Journal articles on the topic 'Formal control models'

To see the other types of publications on this topic, follow the link: Formal control models.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Formal control models.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Vilihura, Vladislav, Yuriy Gorbenko, Vitaliy Yesin, and Serhiy Rassomakhin. "Using formal security models in secure databases." Physico-mathematical modelling and informational technologies, no. 32 (July 7, 2021): 70–74. http://dx.doi.org/10.15407/fmmit2021.32.070.

Full text
Abstract:
The paper contains key provisions (requirements) that should be followed when building secure databases using the capabilities of the main formal access control models, such as discretionary access control models, mandatory access control models, role-based access control models. At the same time, it is noted that any security model does not provide protection but only provides the principle of building a secure database, the implementation of which should ensure the security properties inherent in the model. The security of the database is equally determined by: the properties of the model itself (one or more), its (their) adequacy to the threats affecting the system, and how it (they) is correctly implemented(s). The decisive factor in making a decision is always an assessment of a specific situation, which will allow you to make the right choice, including the complex use of formal models.
APA, Harvard, Vancouver, ISO, and other styles
2

Bi, Henry H., and John Nolt. "Toward a Formal Semantics for Control-Flow Process Models." Journal of Database Management 23, no. 2 (April 2012): 72–97. http://dx.doi.org/10.4018/jdm.2012040104.

Full text
Abstract:
A number of information systems have been developed to automate business processes. For process modeling, verification, and automation in information systems, a formal semantics of control-flow process models is needed. Usually process modeling languages (e.g., BPMN, EPC, IDEF3, UML, and WfMC standards) are used to represent control-flow process models. When these process modeling languages are developed, their informal semantics are typically described using examples, but their formal semantics are not defined. Although many different semantics for control-flow process models have been proposed, the existing semantics specifications have limitations because they do not support certain desirable features. In this paper, we propose a new formal semantics for control-flow process models. We show that it is more accurate, complete, and applicable than the existing semantics specifications.
APA, Harvard, Vancouver, ISO, and other styles
3

Bakker, Otto J., Jack C. Chaplin, Lavindra de Silva, Paolo Felli, David Sanderson, Brian Logan, and Svetan Ratchev. "Toward Process Control from Formal Models of Transformable Manufacturing Systems." Procedia CIRP 63 (2017): 521–26. http://dx.doi.org/10.1016/j.procir.2017.03.159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pattee, H. H. "The limitations of formal models of measurement, control, and cognition." Applied Mathematics and Computation 56, no. 2-3 (July 1993): 111–30. http://dx.doi.org/10.1016/0096-3003(93)90118-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tittus, M., and B. Egardt. "On the Use of Multiple Models and Formal Control Synthesis in Batch Control." IFAC Proceedings Volumes 29, no. 1 (June 1996): 6096–101. http://dx.doi.org/10.1016/s1474-6670(17)58658-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Grobelna, Iwona. "Formal Verification of Control Modules in Cyber-Physical Systems." Sensors 20, no. 18 (September 10, 2020): 5154. http://dx.doi.org/10.3390/s20185154.

Full text
Abstract:
The paper proposes a novel formal verification method for a state-based control module of a cyber-physical system. The initial specification in the form of user-friendly UML state machine diagrams is written as an abstract rule-based logical model. The logical model is then used both for formal verification using the model checking technique and for prototype implementation in FPGA devices. The model is automatically transformed into a verifiable model in nuXmv format and into synthesizable code in VHDL language, which ensures that the resulting models are consistent with each other. It also allows the early detection of any errors related to the specification. A case study of a manufacturing automation system is presented to illustrate the approach.
APA, Harvard, Vancouver, ISO, and other styles
7

Schall, Jeffrey D., Thomas J. Palmeri, and Gordon D. Logan. "Models of inhibitory control." Philosophical Transactions of the Royal Society B: Biological Sciences 372, no. 1718 (February 27, 2017): 20160193. http://dx.doi.org/10.1098/rstb.2016.0193.

Full text
Abstract:
We survey models of response inhibition having different degrees of mathematical, computational and neurobiological specificity and generality. The independent race model accounts for performance of the stop-signal or countermanding task in terms of a race between GO and STOP processes with stochastic finishing times. This model affords insights into neurophysiological mechanisms that are reviewed by other authors in this volume. The formal link between the abstract GO and STOP processes and instantiating neural processes is articulated through interactive race models consisting of stochastic accumulator GO and STOP units. This class of model provides quantitative accounts of countermanding performance and replicates the dynamics of neural activity producing that performance. The interactive race can be instantiated in a network of biophysically plausible spiking excitatory and inhibitory units. Other models seek to account for interactions between units in frontal cortex, basal ganglia and superior colliculus. The strengths, weaknesses and relationships of the different models will be considered. We will conclude with a brief survey of alternative modelling approaches and a summary of problems to be addressed including accounting for differences across effectors, species, individuals, task conditions and clinical deficits. This article is part of the themed issue ‘Movement suppression: brain mechanisms for stopping and stillness’.
APA, Harvard, Vancouver, ISO, and other styles
8

Seidner, C., and O. H. Roux. "Formal Methods for Systems Engineering Behavior Models." IEEE Transactions on Industrial Informatics 4, no. 4 (November 2008): 280–91. http://dx.doi.org/10.1109/tii.2008.2008998.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Das, Sukanta, and Mihir K. Chakraborty. "Formal Logic of Cellular Automata." Complex Systems 30, no. 2 (June 15, 2021): 187–203. http://dx.doi.org/10.25088/complexsystems.30.2.187.

Full text
Abstract:
This paper develops a formal logic, named L CA , targeting modeling of one-dimensional binary cellular automata. We first develop the syntax of L CA , then give semantics to L CA in the domain of all binary strings. Then the elementary cellular automata and four-neighborhood binary cellular automata are shown as models of the logic. These instances point out that there are other models of L CA . Finally it is proved that any one-dimensional binary cellular automaton is a model of the proposed logic.
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Bo, Jia Di Qiu, and Ming Ming Chen. "Designing Access Control Policy Using Formal Concept Analysis." Applied Mechanics and Materials 602-605 (August 2014): 3822–25. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.3822.

