A Survey on Formal Verification of Separation Kernels

Author(s):  
Ram Chandra Bhushan ◽  
Dharmendra K. Yadav

Introduction: In developing safety and security critical systems, separation kernel acts as a primary foundation, which provides spatial as well as temporal separation. Separation kernel offers highly assured partitions to the applications hosted on the fundamentally critical systems and can also control the flow of information between them. The industries, as well as academia, have developed several separation kernels that have been broadly applied in critical systems like military/defense secured applications, avionics/aerospace intelligent systems, healthcare units that deal with human lives and in many more areas. The increasing popularity of separation kernels demands the formal verification that assures the correctness of the functionalities in it. Further, formal verification of separation kernels has become mandatory by the security/safety certification authorities. Conclusion: This paper first presents the concept of separation kernel, and then it discusses the functionalities, design, and properties of it. The classification and analysis of the formal languages are being presented in this paper that has been used for writing the specifications of separation kernel and verifying it. The paper is an attempt towards the classification of formal languages being used for the verification of several separation kernels.

Author(s):  
Pierre-Loïc Garoche

The verification of control system software is critical to a host of technologies and industries, from aeronautics and medical technology to the cars we drive. The failure of controller software can cost people their lives. This book provides control engineers and computer scientists with an introduction to the formal techniques for analyzing and verifying this important class of software. Too often, control engineers are unaware of the issues surrounding the verification of software, while computer scientists tend to be unfamiliar with the specificities of controller software. The book provides a unified approach that is geared to graduate students in both fields, covering formal verification methods as well as the design and verification of controllers. It presents a wealth of new verification techniques for performing exhaustive analysis of controller software. These include new means to compute nonlinear invariants, the use of convex optimization tools, and methods for dealing with numerical imprecisions such as floating point computations occurring in the analyzed software. As the autonomy of critical systems continues to increase—as evidenced by autonomous cars, drones, and satellites and landers—the numerical functions in these systems are growing ever more advanced. The techniques presented here are essential to support the formal analysis of the controller software being used in these new and emerging technologies.


1991 ◽  
Vol 16 (5) ◽  
pp. 1-15 ◽  
Author(s):  
John Rushby ◽  
Friedrich von Henke

Author(s):  
Nidhi Rajesh Mavani ◽  
Jarinah Mohd Ali ◽  
Suhaili Othman ◽  
M. A. Hussain ◽  
Haslaniza Hashim ◽  
...  

AbstractArtificial intelligence (AI) has embodied the recent technology in the food industry over the past few decades due to the rising of food demands in line with the increasing of the world population. The capability of the said intelligent systems in various tasks such as food quality determination, control tools, classification of food, and prediction purposes has intensified their demand in the food industry. Therefore, this paper reviews those diverse applications in comparing their advantages, limitations, and formulations as a guideline for selecting the most appropriate methods in enhancing future AI- and food industry–related developments. Furthermore, the integration of this system with other devices such as electronic nose, electronic tongue, computer vision system, and near infrared spectroscopy (NIR) is also emphasized, all of which will benefit both the industry players and consumers.


Author(s):  
M Dickin

Pipe-lay vessels, heavy-lift crane vessels and dual purpose heavy-lift and pipe-lay vessels are distinct in many ways from other types of ships or offshore units. The unique functions that these vessels carry out can impact directly on the overall safety of the vessel, the personnel on-board and the potential to pollute the environment. This paper outlines some of the hull and machinery safety assurance considerations for classification and design pertinent to pipe-lay and heavy-lift operations. The considerations that are discussed in this paper include the implications of classing the vessel as a ship or an offshore unit; the interaction between classification and marine warranty; general arrangement; station-keeping; structural assessment and the interaction between safety critical systems. Specific hazards for pipe-lay vessels and their use of chemicals on-board are also discussed.


2021 ◽  
Author(s):  
Jie Huang

Insufficient WTO regulation of cross-border e-commerce confronts China and the US with three legal challenges: ambiguous classification of digital products, inadequate consumer and privacy protection, and weak protection of cross-border flow of information. China and the US have adopted converging approaches to address these challenges: inserting e-commerce chapters into their FTAs. However, the substance of these chapters is diverging. Firstly, US FTAs categorise digital products separately from goods and services and provide national treatment and most favoured nation treatment to products and their suppliers. China’s FTAs still offer no solutions to the classification of digital products and their treatment. Secondly, although China’s FTAs still provide weak protection for consumers and privacy, Chinese domestic law has converged towards US FTAs to provide better protection. Thirdly, US and China FTAs are significantly divergent in their regulation of the free flow of information. In the post-TPP era, a polycentric direction will emerge in the regulation of the free flow of information between China and the US.


