5,455 results on '"Automata"'
Search Results
202. PDF: Path-Oriented, Derivative-Free Approach for Safety Falsification of Nonlinear and Nondeterministic CPS.
- Author
-
Wang, Jiawan, Bu, Lei, Xing, Shaopeng, and Li, Xuandong
- Subjects
- *
FALSIFICATION , *CYBER physical systems , *MATHEMATICAL optimization , *CONTINUOUS processing , *PROBLEM solving - Abstract
Cyber-physical systems (CPSs) integrate discrete computations with continuous physical processes and can be highly nonlinear and nondeterministic. Unlike the verification of CPS, which is difficult to handle, the falsification of CPS fulfills certain requirements from testing by seeking witness behavior of these systems and is easier to conduct. However, existing falsification techniques may fail to support the general complex CPS in practice because they usually focus on certain restricted classes of systems. In this article, we present a path-oriented, derivative-free approach to falsify safety properties in nonlinear and nondeterministic CPS. In our approach, we model the behavior of CPS by hybrid automata. Then, we enumerate candidate paths of hybrid automata (HA), transform the feasibility of candidate paths into optimization problems, and solve these optimization problems by our newly proposed classification model-based, derivative-free optimization algorithm. We also provide two novel pruning techniques to further improve the efficiency and efficacy of our approach: 1) a nested optimization structure with better model refinements for continuous search space pruning and 2) a hardly feasible path prefixes guided backtracking for discrete search space pruning. We implement our approach into a tool called PDF. Our experiments showed that PDF supported the safety falsification of CPS in all of our benchmarks, and it achieved success rates no lower than 95% in only seconds on 22/28 of the benchmarks. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
203. Reduction of Diagnosers for Discrete-Event Systems.
- Author
-
Vasconcellos, Augusto Pedro, Viana, Gustavo da Silva, and Moreira, Marcos Vicente
- Subjects
GREEDY algorithms ,OPTICAL disks ,FAULT diagnosis - Abstract
The main drawback of implementing the traditional diagnoser for Discrete-Event Systems proposed in the literature is that its state set can be very large, requiring the use of a large amount of memory to store the diagnoser for complex systems. In this paper, we propose a greedy algorithm for the computation of a reduced diagnoser, that preserves the diagnosability of the system language and the same diagnosis delay as the original diagnoser. The reduction algorithm is based on merging states of the original diagnoser, and uses a free parameter to choose which and in what order states should be merged with a view to trying to obtain a diagnoser with the smallest possible number of states. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
204. Observed Data-Based Model Construction of Finite State Machines Using Exponential Representation of LMs.
- Author
-
Yan, Yongyi, Yue, Jumei, and Chen, Zengqiang
- Abstract
The problem of model construction of finite state machines (FSMs) from observed data is addressed by borrowing the methods and ideas of system identification in control theory. The construction contains three steps. Firstly, the dynamic matrix of FSM to be constructed is built from observed input and output data, the result is a logical matrix (LM). In the second stage, the obtained dynamic matrix is first represented as an exponent of an LM; then the LM is used as the structure matrix of the FSM to be built. Finally, an FSM making the observed data verified the known dynamic equation is constructed according to the one-to-one correspondence between structure matrices and FSMs. In addition, some theoretic results are presented: several necessary and sufficient conditions for the exponent representability of LMs; classification of LMs (LMs are classified into two categories, type-1 and type-2 ones, according to their exponent representability); and methods of representing each kind of LM as an exponent form of an LM. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
205. Approximate Bisimulations for Fuzzy Automata Over Complete Heyting Algebras.
- Author
-
Stanimirovic, Stefan, Micic, Ivana, and Ciric, Miroslav
- Subjects
HEYTING algebras ,BISIMULATION ,APPROXIMATION algorithms - Abstract
In this article, we define $\lambda$ -approximate simulations and bisimulations for fuzzy automata over complete Heyting algebras. The value $\lambda$ presents the degree of language similarity or equality between observed fuzzy automata. Algorithms for computing the greatest $\lambda$ -approximate simulations and bisimulations are given. We show that $\lambda$ -approximate simulations and bisimulations on a fuzzy automaton can be effectively used for factorization of fuzzy automata. We present the algorithm that splits the interval of the degrees of language similarity or equality into subintervals with the same minimal corresponding factor fuzzy automata. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
206. On Detectabilities of Fuzzy Discrete Event Systems.
- Author
-
Mekki, Ahmed O., Lin, Feng, and Ying, Hao
- Subjects
DISCRETE systems ,SYSTEMS engineering ,ENGINEERING systems - Abstract
Many biomedical systems and some engineering systems can be modeled as fuzzy discrete event systems. In this article, fuzzy discrete event systems with constraints (FDESwC) are introduced and detectabilities of FDESwC are investigated. While detectabilities of conventional crisp discrete event systems (DES) have been investigated before, detectabilities of FDESwC are much more complex because the state space of FDESwC is infinite, unlike that of crisp DES. To overcome this difficulty, trajectories of FDESwC bounded by $N$ observations are considered and $N$ -detectabilities are introduced. $N$ -detectabilities of crisp DES are first defined and proved to be equivalent to detectabilities if $N$ is sufficiently large. Fuzzy $N$ -detectabilities of FDESwC are then defined. An algorithm is derived to check fuzzy $N$ -detectabilities. While fuzzy detectabilities require to determine which state the system is in, this requirement can be relaxed in some applications. To do so, fuzzy $D$ -detectabilities are introduced and investigated, where the requirement is to distinguish certain pairs of states. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
207. Secure Recovery Procedure for Manufacturing Systems Using Synchronizing Automata and Supervisory Control Theory.
- Author
-
Alves, Lucas V. R. and Pena, Patricia N.
- Subjects
- *
MANUFACTURING processes , *DISCRETE systems , *INDUSTRIAL safety , *SUPERVISORY control systems , *PROGRAMMABLE controllers - Abstract
Manufacturing systems may be subject to external attacks and failures, so it is important to deal with the recovery of the system after these situations. This article deals with the problem of recovering a manufacturing system, modeled as a discrete event system (DES) using the supervisory control theory (SCT), when the control structure, called supervisor, desynchronizes from the physical plant. The desynchronization may be seen as plant and supervisor being in uncorresponding states. The recovery of the system may be attained if there is a word, the synchronizing word, that regardless the state of each one of them, brings the system and supervisor back to a known state. The concepts of synchronizing automata are used to do so. In this article, we show under what conditions a set of synchronizing plants and specifications leads to a synchronizing supervisor obtained by the SCT. The problem is extended to cope with multiple supervisors, proposing a local recovery when possible. We also present a simple way to model problems, composed of machines and buffers, as synchronizing automata such that it is always possible do restore synchronization between the control (supervisor) and the plant. Note to Practitioners—Given the unpredictability of faults and malicious attacks occurring in industrial systems, recovery strategies are crucial for a harmonic operation of the plant. The possibility of leading the system to a known state, recovering control, is of extreme importance to the safety of industrial processes. The method proposed in this article uses well-known concepts of supervisory control theory (SCT) of discrete event systems (DESs), introducing the recovery process (using recovery events) in the modeling phase such that it is possible to isolate and fix only the part of the control system subject to the fault. The result of the proposed approach allows the implementation of such control system with the recovery procedure directly in the programmable logic controllers (PLCs). [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
