A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Connectivity condition for structural properties using a graph theoretical approach: Probabilistic reliability assessment
2013
IFAC Proceedings Volumes
In a structured system graphically represented, the satisfaction of structural properties depends on graphical conditions. ...
As an application of the proposed Boolean expression, we can define the reliability characteristics of the connectivity condition and for how much time it remains satisfied knowing the reliability characteristics ...
., 1977] also propose a graph theoretical approach based on a function useful to compute system reliability. ...
doi:10.3182/20130204-3-fr-2033.00119
fatcat:o7p5l7udkjdinccvkvfh7obvgu
The Validation of Graph Model-Based, Gate Level Low-Dimensional Feature Data for Machine Learning Applications
2019
2019 IEEE Nordic Circuits and Systems Conference (NORCAS): NORCHIP and International Symposium of System-on-Chip (SoC)
A scalable feature learning method on a graphical domain called node2vec algorithm had been utilized for efficiently extracting structural features of the netlist, providing a valuable database to exercise ...
The current work proposes to model the gate-level netlist as a Probabilistic Bayesian Graph (PGB) in the form of a Graph Modeling Language (GML) format. ...
As the structural information of gate-level netlist is transformed into the probabilistic graph, the statistical properties of a graph node conventionally equivalent to that of a sequential (flip-flop) ...
doi:10.1109/norchip.2019.8906974
dblp:conf/norchip/BalakrishnanLGA19
fatcat:skhbcxxq3rccbbd4poykwwlqke
Cyber-Physical Power System (CPPS): A Review on Modelling, Simulation, and Analysis with Cyber Security Applications
2020
IEEE Access
In addition to that, a Bayesian structure can also be used for reliability assessment of CPPS by Bayesian network probabilistic reasoning [141] . ...
Graphical security model [111] To propose a framework for security modelling and assessment of the IoT. Graphical security model for the IoT. ...
doi:10.1109/access.2020.3016826
fatcat:caax2ubyyrclhj37g5ynvlm66q
A PROBABLISTIC APPROACH TO EVALUATION OF THE ULTIMATE LOAD ON FLEXURAL RC ELEMENT ON CRACK LENGTH
2020
International Journal for Computational Civil and Structural Engineering
The article describes a probabilistic approach to load-bearing capacity and reliability analysis of flexural reinforced concrete elements based on the crack length criterion. ...
The fracture mechanics of concrete and reinforced concrete is a promising direction in the development of methods for reinforced concrete structural elements design and inspection. ...
In practice structural reliability (or structural probabilistic design) increasingly is being applied, particularly for situations where quantitative, data-based risk assessment of non-elementary structural ...
doi:10.22337/2587-9618-2020-16-1-98-105
fatcat:inf4qu4ktjhpnc4ogzowrfrd6q
Systems Theoretic Techniques for Modeling, Control, and Decision Support in Complex Dynamic Systems
[article]
2013
arXiv
pre-print
We discuss the problems of modeling, control, and decision support in complex dynamic systems from a general system theoretic point of view. ...
Architectural and structural models of computer information system intended for simulation and decision support in complex systems are presented. ...
These properties guarantee the model rigidity in a given class of variations of the problem conditions and, as a consequence, the reliability and accuracy of system simulation. ...
arXiv:1008.0775v2
fatcat:yqythihthrdivmj3kmuc73kqme
Dynamic reliability: towards an integrated platform for probabilistic risk assessment
2000
Reliability Engineering & System Safety
In principle, they constitute a more realistic modeling of systems for the purposes of reliability, risk and safety analysis. ...
Other factors, which play a role in the choice of a risk assessment methodology, are the investments made in earlier codes and the confidence and comfort users may have developed for a particular method ...
One of the acknowledged reasons for this situation is the theoretical flavor of dynamic reliability techniques. ...
doi:10.1016/s0951-8320(00)00017-x
fatcat:k6h3hliez5bhxnryrwrmvb6rnu
Handling probabilistic integrity constraints in pay-as-you-go reconciliation of data models
2019
Information Systems
We argue that such a setting calls for a probabilistic model of integrity constraints, for which satisfaction is preferred, but not required. ...
In this work, we present a model for probabilistic constraints that enables reasoning on the correctness of individual correspondences within a network of data models, in order to guide an expert in the ...
to compute the correctness probabilities of correspondences in a matching network under probabilistic integrity constraints using the graphical formalism of a factor graph. ...
doi:10.1016/j.is.2019.04.002
fatcat:p5icszobofbbrl3axoxexss75i
A Review of Complex Systems Approaches to Cancer Networks
[article]
2020
arXiv
pre-print
The emerging field of complex systems has redefined cancer networks as a computational system with intractable algorithmic complexity. ...