Full text
Abstract:
The need to securely share information among collaborating entities is increasingly becoming important. It often needed to implement access control (AC) models. The objective of this paper is to design access control policy using formal concept analysis, which is based on mathematical lattice and order theory. We provide discussion on how FCA can be used to capture RBAC constraints. We show with FCA, we can express more intend constrains than it can be done in traditional RBAC approach. The experimental results show that the approach is more resilient to dynamic computer environment.
APA, Harvard, Vancouver, ISO, and other styles
11

Lieder, F., and G. Iwama. "Toward a formal theory of proactivity." Cognitive, Affective, & Behavioral Neuroscience 21, no. 3 (March 15, 2021): 490–508. http://dx.doi.org/10.3758/s13415-021-00884-y.

Full text
Abstract:
AbstractBeyond merely reacting to their environment and impulses, people have the remarkable capacity to proactively set and pursue their own goals. The extent to which they leverage this capacity varies widely across people and situations. The goal of this article is to propose and evaluate a model of proactivity and reactivity. We proceed in three steps. First, we model proactivity in a widely used cognitive control task known as the AX Continuous Performance Task (AX-CPT). Our theory formalizes an important aspect of proactivity as meta-control over proactive and reactive control. Second, we perform a quantitative model comparison to identify the number and nature of meta-control decisions that are involved in the regulation of proactive behavior. Our findings suggest that individual differences in proactivity are governed by two independent meta-control decisions, namely deciding whether to set an intention for what to do in a future situation and deciding whether to recall one’s intentions when the situation occurs. Third, we test the assumptions and qualitative predictions of the winning model against data from numerous experiments varying the incentives, cognitive load, and statistical structure of the task. Our results suggest that proactivity can be understood in terms of computational models of meta-control. Future work will extend our models from proactive control in the AX-CPT to proactive goal creation and goal pursuit in the real world.
APA, Harvard, Vancouver, ISO, and other styles
12

Valiño, V., A. Perdigones, and J. Cerro. "DEVELOPMENT OF FORMAL DYNAMIC MODELS WITH MICROSOFT EXCEL FOR GREENHOUSE CLIMATE CONTROL." Acta Horticulturae, no. 802 (December 2008): 111–16. http://dx.doi.org/10.17660/actahortic.2008.802.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Joshi, S. B., E. G. Mettala, J. S. Smith, and R. A. Wysk. "Formal models for control of flexible manufacturing cells: physical and system model." IEEE Transactions on Robotics and Automation 11, no. 4 (1995): 558–70. http://dx.doi.org/10.1109/70.406940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Kobeissi, Elodie, Pierre-Yves Piriou, and Jean-Marc Faure. "Formal Verification of Safety Analysis Models of Repairable and Reconfigurable Systems." IFAC-PapersOnLine 50, no. 1 (July 2017): 11144–49. http://dx.doi.org/10.1016/j.ifacol.2017.08.1224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

TIKHONOV, VALERY A., and VLADIMIR A. NOVIKOV. "VERIFICATION OF ACCESS CONTROL SYSTEMS BASED ON MODELING WITH COLORED PETRI NETS." H&ES Research 13, no. 6 (2021): 50–59. http://dx.doi.org/10.36724/2409-5419-2021-13-6-50-59.

Full text
Abstract:
Introduction: the complexity of the information systems (IS) being developed increases the requirements for the error-free design of the access control system and increases the likelihood of the presence and impact of vulnerabilities on the state of information security. Formal verification of the IS project at the development stage allows minimizing the appearance of architectural vulnerabilities. Changes carried out by regulators in the field of certification of information security means actualizing issues related to the development and analysis of formal models. Purpose: development of an approach to the construction and formal verification of models that has an intuitively, completeness presentation and effective analysis. Methods: construction of models by the mathematical apparatus of colored Petri nets in the CPN Tools modeling environment with the subsequent study of the properties of the net. Results: an approach has been developed that has structural, logical and dynamic completeness. The clarity of the models developed using the presented approach reduces the time for detecting incorrect functioning and developing compensatory measures with the subsequent confirmation of their effectiveness. The analyze of the state space showed the need to supplement the modeling environment for the complete construction of the state space in the case of complex models and a large number of markers during the initial marking of the Petri net. Practical relevance: the developed approach is proposed to be used for formal verification of access control models and filtering information flows in the certification procedure for information security tools. The versatility and simplicity of the approach allows you to implement the formal verification procedure in the development stages of various kinds of systems. Development prospects: development of additional software that allows building a complete state space for com" plex models, as well as complementing the method with approaches using ASK-CTL logic.
APA, Harvard, Vancouver, ISO, and other styles
16

Selvaraj, Yuvaraj, Ashfaq Farooqui, Ghazaleh Panahandeh, Wolfgang Ahrendt, and Martin Fabian. "Automatically Learning Formal Models from Autonomous Driving Software." Electronics 11, no. 4 (February 18, 2022): 643. http://dx.doi.org/10.3390/electronics11040643.

Full text
Abstract:
The correctness of autonomous driving software is of utmost importance, as incorrect behavior may have catastrophic consequences. Formal model-based engineering techniques can help guarantee correctness and thereby allow the safe deployment of autonomous vehicles. However, challenges exist for widespread industrial adoption of formal methods. One of these challenges is the model construction problem. Manual construction of formal models is time-consuming, error-prone, and intractable for large systems. Automating model construction would be a big step towards widespread industrial adoption of formal methods for system development, re-engineering, and reverse engineering. This article applies active learning techniques to obtain formal models of an existing (under development) autonomous driving software module implemented in MATLAB. This demonstrates the feasibility of automated learning for automotive industrial use. Additionally, practical challenges in applying automata learning, and possible directions for integrating automata learning into the automotive software development workflow, are discussed.
APA, Harvard, Vancouver, ISO, and other styles
17

Gao, Xiaodan, Viktoria Hnatkovska, and Vadim Marmer. "Limited participation in international business cycle models: A formal evaluation." Journal of Economic Dynamics and Control 39 (February 2014): 255–72. http://dx.doi.org/10.1016/j.jedc.2013.12.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Novikov, Dmitry. "Models of Strategic Decision-Making under Informational Control." Mathematics 9, no. 16 (August 9, 2021): 1889. http://dx.doi.org/10.3390/math9161889.