208. DESCRIPTIVE SET THEORY, FROM CANTOR TO WADGE AND BEYOND.
- Author
-
Camerlo, Riccardo
- Subjects
- *
SET theory - Abstract
The article surveys some selected topics in descriptive set theory, showing how the problem of classifying sets according to their complexity has been tackled since Cantor's creation of the subject to current research. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
209. APmap: An Open-Source Compiler for Automata Processors.
- Author
-
Yu, Jintao, Lebdeh, Muath Abu, Nguyen, Hoang Anh Du, Taouil, Mottaqiallah, and Hamdioui, Said
- Subjects
- *
OPEN source software , *ROBOTS - Abstract
A novel type of hardware accelerators called automata processors (APs) have been proposed to accelerate finite-state automata. The bone structure of an AP is a hierarchical routing matrix that connects many memory arrays. With this structure, an AP can process an input symbol every clock cycle, and hence achieve much higher performance compared to conventional architectures. However, the design automation for the APs is not well researched. This article proposes a fully automated tool named APmap for mapping the automata to APs that use a two-level routing matrix. APmap first partitions a large automaton into small graphs and then maps them. Multiple transformations are applied to the automaton by APmap to meet hardware constraints. The experiments on a standard benchmark suite show that our approach leads to around 19% less storage utilization compared to state-of-the-art. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
210. Discrete Event Approach to Robust Control in Automated Manufacturing Systems.
- Author
-
Wang, Xiaojun, Hu, Hesuan, and Zhou, MengChu
- Subjects
- *
AUTOMATIC control systems , *PRODUCTION control , *PETRI nets , *FLEXIBLE manufacturing systems , *ROBUST control , *MANUFACTURING processes , *SUPERVISORY control systems , *ACTIVE noise & vibration control - Abstract
In recent decades, deadlock control for automated manufacturing systems has been an active area. Most researchers have assumed that allocated resources, such as sensors, actuators, and controllers never fail. However, this case is not prevalent in practice due to the unexpected failure of resources. Thus, the objective of robust control is presented in this article. Several methods have been developed along this direction, such as methods that combine neighborhood constraints and the modified Banker’s algorithm, as well as methods based on critical places. To explore their effectiveness and performance, we not only conduct a comparison investigation but also develop new theoretical results. According to the experimental results, critical place-based approaches are simpler, more efficient, and more comprehensive than the Banker’s algorithm-based approaches in response to resource failures. This article is motivated by the control of production Petri nets; however, the results are also applicable to other more complex systems. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
211. Model Predictive Control of Priced Timed Automata Encoded With First-Order Logic.
- Author
-
Balta, Efe C., Kovalenko, Ilya, Spiegel, Isaac A., Tilbury, Dawn M., and Barton, Kira
- Subjects
FIRST-order logic ,MANUFACTURING processes ,PREDICTION models ,COST functions ,MANUFACTURED products ,PREDICTIVE control systems - Abstract
Priced timed automata (PTA) are discrete-event system models with temporal constraints and a cost function and are used to pose optimal scheduling and routing problems. To date, solutions to these problems have been found offline and executed open loop.This open-loop control strategy makes it impossible to account for disturbances, i.e., changes in costs or scheduling constraints over time. To address this shortcoming, this work’s first contribution is a closed-loop model predictive control (MPC) framework for PTA, enabling decision-making based on real-time model updates. To ensure the feasibility of an MPC problem, it is often desirable to soften constraints. However, the contemporary PTA theory does not consider soft constraints. Thus, this work’s second contribution is to integrate constraint softening with PTA control by harnessing the capabilities of new solvers enabled by the recasting of the models and control problem into first-order logic by employing modified encoding schemes based on existing works. Finally, the proposed control framework and implementation are demonstrated in a simulation case study on the guidance of a product through a manufacturing system. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
212. Transition Algebra for Software Testing.
- Author
-
Liu, Pan, Li, Yihao, and Miao, Huaikou
- Subjects
- *
ALGEBRA , *HUMAN behavior models , *COMPUTER software testing , *TEST methods - Abstract
Model-based testing has been highlighted in the last few decades. Many improvements have been proposed for this testing method. One improvement is the use of extended regular expressions (EREs) for modeling software behavior, and then using the ERE model to generate test paths. To improve the theory of test generation based on the ERE model, this article presents an algebraic system, named transition algebra, by extending Kleene algebra. Eight operations and their corresponding operational properties, including basic and nonbasic operational properties, are designed for transition algebra, and all such properties are proven. Five examples are given to illustrate the use of ERE modeling and algebraic operations. To ensure the automatic generation of test paths from the ERE model, the article proves that any ERE model constructed by transition algebra can be converted to a set of transition sequences. Compared to Kleene algebra with tests, transition algebra has more operations to build a powerful ERE model and more operational properties to process the ERE model for the generation of test paths. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
213. ORACALL: An Oracle-Based Attack on Cellular Automata Guided Logic Locking.
- Author
-
Saha, Akashdeep, Banerjee, Hrivu, Chakraborty, Rajat Subhra, and Mukhopadhyay, Debdeep
- Subjects
- *
CELLULAR automata , *SEQUENTIAL circuits , *COMBINATIONAL circuits , *LOGIC - Abstract
In logic locking, the finite-state machine (FSM) embedded in a sequential circuit is often chosen to be obfuscated. Such an obfuscation scheme using a class of nongroup additive cellular automata (CA) called $D1 * CA$ and $D1 * CA_{\mathrm{ dual}}$ to obfuscate each state transition of an FSM has been proposed previously. Since $D1 * CA$ and $D1 * CA_{\mathrm{ dual}}$ provide high testability even in the absence of scan-based design-for-testability techniques, they conceal the sequential elements, thus thwarting several existing scan-chain attacks. In this article, we introduce a novel attack to extract the secret key used to obfuscate each state transition of the FSM, by utilizing the information leaked by the leftmost CA cell, which is obtained via an oracle query to the obfuscated circuit. The proposed attack has two variants: 1) when the combinational circuit of the Interrupt Logic is not logic encrypted and 2) when the Interrupt Logic is logic encrypted with a $k$ -bit key. The first attack variant has a complexity of $\mathcal {O}(n \cdot m)$ , where $n$ denotes the number of transitions in the FSM, and $m$ denotes the maximum transition cycle length of the underlying $D1 * CA$. The second attack variant has a complexity of $\mathcal {O}(n\cdot q_{\mathrm{ max}})$ , where $q_{\mathrm{ max}}$ denotes the maximum number of oracle queries (equal to the number of primary inputs involved in that state transition), followed by a SAT-attack to extract the $k$ -bit key of the corresponding Interrupt Logic. The experimental evaluation of the attack on CA-based obfuscated benchmark circuits establishes the effectiveness of our proposed attack. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