2011 ◽  
pp. 131-140
Author(s):  
Gloria E Phillips-Wren ◽  
Manuel Mora ◽  
Guisseppi Forgionne

Decision support systems (DSSs) have been researched extensively over the years with the purpose of aiding the decision maker (DM) in an increasingly complex and rapidly changing environment (Sprague & Watson, 1996; Turban & Aronson, 1998). Newer intelligent systems, enabled by the advent of the Internet combined with artificial-intelligence (AI) techniques, have extended the reach of DSSs to assist with decisions in real time with multiple informaftion flows and dynamic data across geographical boundaries. All of these systems can be grouped under the broad classification of decision-making support systems (DMSS) and aim to improve human decision making. A DMSS in combination with the human DM can produce better decisions by, for example (Holsapple & Whinston, 1996), supplementing the DM’s abilities; aiding one or more of Simon’s (1997) phases of intelligence, design, and choice in decision making; facilitating problem solving; assisting with unstructured or semistructured problems (Keen & Scott Morton, 1978); providing expert guidance; and managing knowledge. Yet, the specific contribution of a DMSS toward improving decisions remains difficult to quantify.


Author(s):  
Gloria E. Phillips-Wren ◽  
Manuel Mora ◽  
Guisseppi Forgionne

Decision support systems (DSSs) have been researched extensively over the years with the purpose of aiding the decision maker (DM) in an increasingly complex and rapidly changing environment (Sprague & Watson, 1996; Turban & Aronson, 1998). Newer intelligent systems, enabled by the advent of the Internet combined with artificial-intelligence (AI) techniques, have extended the reach of DSSs to assist with decisions in real time with multiple informaftion flows and dynamic data across geographical boundaries. All of these systems can be grouped under the broad classification of decision-making support systems (DMSS) and aim to improve human decision making. A DMSS in combination with the human DM can produce better decisions by, for example (Holsapple & Whinston, 1996), supplementing the DM’s abilities; aiding one or more of Simon’s (1997) phases of intelligence, design, and choice in decision making; facilitating problem solving; assisting with unstructured or semistructured problems (Keen & Scott Morton, 1978); providing expert guidance; and managing knowledge. Yet, the specific contribution of a DMSS toward improving decisions remains difficult to quantify.


2009 ◽  
Vol 27 (5) ◽  
pp. 2011-2018 ◽  
Author(s):  
P. Dobias ◽  
J. A. Wanliss

Abstract. Intermittency is one of the possible means of quantifying dynamics of fractal processes. In this paper, the analysis of the intermittency of magnetospheric storms and substorms is presented. The analysis allows for a classification of the processes in terms of the power-law scaling of the magnitude of deviations of the index values from the values at quiet times (normal state), and the relative timings of occurrences of such deviations. These are expressed in terms of the co-dimension and the Fano factor. The relationship between the two is related to the nature of the processes behind the observed storm and substorm dynamics. The results suggest that there is a similarity between the two, and therefore it is possible that there are common dynamical processes behind the storms and substorms. In particular, it appears that both of them behave consistently with what would be expected for critical systems, which is consistent with the conclusions of several previous works.


2018 ◽  
Vol 38 (2) ◽  
pp. 52-60 ◽  
Author(s):  
Miguel Uparela Cantillo ◽  
Ruben González ◽  
Jamer Jiménez Mares ◽  
Christian Quintero Monroy

The identification of irregular users is an important assignment in the recovery of energy in the distribution sector. This analysis requires low error levels to minimize non-technical electrical losses in power grid. However, the detection of fraudulent users who have billing does not present a generalized methodology. This issue is complex and varies according to the case study. This paper presents a novel methodology to identify residential fraudulent users by using intelligent systems. The proposed intelligent system consists of three fundamental modules. The first module performs the classification of users with similar power consumption curves using self-organizing maps and genetic algorithms. The second module allows carrying out the monthly electricity demand forecasting through of recursive adjustment of ARIMA models. The third module performs the detection of fraudulent users through an artificial neural network for pattern recognition. For the design and validation of the proposed intelligent system, several tests were performed in each developed module. The database used for the design and evaluation of the modules was constructed with data supplied by the energy distribution company of the Colombian Caribbean Region. The results obtained by the proposed intelligent system show a better performance versus the detection rates obtained by the company.


Sign in / Sign up

Export Citation Format

Share Document