Full text
Abstract:
A general complex model is considered for collective dynamical strategic decision-making with explicitly interconnected factors reflecting both psychic (internal state) and behavioral (external-action, result of activity) components of agents’ activity under the given environmental and control factors. This model unifies and generalizes approaches of game theory, social psychology, theories of multi-agent systems, and control in organizational systems by simultaneous consideration of both internal and external parameters of the agents. Two special models (of informational control and informational confrontation) contain formal results on controllability and properties of equilibriums. Interpretations of a general model are conformity (threshold behavior), consensus, cognitive dissonance, and other effects with applications to production systems, multi-agent systems, crowd behavior, online social networks, and voting in small and large groups.
APA, Harvard, Vancouver, ISO, and other styles
19

Gouglidis, Antonios, Christos Grompanopoulos, and Anastasia Mavridou. "Formal Verification of Usage Control Models: A Case Study of UseCON Using TLA+." Electronic Proceedings in Theoretical Computer Science 272 (June 25, 2018): 52–64. http://dx.doi.org/10.4204/eptcs.272.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Zhao, Chunna, Murong Jiang, and Yaqun Huang. "Formal Verification of Fractional-Order PID Control Systems Using Higher-Order Logic." Fractal and Fractional 6, no. 9 (August 30, 2022): 485. http://dx.doi.org/10.3390/fractalfract6090485.

Full text
Abstract:
Fractional-order PID control is a landmark in the development of fractional-order control theory. It can improve the control precision and accuracy of systems and achieve more robust control results. As a theorem-proving formal verification method, it can be applied to an arbitrary system represented by a mathematical model. It is the ideal verification method because it is not subject to limits on state numbers. This paper presents the higher-order logic (HOL) formal verification and modeling of fractional-order PID controller systems. Firstly, a fractional-order PID controller was designed. The accuracy of fractional-order PID control can be supported by simulation, comparing integral-order PID controls. Secondly, the superior property of fractional-order PID control is validated via higher-order logic theorem proofs. An important basic property, the relationship between fractional-order differential calculus and integral-order differential calculus, was analyzed via a higher-order logic theorem proof. Then, the relations between the fractional-order PID controller and integral-order PID controller were verified based on the fractional-order Grünwald–Letnikov definition for higher-order logic theorem proofs. Formalization models of the fractional-order PID controller and the fractional-order closed-loop control system were established. Finally, the stability of the fractional-order control systems was verified based on established formal models and theorems. The results show that the fractional-order PID controllers can be conducive to the control performance of control systems, and the higher-order logic formal verification method can ensure the reliability and security of fractional-order control systems.
APA, Harvard, Vancouver, ISO, and other styles
21

Chinchali, Sandeep P., Scott C. Livingston, Mo Chen, and Marco Pavone. "Multi-objective optimal control for proactive decision making with temporal logic models." International Journal of Robotics Research 38, no. 12-13 (August 15, 2019): 1490–512. http://dx.doi.org/10.1177/0278364919868290.

Full text
Abstract:
The operation of today’s robots entails interactions with humans, e.g., in autonomous driving amidst human-driven vehicles. To effectively do so, robots must proactively decode the intent of humans and concurrently leverage this knowledge for safe, cooperative task satisfaction: a problem we refer to as proactive decision making. However, simultaneous intent decoding and robotic control requires reasoning over several possible human behavioral models, resulting in high-dimensional state trajectories. In this paper, we address the proactive decision-making problem using a novel combination of formal methods, control, and data mining techniques. First, we distill high-dimensional state trajectories of human–robot interaction into concise, symbolic behavioral summaries that can be learned from data. Second, we leverage formal methods to model high-level agent goals, safe interaction, and information-seeking behavior with temporal logic formulas. Finally, we design a novel decision-making scheme that maintains a belief distribution over models of human behavior, and proactively plans informative actions. After showing several desirable theoretical properties, we apply our framework to a dataset of humans driving in crowded merging scenarios. For it, temporal logic models are generated and used to synthesize control strategies using tree-based value iteration and deep reinforcement learning. In addition, we illustrate how data-driven models of human responses to informative robot probes, such as from generative models such as conditional variational autoencoders, can be clustered with formal specifications. Results from simulated self-driving car scenarios demonstrate that data-driven strategies enable safe interaction, correct model identification, and significant dimensionality reduction.
APA, Harvard, Vancouver, ISO, and other styles
22

Strljic, Daniella, Annika Kienzlen, and Oliver Riedel. "Formale Sprachen für Fabriksimulation/Comparative Analysis of Description Models and Languages for Factory Simulation – Formal Languages for Factory Simulation." wt Werkstattstechnik online 112, no. 04 (2022): 221–26. http://dx.doi.org/10.37544/1436-4980-2022-04-21.

Full text
Abstract:
Während des Fabriklebenszyklus werden viele verschiedene Simulationsmodelle eingesetzt. Diese benötigen spezialisierte Simulationsmethoden und -werkzeuge, die je ein neues Simulationsmodell erfordern, das manuell in einer spezifischen Modellierungssprache erstellt wird. Der Beitrag zeigt eine Analyse von Ansätzen für die Fabriksimulationsbeschreibung mit dem Ziel einer durchgängigen Fabriksimulation. Diese erlauben einen Datenaustausch, aber keine dynamische Kopplung oder Generierung, darum wird ein Fabrikmodell umrissen.   A wide variety of simulation models are used during the factory lifecycle. They require many specialized simulation methods and tools each requiring a new simulation model which is manually created in a specific modeling language. This paper shows an analysis of existing approaches and data models for factory simulation description with the goal of a consistent factory simulation. These allow data exchange, but not dynamic coupling or model generation, therefore a factory model is outlined.
APA, Harvard, Vancouver, ISO, and other styles
23

Pong, Fong, and Michel Dubois. "Formal verification of complex coherence protocols using symbolic state models." Journal of the ACM 45, no. 4 (July 1998): 557–87. http://dx.doi.org/10.1145/285055.285057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

El Hichami, Outman, Mohamed Naoum, Mohammed Al Achhab, Ismail Berrada, and Badr Eddine El Mohajir. "An Algebraic Method for Analysing Control Flow of BPMN Models." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 3, no. 3 (October 19, 2015): 20. http://dx.doi.org/10.3991/ijes.v3i3.4862.

