scholarly journals Multilayer networks as embodied consciousness interactions. A formal model approach.

2021 ◽  
Author(s):  
Camilo Miguel Signorelli ◽  
joaquin diaz boils

An algebraic interpretation of multilayer networks is introduced in relation to conscious experience, brain and body. The discussion is based on a network model for undirected multigraphs with coloured edges whose elements are time-evolving multilayers, representing complex experiential brain-body networks. These layers have the ability to merge by an associative binary operator, accounting for biological composition. As an extension, they can rotate in a formal analogy to how the activity inside layers would dynamically evolve. Under consciousness interpretation, we also studied a mathematical formulation of splitting layers, resulting in a formal analysis for the transition from conscious to non-conscious activity. From this construction, we recover core structures for conscious experience, dynamical content and causal efficacy of conscious interactions, predicting topological network changes after conscious layer interactions. Our approach provides a mathematical account of coupling and splitting layers co-arising with more complex experiences. These concrete results may inspire the use of formal studies of conscious experience not only to describe it, but also to obtain new predictions and future applications of formal mathematical tools.

2013 ◽  
Vol 3 (4) ◽  
Author(s):  
Manlio De Domenico ◽  
Albert Solé-Ribalta ◽  
Emanuele Cozzo ◽  
Mikko Kivelä ◽  
Yamir Moreno ◽  
...  

2010 ◽  
Vol 47 (1) ◽  
pp. 81-97 ◽  
Author(s):  
Marián Novotný

Abstract Design of security protocols is notoriously error-prone. For this reason, it is required to use formal methods to analyze their security properties. In the paper we present a formal analysis of the Canvas protocol. The Canvas protocol was developed by Harald Vogt and should provide data integrity inWireless Sensor Networks. However, Dieter Gollmann published an attack on the protocol. We consider the fallacy of the Canvas scheme in different models of the attacker and present a solution for correcting the scheme.We propose a formal model of the fixed Canvas protocol in the applied pi-calculus. This model includes a model of the network topology, communication channels, captured nodes, and capabilities of the attacker. Moreover, we formulate and analyze the data integrity property of the scheme in the semantic model of the applied pi-calculus. We prove that the fixed Canvas scheme, in the presence of an active adversary, provides data integrity of messages assuming that captured nodes are not direct neighbors in the communication graph of a sensor network. Finally, we discuss the applicability of the proposed formal model for analysis of other WSN security protocols.


2016 ◽  
Vol 49 (1) ◽  
pp. 58-78 ◽  
Author(s):  
Adam Karbowski

Abstract The goal of this paper is to present a formal model of firm innovation that simultaneously analyzes innovation factors characteristic to the Schumpeterian strand of industrial organization literature and the know-how strand. Corporate R&D intensity serves here as an input measure of firm innovation. R&D intensity can be defined as a ratio of firm’s R&D spending to the firm’s sales (total revenues). On the basis of formal analysis it is found that R&D intensity is fully determined by three complementary factors, i.e. a firm’s technological competence (supply-side factor), consumer preference for quality and price of a product (demand-side factor), as well as a moderator factor associated with the knowledge spillovers, which occur between competing firms in the industry. Since the above factors are expressed in terms of elasticities, the presented model is called an elasticity-based model of firm innovation. Further, within the model framework, it is shown how horizontal R&D cooperation alleviates the free-rider problem that can discourage a firm’s innovation activities. It is next postulated that horizontal R&D cooperation can be effectively treated as a complementary tool (to such traditional solutions as patent protection and public research subsidies) for solving the problem of negative externalities in an industry with pervasive knowledge spillovers.


2021 ◽  
Vol 7 ◽  
pp. e351
Author(s):  
Muhammad Rizwan Ali ◽  
Farooq Ahmad ◽  
Muhammad Hasanain Chaudary ◽  
Zuhaib Ashfaq Khan ◽  
Mohammed A. Alqahtani ◽  
...  

