TESTING NON-FUNCTIONAL QUALITY CHARACTERISTICS OF CYBER-PHYSICAL SYSTEMS

Size: px
Start display at page:

Download "TESTING NON-FUNCTIONAL QUALITY CHARACTERISTICS OF CYBER-PHYSICAL SYSTEMS"

Transcription

1 TESTING NON-FUNCTIONAL QUALITY CHARACTERISTICS OF CYBER-PHYSICAL SYSTEMS Presented by Martin A. Schneider (Fraunhofer FOKUS) All rights reserved

2 Cyber-Physical Systems and Non-Functional Quality Characteristics CPS interact with their physical environment through sensors, actuators and a communication infrastructure examples of CPS sensor systems connected cars and automated driving factory of the future medical devices reliability, safety and security are critical quality characteristics of CPS Jackie Roth: Connected car market gains traction. Canadian Auto Dealer (2016). Available at: Alun Williams: Comment: Five steps to enabling a datadriven, smart factory. ElectronicsWeekly.com (2017). Available at: 2 All rights reserved

3 CPS may be unreliable undesired behaviour of a CPS is observed at runtime due to uncertainty in the digital x physical environment Challenge How to find find such scenarios efficiently in the infinite and complex space of the scenarios? Solution Search algorithms 3 All rights reserved

4 Search Algorithms search algorithms do not exactly how to create a solution to a problem derive candidate solutions assess them plenty of algorithms genetic algorithm: mutation, crossover need to be tailored to the concrete problem search-based testing 4 All rights reserved

5 Search-based Testing with a Genetic Algorithm 15 starting point... test case generation & execution crossover test case generation & execution 85 mutation 10 candidate solutions quality evaluation (fitness evaluation) & selection 5 All rights reserved

6 Functional Models as a Starting Point we use UML state machines that describe the CPS expected behavior states, transitions, guards, triggers, effects 6 All rights reserved

7 Mutation Operator Description Constraints/Comments Add Transition Adds a new transition by duplicating an existing one and setting a new source and target Remove Guard state. completely. Completely removes the Transitions having an initial state Remove Effect Guided Search by Uncertainty Models Remove Transition transition. as source or a final node as target must not be removed. Equivalent to Change Guard: replace expression with false. Change Guard/ - replace expression with true/false Completely removes the Transitions having an initial state sheer mass of mutation operators for state machines Change Effect - negate expression transition. as source or a final node as - replace subexpression with Remove Transition (with State Merge) target must not be removed. Merges the source and target large number of test cases state if the removed transition is Equivalent to Change Guard: the only one connecting them replace expression with false. (optional: with the same direction). This avoid mutilated cannot state machines execute which inhibit all of them generating test cases. Swaps source and target of the Transitions having an initial state How to select the promising mutations? transition. as source or a final node as Reverse Transition Change Source/Target target must not be reversed. Optional: Transitions being the without time-consuming test case execution only one that connect source Move the source or the target of the transition to any other state. and target state must not be removed (optional: with the same direction). This avoid mutilated state machines which inhibit generating test cases. In case the target state of the transition is changed, the target must not be the initial state. In case the source state of the transition is changed, the source must not be the final node. Mutation Operator Description Constraints/Comments Remove Trigger Transforms the transition to a completion transition. Removes the guard of a transition Equivalent to Change Guard: replace expression with true Change Trigger Operation Removes the effect of a transition completely. Changes the operation to another one of the same interface of the original operation. true/false - negate subexpression - change logical operator - change relational operator - change arithmetic operator - change set operator - change quantifier - replace operand guard/effect mutation operators - remove statement - move statement - fix parameter/property of a called method or sent signal - change called method or sent signal - change operator - fix operand (replace it with a literal) - change operand (replace with variable, call parameter or signal property of the same type) - replace result: replace right-handside (RHS) expression with default value of left-hand-side (LHS) Guards and effects are written in C#. 7 All rights reserved

8 Uncertainty uncertainty describes what might go wrong in the environment testers bootstrap search-based testing with such knowledge uncertainty models are pointing to parts of the functional model mutation is guided by these uncertainty models with further generations, chances increase that other kinds of mutations are introduced 8 All rights reserved

9 Search-based Testing with a Genetic Algorithm 15 starting point guided by uncertainty models mutation... candidate solutions state machines test case generation & execution quality evaluation (fitness evaluation) & selection crossover recombine mutations test case generation & execution 85 9 All rights reserved

10 Example Mutation Operator Delete Transition Mutation Operator Remove Trigger mount Mutation Operator Add Transition 10 All rights reserved

11 Quality Evaluation: Fitness Factors model-based description of quality-indicating functions, e.g. provided by the CPS (mission-critical functionality) by the test environment, e.g., response time, resource consumption fitness factors allows to specify if values should minimize, maximize, or approach a certain treshold value how they should relate to other values 11 All rights reserved

12 Conclusions small effort for testers start from functional models (state machines) add uncertainty models reduction of search space search is guided by uncertainty models configurable by uncertainty models and model-based fitness factors 12 All rights reserved

