2,526 Hits in 11.6 sec

Connectivity condition for structural properties using a graph theoretical approach: Probabilistic reliability assessment

M. Dakil, C. Simon, T. Boukhobza
2013 IFAC Proceedings Volumes  
In a structured system graphically represented, the satisfaction of structural properties depends on graphical conditions.  ...  As an application of the proposed Boolean expression, we can define the reliability characteristics of the connectivity condition and for how much time it remains satisfied knowing the reliability characteristics  ...  ., 1977] also propose a graph theoretical approach based on a function useful to compute system reliability.  ... 
doi:10.3182/20130204-3-fr-2033.00119 fatcat:o7p5l7udkjdinccvkvfh7obvgu

The Validation of Graph Model-Based, Gate Level Low-Dimensional Feature Data for Machine Learning Applications

Aneesh Balakrishnan, Thomas Lange, Maximilien Glorieux, Dan Alexandrescu, Maksim Jenihhin
2019 2019 IEEE Nordic Circuits and Systems Conference (NORCAS): NORCHIP and International Symposium of System-on-Chip (SoC)  
A scalable feature learning method on a graphical domain called node2vec algorithm had been utilized for efficiently extracting structural features of the netlist, providing a valuable database to exercise  ...  The current work proposes to model the gate-level netlist as a Probabilistic Bayesian Graph (PGB) in the form of a Graph Modeling Language (GML) format.  ...  As the structural information of gate-level netlist is transformed into the probabilistic graph, the statistical properties of a graph node conventionally equivalent to that of a sequential (flip-flop)  ... 
doi:10.1109/norchip.2019.8906974 dblp:conf/norchip/BalakrishnanLGA19 fatcat:skhbcxxq3rccbbd4poykwwlqke

Cyber-Physical Power System (CPPS): A Review on Modelling, Simulation, and Analysis with Cyber Security Applications

Rajaa Vikhram Yohanandhan, Rajvikram Madurai Elavarasan, Manoharan Premkumar, Lucian Mihet-Popa
2020 IEEE Access  
In addition to that, a Bayesian structure can also be used for reliability assessment of CPPS by Bayesian network probabilistic reasoning [141] .  ...  Graphical security model [111] To propose a framework for security modelling and assessment of the IoT. Graphical security model for the IoT.  ... 
doi:10.1109/access.2020.3016826 fatcat:caax2ubyyrclhj37g5ynvlm66q


Sergey Solovyev
2020 International Journal for Computational Civil and Structural Engineering  
The article describes a probabilistic approach to load-bearing capacity and reliability analysis of flexural reinforced concrete elements based on the crack length criterion.  ...  The fracture mechanics of concrete and reinforced concrete is a promising direction in the development of methods for reinforced concrete structural elements design and inspection.  ...  In practice structural reliability (or structural probabilistic design) increasingly is being applied, particularly for situations where quantitative, data-based risk assessment of non-elementary structural  ... 
doi:10.22337/2587-9618-2020-16-1-98-105 fatcat:inf4qu4ktjhpnc4ogzowrfrd6q

Systems Theoretic Techniques for Modeling, Control, and Decision Support in Complex Dynamic Systems [article]

Armen Bagdasaryan
2013 arXiv   pre-print
We discuss the problems of modeling, control, and decision support in complex dynamic systems from a general system theoretic point of view.  ...  Architectural and structural models of computer information system intended for simulation and decision support in complex systems are presented.  ...  These properties guarantee the model rigidity in a given class of variations of the problem conditions and, as a consequence, the reliability and accuracy of system simulation.  ... 
arXiv:1008.0775v2 fatcat:yqythihthrdivmj3kmuc73kqme

Dynamic reliability: towards an integrated platform for probabilistic risk assessment

P.E. Labeau, C. Smidts, S. Swaminathan
2000 Reliability Engineering & System Safety  
In principle, they constitute a more realistic modeling of systems for the purposes of reliability, risk and safety analysis.  ...  Other factors, which play a role in the choice of a risk assessment methodology, are the investments made in earlier codes and the confidence and comfort users may have developed for a particular method  ...  One of the acknowledged reasons for this situation is the theoretical flavor of dynamic reliability techniques.  ... 
doi:10.1016/s0951-8320(00)00017-x fatcat:k6h3hliez5bhxnryrwrmvb6rnu

Handling probabilistic integrity constraints in pay-as-you-go reconciliation of data models