214. Simulation Evaluation of Threshold-Based Bus Control Strategy Under the Mixed Traffic Condition.
- Author
-
Huang, Qingxia, Jia, Bin, Qiang, Shengjie, Jiang, Rui, Liu, Feng, and Gao, Ziyou
- Abstract
Implementing operational strategies is a sustainable and effective way for providing good bus serviceability, but the effects of the strategies on other traffic participants, e.g., cars, have drawn little attention. This paper thus aims to explore the effects of the mutual interference between buses and private cars, when applying a bus control strategy to a regular transit line. Three threshold-based strategies are compared, including (a) holding control (HC); (b) limited boarding control (LBC) and (c) holding combined with limited boarding control (H-LBC). A cellular automaton based model is proposed to depict the interaction between cars and buses, and the model parameters are calibrated using data collected from a real-life bus route in Beijing, China. The control strategies are evaluated by their benefits for three stakeholders involved in the system, including passengers, bus operator and car drivers. Simulation results show that a good bus control strategy does not only improve the efficiencies of bus operating and passenger travel, but also speed up the car running by alleviating traffic congestion. In turn, the car volume is an important factor when setting the optimal parameter for control strategies. Moreover, the comparison suggests that H-LBC outperforms the other two strategies in improving the service level for passengers, buses as well as cars, especially under crowded scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
215. Guided play: from instructions to creativity when constructing automata
- Author
-
G. Bidarra, Piedade Vaz Rebelo, O. Thiel, V. Alferes, I. Silva, C. Barreira, A. Santos, J. Almeida, I. Machado, A. Conceiçao, C. Bartolleti, F. Ferrini, J. Josephson, and N. Kostova
- Subjects
guided play ,automata ,creativity ,learning ,Psychology ,BF1-990 - Abstract
Play is a very important activity for children development and there are evidences that it can be an added value when used for educational purposes. Research about how to integrate play in education points to the importance of teacher role, namely how children play can be scaffold and guided. However, there is also lack of agreement about how to guide children playing and the impact of the guidance in the activity development and competences promoted. Given the characteristics of automata, especially the fact that they include a narrative and a mechanism, they can be used within a play based pedagogy, to implement activities related to plan and construct toys and to promote competences as observation, problem solving, creativity in the STEM areas. To explore this potential of moving toys to promote STEM in the early years of schooling is the aim of the Erasmus + AutoSTEM project. This work aims to describe the main objectives and resources of the AutoSTEM project, including the description of a workshop to construct a toy with a sliding mechanism, the Jelly Bird. The procedures involved the presentation and observation of the toy, detailed instructions on how to construct it, the decoration and the elaboration of a narrative about it. 23 children from the 2nd year of basic education participated in the workshop. The analysis of the prototypes shows that all the participants built them properly. Also some alternative ideas to the proposal initially presented emerged, as well as a diversity of narratives. These data suggest that the instructions enhanced the construction of the prototype, but did not inhibit the creativity of the work developed.
- Published
- 2020
- Full Text
- View/download PDF
216. Children's engagement and learning in 'moving toys' workshops in the 1st cycle of schooling
- Author
-
A. Santos, Piedade Vaz Rebelo, O. Thiel, G. Bidarra, V. Alferes, J. Almeida, C. Barreira, I. Machado, F. Rabaça, M. D Dias, P. Pereira, N. Catré, F. Ferrini, C. Bartolleti, J. Josephson, and N. Kostova
- Subjects
automata ,stem ,envolvimento ,aprendizagem ,Psychology ,BF1-990 - Abstract
The motivation and interest of children and young people in science areas remains a challenge for contemporary education, and there is also evidence of the importance of its promotion since the early years of schooling as well as the use of interdisciplinary approaches. The Erasmus + AutoSTEM project aims to analyse the potential of constructing automata or “moving toys” as a motivation strategy for learning in the areas of science, technology, engineering and mathematics (STEM), in the early years of schooling. The characteristics of the automata, namely the fact that they have a narrative part and a mechanism, allow, in a playful approach, to implement activities related to the planning and construction of those toys and to enhance skills such as observation, problem solving, creativity and also skills in the referred STEM areas. In this work, the description of the implementation and evaluation of automata workshops in a school of the 1st year of basic education is made. The data were collected based on direct observation focusing on dimensions of engagement and a questionnaire regarding interest, perception of learning, difficulties experienced, suggestions for improvement. Results evidence that the children showed curiosity for the prototypes presented, having immediately designed their own project, explored materials and completed the construction, in some cases with their own proposals. The perceived difficulties vary according to the age, as well as the type of mechanism chosen.
- Published
- 2020
- Full Text
- View/download PDF
217. Overview of Opacity in Discrete Event Systems
- Author
-
Ye Guo, Xiaoning Jiang, Chen Guo, Shouguang Wang, and Oussama Karoui
- Subjects
Discrete event secrete ,opacity ,automata ,Petri nets ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
In recent years, opacity has received increasing attention in terms of analyzing security and privacy problems. Opacity is a confidentiality property that characterizes a system's ability to hide its secret information from any external intruders. A systematic overview of opacity in the context of discrete event systems (DESs) was conducted; this paper firstly reviews the verification methods and computational complexity of the opacity in DESs using the formalisms of automata and Petri nets. When the system is verified to be non-opaque, the approaches that synthesize an opaque system are summarized. Finally, the future research directions and open problems of opacity in DES are also reviewed.
- Published
- 2020
- Full Text
- View/download PDF
218. Codiagnosability of Networked Discrete Event Systems With Timing Structure.
- Author
-
Viana, Gustavo S., Alves, Marcos V. S., and Basilio, Joao Carlos
- Subjects
- *
DISCRETE systems , *TELECOMMUNICATION systems - Abstract
We address, in this article, the problem of codiagnosability of networked discrete event systems with timing structure (NDESWTS) subject to delays and loss of observations of events between the measurement sites (MS) and local diagnosers (LD). To this end, we first introduce a new timed model that represents the dynamic behavior of the plant based on the, a priori, knowledge of the minimal activation time for each transition of the plant and on the maximal delays in the communication channels that connect MS and LD. We then convert this timed model into an equivalent untimed one, and add possible intermittent packet loss in the communication network. Based on this untimed model, we present necessary and sufficient conditions for NDESWTS codiagnosability and propose two tests for its verification: one that deploys diagnosers and another one that uses verifiers. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
219. A Compact and Uniform Approach for Synthesizing State-Based Property-Enforcing Supervisors for Discrete-Event Systems.
- Author
-
Meira-Goes, Romulo, Weitze, Jack, and Lafortune, Stephane
- Subjects
- *
SUPERVISORS , *SUPERVISORY control systems , *NUMBER systems , *PROBLEM solving - Abstract
In this article, we are interested in the problem of synthesizing a partial observation supervisor for a discrete-event system such that it enforces a desired property. We introduce a compact and uniform approach to the problem of synthesizing state-based property-enforcing supervisors. A state-based property is a property that only depends on the current estimate of the past behavior of the system and does not depend on its future behavior. Previous work has introduced a uniform methodology to solve this problem through the construction of a finite structure called the all enforcement structure (AES), which captures a game between the supervisor and the environment. Although the AES is a powerful structure that includes all possible property-enforcing supervisors, its construction is computationally challenging since the number of states grows exponentially in the number of states and the number of events of the system. Our contribution is the definition of a compact AES that is equivalent to but computationally more efficient than the original AES. Specifically, the compact AES enjoys the same properties as the original AES with respect to synthesizing maximally permissive supervisors under the assumption of incomparable sets of controllable and observable events. We also provide experimental results to show the benefits of the compact AES over the original AES. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