13 Conclusions Thanks for your attention! Questions!? Martin Schneider Senior Scientist Fraunhofer FOKUS 13 All rights reserved

Model-based Behavioural Fuzzing. Martin Schneider (Fraunhofer FOKUS)

Model-based Behavioural Fuzzing. Martin Schneider (Fraunhofer FOKUS) Model-based Behavioural Fuzzing Martin Schneider (Fraunhofer FOKUS) Outline Introduction to fuzzing Behavioural fuzzing of UML sequence diagrams Test case selection by augmenting the model Conclusions

More information

Effizientere IT-Sicherheitstests mit Hilfe von Usage-based Testing

Effizientere IT-Sicherheitstests mit Hilfe von Usage-based Testing Effizientere IT-Sicherheitstests mit Hilfe von Usage-based Testing GI TAV 37 5. Februar 2015 Martin Schneider Fraunhofer FOKUS Steffen Herbold Universität Göttingen Outline Challenge: Efficiency of Security

More information

Thrive in today's digital economy

Thrive in today's digital economy Thrive in today's digital economy "Connectivity redefines everything, and we have believed in its transformative power for decades. Fifty years ago, we integrated intelligence in machines and automated

More information

Thrive in today's digital economy

Thrive in today's digital economy Thrive in today's digital economy TABLE OF CONTENTS "Connectivity redefines everything, and we have believed in its transformative power for decades. Fifty years ago, we integrated intelligence in machines

More information

SECURITY OF CPS: SECURE EMBEDDED SYSTEMS AS A BASIS

SECURITY OF CPS: SECURE EMBEDDED SYSTEMS AS A BASIS SECURITY OF CPS: SECURE EMBEDDED SYSTEMS AS A BASIS Christoph Krauß, christoph.krauss@aisec.fraunhofer.de Dagstuhl Seminar 11441: Science and Engineering of CPS, November 2011 Overview Introduction Securing

More information

Cyber Physical. Systems 27/09/2018. Presented by Nicolas and Ayman

Cyber Physical. Systems 27/09/2018. Presented by Nicolas and Ayman 1 Cyber Physical Systems 27/09/2018 Presented by Nicolas and Ayman Summary I - What are Cyber Physical Systems? II - Applications III - Technical Design IV - Design Challenges V Benefits and potential

More information

System Testing of Timing Requirements based on Use Cases and Timed Automata

System Testing of Timing Requirements based on Use Cases and Timed Automata System Testing of Timing Requirements based on Use Cases and Timed Automata Chunhui Wang, Fabrizio Pastore, Lionel Briand SNT - University of Luxembourg Email: {chunhui.wang,fabrizio.pastore,lionel.briand}@uni.lu

More information

The Digitising European Industry strategy & H2020 calls related to Cyber-Physical Systems

The Digitising European Industry strategy & H2020 calls related to Cyber-Physical Systems The Digitising European Industry strategy & H2020 calls related to Cyber-Physical Systems #DigitiseEU Dr. Werner Steinhögl European Commission - DG CONNECT Technologies and Systems for Digitising Industry

More information

Genetic Programming. Genetic Programming. Genetic Programming. Genetic Programming. Genetic Programming. Genetic Programming

Genetic Programming. Genetic Programming. Genetic Programming. Genetic Programming. Genetic Programming. Genetic Programming What is it? Genetic programming (GP) is an automated method for creating a working computer program from a high-level problem statement of a problem. Genetic programming starts from a highlevel statement

More information

Specification-based Testing of Embedded Systems H. Schlingloff, SEFM 2008

Specification-based Testing of Embedded Systems H. Schlingloff, SEFM 2008 SEFM School 2008 Specification-based Testing of Embedded Systems Prof. Dr. Holger Schlingloff Humboldt-Universität zu Berlin and Fraunhofer FIRST, Berlin Lecture 5: OCL, ParTeG Course Outline L1: Introduction

More information

Expression and Operator

Expression and Operator Expression and Operator Examples: Two types: Expressions and Operators 3 + 5; x; x=0; x=x+1; printf("%d",x); Function calls The expressions formed by data and operators An expression in C usually has a

More information

AirTight: A Resilient Wireless Communication Protocol for Mixed- Criticality Systems

AirTight: A Resilient Wireless Communication Protocol for Mixed- Criticality Systems AirTight: A Resilient Wireless Communication Protocol for Mixed- Criticality Systems Alan Burns, James Harbin, Leandro Indrusiak, Iain Bate, Robert Davis and David Griffin Real-Time Systems Research Group

More information

Propositional Calculus: Boolean Algebra and Simplification. CS 270: Mathematical Foundations of Computer Science Jeremy Johnson

Propositional Calculus: Boolean Algebra and Simplification. CS 270: Mathematical Foundations of Computer Science Jeremy Johnson Propositional Calculus: Boolean Algebra and Simplification CS 270: Mathematical Foundations of Computer Science Jeremy Johnson Propositional Calculus Topics Motivation: Simplifying Conditional Expressions

More information

The Internet of Things and Factory of Future

The Internet of Things and Factory of Future The Internet of Things and Factory of Future Andy Chang Sr. Manager, Academic Research & Industrial Internet of Things 2 Our Mission We equip engineers and scientists with systems that accelerate productivity,

