WorldWideScience

Sample records for design formal protocols

  1. Protocol design and implementation using formal methods

    NARCIS (Netherlands)

    van Sinderen, Marten J.; Ferreira Pires, Luis; Pires, L.F.; Vissers, C.A.

    1992-01-01

    This paper reports on a number of formal methods that support correct protocol design and implementation. These methods are placed in the framework of a design methodology for distributed systems that was studied and developed within the ESPRIT II Lotosphere project (2304). The paper focuses on

  2. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  3. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  4. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  5. Formal Test Automation: The Conference Protocol with PHACT

    NARCIS (Netherlands)

    Heerink, A.W.; Ural, Hasan; Probert, Robert L.; Feenstra, J.; Tretmans, G.J.; von Bochmann, Gregor

    2000-01-01

    We discuss a case study of automatic test generation and test execution based on formal methods. The case is the Conference Protocol, a simple, chatbox-like protocol, for which (formal) specifications and multiple implementations are publicly available and which is also used in other case study

  6. Formal description of the jumpstart just-in-time signaling protocol using EFSM

    Science.gov (United States)

    Zaim, A. H.; Baldine, Ilia; Cassada, Mark; Rouskas, George N.; Perros, Harry G.; Stevenson, Daniel S.

    2002-07-01

    We present a formal protocol description for a Just-In-Time (JIT) signaling scheme running over a core dWDM network which utilizes Optical Burst Switches (OBS). We apply an eight-tuple extended finite state machine (EFSM) model to formally specify the protocol. Using the EFSM model, we define the communication between a source client node and a destination client node through an ingress and one or multiple intermediate switches. We worked on single burst connections that means setting up the connection just before sending a single burst and then closing the connection as soon as the burst is sent. The communication between the EFSMs is handled through message transfer between protocol entities.

  7. Clinical applicability and cutoff values for an unstructured neuropsychological assessment protocol for older adults with low formal education.

    Science.gov (United States)

    de Paula, Jonas Jardim; Bertola, Laiss; Ávila, Rafaela Teixeira; Moreira, Lafaiete; Coutinho, Gabriel; de Moraes, Edgar Nunes; Bicalho, Maria Aparecida Camargos; Nicolato, Rodrigo; Diniz, Breno Satler; Malloy-Diniz, Leandro Fernandes

    2013-01-01

    The neuropsychological exam plays a central role in the assessment of elderly patients with cognitive complaints. It is particularly relevant to differentiate patients with mild dementia from those subjects with mild cognitive impairment. Formal education is a critical factor in neuropsychological performance; however, there are few studies that evaluated the psychometric properties, especially criterion related validity, neuropsychological tests for patients with low formal education. The present study aims to investigate the validity of an unstructured neuropsychological assessment protocol for this population and develop cutoff values for clinical use. A protocol composed by the Rey-Auditory Verbal Learning Test, Frontal Assessment Battery, Category and Letter Fluency, Stick Design Test, Clock Drawing Test, Digit Span, Token Test and TN-LIN was administered to 274 older adults (96 normal aging, 85 mild cognitive impairment and 93 mild Alzheimer`s disease) with predominantly low formal education. Factor analysis showed a four factor structure related to Executive Functions, Language/Semantic Memory, Episodic Memory and Visuospatial Abilities, accounting for 65% of explained variance. Most of the tests showed a good sensitivity and specificity to differentiate the diagnostic groups. The neuropsychological protocol showed a significant ecological validity as 3 of the cognitive factors explained 31% of the variance on Instrumental Activities of Daily Living. The study presents evidence of the construct, criteria and ecological validity for this protocol. The neuropsychological tests and the proposed cutoff values might be used for the clinical assessment of older adults with low formal education.

  8. Formal analysis of design process dynamics

    NARCIS (Netherlands)

    Bosse, T.; Jonker, C.M.; Treur, J.

    2010-01-01

    This paper presents a formal analysis of design process dynamics. Such a formal analysis is a prerequisite to come to a formal theory of design and for the development of automated support for the dynamics of design processes. The analysis was geared toward the identification of dynamic design

  9. Formal Analysis of Design Process Dynamics

    NARCIS (Netherlands)

    Bosse, T.; Jonker, C.M.; Treur, J.

    2010-01-01

    This paper presents a formal analysis of design process dynamics. Such a formal analysis is a prerequisite to come to a formal theory of design and for the development of automated support for the dynamics of design processes. The analysis was geared toward the identification of dynamic design

  10. A Formal Analysis of the Web Services Atomic Transaction Protocol with UPPAAL

    DEFF Research Database (Denmark)

    Ravn, Anders Peter; Srba, Jiri; Vighio, Saleem

    2010-01-01

    We present a formal analysis of the Web Services Atomic Transaction (WS-AT) protocol. WS-AT is a part of the WS-Coordination framework and describes an algorithm for reaching agreement on the outcome of a distributed transaction. The protocol is modelled and verified using the model checker UPPAAL...

  11. Formal Test Automation: The Conference protocol with TGV/TorX

    NARCIS (Netherlands)

    Ural, Hasan; Du Bousquet, Lydie; Ramangalahy, Solofo; Probert, Robert L.; von Bochmann, Gregor; Simon, Severine; Viho, Cesar; Belinfante, Axel; de Vries, R.G.

    We present an experiment of automated formal conformance testing of the Conference Protocol Entity as reported in [2]. Our approach differs from other experiments, since it investigates the combination of the tools TGV for abstract test generation and TorX for test execution.

  12. A Formal Verification of the Alternating Bit Protocol in the Calculus of Constructions

    NARCIS (Netherlands)

    Bezem, M.A.; Groote, J.F.

    We report on a formal verification of the Alternating Bit Protocol (ABP) in the Calculus of Constructions. We outline a semi-formal correctness proof of the ABP with sufficient detail to be formalised. Thereafter we show by examples how the formalised proof has been verified by the automated proof

  13. Implementing the WebSocket Protocol Based on Formal Modelling and Automated Code Generation

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge; Kristensen, Lars Michael

    2014-01-01

    with pragmatic annotations for automated code generation of protocol software. The contribution of this paper is an application of the approach as implemented in the PetriCode tool to obtain protocol software implementing the IETF WebSocket protocol. This demonstrates the scalability of our approach to real...... protocols. Furthermore, we perform formal verification of the CPN model prior to code generation, and test the implementation for interoperability against the Autobahn WebSocket test-suite resulting in 97% and 99% success rate for the client and server implementation, respectively. The tests show...

  14. Indicators and protocols for monitoring impacts of formal and informal trails in protected areas

    Science.gov (United States)

    Marion, Jeffrey L.; Leung, Yu-Fai

    2011-01-01

    Trails are a common recreation infrastructure in protected areas and their conditions affect the quality of natural resources and visitor experiences. Various trail impact indicators and assessment protocols have been developed in support of monitoring programs, which are often used for management decision-making or as part of visitor capacity management frameworks. This paper reviews common indicators and assessment protocols for three types of trails, surfaced formal trails, unsurfaced formal trails, and informal (visitor-created) trails. Monitoring methods and selected data from three U.S. National Park Service units are presented to illustrate some common trail impact indicators and assessment options.

  15. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  16. Formalizing and proving a typing result for security protocols in Isabelle/HOL

    DEFF Research Database (Denmark)

    Hess, Andreas Viktor; Modersheim, Sebastian

    2017-01-01

    or the positive output of a verification tool. However several of these works have used a typed model, where the intruder is restricted to "well-typed" attacks. There also have been several works that show that this is actually not a restriction for a large class of protocols, but all these results so far...... are again pen-and-paper proofs. In this work we present a formalization of such a typing result in Isabelle/HOL. We formalize a constraint-based approach that is used in the proof argument of such typing results, and prove its soundness, completeness and termination. We then formalize and prove the typing...... result itself in Isabelle. Finally, to illustrate the real-world feasibility, we prove that the standard Transport Layer Security (TLS) handshake satisfies the main condition of the typing result....

  17. Formal Specification and Description Language and Message Sequence Chart to Model and Validate Session Initiation Protocol Services

    OpenAIRE

    Sa'ed Abed; Mohammad H. Al Shayeji; Ovais Ahmed; Sahel Alouneh

    2016-01-01

    Session Initiation Protocol (SIP) is a signaling layer protocol for building, adjusting and ending sessions among participants including Internet conferences, telephone calls and multimedia distribution. SIP facilitates user movement by proxying and forwarding requests to the present location of the user. In this paper, we provide a formal Specification and Description Language (SDL) and Message Sequence Chart (MSC) to model and define the Internet Engineering Task Force (IETF) SIP protocol a...

  18. Formal methods in design and verification of functional specifications

    International Nuclear Information System (INIS)

    Vaelisuo, H.

    1995-01-01

    It is claimed that formal methods should be applied already when specifying the functioning of the control/monitoring system, i.e. when planning how to implement the desired operation of the plant. Formal methods are seen as a way to mechanize and thus automate part of the planning. All mathematical methods which can be applied on related problem solving should be considered as formal methods. Because formal methods can only support the designer, not replace him/her, they must be integrated into a design support tool. Such a tool must also aid the designer in getting the correct conception of the plant and its behaviour. The use of a hypothetic design support tool is illustrated to clarify the requirements such a tool should fulfill. (author). 3 refs, 5 figs

  19. Formal Methods for Abstract Specifications – A Comparison of Concepts

    DEFF Research Database (Denmark)

    Instenberg, Martin; Schneider, Axel; Schnetter, Sabine

    2006-01-01

    In industry formal methods are becoming increasingly important for the verification of hardware and software designs. However current practice for specification of system and protocol functionality on high level of abstraction is textual description. For verification of the system behavior manual...... inspections and tests are usual means. To facilitate the introduction of formal methods in the development process of complex systems and protocols, two different tools evolved from research activities – UPPAAL and SpecEdit – have been investigated and compared regarding their concepts and functionality...

  20. Formal education of curriculum and instructional designers

    NARCIS (Netherlands)

    McKenney, Susan; Visscher-Voerman, Irene

    2013-01-01

    McKenney, S., & Visscher-Voerman, I. (2013). Formal education of curriculum and instructional designers. Educational Designer, 2(6). Available online: http://www.educationaldesigner.org/ed/volume2/issue6/article20/index.htm

  1. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    Science.gov (United States)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  2. Informal and formal trail monitoring protocols and baseline conditions: Acadia National Park

    Science.gov (United States)

    Marion, Jeffrey L.; Wimpey, Jeremy F.; Park, L.

    2011-01-01

    At Acadia National Park, changing visitor use levels and patterns have contributed to an increasing degree of visitor use impacts to natural and cultural resources. To better understand the extent and severity of these resource impacts and identify effective management techniques, the park sponsored this research to develop monitoring protocols, collect baseline data, and identify suggestions for management strategies. Formal and informal trails were surveyed and their resource conditions were assessed and characterized to support park planning and management decision-making.

  3. Formal verification an essential toolkit for modern VLSI design

    CERN Document Server

    Seligman, Erik; Kumar, M V Achutha Kiran

    2015-01-01

    Formal Verification: An Essential Toolkit for Modern VLSI Design presents practical approaches for design and validation, with hands-on advice for working engineers integrating these techniques into their work. Building on a basic knowledge of System Verilog, this book demystifies FV and presents the practical applications that are bringing it into mainstream design and validation processes at Intel and other companies. The text prepares readers to effectively introduce FV in their organization and deploy FV techniques to increase design and validation productivity. Presents formal verific

  4. Flexible receiver adapter formal design review

    International Nuclear Information System (INIS)

    Krieg, S.A.

    1995-01-01

    This memo summarizes the results of the Formal (90%) Design Review process and meetings held to evaluate the design of the Flexible Receiver Adapters, support platforms, and associated equipment. The equipment is part of the Flexible Receiver System used to remove, transport, and store long length contaminated equipment and components from both the double and single-shell underground storage tanks at the 200 area tank farms

  5. RTL2RTL Formal Equivalence: Boosting the Design Confidence

    Directory of Open Access Journals (Sweden)

    M V Achutha Kiran Kumar

    2014-07-01

    Full Text Available Increasing design complexity driven by feature and performance requirements and the Time to Market (TTM constraints force a faster design and validation closure. This in turn enforces novel ways of identifying and debugging behavioral inconsistencies early in the design cycle. Addition of incremental features and timing fixes may alter the legacy design behavior and would inadvertently result in undesirable bugs. The most common method of verifying the correctness of the changed design is to run a dynamic regression test suite before and after the intended changes and compare the results, a method which is not exhaustive. Modern Formal Verification (FV techniques involving new methods of proving Sequential Hardware Equivalence enabled a new set of solutions for the given problem, with complete coverage guarantee. Formal Equivalence can be applied for proving functional integrity after design changes resulting from a wide variety of reasons, ranging from simple pipeline optimizations to complex logic redistributions. We present here our experience of successfully applying the RTL to RTL (RTL2RTL Formal Verification across a wide spectrum of problems on a Graphics design. The RTL2RTL FV enabled checking the design sanity in a very short time, thus enabling faster and safer design churn. The techniques presented in this paper are applicable to any complex hardware design.

  6. European Train Control System: A Case Study in Formal Verification

    Science.gov (United States)

    Platzer, André; Quesel, Jan-David

    Complex physical systems have several degrees of freedom. They only work correctly when their control parameters obey corresponding constraints. Based on the informal specification of the European Train Control System (ETCS), we design a controller for its cooperation protocol. For its free parameters, we successively identify constraints that are required to ensure collision freedom. We formally prove the parameter constraints to be sharp by characterizing them equivalently in terms of reachability properties of the hybrid system dynamics. Using our deductive verification tool KeYmaera, we formally verify controllability, safety, liveness, and reactivity properties of the ETCS protocol that entail collision freedom. We prove that the ETCS protocol remains correct even in the presence of perturbation by disturbances in the dynamics. We verify that safety is preserved when a PI controlled speed supervision is used.

  7. Pemodelan dan Verifikasi Formal Protokol EE-OLSR dengan UPPAAL CORA

    Directory of Open Access Journals (Sweden)

    Rachmat Wahid Saleh Insani

    2016-01-01

    Protocol verification process generally be done by simulation and testing. However, these processes unable to verify there are no subtle error or design flaw in protocol. Model Checking is an algorithmic method runs in fully automatic to verify a system. UPPAAL is a model checker tool to model, verify, and simulate a system in Timed Automata. UPPAAL CORA is model checker tool to verify EE-OLSR protocol modelled in Linearly Priced Timed Automata, if the protocol satisfy the energy efficient property formulated by formal specification language in Weighted Computation Tree Logic syntax. Model Checking Technique to verify the protocols results in the protocol is satisfy the energy efficient property only when the packet transmission traffic happens.

  8. Towards a formal logic of design rationalization

    DEFF Research Database (Denmark)

    Galle, Per

    1997-01-01

    Certain extensions to standard predicate logic are proposed and used as a framework for critical logical study of patterns of inference in design reasoning. It is shown that within this framework a modal logic of design rationalization (suggested by an empirical study reported earlier) can...... be formally defined in terms of quantification over a universe of discourse of ‘relevant points of view’. Five basic principles of the extended predicate logic are listed, on the basis of which the validity of ten modal patterns of inference encountered in design rationalization is tested. The basic idea...

  9. Spent Nuclear Fuel Cold Vacuum Drying facility comprehensive formal design review report

    International Nuclear Information System (INIS)

    HALLER, C.S.

    1999-01-01

    The majority of the Cold Vacuum Drying Facility (CVDF) design and construction is complete; isolated portions are still in the design and fabrication process. The project commissioned a formal design review to verify the sufficiency and accuracy of current design media to assure that: (1) the design completely and accurately reflects design criteria, (2) design documents are consistent with one another, and (3) the design media accurately reflects the current design. This review is a key element in the design validation and verification activities required by SNF-4396, ''Design Verification and Validation Plan For The Cold Vacuum Drying Facility''. This report documents the results of the formal design review

  10. Formalization of Quantum Protocols using Coq

    Directory of Open Access Journals (Sweden)

    Jaap Boender

    2015-11-01

    Full Text Available Quantum Information Processing, which is an exciting area of research at the intersection of physics and computer science, has great potential for influencing the future development of information processing systems. The building of practical, general purpose Quantum Computers may be some years into the future. However, Quantum Communication and Quantum Cryptography are well developed. Commercial Quantum Key Distribution systems are easily available and several QKD networks have been built in various parts of the world. The security of the protocols used in these implementations rely on information-theoretic proofs, which may or may not reflect actual system behaviour. Moreover, testing of implementations cannot guarantee the absence of bugs and errors. This paper presents a novel framework for modelling and verifying quantum protocols and their implementations using the proof assistant Coq. We provide a Coq library for quantum bits (qubits, quantum gates, and quantum measurement. As a step towards verifying practical quantum communication and security protocols such as Quantum Key Distribution, we support multiple qubits, communication and entanglement. We illustrate these concepts by modelling the Quantum Teleportation Protocol, which communicates the state of an unknown quantum bit using only a classical channel.

  11. The specification-based validation of reliable multicast protocol: Problem Report. M.S. Thesis

    Science.gov (United States)

    Wu, Yunqing

    1995-01-01

    Reliable Multicast Protocol (RMP) is a communication protocol that provides an atomic, totally ordered, reliable multicast service on top of unreliable IP multicasting. In this report, we develop formal models for RMP using existing automated verification systems, and perform validation on the formal RMP specifications. The validation analysis help identifies some minor specification and design problems. We also use the formal models of RMP to generate a test suite for conformance testing of the implementation. Throughout the process of RMP development, we follow an iterative, interactive approach that emphasizes concurrent and parallel progress of implementation and verification processes. Through this approach, we incorporate formal techniques into our development process, promote a common understanding for the protocol, increase the reliability of our software, and maintain high fidelity between the specifications of RMP and its implementation.

  12. A formalized design process for bacterial consortia that perform logic computing.

    Directory of Open Access Journals (Sweden)

    Weiyue Ji

    Full Text Available The concept of microbial consortia is of great attractiveness in synthetic biology. Despite of all its benefits, however, there are still problems remaining for large-scaled multicellular gene circuits, for example, how to reliably design and distribute the circuits in microbial consortia with limited number of well-behaved genetic modules and wiring quorum-sensing molecules. To manage such problem, here we propose a formalized design process: (i determine the basic logic units (AND, OR and NOT gates based on mathematical and biological considerations; (ii establish rules to search and distribute simplest logic design; (iii assemble assigned basic logic units in each logic operating cell; and (iv fine-tune the circuiting interface between logic operators. We in silico analyzed gene circuits with inputs ranging from two to four, comparing our method with the pre-existing ones. Results showed that this formalized design process is more feasible concerning numbers of cells required. Furthermore, as a proof of principle, an Escherichia coli consortium that performs XOR function, a typical complex computing operation, was designed. The construction and characterization of logic operators is independent of "wiring" and provides predictive information for fine-tuning. This formalized design process provides guidance for the design of microbial consortia that perform distributed biological computation.

  13. Authentication Test-Based the RFID Authentication Protocol with Security Analysis

    Directory of Open Access Journals (Sweden)

    Minghui Wang

    2014-08-01

    Full Text Available To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authentication Test is a new type of analysis and design method of security protocols based on Strand space model, and it can be used for most types of the security protocols. After analysis the security, the proposed protocol can meet the RFID security demand: information confidentiality, data integrity and identity authentication.

  14. Formal methods in the design of Ada 1995

    Science.gov (United States)

    Guaspari, David

    1995-01-01

    Formal, mathematical methods are most useful when applied early in the design and implementation of a software system--that, at least, is the familiar refrain. I will report on a modest effort to apply formal methods at the earliest possible stage, namely, in the design of the Ada 95 programming language itself. This talk is an 'experience report' that provides brief case studies illustrating the kinds of problems we worked on, how we approached them, and the extent (if any) to which the results proved useful. It also derives some lessons and suggestions for those undertaking future projects of this kind. Ada 95 is the first revision of the standard for the Ada programming language. The revision began in 1988, when the Ada Joint Programming Office first asked the Ada Board to recommend a plan for revising the Ada standard. The first step in the revision was to solicit criticisms of Ada 83. A set of requirements for the new language standard, based on those criticisms, was published in 1990. A small design team, the Mapping Revision Team (MRT), became exclusively responsible for revising the language standard to satisfy those requirements. The MRT, from Intermetrics, is led by S. Tucker Taft. The work of the MRT was regularly subject to independent review and criticism by a committee of distinguished Reviewers and by several advisory teams--for example, the two User/Implementor teams, each consisting of an industrial user (attempting to make significant use of the new language on a realistic application) and a compiler vendor (undertaking, experimentally, to modify its current implementation in order to provide the necessary new features). One novel decision established the Language Precision Team (LPT), which investigated language proposals from a mathematical point of view. The LPT applied formal mathematical analysis to help improve the design of Ada 95 (e.g., by clarifying the language proposals) and to help promote its acceptance (e.g., by identifying a

  15. Applying formal method to design of nuclear power plant embedded protection system

    International Nuclear Information System (INIS)

    Kim, Jin Hyun; Kim, Il Gon; Sung, Chang Hoon; Choi, Jin Young; Lee, Na Young

    2001-01-01

    Nuclear power embedded protection systems is a typical safety-critical system, which detects its failure and shutdowns its operation of nuclear reactor. These systems are very dangerous so that it absolutely requires safety and reliability. Therefore nuclear power embedded protection system should fulfill verification and validation completely from the design stage. To develop embedded system, various V and V method have been provided and especially its design using Formal Method is studied in other advanced country. In this paper, we introduce design method of nuclear power embedded protection systems using various Formal-Method in various respect following nuclear power plant software development guideline

  16. Industrial applications of formal methods to model, design and analyze computer systems

    CERN Document Server

    Craigen, Dan

    1995-01-01

    Formal methods are mathematically-based techniques, often supported by reasoning tools, that can offer a rigorous and effective way to model, design and analyze computer systems. The purpose of this study is to evaluate international industrial experience in using formal methods. The cases selected are representative of industrial-grade projects and span a variety of application domains. The study had three main objectives: · To better inform deliberations within industry and government on standards and regulations; · To provide an authoritative record on the practical experience of formal m

  17. About the Design of QUIC Firefox Transport Protocol

    Directory of Open Access Journals (Sweden)

    Vraj Pandya

    2017-07-01

    Full Text Available QUIC (Quick UDP Internet Connections Chrome is an experimental transport layer network protocol designed by Jim Roskind at Google, initially implemented in 2012 and announced publicly in 2013. One of the QUIC's goals is to improve performance of connection-oriented web applications that are currently using the Transmission Control Protocol (TCP. To do that, QUIC achieves a reduced latency and a better stream-multiplexing support to avoid network congestion. In 2015, Firefox Mozilla started to work on an equivalent QUIC transport protocol for their browser. This idea was motivated by the differences between Chrome and Firefox. Despite the fact that Mozilla Firefox and Google Chrome are both web browser engines, there are some significant differences between them, such as file hierarchy, open source policies (Firefox is completely, while Chrome is only partial, tabs design, continuous integration, and more. Likewise QUIC Chrome, QUIC Firefox is a new multiplexed and secure transport based on User Datagram Protocol (UDP, designed from the ground up and optimized for Hyper-Text Transfer Protocol 2 (HTTP/2 semantics. While built with HTTP/2 as the primary application protocol, QUIC builds on decades of transport and security experience, and implements mechanisms that make it attractive as a modern general-purpose transport. In addition to describing the main design of QUIC Firefox, this paper will compare Firefox with QUIC Firefox. Our preliminary experimental results support that QUIC Firefox has a faster execution time, less latency time, and a better throughput time than the traditional Firefox.  

  18. Integrated Design Validation: Combining Simulation and Formal Verification for Digital Integrated Circuits

    Directory of Open Access Journals (Sweden)

    Lun Li

    2006-04-01

    Full Text Available The correct design of complex hardware continues to challenge engineers. Bugs in a design that are not uncovered in early design stages can be extremely expensive. Simulation is a predominantly used tool to validate a design in industry. Formal verification overcomes the weakness of exhaustive simulation by applying mathematical methodologies to validate a design. The work described here focuses upon a technique that integrates the best characteristics of both simulation and formal verification methods to provide an effective design validation tool, referred as Integrated Design Validation (IDV. The novelty in this approach consists of three components, circuit complexity analysis, partitioning based on design hierarchy, and coverage analysis. The circuit complexity analyzer and partitioning decompose a large design into sub-components and feed sub-components to different verification and/or simulation tools based upon known existing strengths of modern verification and simulation tools. The coverage analysis unit computes the coverage of design validation and improves the coverage by further partitioning. Various simulation and verification tools comprising IDV are evaluated and an example is used to illustrate the overall validation process. The overall process successfully validates the example to a high coverage rate within a short time. The experimental result shows that our approach is a very promising design validation method.

  19. A formal account of the dual extension of knowledge and concept in C-K design theory

    NARCIS (Netherlands)

    Hendriks, L.; Kazakci, A.O.; Marjanović, D.; Štorga, M.; Pavković, N.; Bojčetić, N.

    2010-01-01

    The paper presents a contribution to the formalization efforts of C-K design theory. First, we analyze the notion of "dual expansion of concepts and knowledge" in C-K design theory and we discuss how such a reasoning process can be modeled using first-order logic. Then, we present a basic formal

  20. Beyond formalism

    Science.gov (United States)

    Denning, Peter J.

    1991-01-01

    The ongoing debate over the role of formalism and formal specifications in software features many speakers with diverse positions. Yet, in the end, they share the conviction that the requirements of a software system can be unambiguously specified, that acceptable software is a product demonstrably meeting the specifications, and that the design process can be carried out with little interaction between designers and users once the specification has been agreed to. This conviction is part of a larger paradigm prevalent in American management thinking, which holds that organizations are systems that can be precisely specified and optimized. This paradigm, which traces historically to the works of Frederick Taylor in the early 1900s, is no longer sufficient for organizations and software systems today. In the domain of software, a new paradigm, called user-centered design, overcomes the limitations of pure formalism. Pioneered in Scandinavia, user-centered design is spreading through Europe and is beginning to make its way into the U.S.

  1. Formal design review report project W-151 mixer pump procurement

    Energy Technology Data Exchange (ETDEWEB)

    Crass, D.W.

    1997-01-21

    A formal design review for WHC-S-0040 was held on January 21, 1993. The review was completed January 29, 1993. No outstanding action items existed. Comments were recorded on Record Comment Record (RCR) forms and incorporated into the specification. The specification was considered acceptable, approved and issued as WHC-S-0040, Rev. 0 on March 4, 1993.

  2. SDL-Based Protocol Validation for the Integrated Safety Communication Network in Nuclear Power Plants

    International Nuclear Information System (INIS)

    Kim, Jung-hun; Kim, Dong-hoon; Lee, Dong-young; Park, Sung-woo

    2006-01-01

    The communication protocol in nuclear power plants needs to be validated systematically to avoid the critical situation that may be caused by its own faults. We establish the methodology to validate the protocol designed for the Integrated Safety Communication Networks (ISCN) of Korea Nuclear Instrumentation and Control System (KNICS). The ISCN protocol is specified using the formal description technique called the SDL. The validation of ISCN protocol is done via the Simulator and Validator, both of which are main functions provided by the SDL

  3. Formal Learning Sequences and Progression in the Studio: A Framework for Digital Design Education

    Directory of Open Access Journals (Sweden)

    Pontus Wärnestål

    2016-02-01

    Full Text Available This paper examines how to leverage the design studio learning environment throughout long-term Digital Design education in order to support students to progress from tactical, well-defined, device-centric routine design, to confidently design sustainable solutions for strategic, complex, problems for a wide range of devices and platforms in the digital space. We present a framework derived from literature on design, creativity, and theories on learning that: (a implements a theory of formal learning sequences as a user-centered design process in the studio; and (b describes design challenge progressions in the design studio environment modeled in seven dimensions. The framework can be used as a tool for designing, evaluating, and communicating course progressions within – and between series of – design studio courses. This approach is evaluated by implementing a formal learning sequence framework in a series of design studio courses that progress in an undergraduate design-oriented Informatics program. Reflections from students, teachers, and external clients indicate high student motivation and learning goal achievement, high teacher satisfaction and skill development, and high satisfaction among external clients.

  4. Introduction to Open Core Protocol Fastpath to System-on-Chip Design

    CERN Document Server

    Schwaderer, W David

    2012-01-01

    This book introduces Open Core Protocol (OCP), not as a conventional hardware communications protocol but as a meta-protocol: a means for describing and capturing the communications requirements of an IP core, and mapping them to a specific set of signals with known semantics.  Readers will learn the capabilities of OCP as a semiconductor hardware interface specification that allows different System-On-Chip (SoC) cores to communicate.  The OCP methodology presented enables intellectual property designers to design core interfaces in standard ways. This facilitates reusing OCP-compliant cores across multiple SoC designs which, in turn, drastically reduces design times, support costs, and overall cost for electronics/SoCs. Provides a comprehensive introduction to Open Core Protocol, which is more accessible than the full specification; Designed as a hands-on, how-to guide to semiconductor design; Includes numerous, real “usage examples” which are not available in the full specification; Integrates coverag...

  5. RFID protocol design, optimization, and security for the Internet of Things

    CERN Document Server

    Liu, Alex X; Liu, Xiulong; Li, Keqiu

    2017-01-01

    This book covers the topic of RFID protocol design and optimization and the authors aim to demystify complicated RFID protocols and explain in depth the principles, techniques, and practices in designing and optimizing them.

  6. Validation of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-12-01

    The communication network designed to transmit control and processing signals in digital Instrument and Control (I and C) systems in Nuclear Power Plant (NPP), should provide a high level of safety and reliability. There are different features between the communication networks of NPPs and other commercial communication networks. Safety and reliability are the most important factors in the communication networks of an NPP rather than efficiency which are important factors of a commercial communication network design. To develop Data Communication Protocol for Nuclear Power Plant, We analyze the design criteria and performance requirements of existing commercial communication protocols based on Information Technology(IT). And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol(Nuclear power plant Safety Communication Protocol : NSCP) for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications. NSCP is the communication protocol designed for a safety-grade control network in the nuclear power plant. In this report, we had specified NSCP protocol by FDT(Formal Description Technique) and established validation procedures based on the validation methodology. It was confirmed specification error, major function's validity and reachability of NSCP by performing simulation and the validation process using Telelogic Tau tool

  7. Designing typefaces for maps. A protocol of tests.

    Science.gov (United States)

    Biniek, Sébastien; Touya, Guillaume; Rouffineau, Gilles; Huot-Marchand, Thomas

    2018-05-01

    The text management in map design is a topic generally linked to placement and composition issues. Whereas the type design issue is rarely addressed or at least only partially. Moreover the typefaces especially designed for maps are rare. This paper presents a protocol of tests to evaluate characters for digital topographic maps and fonts that were designed for the screen through the use of geographical information systems using this protocol. It was launched by the Atelier National de Recherche Typographique Research (ANRT, located in Nancy, France) and took place over his `post-master' course in 2013. The purpose is to isolate different issues inherent to text in a topographic map: map background, nonlinear text placement and toponymic hierarchies. Further research is necessary to improve this kind of approach.

  8. Modeling Organizational Design - Applying A Formalism Model From Theoretical Physics

    Directory of Open Access Journals (Sweden)

    Robert Fabac

    2008-06-01

    Full Text Available Modern organizations are exposed to diverse external environment influences. Currently accepted concepts of organizational design take into account structure, its interaction with strategy, processes, people, etc. Organization design and planning aims to align this key organizational design variables. At the higher conceptual level, however, completely satisfactory formulation for this alignment doesn’t exist. We develop an approach originating from the application of concepts of theoretical physics to social systems. Under this approach, the allocation of organizational resources is analyzed in terms of social entropy, social free energy and social temperature. This allows us to formalize the dynamic relationship between organizational design variables. In this paper we relate this model to Galbraith's Star Model and we also suggest improvements in the procedure of the complex analytical method in organizational design.

  9. Model-Checking Driven Design of QoS-Based Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhi Chen

    2015-01-01

    Full Text Available Accurate and reliable routing protocols with Quality of Service (QoS support determine the mission-critical application efficiency in WSNs. This paper proposes a model-checking design driven framework for designing the QoS-based routing protocols of WSNs, which involves the light-weight design process, the timed automata model, and the alternative QoS verification properties. The accurate feedback of continually model checking in the iterative design process effectively stimulates the parameter tuning of the protocols. We demonstrate the straightforward and modular characteristics of the proposed framework in designing a prototype QoS-based routing protocol. The prototype study shows that the model-checking design framework may complement other design methods and ensure the QoS implementation of the QoS-based routing protocol design for WSNs.

  10. Formalized Informal Learning

    DEFF Research Database (Denmark)

    Levinsen, Karin Tweddell; Sørensen, Birgitte Holm

    2013-01-01

    are examined and the relation between network society competences, learners’ informal learning strategies and ICT in formalized school settings over time is studied. The authors find that aspects of ICT like multimodality, intuitive interaction design and instant feedback invites an informal bricoleur approach....... When integrated into certain designs for teaching and learning, this allows for Formalized Informal Learning and support is found for network society competences building....

  11. A Formal Approach to User Interface Design using Hybrid System Theory, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Optimal Synthesis Inc.(OSI) proposes to develop an aiding tool for user interface design that is based on mathematical formalism of hybrid system theory. The...

  12. Toward Synthesis, Analysis, and Certification of Security Protocols

    Science.gov (United States)

    Schumann, Johann

    2004-01-01

    : multiple tries with invalid passwords caused the expected error message (too many retries). but let the user nevertheless pass. Finally, security can be compromised by silly implementation bugs or design decisions. In a commercial VPN software, all calls to the encryption routines were incidentally replaced by stubs, probably during factory testing. The product worked nicely. and the error (an open VPN) would have gone undetected, if a team member had not inspected the low-level traffic out of curiosity. Also, the use secret proprietary encryption routines can backfire, because such algorithms often exhibit weaknesses which can be exploited easily (see e.g., DVD encoding). Summarizing, there is large number of possibilities to make errors which can compromise the security of a protocol. In today s world with short time-to-market and the use of security protocols in open and hostile networks for safety-critical applications (e.g., power or air-traffic control), such slips could lead to catastrophic situations. Thus, formal methods and automatic reasoning techniques should not be used just for the formal proof of absence of an attack, but they ought to be used to provide an end-to-end tool-supported framework for security software. With such an approach all required artifacts (code, documentation, test cases) , formal analyses, and reliable certification will be generated automatically, given a single, high level specification. By a combination of program synthesis, formal protocol analysis, certification; and proof-carrying code, this goal is within practical reach, since all the important technologies for such an approach actually exist and only need to be assembled in the right way.

  13. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  14. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    events. Methods like strand spaces and the inductive method of Paulson have been designed to support an intensional, event-based, style of reasoning. These methods have successfully tackled a number of protocols though in an ad hoc fashion. They make an informal spring from a protocol to its......-nets. They have persistent conditions and as we show in this thesis, unfold under reasonable assumptions to a more basic kind of nets. We relate SPL-nets to strand spaces and inductive rules, as well as trace languages and event structures so unifying a range of approaches, as well as providing conditions under...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...

  15. Design of an autonomous decentralized MAC protocol for wireless sensor networks

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Dal Pont, L.; Havinga, Paul J.M.

    In this document the design of a MAC protocol for wireless sensor networks is discussed. The autonomous decentralized TDMA based MAC protocol minimizes power consumtion by efficiency implementing unicast/omnicast, scheduled rendezvous times and wakeup calls. The MAC protocol is an ongoing research

  16. Quantitative methods for studying design protocols

    CERN Document Server

    Kan, Jeff WT

    2017-01-01

    This book is aimed at researchers and students who would like to engage in and deepen their understanding of design cognition research. The book presents new approaches for analyzing design thinking and proposes methods of measuring design processes. These methods seek to quantify design issues and design processes that are defined based on notions from the Function-Behavior-Structure (FBS) design ontology and from linkography. A linkograph is a network of linked design moves or segments. FBS ontology concepts have been used in both design theory and design thinking research and have yielded numerous results. Linkography is one of the most influential and elegant design cognition research methods. In this book Kan and Gero provide novel and state-of-the-art methods of analyzing design protocols that offer insights into design cognition by integrating segmentation with linkography by assigning FBS-based codes to design moves or segments and treating links as FBS transformation processes. They propose and test ...

  17. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  18. Model-Based Design and Formal Verification Processes for Automated Waterway System Operations

    Directory of Open Access Journals (Sweden)

    Leonard Petnga

    2016-06-01

    Full Text Available Waterway and canal systems are particularly cost effective in the transport of bulk and containerized goods to support global trade. Yet, despite these benefits, they are among the most under-appreciated forms of transportation engineering systems. Looking ahead, the long-term view is not rosy. Failures, delays, incidents and accidents in aging waterway systems are doing little to attract the technical and economic assistance required for modernization and sustainability. In a step toward overcoming these challenges, this paper argues that programs for waterway and canal modernization and sustainability can benefit significantly from system thinking, supported by systems engineering techniques. We propose a multi-level multi-stage methodology for the model-based design, simulation and formal verification of automated waterway system operations. At the front-end of development, semi-formal modeling techniques are employed for the representation of project goals and scenarios, requirements and high-level models of behavior and structure. To assure the accuracy of engineering predictions and the correctness of operations, formal modeling techniques are used for the performance assessment and the formal verification of the correctness of functionality. The essential features of this methodology are highlighted in a case study examination of ship and lock-system behaviors in a two-stage lock system.

  19. Protocol design and analysis for cooperative wireless networks

    CERN Document Server

    Song, Wei; Jin, A-Long

    2017-01-01

    This book focuses on the design and analysis of protocols for cooperative wireless networks, especially at the medium access control (MAC) layer and for crosslayer design between the MAC layer and the physical layer. It highlights two main points that are often neglected in other books: energy-efficiency and spatial random distribution of wireless devices. Effective methods in stochastic geometry for the design and analysis of wireless networks are also explored. After providing a comprehensive review of existing studies in the literature, the authors point out the challenges that are worth further investigation. Then, they introduce several novel solutions for cooperative wireless network protocols that reduce energy consumption and address spatial random distribution of wireless nodes. For each solution, the book offers a clear system model and problem formulation, details of the proposed cooperative schemes, comprehensive performance analysis, and extensive numerical and simulation results that validate th...

  20. Formal Security Analysis of the MaCAN Protocol

    DEFF Research Database (Denmark)

    Bruni, Alessandro; Sojka, Michal; Nielson, Flemming

    2014-01-01

    analysis identifies two flaws in the original protocol: one creates unavailability concerns during key establishment, and the other allows re-using authenticated signals for different purposes. We propose and analyse a modification that improves its behaviour while fitting the constraints of CAN bus...

  1. Security protocol specification and verification with AnBx

    DEFF Research Database (Denmark)

    Bugliesi, Michele; Calzavara, Stefano; Mödersheim, Sebastian Alexander

    2016-01-01

    Designing distributed protocols is complex and requires actions at very different levels: from the design of an interaction flow supporting the desired application-specific guarantees to the selection of the most appropriate network-level protection mechanisms. To tame this complexity, we propose...... with a novel notion of forwarding channels, enforcing specific security guarantees from the message originator to the final recipient along a number of intermediate forwarding agents. We give a formal semantics of AnBx in terms of a state transition system expressed in the AVISPA Intermediate Format. We devise...

  2. Design and Simulation of a High Performance Emergency Data Delivery Protocol

    DEFF Research Database (Denmark)

    Swartz, Kevin; Wang, Di

    2007-01-01

    The purpose of this project was to design a high performance data delivery protocol, capable of delivering data as quickly as possible to a base station or target node. This protocol was designed particularly for wireless network topologies, but could also be applied towards a wired system....... An emergency is defined as any event with high priority that needs to be handled immediately. It is assumed that this emergency event is important enough that energy efficiency is not a factor in our protocol. The desired effect is for fast as possible delivery to the base station for rapid event handling....

  3. Design of a 1-chip IBM-3270 protocol handler

    NARCIS (Netherlands)

    Spaanenburg, L.

    1989-01-01

    The single-chip design of a 20MHz IBM-3270 coax protocol handler in a conventional 3 μ CMOS process-technology is discussed. The harmonious combination of CMOS circuit tricks and high-level design disciplines allows the 50k transistor design to be compiled and optimized into a 35 mm**2 chip in 4

  4. Linguistic Formalism for Semi-Autonomous Reactor Operation

    International Nuclear Information System (INIS)

    Joo, Sungmoon; Seo, Sang Mun; Suh, Yong-Suk; Park, Cheol

    2017-01-01

    The ultimate goal of our work is to develop a novel, integrated system for semi-autonomous reactor operation by introducing an interfacing language shared by human reactor operators and artificially intelligent service agents (e.g., robots). We envision that human operators and artificially intelligent service agents operate the reactor cooperatively in the future. For example, an artificially intelligent service agent carries out a human reactor operator's command or reports the result of a task commanded by the human reactor operator. This work presents preliminary work towards a unified linguistic formalism for cooperative, semiautonomous reactor operation. Application of the proposed formalism to reactor operator communication domain shows that the formalism effectively captures the syntax and semantics of the domain-specific language defined by the communication protocol.

  5. Pragmatics Annotated Coloured Petri Nets for Protocol Software Generation and Verification

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge; Kristensen, Lars Michael; Kindler, Ekkart

    This paper presents the formal definition of Pragmatics Annotated Coloured Petri Nets (PA-CPNs). PA-CPNs represent a class of Coloured Petri Nets (CPNs) that are designed to support automated code genera-tion of protocol software. PA-CPNs restrict the structure of CPN models and allow Petri net...... elements to be annotated with so-called pragmatics, which are exploited for code generation. The approach and tool for gen-erating code is called PetriCode and has been discussed and evaluated in earlier work already. The contribution of this paper is to give a formal def-inition for PA-CPNs; in addition...

  6. Design and Analysis of Transport Protocols for Reliable High-Speed Communications

    NARCIS (Netherlands)

    Oláh, A.

    1997-01-01

    The design and analysis of transport protocols for reliable communications constitutes the topic of this dissertation. These transport protocols guarantee the sequenced and complete delivery of user data over networks which may lose, duplicate and reorder packets. Reliable transport services are

  7. The Design of Finite State Machine for Asynchronous Replication Protocol

    Science.gov (United States)

    Wang, Yanlong; Li, Zhanhuai; Lin, Wei; Hei, Minglei; Hao, Jianhua

    Data replication is a key way to design a disaster tolerance system and to achieve reliability and availability. It is difficult for a replication protocol to deal with the diverse and complex environment. This means that data is less well replicated than it ought to be. To reduce data loss and to optimize replication protocols, we (1) present a finite state machine, (2) run it to manage an asynchronous replication protocol and (3) report a simple evaluation of the asynchronous replication protocol based on our state machine. It's proved that our state machine is applicable to guarantee the asynchronous replication protocol running in the proper state to the largest extent in the event of various possible events. It also can helpful to build up replication-based disaster tolerance systems to ensure the business continuity.

  8. Formal methods for dynamical systems : 13th International School on Formal Methods for the Design of Computer, Communication, and Software Systems, SFM 2013, Bertinoro, Italy, June 17-22, 2013 : advanced lectures

    NARCIS (Netherlands)

    Bernardo, M.; Vink, de E.P.; Di Pierro, A.; Wiklicky, H.

    2013-01-01

    Preface. This volume presents a set of papers accompanying the lectures of the 13th International School on Formal Methods for the Design of Computer, Communication, and Software Systems (SFM). This series of schools addresses the use of formal methods in computer science as a prominent approach to

  9. Code Generation for Protocols from CPN models Annotated with Pragmatics

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge; Kristensen, Lars Michael; Kindler, Ekkart

    software implementation satisfies the properties verified for the model. Coloured Petri Nets (CPNs) have been widely used to model and verify protocol software, but limited work exists on using CPN models of protocol software as a basis for automated code generation. In this report, we present an approach...... modelling languages, MDE further has the advantage that models are amenable to model checking which allows key behavioural properties of the software design to be verified. The combination of formally verified models and automated code generation contributes to a high degree of assurance that the resulting...... for generating protocol software from a restricted class of CPN models. The class of CPN models considered aims at being descriptive in that the models are intended to be helpful in understanding and conveying the operation of the protocol. At the same time, a descriptive model is close to a verifiable version...

  10. A systematic review of protocol studies on conceptual design cognition: design as search and exploration

    OpenAIRE

    Hay, Laura; Duffy, Alex H.B.; McTeague, Chris; Pidgeon, Laura M.; Vuletic, Tijana; Grealy, Madeleine

    2017-01-01

    This paper reports findings from the first systematic review of protocol studies focusing specifically on conceptual design cognition, aiming to answer the following research question: What is our current understanding of the cognitive processes involved in conceptual design tasks carried out by individual designers? We reviewed 47 studies on architectural design, engineering design and product design engineering. This paper reports 24 cognitive processes investigated in a subset of 33 studie...