Full text
Abstract:
This paper introduces an approach for formal verification of BPMN models. The incompatible constructs of the BPMN patterns can lead to wrong or incomplete semantics which resulting the behavioral errors such as deadlock and multiple termination. This research is motivated by the need to create a correct business process and in order to generate a more complete formalization of BPMN semantics than existing formalizations. We first introduce the chosen patterns which are the most used in the modelisation of the service-based business processes. Then, we illustrate a definition of the execution semantics of these patterns by using the rules of Max+ Algebra formulas, which have important benefits.
APA, Harvard, Vancouver, ISO, and other styles
25

Gokhale, Sheetal, Ashwini Dalvi, and Irfan Siddavatam. "Industrial Control Systems Honeypot: A Formal Analysis of Conpot." International Journal of Computer Network and Information Security 12, no. 6 (December 8, 2020): 44–56. http://dx.doi.org/10.5815/ijcnis.2020.06.04.

Full text
Abstract:
Technologies used in ICS and Smart Grid are overlapping. The most discussed attacks on ICSs are Stuxnet and Black energy malware. The anatomy of these attacks not only pointed out that the security of ICS is of prime concern but also demanded to execute a proactive approach in practicing ICS security. Honeypot is used to implement defensive measures for security. The Honeynet group released Honeypot for ICS labelled as Conpot in 2013. Though the Conpot is low interactive Honeypot, it emulates processes of different cyber-physical systems, typically Smart Grid. In the literature, the effectiveness of Honeypot operations was studied by challenging limitations of the existing setup or proposing new variants. Similar approaches are followed for Conpot evaluation. However, none of the work addressed a formal verification method to verify the engagement of Honeypot, and this makes the presented work unique. For proposed work, Coloured Petri Net (CPN) tool is used for formal verification of Conpot. The variants of Conpot are modelled, including initial state model, deadlock state model and livelock model. Further evaluation of these models based on state space analysis results confirmed that Conpot could lure an attacker by engaging him in an infinite loop and thereby limiting the scope of the attacker from exploring and damaging the real-time systems or services. However, in the deadlock state, the attacker’s activity in the conpot will be restricted and will be unable to proceed further as the conpot model incorporates deadlock loop.
APA, Harvard, Vancouver, ISO, and other styles
26

de Silva, Lavindra, Paolo Felli, David Sanderson, Jack C. Chaplin, Brian Logan, and Svetan Ratchev. "Synthesising process controllers from formal models of transformable assembly systems." Robotics and Computer-Integrated Manufacturing 58 (August 2019): 130–44. http://dx.doi.org/10.1016/j.rcim.2019.01.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

López, Joaquín, Alejandro Santana-Alonso, and Miguel Díaz-Cacho Medina. "Formal Verification for Task Description Languages. A Petri Net Approach." Sensors 19, no. 22 (November 14, 2019): 4965. http://dx.doi.org/10.3390/s19224965.

Full text
Abstract:
One of the main challenges in verifying robotic systems is its asynchronous interaction with an unstructured environment, observed by imperfect sensors. Autonomous robot systems usually require some language to support task-level control. This paper presents an effective approach to apply formal verification methods for that kind of language. A main contribution of this method is to avoid modeling the robotic system with a specific formalism. The approach translates the task-level control models into a Petri net (PN) based representation. This is used to define new methods to analyze some task properties such as liveness, deadlock-freeness and terminability. The approach has been applied to the Task Description Language (TDL) and it is illustrated by experiments. The final goal is to create new tools within the application development environment to include formal verification as part of the normal software development cycle. The TDL to PN translator uses the Petri Net Markup Language (PNML) as its file format. This format permits interoperability with other Petri net tools that can also be used to analyze the PNs.
APA, Harvard, Vancouver, ISO, and other styles
28

Vilihura, V. V. "Analysis of formal models for access control and specific features of their applicability to databases." Radiotekhnika, no. 205 (July 2, 2021): 53–70. http://dx.doi.org/10.30837/rt.2021.2.205.05.

Full text
Abstract:
An integral part of any project to create or assess the security of information systems and databases is the presence of a security model. The paper considers the main positions of the most common security models based on controlling the access of subjects to objects. The analysis of formal models for access control has revealed that each of them, having certain advantages and disadvantages, has the right to be used. The decisive factor in making a decision is an assessment of a specific situation, which will allow one to make the right choice. In this regard, the paper notes that security models based on discretionary policies are advisable to be applied when conducting formal verification of the correctness of building access control systems in well-protected information systems and databases. However, it is emphasized that these models have certain drawbacks that limit their use. The paper states that despite the fact that security models based on the mandatory access policy play a significant role in information security theory and their provisions have been introduced as mandatory requirements for systems that process secret information, as well as in the standards of secure systems, a number of problems may arise in the practical implementation of these models. Among these problems there are the problems associated with overestimating the security level, blind recordings, performing operations that do not fit into the framework of the model by privileged subjects. The paper also concludes that the use of security models based on role-based policy allows one to implement access control rules dynamically changing during the operation of information systems and databases, the effectiveness of which is especially noticeable when organizing access to the resources of systems with a large number of users and objects.
APA, Harvard, Vancouver, ISO, and other styles
29

Klimis, Vasileios, Jack Clark, Alan Baker, David Neto, John Wickerson, and Alastair F. Donaldson. "Taking Back Control in an Intermediate Representation for GPU Computing." Proceedings of the ACM on Programming Languages 7, POPL (January 9, 2023): 1740–69. http://dx.doi.org/10.1145/3571253.

Full text
Abstract:
We describe our experiences successfully applying lightweight formal methods to substantially improve and reformulate an important part of Standard Portable Intermediate Representation SPIRV, an industry-standard language for GPU computing. The formal model that we present has allowed us to (1) identify several ambiguities and needless complexities in the way that structured control flow was defined in the SPIRV specification; (2) interact with the authors of the SPIRV specification to rectify these problems; (3) validate the developer tools and conformance test suites that support the SPIRV language by cross-checking them against our formal model, improving the tools, test suites, and our models in the process; and (4) develop a novel method for fuzzing SPIRV compilers to detect miscompilation bugs that leverages our formal model. The latest release of the SPIRV specification incorporates the revised set of control-flow definitions that have arisen from our work. Furthermore, our novel compiler-fuzzing technique has led to the discovery of twenty distinct, previously unknown bugs in SPIRV compilers from Google, the Khronos Group, Intel, and Mozilla. Our work showcases the practical impact that formal modelling and analysis techniques can have on the design and implementation of industry-standard programming languages.
APA, Harvard, Vancouver, ISO, and other styles
30

Türke, Ralf‐Eckhard. "Role and contribution of formal models to governing: a heuristic." Kybernetes 39, no. 9/10 (October 19, 2010): 1566–82. http://dx.doi.org/10.1108/03684921011081178.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Wang, Feng Qin, and Heng Jin Ke. "Control Flow Analyze for Procedure Blueprint." Applied Mechanics and Materials 58-60 (June 2011): 1061–66. http://dx.doi.org/10.4028/www.scientific.net/amm.58-60.1061.