More information

Potential Errors and Test Assessment in Software Product Line Engineering

Potential Errors and Test Assessment in Software Product Line Engineering Potential Errors and Test Assessment in Software Product Line Engineering A Mutation System for Variable Systems Hartmut Lackner hartmut.lackner@informa9k.hu- berlin.de Martin Schmidt schmidma@informa9k.hu-

More information

Smart Meter Security. Martin Klimke, Principle of Technical Marketing Infineon Chip Card and Security

Smart Meter Security. Martin Klimke, Principle of Technical Marketing Infineon Chip Card and Security Smart Meter Security Martin Klimke, Principle of Technical Marketing Infineon Chip Card and Security Smart Grids: Advanced power control, intelligence and communications New Business models and Services

More information

Next Generation Data Center Facilities Design. Presenter: Ping Lin

Next Generation Data Center Facilities Design. Presenter: Ping Lin Next Generation Data Center Facilities Design Presenter: Ping Lin ping.lin@cqinc.com.tw What is the greatest facility problem with your primary data center? 1. Excessive Heat 2. Insufficient raised floor

More information

Programming Embedded Systems

Programming Embedded Systems Programming Embedded Systems Lecture 8 Overview of software testing Wednesday Feb 8, 2012 Philipp Rümmer Uppsala University Philipp.Ruemmer@it.uu.se 1/53 Lecture outline Testing in general Unit testing

More information

Fast Knowledge Discovery in Time Series with GPGPU on Genetic Programming

Fast Knowledge Discovery in Time Series with GPGPU on Genetic Programming Fast Knowledge Discovery in Time Series with GPGPU on Genetic Programming Sungjoo Ha, Byung-Ro Moon Optimization Lab Seoul National University Computer Science GECCO 2015 July 13th, 2015 Sungjoo Ha, Byung-Ro

More information

Let Energy Monitoring Solutions Do the Heavy Lifting

Let Energy Monitoring Solutions Do the Heavy Lifting Let Energy Monitoring Solutions Do the Heavy Lifting Let Energy Monitoring Solutions Do the Heavy Lifting Duke Dunsford & John Forsyth Schneider Electric This session is eligible for 1 Contact Hour. For

More information

Principles of Programming Languages

Principles of Programming Languages Principles of Programming Languages www.cs.bgu.ac.il/~ppl172 Collaboration and Management Dana Fisman Lesson 2 - Types with TypeScript 1 Types What are types in programming languages? What types are you

More information

Model-Based Testing of Safety-Critical Avionics Systems

Model-Based Testing of Safety-Critical Avionics Systems Model-Based Testing of Safety-Critical Avionics Systems by Syed Samsul Arefin A thesis submitted to The Faculty of Graduate Studies of The University of Manitoba in partial fulfillment of the requirements

More information

A Practical Approach to Programming With Assertions

A Practical Approach to Programming With Assertions A Practical Approach to Programming With Assertions Ken Bell Christian-Albrechts Universität Kiel Department of Computer Science and Applied Mathematics Real-Time Systems and Embedded Systems Group July

More information

Declaration and Memory

Declaration and Memory Declaration and Memory With the declaration int width; the compiler will set aside a 4-byte (32-bit) block of memory (see right) The compiler has a symbol table, which will have an entry such as Identifier

More information

Using Choice and Junction Points in RSARTE vs RoseRT

Using Choice and Junction Points in RSARTE vs RoseRT Using Choice and Junction Points in RSARTE vs RoseRT CHOICE POINTS IN ROSE RT AND RSARTE...2 CHOICE POINTS VS JUNCTION POINTS...5 HOW CHOICE POINTS ARE IMPORTED FROM ROSERT...8 This document discusses

More information

Is This What the Future Will Look Like?

Is This What the Future Will Look Like? Is This What the Future Will Look Like? Implementing fault tolerant system architectures with AUTOSAR basic software Highly automated driving adds new requirements to existing safety concepts. It is no

More information

Experiences in the Use of MDA and UML in Developing NATO Standards

Experiences in the Use of MDA and UML in Developing NATO Standards Welcome Experiences in the Use of MDA and UML in Developing NATO Standards 16 July 2008 Chris Raistrick, Kennedy Carter chris.raistrick@kc.com KC.COM DODAF OV-1 Discovered Lethality Service with NATO Network

More information

White Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017

White Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017 White Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017 Call for Authors This call for authors seeks contributions from academics and scientists who are in the fields of

More information

Programming Embedded Systems

Programming Embedded Systems Programming Embedded Systems Overview of testing techniques Monday March 3, 2014 Philipp Rümmer Uppsala University Philipp.Ruemmer@it.uu.se 1/70 Lecture outline Background, testing in general Unit testing

More information

IOT FLAGSHIP PROJECT. Dr. Mario Drobics, AIT

IOT FLAGSHIP PROJECT. Dr. Mario Drobics, AIT IOT FLAGSHIP PROJECT Dr. Mario Drobics, AIT Challenge Digitalization over the entire product lifecycle accelerates the development, validation, instrumentation and deployment of complex industrial products

More information

ADAM-6200 Series. Feature. Transition and Vision on Remote DAQ Device 19-13

ADAM-6200 Series. Feature. Transition and Vision on Remote DAQ Device 19-13 ADAM-6200 Series Feature DI/O LED Indication Flexible user-defined Modbus address 19 20 21 DAQ Boards Signal Conditioning Industrial USB I/O Modules22 Transition and Vision on Remote DAQ Device In 2002,

More information

In this lecture, we will go beyond the basic Verilog syntax and examine how flipflops and other clocked circuits are specified.

