4 research outputs found

    Natural Deduction in a Paracomplete Setting

    Get PDF
    In this paper we present the automated proof search technique in natural deduction paracomplete logic. Here, for some statements we do not have evidence to conclude if they are true or false, as it happens in the classical framework. As a consequence, for example, formulae of the type p_:p, are not valid. In this paper we formulate the natural deduction system for paracompletelogic PComp, explain its main concepts, define proof searching techniques and the searching algorithm providing examples proofs

    Automated Realistic Test Input Generation and Cost Reduction in Service-centric System Testing

    Get PDF
    Service-centric System Testing (ScST) is more challenging than testing traditional software due to the complexity of service technologies and the limitations that are imposed by the SOA environment. One of the most important problems in ScST is the problem of realistic test data generation. Realistic test data is often generated manually or using an existing source, thus it is hard to automate and laborious to generate. One of the limitations that makes ScST challenging is the cost associated with invoking services during testing process. This thesis aims to provide solutions to the aforementioned problems, automated realistic input generation and cost reduction in ScST. To address automation in realistic test data generation, the concept of Service-centric Test Data Generation (ScTDG) is presented, in which existing services used as realistic data sources. ScTDG minimises the need for tester input and dependence on existing data sources by automatically generating service compositions that can generate the required test data. In experimental analysis, our approach achieved between 93% and 100% success rates in generating realistic data while state-of-the-art automated test data generation achieved only between 2% and 34%. The thesis addresses cost concerns at test data generation level by enabling data source selection in ScTDG. Source selection in ScTDG has many dimensions such as cost, reliability and availability. This thesis formulates this problem as an optimisation problem and presents a multi-objective characterisation of service selection in ScTDG, aiming to reduce the cost of test data generation. A cost-aware pareto optimal test suite minimisation approach addressing testing cost concerns during test execution is also presented. The approach adapts traditional multi-objective minimisation approaches to ScST domain by formulating ScST concerns, such as invocation cost and test case reliability. In experimental analysis, the approach achieved reductions between 69% and 98.6% in monetary cost of service invocations during testin

    Building safety into the conceptual design of complex systems. An aircraft systems perspective.

    Get PDF
    Safety is a critical consideration during the design of an aircraft, as it constrains how primary functions of the system can be achieved. It is essential to include safety considerations from early design stages to avoid low-performance solutions or high costs associated with the substantial redesign that is commonly required when the system is found not to be safe at late stages of the design. Additionally, safety is a crucial element in the certification process of aircraft, which requires compliance with safety requirements to be demonstrated. Existing methods for safety assessment are limited in their ability to inform architectural decisions from early design stages. Current techniques often require large amounts of manual work and are not well integrated with other system engineering tools, which translates into increased time to synthesise and analyse architectures, thus reducing the number of alternative architectures that can be studied. This lack of timely safety assessment also results in a situation where safety models evolve at a different pace and become outdated with respect to the architecture definition, which limits their ability to provide valuable feedback. Within this context, the aim is to improve the efficiency and effectiveness of design for safety as an integral part of the systems architecting process. Three objectives are proposed to achieve the stated aim: automate and integrate the hazard assessment process with the systems architecting process; facilitate the interactive introduction of safety principles; and enable a faster assessment of safety and performance of architectures. The scope is restricted to the earlier (conceptual) design stages, the use of model-based systems engineering for systems architecting (RFLP paradigm) and steady-state models for rapid analysis. Regarding the first objective, an enabler to support the generation of safety requirements through hazard assessment was created. The enabler integrates the RFLP architecting process with the System-Theoretic Process Analysis to ensure consistency of the safety assessment and derived safety requirements more efficiently. Concerning the second objective, interactive enablers were developed to support the designer when synthesizing architectures featuring a combination of safety principles such as physical redundancy, functional redundancy, and containment. To ensure consistency and reduce the required amount of work for adding safety, these methods leverage the ability to trace dependencies within the logical view and between the RFLP domains of the architecture. As required by the third objective, methods were developed to automate substantial parts of the creation process of analysis models. In particular, the methods enable rapid obtention of models for Fault Tree Analysis and subsystem sizing considering advanced contextual information such as mission, environment, and system configurations. To evaluate this research, the methods were implemented into AirCADia Architect, an object-oriented architecting tool. The methods were verified and evaluated through their applications to two aircraft-related use cases. The first use case involves the wheel brake systems and the second one involves several subsystems. The results of this study were presented to a group of design specialists from a major airframe manufacturer for evaluation. The experts concluded that the proposed framework allows architects to define and analyse safe architectures faster, thus enabling a more effective and efficient design space exploration during conceptual design.PhD in Aerospac

    Towards a standardised attack graph visual syntax

    Get PDF
    More research needs to focus on developing effective methods of aiding the understanding and perception of cyber-attacks. Attack modelling techniques (AMTs) - such as attack graphs, attack trees and fault trees, are popular methods of mathematically and visually representing the sequence of events that lead to a successful cyber-attack. Although useful in aiding cyber-attack perception, there is little empirical or comparative research which evaluates the effectiveness of these methods. Furthermore, there is no standardised attack graph visual syntax configuration, currently more than seventy-five self-nominated attack graph and twenty attack tree configurations have been described in the literature - each of which presents attributes such as preconditions and exploits in a different way. This research analyses methods of presenting cyber-attacks and reveals that attack graphs and attack trees are the dominant methods. The research proposes an attack graph visual syntax which is designed using evidence based principles. The proposed attack graph is compared with the fault tree - which is a standard method of representing events such as cyber-attacks. This comparison shows that the proposed attack graph visual syntax is more effective than the fault tree method at aiding cyber-attack perception and that the attack graph can be an effective tool for aiding cyber-attack perception - particularly in educational contexts. Although the proposed attack graph visual syntax is shown to be cognitively effective, this is no indication of practitioner acceptance. The research proceeds to identify a preferred attack graph visual syntax from a range of visual syntaxes - one of which is the proposed attack graph visual syntax. The method used to perform the comparison is conjoint analysis which is innovative for this field. The results of the second study reveal that the proposed attack graph visual syntax is one of the preferred configurations. This attack graph has the following attributes. The flow of events is represented top-down, preconditions are represented as rectangles, and exploits are represented as ellipses. The key contribution of this research is the development of an attack graph visual syntax which is effective in aiding the understanding of cyber-attacks particularly in educational contexts. The proposed method is a significant step towards standardising the attack graph visual syntax
    corecore