scholarly journals Computational Abstraction

Entropy ◽  
2021 ◽  
Vol 23 (2) ◽  
pp. 213
Author(s):  
Raymond Turner

Representation and abstraction are two of the fundamental concepts of computer science. Together they enable “high-level” programming: without abstraction programming would be tied to machine code; without a machine representation, it would be a pure mathematical exercise. Representation begins with an abstract structure and seeks to find a more concrete one. Abstraction does the reverse: it starts with concrete structures and abstracts away. While formal accounts of representation are easy to find, abstraction is a different matter. In this paper, we provide an analysis of data abstraction based upon some contemporary work in the philosophy of mathematics. The paper contains a mathematical account of how Frege’s approach to abstraction may be interpreted, modified, extended and imported into type theory. We argue that representation and abstraction, while mathematical siblings, are philosophically quite different. A case of special interest concerns the abstract/physical interface which houses both the physical representation of abstract structures and the abstraction of physical systems.

2021 ◽  
Vol 43 (1) ◽  
pp. 1-46
Author(s):  
David Sanan ◽  
Yongwang Zhao ◽  
Shang-Wei Lin ◽  
Liu Yang

To make feasible and scalable the verification of large and complex concurrent systems, it is necessary the use of compositional techniques even at the highest abstraction layers. When focusing on the lowest software abstraction layers, such as the implementation or the machine code, the high level of detail of those layers makes the direct verification of properties very difficult and expensive. It is therefore essential to use techniques allowing to simplify the verification on these layers. One technique to tackle this challenge is top-down verification where by means of simulation properties verified on top layers (representing abstract specifications of a system) are propagated down to the lowest layers (that are an implementation of the top layers). There is no need to say that simulation of concurrent systems implies a greater level of complexity, and having compositional techniques to check simulation between layers is also desirable when seeking for both feasibility and scalability of the refinement verification. In this article, we present CSim 2 a (compositional) rely-guarantee-based framework for the top-down verification of complex concurrent systems in the Isabelle/HOL theorem prover. CSim 2 uses CSimpl, a language with a high degree of expressiveness designed for the specification of concurrent programs. Thanks to its expressibility, CSimpl is able to model many of the features found in real world programming languages like exceptions, assertions, and procedures. CSim 2 provides a framework for the verification of rely-guarantee properties to compositionally reason on CSimpl specifications. Focusing on top-down verification, CSim 2 provides a simulation-based framework for the preservation of CSimpl rely-guarantee properties from specifications to implementations. By using the simulation framework, properties proven on the top layers (abstract specifications) are compositionally propagated down to the lowest layers (source or machine code) in each concurrent component of the system. Finally, we show the usability of CSim 2 by running a case study over two CSimpl specifications of an Arinc-653 communication service. In this case study, we prove a complex property on a specification, and we use CSim 2 to preserve the property on lower abstraction layers.


Author(s):  
Aleksandr V. Babkin ◽  
◽  
Elena V. Shkarupeta ◽  
Vladimir A. Plotnikov ◽  
◽  
...  

Ten years after the first introduction of Industry 4.0 at Hannover trade fair as a concept of German industry efficiency improvement, the European Commission announced a new industrial evolution – Industry 5.0 and revealed an updated representation of Industry 5.0 as a result of attaining of triad forming stability, human-centricity and industry viability. At the nexus of the fourth and fifth phases of industry evolutions, new objects arise – intelligent cyber-social ecosystems that use the strengths of cyber-physical ecosystems, changing under the influence of digital end-to-end technologies, combined with human and artificial intelligence. The purpose of this research is to present a conceptual model of an intelligent (“smart”) cyber-social ecosystem based on multimodal hyperspace within the conditions of Industry 5.0. The research methodology includes systems science, metasystemic, ecosystemic, value-based, cyber-socio-techno-cognitive approaches; concepts of platforms, creator economy, Open innovations 2.0 based on an innovative model of a quadruple helix. As a result of this research, the evolution of the establishment and development of an ecosystemic paradigm in economic science is shown. The study describes a cognitive transition from cyber-physical systems of Industry 4.0 to intelligent cyber-social ecosystems as objects of Industry 5.0. A conceptual model has been originated, in which a cyber-social ecosystem is introduced as an ecosystem of new metalevel (“metasystem”), evolving under the conditions of the transition from Industry 4.0 to Industry 5.0 based on cyber-social values of human-centricity, stability and viability. The model is notable for its high level of cybernetic hyperconvergence, socioecosystemic, technological and cognitive modality to achieve ethical social goals, sustainable welfare for all humanity and each individual person, taking into account the scope of planetary capacity.