Full text
Abstract:
Based on the well-defined UML2.0 activity diagram, a meta-model based on Control Flow Diagram is presented. And our strategy in this article is to define an OCL-based mapping in a formal and verifiable form as consistency rules between an AISD and a CFG, so as to ensure the completeness of our meta-models and allow their verification. At last, we adopt a static analyze method to transform procedure blueprint to Control Flow diagram.
APA, Harvard, Vancouver, ISO, and other styles
32

Hsieh, Fu-Shiung. "Design of reconfiguration mechanism for holonic manufacturing systems based on formal models." Engineering Applications of Artificial Intelligence 23, no. 7 (October 2010): 1187–99. http://dx.doi.org/10.1016/j.engappai.2010.05.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Kucherov, Mikhail M., and Nina A. Bogulskaya. "Trilattice-Based Access Control Models: How to Secure Current Computer Network." MATEC Web of Conferences 210 (2018): 04053. http://dx.doi.org/10.1051/matecconf/201821004053.

Full text
Abstract:
Designing security, from the hardware level, is essential to ensure the integrity of the intelligent cyber-physical infrastructure that is the Industrial Internet of Things (IIoT). If intelligent cyber-physical infrastructure fails to do the right things because it is insecure and vulnerable, then there will be negative social consequences [1]. Security is, in a sense, the access control to IIoT systems, which increasingly relies on the ability to compose different policies. Therefore, the advantage in any framework for compiling policies is that it is intuitive, formal, expressive, application-independent, as well as expandable to create domain-specific instances. Recently, such a scheme was proposed based on Belnap logic FOUR2 [2]. Four values of the Belnap bilattice have been interpreted as grant, deny, conflict, or unspecified with respect to access-control policy. Belnap’s four-valued logic has found a variety of applications in various fields, such as deductive database theory, distributed logic programming, and other areas. However, it turns out that the truth order in FOUR2 is a truth-and-falsity order at the same time [3]. The smallest lattice, where the orders of truth and falsity are independent of each other, which is especially important for security policy, is that of Shramko-Wansing’s SIXTEEN3. This generalization is well-motivated and leads from the bilattice FOUR2 with an information and a truth-and-falsity ordering to another algebraic structure, namely the trilattice SIXTEEN3 with an information ordering together with a truth ordering and a (distinct) falsity ordering.Based onSIXTEEN3 and new Boolean predicates to control access [4], we define an expressive access-control policy language, having composition statements based on the statements of Schramko-Wansing’s logic. Natural orderings on politics are obtained by independent lifting the orders of truth and falsity of trilattice, which results in a query language in which conflict freedom analysis can be developed. The reduction of formal verification of queries to that on predicates over access requests enables to carry out policy analysis. We evaluate our approach through examples of control access model policy.
APA, Harvard, Vancouver, ISO, and other styles
34

CRAIG, IAIN D. "FORMAL TECHNIQUES IN THE DEVELOPMENT OF BLACKBOARD SYSTEMS." International Journal of Pattern Recognition and Artificial Intelligence 07, no. 02 (April 1993): 197–219. http://dx.doi.org/10.1142/s021800149300011x.

Full text
Abstract:
In a recent book, the author presented a mathematical specification of a blackboard system shell. The exercise suggested a method for developing blackboard systems with the aid of formal methods. This paper describes a formal method for the development of blackboard systems. The method is based, in part, on an informal one. Apart from the difference in emphasis (formal rather than informal), the new approach rests upon a formal definition of the architecture. The essential idea is that the mapping between the formal model of the problem domain (which is intended to be similar to the formal models proposed by, for example, Hayes) and the blackboard shell should be supported by formal proofs of correctness in a way identical to formal software engineering. We present an informal method for constructing blackboard systems. The informal method forms the basis of the formal method whose initial stages are then described. We outline the formal treatment of control and suggest the use of temporal logic as a tool for reasoning about control. The paper ends with a review of the method.
APA, Harvard, Vancouver, ISO, and other styles
35

Song, Xiao, and Wen Shi. "Impact of Informal Network on Opinion Dynamics in Command and Control Network." Applied Mechanics and Materials 764-765 (May 2015): 919–23. http://dx.doi.org/10.4028/www.scientific.net/amm.764-765.919.

Full text
Abstract:
This paper aims to study the opinion dynamics in military command and control (C2) network with the impact of informal network. The authors reviewed recent opinion dynamics models and explored the relationships between formal and informal networks in detail. Then the opinion dynamics model in C2 network was introduced and a hybrid network based on small-world or scale-free network was proposed. Afterwards, the authors studied the opinion dynamics based on the formal C2 network and hybrid network by computer simulations, and found that opinion dynamics with the impact of informal network is almost independent on the network properties (including small-world, scale-free and rewiring probability) but dependent on the scale of the informal network. And it is concluded that the larger the size of informal network is, the better it can facilitate convergence of opinions in formal C2 network.
APA, Harvard, Vancouver, ISO, and other styles
36

Fu, Yujian, Zhijiang Dong, and Xudong He. "Formal Modeling and Analysis of Collaborative Humanoid Robotics." International Journal of Robotics Applications and Technologies 6, no. 1 (January 2018): 34–54. http://dx.doi.org/10.4018/ijrat.2018010103.

