84 research outputs found
FIG: The Finite Improbability Generator
This paper introduces the statistical model checker FIGV, that estimates transient and steady-state reachability properties in stochastic automata. This software tool specialises in Rare Event Simulation via importance splitting, and implements the algorithms RESTART and Fixed Effort. FIG is push-button automatic since the user need not define an importance function: this function is derived from the model specification plus the property query. The tool operates with Input/Output Stochastic Automata with Urgency, aka IOSA models, described either in the native syntax or in the JANI exchange format. The theory backing FIG has demonstrated good efficiency, comparable to optimal importance splitting implemented ad hoc for specific models. Written in C++, FIG can outperform other state-of-the-art tools for Rare Event Simulation.</p
Diffusion in Fluctuating Media: The Resonant Activation Problem
We present a one-dimensional model for diffusion in a fluctuating lattice;
that is a lattice which can be in two or more states. Transitions between the
lattice states are induced by a combination of two processes: one periodic
deterministic and the other stochastic. We study the dynamics of a system of
particles moving in that medium, and characterize the problem from different
points of view: mean first passage time (MFPT), probability of return to a
given site (), and the total length displacement or number of visited
lattice sites (). We observe a double {\it resonant activation}-like
phenomenon when we plot the MFPT and as functions of the intensity of
the transition rate stochastic component.Comment: RevTex, 15 pgs, 8 figures, submitted to Eur.Phys.J.
Efficient Algorithms for Quantitative Attack Tree Analysis
Numerous analysis methods for quantitative attack tree analysis have been proposed. These algorithms compute relevant security metrics, i.e. performance indicators that quantify how good the security of a system is, such as the most likely attack, the cheapest, or the most damaging one. This paper classifies attack trees in two dimensions: proper trees vs. directed acyclic graphs (i.e. with shared subtrees); and static vs. dynamic gates. For each class, we propose novel algorithms that work over a generic attribute domain, encompassing a large number of concrete security metrics defined on the attack tree semantics. We also analyse the computational complexity of our methods
Efficient Algorithms for Quantitative Attack Tree Analysis
Numerous analysis methods for quantitative attack tree analysis have been proposed. These algorithms compute relevant security metrics, i.e. performance indicators that quantify how good the security of a system is, such as the most likely attack, the cheapest, or the most damaging one. This paper classifies attack trees in two dimensions: proper trees vs. directed acyclic graphs (i.e. with shared subtrees); and static vs. dynamic gates. For each class, we propose novel algorithms that work over a generic attribute domain, encompassing a large number of concrete security metrics defined on the attack tree semantics. We also analyse the computational complexity of our methods
Bulk Mediated Surface Diffusion: The Infinite System Case
An analytical soluble model based on a Continuous Time Random Walk (CTRW)
scheme for the adsorption-desorption processes at interfaces, called
bulk-mediated surface diffusion, is presented. The time evolution of the
effective probability distribution width on the surface is calculated and
analyzed within an anomalous diffusion framework. The asymptotic behavior for
large times shows a sub-diffusive regime for the effective surface diffusion
but, depending on the observed range of time, other regimes may be obtained.
Montecarlo simulations show excellent agreement with analytical results. As an
important byproduct of the indicated approach, we present the evaluation of the
time for the first visit to the surface.Comment: 15 pages, 7 figure
Bulk Mediated Surface Diffusion: Finite System Case
We address the dynamics of adsorbed molecules (a fundamental issue in surface
physics) within the framework of a Master Equation scheme, and study the
diffusion of particles in a finite cubic lattice whose boundaries are at the
and the planes where , while the and
directions are unbounded. As we are interested in the effective diffusion
process at the interface , we calculate analytically the conditional
probability for finding the system on the plane as well as the surface
dispersion as a function of time and compare these results with Monte Carlo
simulations finding an excellent agreement.Comment: 19 pages, 8 figure
Narrow-escape-time problem: the imperfect trapping case
We present a master equation approach to the \emph{narrow escape time} (NET)
problem, i.e. the time needed for a particle contained in a confining domain
with a single narrow opening, to exit the domain for the first time. We
introduce a finite transition probability, , at the narrow escape window
allowing the study of the imperfect trapping case. Ranging from 0 to ,
allowed the study of both extremes of the trapping process: that of a
highly deficient capture, and situations where escape is certain ("perfect
trapping" case). We have obtained analytic results for the basic quantity
studied in the NET problem, the \emph{mean escape time} (MET), and we have
studied its dependence in terms of the transition (desorption) probability over
(from) the surface boundary, the confining domain dimensions, and the finite
transition probability at the escape window. Particularly we show that the
existence of a global minimum in the NET depends on the `imperfection' of the
trapping process. In addition to our analytical approach, we have implemented
Monte Carlo simulations, finding excellent agreement between the theoretical
results and simulations.Comment: 9 page
Automated fault tree learning from continuous-valued sensor data: a case study on domestic heaters
Many industrial sectors have been collecting big sensor data. With recent
technologies for processing big data, companies can exploit this for automatic
failure detection and prevention. We propose the first completely automated
method for failure analysis, machine-learning fault trees from raw
observational data with continuous variables. Our method scales well and is
tested on a real-world, five-year dataset of domestic heater operations in The
Netherlands, with 31 million unique heater-day readings, each containing 27
sensor and 11 failure variables. Our method builds on two previous procedures:
the C4.5 decision-tree learning algorithm, and the LIFT fault tree learning
algorithm from Boolean data. C4.5 pre-processes each continuous variable: it
learns an optimal numerical threshold which distinguishes between faulty and
normal operation of the top-level system. These thresholds discretise the
variables, thus allowing LIFT to learn fault trees which model the root failure
mechanisms of the system and are explainable. We obtain fault trees for the 11
failure variables, and evaluate them in two ways: quantitatively, with a
significance score, and qualitatively, with domain specialists. Some of the
fault trees learnt have almost maximum significance (above 0.95), while others
have medium-to-low significance (around 0.30), reflecting the difficulty of
learning from big, noisy, real-world sensor data. The domain specialists
confirm that the fault trees model meaningful relationships among the
variables.Comment: Preprint submitted to the International Journal of Prognostics and
Health Management - March 202
- …