  11. Replication protocol analysis: a method for the study of real-world design thinking

    DEFF Research Database (Denmark)

    Galle, Per; Kovacs, L. B.

    1996-01-01

    Given the brief of an architectural competition on site planning, and the design awarded the first prize, the first author (trained as an architect but not a participant in the competition) produced a line of reasoning that might have led from brief to design. In the paper, such ‘design replication......’ is refined into a method called ‘replication protocol analysis’ (RPA), and discussed from a methodological perspective of design research. It is argued that for the study of real-world design thinking this method offers distinct advantages over traditional ‘design protocol analysis’, which seeks to capture...

  12. CaPiTo: protocol stacks for services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    CaPiTo allows the modelling of service-oriented applications using process algebras at three levels of abstraction. The abstract level focuses on the key functionality of the services; the plug-in level shows how to obtain security using standardised protocol stacks; finally, the concrete level...... allows to consider how security is obtained using asymmetric and symmetric cryptographic primitives. The CaPiTo approach therefore caters for a variety of developers that need to cooperate on designing and implementing service-oriented applications. We show how to formally analyse CaPiTo specifications...

  13. Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method

    Directory of Open Access Journals (Sweden)

    Hanane Houmani

    2012-01-01

    Full Text Available Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, and integrity. In this paper, we analyze the SET and the NSL protocols with respect to the confidentiality (secrecy property. To perform this analysis, we use the interpretation functions-based method. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily-life protocols such as SET and NSL. Also, this method could be used under different assumptions such as a variety of intruder abilities including algebraic properties of cryptographic primitives. The NSL protocol, for instance, is analyzed with and without the homomorphism property. We show also, using the SET protocol, the usefulness of this approach to correct weaknesses and problems discovered during the analysis.

  14. Mapping of Schistosomiasis and Soil-Transmitted Helminths in Namibia: The First Large-Scale Protocol to Formally Include Rapid Diagnostic Tests.

    Directory of Open Access Journals (Sweden)

    José Carlos Sousa-Figueiredo

    Full Text Available Namibia is now ready to begin mass drug administration of praziquantel and albendazole against schistosomiasis and soil-transmitted helminths, respectively. Although historical data identifies areas of transmission of these neglected tropical diseases (NTDs, there is a need to update epidemiological data. For this reason, Namibia adopted a new protocol for mapping of schistosomiasis and geohelminths, formally integrating rapid diagnostic tests (RDTs for infections and morbidity. In this article, we explain the protocol in detail, and introduce the concept of 'mapping resolution', as well as present results and treatment recommendations for northern Namibia.This new protocol allowed a large sample to be surveyed (N = 17,896 children from 299 schools at relatively low cost (7 USD per person mapped and very quickly (28 working days. All children were analysed by RDTs, but only a sub-sample was also diagnosed by light microscopy. Overall prevalence of schistosomiasis in the surveyed areas was 9.0%, highly associated with poorer access to potable water (OR = 1.5, P<0.001 and defective (OR = 1.2, P<0.001 or absent sanitation infrastructure (OR = 2.0, P<0.001. Overall prevalence of geohelminths, more particularly hookworm infection, was 12.2%, highly associated with presence of faecal occult blood (OR = 1.9, P<0.001. Prevalence maps were produced and hot spots identified to better guide the national programme in drug administration, as well as targeted improvements in water, sanitation and hygiene. The RDTs employed (circulating cathodic antigen and microhaematuria for Schistosoma mansoni and S. haematobium, respectively performed well, with sensitivities above 80% and specificities above 95%.This protocol is cost-effective and sensitive to budget limitations and the potential economic and logistical strains placed on the national Ministries of Health. Here we present a high resolution map of disease prevalence levels, and treatment regimens are

  15. Design and analysis of communication protocols for quantum repeater networks

    International Nuclear Information System (INIS)

    Jones, Cody; Kim, Danny; Rakher, Matthew T; Ladd, Thaddeus D; Kwiat, Paul G

    2016-01-01

    We analyze how the performance of a quantum-repeater network depends on the protocol employed to distribute entanglement, and we find that the choice of repeater-to-repeater link protocol has a profound impact on entanglement-distribution rate as a function of hardware parameters. We develop numerical simulations of quantum networks using different protocols, where the repeater hardware is modeled in terms of key performance parameters, such as photon generation rate and collection efficiency. These parameters are motivated by recent experimental demonstrations in quantum dots, trapped ions, and nitrogen-vacancy centers in diamond. We find that a quantum-dot repeater with the newest protocol (‘MidpointSource’) delivers the highest entanglement-distribution rate for typical cases where there is low probability of establishing entanglement per transmission, and in some cases the rate is orders of magnitude higher than other schemes. Our simulation tools can be used to evaluate communication protocols as part of designing a large-scale quantum network. (paper)

  16. Software Formal Inspections Guidebook

    Science.gov (United States)

    1993-01-01

    The Software Formal Inspections Guidebook is designed to support the inspection process of software developed by and for NASA. This document provides information on how to implement a recommended and proven method for conducting formal inspections of NASA software. This Guidebook is a companion document to NASA Standard 2202-93, Software Formal Inspections Standard, approved April 1993, which provides the rules, procedures, and specific requirements for conducting software formal inspections. Application of the Formal Inspections Standard is optional to NASA program or project management. In cases where program or project management decide to use the formal inspections method, this Guidebook provides additional information on how to establish and implement the process. The goal of the formal inspections process as documented in the above-mentioned Standard and this Guidebook is to provide a framework and model for an inspection process that will enable the detection and elimination of defects as early as possible in the software life cycle. An ancillary aspect of the formal inspection process incorporates the collection and analysis of inspection data to effect continual improvement in the inspection process and the quality of the software subjected to the process.

  17. Mechanical verification of concurrency control and recovery protocols

    NARCIS (Netherlands)

    Chkliaev, D.

    2001-01-01

    The thesis concerns the formal specification and mechanized verification of concurrency control and recovery protocols for distributed databases. Such protocols are needed for many modern application such as banking and are often used in safety-critical applications. Therefore it is very important

  18. A Dialogue Game Protocol for Agent Purchase Negotiations

    NARCIS (Netherlands)

    McBurney, P.; Eijk, R.M. van; Parsons, S.; Amgoud, L.

    2003-01-01

    We propose a dialogue game protocol for purchase negotiation dialogues which identifies appropriate speech acts, defines constraints on their utterances, and specifies the different sub-tasks agents need to perform in order to engage in dialogues according to this protocol. Our formalism combines

  19. Survey of Existing Tools for Formal Verification.

    Energy Technology Data Exchange (ETDEWEB)

    Punnoose, Ratish J.; Armstrong, Robert C.; Wong, Matthew H.; Jackson, Mayo

    2014-12-01

    Formal methods have come into wide use because of their effectiveness in verifying "safety and security" requirements of digital systems; a set of requirements for which testing is mostly ineffective. Formal methods are routinely used in the design and verification of high-consequence digital systems in industry. This report outlines our work in assessing the capabilities of commercial and open source formal tools and the ways in which they can be leveraged in digital design workflows.

  20. From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT

    Directory of Open Access Journals (Sweden)

    Tieming Chen

    2016-01-01

    Full Text Available Model checking has successfully been applied on verification of security protocols, but the modeling process is always tedious and proficient knowledge of formal method is also needed although the final verification could be automatic depending on specific tools. At the same time, due to the appearance of novel kind of networks, such as wireless sensor networks (WSN and wireless body area networks (WBAN, formal modeling and verification for these domain-specific systems are quite challenging. In this paper, a specific and novel formal modeling and verification method is proposed and implemented using an expandable tool called PAT to do WSN-specific security verification. At first, an abstract modeling data structure for CSP#, which is built in PAT, is developed to support the node mobility related specification for modeling location-based node activity. Then, the traditional Dolev-Yao model is redefined to facilitate modeling of location-specific attack behaviors on security mechanism. A throughout formal verification application on a location-based security protocol in WSN is described in detail to show the usability and effectiveness of the proposed methodology. Furthermore, also a novel location-based authentication security protocol in WBAN can be successfully modeled and verified directly using our method, which is, to the best of our knowledge, the first effort on employing model checking for automatic analysis of authentication protocol for WBAN.

  1. A round-robin gamma stereotactic radiosurgery dosimetry interinstitution comparison of calibration protocols

    Energy Technology Data Exchange (ETDEWEB)

    Drzymala, R. E., E-mail: drzymala@wustl.edu [Department of Radiation Oncology, Washington University, St. Louis, Missouri 63110 (United States); Alvarez, P. E. [Imaging and Radiation Oncology Core Houston, UT MD Anderson Cancer Center, Houston, Texas 77030 (United States); Bednarz, G. [Radiation Oncology Department, University of Pittsburgh Medical Center, Pittsburgh, Pennsylvania 15232 (United States); Bourland, J. D. [Department of Radiation Oncology, Wake Forest University, Winston-Salem, North Carolina 27157 (United States); DeWerd, L. A. [Department of Medical Physics, University of Wisconsin-Madison, Madison, Wisconsin 53705 (United States); Ma, L. [Department of Radiation Oncology, University California San Francisco, San Francisco, California 94143 (United States); Meltsner, S. G. [Department of Radiation Oncology, Duke University Medical Center, Durham, North Carolina 27710 (United States); Neyman, G. [Department of Radiation Oncology, The Cleveland Clinic Foundation, Cleveland, Ohio 44195 (United States); Novotny, J. [Medical Physics Department, Hospital Na Homolce, Prague 15030 (Czech Republic); Petti, P. L. [Gamma Knife Center, Washington Hospital Healthcare System, Fremont, California 94538 (United States); Rivard, M. J. [Department of Radiation Oncology, Tufts University School of Medicine, Boston, Massachusetts 02111 (United States); Shiu, A. S. [Department of Radiation Oncology, University of Southern California, Los Angeles, California 90033 (United States); Goetsch, S. J. [San Diego Medical Physics, Inc., La Jolla, California 92037 (United States)

    2015-11-15

    Purpose: Absorbed dose calibration for gamma stereotactic radiosurgery is challenging due to the unique geometric conditions, dosimetry characteristics, and nonstandard field size of these devices. Members of the American Association of Physicists in Medicine (AAPM) Task Group 178 on Gamma Stereotactic Radiosurgery Dosimetry and Quality Assurance have participated in a round-robin exchange of calibrated measurement instrumentation and phantoms exploring two approved and two proposed calibration protocols or formalisms on ten gamma radiosurgery units. The objectives of this study were to benchmark and compare new formalisms to existing calibration methods, while maintaining traceability to U.S. primary dosimetry calibration laboratory standards. Methods: Nine institutions made measurements using ten gamma stereotactic radiosurgery units in three different 160 mm diameter spherical phantoms [acrylonitrile butadiene styrene (ABS) plastic, Solid Water, and liquid water] and in air using a positioning jig. Two calibrated miniature ionization chambers and one calibrated electrometer were circulated for all measurements. Reference dose-rates at the phantom center were determined using the well-established AAPM TG-21 or TG-51 dose calibration protocols and using two proposed dose calibration protocols/formalisms: an in-air protocol and a formalism proposed by the International Atomic Energy Agency (IAEA) working group for small and nonstandard radiation fields. Each institution’s results were normalized to the dose-rate determined at that institution using the TG-21 protocol in the ABS phantom. Results: Percentages of dose-rates within 1.5% of the reference dose-rate (TG-21 + ABS phantom) for the eight chamber-protocol-phantom combinations were the following: 88% for TG-21, 70% for TG-51, 93% for the new IAEA nonstandard-field formalism, and 65% for the new in-air protocol. Averages and standard deviations for dose-rates over all measurements relative to the TG-21 + ABS

  2. Biometrics based authentication scheme for session initiation protocol.

    Science.gov (United States)

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  3. Design Review Report for formal review of safety class features of exhauster system for rotary mode core sampling

    International Nuclear Information System (INIS)

    JANICEK, G.P.

    2000-01-01

    Report documenting Formal Design Review conducted on portable exhausters used to support rotary mode core sampling of Hanford underground radioactive waste tanks with focus on Safety Class design features and control requirements for flammable gas environment operation and air discharge permitting compliance

  4. Design Review Report for formal review of safety class features of exhauster system for rotary mode core sampling

    Energy Technology Data Exchange (ETDEWEB)

    JANICEK, G.P.

    2000-06-08

    Report documenting Formal Design Review conducted on portable exhausters used to support rotary mode core sampling of Hanford underground radioactive waste tanks with focus on Safety Class design features and control requirements for flammable gas environment operation and air discharge permitting compliance.

  5. Protocols for the Design of Kinase-focused Compound Libraries.

    Science.gov (United States)

    Jacoby, Edgar; Wroblowski, Berthold; Buyck, Christophe; Neefs, Jean-Marc; Meyer, Christophe; Cummings, Maxwell D; van Vlijmen, Herman

    2018-05-01

    Protocols for the design of kinase-focused compound libraries are presented. Kinase-focused compound libraries can be differentiated based on the design goal. Depending on whether the library should be a discovery library specific for one particular kinase, a general discovery library for multiple distinct kinase projects, or even phenotypic screening, there exists today a variety of in silico methods to design candidate compound libraries. We address the following scenarios: 1) Datamining of SAR databases and kinase focused vendor catalogues; 2) Predictions and virtual screening; 3) Structure-based design of combinatorial kinase inhibitors; 4) Design of covalent kinase inhibitors; 5) Design of macrocyclic kinase inhibitors; and 6) Design of allosteric kinase inhibitors and activators. © 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  6. Designed Natural Spaces: Informal Gardens Are Perceived to Be More Restorative than Formal Gardens.

    Science.gov (United States)

    Twedt, Elyssa; Rainey, Reuben M; Proffitt, Dennis R

    2016-01-01

    Experimental research shows that there are perceived and actual benefits to spending time in natural spaces compared to urban spaces, such as reduced cognitive fatigue, improved mood, and reduced stress. Whereas past research has focused primarily on distinguishing between distinct categories of spaces (i.e., nature vs. urban), less is known about variability in perceived restorative potential of environments within a particular category of outdoor spaces, such as gardens. Conceptually, gardens are often considered to be restorative spaces and to contain an abundance of natural elements, though there is great variability in how gardens are designed that might impact their restorative potential. One common practice for classifying gardens is along a spectrum ranging from "formal or geometric" to "informal or naturalistic," which often corresponds to the degree to which built or natural elements are present, respectively. In the current study, we tested whether participants use design informality as a cue to predict perceived restorative potential of different gardens. Participants viewed a set of gardens and rated each on design informality, perceived restorative potential, naturalness, and visual appeal. Participants perceived informal gardens to have greater restorative potential than formal gardens. In addition, gardens that were more visually appealing and more natural-looking were perceived to have greater restorative potential than less visually appealing and less natural gardens. These perceptions and precedents are highly relevant for the design of gardens and other similar green spaces intended to provide relief from stress and to foster cognitive restoration.

  7. Designed natural spaces: Informal gardens are perceived to be more restorative than formal gardens

    Directory of Open Access Journals (Sweden)

    Elyssa eTwedt

    2016-02-01

    Full Text Available Experimental research shows that there are perceived and actual benefits to spending time in natural spaces compared to urban spaces such as reduced cognitive fatigue, improved mood, and reduced stress. Whereas past research has focused primarily on distinguishing between distinct categories of spaces (i.e., nature versus urban, less is known about variability in perceived restorative potential of environments within a particular category of outdoor spaces, such as gardens. Conceptually, gardens are often considered to be restorative spaces and to contain an abundance of natural elements, though there is great variability in how gardens are designed that might impact their restorative potential. One common practice for classifying gardens is along a spectrum ranging from formal or geometric to informal or naturalistic, which often corresponds to the degree to which built or natural elements are present, respectively. In the current study, we tested whether participants use design informality as a cue to predict perceived restorative potential of different gardens. Participants viewed a set of gardens and rated each on design informality, perceived restorative potential, naturalness, and visual appeal. Participants perceived informal gardens to have greater restorative potential than formal gardens. In addition, gardens that were more visually appealing and more natural-looking were perceived to have greater restorative potential than less visually appealing and less natural gardens. These perceptions and precedents are highly relevant for the design of gardens and other similar green spaces intended to provide relief from stress and to foster cognitive restoration.

  8. Scalable Techniques for Formal Verification

    CERN Document Server

    Ray, Sandip

    2010-01-01

    This book presents state-of-the-art approaches to formal verification techniques to seamlessly integrate different formal verification methods within a single logical foundation. It should benefit researchers and practitioners looking to get a broad overview of the spectrum of formal verification techniques, as well as approaches to combining such techniques within a single framework. Coverage includes a range of case studies showing how such combination is fruitful in developing a scalable verification methodology for industrial designs. This book outlines both theoretical and practical issue

  9. Formal Methods for Life-Critical Software

    Science.gov (United States)

    Butler, Ricky W.; Johnson, Sally C.

    1993-01-01

    The use of computer software in life-critical applications, such as for civil air transports, demands the use of rigorous formal mathematical verification procedures. This paper demonstrates how to apply formal methods to the development and verification of software by leading the reader step-by-step through requirements analysis, design, implementation, and verification of an electronic phone book application. The current maturity and limitations of formal methods tools and techniques are then discussed, and a number of examples of the successful use of formal methods by industry are cited.

  10. A Formal Model and Verification Problems for Software Defined Networks

    Directory of Open Access Journals (Sweden)

    V. A. Zakharov

    2013-01-01

    Full Text Available Software-defined networking (SDN is an approach to building computer networks that separate and abstract data planes and control planes of these systems. In a SDN a centralized controller manages a distributed set of switches. A set of open commands for packet forwarding and flow-table updating was defined in the form of a protocol known as OpenFlow. In this paper we describe an abstract formal model of SDN, introduce a tentative language for specification of SDN forwarding policies, and set up formally model-checking problems for SDN.

  11. Design of Bus Protocol Intelligent Initiation System Based On RS485

    Directory of Open Access Journals (Sweden)

    Li Liming

    2017-01-01

    Full Text Available In order to design an effective and reliable RS485 bus protocol based on RS485 bus, this paper introduces the structure and transmission mode of the command frame and the response frame, and also introduce four control measures and the communication in order to process quality of this system. The communication protocol is open, tolerant, reliable and fast, and can realize ignition more reliable and accurate in the intelligent initiation system.

  12. Formalizing Evaluation in Music Information Retrieval

    DEFF Research Database (Denmark)

    Sturm, Bob L.

    2013-01-01

    We develop a formalism to disambiguate the evaluation of music information retrieval systems. We define a ``system,'' what it means to ``analyze'' one, and make clear the aims, parts, design, execution, interpretation, and assumptions of its ``evaluation.'' We apply this formalism to discuss...

  13. A formal expert judgment procedure for performance assessments of the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Trauth, K.M.; Guzowski, R.V.; Hora, S.C.

    1994-09-01

    The Waste Isolation Pilot Plant (WIPP) is an experimental facility located in southeastern New Mexico. It has been designed to determine the feasibility of the geologic disposal of defense-generated transuranic waste in a deep bedded-salt formation. The WIPP was also designed for disposal and will operate in that capacity if approved. The WIPP Performance Assessment Department at Sandia National Laboratories has been conducting analyses to assess the long-term performance of the WIPP. These analyses sometimes require the use of expert judgment. This Department has convened several expert-judgment panels and from that experience has developed an internal quality-assurance procedure to guide the formal elicitation of expert judgment. This protocol is based on the principles found in the decision-analysis literature

  14. A formal expert judgment procedure for performance assessments of the Waste Isolation Pilot Plant

    Energy Technology Data Exchange (ETDEWEB)

    Trauth, K.M. [Sandia National Labs., Albuquerque, NM (United States); Guzowski, R.V. [Science Applications International Corp., Albuquerque, NM (United States); Hora, S.C. [Univ. of Hawaii, Hilo, HI (United States). Business Administration & Economics Div.

    1994-09-01

    The Waste Isolation Pilot Plant (WIPP) is an experimental facility located in southeastern New Mexico. It has been designed to determine the feasibility of the geologic disposal of defense-generated transuranic waste in a deep bedded-salt formation. The WIPP was also designed for disposal and will operate in that capacity if approved. The WIPP Performance Assessment Department at Sandia National Laboratories has been conducting analyses to assess the long-term performance of the WIPP. These analyses sometimes require the use of expert judgment. This Department has convened several expert-judgment panels and from that experience has developed an internal quality-assurance procedure to guide the formal elicitation of expert judgment. This protocol is based on the principles found in the decision-analysis literature.

  15. A formal expert judgment procedure for performance assessments of the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    Trauth, K.M.; Guzowski, R.V.; Hora, S.C.

    1993-01-01

    The Waste Isolation Pilot Plant (WIPP) is an experimental facility located in southeastern New Mexico. It has been designed to determine the feasibility of the geologic disposal of defense-generated transuranic waste in a deep bedded-salt formation. The WIPP was also designed for disposal and will operate in that capacity if approved. The WIPP Performance Assessment Department at Sandia National Laboratories has been conducting analyses to assess the long-term performance of the WIPP. These analyses sometimes require the use of expert judgment. This Department has convened several expert-judgment panels and from that experience has developed an internal quality-assurance procedure to guide the formal elicitation of expert judgment. This protocol is based on the principles found in the decision-analysis literature

  16. Formal Women-only Networks

    DEFF Research Database (Denmark)

    Villesèche, Florence; Josserand, Emmanuel

    2017-01-01

    /organisations and the wider social group of women in business. Research limitations/implications: The authors focus on the distinction between external and internal formal women-only networks while also acknowledging the broader diversity that can characterise such networks. Their review provides the reader with an insight...... member level, the authors suggest that such networks can be of value for organisations and the wider social group of women in management and leadership positions.......Purpose: The purpose of this paper is to review the emerging literature on formal women-only business networks and outline propositions to develop this under-theorised area of knowledge and stimulate future research. Design/methodology/approach: The authors review the existing literature on formal...

  17. Formal description of the OSI session layer: introduction

    NARCIS (Netherlands)

    Ajubi, I.; Scollo, Giuseppe; van Sinderen, Marten J.; van Eijk, P.H.J.; Vissers, C.A.; Diaz, M.

    1989-01-01

    The LOTOS formal description of the OSI session layer is introduced with the purpose of familiarizing the reader with the design choices that influenced the development of the formal description. Such design choices concern the adoptation of specification styles and the reflection of elements of the

  18. Automatic verification of a lip-synchronisation protocol using Uppaal

    NARCIS (Netherlands)

    Bowman, H.; Faconti, G.; Katoen, J.-P.; Latella, D.; Massink, M.

    1998-01-01

    We present the formal specification and verification of a lip-synchronisation protocol using the real-time model checker Uppaal. A number of specifications of this protocol can be found in the literature, but this is the first automatic verification. We take a published specification of the

  19. A model based security testing method for protocol implementation.

    Science.gov (United States)

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  20. A formal design verification and validation on the human factors of a computerized information system in nuclear power plants

    International Nuclear Information System (INIS)

    Lee, Yong Hee; Park, Jae Chang; Cheon, Se Woo; Jung, Kwang Tae; Baek, Seung Min; Han, Seung; Park, Hee Suk; Son, Ki Chang; Kim, Jung Man; Jung Yung Woo

    1999-11-01

    This report describe a technical transfer under the title of ''A formal design verification and validation on the human factors of a computerized information system in nuclear power plants''. Human factors requirements for the information system designs are extracted from various regulatory and industrial standards and guidelines, and interpreted into a more specific procedures and checklists for verifying the satisfaction of those requirements. A formalized implementation plan is established for human factors verification and validation of a computerized information system in nuclear power plants. Additionally, a Computer support system, named as DIMS-web (design Issue Management System), is developed based upon web internet environment so as to enhance the implementation of the human factors activities. DIMS-Web has three maine functions: supporting requirements review, tracking design issues, and management if issues screening evaluation. DIMS-Web shows its benefits in practice through a trial application to the design review of CFMS for YGN nuclear unit 5 and 6. (author)

  1. A formal design verification and validation on the human factors of a computerized information system in nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Yong Hee; Park, Jae Chang; Cheon, Se Woo; Jung, Kwang Tae; Baek, Seung Min; Han, Seung; Park, Hee Suk; Son, Ki Chang; Kim, Jung Man; Jung Yung Woo

    1999-11-01

    This report describe a technical transfer under the title of ''A formal design verification and validation on the human factors of a computerized information system in nuclear power plants''. Human factors requirements for the information system designs are extracted from various regulatory and industrial standards and guidelines, and interpreted into a more specific procedures and checklists for verifying the satisfaction of those requirements. A formalized implementation plan is established for human factors verification and validation of a computerized information system in nuclear power plants. Additionally, a Computer support system, named as DIMS-web (design Issue Management System), is developed based upon web internet environment so as to enhance the implementation of the human factors activities. DIMS-Web has three maine functions: supporting requirements review, tracking design issues, and management if issues screening evaluation. DIMS-Web shows its benefits in practice through a trial application to the design review of CFMS for YGN nuclear unit 5 and 6. (author)

  2. Bio-Inspired Energy-Aware Protocol Design for Cooperative Wireless Networks

    DEFF Research Database (Denmark)

    Perrucci, Gian Paolo; Anggraeni, Puri Novelti; Wardana, Satya Ardhy

    2011-01-01

    In this work, bio-inspired cooperation rules are applied to wireless communication networks. The main goal is to derive cooperative behaviour rules to improve the energy consumption of each mobile device. A medium access control (MAC) protocol particularly designed for peer-to-peer communication...... be achieved by this architecture using game theoretic approaches. As an extension, this work explores the impact of the MAC protocol on the power saving capabilities. This result shows that standard MAC mechanisms are not optimised for the considered cooperative setup. A new MAC protocol is proposed...... among cooperative wireless mobile devices is described. The work is based on a novel communication architecture, where a group of mobile devices are connected both to a cellular base station and among them using short-range communication links. A prior work has investigated the energy saving that can...

  3. Biometrics based authentication scheme for session initiation protocol

    OpenAIRE

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when co...

  4. Formal methods for industrial critical systems a survey of applications

    CERN Document Server

    Margaria-Steffen, Tiziana

    2012-01-01

    "Today, formal methods are widely recognized as an essential step in the design process of industrial safety-critical systems. In its more general definition, the term formal methods encompasses all notations having a precise mathematical semantics, together with their associated analysis methods, that allow description and reasoning about the behavior of a system in a formal manner.Growing out of more than a decade of award-winning collaborative work within the European Research Consortium for Informatics and Mathematics, Formal Methods for Industrial Critical Systems: A Survey of Applications presents a number of mainstream formal methods currently used for designing industrial critical systems, with a focus on model checking. The purpose of the book is threefold: to reduce the effort required to learn formal methods, which has been a major drawback for their industrial dissemination; to help designers to adopt the formal methods which are most appropriate for their systems; and to offer a panel of state-of...

  5. A Passive Testing Approach for Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiaoping Che

    2015-11-01

    Full Text Available Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN. However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results.

  6. Designing of Roaming Protocol for Bluetooth Equipped Multi Agent Systems

    Science.gov (United States)

    Subhan, Fazli; Hasbullah, Halabi B.

    Bluetooth is an established standard for low cost, low power, wireless personal area network. Currently, Bluetooth does not support any roaming protocol in which handoff occurs dynamically when a Bluetooth device is moving out of the piconet. If a device is losing its connection to the master device, no provision is made to transfer it to another master. Handoff is not possible in a piconet, as in order to stay within the network, a slave would have to keep the same master. So, by definition intra-handoff is not possible within a piconet. This research mainly focuses on Bluetooth technology and designing a roaming protocol for Bluetooth equipped multi agent systems. A mathematical model is derived for an agent. The idea behind the mathematical model is to know when to initiate the roaming process for an agent. A desired trajectory for the agent is calculated using its x and y coordinates system, and is simulated in SIMULINK. Various roaming techniques are also studied and discussed. The advantage of designing a roaming protocol is to ensure the Bluetooth enabled roaming devices can freely move inside the network coverage without losing its connection or break of service in case of changing the base stations.

  7. A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2009-01-01

    ZigBee is a wireless sensor network standard that defines network and application layers on top of IEEE 802.15.4’s physical and medium access control layers. In the latest version of ZigBee, enhancements are prescribed for the security sublayer but we show in this paper that problems persist....... In particular we show that the End-to-End Application Key Establishment Protocol is flawed and we propose a secure protocol instead. We do so by using formal verification techniques based on static program analysis and process algebras. We present a way of using formal methods in wireless network security......, and propose a secure key establishment protocol for ZigBee networks....

  8. Physics student ideas on quantum state and its formal representations

    International Nuclear Information System (INIS)

    Zuccarini, G.

    2014-01-01

    Developing a quantum way of thinking is a core and challenging task for physics students. The concept of quantum state, whose physical meaning is connected to the formal structure of the theory, plays an important role in the construction of a quantum perspective and in student difficulties elicited by research. A questionnaire and interview protocol were devised to explore student understanding of the state concept in connection to the properties of its formal representations and to quantum behavior. Results of a calibration of research instruments performed on 6 physics students from different universities are here presented.

  9. Using formal specification in the Guidance and Control Software (GCS) experiment. Formal design and verification technology for life critical systems

    Science.gov (United States)

    Weber, Doug; Jamsek, Damir

    1994-01-01

    The goal of this task was to investigate how formal methods could be incorporated into a software engineering process for flight-control systems under DO-178B and to demonstrate that process by developing a formal specification for NASA's Guidance and Controls Software (GCS) Experiment. GCS is software to control the descent of a spacecraft onto a planet's surface. The GCS example is simplified from a real example spacecraft, but exhibits the characteristics of realistic spacecraft control software. The formal specification is written in Larch.

  10. New procedure for departure formalities

    CERN Multimedia

    HR & GS Departments

    2011-01-01

    As part of the process of simplifying procedures and rationalising administrative processes, the HR and GS Departments have introduced new personalised departure formalities on EDH. These new formalities have applied to students leaving CERN since last year and from 17 October 2011 this procedure will be extended to the following categories of CERN personnel: Staff members, Fellows and Associates. It is planned to extend this electronic procedure to the users in due course. What purpose do departure formalities serve? The departure formalities are designed to ensure that members of the personnel contact all the relevant services in order to return any necessary items (equipment, cards, keys, dosimeter, electronic equipment, books, etc.) and are aware of all the benefits to which they are entitled on termination of their contract. The new departure formalities on EDH have the advantage of tailoring the list of services that each member of the personnel must visit to suit his individual contractual and p...

  11. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  12. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  13. Software protocol design: Communication and control in a multi-task robot machine for ITER vacuum vessel assembly and maintenance

    International Nuclear Information System (INIS)

    Li, Ming; Wu, Huapeng; Handroos, Heikki; Yang, Guangyou; Wang, Yongbo

    2015-01-01

    Highlights: • A high-level protocol is proposed for the data inter-transmission. • The protocol design is task-oriented for the robot control in the software system. • The protocol functions as a role of middleware in the software. • The protocol running stand-alone as an independent process in the software provides greater security. • Providing a reference design protocol for the multi-task robot machine in the industry. - Abstract: A specific communication and control protocol for software design of a multi-task robot machine is proposed. In order to fulfill the requirements on the complicated multi machining functions and the high performance motion control, the software design of robot is divided into two main parts accordingly, which consists of the user-oriented HMI part and robot control-oriented real-time control system. The two parts of software are deployed in the different hardware for the consideration of run-time performance, which forms a client–server-control architecture. Therefore a high-level task-oriented protocol is designed for the data inter-communication between the HMI part and the control system part, in which all the transmitting data related to a machining task is divided into three categories: trajectory-oriented data, task control-oriented data and status monitoring-oriented data. The protocol consists of three sub-protocols accordingly – a trajectory protocol, task control protocol and status protocol – which are deployed over the Ethernet and run as independent processes in both the client and server computers. The protocols are able to manage the vast amounts of data streaming due to the multi machining functions in a more efficient way. Since the protocol is functioning in the software as a role of middleware, and providing the data interface standards for the developing groups of two parts of software, it also permits greater focus of both software parts developers on their own requirements-oriented design. By

  14. Software protocol design: Communication and control in a multi-task robot machine for ITER vacuum vessel assembly and maintenance

    Energy Technology Data Exchange (ETDEWEB)

    Li, Ming, E-mail: ming.li@lut.fi [Laboratory of Intelligent Machines, Lappeenranta University of Technology (Finland); Wu, Huapeng; Handroos, Heikki [Laboratory of Intelligent Machines, Lappeenranta University of Technology (Finland); Yang, Guangyou [School of Mechanical Engineering, Hubei University of Technology, Wuhan (China); Wang, Yongbo [Laboratory of Intelligent Machines, Lappeenranta University of Technology (Finland)

    2015-10-15

    Highlights: • A high-level protocol is proposed for the data inter-transmission. • The protocol design is task-oriented for the robot control in the software system. • The protocol functions as a role of middleware in the software. • The protocol running stand-alone as an independent process in the software provides greater security. • Providing a reference design protocol for the multi-task robot machine in the industry. - Abstract: A specific communication and control protocol for software design of a multi-task robot machine is proposed. In order to fulfill the requirements on the complicated multi machining functions and the high performance motion control, the software design of robot is divided into two main parts accordingly, which consists of the user-oriented HMI part and robot control-oriented real-time control system. The two parts of software are deployed in the different hardware for the consideration of run-time performance, which forms a client–server-control architecture. Therefore a high-level task-oriented protocol is designed for the data inter-communication between the HMI part and the control system part, in which all the transmitting data related to a machining task is divided into three categories: trajectory-oriented data, task control-oriented data and status monitoring-oriented data. The protocol consists of three sub-protocols accordingly – a trajectory protocol, task control protocol and status protocol – which are deployed over the Ethernet and run as independent processes in both the client and server computers. The protocols are able to manage the vast amounts of data streaming due to the multi machining functions in a more efficient way. Since the protocol is functioning in the software as a role of middleware, and providing the data interface standards for the developing groups of two parts of software, it also permits greater focus of both software parts developers on their own requirements-oriented design. By

  15. Replication protocol analysis: a method for the study of real-world design thinking

    DEFF Research Database (Denmark)

    Galle, Per; Kovacs, L. B.

    1996-01-01

    ’ is refined into a method called ‘replication protocol analysis’ (RPA), and discussed from a methodological perspective of design research. It is argued that for the study of real-world design thinking this method offers distinct advantages over traditional ‘design protocol analysis’, which seeks to capture......Given the brief of an architectural competition on site planning, and the design awarded the first prize, the first author (trained as an architect but not a participant in the competition) produced a line of reasoning that might have led from brief to design. In the paper, such ‘design replication...... the designer’s authentic line of reasoning. To illustrate how RPA can be used, the site planning case is briefly presented, and part of the replicated line of reasoning analysed. One result of the analysis is a glimpse of a ‘logic of design’; another is an insight which sheds new light on Darke’s classical...

  16. Formal specifications for safety grade systems

    International Nuclear Information System (INIS)

    Chisholm, G.H.; Smith, B.T.; Wojcik, A.S.

    1992-01-01

    The authors describe the findings of a study into the application of formal methods to the specification of a safety system for an operating nuclear reactor. They developed a formal specification that is used to verify and validate that no unsafe condition will result from action or inaction of the system. For this reason, the specification must facilitate thinking about, talking about, and implementing the system. In fact, the specification must provide a bridge between people (designers, engineers, policy makers) and diverse implementations (hardware, software, sensors, power supplies) at all levels. For a specification to serve as an effective linkage, it must have the following properties: (1) completeness, (2) conciseness, (3) unambiguity, and (4) communicativeness. In this paper they describe the development of a specification that has three properties. This development is based on the use of formal methods, i.e., methods that add mathematical rigor to the development, analysis and operation of computer systems and to applications based thereon (Neumann). They demonstrate that a specification derived from a formal basis facilitates development of the design and its subsequent verification

  17. Protocol and networking design issues for local access WDM networks

    NARCIS (Netherlands)

    Salvador, M.R.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.

    This report gives an overview of some of the protocol and networking design issues that have been addressed in Flamingo, a major ongoing project which investigates the use of WDM optical technology in local access networks. Quality of service delivery and wavelength assignment are focused on in this

  18. Verification of the safety communication protocol in train control system using colored Petri net

    International Nuclear Information System (INIS)

    Chen Lijie; Tang Tao; Zhao Xianqiong; Schnieder, Eckehard

    2012-01-01

    This paper deals with formal and simulation-based verification of the safety communication protocol in ETCS (European Train Control System). The safety communication protocol controls the establishment of safety connection between train and trackside. Because of its graphical user interface and modeling flexibility upon the changes in the system conditions, this paper proposes a composition Colored Petri Net (CPN) representation for both the logic and the timed model. The logic of the protocol is proved to be safe by means of state space analysis: the dead markings are correct; there are no dead transitions; being fair. Further analysis results have been obtained using formal and simulation-based verification approach. The timed models for the open transmit system and the application process are created for the purpose of performance analysis of the safety communication protocol. The models describe the procedure of data transmission and processing, and also provide relevant timed and stochastic factors, as well as time delay and lost packet, which may influence the time for establishment of safety connection of the protocol. Time for establishment of safety connection of the protocol in normal state is verified by formal verification, and then time for establishment of safety connection with different probability of lost packet is simulated. After verification it is found that the time for establishment of safety connection of the safety communication protocol satisfies the safety requirements.

  19. Formal Modeling of Greedy Nodes in 802.15.4 WSN

    Directory of Open Access Journals (Sweden)

    Youcef Hammal

    2015-06-01

    Full Text Available This paper deals with formal specification of the non-slotted CSMA/CA protocol in wireless sensor networks(WSN whose some nodes own a greedy behavior. This protocol requires sensor nodes to wait some time before initiating a transmission, whereas greedy nodes may try to reduce their waiting duration, which may penalize other nodes. To analyze their impact on WSN mode in operation, we use timed automata of the model-checker UPPAAL to capture the abstract behavior of communication medium, sane, and greedy nodes in WSN. This enables the use of analysis tools to check whether these models satisfy intended properties.

  20. Critical formalism or digital biomorphology. The contemporary architecture formal dilema

    Directory of Open Access Journals (Sweden)

    Beatriz Villanueva Cajide

    2018-05-01

    Full Text Available With the dawn of digital media the architecture’s formal possibilities reached a level unknown before. The Guggenheim Museo branch in Bilbao appears in 1993 as the materialisation of the possibilities of the use of digital tools in architecture’s design, starting the development of a digital based architecture which currently has reached an exhaustion level that is evident in the repetition biomorphologic shapes emerged from the digital determinism to which some contemporary architectural practices have converged. While the digitalisation of the architectural process is irreversible and desirable, it is necessary to rethink the terms of this collaboration beyond the possibilities of the digital tools themselves. This article proposes to analyse seven texts written in the very moment when digitalisation became a real possibility, between Gehry’s conception of the Guggenheim Museum in 1992 and the Congress on Morphogenesis hold in the Architectural Association in 2004, in order to explore the possibility of reversing the process that has led to the formal exhaustion of digital architecture, from the acceptance of incorporating strategies coming from a contemporary critical formalism.

  1. Proceedings of the First NASA Formal Methods Symposium

    Science.gov (United States)

    Denney, Ewen (Editor); Giannakopoulou, Dimitra (Editor); Pasareanu, Corina S. (Editor)

    2009-01-01

    Topics covered include: Model Checking - My 27-Year Quest to Overcome the State Explosion Problem; Applying Formal Methods to NASA Projects: Transition from Research to Practice; TLA+: Whence, Wherefore, and Whither; Formal Methods Applications in Air Transportation; Theorem Proving in Intel Hardware Design; Building a Formal Model of a Human-Interactive System: Insights into the Integration of Formal Methods and Human Factors Engineering; Model Checking for Autonomic Systems Specified with ASSL; A Game-Theoretic Approach to Branching Time Abstract-Check-Refine Process; Software Model Checking Without Source Code; Generalized Abstract Symbolic Summaries; A Comparative Study of Randomized Constraint Solvers for Random-Symbolic Testing; Component-Oriented Behavior Extraction for Autonomic System Design; Automated Verification of Design Patterns with LePUS3; A Module Language for Typing by Contracts; From Goal-Oriented Requirements to Event-B Specifications; Introduction of Virtualization Technology to Multi-Process Model Checking; Comparing Techniques for Certified Static Analysis; Towards a Framework for Generating Tests to Satisfy Complex Code Coverage in Java Pathfinder; jFuzz: A Concolic Whitebox Fuzzer for Java; Machine-Checkable Timed CSP; Stochastic Formal Correctness of Numerical Algorithms; Deductive Verification of Cryptographic Software; Coloured Petri Net Refinement Specification and Correctness Proof with Coq; Modeling Guidelines for Code Generation in the Railway Signaling Context; Tactical Synthesis Of Efficient Global Search Algorithms; Towards Co-Engineering Communicating Autonomous Cyber-Physical Systems; and Formal Methods for Automated Diagnosis of Autosub 6000.

  2. A Verifiable Language for Cryptographic Protocols

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde

    We develop a formal language for specifying cryptographic protocols in a structured and clear manner, which allows verification of many interesting properties; in particular confidentiality and integrity. The study sheds new light on the problem of creating intuitive and human readable languages...

  3. Cross-layer protocol design for QoS optimization in real-time wireless sensor networks

    Science.gov (United States)

    Hortos, William S.

    2010-04-01

    The metrics of quality of service (QoS) for each sensor type in a wireless sensor network can be associated with metrics for multimedia that describe the quality of fused information, e.g., throughput, delay, jitter, packet error rate, information correlation, etc. These QoS metrics are typically set at the highest, or application, layer of the protocol stack to ensure that performance requirements for each type of sensor data are satisfied. Application-layer metrics, in turn, depend on the support of the lower protocol layers: session, transport, network, data link (MAC), and physical. The dependencies of the QoS metrics on the performance of the higher layers of the Open System Interconnection (OSI) reference model of the WSN protocol, together with that of the lower three layers, are the basis for a comprehensive approach to QoS optimization for multiple sensor types in a general WSN model. The cross-layer design accounts for the distributed power consumption along energy-constrained routes and their constituent nodes. Following the author's previous work, the cross-layer interactions in the WSN protocol are represented by a set of concatenated protocol parameters and enabling resource levels. The "best" cross-layer designs to achieve optimal QoS are established by applying the general theory of martingale representations to the parameterized multivariate point processes (MVPPs) for discrete random events occurring in the WSN. Adaptive control of network behavior through the cross-layer design is realized through the parametric factorization of the stochastic conditional rates of the MVPPs. The cross-layer protocol parameters for optimal QoS are determined in terms of solutions to stochastic dynamic programming conditions derived from models of transient flows for heterogeneous sensor data and aggregate information over a finite time horizon. Markov state processes, embedded within the complex combinatorial history of WSN events, are more computationally

  4. Rendezvous Protocols and Dynamic Frequency Hopping Interference Design for Anti-Jamming Satellite Communication

    Science.gov (United States)

    2013-11-25

    previously considered this proactive approach to combat unintentional, persistent (non- reactive) interference . In this project, we plan on extending our...channel” (or code ) by chance, through public knowledge of the underlying protocol semantics , or by compromising one of the network devices. An alternative...AFRL-RV-PS- AFRL-RV-PS- TR-2013-0142 TR-2013-0142 RENDEZVOUS PROTOCOLS AND DYNAMIC FREQUENCY HOPPING INTERFERENCE DESIGN FOR ANTI-JAMMING

  5. Design Aspects of An Energy-Efficient, Lightweight Medium Access Control Protocol for Wireless Sensor Networks

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Havinga, Paul J.M.

    2006-01-01

    This document gives an overview of the most relevant design aspects of the lightweight medium access control (LMAC) protocol [16] for wireless sensor networks (WSNs). These aspects include selfconfiguring and localized operation of the protocol, time synchronization in multi-hop networks, network

  6. Modelling the protocol stack in NCS with deterministic and stochastic petri net

    Science.gov (United States)

    Hui, Chen; Chunjie, Zhou; Weifeng, Zhu

    2011-06-01

    Protocol stack is the basis of the networked control systems (NCS). Full or partial reconfiguration of protocol stack offers both optimised communication service and system performance. Nowadays, field testing is unrealistic to determine the performance of reconfigurable protocol stack; and the Petri net formal description technique offers the best combination of intuitive representation, tool support and analytical capabilities. Traditionally, separation between the different layers of the OSI model has been a common practice. Nevertheless, such a layered modelling analysis framework of protocol stack leads to the lack of global optimisation for protocol reconfiguration. In this article, we proposed a general modelling analysis framework for NCS based on the cross-layer concept, which is to establish an efficiency system scheduling model through abstracting the time constraint, the task interrelation, the processor and the bus sub-models from upper and lower layers (application, data link and physical layer). Cross-layer design can help to overcome the inadequacy of global optimisation based on information sharing between protocol layers. To illustrate the framework, we take controller area network (CAN) as a case study. The simulation results of deterministic and stochastic Petri-net (DSPN) model can help us adjust the message scheduling scheme and obtain better system performance.