220. Synthesis of Optimal Multiobjective Attack Strategies for Controlled Systems Modeled by Probabilistic Automata.
- Author
-
Meira-Goes, Romulo, Kwong, Raymond H., and Lafortune, Stephane
- Subjects
- *
PROBABILISTIC automata , *SUPERVISORY control systems , *MARKOV processes , *COST functions , *STOCHASTIC systems , *STOCHASTIC control theory - Abstract
In this article, we study the security of control systems in the context of the supervisory control layer of stochastic discrete-event systems. Control systems heavily rely on correct communication between the plant and the controller. In this article, we consider that such communication is partially compromised by a malicious attacker. The attacker has the ability to modify a subset of the sensor readings and mislead the supervisor, with the goal of inducing the system into an unsafe state. We consider this problem from the attacker’s viewpoint and investigate the synthesis of an attack strategy for systems modeled as probabilistic automata. Specifically, we investigate the synthesis of attack functions constrained by multiple objectives. We proceed in two steps. First, we quantify each attack strategy based on the likelihood of successfully reaching an unsafe state. Based on this quantification, we study the problem of synthesizing attack functions with the maximum likelihood of successfully reaching an unsafe state. Second, we consider the problem of synthesizing attack functions that have the maximum likelihood of successfully reaching an unsafe state while minimizing a cost function, i.e., the synthesis of attack functions is constrained by multiple objectives. Our solution methodology is based on mapping these problems to optimal control problems for Markov decision processes, specifically, a probabilistic reachability problem and a stochastic shortest path problem. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
221. Supervisory Control of Timed Discrete-Event Systems With Logical and Temporal Specifications.
- Author
-
Basile, Francesco, Cordone, Roberto, and Piroddi, Luigi
- Subjects
- *
SUPERVISORY control systems , *PETRI nets , *DISCRETE systems , *LINEAR programming , *INTEGER programming - Abstract
A novel framework is introduced for the supervisory control (SC) of timed discrete event systems based on Time Petri nets. The method encompasses both logical (markings to reach or avoid) and temporal specifications (arrival and departure times in specific markings). It relies on the construction of a partial forward reachability graph of the modified state class graph type and the formulation of integer linear programming problems to establish suitable firing time intervals (FTIs) for the controllable transitions. For each enabled controllable transition, the SC algorithm provides the largest FTI that that the specifications are met, irrespectively of the firing times of the uncontrollable transitions. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
222. Optimal Secret Protections in Discrete-Event Systems.
- Author
-
Ma, Ziyue and Cai, Kai
- Subjects
- *
SUPERVISORY control systems , *OFFICIAL secrets , *FINITE state machines , *EPIPHENOMENALISM , *CYBER physical systems - Abstract
In this article, we study a security problem of protecting secrets in discrete-event systems modeled by deterministic finite automata. In the system, some states are defined as secrets, each of which is associated with a security level. The problem is to design an event-protecting policy such that any event sequence from the initial state that reaches a secret state contains a number of protected events no less than the required level of security. To solve this secret securing problem, we first develop a layered structure called the security automaton. Then, we show that the problem is transformed to a supervisory control problem in the security automaton. We consider two criteria of optimality on protecting policies: 1) disruptiveness, i.e., protecting policies with a minimum degree of disturbance to legal users’ normal operations; and 2) cost, i.e., protecting policies with a minimal cost. For the optimality on disruptiveness, we prove that a minimally disruptive protecting policy is obtained by using the classical supervisory control theory in the security automaton. For the optimality on cost, we develop a method to obtain a protecting policy with minimal cost by finding a min-cut in the security automaton. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
223. Cellular Automata Can Reduce Memory Requirements of Collective-State Computing.
- Author
-
Kleyko, Denis, Frady, Edward Paxon, and Sommer, Friedrich T.
- Subjects
- *
CELLULAR automata , *CONCRETE testing , *MEMORY , *RANDOM sets , *DISTRIBUTED computing - Abstract
Various nonclassical approaches of distributed information processing, such as neural networks, reservoir computing (RC), vector symbolic architectures (VSAs), and others, employ the principle of collective-state computing. In this type of computing, the variables relevant in computation are superimposed into a single high-dimensional state vector, the collective state. The variable encoding uses a fixed set of random patterns, which has to be stored and kept available during the computation. In this article, we show that an elementary cellular automaton with rule 90 (CA90) enables the space–time tradeoff for collective-state computing models that use random dense binary representations, i.e., memory requirements can be traded off with computation running CA90. We investigate the randomization behavior of CA90, in particular, the relation between the length of the randomization period and the size of the grid, and how CA90 preserves similarity in the presence of the initialization noise. Based on these analyses, we discuss how to optimize a collective-state computing model, in which CA90 expands representations on the fly from short seed patterns—rather than storing the full set of random patterns. The CA90 expansion is applied and tested in concrete scenarios using RC and VSAs. Our experimental results show that collective-state computing with CA90 expansion performs similarly compared to traditional collective-state models, in which random patterns are generated initially by a pseudorandom number generator and then stored in a large memory. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
224. Obfuscation mechanism for simultaneous public event information release and private event information hiding in discrete event systems.
- Author
-
Duan, Wei, Hadjicostis, Christoforos N., and Li, Zhiwu
- Abstract
In this paper, we study the problem of simultaneous public event information release and private event information hiding in discrete event systems modeled by partially observed non-deterministic finite automata, where the public and private event information is respectively defined as unobservable fault and secret events. The notion of D-C-compossibility is introduced to characterize whether a system simultaneously conceals the occurrences of secret events while releasing the occurrences of fault events. When such a property does not hold, we investigate its enforcement through a defensive function. This function takes each observable event of a system as input and generates a suitably modified event sequence at the system's output using event deletion, insertion, or substitution. Specifically, our focus is on prioritizing the concealment of the secret events while maximizing the detection of the fault events through the use of defensive functions. The notion of D-C-enforceability that refers to the capability of a defensive function to employ a strategy for manipulating observations of a system to enforce D - C -compossibility is proposed. That is, a D - C -enforcing defensive function ensures that all occurrences of fault events can be revealed while concealing all occurrences of secret events. A D - C -diagnoser construction is proposed to enumerate all feasible defensive actions following system behavior. By taking advantage of the D - C -diagnoser, we obtain a necessary and sufficient condition for D - C -enforceability, along with a corresponding obfuscation strategy for defensive functions. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
225. Clocks, Automata and the Mechanization of Nature (1300–1600)
- Author
-
Sylvain Roudaut
- Subjects
artifacts ,nature ,mechanism ,machines ,clocks ,automata ,Logic ,BC1-199 ,Philosophy (General) ,B1-5802 - Abstract
This paper aims at tracking down, by looking at late medieval and early modern discussions over the ontological status of artifacts, the main steps of the process through which nature became theorized on a mechanistic model in the early 17th century. The adopted methodology consists in examining how inventions such as mechanical clocks and automata forced philosophers to modify traditional criteria based on an intrinsic principle of motion and rest for defining natural beings. The paper studies different strategies designed in the transitional period 1300–1600 for making these inventions compatible with classical definitions of nature and artifacts. In the first part of the paper, it is shown that, even if virtually all medieval philosophers acknowledged an ontological distinction between artifacts and natural beings, these different strategies demonstrate a growing concern about the consistency of the art/nature distinction. The next part of the paper studies how mechanical clocks, even before the Scientific Revolution, served as theoretical models for applying mechanistic views to different objects (be they cosmological, physical or biological). The epistemological function of clocks appears to stem from different factors (like the specific manufacturing of late medieval clocks as well as the evolution of 16th-century mechanics) that are listed in this second part of the paper. These factors, combined with the definitional issues raised by automata, explain that clocks became the symbol of a new approach to natural philosophy, characterized by the collapse of the art/nature distinction and the “mechanization of nature”.
