232,035 research outputs found
Safety and Security Analysis of AEB for L4 Autonomous Vehicle Using STPA
Autonomous vehicles (AVs) are coming to our streets. Due to the presence of highly complex software systems in AVs, there is a need for a new hazard analysis technique to meet stringent safety standards. System Theoretic Process Analysis (STPA), based on Systems Theoretic Accident Modeling and Processes (STAMP), is a powerful tool that can identify, define, analyze and mitigate hazards from the earliest conceptual stage deployment to the operation of a system. Applying STPA to autonomous vehicles demonstrates STPA\u27s applicability to preliminary hazard analysis, alternative available, developmental tests, organizational design, and functional design of each unique safety operation.
This paper describes the STPA process used to generate system design requirements for an Autonomous Emergency Braking (AEB) system using a top-down analysis approach to system safety. The paper makes the following contributions to practicing STPA for safety and security:
1) It describes the incorporation of safety and security analysis in one process and discusses the benefits of this;
2) It provides an improved, structural approach for scenario analysis, concentrating on safety and security;
3) It demonstrates the utility of STPA for gap analysis of existing designs in the automotive domain;
4) It provides lessons learned throughout the process of applying STPA and STPA-Sec
A Puff of Steem: Security Analysis of Decentralized Content Curation
Decentralized content curation is the process through which uploaded posts are ranked and filtered based exclusively on users\u27 feedback. Platforms such as the blockchain-based Steemit employ this type of curation while providing monetary incentives to promote the visibility of high quality posts according to the perception of the participants. Despite the wide adoption of the platform very little is known regarding its performance and resilience characteristics. In this work, we provide a formal model for decentralized content curation that identifies salient complexity and game-theoretic measures of performance and resilience to selfish participants. Armed with our model, we provide a first analysis of Steemit identifying the conditions under which the system can be expected to correctly converge to curation while we demonstrate its susceptibility to selfish participant behaviour. We validate our theoretical results with system simulations in various scenarios
Теоретико-множественный анализ процесса создания библиографического списка
В работе проведен теоретико-множественный процесса создания библиографического списка. Определено понятие библиографического списка. Раскрыто содержание теоретико-множественного анализа. Составлено дерево целей и задач исследования. Определены основные объекты системы, компоненты процесса создания библиографического списка, а так же взаимосвязи между ними. Построена множественная модель библиографического списка.In work it is carried out set-theoretic process of creation of a bibliography. The concept of a bibliography is defined. The contents of the set-theoretic analysis are opened. The tree of the purposes and research problems is made. The main objects of system, components of process of creation of a bibliography, and also interrelations between them are defined. The multiple model of a bibliography is constructed
Multiscale Analysis of Information Dynamics for Linear Multivariate Processes
In the study of complex physical and physiological systems represented by
multivariate time series, an issue of great interest is the description of the
system dynamics over a range of different temporal scales. While
information-theoretic approaches to the multiscale analysis of complex dynamics
are being increasingly used, the theoretical properties of the applied measures
are poorly understood. This study introduces for the first time a framework for
the analytical computation of information dynamics for linear multivariate
stochastic processes explored at different time scales. After showing that the
multiscale processing of a vector autoregressive (VAR) process introduces a
moving average (MA) component, we describe how to represent the resulting VARMA
process using state-space (SS) models and how to exploit the SS model
parameters to compute analytical measures of information storage and
information transfer for the original and rescaled processes. The framework is
then used to quantify multiscale information dynamics for simulated
unidirectionally and bidirectionally coupled VAR processes, showing that
rescaling may lead to insightful patterns of information storage and transfer
but also to potentially misleading behaviors
Exploratory Study of the Privacy Extension for System Theoretic Process Analysis (STPA-Priv) to elicit Privacy Risks in eHealth
Context: System Theoretic Process Analysis for Privacy (STPA-Priv) is a novel
privacy risk elicitation method using a top down approach. It has not gotten
very much attention but may offer a convenient structured approach and
generation of additional artifacts compared to other methods. Aim: The aim of
this exploratory study is to find out what benefits the privacy risk
elicitation method STPA-Priv has and to explain how the method can be used.
Method: Therefore we apply STPA-Priv to a real world health scenario that
involves a smart glucose measurement device used by children. Different kinds
of data from the smart device including location data should be shared with the
parents, physicians, and urban planners. This makes it a sociotechnical system
that offers adequate and complex privacy risks to be found. Results: We find
out that STPA-Priv is a structured method for privacy analysis and finds
complex privacy risks. The method is supported by a tool called XSTAMPP which
makes the analysis and its results more profound. Additionally, we learn that
an iterative application of the steps might be necessary to find more privacy
risks when more information about the system is available later. Conclusions:
STPA-Priv helps to identify complex privacy risks that are derived from
sociotechnical interactions in a system. It also outputs privacy constraints
that are to be enforced by the system to ensure privacy.Comment: author's post-prin
Quantum picturalism for topological cluster-state computing
Topological quantum computing is a way of allowing precise quantum
computations to run on noisy and imperfect hardware. One implementation uses
surface codes created by forming defects in a highly-entangled cluster state.
Such a method of computing is a leading candidate for large-scale quantum
computing. However, there has been a lack of sufficiently powerful high-level
languages to describe computing in this form without resorting to single-qubit
operations, which quickly become prohibitively complex as the system size
increases. In this paper we apply the category-theoretic work of Abramsky and
Coecke to the topological cluster-state model of quantum computing to give a
high-level graphical language that enables direct translation between quantum
processes and physical patterns of measurement in a computer - a "compiler
language". We give the equivalence between the graphical and topological
information flows, and show the applicable rewrite algebra for this computing
model. We show that this gives us a native graphical language for the design
and analysis of topological quantum algorithms, and finish by discussing the
possibilities for automating this process on a large scale.Comment: 18 pages, 21 figures. Published in New J. Phys. special issue on
topological quantum computin
- …
