Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2024
Construction of green logistics evaluation index system based on big data
Journal of Computational Methods in Sciences and Engineering (JOCMSE), Volume 24, Issue 4-5Pages 2629–2642https://doi.org/10.3233/JCM-247491With the improvement of environmental awareness, green logistics, as a kind of logistics mode that can realize the unity of economic benefits and environmental benefits, has been paid more and more attention by the academia and the industry. However, how ...
- research-articleJune 2023
Suboptimal Robust Stabilization of an Unknown Autoregressive Object with Uncertainty and Offset External Perturbation
Automation and Remote Control (ARCO), Volume 84, Issue 6Pages 579–593https://doi.org/10.1134/S0005117923060097AbstractIn this paper, the problem of suboptimal stabilization of an object with discrete time, output and control uncertainties, and bounded external perturbation is considered. The autoregressive nominal model coefficients, uncertainty amplification ...
- research-articleAugust 2022
Verification of Cyber Emulation Experiments Through Virtual Machine and Host Metrics
- Jamie Thorpe,
- Laura P. Swiler,
- Seth Hanson,
- Gerardo Cruz,
- Thomas Tarman,
- Trevor Rollins,
- Bert J. Debusschere
CSET '22: Proceedings of the 15th Workshop on Cyber Security Experimentation and TestPages 71–80https://doi.org/10.1145/3546096.3546115Virtual machine emulation environments provide ideal testbeds for cybersecurity evaluations because they run real software binaries in a scalable, offline test setting that is suitable for assessing the impacts of software security flaws on the system. ...
- research-articleJanuary 2022
Modelling and verification of enterprise application integration processes through coloured Petri nets
International Journal of Computer Applications in Technology (IJCAT), Volume 70, Issue 2Pages 73–84https://doi.org/10.1504/ijcat.2022.130291Integration processes are considered workflow processes that can be modelled using a process modelling language. Integration platforms usually offer a modelling language based on the well-known integration patterns. To automatically verify the logical ...
-
- research-articleAugust 2021
Adaptive Optimal Tracking of a Discrete-Time Minimum-Phase Plant under Output Uncertainty
Automation and Remote Control (ARCO), Volume 82, Issue 8Pages 1378–1394https://doi.org/10.1134/S0005117921080051AbstractWe consider adaptive optimal tracking problems for a minimum-phase discrete-time plant with uncertainty in the output channel and bounded exogenous disturbance. The coefficients of the equation of the linear time-invariant nominal model, the ...
- research-articleOctober 2021
Differential Leave-One-Out Cross-Validation for Feature Selection in Generalized Linear Dependence Models
ITCC '21: Proceedings of the 2021 3rd International Conference on Information Technology and Computer CommunicationsPages 47–56https://doi.org/10.1145/3473465.3473474Estimation of dependencies from empirical data in a growing class of models is inevitably concerned with choosing the value of a structural parameter responsible for the model’s complexity. The most popular cross-validation schemes, in particular, LOO, ...
- research-articleJanuary 2021
Analysing State-based Models for AI Problems
Procedia Computer Science (PROCS), Volume 192, Issue CPages 736–745https://doi.org/10.1016/j.procs.2021.08.076AbstractAI problems which can be solved using a state-based model are a significant portion, covering most NP problems. Although the strategies required to solve such problems are well documented and researched, the model itself is seldom analysed, being ...
- research-articleOctober 2020
GangSweep: Sweep out Neural Backdoors by GAN
MM '20: Proceedings of the 28th ACM International Conference on MultimediaPages 3173–3181https://doi.org/10.1145/3394171.3413546This work proposes GangSweep, a new backdoor detection framework that leverages the super reconstructive power of Generative Adversarial Networks (GAN) to detect and ''sweep out'' neural backdoors. It is motivated by a series of intriguing empirical ...
- posterMarch 2020
Chaining model transformations to develop a system model verification tool: application to capella state machines and data flows models
SAC '20: Proceedings of the 35th Annual ACM Symposium on Applied ComputingPages 1654–1657https://doi.org/10.1145/3341105.3374093In the context of model-based system engineering (MBSE), the need emerges for model verification tools aiming at detecting inconsistencies in the dynamic behavioral aspect of the design. In this paper, a model-based approach is proposed to develop model ...