In this lecture, we will go beyond the basic Verilog syntax and examine how flipflops and other clocked circuits are specified. 1 In this lecture, we will go beyond the basic Verilog syntax and examine how flipflops and other clocked circuits are specified. I will also introduce the idea of a testbench as part of a design specification.

More information

Motivation of Loops. Loops. The for Loop (1) Learning Outcomes

Motivation of Loops. Loops. The for Loop (1) Learning Outcomes Motivation of Loops Loops EECS1021: Object Oriented Programming: from Sensors to Actuators Winter 2019 CHEN-WEI WANG We may want to repeat the similar action(s) for a (bounded) number of times. e.g., Print

More information

Magnetic and Hydraulic-Magnetic Circuit Breaker

Magnetic and Hydraulic-Magnetic Circuit Breaker Description Single or multipole hydraulic-magnetic circuit breakers with trip-free - mechanism and toggle actuation. A choice of switching characteristics ensures suitability for a wide range of applications.

More information

Examining future priorities for cyber security management

Examining future priorities for cyber security management Examining future priorities for cyber security management Cybersecurity Focus Day Insurance Telematics 16 Andrew Miller Chief Technical Officer Thatcham Research Owned by the major UK Motor Insurers with

More information

Loops. EECS1021: Object Oriented Programming: from Sensors to Actuators Winter 2019 CHEN-WEI WANG

Loops. EECS1021: Object Oriented Programming: from Sensors to Actuators Winter 2019 CHEN-WEI WANG Loops EECS1021: Object Oriented Programming: from Sensors to Actuators Winter 2019 CHEN-WEI WANG Learning Outcomes Understand about Loops : Motivation: Repetition of similar actions Two common loops: for

More information

Powering the Internet of Things with MQTT

Powering the Internet of Things with MQTT Powering the Internet of Things with MQTT By Ming Fong Senior Principal Development Engineer Schneider-Electric Software, LLC. Introduction In the last ten years, devices such as smartphones, wearable

More information

SMART BUILDINGS IN THE SMART GRID

SMART BUILDINGS IN THE SMART GRID SMART BUILDINGS IN THE SMART GRID JIANGMENG ZHANG TIM YARDLEY UNIVERSITY OF ILLINOIS ARIZONA STATE UNIVERSITY DARTMOUTH COLLEGE WASHINGTON STATE UNIVERSITY FUNDING SUPPORT PROVIDED BY DOE-OE AND DHS S&T

More information

CS 137 Part 7. Big-Oh Notation, Linear Searching and Basic Sorting Algorithms. November 10th, 2017

CS 137 Part 7. Big-Oh Notation, Linear Searching and Basic Sorting Algorithms. November 10th, 2017 CS 137 Part 7 Big-Oh Notation, Linear Searching and Basic Sorting Algorithms November 10th, 2017 Big-Oh Notation Up to this point, we ve been writing code without any consideration for optimization. There

More information

Embedded Systems 1. Introduction

Embedded Systems 1. Introduction Embedded Systems 1. Introduction Lothar Thiele 1-1 Organization WWW: http://www.tik.ee.ethz.ch/tik/education/lectures/es/ Lecture: Lothar Thiele, thiele@ethz.ch Coordination: Rehan Ahmed, rehan.ahmed@tik.ee.ethz.ch

More information

7 The proposed domain specific language: operational level

7 The proposed domain specific language: operational level 7 The proposed domain specific language: operational level In our methodology, a scenario corresponds to the specification of concrete activities in the pervasive mobile game, including interactions among

More information

IDACCS Wireless Integrity protection in a smart grid environment for wireless access of smart meters

IDACCS Wireless Integrity protection in a smart grid environment for wireless access of smart meters IDACCS Wireless 2014 Integrity protection in a smart grid environment for wireless access of smart meters Prof- Dr.-Ing. Kai-Oliver Detken DECOIT GmbH Fahrenheitstraße 9 D-28359 Bremen URL: http://www.decoit.de

More information

Regression Test Case Prioritization using Genetic Algorithm

Regression Test Case Prioritization using Genetic Algorithm 9International Journal of Current Trends in Engineering & Research (IJCTER) e-issn 2455 1392 Volume 2 Issue 8, August 2016 pp. 9 16 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Regression

More information

UML for Real-Time Overview

UML for Real-Time Overview Abstract UML for Real-Time Overview Andrew Lyons April 1998 This paper explains how the Unified Modeling Language (UML), and powerful modeling constructs originally developed for the modeling of complex

