The paper is devoted to model based testing against non-deterministic specifications. Such test derivation strategies are well developed, for example against non-deterministic Finite State Machines, however the length...
详细信息
ISBN:
(纸本)9783031046735;9783031046728
The paper is devoted to model based testing against non-deterministic specifications. Such test derivation strategies are well developed, for example against non-deterministic Finite State Machines, however the length of the corresponding test suite can be exponential w.r.t. the number of specification states. We therefore discuss how a test suite can be minimized or reduced when certain level of guarantee concerning its fault coverage is still preserved. The main idea behind the approach is to augment the specification by assigning probabilities for the non-deterministic transitions and later on evaluate the probability of each test sequence to detect the relevant faulty implementation. Given a probability P which is user-defined, we propose an approach for minimizing a given exhaustive test suite TS such that, it stays exhaustive with the probability no less than P.
This paper presents SWAT - system-Wide Analysis Toolkit. It is based on open source emulation and debugging projects and implements the approaches for non-intrusive system-wide analysis and debugging: lightweight OS-a...
详细信息
ISBN:
(纸本)9781728189130
This paper presents SWAT - system-Wide Analysis Toolkit. It is based on open source emulation and debugging projects and implements the approaches for non-intrusive system-wide analysis and debugging: lightweight OS-agnostic virtual machine introspection, full system execution replay, non-intrusive debugging with WinDbg, and full system reverse debugging. These features are based on novel non-intrusive introspection and reverse debugging methods. They are useful for stealth debugging and analysis of the platforms with custom kernels. SWAT includes multi-platform emulator QEMU with additional instrumentation and debugging features, GUI for convenient QEMU setup and execution, QEMU plugin for non-intrusive introspection, and modified version of GDB. Our toolkit may be useful for the developers of the virtual platforms, emulators, and firmwares/drivers/operating systems. Virtual machine intospection approach does not require loading any guest agents and source code of the OS. Therefore it may be applied to ROM-based guest systems and enables using of record/replay of the system execution. This paper includes the description of SWAT components, analysis methods, and some SWAT use cases.
As the population grows, the need for higher-quality medical services increases, as well as the demand for information technology in medicine. The Smart Healthcare concept brings various approaches to address the acut...
详细信息
As the population grows, the need for higher-quality medical services increases, as well as the demand for information technology in medicine. The Smart Healthcare concept brings various approaches to address the acute problems encountered in modern healthcare. In this paper, we review the main problems of modern healthcare and analyze existing approaches and technologies in digital twins, the Internet of Things, and mobile medicine. We will also analyze the key features of modern platforms that support Mobile Health Applications. Finally, based on our analysis, we will propose the concept of Smart Healthcare Platform, focused on solving tasks related to supporting the development of Mobile Health Applications, including organizing access, management, and sharing of user data.
Convolutional Neural Networks (CNN) show high accuracy in pattern recognition solving problem but have high computational complexity, which leads to slow data processing. To increase the speed of CNN, we propose a har...
详细信息
Convolutional Neural Networks (CNN) show high accuracy in pattern recognition solving problem but have high computational complexity, which leads to slow data processing. To increase the speed of CNN, we propose a hardware implementation method with calculations in the residue number system with moduli of a special type 2 (alpha) and 2(alpha) -1. A hardware simulation of the proposed method on Field -Programmable Gate Array for LeNet-5 CNN is trained with the MNIST, FMNIST, and CIFAR-10 image databases. It has shown that the proposed approach can increase the clock frequency and performance of the device by 11-12%, compared with the traditional approach based on the positional number system.
Although genomic research has predominantly relied on phenotypic ascertainment of individuals affected with heritable disease, the falling costs of sequencing allow consideration of genomic ascertainment and reverse p...