The cloud is a shared pool of systems that provides multiple resources through the Internet, users can access a lot of computing power using their computer. However, with the strong migration rate of multiple applications towards the cloud, more disks and servers are required to store huge data. Most of the cloud storage service providers are replicating full copies of data over multiple data centers to ensure data availability. Further, the replication is not only a costly process but also a wastage of energy resources. Furthermore, erasure codes reduce the storage cost by splitting data in n chunks and storing these chunks into n + k different data centers, to tolerate k failures. Moreover, it also needs extra computation cost to regenerate the data object. Cache-A Replica On Modification (CAROM) is a hybrid file system that gets combined benefits from both the replication and erasure codes to reduce access latency and bandwidth consumption. However, in the literature, no formal analysis of CAROM is available which can validate its performance. To address this issue, this research firstly presents a colored Petri net based formal model of CAROM. The research proceeds by presenting a formal analysis and simulation to validate the performance of the proposed system. This paper contributes towards the utilization of resources in clouds by presenting a comprehensive formal analysis of CAROM.


Author(s):  
Andreas Jacobsson ◽  
Paul Davidsson

This chapter introduces a formal model of virtual enterprises, as well as an analysis of their creation and operation. It is argued that virtual enterprises offer a promising approach to promote both innovations and collaboration between companies. A framework of integrated ICT-tools, called Plug and Play Business, which support innovators in turning their ideas into businesses by dynamically forming virtual enterprises, is also formally specified. Furthermore, issues regarding the implementation of this framework are discussed and some useful technologies are identified.


2015 ◽  
pp. 728-750
Author(s):  
Djamel Benmerzoug

This paper deals with one of the key issue in modern enterprises applications: the Agents Interaction Protocols (AiP) that are interconnecting the different parts involved in collaborative activities. The challenge here is twofold. First, we must provide a formal model that is rich enough to capture interactions characteristics. Second, we must allow designers to combine existing protocols to achieve a new specific need. The paper introduces a formal analysis framework allowing the verification of the conformance between interaction protocols. The semantics of AiP notations used in our approach and its application are described on the basis of translation rules into colored Petri net. The key feature of this framework is the ability to model and formally verify composition of AiP, where particular protocols may then be selected and composed to support a new business task. Furthermore, an agent-based architecture that supports our approach is developed. The main goal of the proposed architecture is to address and tackle AiP composition in the context of Cloud-based enterprise application.


2021 ◽  
Vol 2021 (1) ◽  
pp. 10972
Author(s):  
Sergio Giovanetti Lazzarini ◽  
Sandro Cabral ◽  
Sergio Firpo ◽  
Thomaz Teodorovicz

Author(s):  
Zakaria Benzadri ◽  
Ayoub Bouheroum ◽  
Faiza Belala

Despite the importance of fog computing, few works using formal techniques have been interested in the modelling and verification of fog architectures to ensure their security. The present work fits into this context and proposes a generic formal model (CA-BRS), extending the BRS with control agents. This offers the possibility to specify a fog architecture consisting of a set of secure fog nodes that act both as filters to reduce the amount of data sent to the cloud and as processing units close to the data collected. This formal setting makes possible the description of the multi-layers' collaboration requirements (IoT, fog, and cloud) and the analysis of certain security requirements with regard to identity management and resource access management. The execution of CA-BRS model through the framework supporting tool: “Maude-based Tool for CA-BRS” allows the formal analysis of the reliability and availability properties of an illustrative fog system example which is an oil/gas refinery plant.


SIMULATION ◽  
2021 ◽  
pp. 003754972110031
Author(s):  
Daniella Niyonkuru ◽  
Gabriel Wainer

Development of Embedded Real-Time Systems is prone to error, and developing bug-free applications is expensive and no guarantees can be provided. We introduce the concept of Digital Quadruplet which includes: a 3D virtual representation of the physical world (a Digital Twin), a Discrete-Event formal model of the system of interest (called the “Digital Triplet”), which can be used for formal analysis as well as simulation studies, and a physical model of the real system under study for experimentation (called the “Digital Quadruplet”). We focus on the definition of the idea of a Digital Quadruplet and how to make these four apparati consistent and reusable. To do so, we use the Discrete-Event formal model as a center for both simulation and execution of the real-time embedded components with timing constraints, as well as a common mechanism for interfacing with the digital counterparts, providing model continuity throughout the process. Here we focus on a principal part of the Digital Quadruplet idea: the provision of an environment to allow models to be used for simulation (in virtual time), visualization, or execution in real-time. A Discrete-EVent Systems specifications (DEVS) kernel runs on bare-metal hardware platforms, avoiding the use of an Operating RTOS in the platform, and the combination with discrete-event modeling engineering.


Sign in / Sign up

Export Citation Format

Share Document