Expert Systems are programs that employ artificial intelligence and mimic the performance of human experts in a certain field by gathering and capturing expert information. In this paper, we present a rule-based exper...
详细信息
Industry 4.0 is blurring the lines between the physical, and digital spheres of global production systems. Industry 4.0 sets the foundations for a completely connected factories that are characterized by the digitizat...
详细信息
ISBN:
(纸本)9781538683880
Industry 4.0 is blurring the lines between the physical, and digital spheres of global production systems. Industry 4.0 sets the foundations for a completely connected factories that are characterized by the digitization and interconnection of supply chains, production equipment and production lines, and the application of the latest advanced digital information technologies to manufacturing activities. To fully realize the promise of Industry 4.0, disparate manufacturing systems, devices, data and processes need to connect, communicate, and interoperate. This paper has dual purpose. It first introduces a model-basedengineering that enables a concurrent, collaborative design process where users examine and define requirements, propose solution architectures, demonstrate and exchange ideas with stakeholders, and consider product feature tradeoffs. Subsequently, it proposes a novel programming paradigm and a flexible environment that helps developers develop design-to production industrial automation solutions by employing structured higher-level modular software techniques.
Nowadays, the construction industry's digital transformation processes are challenging civil engineering education. In general, students and society underestimate the civil engineering field as an outdated and arc...
详细信息
Nowadays, the construction industry's digital transformation processes are challenging civil engineering education. In general, students and society underestimate the civil engineering field as an outdated and archaic knowledge area. Despite the defragmentation and heterogeneity of the sector, advances have been made on the path for Construction 4.0 and 5.0 scenarios. From this perspective, the CONSTRUCT-Gequaltec group of the Faculty of engineering of the University of Porto have been sponsoring research and technological development using hardware and software targeting construction management solutions. This paper presents the work in progress mainly connected to the curricular units regarding project management in the Construction Section of the Civil engineering Department. It also targets assumptions of some expected results across the research and innovation priorities from ECTP Innovative Built Environment and United Nations Sustainable Development Goals (SDGs). Two fundamental elements of the teaching practices are presented as the Construction Sites of the Future (Laboratory -based Education initiative) and Digital products catalogue targeting Digital Twins in Construction (Project based Learning initiative). The learning outcomes address increasing knowledge of innovative solutions, delivering skills to deploy 5.0 actions, and targeting humancentred and sustainable attitudes and values.
Smart contract decompilers, converting smart contract bytecode into smart contract source code, have been used extensively in many scenarios such as binary code analysis, reverse engineering, and security studies. How...
详细信息
ISBN:
(纸本)9781665452786
Smart contract decompilers, converting smart contract bytecode into smart contract source code, have been used extensively in many scenarios such as binary code analysis, reverse engineering, and security studies. However, existing studies, as well as industrial engineering practices, all assumed that smart contract decompilers are reliable and trustworthy, to generate correct and semantically equivalent source code from binaries. Unfortunately, whether such an assumption truly holds in practice is still unknown. In this paper, we conduct, to the best of our knowledge, the first and most comprehensive large-scale empirical study of smart contract decompilers, to gain an understanding of the reliability, limitations, and remaining research challenges of state-of-the-art smart contract decompilation tools. We first designed and implemented a software prototype SOLINSIGHT, then used it to study 5 state-of-the-art smart contract decompilers. We obtained important findings and insights from empirical results, such as: 1) we proposed 3 root causes leading to decompiler failures;2) we revealed 2 reasons hurting performance;3) we identified 3 root causes affecting decompilation effectiveness;4) we proposed a measurement metric for completeness;and 5) we investigated the resilience of contract decompilers against program transformations. We suggest that: 1) decompiler builders should enhance decompilers in terms of effectiveness, performance, and completeness;and 2) security researchers should select appropriate decompilers based on the suggestions in this study. We believe these findings and suggestions will help decompiler builders, contract developers, and security researchers, by providing better guidelines for contract decompiler studies.
Ontologies are the knowledge repositories that enable meaningful inter-agent communication in semantic web frameworks. To support the huge number of services that will be developed in the semantic web, ontologies are ...
