84 research outputs found

    FIG: The Finite Improbability Generator

    Get PDF
    This paper introduces the statistical model checker FIGV, that estimates transient and steady-state reachability properties in stochastic automata. This software tool specialises in Rare Event Simulation via importance splitting, and implements the algorithms RESTART and Fixed Effort. FIG is push-button automatic since the user need not define an importance function: this function is derived from the model specification plus the property query. The tool operates with Input/Output Stochastic Automata with Urgency, aka IOSA models, described either in the native syntax or in the JANI exchange format. The theory backing FIG has demonstrated good efficiency, comparable to optimal importance splitting implemented ad hoc for specific models. Written in C++, FIG can outperform other state-of-the-art tools for Rare Event Simulation.</p

    Diffusion in Fluctuating Media: The Resonant Activation Problem

    Full text link
    We present a one-dimensional model for diffusion in a fluctuating lattice; that is a lattice which can be in two or more states. Transitions between the lattice states are induced by a combination of two processes: one periodic deterministic and the other stochastic. We study the dynamics of a system of particles moving in that medium, and characterize the problem from different points of view: mean first passage time (MFPT), probability of return to a given site (Ps0P_{s_0}), and the total length displacement or number of visited lattice sites (Λ\Lambda). We observe a double {\it resonant activation}-like phenomenon when we plot the MFPT and Ps0P_{s_0} as functions of the intensity of the transition rate stochastic component.Comment: RevTex, 15 pgs, 8 figures, submitted to Eur.Phys.J.

    Efficient Algorithms for Quantitative Attack Tree Analysis

    Get PDF
    Numerous analysis methods for quantitative attack tree analysis have been proposed. These algorithms compute relevant security metrics, i.e. performance indicators that quantify how good the security of a system is, such as the most likely attack, the cheapest, or the most damaging one. This paper classifies attack trees in two dimensions: proper trees vs. directed acyclic graphs (i.e. with shared subtrees); and static vs. dynamic gates. For each class, we propose novel algorithms that work over a generic attribute domain, encompassing a large number of concrete security metrics defined on the attack tree semantics. We also analyse the computational complexity of our methods

    Efficient Algorithms for Quantitative Attack Tree Analysis

    Get PDF
    Numerous analysis methods for quantitative attack tree analysis have been proposed. These algorithms compute relevant security metrics, i.e. performance indicators that quantify how good the security of a system is, such as the most likely attack, the cheapest, or the most damaging one. This paper classifies attack trees in two dimensions: proper trees vs. directed acyclic graphs (i.e. with shared subtrees); and static vs. dynamic gates. For each class, we propose novel algorithms that work over a generic attribute domain, encompassing a large number of concrete security metrics defined on the attack tree semantics. We also analyse the computational complexity of our methods

    Bulk Mediated Surface Diffusion: The Infinite System Case

    Get PDF
    An analytical soluble model based on a Continuous Time Random Walk (CTRW) scheme for the adsorption-desorption processes at interfaces, called bulk-mediated surface diffusion, is presented. The time evolution of the effective probability distribution width on the surface is calculated and analyzed within an anomalous diffusion framework. The asymptotic behavior for large times shows a sub-diffusive regime for the effective surface diffusion but, depending on the observed range of time, other regimes may be obtained. Montecarlo simulations show excellent agreement with analytical results. As an important byproduct of the indicated approach, we present the evaluation of the time for the first visit to the surface.Comment: 15 pages, 7 figure

    Bulk Mediated Surface Diffusion: Finite System Case

    Full text link
    We address the dynamics of adsorbed molecules (a fundamental issue in surface physics) within the framework of a Master Equation scheme, and study the diffusion of particles in a finite cubic lattice whose boundaries are at the z=1z=1 and the z=Lz=L planes where L=2,3,4,...L = 2,3,4,..., while the xx and yy directions are unbounded. As we are interested in the effective diffusion process at the interface z=1z = 1, we calculate analytically the conditional probability for finding the system on the z=1z=1 plane as well as the surface dispersion as a function of time and compare these results with Monte Carlo simulations finding an excellent agreement.Comment: 19 pages, 8 figure

    Narrow-escape-time problem: the imperfect trapping case

    Get PDF
    We present a master equation approach to the \emph{narrow escape time} (NET) problem, i.e. the time needed for a particle contained in a confining domain with a single narrow opening, to exit the domain for the first time. We introduce a finite transition probability, ν\nu, at the narrow escape window allowing the study of the imperfect trapping case. Ranging from 0 to ∞\infty, ν\nu allowed the study of both extremes of the trapping process: that of a highly deficient capture, and situations where escape is certain ("perfect trapping" case). We have obtained analytic results for the basic quantity studied in the NET problem, the \emph{mean escape time} (MET), and we have studied its dependence in terms of the transition (desorption) probability over (from) the surface boundary, the confining domain dimensions, and the finite transition probability at the escape window. Particularly we show that the existence of a global minimum in the NET depends on the `imperfection' of the trapping process. In addition to our analytical approach, we have implemented Monte Carlo simulations, finding excellent agreement between the theoretical results and simulations.Comment: 9 page

    Automated fault tree learning from continuous-valued sensor data: a case study on domestic heaters

    Get PDF
    Many industrial sectors have been collecting big sensor data. With recent technologies for processing big data, companies can exploit this for automatic failure detection and prevention. We propose the first completely automated method for failure analysis, machine-learning fault trees from raw observational data with continuous variables. Our method scales well and is tested on a real-world, five-year dataset of domestic heater operations in The Netherlands, with 31 million unique heater-day readings, each containing 27 sensor and 11 failure variables. Our method builds on two previous procedures: the C4.5 decision-tree learning algorithm, and the LIFT fault tree learning algorithm from Boolean data. C4.5 pre-processes each continuous variable: it learns an optimal numerical threshold which distinguishes between faulty and normal operation of the top-level system. These thresholds discretise the variables, thus allowing LIFT to learn fault trees which model the root failure mechanisms of the system and are explainable. We obtain fault trees for the 11 failure variables, and evaluate them in two ways: quantitatively, with a significance score, and qualitatively, with domain specialists. Some of the fault trees learnt have almost maximum significance (above 0.95), while others have medium-to-low significance (around 0.30), reflecting the difficulty of learning from big, noisy, real-world sensor data. The domain specialists confirm that the fault trees model meaningful relationships among the variables.Comment: Preprint submitted to the International Journal of Prognostics and Health Management - March 202
    • …
    corecore