More information

Need high availability in performance in your PLC? Modicon Premium Hot Standby PLC by Schneider Electric. Make the most of your energy SM

Need high availability in performance in your PLC? Modicon Premium Hot Standby PLC by Schneider Electric. Make the most of your energy SM Need high availability in performance in your PLC? Modicon Hot Standby PLC by Schneider Electric. Make the most of your energy SM Modicon TSX PLC Modicon Hot Standby Long-term reliability and availability

More information

DETERMINING PARETO OPTIMAL CONTROLLER PARAMETER SETS OF AIRCRAFT CONTROL SYSTEMS USING GENETIC ALGORITHM

DETERMINING PARETO OPTIMAL CONTROLLER PARAMETER SETS OF AIRCRAFT CONTROL SYSTEMS USING GENETIC ALGORITHM DETERMINING PARETO OPTIMAL CONTROLLER PARAMETER SETS OF AIRCRAFT CONTROL SYSTEMS USING GENETIC ALGORITHM Can ÖZDEMİR and Ayşe KAHVECİOĞLU School of Civil Aviation Anadolu University 2647 Eskişehir TURKEY

More information

Reasoning about programs. Chapter 9 of Thompson

Reasoning about programs. Chapter 9 of Thompson Reasoning about programs Chapter 9 of Thompson Proof versus testing A proof will state some property of a program that holds for all inputs. Testing shows only that a property holds for a particular set

More information

Specification-based Testing of Embedded Systems H. Schlingloff, SEFM 2008

Specification-based Testing of Embedded Systems H. Schlingloff, SEFM 2008 SEFM School 2008 Specification-based Testing of Embedded Systems Prof. Dr. Holger Schlingloff Humboldt-Universität zu Berlin and Fraunhofer FIRST, Berlin Lecture 4: Mutations, OCL etc. Course Outline L1:

More information

JVM ByteCode Interpreter

JVM ByteCode Interpreter JVM ByteCode Interpreter written in Haskell (In under 1000 Lines of Code) By Louis Jenkins Presentation Schedule ( 15 Minutes) Discuss and Run the Virtual Machine first

More information

DYNAMICS and CONTROL

DYNAMICS and CONTROL DYNAMICS and CONTROL Module V(III) V(I) Control Benefits A look at the future Presented by Pedro Albertos Professor of Systems Engineering and Control - UPV Modules: Examples of systems and signals Models

More information

Panel Energy: How Optimal Are The Current Energy Systems From a security point of view

Panel Energy: How Optimal Are The Current Energy Systems From a security point of view Panel Energy: How Optimal Are The Current Energy Systems From a security point of view Chakib BEKARA Fraunhofer FOKUS Institute Berlin, GERMANY 28/06/2012 BEKARA Chakib, ENERGY 2012 1 Security Issues in

More information

Chapter S:I. I. Introduction. Examples for Search Problems Search Problem Abstraction

Chapter S:I. I. Introduction. Examples for Search Problems Search Problem Abstraction Chapter S:I I. Introduction Examples for Search Problems Search Problem Abstraction S:I-1 Introduction STEIN/LETTMANN 1998-2016 Road Map Problem Search for a route from place A to : A S:I-2 Introduction

More information

New developments about PL and SIL. Present harmonised versions, background and changes.

New developments about PL and SIL. Present harmonised versions, background and changes. Safety evevt 2017 Functional safety New developments about PL and SIL. Present harmonised versions, background and changes. siemens.com ISO/ TC 199 and IEC/ TC 44 joint working group 1 - Merging project

More information

Redundant States in Sequential Circuits

Redundant States in Sequential Circuits Redundant States in Sequential Circuits Removal of redundant states is important because Cost: the number of memory elements is directly related to the number of states Complexity: the more states the

More information

Formal specification of semantics of UML 2.0 activity diagrams by using Graph Transformation Systems

Formal specification of semantics of UML 2.0 activity diagrams by using Graph Transformation Systems Formal specification of semantics of UML 2.0 activity diagrams by using Graph Transformation Systems Somayeh Azizi 1, Vahid Panahi 2 Computer science department, Sama Technical and vocational, Training

More information

UML-based framework for simulation of distributed ECU systems in automotive applications

UML-based framework for simulation of distributed ECU systems in automotive applications UML-based framework for simulation of distributed ECU systems in automotive applications Frank Steinert protime GmbH Prien Germany A UML based framework for the simulation of distributed systems of embedded

More information

Resilient Smart Grids

Resilient Smart Grids Resilient Smart Grids André Teixeira Kaveh Paridari, Henrik Sandberg KTH Royal Institute of Technology, Sweden SPARKS 2nd Stakeholder Workshop Cork, Ireland March 25th, 2015 Legacy Distribution Grids Main

More information

Bayesian Train Localization Method Extended By 3D Geometric Railway Track Observations From Inertial Sensors

Bayesian Train Localization Method Extended By 3D Geometric Railway Track Observations From Inertial Sensors www.dlr.de Chart 1 Fusion 2012 > Oliver Heirich Extended Bayesian Train Localization > 10.7.2012 Bayesian Train Localization Method Extended By 3D Geometric Railway Track Observations From Inertial Sensors

More information

Suppose you have a problem You don t know how to solve it What can you do? Can you use a computer to somehow find a solution for you?