Although genomic research has predominantly relied on phenotypic ascertainment of individuals affected with heritable disease, the falling costs of sequencing allow consideration of genomic ascertainment and reverse phenotyping (the ascertainment of individuals with specific genomic variants and subsequent evaluation of physical characteristics). In this research modality, the scientific question is inverted: investigators gather individuals with a genomic variant and test the hypothesis that there is an associated phenotype via targeted phenotypic evaluations. Genomic ascertainment research is thus a model of predictive genomic medicine and genomic screening. Here, we provide our experience implementing this research method. We describe the infrastructure we developed to perform reverse phenotyping studies, including aggregating a super-cohort of sequenced individuals who consented to recontact for genomic ascertainment research. We assessed 13 studies completed at the National institutes of Health (NIH) that piloted our reverse phenotyping approach. The studies can be broadly categorized as (1) facilitating novel genotype-disease associations, (2) expanding the phenotypic spectra, or (3) demonstrating ex vivo functional mechanisms of disease. We highlight three examples of reverse phenotyping studies in detail and describe how using a targeted reverse phenotyping approach (as opposed to phenotypic ascertainment or clinical informatics approaches) was crucial to the conclusions reached. Finally, we propose a framework and address challenges to building collaborative genomic ascertainment research programs at other institutions. Our goal is for more researchers to take advantage of this approach, which will expand our understanding of the predictive capability of genomic medicine and increase the opportunity to mitigate genomic disease.
The plane problem of a viscous laminar flow around elliptical cylinders at an angle of attack is considered. By solving the equations of the laminar boundary layer using the Loytsyansky local similarity method, the sh...
详细信息
The plane problem of a viscous laminar flow around elliptical cylinders at an angle of attack is considered. By solving the equations of the laminar boundary layer using the Loytsyansky local similarity method, the shear stress at the boundary of the ellipse and the separation points are found. From the equality of the velocities at the separation points, the circulation is found, and a complete solution to the problem of the velocity and pressure fields outside the boundary layer is constructed. The lift and drag coefficients are found depending on the attack angle and the ellipse axes ratio. The theoretical results are compared with the available experimental data and direct numerical solutions of the Navier-Stokes equations.
Code analysis for defect detection is very important in the modern world, especially in the case of complex multi-thread applications. An example of a tool, suitable for software of high complexity, is the famous S2E,...
详细信息
Code analysis for defect detection is very important in the modern world, especially in the case of complex multi-thread applications. An example of a tool, suitable for software of high complexity, is the famous S2E, which allows for full-system emulation with symbolic execution. This paper presents several major enhancements for S2E, including: firstly, support for multiple virtual cores, allowing to have parallel speed-up;secondly, on this basis, a race checker plugin to detect defects of this sort in multi-thread programs. This development has concerned such interesting points of research as scheduling in multi-core emulation and race detection with symbolic execution.
We consider Runge-Kutta methods whose stability domain includes a disk of maximum diameter for given number of stages and order. These methods are used to solve initial value problems obtained by approximating hyperbo...
详细信息
We consider Runge-Kutta methods whose stability domain includes a disk of maximum diameter for given number of stages and order. These methods are used to solve initial value problems obtained by approximating hyperbolic systems with the use of the discontinuous Galerkin method. Two three-stage methods in the class in question are proposed for which, using test problems for the transport equation and for the system of gasdynamic equations, we study the possibility to maintain the stability and monotonicity of the numerical solution with the maximum possible time steps.
A Abstract dialectical frameworks (ADFs) are a well-studied generalisation of the prominent argumentation frameworks due to Phan Minh Dung. In this paper we propose to use reduced ordered binary decision diagrams (RoB...
详细信息
ISBN:
(纸本)9783031157073;9783031157066
A Abstract dialectical frameworks (ADFs) are a well-studied generalisation of the prominent argumentation frameworks due to Phan Minh Dung. In this paper we propose to use reduced ordered binary decision diagrams (RoBDDs) as a suitable representation of the acceptance conditions of arguments within ADFs. We first show that computational complexity of reasoning on ADFs represented by RoBDDs is milder than in the general case, with a drop of one level in the polynomial hierarchy. Furthermore, we present a framework to systematically define heuristics for search space exploitation, based on easily retrievable properties of RoBDDs and the recently proposed approach of weighted faceted navigation for answer set programming. Finally, we present preliminary experiments of an implementation of our approach showing promise both when compared to state-of-the-art solvers and when developing heuristics for reasoning.
暂无评论