Full text
Abstract:
A humanoid robot is inherently complex due to the heterogeneity of accessory devices and to the interactions of various interfaces, which will be exponentially increased in multiple robotics collaboration. Therefore, the design and implementation of multiple humanoid robotics (MHRs) remains a very challenging issue. It is known that formal methods provide a rigorous analysis of the complexity in both design of control and implementation of systems. This article presents an agent-based framework of formal modeling on the design of communication and control strategies of a team of autonomous robotics, to attain the specified tasks in a coordinated manner. To ensure a successful collaboration of multiple robotics, this formal agent-based framework captures behaviors in Petri Net models and specifies collaboration operations in four defined operations. To validate the framework, a non-trivial soccer bot set was implemented and simulation results were discussed.
APA, Harvard, Vancouver, ISO, and other styles
37

Tsoukalas, Lefteri H. "Neurofuzzy Anticipatory Systems: A New Approach to Intelligent Control." International Journal on Artificial Intelligence Tools 06, no. 03 (September 1997): 365–95. http://dx.doi.org/10.1142/s0218213097000207.

Full text
Abstract:
Anticipatory systems are systems whose change of state is based on information about present as well as future states. Planning and acting on the basis of anticipations of the future is an omnipresent feature of human control strategies, deeply permeating our daily experience and considered as the hallmark of natural intelligence. Yet, as the eminent mathematical biologist Robert Rosen has pointed out in his book Anticipatory Systems (1985), such control strategies are curiously absent from existing formal approaches to automatic control and decision-making processes. Recent developments in biology, ethology and cognitive sciences, however, as well as advancements in the technology of computer-based predictive models, compel us to reconsider the role of anticipation in intelligent systems and to the extent possible incorporate it in our formal approaches to control. Significant improvements in neural predictive computing when combined with the flexibility of fuzzy systems, supports the development of neurofuzzy anticipatory control architectures that integrate planning and control sequencing functions with feedback control algorithms. A review of the role of anticipation in intelligent systems and a new approach for neurofuzzy anticipatory control using radial basis neural predictive models and fuzzy if/then rules is presented.
APA, Harvard, Vancouver, ISO, and other styles
38

Florêncio, Marina, Lídia Oliveira, and Helena Costa Oliveira. "Management Control Systems and the Integration of the Sustainable Development Goals into Business Models." Sustainability 15, no. 3 (January 25, 2023): 2246. http://dx.doi.org/10.3390/su15032246.

Full text
Abstract:
Since the introduction of Agenda 2030 and the Sustainable Development Goals (SDGs), companies play a central role in promoting sustainable development. Management control became essential to support the SGDs’ integration into business models. This qualitative and interpretative study relies on a Brazilian company proactive in sustainability—Natura—and analyzes its management controls for sustainability using the Malmi and Brown framework. Natura’s external reports were used, along with public interviews with its sustainability key actors. The findings suggest the existence of broad management control, comprising planning, cybernetic, reward and compensation, administrative and cultural controls. Additionally, strong formal and informal management controls for sustainability are juxtaposed. The company’s culture and values are the main motivation for integrating the SDGs. It was found that Natura has been introducing increasingly innovative cybernetic controls, with emphasis on environmental profit and loss, social profit and loss, and integrated profit and loss tools. The research contributes to a greater awareness of the company role in achieving the SDGs, and the importance of their integration into business models. This study also adds to the management control literature, responding to the research calls concerning the role of management control tools to achieve SDGs.
APA, Harvard, Vancouver, ISO, and other styles
39

Champion, Adrien, Rémi Delmas, Michael Dierkes, Pierre-loic Garoche, Romain Jobredeaux, and Pierre Roux. "Formal Methods for the Analysis of Critical Control Systems Models: Combining Non-Linear and Linear Analyses." SAE International Journal of Aerospace 6, no. 1 (September 17, 2013): 150–60. http://dx.doi.org/10.4271/2013-01-2109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Plummer, Elizabeth. "The Effects of Protest Format and Agent Use on Residential Appeals Adjustments." Journal of the American Taxation Association 37, no. 1 (December 1, 2014): 205–36. http://dx.doi.org/10.2308/atax-50990.

Full text
Abstract:
ABSTRACT This study examines how protest format and use of an agent affect the magnitude of the adjustments obtained in property tax appeals. The sample includes all single-family residential properties in Harris County, Texas for which a property tax protest was filed in 2010 or 2011 (n = 290,022). A protest can be settled in one of three formats: electronically (only when an agent is not used), an informal hearing, or a formal hearing. Because an owner's decision to use an agent is voluntary, I use a two-stage estimation process to help control for potential selection bias. The first-stage probit model is used to generate the predicted probability that an owner will use an agent, while the second-stage Tobit regression models the appeals adjustment as a function of protest format, agent use, control variables, and the selection-bias variable. Empirical results show that when an owner does not use an agent, appeals adjustments for electronic settlements are smaller than for informal settlements, and appeals adjustments for informal settlements are smaller than for formal settlements. When an agent is used, results show the opposite: appeals adjustments for informal settlements are greater than for formal settlements. Results also show that appeals adjustments are smaller when an agent is used compared with owners representing themselves, regardless of whether the hearing is formal or informal. Results are generally consistent with agency problems whereby property tax agents accept suboptimal appeals adjustments. Results from the first-stage probit model provide evidence on factors that affect the likelihood that an owner will use an agent.
APA, Harvard, Vancouver, ISO, and other styles
41

Füchslin, Rudolf M., Andrej Dzyakanchuk, Dandolo Flumini, Helmut Hauser, Kenneth J. Hunt, Rolf H. Luchsinger, Benedikt Reller, Stephan Scheidegger, and Richard Walker. "Morphological Computation and Morphological Control: Steps Toward a Formal Theory and Applications." Artificial Life 19, no. 1 (January 2013): 9–34. http://dx.doi.org/10.1162/artl_a_00079.

Full text
Abstract:
Morphological computation can be loosely defined as the exploitation of the shape, material properties, and physical dynamics of a physical system to improve the efficiency of a computation. Morphological control is the application of morphological computing to a control task. In its theoretical part, this article sharpens and extends these definitions by suggesting new formalized definitions and identifying areas in which the definitions we propose are still inadequate. We go on to describe three ongoing studies, in which we are applying morphological control to problems in medicine and in chemistry. The first involves an inflatable support system for patients with impaired movement, and is based on macroscopic physics and concepts already tested in robotics. The two other case studies (self-assembly of chemical microreactors; models of induced cell repair in radio-oncology) describe processes and devices on the micrometer scale, in which the emergent dynamics of the underlying physical system (e.g., phase transitions) are dominated by stochastic processes such as diffusion.
APA, Harvard, Vancouver, ISO, and other styles
42

Abate, Alessandro, Iury Bessa, Lucas Cordeiro, Cristina David, Pascal Kesseli, Daniel Kroening, and Elizabeth Polgreen. "Automated formal synthesis of provably safe digital controllers for continuous plants." Acta Informatica 57, no. 1-2 (December 6, 2019): 223–44. http://dx.doi.org/10.1007/s00236-019-00359-1.