  7. El Salvador - Formal Technical Education

    Data.gov (United States)

    Millennium Challenge Corporation — With a budget of nearly $20 million, the Formal Technical Education Sub-Activity was designed to strengthen technical and vocational educational institutions in the...

  8. Biopiracy after the Nagoya Protocol: Problem Structure, Regime Design and Implementation Challenges

    Directory of Open Access Journals (Sweden)

    Florian Rabitz

    2015-08-01

    Full Text Available This article assesses the effectiveness of the 2010 Nagoya Protocol to the Convention on Biological Diversity (CBD for addressing "biopiracy" of genetic resources; that is, their biotechnological utilization in violation of either the provider country legislation or mutually agreed contractual obligations. Biopiracy is defined as a problem resulting from a distributive conflict between provider and user countries, the practical difficulties of monitoring the utilization of genetic resources in a transnational context, and the pervasive scientific uncertainty about the nature and extent of the problem. The Nagoya Protocol predominantly focuses on compliance management while lacking the necessary enforcement provisions for deterring non-compliance through effective monitoring and sanctions. Using the example of recent European Union implementing legislation, this article underscores how parties may use the Protocol's legal ambiguities to soften its regulatory impact on domestic industry. As a result, in light of both problem structure and regime design, the Protocol only offers modest improvements over the status quo ante.

  9. A Comparitive Study of Subject Knowledge of B.Ed Graduates of Formal and Non-Formal Teacher Education Systems

    Science.gov (United States)

    Saif, Perveen; Reba, Amjad; ud Din, Jalal

    2017-01-01

    This study was designed to compare the subject knowledge of B.Ed graduates of formal and non-formal teacher education systems. The population of the study included all teachers from Girls High and Higher Secondary Schools both from private and public sectors from the district of Peshawar. Out of the total population, twenty schools were randomly…

  10. [Sampling and measurement methods of the protocol design of the China Nine-Province Survey for blindness, visual impairment and cataract surgery].

    Science.gov (United States)

    Zhao, Jia-liang; Wang, Yu; Gao, Xue-cheng; Ellwein, Leon B; Liu, Hu

    2011-09-01

    To design the protocol of the China nine-province survey for blindness, visual impairment and cataract surgery to evaluate the prevalence and main causes of blindness and visual impairment, and the prevalence and outcomes of the cataract surgery. The protocol design was began after accepting the task for the national survey for blindness, visual impairment and cataract surgery from the Department of Medicine, Ministry of Health, China, in November, 2005. The protocol in Beijing Shunyi Eye Study in 1996 and Guangdong Doumen County Eye Study in 1997, both supported by World Health Organization, was taken as the basis for the protocol design. The relative experts were invited to discuss and prove the draft protocol. An international advisor committee was established to examine and approve the draft protocol. Finally, the survey protocol was checked and approved by the Department of Medicine, Ministry of Health, China and Prevention Program of Blindness and Deafness, WHO. The survey protocol was designed according to the characteristics and the scale of the survey. The contents of the protocol included determination of target population and survey sites, calculation of the sample size, design of the random sampling, composition and organization of the survey teams, determination of the examinee, the flowchart of the field work, survey items and methods, diagnostic criteria of blindness and moderate and sever visual impairment, the measures of the quality control, the methods of the data management. The designed protocol became the standard and practical protocol for the survey to evaluate the prevalence and main causes of blindness and visual impairment, and the prevalence and outcomes of the cataract surgery.

  11. A Web Resource for Standardized Benchmark Datasets, Metrics, and Rosetta Protocols for Macromolecular Modeling and Design.

    Directory of Open Access Journals (Sweden)

    Shane Ó Conchúir

    Full Text Available The development and validation of computational macromolecular modeling and design methods depend on suitable benchmark datasets and informative metrics for comparing protocols. In addition, if a method is intended to be adopted broadly in diverse biological applications, there needs to be information on appropriate parameters for each protocol, as well as metrics describing the expected accuracy compared to experimental data. In certain disciplines, there exist established benchmarks and public resources where experts in a particular methodology are encouraged to supply their most efficient implementation of each particular benchmark. We aim to provide such a resource for protocols in macromolecular modeling and design. We present a freely accessible web resource (https://kortemmelab.ucsf.edu/benchmarks to guide the development of protocols for protein modeling and design. The site provides benchmark datasets and metrics to compare the performance of a variety of modeling protocols using different computational sampling methods and energy functions, providing a "best practice" set of parameters for each method. Each benchmark has an associated downloadable benchmark capture archive containing the input files, analysis scripts, and tutorials for running the benchmark. The captures may be run with any suitable modeling method; we supply command lines for running the benchmarks using the Rosetta software suite. We have compiled initial benchmarks for the resource spanning three key areas: prediction of energetic effects of mutations, protein design, and protein structure prediction, each with associated state-of-the-art modeling protocols. With the help of the wider macromolecular modeling community, we hope to expand the variety of benchmarks included on the website and continue to evaluate new iterations of current methods as they become available.

  12. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  13. Linear transceiver design for nonorthogonal amplify-and-forward protocol using a bit error rate criterion

    KAUST Repository

    Ahmed, Qasim Zeeshan

    2014-04-01

    The ever growing demand of higher data rates can now be addressed by exploiting cooperative diversity. This form of diversity has become a fundamental technique for achieving spatial diversity by exploiting the presence of idle users in the network. This has led to new challenges in terms of designing new protocols and detectors for cooperative communications. Among various amplify-and-forward (AF) protocols, the half duplex non-orthogonal amplify-and-forward (NAF) protocol is superior to other AF schemes in terms of error performance and capacity. However, this superiority is achieved at the cost of higher receiver complexity. Furthermore, in order to exploit the full diversity of the system an optimal precoder is required. In this paper, an optimal joint linear transceiver is proposed for the NAF protocol. This transceiver operates on the principles of minimum bit error rate (BER), and is referred as joint bit error rate (JBER) detector. The BER performance of JBER detector is superior to all the proposed linear detectors such as channel inversion, the maximal ratio combining, the biased maximum likelihood detectors, and the minimum mean square error. The proposed transceiver also outperforms previous precoders designed for the NAF protocol. © 2002-2012 IEEE.

  14. Behaviour Protocols Verification: Fighting State Explosion

    Czech Academy of Sciences Publication Activity Database

    Mach, M.; Plášil, František; Kofroň, Jan

    2005-01-01

    Roč. 6, č. 2 (2005), s. 22-30 ISSN 1525-9293 R&D Projects: GA ČR(CZ) GA102/03/0672 Institutional research plan: CEZ:AV0Z10300504 Keywords : formal verification * software components * stateexplos ion * behavior protocols * parse trees Subject RIV: JC - Computer Hardware ; Software

  15. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... results. The most important generalization is the support for all security properties of the geometric fragment proposed by [Gut14]....... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  16. A Pattern Language for Designing Application-Level Communication Protocols and the Improvement of Computer Science Education through Cloud Computing

    OpenAIRE

    Lascano, Jorge Edison

    2017-01-01

    Networking protocols have been developed throughout time following layered architectures such as the Open Systems Interconnection model and the Internet model. These protocols are grouped in the Internet protocol suite. Most developers do not deal with low-level protocols, instead they design application-level protocols on top of the low-level protocol. Although each application-level protocol is different, there is commonality among them and developers can apply lessons learned from one prot...

  17. Formal verification method for nuclear I and C systems using ESDT and SMV in the software design phase

    International Nuclear Information System (INIS)

    Song, Myung Jun; Koo, Seo Ryong; Seong, Poong Hyun

    2004-01-01

    As PLCs are widely used in the digital I and C systems of nuclear power plants (NPPs), the safety of PLC software has become the most important consideration. Software safety is an important property for safety critical systems, especially those in aerospace, satellite and nuclear power plants, whose failure could result in danger to human life, property or environment. It is recently becoming more important due to the increase in the complexity and size of safety critical systems. This research proposes a method to perform effective verification tasks on the traceability analysis and software design evaluation in the software design phase. In order to perform the traceability analysis between a Software Requirements Specification (SRS) written in a natural language and a Software Design Specification (SDS) written in Function Block Diagram (FBD), this method uses extended-structured decision tables (ESDTs). ESDTs include information related to the traceability analysis from a text-based SRS and a FBD-based SDS, respectively. Through comparing with both ESDTs from an SRS and ESDTs from an SDS, the effective traceability analysis of both a text-based SRS and a FBD-based SDS can be achieved. For the software design evaluation, a model checking, which is mainly used to verify PLC programs formally, is used in this research. A FBD-style design specification is translated into input languages of the SMV by translation rules and then the FBD-style design specification can be formally analyzed using SMV. (author)

  18. Informal work and formal plans

    DEFF Research Database (Denmark)

    Dalsted, Rikke Juul; Hølge-Hazelton, Bibi; Kousgaard, Marius Brostrøm

    2012-01-01

    INTRODUCTION: Formal pathways models outline that patients should receive information in order to experience a coherent journey but do not describe an active role for patients or their relatives. The aim of this is paper is to articulate and discuss the active role of patients during their cancer...... trajectories. METHODS AND THEORY: An in-depth case study of patient trajectories at a Danish hospital and surrounding municipality using individual interviews with patients. Theory about trajectory and work by Strauss was included. RESULTS: Patients continuously took initiatives to organize their treatment....... The patients' requests were not sufficiently supported in the professional organisation of work or formal planning. Patients' insertion and use of information in their trajectories challenged professional views and working processes. And the design of the formal pathway models limits the patients' active...

  19. A fresh recipe for designers: HCI approach to explore the nexus between design techniques and formal methods in software development

    Directory of Open Access Journals (Sweden)

    Julian Galindo Losada

    2016-11-01

    Full Text Available Emerging companies involved in design and implementation of innovative products demand multidisciplinary teams to be competitive in the market. This need mainly exposes designers to extend their knowledge not only in User Interface elements of the design process but also in software methodologies to cover the lack of resources and expertise in start-ups. It raises the question of how designers can line up HCI techniques with best practices in software development while preserving usability and easy-to-use principles. To explore this gap, this paper proposes an approach which combines existing technology and methods by studying the nexus between HCI prototyping and software engineering. The approach is applied into a case study in the design of a virtual shop harmonizing the use of storyboards and the spiral. A comprehensive analysis is performed by using a Technology acceptance model (TAM regarding with two variables: usability and easy-to-use. The present finding underlines the positive integration of HCI techniques and formal methods without compromising user satisfaction with a potential benefit for small companies in a formation stage.

  20. Sufficient Conditions for Vertical Composition of Security Protocols (Extended Version)

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Viganò, Luca

    a certain kind of channel as a goal and another secure protocol P2 that assumes this kind of channel, can we then derive that their vertical composition P2[P1] is secure? It is well known that protocol composition can lead to attacks even when the individual protocols are all secure in isolation......Vertical composition of security protocols means that an application protocol (e.g., a banking service) runs over a channel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality question: given a secure protocol P1 that provides....... In this paper, we formalize seven easy-to-check static conditions that support a large class of channels and applications and that we prove to be su_cient for vertical security protocol composition....

  1. A formal analysis of ISO/IEEE P11073-20601 standard of medical device communication

    NARCIS (Netherlands)

    Goga, Nicolae; Costache, Stefania; Moldoveanu, Florica

    2009-01-01

    This article presents the formal work done for the ISO/IEEE P11073-20601 Draft Standard for Health informatics - Personal health device communication - Application profile Optimized exchange protocol. ISO/IEEE 11073 family defines standards for device communication between agents (e.g. blood

  2. A Machine-Checked Formalization of the Generic Model and the Random Oracle Model

    NARCIS (Netherlands)

    Barthe, Gilles; Cederquist, J.G.; Tarento, Sabrina; Basin, David; Rusinowitch, Michaël

    Most approaches to the formal analyses of cryptographic protocols make the perfect cryptography assumption, i.e. the hypothese that there is no way to obtain knowledge about the plaintext pertaining to a ciphertext without knowing the key. Ideally, one would prefer to rely on a weaker hypothesis on

  3. A Synthesized Framework for Formal Verification of Computing Systems

    Directory of Open Access Journals (Sweden)

    Nikola Bogunovic

    2003-12-01

    Full Text Available Design process of computing systems gradually evolved to a level that encompasses formal verification techniques. However, the integration of formal verification techniques into a methodical design procedure has many inherent miscomprehensions and problems. The paper explicates the discrepancy between the real system implementation and the abstracted model that is actually used in the formal verification procedure. Particular attention is paid to the seamless integration of all phases of the verification procedure that encompasses definition of the specification language and denotation and execution of conformance relation between the abstracted model and its intended behavior. The concealed obstacles are exposed, computationally expensive steps identified and possible improvements proposed.

  4. On BAN logics for industrial security protocols

    NARCIS (Netherlands)

    Agray, N.; Hoek, van der W.; Vink, de E.P.; Dunin-Keplicz, B.; Nawarecki, E.

    2002-01-01

    This paper reports on two case-studies of applying BAN logic to industrial strength security protocols. These studies demonstrate the flexibility of the BAN language, as it caters for the addition of appropriate constructs and rules. We argue that, although a semantical foundation of the formalism

  5. Formalisms for reuse and systems integration

    CERN Document Server

    Rubin, Stuart

    2015-01-01

    Reuse and integration are defined as synergistic concepts, where reuse addresses how to minimize redundancy in the creation of components; while, integration focuses on component composition. Integration supports reuse and vice versa. These related concepts support the design of software and systems for maximizing performance while minimizing cost. Knowledge, like data, is subject to reuse; and, each can be interpreted as the other. This means that inherent complexity, a measure of the potential utility of a system, is directly proportional to the extent to which it maximizes reuse and integration. Formal methods can provide an appropriate context for the rigorous handling of these synergistic concepts. Furthermore, formal languages allow for non ambiguous model specification; and, formal verification techniques provide support for insuring the validity of reuse and integration mechanisms.   This edited book includes 12 high quality research papers written by experts in formal aspects of reuse and integratio...

  6. Interaction systems design and the protocol- and middleware-centred paradigms in distributed application development

    OpenAIRE

    Andrade Almeida, João; van Sinderen, Marten J.; Quartel, Dick; Ferreira Pires, Luis

    2003-01-01

    This paper aims at demonstrating the benefits and importance of interaction systems design in the development of distributed applications. We position interaction systems design with respect to two paradigms that have influenced the design of distributed applications: the middleware-centred and the protocol-centred paradigm. We argue that interaction systems that support application-level interactions should be explicitly designed, using the externally observable behaviour of the interaction ...

  7. Protocol and networking design issues for local access WDM networks

    OpenAIRE

    Salvador, M.R.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.

    1999-01-01

    This report gives an overview of some of the protocol and networking design issues that have been addressed in Flamingo, a major ongoing project which investigates the use of WDM optical technology in local access networks. Quality of service delivery and wavelength assignment are focused on in this report. A brief introduction to optical networks and WDM as well as a brief description of Flamingo are also included in this report.

  8. Invariant-based reasoning about parameterized security protocols

    NARCIS (Netherlands)

    Mooij, A.J.

    2010-01-01

    We explore the applicability of the programming method of Feijen and van Gasteren to the domain of security protocols. This method addresses the derivation of concurrent programs from a formal specification, and it is based on common notions like invariants and pre- and post-conditions. We show that

  9. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  10. Alveolar Bone Resorption Evaluation Around Single-piece Designed Bicortical Implants, Using Immediate Loading Protocol, Based on Orthopantomographs

    Directory of Open Access Journals (Sweden)

    Száva Dániel-Tamás

    2017-12-01

    Full Text Available Background: Inserting dental implants in severely atrophied jawbones is a great challenge for the dental practitioner. There are an increasing number of patients who choose dental implantanchored prosthetic restorations despite compromised bone quality and quantity. There have been numerous attempts in adapting implant design for the atrophic crestal bone. One-piece, needle-type basal implant design is a typical design for these cases. These implants are inserted in the remaining compact bone located in the basal aspect of the jawbones. If high primary stability is achieved, these implants are used for immediate loading protocol. From many points of view, this technique is based on contradictory principles compared to classic implant surgery and loading protocols. The aim of this study was to investigate the long-term success of basal one-piece short-diameter dental implants used for immediate loading protocol.

  11. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    . The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA......The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not...

  12. The Development of a Design and Construction Process Protocol to Support the Home Modification Process Delivered by Occupational Therapists.

    Science.gov (United States)

    Russell, Rachel; Ormerod, Marcus; Newton, Rita

    2018-01-01

    Modifying the home environments of older people as they age in place is a well-established health and social care intervention. Using design and construction methods to redress any imbalance caused by the ageing process or disability within the home environment, occupational therapists are seen as the experts in this field of practice. However, the process used by occupational therapists when modifying home environments has been criticised for being disorganised and not founded on theoretical principles and concepts underpinning the profession. To address this issue, research was conducted to develop a design and construction process protocol specifically for home modifications. A three-stage approach was taken for the analysis of qualitative data generated from an online survey, completed by 135 occupational therapists in the UK. Using both the existing occupational therapy intervention process model and the design and construction process protocol as the theoretical frameworks, a 4-phase, 9-subphase design and construction process protocol for home modifications was developed. Overall, the study is innovative in developing the first process protocol for home modifications, potentially providing occupational therapists with a systematic and effective approach to the design and delivery of home modification services for older and disabled people.

  13. Formal matrices

    CERN Document Server

    Krylov, Piotr

    2017-01-01

    This monograph is a comprehensive account of formal matrices, examining homological properties of modules over formal matrix rings and summarising the interplay between Morita contexts and K theory. While various special types of formal matrix rings have been studied for a long time from several points of view and appear in various textbooks, for instance to examine equivalences of module categories and to illustrate rings with one-sided non-symmetric properties, this particular class of rings has, so far, not been treated systematically. Exploring formal matrix rings of order 2 and introducing the notion of the determinant of a formal matrix over a commutative ring, this monograph further covers the Grothendieck and Whitehead groups of rings. Graduate students and researchers interested in ring theory, module theory and operator algebras will find this book particularly valuable. Containing numerous examples, Formal Matrices is a largely self-contained and accessible introduction to the topic, assuming a sol...

  14. Asymmetric Formal Aza-Diels-Alder Reaction of Trifluoromethyl Hemiaminals with Enones Catalyzed by Primary Amines.

    Science.gov (United States)

    Zhang, Sheng; Cha, Lide; Li, Lijun; Hu, Yanbin; Li, Yanan; Zha, Zhenggen; Wang, Zhiyong

    2016-04-15

    A primary amine-catalyzed asymmetric formal aza-Diels-Alder reaction of trifluoromethyl hemiaminals with enones was developed via a chiral gem-diamine intermediate. This novel protocol allowed facile access to structurally diverse trifluoromethyl-substituted piperidine scaffolds with high stereoselectivity. The utility of this method was further demonstrated through a concise approach to biologically active 4-hydroxypiperidine. More importantly, a stepwise mechanism involving an asymmetric induction process was proposed to rationalize the positive correlation between the chirality of the gem-diamine intermediate and the formal aza-Diels-Alder product.

  15. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  16. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Directory of Open Access Journals (Sweden)

    Alavalapati Goutham Reddy

    Full Text Available Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  17. Modular formal analysis of the central guardian in the Time-Triggered Architecture

    International Nuclear Information System (INIS)

    Pfeifer, Holger; Henke, Friedrich W. von

    2007-01-01

    The Time-Triggered Protocol TTP/C constitutes the core of the communication level of the Time-Triggered Architecture for dependable real-time systems. TTP/C ensures consistent data distribution, even in the presence of faults occurring to nodes or the communication channel. However, the protocol mechanisms of TTP/C rely on a rather optimistic fault hypothesis. Therefore, an independent component, the central guardian, employs static knowledge about the system to transform arbitrary node failures into failure modes that are covered by the fault hypothesis. This paper presents a modular formal analysis of the communication properties of TTP/C based on the guardian approach. Through a hierarchy of formal models, we give a precise description of the arguments that support the desired correctness properties of TTP/C. First, requirements for correct communication are expressed on an abstract level. By stepwise refinement we show both that these abstract requirements are met under the optimistic fault hypothesis, and how the guardian model allows a broader class of node failures to be tolerated. The models have been developed and mechanically checked using the specification and verification system PVS

  18. What makes industries believe in formal methods

    NARCIS (Netherlands)

    Vissers, C.A.; van Sinderen, Marten J.; Ferreira Pires, Luis; Pires, L.F.; Danthine, A.S.; Leduc, G.; Wolper, P.

    1993-01-01

    The introduction of formal methods in the design and development departments of an industrial company has far reaching and long lasting consequences. In fact it changes the whole environment of methods, tools and skills that determine the design culture of that company. A decision to replace current

  19. Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.

    Science.gov (United States)

    Das, Ashok Kumar; Wazid, Mohammad; Kumar, Neeraj; Khan, Muhammad Khurram; Choo, Kim-Kwang Raymond; Park, YoungHo

    2017-09-18

    Wearable devices are used in various applications to collect information including step information, sleeping cycles, workout statistics, and health related information. Due to the nature and richness of the data collected by such devices, it is important to ensure the security of the collected data. This paper presents a new lightweight authentication scheme suitable for wearable device deployment. The scheme allows a user to mutually authenticate his/her wearable device(s) and the mobile terminal (e.g., Android and iOS device) and establish a session key among these devices (worn and carried by the same user) for secure communication between the wearable device and the mobile terminal. The security of the proposed scheme is then demonstrated through the broadly-accepted Real-Or-Random model, as well as using the popular formal security verification tool, known as the Automated Validation of Internet Security Protocols and Applications (AVISPA). Finally, we present a comparative summary of the proposed scheme in terms of the overheads such as computation and communication costs, security and functionality features of the proposed scheme and related schemes, and also the evaluation findings from the NS2 simulation.

  20. Etiquette and Protocol: A Guide for Campus Events.

    Science.gov (United States)

    Harris, April L.

    Intended for special events planners on college campuses, this book offers advice on matters of etiquette and protocol for campus events. Chapters cover the following topics: (1) invitations (e.g., the precedence of extending invitations, invitation components, formal invitations, types of invitations); (2) forms of address (with examples of…

  1. Understanding Creative Design Processes by Integrating Sketching and CAD Modelling Design Environments: A Preliminary Protocol Result from Architectural Designers

    Directory of Open Access Journals (Sweden)

    Yi Teng Shih

    2015-11-01

    Full Text Available This paper presents the results of a preliminary protocol study of the cognitive behaviour of architectural designers during the design process. The aim is to better understand the similarities and differences in cognitive behaviour using Sequential Mixed Media (SMM and Alternative Mixed Media (AMM approaches, and how switching between media may impact on design processes. Two participants with at least one-year’s professional design experience and a Bachelor of Design degree, and competence in both sketching and computer-aid design (CAD modelling participated in the study. Video recordings of participants working on different projects were coded using the Function-Behaviour-Structure (FBS coding scheme. Participants were also interviewed and their explanations about their switching behaviours were categorised into three types: S→C, S/C↹R and C→S. Preliminary results indicate that switching between media may influence how designers identify problems and develop solutions. In particular, two design issues were identified.  These relate to the FBS coding scheme, where structure (S and behaviour derived from structure (Bs, change to documentation (D after switching from sketching to CAD modelling (S→C. These switches make it possible for designers to integrate both approaches into one design medium and facilitate their design processes in AMM design environments.

  2. Digital system verification a combined formal methods and simulation framework

    CERN Document Server

    Li, Lun

    2010-01-01

    Integrated circuit capacity follows Moore's law, and chips are commonly produced at the time of this writing with over 70 million gates per device. Ensuring correct functional behavior of such large designs before fabrication poses an extremely challenging problem. Formal verification validates the correctness of the implementation of a design with respect to its specification through mathematical proof techniques. Formal techniques have been emerging as commercialized EDA tools in the past decade. Simulation remains a predominantly used tool to validate a design in industry. After more than 5

  3. Spinor formalism and complex-vector formalism of general relativity

    International Nuclear Information System (INIS)

    Han-ying, G.; Yong-shi, W.; Gendao, L.

    1974-01-01

    In this paper, using E. Cartan's exterior calculus, we give the spinor form of the structure equations, which leads naturally to the Newman--Penrose equations. Furthermore, starting from the spinor spaces and the el (2C) algebra, we construct the general complex-vector formalism of general relativity. We find that both the Cahen--Debever--Defrise complex-vector formalism and that of Brans are its special cases. Thus, the spinor formalism and the complex-vector formalism of general relativity are unified on the basis of the uni-modular group SL(2C) and its Lie algebra

  4. Cryptographic protocol security analysis based on bounded constructing algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

  5. The Development of a Design and Construction Process Protocol to Support the Home Modification Process Delivered by Occupational Therapists

    Directory of Open Access Journals (Sweden)

    Rachel Russell

    2018-01-01

    Full Text Available Modifying the home environments of older people as they age in place is a well-established health and social care intervention. Using design and construction methods to redress any imbalance caused by the ageing process or disability within the home environment, occupational therapists are seen as the experts in this field of practice. However, the process used by occupational therapists when modifying home environments has been criticised for being disorganised and not founded on theoretical principles and concepts underpinning the profession. To address this issue, research was conducted to develop a design and construction process protocol specifically for home modifications. A three-stage approach was taken for the analysis of qualitative data generated from an online survey, completed by 135 occupational therapists in the UK. Using both the existing occupational therapy intervention process model and the design and construction process protocol as the theoretical frameworks, a 4-phase, 9-subphase design and construction process protocol for home modifications was developed. Overall, the study is innovative in developing the first process protocol for home modifications, potentially providing occupational therapists with a systematic and effective approach to the design and delivery of home modification services for older and disabled people.

  6. An Ontology for a TripTych Formal Software Development

    DEFF Research Database (Denmark)

    Bjørner, Dines

    2003-01-01

    An ontology, ie., a formalised set of strongly interrelated definitions, is given for an approach to software development that spans domain engineering, requirements engineering and software design - and which is otherwise based on a judicious use of both informal and formal, mathematics-based te......An ontology, ie., a formalised set of strongly interrelated definitions, is given for an approach to software development that spans domain engineering, requirements engineering and software design - and which is otherwise based on a judicious use of both informal and formal, mathematics...

  7. Functional Automata - Formal Languages for Computer Science Students

    Directory of Open Access Journals (Sweden)

    Marco T. Morazán

    2014-12-01

    Full Text Available An introductory formal languages course exposes advanced undergraduate and early graduate students to automata theory, grammars, constructive proofs, computability, and decidability. Programming students find these topics to be challenging or, in many cases, overwhelming and on the fringe of Computer Science. The existence of this perception is not completely absurd since students are asked to design and prove correct machines and grammars without being able to experiment nor get immediate feedback, which is essential in a learning context. This article puts forth the thesis that the theory of computation ought to be taught using tools for actually building computations. It describes the implementation and the classroom use of a library, FSM, designed to provide students with the opportunity to experiment and test their designs using state machines, grammars, and regular expressions. Students are able to perform random testing before proceeding with a formal proof of correctness. That is, students can test their designs much like they do in a programming course. In addition, the library easily allows students to implement the algorithms they develop as part of the constructive proofs they write. Providing students with this ability ought to be a new trend in the formal languages classroom.

  8. Visible light-photocatalysed carbazole synthesis via a formal (4+2) cycloaddition of indole-derived bromides and alkynes.

    Science.gov (United States)

    Yuan, Zhi-Guang; Wang, Qiang; Zheng, Ang; Zhang, Kai; Lu, Liang-Qiu; Tang, Zilong; Xiao, Wen-Jing

    2016-04-14

    We successfully developed an unprecedented route to carbazole synthesis through a visible light-photocatalysed formal (4+2) cycloaddition of indole-derived bromides and alkynes. This novel protocol features extremely mild conditions, a broad substrate scope and high reaction efficiency.

  9. Cross-Layer Protocol as a Better Option in Wireless Mesh Network with Respect to Layered-Protocol

    OpenAIRE

    Ahmed Abdulwahab Al-Ahdal; Dr. V. P. Pawar; G. N. Shinde

    2014-01-01

    The Optimal way to improve Wireless Mesh Networks (WMNs) performance is to use a better network protocol, but whether layered-protocol design or cross-layer design is a better option to optimize protocol performance in WMNs is still an on-going research topic. In this paper, we focus on cross-layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to b...

  10. SBME : Exploring boundaries between formal, non-formal, and informal learning

    OpenAIRE

    Shahoumian, Armineh; Parchoma, Gale; Saunders, Murray; Hanson, Jacky; Dickinson, Mike; Pimblett, Mark

    2013-01-01

    In medical education learning extends beyond university settings into practice. Non-formal and informal learning support learners’ efforts to meet externally set and learner-identified objectives. In SBME research, boundaries between formal, non-formal, and informal learning have not been widely explored. Whether SBME fits within or challenges these categories can make a contribution. Formal learning is described in relation to educational settings, planning, assessment, and accreditation. In...

  11. An Ontology for State Analysis: Formalizing the Mapping to SysML

    Science.gov (United States)

    Wagner, David A.; Bennett, Matthew B.; Karban, Robert; Rouquette, Nicolas; Jenkins, Steven; Ingham, Michel

    2012-01-01

    State Analysis is a methodology developed over the last decade for architecting, designing and documenting complex control systems. Although it was originally conceived for designing robotic spacecraft, recent applications include the design of control systems for large ground-based telescopes. The European Southern Observatory (ESO) began a project to design the European Extremely Large Telescope (E-ELT), which will require coordinated control of over a thousand articulated mirror segments. The designers are using State Analysis as a methodology and the Systems Modeling Language (SysML) as a modeling and documentation language in this task. To effectively apply the State Analysis methodology in this context it became necessary to provide ontological definitions of the concepts and relations in State Analysis and greater flexibility through a mapping of State Analysis into a practical extension of SysML. The ontology provides the formal basis for verifying compliance with State Analysis semantics including architectural constraints. The SysML extension provides the practical basis for applying the State Analysis methodology with SysML tools. This paper will discuss the method used to develop these formalisms (the ontology), the formalisms themselves, the mapping to SysML and approach to using these formalisms to specify a control system and enforce architectural constraints in a SysML model.

  12. Formalization of Database Systems -- and a Formal Definition of {IMS}

    DEFF Research Database (Denmark)

    Bjørner, Dines; Løvengreen, Hans Henrik

    1982-01-01

    Drawing upon an analogy between Programming Language Systems and Database Systems we outline the requirements that architectural specifications of database systems must futfitl, and argue that only formal, mathematical definitions may 6atisfy these. Then we illustrate home aspects and touch upon...... come ueee of formal definitions of data models and databaee management systems. A formal model of INS will carry this discussion. Finally we survey some of the exkting literature on formal definitions of database systems. The emphasis will be on constructive definitions in the denotationul semantics...... style of the VCM: Vienna Development Nethd. The role of formal definitions in international standardiaation efforts is briefly mentioned....

  13. Enhancing Formal E-Learning with Edutainment on Social Networks

    Science.gov (United States)

    Labus, A.; Despotovic-Zrakic, M.; Radenkovic, B.; Bogdanovic, Z.; Radenkovic, M.

    2015-01-01

    This paper reports on the investigation of the possibilities of enhancing the formal e-learning process by harnessing the potential of informal game-based learning on social networks. The goal of the research is to improve the outcomes of the formal learning process through the design and implementation of an educational game on a social network…

  14. An extended protocol for usability validation of medical devices: Research design and reference model.

    Science.gov (United States)

    Schmettow, Martin; Schnittker, Raphaela; Schraagen, Jan Maarten

    2017-05-01

    This paper proposes and demonstrates an extended protocol for usability validation testing of medical devices. A review of currently used methods for the usability evaluation of medical devices revealed two main shortcomings. Firstly, the lack of methods to closely trace the interaction sequences and derive performance measures. Secondly, a prevailing focus on cross-sectional validation studies, ignoring the issues of learnability and training. The U.S. Federal Drug and Food Administration's recent proposal for a validation testing protocol for medical devices is then extended to address these shortcomings: (1) a novel process measure 'normative path deviations' is introduced that is useful for both quantitative and qualitative usability studies and (2) a longitudinal, completely within-subject study design is presented that assesses learnability, training effects and allows analysis of diversity of users. A reference regression model is introduced to analyze data from this and similar studies, drawing upon generalized linear mixed-effects models and a Bayesian estimation approach. The extended protocol is implemented and demonstrated in a study comparing a novel syringe infusion pump prototype to an existing design with a sample of 25 healthcare professionals. Strong performance differences between designs were observed with a variety of usability measures, as well as varying training-on-the-job effects. We discuss our findings with regard to validation testing guidelines, reflect on the extensions and discuss the perspectives they add to the validation process. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. SELF-EFFICACY OF FORMALLY AND NON-FORMALLY TRAINED PUBLIC SECTOR TEACHERS

    Directory of Open Access Journals (Sweden)

    Muhammad Nadeem ANWAR

    2009-07-01

    Full Text Available The main objective of the study was to compare the formally and non-formally trained in-service public sector teachers’ Self-efficacy. Five hypotheses were developed describing no difference in the self-efficacy of formally and non-formally trained teachers to influence decision making, influence school resources, instructional self-efficacy, disciplinary self-efficacy and create positive school climate. Teacher Efficacy Instrument (TSES developed by Bandura (2001 consisting of thirty 9-point items was used in the study. 342 formally trained and 255 non-formally trained respondents’ questionnaires were received out of 1500 mailed. The analysis of data revealed that the formally trained public sector teachers are high in their self-efficacy on all the five categories: to influence decision making, to influence school resources, instructional self-efficacy, disciplinary self-efficacy and self-efficacy to create positive school climate.

  16. Masses of Formal Philosophy

    DEFF Research Database (Denmark)

    Masses of Formal Philosophy is an outgrowth of Formal Philosophy. That book gathered the responses of some of the most prominent formal philosophers to five relatively open and broad questions initiating a discussion of metaphilosophical themes and problems surrounding the use of formal methods i...... in philosophy. Including contributions from a wide range of philosophers, Masses of Formal Philosophy contains important new responses to the original five questions.......Masses of Formal Philosophy is an outgrowth of Formal Philosophy. That book gathered the responses of some of the most prominent formal philosophers to five relatively open and broad questions initiating a discussion of metaphilosophical themes and problems surrounding the use of formal methods...

  17. Authentication Protocols for Internet of Things: A Comprehensive Survey

    Directory of Open Access Journals (Sweden)

    Mohamed Amine Ferrag

    2017-01-01

    Full Text Available In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1 Machine to Machine Communications (M2M, (2 Internet of Vehicles (IoV, (3 Internet of Energy (IoE, and (4 Internet of Sensors (IoS. Threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT are presented. In addition a taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided. Based on the current survey, open issues are identified and future research directions are proposed.

  18. Design and Implementation of a Secure Modbus Protocol

    Science.gov (United States)

    Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto

    The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.

  19. Modern Logical Frameworks Design

    DEFF Research Database (Denmark)

    Murawska, Agata Anna

    2017-01-01

    lack support for reasoning about, or programming with, the mechanised systems. Our main motivation is to eventually make it possible to model and reason about complex concurrent systems and protocols. No matter the application, be it the development of a logic for multiparty session types...... or a cryptographic protocol used in a voting system, we need the ability to model and reason about both the building blocks of these systems and the intricate connections between them. To this end, this dissertation is an investigation into LF-based formalisms that might help address the aforementioned issues. We...... design and provide the meta-theory of two new frameworks, HyLF and Lincx. The former aims to extend the expressiveness of LF to include proof irrelevance and some user-defined behaviours, using ideas from hybrid logics. The latter is a showcase for an easier to implement framework, while also allowing...

  20. Educational attainment, formal employment and contraceptives ...

    African Journals Online (AJOL)

    Based on this, the study examines educational attainment, formal employment and contraceptives practices among working women in Lagos State University. Survey design was adopted for the study. Using Stratified and simple random sampling techniques, quantitative data was gathered through the administration of ...

  1. Formal and informal appropriation mechanisms: the role of openness and innovativeness

    NARCIS (Netherlands)

    Zobel, Ann-Kristin; Lokshin, Boris; Hagedoorn, John

    2016-01-01

    This paper analyses how firms’ degree of openness and innovativeness influence their use of formal and informal appropriation mechanisms. Patents, trademarks, copyrights, and design rights are formal appropriation mechanisms. Secrecy, lead-time, and complexity are examples of informal appropriation

  2. SME´s semi-formality rate in Costa Rica: a clusters approach

    Directory of Open Access Journals (Sweden)

    Lizette Brenes Bonilla

    2016-02-01

    Full Text Available The MSME Observatory has been studying MSMEs in Costa Rica. Its findings show that for every formal enterprise, there are 2.4 semi-formal ones. The latter refers to those enterprises that have already started the formalization process with the corresponding municipality but that still do not have all the formalization requirements.Owing to the importance of the semi-formal sector in the economic activity of Costa Rica, this study analyzed this business park and the role of municipal management concerning MSMEs, calculated the correlation among semi-formality, competitiveness, and development, and finally, proposed a cluster design to deal with the state of affairs. It should be noted that this type of analysis has never been undertaken in the country.

  3. An Even Better Approach : Improving the B.A.T.M.A.N. Protocol Through Formal Modelling and Analysis

    NARCIS (Netherlands)

    Fehnker, Ansgar; Chaudhary, Kaylash; Mehta, Vinay; Dutle, Aaron; Muñoz, César; Narkawicz, Anthony

    2018-01-01

    This paper considers a network routing protocol known as Better Approach to Mobile Adhoc Networks (B.A.T.M.A.N.). The protocol has two aims: first, discovery of all bidirectional links, and second, identification of the best-next-hop to the other nodes. A key mechanism of the protocol is to flood

  4. A Formal Methods Approach to the Analysis of Mode Confusion

    Science.gov (United States)

    Butler, Ricky W.; Miller, Steven P.; Potts, James N.; Carreno, Victor A.

    2004-01-01

    The goal of the new NASA Aviation Safety Program (AvSP) is to reduce the civil aviation fatal accident rate by 80% in ten years and 90% in twenty years. This program is being driven by the accident data with a focus on the most recent history. Pilot error is the most commonly cited cause for fatal accidents (up to 70%) and obviously must be given major consideration in this program. While the greatest source of pilot error is the loss of situation awareness , mode confusion is increasingly becoming a major contributor as well. The January 30, 1995 issue of Aviation Week lists 184 incidents and accidents involving mode awareness including the Bangalore A320 crash 2/14/90, the Strasbourg A320 crash 1/20/92, the Mulhouse-Habsheim A320 crash 6/26/88, and the Toulouse A330 crash 6/30/94. These incidents and accidents reveal that pilots sometimes become confused about what the cockpit automation is doing. Consequently, human factors research is an obvious investment area. However, even a cursory look at the accident data reveals that the mode confusion problem is much deeper than just training deficiencies and a lack of human-oriented design. This is readily acknowledged by human factors experts. It seems that further progress in human factors must come through a deeper scrutiny of the internals of the automation. It is in this arena that formal methods can contribute. Formal methods refers to the use of techniques from logic and discrete mathematics in the specification, design, and verification of computer systems, both hardware and software. The fundamental goal of formal methods is to capture requirements, designs and implementations in a mathematically based model that can be analyzed in a rigorous manner. Research in formal methods is aimed at automating this analysis as much as possible. By capturing the internal behavior of a flight deck in a rigorous and detailed formal model, the dark corners of a design can be analyzed. This paper will explore how formal

  5. Re-verification of a Lip Synchronization Protocol using Robust Reachability

    Directory of Open Access Journals (Sweden)

    Piotr Kordy

    2010-03-01

    Full Text Available The timed automata formalism is an important model for specifying and analysing real-time systems. Robustness is the correctness of the model in the presence of small drifts on clocks or imprecision in testing guards. A symbolic algorithm for the analysis of the robustness of timed automata has been implemented. In this paper, we re-analyse an industrial case lip synchronization protocol using the new robust reachability algorithm. This lip synchronization protocol is an interesting case because timing aspects are crucial for the correctness of the protocol. Several versions of the model are considered: with an ideal video stream, with anchored jitter, and with non-anchored jitter.

  6. Application of Quantum Process Calculus to Higher Dimensional Quantum Protocols

    Directory of Open Access Journals (Sweden)

    Simon J. Gay

    2014-07-01

    Full Text Available We describe the use of quantum process calculus to describe and analyze quantum communication protocols, following the successful field of formal methods from classical computer science. We have extended the quantum process calculus to describe d-dimensional quantum systems, which has not been done before. We summarise the necessary theory in the generalisation of quantum gates and Bell states and use the theory to apply the quantum process calculus CQP to quantum protocols, namely qudit teleportation and superdense coding.

  7. Design of a protocol for the use of radiochromic films in IMRT plans control

    International Nuclear Information System (INIS)

    Aberbuj, P.D.

    2011-01-01

    The purpose of this work is to design a protocol for the use of the Gafchromic EBT2 radiochromic films with the Epson CX5600 scanner as dosimetric system for IMRT patient specific quality assurance, with an emphasis on keep the uncertainty below 3%. The studied uncertainty sources are related to the scanner reproducibility, the film and scanner homogeneity, and the dose estimation. By introducing a series of modifications to the initial protocol, the total uncertainty was kept below 3% in the range 30-500 c Gy, being less than 1% between 150 and 500 c Gy. (author)

  8. Toward the elaboration of a Universal Design Protocol in the National University of Córdoba

    Directory of Open Access Journals (Sweden)

    Mauricio Alexei Mareño Sempertegui

    2014-06-01

    Full Text Available This article is aimed at expressing the main aspects of the process of administration of an Urban and Building Protocol of Accessibility based on the principles of Universal Design in the National University of Cordoba in Argentina.The main concepts that form the theoretical structure are outlined, posing the need to overcome traditional conceptions which still remain in the policies of accessibility in regional universities and which are insufficient to guide the design of a respectful intervention of fundamental rights. In this way, the concepts of disability and accessibility should be redefined from a perspective of rights.This institutional protocol has as its main objective the guidance of the design and construction of an urban and building space for this university so it can be useful for all the people in a safe, self-sufficient-unexclusive way. Thus, some essential institutional conditions are outlined to guarantee its effective implementation.

  9. Improving the efficiency of single and multiple teleportation protocols based on the direct use of partially entangled states

    Energy Technology Data Exchange (ETDEWEB)

    Fortes, Raphael; Rigolin, Gustavo, E-mail: rigolin@ifi.unicamp.br

    2013-09-15

    We push the limits of the direct use of partially pure entangled states to perform quantum teleportation by presenting several protocols in many different scenarios that achieve the optimal efficiency possible. We review and put in a single formalism the three major strategies known to date that allow one to use partially entangled states for direct quantum teleportation (no distillation strategies permitted) and compare their efficiencies in real world implementations. We show how one can improve the efficiency of many direct teleportation protocols by combining these techniques. We then develop new teleportation protocols employing multipartite partially entangled states. The three techniques are also used here in order to achieve the highest efficiency possible. Finally, we prove the upper bound for the optimal success rate for protocols based on partially entangled Bell states and show that some of the protocols here developed achieve such a bound. -- Highlights: •Optimal direct teleportation protocols using directly partially entangled states. •We put in a single formalism all strategies of direct teleportation. •We extend these techniques for multipartite partially entangle states. •We give upper bounds for the optimal efficiency of these protocols.

  10. Formal Analysis of BPMN Models Using Event-B

    Science.gov (United States)

    Bryans, Jeremy W.; Wei, Wei

    The use of business process models has gone far beyond documentation purposes. In the development of business applications, they can play the role of an artifact on which high level properties can be verified and design errors can be revealed in an effort to reduce overhead at later software development and diagnosis stages. This paper demonstrates how formal verification may add value to the specification, design and development of business process models in an industrial setting. The analysis of these models is achieved via an algorithmic translation from the de-facto standard business process modeling language BPMN to Event-B, a widely used formal language supported by the Rodin platform which offers a range of simulation and verification technologies.

  11. TRUST: A Successful Formal-Informal Teacher Education Partnership Designed to Improve and Promote Urban Earth Science Education

    Science.gov (United States)

    Sloan, H.; Drantch, K.; Steenhuis, J.

