This paper is devoted to the problem of state estimation for a class of dynamic system with multiple nonlinear-linear (NL) mixing state constraints. A computational algorithm was developed by C. Yang and E. Blasch to ...
详细信息
This paper is devoted to the problem of state estimation for a class of dynamic system with multiple nonlinear-linear (NL) mixing state constraints. A computational algorithm was developed by C. Yang and E. Blasch to incorporate a positive definite quadratic form equality constraint into the Kalman filtering for the ground vehicle tracking. However, when the target tracked in multidimensional space, a single positive definite quadratic form constraint is not enough due to the involvement of other surface such as hyperboloid, paraboloid, or even plane. A analytic method of incorporating multiple nonlinear-linear mixing state constraints into the Kalman filter is presented here, and a sufficient condition is obtained that guarantee the existence of solution. The constraints may be time varying. At each time step the unconstrained Kalman filter solution is projected onto the state constraints surface. This significantly improves the prediction accuracy of the filter. The use of this algorithm is demonstrated on a nonlinear-linear mixing spacecraft positioning problem.
Aspect-oriented programming modularizes crosscutting concerns into aspects with the advice invoked at the specified points of program execution. Aspects can be used in a harmful way that invalidates desired properties...
详细信息
Aspect-oriented programming modularizes crosscutting concerns into aspects with the advice invoked at the specified points of program execution. Aspects can be used in a harmful way that invalidates desired properties and even destroys the conceptual integrity of programs. To assure the quality of an aspect-oriented system, rigorous analysis and design of aspects are highly desirable. In this paper, we present an approach to aspect-oriented modeling and verification with finite state machines. Our approach provides explicit notations (e.g., pointcut, advice and aspect) for capturing crosscutting concerns and incremental modification requirements with respect to class state models. For verification purposes, we compose the aspect models and class models in an aspect-oriented model through a weaving mechanism. Then we transform the woven models and the class models not affected by the aspects into FSP (Finite state Processes), which are to be checked by the LTSA (Labeled Transition System Analyzer) model checker against the desired system properties. We have applied our approach to the modeling and verification of three aspect-oriented systems. To further evaluate the effectiveness of verification, we created a large number of flawed aspect models and verified them against the system requirements. The results show that the verification has revealed all flawed models. This indicates that our approach is effective in quality assurance of aspect-oriented state models. As such, our approach can be used for model-checking state-based specification of aspect-oriented design and can uncover some system design problems before the system is implemented.
The security problem for Peer-to-peer (P2P) systems has been gradually recognized as an important topic of P2P applications. Among existing solution for P2P security, how to establish trust relationship among peers is...
详细信息
The security problem for Peer-to-peer (P2P) systems has been gradually recognized as an important topic of P2P applications. Among existing solution for P2P security, how to establish trust relationship among peers is a key problem in demand. This paper proposes a novel dynamical trust construction schema based on fuzzy decision and Extended automated trust negotiation (EATN). The presented approach adopts fuzzy trust graph to describe the trust information in the P2P systems. Trust relationship among peers can be constructed by the combination of the fuzzy trust graph, fuzzy path search algorithm and EATN. The relevant application case indicates the schema is feasible. The simulations also show that the presented schema can improve the interactive success ratio by enhancing the trust relationship in the P2P systems.
This paper presents the design of a decentralized storage scheme to support multi-dimensional range queries over sensor networks. We build a distributed k-d tree based index structure over sensor network, so as to eff...
详细信息
Memory corruption attacks account for most parts of malicious attacks toward software security. Recently dynamic taint analysis is proposed and is gaining momentum. This proposed technique attempts to defeat attacks b...
详细信息
Traditional interaction testing aims to build test suites that cover all t-way interactions of inputs. But in many test scenarios, the entire test suites cannot be fully run due to the limited budget. Therefore it is ...
详细信息
Satisfiability modulo theories (SMT) play a key role in verification applications. A crucial SMT problem is to combine separate theory solvers for the union of theories. In previous work, the simplex method is used to...
详细信息
Satisfiability modulo theories (SMT) play a key role in verification applications. A crucial SMT problem is to combine separate theory solvers for the union of theories. In previous work, the simplex method is used to determine the solvability of constraint systems and the equalities implied by constraint systems are detected by a multitude of applications of the dual simplex method. We present an effective simplex tableau-based method to identify all implicit equalities such that the simplex method is harnessed to an irreducible minimum. Experimental results show that the method is feasible and effective.
Applying SRGMs (software Reliability Growth Models) to real projects is a major concern in software reliability. Sometimes, it is hard to decide the best model for a specific project. Researchers have made a first ste...
详细信息
We investigate the evolutionary prisoner's dilemma game (PDG) on weighted Newman-Watts (NW) networks. In weighted NW networks, the link weight ωij is assigned to the link between the nodes i and j as: ωij = (...
详细信息
We investigate the evolutionary prisoner's dilemma game (PDG) on weighted Newman-Watts (NW) networks. In weighted NW networks, the link weight ωij is assigned to the link between the nodes i and j as: ωij = (ki · kj)^β, where ki(kj) is the degree of node i(j) and β represents the strength of the correlations. Obviously, the link weight can be tuned by only one parameter β. We focus on the cooperative behavior and wealth distribution in the system. Simulation results show that the cooperator frequency is promoted by a large range of β and there is a minimal cooperation frequency around β = -1. Moreover, we also employ the Gini coefficient to study the wealth distribution in the population. Numerical results show that the Gini coefficient reaches its minimum when β≈ -1. Our work may be helpful in understanding the emergence of cooperation and unequal wealth distribution in society.
Trust-based reputation system(TBRS) provides us an excellent decision-support tool for distributed environments. TBRS quantifies the trust relationships between entities based on the information that describes the ent...
详细信息
暂无评论