An Automatic Verification Method of Intelligent Substation Operation Order Based on Chinese Semantic Deep Learning

Author(s):  
Daming Zhou ◽  
Li Lee ◽  
Miao Jiang ◽  
Mingxue Wang ◽  
Jinyu Chen
2021 ◽  
Author(s):  
Andi Zheng ◽  
Yaqiong Fu ◽  
Mingze Dong ◽  
Xinyi Du ◽  
Yueming Chen ◽  
...  

2014 ◽  
Vol 2014 ◽  
pp. 1-20 ◽  
Author(s):  
Vinh Thong Ta ◽  
Levente Buttyán ◽  
Amit Dvir

We address the problem of formal and automated security verification of transport protocols for wireless sensor networks (WSN) that may perform cryptographic operations. The verification of this class of protocols is difficult because they typically consist of complex behavioral characteristics, such as real-time, probabilistic, and cryptographic operations. To solve this problem, we propose a probabilistic timed calculus for cryptographic protocols and demonstrate how to use this formal language for proving security or vulnerability of protocols. The main advantage of the proposed language is that it supports an expressive syntax and semantics, allowing for studying real-time, probabilistic, and cryptographic issues at the same time. Hence, it can be used to verify systems that involve these three properties in a convenient way. In addition, we propose an automatic verification method, based on the well-known PAT process analysis toolkit, for this class of protocols. For demonstration purposes, we apply the proposed manual and automatic proof methods for verifying the security of DTSN and SDTP, which are two of the recently proposed WSN transport protocols.


2021 ◽  
Author(s):  
ZhiHong Wang ◽  
NianSheng Chen ◽  
YiPing Ma ◽  
Lei Rao ◽  
GuangYu Fan

2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
Yu Long Fu ◽  
Xiao Long Xin

The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.


2006 ◽  
Vol 6 (3) ◽  
pp. 321-353 ◽  
Author(s):  
AHMED BOUAJJANI ◽  
AGATHE MERCERON

We address the problem of verifying clique avoidance in the TTP protocol. TTP allows several stations embedded in a car to communicate. It has many mechanisms to ensure robustness to faults. In particular, it has an algorithm that allows a station to recognize itself as faulty and leave the communication. This algorithm must satisfy the crucial ‘non-clique’ property: it is impossible to have two or more disjoint groups of stations communicating exclusively with stations in their own group. In this paper, we propose an automatic verification method for an arbitrary number of stations $N$ and a given number of faults $k$. We give an abstraction that allows to model the algorithm by means of unbounded (parametric) counter automata. We have checked the non-clique property on this model in the case of one fault, using the ALV tool as well as the LASH tool.


2020 ◽  
Vol 10 (11) ◽  
pp. 3716 ◽  
Author(s):  
Hsin-Hsiung Kao ◽  
Che-Yen Wen

Signature verification is one of the biometric techniques frequently used for personal identification. In many commercial scenarios, such as bank check payment, the signature verification process is based on human examination of a single known sample. Although there is extensive research on automatic signature verification, yet few attempts have been made to perform the verification based on a single reference sample. In this paper, we propose an off-line handwritten signature verification method based on an explainable deep learning method (deep convolutional neural network, DCNN) and unique local feature extraction approach. We use the open-source dataset, Document Analysis and Recognition (ICDAR) 2011 SigComp, to train our system and verify a questioned signature as genuine or a forgery. All samples used in our testing process are collected from a new author whose signatures are not present in the training or other stages. From the experimental results, we get the accuracy between 94.37% and 99.96%, false rejection rate (FRR) between 5.88% and 0%, false acceptance rate (FAR) between 0.22% and 5.34% in our testing dataset.


2011 ◽  
Vol 22 (04) ◽  
pp. 761-782 ◽  
Author(s):  
PAROSH AZIZ ABDULLA ◽  
GIORGIO DELZANNO ◽  
AHMED REZINE

We propose a symbolic verification method for directory-based consistency protocols working for an arbitrary number of controlled resources and competing processes. We use a graph-based language to specify in a uniform way both client/server interaction schemes and manipulation of directories that contain the access rights of individual clients. Graph transformations model the dynamics of a given protocol. Universally quantified conditions defined on the labels of edges incident to a given node are used to model inspection of directories, invalidation loops and integrity conditions. Our verification procedure computes an approximated backward reachability analysis by using a symbolic representation of sets of configurations. Termination is ensured by using the theory of well-quasi orderings.


Author(s):  
Punam R. Patil ◽  
Bhushan V. Patil

One of the challenging and effective way of identifying person through biometric techniques is Signature verification as compared to traditional handcrafted system, where a forger has access and also attempt to imitate it which is used in commercial scenarios, like bank check payment, business organizations, educational institutions, government sectors, health care industry etc. so the signature verification process is used for human examination of a single known sample. There are mainly two types of signature verification: static and dynamic. i) Static or off-line verification is the process of verifying an electronic or document signature after it has been made, ii) Dynamic or on-line verification takes place as a person creates his/her signature on a digital tablet or a similar device. As compared, Offline signature verification is not efficient and slow for a large number of documents. Therefore although vast and extensive research on signature verification there is need to more focus and review on the online signature verification method to increase efficiency using deep learning.


2012 ◽  
Vol 605-607 ◽  
pp. 1099-1104
Author(s):  
Yong Jie Fu ◽  
Xing Bo Hou

This paper is aimed at the matter that verification method of time interval generator is still manual test, low efficiency, heavy workload, and for mechanical stopwatch calibrator can not be test because of lack of a machine / electrical converter. The author developed a machine/electrical switch, and programmed the automatic verification and management software using VB language, which realized the automatic verification and information management for various types of time interval generator. The machine/electrical switch is tested by NIM, the result show that the main indexes meet the design requirements. By practical application, the system has been working condition, which can be used as standard equipment of time and frequency parameter.


Sign in / Sign up

Export Citation Format

Share Document