Full text
Abstract:
Abstract We present a sound and automated approach to synthesizing safe, digital controllers for physical plants represented as time-invariant models. Models are linear differential equations with inputs, evolving over a continuous state space. The synthesis precisely accounts for the effects of finite-precision arithmetic introduced by the controller. The approach uses counterexample-guided inductive synthesis: an inductive generalization phase produces a controller that is known to stabilize the model but that may not be safe for all initial conditions of the model. Safety is then verified via bounded model checking: if the verification step fails, a counterexample is provided to the inductive generalization, and the process further iterates until a safe controller is obtained. We demonstrate the practical value of this approach by automatically synthesizing safe controllers for physical plant models from the digital control literature.
APA, Harvard, Vancouver, ISO, and other styles
43

Mitsch, Stefan, Khalil Ghorbal, David Vogelbacher, and André Platzer. "Formal verification of obstacle avoidance and navigation of ground robots." International Journal of Robotics Research 36, no. 12 (October 2017): 1312–40. http://dx.doi.org/10.1177/0278364917733549.

Full text
Abstract:
This article answers fundamental safety questions for ground robot navigation: under which circumstances does which control decision make a ground robot safely avoid obstacles? Unsurprisingly, the answer depends on the exact formulation of the safety objective, as well as the physical capabilities and limitations of the robot and the obstacles. Because uncertainties about the exact future behavior of a robot’s environment make this a challenging problem, we formally verify corresponding controllers and provide rigorous safety proofs justifying why the robots can never collide with the obstacle in the respective physical model. To account for ground robots in which different physical phenomena are important, we analyze a series of increasingly strong properties of controllers for increasingly rich dynamics and identify the impact that the additional model parameters have on the required safety margins. We analyze and formally verify: (i) static safety, which ensures that no collisions can happen with stationary obstacles; (ii) passive safety, which ensures that no collisions can happen with stationary or moving obstacles while the robot moves; (iii) the stronger passive-friendly safety, in which the robot further maintains sufficient maneuvering distance for obstacles to avoid collision as well; and (iv) passive orientation safety, which allows for imperfect sensor coverage of the robot, i.e., the robot is aware that not everything in its environment will be visible. We formally prove that safety can be guaranteed despite sensor uncertainty and actuator perturbation. We complement these provably correct safety properties with liveness properties: we prove that provably safe motion is flexible enough to let the robot navigate waypoints and pass intersections. To account for the mixed influence of discrete control decisions and the continuous physical motion of the ground robot, we develop corresponding hybrid system models and use differential dynamic logic theorem-proving techniques to formally verify their correctness. Since these models identify a broad range of conditions under which control decisions are provably safe, our results apply to any control algorithm for ground robots with the same dynamics. As a demonstration, we also synthesize provably correct runtime monitor conditions that check the compliance of any control algorithm with the verified control decisions.
APA, Harvard, Vancouver, ISO, and other styles
44

Pashchenko, Dmitry V., Alexey I. Martyshkin, Dmitry A. Trokoz, Tatyana Yu Pashchenko, Mikhail Yu Babich, and Mikhail M. Butaev. "Parallel decomposition of control algorithms for computational processes based on the use of nondeterministic automaton logic." Nexo Revista Científica 34, no. 01 (April 12, 2021): 01–12. http://dx.doi.org/10.5377/nexo.v34i01.11278.

Full text
Abstract:
The paper deals with the issues of decomposition of control algorithms for the processes in parallel computing systems and the use of automaton models. When designing parallel processing systems, an important task is the formal presentation of process control algorithms since they allow achieving a packaged solution to the problems of specification, development, implementation, verification, and analysis of complex control systems, including the control of interacting processes and resources in parallel computing systems. It is especially necessary to use formal methods to verify complex information processing systems by model testing. One of the methods for the formal description of control algorithms is based on the use for these purposes of the nondeterministic automaton (NDA) logic, which is a method that allows one to present control algorithms for information processing in the form of systems of canonical equations describing all particular events implemented in the algorithm. The advantage of such a language is that all transitions in the control system are described not in terms of system states, but in terms of particular events, the simultaneous existence of which determines all states and transitions in the system; this allows avoiding a "combinatorial explosion" in the state space to the possibilities of means verification. Purpose of the paper: research of control algorithms for parallel computing systems using the NDA apparatus. The development and research object is parallel decomposition of control algorithms for parallel computing systems using automatic models.
APA, Harvard, Vancouver, ISO, and other styles
45

Chama, Wafa, Allaoua Chaoui, and Seidali Rehab. "Formal Modeling and Analysis of Object Oriented Systems using Triple Graph Grammars." International Journal of Embedded and Real-Time Communication Systems 6, no. 2 (April 2015): 48–64. http://dx.doi.org/10.4018/ijertcs.2015040103.

Full text
Abstract:
This paper proposes a Model Driven Engineering automatic translation approach based on the integration of rewriting logic formal specification and UML semi-formal models. This integration is a contribution in formalizing UML models since it lacks for formal semantics. It aims at providing UML with the capabilities of rewriting logic and its Maude language to control and detect incoherencies in their diagrams. Rewriting logic Maude language allows simulation and verification of system's properties using its LTL model-checker. This automatic translation approach is based on meta-modeling and graph transformation since UML diagrams are graphs. More precisely, the authors have proposed five meta-models and three triple graph grammars to perform the translation process. The authors have used Eclipse Generative Modeling tools: Eclipse Modeling Framework (EMF) for meta-modeling, Graphical Modeling Framework (GMF) for generating visual modeling tools and TGG Interpreter for proposing triple graph grammars. The approach is illustrated through an example.
APA, Harvard, Vancouver, ISO, and other styles
46

Dou, Tiantian, Yuri Kaszubowski Lopes, Peter Rockett, Elizabeth A. Hathway, and Esmail Saber. "GPML: an XML-based standard for the interchange of genetic programming trees." Genetic Programming and Evolvable Machines 21, no. 4 (November 27, 2019): 605–27. http://dx.doi.org/10.1007/s10710-019-09370-4.