- Published
- 2022
- Full Text
- View/download PDF
226. Formally Reasoning About Quality.
- Author
-
ALMAGOR, SHAULL, BOKER, UDI, and KUPFERMAN, ORNA
- Subjects
REASONING ,COMPUTER software ,COMPUTER input-output equipment ,MATHEMATICAL models ,QUANTITATIVE research - Abstract
In recent years, there has been a growing need and interest in formally reasoning about the quality of software and hardware systems. As opposed to traditional verification, in which one considers the question of whether a system satisfies a given specification or not, reasoning about quality addresses the question of how well the system satisfies the specification. We distinguish between two approaches to specifying quality. The first, propositional quality, extends the specification formalism with propositional quality operators, which prioritize and weight different satisfaction possibilities. The second, temporal quality, refines the "eventually" operators of the specification formalism with discounting operators, whose semantics takes into an account the delay incurred in their satisfaction. In this article, we introduce two quantitative extensions of Linear Temporal Logic (LTL), one by propositional quality operators and one by discounting operators. In both logics, the satisfaction value of a specification is a number in [0, 1], which describes the quality of the satisfaction. We demonstrate the usefulness of both extensions and study the decidability and complexity of the decision and search problems for them as well as for extensions of LTL that combine both types of operators. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
227. 'The Catastrophe of Technology': Posthuman Automata and Nam June Paik’s Robot K-456
- Author
-
Barrett, G Douglas, author
- Published
- 2023
- Full Text
- View/download PDF
228. Aristotle on Automation – A Preindustrial Political Theory of Technology
- Author
-
Bhorat, Muhammed Ziyaad
- Subjects
Political science ,Classical studies ,Aristotle ,automata ,automation ,slavery ,technology ,work - Abstract
It would appear that our present age of advanced automation technologies is becoming less democratic. I argue that understanding the historical interaction between political thought and technological development provides insight into the relations between automation and democratic decline today. The preindustrial period serves as a foundation for this contemporary problematic, and it is Aristotle, in fact, who offers us an early political theory of automation. Moreover, we can trace the reception and rediscovery of Aristotle’s theory into medieval and early modern political thought. These periods, I argue, are often completely overlooked or misunderstood in contemporary discourses about automation because of linguistic and philological barriers that separate contemporary scholars of economics and technology from premodernity. But they show the resistance of Aristotle’s theory of automation throughout history. Ideas about automation are therefore neither new nor unique to the modern period. Aristotle’s Politics contains one of the earliest specifications of the relation between automated tools, work, and slavery in the context of political formation. Originally for Aristotle, neither automated tools nor workers required higher ‘intelligence’ to perform work. Aristotle’s idea of automation is moreover rooted in an extreme despotism, while dubiously associating freer and more democratic regimes with the substitution of work by automated tools. By interpreting Aristotle’s theory for the first time, as mediated through medieval and early Renaissance thinkers like Moerbeke, Magnus, Aquinas, Oresme, and Bruni, as well as the early modern political thought of Hobbes, I show i) the historic and enduring entanglement of political thought and technology, ii) the preindustrial period’s underappreciated role in shaping contemporary technology and politics, iii) a different, technological kind of Aristotle, and iv) a corrective to the ongoing uses and misuses of Aristotle’s theory in the Politics.
- Published
- 2022
229. On testing and automatic mending of safety PLC code.
- Author
-
Khan, Adnan and Fabian, Martin
- Subjects
PROGRAMMABLE controllers ,SUPERVISORY control systems ,DISCRETE systems - Abstract
This paper presents an approach to automatically amend an erroneous model of an implementation using a safety specification as the basis to ensure safety. Industrially, safety PLCs are common to ensure safe operations. However, before its commissioning, the implemented safety code must be tested for faults caused by spurious transitions and missing safety transitions. Spurious transitions are implemented events that are not prescribed by the safety specification, while missing safety transitions are unimplemented safety events that are prescribed by the safety specification. The presence of these faults can result in material or human damage. The proposed approach requires the model of an implementation to be trace equivalent with the given safety specification only in terms of traces composed of safety events, which is captured by the notion of safe-IOCOS. If the implementation emits other than the specified safety events then the implementation is not safe-IOCOS and requires amendment. This is achieved by removing the spurious transitions and adding the missing safety events in the implementation using synthesis techniques from the supervisory control theory. The infimal controllable superlanguage is used to compute the infimal safety extension , which adds the missing safety transitions. It is shown how the resulting model of an implementation after amendment is both safe-IOCOS and controllable with respect to the specification. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
230. An Abstraction-Free Method for Multirobot Temporal Logic Optimal Control Synthesis.
- Author
-
Luo, Xusheng, Kantaros, Yiannis, and Zavlanos, Michael M.
- Subjects
- *
LOGIC , *DATA warehousing , *ROBOTS , *MOBILE robots , *CONSTRUCTION planning - Abstract
The majority of existing linear temporal logic (LTL) planning methods rely on the construction of a discrete product automaton, which combines a discrete abstraction of robot mobility and a Büchi automaton that captures the LTL specification. Representing this product automaton as a graph and using graph search techniques, optimal plans that satisfy the LTL task can be synthesized. However, constructing expressive discrete abstractions makes the synthesis problem computationally intractable. In this article, we propose a new sampling-based LTL planning algorithm that does not require any discrete abstraction of robot mobility. Instead, it incrementally builds trees that explore the product state-space, until a maximum number of iterations is reached or a feasible plan is found. The use of trees makes data storage and graph search tractable, which significantly increases the scalability of our algorithm. To accelerate the construction of feasible plans, we introduce bias in the sampling process, which is guided by transitions in the Büchi automaton that belong to the shortest path to the accepting states. We show that our planning algorithm, with and without bias, is probabilistically complete and asymptotically optimal. Finally, we present numerical experiments showing that our method outperforms relevant temporal logic planning methods. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
231. Zero-forcing Finite Automata.
- Author
-
Shamsizadeh, M., Zahedi, M. M., Golmohamadian, M., and Abolpour, K. H.
- Subjects
- *
FINITE state machines , *GRAPH theory , *ROBOTS - Abstract
The current study aims to establish a connection between graphs and automata theory, which appar- ently demonstrate different mathematical structures. Through searching out some properties of one of these structures, we try to find some new properties of the other structure as well. This will result in obtaining some unknown properties. At first, a novel automaton called zero-forcing (Z-F) finite automata is defined according to the notion of a zero-forcing set of a graph. It is shown that for a given graph and for some zero forcing sets, various Z-F-finite automata will be obtained. In addition, the language and the closure properties of Z-F-finite automata, in particular; union, connection, and serial connection are studied. Moreover, considering some properties of graphs such as the closed trail, connected and complete; some new features for Z-F-finite automata are presented. Further, it is shown that there is not any finite graph such that f be a part of the language of its Z-F-finite automata. Actually, it is proved that for every given graph, the Z-F-finite automata of it does not show any closed trail containing all edges for every zero forcing set, but if the graph G has been a closed trail containing all edges, then the Z-F-finite automata of it has a weak closed trail containing all edges. Some examples are also given to clarify these new notions. [ABSTRACT FROM AUTHOR]
- Published
- 2021
232. Efficient Automaton Theoretical Vacuity Detection for Formal Properties.
- Author
-
Zhou, Shan, Li, Xu Zhi, Wang, Jin Bo, Yuan, Jun, and Jia, Jiao
- Subjects
- *
ROBOTS , *COMPLEXITY (Philosophy) , *SEMANTICS - Abstract
Model checking is a powerful technique for verifying the correctness of systems with respect to the requirements. While some errors happen in the property, the model itself, or the environment, we think that satisfaction of the property is meaningless (vacuous) satisfaction. It misleads users of model-checking that a system is correct. Traditional temporal logic vacuity detection is based on a syntactic definition. It is undesirable because vacuity detection would depend on syntactic formalization choices that have no effect on the semantics. This article presents an automaton-based semantic vacuity detection method which synthesizes the property into the automaton and detects the vacuity by detecting the reachability of the automaton state. Compared with the traditional syntactic-based vacuity detection, the proposed method is well suited for detecting vacuity with respect to multiple occurrences of a sub-formula. At the same time, we do not distinguish the temporal logic language. As long as the property can be synthesized into an automaton, this method can be well applied. We extend the vacuity to the satisfaction of real-time properties. The real experiments show that this method is applied efficiently in practical vacuity detection. To our knowledge, it is the first attempt to present and solve practical vacuity in an automaton view. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
233. Formal Analysis of TSN Scheduler for Real-Time Communications.
- Author
-
Lv, Jin, Zhao, Yongxin, Wu, Xi, Li, Yongjian, and Wang, Qiang
- Subjects
- *
PRODUCTION scheduling , *STARVATION - Abstract
Time sensitive networking (TSN) is an emerging technology for in-vehicle networks, which has strict timing constraints and dependability requirements. The performance and efficiency of TSN depend on a reliable scheduling mechanism for real-time communications. Traditionally, the TSN scheduler is analyzed using simulations and testing, which are error-prone and inaccurate. In this article, we employ a timed model checker UPPAAL to formally model and analyze the TSN scheduler with a consideration of its transmission latency and time utilization. We first use the build-in assertion in UPPAAL to verify the deadlock-free property, safety property, and starvation-free property of our model. Then, we calculate the time utilization and the transmission delay of audio video bridging data frame under two scheduling mechanisms according to the simulation process. Then, we compared the time performance of this two scheduling mechanisms and found that each of them has their own advantages and disadvantages. This article provides a formal analysis framework for investigating scheduling strategies in TSN, which facilitates the designers to have a better understanding and development of TSN schedulers in the future. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
234. Recognizing Lexicographically Smallest Words and Computing Successors in Regular Languages.
- Author
-
Fleischer, Lukas and Shallit, Jeffrey
- Subjects
- *
FORMAL languages , *COMPUTATIONAL complexity , *WORD problems (Mathematics) , *LANGUAGE & languages , *VOCABULARY , *POLYNOMIAL time algorithms - Abstract
For a formal language L , the problem of language enumeration asks to compute the length-lexicographically smallest word in L larger than a given input w ∈ Σ ∗ (henceforth called the L -successor of w). We investigate this problem for regular languages from a computational complexity and state complexity perspective. We first show that if L is recognized by a DFA with n states, then 2 Θ (n log n) states are (in general) necessary and sufficient for an unambiguous finite-state transducer to compute L -successors. As a byproduct, we obtain that if L is recognized by a DFA with n states, then 2 Θ (n log n) states are sufficient for a DFA to recognize the subset S (L) of L composed of its lexicographically smallest words. We give a matching lower bound that holds even if S (L) is represented as an NFA. It has been known that L -successors can be computed in polynomial time, even if the regular language is given as part of the input (assuming a suitable representation of the language, such as a DFA). In this paper, we refine this result in multiple directions. We show that if the regular language is given as part of the input and encoded as a DFA, the problem is in N L. If the regular language L is fixed, we prove that the enumeration problem of the language is reducible to deciding membership to the Myhill-Nerode equivalence classes of L under D L O G T I M E -uniform A C 0 reductions. In particular, this implies that fixed star-free languages can be enumerated in A C 0 , arbitrary fixed regular languages can be enumerated in N C 1 and that there exist regular languages for which the problem is N C 1 -complete. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
235. Assuring Intelligent Systems: Contingency Management for UAS.
- Author
-
Neogi, Natasha, Bhattacharyya, Siddhartha, Griessler, Daniel, Kiran, Harshitha, and Carvalho, Marco
- Abstract
Unmanned aircraft systems (UAS) collaborate with humans to operate in diverse, safety-critical applications. However, assurance technologies need to be integrated into the design process in order to guarantee safe behavior, thereby enabling UAS operations in the National Airspace System (NAS). In this paper, formal methods are integrated with learning-enabled systems representations. The generation and representation of knowledge are captured via monadic second-order logic rules in the cognitive architecture Soar. These rules are translated into timed automata, and a proof of correctness for the translation is provided so that safety and liveness properties can be checked in the formal verification environment Uppaal. This approach is agnostic to the learning mechanism used to generate the learned rules (e.g., chunking, etc.). An example of a fault-tolerant, learning-enabled UAS deciding which of four contingency procedures to execute under a lost link scenario while overflying an urban area is used to illustrate the approach. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
