A Symbolic Approach to the Analysis of Multi-Formalism Markov Reward Models

Author(s):  
Kai Lampka ◽  
Markus Siegle

When modelling large systems, modularity is an important concept, as it aids modellers to master the complexity of their model. Moreover, employing different modelling formalisms within the same modelling project has the potential to ease the description of various parts or aspects of the overall system. In the area of performability modelling, formalisms such as stochastic reward nets, stochastic process algebras, stochastic automata, or stochastic UML state charts are often used, and several of these may be employed within one modelling project. This chapter presents an approach for efficiently constructing a symbolic representation in the form of a zero-suppressed Binary Decision Diagram (BDD), which represents the Markov Reward Model underlying a multi-formalism high-level model. In this approach, the interaction between the submodels may be established either by the sharing of state variables or by the synchronisation of common activities. It is shown that the Decision Diagram data structure and the associated algorithms enable highly efficient state space generation and different forms of analysis of the underlying Markov Reward Model (e.g. calculation of reward measures or asserting non-functional system properties by means of model checking techniques).

2013 ◽  
Vol 61 (3) ◽  
pp. 569-579 ◽  
Author(s):  
A. Poniszewska-Marańda

Abstract Nowadays, the growth and complexity of functionalities of current information systems, especially dynamic, distributed and heterogeneous information systems, makes the design and creation of such systems a difficult task and at the same time, strategic for businesses. A very important stage of data protection in an information system is the creation of a high level model, independent of the software, satisfying the needs of system protection and security. The process of role engineering, i.e. the identification of roles and setting up in an organization is a complex task. The paper presents the modeling and design stages in the process of role engineering in the aspect of security schema development for information systems, in particular for dynamic, distributed information systems, based on the role concept and the usage concept. Such a schema is created first of all during the design phase of a system. Two actors should cooperate with each other in this creation process, the application developer and the security administrator, to determine the minimal set of user’s roles in agreement with the security constraints that guarantee the global security coherence of the system.


Author(s):  
Daniel Tang ◽  
Mike Evans ◽  
Paul Briskham ◽  
Luca Susmel ◽  
Neil Sims

Self-pierce riveting (SPR) is a complex joining process where multiple layers of material are joined by creating a mechanical interlock via the simultaneous deformation of the inserted rivet and surrounding material. Due to the large number of variables which influence the resulting joint, finding the optimum process parameters has traditionally posed a challenge in the design of the process. Furthermore, there is a gap in knowledge regarding how changes made to the system may affect the produced joint. In this paper, a new system-level model of an inertia-based SPR system is proposed, consisting of a physics-based model of the riveting machine and an empirically-derived model of the joint. Model predictions are validated against extensive experimental data for multiple sets of input conditions, defined by the setting velocity, motor current limit and support frame type. The dynamics of the system and resulting head height of the joint are predicted to a high level of accuracy. Via a model-based case study, changes to the system are identified, which enable either the cycle time or energy consumption to be substantially reduced without compromising the overall quality of the produced joint. The predictive capabilities of the model may be leveraged to reduce the costs involved in the design and validation of SPR systems and processes.


2015 ◽  
Vol 48 (4) ◽  
pp. 348-353 ◽  
Author(s):  
Łukasz Golly ◽  
Adam Milik ◽  
Andrzej Pulka
Keyword(s):  

1977 ◽  
Vol 99 (2) ◽  
pp. 85-90 ◽  
Author(s):  
L. S. Bonderson

The system properties of passivity, losslessness, and reciprocity are defined and their necessary and sufficient conditions are derived for a class of linear one-dimensional multipower distributed systems. The utilization of power product pairs as state variables and the representation of the dynamics in first-order form allows results completely analogous to those for lumped-element systems.


2018 ◽  
Vol 6 (2) ◽  
pp. 221-234
Author(s):  
T.C. Sandanayake ◽  
P.G.C. Jayangani

Software as a service (SaaS) is one type of the cloud computing that has gained more popularity in the world. It is a way of delivering the software through the internet to its end users. Then users can use it through subscriptions from vendors.  Users have to pay only for what they use. SaaS architecture is a very high level model which is based on Application Service Provider (ASP) concept and Service Oriented Architecture. Currently many organizations are using SaaS as it is a service centric model and it uses technologies like multi-tenant architecture which in turn provides the users with many desired set of features. SaaS also have some security challenges which can be classified under data, application and deployment of SaaS architecture. Furthermore there are many emerging trends in SaaSwhich are focused on full filling advanced customer demands. This research study is evaluating the current trends, approaches and applications of SAAS.


Author(s):  
Julie Roux ◽  
Katell Morin-Allory ◽  
Vincent Beroulle ◽  
Regis Leveugle ◽  
Lilian Bossuet ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document