Ubiquitous computing and universal network connectivity have given rise to expectations of building a Digital Society, where many aspects of business and social activities may be accomplished by remote participants. I...
详细信息
Ubiquitous computing and universal network connectivity have given rise to expectations of building a Digital Society, where many aspects of business and social activities may be accomplished by remote participants. Intelligent, context-aware, and workflow-centric collaboration is an essential prerequisite to fulfill that expectation. EkSarva is a framework, which enables realization of such collaborations in diverse domains. This is accomplished by identifying the key concepts and their inter-relationships (dubbed the PPP/SST paradigm), which form the foundation of this framework. The key concepts include: (a) Project, (b) Person, (c) Place, (d) Signal, (e) Situation, and (f) Transcript. This paper describes how these concepts collectively can give rise to an intelligent collaboration environment.
Water is an inescapable necessity for all forms of life on Earth. Therefore, both man-made reservoirs and natural reservoirs play critical roles for several purposes. Evaporation is an important factor that should be ...
详细信息
The process of unsteady flow of a single-phase liquid in a cylindrical reservoir arising under the elastic mode of reservoir development is considered. To describe this process, a power law of filtration is proposed f...
The process of unsteady flow of a single-phase liquid in a cylindrical reservoir arising under the elastic mode of reservoir development is considered. To describe this process, a power law of filtration is proposed for a single-phase flow in a porous medium. Within the framework of the proposed model, the task of identifying one parameter of the model characterizing the simulated reservoir system is set. To construct a discrete analog of the inverse problem, the finite difference method is used using an explicit–implicit approximation in time. To solve the resulting system of nonlinear equations, a special representation is proposed that allows reducing the nonlinear system to two independent systems of linear equations. As a result, an explicit formula is obtained for determining the approximate value of the desired reservoir parameter. Based on the proposed method, numerical experiments were carried out for model problems.
Background: In this Innovative Practice Work in Progress, we present our initial efforts to integrate formal methods, with a focus on model-checking specifications written in Temporal Logic of Actions (TLA+), into com...
详细信息
Background: In this Innovative Practice Work in Progress, we present our initial efforts to integrate formal methods, with a focus on model-checking specifications written in Temporal Logic of Actions (TLA+), into computer science education, targeting undergraduate juniors/seniors and graduate students. Many safety-critical systems and services crucially depend on correct and reliable behavior. Formal methods can play a key role in ensuring correct and safe system behavior, yet remain underutilized in educational and industry contexts. Aims: We aim to (1) qualitatively assess the state of formal methods in computer science programs, (2) construct level-appropriate examples that could be included midway into one’s undergraduate studies, (3) demonstrate how to address successive "failures" through progressively stringent safety and liveness requirements, and (4) establish an ongoing framework for assessing interest and relevance among students. Methods: We detail our pedagogical strategy for embedding TLA+ into an intermediate course on formal methods at our institution. After starting with a refresher on mathematical logic, students specify the rules of simple puzzles in TLA+ and use its included model checker (known as TLC) to find a solution. We gradually escalate to more complex, dynamic, event-driven systems, such as the control logic of a microwave oven, where students will study safety and liveness requirements. We subsequently discuss explicit concurrency, along with thread safety and deadlock avoidance, by modeling bounded counters and buffers. Results: Our initial findings suggest that through careful curricular design and choice of examples and tools, it is possible to inspire and cultivate a new generation of software engineers proficient in formal methods. Conclusions: Our initial efforts suggest that 84% of our students had a positive experience in our formal methods course. Our future plans include a longitudinal analysis within our own institution and
作者:
GALLAHUE, JSTHE AUTHOR is the Department Manager of Combat Systems Engineering at Litton Industries. Data Systems Division. Prior to joining Litton Industries
he was associated with UNIVAC. Since joining the Combat Systems Community in 1959. his assignments have included operational computer programming field engineering systems engineering equipment design proposal management test engineering. and programs management. In these varied roles he supported the NTDS R&D Program NTDS Service Test Program Interim Fleet Programming Center Pacific Anti-Submarine Warfare Ship Command and Control Systems SQS-26/NTDS/UBFCS Interface Design DD 963 Class LHA 1 Class. and the DDG 993 Class.
