9,598 research outputs found

    Analysis of hybrid systems using HySAT

    Get PDF
    In this paper we describe the complete workflow of analyzing the dynamic behavior of safety-critical embedded systems with HySAT. HySAT is an arithmetic constraint solver with a tightly integrated bounded model checker for hybrid discrete-continuous systems which — in contrast to many other solvers — is not confined to linear arithmetic, but can also deal with nonlinear constraints involving transcendental functions. Based on a controller for train separation implementing a “moving block ” interlocking scheme in the forthcoming European Train Control System Level 3, we exemplify the usage of the tool over the whole cycle from encoding a hybrid system to interpreting the results

    Multi-objective design of robust flight control systems

    Get PDF
    The aim of this work is to demonstrate the capabilities of evolutionary methods in the design of robust controllers for unstable fighter aircraft in the framework of H1 control theory. A multi–objective evolutionary algorithm is used to find the controller gains that minimize a weighted combination of the infinite–norm of the sensitivity function (for disturbance attenuation requirements) and complementary sensitivity function (for robust stability requirements). After considering a single operating point for a level flight trim condition of a F-16 fighter aircraft model, two different approaches will then be considered to extend the domain of validity of the control law: 1) the controller is designed for different operating points and gain scheduling is adopted; 2) a single control law is designed for all the considered operating points by multiobjective minimisation. The two approaches will be analysed and compared in terms of efficacy and required human and computational resources

    Generating Property-Directed Potential Invariants By Backward Analysis

    Full text link
    This paper addresses the issue of lemma generation in a k-induction-based formal analysis of transition systems, in the linear real/integer arithmetic fragment. A backward analysis, powered by quantifier elimination, is used to output preimages of the negation of the proof objective, viewed as unauthorized states, or gray states. Two heuristics are proposed to take advantage of this source of information. First, a thorough exploration of the possible partitionings of the gray state space discovers new relations between state variables, representing potential invariants. Second, an inexact exploration regroups and over-approximates disjoint areas of the gray state space, also to discover new relations between state variables. k-induction is used to isolate the invariants and check if they strengthen the proof objective. These heuristics can be used on the first preimage of the backward exploration, and each time a new one is output, refining the information on the gray states. In our context of critical avionics embedded systems, we show that our approach is able to outperform other academic or commercial tools on examples of interest in our application field. The method is introduced and motivated through two main examples, one of which was provided by Rockwell Collins, in a collaborative formal verification framework.Comment: In Proceedings FTSCS 2012, arXiv:1212.657

    Constraint-based reachability

    Get PDF
    Iterative imperative programs can be considered as infinite-state systems computing over possibly unbounded domains. Studying reachability in these systems is challenging as it requires to deal with an infinite number of states with standard backward or forward exploration strategies. An approach that we call Constraint-based reachability, is proposed to address reachability problems by exploring program states using a constraint model of the whole program. The keypoint of the approach is to interpret imperative constructions such as conditionals, loops, array and memory manipulations with the fundamental notion of constraint over a computational domain. By combining constraint filtering and abstraction techniques, Constraint-based reachability is able to solve reachability problems which are usually outside the scope of backward or forward exploration strategies. This paper proposes an interpretation of classical filtering consistencies used in Constraint Programming as abstract domain computations, and shows how this approach can be used to produce a constraint solver that efficiently generates solutions for reachability problems that are unsolvable by other approaches.Comment: In Proceedings Infinity 2012, arXiv:1302.310

    Successful Demand Forecasting Modeling Strategies for Increasing Small Retail Medical Supply Profitability

    Get PDF
    The lack of effective demand forecasting strategies can result in imprecise inventory replenishment, inventory overstock, and unused inventory. The purpose of this single case study was to explore successful demand forecasting strategies that leaders of a small, retail, medical supply business used to increase profitability. The conceptual framework for this study was Winters\u27s forecasting demand approach. Data were collected from semistructured, face-to-face interviews with 8 business leaders of a private, small, retail, medical supply business in the southeastern United States and the review of company artifacts. Yin\u27s 5-step qualitative data analysis process of compiling, disassembling, reassembling, interpreting, and concluding was applied. Key themes that emerged from data analysis included understanding sales trends, inventory management with pricing, and seasonality. The findings of this study might contribute to positive social change by encouraging leaders of medical supply businesses to apply demand forecasting strategies that may lead to benefits for medically underserved citizens in need of accessible and abundant medical supplies
    • …
    corecore