Suppose you have a problem You don t know how to solve it What can you do? Can you use a computer to somehow find a solution for you? Gurjit Randhawa Suppose you have a problem You don t know how to solve it What can you do? Can you use a computer to somehow find a solution for you? This would be nice! Can it be done? A blind generate

More information

Range Restriction for General Formulas

Range Restriction for General Formulas Range Restriction for General Formulas 1 Range Restriction for General Formulas Stefan Brass Martin-Luther-Universität Halle-Wittenberg Germany Range Restriction for General Formulas 2 Motivation Deductive

More information

Calc Redirection : A Structure for Direction Finding Aided Traffic Monitoring

Calc Redirection : A Structure for Direction Finding Aided Traffic Monitoring Calc Redirection : A Structure for Direction Finding Aided Traffic Monitoring Paparao Sanapathi MVGR College of engineering vizianagaram, AP P. Satheesh, M. Tech,Ph. D MVGR College of engineering vizianagaram,

More information

CHAPTER 5 ENERGY MANAGEMENT USING FUZZY GENETIC APPROACH IN WSN

CHAPTER 5 ENERGY MANAGEMENT USING FUZZY GENETIC APPROACH IN WSN 97 CHAPTER 5 ENERGY MANAGEMENT USING FUZZY GENETIC APPROACH IN WSN 5.1 INTRODUCTION Fuzzy systems have been applied to the area of routing in ad hoc networks, aiming to obtain more adaptive and flexible

More information

Transforming Cyber-Physical System Models

Transforming Cyber-Physical System Models Transforming Cyber-Physical System Models Nathan Jarus Ph.D. Candidate Department of Electrical and Computer Engineering Advisors: Dr. Sahra Sedigh Sarvestani and Dr. Ali Hurson ISC Graduate Research Symposium

More information

Real-Time Insights from the Source

Real-Time Insights from the Source LATENCY LATENCY LATENCY Real-Time Insights from the Source This white paper provides an overview of edge computing, and how edge analytics will impact and improve the trucking industry. What Is Edge Computing?

More information

MASP Chapter on Safety and Security

MASP Chapter on Safety and Security MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio

More information

MIT Introduction to Program Analysis and Optimization. Martin Rinard Laboratory for Computer Science Massachusetts Institute of Technology

MIT Introduction to Program Analysis and Optimization. Martin Rinard Laboratory for Computer Science Massachusetts Institute of Technology MIT 6.035 Introduction to Program Analysis and Optimization Martin Rinard Laboratory for Computer Science Massachusetts Institute of Technology Program Analysis Compile-time reasoning about run-time behavior

More information

Shao-Wen Yang, Ph.D. Staff Research Scientist Intel Labs, Intel Corporation

Shao-Wen Yang, Ph.D. Staff Research Scientist Intel Labs, Intel Corporation Shao-Wen Yang, Ph.D. Staff Research Scientist Intel Labs, Intel Corporation Content may contain references, logos, trade or service marks that are the property of their respective owners Executive Summary

More information

Abstract Data Types. CS 234, Fall Types, Data Types Abstraction Abstract Data Types Preconditions, Postconditions ADT Examples

Abstract Data Types. CS 234, Fall Types, Data Types Abstraction Abstract Data Types Preconditions, Postconditions ADT Examples Abstract Data Types CS 234, Fall 2017 Types, Data Types Abstraction Abstract Data Types Preconditions, Postconditions ADT Examples Data Types Data is stored in a computer as a sequence of binary digits:

More information

System Analysis and Design. Statecharts

System Analysis and Design. Statecharts System Analysis and Design Statecharts Salahaddin University College of Engineering Software Engineering Department 2011-2012 Amanj Sherwany http://www.amanj.me/wiki/doku.php?id=teaching:su:system_analysis_and_design

More information

IEEE-SA Internet of Things - Security & Standards

IEEE-SA Internet of Things - Security & Standards IEEE-SA Internet of Things - Security & Standards Srikanth Chandrasekaran IEEE Standards Association MOBILE WORLD CONGRESS, SHANGHAI JUNE 2018 What does the IEEE Standards Association (IEEE-SA) do? Vision:

More information

Explicit MPC in Mechatronics Industry:

Explicit MPC in Mechatronics Industry: European Control Conference, July 8 th, 23 Zurich, CH MITSUBISHI ELECTRIC RESEARCH LABORATORIES Cambridge, Massachusetts Explicit MPC in Mechatronics Industry: Technology Transfer Potential and Limitations

More information

Department of Homeland Security

Department of Homeland Security Department of Homeland Security Science & Technology Directorate Emergency Preparedness & Response Christopher Doyle Deputy Program Director A Roadmap for Integrated Modeling & Simulation for Emergency

More information

THE AUTOMATED TEST FRAMEWORK

THE AUTOMATED TEST FRAMEWORK 2017 THE AUTOMATED TEST FRAMEWORK Test More. Test Consistently. Test Faster. Secure Results. Delivered. xceleratesolutions.com TABLE OF CONTENTS CONCEPT...3 BENEFITS...4 TRANSFORMING FROM TRADITIONAL TO

