The proceedings contain 19 papers. The special focus in this conference is on integrated Formal Methods. The topics include: Implementing, Specifying, and Verifying the QOI Format in Dafny: A Case Study...
ISBN:
(纸本)9783031765537
The proceedings contain 19 papers. The special focus in this conference is on integrated Formal Methods. The topics include: Implementing, Specifying, and Verifying the QOI Format in Dafny: A Case Study;veriCode: Correct Translation of Abstract Specifications to C Code;proving Termination via Measure Transfer in Equivalence Checking;PLACIDUS: Engineering Product Lines of Rigorous Assurance Cases;stateful Functional modeling with Refinement (a Lean4 Framework);modeling Register Pairs in CompCert;monitoring Extended Hypernode Logic;towards Quantitative Analysis of Simulink Models Using Stochastic Hybrid Automata;monitoring Real-Time systems Under Parametric Delay;veyMont: Choreography-Based Generation of Correct Concurrent Programs with Shared Memory;correct and Complete Symbolic Execution for Free;solvent: Liquidity Verification of Smart Contracts;StEVe: A Rational Verification Tool for Stackelberg Security Games;PyQBF: A Python Framework for Solving Quantified Boolean Formulas;Improving SAT Solver Performance Through MLP-Predicted Genetic Algorithm Parameters;active Learning of Runtime Monitors Under Uncertainty;specify What? Enhancing Neural Specification Synthesis by Symbolic Methods.
In the last decade, mobility prediction has played a crucial role in urban planning, traffic forecasting, advertising, and service recommendation. This paper addresses the prediction of mobility and emphasizes an esse...
详细信息
The article discusses the issues of studying the possibilities of modernizing components and elements of rotary machines by static and dynamic analyzes of structures using integrated computersystems. Such machines in...
详细信息
ISBN:
(纸本)9783031614149;9783031614156
The article discusses the issues of studying the possibilities of modernizing components and elements of rotary machines by static and dynamic analyzes of structures using integrated computersystems. Such machines include gas turbine and turbojet engines, turbocompressors, and turboexpanders. The main goal of the work is to select a modified rotor design for installing a different type of support. In this case, the search of rational design of expander-compressor rotor unit is considered to use a combination of passive and active bearings instead of plain bearings. Since these types of supports have different levels of support rigidity, topological rationalization of the structure is carried out using static structural analysis (for the estimation of rotor static equilibrium position) and dynamic analysis (for the estimation of the critical rotation speeds). The last one makes it possible to detune critical speeds from the range of operating rotation speeds. For the rotor of an expander-compressor unit with the impellers of the expander and compressor cantilevered on a single shaft, multivariate calculation studies made it possible to find a rational rotor design for the installation of magnetic bearings. The following parameters varied within certain limits, when changing the design: locations of support sections, diameters and lengths of shaft sections. Analyzes were carried out using a numerical finite elementmethod. The results are presented for the final design in the form of displacement distributions, corresponding to the static equilibrium position, as well as the values of natural frequencies and critical rotation speeds and the shapes corresponding to them. The accuracy of the numerical simulation results was assessed using traditional finite element methods and was confirmed by comparison with the results of model numerical experiments. The presented approach to searching for a rational designmade it possible to prove the possibility of using a combinati
The proceedings contain 16 papers. The special focus in this conference is on modeling and Simulation of Social-Behavioral Phenomena in Creative Socities. The topics include: A Signed Network Model of the Interaction ...
ISBN:
(纸本)9783031722592
The proceedings contain 16 papers. The special focus in this conference is on modeling and Simulation of Social-Behavioral Phenomena in Creative Socities. The topics include: A Signed Network Model of the Interaction Between Religious Movements and Authority in Judea;digital Society and Social Conflicts: A Science Map of the Field;on Strong Solutions in Linear Programming Problems with a Fuzzy Goal;sustainable Cooperation in a Bicriteria Game of Renewable Resource Extraction;Using the RoBERTa and T5 Models for Analyzing Texts in Uzbek: NER Tasks and Punctuation Prediction;algorithmic Strategies for stemming Complex Word from Uzbek to English in Machine Translation;research on the Impact of Social Networks on the Development of Bilingualism in Kazakhstan;A Comparative Analysis of LSTM and BERT Models for Named Entity Recognition in Kazakh Language: A Multi-classification Approach;Collection and Preprocessing of Data for LLM in the Kazakh Language in the Field of Legislation;model of Innovation-Based Economy Within the New Paradigm During the Relevant Economic Transformation;optimization of an Enterprise System Structure Based on the Concept of Multipolar Management;ethnic Nation Index;quantifying of Governance and Sectoral Policy History: Assessing General Education Efficiency in Lithuania in 1990–2020;investment Strategies and Private Interests in the Hierarchical Management systems.
In this paper, for the process of radical polymerization, a method is used to obtain basic functions linking the kinetic constants of the process rates. It is shown that when analyzing the conversion curve, depending ...
详细信息
para>The measurement of the total number of colonies is the basic operation of food detection, biopharmaceutical, environmental monitoring, such as water quality detection, etc. The colony number is time-consuming ...
详细信息
This paper explores a novel approach to model strategies for flattening wrinkled cloth learning from humans. A human participant study was conducted where the participants were presented with various wrinkle types and...
详细信息
The proceedings contain 27 papers. The topics discussed include: a general-purpose analog computer to population protocol compiler;compile-time optimization of the energy consumption of numerical computations;effectiv...
ISBN:
(纸本)9798400704925
The proceedings contain 27 papers. The topics discussed include: a general-purpose analog computer to population protocol compiler;compile-time optimization of the energy consumption of numerical computations;effective HPC programming via domain specific abstractions and compilation;high-level synthesis for complex applications: the Bambu approach;relaxed threshold implementations;using a performance model to implement a superscalar CVA6;seeing beyond the order: a LEN5 to sharpen edge microprocessors with dynamic scheduling;integrating SystemC-AMS power modeling with a RISC-V ISS for virtual prototyping of battery-operated embedded devices;a gigabit, DMA-enhanced open-source ethernet controller for mixed-criticality systems;and model theft attack against a tinyML application running on an ultra-low-power open-source SoC.
Irrigation canal networks play a pivotal role in satisfying the water demands of farmlands around the world. In a time of global warming, automatic irrigation systems are crucial in order to minimize water losses caus...
详细信息
Aiming at the current status quo that the security assessment of mimetic multivariate systems generally adopts a single level of assessment, which is unable to establish a security link between its internal software d...
详细信息
ISBN:
(数字)9798331533113
ISBN:
(纸本)9798331533120
Aiming at the current status quo that the security assessment of mimetic multivariate systems generally adopts a single level of assessment, which is unable to establish a security link between its internal software diversity and the overall security of mimetic multivariate systems, this paper proposes an assessment mechanism that combines two assessment methods, namely, software diversity metrics under multi-granularity characterization and risk assessment of vulnerability attacking system modeling. The experimental part of the dataset uses the GNU core toolset (coreutils 8.32), and the validity of this assessment method is verified by designing a security assessment algorithm that weights and scores the heterogeneity of the multi-granularity software diversity technique, and then by modeling an attack on the mimetic multi-variant system experiment. The experimental results show that the security assessment algorithm can effectively assess the anti-attack ability and security of the mimetic multivariate system under the multi-granularity feature, which has certain reference value for the future research on the security assessment method of the mimetic multivariate system.
暂无评论