Full text
Abstract:
AbstractWe propose a genetic programming markup language (GPML), an XML-based standard for the interchange of genetic programming trees, and outline the benefits such a format would bring in allowing the deployment of trained genetic programming (GP) models in applications as well as the subsidiary benefit of allowing GP researchers to directly share trained trees. We present a formal definition of this standard and describe details of an implementation. In addition, we present a case study where GPML is used to implement a model predictive controller for the control of a building heating plant.
APA, Harvard, Vancouver, ISO, and other styles
47

KINANE, CHRISTINA M. "Control without Confirmation: The Politics of Vacancies in Presidential Appointments." American Political Science Review 115, no. 2 (February 15, 2021): 599–614. http://dx.doi.org/10.1017/s000305542000115x.

Full text
Abstract:
Scholarship on separation of powers assumes executives are constrained by legislative approval when placing agents in top policy-making positions. But presidents frequently fill vacancies in agency leadership with unconfirmed, temporary officials or leave them empty entirely. I develop a novel dataset of vacancies across 15 executive departments from 1977 to 2016 and reevaluate the conventional perspective that appointment power operates only through formal channels. I argue that presidents’ nomination strategies include leaving positions empty and making interim appointments, and this choice reflects presidents’ priorities and the character of vacant positions. The evidence indicates that interim appointees are more likely when positions have a substantial capacity to act on presidential expansion priorities and suggest that presidents can capitalize on their first-mover advantage to evade Senate confirmation. The results further suggest that separation of powers models may need to consider how deliberate inaction and sidestepping of formal powers influence political control and policy-making strategies.
APA, Harvard, Vancouver, ISO, and other styles
48

Burenkov, Vladimir Sergeevich. "Formal Verification of a Mandatory Integrity Control Model for the KasperskyOS Operating System." Proceedings of the Institute for System Programming of the RAS 32, no. 6 (2020): 31–48. http://dx.doi.org/10.15514/ispras-2020-32(6)-3.

Full text
Abstract:
Models of mandatory integrity control in operating systems usually restrict accesses of active components of a system to passive ones and represent the accesses directly. This is suitable in case of monolithic operating systems whose components that provide access to resources are part of the trusted computing base. However, due to the sheer complexity of such components, it is extremely nontrivial to prove such a model to be adequate to the real system. KasperskyOS is a microkernel operating system that organizes access to resources via components that are not necessarily part of the trusted computing base. KasperskyOS implements a specifically developed mandatory integrity control model that takes such components into account. This paper formalizes the model and describes the process of automated proof of the model’s properties. For formalization, we use the Event-B language. We clarify parts specific to Event-B to make our presentation accessible to professionals familiar with discrete mathematics but not necessarily with Event-B. We reflect on the proof experience obtained in the Rodin platform.
APA, Harvard, Vancouver, ISO, and other styles
49

ARNOLD, J. ANDREW, and JOHN C. KUNZ. "Integrating product models with engineering analysis applications: Two case studies." Artificial Intelligence for Engineering Design, Analysis and Manufacturing 14, no. 2 (April 2000): 137–47. http://dx.doi.org/10.1017/s0890060400142039.

Full text
Abstract:
Current methods to develop standard Architecture, Engineering, Construction (AEC) product models focus on the definition of product model semantics without concurrent and formal consideration of the engineering analyses that such models must support, or formal consideration of the requirements for sharing information between applications. We present two case studies that demonstrate a service to extract data from product models and provide inputs to component analysis applications. The service was validated in a proof-of-concept application called the Internet Broker for Engineering Services (IBES) that extracts information for component analysis from product models that are external to the application and accessed across the Internet. IBES was tested for two research cases. The product model for the first case, control valve selection is based on STEP Application Protocol 227. The product model for the second case, control valve diagnosis, specifies additional semantics that support the operations and maintenance (O&M) phase of the facility life cycle. The cases offer evidence that large standard data models can support routine analyses for control valves. However, the amount of shared information between the case applications is small and is largely dependent upon the concurrence of component behaviors that are necessary to model analysis. The IBES reference model and reasoning to support information extraction was consistent for both cases. This consistency suggests that it is possible to define a general set of computational methods that integrate project information models with external component analysis applications across the product life cycle. We argue that enabling a web-based link between product models and applications requires a set of capabilities, including bi-directional communication between separated data and analysis nodes, query generation, data translation, and validation of data extracted from semistandard models. We discuss the tentative implication that minimal shared information calls into question the assumption that large core product models will work effectively in practice.
APA, Harvard, Vancouver, ISO, and other styles
50

Ekster, Alex, Vasiliy Alchakov, Ivan Meleshin, and Alexandr Larionenko. "Modeling Performance of Butterfly Valves Using Machine Learning Methods." Sustainability 13, no. 24 (December 7, 2021): 13545. http://dx.doi.org/10.3390/su132413545.

Full text
Abstract:
Control of airflow of activated sludge systems has significant challenges due to the non-linearity of the control element (butterfly valve). To overcome this challenge, some valve manufacturers developed valves with linear characteristics. However, these valves are 10–100 times more expensive than butterfly valves. By developing models for butterfly valves installed characteristics and utilizing these models for real-time airflow control, the authors of this paper aimed to achieve the same accuracy of control using butterfly valves as achieved using valves with linear characteristics. Several approaches were tested to model the installed valve’s characteristics, such as a formal mathematical model utilizing Simscape/Matlab software, a semi-empirical model, and several machine learning methods (MLM), including regression, support vector machine, Gaussian process, decision tree, and deep learning. Several versions of the airflow-valve position models were developed using each machine learning method listed above. The one with the smallest forecast error was selected for field testing at the 55.5×103 m3/day 12 MGD City of Chico activated sludge system. Field testing of the formal mathematical model, semi-empirical model, and the regularized gradient boosting machine model (the best among MLMs) showed that the regularized gradient boosting machine model (RGBMM) provided the best accuracy. The use of the RGBMMs in airflow control loops since 2019 at the City of Chico wastewater treatment plant showed that these models are robust and accurate (2.9% median error).
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography