with the objective to uncover potential...... safety violations. From a formal methods perspective, these verification objectives can be approached by theorem proving, global, or bounded model checking. This paper explains the techniques for application of bounded model checking techniques, and discusses their advantages in comparison to the...
Bounded Model Checking of Temporal Formulas with Alloy
Cunha, Alcino
2012-01-01
Alloy is formal modeling language based on first-order relational logic, with no specific support for specifying reactive systems. We propose the usage of temporal logic to specify such systems, and show how bounded model checking can be performed with the Alloy Analyzer.
Towards Model Checking a Spi-Calculus Dialect
Gnesi, S.; Latella, D.; Lenzini, G.
2002-01-01
We present a model checking framework for a spi-calculus dialect which uses a linear time temporal logic for expressing security properties. We have provided our spi-calculus dialect, called SPID, with a semantics based on labeled transition systems (LTS), where the intruder is modeled in the Dolev-
Using Model Checking for Analyzing Distributed Power Control Problems
Brihaye, Thomas; Jungers, Marc; Lasaulce, Samson; Markey, Nicolas; Oreiby, Ghassan
2010-01-01
Model checking (MC) is a formal verification technique which has been known and still knows a resounding success in the computer science community. Realizing that the distributed power control ( PC) problem can be modeled by a timed game between a given transmitter and its environment, the authors...
Action Algebras and Model Algebras in Denotational Semantics
Guedes, Luiz Carlos Castro; Haeusler, Edward Hermann
This article describes some results concerning the conceptual separation of model dependent and language inherent aspects in a denotational semantics of a programming language. Before going into the technical explanation, the authors wish to relate a story that illustrates how correctly and precisely posed questions can influence the direction of research. By means of his questions, Professor Mosses aided the PhD research of one of the authors of this article and taught the other, who at the time was a novice supervisor, the real meaning of careful PhD supervision. The student’s research had been partially developed towards the implementation of programming languages through denotational semantics specification, and the student had developed a prototype [12] that compared relatively well to some industrial compilers of the PASCAL language. During a visit to the BRICS lab in Aarhus, the student’s supervisor gave Professor Mosses a draft of an article describing the prototype and its implementation experiments. The next day, Professor Mosses asked the supervisor, “Why is the generated code so efficient when compared to that generated by an industrial compiler?” and “You claim that the efficiency is simply a consequence of the Object- Orientation mechanisms used by the prototype programming language (C++); this should be better investigated. Pay more attention to the class of programs that might have this good comparison profile.” As a result of these aptly chosen questions and comments, the student and supervisor made great strides in the subsequent research; the advice provided by Professor Mosses made them perceive that the code generated for certain semantic domains was efficient because it mapped to the “right aspect” of the language semantics. (Certain functional types, used to represent mappings such as Stores and Environments, were pushed to the level of the object language (as in gcc). This had the side-effect of generating code for arrays in
Fermi resonance-algebraic model for molecular vibrational spectra
侯喜文; 董世海; 谢汨; 马中骐
1999-01-01
A Fermi resonance-algebraic model is proposed for molecular vibrations, where a U(2) algebra is used for describing the vibrations of each bond, and Fermi resonances between stretching and bending modes are taken into account. The model for a bent molecule XY2 and a molecule XY3 is successfully applied to fitting the recently observed vibrational spectrum of the water molecule and arsine (AsH3), respectively, and the results are compared with those of other models. Calculations show that algebraic approaches can be used as an effective method to describe molecular vibrations with small standard deviations.
Modelling Software Evolution using Algebraic Graph Rewriting
Ciraci, Selim; Broek, van den, PR Peter; Avgeriou, P.; Zdun, U.; Borne, I
2006-01-01
We show how evolution requests can be formalized using algebraic graph rewriting. In particular, we present a way to convert the UML class diagrams to colored graphs. Since changes in software may effect the relation between the methods of classes, our colored graph representation also employs the relations in UML interaction diagrams. Then, we provide a set of algebraic graph rewrite rules that formalizes the changes that may be caused by an evolution request, using the pushout construction ...
W-algebras and superalgebras from constrained WZW models
A classification of W algebras and superalgebras arising in Abelian as well as non Abelian Toda theories is presented. Each model, obtained from a constrained WZW action, is related with an Sl(2) subalgebra (resp. OSp(1/2) superalgebra) of a simple Lie algebra (resp. superalgebra) G. However, the determination of an U(1)Y factor, commuting with Sl(2) (resp. OSp(1/2)), appears, when it exists, particularly useful to characterize the corresponding W algebra. The (super) conformal spin contents of each W (super)algebra is performed. The class of all the superconformal algebras (i.e. with conformal spins s≤2) is easily obtained as a byproduct of our general results. (author) 26 refs.; 21 tabs
Algebra model and security analysis for cryptographic protocols
HUAI Jinpeng; LI Xianxian
2004-01-01
More and more cryptographic protocols have been used to achieve various security requirements of distributed systems in the open network environment. However cryptographic protocols are very difficult to design and analyze due to the complexity of the cryptographic protocol execution, and a large number of problems are unsolved that range from the theory framework to the concrete analysis technique. In this paper, we build a new algebra called cryptographic protocol algebra (CPA) for describing the message operations with many cryptographic primitives, and proposed a new algebra model for cryptographic protocols based on the CPA. In the model, expanding processes of the participant's knowledge on the protocol runs are characterized with some algebraic notions such as subalgebra, free generator and polynomial algebra, and attack processes are modeled with a new notion similar to that of the exact sequence used in homological algebra. Then we develope a mathematical approach to the cryptographic protocol security analysis. By using algebraic techniques, we have shown that for those cryptographic protocols with some symmetric properties, the execution space generated by an arbitrary number of participants may boil down to a smaller space generated by several honest participants and attackers. Furthermore we discuss the composability problem of cryptographic protocols and give a sufficient condition under which the protocol composed of two correct cryptographic protocols is still correct, and we finally offer a counterexample to show that the statement may not be true when the condition is not met.
Model checking conditional CSL for continuous-time Markov chains
Gao, Yang; Xu, Ming; Zhan, Naijun;
2013-01-01
probabilistic operator. CCSL allows us to express a richer class of properties for CTMCs. Based on a parameterized product obtained from the CTMC and an automaton extracted from a given CCSL formula, we propose an approximate model checking algorithm and analyse its complexity....
An Extended Ontology Model and Ontology Checking Based on Description Logics
王洪伟; 蒋馥; 吴家春
2004-01-01
Ontology is defined as an explicit specification of a conceptualization. In this paper, an extended ontology model was constructed using description logics, which is a 5-tuples including term set, individual set, term definition set, instantiation assertion set and term restriction set. Based on the extended model, the issue on ontology checking was studied with the conclusion that the four kinds of term checking, including term satisfiability checking, term subsumption checking, term equivalence checking and term disjointness checking, can be reduced to the satisfiability checking, and satisfiability checking can be transformed into instantiation consistence checking.
Computing Small 1-Homological Models for Commutative Differential Graded Algebras
Alvarez, Victor; Armario, Jose Andres; Frau, Maria Dolores; Gonzalez-Diaz, Rocio; Jimenez, Maria Jose; Real, Pedro; Silva, Beatriz
2001-01-01
We use homological perturbation machinery specific for the algebra category [P. Real. Homological Perturbation Theory and Associativity. Homology, Homotopy and Applications vol. 2, n. 5 (2000) 51-88] to give an algorithm for computing the differential structure of a small 1--homological model for commutative differential graded algebras (briefly, CDGAs). The complexity of the procedure is studied and a computer package in Mathematica is described for determining such models.
Mixed Portmanteau Test for Diagnostic Checking of Time Series Models
Sohail Chand
2014-01-01
Full Text Available Model criticism is an important stage of model building and thus goodness of fit tests provides a set of tools for diagnostic checking of the fitted model. Several tests are suggested in literature for diagnostic checking. These tests use autocorrelation or partial autocorrelation in the residuals to criticize the adequacy of fitted model. The main idea underlying these portmanteau tests is to identify if there is any dependence structure which is yet unexplained by the fitted model. In this paper, we suggest mixed portmanteau tests based on autocorrelation and partial autocorrelation functions of the residuals. We derived the asymptotic distribution of the mixture test and studied its size and power using Monte Carlo simulations.
Hyper-lattice algebraic model for data warehousing
Sen, Soumya; Chaki, Nabendu
2016-01-01
This book presents Hyper-lattice, a new algebraic model for partially ordered sets, and an alternative to lattice. The authors analyze some of the shortcomings of conventional lattice structure and propose a novel algebraic structure in the form of Hyper-lattice to overcome problems with lattice. They establish how Hyper-lattice supports dynamic insertion of elements in a partial order set with a partial hierarchy between the set members. The authors present the characteristics and the different properties, showing how propositions and lemmas formalize Hyper-lattice as a new algebraic structure.
Logic Model Checking of Unintended Acceleration Claims in Toyota Vehicles
Gamble, Ed
2012-01-01
Part of the US Department of Transportation investigation of Toyota sudden unintended acceleration (SUA) involved analysis of the throttle control software, JPL Laboratory for Reliable Software applied several techniques including static analysis and logic model checking, to the software; A handful of logic models were build, Some weaknesses were identified; however, no cause for SUA was found; The full NASA report includes numerous other analyses
Symbolic Model Checking and Analysis for E-Commerce Protocol
WEN Jing-Hua; ZHANG Mei; LI Xiang
2005-01-01
A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects - non-repudiation and fairness using SMV. As a result, the CMP1 protocol is not fair and we have improved it. This result shows that it is effective to analyze and check the new features of e-commerce protocols using SMV model checker
Quantum matrix algebra for the SU(n) WZNW model
Furlan, Paolo; Isaev, A P; Ogievetsky, O V; Pyatov, P N; Todorov, I T
2003-01-01
The zero modes of the chiral SU(n) WZNW model give rise to an intertwining quantum matrix algebra A generated by an n x n matrix a=(a^i_\\alpha) (with noncommuting entries) and by rational functions of n commuting elements q^{p_i}. We study a generalization of the Fock space (F) representation of A for generic q (q not a root of unity) and demonstrate that it gives rise to a model of the quantum universal enveloping algebra U_q(sl_n), each irreducible representation entering F with multiplicity 1. For an integer level k the complex parameter q is an even root of unity, q^h=-1 (h=k+n) and the algebra A has an ideal I_h such that the factor algebra A_h = A/I_h is finite dimensional.
Category-theoretic models of algebraic computer systems
Kovalyov, S. P.
2016-01-01
A computer system is said to be algebraic if it contains nodes that implement unconventional computation paradigms based on universal algebra. A category-based approach to modeling such systems that provides a theoretical basis for mapping tasks to these systems' architecture is proposed. The construction of algebraic models of general-purpose computations involving conditional statements and overflow control is formally described by a reflector in an appropriate category of algebras. It is proved that this reflector takes the modulo ring whose operations are implemented in the conventional arithmetic processors to the Łukasiewicz logic matrix. Enrichments of the set of ring operations that form bases in the Łukasiewicz logic matrix are found.
Observable algebras for the rational and trigonometric Euler-Calogero-Moser Models
We construct polynomial Poisson algebras of observables for the classical Euler-Calogero-Moser (ECM) models. Their structure connects them to flavour-indexed non-linear W∞ algebras, albeit with qualitative differences. The conserved Hamiltonians and symmetry algebras derived in a previous work are subsets of these algebra. We define their linear, N →∞ limits, realizing W∞ type algebras coupled to current algebras. ((orig.))
Schedulability of Herschel revisited using statistical model checking
David, Alexandre; Larsen, Kim Guldstrand; Legay, Axel;
2015-01-01
Schedulability analysis is a main concern for several embedded applications due to their safety-critical nature. The classical method of response time analysis provides an efficient technique used in industrial practice. However, the method is based on conservative assumptions related to execution...... and blocking times of tasks. Consequently, the method may falsely declare deadline violations that will never occur during execution. This paper is a continuation of previous work of the authors in applying extended timed automata model checking (using the tool UPPAAL) to obtain more exact...... schedulability analysis, here in the presence of non-deterministic computation times of tasks given by intervals [BCET,WCET]. Computation intervals with preemptive schedulers make the schedulability analysis of the resulting task model undecidable. Our contribution is to propose a combination of model checking...
Performance modeling and prediction for linear algebra algorithms
Iakymchuk, Roman
2012-01-01
This dissertation incorporates two research projects: performance modeling and prediction for dense linear algebra algorithms, and high-performance computing on clouds. The first project is focused on dense matrix computations, which are often used as computational kernels for numerous scientific applications. To solve a particular mathematical operation, linear algebra libraries provide a variety of algorithms. The algorithm of choice depends, obviously, on its performance. Performance of su...
Detecting feature interactions in Web services with model checking techniques
无
2007-01-01
As a platform-independent software system, a Web service is designed to offer interoperability among diverse and heterogeneous applications.With the introduction of service composition in the Web service creation, various message interactions among the atomic services result in a problem resembling the feature interaction problem in the telecommunication area.This article defines the problem as feature interaction in Web services and proposes a model checking-based detection method.In the method, the Web service description is translated to the Promela language - the input language of the model checker simple promela interpreter (SPIN), and the specific properties, expressed as linear temporal logic (LTL) formulas, are formulated according to our classification of feature interaction.Then, SPIN is used to check these specific properties to detect the feature interaction in Web services.
SMT-based Bounded Model Checking with Difference Logic Constraints
Bersani, Marcello M; Morzenti, Angelo; Pradella, Matteo; Rossi, Matteo; Pietro, Pierluigi San
2010-01-01
Traditional Bounded Model Checking (BMC) is based on translating the model checking problem into SAT, the Boolean satisfiability problem. This paper introduces an encoding of Linear Temporal Logic with Past operators (PLTL) into the Quantifier-Free Difference Logic with Uninterpreted Functions (QF-UFIDL). The resulting encoding is a simpler and more concise version of existing SATbased encodings, currently used in BMC. In addition, we present an extension of PLTL augmented with arithmetic relations over integers, which can express unbounded counters; as such, the extended logic is more expressive than PLTL. We introduce suitable restrictions and assumptions that are shown to make the verification problem for the extended logic decidable, and we define an encoding of the new logic into QF-UFIDL. Finally, a performance comparison with the SAT-based approach on purely PLTL examples shows significant improvements in terms of both execution time and memory occupation.
Boundary algebras and Kac modules for logarithmic minimal models
Morin-Duchesne, Alexi; Ridout, David
2015-01-01
Virasoro Kac modules were initially introduced indirectly as representations whose characters arise in the continuum scaling limits of certain transfer matrices in logarithmic minimal models, described using Temperley-Lieb algebras. The lattice transfer operators include seams on the boundary that use Wenzl-Jones projectors. If the projectors are singular, the original prescription is to select a subspace of the Temperley-Lieb modules on which the action of the transfer operators is non-singular. However, this prescription does not, in general, yield representations of the Temperley-Lieb algebras and the Virasoro Kac modules have remained largely unidentified. Here, we introduce the appropriate algebraic framework for the lattice analysis as a quotient of the one-boundary Temperley-Lieb algebra. The corresponding standard modules are introduced and examined using invariant bilinear forms and their Gram determinants. The structures of the Virasoro Kac modules are inferred from these results and are found to be...
A Graphical μ-Calculus and Local Model Checking
林惠民
2002-01-01
A graphical notation for the propositionalμ-calculus, called modal graphs, ispresented. It is shown that both the textual and equational presentations of theμ-calculus canbe translated into modal graphs. A model checking algorithm based on such graphs is proposed.The algorithm is truly local in the sense that it only generates the parts of the underlyingsearch space which are necessary for the computation of the final result. The correctness of thealgorithm is proven and its complexity analysed.
Model Checking for Licensing Support in the Finnish Nuclear Industry
Antti, Pakonen; Janne, Valkonen [VTT Technical Research, VTT (Finland); Sami, Matinaho; Markus, Hartikainen [Protum Power and Heat, Fortum (Finland)
2014-08-15
This paper examines how model checking can be used to support the qualification of digital I and C software in nuclear power plants, in a way that is consistent with regulatory demands specifically, the common position of seven European nuclear regulators and authorised technical support organisations. As a practical example, we discuss the third-party review service provided by VTT for the power company Fortum in the I and C renewal project of the Loviisa plant in southern Finland.
Parallel State Space Construction for Model-Checking
Garavel, Hubert; Mateescu, Radu; Smarandache, Irina
2001-01-01
The verification of concurrent finite-state systems by model-checking often requires to generate (a large part of) the state space of the system under analysis. Because of the state explosion problem, this may be a resource-consuming operation, both in terms of memory and CPU time. In this report, we aim at improving the performances of state space construction by using parallelization techniques. We present parallel algorithms for constructing state spaces (or Labeled Transition Systems) on ...
A comparison between algebraic models of molecular spectroscopy
Bijker, R; Lemus, R; Arias, J M; Pérez-Bernal, F
1998-01-01
We discuss a symmetry-adapted algebraic (or vibron) model for molecular spectroscopy. The model is formulated in terms of tensor operators under the molecular point group. In this way, we have identified interactions that are absent in previous versions of the vibron model, in which the Hamiltonian is expressed in terms of Casimir operators and their products. The inclusion of these new interactions leads to reliable spectroscopic predictions. As an example we study the vibrational excitations of the methane molecule, and compare our results with those obtained in other algebraic models.
Correctness of Sensor Network Applications by Software Bounded Model Checking
Werner, Frank; Faragó, David
We investigate the application of the software bounded model checking tool CBMC to the domain of wireless sensor networks (WSNs). We automatically generate a software behavior model from a network protocol (ESAWN) implementation in a WSN development and deployment platform (TinyOS), which is used to rigorously verify the protocol. Our work is a proof of concept that automatic verification of programs of practical size (≈ 21 000 LoC) and complexity is possible with CBMC and can be integrated into TinyOS. The developer can automatically check for pointer dereference and array index out of bound errors. She can also check additional, e.g., functional, properties that she provides by assume- and assert-statements. This experience paper shows that our approach is in general feasible since we managed to verify about half of the properties. We made the verification process scalable in the size of the code by abstraction (eg, from hardware) and by simplification heuristics. The latter also achieved scalability in data type complexity for the properties that were verifiable. The others require technical advancements for complex data types within CBMC's core.
Model-checking techniques based on cumulative residuals.
Lin, D Y; Wei, L J; Ying, Z
2002-03-01
Residuals have long been used for graphical and numerical examinations of the adequacy of regression models. Conventional residual analysis based on the plots of raw residuals or their smoothed curves is highly subjective, whereas most numerical goodness-of-fit tests provide little information about the nature of model misspecification. In this paper, we develop objective and informative model-checking techniques by taking the cumulative sums of residuals over certain coordinates (e.g., covariates or fitted values) or by considering some related aggregates of residuals, such as moving sums and moving averages. For a variety of statistical models and data structures, including generalized linear models with independent or dependent observations, the distributions of these stochastic processes tinder the assumed model can be approximated by the distributions of certain zero-mean Gaussian processes whose realizations can be easily generated by computer simulation. Each observed process can then be compared, both graphically and numerically, with a number of realizations from the Gaussian process. Such comparisons enable one to assess objectively whether a trend seen in a residual plot reflects model misspecification or natural variation. The proposed techniques are particularly useful in checking the functional form of a covariate and the link function. Illustrations with several medical studies are provided. PMID:11890304
Model-Checking Linear-Time Properties of Quantum Systems
Ying, Mingsheng; Yu, Nengkun; Feng, Yuan
2011-01-01
We define a formal framework for reasoning about linear-time properties of quantum systems in which quantum automata are employed in the modeling of systems and certain closed subspaces of state (Hilbert) spaces are used as the atomic propositions about the behavior of systems. We provide an algorithm for verifying invariants of quantum automata. Then automata-based model-checking technique is generalized for the verification of safety properties recognizable by reversible automata and omega-properties recognizable by reversible Buechi automata.
Model Checking Data Consistency for Cache Coherence Protocols
Hong Pan; Hui-Min Lin; Yi Lv
2006-01-01
A method for automatic verification of cache coherence protocols is presented, in which cache coherence protocols are modeled as concurrent value-passing processes, and control and data consistency requirement are described as formulas in first-orderμ-calculus. A model checker is employed to check if the protocol under investigation satisfies the required properties. Using this method a data consistency error has been revealed in a well-known cache coherence protocol.The error has been corrected, and the revised protocol has been shown free from data consistency error for any data domain size, by appealing to data independence technique.
Applying Model Checking to Industrial-Sized PLC Programs
AUTHOR|(CDS)2079190; Darvas, Daniel; Blanco Vinuela, Enrique; Tournier, Jean-Charles; Bliudze, Simon; Blech, Jan Olaf; Gonzalez Suarez, Victor M
2015-01-01
Programmable logic controllers (PLCs) are embedded computers widely used in industrial control systems. Ensuring that a PLC software complies with its specification is a challenging task. Formal verification has become a recommended practice to ensure the correctness of safety-critical software but is still underused in industry due to the complexity of building and managing formal models of real applications. In this paper, we propose a general methodology to perform automated model checking of complex properties expressed in temporal logics (\\eg CTL, LTL) on PLC programs. This methodology is based on an intermediate model (IM), meant to transform PLC programs written in various standard languages (ST, SFC, etc.) to different modeling languages of verification tools. We present the syntax and semantics of the IM and the transformation rules of the ST and SFC languages to the nuXmv model checker passing through the intermediate model. Finally, two real cases studies of \\CERN PLC programs, written mainly in th...
SoS contract verification using statistical model checking
Alessandro Mignogna
2013-11-01
Full Text Available Exhaustive formal verification for systems of systems (SoS is impractical and cannot be applied on a large scale. In this paper we propose to use statistical model checking for efficient verification of SoS. We address three relevant aspects for systems of systems: 1 the model of the SoS, which includes stochastic aspects; 2 the formalization of the SoS requirements in the form of contracts; 3 the tool-chain to support statistical model checking for SoS. We adapt the SMC technique for application to heterogeneous SoS. We extend the UPDM/SysML specification language to express the SoS requirements that the implemented strategies over the SoS must satisfy. The requirements are specified with a new contract language specifically designed for SoS, targeting a high-level English- pattern language, but relying on an accurate semantics given by the standard temporal logics. The contracts are verified against the UPDM/SysML specification using the Statistical Model Checker (SMC PLASMA combined with the simulation engine DESYRE, which integrates heterogeneous behavioral models through the functional mock-up interface (FMI standard. The tool-chain allows computing an estimation of the satisfiability of the contracts by the SoS. The results help the system architect to trade-off different solutions to guide the evolution of the SoS.
Laser modeling a numerical approach with algebra and calculus
Csele, Mark Steven
2014-01-01
Offering a fresh take on laser engineering, Laser Modeling: A Numerical Approach with Algebra and Calculus presents algebraic models and traditional calculus-based methods in tandem to make concepts easier to digest and apply in the real world. Each technique is introduced alongside a practical, solved example based on a commercial laser. Assuming some knowledge of the nature of light, emission of radiation, and basic atomic physics, the text:Explains how to formulate an accurate gain threshold equation as well as determine small-signal gainDiscusses gain saturation and introduces a novel pass
Optical linear algebra processors - Noise and error-source modeling
Casasent, D.; Ghosh, A.
1985-01-01
The modeling of system and component noise and error sources in optical linear algebra processors (OLAPs) are considered, with attention to the frequency-multiplexed OLAP. General expressions are obtained for the output produced as a function of various component errors and noise. A digital simulator for this model is discussed.
Logarithmic sℓ-hat (2) CFT models from Nichols algebras: I
We construct chiral algebras that centralize rank-2 Nichols algebras with at least one fermionic generator. This gives ‘logarithmic’ W-algebra extensions of a fractional-level sℓ-hat (2) algebra. We discuss crucial aspects of the emerging general relation between Nichols algebras and logarithmic conformal field theory (CFT) models: (i) the extra input, beyond the Nichols algebra proper, needed to uniquely specify a conformal model; (ii) a relation between the CFT counterparts of Nichols algebras connected by Weyl groupoid maps; and (iii) the common double bosonization U(X) of such Nichols algebras. For an extended chiral algebra, candidates for its simple modules that are counterparts of the U(X) simple modules are proposed, as a first step toward a functorial relation between U(X) and W-algebra representation categories. (paper)
Stochastic Model Checking of the Stochastic Quality Calculus
Nielson, Flemming; Nielson, Hanne Riis; Zeng, Kebin
2015-01-01
The Quality Calculus uses quality binders for input to express strategies for continuing the computation even when the desired input has not been received. The Stochastic Quality Calculus adds generally distributed delays for output actions and real-time constraints on the quality binders for inp...... based on stochastic model checking and we compute closed form solutions for a number of interesting scenarios. The analyses are applied to the design of an intelligent smart electrical meter of the kind to be installed in European households by 2020....
Symbolic Game Semantics for Model Checking Program Families
Dimovski, Aleksandar
this paper, we propose an efficient game semantics based approach for verifying open program families, i.e. program families with free (undefined) identifiers. We use symbolic representation of algorithmic game semantics, where concrete values are replaced with symbolic ones. In this way, we can...... compactly represent program families with infinite integers as so-called (finite-state) featured symbolic automata. Specifically designed model checking algorithms are then employed to verify safety of all programs from a family at once and pinpoint those programs that are unsafe (respectively, safe). We...
Model Checking Degrees of Belief in a System of Agents
Raimondi, Franco; Primero, Giuseppe; Rungta, Neha
2014-01-01
Reasoning about degrees of belief has been investigated in the past by a number of authors and has a number of practical applications in real life. In this paper we present a unified framework to model and verify degrees of belief in a system of agents. In particular, we describe an extension of the temporal-epistemic logic CTLK and we introduce a semantics based on interpreted systems for this extension. In this way, degrees of beliefs do not need to be provided externally, but can be derived automatically from the possible executions of the system, thereby providing a computationally grounded formalism. We leverage the semantics to (a) construct a model checking algorithm, (b) investigate its complexity, (c) provide a Java implementation of the model checking algorithm, and (d) evaluate our approach using the standard benchmark of the dining cryptographers. Finally, we provide a detailed case study: using our framework and our implementation, we assess and verify the situational awareness of the pilot of Air France 447 flying in off-nominal conditions.
Generalized Symbolic Execution for Model Checking and Testing
Khurshid, Sarfraz; Pasareanu, Corina; Visser, Willem; Kofmeyer, David (Technical Monitor)
2003-01-01
Modern software systems, which often are concurrent and manipulate complex data structures must be extremely reliable. We present a novel framework based on symbolic execution, for automated checking of such systems. We provide a two-fold generalization of traditional symbolic execution based approaches: one, we define a program instrumentation, which enables standard model checkers to perform symbolic execution; two, we give a novel symbolic execution algorithm that handles dynamically allocated structures (e.g., lists and trees), method preconditions (e.g., acyclicity of lists), data (e.g., integers and strings) and concurrency. The program instrumentation enables a model checker to automatically explore program heap configurations (using a systematic treatment of aliasing) and manipulate logical formulae on program data values (using a decision procedure). We illustrate two applications of our framework: checking correctness of multi-threaded programs that take inputs from unbounded domains with complex structure and generation of non-isomorphic test inputs that satisfy a testing criterion. Our implementation for Java uses the Java PathFinder model checker.
An algebraic approach to modeling in software engineering
Our work couples the formalism of universal algebras with the engineering techniques of mathematical modeling to develop a new approach to the software engineering process. Our purpose in using this combination is twofold. First, abstract data types and their specification using universal algebras can be considered a common point between the practical requirements of software engineering and the formal specification of software systems. Second, mathematical modeling principles provide us with a means for effectively analyzing real-world systems. We first use modeling techniques to analyze a system and then represent the analysis using universal algebras. The rest of the software engineering process exploits properties of universal algebras that preserve the structure of our original model. This paper describes our software engineering process and our experience using it on both research and commercial systems. We need a new approach because current software engineering practices often deliver software that is difficult to develop and maintain. Formal software engineering approaches use universal algebras to describe ''computer science'' objects like abstract data types, but in practice software errors are often caused because ''real-world'' objects are improperly modeled. There is a large semantic gap between the customer's objects and abstract data types. In contrast, mathematical modeling uses engineering techniques to construct valid models for real-world systems, but these models are often implemented in an ad hoc manner. A combination of the best features of both approaches would enable software engineering to formally specify and develop software systems that better model real systems. Software engineering, like mathematical modeling, should concern itself first and foremost with understanding a real system and its behavior under given circumstances, and then with expressing this knowledge in an executable form
Fully Analyzing an Algebraic Polya Urn Model
Morcrette, Basile
2012-01-01
This paper introduces and analyzes a particular class of Polya urns: balls are of two colors, can only be added (the urns are said to be additive) and at every step the same constant number of balls is added, thus only the color compositions varies (the urns are said to be balanced). These properties make this class of urns ideally suited for analysis from an "analytic combinatorics" point-of-view, following in the footsteps of Flajolet-Dumas-Puyhaubert, 2006. Through an algebraic generating function to which we apply a multiple coalescing saddle-point method, we are able to give precise asymptotic results for the probability distribution of the composition of the urn, as well as local limit law and large deviation bounds.
Model checking as an aid to procedure design
The OECD Halden Reactor Project has been actively working on computer assisted operating procedures for many years. The objective of the research has been to provide computerised assistance for procedure design, verification and validation, implementation and maintenance. For the verification purpose, the application of formal methods has been considered in several reports. The recent formal verification activity conducted at the Halden Project is based on using model checking to the verification of procedures. This report presents verification approaches based on different model checking techniques and tools for the formalization and verification of operating procedures. Possible problems and relative merits of the different approaches are discussed. A case study of one of the approaches is presented to show the practical application of formal verification. Application of formal verification in the traditional procedure design process can reduce the human resources involved in reviews and simulations, and hence reduce the cost of verification and validation. A discussion of the integration of the formal verification with the traditional procedure design process is given at the end of this report. (Author)
Reasoning About Strategies: On the Model-Checking Problem
Mogavero, Fabio; Perelli, Giuseppe; Vardi, Moshe Y
2011-01-01
In open systems verification, to formally check for reliability, one needs an appropriate formalism to model the interaction between agents and express the correctness of the system no matter how the environment behaves. An important contribution in this context is given by modal logics for strategic ability, in the setting of multi-agent games, such as ATL, ATL*, and the like. Recently, Chatterjee, Henzinger, and Piterman introduced Strategy Logic (CHP-SL), with the aim of getting a powerful framework for reasoning explicitly about strategies. CHP-SL is obtained by using first-order quantifications over strategies and it has been investigated in the setting of two-agents turned-based games, where a non-elementary model-checking algorithm has been provided. While CHP-SL is a very expressive logic, we claim that it does not fully capture the strategic aspects of multi-agent systems. In this paper, we introduce and study a more general strategy logic, denoted SL, for reasoning about strategies in multi-agent co...
Using Model Checking for Analyzing Distributed Power Control Problems
Thomas Brihaye
2010-01-01
Full Text Available Model checking (MC is a formal verification technique which has been known and still knows a resounding success in the computer science community. Realizing that the distributed power control (PC problem can be modeled by a timed game between a given transmitter and its environment, the authors wanted to know whether this approach can be applied to distributed PC. It turns out that it can be applied successfully and allows one to analyze realistic scenarios including the case of discrete transmit powers and games with incomplete information. The proposed methodology is as follows. We state some objectives a transmitter-receiver pair would like to reach. The network is modeled by a game where transmitters are considered as timed automata interacting with each other. The objectives are then translated into timed alternating-time temporal logic formulae and MC is exploited to know whether the desired properties are verified and determine a winning strategy.
Model-checking dense-time Duration Calculus
Fränzle, Martin
2004-01-01
Since the seminal work of Zhou Chaochen, M. R. Hansen, and P. Sestoft on decidability of dense-time Duration Calculus [Zhou, Hansen, Sestoft, 1993] it is well-known that decidable fragments of Duration Calculus can only be obtained through withdrawal of much of the interesting vocabulary of this...... logic. While this was formerly taken as an indication that key-press verification of implementations with respect to elaborate Duration Calculus specifications were also impossible, we show that the model property is well decidable for realistic designs which feature natural constraints on their...... suitably sparser model classes we obtain model-checking procedures for rich subsets of Duration Calculus. Together with undecidability results also obtained, this sheds light upon the exact borderline between decidability and undecidability of Duration Calculi and related logics....
Methods to model-check parallel systems software.
Matlin, O. S.; McCune, W.; Lusk, E.
2003-12-15
We report on an effort to develop methodologies for formal verification of parts of the Multi-Purpose Daemon (MPD) parallel process management system. MPD is a distributed collection of communicating processes. While the individual components of the collection execute simple algorithms, their interaction leads to unexpected errors that are difficult to uncover by conventional means. Two verification approaches are discussed here: the standard model checking approach using the software model checker SPIN and the nonstandard use of a general-purpose first-order resolution-style theorem prover OTTER to conduct the traditional state space exploration. We compare modeling methodology and analyze performance and scalability of the two methods with respect to verification of MPD.
Weak quasitriangular Quasi-Hopf algebra structure of minimal models
Teschner, J. A.
1995-01-01
The chiral vertex operators for the minimal models are constructed and used to define a fusion product of representations. The existence of commutativity and associativity operations is proved. The matrix elements of the associativity operations are shown to be given in terms of the 6-j symbols of the weak quasitriangular quasi-Hopf algebra obtained by truncating $\\usl$ at roots of unity.
Supersymmetry and DLCQ Limit of Lie 3-algebra Model of M-theory
Sato, Matsuo
2011-01-01
In arXiv:1003.4694, we proposed two models of M-theory, Hermitian 3-algebra model and Lie 3-algebra model. In this paper, we study the Lie 3-algebra model with a Lorentzian Lie 3-algebra. This model is ghost-free despite the Lorentzian 3-algebra. We show that our model satisfies two criteria as a model of M-theory. First, we show that the model possesses N=1 supersymmetry in eleven dimensions. Second, we show the model reduces to BFSS matrix theory with finite size matrices in a DLCQ limit.
A conceptual model of check dam hydraulics for gully control
C. Castillo
2013-09-01
Full Text Available There is little information in scientific literature regarding the modifications induced by check dam systems in flow regimes in restored gully reaches, despite it being a crucial issue for the design of conservation measures. Here, we develop a conceptual model to classify flow regimes in straight rectangular channels for initial and dam-filling conditions as well as a method of estimating efficiency in order to provide guidelines for optimal design. The model integrates several previous mathematical approaches for assessing the main processes involved (hydraulic jump HJ, impact flow, gradually varied flows. Its performance was compared with the simulations obtained from IBER, a bi-dimensional hydrodynamic model. The impact of check dam spacing (defined by the geometric factor of influence c on efficiency was explored. Eleven main classifications of flow regimes were identified depending on the element and level of influence. The model produced similar results when compared with IBER, but led to higher estimations of HJ and impact lengths. Total influence guaranteed maximum efficiency and HJ control defining the location of the optimal c. Geometric total influence (c = 1 was a valid criterion for the different stages of the structures in a wide range of situations provided that hydraulic roughness conditions remained high within the gully, e.g. through revegetation. Our total influence criterion involved shorter spacing than that habitually recommended in technical manuals for restoration, but was in line with those values found in spontaneous and stable step-pools systems, which might serve as a reference for man-made interventions.
How algebraic Bethe ansatz works for integrable model
Fadeev, L
1996-01-01
I study the technique of Algebraic Bethe Ansatz for solving integrable models and show how it works in detail on the simplest example of spin 1/2 XXX magnetic chain. Several other models are treated more superficially, only the specific details are given. Several parameters, appearing in these generalizations: spin s, anisotropy parameter \\ga, shift \\om in the alternating chain, allow to include in our treatment most known examples of soliton theory, including relativistic model of Quantum Field Theory.
Generalization of Richardson-Gaudin models to rank-2 algebras
Errea, B; Lerma, S; Dukelsky, J; Dimitrova, S S; Pittel, S; Van Isacker, P; Gueorguiev, V G
2006-07-20
A generalization of Richardson-Gaudin models to the rank-2 SO(5) and SO(3,2) algebras is used to describe systems of two kinds of fermions or bosons interacting through a pairing force. They are applied to the proton-neutron neutron isovector pairing model and to the Interacting Boson Model 2, in the transition from vibration to gamma-soft nuclei, respectively. In both cases, the integrals of motion and their eigenvalues are obtained.
Modelling and Analysis of Network Security - an Algebraic Approach
Qian ZHANG; Jiang, Ying; Wu, Peng
2015-01-01
Game theory has been applied to investigate network security. But different security scenarios were often modeled via different types of games and analyzed in an ad-hoc manner. In this paper, we propose an algebraic approach for modeling and analyzing uniformly several types of network security games. This approach is based on a probabilistic extension of the value-passing Calculus of Communicating Systems (CCS) which is regarded as a Generative model for Probabilistic Value-passing CCS (PVCC...
Algebraic turbulence modeling for unstructured and adaptive meshes
Mavriplis, Dimitri J.
1990-01-01
An algebraic turbulence model based on the Baldwin-Lomax model, has been implemented for use on unstructured grids. The implementation is based on the use of local background structured turbulence meshes. At each time-step, flow variables are interpolated from the unstructured mesh onto the background structured meshes, the turbulence model is executed on these meshes, and the resulting eddy viscosity values are interpolated back to the unstructured mesh. Modifications to the algebraic model were required to enable the treatment of more complicated flows, such as confluent boundary layers and wakes. The model is used in conjuction with an efficient unstructured multigrid finite-element Navier-Stokes solver in order to compute compressible turbulent flows on fully unstructured meshes. Solutions about single and multiple element airfoils are obtained and compared with experimental data.
The BC1 quantum elliptic model: algebraic forms, hidden algebra sl(2), polynomial eigenfunctions
The potential of the BC1 quantum elliptic model is a superposition of two Weierstrass functions with a doubling of both periods (two coupling constants). The BC1 elliptic model degenerates to an A1 elliptic model characterized by the Lamé Hamiltonian. It is shown that in the space of the BC1 elliptic invariant, the potential becomes a rational function, while the flat space metric becomes a polynomial. The model possesses the hidden sl(2) algebra for arbitrary coupling constants: it is equivalent to the sl(2) quantum top in three different magnetic fields. It is shown that three one-parametric families of coupling constants exist, for which a finite number of polynomial eigenfunctions (up to a factor) occur. (paper)
Combining Decision Diagrams and SAT Procedures for Efficient Symbolic Model Checking
Williams, Poul Frederick; Biere, Armin; Clarke, Edmund M.;
2000-01-01
, combined with BDDs and SAT-solvers to perform satisfiability checking. As a result we are able to model check systems for which standard BDD-based methods fail. For example, we model check a liveness property of a 256 bit shift-and-add multiplier and we are able to find a previously undetected bug...
A Succinct Approach to Static Analysis and Model Checking
Filipiuk, Piotr
In a number of areas software correctness is crucial, therefore it is often desirable to formally verify the presence of various properties or the absence of errors. This thesis presents a framework for concisely expressing static analysis and model checking problems. The framework facilitates...... guarantees that there always is single best solution for a problem under consideration. We also develop a solving algorithm, based on a dierential worklist, that computes the least solution guaranteed by the Moore Family result. Furthermore, we present a logic for specifying analysis problems called Layered...... Fixed Point Logic. Its most prominent feature is the direct support for both inductive computations of behaviors as well as co-inductive specications of properties. Two main theoretical contributions are a Moore Family result and a parametrized worst-case time complexity result. We develop a BDD...
Analysis of the Security of BB84 by Model Checking
Elboukhari, Mohamed; Azizi, Abdelmalek; 10.5121/ijnsa.2010.2207
2010-01-01
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was noted that quantum computers could break public key cryptosystems based on number theory extensive studies have been undertaken on QKD. Based on quantum mechanics, QKD offers unconditionally secure communication. Now, the progress of research in this field allows the anticipation of QKD to be available outside of laboratories within the next few years. Efforts are made to improve the performance and reliability of the implemented technologies. But several challenges remain despite this big progress. The task of how to test the apparatuses of QKD For example did not yet receive enough attention. These devises become complex and demand a big verification effort. In this paper we are interested in an approach based on the technique of probabilistic model checking for studying quantum information. Precisely, we use the PRISM tool to analyze ...
Boundary algebras and Kac modules for logarithmic minimal models
Morin-Duchesne, Alexi; Rasmussen, Jørgen; Ridout, David
2015-10-01
Virasoro Kac modules were originally introduced indirectly as representations whose characters arise in the continuum scaling limits of certain transfer matrices in logarithmic minimal models, described using Temperley-Lieb algebras. The lattice transfer operators include seams on the boundary that use Wenzl-Jones projectors. If the projectors are singular, the original prescription is to select a subspace of the Temperley-Lieb modules on which the action of the transfer operators is non-singular. However, this prescription does not, in general, yield representations of the Temperley-Lieb algebras and the Virasoro Kac modules have remained largely unidentified. Here, we introduce the appropriate algebraic framework for the lattice analysis as a quotient of the one-boundary Temperley-Lieb algebra. The corresponding standard modules are introduced and examined using invariant bilinear forms and their Gram determinants. The structures of the Virasoro Kac modules are inferred from these results and are found to be given by finitely generated submodules of Feigin-Fuchs modules. Additional evidence for this identification is obtained by comparing the formalism of lattice fusion with the fusion rules of the Virasoro Kac modules. These are obtained, at the character level, in complete generality by applying a Verlinde-like formula and, at the module level, in many explicit examples by applying the Nahm-Gaberdiel-Kausch fusion algorithm.
The Hidden Quantum Group of the 8-vertex Free Fermion Model: q-Clifford Algebras
Cuerno, Rodolfo; Gómez, César; López Manzanares, Esperanza; Sierra, Germán
1993-01-01
We prove in this paper that the elliptic $R$--matrix of the eight vertex free fermion model is the intertwiner $R$--matrix of a quantum deformed Clifford--Hopf algebra. This algebra is constructed by affinization of a quantum Hopf deformation of the Clifford algebra.
Integrability in three dimensions: Algebraic Bethe ansatz for anyonic models
Khachatryan, Sh.; Ferraz, A.; Klümper, A.; Sedrakyan, A.
2015-10-01
We extend basic properties of two dimensional integrable models within the Algebraic Bethe Ansatz approach to 2 + 1 dimensions and formulate the sufficient conditions for the commutativity of transfer matrices of different spectral parameters, in analogy with Yang-Baxter or tetrahedron equations. The basic ingredient of our models is the R-matrix, which describes the scattering of a pair of particles over another pair of particles, the quark-anti-quark (meson) scattering on another quark-anti-quark state. We show that the Kitaev model belongs to this class of models and its R-matrix fulfills well-defined equations for integrability.
Integrability in three dimensions: Algebraic Bethe ansatz for anyonic models
Sh. Khachatryan
2015-10-01
Full Text Available We extend basic properties of two dimensional integrable models within the Algebraic Bethe Ansatz approach to 2+1 dimensions and formulate the sufficient conditions for the commutativity of transfer matrices of different spectral parameters, in analogy with Yang–Baxter or tetrahedron equations. The basic ingredient of our models is the R-matrix, which describes the scattering of a pair of particles over another pair of particles, the quark-anti-quark (meson scattering on another quark-anti-quark state. We show that the Kitaev model belongs to this class of models and its R-matrix fulfills well-defined equations for integrability.
Algebraic fermion models and nuclear structure physics
Recent experimental and theoretical developments are generating renewed interest in the nuclear SU(3) shell model, and this extends to the symplectic model, with its Sp(6,R) symmetry, which is a natural multi-(ℎ/2π)ω extension of the SU(3) theory. First and foremost, an understanding of how the dynamics of a quantum rotor is embedded in the shell model has established it as the model of choice for describing strongly deformed systems. Second, the symplectic model extension of the 0-(ℎ/2π)ω theory can be used to probe additional degrees of freedom, like core polarization and vorticity modes that play a key role in providing a full description of quadrupole collectivity. Third, the discovery and understanding of pseudo-spin has allowed for an extension of the theory from light (A≤40) to heavy (A≥100) nuclei. Fourth, a user-friendly computer code for calculating reduced matrix elements of operators that couple SU(3) representations is now available. And finally, since the theory is designed to cope with deformation in a natural way, microscopic features of deformed systems can be probed; for example, the theory is now being employed to study double beta decay and thereby serves to probe the validity of the standard model of particles and their interactions. A subset of these topics will be considered in this course--examples cited include: a consideration of the origin of pseudo-spin symmetry; a SU(3)-based interpretation of the coupled-rotor model, early results of double beta decay studies; and some recent developments on the pseudo-SU(3) theory. Nothing will be said about other fermion-based theories; students are referred to reviews in the literature for reports on developments in these related areas
Analysis of the Security of BB84 by Model Checking
Mohamed Elboukhari
2010-04-01
Full Text Available Quantum Cryptography or Quantum key distribution (QKD is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was noted that quantum computers could break public key cryptosystems based on number theory extensive studies have been undertaken on QKD. Based on quantum mechanics, QKD offers unconditionally secure communication. Now, the progress of research in this field allows the anticipation of QKD to be available outside of laboratories within the next few years. Efforts are made to improve the performance and reliability of the implemented technologies. But several challenges remain despite this big progress. The task of how to test the apparatuses of QKD For example did not yet receive enough attention. These devises become complex and demand a big verification effort. In this paper we are interested in an approach based on the technique of probabilistic model checking for studying quantum information. Precisely, we use the PRISM tool to analyze the security of BB84 protocol and we are focused on the specific security property of eavesdropping detection. We show that this property is affected by the parameters of quantum channel and the power of eavesdropper
Optimisation of BPMN Business Models via Model Checking
Herbert, Luke Thomas; Sharp, Robin
2013-01-01
synthesized BPMN components, based on probabilistic computation tree logic and real-valued reward structures of the BPMN model, allowing for the specification of complex quantitative goals. We here present a simple algorithm, inspired by concepts from evolutionary algorithms, which iteratively generates...
Algebraic Turbulence-Chemistry Interaction Model
Norris, Andrew T.
2012-01-01
The results of a series of Perfectly Stirred Reactor (PSR) and Partially Stirred Reactor (PaSR) simulations are compared to each other over a wide range of operating conditions. It is found that the PaSR results can be simulated by a PSR solution with just an adjusted chemical reaction rate. A simple expression has been developed that gives the required change in reaction rate for a PSR solution to simulate the PaSR results. This expression is the basis of a simple turbulence-chemistry interaction model. The interaction model that has been developed is intended for use with simple one-step global reaction mechanisms and for steady-state flow simulations. Due to the simplicity of the model there is very little additional computational cost in adding it to existing CFD codes.
Model Checking of a Diabetes-Cancer Model
Gong, Haijun; Zuliani, Paolo; Clarke, Edmund M.
2011-06-01
Accumulating evidence suggests that cancer incidence might be associated with diabetes mellitus, especially Type II diabetes which is characterized by hyperinsulinaemia, hyperglycaemia, obesity, and overexpression of multiple WNT pathway components. These diabetes risk factors can activate a number of signaling pathways that are important in the development of different cancers. To systematically understand the signaling components that link diabetes and cancer risk, we have constructed a single-cell, Boolean network model by integrating the signaling pathways that are influenced by these risk factors to study insulin resistance, cancer cell proliferation and apoptosis. Then, we introduce and apply the Symbolic Model Verifier (SMV), a formal verification tool, to qualitatively study some temporal logic properties of our diabetes-cancer model. The verification results show that the diabetes risk factors might not increase cancer risk in normal cells, but they will promote cell proliferation if the cell is in a precancerous or cancerous stage characterized by losses of the tumor-suppressor proteins ARF and INK4a.
Algebraic spin liquid in an exactly solvable spin model
Yao, Hong; Zhang, Shou-Cheng; Kivelson, Steven A.; /Stanford U., Phys. Dept.
2010-03-25
We have proposed an exactly solvable quantum spin-3/2 model on a square lattice. Its ground state is a quantum spin liquid with a half integer spin per unit cell. The fermionic excitations are gapless with a linear dispersion, while the topological 'vison' excitations are gapped. Moreover, the massless Dirac fermions are stable. Thus, this model is, to the best of our knowledge, the first exactly solvable model of half-integer spins whose ground state is an 'algebraic spin liquid.'
Model Checking Classes of Metric LTL Properties of Object-Oriented Real-Time Maude Specifications
Erika Ábrahám; Peter Csaba Ölveczky; Daniela Lepri
2010-01-01
This paper presents a transformational approach for model checking two important classes of metric temporal logic (MTL) properties, namely, bounded response and minimum separation, for nonhierarchical object-oriented Real-Time Maude specifications. We prove the correctness of our model checking algorithms, which terminate under reasonable non-Zeno-ness assumptions when the reachable state space is finite. These new model checking features have been integrated into Real-Time Maude, and are use...
Kolman, Bernard
1985-01-01
College Algebra, Second Edition is a comprehensive presentation of the fundamental concepts and techniques of algebra. The book incorporates some improvements from the previous edition to provide a better learning experience. It provides sufficient materials for use in the study of college algebra. It contains chapters that are devoted to various mathematical concepts, such as the real number system, the theory of polynomial equations, exponential and logarithmic functions, and the geometric definition of each conic section. Progress checks, warnings, and features are inserted. Every chapter c
The Modeling Library of Eavesdropping Methods in Quantum Cryptography Protocols by Model Checking
Yang, Fan; Yang, Guowu; Hao, Yujie
2016-07-01
The most crucial issue of quantum cryptography protocols is its security. There exists many ways to attack the quantum communication process. In this paper, we present a model checking method for modeling the eavesdropping in quantum information protocols. So when the security properties of a certain protocol are needed to be verified, we can directly use the models which are already built. Here we adopt the probabilistic model checking tool—PRISM to model these attack methods. The verification results show that the detection rate of eavesdropping is approximately close to 1 when enough photons are transmitted.
The Modeling Library of Eavesdropping Methods in Quantum Cryptography Protocols by Model Checking
Yang, Fan; Yang, Guowu; Hao, Yujie
2016-03-01
The most crucial issue of quantum cryptography protocols is its security. There exists many ways to attack the quantum communication process. In this paper, we present a model checking method for modeling the eavesdropping in quantum information protocols. So when the security properties of a certain protocol are needed to be verified, we can directly use the models which are already built. Here we adopt the probabilistic model checking tool—PRISM to model these attack methods. The verification results show that the detection rate of eavesdropping is approximately close to 1 when enough photons are transmitted.
The supersymmetry extended Weyl algebra and Casalbuoni's G4 model
We briefly review the classical version of Casalbuoni's G4 supersymmetric model (i.e. the single particle version of the scalar chiral supermultiplet) with particular emphasis on the role played by the chirality. We show that the off-mass-shell commutators of the quantum model can be derived from the Lie algebra of the Weyl (i.e. Poincare plus dilatations) group extended by supersymmetry. The proper-time wavefunctions of the off-mass-shell states satisfy equations which clarify the role of the auxiliary fields of quantum field theory. (orig.)
A Multiple—Valued Algebra for Modeling MOS VLSI Circuits at Switch—Level
胡谋
1992-01-01
A multiple-valued algebra for modeling MOS VLSI circuits at switch-level is proposed in this paper,Its structure and properties are studied.This algebra can be used to transform a MOS digital circuit to a swith-level algebraic expression so as to generate the truth table for the circuit and to derive a Boolean expression for it.In the paper,methods to construct a switch-level algebraic expression for a circuit and methods to simplify expressions are given.This algebra provides a new tool for MOS VLSI circuit design and analysis.
Applications Of Algebraic Image Operators To Model-Based Vision
Lerner, Bao-Ting; Morelli, Michael V.; Thomas, Hans J.
1989-03-01
This paper extends our previous research on a highly structured and compact algebraic representation of grey-level images. Addition and multiplication are defined for the set of all grey-level images, which can then be described as polynomials of two variables. Utilizing this new algebraic structure, we have devised an innovative, efficient edge detection scheme.We have developed a robust method for linear feature extraction by combining the techniques of a Hough transform and a line follower with this new edge detection scheme. The major advantage of this feature extractor is its general, object-independent nature. Target attributes, such as line segment lengths, intersections, angles of intersection, and endpoints are derived by the feature extraction algorithm and employed during model matching. The feature extractor and model matcher are being incorporated into a distributed robot control system. Model matching is accomplished using both top-down and bottom-up processing: a priori sensor and world model information are used to constrain the search of the image space for features, while extracted image information is used to update the model.
Clifford algebra and the projective model of Hyperbolic spaces
Sokolov, Andrey
2016-01-01
I apply the algebraic framework developed in [1] to study geometry of hyperbolic spaces in 1, 2, and 3 dimensions. The background material on projectivised Clifford algebras and their application to Cayley-Klein geometries is described in [2].
Family-Based Model Checking Without a Family-Based Model Checker
Dimovski, Aleksandar; Al-Sibahi, Ahmad Salim; Brabrand, Claus; Wasowski, Andrzej
Many software systems are variational: they can be configured to meet diverse sets of requirements. Variability is found in both communication protocols and discrete controllers of embedded systems. In these areas, model checking is an important verification technique. For variational models...
Proceedings Second International Workshop on Algebraic Methods in Model-based Software Engineering
Durán, Francisco
2011-01-01
Over the past years there has been quite a lot of activity in the algebraic community about using algebraic methods for providing support to model-driven software engineering. The aim of this workshop is to gather researchers working on the development and application of algebraic methods to provide rigorous support to model-based software engineering. The topics relevant to the workshop are all those related to the use of algebraic methods in software engineering, including but not limited to: formally specifying and verifying model-based software engineering concepts and related ones (MDE, UML, OCL, MOF, DSLs, ...); tool support for the above; integration of formal and informal methods; and theoretical frameworks (algebraic, rewriting-based, category theory-based, ...). The workshop's main goal is to examine, discuss, and relate the existing projects within the algebraic community that address common open-issues in model-driven software engineering.
PVeStA: A Parallel Statistical Model Checking and Quantitative Analysis Tool
AlTurki, Musab
2011-01-01
Statistical model checking is an attractive formal analysis method for probabilistic systems such as, for example, cyber-physical systems which are often probabilistic in nature. This paper is about drastically increasing the scalability of statistical model checking, and making such scalability of analysis available to tools like Maude, where probabilistic systems can be specified at a high level as probabilistic rewrite theories. It presents PVeStA, an extension and parallelization of the VeStA statistical model checking tool [10]. PVeStA supports statistical model checking of probabilistic real-time systems specified as either: (i) discrete or continuous Markov Chains; or (ii) probabilistic rewrite theories in Maude. Furthermore, the properties that it can model check can be expressed in either: (i) PCTL/CSL, or (ii) the QuaTEx quantitative temporal logic. As our experiments show, the performance gains obtained from parallelization can be very high. © 2011 Springer-Verlag.
Topological basis realization for BMW algebra and Heisenberg XXZ spin chain model
Liu, Bo; Xue, Kang; Wang, Gangcheng; Liu, Ying; Sun, Chunfang
2015-04-01
In this paper, we study three-dimensional (3D) reduced Birman-Murakami-Wenzl (BMW) algebra based on topological basis theory. Several examples of BMW algebra representations are reviewed. We also discuss a special solution of BMW algebra, which can be used to construct Heisenberg XXZ model. The theory of topological basis provides a useful method to solve quantum spin chain models. It is also shown that the ground state of XXZ spin chain is superposition state of topological basis.
A U(1) Current Algebra Model Coupled to 2D-Gravity
Stoilov, M.; Zaikov, R.
1993-01-01
We consider a simple model of a scalar field with $U(1)$ current algebra gauge symmetry coupled to $2D$-gravity in order to clarify the origin of Stuckelberg symmetry in the $w_{\\infty}$-gravity theory. An analogous symmetry takes place in our model too. The possible central extension of the complete symmetry algebra and the corresponding critical dimension have been found. The analysis of the Hamiltonian and the constraints shows that the generators of the current algebra, the reparametrizat...
A New Algebraic Modelling Approach to Distributed Problem-Solving in MAS
帅典勋; 邓志东
2002-01-01
This paper is devoted to a new algebraic modelling approach to distributed problem-solving in multi-agent systems (MAS), which is featured by a unified framework for describing and treating social behaviors, social dynamics and social intelligence. A conceptual architecture of algebraic modelling is presented. The algebraic modelling of typical social behaviors, social situation and social dynamics is discussed in the context of distributed problemsolving in MAS. The comparison and simulation on distributed task allocations and resource assignments in MAS show more advantages of the algebraic approach than other conventional methods.
Clifford algebras geometric modelling and chain geometries with application in kinematics
Klawitter, Daniel
2015-01-01
After revising known representations of the group of Euclidean displacements Daniel Klawitter gives a comprehensive introduction into Clifford algebras. The Clifford algebra calculus is used to construct new models that allow descriptions of the group of projective transformations and inversions with respect to hyperquadrics. Afterwards, chain geometries over Clifford algebras and their subchain geometries are examined. The author applies this theory and the developed methods to the homogeneous Clifford algebra model corresponding to Euclidean geometry. Moreover, kinematic mappings for special Cayley-Klein geometries are developed. These mappings allow a description of existing kinematic mappings in a unifying framework. Contents Models and representations of classical groups Clifford algebras, chain geometries over Clifford algebras Kinematic mappings for Pin and Spin groups Cayley-Klein geometries Target Groups Researchers and students in the field of mathematics, physics, and mechanical engineering About...
Algebraic Traveling Wave Solutions of a Non-local Hydrodynamic-type Model
In this paper we consider the algebraic traveling wave solutions of a non-local hydrodynamic-type model. It is shown that algebraic traveling wave solutions exist if and only if an associated first order ordinary differential system has invariant algebraic curve. The dynamical behavior of the associated ordinary differential system is analyzed. Phase portraits of the associated ordinary differential system is provided under various parameter conditions. Moreover, we classify algebraic traveling wave solutions of the model. Some explicit formulas of smooth solitary wave and cuspon solutions are obtained
Model checking and strategy synthesis for stochastic games: from theory to practice
Kwiatkowska, MZ
2016-01-01
Probabilistic model checking is an automatic procedure for establishing if a desired property holds in a probabilistic model, aimed at verifying quantitative probabilistic specifications such as the probability of a critical failure occurring or expected time to termination. Much progress has been made in recent years in algorithms, tools and applications of probabilistic model checking, as exemplified by the probabilistic model checker PRISM (www.prismmodelchecker.org). However, the unstoppa...
Checking Fine and Gray Subdistribution Hazards Model with Cumulative Sums of Residuals
Li, Jianing; Scheike, Thomas H.; Zhang, Mei-Jie
2014-01-01
Recently, Fine and Gray (1999) proposed a semi-parametric proportional regression model for the subdistribution hazard function which has been used extensively for analyzing competing risks data. However, failure of model adequacy could lead to severe bias in parameter estimation, and only a limited contribution has been made to check the model assumptions. In this paper, we present a class of analytical methods and graphical approaches for checking the assumptions of Fine and Gray’s model. T...
A logic for model-checking of mean-field models
Kolesnichenko, Anna; Remke, Anne; Boer, de, J.W.; Haverkort, Boudewijn R.
2012-01-01
Recently, many systems consisting of a large number of interacting objects were analysed using the mean-field method, which has only been used for performance evaluation. In this short paper, we apply it to model checking. We define logic, which allows to describe the overall properties of the large system.
Algebraic model for single-particle energies of $\\Lambda$ hypernuclei
Fortunato, L
2016-01-01
A model is proposed for the spectrum of $\\Lambda$ hypernuclei based on the $u(3)\\times u(2)$ Lie algebra, in which the internal degrees of freedom of the spin-1/2 $\\Lambda$ particle are treated in the Fermionic $u(2)$ scheme, while the motion of the hyperon inside a nucleus is described in the Bosonic $u(3)$ harmonic oscillator scheme. Within this model, a simple formula for single-particle energies of the $\\Lambda$ particle is obtained from the natural dynamical symmetry. The formula is applied to the experimental data on the reaction spectroscopy for the $^{89}_\\Lambda$Y and $^{51}_\\Lambda$V hypernuclei, providing a clear theoretical interpretation of the observed structures.
Development of a butterfly check valve model under natural circulation conditions
Highlights: • Bases on Lim’s swing check valve model, a butterfly check valve model was developed. • The method to quantify the friction torque TF in Li’s model was corrected. • The developed model was implemented into the RELAP5 code and verified. - Abstract: A butterfly check valve is widely used to prevent a reverse flow in the pipe lines of a marine nuclear power plant. Under some conditions, the natural circulation conditions in particular, the fluid velocity through the butterfly check valve might become too low to hold the valve disk fully open, thereby the flow resistance of the butterfly check valve varies with the location of the valve disk and as a result the fluid flow is significantly affected by the dynamic motion of the valve disk. Simulation of a pipe line that includes some butterfly check valves, especially under natural circulation conditions, is thus complicated. This paper focuses on the development of a butterfly check valve model to enhance the capability of the thermal–hydraulic system code and the developed model is implemented into the RELAP5 code. Both steady-state calculations and transient calculations were carried out for the primary loop system of a marine nuclear power plant and the calculation results are compared with the experimental data for verification purpose. The simulation results show an agreement with the experimental data
Checking the new IRI model The bottomside B parameters
Mosert, M; Ezquer, R; Lazo, B; Miro, G
2002-01-01
Electron density profiles obtained at Pruhonice (50.0, 15.0), El Arenosillo (37.1, 353.2) and Havana (23, 278) were used to check the bottom-side B parameters BO (thickness parameter) and B1 (shape parameter) predicted by the new IRI - 2000 version. The electron density profiles were derived from ionograms using the ARP technique. The data base includes daytime and nighttime ionograms recorded under different seasonal and solar activity conditions. Comparisons with IRI predictions were also done. The analysis shows that: a) The parameter B1 given by IRI 2000 reproduces better the observed ARP values than the IRI-90 version and b) The observed BO values are in general well reproduced by both IRI versions: IRI-90 and IRI-2000.
Model Checking and Model-based Testing in the Railway Domain
Haxthausen, Anne Elisabeth; Peleska, Jan
2015-01-01
This chapter describes some approaches and emerging trends for verification and model-based testing of railway control systems. We describe state-of-the-art methods and associated tools for verifying interlocking systems and their configuration data, using bounded model checking and k-induction. ......This chapter describes some approaches and emerging trends for verification and model-based testing of railway control systems. We describe state-of-the-art methods and associated tools for verifying interlocking systems and their configuration data, using bounded model checking and k......-induction. Using real-world models of novel Danish interlocking systems, it is exemplified how this method scales up and is suitable for industrial application. For verification of the integrated HW/SW system performing the interlocking control tasks, a modelbased hardware-in-the-loop testing approach is presented...
Algebraic models of deviant modal operators based on de Morgan and Kleene lattices
Cattaneo, G.; Ciucci, DE; Dubois, D.
2011-01-01
An algebraic model of a kind of modal extension of de Morgan logic is described under the name MDS5 algebra. The main properties of this algebra can be summarized as follows: (1) it is based on a de Morgan lattice, rather than a Boolean algebra; (2) a modal necessity operator that satisfies the axioms N, K, T, and 5 (and as a consequence also B and 4) of modal logic is introduced; it allows one to introduce a modal possibility by the usual combination of necessity operation and...
Phases and phase transitions in the algebraic microscopic shell model
Georgieva A. I.
2016-01-01
Full Text Available We explore the dynamical symmetries of the shell model number conserving algebra, which define three types of pairing and quadrupole phases, with the aim to obtain the prevailing phase or phase transition for the real nuclear systems in a single shell. This is achieved by establishing a correspondence between each of the pairing bases with the Elliott’s SU(3 basis that describes collective rotation of nuclear systems. This allows for a complete classification of the basis states of different number of particles in all the limiting cases. The probability distribution of the SU(3 basis states within theirs corresponding pairing states is also obtained. The relative strengths of dynamically symmetric quadrupole-quadrupole interaction in respect to the isoscalar, isovector and total pairing interactions define a control parameter, which estimates the importance of each term of the Hamiltonian in the correct reproduction of the experimental data for the considered nuclei.
Model Checking of Software Components: Combining Java PathFinder and Behavior Protocol Model Checker
Pařízek, P.; Plášil, František; Kofroň, Jan
Los Alamitos: IEEE Computer Society, 2006, s. 133-141. ISBN 0-7695-2624-1. [SEW 2006. Annual IEEE/NASA Software Engineering Workshop /30./. Loyola College Graduate Center, Columbia (US), 24.04.2006-28.04.2006] R&D Projects: GA ČR GA201/06/0770 Institutional research plan: CEZ:AV0Z10300504 Keywords : software components * behavior protocols * model checking * cooperation of model checkers Subject RIV: JC - Computer Hardware ; Software
An Approach to Checking 3D Model with Related Engineering Drawings
无
2002-01-01
For some reasons, engineers build their product 3D mo del according to a set of related engineering drawings. The problem is how we ca n know the 3D model is correct. The manual checking is very boring and time cons uming, and still could not avoid mistakes. Thus, we could not confirm the model, maybe try checking again. It will effect the production preparing cycle greatly , and should be solved in a intelligent way. The difficulties are quite obvious, unlike word checking in a word processing package, ...
ADAM: Analysis of Discrete Models of Biological Systems Using Computer Algebra
Hinkelmann, Franziska; Guang, Bonny; McNeill, Rustin; Blekherman, Grigoriy; Veliz-Cuba, Alan; Laubenbacher, Reinhard
2010-01-01
Motivation: Many biological systems are modeled qualitatively with discrete models, such as probabilistic Boolean networks, logical models, bounded Petri nets, and agent-based models. Simulation is a common practice for analyzing discrete models, but many systems are far too large to capture all the relevant dynamical features through simulation alone. Results: We convert discrete models into algebraic models and apply tools from computational algebra to analyze their dynamics. The key feature of biological systems that is exploited by our algorithms is their sparsity: while the number of nodes in a biological network may be quite large, each node is affected only by a small number of other nodes. In our experience with models arising in systems biology and random models, this structure leads to fast computations when using algebraic models, and thus efficient analysis. Availability: All algorithms and methods are available in our package Analysis of Dynamic Algebraic Models (ADAM), a user friendly web-interf...
Efficient model checking for duration calculus based on branching-time approximations
Fränzle, Martin; Hansen, Michael Reichhardt
2008-01-01
Duration Calculus (abbreviated to DC) is an interval-based, metric-time temporal logic designed for reasoning about embedded real-time systems at a high level of abstraction. But the complexity of model checking any decidable fragment featuring both negation and chop, DC's only modality, is non......-elementary and thus impractical. We here investigate a similar approximation as frequently employed in model checking situation-based temporal logics, where linear-time problems are safely approximated by branching-time counterparts amenable to more efficient model-checking algorithms. Mimicking the role that a...... situation has in (A)CTL as origin of a set of linear traces, we define a branching-time counterpart to interval-based temporal logics building on situation pairs spanning sets of intervals. While this branching-time interval semantics yields the desired reduction in complexity of the model-checking problem...
Efficient Symmetry Reduction and the Use of State Symmetries for Symbolic Model Checking
Christian Appold
2010-06-01
Full Text Available One technique to reduce the state-space explosion problem in temporal logic model checking is symmetry reduction. The combination of symmetry reduction and symbolic model checking by using BDDs suffered a long time from the prohibitively large BDD for the orbit relation. Dynamic symmetry reduction calculates representatives of equivalence classes of states dynamically and thus avoids the construction of the orbit relation. In this paper, we present a new efficient model checking algorithm based on dynamic symmetry reduction. Our experiments show that the algorithm is very fast and allows the verification of larger systems. We additionally implemented the use of state symmetries for symbolic symmetry reduction. To our knowledge we are the first who investigated state symmetries in combination with BDD based symbolic model checking.
Validation of mission critical software design and implementation using model checking
Pingree, P. J.; Mikk, E.; Holzmann, G.; Smith, M.; Dams, D.
2002-01-01
Model Checking conducts an exhaustive exploration of all possible behaviors of a software system design and as such can be used to detect defects in designs that are typically difficult to discover with conventional testing approaches.
Deterministic Compilation of Temporal Safety Properties in Explicit State Model Checking
National Aeronautics and Space Administration — The translation of temporal logic specifications constitutes an essen- tial step in model checking and a major influence on the efficiency of formal verification...
Re"modeling" College Algebra: An Active Learning Approach
Pinzon, D.; Pinzon, K.; Stackpole, M.
2016-01-01
In this paper, we discuss active learning in College Algebra at Georgia Gwinnett College. This approach has been used in more than 20 sections of College Algebra taught by the authors in the past four semesters. Students work in small, structured groups on guided inquiry activities after watching 15-20 minutes of videos before class. We discuss a…
Towards Symbolic Model Checking for Multi-Agent Systems via OBDDs
Raimondi, Franco; Lomunscio, Alessio
2004-01-01
We present an algorithm for model checking temporal-epistemic properties of multi-agent systems, expressed in the formalism of interpreted systems. We first introduce a technique for the translation of interpreted systems into boolean formulae, and then present a model-checking algorithm based on this translation. The algorithm is based on OBDD's, as they offer a compact and efficient representation for boolean formulae.
Phase Two Feasibility Study for Software Safety Requirements Analysis Using Model Checking
Turgeon, Gregory; Price, Petra
2010-01-01
A feasibility study was performed on a representative aerospace system to determine the following: (1) the benefits and limitations to using SCADE , a commercially available tool for model checking, in comparison to using a proprietary tool that was studied previously [1] and (2) metrics for performing the model checking and for assessing the findings. This study was performed independently of the development task by a group unfamiliar with the system, providing a fresh, external perspective free from development bias.
Algebraic structures generating reaction-diffusion models: the activator-substrate system
Palese, Marcella
2015-01-01
We shall construct a class of nonlinear reaction-diffusion equations starting from an infinitesimal algebraic skeleton. Our aim is to explore the possibility of an algebraic foundation of integrability properties and of stability of equilibrium states associated with nonlinear models describing patterns formation.
Sigma-model Solutions and Intersecting p-Branes Related to Lie Algebras
Grebeniuk, M. A.; Ivashchuk, V. D.
1998-01-01
A family of Majumdar-Papapetrou type solutions in sigma-model of p-brane origin is obtained for all direct sums of finite-dimensional simple Lie algebras. Several examples of p-brane dyonic configurations in D=10 (IIA) and D=11 supergravities corresponding to the Lie algebra sl(3,C) are considered.
Lahtinen, J. [VTT Technical Research Centre of Finland, Espoo (Finland); Launiainen, T.; Heljanko, K.; Ropponen, J. [Aalto Univ., Espoo (Finland). Dept. of Information and Computer Science
2012-07-01
Digital instrumentation and control (I and C) systems are challenging to verify. They enable complicated control functions, and the state spaces of the models easily become too large for comprehensive verification through traditional methods. Model checking is a formal method that can be used for system verification. A number of efficient model checking systems are available that provide analysis tools to determine automatically whether a given state machine model satisfies the desired safety properties. This report reviews the work performed in the Safety Evaluation and Reliability Analysis of Nuclear Automation (SARANA) project in 2011 regarding model checking. We have developed new, more exact modelling methods that are able to capture the behaviour of a system more realistically. In particular, we have developed more detailed fault models depicting the hardware configuration of a system, and methodology to model function-block-based systems asynchronously. In order to improve the usability of our model checking methods, we have developed an algorithm for model checking large modular systems. The algorithm can be used to verify properties of a model that could otherwise not be verified in a straightforward manner. (orig.)
Index-aware model order reduction methods applications to differential-algebraic equations
Banagaaya, N; Schilders, W H A
2016-01-01
The main aim of this book is to discuss model order reduction (MOR) methods for differential-algebraic equations (DAEs) with linear coefficients that make use of splitting techniques before applying model order reduction. The splitting produces a system of ordinary differential equations (ODE) and a system of algebraic equations, which are then reduced separately. For the reduction of the ODE system, conventional MOR methods can be used, whereas for the reduction of the algebraic systems new methods are discussed. The discussion focuses on the index-aware model order reduction method (IMOR) and its variations, methods for which the so-called index of the original model is automatically preserved after reduction.
Verifying Real-time Commit Protocols Using Dense-time Model Checking Technology
Al-Bataineh, Omar I.; Reynolds, Mark; French, Tim; Woodings, Terry
2012-01-01
The timed-based automata model, introduced by Alur and Dill, provides a useful formalism for describing real-time systems. Over the last two decades, several dense-time model checking tools have been developed based on that model. The paper considers the verification of real-time distributed commit protocols using dense-time model checking technology. More precisely, we model and verify the well-known timed two phase commit protocol in three different state-of-the-art real-time model checkers...
Verifying Real-time Commit Protocols Using Dense-time Model Checking Technology
Al-Bataineh, Omar I; French, Tim; Woodings, Terry
2012-01-01
The timed-based automata model, introduced by Alur and Dill, provides a useful formalism for describing real-time systems. Over the last two decades, several dense-time model checking tools have been developed based on that model. The paper considers the verification of real-time distributed commit protocols using dense-time model checking technology. More precisely, we model and verify the well-known timed two phase commit protocol in three different state-of-the-art real-time model checkers: UPPAAL, Rabbit, and RED, and compare the results.
Bracken, Anthony J.; Ge Xiangyu; Gould, Mark D.; Links, Jon; Zhou Huanqiang [Centre for Mathematical Physics, University of Queensland, Brisbane, QLD (Australia)
2001-06-01
Integrable extended Hubbard models arising from symmetric group solutions are examined in the framework of the graded quantum inverse scattering method. The Bethe ansatz equations for all these models are derived by using the algebraic Bethe ansatz method. (author)
PKreport: report generation for checking population pharmacokinetic model assumptions
Li Jun
2011-05-01
Full Text Available Abstract Background Graphics play an important and unique role in population pharmacokinetic (PopPK model building by exploring hidden structure among data before modeling, evaluating model fit, and validating results after modeling. Results The work described in this paper is about a new R package called PKreport, which is able to generate a collection of plots and statistics for testing model assumptions, visualizing data and diagnosing models. The metric system is utilized as the currency for communicating between data sets and the package to generate special-purpose plots. It provides ways to match output from diverse software such as NONMEM, Monolix, R nlme package, etc. The package is implemented with S4 class hierarchy, and offers an efficient way to access the output from NONMEM 7. The final reports take advantage of the web browser as user interface to manage and visualize plots. Conclusions PKreport provides 1 a flexible and efficient R class to store and retrieve NONMEM 7 output, 2 automate plots for users to visualize data and models, 3 automatically generated R scripts that are used to create the plots; 4 an archive-oriented management tool for users to store, retrieve and modify figures, 5 high-quality graphs based on the R packages, lattice and ggplot2. The general architecture, running environment and statistical methods can be readily extended with R class hierarchy. PKreport is free to download at http://cran.r-project.org/web/packages/PKreport/index.html.
Model-Checking Real-Time Control Programs
Iversen, T. K.; Kristoffersen, K. J.; Larsen, Kim Guldstrand; Laursen, M.; Madsen, R. G.; Mortensen, S. K.; Pettersson, P.; Thomasen, C. B.
In this paper, we present a method for automatic verification of real-time control programs running on LEGO(R) RCX(TM) bricks using the verification tool UPPALL. The control programs, consisting of a number of tasks running concurrently, are automatically translated into the mixed automata model of...... UPPAAL. The fixed scheduling algorithm used by the LEGO(R) RCX(TM) processor is modeled in UPPALL, and supply of similar (sufficient) timed automata models for the environment allows analysis of the overall real-time system using the tools of UPPALL. To illustrate our technique for sorting LEGO(R) bricks...
Practical Application of Model Checking in Software Verification
Havelund, Klaus; Skakkebaek, Jens Ulrik
1999-01-01
This paper presents our experiences in applying the JAVA PATHFINDER (J(sub PF)), a recently developed JAVA to SPIN translator, in the finding of synchronization bugs in a Chinese Chess game server application written in JAVA. We give an overview of J(sub PF) and the subset of JAVA that it supports and describe the abstraction and verification of the game server. Finally, we analyze the results of the effort. We argue that abstraction by under-approximation is necessary for abstracting sufficiently smaller models for verification purposes; that user guidance is crucial for effective abstraction; and that current model checkers do not conveniently support the computational models of software in general and JAVA in particular.
Application of Model-Checking Technology to Controller Synthesis
David, Alexandre; Grunnet, Jacob Deleuran; Jessen, Jan Jacob;
2011-01-01
its continuous environment, which is modelled and taken care of in our frameworks. Our first technique does it by using Matlab to discretise the problem and then Uppaal-tiga to solve the obtained timed game. This is implemented as a toolbox. The second technique relies on the user defining a timed...... game model in Uppaal- tiga. Then the strategy is automatically imported in Simulink as an S-function for simulation and validation purposes. We demonstrate the effectiveness of these frameworks in different case-studies....
Model Checking Electronic Commerce Security Protocols Based on CTL
XIAO De-qin; ZHANG Huan-guo
2005-01-01
We present a model based on Computational Temporal Logic (CTL) methods for verifying security requirements of electronic commerce protocols. The model describes formally the authentication, confidentiality integrity,non-repudiation, denial of service and access control of the electronic commerce protocols. We illustrate as case study a variant of the Lu-Smolka protocol proposed by Lu-Smolka.Moreover, we have discovered two attacks that allow a dishonest user to purchase a good debiting the amount to another user. And also, we compared our work with relative research works and found that the formal way of this paper is more general to specify security protocols for E-Commerce.
VERIFICATION OF CONFLICTION AND UNREACHABILITY IN RULE-BASED EXPERT SYSTEMS WITH MODEL CHECKING
Einollah pira
2014-03-01
Full Text Available It is important to find optimal solutions for structural errors in rule-based expert systems .Solutions to discovering such errors by using model checking techniques have already been proposed, but these solutions have problems such as state space explosion. In this paper, to overcome these problems, we model the rule-based systems as finite state transition systems and express confliction and unreachabilityas Computation Tree Logic (CTL logic formula and then use the technique of model checking to detect confliction and unreachability in rule-based systems with the model checker UPPAAL.
Y(sl(2)) Algebra Application in Extended Hydrogen Atom and Monopole Models
TIAN Li-Jun; ZHANG Hong-Biao; JIN Shuo; XUE Kang
2004-01-01
We present the extended hydrogen atom and monopole-hydrogen atom theory through generalizing the usual hydrogen atom model and with a monopole model respectively, in which Y (sl(2) ) algebras are realized. We derive the Hamiltonians of the two models based on the Y(sl(2) ) and the generalized Pauli equation. The energy spectra of the systems are also given in terms of Yangian algebra and quantum mechanics.
Efficient Proof Engines for Bounded Model Checking of Hybrid Systems
Fränzle, Martin; Herde, Christian
2005-01-01
In this paper we present HySat, a new bounded model checker for linear hybrid systems, incorporating a tight integration of a DPLL-based pseudo-Boolean SAT solver and a linear programming routine as core engine. In contrast to related tools like MathSAT, ICS, or CVC, our tool exploits all of the...
Hypersonic: Model Analysis and Checking in the Cloud
Acretoaie, Vlad; Störrle, Harald
2014-01-01
”. Objective: In this paper we investigate the conceptual and technical feasibility of a new software architecture for modeling tools, where certain advanced features are factored out of the client and moved towards the Cloud. With this approach we plan to address the above mentioned drawbacks of existing...
Membrane Matrix models and non-perturbative checks of gauge/gravity duality
O'Connor, Denjoe
2016-01-01
We compare the bosonic and maximally supersymmetric membrane models. We find that in Hoppe regulated form the bosonic membrane is well approximated by massive Gaussian quantum matrix models. In contrast the similarly regulated supersymmetric membrane, which is equivalent to the BFSS model, has a gravity dual description. We sketch recent progress in checking gauge/gravity duality in this context.
Using Runtime Analysis to Guide Model Checking of Java Programs
Havelund, Klaus; Norvig, Peter (Technical Monitor)
2001-01-01
This paper describes how two runtime analysis algorithms, an existing data race detection algorithm and a new deadlock detection algorithm, have been implemented to analyze Java programs. Runtime analysis is based on the idea of executing the program once. and observing the generated run to extract various kinds of information. This information can then be used to predict whether other different runs may violate some properties of interest, in addition of course to demonstrate whether the generated run itself violates such properties. These runtime analyses can be performed stand-alone to generate a set of warnings. It is furthermore demonstrated how these warnings can be used to guide a model checker, thereby reducing the search space. The described techniques have been implemented in the b e grown Java model checker called PathFinder.
Model Checking of E-Commerce Protocol using Casper FDR
Dantuluri Sravanthi
2013-01-01
In present days the popularity of electronic commerce applications are motivated the development of new e-commerce protocols. By using these new protocols the secrecy and agreement properties are achieved. This paper mainly focuses on how to model the e-commerce protocol in CSP using SPL and verified using CasperFDR whether the protocol satisfies the properties specified. Attacks are identified in this version. The specifications through which these attacks are found are presented.
Using Stochastic Model Checking to Provision Complex Business Services
Herbert, Luke Thomas; Sharp, Robin
2012-01-01
We present a framework for modelling and analysis of real-world business workflows. Business processes regularly form the basis for the design of software services, and frequently display complex stochastic behaviour. The accurate evaluation of their qualitative aspects can allow for determining ...... of business processes including transient probabilities, timing, occurrence and ordering of events, and best- and worst-case scenarios. The developments presented are illustrated using an example from the health-care industry.......We present a framework for modelling and analysis of real-world business workflows. Business processes regularly form the basis for the design of software services, and frequently display complex stochastic behaviour. The accurate evaluation of their qualitative aspects can allow for determining...... bounds on resources consumed during execution of business processes. Accurate resource provisioning is often central to ensuring the safe execution of a process. We first introduce a formalised core subset of the Business Process Modelling and Notation (BPMN), which we extend with probabilistic and non...
Numerical modelling of granular flows: a reality check
Windows-Yule, C. R. K.; Tunuguntla, D. R.; Parker, D. J.
2016-07-01
Discrete particle simulations provide a powerful tool for the advancement of our understanding of granular media, and the development and refinement of the multitudinous techniques used to handle and process these ubiquitous materials. However, in order to ensure that this tool can be successfully utilised in a meaningful and reliable manner, it is of paramount importance that we fully understand the degree to which numerical models can be trusted to accurately and quantitatively recreate and predict the behaviours of the real-world systems they are designed to emulate. Due to the complexity and diverse variety of physical states and dynamical behaviours exhibited by granular media, a simulation algorithm capable of closely reproducing the behaviours of a given system may be entirely unsuitable for other systems with different physical properties, or even similar systems exposed to differing control parameters. In this paper, we focus on two widely used forms of granular flow, for which discrete particle simulations are shown to provide a full, quantitative replication of the behaviours of real industrial and experimental systems. We identify also situations for which quantitative agreement may fail are identified, but important general, qualitative trends are still recreated, as well as cases for which computational models are entirely unsuitable. By assembling this information into a single document, we hope not only to provide researchers with a useful point of reference when designing and executing future studies, but also to equip those involved in the design of simulation algorithms with a clear picture of the current strengths and shortcomings of contemporary models, and hence an improved knowledge of the most valuable areas on which to focus their work.
Numerical modelling of granular flows: a reality check
Windows-Yule, C. R. K.; Tunuguntla, D. R.; Parker, D. J.
2015-12-01
Discrete particle simulations provide a powerful tool for the advancement of our understanding of granular media, and the development and refinement of the multitudinous techniques used to handle and process these ubiquitous materials. However, in order to ensure that this tool can be successfully utilised in a meaningful and reliable manner, it is of paramount importance that we fully understand the degree to which numerical models can be trusted to accurately and quantitatively recreate and predict the behaviours of the real-world systems they are designed to emulate. Due to the complexity and diverse variety of physical states and dynamical behaviours exhibited by granular media, a simulation algorithm capable of closely reproducing the behaviours of a given system may be entirely unsuitable for other systems with different physical properties, or even similar systems exposed to differing control parameters. In this paper, we focus on two widely used forms of granular flow, for which discrete particle simulations are shown to provide a full, quantitative replication of the behaviours of real industrial and experimental systems. We identify also situations for which quantitative agreement may fail are identified, but important general, qualitative trends are still recreated, as well as cases for which computational models are entirely unsuitable. By assembling this information into a single document, we hope not only to provide researchers with a useful point of reference when designing and executing future studies, but also to equip those involved in the design of simulation algorithms with a clear picture of the current strengths and shortcomings of contemporary models, and hence an improved knowledge of the most valuable areas on which to focus their work.
Currents algebra for an atom-molecule Bose-Einstein condensate model
Filho, Gilberto N. Santos
2016-01-01
I present an interconversion currents algebra for an atom-molecule Bose-Einstein condensate model and use it to get the quantum dynamics of the currents. For different choices of the Hamiltonian parameters I get different currents dynamics.
A Check-up for the Statistical Parton Model
Buccella, Franco
2014-01-01
We compare the parton distributions deduced in the framework of a quantum statistical approach for both the longitudinal and transverse degrees of freedom with the unpolarized distributions measured at Hera and with the polarized ones proposed in a previous paper, which have been shown to be in very good agreement also with the results of experiments performed after that proposal. The agreement with Hera data in correspondence of very similar values for the 'temperature' and the 'potentials' found in the previous work gives a robust confirm of the statistical model. The feature of describing both unpolarized and polarized parton distributions in terms of few parameters fixed by data with large statistics and small systematic errors makes very attractive the parametrization proposed here.
A check-up for the statistical Parton model
Buccella, Franco; Sohaily, Sozha
2015-11-01
We compare the Parton distributions deduced in the framework of a quantum statistical approach for both the longitudinal and transverse degrees of freedom with the unpolarized distributions measured at HERA and with the polarized ones proposed in a previous paper, which have been shown to be in very good agreement also with the results of experiments performed after that proposal. The agreement with HERA data in correspondence to very similar values for the “temperature” and the “potentials” found in the previous work gives a robust confirm of the statistical model. The unpolarized distributions are compared also with the result of NNPDF. The free parameters are fixed mainly by data in the range (0.1, 0.5) for the x variable, where the valence Partons dominate, and in the small x region for the diffractive contribution. This feature makes the parametrization proposed here very attractive.
Prototype of Automated PLC Model Checking Using Continuous Integration Tools
Lettrich, Michael
2015-01-01
To deal with the complexity of operating and supervising large scale industrial installations at CERN, often Programmable Logic Controllers (PLCs) are used. A failure in these control systems can cause a disaster in terms of economic loses, environmental damages or human losses. Therefore the requirements to software quality are very high. To provide PLC developers with a way to verify proper functionality against requirements, a Java tool named PLCverif has been developed which encapsulates and thus simplifies the use of third party model checkers. One of our goals in this project is to integrate PLCverif in development process of PLC programs. When the developer changes the program, all the requirements should be verified again, as a change on the code can produce collateral effects and violate one or more requirements. For that reason, PLCverif has been extended to work with Jenkins CI in order to trigger automatically the verication cases when the developer changes the PLC program. This prototype has been...
Cascading Verification: An Integrated Method for Domain-Specific Model Checking
Zervoudakis, F.