236. Opacity Measures of Fuzzy Discrete Event Systems.
- Author
-
Deng, Weilin, Qiu, Daowen, and Yang, Jingkai
- Subjects
DISCRETE systems ,FUZZY sets ,FUZZY measure theory ,FUZZY logic ,LOCATION-based services ,FIRST in, first out (Queuing theory) - Abstract
Opacity, as an important security property, has been well investigated in crisp discrete event systems. However, in some practical systems, the general behaviors, secret and nonsecret behaviors obtained by the intruder need to be expressed as fuzzy sets rather than crisp sets. Under this situation, the intruder makes inferences by fuzzy logic rather than classic logic, thus the notions of the fuzzy opacity measures are desired to be established. First, by means of the basic laws of fuzzy logic, a general fuzzy opacity measure, as a template, is presented, in this article, for the given generalized characterizations of secret and nonsecret behaviors. Moreover, a specific measure, called as fuzzy initial-final opacity (FIFO) measure, is investigated under the assumption that the secrets and nonsecrets can be coded into the initial-final state-pairs. In addition, two variants of FIFO measure are also proposed under the assumptions that the secrets and nonsecrets are only related to the initial-states or final-states. With these fuzzy opacity measures, the system designers can evaluate the opacity degree of the systems to be designed. To show the applicability of the fuzzy opacity measures to practical systems, we finally present an illustrative example of evaluating the location privacy protection systems in location-based services by means of the fuzzy opacity measures. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
237. Performance Analysis of the Automata in a Blossoming Flower Clock in the 18th Century
- Author
-
Chen, Yu-Hsun, Ceccarelli, Marco, Yan, Hong-Sen, Ceccarelli, Marco, Series editor, Corves, Burkhard, Advisory editor, Takeda, Yukio, Advisory editor, Ferraresi, Carlo, editor, and Quaglia, Giuseppe, editor
- Published
- 2018
- Full Text
- View/download PDF
238. Promethean Myths of the Twenty-First Century: Contemporary Frankenstein Film Adaptations and the Rise of the Viral Zombie
- Author
-
Aldana Reyes, Xavier, Banerjee, Anindita, Series Editor, Haywood Ferreira, Rachel, Series Editor, Bould, Mark, Series Editor, Davison, Carol Margaret, editor, and Mulvey-Roberts, Marie, editor
- Published
- 2018
- Full Text
- View/download PDF
239. Trusted Autonomy Under Uncertainty
- Author
-
Smithson, Michael, Kacprzyk, Janusz, Series editor, Abbass, Hussein A., editor, Scholz, Jason, editor, and Reid, Darryn J., editor
- Published
- 2018
- Full Text
- View/download PDF
240. Transformation Semigroups for Rough Sets
- Author
-
More, Anuj Kumar, Banerjee, Mohua, Hutchison, David, Series Editor, Kanade, Takeo, Series Editor, Kittler, Josef, Series Editor, Kleinberg, Jon M., Series Editor, Mattern, Friedemann, Series Editor, Mitchell, John C., Series Editor, Naor, Moni, Series Editor, Pandu Rangan, C., Series Editor, Steffen, Bernhard, Series Editor, Terzopoulos, Demetri, Series Editor, Tygar, Doug, Series Editor, Weikum, Gerhard, Series Editor, Nguyen, Hung Son, editor, Ha, Quang-Thuy, editor, Li, Tianrui, editor, and Przybyła-Kasperek, Małgorzata, editor
- Published
- 2018
- Full Text
- View/download PDF
241. From Two-Way Transducers to Regular Function Expressions
- Author
-
Baudru, Nicolas, Reynier, Pierre-Alain, Hutchison, David, Series Editor, Kanade, Takeo, Series Editor, Kittler, Josef, Series Editor, Kleinberg, Jon M., Series Editor, Mattern, Friedemann, Series Editor, Mitchell, John C., Series Editor, Naor, Moni, Series Editor, Pandu Rangan, C., Series Editor, Steffen, Bernhard, Series Editor, Terzopoulos, Demetri, Series Editor, Tygar, Doug, Series Editor, Weikum, Gerhard, Series Editor, Hoshi, Mizuho, editor, and Seki, Shinnosuke, editor
- Published
- 2018
- Full Text
- View/download PDF
242. Tree-to-Graph Transductions with Scope
- Author
-
Björklund, Johanna, Hutchison, David, Series Editor, Kanade, Takeo, Series Editor, Kittler, Josef, Series Editor, Kleinberg, Jon M., Series Editor, Mattern, Friedemann, Series Editor, Mitchell, John C., Series Editor, Naor, Moni, Series Editor, Pandu Rangan, C., Series Editor, Steffen, Bernhard, Series Editor, Terzopoulos, Demetri, Series Editor, Tygar, Doug, Series Editor, Weikum, Gerhard, Series Editor, Hoshi, Mizuho, editor, and Seki, Shinnosuke, editor
- Published
- 2018
- Full Text
- View/download PDF
243. A Novel Approach to Verifying Context Free Properties of Programs
- Author
-
Zhang, Nan, Duan, Zhenhua, Tian, Cong, Du, Hongwei, Hutchison, David, Series Editor, Kanade, Takeo, Series Editor, Kittler, Josef, Series Editor, Kleinberg, Jon M., Series Editor, Mattern, Friedemann, Series Editor, Mitchell, John C., Series Editor, Naor, Moni, Series Editor, Pandu Rangan, C., Series Editor, Steffen, Bernhard, Series Editor, Terzopoulos, Demetri, Series Editor, Tygar, Doug, Series Editor, Weikum, Gerhard, Series Editor, Tang, Shaojie, editor, Du, Ding-Zhu, editor, Woodruff, David, editor, and Butenko, Sergiy, editor
- Published
- 2018
- Full Text
- View/download PDF
244. Deterministic Parsing with P Colony Automata
- Author
-
Csuhaj-Varjú, Erzsébet, Kántor, Kristóf, Vaszil, György, Hutchison, David, Series Editor, Kanade, Takeo, Series Editor, Kittler, Josef, Series Editor, Kleinberg, Jon M., Series Editor, Mattern, Friedemann, Series Editor, Mitchell, John C., Series Editor, Naor, Moni, Series Editor, Pandu Rangan, C., Series Editor, Steffen, Bernhard, Series Editor, Terzopoulos, Demetri, Series Editor, Tygar, Doug, Series Editor, Weikum, Gerhard, Series Editor, Graciani, Carmen, editor, Riscos-Núñez, Agustín, editor, Păun, Gheorghe, editor, Rozenberg, Grzegorz, editor, and Salomaa, Arto, editor
- Published
- 2018
- Full Text
- View/download PDF
245. Automata - Introducing Simulations
- Author
-
Derrick, John, Boiten, Eerke, Derrick, John, and Boiten, Eerke
- Published
- 2018
- Full Text
- View/download PDF
246. Local Mean Payoff Supervisory Control for Discrete Event Systems.
- Author
-
Ji, Yiding, Yin, Xiang, and Lafortune, Stephane
- Subjects
- *
DISCRETE systems , *SUPERVISORY control systems , *PETRI nets - Abstract
This article investigates quantitative supervisory control with local mean payoff objectives on discrete event systems modeled as weighted automata. Weight flows are generated as new events occur, which are required to satisfy some quantitative conditions. We focus on mean weights (payoffs) over a finite number of events, which serve as a measure for the stability or robustness of weight flows. The range of events to evaluate the mean payoff is termed a window, which slides as new events occur. Qualitative requirements such as safety and liveness are also necessary along with quantitative requirements. Supervisory control is employed to manipulate the operation of the system so that the requirements are satisfied. We consider two different scenarios based on whether the window size is fixed or not. Correspondingly, we formulate two supervisory control problems, both of which are solved sequentially by first tackling the qualitative issues and then the quantitative ones. The automaton model is then transformed to a two-player game between the supervisor and the environment, where safety and liveness are enforced. Based on the intermediate results, several quantitative objectives are defined to formulate two games, which correspond to the two proposed supervisory control problems. Finally, we synthesize provably correct supervisors by solving the games and completely resolve both problems. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
247. Observer Construction for Polynomially Ambiguous Max-Plus Automata.
- Author
-
Lai, Aiwen, Lahaye, Sebastien, and Komenda, Jan
- Subjects
- *
DISCRETE systems , *OBSERVABILITY (Control theory) , *PETRI nets - Abstract
In this article, we deal with state estimation of timed discrete event systems that are modeled by max-plus automata (MPAs), where only some events are observable. For a given MPA, a formal procedure is first proposed for constructing its observer by extending our previous concept of observer for unambiguous MPAs to polynomially ambiguous MPAs. As an application, we present a necessary and sufficient condition based on the constructed observer to check the critical observability of MPAs. The state set of an MPA is divided into two disjoint subsets, i.e., the set of critical states and the set of noncritical states. A system is critically observable if the set of all states that are consistent with any observation is either a subset of the critical states set or a subset of the noncritical states set. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
248. Supervisory Control of Petri Nets in the Presence of Replacement Attacks.
- Author
-
You, Dan, Wang, ShouGuang, Zhou, MengChu, and Seatzu, Carla
- Subjects
- *
PETRI nets , *SUPERVISORY control systems , *DISCRETE systems - Abstract
This article addresses the robust control problem of discrete event systems assuming that replacement attacks may occur, thus making it appear that an event that has occurred looks like another event. In particular, we assume that this is done by tampering with the sensor-readings in the sensor communication channel. Specifically, we use Petri nets as the reference formalism to model the plant and assume a control specification in terms of a generalized mutual exclusion constraint. We propose three different methods to derive a control policy that is robust to the possible replacement attacks. The first two methods lead to an optimal (i.e., maximally permissive) policy but are computationally inefficient when applied to large-size systems. On the contrary, the third method computes a policy more efficiently and reveals more easily implementable in practice. However, this is done at the expense of optimality. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
249. Les illustrations en pleine page du cartulaire du XIIe siècle (ms 210 d’Avranches), problèmes d’interprétation et sources textuelles
- Author
-
Jacques Le Maho
- Subjects
illumination ,Saint Aubert ,clock ,automata ,Richard I ,Edward the Confessor ,Medieval history ,D111-203 - Abstract
The three large images that adorn folios 4v, 19v and 25v of the 12th-century cartulary have already been extensively studied and commented upon and continue to raise numerous problems of interpretation. On the assumption that these drawings are partly based on texts independent of the cartulary, the present study aims to try to identify these sources. In the case of the illustration on folio 4v, the investigation carried out through a series of historical and literary texts leads to the conclusion that the palace of Saint Aubert is probably inspired by the description of a hydraulic clock in the image of the celestial city. The illustration on folio 19v, dedicated to the Montois reform of Richard I, is based on the Introductio monachorum. The illustration on folio 25v, depicting two miracles that occurred on the Mount, seems to have two main sources: a life of William the Long Sword and the late eleventh-century book of Miracula. One of the two miracles is not associated with any of the charters in the cartulary, which raises the question of why the image was included in this collection.
- Published
- 2021
- Full Text
- View/download PDF
250. CONTRIBUTIONS OF MUSLIM MECHANICAL ENGINEERS IN MODERN AUTOMATA (IN THE LIGHT OF KITĀB AL-ḤIYAL OF AL- ǦAZARĪ) A DESCRIPTIVE AND ANALYTICAL STUDY
- Author
-
Boussy Zidan
- Subjects
mechanical engineering ,automata ,miniatures ,manuscript ,islamic civilization ,al- ǧazarī ,kitāb al-ḥiyal ,Archaeology ,CC1-960 ,History of Civilization ,CB3-482 - Abstract
(Ar) اسهامات الهندسة الميكانيكية الإسلامية في تطوير الآلات ذاتية الحركة (في ضوء كتاب الحيل للجزري) دراسة وصفية تحليلية هل كان للعرب المسلمين قديما باع في علم الهندسة الميكانيكية؟ وهل كان لهم السبق على الغرب في هذا المجال؟ من الملاحظ حاليا أن العرب والمسلمين في شتى دول العالم -تقريباً- أصبحوا مجرد مستهلكون لما ينتجه الغرب في شتى المجالات، نتيجة لما وصل اليه الغرب من تقدم وتطور تكنولوجي مستمر ومتنامي بسرعة فائقة. وهنا كان لابد لنا ان نتساءل هل كان العرب المسلمين على هذا الحال قديما؟ يقوم هذا البحث على اثبات فرضية أن العلماء المسلمين قد حققوا تقدماً كبيرا في مجال الهندسة الميكانيكية، واستطاعوا ابتكار آلات ذاتية الحركة، والمعروفة حديثاً بـ »الأتمته«. ووفقاً لذلك، كان الهدف الأساسي لهذا البحث هو إثبات صحة هذه الفرضية. يتناول هذا البحث بعض نماذج من الآلات ذاتية الحركة؛ وذلك من خلال كتاب »الجامع بين العلم والعمل النافع في معرفة الحيل الهندسية« لمؤلفه العالم المسلم الجزري. تضمن الكتاب - في الأصل مخطوط - وصف تفصيلي لهذه الآلات الميكانيكية ذاتية الحركة، وكيفية تنفيذها مشفوعا بالتصاوير الملونة المعروفة اصطلاحاً بـ »المنمنمات«. تتكون خطة البحث من تمهيد يتناول التعريف بما يصطلح عليه التكنولوجيا الدقيقة والأتمته » الآلات ذاتية الحركة«، ويلي ذلك تاريخ الأتمته بدءا من العصور القديمة وحتى العصور الوسطى. كما سيتناول البحث إسهامات علماء المسلمين في مجال الهندسة الميكانيكية بشكل عام، وفي مجال انتاج الآلات ذاتية الحركة بشكل خاص، مدعوما باستعراض نماذج للآلات ذاتية الحركة تم شرحها ضمن »كتاب الحيل«. ويلي ذلك السيرة الذاتية للعالم المسلم اسماعيل بن الرزاز الملقب بـ »الجزري «، بالإضافة إلى تحليل تاريخي وفني موجز عن المخطوط محل الدراسة. وفي النهاية سيتم عمل دراسة تحليلية للنماذج المختارة من الآلات ذاتية الحركة وعلاقتهم بالآلات الحديثة والصناعات التكنولوجية المتطورة. وفي المجمل واستنادا على »كتاب الحيل«، والذي يعود تاريخه للقرن ٧هـ/ ١٣م تمكن هذا البحث من التدليل على أن الآلات ذاتية الحركة ليست اختراعاً غربياً؛ بل هي نتاج الحضارة الإسلامية، ودليل ملموس على مدى تفوقهم في مجال الهندسة الميكانيكية منذ العصور الوسطى. (En) Were the Muslims in ancient times highly proficient in mechanical engineering? Did they have a head start over the West in this field? Unfortunately, it is noticeable nowadays that Arabs and Muslims all over the world became just consumers; exploiting all technological developments of the West that are rapidly growing. Here we had to wonder whether the Arab Muslims, long ago, was in this manner. This research hypothesizes that Muslims had attained an advanced level of mechanical engineering and were the inventors of the self-moving artifacts; recently known as automata. Accordingly, this research has undertaken the mission to prove that assumption. This paper focuses on automata machines, in light of «kitāb al-Ḥiyal» of the Muslim engineer al- Ǧazarī. This book -initially a manuscript- included a detailed description of these machines accompanied by painted illustrations known as «miniatures». The paper begins with a preface dealing with the meaning of fine technology and automata, followed by the story of automata since the antique ages and until the medieval epochs. The latter element is an indication of Muslims’ contributions to mechanical engineering in general, and automata in particular. This is supported by previewing samples on automata «self-moving» machines according to the miniatures of «kitāb al-Ḥiyal ». This is followed by briefed biography of the book’s author al- Ǧazarī and a historical and artistic analysis of the book itself. Finally, there is a concise scientific analysis of the chosen samples of automata and their relevance to modern machines and advanced technology industries. Conclusively, concerning the value of «kitāb al-Ḥiyal» which is dated back to the 7th century AH/ 13th century AD, this research accentuated that automata machines are not a Western invention, they are an outcome of the Golden Age of the Islamic civilization, proving their supremacy in mechanical engineering since the medieval epochs.
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.