详细信息
Cloud computing is an emerging new computing paradigm for delivering some computing services to consumers, which provides scalable and inexpensive service-oriented computing infrastructures with good quality of servic...
详细信息
ISBN:
(纸本)9783642549304;9783642549298
Cloud computing is an emerging new computing paradigm for delivering some computing services to consumers, which provides scalable and inexpensive service-oriented computing infrastructures with good quality of service levels. In this paper, based on the studies about the characteristic of knowledge service, a feature model of knowledge service is proposed with three features, such as service requirement, knowledge service process, and the quality of knowledge service (QoKS). Furthermore, the architecture about service-oriented knowledge acquisition is built to provide a fundamental for knowledge service, and the lifecycle process about knowledge service is studied under the service-oriented architecture. Then, a best practice about knowledge Cloud, named Eknoware, is developed based on the architecture above-mentioned, which can provide some knowledge service patterns and reorganize the knowledge clusters to suitable customers.
The rapid progress of modern computing systems has led to a growing interest in informative run-time logs. Various log-based anomaly detection techniques have been proposed to ensure software reliability. However, the...
详细信息
ISBN:
(纸本)9798350329964
The rapid progress of modern computing systems has led to a growing interest in informative run-time logs. Various log-based anomaly detection techniques have been proposed to ensure software reliability. However, their implementation in the industry has been limited due to the lack of high-quality public log resources as training datasets. While some log datasets are available for anomaly detection, they suffer from limitations in (1) comprehensiveness of log events;(2) scalability over diverse systems;and (3) flexibility of log utility. To address these limitations, we propose AUTOLOG, the first automated log generation methodology for anomaly detection. AUTOLOG uses program analysis to generate runtime log sequences without actually running the system. AU-TOLOG starts with probing comprehensive logging statements associated with the call graphs of an application. Then, it constructs execution graphs for each method after pruning the call graphs to find log-related execution paths in a scalable manner. Finally, AUTOLOG propagates the anomaly label to each acquired execution path based on human knowledge. It generates flexible log sequences by walking along the log execution paths with controllable parameters. Experiments on 50 popular Java projects show that AUTOLOG acquires significantly more (9x-58x) log events than existing log datasets from the same system, and generates log messages much faster (15x) with a single machine than existing passive data collection approaches. AUTOLOG also provides hyper-parameters to adjust the data size, anomaly rate, and component indicator for simulating different real-world scenarios. We further demonstrate AUTOLOG's practicality by showing that AUTOLOG enables log-based anomaly detectors to achieve better performance (1.93%) compared to existing log datasets. We hope AUTOLOG can facilitate the benchmarking and adoption of automated log analysis techniques.
A PC-based user interface (N-CHIME) to a simulation language (HSL) is described. The interface adjusts to users with different levels of knowledge and experience, while providing alternative paths toward modeling obje...
详细信息
A PC-based user interface (N-CHIME) to a simulation language (HSL) is described. The interface adjusts to users with different levels of knowledge and experience, while providing alternative paths toward modeling objectives. Included are the abilities (1) to browse through a library of previously created models, both graphic and textual versions, and (2) to graphically specify a simulation model and then have it automatically transformed into an HSL program shell. The user retains full control over the whole simulation cycle, from model design to simulation and evaluation. This paper emphasizes the configuration of the N-CHIME plus HSL software within a PC-based environment.
Temporal induction is a SAT-based model checking technique. We prove that the SAT instances generated by its induction rule can be reduced to the so called Incremental CNFs. A new DPLL procedure is customized for Incr...
详细信息
ISBN:
(纸本)9780769550077
Temporal induction is a SAT-based model checking technique. We prove that the SAT instances generated by its induction rule can be reduced to the so called Incremental CNFs. A new DPLL procedure is customized for Incremental CNFs, so that the intermediate results in solving previous instances, including the learnt clauses and the search tree, can be reused in solving the next instance. To the best of our knowledge, this is the first result on reusing the search tree in SAT solving of temporal induction. Experimental results on a large number of benchmarks show significant performance gain of our approach.
The traditional development of hardware and software of embedded system is non-synchronous, low efficiency and the design knowledge can not be reused. To solve these problems, a new developing method, Reconfigurable D...
详细信息
暂无评论