3,801 research outputs found

    Formal Analysis of Linear Control Systems using Theorem Proving

    Full text link
    Control systems are an integral part of almost every engineering and physical system and thus their accurate analysis is of utmost importance. Traditionally, control systems are analyzed using paper-and-pencil proof and computer simulation methods, however, both of these methods cannot provide accurate analysis due to their inherent limitations. Model checking has been widely used to analyze control systems but the continuous nature of their environment and physical components cannot be truly captured by a state-transition system in this technique. To overcome these limitations, we propose to use higher-order-logic theorem proving for analyzing linear control systems based on a formalized theory of the Laplace transform method. For this purpose, we have formalized the foundations of linear control system analysis in higher-order logic so that a linear control system can be readily modeled and analyzed. The paper presents a new formalization of the Laplace transform and the formal verification of its properties that are frequently used in the transfer function based analysis to judge the frequency response, gain margin and phase margin, and stability of a linear control system. We also formalize the active realizations of various controllers, like Proportional-Integral-Derivative (PID), Proportional-Integral (PI), Proportional-Derivative (PD), and various active and passive compensators, like lead, lag and lag-lead. For illustration, we present a formal analysis of an unmanned free-swimming submersible vehicle using the HOL Light theorem prover.Comment: International Conference on Formal Engineering Method

    A mechanized proof of loop freedom of the (untimed) AODV routing protocol

    Full text link
    The Ad hoc On-demand Distance Vector (AODV) routing protocol allows the nodes in a Mobile Ad hoc Network (MANET) or a Wireless Mesh Network (WMN) to know where to forward data packets. Such a protocol is 'loop free' if it never leads to routing decisions that forward packets in circles. This paper describes the mechanization of an existing pen-and-paper proof of loop freedom of AODV in the interactive theorem prover Isabelle/HOL. The mechanization relies on a novel compositional approach for lifting invariants to networks of nodes. We exploit the mechanization to analyse several improvements of AODV and show that Isabelle/HOL can re-establish most proof obligations automatically and identify exactly the steps that are no longer valid.Comment: The Isabelle/HOL source files, and a full proof document, are available in the Archive of Formal Proofs, at http://afp.sourceforge.net/entries/AODV.shtm

    Mechanizing a Process Algebra for Network Protocols

    Get PDF
    This paper presents the mechanization of a process algebra for Mobile Ad hoc Networks and Wireless Mesh Networks, and the development of a compositional framework for proving invariant properties. Mechanizing the core process algebra in Isabelle/HOL is relatively standard, but its layered structure necessitates special treatment. The control states of reactive processes, such as nodes in a network, are modelled by terms of the process algebra. We propose a technique based on these terms to streamline proofs of inductive invariance. This is not sufficient, however, to state and prove invariants that relate states across multiple processes (entire networks). To this end, we propose a novel compositional technique for lifting global invariants stated at the level of individual nodes to networks of nodes.Comment: This paper is an extended version of arXiv:1407.3519. The Isabelle/HOL source files, and a full proof document, are available in the Archive of Formal Proofs, at http://afp.sourceforge.net/entries/AWN.shtm

    Formal mechanization of device interactions with a process algebra

    Get PDF
    The principle emphasis is to develop a methodology to formally verify correct synchronization communication of devices in a composed hardware system. Previous system integration efforts have focused on vertical integration of one layer on top of another. This task examines 'horizontal' integration of peer devices. To formally reason about communication, we mechanize a process algebra in the Higher Order Logic (HOL) theorem proving system. Using this formalization we show how four types of device interactions can be represented and verified to behave as specified. The report also describes the specification of a system consisting of an AVM-1 microprocessor and a memory management unit which were verified in previous work. A proof of correct communication is presented, and the extensions to the system specification to add a direct memory device are discussed

    An Introduction to Mechanized Reasoning

    Get PDF
    Mechanized reasoning uses computers to verify proofs and to help discover new theorems. Computer scientists have applied mechanized reasoning to economic problems but -- to date -- this work has not yet been properly presented in economics journals. We introduce mechanized reasoning to economists in three ways. First, we introduce mechanized reasoning in general, describing both the techniques and their successful applications. Second, we explain how mechanized reasoning has been applied to economic problems, concentrating on the two domains that have attracted the most attention: social choice theory and auction theory. Finally, we present a detailed example of mechanized reasoning in practice by means of a proof of Vickrey's familiar theorem on second-price auctions

    Monte Carlo verification of the holder correction factors for the radiophotoluminescent glass dosimeter used by the IAEA in international dosimetry audits

    Get PDF
    The International Atomic Energy Agency (IAEA), jointly with the World Health Organization (WHO), has operated a postal dosimetry audit program for radiotherapy centers worldwide since 1969. In 2017 the IAEA introduced a new methodology based on radiophotoluminescent dosimetry (RPLD) for these audits. The detection system consists of a phosphate glass dosimeter inserted in a plastic capsule that is kept in measuring position with a PMMA holder during irradiation. Correction factors for this holder were obtained using experimental methods. In this work these methods are described and the resulting factors are verified by means of Monte Carlo simulation with the general-purpose code PENELOPE for a range of photon beam qualities relevant in radiotherapy. The study relies on a detailed geometrical representation of the experimental setup. Various photon beams were obtained from faithful modeling of the corresponding linacs. Monte Carlo simulation transport parameters are selected to ensure subpercent accuracy. The simulated correction factors fall in the interval 1.005–1.008 (±0.2%), with deviations with respect to experimental values not larger than 0.2(2)%. This study corroborates the validity of the holder correction factors currently used for the IAEA audits.Peer ReviewedPostprint (author's final draft

    Product formula for p-adic epsilon factors

    Full text link
    Let X be a smooth proper curve over a finite field of characteristic p. We prove a product formula for p-adic epsilon factors of arithmetic D-modules on X. In particular we deduce the analogous formula for overconvergent F-isocrystals, which was conjectured previously. The p-adic product formula is the equivalent in rigid cohomology of the Deligne-Laumon formula for epsilon factors in l-adic \'etale cohomology (for a prime l different from p). One of the main tools in the proof of this p-adic formula is a theorem of regular stationary phase for arithmetic D-modules that we prove by microlocal techniques.Comment: Revised version: some proofs and constructions detailed, notation improved, index of notation added ; 88 page

    Using of small-scale quantum computers in cryptography with many-qubit entangled states

    Full text link
    We propose a new cryptographic protocol. It is suggested to encode information in ordinary binary form into many-qubit entangled states with the help of a quantum computer. A state of qubits (realized, e.g., with photons) is transmitted through a quantum channel to the addressee, who applies a quantum computer tuned to realize the inverse unitary transformation decoding of the message. Different ways of eavesdropping are considered, and an estimate of the time needed for determining the secret unitary transformation is given. It is shown that using even small quantum computers can serve as a basis for very efficient cryptographic protocols. For a suggested cryptographic protocol, the time scale on which communication can be considered secure is exponential in the number of qubits in the entangled states and in the number of gates used to construct the quantum network
    corecore