More information

Algorithms & Complexity

Algorithms & Complexity Algorithms & Complexity Nicolas Stroppa - nstroppa@computing.dcu.ie CA313@Dublin City University. 2006-2007. November 21, 2006 Classification of Algorithms O(1): Run time is independent of the size of

More information

Genetic improvement of software: a case study

Genetic improvement of software: a case study Genetic improvement of software: a case study Justyna Petke Centre for Research on Evolution, Search and Testing Department of Computer Science, UCL, London Genetic Improvement Programming Automatically

More information

Case Study Experiences from the DIAMONDS Project 8 th ETSI Security Conference January, Sophia Antipolis - France

Case Study Experiences from the DIAMONDS Project 8 th ETSI Security Conference January, Sophia Antipolis - France Case Study Experiences from the DIAMONDS Project 8 th ETSI Security Conference 16. -17. January, Sophia Antipolis - France Ina Schieferdecker www.itea2-diamonds.org DIAMONDS Project In six countries Project

More information

CS 321 Homework 4 due 1:30pm, Thursday, March 15, 2012 This homework specification is copyright by Andrew Tolmach. All rights reserved.

CS 321 Homework 4 due 1:30pm, Thursday, March 15, 2012 This homework specification is copyright by Andrew Tolmach. All rights reserved. CS 321 Homework 4 due 1:30pm, Thursday, March 15, 2012 This homework specification is copyright 2002-2012 by Andrew Tolmach. All rights reserved. Typechecking In this assignment, you will build a type-checker

More information

Application Note: Driving Torque Optimization

Application Note: Driving Torque Optimization Application Note: Driving Torque Optimization Introduction The optimization module of SAM offers single-function multi-parameter optimization based on a mix of evolutionary algorithms and Simplex techniques.

More information

Evolutionary Computation for Combinatorial Optimization

Evolutionary Computation for Combinatorial Optimization Evolutionary Computation for Combinatorial Optimization Günther Raidl Vienna University of Technology, Vienna, Austria raidl@ads.tuwien.ac.at EvoNet Summer School 2003, Parma, Italy August 25, 2003 Evolutionary

More information

Introduction to Software Testing Chapter 3.1, 3.2 Logic Coverage Paul Ammann & Jeff Offutt

Introduction to Software Testing Chapter 3.1, 3.2 Logic Coverage Paul Ammann & Jeff Offutt Introduction to Software Testing Chapter 3.1, 3.2 Logic Coverage Paul Ammann & Jeff Offutt www.introsoftwaretesting.com Ch. 3 : Logic Coverage Four Structures for Modeling Software Graphs Logic Input Space

More information

Introduction to Software Testing Chapter 3.1, 3.2 Logic Coverage Paul Ammann & Jeff Offutt

Introduction to Software Testing Chapter 3.1, 3.2 Logic Coverage Paul Ammann & Jeff Offutt Introduction to Software Testing Chapter 3.1, 3.2 Logic Coverage Paul Ammann & Jeff Offutt http://www.cs.gmu.edu/~offutt/softwaretest/ Ch. 3 : Logic Coverage Four Structures for Modeling Software Graphs

More information

16.1 Introduction... 2

16.1 Introduction... 2 Department of Computer Science Tackling Design Patterns Chapter 16: UML Activity Diagrams Copyright c 2016 by Linda Marshall and Vreda Pieterse. All rights reserved. Contents 16.1 Introduction.................................

More information

Networked Cyber-Physical Systems

Networked Cyber-Physical Systems Networked Cyber-Physical Systems Dr.ir. Tamás Keviczky Delft Center for Systems and Control Delft University of Technology The Netherlands t.keviczky@tudelft.nl http://www.dcsc.tudelft.nl/~tkeviczky/ September

More information

Bayesian Methods in Vision: MAP Estimation, MRFs, Optimization

Bayesian Methods in Vision: MAP Estimation, MRFs, Optimization Bayesian Methods in Vision: MAP Estimation, MRFs, Optimization CS 650: Computer Vision Bryan S. Morse Optimization Approaches to Vision / Image Processing Recurring theme: Cast vision problem as an optimization

More information

Unified Modeling Language 2

Unified Modeling Language 2 Unified Modeling Language 2 State machines 109 History and predecessors 1950 s: Finite State Machines Huffmann, Mealy, Moore 1987: Harel Statecharts conditions hierarchical (and/or) states history states

More information

ArchiMate symbols for relating system elements

ArchiMate symbols for relating system elements ArchiMate symbols for relating system elements Including diagrams and definitions edited from the ArchiMate 2.1 standard. Copyright The Open Group, All Rights Reserved. ArchiMate is a registered trademark

More information

Ambient SoC Enabling Future (CPSS Cyber- Physical Social Systems)

Ambient SoC Enabling Future (CPSS Cyber- Physical Social Systems) 九州大学学術情報リポジトリ Kyushu University Institutional Repository Ambient SoC Enabling Future (CPSS Cyber- Physical Social Systems) Murakami, Kazuaki J. Faculty of Information Science and Electrical Engineering,