2019 ◽  
Vol 1 (2) ◽  
pp. 19-37
Author(s):  
K. Sridhar Patnaik ◽  
Itu Snigdh

Cyber-physical systems (CPS) is an exciting emerging research area that has drawn the attention of many researchers. However, the difficulties of computing and physical paradigm introduce a lot of trials while developing CPS, such as incorporation of heterogeneous physical entities, system verification, security assurance, and so on. A common or unified architecture plays an important role in the process of CPS design. This article introduces the architectural modeling representation of CPS. The layers of models are integrated from high level to lower level to get the general Meta model. Architecture captures the essential attributes of a CPS. Despite the rapid growth in IoT and CPS a general principled modeling approach for the systematic development of these new engineering systems is still missing. System modeling is one of the important aspects of developing abstract models of a system wherein, each model represents a different view or perspective of that system. With Unified Modeling Language (UML), the graphical analogy of such complex systems can be successfully presented.


2013 ◽  
Vol 23 (5) ◽  
pp. 552-593 ◽  
Author(s):  
EDWIN BRADY

AbstractMany components of a dependently typed programming language are by now well understood, for example, the underlying type theory, type checking, unification and evaluation. How to combine these components into a realistic and usable high-level language is, however, folklore, discovered anew by successive language implementors. In this paper, I describe the implementation ofIdris, a new dependently typed functional programming language.Idrisis intended to be ageneral-purposeprogramming language and as such provides high-level concepts such as implicit syntax, type classes anddonotation. I describe the high-level language and the underlying type theory, and present a tactic-based method forelaboratingconcrete high-level syntax with implicit arguments and type classes into a fully explicit type theory. Furthermore, I show how this method facilitates the implementation of new high-level language constructs.


2018 ◽  
Vol 7 (3.33) ◽  
pp. 165
Author(s):  
JangMook KANG ◽  
Cheol Hee YOON ◽  
Tae Hyeong KWON

Malicious hacking is evolving continuously malicious code attacks. It needs flexible solutions such as the prevention leakage of personal information, demanding the ability of institutions to prevent high level of infringement. But, typical simple's security control system is limited by responding only to the tertiary industry equipment in the ICT field. A CPS type security system is capable of responding to the transition from ICT to AI which is should be applied. This is time of reorganization from the current security domain to the artificial intelligent ICBM device, it should apply the digital twin model which we are considering the people and environment of CPS type system. In this paper, we have studied a model of how cyber - physical systems can be implemented using existing security system platform technology. We also propose a new security technology applying model through analyzing log form of security equipment that has occurred for many years.  


Author(s):  
Jiachuan Wang ◽  
Zhun Fan ◽  
Janis P. Terpenny ◽  
Erik D. Goodman

AbstractTo support the concurrent design processes of mechatronic subsystems, unified mechatronics modeling and cooperative body–brain coevolutionary synthesis are developed. In this paper, both body-passive physical systems and brain-active control systems can be represented using the bond graph paradigm. Bond graphs are combined with genetic programming to evolve low-level building blocks into systems with high-level functionalities including both topological configurations and parameter settings. Design spaces of coadapted mechatronic subsystems are automatically explored in parallel for overall design optimality. A quarter-car suspension system case study is provided. Compared with conventional design methods, semiactive suspension designs with more creativity and flexibility are achieved through this approach.


Author(s):  
YONG KIAM TAN ◽  
MAGNUS O. MYREEN ◽  
RAMANA KUMAR ◽  
ANTHONY FOX ◽  
SCOTT OWENS ◽  
...  

AbstractThe CakeML compiler is, to the best of our knowledge, the most realistic verified compiler for a functional programming language to date. The architecture of the compiler, a sequence of intermediate languages through which high-level features are compiled away incrementally, enables verification of each compilation pass at an appropriate level of semantic detail. Parts of the compiler’s implementation resemble mainstream (unverified) compilers for strict functional languages, and it supports several important features and optimisations. These include efficient curried multi-argument functions, configurable data representations, efficient exceptions, register allocation, and more. The compiler produces machine code for five architectures: x86-64, ARMv6, ARMv8, MIPS-64, and RISC-V. The generated machine code contains the verified runtime system which includes a verified generational copying garbage collector and a verified arbitrary precision arithmetic (bignum) library. In this paper, we present the overall design of the compiler backend, including its 12 intermediate languages. We explain how the semantics and proofs fit together and provide detail on how the compiler has been bootstrapped inside the logic of a theorem prover. The entire development has been carried out within the HOL4 theorem prover.


Author(s):  
Felician Campean ◽  
Daniel Neagu ◽  
Aleksandr Doikin ◽  
Morteza Soleimani ◽  
Thomas Byrne ◽  
...  

AbstractUnderpinned by a contemporary view of automotive systems as cyber-physical systems, characterised by progressively open architectures increasingly defined by their interaction with the users and the smart environment, this paper provides a critical and up-to-date review of automotive Integrated Vehicle Health Management (IVHM) systems. The paper discusses the challenges with prognostics and intelligent health management of automotive systems, and proposes a high-level framework, referred to as the Automotive Healthcare Analytic Factory, to systematically collect and process heterogeneous data from across the product lifecycle, towards actionable insight for personalised healthcare of systems.


Sign in / Sign up

Export Citation Format

Share Document