- research-articleMay 2019
Slicing executable system-of-systems models for efficient statistical verification
SESoS-WDES '19: Proceedings of the 7th International Workshop on Software Engineering for Systems-of-Systems and 13th Workshop on Distributed Software Development, Software Ecosystems and Systems-of-SystemsPages 18–25https://doi.org/10.1109/SESoS/WDES.2019.00011A System of Systems (SoS), composed of independent constituent systems, can create synergy among its systems to achieve a common goal. Many studies have used statistical model checking techniques to verify how well an SoS can achieve its goals. SoS ...
- articleOctober 2017
Adaptive suboptimal tracking under bounded Lipshitz uncertainty in a discrete minimum-phase object
Automation and Remote Control (ARCO), Volume 78, Issue 10Pages 1775–1789https://doi.org/10.1134/S0005117917100034We consider a deterministic problem of asymptotically suboptimal tracking of a bounded reference signal with the output of a scalar discrete minimum-phase object with unknown transition function under a bounded external disturbance and bounded nonlinear ...
- research-articleFebruary 2015
Experimental Validation of a Feed-Forward Predictor for the Spring-Loaded Inverted Pendulum Template
IEEE Transactions on Robotics (TOR), Volume 31, Issue 1Pages 208–216https://doi.org/10.1109/TRO.2014.2383531Widely accepted utility of simple spring-mass models for running behaviors as descriptive tools, as well as literal control targets, motivates accurate analytical approximations to their dynamics. Despite the availability of a number of such analytical ...
- articleDecember 2014
The Perspective on Data and Control Flow Analysis in Topological Functioning Models by Petri Nets
Applied Computer Systems (ACSS), Volume 16, Issue 1Pages 77–84https://doi.org/10.1515/acss-2014-0016Abstract The perspective on integration of two mathematical formalisms, i.e., Colored Petri Nets CPNs and Topological Functioning Model TFM, is discussed in the paper. The roots of CPNs are in modeling system functionality. The TFM joins principles of ...
- ArticleOctober 2014
Using Measures for Verifying and Improving Requirement Models in MDD Processes
QSIC '14: Proceedings of the 2014 14th International Conference on Quality SoftwarePages 164–173https://doi.org/10.1109/QSIC.2014.52It is well known that an appropriate requirement specification is essential for the success of software development projects. In the model-driven development context, the requirement models can be used as entry artifacts for aligning the final software ...
- ArticleJune 2014
Run-time generation, transformation, and verification of access control models for self-protection
SEAMS 2014: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing SystemsPages 135–144https://doi.org/10.1145/2593929.2593945Self-adaptive access control, in which self-* properties are applied to protecting systems, is a promising solution for the handling of malicious user behaviour in complex infrastructures. A major challenge in self-adaptive access control is ensuring ...
- research-articleOctober 2013
Numerical verification of bidirectional reflectance distribution functions for physical plausibility
SAICSIT '13: Proceedings of the South African Institute for Computer Scientists and Information Technologists ConferencePages 200–208https://doi.org/10.1145/2513456.2513499The implementations of a couple of often used Bidirectional Reflectance Distribution Functions (BRDFs) are numerically verified against the three conditions for physical plausibility. These conditions are positivity, symmetry (sometimes referred to as ...
- research-articleJuly 2013
Simulation of a squirrel-cage induction motor: an exercise in modeling and simulation
GCMS '13: Proceedings of the 2013 Grand Challenges on Modeling and Simulation ConferenceArticle No.: 20, Pages 1–7Stages in the development of a field-programmable gate array (FPGA) simulation of a squirrel-cage induction motor are described that clearly illustrate some of the problems that can arise in developing simulations. The authors have experience in ...
- research-articleMay 2013
Transformation operators for easier engineering of medical process models
SEHC '13: Proceedings of the 5th International Workshop on Software Engineering in Health CarePages 39–45The need for high-quality models is increasingly recognized for driving and documenting complex medical processes such as cancer therapies. A medical environment for such processes has to deal with a great multiplicity of dimensions such as different ...
- articleNovember 2012
Investigating single-type structural elements of a component Petri net during component modeling and analysis of a complex system with parallelism
Cybernetics and Systems Analysis (KLU-CASA), Volume 48, Issue 6Pages 823–831https://doi.org/10.1007/s10559-012-9461-4The process of modelling reactive distributed systems by a component Petri net (a CN-net) is considered. A mechanism for constructing composite components (places and transitions) of a CN-net is shown, and an analysis of a CN-net is demonstrated by the ...