Herein, a tumor and its heterogeneous phenotypes are discussed as dynamical systems having multiple, strange attractors. ...
A Bayesian network is a type of a Probabilistic Graphical Model (PGM) where each node represents a random variable Gi corresponding to the expression level of gene i. ...
arXiv:2009.12693v2
fatcat:kt3e4bqaufgwlbhx2wbgzftnpe
DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees
[article]
2013
arXiv
pre-print
The objective of this survey is to present a complete overview of graphical attack and defense modeling techniques based on DAGs. ...
This paper presents the current state of the art on attack and defense modeling approaches that are based on directed acyclic graphs (DAGs). ...
Acknowledgments The authors would like to thank Sjouke Mauw and Pieter Hartel for their comments on a preliminary version of this survey, which helped them to improve the paper. ...
arXiv:1303.7397v1
fatcat:fiebxymrd5dcnmnufddaoaqlaa
Model for Risk Calculation and Reliability Comparison of Level Crossings
2021
Entropy
The basic input parameters for the calculation of the maximal risk are the geometric characteristics of the level crossing and the intensities and structure of the flows of road and railway vehicles. ...
The calculation of the maximal risk of a level crossing is achieved under the conditions of generating the maximum entropy in the virtual operating mode. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/e23091230
pmid:34573855
fatcat:qmprz2hlg5bmplimk5tbqrit3y
System Reliability at the Crossroads
2012
ISRN Applied Mathematics
System reliability, a field of applied mathematics that addresses the latter challenges, is at a juncture where fundamental changes are likely. ...
potential for a perfect storm that can revive and fundamentally transform the field; however, for this transformation to occur, some serious obstacles need to be overcome. ...
Theoretically, there are two ways that can provide a probabilistic estimate of software errors. i Uncertainty propagation method: analogous to uncertainty propagation used in structural reliability 81 ...
doi:10.5402/2012/850686
fatcat:upgg7ns3inbitidlsbqay4b32q
Systems interface biology
2006
Journal of the Royal Society Interface
In the same manner, these new classes of biological problems are motivating novel developments in theoretical systems approaches. ...
The field of systems biology has attracted the attention of biologists, engineers, mathematicians, physicists, chemists and others in an endeavour to create systems-level understanding of complex biological ...
We acknowledge the financial support to F.J.D. from the Institute for Collaborative Biotechnologies through grant DAAD19-03-D-0004 from the US Army Research Office. ...
doi:10.1098/rsif.2006.0143
pmid:16971329
pmcid:PMC1664650
fatcat:rqtnqq6ulvc5ldya75qha7di5u
A new rational method for calculating the GSI
2009
Tunnelling and Underground Space Technology
exploited in order to obtain a reliable, quantitative assessment of the GSI by means of the basic input parameters for the determination of the RMi (i.e. the elementary block volume and the joint conditions ...
In this paper a new approach for a quantitative assessment of the Geological Strength Index (GSI, Hoek et al., 1995) is proposed. ...
Simone Cocchi for the many geostructural surveys realized to test and compare the new approach proposed; -Ing. Shulin Xu for critical review of the manuscript and his numerous suggestions. ...
doi:10.1016/j.tust.2008.03.002
fatcat:sb5qrzilafeb5jh6g5agfoempu
DAG-based attack and defense modeling: Don't miss the forest for the attack trees
2014
Computer Science Review
Graphical models constitute a valuable support tool to facilitate threat assessment and risk management of real-life systems. Thus, they have also become popular in the industrial sector. ...
The great advantage of graph-based approaches lies in combining user friendly, intuitive, visual features with formal semantics and algorithms that allow for qualitative and quantitative analysis. ...
There still exists a gap between theoretical research and practical employment of graphical security models. ...
doi:10.1016/j.cosrev.2014.07.001
fatcat:aie7uxdorjclnb5ctgg5nrczqi
A review of cyber security risk assessment methods for SCADA systems
2016
Computers & security
We select and in-detail examine twenty-four risk assessment methods developed for or applied in the context of a SCADA system. ...
Based on the analysis, we suggest an intuitive scheme for the categorisation of cyber security risk assessment methods for SCADA systems. ...
An evolution graph is a directed acyclic graph which consists of the states of an elementary attack committed to achieve a final goal. Each evolution describes an attack strategy. ...
doi:10.1016/j.cose.2015.09.009
fatcat:cf232dewkvcndl5ctydyuywhgq
« Previous
Showing results 1 — 15 out of 2,526 results