More information

CS4514 Real-Time Systems and Modeling

CS4514 Real-Time Systems and Modeling CS4514 Real-Time Systems and Modeling Fall 2015 José M. Garrido Department of Computer Science College of Computing and Software Engineering Kennesaw State University Real-Time Systems RTS are computer

More information

Software Vulnerability

Software Vulnerability Software Vulnerability Refers to a weakness in a system allowing an attacker to violate the integrity, confidentiality, access control, availability, consistency or audit mechanism of the system or the

More information

5G Journey: Path Forward

5G Journey: Path Forward 5G Journey: Path Forward Vida Ilderem, PhD Vice President, Intel Labs Director, Wireless Communication Research Acknowledgement: Schooler, Foerster, Srikanteswara, Himayat, Talwar WE ARE HERE: 5G Reactive,

More information

Mobile and Ubiquitous Computing CS 525M: Input devices and Mobile HCI. Baoyuan, Xing. Computer Science Dept. Worcester Polytechnic Institute (WPI)

Mobile and Ubiquitous Computing CS 525M: Input devices and Mobile HCI. Baoyuan, Xing. Computer Science Dept. Worcester Polytechnic Institute (WPI) Mobile and Ubiquitous Computing CS 525M: Input devices and Mobile HCI Baoyuan, Xing Computer Science Dept. Worcester Polytechnic Institute (WPI) Human Phone Interaction : EyePhone http://www.youtube.com/watch?v=lybzgfadnlg

More information

Context-Aware Actors. Outline

Context-Aware Actors. Outline Context-Aware Actors Anne H. H. Ngu Department of Computer Science Texas State University-San Macos 02/8/2011 Ngu-TxState Outline Why Context-Aware Actor? Context-Aware Scientific Workflow System - Architecture

More information

a. The following method would allow an object of the static type List<String> to be passed to it as an argument.

a. The following method would allow an object of the static type List<String> to be passed to it as an argument. On the final exam you will be provided UML diagrams for design patterns (as in the midterm) and also JavaDoc description of methods in the Reflection API. 1. True/False (if false, explain why) a. The following

More information

The Berlin Center for Digital Transformation Jürgen Diller Berlin, 31st January 2018

The Berlin Center for Digital Transformation Jürgen Diller Berlin, 31st January 2018 3alexd/ istock The Berlin Center for Digital Transformation Jürgen Diller Berlin, 31st January 2018 The Fraunhofer-Gesellschaft Research volume: 2.1 billion euros, of this sum 1.9 billion euros is generated

More information

Cyber Physical Systems

Cyber Physical Systems Cyber Physical Systems an introduction and a perspective Johan Lukkien 1 What is CPS about? 2 CPS: Definitions UC Berkeley (May 2015). Cyber- Physical Systems (CPS) are integrations of computation, networking,

More information

SIP Automated Driving System SEIGO KUZUMAKI Program Director. Nov

SIP Automated Driving System SEIGO KUZUMAKI Program Director. Nov SIP Automated Driving System SEIGO KUZUMAKI Program Director Nov.14.2017 Welcome back to SIP-adus WS! `Is it not delightful to have friends coming from distant quarters? (The Analects of Confucius) Intensive

More information

Abstract Data Types. Stack. January 26, 2018 Cinda Heeren / Geoffrey Tien 1

Abstract Data Types. Stack. January 26, 2018 Cinda Heeren / Geoffrey Tien 1 Abstract Data Types Stack January 26, 2018 Cinda Heeren / Geoffrey Tien 1 Abstract data types and data structures An Abstract Data Type (ADT) is: A collection of data Describes what data are stored but

More information

HIGH LEVEL REQUIREMENTS OF FAST SIMULATION AND MODELLING SUITE OF TOOLS FOR FUTURE SELF-HEALING DISTRIBUTION POWER SYSTEM

HIGH LEVEL REQUIREMENTS OF FAST SIMULATION AND MODELLING SUITE OF TOOLS FOR FUTURE SELF-HEALING DISTRIBUTION POWER SYSTEM HIGH LEVEL REQUIREMENTS OF FAST SIMULATION AND MODELLING SUITE OF TOOLS FOR FUTURE SELF-HEALING DISTRIBUTION POWER SYSTEM A. Valenti* I Bel ** S. Lee *EDF **EPRI E2I ConEdison France USA USA arnaud.valenti@edf.fr

More information

Security for Industry 4.0 Trends -- Challenges -- Opportunities

Security for Industry 4.0 Trends -- Challenges -- Opportunities Security for Industry 4.0 Trends -- Challenges -- Opportunities, Siemens Corporate Technology and Member of the German Platform Industry 4.0 siemens.com/innovation Increasing intelligence and open communication

More information

Evolutionary Methods for State-based Testing

Evolutionary Methods for State-based Testing Evolutionary Methods for State-based Testing PhD Student Raluca Lefticaru Supervised by Florentin Ipate University of Piteşti, Romania Department of Computer Science Outline Motivation Search-based software

More information