    2006-12-01

    We present an NSF-funded collaborative formal-informal partnership for urban Earth science teacher preparation and professional development. This model brings together The American Museum of Natural History (AMNH) and Brooklyn and Lehman College of the City University of New York (CUNY) to address science-impoverished classrooms that lack highly qualified teachers by focusing on Earth science teacher certification. Project design was based on identified needs in the local communities and schools, careful analysis of content knowledge mastery required for Earth science teacher certification, and existing impediments to certification. The problem-based approach required partners to push policy envelopes and to invent new ways of articulating content and pedagogy at both intra- and inter-institutional levels. One key element of the project is involvement of the local board of education, teachers, and administrators in initial design and ongoing assessment. Project components include formal Earth systems science courses, a summer institute primarily led and delivered by AMNH scientists through an informal series of lectures coupled to workshops led by AMNH educators, a mechanism for assigning course credit for informal experiences, development of new teaching approaches that include teacher action plans and an external program of evaluation. The principal research strand of this project focuses on the resulting model for formal-informal teacher education partnership, the project's impact on participating teachers, policy issues surrounding the model and the changes required for its development and implementation, and its potential for Earth science education reform. As the grant funded portion of the project draws to a close we begin to analyze data collected over the past 3 years. Third-year findings of the project's external evaluation indicate that the problem-based approach has been highly successful, particularly its impact on participating teachers. In addition

  12. Formalizing Darwinism and inclusive fitness theory.

    Science.gov (United States)

    Grafen, Alan

    2009-11-12

    Inclusive fitness maximization is a basic building block for biological contributions to any theory of the evolution of society. There is a view in mathematical population genetics that nothing is caused to be maximized in the process of natural selection, but this is explained as arising from a misunderstanding about the meaning of fitness maximization. Current theoretical work on inclusive fitness is discussed, with emphasis on the author's 'formal Darwinism project'. Generally, favourable conclusions are drawn about the validity of assuming fitness maximization, but the need for continuing work is emphasized, along with the possibility that substantive exceptions may be uncovered. The formal Darwinism project aims more ambitiously to represent in a formal mathematical framework the central point of Darwin's Origin of Species, that the mechanical processes of inheritance and reproduction can give rise to the appearance of design, and it is a fitting ambition in Darwin's bicentenary year to capture his most profound discovery in the lingua franca of science.

  13. Machine Learning-based Intelligent Formal Reasoning and Proving System

    Science.gov (United States)

    Chen, Shengqing; Huang, Xiaojian; Fang, Jiaze; Liang, Jia

    2018-03-01

    The reasoning system can be used in many fields. How to improve reasoning efficiency is the core of the design of system. Through the formal description of formal proof and the regular matching algorithm, after introducing the machine learning algorithm, the system of intelligent formal reasoning and verification has high efficiency. The experimental results show that the system can verify the correctness of propositional logic reasoning and reuse the propositional logical reasoning results, so as to obtain the implicit knowledge in the knowledge base and provide the basic reasoning model for the construction of intelligent system.

  14. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  15. PATIENT-CENTRED SCREENING FOR PRIMARY IMMUNODEFICIENCY, A MULTI-STAGE DIAGNOSTIC PROTOCOL DESIGNED FOR NONIMMUNOLOGISTS: 2011 UPDATE

    Directory of Open Access Journals (Sweden)

    E. de Vries

    2013-01-01

    Full Text Available Abstract. Members of the European Society for Immunodeficiencies (ESID and other colleagues have updated themulti-stage expert-opinion-based diagnostic protocol for non-immunologists incorporating newly defined primary immunodeficiency diseases (PIDs. The protocol presented here aims to increase the awareness of PIDs among doctors working in different fields. Prompt identification of PID is important for prognosis, but this may not be an easy task. The protocol therefore starts from the clinical presentation of the patient. Because PIDs may present at all ages, this protocol is aimed at both adult and paediatric physicians. The multi-stage design allows cost-effective screening for PID of the large number of potential cases in the early phases, with more expensive tests reserved for definitive classification in collaboration with a specialist in the field of immunodeficiency at a later stage.

  16. 30 : 2: A Game Designed to Promote the Cardiopulmonary Resuscitation Protocol

    Directory of Open Access Journals (Sweden)

    Imma Boada

    2016-01-01

    Full Text Available Cardiopulmonary resuscitation (CPR is a first-aid key survival technique used to stimulate breathing and keep blood flowing to the heart. Its effective administration can significantly increase the survival chances of cardiac arrest victims. We propose 30 : 2, a videogame designed to introduce the main steps of the CPR protocol. It is not intended for certification and training purpose. Driven by the 2010 European Resuscitation Council guidelines we have designed a game composed of eight mini games corresponding to the main steps of the protocol. The player acts as a helper and has to solve a different challenge. We present a detailed description of the game creation process presenting the requirements, the design decisions, and the implementation details. In addition, we present some first impressions of our testing users (25 children, five of each age from 8 to 12 years old and 12 males and 13 females. We evaluated clarity of instructions and three settings of the game: the aesthetics of scenarios, the playability, and the enjoyability of each mini game. All games were well punctuated, and there are no significantly differences between their sex. The proposed game can be a suitable tool to disseminate and promote CPR knowledge.

  17. Formalizing Informal Logic

    Directory of Open Access Journals (Sweden)

    Douglas Walton

    2015-12-01

    Full Text Available This paper presents a formalization of informal logic using the Carneades Argumentation System (CAS, a formal, computational model of argument that consists of a formal model of argument graphs and audiences. Conflicts between pro and con arguments are resolved using proof standards, such as preponderance of the evidence. CAS also formalizes argumentation schemes. Schemes can be used to check whether a given argument instantiates the types of argument deemed normatively appropriate for the type of dialogue.

  18. A model-guided symbolic execution approach for network protocol implementations and vulnerability detection.

    Science.gov (United States)

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Formal techniques have been devoted to analyzing whether network protocol specifications violate security policies; however, these methods cannot detect vulnerabilities in the implementations of the network protocols themselves. Symbolic execution can be used to analyze the paths of the network protocol implementations, but for stateful network protocols, it is difficult to reach the deep states of the protocol. This paper proposes a novel model-guided approach to detect vulnerabilities in network protocol implementations. Our method first abstracts a finite state machine (FSM) model, then utilizes the model to guide the symbolic execution. This approach achieves high coverage of both the code and the protocol states. The proposed method is implemented and applied to test numerous real-world network protocol implementations. The experimental results indicate that the proposed method is more effective than traditional fuzzing methods such as SPIKE at detecting vulnerabilities in the deep states of network protocol implementations.

  19. The Stick Design Test on the assessment of older adults with low formal education: evidences of construct, criterion-related and ecological validity.

    Science.gov (United States)

    de Paula, Jonas Jardim; Costa, Mônica Vieira; Bocardi, Matheus Bortolosso; Cortezzi, Mariana; De Moraes, Edgar Nunes; Malloy-Diniz, Leandro Fernandes

    2013-12-01

    The assessment of visuospatial abilities is usually performed by drawing tasks. In patients with very low formal education, the use of these tasks might be biased by their cultural background. The Stick Design Test was developed for the assessment of this population. We aim to expand the test psychometric properties by assessing its construct, criterion-related and ecological validity in older adults with low formal education. Healthy older adults (n = 63) and Alzheimer's disease patients (n = 92) performed the Stick Design Test, Mini-Mental State Examination, Digit Span Forward and the Clock Drawing Test. Their caregivers answered Personal Care and Instrumental Activities of Daily Living). Construct validity was assessed by factor analysis, convergent correlations (with the Clock Drawing Test), and divergent correlations (with Digit Span Forward); criterion-related validity by receiver operating characteristic curve analysis and binary logistic regression; and Ecological validity by correlations with ADL. The test factor structure was composed by one component (R 2 = 64%). Significant correlations with the Clock Drawing Test and Digit Span Forward were found, and the relationship was stronger with the first measure. The test was less associated with formal education than the Clock Drawing Test. It classified about 76% of the participants correctly and had and additive effect with the Mini-Mental State Examination (84% of correct classification). The test also correlated significantly with measures of ADL, suggesting ecological validity. The Stick Design Test shows evidence of construct, criterion-related and ecological validity. It is an interesting alternative to drawing tasks for the assessment of visuospatial abilities.

  20. A protocol for better design, application, and communication of population viability analyses.

    Science.gov (United States)

    Pe'er, Guy; Matsinos, Yiannis G; Johst, Karin; Franz, Kamila W; Turlure, Camille; Radchuk, Viktoriia; Malinowska, Agnieszka H; Curtis, Janelle M R; Naujokaitis-Lewis, Ilona; Wintle, Brendan A; Henle, Klaus

    2013-08-01

    Population viability analyses (PVAs) contribute to conservation theory, policy, and management. Most PVAs focus on single species within a given landscape and address a specific problem. This specificity often is reflected in the organization of published PVA descriptions. Many lack structure, making them difficult to understand, assess, repeat, or use for drawing generalizations across PVA studies. In an assessment comparing published PVAs and existing guidelines, we found that model selection was rarely justified; important parameters remained neglected or their implementation was described vaguely; limited details were given on parameter ranges, sensitivity analysis, and scenarios; and results were often reported too inconsistently to enable repeatability and comparability. Although many guidelines exist on how to design and implement reliable PVAs and standards exist for documenting and communicating ecological models in general, there is a lack of organized guidelines for designing, applying, and communicating PVAs that account for their diversity of structures and contents. To fill this gap, we integrated published guidelines and recommendations for PVA design and application, protocols for documenting ecological models in general and individual-based models in particular, and our collective experience in developing, applying, and reviewing PVAs. We devised a comprehensive protocol for the design, application, and communication of PVAs (DAC-PVA), which has 3 primary elements. The first defines what a useful PVA is; the second element provides a workflow for the design and application of a useful PVA and highlights important aspects that need to be considered during these processes; and the third element focuses on communication of PVAs to ensure clarity, comprehensiveness, repeatability, and comparability. Thereby, DAC-PVA should strengthen the credibility and relevance of PVAs for policy and management, and improve the capacity to generalize PVA findings

  1. The Accent-protocol: a framework for benchmarking and model evaluation

    NARCIS (Netherlands)

    Builtjes, P.J.H.; Grewe, V.; Moussiopoulos, N.; Borrego, C.; Isaksen, I.S.A.; Volz-Thomas, A.

    2011-01-01

    We summarise results from a workshop on “Model Benchmarking and Quality Assurance” of the EU-Network of Excellence ACCENT, including results from other activities (e.g. COST Action 732) and publications. A formalised evaluation protocol is presented, i.e. a generic formalism describing the procedure

  2. Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols

    NARCIS (Netherlands)

    Pettorossi, Alberto; Delzanno, Giorgio; Etalle, Sandro

    2001-01-01

    We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder

  3. Design and Analysis of Secure Routing Protocol for Wireless Sensor Networks

    Science.gov (United States)

    Wang, Jiong; Zhang, Hua

    2017-09-01

    In recent years, with the development of science and technology and the progress of the times, China's wireless network technology has become increasingly prosperous and it plays an important role in social production and life. In this context, in order to further to enhance the stability of wireless network data transmission and security enhancements, the staff need to focus on routing security and carry out related work. Based on this, this paper analyzes the design of wireless sensor based on secure routing protocol.

  4. Design and implementation of an intrusion detection system based on IPv6 protocol

    Science.gov (United States)

    Liu, Bin; Li, Zhitang; Li, Yao; Li, Zhanchun

    2005-11-01

    Network intrusion detection systems (NIDS) are important parts of network security architecture. Although many NIDS have been proposed, there is little effort to expand the current set of NIDS to support IPv6 protocol. This paper presents the design and implementation of a Network-based Intrusion Detection System that supports both IPv6 protocol and IPv4 protocol. It characters rules based logging to perform content pattern matching and detect a variety of attacks and probes from IPv4 and IPv6.There are four primary subsystems to make it up: packet capture, packet decoder, detection engine, and logging and alerting subsystem. A new approach to packet capture that combined NAPI with MMAP is proposed in this paper. The test results show that the efficiency of packet capture can be improved significantly by this method. Several new attack tools for IPv6 have been developed for intrusion detection evaluation. Test shows that more than 20 kinds of IPv6 attacks can be detected by this system and it also has a good performance under heavy traffic load.

  5. Informal work and formal plans

    DEFF Research Database (Denmark)

    Dalsted, Rikke Juul; Hølge-Hazelton, Bibi; Kousgaard, Marius Brostrøm

    2012-01-01

    trajectories. METHODS AND THEORY: An in-depth case study of patient trajectories at a Danish hospital and surrounding municipality using individual interviews with patients. Theory about trajectory and work by Strauss was included. RESULTS: Patients continuously took initiatives to organize their treatment...... and care. They initiated processes in the trajectories, and acquired information, which they used to form their trajectories. Patients presented problems to the healthcare professionals in order to get proper help when needed. DISCUSSION: Work done by patients was invisible and not perceived as work....... The patients' requests were not sufficiently supported in the professional organisation of work or formal planning. Patients' insertion and use of information in their trajectories challenged professional views and working processes. And the design of the formal pathway models limits the patients' active...

  6. Enhancing System Realisation in Formal Model Development

    DEFF Research Database (Denmark)

    Tran-Jørgensen, Peter Würtz Vinther

    and requirements of software extensions targeting Overture. The tools developed in this PhD project have successfully supported three case studies from externally funded projects. The feedback received from the case study work has further helped improve the code generation infrastructure and the tools built using...... implementation. One way to realise the system’s software is by automatically generating it from the formal specification – a technique referred to as code generation. However, in general it is difficult to make guarantees about the correctness of the generated code – especially while requiring automation...... of the steps involved in realising the formal specification. This PhD dissertation investigates ways to improve the automation of the steps involved in realising and validating a system based on a formal specification. The approach aims to develop properly designed software tools which support the integration...

  7. Exploiting formal, non-formal and informal learning when using business games in leadership education

    DEFF Research Database (Denmark)

    Børgesen, Kenneth; Nielsen, Rikke Kristine; Henriksen, Thomas Duus

    2016-01-01

    Purpose This paper aims to address the necessity of allowing non-formal and informal processes to unfold when using business games for leadership development. While games and simulations have long been used in management training and leadership development, emphasis has been placed on the formal...... of the process is not assessed. Practical implications This paper suggests that the use of business games in leadership development should focus more on the processes and activities surrounding the game rather than narrowly focusing on the game. Originality/value This paper suggests a novel approach to using...... parts of the process and especially on the gaming experience. Design/methodology/approach This paper is based on a qualitative study of a French management game on change management, in which the game-based learning process is examined in light of adult learning. Findings This paper concludes that less...

  8. Nuclear power plant human computer interface design incorporating console simulation, operations personnel, and formal evaluation techniques

    International Nuclear Information System (INIS)

    Chavez, C.; Edwards, R.M.; Goldberg, J.H.

    1993-01-01

    New CRT-based information displays which enhance the human machine interface are playing a very important role and are being increasingly used in control rooms since they present a higher degree of flexibility compared to conventional hardwired instrumentation. To prototype a new console configuration and information display system at the Experimental Breeder Reactor II (EBR-II), an iterative process of console simulation and evaluation involving operations personnel is being pursued. Entire panels including selector switches and information displays are simulated and driven by plant dynamical simulations with realistic responses that reproduce the actual cognitive and physical environment. Careful analysis and formal evaluation of operator interaction while using the simulated console will be conducted to determine underlying principles for effective control console design for this particular group of operation personnel. Additional iterations of design, simulation, and evaluation will then be conducted as necessary

  9. The content and role of formal contracts in high-tech alliances

    NARCIS (Netherlands)

    de Jong, Gjalt; Woolthuis, Rosalinde Ja Klein

    2009-01-01

    In this study we investigate the governance structure of innovation processes in high-tech alliances, focusing on the content and role of formal contracts. The design of a formal agreement is one of the most important strategic decisions for alliance partners. Drawing upon transaction cost arguments

  10. Cure Cycle Design Methodology for Fabricating Reactive Resin Matrix Fiber Reinforced Composites: A Protocol for Producing Void-free Quality Laminates

    Science.gov (United States)

    Hou, Tan-Hung

    2014-01-01

    For the fabrication of resin matrix fiber reinforced composite laminates, a workable cure cycle (i.e., temperature and pressure profiles as a function of processing time) is needed and is critical for achieving void-free laminate consolidation. Design of such a cure cycle is not trivial, especially when dealing with reactive matrix resins. An empirical "trial and error" approach has been used as common practice in the composite industry. Such an approach is not only costly, but also ineffective at establishing the optimal processing conditions for a specific resin/fiber composite system. In this report, a rational "processing science" based approach is established, and a universal cure cycle design protocol is proposed. Following this protocol, a workable and optimal cure cycle can be readily and rationally designed for most reactive resin systems in a cost effective way. This design protocol has been validated through experimental studies of several reactive polyimide composites for a wide spectrum of usage that has been documented in the previous publications.

  11. Essential competencies analysis of a training model development for non-formal vocational teachers under the office of the non-formal and informal education in Thailand

    Directory of Open Access Journals (Sweden)

    Chayanopparat Piyanan

    2016-01-01

    Full Text Available Non-formal vocational education provides practical experiences in a particular occupational field to non-formal semi-skilled learners. Non-formal vocational teachers are the key persons to deliver particular occupational knowledge. The essential competencies enhancement for non-sformal vocational teachers will improve teaching performance. The question of the research is what the essential competencies for the nonformal vocational teachers are. The research method was 1 to review related literature, 2 to collect a needs assessment, and 3 to analyse the essential competencies for non-formal vocational teachers. The population includes non-formal vocational teachers at the executive level and nonformal vocational teachers. The results from the essential competencies analysis found that the essential competencies for non-formal vocational teachers consist of 5 capabilities including 1 Adult learning design capability, 2 Adult learning principle application capability, 3 ICT searching capability for teaching preparation, 4 Instructional plan development capability and 5 Instructional media development capability.

  12. Formalized informal learning

    DEFF Research Database (Denmark)

    Levinsen, Karin; Sørensen, Birgitte Holm

    2011-01-01

    and other relevant stakeholders, as well as participant observations in the classroom documented by thick descriptions, formal and informal interviews and focus group interviews. The aim of the study was to explore and identify relations between designs for teaching and learning and the students' learning......This paper presents findings from a large-scale longitudinal, qualitative study - Project ICT and Learning (PIL) - that engaged the participation of eight primary schools in Denmark, and was conducted between 2006 and 2008. The research design was based on action research, involving teachers...... of school subjects within defined learning goals and curricula, along with various implementations of ICT in the pedagogical everyday practice (Levinsen & Sørensen 2008). However, another research strand - the topic of this paper - emerged during the project's life cycle as a consequence of ongoing changes...

  13. Software Components and Formal Methods from a Computational Viewpoint

    OpenAIRE

    Lambertz, Christian

    2012-01-01

    Software components and the methodology of component-based development offer a promising approach to master the design complexity of huge software products because they separate the concerns of software architecture from individual component behavior and allow for reusability of components. In combination with formal methods, the specification of a formal component model of the later software product or system allows for establishing and verifying important system properties in an automatic a...

  14. Exploring the dynamics of formal and informal networks in complex multi-team development projects

    DEFF Research Database (Denmark)

    Kratzer, J.; Gemuenden, H. G.; Lettl, Christopher

    2007-01-01

    The increasing number of complex multi-team projects and the scarcity of knowledge about how to run them successfully, create a need for systematic empirical studies. We attempt to lessen this empirical gap by examining the overlap and structure of formally ascribed design interfaces and informal...... communication networks between participating teams in two complex multi-team projects in the space industry. We study the two projects longitudinally throughout the design and integration phases of product development. There are three major findings. First, formally ascribed design interfaces and informal...... communication networks overlap only marginally. Second, the structure of informal communication remains largely stable in the transition from the design to the integration phase. The third and most intriguing finding is that the weak overlap between formally ascribed design interfaces and the informal...

  15. Making Explicit the Formalism Underlying Evaluation in Music Information Retrieval Research

    DEFF Research Database (Denmark)

    Sturm, Bob L.

    2014-01-01

    We make explicit the formalism underlying evaluation in music information retrieval research. We define a ``system,'' what it means to ``analyze'' one, and make clear the aims, parts, design, execution, interpretation, assumptions and limitations of its ``evaluation.'' We apply this formalism...... to discuss the MIREX automatic mood classification task....

  16. A model-guided symbolic execution approach for network protocol implementations and vulnerability detection.

    Directory of Open Access Journals (Sweden)

    Shameng Wen

    Full Text Available Formal techniques have been devoted to analyzing whether network protocol specifications violate security policies; however, these methods cannot detect vulnerabilities in the implementations of the network protocols themselves. Symbolic execution can be used to analyze the paths of the network protocol implementations, but for stateful network protocols, it is difficult to reach the deep states of the protocol. This paper proposes a novel model-guided approach to detect vulnerabilities in network protocol implementations. Our method first abstracts a finite state machine (FSM model, then utilizes the model to guide the symbolic execution. This approach achieves high coverage of both the code and the protocol states. The proposed method is implemented and applied to test numerous real-world network protocol implementations. The experimental results indicate that the proposed method is more effective than traditional fuzzing methods such as SPIKE at detecting vulnerabilities in the deep states of network protocol implementations.

  17. How to design and write a clinical research protocol in Cosmetic Dermatology*

    Science.gov (United States)

    Bagatin, Ediléia; Miot, Helio A.

    2013-01-01

    Cosmetic Dermatology is a growing subspecialty. High-quality basic science studies have been published; however, few double-blind, randomized controlled clinical trials, which are the major instrument for evidence-based medicine, have been conducted in this area. Clinical research is essential for the discovery of new knowledge, improvement of scientific basis, resolution of challenges, and good clinical practice. Some basic principles for a successful researcher include interest, availability, persistence, and honesty. It is essential to learn how to write a protocol research and to know the international and national regulatory rules. A complete clinical trial protocol should include question, background, objectives, methodology (design, variable description, sample size, randomization, inclusion and exclusion criteria, intervention, efficacy and safety measures, and statistical analysis), consent form, clinical research form, and references. Institutional ethical review board approval and financial support disclosure are necessary. Publication of positive or negative results should be an authors' commitment. PMID:23539006

  18. International Thermonuclear Experimental Reactor (ITER). Engineering Design Activities (EDA). Agreement and protocol 1

    International Nuclear Information System (INIS)

    1992-01-01

    This document contains protocol 1 to the agreement among the European Atomic Energy Community, the government of Japan, the Government of the Russian Federation, and the Government of the United States of America on cooperation in the engineering design activities for the International Thermonuclear Experimental Reactor, which activities shall be conducted under the auspices of the International Atomic Energy Agency

  19. Comparing formal verification approaches of interlocking systems

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Nguyen, Hoang Nga; Roggenbach, Markus

    2016-01-01

    these approaches. As a first step towards this, in this paper we suggest a way to compare different formal approaches for verifying designs of route-based interlocking systems and we demonstrate it on modelling and verification approaches developed within the research groups at DTU/Bremen and at Surrey......The verification of railway interlocking systems is a challenging task, and therefore several research groups have suggested to improve this task by using formal methods, but they use different modelling and verification approaches. To advance this research, there is a need to compare....../Swansea. The focus is on designs that are specified by so-called control tables. The paper can serve as a starting point for further comparative studies. The DTU/Bremen research has been funded by the RobustRailS project granted by Innovation Fund Denmark. The Surrey/Swansea research has been funded by the Safe...

  20. Concrete Security for Entity Recognition: The Jane Doe Protocol

    DEFF Research Database (Denmark)

    Lucks, Stefan; Zenner, Erik; Weimerskirch, Andre

    2008-01-01

    Entity recognition does not ask whether the message is from some entity X, just whether a message is from the same entity as a previous message. This turns turns out to be very useful for low-end devices. The current paper proposes a new protocol – the “Jane Doe Protocol” –, and provides a formal...

  1. 42 CFR 411.380 - When CMS issues a formal advisory opinion.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false When CMS issues a formal advisory opinion. 411.380... Relationships Between Physicians and Entities Furnishing Designated Health Services § 411.380 When CMS issues a formal advisory opinion. (a) CMS considers an advisory opinion to be issued once it has received payment...

  2. Analysis of Formal Methods for Specification of E-Commerce Applications

    Directory of Open Access Journals (Sweden)

    Sadiq Ali Khan

    2016-01-01

    Full Text Available E-commerce based application characteristics portray elevated dynamics while incorporating decentralized nature. Extreme emphasis influencing structural design plus implementation, positions such applications highly appreciated. Significant research articles reveal that, applying formal methods addressing challenges incumbent with E-commerce based applications, contribute towards reliability and robustness obliging the system. Anticipating and designing sturdy e-process and concurrent implementation, allows application behavior extra strength against errors, frauds and hacking, minimizing program faults during application operations. Programmers find extreme difficulty guaranteeing correct processing under all circumstances, however, not impossible. Concealed flaws and errors, triggered only under unexpected and unanticipated scenarios, pilot subtle mistakes and appalling failures. Code authors utilize various formal methods for reducing these flaws. Mentioning prominent methods would include, ASM (Abstract State Machines, B-Method, z-Language, UML (Unified Modelling Language etc. This paper primarily focuses different formal methods applied while deliberating specification and verification techniques for cost effective.

  3. Formality in Brackets

    DEFF Research Database (Denmark)

    Garsten, Christina; Nyqvist, Anette

    Ethnographic work in formal organizations involves learning to recognize the many layers of front stage and back stage of organized life, and to bracket formality. It means to be alert to the fact that what is formal and front stage for one some actors, and in some situations, may in fact be back...... stage and informal for others. Walking the talk, donning the appropriate attire, wearing the proper suit, may be part of what is takes to figure out the code of formal organizational settings – an entrance ticket to the backstage, as it were. Oftentimes, it involves a degree of mimicry, of ‘following...... suits’ (Nyqvist 2013), and of doing ‘ethnography by failure’ (Garsten 2013). In this paper, we explore the layers of informality and formality in our fieldwork experiences among financial investors and policy experts, and discuss how to ethnographically represent embodied fieldwork practices. How do we...

  4. Informal and formal learning of general practitioners

    NARCIS (Netherlands)

    Spaan, Nadia Roos; Dekker, Anne R. J.; van der Velden, Alike W.; de Groot, Esther

    2016-01-01

    Purpose The purpose of this study is to understand the influence of formal learning from a web-based training and informal (workplace) learning afterwards on the behaviour of general practitioners (GPs) with respect to prescription of antibiotics. Design/methodology/approach To obtain insight in

  5. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  6. Automated Verification of Quantum Protocols using MCMAS

    Directory of Open Access Journals (Sweden)

    F. Belardinelli

    2012-07-01

    Full Text Available We present a methodology for the automated verification of quantum protocols using MCMAS, a symbolic model checker for multi-agent systems The method is based on the logical framework developed by D'Hondt and Panangaden for investigating epistemic and temporal properties, built on the model for Distributed Measurement-based Quantum Computation (DMC, an extension of the Measurement Calculus to distributed quantum systems. We describe the translation map from DMC to interpreted systems, the typical formalism for reasoning about time and knowledge in multi-agent systems. Then, we introduce dmc2ispl, a compiler into the input language of the MCMAS model checker. We demonstrate the technique by verifying the Quantum Teleportation Protocol, and discuss the performance of the tool.

  7. A brief overview of NASA Langley's research program in formal methods

    Science.gov (United States)

    1992-01-01

    An overview of NASA Langley's research program in formal methods is presented. The major goal of this work is to bring formal methods technology to a sufficiently mature level for use by the United States aerospace industry. Towards this goal, work is underway to design and formally verify a fault-tolerant computing platform suitable for advanced flight control applications. Also, several direct technology transfer efforts have been initiated that apply formal methods to critical subsystems of real aerospace computer systems. The research team consists of six NASA civil servants and contractors from Boeing Military Aircraft Company, Computational Logic Inc., Odyssey Research Associates, SRI International, University of California at Davis, and Vigyan Inc.

  8. Generalized fragment picking in Rosetta: design, protocols and applications.

    Directory of Open Access Journals (Sweden)

    Dominik Gront

    Full Text Available The Rosetta de novo structure prediction and loop modeling protocols begin with coarse grained Monte Carlo searches in which the moves are based on short fragments extracted from a database of known structures. Here we describe a new object oriented program for picking fragments that greatly extends the functionality of the previous program (nnmake and opens the door for new approaches to structure modeling. We provide a detailed description of the code design and architecture, highlighting its modularity, and new features such as extensibility, total control over the fragment picking workflow and scoring system customization. We demonstrate that the program provides at least as good building blocks for ab-initio structure prediction as the previous program, and provide examples of the wide range of applications that are now accessible.

  9. Formal, Non-Formal and Informal Learning in the Sciences

    Science.gov (United States)

    Ainsworth, Heather L.; Eaton, Sarah Elaine

    2010-01-01

    This research report investigates the links between formal, non-formal and informal learning and the differences between them. In particular, the report aims to link these notions of learning to the field of sciences and engineering in Canada and the United States, including professional development of adults working in these fields. It offers…

  10. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  11. Formal specification level concepts, methods, and algorithms

    CERN Document Server

    Soeken, Mathias

    2015-01-01

    This book introduces a new level of abstraction that closes the gap between the textual specification of embedded systems and the executable model at the Electronic System Level (ESL). Readers will be enabled to operate at this new, Formal Specification Level (FSL), using models which not only allow significant verification tasks in this early stage of the design flow, but also can be extracted semi-automatically from the textual specification in an interactive manner.  The authors explain how to use these verification tasks to check conceptual properties, e.g. whether requirements are in conflict, as well as dynamic behavior, in terms of execution traces. • Serves as a single-source reference to a new level of abstraction for embedded systems, known as the Formal Specification Level (FSL); • Provides a variety of use cases which can be adapted to readers’ specific design flows; • Includes a comprehensive illustration of Natural Language Processing (NLP) techniques, along with examples of how to i...

  12. Active SAmpling Protocol (ASAP) to Optimize Individual Neurocognitive Hypothesis Testing: A BCI-Inspired Dynamic Experimental Design.

    Science.gov (United States)

    Sanchez, Gaëtan; Lecaignard, Françoise; Otman, Anatole; Maby, Emmanuel; Mattout, Jérémie

    2016-01-01

    The relatively young field of Brain-Computer Interfaces has promoted the use of electrophysiology and neuroimaging in real-time. In the meantime, cognitive neuroscience studies, which make extensive use of functional exploration techniques, have evolved toward model-based experiments and fine hypothesis testing protocols. Although these two developments are mostly unrelated, we argue that, brought together, they may trigger an important shift in the way experimental paradigms are being designed, which should prove fruitful to both endeavors. This change simply consists in using real-time neuroimaging in order to optimize advanced neurocognitive hypothesis testing. We refer to this new approach as the instantiation of an Active SAmpling Protocol (ASAP). As opposed to classical (static) experimental protocols, ASAP implements online model comparison, enabling the optimization of design parameters (e.g., stimuli) during the course of data acquisition. This follows the well-known principle of sequential hypothesis testing. What is radically new, however, is our ability to perform online processing of the huge amount of complex data that brain imaging techniques provide. This is all the more relevant at a time when physiological and psychological processes are beginning to be approached using more realistic, generative models which may be difficult to tease apart empirically. Based upon Bayesian inference, ASAP proposes a generic and principled way to optimize experimental design adaptively. In this perspective paper, we summarize the main steps in ASAP. Using synthetic data we illustrate its superiority in selecting the right perceptual model compared to a classical design. Finally, we briefly discuss its future potential for basic and clinical neuroscience as well as some remaining challenges.

  13. Fear of the Formal

    DEFF Research Database (Denmark)

    du Gay, Paul; Lopdrup-Hjorth, Thomas

    Over recent decades, institutions exhibiting high degrees of formality have come in for severe criticism. From the private to the public sector, and across a whole spectrum of actors spanning from practitioners to academics, formal organization is viewed with increasing doubt and skepticism....... In a “Schumpetarian world” (Teece et al., 1997: 509) of dynamic competition and incessant reform, formal organization appears as well suited to survival as a fish out of water. Indeed, formal organization, and its closely overlapping semantic twin bureaucracy, are not only represented as ill suited to the realities...... is that formal organization is an obstacle to be overcome. For that very reason, critics, intellectuals and reformers alike have urged public and private organizations to break out of the stifling straightjacket of formality, to dispense with bureaucracy, and to tear down hierarchies. This could either be done...

  14. Informal and Formal Learning of General Practitioners

    Science.gov (United States)

    Spaan, Nadia Roos; Dekker, Anne R. J.; van der Velden, Alike W.; de Groot, Esther

    2016-01-01

    Purpose: The purpose of this study is to understand the influence of formal learning from a web-based training and informal (workplace) learning afterwards on the behaviour of general practitioners (GPs) with respect to prescription of antibiotics. Design/methodology/approach: To obtain insight in various learning processes, semi-structured…

  15. Design and implementation of embedded Bluetooth software system

    Science.gov (United States)

    Zhou, Zhijian; Zhou, Shujie; Xu, Huimin

    2001-10-01

    This thesis introduces the background knowledge and characteristics of Bluetooth technology. Then it summarizes the architecture and working principle of Bluetooth software. After carefully studying the characteristics of embedded operating system and Bluetooth software, this thesis declared two sets of module about Bluetooth software. Corresponding to these module's characteristics, this thesis introduces the design and implementation of LAN Access and Bluetooth headset. The Headset part introduces a developing method corresponding to the particularity of Bluetooth control software. Although these control software are application entity, the control signaling exchanged between them are regulations according to former definitions and they functions through the interaction of data and control information. These data and control information construct the protocol data unit (PDU), and the former definition can be seen as protocol in fact. This thesis uses the advanced development flow on communication protocol development as reference, a formal method - SDL (Specification and Description Language) - describing, validating and coding manually to C. This method not only reserved the efficiency of manually coded code, but also it ensures the quality of codes. The introduction also involves finite state machine theory while introduces the practical developing method on protocol development with the aid of SDL.

  16. Enhanced just-in-time plus protocol for optical burst switching networks

    Science.gov (United States)

    Rodrigues, Joel J. P. C.; Gregório, José M. B.; Vasilakos, Athanasios V.

    2010-07-01

    We propose a new one-way resource reservation protocol for optical burst switching (OBS) networks, called Enhanced Just-in-Time Plus (E-JIT+). The protocol is described in detail, and its formal specification is presented, following an extended finite state machine approach. The performance evaluation of E-JIT+ is analyzed in comparison with other proposed OBS protocols (JIT+ and E-JIT) for the following network topologies: rings; degree-two, degree-three, and degree-four chordal rings; mesh-torus; NSFNET; ARPANET; FCCN-NET; and the European Optical Network. We evaluate and compare the performance of the different protocols in terms of burst loss probability, taking into account the most important OBS network parameters. It was shown that E-JIT+ performs better than available one-way resource reservation protocols for all the evaluated network topologies. Moreover, the scalability of E-JIT+ was observed, and when the network traffic increases, the burst loss probability also increases, leading to a worse network performance.

  17. A new approach for formal behavioral modeling of protection services in antivirus systems

    OpenAIRE

    Norouzi, Monire; Parsa, Saeed; Mahjur, Ali

    2014-01-01

    Formal method techniques provides a suitable platform for the software development in software systems. Formal methods and formal verification is necessary to prove the correctness and improve performance of software systems in various levels of design and implementation, too. Security Discussion is an important issue in computer systems. Since the antivirus applications have very important role in computer systems security, verifying these applications is very essential and necessary. In thi...

  18. Necessity of Integral Formalism

    International Nuclear Information System (INIS)

    Tao Yong

    2011-01-01

    To describe the physical reality, there are two ways of constructing the dynamical equation of field, differential formalism and integral formalism. The importance of this fact is firstly emphasized by Yang in case of gauge field [Phys. Rev. Lett. 33 (1974) 445], where the fact has given rise to a deeper understanding for Aharonov-Bohm phase and magnetic monopole [Phys. Rev. D 12 (1975) 3845]. In this paper we shall point out that such a fact also holds in general wave function of matter, it may give rise to a deeper understanding for Berry phase. Most importantly, we shall prove a point that, for general wave function of matter, in the adiabatic limit, there is an intrinsic difference between its integral formalism and differential formalism. It is neglect of this difference that leads to an inconsistency of quantum adiabatic theorem pointed out by Marzlin and Sanders [Phys. Rev. Lett. 93 (2004) 160408]. It has been widely accepted that there is no physical difference of using differential operator or integral operator to construct the dynamical equation of field. Nevertheless, our study shows that the Schrödinger differential equation (i.e., differential formalism for wave function) shall lead to vanishing Berry phase and that the Schrödinger integral equation (i.e., integral formalism for wave function), in the adiabatic limit, can satisfactorily give the Berry phase. Therefore, we reach a conclusion: There are two ways of describing physical reality, differential formalism and integral formalism; but the integral formalism is a unique way of complete description. (general)

  19. Pragmatics for formal semantics

    DEFF Research Database (Denmark)

    Danvy, Olivier

    2011-01-01

    This tech talk describes how to write and how to inter-derive formal semantics for sequential programming languages. The progress reported here is (1) concrete guidelines to write each formal semantics to alleviate their proof obligations, and (2) simple calculational tools to obtain a formal...

  20. Industrial use of formal methods formal verification

    CERN Document Server

    Boulanger, Jean-Louis

    2012-01-01

    At present the literature gives students and researchers of the very general books on the formal technics. The purpose of this book is to present in a single book, a return of experience on the used of the "formal technics" (such proof and model-checking) on industrial examples for the transportation domain. This book is based on the experience of people which are completely involved in the realization and the evaluation of safety critical system software based.  The implication of the industrialists allows to raise the problems of confidentiality which could appear and so allow

  1. Formal Design Review Foot Clamp Modification

    International Nuclear Information System (INIS)

    OTEN, T.C.

    2000-01-01

    This report documents the Design Review performed for the foot clamp modification. The report documents the acceptability of the design, identifies the documents that were reviewed, the scope of the review and the members of the review team

  2. Formal Verification -26 ...

    Indian Academy of Sciences (India)

    by testing of the components and successful testing leads to the software being ... Formal verification is based on formal methods which are mathematically based ..... scenario under which a similar error could occur. There are various other ...

  3. Model-based prototyping of an interoperability protocol for mobile ad-hoc networks

    NARCIS (Netherlands)

    Kristensen, L.M.; Westergaard, M.; Norgaard, P.C.; Romijn, J.; Smith, G.; Pol, van de J.

    2005-01-01

    We present an industrial project conducted at Ericsson Danmark A/S, Telebit where formal methods in the form of Coloured Petri Nets (CP-nets or CPNs) have been used for the specification of an interoperability protocol for routing packets between fixed core networks and mobile ad-hoc networks. The

  4. Experiences with Formal Engineering : Model-Based Specification, Implementation and Testing of a Software Bus at Neopost

    NARCIS (Netherlands)

    Sijtema, Marten; Stoelinga, Mariëlle Ida Antoinette; Belinfante, Axel; Marinelli, Lawrence; Salaün, Gwen; Schätz, Bernhard

    We report on the actual industrial use of formal methods during the development of a software bus. At Neopost Inc., we developed the server component of a software bus, called the XBus, using formal methods during the design, validation and testing phase: We modeled our design of the XBus in the

  5. Towards a formal assessment of design literacy

    DEFF Research Database (Denmark)

    Christensen, Kasper Skov; Hjorth, Mikkel; Iversen, Ole Sejer

    2016-01-01

    We present a tool for quantitative assessment of K-12 students' stance towards inquiry as an important part of students' development of design literacy. On a basis of design thinking literature, we position designerly stance towards inquiry as a prerequisite for engaging with wicked problems. The...... is meant to provide educators, leaders, and policy makers with strong arguments for introducing design literacy in K-12 schools, which, we posit, function within in an age of measurement.......We present a tool for quantitative assessment of K-12 students' stance towards inquiry as an important part of students' development of design literacy. On a basis of design thinking literature, we position designerly stance towards inquiry as a prerequisite for engaging with wicked problems....... The Design Literacy (DeL) assessment tool contains design of a qualitative survey question, a coding scheme for assessing aspects of a designerly stance towards inquiry, and a description of how, we have validated the results through a large-scale survey administration in K-12 education. Our DeL tool...

  6. A Comparison of Participation Patterns in Selected Formal, Non-Formal, and Informal Online Learning Environments

    Science.gov (United States)

    Schwier, Richard A.; Seaton, J. X.

    2013-01-01

    Does learner participation vary depending on the learning context? Are there characteristic features of participation evident in formal, non-formal, and informal online learning environments? Six online learning environments were chosen as epitomes of formal, non-formal, and informal learning contexts and compared. Transcripts of online…

  7. Safe bunker designing for the 18 MV Varian 2100 Clinac: a comparison between Monte Carlo simulation based upon data and new protocol recommendations.

    Science.gov (United States)

    Beigi, Manije; Afarande, Fatemeh; Ghiasi, Hosein

    2016-01-01

    The aim of this study was to compare two bunkers designed by only protocols recommendations and Monte Carlo (MC) based upon data derived for an 18 MV Varian 2100Clinac accelerator. High energy radiation therapy is associated with fast and thermal photoneutrons. Adequate shielding against the contaminant neutron has been recommended by IAEA and NCRP new protocols. The latest protocols released by the IAEA (safety report No. 47) and NCRP report No. 151 were used for the bunker designing calculations. MC method based upon data was also derived. Two bunkers using protocols and MC upon data were designed and discussed. From designed door's thickness, the door designed by the MC simulation and Wu-McGinley analytical method was closer in both BPE and lead thickness. In the case of the primary and secondary barriers, MC simulation resulted in 440.11 mm for the ordinary concrete, total concrete thickness of 1709 mm was required. Calculating the same parameters value with the recommended analytical methods resulted in 1762 mm for the required thickness using 445 mm as recommended by TVL for the concrete. Additionally, for the secondary barrier the thickness of 752.05 mm was obtained. Our results showed MC simulation and the followed protocols recommendations in dose calculation are in good agreement in the radiation contamination dose calculation. Difference between the two analytical and MC simulation methods revealed that the application of only one method for the bunker design may lead to underestimation or overestimation in dose and shielding calculations.

  8. Simulation and formal analysis of visual attention

    NARCIS (Netherlands)

    Bosse, T.; Maanen, P.P. van; Treur, J.

    2009-01-01

    In this paper a simulation model for visual attention is discussed and formally analysed. The model is part of the design of an agent-based system that supports a naval officer in its task to compile a tactical picture of the situation in the field. A case study is described in which the model is

  9. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  10. Improving Learner Outcomes in Lifelong Education: Formal Pedagogies in Non-Formal Learning Contexts?

    Science.gov (United States)

    Zepke, Nick; Leach, Linda

    2006-01-01

    This article explores how far research findings about successful pedagogies in formal post-school education might be used in non-formal learning contexts--settings where learning may not lead to formal qualifications. It does this by examining a learner outcomes model adapted from a synthesis of research into retention. The article first…

  11. Modeling and Verification of the Bitcoin Protocol

    Directory of Open Access Journals (Sweden)

    Kaylash Chaudhary

    2015-11-01

    Full Text Available Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double spending, and inspired by its popularity, we would like to investigate the correctness of the Bitcoin protocol. Double spending is an important threat to electronic payment systems. Double spending would happen if one user could force a majority to believe that a ledger without his previous payment is the correct one. We are interested in the probability of success of such a double spending attack, which is linked to the computational power of the attacker. This paper examines the Bitcoin protocol and provides its formalization as an UPPAAL model. The model will be used to show how double spending can be done if the parties in the Bitcoin protocol behave maliciously, and with what probability double spending occurs.

  12. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  13. Standardized terminology for clinical trial protocols based on top-level ontological categories.

    Science.gov (United States)

    Heller, B; Herre, H; Lippoldt, K; Loeffler, M

    2004-01-01

    This paper describes a new method for the ontologically based standardization of concepts with regard to the quality assurance of clinical trial protocols. We developed a data dictionary for medical and trial-specific terms in which concepts and relations are defined context-dependently. The data dictionary is provided to different medical research networks by means of the software tool Onto-Builder via the internet. The data dictionary is based on domain-specific ontologies and the top-level ontology of GOL. The concepts and relations described in the data dictionary are represented in natural language, semi-formally or formally according to their use.

  14. Capturing design knowledge in formal concept definitions

    NARCIS (Netherlands)

    Leeuwen, van J.P.; Vries, de B.; Timmermans, H.J.P.; Vries, de B.

    2000-01-01

    For support of creativity in architectural design, design systems must be provided with information models that are flexible enough to follow the dynamic way of designers in handling early design information. This paper discusses a framework for information modelling using Features that answers this

  15. Formal Modeling and Verification for MVB

    Directory of Open Access Journals (Sweden)

    Mo Xia

    2013-01-01

    Full Text Available Multifunction Vehicle Bus (MVB is a critical component in the Train Communication Network (TCN, which is widely used in most of the modern train techniques of the transportation system. How to ensure security of MVB has become an important issue. Traditional testing could not ensure the system correctness. The MVB system modeling and verification are concerned in this paper. Petri Net and model checking methods are used to verify the MVB system. A Hierarchy Colored Petri Net (HCPN approach is presented to model and simulate the Master Transfer protocol of MVB. Synchronous and asynchronous methods are proposed to describe the entities and communication environment. Automata model of the Master Transfer protocol is designed. Based on our model checking platform M3C, the Master Transfer protocol of the MVB is verified and some system logic critical errors are found. Experimental results show the efficiency of our methods.

  16. Combining Formal, Non-Formal and Informal Learning for Workforce Skill Development

    Science.gov (United States)

    Misko, Josie

    2008-01-01

    This literature review, undertaken for Australian Industry Group, shows how multiple variations and combinations of formal, informal and non-formal learning, accompanied by various government incentives and organisational initiatives (including job redesign, cross-skilling, multi-skilling, diversified career pathways, action learning projects,…

  17. Qualitative simulation in formal process modelling

    International Nuclear Information System (INIS)

    Sivertsen, Elin R.

    1999-01-01

    In relation to several different research activities at the OECD Halden Reactor Project, the usefulness of formal process models has been identified. Being represented in some appropriate representation language, the purpose of these models is to model process plants and plant automatics in a unified way to allow verification and computer aided design of control strategies. The present report discusses qualitative simulation and the tool QSIM as one approach to formal process models. In particular, the report aims at investigating how recent improvements of the tool facilitate the use of the approach in areas like process system analysis, procedure verification, and control software safety analysis. An important long term goal is to provide a basis for using qualitative reasoning in combination with other techniques to facilitate the treatment of embedded programmable systems in Probabilistic Safety Analysis (PSA). This is motivated from the potential of such a combination in safety analysis based on models comprising both software, hardware, and operator. It is anticipated that the research results from this activity will benefit V and V in a wide variety of applications where formal process models can be utilized. Examples are operator procedures, intelligent decision support systems, and common model repositories (author) (ml)

  18. Formal Method of Description Supporting Portfolio Assessment

    Science.gov (United States)

    Morimoto, Yasuhiko; Ueno, Maomi; Kikukawa, Isao; Yokoyama, Setsuo; Miyadera, Youzou

    2006-01-01

    Teachers need to assess learner portfolios in the field of education. However, they need support in the process of designing and practicing what kind of portfolios are to be assessed. To solve the problem, a formal method of describing the relations between the lesson forms and portfolios that need to be collected and the relations between…

  19. Development of the protocol for purification of artemisinin based on combination of commercial and computationally designed adsorbents.

    Science.gov (United States)

    Piletska, Elena V; Karim, Kal; Cutler, Malcolm; Piletsky, Sergey A

    2013-01-01

    A polymeric adsorbent for extraction of the antimalarial drug artemisinin from Artemisia annua L. was computationally designed. This polymer demonstrated a high capacity for artemisinin (120 mg g(-1) ), quantitative recovery (87%) and was found to be an effective material for purification of artemisinin from complex plant matrix. The artemisinin quantification was conducted using an optimised HPLC-MS protocol, which was characterised by high precision and linearity in the concentration range between 0.05 and 2 μg mL(-1) . Optimisation of the purification protocol also involved screening of commercial adsorbents for the removal of waxes and other interfering natural compounds, which inhibit the crystallisation of artemisinin. As a result of a two step-purification protocol crystals of artemisinin were obtained, and artemisinin purity was evaluated as 75%. By performing the second stage of purification twice, the purity of artemisinin can be further improved to 99%. The developed protocol produced high-purity artemisinin using only a few purification steps that makes it suitable for large scale industrial manufacturing process. © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  20. Towards designing energy-efficient routing protocol for wireless mesh networks

    CSIR Research Space (South Africa)

    Dludla, AG

    2009-08-01

    Full Text Available Different studies have proposed number of routing protocols to overcome data transmission challenges. Very few of these protocols consider node energy. In this study, the state of art work from various studies is reviewed and compared based...

  1. Synthesis of FBD-based PLC design from NuSCR formal specification

    International Nuclear Information System (INIS)

    Yoo, Junbeom; Cha, Sungdeok; Kim, Chang Hwoi; Song, Duck Yong

    2005-01-01

    NuSCR is a formal specification language to document requirements for real-time embedded software with nuclear engineering applications in mind. Domain experts actively participated in selecting how to best represent various aspects. It uses tabular notations to specify required computations and automata to document state- or time-dependent behavior. As programmable logic controllers (PLCs) are widely used to implement real-time embedded software, synthesis of PLC code from a formal specification is desirable if transformation rules can be rigorously defined. In addition to improved productivity, results of safety analysis performed on requirements remain valid. In this paper, we demonstrate how NuSCR specification can be translated into semantically equivalent function block diagram (FBD) code. The process, except the initial phase where user provides information on missing or implicit details, is automated. Since executable code can be automatically generated using CASE tools from FBD, much of software development is automated. Proposed technique is currently being used in developing reactor protection system (RPS) for nuclear power plants in Korea, and experience to date has been positive. We demonstrate the proposed approach using the fixed set-point rising trip which is one of the most complex trip logics included in the RPS

  2. Design of a Corporate SDI in Power Sector Using a Formal Model

    Directory of Open Access Journals (Sweden)

    Italo L. Oliveira

    2017-10-01

    Full Text Available Geospatial data are essential for the decision-making process. However, obtaining and keeping such data up to date usually require much time and many financial resources. In order to minimize the production costs and incentivize sharing these data, countries are promoting the implementation of Spatial Data Infrastructures (SDI at the different public administration levels. The International Cartographic Association (ICA proposes a formal model that describes the main concepts of an SDI based on three of the five viewpoints of the Reference Model for Open Distributed Processing (RM-ODP. Afterwards, researchers extended ICA’s model to describe, more properly, the actors, hierarchical relationship and interactions related to the policies that drive an SDI. However, the proposed extensions are semantically inconsistent with the original proposal. Moreover, the use of ICA’s formal model and its extensions has not been assessed yet to specify a corporate-level SDI. This study describes the merger of actors and policies proposed by the ICA and its extensions in order to eliminate differences in the semantics or terminology among them. This unified model was applied to specify a corporate SDI for a large Brazilian corporation, the Minas Gerais Power Company (Companhia Energética de Minas Gerais (Cemig, which is comprised of about 200 companies in the power sector. The case study presents part of the specification of the five RM-ODP viewpoints, i.e., the three viewpoints featured in ICA’s formal model (Enterprise, Information, and Computation and the other two viewpoints that make up the RM-ODP (Engineering and Technology. The adapted ICA’s model proved adequate to describe SDI-Cemig. In addition, the case study may serve as an example of the specification and implementation of new SDIs, not only corporate ones, but also of public agencies at any hierarchical level.

  3. Integrated formal operations plan

    Energy Technology Data Exchange (ETDEWEB)

    Cort, G.; Dearholt, W.; Donahue, S.; Frank, J.; Perkins, B.; Tyler, R.; Wrye, J.

    1994-01-05

    The concept of formal operations (that is, a collection of business practices to assure effective, accountable operations) has vexed the Laboratory for many years. To date most attempts at developing such programs have been based upon rigid, compliance-based interpretations of a veritable mountain of Department of Energy (DOE) orders, directives, notices, and standards. These DOE dictates seldom take the broad view but focus on highly specialized programs isolated from the overall context of formal operations. The result is a confusing array of specific, and often contradictory, requirements that produce a patchwork of overlapping niche programs. This unnecessary duplication wastes precious resources, dramatically increases the complexity of our work processes, and communicates a sense of confusion to our customers and regulators. Coupled with the artificial divisions that have historically existed among the Laboratory`s formal operations organizations (quality assurance, configuration management, records management, training, etc.), this approach has produced layers of increasingly vague and complex formal operations plans, each of which interprets its parent and adds additional requirements of its own. Organizational gridlock ensues whenever an activity attempts to implement these bureaucratic monstrosities. The integrated formal operations plan presented is to establish a set of requirements that must be met by an integrated formal operations program, assign responsibilities for implementation and operation of the program, and specify criteria against which the performance of the program will be measured. The accountable line manager specifies the items, processes, and information (the controlled elements) to which the formal operations program specified applies. The formal operations program is implemented using a graded approach based on the level of importance of the various controlled elements and the scope of the activities in which they are involved.

  4. Formal education of curriculum and instructional designers

    NARCIS (Netherlands)

    McKenney, Susan; Visscher-Voerman, Irene

    2013-01-01

    In practice, few researchers and designers have strong conceptual understanding of the marriage between the design discipline and scientific research traditions. Rather, most have strong exposure to either research methodologies or instructional design methods, theories and/or practices. Within the

  5. Formal Analysis and Design of Supervisor and User Interface Allowing for Non-Deterministic Choices Using Weak Bi-Simulation

    Directory of Open Access Journals (Sweden)

    Shazada Muhammad Umair Khan

    2018-01-01

    Full Text Available In human machine systems, a user display should contain sufficient information to encapsulate expressive and normative human operator behavior. Failure in such system that is commanded by supervisor can be difficult to anticipate because of unexpected interactions between the different users and machines. Currently, most interfaces have non-deterministic choices at state of machine. Inspired by the theories of single user of an interface established on discrete event system, we present a formal model of multiple users, multiple machines, a supervisor and a supervisor machine. The syntax and semantics of these models are based on the system specification using timed automata that adheres to desirable specification properties conducive to solving the non-deterministic choices for usability properties of the supervisor and user interface. Further, the succinct interface developed by applying the weak bi-simulation relation, where large classes of potentially equivalent states are refined into a smaller one, enables the supervisor and user to perform specified task correctly. Finally, the proposed approach is applied to a model of a manufacturing system with several users interacting with their machines, a supervisor with several users and a supervisor with a supervisor machine to illustrate the design procedure of human–machine systems. The formal specification is validated by z-eves toolset.

  6. Integrating semi-formal and formal requirements

    NARCIS (Netherlands)

    Wieringa, Roelf J.; Olivé, Antoni; Dubois, Eric; Pastor, Joan Antoni; Huyts, Sander

    1997-01-01

    In this paper, we report on the integration of informal, semiformal and formal requirements specification techniques. We present a framework for requirements specification called TRADE, within which several well-known semiformal specification techniques are placed. TRADE is based on an analysis of

  7. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks

    Science.gov (United States)

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675

  8. Automated Planning Enables Complex Protocols on Liquid-Handling Robots.

    Science.gov (United States)

    Whitehead, Ellis; Rudolf, Fabian; Kaltenbach, Hans-Michael; Stelling, Jörg

    2018-03-16

    Robotic automation in synthetic biology is especially relevant for liquid handling to facilitate complex experiments. However, research tasks that are not highly standardized are still rarely automated in practice. Two main reasons for this are the substantial investments required to translate molecular biological protocols into robot programs, and the fact that the resulting programs are often too specific to be easily reused and shared. Recent developments of standardized protocols and dedicated programming languages for liquid-handling operations addressed some aspects of ease-of-use and portability of protocols. However, either they focus on simplicity, at the expense of enabling complex protocols, or they entail detailed programming, with corresponding skills and efforts required from the users. To reconcile these trade-offs, we developed Roboliq, a software system that uses artificial intelligence (AI) methods to integrate (i) generic formal, yet intuitive, protocol descriptions, (ii) complete, but usually hidden, programming capabilities, and (iii) user-system interactions to automatically generate executable, optimized robot programs. Roboliq also enables high-level specifications of complex tasks with conditional execution. To demonstrate the system's benefits for experiments that are difficult to perform manually because of their complexity, duration, or time-critical nature, we present three proof-of-principle applications for the reproducible, quantitative characterization of GFP variants.

  9. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  10. Formal System Verification - Extension 2

    Science.gov (United States)

    2012-08-08

    vision of truly trustworthy systems has been to provide a formally verified microkernel basis. We have previously developed the seL4 microkernel...together with a formal proof (in the theorem prover Isabelle/HOL) of its functional correctness [6]. This means that all the behaviours of the seL4 C...source code are included in the high-level, formal specification of the kernel. This work enabled us to provide further formal guarantees about seL4 , in

  11. Psychologist in non-formal education

    OpenAIRE

    Pavićević Miljana S.

    2011-01-01

    Learning is not limited to school time. It starts at birth and continues throughout the entire life. Equally important as formal education there are also non-formal and informal education. Any kind of learning outside the traditional school can be called informal. However, it is not easy to define non-formal education because it is being described differently, for example as an education movement, process, system… Projects and programs implemented under the name of non-formal education are of...

  12. Milrinone and homeostasis to treat cerebral vasospasm associated with subarachnoid hemorrhage: the Montreal Neurological Hospital protocol.

    Science.gov (United States)

    Lannes, Marcelo; Teitelbaum, Jeanne; del Pilar Cortés, Maria; Cardoso, Mauro; Angle, Mark

    2012-06-01

    For the treatment of cerebral vasospasm, current therapies have focused on increasing blood flow through blood pressure augmentation, hypervolemia, the use of intra-arterial vasodilators, and angioplasty of proximal cerebral vessels. Through a large case series, we present our experience of treating cerebral vasospasm with a protocol based on maintenance of homeostasis (correction of electrolyte and glucose disturbances, prevention and treatment of hyperthermia, replacement of fluid losses), and the use of intravenous milrinone to improve microcirculation (the Montreal Neurological Hospital protocol). Our objective is to describe the use milrinone in our practice and the neurological outcomes associated with this approach. Large case series based on the review of all patients diagnosed with delayed ischemic neurologic deficits after aneurysmal subarachnoid hemorrhage between April 1999 and April 2006. 88 patients were followed for a mean time of 44.6 months. An intravenous milrinone infusion was used for a mean of 9.8 days without any significant side effects. No medical complications associated with this protocol were observed. There were five deaths; of the surviving patients, 48.9 % were able to go back to their previous baseline and 75 % had a good functional outcome (modified Rankin scale ≤ 2). A protocol using intravenous milrinone, and the maintenance of homeostasis is simple to use and requires less intensive monitoring and resources than the standard triple H therapy. Despite the obvious limitations of this study's design, we believe that it would be now appropriate to proceed with formal prospective studies of this protocol.

  13. Formal Verification of Continuous Systems

    DEFF Research Database (Denmark)

    Sloth, Christoffer

    2012-01-01

    and the verification procedures should be algorithmically synthesizable. Autonomous control plays an important role in many safety-critical systems. This implies that a malfunction in the control system can have catastrophic consequences, e.g., in space applications where a design flaw can result in large economic...... losses. Furthermore, a malfunction in the control system of a surgical robot may cause death of patients. The previous examples involve complex systems that are required to operate according to complex specifications. The systems cannot be formally verified by modern verification techniques, due...

  14. Topical Roots of Formal Dialectic

    NARCIS (Netherlands)

    Krabbe, Erik C. W.

    Formal dialectic has its roots in ancient dialectic. We can trace this influence in Charles Hamblin's book on fallacies, in which he introduced his first formal dialectical systems. Earlier, Paul Lorenzen proposed systems of dialogical logic, which were in fact formal dialectical systems avant la

  15. Design of a Channel Error Simulator using Virtual Instrument Techniques for the Initial Testing of TCP/IP and SCPS Protocols

    Science.gov (United States)

    Horan, Stephen; Wang, Ru-Hai

    1999-01-01

    There exists a need for designers and developers to have a method to conveniently test a variety of communications parameters for an overall system design. This is no different when testing network protocols as when testing modulation formats. In this report, we discuss a means of providing a networking test device specifically designed to be used for space communications. This test device is a PC-based Virtual Instrument (VI) programmed using the LabVIEW(TM) version 5 software suite developed by National Instruments(TM)TM. This instrument was designed to be portable and usable by others without special, additional equipment. The programming was designed to replicate a VME-based hardware module developed earlier at New Mexico State University (NMSU) and to provide expanded capabilities exceeding the baseline configuration existing in that module. This report describes the design goals for the VI module in the next section and follows that with a description of the design of the VI instrument. This is followed with a description of the validation tests run on the VI. An application of the error-generating VI to networking protocols is then given.

  16. Lending Policies of Informal, Formal, and Semi-formal Lenders: Evidence from Vietnam

    NARCIS (Netherlands)

    Lensink, B.W.; Pham, T.T.T.

    2007-01-01

    This paper compares lending policies of formal, informal and semiformal lenders with respect to household lending in Vietnam. The analysis suggests that the probability of using formal or semiformal credit increases if borrowers provide collateral, a guarantor and/or borrow for business-related

  17. New Computational Approaches for NMR-based Drug Design: A Protocol for Ligand Docking to Flexible Target Sites

    International Nuclear Information System (INIS)

    Gracia, Luis; Speidel, Joshua A.; Weinstein, Harel

    2006-01-01

    NMR-based drug design has met with some success in the last decade, as illustrated in numerous instances by Fesik's ''ligand screening by NMR'' approach. Ongoing efforts to generalize this success have led us to the development of a new paradigm in which quantitative computational approaches are being integrated with NMR derived data and biological assays. The key component of this work is the inclusion of the intrinsic dynamic quality of NMR structures in theoretical models and its use in docking. A new computational protocol is introduced here, designed to dock small molecule ligands to flexible proteins derived from NMR structures. The algorithm makes use of a combination of simulated annealing monte carlo simulations (SA/MC) and a mean field potential informed by the NMR data. The new protocol is illustrated in the context of an ongoing project aimed at developing new selective inhibitors for the PCAF bromodomains that interact with HIV Tat

  18. Concepciones acerca de la maternidad en la educación formal y no formal

    Directory of Open Access Journals (Sweden)

    Alvarado Calderón, Kathia

    2005-06-01

    Full Text Available Este artículo presenta algunos resultados de la investigación desarrollada en el Instituto de Investigación en Educación (INIE, bajo el nombre "Construcción del concepto de maternidad en la educación formal y no formal". Utilizando un enfoque cualitativo de investigación, recurrimos a las técnicas de elaboración de dibujos, entrevistas y grupo focal como recursos para la recolección de la información. De esta manera, podemos acercarnos a las concepciones de la maternidad que utilizan los participantes de las diferentes instancias educativas (formal y no formal con quienes se trabajó. This article presents some results the research developed in the Instituto de Investigación en Educación (INIE, named "Construcción del concepto de maternidad en la educación formal y no formal". It begins with a theoretical analysis about social conceptions regarding motherhood in the occidental societies. Among the techniques for gathering information were thematic drawing, interview and focus group, using a qualitative approach research method. This is followed by a brief summary of main findings. The article concludes with a proposal of future working lines for the deconstruction of the motherhood concept in formal and informal education contexts.

  19. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  20. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    International Nuclear Information System (INIS)

    Xie Qi; Hu Bin; Chen Ke-Fei; Liu Wen-Hao; Tan Xiao

    2015-01-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. (paper)

  1. Time Error Analysis of SOE System Using Network Time Protocol

    International Nuclear Information System (INIS)

    Keum, Jong Yong; Park, Geun Ok; Park, Heui Youn

    2005-01-01

    To find the accuracy of time in the fully digitalized SOE (Sequence of Events) system, we used a formal specification of the Network Time Protocol (NTP) Version 3, which is used to synchronize time keeping among a set of distributed computers. Through constructing a simple experimental environments and experimenting internet time synchronization, we analyzed the time errors of local clocks of SOE system synchronized with a time server via computer networks

  2. Non-formal techniques for requirements elicitation, modeling, and early assessment for services

    NARCIS (Netherlands)

    van der Veer, Gerrit C.; Vyas, Dhaval; Dittmar, A.; Forbig, P.

    2011-01-01

    Designing systems for multiple stakeholders requires frequent collaboration with multiple stakeholders from the start. In many cases at least some stakeholders lack a professional habit of formal modeling. We report observations from two case studies of stakeholder involvement in early design where

  3. Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2015-07-01

    Full Text Available Information technology (IT security has become a major concern due to the growing demand for information and massive development of client/server applications for various types of applications running on modern IT infrastructure. How has security been taken into account and which paradigms are necessary to minimize security issues while increasing efficiency, reducing the influence on transmissions, ensuring protocol independency and achieving substantial performance? We have found cryptography to be an absolute security mechanism for client/server architectures, and in this study, a new security design was developed with the MODBUS protocol, which is considered to offer phenomenal performance for future development and enhancement of real IT infrastructure. This study is also considered to be a complete development because security is tested in almost all ways of MODBUS communication. The computed measurements are evaluated to validate the overall development, and the results indicate a substantial improvement in security that is differentiated from conventional methods.

  4. Developing Formal Correctness Properties from Natural Language Requirements

    Science.gov (United States)

    Nikora, Allen P.

    2006-01-01

    This viewgraph presentation reviews the rationale of the program to transform natural language specifications into formal notation.Specifically, automate generation of Linear Temporal Logic (LTL)correctness properties from natural language temporal specifications. There are several reasons for this approach (1) Model-based techniques becoming more widely accepted, (2) Analytical verification techniques (e.g., model checking, theorem proving) significantly more effective at detecting types of specification design errors (e.g., race conditions, deadlock) than manual inspection, (3) Many requirements still written in natural language, which results in a high learning curve for specification languages, associated tools and increased schedule and budget pressure on projects reduce training opportunities for engineers, and (4) Formulation of correctness properties for system models can be a difficult problem. This has relevance to NASA in that it would simplify development of formal correctness properties, lead to more widespread use of model-based specification, design techniques, assist in earlier identification of defects and reduce residual defect content for space mission software systems. The presentation also discusses: potential applications, accomplishments and/or technological transfer potential and the next steps.

  5. Moving interprofessional learning forward through formal assessment.

    Science.gov (United States)

    Stone, Judy

    2010-04-01

    There is increasing agreement that graduates who finish tertiary education with the full complement of skills and knowledge required for their designated profession are not 'work-ready' unless they also acquire interpersonal, collaborative practice and team-working capabilities. Health workers are unable to contribute to organisational culture in a positive way unless they too attain these capabilities. These capabilities have been shown to improve health care in terms of patient safety, worker satisfaction and health service efficiency. Given the importance of interprofessional learning (IPL) which seeks to address these capabilities, why is IPL not consistently embedded into the education of undergraduates, postgraduates and vocationally qualified personnel through formal assessment? This paper offers an argument for the formal assessment of IPL. It illustrates how the interests of the many stakeholders in IPL can benefit from, and contribute to, the integration of IPL into mainstream professional development and tertiary education. It offers practical examples of assessment in IPL which could drive learning and offer authentic, contextual teaching and learning experiences to undergraduates and health workers alike. Assessment drives learning and without formal assessment IPL will continue to be viewed as an optional topic of little relative importance for learners. In order to make the next step forward, IPL needs to be recognised and endorsed through formal assessment, both at the tertiary education level and within the workplace environment. This is supported by workforce initiatives and tertiary education policy which can be used to specify the capabilities or generic skills necessary for effective teamwork and collaborative practice.

  6. Data Exchange Protocol in Repsail

    Directory of Open Access Journals (Sweden)

    Gucma Maciej

    2017-12-01

    Full Text Available Article presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar. Author shows the basis of the dedicated format of exchange for in board devices.

  7. ASLan++ — A Formal Security Specification Language for Distributed Systems

    DEFF Research Database (Denmark)

    Von Oheimb, David; Mödersheim, Sebastian Alexander

    2010-01-01

    This paper introduces ASLan++, the AVANTSSAR Specification Language. ASLan++ has been designed for formally specifying dynamically composed security-sensitive web services and service-oriented architectures, their associated security policies, as well as their security properties, at both communi...

  8. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  9. Using Integer Clocks to Verify the Timing-Sync Sensor Network Protocol

    Science.gov (United States)

    Huang, Xiaowan; Singh, Anu; Smolka, Scott A.

    2010-01-01

    We use the UPPAAL model checker for Timed Automata to verify the Timing-Sync time-synchronization protocol for sensor networks (TPSN). The TPSN protocol seeks to provide network-wide synchronization of the distributed clocks in a sensor network. Clock-synchronization algorithms for sensor networks such as TPSN must be able to perform arithmetic on clock values to calculate clock drift and network propagation delays. They must be able to read the value of a local clock and assign it to another local clock. Such operations are not directly supported by the theory of Timed Automata. To overcome this formal-modeling obstacle, we augment the UPPAAL specification language with the integer clock derived type. Integer clocks, which are essentially integer variables that are periodically incremented by a global pulse generator, greatly facilitate the encoding of the operations required to synchronize clocks as in the TPSN protocol. With this integer-clock-based model of TPSN in hand, we use UPPAAL to verify that the protocol achieves network-wide time synchronization and is devoid of deadlock. We also use the UPPAAL Tracer tool to illustrate how integer clocks can be used to capture clock drift and resynchronization during protocol execution

  10. IMPLEMENTASI MODEL PEMBELAJARAN INQUIRY TRAINING DALAM PEMBELAJARAN FISIKA UNTUK MENINGKATKAN KEMAMPUAN BERPIKIR FORMAL SISWA

    Directory of Open Access Journals (Sweden)

    D. Nasution

    2015-07-01

    Full Text Available Low ability of formal thinking students caused the learning outcomes they get too low. This study aims to determine the effectiveness of the inquiry learning model training in improving students' ability to think formal. The design was used quasi-experimental "non-equivalent groups pretest-posttest design". Implementation  experimental class learning with inquiry learning model training, control class learning with direct instruction. Data obtained through a formal thinking ability test thinking ability. Learning model efectivity in improving formal thinking ability is determined based on the gain score average which normalized by average difference test of statistic, namely t test. The results of the reasearch found that the inquiry training learning model is more effective in improving students formal thinking ability compared with the direct instruction learning model. The N-gain percentage of formal thinking ability of students in the experiment class in the indicators of hypothetical deductive thinking, combination thinking and reflection thinking are in the medium category, just proportional thinking is the high category. N-gain average percentage of control class for the hypothesis deductive thinking is just in the low category, while the proportional thinking, combination thinking and reflection thinking are in the medium category.Rendahnya kemampuan berpikir formal siswa menyebabkan hasil belajar yang mereka peroleh juga rendah. Penelitian ini bertujuan untuk mengetahui efektivitas  model pembelajaran inquiry training dalam meningkatkan kemampuan berpikir formal  siswa. Disain yang digunakan adalah kuasi eksperimen “non-equivalent groups pretest-posttest design”. Implementasi pembelajaran kelas eksperimen dibelajarkan dengan model pembelajaran inquiry training, kelas kontrol dengan model pembelajaran direct instruction.  Data kemampuan berpikir formal diperoleh melalui tes kemampuan berpikir formal. Efektivitas

  11. BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications

    Directory of Open Access Journals (Sweden)

    Dina Shehada

    2017-01-01

    Full Text Available Mobile agents are smart programs that migrate from one platform to another to perform the user task. Mobile agents offer flexibility and performance enhancements to systems and service real-time applications. However, security in mobile agent systems is a great concern. In this paper, we propose a novel Broadcast based Secure Mobile Agent Protocol (BROSMAP for distributed service applications that provides mutual authentication, authorization, accountability, nonrepudiation, integrity, and confidentiality. The proposed system also provides protection from man in the middle, replay, repudiation, and modification attacks. We proved the efficiency of the proposed protocol through formal verification with Scyther verification tool.

  12. The base of the iceberg: informal learning and its impact on formal and non-formal learning

    OpenAIRE

    Rogers, Alan

    2014-01-01

    The author looks at learning (formal, non-formal and informal) and examines the hidden world of informal (unconscious, unplanned) learning. He points out the importance of informal learning for creating tacit attitudes and values, knowledge and skills which influence (conscious, planned) learning - formal and non-formal. Moreover, he explores the implications of informal learning for educational planners and teachers in the context of lifelong learning. While mainly aimed at adult educators, ...

  13. Development of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-07-01

    The communication protocol, which provide overall communication rules and methods and give ways how to exchange information, is the most important part and it can affect the overall performance of communication network. Therefore, the first step of development of the communication network of an NPP is its own communication protocol design, which conforms to the requirements and characteristics of an NPP I and C. To manage the protocol development process, we establish development procedure and define detail substantive based on the procedure and we examine the adaptability of existing commercial communication protocols to the communication protocol of an NPP I and C. Existing commercial communication protocols based on Information Technology(IT) can be categorized into 3 groups: general commercial communication protocols, industrial communication protocols, military communication protocols. We analyze the design criteria and performance requirements of popular protocols in each group. And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications

  14. Prayer and Adolescence: Can Formal Instruction Make a Difference?

    Science.gov (United States)

    Sigel, Deena

    2016-01-01

    This design experiment in prayer education for Jewish students was motivated by a current educational concern: educating for spirituality and religious practice. Educators are tasked with formally nurturing spirituality (Wright 2001). It is known that attitude to religious observance may change during adolescence (Hyde 1963), thus attitude to…

  15. Security analysis of standards-driven communication protocols for healthcare scenarios.

    Science.gov (United States)

    Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco

    2012-12-01

    The importance of the Electronic Health Record (EHR), that stores all healthcare-related data belonging to a patient, has been recognised in recent years by governments, institutions and industry. Initiatives like the Integrating the Healthcare Enterprise (IHE) have been developed for the definition of standard methodologies for secure and interoperable EHR exchanges among clinics and hospitals. Using the requisites specified by these initiatives, many large scale projects have been set up for enabling healthcare professionals to handle patients' EHRs. The success of applications developed in these contexts crucially depends on ensuring such security properties as confidentiality, authentication, and authorization. In this paper, we first propose a communication protocol, based on the IHE specifications, for authenticating healthcare professionals and assuring patients' safety. By means of a formal analysis carried out by using the specification language COWS and the model checker CMC, we reveal a security flaw in the protocol thus demonstrating that to simply adopt the international standards does not guarantee the absence of such type of flaws. We then propose how to emend the IHE specifications and modify the protocol accordingly. Finally, we show how to tailor our protocol for application to more critical scenarios with no assumptions on the communication channels. To demonstrate feasibility and effectiveness of our protocols we have fully implemented them.

  16. Colon cleansing protocol in children: research conditions vs. clinical practice.

    Science.gov (United States)

    Elitsur, Yoram; Balfaqih, Yaslam; Preston, Deborah

    2018-04-01

     Colon preparation rates are the limiting factor for a successful diagnostic colonoscopy in children. Different colon cleansing protocols have been published for use in children. Unfortunately, the applicability of those published research protocols has not been formally evaluated in routine clinical practice. We investigated the success rate of our previously published colon cleansing protocol as utilized in our clinical practice.  This was a retrospective study. In the clinical practice, the colon cleansing protocol included PEG-3350 at a dose of 2 g/kg/day plus Dulcolax (Bisacodyl, Boehringer Ingelheim, TX USA) 5 mg/day for 2 days. Adequate colon preparation was graded between 1 - 5, as previously described, and grade ≥ 4.0 was considered an adequate preparation. Patients were instructed to complete a questionnaire that included PEG-3350 dose, number of stools per day, consistency of each stool, and side effects (vomiting, abdominal pain). Clinical and endoscopic results were compared between the protocol under research conditions and routine practice.  The success rate of the colon preparation in our clinical practice was similar to the results observed under our research protocol (75 % vs. 73.6 %). Moreover, the total number of stools, stool consistency, and the intubation rate of the terminal ileum were also similar. We concluded, that in our experience, the colon cleansing protocol used under research conditions was effective and appropriate for use in routine clinical practice.  We recommend testing each new protocol under the routine conditions of clinical practice to confirm its applicability for general practitioners.

  17. Transitioning Adolescents and Young Adults With HIV Infection to Adult Care: Pilot Testing the "Movin' Out" Transitioning Protocol.

    Science.gov (United States)

    Maturo, Donna; Powell, Alexis; Major-Wilson, Hannah; Sanchez, Kenia; De Santis, Joseph P; Friedman, Lawrence B

    2015-01-01

    Advances in care and treatment of adolescents/young adults with HIV infection have made survival into adulthood possible, requiring transition to adult care. Researchers have documented that the transition process is challenging for adolescents/young adults. To ensure successful transition, a formal transition protocol is needed. Despite existing research, little quantitative evaluation of the transition process has been conducted. The purpose of the study was to pilot test the "Movin' Out" Transitioning Protocol, a formalized protocol developed to assist transition to adult care. A retrospective medical/nursing record review was conducted with 38 clients enrolled in the "Movin' Out" Transitioning Protocol at a university-based adolescent medicine clinic providing care to adolescents/young adults with HIV infection. Almost half of the participants were able to successfully transition to adult care. Reasons for failure to transition included relocation, attrition, lost to follow-up, and transfer to another adult service. Failure to transition to adult care was not related to adherence issues, X(2) (1, N=38)=2.49, p=.288; substance use, X(2) (1, N=38)=1.71, p=.474; mental health issues, X(2) (1, N=38)=2.23, p=.322; or pregnancy/childrearing, X(2) (1, N=38)=0.00, p=.627). Despite the small sample size, the "Movin' Out" Transitioning Protocol appears to be useful in guiding the transition process of adolescents/young adults with HIV infection to adult care. More research is needed with a larger sample to fully evaluate the "Movin' Out" Transitioning Protocol. Copyright © 2015 Elsevier Inc. All rights reserved.

  18. An improved authenticated key agreement protocol for telecare medicine information system.

    Science.gov (United States)

    Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin

    2016-01-01

    In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.

  19. Formal concept analysis applied to the prediction of additives for galvanizing process

    Directory of Open Access Journals (Sweden)

    J. Klimeš

    2010-04-01

    Full Text Available Formal concept analysis is a new mathematical approach to data analysis, data mining and to discavering patterns in data. The result of the application of the formal concept analysis method to the behavior of the galvanizing of rimmed steel is presented. Effects of additives in the galvanizing process have been correlated to the chemical element properties of the additives. This model may also help to design new alloys as additives in the galvanizing process.

  20. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  1. Formal validation of supervisory energy management systems for microgrids

    DEFF Research Database (Denmark)

    Sugumar, Gayathri; Selvamuthukumaran, R.; Dragicevic, T.

    2017-01-01

    techniques are available in the literature to monitor and control the energy flows among distributed RES in MGs, formal verification of those techniques was not proposed yet. The emphasis of this paper is to design and validate energy management system for a MG which consists of a solar photovoltaic (PV...

  2. Formalized Epistemology, Logic, and Grammar

    Science.gov (United States)

    Bitbol, Michel

    The task of a formal epistemology is defined. It appears that a formal epistemology must be a generalization of "logic" in the sense of Wittgenstein's Tractatus. The generalization is required because, whereas logic presupposes a strict relation between activity and language, this relation may be broken in some domains of experimental enquiry (e.g., in microscopic physics). However, a formal epistemology should also retain a major feature of Wittgenstein's "logic": It must not be a discourse about scientific knowledge, but rather a way of making manifest the structures usually implicit in knowledge-gaining activity. This strategy is applied to the formalism of quantum mechanics.

  3. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol\\'s perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain\\'s fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  4. Landau-Zener evolution under weak measurement: manifestation of the Zeno effect under diabatic and adiabatic measurement protocols

    Science.gov (United States)

    Novelli, Anna; Belzig, Wolfgang; Nitzan, Abraham

    2015-01-01

    The time evolution and the asymptotic outcome of a Landau-Zener-Stueckelberg-Majorana (LZ) process under continuous weak non-selective measurement is analyzed. We compare two measurement protocols in which the populations of either the adiabatic or the non-adiabatic levels are (continuously and weakly) monitored. The weak measurement formalism, described using a Gaussian Kraus operator, leads to a time evolution characterized by a Markovian dephasing process, which, in the non-adiabatic measurement protocol is similar to earlier studies of LZ dynamics in a dephasing environment. Casting the problem in the language of measurement theory makes it possible for us to compare diabatic and adiabatic measurement scenarios, to consider engineered dephasing as a control device and to examine the manifestation of the Zeno effect under the different measurement protocols. In particular, under measurement of the non-adiabatic populations, the Zeno effect is manifested not as a freezing of the measured system in its initial state, but rather as an approach to equal asymptotic populations of the two diabatic states. This behavior can be traced to the way by which the weak measurement formalism behaves in the strong measurement limit, with a built-in relationship between measurement time and strength.

  5. FLIP: An Internetwork Protocol for Supporting Distributed Systems

    NARCIS (Netherlands)

    Kaashoek, M.F.; van Renesse, R.; van Staveren, H.; Tanenbaum, A.S.

    1993-01-01

    Most modern network protocols give adequate support for traditional applications such as file transfer and remote login. Distributed applications, however, have different requirements 1993. Instead of using ad hoc protocols to meet each of the new requirements, we have designed a new protocol,

  6. Toward a Formal Model of Cognitive Synergy

    OpenAIRE

    Goertzel, Ben

    2017-01-01

    "Cognitive synergy" refers to a dynamic in which multiple cognitive processes, cooperating to control the same cognitive system, assist each other in overcoming bottlenecks encountered during their internal processing. Cognitive synergy has been posited as a key feature of real-world general intelligence, and has been used explicitly in the design of the OpenCog cognitive architecture. Here category theory and related concepts are used to give a formalization of the cognitive synergy concept....

  7. Indigenous Knowledge and Education from the Quechua Community to School: Beyond the Formal/Non-Formal Dichotomy

    Science.gov (United States)

    Sumida Huaman, Elizabeth; Valdiviezo, Laura Alicia

    2014-01-01

    In this article, we propose to approach Indigenous education beyond the formal/non-formal dichotomy. We argue that there is a critical need to conscientiously include Indigenous knowledge in education processes from the school to the community; particularly, when formal systems exclude Indigenous cultures and languages. Based on ethnographic…

  8. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  9. Removing Ambiguities of IP Telephony Traffic Using Protocol Scrubbers

    Directory of Open Access Journals (Sweden)

    Bazara I. A. Barry

    2012-10-01

    Full Text Available Network intrusion detection systems (NIDSs face the serious challenge of attacks such as insertion and evasion attacks that are caused by ambiguous network traffic. Such ambiguity comes as a result of the nature of network traffic which includes protocol implementation variations and errors alongside legitimate network traffic. Moreover, attackers can intentionally introduce further ambiguities in the traffic. Consequently, NIDSs need to be aware of these ambiguities when detection is performed and make sure to differentiate between true attacks and protocol implementation variations or errors; otherwise, detection accuracy can be affected negatively. In this paper we present the design and implementation of tools that are called protocol scrubbers whose main functionality is to remove ambiguities from network traffic before it is presented to the NIDS. The proposed protocol scrubbers are designed for session initiation and data transfer protocols in IP telephony systems. They guarantee that the traffic presented to NIDSs is unambiguous by eliminating ambiguous behaviors of protocols using well-designed protocol state machines, and walking through packet headers of protocols to make sure packets will be interpreted in the desired way by the NIDS. The experimental results shown in this paper demonstrate the good quality and applicability of the introduced scrubbers.

  10. Learning Conditions for Non-Formal and Informal Workplace Learning

    Science.gov (United States)

    Kyndt, Eva; Dochy, Filip; Nijs, Hanne

    2009-01-01

    Purpose: The purpose of this research paper is to investigate the presence of learning conditions for non-formal and informal workplace learning in relation to the characteristics of the employee and the organisation he or she works for. Design/methodology/approach: The questionnaire developed by Clauwaert and Van Bree on learning conditions was…

  11. A formal modeling approach for supply chain event management

    NARCIS (Netherlands)

    Liu, R.; Kumar, Akhil; Aalst, van der W.M.P.

    2007-01-01

    As supply chains become more dynamic, there is a need for a sense-and-respond capability to react to events in a real-time manner. In this paper, we propose Petri nets extended with time and color (to represent case data) as a formalism for managing events. We designed seven basic patterns to

  12. The Design of Municipal Web Sites in Spain: A methodological proposal for their analysis

    Directory of Open Access Journals (Sweden)

    Valeriano Piñeiro-Naval

    2017-03-01

    Full Text Available This paper examines the main aspects of the design of Spanish municipal websites: their visual appearance, information architecture and usability. A content analysis, which is a paradigmatic method used in communication research, was performed. One of the main steps of the protocol requires the development of a codebook that, in our case, consists of 41 variables. Likewise, following a strategic and reasoned grouping of some of these variables, we created a Formal Quality Index that was applied to the evaluation of the 500 websites in the study sample.

  13. Concepts of formal concept analysis

    Science.gov (United States)

    Žáček, Martin; Homola, Dan; Miarka, Rostislav

    2017-07-01

    The aim of this article is apply of Formal Concept Analysis on concept of world. Formal concept analysis (FCA) as a methodology of data analysis, information management and knowledge representation has potential to be applied to a verity of linguistic problems. FCA is mathematical theory for concepts and concept hierarchies that reflects an understanding of concept. Formal concept analysis explicitly formalizes extension and intension of a concept, their mutual relationships. A distinguishing feature of FCA is an inherent integration of three components of conceptual processing of data and knowledge, namely, the discovery and reasoning with concepts in data, discovery and reasoning with dependencies in data, and visualization of data, concepts, and dependencies with folding/unfolding capabilities.

  14. Design of PDT protocols using delta-aminolevulinic acid (5ALA)

    Science.gov (United States)

    Jacques, Steven L.; He, Xiao-Yan; Gofstein, Gary

    1993-06-01

    The kinetics of protoporphyrin IX (PPIX) synthesis, bioconversion to other metabolic products, and photobleaching were measured in cell cultures after incubation in media containing the metabolic precursor for heme synthesis, (delta) -aminolevulinic acid (5 ALA). A compartmental model described the kinetics in terms of rate constants for the three processes. The maximum amount of PPIX that can be attained in the cells and the concentration of 5 ALA in the medium that obtains this maximum were determined. Using this information, two dosimetry protocols are outlined which both involve complete photobleaching of the PPIX: (1) the classical acute protocol using maximum 5 ALA to produce maximum PPIX and a light treatment of about 0.5 - 1 hr, and (2) a novel prolonged protocol using continuous low-level 5 ALA delivery to produce only slightly elevated PPIX and an extended light exposure time of over 24 hrs.

  15. Knowledge and skill retention of a mobile phone data collection protocol in rural Liberia.

    Science.gov (United States)

    Munro, Michelle L; Lori, Jody R; Boyd, Carol J; Andreatta, Pamela

    2014-01-01

    With a large number of births occurring outside the formal health system, it is difficult to determine the number of pregnant women in rural regions of Liberia. The exponential growth of mobile phone use in developing countries provides a potential avenue for data collection on maternal and child health in such rural, remote regions. A pre-, post-, and one-year posttest design was used to collect data on knowledge and skill retention for 7 essential items required for mobile phone use among traditional birth attendants (TBAs) trained in a short message service (SMS) texting data collection protocol (N = 99) in rural Liberia. Sixty-three participants (63.6% retention) completed the one-year posttest and displayed evidence of statistically significant knowledge and skill retention in 6 of the 7 tasks (P < .005), including the ability to: 1) turn on the phone, 2) use the mobile phone to make a call, 3) recognize that they have coverage, 4) recognize that the mobile phone is charged, 5) create a SMS text message without help, and 6) send a SMS text message without help. The TBAs continued to have difficulty with more complex tasks such as adding minutes to a phone. The mobile phone data-collection protocol proved feasible with TBAs demonstrating knowledge retention in a one-year posttest; however, clinical significance needs further investigation. The protocol increased communication and collaboration among TBAs, certified midwives, and clinic staff. © 2014 by the American College of Nurse-Midwives.

  16. Y-formalism and b ghost in the non-minimal pure spinor formalism of superstrings

    International Nuclear Information System (INIS)

    Oda, Ichiro; Tonin, Mario

    2007-01-01

    We present the Y-formalism for the non-minimal pure spinor quantization of superstrings. In the framework of this formalism we compute, at the quantum level, the explicit form of the compound operators involved in the construction of the b ghost, their normal-ordering contributions and the relevant relations among them. We use these results to construct the quantum-mechanical b ghost in the non-minimal pure spinor formalism. Moreover we show that this non-minimal b ghost is cohomologically equivalent to the non-covariant b ghost

  17. Systematic review of economic analyses in patient safety: a protocol designed to measure development in the scope and quality of evidence.

    Science.gov (United States)

    Carter, Alexander W; Mandavia, Rishi; Mayer, Erik; Marti, Joachim; Mossialos, Elias; Darzi, Ara

    2017-08-18

    Recent avoidable failures in patient care highlight the ongoing need for evidence to support improvements in patient safety. According to the most recent reviews, there is a dearth of economic evidence related to patient safety. These reviews characterise an evidence gap in terms of the scope and quality of evidence available to support resource allocation decisions. This protocol is designed to update and improve on the reviews previously conducted to determine the extent of methodological progress in economic analyses in patient safety. A broad search strategy with two core themes for original research (excluding opinion pieces and systematic reviews) in 'patient safety' and 'economic analyses' has been developed. Medline, Econlit and National Health Service Economic Evaluation Database bibliographic databases will be searched from January 2007 using a combination of medical subject headings terms and research-derived search terms (see table 1). The method is informed by previous reviews on this topic, published in 2012. Screening, risk of bias assessment (using the Cochrane collaboration tool) and economic evaluation quality assessment (using the Drummond checklist) will be conducted by two independent reviewers, with arbitration by a third reviewer as needed. Studies with a low risk of bias will be assessed using the Drummond checklist. High-quality economic evaluations are those that score >20/35. A qualitative synthesis of evidence will be performed using a data collection tool to capture the study design(s) employed, population(s), setting(s), disease area(s), intervention(s) and outcome(s) studied. Methodological quality scores will be compared with previous reviews where possible. Effect size(s) and estimate uncertainty will be captured and used in a quantitative synthesis of high-quality evidence, where possible. Formal ethical approval is not required as primary data will not be collected. The results will be disseminated through a peer

  18. Geometry and Formal Linguistics.

    Science.gov (United States)

    Huff, George A.

    This paper presents a method of encoding geometric line-drawings in a way which allows sets of such drawings to be interpreted as formal languages. A characterization of certain geometric predicates in terms of their properties as languages is obtained, and techniques usually associated with generative grammars and formal automata are then applied…

  19. Geology and Design: Formal and Rational Connections

    Science.gov (United States)

    Eriksson, S. C.; Brewer, J.

    2016-12-01

    Geological forms and the manmade environment have always been inextricably linked. From the time that Upper Paleolithic man created drawings in the Lascaux Caves in the southwest of France, geology has provided a critical and dramatic spoil for human creativity. This inspiration has manifested itself in many different ways, and the history of architecture is rife with examples of geologically derived buildings. During the early 20th Century, German Expressionist art and architecture was heavily influenced by the natural and often translucent quality of minerals. Architects like Bruno Taut drew and built crystalline forms that would go on to inspire the more restrained Bauhaus movement. Even within the context of Contemporary architecture, geology has been a fertile source for inspiration. Architectural practices across the globe leverage the rationality and grounding found in geology to inform a process that is otherwise dominated by computer-driven parametric design. The connection between advanced design technology and the beautifully realized geo natural forms insures that geology will be a relevant source of architectural inspiration well into the 21st century. The sometimes hidden relationship of geology to the various sub-disciplines of Design such as Architecture, Interiors, Landscape Architecture, and Historic Preservation is explored in relation to curriculum and the practice of design. Topics such as materials, form, history, the cultural and physical landscape, natural hazards, and global design enrich and inform curriculum across the college. Commonly, these help define place-based education.

  20. From Safety Analysis to Formal Specification

    DEFF Research Database (Denmark)

    Hansen, Kirsten Mark; Ravn, Anders P.; Stavridou, Victoria

    1998-01-01

    Software for safety critical systems must deal with the hazards identified bysafety analysis. This paper investigates, how the results of onesafety analysis technique, fault trees, are interpreted as software safetyrequirements to be used in the program design process. We propose thatfault tree...... analysis and program development use the samesystem model. This model is formalized in areal-time, interval logic, based on a conventional dynamic systems modelwith state evolving over time. Fault trees are interpreted astemporal formulas, and it is shown how such formulas can be usedfor deriving safety...

  1. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung; Kazandjieva, Maria A.; Jain, Mayank; Levis, Philip

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol's perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain's fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  2. Biocoder: A programming language for standardizing and automating biology protocols.

    Science.gov (United States)

    Ananthanarayanan, Vaishnavi; Thies, William

    2010-11-08

    Published descriptions of biology protocols are often ambiguous and incomplete, making them difficult to replicate in other laboratories. However, there is increasing benefit to formalizing the descriptions of protocols, as laboratory automation systems (such as microfluidic chips) are becoming increasingly capable of executing them. Our goal in this paper is to improve both the reproducibility and automation of biology experiments by using a programming language to express the precise series of steps taken. We have developed BioCoder, a C++ library that enables biologists to express the exact steps needed to execute a protocol. In addition to being suitable for automation, BioCoder converts the code into a readable, English-language description for use by biologists. We have implemented over 65 protocols in BioCoder; the most complex of these was successfully executed by a biologist in the laboratory using BioCoder as the only reference. We argue that BioCoder exposes and resolves ambiguities in existing protocols, and could provide the software foundations for future automation platforms. BioCoder is freely available for download at http://research.microsoft.com/en-us/um/india/projects/biocoder/. BioCoder represents the first practical programming system for standardizing and automating biology protocols. Our vision is to change the way that experimental methods are communicated: rather than publishing a written account of the protocols used, researchers will simply publish the code. Our experience suggests that this practice is tractable and offers many benefits. We invite other researchers to leverage BioCoder to improve the precision and completeness of their protocols, and also to adapt and extend BioCoder to new domains.

  3. Formal Testing of Correspondence Carrying Software

    NARCIS (Netherlands)

    Bujorianu, M.C.; Bujorianu, L.M.; Maharaj, S.

    2008-01-01

    Nowadays formal software development is characterised by use of multitude formal specification languages. Test case generation from formal specifications depends in general on a specific language, and, moreover, there are competing methods for each language. There is a need for a generic approach to

  4. Formal Physical Therapy May Not Be Necessary After Unicompartmental Knee Arthroplasty: A Randomized Clinical Trial.

    Science.gov (United States)

    Fillingham, Yale A; Darrith, Brian; Lonner, Jess H; Culvern, Chris; Crizer, Meredith; Della Valle, Craig J

    2018-02-21

    The purpose of this randomized clinical trial was to compare formal outpatient physical therapy (PT) and unsupervised home exercises after unicompartmental knee arthroplasty (UKA). Fifty-two patients were randomized to 6 weeks of outpatient PT or an unsupervised home exercise program after UKA. The primary outcome was change in range of motion at 6 weeks with secondary outcomes including total arc of motion, Knee Society Score, Knee Injury and Osteoarthritis Outcome Score Jr, Lower Extremity Functional Scale, and Veterans Rands-12 score. Twenty-five patients received outpatient PT, 22 patients the self-directed exercise program, while 3 patients deviated from the protocol, 1 patient withdrew, and 1 patient was lost to follow-up. There was no difference in the change of range of motion (P = .43) or total arc of motion at 6 weeks (P = .17) between the groups and likewise no significant differences were found in any of the secondary outcomes. Two patients who crossed over from the unsupervised home exercise program to formal outpatient PT within the first 2 weeks postoperatively required a manipulation under anesthesia. Our results suggest self-directed exercises may be appropriate for most patients following UKA. However, there is a subset of patients who may benefit from formal PT. Copyright © 2018 Elsevier Inc. All rights reserved.

  5. Backpressure-based control protocols: design and computational aspects

    NARCIS (Netherlands)

    Miretskiy, D.I.; Scheinhardt, Willem R.W.; Mandjes, M.R.H.

    2009-01-01

    Congestion control in packet-based networks is often realized by feedback protocols. In this paper we assess their performance under a back-pressure mechanism that has been proposed and standardized for Ethernet metropolitan networks. In such a mechanism the service rate of an upstream queue is

  6. Backpressure-based control protocols: Design and computational aspects

    NARCIS (Netherlands)

    Miretskiy, D.I.; Scheinhardt, W.R.W.; Mandjes, M.R.H.

    2009-01-01

    Congestion control in packet-based networks is often realized by feedback protocols. In this paper we assess their performance under a back-pressure mechanism that has been proposed and standardized for Ethernet metropolitan networks. In such a mechanism the service rate of an upstream queue is

  7. Formal modeling of virtual machines

    Science.gov (United States)

    Cremers, A. B.; Hibbard, T. N.

    1978-01-01

    Systematic software design can be based on the development of a 'hierarchy of virtual machines', each representing a 'level of abstraction' of the design process. The reported investigation presents the concept of 'data space' as a formal model for virtual machines. The presented model of a data space combines the notions of data type and mathematical machine to express the close interaction between data and control structures which takes place in a virtual machine. One of the main objectives of the investigation is to show that control-independent data type implementation is only of limited usefulness as an isolated tool of program development, and that the representation of data is generally dictated by the control context of a virtual machine. As a second objective, a better understanding is to be developed of virtual machine state structures than was heretofore provided by the view of the state space as a Cartesian product.

  8. Canonical formalism for relativistic dynamics

    International Nuclear Information System (INIS)

    Penafiel-Nava, V.M.

    1982-01-01

    The possibility of a canonical formalism appropriate for a dynamical theory of isolated relativistic multiparticle systems involving scalar interactions is studied. It is shown that a single time-parameter structure satisfying the requirements of Poincare invariance and simultaneity of the constituents (global tranversality) can not be derived from a homogeneous Lagrangian. The dynamics is deduced initially from a non-homogeneous but singular Lagrangian designed to accommodate the global tranversality constraints with the equaltime plane associated to the total momentum of the system. An equivalent standard Lagrangian is used to generalize the parametrization procedure which is referred to an arbitrary geodesic in Minkowski space. The equations of motion and the definition of center of momentum are invariant with respect to the choice of geodesic and the entire formalism becomes separable. In the original 8N-dimensional phase-space, the symmetries of the Lagrangian give rise to a canonical realization of a fifteen-generator Lie algebra which is projected in the 6N dimensional hypersurface of dynamical motions. The time-component of the total momentum is thus reduced to a neutral element and the canonical Hamiltonian survives as the only generator for time-translations so that the no-interaction theorem becomes inapplicable

  9. Design of an eLearning System for Accreditation of Non-formal Learning

    OpenAIRE

    Kovatcheva , Eugenia; Nikolov , Roumen

    2008-01-01

    This paper deals with issues related to the non-formal learning in vocational education, and the role of ICT for providing appropriate accreditation model in such education. The presented conclusions are based on the Leonardo da Vinci project LeoSPAN. The paper emphasises on the development of a model and a prototype of an adaptive eLearning system that ensures the pre-defined learner outcomes. One of the advantages of the eLearning system is the flexibility for people who upgrade and improve...

  10. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  11. Reciprocal relations between cognitive neuroscience and formal cognitive models: opposites attract?

    NARCIS (Netherlands)

    Forstmann, B.U.; Wagenmakers, E.-J.; Eichele, T.; Brown, S.; Serences, J.T.

    2011-01-01

    Cognitive neuroscientists study how the brain implements particular cognitive processes such as perception, learning, and decision-making. Traditional approaches in which experiments are designed to target a specific cognitive process have been supplemented by two recent innovations. First, formal

  12. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial...... standards used for implementing the service-oriented applications. By doing so, we will be able to not only reason about applications at different levels of abstractions, but also to build a bridge between the views of researchers on formal methods and developers in industry. We apply our approach...... to the financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  13. Experiences with formal engineering: model-based specification, implementation and testing of a software bus at Neopost

    NARCIS (Netherlands)

    Sijtema, M.; Salaün, G.; Schätz, B.; Belinfante, Axel; Stoelinga, Mariëlle Ida Antoinette; Marinelli, L.

    2014-01-01

    We report on the actual industrial use of formal methods during the development of a software bus. During an internship at Neopost Inc., of 14 weeks, we developed the server component of a software bus, called the XBus, using formal methods during the design, validation and testing phase: we modeled

  14. Practice-Oriented Formal Methods to Support the Software Development of Industrial Control Systems

    CERN Document Server

    AUTHOR|(CDS)2088632; Blanco Viñuela, Enrique

    Formal specification and verification methods provide ways to describe requirements precisely and to check whether the requirements are satisfied by the design or the implementation. In other words, they can prevent development faults and therefore improve the quality of the developed systems. These methods are part of the state-of-the-practice in application domains with high criticality, such as avionics, railway or nuclear industry. The situation is different in the industrial control systems domain. As the criticality of the systems is much lower, formal methods are rarely used. The two main obstacles to using formal methods in systems with low- or medium-criticality are performance and usability. Overcoming these obstacles often needs deep knowledge and high effort. Model checking, one of the main formal verification techniques, is computationally difficult, therefore the analysis of non-trivial systems requires special considerations. Furthermore, the mainly academic tools implementing different model c...

  15. Formalizing the concept of sound.

    Energy Technology Data Exchange (ETDEWEB)

    Kaper, H. G.; Tipei, S.

    1999-08-03

    The notion of formalized music implies that a musical composition can be described in mathematical terms. In this article we explore some formal aspects of music and propose a framework for an abstract approach.

  16. Formal Analysis of Domain Models

    National Research Council Canada - National Science Library

    Bharadwaj, Ramesh

    2002-01-01

    Recently, there has been a great deal of interest in the application of formal methods, in particular, precise formal notations and automatic analysis tools for the creation and analysis of requirements specifications (i.e...

  17. Intervention Models of Non-formal Education for the Reintegration of ...

    African Journals Online (AJOL)

    This study examined application of models in the design of non-formal education programmes for capacity building among abused children for societal reintegration. It is observed that various strategies for enhancing capacity building for abused children, most of whom are victims of the maladjustment and inadequacies of ...

  18. REQUIREMENTS PATTERNS FOR FORMAL CONTRACTS IN ARCHITECTURAL ANALYSIS AND DESIGN LANGUAGE (AADL) MODELS

    Science.gov (United States)

    2017-04-17

    because of simultaneous failures in two of the aircrafts braking system . The architecture of the primary Braking System Control Unit (BSCU) is...is a component of the overall Flight Control System (FCS) that compares the measured state of an aircraft (position, speed, and attitude) to the...Cyberphysical Systems , Formal Methods, Requirements Patterns, AADL, Assume Guarantee Reasoning Environment 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF

  19. A Review of Protocol Implementations and Energy Efficient Cross-Layer Design for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Tao Chen

    2012-11-01

    Full Text Available The issues inherent in caring for an ever-increasing aged population has been the subject of endless debate and continues to be a hot topic for political discussion. The use of hospital-based facilities for the monitoring of chronic physiological conditions is expensive and ties up key healthcare professionals. The introduction of wireless sensor devices as part of a Wireless Body Area Network (WBAN integrated within an overall eHealth solution could bring a step change in the remote management of patient healthcare. Sensor devices small enough to be placed either inside or on the human body can form a vital part of an overall health monitoring network. An effectively designed energy efficient WBAN should have a minimal impact on the mobility and lifestyle of the patient. WBAN technology can be deployed within a hospital, care home environment or in the patient’s own home. This study is a review of the existing research in the area of WBAN technology and in particular protocol adaptation and energy efficient cross-layer design. The research reviews the work carried out across various layers of the protocol stack and highlights how the latest research proposes to resolve the various challenges inherent in remote continual healthcare monitoring.

  20. Design and implementation of a telemedicine system using Bluetooth protocol and GSM/GPRS network, for real time remote patient monitoring.

    Science.gov (United States)

    Jasemian, Yousef; Nielsen, Lars Arendt

    2005-01-01

    This paper introduces the design and implementation of a generic wireless and Real-time Multi-purpose Health Care Telemedicine system applying Bluetooth protocol, Global System for Mobile Communications (GSM) and General Packet Radio Service (GPRS). The paper explores the factors that should be considered when evaluating different technologies for application in telemedicine system. The design and implementation of an embedded wireless communication platform utilising Bluetooth protocol is described, and the implementation problems and limitations are investigated. The system is tested and its telecommunication general aspects are verified. The results showed that the system has (97.9 +/- 1.3)% Up-time, 2.5 x 10(-5) Bit Error Rate, 1% Dropped Call Rate, 97.4% Call Success Rate, 5 second transmission delay in average, (3.42 +/- 0.11) kbps throughput, and the system may have application in electrocardiography.

  1. Observing documentary reading by verbal protocol

    Directory of Open Access Journals (Sweden)

    Fujita Mariangela Spotti Lopes

    2003-01-01

    Full Text Available Verifies the applicability to research on indexers' reading strategies of the process observing technique known as Verbal Protocol or Thinking Aloud. This interpretative-qualitative data collecting technique allows the observation of different kinds of process during the progress of different kinds of tasks. Presents a theoretical investigation into "reading" and into formal methodological procedures to observe reading processes. Describes details of the methodological procedures adopted in five case studies with analysis of samples of data. The project adopted three kinds of parameters for data analysis: theoretical, normative, empirical (derived from observations made in the first case study. The results are compared, and important conclusions regarding documentary reading are drawn.

  2. Adolescent Learning in the Zoo: Embedding a Non-Formal Learning Environment to Teach Formal Aspects of Vertebrate Biology

    Science.gov (United States)

    Randler, Christoph; Kummer, Barbara; Wilhelm, Christian

    2012-06-01

    The aim of this study was to assess the outcome of a zoo visit in terms of learning and retention of knowledge concerning the adaptations and behavior of vertebrate species. Basis of the work was the concept of implementing zoo visits as an out-of-school setting for formal, curriculum based learning. Our theoretical framework centers on the self-determination theory, therefore, we used a group-based, hands-on learning environment. To address this questions, we used a treatment—control design (BACI) with different treatments and a control group. Pre-, post- and retention tests were applied. All treatments led to a substantial increase of learning and retention knowledge compared to the control group. Immediately after the zoo visit, the zoo-guide tour provided the highest scores, while after a delay of 6 weeks, the learner-centered environment combined with a teacher-guided summarizing scored best. We suggest incorporating the zoo as an out-of-school environment into formal school learning, and we propose different methods to improve learning in zoo settings.

  3. A Survey of Formal Methods in Software Development

    DEFF Research Database (Denmark)

    Bjørner, Dines

    2012-01-01

    The use of formal methods and formal techniques in industry is steadily growing. In this survey we shall characterise what we mean by software development and by a formal method; briefly overview a history of formal specification languages - some of which are: VDM (Vienna Development Method, 1974...... need for multi-language formalisation (Petri Nets, MSC, StateChart, Temporal Logics); the sociology of university and industry acceptance of formal methods; the inevitability of the use of formal software development methods; while referring to seminal monographs and textbooks on formal methods....

  4. The Integration of Formal and Non-formal Education: The Dutch “brede school”

    Directory of Open Access Journals (Sweden)

    du Bois-Reymond, Manuela

    2009-12-01

    Full Text Available The Dutch “brede school” (BS development originates in the 1990s and has spread unevenly since: quicker in the primary than secondary educational sector. In 2007, there were about 1000 primary and 350 secondary BS schools and it is the intention of the government as well as the individual municipalities to extend that number and make the BS the dominant school form of the near future. In the primary sector, a BS cooperates with crèche and preschool facilities, besides possible other neighborhood partners. The main targets are, first, to enhance educational opportunities, particularly for children with little (western- cultural capital, and secondly to increase women’s labor market participation by providing extra familial care for babies and small children. All primary schools are now obliged to provide such care. In the secondary sector, a BS is less neighborhood-orientated than a primary BS because those schools are bigger and more often located in different buildings. As in the primary sector, there are broad and more narrow BS, the first profile cooperating with many non-formal and other partners and facilities and the second with few. On the whole, there is a wide variety of BS schools, with different profiles and objectives, dependent on the needs and wishes of the initiators and the neighborhood. A BS is always the result of initiatives of the respective school and its partners: parents, other neighborhood associations, municipality etc. BS schools are not enforced by the government although the general trend will be that existing school organizations transform into BS. The integration of formal and non-formal education and learning is more advanced in primary than secondary schools. In secondary education, vocational as well as general, there is a clear dominance of formal education; the non-formal curriculum serves mainly two lines and objectives: first, provide attractive leisure activities and second provide compensatory

  5. Formal and Informal Continuing Education Activities and Athletic Training Professional Practice

    Science.gov (United States)

    Armstrong, Kirk J.; Weidner, Thomas G.

    2010-01-01

    Abstract Context: Continuing education (CE) is intended to promote professional growth and, ultimately, to enhance professional practice. Objective: To determine certified athletic trainers' participation in formal (ie, approved for CE credit) and informal (ie, not approved for CE credit) CE activities and the perceived effect these activities have on professional practice with regard to improving knowledge, clinical skills and abilities, attitudes toward patient care, and patient care itself. Design: Cross-sectional study. Setting: Athletic training practice settings. Patients or Other Participants: Of a geographic, stratified random sample of 1000 athletic trainers, 427 (42.7%) completed the survey. Main Outcome Measure(s): The Survey of Formal and Informal Athletic Training Continuing Education Activities was developed and administered electronically. The survey consisted of demographic characteristics and Likert-scale items regarding CE participation and perceived effect of CE on professional practice. Internal consistency of survey items was determined using the Cronbach α (α  =  0.945). Descriptive statistics were computed for all items. An analysis of variance and dependent t tests were calculated to determine differences among respondents' demographic characteristics and their participation in, and perceived effect of, CE activities. The α level was set at .05. Results: Respondents completed more informal CE activities than formal CE activities. Participation in informal CE activities included reading athletic training journals (75.4%), whereas formal CE activities included attending a Board of Certification–approved workshop, seminar, or professional conference not conducted by the National Athletic Trainers' Association or affiliates or committees (75.6%). Informal CE activities were perceived to improve clinical skills or abilities and attitudes toward patient care. Formal CE activities were perceived to enhance knowledge. Conclusions: More

  6. Designing for Non-Formal Learning

    DEFF Research Database (Denmark)

    Petersson, Eva

    2008-01-01

    Implementation of information technology is evident within different sectors of society such that adoption presents new opportunities in ever-widening circles. Such widespread use includes by, and for, disabled people. Within this community it has been reported that use of IT can augment opportun......Implementation of information technology is evident within different sectors of society such that adoption presents new opportunities in ever-widening circles. Such widespread use includes by, and for, disabled people. Within this community it has been reported that use of IT can augment...... reflect upon how, by questioning the technology as introduced above, interesting paradigms for design become apparent. Certain of these are application- specific and others are more generic. Such paradigms have been subject of limited research which I suggest should be extended to question from a social...

  7. Landau–Zener evolution under weak measurement: manifestation of the Zeno effect under diabatic and adiabatic measurement protocols

    International Nuclear Information System (INIS)

    Novelli, Anna; Belzig, Wolfgang; Nitzan, Abraham

    2015-01-01

    The time evolution and the asymptotic outcome of a Landau–Zener–Stueckelberg–Majorana (LZ) process under continuous weak non-selective measurement is analyzed. We compare two measurement protocols in which the populations of either the adiabatic or the non-adiabatic levels are (continuously and weakly) monitored. The weak measurement formalism, described using a Gaussian Kraus operator, leads to a time evolution characterized by a Markovian dephasing process, which, in the non-adiabatic measurement protocol is similar to earlier studies of LZ dynamics in a dephasing environment. Casting the problem in the language of measurement theory makes it possible for us to compare diabatic and adiabatic measurement scenarios, to consider engineered dephasing as a control device and to examine the manifestation of the Zeno effect under the different measurement protocols. In particular, under measurement of the non-adiabatic populations, the Zeno effect is manifested not as a freezing of the measured system in its initial state, but rather as an approach to equal asymptotic populations of the two diabatic states. This behavior can be traced to the way by which the weak measurement formalism behaves in the strong measurement limit, with a built-in relationship between measurement time and strength. (paper)

  8. Towards a Formal Model of Privacy-Sensitive Dynamic Coalitions

    Directory of Open Access Journals (Sweden)

    Sebastian Bab

    2012-04-01

    Full Text Available The concept of dynamic coalitions (also virtual organizations describes the temporary interconnection of autonomous agents, who share information or resources in order to achieve a common goal. Through modern technologies these coalitions may form across company, organization and system borders. Therefor questions of access control and security are of vital significance for the architectures supporting these coalitions. In this paper, we present our first steps to reach a formal framework for modeling and verifying the design of privacy-sensitive dynamic coalition infrastructures and their processes. In order to do so we extend existing dynamic coalition modeling approaches with an access-control-concept, which manages access to information through policies. Furthermore we regard the processes underlying these coalitions and present first works in formalizing these processes. As a result of the present paper we illustrate the usefulness of the Abstract State Machine (ASM method for this task. We demonstrate a formal treatment of privacy-sensitive dynamic coalitions by two example ASMs which model certain access control situations. A logical consideration of these ASMs can lead to a better understanding and a verification of the ASMs according to the aspired specification.

  9. Formalizing Probabilistic Safety Claims

    Science.gov (United States)

    Herencia-Zapana, Heber; Hagen, George E.; Narkawicz, Anthony J.

    2011-01-01

    A safety claim for a system is a statement that the system, which is subject to hazardous conditions, satisfies a given set of properties. Following work by John Rushby and Bev Littlewood, this paper presents a mathematical framework that can be used to state and formally prove probabilistic safety claims. It also enables hazardous conditions, their uncertainties, and their interactions to be integrated into the safety claim. This framework provides a formal description of the probabilistic composition of an arbitrary number of hazardous conditions and their effects on system behavior. An example is given of a probabilistic safety claim for a conflict detection algorithm for aircraft in a 2D airspace. The motivation for developing this mathematical framework is that it can be used in an automated theorem prover to formally verify safety claims.

  10. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  11. Radio protocols for LTE and LTE-advanced

    CERN Document Server

    Yi, SeungJune; Lee, YoungDae; Park, SungJun; Jung, SungHoon

    2012-01-01

    Provides a unique focus on radio protocols for LTE and LTE-Advanced (LTE-A) Giving readers a valuable understanding of LTE radio protocols, this book covers LTE (Long-Term Evolution) Layer 2/3 radio protocols as well as new features including LTE-Advanced. It is divided into two sections to differentiate between the two technologies' characteristics. The authors systematically explain the design principles and functions of LTE radio protocols during the development of mobile handsets. The book also provides essential knowledge on the interaction between mobile networks a

  12. Augmenting Reality and Formality of Informal and Non-Formal Settings to Enhance Blended Learning

    Science.gov (United States)

    Pérez-Sanagustin, Mar; Hernández-Leo, Davinia; Santos, Patricia; Kloos, Carlos Delgado; Blat, Josep

    2014-01-01

    Visits to museums and city tours have been part of higher and secondary education curriculum activities for many years. However these activities are typically considered "less formal" when compared to those carried out in the classroom, mainly because they take place in informal or non-formal settings. Augmented Reality (AR) technologies…

  13. Superfield formalism

    Indian Academy of Sciences (India)

    dimensional superfields, is a clear signature of the presence of the (anti-)BRST invariance in the original. 4D theory. Keywords. Non-Abelian 1-form gauge theory; Dirac fields; (anti-)Becchi–Roucet–Stora–. Tyutin invariance; superfield formalism; ...

  14. A Review of Communications Protocol for Intelligent Remote Terminal Unit Development

    Directory of Open Access Journals (Sweden)

    Mohd Ruddin Ab. Ghani

    2013-11-01

    Full Text Available This paper reviewed all the possible interfacing communication protocols for remote terminal unit (RTU. Supervisory Control and Data Acquisition (SCADA system is a central station that can communicate with other network using the protocol. Fundamentally, the architectures of all networks are based on the seven layers of open system interconnection (OSI and International Standard Organization (ISO. The objective of designing the protocols is to check the status of all the input and output field devices and send the report according to that status. The corresponding protocol and communication parameters between the connecting devices will be included in designing a complex SCADA system. The available protocols to develop the communication of RTU are Modbus/ASCII, distributed network protocol (DNP3, controller area network (CAN, International Electro-technical Commission (IEC 60870, transmission control protocol/internet protocol (TCP/IP.

  15. MOOC & B-Learning: Students' Barriers and Satisfaction in Formal and Non-Formal Learning Environments

    Science.gov (United States)

    Gutiérrez-Santiuste, Elba; Gámiz-Sánchez, Vanesa-M.; Gutiérrez-Pérez, Jose

    2015-01-01

    The study presents a comparative analysis of two virtual learning formats: one non-formal through a Massive Open Online Course (MOOC) and the other formal through b-learning. We compare the communication barriers and the satisfaction perceived by the students (N = 249) by developing a qualitative analysis using semi-structured questionnaires and…

  16. The development of a model of creative space and its potential for transfer from non-formal to formal education

    Science.gov (United States)

    White, Irene; Lorenzi, Francesca

    2016-12-01

    Creativity has been emerging as a key concept in educational policies since the mid-1990s, with many Western countries restructuring their education systems to embrace innovative approaches likely to stimulate creative and critical thinking. But despite current intentions of putting more emphasis on creativity in education policies worldwide, there is still a relative dearth of viable models which capture the complexity of creativity and the conditions for its successful infusion into formal school environments. The push for creativity is in direct conflict with the results-driven/competitive performance-oriented culture which continues to dominate formal education systems. The authors of this article argue that incorporating creativity into mainstream education is a complex task and is best tackled by taking a systematic and multifaceted approach. They present a multidimensional model designed to help educators in tackling the challenges of the promotion of creativity. Their model encompasses three distinct yet interrelated dimensions of a creative space - physical, social-emotional and critical. The authors use the metaphor of space to refer to the interplay of the three identified dimensions. Drawing on confluence approaches to the theorisation of creativity, this paper exemplifies the development of a model before the background of a growing trend of systems theories. The aim of the model is to be helpful in systematising creativity by offering parameters - derived from the evaluation of an example offered by a non-formal educational environment - for the development of creative environments within mainstream secondary schools.

  17. Formality of the Chinese collective leadership.

    Science.gov (United States)

    Li, Haiying; Graesser, Arthur C

    2016-09-01

    We investigated the linguistic patterns in the discourse of four generations of the collective leadership of the Communist Party of China (CPC) from 1921 to 2012. The texts of Mao Zedong, Deng Xiaoping, Jiang Zemin, and Hu Jintao were analyzed using computational linguistic techniques (a Chinese formality score) to explore the persuasive linguistic features of the leaders in the contexts of power phase, the nation's education level, power duration, and age. The study was guided by the elaboration likelihood model of persuasion, which includes a central route (represented by formal discourse) versus a peripheral route (represented by informal discourse) to persuasion. The results revealed that these leaders adopted the formal, central route more when they were in power than before they came into power. The nation's education level was a significant factor in the leaders' adoption of the persuasion strategy. The leaders' formality also decreased with their increasing age and in-power times. However, the predictability of these factors for formality had subtle differences among the different types of leaders. These results enhance our understanding of the Chinese collective leadership and the role of formality in politically persuasive messages.

  18. Security Protocol Review Method Analyzer(SPRMAN)

    OpenAIRE

    Navaz, A. S. Syed; Narayanan, H. Iyyappa; Vinoth, R.

    2013-01-01

    This Paper is designed using J2EE (JSP, SERVLET), HTML as front end and a Oracle 9i is back end. SPRMAN is been developed for the client British Telecom (BT) UK., Telecom company. Actually the requirement of BT is, they are providing Network Security Related Products to their IT customers like Virtusa,Wipro,HCL etc., This product is framed out by set of protocols and these protocols are been associated with set of components. By grouping all these protocols and components together, product is...

  19. Towards a formal semantics for Ada 9X

    Science.gov (United States)

    Guaspari, David; Mchugh, John; Wolfgang, Polak; Saaltink, Mark

    1995-01-01

    The Ada 9X language precision team was formed during the revisions of Ada 83, with the goal of analyzing the proposed design, identifying problems, and suggesting improvements, through the use of mathematical models. This report defines a framework for formally describing Ada 9X, based on Kahn's 'natural semantics', and applies the framework to portions of the language. The proposals for exceptions and optimization freedoms are also analyzed, using a different technique.

  20. Revealing dynamics and consequences of fit and misfit between formal and informal networks in multi-institutional product development collaborations

    NARCIS (Netherlands)

    Kratzer, J.; Gemuenden, Hans G.; Lettl, Christopher

    The study presents a longitudinal examination about dynamics and consequences of fit and misfit between formally ascribed design interfaces and informal communication networks in two large multi-institutional product development collaborations in space industry. Findings: (1) formally ascribed

  1. 40 years of formal methods

    DEFF Research Database (Denmark)

    Bjørner, Dines; Havelund, Klaus

    2014-01-01

    In this "40 years of formal methods" essay we shall first delineate, Sect. 1, what we mean by method, formal method, computer science, computing science, software engineering, and model-oriented and algebraic methods. Based on this, we shall characterize a spectrum from specification-oriented met...

  2. Dosimetry study comparing NCS report-2 versus IAEA TRS-398 protocol for high energy photon beams

    International Nuclear Information System (INIS)

    Attalaa, E.M.; Khaled, N.E.; Abou Elenein, H.S.; Elsayed, A.A.

    2005-01-01

    In this work a dosimetry study is presented in which the results of absorbed dose determined at reference condition according to the IAEA TRS-398 protocol and the NCS report-2 are compared. The IAEA TRS-398 protocol for absorbed dose calibration is based on ionization chamber having absorbed dose to water calibration factor N d w, while the NCS-2 dosimetry report for absorbed dose calibration is based on an ionization chamber having air- kerma calibration factor N k . This study shows that the absorbed dose which is calculated with The IAEA TRS-398 formalisms is higher than that calculated with NCS report-2 formalisms within range from 0.4 to 0.9% in cobalt-60 beam as sensed by different ionization chambers, and from 0.2 to 1.1% for different higher energy photon beams of 6, 8 and 18 MV. The chambers used are PTW 30001, 30004, and NE-2571; which have calibration factors N k and N d w traceable to the BIPM (Bureau International des Poids et Mesures)

  3. Application analysis of formal beauty in architectural design%建筑设计中形式美感的应用分析

    Institute of Scientific and Technical Information of China (English)

    陈虹

    2016-01-01

    Architectural design success is inseparable from it in the form of beauty, the general laws of the formal beauty is the design of any building can escape the, font in the works of the architectural design, graphics, color, text size, proportion, balance, symmetry, style and so on are important factors influencing architectural design. Therefore, to strengthen the role of beauty of architectural aesthetic form in architectural design research is very necessary.%建筑设计成功离不开它的形式美感,形式美的总规律是任何建筑设计都逃避不了的,在建筑设计作品中字体、图形、色彩、文字的大小、比例、平衡、对称、风格等等都是影响建筑设计的重要因素。因此,加强建筑美感形式美感在建筑设计中的作用的研究是十分必要的。

  4. Simulation and Formal Analysis of Visual Attention in Cognitive Systems

    NARCIS (Netherlands)

    Bosse, T.; Maanen, P.P. van; Treur, J.

    2007-01-01

    In this paper a simulation model for visual attention is discussed and formally analysed. The model is part of the design of a cognitive system which comprises an agent that supports a naval officer in its task to compile a tactical picture of the situation in the field. A case study is described in

  5. Utility of Interactional Strategies in the Study of Formal Operations Reasoning.

    Science.gov (United States)

    Siegler, Robert S.

    This paper argues in favor of using interactional strategies in the study of formal operations reasoning. Interactional designs allow a convergent approach to specifying processes underlying the interaction of variables. In contrast, current methodologies contain two inherent disadvantages: they have limited utility in specifying the processes…

  6. Asymmetrical peer interaction and formal operational development: Dialogue dimensions analysis

    Directory of Open Access Journals (Sweden)

    Stepanović-Ilić Ivana

    2015-01-01

    Full Text Available The main goal of the study is to define dialogue dimensions in order to describe the interaction within peer dyads and potentially connect them with formal operations development in the less competent participants. Its significance is related to rare investigations of this subject in the context of formal operations development and to practical implications regarding peer involvement in education process. The sample included 316 students aged 12 and 14. The research had an experimental design: pre-test, intervention and post-test. In the pre-test and the post-test phases students solved the formal operations test BLOT. According to the pre-test results, 47 dyads were formed where less and more competent students jointly solved tasks from BLOT. Their dialogues were coded by 14 dimensions operationalized for this purpose. Correlations between the dialogue dimensions indicate clearly distinguished positive and negative interaction patterns. There are no connections between dialogue dimensions and progress of less competent adolescents on BLOT in the entire sample, but several are found in the subsamples. Arguments exchange seems to be the most encouraging dialogue feature regarding formal operations development, particularly in older students. This confirms relevant research data and the expectations about peers’ constructive role in fostering cognitive development. [Projekat Ministarstva nauke Republike Srbije, br. 179018: Identification, measurement and development of cognitive and emotional competences important for a society oriented towards European integrations

  7. A Formalization of Linkage Analysis

    DEFF Research Database (Denmark)

    Ingolfsdottir, Anna; Christensen, A.I.; Hansen, Jens A.

    In this report a formalization of genetic linkage analysis is introduced. Linkage analysis is a computationally hard biomathematical method, which purpose is to locate genes on the human genome. It is rooted in the new area of bioinformatics and no formalization of the method has previously been ...

  8. Joint estimation and contention-resolution protocol for wireless random access

    DEFF Research Database (Denmark)

    Stefanovic, Cedomir; Trillingsgaard, Kasper Fløe; Kiilerich Pratas, Nuno

    2013-01-01

    We propose a contention-based random-access protocol, designed for wireless networks where the number of users is not a priori known. The protocol operates in rounds divided into equal-duration slots, performing at the same time estimation of the number of users and resolution of their transmissi......We propose a contention-based random-access protocol, designed for wireless networks where the number of users is not a priori known. The protocol operates in rounds divided into equal-duration slots, performing at the same time estimation of the number of users and resolution...... successive interference cancellation which, coupled with the use of the optimized access probabilities, enables throughputs that are substantially higher than the traditional slotted ALOHA-like protocols. The key feature of the proposed protocol is that the round durations are not a priori set...

  9. Fundamentals of the Pure Spinor Formalism

    CERN Document Server

    Hoogeveen, Joost

    2010-01-01

    This thesis presents recent developments within the pure spinor formalism, which has simplified amplitude computations in perturbative string theory, especially when spacetime fermions are involved. Firstly the worldsheet action of both the minimal and the non-minimal pure spinor formalism is derived from first principles, i.e. from an action with two dimensional diffeomorphism and Weyl invariance. Secondly the decoupling of unphysical states in the minimal pure spinor formalism is proved

  10. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  11. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  12. Optimized UAV Communication Protocol Based on Prior Locations

    OpenAIRE

    Sboui, Lokman; Rabah, Abdullatif

    2015-01-01

    In this paper, we adopt a new communication protocol between the UAV and fixed on-ground nodes. This protocol tends to reduce communication power consumption by stopping communication if the channel is not good to communicate (i.e. far nodes, obstacles, etc.) The communication is performed using the XBee 868M standard and Libelium wapsmotes. Our designed protocol is based on a new communication model that we propose in this paper. The protocole decides wether to communicate or not after compu...

  13. Leibniz' First Formalization of Syllogistics

    DEFF Research Database (Denmark)

    Robering, Klaus

    2014-01-01

    of letters just those which belong to the useful, i.e., valid, modes. The set of codes of valid modes turns out to be a so-called "regular" language (in the sense of formal-language-theory). Leibniz' formalization of syllogistics in his Dissertatio thus contains an estimation of the computational complexity...

  14. Formal verification of reactor process control software using assertion checking environment

    International Nuclear Information System (INIS)

    Sharma, Babita; Balaji, Sowmya; John, Ajith K.; Bhattacharjee, A.K.; Dhodapkar, S.D.

    2005-01-01

    Assertion Checking Environment (ACE) was developed in-house for carrying out formal (rigorous/ mathematical) functional verification of embedded software written in MISRA C. MISRA C is an industrially sponsored safe sub-set of C programming language and is well accepted in the automotive and aerospace industries. ACE uses static assertion checking technique for verification of MISRA C programs. First the functional specifications of the program are derived from the specifications in the form of pre- and post-conditions for each C function. These pre- and post-conditions are then introduced as assertions (formal comments) in the program code. The annotated C code is then formally verified using ACE. In this paper we present our experience of using ACE for the formal verification of process control software of a nuclear reactor. The Software Requirements Document (SRD) contained textual specifications of the process control software. The SRD was used by the designers to draw logic diagrams which were given as input to a code generator. The verification of the generated C code was done at 2 levels viz. (i) verification against specifications derived from logic diagrams, and (ii) verification against specifications derived from SRD. In this work we checked approximately 600 functional specifications of the software having roughly 15000 lines of code. (author)

  15. Formalizing the concept phase of product development

    NARCIS (Netherlands)

    Schuts, M.; Hooman, J.

    2015-01-01

    We discuss the use of formal techniques to improve the concept phase of product realisation. As an industrial application, a new concept of interventional X-ray systems has been formalized, using model checking techniques and the simulation of formal models. cop. Springer International Publishing

  16. Formalization of the classification pattern: survey of classification modeling in information systems engineering.

    Science.gov (United States)

    Partridge, Chris; de Cesare, Sergio; Mitchell, Andrew; Odell, James

    2018-01-01

    Formalization is becoming more common in all stages of the development of information systems, as a better understanding of its benefits emerges. Classification systems are ubiquitous, no more so than in domain modeling. The classification pattern that underlies these systems provides a good case study of the move toward formalization in part because it illustrates some of the barriers to formalization, including the formal complexity of the pattern and the ontological issues surrounding the "one and the many." Powersets are a way of characterizing the (complex) formal structure of the classification pattern, and their formalization has been extensively studied in mathematics since Cantor's work in the late nineteenth century. One can use this formalization to develop a useful benchmark. There are various communities within information systems engineering (ISE) that are gradually working toward a formalization of the classification pattern. However, for most of these communities, this work is incomplete, in that they have not yet arrived at a solution with the expressiveness of the powerset benchmark. This contrasts with the early smooth adoption of powerset by other information systems communities to, for example, formalize relations. One way of understanding the varying rates of adoption is recognizing that the different communities have different historical baggage. Many conceptual modeling communities emerged from work done on database design, and this creates hurdles to the adoption of the high level of expressiveness of powersets. Another relevant factor is that these communities also often feel, particularly in the case of domain modeling, a responsibility to explain the semantics of whatever formal structures they adopt. This paper aims to make sense of the formalization of the classification pattern in ISE and surveys its history through the literature, starting from the relevant theoretical works of the mathematical literature and gradually shifting focus

  17. Performance modeling of neighbor discovery in proactive routing protocols

    Directory of Open Access Journals (Sweden)

    Andres Medina

    2011-07-01

    Full Text Available It is well known that neighbor discovery is a critical component of proactive routing protocols in wireless ad hoc networks. However there is no formal study on the performance of proposed neighbor discovery mechanisms. This paper provides a detailed model of key performance metrics of neighbor discovery algorithms, such as node degree and the distribution of the distance to symmetric neighbors. The model accounts for the dynamics of neighbor discovery as well as node density, mobility, radio and interference. The paper demonstrates a method for applying these models to the evaluation of global network metrics. In particular, it describes a model of network connectivity. Validation of the models shows that the degree estimate agrees, within 5% error, with simulations for the considered scenarios. The work presented in this paper serves as a basis for the performance evaluation of remaining performance metrics of routing protocols, vital for large scale deployment of ad hoc networks.

  18. A survey of formal languages for contracts

    DEFF Research Database (Denmark)

    Hvitved, Tom

    2010-01-01

    In this short paper we present the current status on formal languages and models for contracts. By a formal model is meant an unambiguous and rigorous representation of contracts, in order to enable their automatic validation, execution, and analysis — activates that are collectively referred...... to as contract lifecycle management (CLM). We present a set of formalism requirements, which represent features that any ideal contract model should support, based on which we present a comparative survey of existing contract formalisms....

  19. New Communication Network Protocol for a Data Acquisition System

    Science.gov (United States)

    Uchida, T.; Fujii, H.; Nagasaka, Y.; Tanaka, M.

    2006-02-01

    An event builder based on communication networks has been used in high-energy physics experiments, and various networks have been adopted, for example, IEEE 802.3 (Ethernet), asynchronous transfer mode (ATM), and so on. In particular, Ethernet is widely used because its infrastructure is very cost effective. Many systems adopt standard protocols that are designed for a general network. However, in the case of an event builder, the communication pattern between stations is different from that in a general network. The unique communication pattern causes congestion, and thus makes it difficulty to quantitatively design the network. To solve this problem, we have developed a simple network protocol for a data acquisition (DAQ) system. The protocol is designed to keep the sequence of senders so that no congestion occurs. We implemented the protocol on a small hardware component [a field programmable gate array (FPGA)] and measured the performance, so that it will be ready for a generic DAQ system

  20. Energy Efficiency in Ethernet Passive Optical Networks (EPONs): Protocol Design and Performance Evaluation

    DEFF Research Database (Denmark)

    Yan, Ying; Dittmann, Lars

    2011-01-01

    a suitable wakeup time scheduler at the Optical Line Terminal (OLT). A generic EPON system is considered, which is composed of an OLT and several ONUs that are EMM enabled. An energy consumption optimization problem aimed at saving energy is proposed and two heuristic sleep mode scheduling policies......As concerns about energy consumption grow, the power consumption of the EPON becomes a matter of increasing importance. In respect of energy efficiency, the current standard has no management protocols aiming to reduce power consumption in EPONs. In this paper, we propose an Energy Management...... and guaranteeing the network performance at the same time. Simulation results show that an EMM-based EPON with well designed scheduling disciplines is essential to achieving significant energy saving while meeting the delay constraint....

  1. 20 CFR 702.336 - Formal hearings; new issues.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Formal hearings; new issues. 702.336 Section... Procedures Formal Hearings § 702.336 Formal hearings; new issues. (a) If, during the course of the formal hearing, the evidence presented warrants consideration of an issue or issues not previously considered...

  2. The Interrelatedness of Formal, Non-Formal and Informal Learning: Evidence from Labour Market Program Participants

    Science.gov (United States)

    Cameron, Roslyn; Harrison, Jennifer L.

    2012-01-01

    Definitions, differences and relationships between formal, non-formal and informal learning have long been contentious. There has been a significant change in language and reference from adult education to what amounts to forms of learning categorised by their modes of facilitation. Nonetheless, there is currently a renewed interest in the…

  3. Digital Resource Developments for Mathematics Education Involving Homework across Formal, Non-Formal and Informal Settings

    Science.gov (United States)

    Radovic, Slaviša; Passey, Don

    2016-01-01

    The aim of this paper is to explore further an under-developed area--how drivers of curriculum, pedagogy and assessment conceptions and practices shape the creation and uses of technologically based resources to support mathematics learning across informal, non-formal and formal learning environments. The paper considers: the importance of…

  4. NON-FORMAL EDUCATION, OVEREDUCATION AND WAGES

    OpenAIRE

    SANDRA NIETO; RAÚL RAMOS

    2013-01-01

    Why do overeducated workers participate in non-formal education activities? Do not they suffer from an excess of education? Using microdata from the Spanish sample of the 2007 Adult Education Survey, we have found that overeducated workers participate more than the rest in non-formal education and that they earn higher wages than overeducated workers who did not participate. This result can be interpreted as evidence that non-formal education allows overeducated workers to acquire new abiliti...

  5. An Efficient Causal Group Communication Protocol for Free Scale Peer-to-Peer Networks

    Directory of Open Access Journals (Sweden)

    Grigory Evropeytsev

    2016-08-01

    Full Text Available In peer-to-peer (P2P overlay networks, a group of n (≥2 peer processes have to cooperate with each other. Each peer sends messages to every peer and receives messages from every peer in a group. In group communications, each message sent by a peer is required to be causally delivered to every peer. Most of the protocols designed to ensure causal message order are designed for networks with a plain architecture. These protocols can be adapted to use in free scale and hierarchical topologies; however, the amount of control information is O(n, where n is the number of peers in the system. Some protocols are designed for a free scale or hierarchical networks, but in general they force the whole system to accomplish the same order viewed by a super peer. In this paper, we present a protocol that is specifically designed to work with a free scale peer-to-peer network. By using the information about the network’s architecture and by representing message dependencies on a bit level, the proposed protocol ensures causal message ordering without enforcing super peers order. The designed protocol is simulated and compared with the Immediate Dependency Relation and the Dependency Sequences protocols to show its lower overhead.

  6. Design of a passive UHF RFID tag for the ISO18000-6C protocol

    Energy Technology Data Exchange (ETDEWEB)

    Wang Yao; Wen Guangjun; Mao Wei; He Yanli; Zhu Xueyong, E-mail: wangyao220597@yahoo.com.cn [RFIC Laboratory CICS, School of Communication and Information Engineering, University of Electronic Science and Technology of China, Chengdu 611731 (China)

    2011-05-15

    This paper presents a new fully integrated wide-range UHF passive RFID tag chip design that is compatible with the ISO18000-6C protocol. In order to reduce the die area, an ultra-low power CMOS voltage regulator without resistors and an area-efficient amplitude shift keying demodulator with a novel adaptive average generator are both adopted. A low power clock generator is designed to guarantee the accuracy of the clock under {+-}4%. As the clock gating technology is employed to reduce the power consumption of the baseband processor, the total power consumption of the tag is about 14 {mu}W with a sensitivity of -9.5 dBm. The detection distance can reach about 5 m under 4 W effective isotropic radiated power. The whole tag is fabricated in TSMC 0.18 {mu}m CMOS technology and the chip size is 880 x 880 {mu}m{sup 2}. (semiconductor integrated circuits)

  7. Design of a passive UHF RFID tag for the ISO18000-6C protocol

    International Nuclear Information System (INIS)

    Wang Yao; Wen Guangjun; Mao Wei; He Yanli; Zhu Xueyong

    2011-01-01

    This paper presents a new fully integrated wide-range UHF passive RFID tag chip design that is compatible with the ISO18000-6C protocol. In order to reduce the die area, an ultra-low power CMOS voltage regulator without resistors and an area-efficient amplitude shift keying demodulator with a novel adaptive average generator are both adopted. A low power clock generator is designed to guarantee the accuracy of the clock under ±4%. As the clock gating technology is employed to reduce the power consumption of the baseband processor, the total power consumption of the tag is about 14 μW with a sensitivity of -9.5 dBm. The detection distance can reach about 5 m under 4 W effective isotropic radiated power. The whole tag is fabricated in TSMC 0.18 μm CMOS technology and the chip size is 880 x 880 μm 2 . (semiconductor integrated circuits)

  8. Mathematic-Graphical Formalization of Switch Point Control Circuit Function

    Directory of Open Access Journals (Sweden)

    Juraj Zdansky

    2004-01-01

    Full Text Available This article describes authors designed method then enables mathematic – graphical formalization of system’s functional specification. The result of this method is algebraic system – finite automata that is written in transition table. This transition table is possible to overwrite to graphic form (state diagram or to mathematic form (transition and output function. This method is described by example of switch point control circuit.

  9. Adjusting game difficulty level through Formal Concept Analysis

    Science.gov (United States)

    Gómez-Martín, Marco A.; Gómez-Martín, Pedro P.; Gonzâlez-Calero, Pedro A.; Díaz-Agudo, Belén

    In order to reach as many players as possible, videogames usually allow the user to choose the difficulty level. To do it, game designers have to decide the values that some game parameters will have depending on that decision. In simple videogames this is almost trivial: minesweeper is harder with longer board sizes and number of mines. In more complex games, game designers may take advantage of data mining to establish which of all the possible parameters will affect positively to the player experience. This paper describes the use of Formal Concept Analysis to help to balance the game using the logs obtained in the tests made prior the release of the game.

  10. 40 CFR 35.938-4 - Formal advertising.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Formal advertising. 35.938-4 Section 35... advertising. Each contract shall be awarded after formal advertising, unless negotiation is permitted in accordance with § 35.936-18. Formal advertising shall be in accordance with the following: (a) Adequate...

  11. Analytical software design : introduction and industrial experience report

    NARCIS (Netherlands)

    Osaiweran, A.A.H.; Boosten, M.; Mousavi, M.R.

    2010-01-01

    Analytical Software Design (ASD) is a design approach that combines formal and empirical methods for developing mathematically verified software systems. Unlike conventional design methods, the design phase is extended with more formal techniques, so that flaws are detected earlier, thereby reducing

  12. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    Science.gov (United States)

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  13. Seniority in projection operator formalism

    International Nuclear Information System (INIS)

    Ullah, N.

    1976-01-01

    It is shown that the concept of seniority can be introduced in projection operator formalism through the use of the operator Q, which has been defined by de-Shalit and Talmi. The usefulness of seniority concept in projection operator formalism is discussed. An example of four nucleons in j=3/2 configuration is given for illustrative purposes

  14. A Mathematical Formalization Proposal for Business Growth

    Directory of Open Access Journals (Sweden)

    Gheorghe BAILESTEANU

    2013-01-01

    Full Text Available Economic sciences have known a spectacular evolution in the last century; beginning to use axiomatic methods, applying mathematical instruments as a decision-making tool. The quest to formalization needs to be addressed from various different angles, reducing entry and operating formal costs, increasing the incentives for firms to operate formally, reducing obstacles to their growth, and searching for inexpensive approaches through which to enforce compliancy with government regulations. This paper proposes a formalized approach to business growth, based on mathematics and logics, taking into consideration the particularities of the economic sector.

  15. What Determines Firms’ Decisions to Formalize?

    OpenAIRE

    Neil McCulloch; Günther G. Schulze; Janina Voss

    2010-01-01

    In this paper we analyze the decision of small and micro firms to formalize, i.e. to obtain business and other licenses in rural Indonesia. We use the rural investment climate survey (RICS) that consists of non-farm rural enterprises, most of them microenterprises, and analyze the effect of formalization on tax payments, corruption, access to credit and revenue, taking into account the endogeneity of the formalization decision to such benefits and costs. We show, contrary to most of the liter...

  16. Designing protocols for the human teeth biobank of the Universidad Nacional de Colombia

    Directory of Open Access Journals (Sweden)

    Lina Constanza Gonzáles-Pita

    2014-07-01

    Full Text Available Protocols in a Tooth Bank are essential in order to assure smooth operation, reproducibility and standardization that minimize cross contamination, maintain original characteristics and physicochemical properties of teeth, fulll ethical and legal regulations and a proper disposal of residues. Objective: to propose the disinfection, storing and transportation protocols for the UNTB. Methods: A literature search was conducted using the words “teeth, human, tooth bank, disinfection, sterilization, storage, organization, biosecurity, biobank, protocol, prevention” in the Pubmed, Science Direct and Scielo databases. 37 papers ranging from 1988 up to 2014 were selected. International and Colombian ethical and legal regulations for organ donation, handling and investigation were taken into account as well as laboratory observations and chemical basic principles gained through several undergraduate and graduate thesis. All this input was carefully studied, analysed and critically modied for setting the recommended processes for the conversion of donated teeth into organs suitable for research. Results: Collection, transportation, cleaning/disinfection and storing protocols were planned and elaborated. Conclusions: Based on scientic literature, national and international regulations and experimental experience, several protocols for the UNTB were presented.

  17. Lifelong Learning to Empowerment: Beyond Formal Education

    Science.gov (United States)

    Carr, Alexis; Balasubramanian, K.; Atieno, Rosemary; Onyango, James

    2018-01-01

    This paper discusses the relevance of lifelong learning vis-à-vis the Sustainable Development Goals (SDGs) and stresses the need for an approach blending formal education, non-formal and informal learning. The role of Open and Distance Learning (ODL) in moving beyond formal education and the importance of integrating pedagogy, andragogy and…

  18. Design and application of a formal verification tool for VHDL designs

    International Nuclear Information System (INIS)

    John, Ajith K.; Bhattacharjee, A.K.; Sharma, Mukesh; Ganesh, G.; Dhodapkar, S.D.; Biswas, B.B.

    2012-01-01

    The design of Control and Instrumentation (C and I) systems used in safety critical applications such as nuclear power plants involves partitioning of the overall system functionality into subparts and implementing each subpart in hardware and/or software as appropriate. With increasing use of programmable devices like FPGA, the hardware subsystems are often implemented in Hardware Description Languages (HDL) like VHDL. Since the functional bugs in such hardware subsystems used in safety critical C and I systems have disastrous consequences, it is important to use rigorous reasoning to verify the functionalities of the HDL models. Work on developing a software tool named VBMC (VHDL Bounded Model Checker) for mathematically proving functional properties of hardware designs described in VHDL has been described. It is based on the principle of bounded model checking. Although the design of VBMC is still evolving, it is currently also being used for the functional verification of FPGA based intelligent I/O (EHS) boards developed in Reactor Control Division, BARC

  19. Carbon Capture and Storage and the London Protocol

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    The International Energy Agency (IEA) estimates that 100 Carbon Capture and Storage (CCS) projects will be required by 2020 and over 3000 by 2050 if CCS is to contribute fully to the least-cost technology portfolio for CO2 mitigation. For CCS to reach its emissions reduction potential, the 2009 IEA publication Technology Roadmap: Carbon Capture and Storage recommends that international legal obstacles associated with global CCS deployment be removed by 2012 -- including the prohibition on transboundary CO2 transfer under the London Protocol. The London Protocol was amended by contracting parties in 2009 to allow for cross-border transportation of CO2 for sub-seabed storage, but the amendment must be ratified by two-thirds of contracting parties to enter into force. It is unlikely that this will occur in the near term; this working paper therefore outlines options that may be available to contracting parties under international law to address the barrier to deployment presented by Article 6, pending formal entry into force of the 2009 amendment.

  20. Formal And Informal Macro-Regional Transport Clusters As A Primary Step In The Design And Implementation Of Cluster-Based Strategies

    Directory of Open Access Journals (Sweden)

    Nežerenko Olga

    2015-09-01

    Full Text Available The aim of the study is the identification of a formal macro-regional transport and logistics cluster and its development trends on a macro-regional level in 2007-2011 by means of the hierarchical cluster analysis. The central approach of the study is based on two concepts: 1 the concept of formal and informal macro-regions, and 2 the concept of clustering which is based on the similarities shared by the countries of a macro-region and tightly related to the concept of macro-region. The authors seek to answer the question whether the formation of a formal transport cluster could provide the BSR a stable competitive position in the global transportation and logistics market.

  1. A Survey of Formal Methods for Intelligent Swarms

    Science.gov (United States)

    Truszkowski, Walt; Rash, James; Hinchey, Mike; Rouff, Chrustopher A.

    2004-01-01

    Swarms of intelligent autonomous spacecraft, involving complex behaviors and interactions, are being proposed for future space exploration missions. Such missions provide greater flexibility and offer the possibility of gathering more science data than traditional single spacecraft missions. The emergent properties of swarms make these missions powerful, but simultaneously far more difficult to design, and to assure that the proper behaviors will emerge. These missions are also considerably more complex than previous types of missions, and NASA, like other organizations, has little experience in developing or in verifying and validating these types of missions. A significant challenge when verifying and validating swarms of intelligent interacting agents is how to determine that the possible exponential interactions and emergent behaviors are producing the desired results. Assuring correct behavior and interactions of swarms will be critical to mission success. The Autonomous Nano Technology Swarm (ANTS) mission is an example of one of the swarm types of missions NASA is considering. The ANTS mission will use a swarm of picospacecraft that will fly from Earth orbit to the Asteroid Belt. Using an insect colony analogy, ANTS will be composed of specialized workers for asteroid exploration. Exploration would consist of cataloguing the mass, density, morphology, and chemical composition of the asteroids, including any anomalous concentrations of specific minerals. To perform this task, ANTS would carry miniaturized instruments, such as imagers, spectrometers, and detectors. Since ANTS and other similar missions are going to consist of autonomous spacecraft that may be out of contact with the earth for extended periods of time, and have low bandwidths due to weight constraints, it will be difficult to observe improper behavior and to correct any errors after launch. Providing V&V (verification and validation) for this type of mission is new to NASA, and represents the

  2. Formal Symplectic Groupoid of a Deformation Quantization

    Science.gov (United States)

    Karabegov, Alexander V.

    2005-08-01

    We give a self-contained algebraic description of a formal symplectic groupoid over a Poisson manifold M. To each natural star product on M we then associate a canonical formal symplectic groupoid over M. Finally, we construct a unique formal symplectic groupoid ‘with separation of variables’ over an arbitrary Kähler-Poisson manifold.

  3. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    Science.gov (United States)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  4. Artificial grammar learning meets formal language theory: an overview

    Science.gov (United States)

    Fitch, W. Tecumseh; Friederici, Angela D.

    2012-01-01

    Formal language theory (FLT), part of the broader mathematical theory of computation, provides a systematic terminology and set of conventions for describing rules and the structures they generate, along with a rich body of discoveries and theorems concerning generative rule systems. Despite its name, FLT is not limited to human language, but is equally applicable to computer programs, music, visual patterns, animal vocalizations, RNA structure and even dance. In the last decade, this theory has been profitably used to frame hypotheses and to design brain imaging and animal-learning experiments, mostly using the ‘artificial grammar-learning’ paradigm. We offer a brief, non-technical introduction to FLT and then a more detailed analysis of empirical research based on this theory. We suggest that progress has been hampered by a pervasive conflation of distinct issues, including hierarchy, dependency, complexity and recursion. We offer clarifications of several relevant hypotheses and the experimental designs necessary to test them. We finally review the recent brain imaging literature, using formal languages, identifying areas of convergence and outstanding debates. We conclude that FLT has much to offer scientists who are interested in rigorous empirical investigations of human cognition from a neuroscientific and comparative perspective. PMID:22688631

  5. multiPDEVS: A Parallel Multicomponent System Specification Formalism

    Directory of Open Access Journals (Sweden)

    Damien Foures

    2018-01-01

    Full Text Available Based on multiDEVS formalism, we introduce multiPDEVS, a parallel and nonmodular formalism for discrete event system specification. This formalism provides combined advantages of PDEVS and multiDEVS approaches, such as excellent simulation capabilities for simultaneously scheduled events and components able to influence each other using exclusively their state transitions. We next show the soundness of the formalism by giving a construction showing that any multiPDEVS model is equivalent to a PDEVS atomic model. We then present the simulation procedure associated, usually called abstract simulator. As a well-adapted formalism to express cellular automata, we finally propose to compare an implementation of multiPDEVS formalism with a more classical Cell-DEVS implementation through a fire spread application.

  6. A rational quantitative approach to determine the best dosing regimen for a target therapeutic effect: a unified formalism for antibiotic evaluation.

    Science.gov (United States)

    Li, Jun; Nekka, Fahima

    2013-02-21

    The determination of an optimal dosing regimen is a critical step to enhance the drug efficacy and avoid toxicity. Rational dosing recommendations based on mathematical considerations are increasingly being adopted in the process of drug development and use. In this paper, we propose a quantitative approach to evaluate the efficacy of antibiotic agents. By integrating both pharmacokinetic (PK) and pharmacodynamic (PD) information, this approach gives rise to a unified formalism able to measure the cause-effect of dosing regimens. This new pharmaco-metric allows to cover a whole range of antibiotics, including the two well known concentration and time dependent classes, through the introduction of the Hill-dependency concept. As a direct fallout, our formalism opens a new path toward the bioequivalence evaluation in terms of PK and PD, which associates the in vivo drug concentration and the in vitro drug effect. Using this new approach, we succeeded to reveal unexpected, but relevant behaviors of drug performance when different drug regimens and drug classes are considered. Of particular notice, we found that the doses required to reach the same therapeutic effect, when scheduled differently, exhibit completely different tendencies for concentration and time dependent drugs. Moreover, we theoretically confirmed the previous experimental results of the superiority of the once daily regimen of aminoglycosides. The proposed methodology is appealing for its computational features and can easily be applicable to design fair clinical protocols or rationalize prescription decisions. Copyright © 2012 Elsevier Ltd. All rights reserved.

  7. The role of formal specifications

    International Nuclear Information System (INIS)

    McHugh, J.

    1994-01-01

    The role of formal requirements specification is discussed under the premise that the primary purpose of such specifications is to facilitate clear and unambiguous communications among the communities of interest for a given project. An example is presented in which the failure to reach such an understanding resulted in an accident at a chemical plant. Following the example, specification languages based on logical formalisms and notations are considered. These are rejected as failing to serve the communications needs of diverse communities. The notion of a specification as a surrogate for a program is also considered and rejected. The paper ends with a discussion of the type of formal notation that will serve the communications role and several encouraging developments are noted

  8. Bridging In-school and Out-of-school Learning: Formal, Non-Formal, and Informal Education

    Science.gov (United States)

    Eshach, Haim

    2007-04-01

    The present paper thoroughly examines how one can effectively bridge in-school and out-of-school learning. The first part discusses the difficulty in defining out-of-school learning. It proposes to distinguish three types of learning: formal, informal, and non-formal. The second part raises the question of whether out-of-school learning should be dealt with in the in-school system, in view of the fact that we experience informal learning anyway as well as considering the disadvantages and difficulties teachers are confronted with when planning and carrying out scientific fieldtrips. The voices of the teachers, the students, and the non-formal institution staff are heard to provide insights into the problem. The third part discusses the cognitive and affective aspects of non-formal learning. The fourth part presents some models explaining scientific fieldtrip learning and based on those models, suggests a novel explanation. The fifth part offers some recommendations of how to bridge in and out-of-school learning. The paper closes with some practical ideas as to how one can bring the theory described in the paper into practice. It is hoped that this paper will provide educators with an insight so that they will be able to fully exploit the great potential that scientific field trips may offer.

  9. Toward a formal ontology for narrative

    Directory of Open Access Journals (Sweden)

    Ciotti, Fabio

    2016-03-01

    Full Text Available In this paper the rationale and the first draft of a formal ontology for modeling narrative texts are presented. Building on the semiotic and structuralist narratology, and on the work carried out in the late 1980s by Giuseppe Gigliozzi in Italy, the focus of my research are the concepts of character and of narrative world/space. This formal model is expressed in the OWL 2 ontology language. The main reason to adopt a formal modeling approach is that I consider the purely probabilistic-quantitative methods (now widespread in digital literary studies inadequate. An ontology, on one hand provides a tool for the analysis of strictly literary texts. On the other hand (though beyond the scope of the present work, its formalization can also represent a significant contribution towards grounding the application of storytelling methods outside of scholarly contexts.

  10. Industrial Practice in Formal Methods : A Review

    DEFF Research Database (Denmark)

    Bicarregui, Juan C.; Fitzgerald, John; Larsen, Peter Gorm

    2009-01-01

    We examine the the industrial application of formal methods using data gathered in a review of 62 projects taking place over the last 25 years. The review suggests that formal methods are being applied in a wide range of application domains, with increasingly strong tool support. Significant chal...... challenges remain in providing usable tools that can be integrated into established development processes; in education and training; in taking formal methods from first use to second use, and in gathering and evidence to support informed selection of methods and tools.......We examine the the industrial application of formal methods using data gathered in a review of 62 projects taking place over the last 25 years. The review suggests that formal methods are being applied in a wide range of application domains, with increasingly strong tool support. Significant...

  11. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  12. Formal verification - Robust and efficient code: Introduction to Formal Verification

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    In general, FV means "proving that certain properties hold for a given system using formal mathematics". This definition can certainly feel daunting, however, as we will learn, we can reap benefits from the paradigm without digging too deep into ...

  13. Verifying design patterns in Hoare Type Theory

    DEFF Research Database (Denmark)

    Svendsen, Kasper; Buisse, Alexandre; Birkedal, Lars

    In this technical report we document our experiments formally verifying three design patterns in Hoare Type Theory.......In this technical report we document our experiments formally verifying three design patterns in Hoare Type Theory....

  14. Formalization of the Resolution Calculus for First-Order Logic

    DEFF Research Database (Denmark)

    Schlichtkrull, Anders

    2016-01-01

    A formalization in Isabelle/HOL of the resolution calculus for first-order logic is presented. Its soundness and completeness are formally proven using the substitution lemma, semantic trees, Herbrand’s theorem, and the lifting lemma. In contrast to previous formalizations of resolution, it consi......A formalization in Isabelle/HOL of the resolution calculus for first-order logic is presented. Its soundness and completeness are formally proven using the substitution lemma, semantic trees, Herbrand’s theorem, and the lifting lemma. In contrast to previous formalizations of resolution...

  15. Designing and Implementing INTREPID, an Intensive Program in Translational Research Methodologies for New Investigators

    Science.gov (United States)

    Aphinyanaphongs, Yindalon; Shao, Yongzhao; Micoli, Keith J.; Fang, Yixin; Goldberg, Judith D.; Galeano, Claudia R.; Stangel, Jessica H.; Chavis‐Keeling, Deborah; Hochman, Judith S.; Cronstein, Bruce N.; Pillinger, Michael H.

    2014-01-01

    Abstract Senior housestaff and junior faculty are often expected to perform clinical research, yet may not always have the requisite knowledge and skills to do so successfully. Formal degree programs provide such knowledge, but require a significant commitment of time and money. Short‐term training programs (days to weeks) provide alternative ways to accrue essential information and acquire fundamental methodological skills. Unfortunately, published information about short‐term programs is sparse. To encourage discussion and exchange of ideas regarding such programs, we here share our experience developing and implementing INtensive Training in Research Statistics, Ethics, and Protocol Informatics and Design (INTREPID), a 24‐day immersion training program in clinical research methodologies. Designing, planning, and offering INTREPID was feasible, and required significant faculty commitment, support personnel and infrastructure, as well as committed trainees. PMID:25066862

  16. Model Checking Geographically Distributed Interlocking Systems Using UMC

    DEFF Research Database (Denmark)

    Fantechi, Alessandro; Haxthausen, Anne Elisabeth; Nielsen, Michel Bøje Randahl

    2017-01-01

    the relevant distributed protocols. By doing that we obey the safety guidelines of the railway signalling domain, that require formal methods to support the certification of such products. We also show how formal modelling can help designing alternative distributed solutions, while maintaining adherence...

  17. A computational formalization for partial evaluation

    DEFF Research Database (Denmark)

    Hatcliff, John; Danvy, Olivier

    1997-01-01

    We formalize a partial evaluator for Eugenio Moggi's computational metalanguage. This formalization gives an evaluation-order independent view of binding-time analysis and program specialization, including a proper treatment of call unfolding. It also enables us to express the essence of `control...

  18. Style representation in design grammars

    DEFF Research Database (Denmark)

    Ahmad, Sumbul; Chase, Scott Curland

    2012-01-01

    The concept of style is relevant for both the analysis and synthesis of designs. New styles are often formed by the adaptation of previous ones based on changes in design criteria and context. A formal characterization of style is given by shape grammars, which describe the compositional rules...... underlying a set of designs. Stylistic change can be modelled by grammar transformations, which allow the transformation of the structure and vocabulary of a grammar that is used to describe a particular style. In order for grammars to be useful beyond a single application, they should have the capability...... to be transformed according to changing design style needs. Issues of formalizing stylistic change necessitate a lucid and formal definition of style in the design language generated by a grammar. Furthermore, a significant aspect of the definition of style is the representation of aesthetic qualities attributed...

  19. Naturalistic Cognition: A Research Paradigm for Human-Centered Design

    Directory of Open Access Journals (Sweden)

    Peter Storkerson

    2010-01-01

    Full Text Available Naturalistic thinking and knowing, the tacit, experiential, and intuitive reasoning of everyday interaction, have long been regarded as inferior to formal reason and labeled primitive, fallible, subjective, superstitious, and in some cases ineffable. But, naturalistic thinking is more rational and definable than it appears. It is also relevant to design. Inquiry into the mechanisms of naturalistic thinking and knowledge can bring its resources into focus and enable designers to create better, human-centered designs for use in real-world settings. This article makes a case for the explicit, formal study of implicit, naturalistic thinking within the fields of design. It develops a framework for defining and studying naturalistic thinking and knowledge, for integrating them into design research and practice, and for developing a more integrated, consistent theory of knowledge in design. It will (a outline historical definitions of knowledge, attitudes toward formal and naturalistic thinking, and the difficulties presented by the co-presence of formal and naturalistic thinking in design, (b define and contrast formal and naturalistic thinking as two distinct human cognitive systems, (c demonstrate the importance of naturalistic cognition in formal thinking and real-world judgment, (d demonstrate methods for researching naturalistic thinking that can be of use in design, and (e briefly discuss the impact on design theory of admitting naturalistic thinking as valid, systematic, and knowable.

  20. 37 CFR 251.41 - Formal hearings.

    Science.gov (United States)

    2010-07-01

    ... ARBITRATION ROYALTY PANEL RULES AND PROCEDURES COPYRIGHT ARBITRATION ROYALTY PANEL RULES OF PROCEDURE Procedures of Copyright Arbitration Royalty Panels § 251.41 Formal hearings. (a) The formal hearings that will be conducted under the rules of this subpart are rate adjustment hearings and royalty fee...

  1. Formal Engineering Hybrid Systems: Semantic Underpinnings

    NARCIS (Netherlands)

    Bujorianu, M.C.; Bujorianu, L.M.

    2008-01-01

    In this work we investigate some issues in applying formal methods to hybrid system development and develop a categorical framework. We study the themes of stochastic reasoning, heterogeneous formal specification and retrenchment. Hybrid systems raise a rich pallets of aspects that need to be

  2. Formal Analysis Of Use Case Diagrams

    Directory of Open Access Journals (Sweden)

    Radosław Klimek

    2010-01-01

    Full Text Available Use case diagrams play an important role in modeling with UML. Careful modeling is crucialin obtaining a correct and efficient system architecture. The paper refers to the formalanalysis of the use case diagrams. A formal model of use cases is proposed and its constructionfor typical relationships between use cases is described. Two methods of formal analysis andverification are presented. The first one based on a states’ exploration represents a modelchecking approach. The second one refers to the symbolic reasoning using formal methodsof temporal logic. Simple but representative example of the use case scenario verification isdiscussed.

  3. Design and Analysis of QoS Routing Framework integrated with OLSR protocol for Multimedia Traffic in Mobile Adhoc Networks

    Directory of Open Access Journals (Sweden)

    S. Soni

    2017-06-01

    Full Text Available MANETs (Mobile Ad-hoc Networks is the self organizing wireless structure of mobile hosts. Wireless media is used for communication in MANETs. Considering the developing requirements for multimedia and real-time traffic applications in real world, QoS (Quality-of-Service support is essential in MANETs. But most of the characteristics of MANETs make QoS support a difficult problem. It is challenging to support QoS routing in MANET due to dynamic behavior and mobility of the hosts. The OLSR (Optimized Link State Routing protocol can be efficiently used in MANETs to provide QoS routing because of its dynamic MPR (Multi Point Relay selection criteria and proactive nature. In this paper, a design of QoS routing framework integrated with OLSR protocol is proposed and also analyzed using network simulator. Proposed QoS framework combines a bandwidth estimation algorithm with explicit resource reservation, QoS routing and connection admission control (CAC. OLSR protocol is extended for QoS framework to solve performance issues related to node mobility using cross layer approach. Results after simulation conclude about efficiency of the proposed QoS routing framework.

  4. A Survey of Enhanced Recovery After Surgery Protocols for Cesarean Delivery in Serbia

    Directory of Open Access Journals (Sweden)

    Borislava Pujic

    2018-04-01

    Full Text Available Enhanced recovery after surgery (ERAS protocols have been described for patients undergoing colon surgery. Similar protocols for cesarean delivery (CD have been developed recently. CD is one of the most commonly performed surgical procedures, and adoption of ERAS protocols following CD might benefit patients and the health-care system. We aimed to determine which Serbian hospitals reported ERAS protocols, which elements of ERAS protocols were used in CD patients, and whether ERAS and non-ERAS hospitals differed. The survey was sent to all hospitals with obstetric services and 46 of 49 responded. The questionnaire asked whether ERAS protocols had been formally adopted for surgical patients and about their use in CD patients. Specific questions on elements described in other obstetric ERAS protocols for CD included preoperative patient preparation, type of anesthesia and temperature monitoring used for CD, maternal/neonatal contact, and time to discharge. ERAS protocols are used in 24% of surveyed hospitals, 84% admit the patient the day before elective CDs, 87% use a maternal bowel preparation morning on the day of CD, and 80% administer maternal deep venous thrombosis prophylaxis. Only 33% remove IV in the first postoperative day, and 89% of women do not eat solid food until the day following their CD. Neuraxial anesthesia is used in 46% of elective CDs in ERAS hospitals compared to 9% in non-ERAS hospitals (P < 0.01, and neuraxial narcotics for post CD analgesia are given more often in ERAS hospitals. Thirty-six percentage of ERAS patients are discharged within 3 days vs. none in the non-ERAS group. Few elements of ERAS protocols reported from other centers outside Serbia are employed in Serbian hospitals performing CD. Despite significant changes that have been made recently in CD care, enhanced recovery after CD could be significantly improved in Serbian hospitals.

  5. Preferences for and Barriers to Formal and Informal Athletic Training Continuing Education Activities

    Science.gov (United States)

    Armstrong, Kirk J.; Weidner, Thomas G.

    2011-01-01

    Context: Our previous research determined the frequency of participation and perceived effect of formal and informal continuing education (CE) activities. However, actual preferences for and barriers to CE must be characterized. Objective: To determine the types of formal and informal CE activities preferred by athletic trainers (ATs) and barriers to their participation in these activities. Design: Cross-sectional study. Setting: Athletic training practice settings. Patients or Other Participants: Of a geographically stratified random sample of 1000 ATs, 427 ATs (42.7%) completed the survey. Main Outcome Measure(s): As part of a larger study, the Survey of Formal and Informal Athletic Training Continuing Education Activities (FIATCEA) was developed and administered electronically. The FIATCEA consists of demographic characteristics and Likert scale items (1 = strongly disagree, 5 = strongly agree) about preferred CE activities and barriers to these activities. Internal consistency of survey items, as determined by Cronbach α, was 0.638 for preferred CE activities and 0.860 for barriers to these activities. Descriptive statistics were computed for all items. Differences between respondent demographic characteristics and preferred CE activities and barriers to these activities were determined via analysis of variance and dependent t tests. The α level was set at .05. Results: Hands-on clinical workshops and professional networking were the preferred formal and informal CE activities, respectively. The most frequently reported barriers to formal CE were the cost of attending and travel distance, whereas the most frequently reported barriers to informal CE were personal and job-specific factors. Differences were noted between both the cost of CE and travel distance to CE and all other barriers to CE participation (F1,411 = 233.54, P formal CE activities. The same barriers (eg, cost, travel distance) to formal CE appeared to be universal to all ATs. Informal CE was

  6. Formal balancing of chemical reaction networks

    NARCIS (Netherlands)

    van der Schaft, Abraham; Rao, S.; Jayawardhana, B.

    2016-01-01

    In this paper we recall and extend the main results of Van der Schaft, Rao, Jayawardhana (2015) concerning the use of Kirchhoff’s Matrix Tree theorem in the explicit characterization of complex-balanced reaction networks and the notion of formal balancing. The notion of formal balancing corresponds

  7. Formal methods in software development: A road less travelled

    Directory of Open Access Journals (Sweden)

    John A van der Poll

    2010-08-01

    Full Text Available An integration of traditional verification techniques and formal specifications in software engineering is presented. Advocates of such techniques claim that mathematical formalisms allow them to produce quality, verifiably correct, or at least highly dependable software and that the testing and maintenance phases are shortened. Critics on the other hand maintain that software formalisms are hard to master, tedious to use and not well suited for the fast turnaround times demanded by industry. In this paper some popular formalisms and the advantages of using these during the early phases of the software development life cycle are presented. Employing the Floyd-Hoare verification principles during the formal specification phase facilitates reasoning about the properties of a specification. Some observations that may help to alleviate the formal-methods controversy are established and a number of formal methods successes is presented. Possible conditions for an increased acceptance of formalisms in oftware development are discussed.

  8. Statistical Survey of Non-Formal Education

    Directory of Open Access Journals (Sweden)

    Ondřej Nývlt

    2012-12-01

    Full Text Available focused on a programme within a regular education system. Labour market flexibility and new requirements on employees create a new domain of education called non-formal education. Is there a reliable statistical source with a good methodological definition for the Czech Republic? Labour Force Survey (LFS has been the basic statistical source for time comparison of non-formal education for the last ten years. Furthermore, a special Adult Education Survey (AES in 2011 was focused on individual components of non-formal education in a detailed way. In general, the goal of the EU is to use data from both internationally comparable surveys for analyses of the particular fields of lifelong learning in the way, that annual LFS data could be enlarged by detailed information from AES in five years periods. This article describes reliability of statistical data aboutnon-formal education. This analysis is usually connected with sampling and non-sampling errors.

  9. Formal Ontologies and Uncertainty. In Geographical Knowledge

    Directory of Open Access Journals (Sweden)

    Matteo Caglioni

    2014-05-01

    Full Text Available Formal ontologies have proved to be a very useful tool to manage interoperability among data, systems and knowledge. In this paper we will show how formal ontologies can evolve from a crisp, deterministic framework (ontologies of hard knowledge to new probabilistic, fuzzy or possibilistic frameworks (ontologies of soft knowledge. This can considerably enlarge the application potential of formal ontologies in geographic analysis and planning, where soft knowledge is intrinsically linked to the complexity of the phenomena under study.  The paper briefly presents these new uncertainty-based formal ontologies. It then highlights how ontologies are formal tools to define both concepts and relations among concepts. An example from the domain of urban geography finally shows how the cause-to-effect relation between household preferences and urban sprawl can be encoded within a crisp, a probabilistic and a possibilistic ontology, respectively. The ontology formalism will also determine the kind of reasoning that can be developed from available knowledge. Uncertain ontologies can be seen as the preliminary phase of more complex uncertainty-based models. The advantages of moving to uncertainty-based models is evident: whether it is in the analysis of geographic space or in decision support for planning, reasoning on geographic space is almost always reasoning with uncertain knowledge of geographic phenomena.

  10. HUBUNGAN TINGKAT PENDIDIKAN FORMAL DENGAN PARENTING SELF-EFFICACY PERIODE AWAL NIFAS PADA IBU PASCA SECTIO CAESAREA

    Directory of Open Access Journals (Sweden)

    Domas Chandra Pramudianti

    2017-07-01

    Full Text Available Abstract: The research aimsto determine the relationship of the levelof formal education with parenting self-efficacy in the early period ofpostnatal maternal post Sectio Caesarea(SC.The methods is anobservational study with cross sectional design. The study populationincludes all mothers post SC in RSIA ‘Aisyiyah Klaten and DelangguPKU Muhammadiyah Hospital, the subject of the study involved 66people. Samples were selected purposively to the inclusion criteriaof exclusion. Data analysis using Spearman Rank at the 95% confidencelevel. The results is level of formal education have a meaningfulrelationship with parenting self-efficacy in the early postnatal periodwith a value of p = 0.000 (p <0.05.Keywords: formal education, parenting self-efficacy

  11. Formalization of Many-Valued Logics

    DEFF Research Database (Denmark)

    Villadsen, Jørgen; Schlichtkrull, Anders

    2017-01-01

    Partiality is a key challenge for computational approaches to artificial intelligence in general and natural language in particular. Various extensions of classical two-valued logic to many-valued logics have been investigated in order to meet this challenge. We use the proof assistant Isabelle...... to formalize the syntax and semantics of many-valued logics with determinate as well as indeterminate truth values. The formalization allows for a concise presentation and makes automated verification possible....

  12. Helicity formalism and spin effects

    International Nuclear Information System (INIS)

    Anselmino, M.; Caruso, F.; Piovano, U.

    1990-01-01

    The helicity formalism and the technique to compute amplitudes for interaction processes involving leptons, quarks, photons and gluons are reviewed. Explicit calculations and examples of exploitation of symmetry properties are shown. The formalism is then applied to the discussion of several hadronic processes and spin effects: the experimental data, when related to the properties of the elementary constituent interactions, show many not understood features. Also the nucleon spin problem is briefly reviewed. (author)

  13. Robust and Efficient Authentication Scheme for Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2015-01-01

    Full Text Available The session initiation protocol (SIP is a powerful application-layer protocol which is used as a signaling one for establishing, modifying, and terminating sessions among participants. Authentication is becoming an increasingly crucial issue when a user asks to access SIP services. Hitherto, many authentication schemes have been proposed to enhance the security of SIP. In 2014, Arshad and Nikooghadam proposed an enhanced authentication and key agreement scheme for SIP and claimed that their scheme could withstand various attacks. However, in this paper, we show that Arshad and Nikooghadam’s authentication scheme is still susceptible to key-compromise impersonation and trace attacks and does not provide proper mutual authentication. To conquer the flaws, we propose a secure and efficient ECC-based authentication scheme for SIP. Through the informal and formal security analyses, we demonstrate that our scheme is resilient to possible known attacks including the attacks found in Arshad et al.’s scheme. In addition, the performance analysis shows that our scheme has similar or better efficiency in comparison with other existing ECC-based authentication schemes for SIP.

  14. Towards Formal Implementation of PUS Standard

    Science.gov (United States)

    Ilić, D.

    2009-05-01

    As an effort to promote the reuse of on-board and ground systems ESA developed a standard for packet telemetry and telecommand - PUS. It defines a set of standard service models with the corresponding structures of the associated telemetry and telecommand packets. Various missions then can choose to implement those standard PUS services that best conform to their specific requirements. In this paper we propose a formal development (based on the Event-B method) of reusable service patterns, which can be instantiated for concrete application. Our formal models allow us to formally express and verify specific service properties including various telecommand and telemetry packet structure validation.

  15. IMPROVEMENT OF GRAPH INTERPRETATION ABILITY USING HYPERTEXT-ASSISTED KINEMATIC LEARNING AND FORMAL THINKING ABILITY

    Directory of Open Access Journals (Sweden)

    S. R. Manurung

    2018-01-01

    Full Text Available The effectiveness of hypertext media in improving graph interpretation ability is investigated in this paper. In addition, joint ability of the formal thinking to improve the graph ability of prospective students is considered. The research design used is the one-group pretest-posttest experimental design is carried out in the research by taking 36 students on from Physics Education Program in one institute for teacher education in Medan. The test consists of graph interpretation ability test in the topic of kinematics and Test of Logical Thinking (TOLT or formal thinking before learning and graph interpretation ability test after learning. The data are then analysed by using SPSS based two ways Analisys of Variance (ANOVA method. The results show that the ability to interpretate graph is significantly improved by using hypertext media assisted kinematic learning.

  16. Gold-Catalyzed Formal C-C Bond Insertion Reaction of 2-Aryl-2-diazoesters with 1,3-Diketones.

    Science.gov (United States)

    Ren, Yuan-Yuan; Chen, Mo; Li, Ke; Zhu, Shou-Fei

    2018-06-29

    The transition-metal-catalyzed formal C-C bond insertion reaction of diazo compounds with monocarbonyl compounds is well established, but the related reaction of 1,3-diketones instead gives C-H bond insertion products. Herein, we report a protocol for a gold-catalyzed formal C-C bond insertion reaction of 2-aryl-2-diazoesters with 1,3-diketones, which provides efficient access to polycarbonyl compounds with an all-carbon quaternary center. The aryl ester moiety plays a crucial role in the unusual chemoselectivity, and the addition of a Brønsted acid to the reaction mixture improves the yield of the C-C bond insertion product. A reaction mechanism involving cyclopropanation of a gold carbenoid with an enolate and ring-opening of the resulting donor-acceptor-type cyclopropane intermediate is proposed. This mechanism differs from that of the traditional Lewis-acid-catalyzed C-C bond insertion reaction of diazo compounds with monocarbonyl compounds, which involves a rearrangement of a zwitterion intermediate as a key step. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  17. The "Healthy Habits, Healthy Girls" randomized controlled trial for girls: study design, protocol, and baseline results.

    Science.gov (United States)

    Leme, Ana Carolina Barco; Philippi, Sonia Tucunduva

    2015-07-01

    The purpose of this article is to describe the study design, protocol, and baseline results of the "Healthy Habits, Healthy Girls" program. The intervention is being evaluated through a randomized controlled trial in 10 public schools in the city of São Paulo, Brazil. Data on the following variables were collected and assessed at baseline and will be reevaluated at 7 and 12 months: body mass index, waist circumference, dietary intake, nutrition, physical activity, social cognitive mediators, physical activity level, sedentary behaviors, self-rated physical status, and overall self-esteem. According to the baseline results, 32.4% and 23.4% of girls were overweight in the intervention and control groups, respectively, and in both groups a higher percentage failed to meet daily recommendations for moderate and vigorous physical activity and maximum screen time (TV, computer, mobile devices). There were no significant differences between the groups for most of the variables, except age (p = 0.000) and waist circumference (p = 0.014). The study showed a gap in the Brazilian literature on protocols for randomized controlled trials to prevent obesity among youth. The current study may thus be an important initial contribution to the field.

  18. A compositional interchange format for hybrid systems : design and implementation

    NARCIS (Netherlands)

    Nadales Agut, D.E.

    2012-01-01

    The design of large industrial controlled systems is a difficult task, which calls for a modelbased design approach. For this, different formalisms exist. Each of these formalisms addresses a specific set of problems, and has its own set of features. Moreover, several formalisms and tools are used

  19. Loops and Metagames: Understanding Game Design Structures

    DEFF Research Database (Denmark)

    Sicart, Miguel Angel

    2015-01-01

    In this paper we present a set of formal concepts that can help in game design analysis. Our goal is to provide a conceptual framework based on terminology used in game design.......In this paper we present a set of formal concepts that can help in game design analysis. Our goal is to provide a conceptual framework based on terminology used in game design....

  20. Multiverse in the Third Quantized Formalism

    International Nuclear Information System (INIS)

    Faizal Mir

    2014-01-01

    In this paper we will analyze the third quantization of gravity in path integral formalism. We will use the time-dependent version of Wheeler—DeWitt equation to analyze the multiverse in this formalism. We will propose a mechanism for baryogenesis to occur in the multiverse, without violating the baryon number conservation. (general)

  1. Overview of a Linguistic Theory of Design. AI Memo 383A.

    Science.gov (United States)

    Miller, Mark L.; Goldstein, Ira P.

    The SPADE theory, which uses linguistic formalisms to model the planning and debugging processes of computer programming, was simultaneously developed and tested in three separate contexts--computer uses in education, automatic programming (a traditional artificial intelligence arena), and protocol analysis (the domain of information processing…

  2. The Formalization of Cultural Psychology. Reasons and Functions.

    Science.gov (United States)

    Salvatore, Sergio

    2017-03-01

    In this paper I discuss two basic theses about the formalization of cultural psychology. First, I claim that formalization is a relevant, even necessary stage of development of this domain of science. This is so because formalization allows the scientific language to achieve a much needed autonomy from the commonsensical language of the phenomena that this science deals with. Second, I envisage the two main functions that formalization has to perform in the field of cultural psychology: on the one hand, it has to provide formal rules grounding and constraining the deductive construction of the general theory; on the other hand, it has to provide the devices for supporting the interpretation of local phenomena, in terms of the abductive reconstruction of the network of linkages among empirical occurrences comprising the local phenomena.

  3. Formal truncations of connected kernel equations

    International Nuclear Information System (INIS)

    Dixon, R.M.

    1977-01-01

    The Connected Kernel Equations (CKE) of Alt, Grassberger and Sandhas (AGS); Kouri, Levin and Tobocman (KLT); and Bencze, Redish and Sloan (BRS) are compared against reaction theory criteria after formal channel space and/or operator truncations have been introduced. The Channel Coupling Class concept is used to study the structure of these CKE's. The related wave function formalism of Sandhas, of L'Huillier, Redish and Tandy and of Kouri, Krueger and Levin are also presented. New N-body connected kernel equations which are generalizations of the Lovelace three-body equations are derived. A method for systematically constructing fewer body models from the N-body BRS and generalized Lovelace (GL) equations is developed. The formally truncated AGS, BRS, KLT and GL equations are analyzed by employing the criteria of reciprocity and two-cluster unitarity. Reciprocity considerations suggest that formal truncations of BRS, KLT and GL equations can lead to reciprocity-violating results. This study suggests that atomic problems should employ three-cluster connected truncations and that the two-cluster connected truncations should be a useful starting point for nuclear systems

  4. Formalizing Implementation Strategies for First-Class Continuations

    DEFF Research Database (Denmark)

    Danvy, Olivier

    1999-01-01

    We present the first formalization of implementation strategies for first-class continuations. The formalization hinges on abstract machines for continuation-passing style (CPS) programs with a special treatment for the current continuation, accounting for the essence of first-class continuations......-class continuations and that second-class continuations are stackable. A large body of work exists on implementing continuations, but it is predominantly empirical and implementation-oriented. In contrast, our formalization abstracts the essence of first-class continuations and provides a uniform setting...

  5. Formalizing Implementation Strategies for First-Class Continuations

    DEFF Research Database (Denmark)

    Danvy, Olivier

    2000-01-01

    We present the first formalization of implementation strategies for first-class continuations. The formalization hinges on abstract machines for continuation-passing style (CPS) programs with a special treatment for the current continuation, accounting for the essence of first-class continuations......-class continuations and that second-class continuations are stackable. A large body of work exists on implementing continuations, but it is predominantly empirical and implementation-oriented. In contrast, our formalization abstracts the essence of first-class continuations and provides a uniform setting...

  6. New Technologies and Learning Environments: A Perspective from Formal and Non-Formal Education in Baja California, Mexico

    Science.gov (United States)

    Zamora, Julieta Lopez; Reynaga, Francisco Javier Arriaga

    2010-01-01

    This paper presents results of two research works, the first approaches non-formal education and the second addresses formal education. In both studies in-depth interview techniques were used. There were some points of convergence between them on aspects such as the implementation of learning environments and the integration of ICT. The interview…

  7. Formal verification of industrial control systems

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Verification of critical software is a high priority but a challenging task for industrial control systems. For many kinds of problems, testing is not an efficient method. Formal methods, such as model checking appears to be an appropriate complementary method. However, it is not common to use model checking in industry yet, as this method needs typically formal methods expertise and huge computing power. In the EN-ICE-PLC section, we are working on a [methodology][1] and a tool ([PLCverif][2]) to overcome these challenges and to integrate formal verification in the development process of our PLC-based control systems. [1]: http://cern.ch/project-plc-formalmethods [2]: http://cern.ch/plcverif

  8. Study, design and realization of a fault-tolerant and predictable synchronous communication protocol on off-the-shelf components

    International Nuclear Information System (INIS)

    Chabrol, D.

    2006-06-01

    This PhD thesis contributes to the design and realization of safety-critical real-time systems on multiprocessor architectures with distributed memory. They are essential to compute systems that have to ensure complex and critical functions. This PhD thesis deals with communication media management. The communication management conditions strongly the capability of the system to fulfill the timeliness property and the dependability requirements. Our contribution includes: - The design of predictable and fault-tolerant synchronous communication protocol; - The study and the definition of the execution model to have a efficient and safe communications management; - The proposal of a method to generate automatically the communications scheduling. Our approach is based on a communication model that allows the analysis of the feasibility, before execution, of a distributed safe-critical real-time system with timeliness and safety requirements. This leads to the definition of an execution model based on a time-triggered and parallel communication management. A set of linear constraints system is generated automatically to compute the network scheduling and the network load with timeliness fulfillment. Then, the proposed communication interface is based on an advanced version of TDMA protocol which allows to use proprietary components (TTP, FlexRay) as well as standard components (Ethernet). The concepts presented in this thesis lead to the realisation and evaluation of a prototype within the framework of the OASIS project done at the CEA/List. (author)

  9. Towards a Formal Model of Social Data

    DEFF Research Database (Denmark)

    Mukkamala, Raghava Rao; Vatrapu, Ravi; Hussain, Abid

    , transform, analyse, and report social data from social media platforms such as Facebook and twitter. Formal methods, models and tools for social data are largely limited to graph theoretical approaches informing conceptual developments in relational sociology and methodological developments in social...... network analysis. As far as we know, there are no integrated modeling approaches to social data across the conceptual, formal and software realms. Social media analytics can be undertaken in two main ways - ”Social Graph Analytics” and ”Social Text Analytics” (Vatrapu, in press/2013). Social graph......, we exemplify the semantics of the formal model with real-world social data examples. Third, we briefly present and discuss the Social Data Analytics Tool (SODATO) that realizes the conceptual model in software and provisions social data for computational social science analysis based on the formal...

  10. The Development and Maintenance of Exemplary Formal Mentoring Programs in Fortune 500 Companies

    Science.gov (United States)

    Hegstad, Christine D.; Wentling, Rose Mary

    2004-01-01

    This study sought to advance current mentoring research by examining the development and maintenance of exemplary formal mentoring programs in the nation's top performing companies. The ADDIE model of instructional systems design, which incorporates five steps from needs analysis to evaluation, formed the conceptual framework guiding the study.…

  11. "Passing It On": Beyond Formal or Informal Pedagogies

    Science.gov (United States)

    Cain, Tim

    2013-01-01

    Informal pedagogies are a subject of debate in music education, and there is some evidence of teachers abandoning formal pedagogies in favour of informal ones. This article presents a case of one teacher's formal pedagogy and theorises it by comparing it with a case of informal pedagogy. The comparison reveals affordances of formal pedagogies…

  12. An approach of requirements tracing in formal refinement

    DEFF Research Database (Denmark)

    Jastram, Michael; Hallerstede, Stefan; Leuschel, Michael

    2010-01-01

    Formal modeling of computing systems yields models that are intended to be correct with respect to the requirements that have been formalized. The complexity of typical computing systems can be addressed by formal refinement introducing all the necessary details piecemeal. We report on preliminar...... changes, making use of corresponding techniques already built into the Event-B method....

  13. Peer support for family carers of people with dementia, alone or in combination with group reminiscence in a factorial design: study protocol for a randomised controlled trial

    Directory of Open Access Journals (Sweden)

    Wenborn Jennifer

    2011-09-01

    Full Text Available Abstract Background Peer support interventions can improve carer wellbeing and interventions that engage both the carer and person with dementia can have significant mutual benefits. Existing research has been criticised for inadequate rigour of design or reporting. This paper describes the protocol for a complex trial that evaluates one-to-one peer support and a group reminiscence programme, both separately and together, in a factorial design. Design A 2 × 2 factorial multi-site randomised controlled trial of individual peer support and group reminiscence interventions for family carers and people with dementia in community settings in England, addressing both effectiveness and cost-effectiveness. Discussion The methods described in this protocol have implications for research into psychosocial interventions, particularly complex interventions seeking to test both individual and group approaches. Trial Registration ISRCTN37956201

  14. The UNC/UMN Baby Connectome Project (BCP): An overview of the study design and protocol development.

    Science.gov (United States)

    Howell, Brittany R; Styner, Martin A; Gao, Wei; Yap, Pew-Thian; Wang, Li; Baluyot, Kristine; Yacoub, Essa; Chen, Geng; Potts, Taylor; Salzwedel, Andrew; Li, Gang; Gilmore, John H; Piven, Joseph; Smith, J Keith; Shen, Dinggang; Ugurbil, Kamil; Zhu, Hongtu; Lin, Weili; Elison, Jed T

    2018-03-22

    The human brain undergoes extensive and dynamic growth during the first years of life. The UNC/UMN Baby Connectome Project (BCP), one of the Lifespan Connectome Projects funded by NIH, is an ongoing study jointly conducted by investigators at the University of North Carolina at Chapel Hill and the University of Minnesota. The primary objective of the BCP is to characterize brain and behavioral development in typically developing infants across the first 5 years of life. The ultimate goals are to chart emerging patterns of structural and functional connectivity during this period, map brain-behavior associations, and establish a foundation from which to further explore trajectories of health and disease. To accomplish these goals, we are combining state of the art MRI acquisition and analysis techniques, including high-resolution structural MRI (T1-and T2-weighted images), diffusion imaging (dMRI), and resting state functional connectivity MRI (rfMRI). While the overall design of the BCP largely is built on the protocol developed by the Lifespan Human Connectome Project (HCP), given the unique age range of the BCP cohort, additional optimization of imaging parameters and consideration of an age appropriate battery of behavioral assessments were needed. Here we provide the overall study protocol, including approaches for subject recruitment, strategies for imaging typically developing children 0-5 years of age without sedation, imaging protocol and optimization, a description of the battery of behavioral assessments, and QA/QC procedures. Combining HCP inspired neuroimaging data with well-established behavioral assessments during this time period will yield an invaluable resource for the scientific community. Copyright © 2018 Elsevier Inc. All rights reserved.

  15. Performance Analysis of On-Demand Routing Protocols in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Arafatur RAHMAN

    2009-01-01

    Full Text Available Wireless Mesh Networks (WMNs have recently gained a lot of popularity due to their rapid deployment and instant communication capabilities. WMNs are dynamically self-organizing, self-configuring and self-healing with the nodes in the network automatically establishing an adiej hoc network and preserving the mesh connectivity. Designing a routing protocol for WMNs requires several aspects to consider, such as wireless networks, fixed applications, mobile applications, scalability, better performance metrics, efficient routing within infrastructure, load balancing, throughput enhancement, interference, robustness etc. To support communication, various routing protocols are designed for various networks (e.g. ad hoc, sensor, wired etc.. However, all these protocols are not suitable for WMNs, because of the architectural differences among the networks. In this paper, a detailed simulation based performance study and analysis is performed on the reactive routing protocols to verify the suitability of these protocols over such kind of networks. Ad Hoc On-Demand Distance Vector (AODV, Dynamic Source Routing (DSR and Dynamic MANET On-demand (DYMO routing protocol are considered as the representative of reactive routing protocols. The performance differentials are investigated using varying traffic load and number of source. Based on the simulation results, how the performance of each protocol can be improved is also recommended.

  16. Mathematical Formalism for Designing Wide-Field X-Ray Telescopes: Mirror Nodal Positions and Detector Tilts

    Science.gov (United States)

    Elsner, R. F.; O'Dell, S. L.; Ramsey, B. D.; Weisskopf, M. C.

    2011-01-01

    We provide a mathematical formalism for optimizing the mirror nodal positions along the optical axis and the tilt of a commonly employed detector configuration at the focus of a x-ray telescope consisting of nested mirror shells with known mirror surface prescriptions. We adopt the spatial resolution averaged over the field-of-view as the figure of merit M. A more complete description appears in our paper in these proceedings.

  17. Mean-Field Analysis for the Evaluation of Gossip Protocols

    NARCIS (Netherlands)

    Bakshi, Rena; Cloth, L.; Fokkink, Wan; Haverkort, Boudewijn R.H.M.

    Gossip protocols are designed to operate in very large, decentralised networks. A node in such a network bases its decision to interact (gossip) with another node on its partial view of the global system. Because of the size of these networks, analysis of gossip protocols is mostly done using

  18. Mean-field analysis for the evaluation of gossip protocols

    NARCIS (Netherlands)

    Bakhshi, Rena; Cloth, L.; Fokkink, Wan; Haverkort, Boudewijn R.H.M.

    2008-01-01

    Gossip protocols are designed to operate in very large, decentralised networks. A node in such a network bases its decision to interact (gossip) with another node on its partial view of the global system. Because of the size of these networks, analysis of gossip protocols is mostly done using

  19. Virtual and physical toys: open-ended features for non-formal learning.

    Science.gov (United States)

    Petersson, Eva; Brooks, Anthony

    2006-04-01

    This paper examines the integrated toy--both physical and virtual--as an essential resource for collaborative learning. This learning incorporates rehabilitation, training, and education. The data derived from two different cases. Pedagogical issues related to non-formal learning and open-ended features of design are discussed. Findings suggest that social, material, and expressive affordances constitute a base for an alterative interface to encourage children's play and learning.

  20. Y-formalism and curved {beta}-{gamma} systems

    Energy Technology Data Exchange (ETDEWEB)

    Grassi, Pietro Antonio [DISTA, Universita del Piemonte Orientale, via Bellini 25/g, 15100 Alessandria (Italy); INFN - Sezione di Torino (Italy)], E-mail: antonio.pietro.grassi@cern.ch; Oda, Ichiro [Department of Physics, Faculty of Science, University of the Ryukyus, Nishihara, Okinawa 903-0213 (Japan); Tonin, Mario [Dipartimento di Fisica, Universita degli Studi di Padova, INFN, Sezionedi Padova, Via F. Marzolo 8, 35131 Padova (Italy)

    2009-01-01

    We adopt the Y-formalism to study {beta}-{gamma} systems on hypersurfaces. We compute the operator product expansions of gauge-invariant currents and we discuss some applications of the Y-formalism to model on Calabi-Yau spaces.

  1. Y-formalism and curved β-γ systems

    International Nuclear Information System (INIS)

    Grassi, Pietro Antonio; Oda, Ichiro; Tonin, Mario

    2009-01-01

    We adopt the Y-formalism to study β-γ systems on hypersurfaces. We compute the operator product expansions of gauge-invariant currents and we discuss some applications of the Y-formalism to model on Calabi-Yau spaces

  2. Model checking as an aid to procedure design

    International Nuclear Information System (INIS)

    Zhang, Wenhu

    2001-01-01

    The OECD Halden Reactor Project has been actively working on computer assisted operating procedures for many years. The objective of the research has been to provide computerised assistance for procedure design, verification and validation, implementation and maintenance. For the verification purpose, the application of formal methods has been considered in several reports. The recent formal verification activity conducted at the Halden Project is based on using model checking to the verification of procedures. This report presents verification approaches based on different model checking techniques and tools for the formalization and verification of operating procedures. Possible problems and relative merits of the different approaches are discussed. A case study of one of the approaches is presented to show the practical application of formal verification. Application of formal verification in the traditional procedure design process can reduce the human resources involved in reviews and simulations, and hence reduce the cost of verification and validation. A discussion of the integration of the formal verification with the traditional procedure design process is given at the end of this report. (Author)

  3. The formal operations: Piaget’s concept, researches and main critics

    Directory of Open Access Journals (Sweden)

    Stepanović Ivana Ž.

    2004-01-01

    Full Text Available This paper deals with Piaget's concept of formal operations, formal operations researches and critics related to the concept. The first part of the work is dedicated to the formal operations concept. The main characteristics of formal operational thought and formal operations structure, as well as structure logical model are presented in that part of the work. The second part is a review of formal operational researches and it is divided in three parts: (1 problems of researches (2 characteristics of applied methodology and (3 author approaches as a specific research context. In the last part of the work the main critics of formal operations concept are presented and discussed.

  4. The Use of Art Practice within Formal Design Structures

    DEFF Research Database (Denmark)

    Wallace, Jamie

    2008-01-01

    of design methodology and ‘problem-solving' led inquiry. The paper centres upon an introspective reflexive account of artistic 'free drawing' techniques integrated within a case of engineering design, supported by an animated sequence of the working process. There then follows a conceptual exploration...

  5. Application of Formal Methods in Software Engineering

    Directory of Open Access Journals (Sweden)

    Adriana Morales

    2011-12-01

    Full Text Available The purpose of this research work is to examine: (1 why are necessary the formal methods for software systems today, (2 high integrity systems through the methodology C-by-C –Correctness-by-Construction–, and (3 an affordable methodology to apply formal methods in software engineering. The research process included reviews of the literature through Internet, in publications and presentations in events. Among the Research results found that: (1 there is increasing the dependence that the nations have, the companies and people of software systems, (2 there is growing demand for software Engineering to increase social trust in the software systems, (3 exist methodologies, as C-by-C, that can provide that level of trust, (4 Formal Methods constitute a principle of computer science that can be applied software engineering to perform reliable process in software development, (5 software users have the responsibility to demand reliable software products, and (6 software engineers have the responsibility to develop reliable software products. Furthermore, it is concluded that: (1 it takes more research to identify and analyze other methodologies and tools that provide process to apply the Formal Software Engineering methods, (2 Formal Methods provide an unprecedented ability to increase the trust in the exactitude of the software products and (3 by development of new methodologies and tools is being achieved costs are not more a disadvantage for application of formal methods.

  6. MR efficiency using automated MRI-desktop eProtocol

    Science.gov (United States)

    Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.

    2017-03-01

    MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.

  7. Formal Constraints on Memory Management for Composite Overloaded Operations

    Directory of Open Access Journals (Sweden)

    Damian W.I. Rouson

    2006-01-01

    Full Text Available The memory management rules for abstract data type calculus presented by Rouson, Morris & Xu [15] are recast as formal statements in the Object Constraint Language (OCL and applied to the design of a thermal energy equation solver. One set of constraints eliminates memory leaks observed in composite overloaded expressions with three current Fortran 95/2003 compilers. A second set of constraints ensures economical memory recycling. The constraints are preconditions, postconditions and invariants on overloaded operators and the objects they receive and return. It is demonstrated that systematic run-time assertion checking inspired by the formal constraints facilitated the pinpointing of an exceptionally hard-to-reproduce compiler bug. It is further demonstrated that the interplay between OCL's modeling capabilities and Fortran's programming capabilities led to a conceptual breakthrough that greatly improved the readability of our code by facilitating operator overloading. The advantages and disadvantages of our memory management rules are discussed in light of other published solutions [11,19]. Finally, it is demonstrated that the run-time assertion checking has a negligible impact on performance.

  8. Formal Analysis of Graphical Security Models

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi

    , software components and human actors interacting with each other to form so-called socio-technical systems. The importance of socio-technical systems to modern societies requires verifying their security properties formally, while their inherent complexity makes manual analyses impracticable. Graphical...... models for security offer an unrivalled opportunity to describe socio-technical systems, for they allow to represent different aspects like human behaviour, computation and physical phenomena in an abstract yet uniform manner. Moreover, these models can be assigned a formal semantics, thereby allowing...... formal verification of their properties. Finally, their appealing graphical notations enable to communicate security concerns in an understandable way also to non-experts, often in charge of the decision making. This dissertation argues that automated techniques can be developed on graphical security...

  9. Formalized search strategies for human risk contributions

    International Nuclear Information System (INIS)

    Rasmussen, J.; Pedersen, O.M.

    1982-07-01

    For risk management, the results of a probabilistic risk analysis (PRA) as well as the underlying assumptions can be used as references in a closed-loop risk control; and the analyses of operational experiences as a means of feedback. In this context, the need for explicit definition and documentation of the PRA coverage, including the search strategies applied, is discussed and aids are proposed such as plant description in terms of a formal abstraction hierarchy and use of cause-consequence-charts for the documentation of not only the results of PRA but also of its coverage. Typical human risk contributions are described on the basis of general plant design features relevant for risk and accident analysis. With this background, search strategies for human risk contributions are treated: Under the designation ''work analysis'', procedures for the analysis of familiar, well trained, planned tasks are proposed. Strategies for identifying human risk contributions outside this category are outlined. (author)

  10. Experience and Explanation: Using Videogames to Prepare Students for Formal Instruction in Statistics

    Science.gov (United States)

    Arena, Dylan A.; Schwartz, Daniel L.

    2014-01-01

    Well-designed digital games can deliver powerful experiences that are difficult to provide through traditional instruction, while traditional instruction can deliver formal explanations that are not a natural fit for gameplay. Combined, they can accomplish more than either can alone. An experiment tested this claim using the topic of statistics,…

  11. Formal verification of Simulink/Stateflow diagrams a deductive approach

    CERN Document Server

    Zhan, Naijun; Zhao, Hengjun

    2017-01-01

    This book presents a state-of-the-art technique for formal verification of continuous-time Simulink/Stateflow diagrams, featuring an expressive hybrid system modelling language, a powerful specification logic and deduction-based verification approach, and some impressive, realistic case studies. Readers will learn the HCSP/HHL-based deductive method and the use of corresponding tools for formal verification of Simulink/Stateflow diagrams. They will also gain some basic ideas about fundamental elements of formal methods such as formal syntax and semantics, and especially the common techniques applied in formal modelling and verification of hybrid systems. By investigating the successful case studies, readers will realize how to apply the pure theory and techniques to real applications, and hopefully will be inspired to start to use the proposed approach, or even develop their own formal methods in their future work.

  12. Adolescent thinking ála Piaget: The formal stage.

    Science.gov (United States)

    Dulit, E

    1972-12-01

    Two of the formal-stage experiments of Piaget and Inhelder, selected largely for their closeness to the concepts defining the stage, were replicated with groups of average and gifted adolescents. This report describes the relevant Piagetian concepts (formal stage, concrete stage) in context, gives the methods and findings of this study, and concludes with a section discussing implications and making some reformulations which generally support but significantly qualify some of the central themes of the Piaget-Inhelder work. Fully developed formal-stage thinking emerges as far from commonplace among normal or average adolescents (by marked contrast with the impression created by the Piaget-Inhelder text, which chooses to report no middle or older adolescents who function at less than fully formal levels). In this respect, the formal stage differs appreciably from the earlier Piagetian stages, and early adolescence emerges as the age for which a "single path" model of cognitive development becomes seriously inadequate and a more complex model becomes essential. Formal-stage thinking seems best conceptualized, like most other aspects of psychological maturity, as a potentiality only partially attained by most and fully attained only by some.

  13. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    Science.gov (United States)

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  14. Formal connections in deformation quantization

    DEFF Research Database (Denmark)

    Masulli, Paolo

    The field of this thesis is deformation quantization, and we consider mainly symplectic manifolds equipped with a star product. After reviewing basics in complex geometry, we introduce quantization, focusing on geometric quantization and deformation quantization. The latter is defined as a star...... characteristic class, and that formal connections form an affine space over the derivations of the star products. Moreover, if the parameter space for the family of star products is contractible, we obtain that any two flat formal connections are gauge equivalent via a self-equivalence of the family of star...

  15. New logistics protocols for distributed interactive simulation

    Science.gov (United States)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  16. Learning Competences in Open Mobile Environments: A Comparative Analysis Between Formal and Non-Formal Spaces

    Directory of Open Access Journals (Sweden)

    Daniel Dominguez

    2014-07-01

    Full Text Available As a result of the increasing use of mobile devices in education, new approaches to define the learning competences in the field of digitally mediated learning have emerged. This paper examines these approaches, using data obtained from empirical research with a group of Spanish university students. The analysis is focused on the experiences of students in the use of mobile devices in both formal and open-informal educational contexts. The theoretical framework of the study is based on the ecological focus applied to explanatory models of digital literacy. As a result of the data it is possible to study this framework in depth, taking into account the theories defending an open view of digital literacy. The study may be of interest to instructional designers and researchers in the fields of open educational resources and technologies applied to education in open contexts.

  17. A technology training protocol for meeting QSEN goals: Focusing on meaningful learning.

    Science.gov (United States)

    Luo, Shuhong; Kalman, Melanie

    2018-01-01

    The purpose of this paper is to describe and discuss how we designed and developed a 12-step technology training protocol. The protocol is meant to improve meaningful learning in technology education so that nursing students are able to meet the informatics requirements of Quality and Safety Education in Nursing competencies. When designing and developing the training protocol, we used a simplified experiential learning model that addressed the core features of meaningful learning: to connect new knowledge with students' prior knowledge and real-world workflow. Before training, we identified students' prior knowledge and workflow tasks. During training, students learned by doing, reflected on their prior computer skills and workflow, designed individualized procedures for integration into their workflow, and practiced the self-designed procedures in real-world settings. The trainer was a facilitator who provided a meaningful learning environment, asked the right questions to guide reflective conversation, and offered scaffoldings at critical moments. This training protocol could significantly improve nurses' competencies in using technologies and increase their desire to adopt new technologies. © 2017 Wiley Periodicals, Inc.

  18. Security Property Validation of the Sensor Network Encryption Protocol (SNEP

    Directory of Open Access Journals (Sweden)

    Salekul Islam

    2015-07-01

    Full Text Available Since wireless sensor networks (WSNs have been designed to be deployed in an unsecured, public environment, secured communication is really vital for their wide-spread use. Among all of the communication protocols developed for WSN, the Security Protocols for Sensor Networks (SPINS is exceptional, as it has been designed with security as a goal. SPINS is composed of two building blocks: Secure Network Encryption Protocol (SNEP and the “micro” version of the Timed Efficient Streaming Loss-tolerant Authentication (TESLA, named μTESLA. From the inception of SPINS, a number of efforts have been made to validate its security properties. In this paper, we have validated the security properties of SNEP by using an automated security protocol validation tool, named AVISPA. Using the protocol specification language, HLPSL, we model two combined scenarios—node to node key agreement and counter exchange protocols—followed by data transmission. Next, we validate the security properties of these combined protocols, using different AVISPA back-ends. AVISPA reports the models we have developed free from attacks. However, by analyzing the key distribution sub-protocol, we find one threat of a potential DoS attack that we have demonstrated by modeling in AVISPA. Finally, we propose a modification, and AVISPA reports this modified version free from the potential DoS attack.

  19. A Conceptual Formalization of Crosscutting in AOSD

    NARCIS (Netherlands)

    van den Berg, Klaas; Conejero, J.M.

    2005-01-01

    We propose a formalization of crosscutting based on a conceptual framework for AOSD. Crosscutting is clearly distinguished from the related concepts scattering and tangling. The definitions of these concepts are formalized and visualized with matrices and matrix operations. This allows more precise

  20. An exact formalism for Doppler-broadened neutron cross-sections

    International Nuclear Information System (INIS)

    Catsaros, Nicolas.

    1985-07-01

    An exact formalism (Ψ, Φ) is proposed for the calculation of Breit-Wigner or Adler-Adler Doppler-broadened neutron cross-sections. The well-known (Ψ, Φ) formalism is shown to be a zero-order approximation of the generalized (Ψ, Φ) formalism. (author)

  1. Toward a bioethical framework for antibiotic use, antimicrobial resistance and for empirically designing ethically robust strategies to protect human health: a research protocol.

    Science.gov (United States)

    Hernández-Marrero, Pablo; Martins Pereira, Sandra; de Sá Brandão, Patrícia Joana; Araújo, Joana; Carvalho, Ana Sofia

    2017-12-01

    Introduction Antimicrobial resistance (AMR) is a challenging global and public health issue, raising bioethical challenges, considerations and strategies. Objectives This research protocol presents a conceptual model leading to formulating an empirically based bioethics framework for antibiotic use, AMR and designing ethically robust strategies to protect human health. Methods Mixed methods research will be used and operationalized into five substudies. The bioethical framework will encompass and integrate two theoretical models: global bioethics and ethical decision-making. Results Being a study protocol, this article reports on planned and ongoing research. Conclusions Based on data collection, future findings and using a comprehensive, integrative, evidence-based approach, a step-by-step bioethical framework will be developed for (i) responsible use of antibiotics in healthcare and (ii) design of strategies to decrease AMR. This will entail the analysis and interpretation of approaches from several bioethical theories, including deontological and consequentialist approaches, and the implications of uncertainty to these approaches.

  2. User Interface Technology for Formal Specification Development

    Science.gov (United States)

    Lowry, Michael; Philpot, Andrew; Pressburger, Thomas; Underwood, Ian; Lum, Henry, Jr. (Technical Monitor)

    1994-01-01

    Formal specification development and modification are an essential component of the knowledge-based software life cycle. User interface technology is needed to empower end-users to create their own formal specifications. This paper describes the advanced user interface for AMPHION1 a knowledge-based software engineering system that targets scientific subroutine libraries. AMPHION is a generic, domain-independent architecture that is specialized to an application domain through a declarative domain theory. Formal specification development and reuse is made accessible to end-users through an intuitive graphical interface that provides semantic guidance in creating diagrams denoting formal specifications in an application domain. The diagrams also serve to document the specifications. Automatic deductive program synthesis ensures that end-user specifications are correctly implemented. The tables that drive AMPHION's user interface are automatically compiled from a domain theory; portions of the interface can be customized by the end-user. The user interface facilitates formal specification development by hiding syntactic details, such as logical notation. It also turns some of the barriers for end-user specification development associated with strongly typed formal languages into active sources of guidance, without restricting advanced users. The interface is especially suited for specification modification. AMPHION has been applied to the domain of solar system kinematics through the development of a declarative domain theory. Testing over six months with planetary scientists indicates that AMPHION's interactive specification acquisition paradigm enables users to develop, modify, and reuse specifications at least an order of magnitude more rapidly than manual program development.

  3. NON-FORMAL EDUCATION WITHIN THE FUNCTION OF RESPONSIBLE PARENTING

    Directory of Open Access Journals (Sweden)

    Dragana Bogavac

    2017-06-01

    Full Text Available The aim of this survey was to discover to what degree parental non-formal education is present within the function of responsible parenting. The questionnaire research method was used in the survey. For the purpose of this research a questionnaire of 13 questions was constructed relating to the forms of non-formal education, and another questionnaire of 10 questions relating to the parents’ expectations of non-formal education. The sample included 198 parents. Examination of the scores concerning the presence of certain forms of parental non-formal education realized in cooperation with the school leads to the conclusion that the parents possess a positive attitude towards non-formal education. The analysis showed that the parents’ expectations were not on a satisfactory level. According to the results, the fathers displayed a greater interest towards non-formal education (7.72±1.35 than the mothers (6.93±1.85, (p<0.05. Unemployed parents had a greater score (7.85±1.30 than the employed parents (7.22±1.71, (p<0.05. A difference in the acceptance of non-formal education in accordance with the level of formal education was also noticeable (p<0.001. Respondents with a high school degree displayed the highest level of acceptance (7.97±0.78, while the lowest interest was seen in respondents with an associate degree (6.41±2.29. Univariate linear regression analysis showed that statistically important predictors were: gender (OR: -0.23 (-1.24 – -0.33, p< 0.001, work status (OR: -0.14 (-1.24 – -0.01, < 0.05 and the level of formal education (OR: -0.33 (-0.81 – -0.34, p< 0.001. The final results lead to the conclusion that parental non-formal education supports the concept of lifelong education.

  4. Formal Implementation of a Performance Evaluation Model for the Face Recognition System

    Directory of Open Access Journals (Sweden)

    Yong-Nyuo Shin

    2008-01-01

    Full Text Available Due to usability features, practical applications, and its lack of intrusiveness, face recognition technology, based on information, derived from individuals' facial features, has been attracting considerable attention recently. Reported recognition rates of commercialized face recognition systems cannot be admitted as official recognition rates, as they are based on assumptions that are beneficial to the specific system and face database. Therefore, performance evaluation methods and tools are necessary to objectively measure the accuracy and performance of any face recognition system. In this paper, we propose and formalize a performance evaluation model for the biometric recognition system, implementing an evaluation tool for face recognition systems based on the proposed model. Furthermore, we performed evaluations objectively by providing guidelines for the design and implementation of a performance evaluation system, formalizing the performance test process.

  5. DNA expressions - A formal notation for DNA

    NARCIS (Netherlands)

    Vliet, Rudy van

    2015-01-01

    We describe a formal notation for DNA molecules that may contain nicks and gaps. The resulting DNA expressions denote formal DNA molecules. Different DNA expressions may denote the same molecule. Such DNA expressions are called equivalent. We examine which DNA expressions are minimal, which

  6. Opinion dynamics model based on quantum formalism

    Energy Technology Data Exchange (ETDEWEB)

    Artawan, I. Nengah, E-mail: nengahartawan@gmail.com [Theoretical Physics Division, Department of Physics, Udayana University (Indonesia); Trisnawati, N. L. P., E-mail: nlptrisnawati@gmail.com [Biophysics, Department of Physics, Udayana University (Indonesia)

    2016-03-11

    Opinion dynamics model based on quantum formalism is proposed. The core of the quantum formalism is on the half spin dynamics system. In this research the implicit time evolution operators are derived. The analogy between the model with Deffuant dan Sznajd models is discussed.

  7. Formal methods for dependable real-time systems

    Science.gov (United States)

    Rushby, John

    1993-01-01

    The motivation for using formal methods to specify and reason about real time properties is outlined and approaches that were proposed and used are sketched. The formal verifications of clock synchronization algorithms are concluded as showing that mechanically supported reasoning about complex real time behavior is feasible. However, there was significant increase in the effectiveness of verification systems since those verifications were performed, at it is to be expected that verifications of comparable difficulty will become fairly routine. The current challenge lies in developing perspicuous and economical approaches to the formalization and specification of real time properties.

  8. General many-body formalism for composite quantum particles.

    Science.gov (United States)

    Combescot, M; Betbeder-Matibet, O

    2010-05-21

    This Letter provides a formalism capable of exactly treating Pauli blocking between n-fermion particles. This formalism is based on an operator algebra made of commutators and anticommutators which contrasts with the usual scalar formalism of Green functions developed half a century ago for elementary quantum particles. We also provide the diagrams which visualize the very specific many-body physics induced by fermion exchanges between composite quantum particles.

  9. Comparison of absorbed dose determinations using the IAEA dosimetry protocol and the ferrous sulphate dosimeter

    International Nuclear Information System (INIS)

    Mattsson, Olof

    1988-01-01

    In 1985 a comparison of different revised protocols for the dosimetry of high-energy photon and electron beams was published (Mattsson, 1985). The conclusions were that the agreement in absorbed dose to water determined using the different protocols is very good and that the agreement between ionization chamber and ferrous sulphate dosimetry is generally good. For electron beams the differences obtained with the ionization chamber and ferrous sulphate dosimeters were up to about 2%. The influence of the energy and angular distribution of the electron beams on the ionization chamber dosimetry is not fully considered in the dosimetry protocols. The basis for the ionization chamber dosimetry has recently been changed when the Bureau International des Poids et Mesures (BIPM) in 1986 changed the air-kerma standard. The reason was the adaption of the new stopping-power values reported in the ICRU Report No. 37. To achieve consistency in the ionization chamber dosimetry the interaction coefficients and correction factors given in the dosimetry protocols should also be based on the same set of stopping-power values. This is not the case with the protocols included in the comparison made by Mattsson. However, in the international code of practice by the International Atomic Energy Agency (IAEA, 1987) the new stopping-power values have been used. The formalism is the same as in most of the previous protocols. Mattsson et al. (1989) have shown that the differences in the various steps cancel out for the protocols published by NACP (1980) and by IAEA (1987) for cobalt-60 gamma quality. However, it is also of interest to investigate the influence of the new air-kerma standard and the new values on coefficients and factors given in the IAEA protocol for other beam qualities. Therefore, the data given by Mattsson (1985) have been recalculated using the new air-kerma standard and the IAEA protocol

  10. Formal methods and their applicability in the development of safety critical software systems

    International Nuclear Information System (INIS)

    Sievertsen, T.

    1995-01-01

    The OECD Halden Reactor Project has for a number of years been involved in the development and application of a formal software specification and development method based on algebraic specification and the HRP Prover. In parallel to this activity the Project has been evaluating and comparing different methods and approaches to formal software development by their application on realistic case examples. Recent work has demonstrated that algebraic specification and the HRP Prover can be used both in the specification and design of a software system, even down to a concrete model which can be translated into the chosen implementation language. The HRP Prover is currently being used in a case study on the applicability of the methodology in the development of a power range monitoring system for a nuclear power plant. The presentation reviews some of the experiences drawn from the Project's research activities in this area, with special emphasis on questions relating to applicability and limitations, and the role of formal methods in the development of safety-critical software systems. (14 refs., 1 fig.)

  11. Cultivating the Capacity for Formal Reasoning: Objectives and Procedures in an Introductory Physical Science Course

    Science.gov (United States)

    Arons, A. B.

    1976-01-01

    Describes special factors and procedures which are utilized in an introductory physical science course for nonscience majors. It is designed to enable students who are at a concrete or transitional stage to attain the formal operational level of development. (Author/SL)

  12. Formalization of the engineering science discipline - knowledge engineering

    Science.gov (United States)

    Peng, Xiao

    innovative Knowledge-Based System (KBS), AVD KBS, forming a systematic approach facilitating knowledge management. 4. Demonstrate the efficiency advantages of AVDKBS over traditional knowledge management methods via selected design case studies. This research formalizes, for the first time, Knowledge Engineering as a distinct discipline by delivering a robust and high-quality knowledge management and process tool, AVDKBS. Formalizing knowledge proves to significantly impact the effectiveness of aerospace knowledge retention and utilization.

  13. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  14. A web-based computer-tailored smoking prevention programme for primary school children: intervention design and study protocol

    Science.gov (United States)

    2012-01-01

    Background Although the number of smokers has declined in the last decade, smoking is still a major health problem among youngsters and adolescents. For this reason, there is a need for effective smoking prevention programmes targeting primary school children. A web-based computer-tailored feedback programme may be an effective intervention to stimulate youngsters not to start smoking, and increase their knowledge about the adverse effects of smoking and their attitudes and self-efficacy regarding non-smoking. Methods & design This paper describes the development and evaluation protocol of a web-based out-of-school smoking prevention programme for primary school children (age 10-13 years) entitled ‘Fun without Smokes’. It is a transformation of a postal mailed intervention to a web-based intervention. Besides this transformation the effects of prompts will be examined. This web-based intervention will be evaluated in a 2-year cluster randomised controlled trial (c-RCT) with three study arms. An intervention and intervention + prompt condition will be evaluated for effects on smoking behaviour, compared with a no information control condition. Information about pupils’ smoking status and other factors related to smoking will be obtained using a web-based questionnaire. After completing the questionnaire pupils in both intervention conditions will receive three computer-tailored feedback letters in their personal e-mail box. Attitudes, social influences and self-efficacy expectations will be the content of these personalised feedback letters. Pupils in the intervention + prompt condition will - in addition to the personalised feedback letters - receive e-mail and SMS messages prompting them to revisit the ‘Fun without Smokes’ website. The main outcome measures will be ever smoking and the utilisation of the ‘Fun without Smokes’ website. Measurements will be carried out at baseline, 12 months and 24 months of follow-up. Discussion The present study

  15. A web-based computer-tailored smoking prevention programme for primary school children: intervention design and study protocol

    Directory of Open Access Journals (Sweden)

    Cremers Henricus-Paul

    2012-06-01

    Full Text Available Abstract Background Although the number of smokers has declined in the last decade, smoking is still a major health problem among youngsters and adolescents. For this reason, there is a need for effective smoking prevention programmes targeting primary school children. A web-based computer-tailored feedback programme may be an effective intervention to stimulate youngsters not to start smoking, and increase their knowledge about the adverse effects of smoking and their attitudes and self-efficacy regarding non-smoking. Methods & design This paper describes the development and evaluation protocol of a web-based out-of-school smoking prevention programme for primary school children (age 10-13 years entitled ‘Fun without Smokes’. It is a transformation of a postal mailed intervention to a web-based intervention. Besides this transformation the effects of prompts will be examined. This web-based intervention will be evaluated in a 2-year cluster randomised controlled trial (c-RCT with three study arms. An intervention and intervention + prompt condition will be evaluated for effects on smoking behaviour, compared with a no information control condition. Information about pupils’ smoking status and other factors related to smoking will be obtained using a web-based questionnaire. After completing the questionnaire pupils in both intervention conditions will receive three computer-tailored feedback letters in their personal e-mail box. Attitudes, social influences and self-efficacy expectations will be the content of these personalised feedback letters. Pupils in the intervention + prompt condition will - in addition to the personalised feedback letters - receive e-mail and SMS messages prompting them to revisit the ‘Fun without Smokes’ website. The main outcome measures will be ever smoking and the utilisation of the ‘Fun without Smokes’ website. Measurements will be carried out at baseline, 12 months and 24 months of follow

  16. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    OpenAIRE

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols,...

  17. Feature-based component model for design of embedded systems

    Science.gov (United States)

    Zha, Xuan Fang; Sriram, Ram D.

    2004-11-01

    An embedded system is a hybrid of hardware and software, which combines software's flexibility and hardware real-time performance. Embedded systems can be considered as assemblies of hardware and software components. An Open Embedded System Model (OESM) is currently being developed at NIST to provide a standard representation and exchange protocol for embedded systems and system-level design, simulation, and testing information. This paper proposes an approach to representing an embedded system feature-based model in OESM, i.e., Open Embedded System Feature Model (OESFM), addressing models of embedded system artifacts, embedded system components, embedded system features, and embedded system configuration/assembly. The approach provides an object-oriented UML (Unified Modeling Language) representation for the embedded system feature model and defines an extension to the NIST Core Product Model. The model provides a feature-based component framework allowing the designer to develop a virtual embedded system prototype through assembling virtual components. The framework not only provides a formal precise model of the embedded system prototype but also offers the possibility of designing variation of prototypes whose members are derived by changing certain virtual components with different features. A case study example is discussed to illustrate the embedded system model.

  18. Architecture Design and Experimental Platform Demonstration of Optical Network based on OpenFlow Protocol

    Science.gov (United States)

    Xing, Fangyuan; Wang, Honghuan; Yin, Hongxi; Li, Ming; Luo, Shenzi; Wu, Chenguang

    2016-02-01

    With the extensive application of cloud computing and data centres, as well as the constantly emerging services, the big data with the burst characteristic has brought huge challenges to optical networks. Consequently, the software defined optical network (SDON) that combines optical networks with software defined network (SDN), has attracted much attention. In this paper, an OpenFlow-enabled optical node employed in optical cross-connect (OXC) and reconfigurable optical add/drop multiplexer (ROADM), is proposed. An open source OpenFlow controller is extended on routing strategies. In addition, the experiment platform based on OpenFlow protocol for software defined optical network, is designed. The feasibility and availability of the OpenFlow-enabled optical nodes and the extended OpenFlow controller are validated by the connectivity test, protection switching and load balancing experiments in this test platform.

  19. The simplest formal argument for fitness optimization

    Indian Academy of Sciences (India)

    The Formal Darwinism Project aims to provide a formal argument linking population genetics to fitness optimization, which of necessity includes defining fitness. This bridges the gulf between those biologists who assume that natural selection leads to something close to fitness optimization and those biologists who believe ...

  20. Land grabbing and formalization in Africa : a critical inquiry

    NARCIS (Netherlands)

    Stein, H.; Cunningham, S.

    2015-01-01

    Two developments in Africa have generated an extensive literature. The first focuses on investment and land grabbing and the second on the formalization of rural property rights. Less has been written on the impact of formalization on land grabbing and of land grabbing on formalization. Recently,