The required configuration management and the necessary control of the Surface Ship Combat System elements demand that they be considered as integrated and tested in accordance with an integrated test plan utilizing a...
The required configuration management and the necessary control of the Surface Ship Combat System elements demand that they be considered as integrated and tested in accordance with an integrated test plan utilizing an integrated test organization. The sometimes used approach of implementing a combat system test program based upon the individual combat system elements being independent, has proven to be less than satisfactory. Then is no question that some of the early testing at the unit, subsystem, and subprogram levels can be planned and conducted independent of a specific “end-item” combat System. This paper addresses the planning and implementing of combat system test with the emphases being upon the integrated phase of test and primarily the lead ship of a class. Information is presented to facilitate planning and implementing a combat system test program including use of shore facilities and integrating these activities with shipboard activities; when to form the test organization and what types of expertise are required; what are the key technical management tools; the proofing of test documentation; the need for detailed “step-by-step” procedures and traceability of the specified requirements; how to assist Ships Force; planning and stat using the conduct of the tests; integrating computer program and special testing into the test program; and the significance of early decisions on administrative and contractual arrangements.
This paper describes a new solution method applied to the problem initializing DAEs using the Modelica language. Modelica is primarily an object- oriented equ-tion-based modeling language that allows specification of ...
详细信息
This paper describes a new solution method applied to the problem initializing DAEs using the Modelica language. Modelica is primarily an object- oriented equ-tion-based modeling language that allows specification of mathematical models of complex natural or man-made systems. Major features of Modelica are the multidomain modeling capability and the reusability of model components corresponding to physical objects, which allow to build and simulate highly complex systems. However, initializing such models has been quite cumbersome, since initial equations have to be pro-vided at the system level, where the user needs to know details on the underlying transformation and index-reduction algorithms, that in general are applied to simulate a Modelica model.
The functional programs are the recursive functions. Therefore, the paper primarily discuss all the forms having the recursive function. For the data structures, such as the lists, the following forms are available: t...
详细信息
Path dissolution is an efficient generalization of the method of analytic tableaux. Both methods feature (in the propositional case) strong completeness, the lack of reliance upon conjunctive normal form (CNF), and th...
详细信息
Path dissolution is an efficient generalization of the method of analytic tableaux. Both methods feature (in the propositional case) strong completeness, the lack of reliance upon conjunctive normal form (CNF), and the ability to produce a list of essential models (satisfying interpretations) of a formula. Dissolution can speed up every step in a tableau deduction in classical logic. The authors consider means for adapting both techniques to multiple-valued logics, and show that the speed-up theorem applies in this more general setting. These results are pertinent for modeling uncertainty and commonsense reasoning.< >
An analysis of modern computer network intrusion detection systems was carried out. The application of machine and deep learning methods for classification problems has been investigated. The UNSW-NB15 dataset, develo...
详细信息
ISBN:
(数字)9798350384499
ISBN:
(纸本)9798350384505
An analysis of modern computer network intrusion detection systems was carried out. The application of machine and deep learning methods for classification problems has been investigated. The UNSW-NB15 dataset, developed at the Australian Cyber Security Center's (ACCS) Cyber Range Laboratory, contains data on normal network operations and synthetic intrusions. Data pre-processing was performed, including class balancing using the SMOTEENN method and selection of informative features using the Recursive Feature Elimination method. The possibility of using the stacking meta-algorithm to detect intrusions into computer networks has been investigated. A new algorithm for generating packets of raw data is proposed, which generates two sets of training data: one for training basic models, the other for a meta-model. A study of the effectiveness of using Random Forest, ANN, K Nearest Neighbor methods and Support Vector Machine and Random Forest as a decision-making meta-model was conducted. The use of the stacking meta-algorithm with the proposed algorithm for forming packets of output data, as well as basic models and a meta-model, led to a significant improvement in the quality of the model. It was found that, on average, recall and f1 score increased by 55.6% and 37.4%, respectively, compared to raw data and other models.
暂无评论