2014-01-01
Model checking is an established formal method for verifying the desired behavioral properties of system models. But popular model checkers tend to support low-level modeling languages that require intricate models to represent even the simplest systems. Modeling complexity arises in part from the need to encode domain knowledge, including domain objects and concepts, and their relationships, at relatively low levels of abstraction. We will demonstrate that, once formalized, domain knowledge ...
Model Checking Real Time Java Using Java PathFinder
Lindstrom, Gary; Mehlitz, Peter C.; Visser, Willem
2005-01-01
The Real Time Specification for Java (RTSJ) is an augmentation of Java for real time applications of various degrees of hardness. The central features of RTSJ are real time threads; user defined schedulers; asynchronous events, handlers, and control transfers; a priority inheritance based default scheduler; non-heap memory areas such as immortal and scoped, and non-heap real time threads whose execution is not impeded by garbage collection. The Robust Software Systems group at NASA Ames Research Center has JAVA PATHFINDER (JPF) under development, a Java model checker. JPF at its core is a state exploring JVM which can examine alternative paths in a Java program (e.g., via backtracking) by trying all nondeterministic choices, including thread scheduling order. This paper describes our implementation of an RTSJ profile (subset) in JPF, including requirements, design decisions, and current implementation status. Two examples are analyzed: jobs on a multiprogramming operating system, and a complex resource contention example involving autonomous vehicles crossing an intersection. The utility of JPF in finding logic and timing errors is illustrated, and the remaining challenges in supporting all of RTSJ are assessed.
Clifford algebra-based spatio-temporal modelling and analysis for complex geo-simulation data
Luo, Wen; Yu, Zhaoyuan; Hu, Yong; Yuan, Linwang
2013-10-01
The spatio-temporal data simulating Ice-Land-Ocean interaction of Antarctic are used to demonstrate the Clifford algebra-based data model construction, spatio-temporal query and data analysis. The results suggest that Clifford algebra provides a powerful mathematical tool for the whole modelling and analysis chains for complex geo-simulation data. It can also help implement spatio-temporal analysis algorithms more clearly and simply.
Heinicke, C; Heinicke, Christian; Hehl, Friedrich W.
2001-01-01
We survey the application of computer algebra in the context of gravitational theories. After some general remarks, we show of how to check the second Bianchi-identity by means of the Reduce package Excalc. Subsequently we list some computer algebra systems and packages relevant to applications in gravitational physics. We conclude by presenting a couple of typical examples.
Gamble, Ed; Holzmann, Gerard
2011-01-01
Part of the US DOT investigation of Toyota SUA involved analysis of the throttle control software. JPL LaRS applied several techniques, including static analysis and logic model checking, to the software. A handful of logic models were built. Some weaknesses were identified; however, no cause for SUA was found. The full NASA report includes numerous other analyses
Requirements-level semantics and model checking of object-oriented statecharts
Eshuis, Rik; Jansen, David N.; Wieringa, Roel
2002-01-01
In this paper we define a requirements-level execution semantics for object-oriented statecharts and show how properties of a system specified by these statecharts can be model checked using tool support for model checkers. Our execution semantics is requirements-level because it uses the perfect te
Random Testing and Model Checking: Building a Common Framework for Nondeterministic Exploration
Groce, Alex; Joshi, Rajeev
2008-01-01
Two popular forms of dynamic analysis, random testing and explicit-state software model checking, are perhaps best viewed as search strategies for exploring the state spaces introduced by nondeterminism in program inputs. We present an approach that enables this nondeterminism to be expressed in the SPIN model checker's PROMELA language, and then lets users generate either model checkers or random testers from a single harness for a tested C program. Our approach makes it easy to compare model checking and random testing for models with precisely the same input ranges and probabilities and allows us to mix random testing with model checking's exhaustive exploration of non-determinism. The PROMELA language, as intended in its design, serves as a convenient notation for expressing nondeterminism and mixing random choices with nondeterministic choices. We present and discuss a comparison of random testing and model checking. The results derive from using our framework to test a C program with an effectively infinite state space, a module in JPL's next Mars rover mission. More generally, we show how the ability of the SPIN model checker to call C code can be used to extend SPIN's features, and hope to inspire others to use the same methods to implement dynamic analyses that can make use of efficient state storage, matching, and backtracking.
R. Lestari
2012-12-01
Full Text Available Tujuan penelitian tindakan kelas ini untuk mengetahui pengaruh proses pembelajaran dengan menggunakan model pembelajaran kooperatif tipe Pair Checks pemecahan masalah terhadap peningkatan social skill siswa. Pada proses penerapan model pembelajaran kooperatif tipe Pair Checks pemecahan masalah siswa dibagi dalam kelompok-kelompok dan satu kelompok terdiri dari dua orang. Setiap kelompok berdiskusi untuk menyelesaikan suatu masalah, kemudian hasil diskusi kelompok akan dicek oleh pasangan dari kelompok lain. Metode Penelitian yang digunakan adalah penelitian tindakan kelas yang dilaksanakan dua siklus. Metode pengumpulan data menggunakan tes dan angket skala sikap, sedangkan teknik analisis data menggunakan teknik analisis data kuantitatif. Social Skill siswa dari siklus I ke siklus II mengalami peningkatan. Hal ini didapatkan dari data angket skala sikap siklus I ke siklus II ketuntasan klasikalnya meningkat dan sebagian besar siswa sudah memiliki social skill yang baik. Hasil belajar kognitif siswa juga mengalami peningkatan. Model pembelajaran kooperatif tipe Pair Checks pemecahan masalah dapat meningkatkan social skill siswa.This two cycles-action research aimed to know learning process applying cooperative learning model-pair checks problem solving type and improvement of studentâ€™s social skills. The process of the model was as follows: deviding students into some groups consisting of two students, solving problem by each group and checking result of the discussion by other groups. Data collection method used was test and the use of attitude scale questionnaire, while technique of data analysis used was quantitative data analysis technique. The data analysis result showed that there was an increase of studentâ€™s social skill and studentsâ€™ achievement from cycle one to two. It is concluded that cooperative learning model-pair checks problem solving type can enhance studentâ€™s social skills
Off-critical W∞ and Virasoro algebras as dynamical symmetries of the integrable models
An infinite set of new non commuting conserved charges in a specific class of perturbed CFT's is founded and a criterion for their existence is presented. They appear to be higher momenta of the already known commuting conserved currents. The algebra they close consists of two non commuting W ∞ algebras. Various Virasoro subalgebras of the full symmetry algebra are founded. It is shown on the examples of the perturbed Ising and Potts models that one of them plays an essential role in the computation of the correlation functions of the fields of the theory. (author)
DiVinE-CUDA - A Tool for GPU Accelerated LTL Model Checking
Jiří Barnat
2009-12-01
Full Text Available In this paper we present a tool that performs CUDA accelerated LTL Model Checking. The tool exploits parallel algorithm MAP adjusted to the NVIDIA CUDA architecture in order to efficiently detect the presence of accepting cycles in a directed graph. Accepting cycle detection is the core algorithmic procedure in automata-based LTL Model Checking. We demonstrate that the tool outperforms non-accelerated version of the algorithm and we discuss where the limits of the tool are and what we intend to do in the future to avoid them.
Local Model Checking of Weighted CTL with Upper-Bound Constraints
Jensen, Jonas Finnemann; Larsen, Kim Guldstrand; Srba, Jiri; Østergaard, Lars
We present a symbolic extension of dependency graphs by Liu and Smolka in order to model-check weighted Kripke structures against the logic CTL with upper-bound weight constraints. Our extension introduces a new type of edges into dependency graphs and lifts the computation of fixed-points from...... boolean domain to nonnegative integers in order to cope with the weights. We present both global and local algorithms for the fixed-point computation on symbolic dependency graphs and argue for the advantages of our approach compared to the direct encoding of the model checking problem into dependency...
Application safety enhancement model using self-checking with software enzymes
Subramaniam, Chandrasekaran; Ravishankar, Arthi; Gopal, Deepthi; Subramanian, Dhaarini
2011-12-01
The objective of the paper is to propose a safety enhancement model for application software in accelerating the respective self checking strategies similar to bio enzymatic actions. The application software components which are safety critical may have to be assessed periodically or on demand to achieve not only the functional correctness but also the safety specifications or features while getting executed. The design and deployment of such software modules can be formally verified for possible safety flaws using self checking capabilities and software enzymatic actions. The self checks must sense the safety holes in the software and decide to activate the built-in software components called enzymes to do the safe guard operations in a timely manner to mitigate the safety faults using the proposed enzyme calculus. The various application hazards due to the boolean faults in the functional and behavioral model that lead to software safety issues are considered in this approach.
Algebraic multigrid preconditioner for the cardiac bidomain model.
Plank, Gernot; Liebmann, Manfred; Weber dos Santos, Rodrigo; Vigmond, Edward J; Haase, Gundolf
2007-04-01
The bidomain equations are considered to be one of the most complete descriptions of the electrical activity in cardiac tissue, but large scale simulations, as resulting from discretization of an entire heart, remain a computational challenge due to the elliptic portion of the problem, the part associated with solving the extracellular potential. In such cases, the use of iterative solvers and parallel computing environments are mandatory to make parameter studies feasible. The preconditioned conjugate gradient (PCG) method is a standard choice for this problem. Although robust, its efficiency greatly depends on the choice of preconditioner. On structured grids, it has been demonstrated that a geometric multigrid preconditioner performs significantly better than an incomplete LU (ILU) preconditioner. However, unstructured grids are often preferred to better represent organ boundaries and allow for coarser discretization in the bath far from cardiac surfaces. Under these circumstances, algebraic multigrid (AMG) methods are advantageous since they compute coarser levels directly from the system matrix itself, thus avoiding the complexity of explicitly generating coarser, geometric grids. In this paper, the performance of an AMG preconditioner (BoomerAMG) is compared with that of the standard ILU preconditioner and a direct solver. BoomerAMG is used in two different ways, as a preconditioner and as a standalone solver. Two 3-D simulation examples modeling the induction of arrhythmias in rabbit ventricles were used to measure performance in both sequential and parallel simulations. It is shown that the AMG preconditioner is very well suited for the solution of the bidomain equation, being clearly superior to ILU preconditioning in all regards, with speedups by factors in the range 5.9-7.7. PMID:17405366
Nonparametric checks for count data models: an application to demand for health care in Spain
Álvarez, Begoña; Delgado, Miguel A.
1997-01-01
This paper presents model specification checking procedures for count data regression models which are consistent in the direction of nonparametric alternatives. The discussion is motivated in the context of a model of demand for health care in Spain. The parameters of the regression model are estimated by maximum likelihood based on Poisson and Negative Binomial specifications as well as by ordinary least squares and semiparametric generalized least squares. However, our interest is not only...
Excel Spreadsheets for Algebra: Improving Mental Modeling for Problem Solving
Engerman, Jason; Rusek, Matthew; Clariana, Roy
2014-01-01
This experiment investigates the effectiveness of Excel spreadsheets in a high school algebra class. Students in the experiment group convincingly outperformed the control group on a post lesson assessment. The student responses, teacher observations involving Excel spreadsheet revealed that it operated as a mindtool, which formed the users'…
The reflection equation algebra of Sklyanin is extended to the supersymmetric case. A graded reflection equation algebra is proposed and the corresponding graded (supersymmetric) boundary quantum inverse scattering method (QISM) is formulated. As an application, integrable open-boundary conditions for the doped spin-1 chain of the supersymmetric t-J model are studied in the framework of the boundary QISM. Diagonal boundary K-matrices are found and four classes of integrable boundary terms are determined. (author)
The classical origin of quantum affine algebra in squashed sigma models
Kawaguchi, Io; Matsumoto, Takuya; Yoshida, Kentaroh
2012-01-01
We consider a quantum affine algebra realized in two-dimensional non-linear sigma models with target space three-dimensional squashed sphere. Its affine generators are explicitly constructed and the Poisson brackets are computed. The defining relations of quantum affine algebra in the sense of the Drinfeld first realization are satisfied at classical level. The relation to the Drinfeld second realization is also discussed including higher conserved charges. Finally we comment on a semiclassic...
Incremental checking of Master Data Management model based on contextual graphs
Lamolle, Myriam; Menet, Ludovic; Le Duc, Chan
2015-10-01
The validation of models is a crucial step in distributed heterogeneous systems. In this paper, an incremental validation method is proposed in the scope of a Model Driven Engineering (MDE) approach, which is used to develop a Master Data Management (MDM) field represented by XML Schema models. The MDE approach presented in this paper is based on the definition of an abstraction layer using UML class diagrams. The validation method aims to minimise the model errors and to optimisethe process of model checking. Therefore, the notion of validation contexts is introduced allowing the verification of data model views. Description logics specify constraints that the models have to check. An experimentation of the approach is presented through an application developed in ArgoUML IDE.