Nguyen Quoc Viet Hung, Matthias Weidlich, Nguyen Thanh Tam, Zoltán Miklós, Karl Aberer, Avigdor Gal, Bela Stantic
2019 Information Systems  
We argue that such a setting calls for a probabilistic model of integrity constraints, for which satisfaction is preferred, but not required.  ...  In this work, we present a model for probabilistic constraints that enables reasoning on the correctness of individual correspondences within a network of data models, in order to guide an expert in the  ...  to compute the correctness probabilities of correspondences in a matching network under probabilistic integrity constraints using the graphical formalism of a factor graph.  ... 
doi:10.1016/ fatcat:p5icszobofbbrl3axoxexss75i

A Review of Complex Systems Approaches to Cancer Networks [article]

Abicumaran Uthamacumaran
2020 arXiv   pre-print
The emerging field of complex systems has redefined cancer networks as a computational system with intractable algorithmic complexity.  ...  Herein, a tumor and its heterogeneous phenotypes are discussed as dynamical systems having multiple, strange attractors.  ...  A Bayesian network is a type of a Probabilistic Graphical Model (PGM) where each node represents a random variable Gi corresponding to the expression level of gene i.  ... 
arXiv:2009.12693v2 fatcat:kt3e4bqaufgwlbhx2wbgzftnpe

DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees [article]

Barbara Kordy, Ludovic Piètre-Cambacédès, Patrick Schweitzer
2013 arXiv   pre-print
The objective of this survey is to present a complete overview of graphical attack and defense modeling techniques based on DAGs.  ...  This paper presents the current state of the art on attack and defense modeling approaches that are based on directed acyclic graphs (DAGs).  ...  Acknowledgments The authors would like to thank Sjouke Mauw and Pieter Hartel for their comments on a preliminary version of this survey, which helped them to improve the paper.  ... 
arXiv:1303.7397v1 fatcat:fiebxymrd5dcnmnufddaoaqlaa

Model for Risk Calculation and Reliability Comparison of Level Crossings

Pamela Ercegovac, Gordan Stojić, Miloš Kopić, Željko Stević, Feta Sinani, Ilija Tanackov
2021 Entropy  
The basic input parameters for the calculation of the maximal risk are the geometric characteristics of the level crossing and the intensities and structure of the flows of road and railway vehicles.  ...  The calculation of the maximal risk of a level crossing is achieved under the conditions of generating the maximum entropy in the virtual operating mode.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/e23091230 pmid:34573855 fatcat:qmprz2hlg5bmplimk5tbqrit3y

System Reliability at the Crossroads

Vitali Volovoi
2012 ISRN Applied Mathematics  
System reliability, a field of applied mathematics that addresses the latter challenges, is at a juncture where fundamental changes are likely.  ...  potential for a perfect storm that can revive and fundamentally transform the field; however, for this transformation to occur, some serious obstacles need to be overcome.  ...  Theoretically, there are two ways that can provide a probabilistic estimate of software errors. i Uncertainty propagation method: analogous to uncertainty propagation used in structural reliability 81  ... 
doi:10.5402/2012/850686 fatcat:upgg7ns3inbitidlsbqay4b32q

Systems interface biology

Francis J. Doyle, Jörg Stelling
2006 Journal of the Royal Society Interface  
In the same manner, these new classes of biological problems are motivating novel developments in theoretical systems approaches.  ...  The field of systems biology has attracted the attention of biologists, engineers, mathematicians, physicists, chemists and others in an endeavour to create systems-level understanding of complex biological  ...  We acknowledge the financial support to F.J.D. from the Institute for Collaborative Biotechnologies through grant DAAD19-03-D-0004 from the US Army Research Office.  ... 
doi:10.1098/rsif.2006.0143 pmid:16971329 pmcid:PMC1664650 fatcat:rqtnqq6ulvc5ldya75qha7di5u

A new rational method for calculating the GSI

G. Russo
2009 Tunnelling and Underground Space Technology  
exploited in order to obtain a reliable, quantitative assessment of the GSI by means of the basic input parameters for the determination of the RMi (i.e. the elementary block volume and the joint conditions  ...  In this paper a new approach for a quantitative assessment of the Geological Strength Index (GSI, Hoek et al., 1995) is proposed.  ...  Simone Cocchi for the many geostructural surveys realized to test and compare the new approach proposed; -Ing. Shulin Xu for critical review of the manuscript and his numerous suggestions.  ... 
doi:10.1016/j.tust.2008.03.002 fatcat:sb5qrzilafeb5jh6g5agfoempu

DAG-based attack and defense modeling: Don't miss the forest for the attack trees

Barbara Kordy, Ludovic Piètre-Cambacédès, Patrick Schweitzer
2014 Computer Science Review  
Graphical models constitute a valuable support tool to facilitate threat assessment and risk management of real-life systems. Thus, they have also become popular in the industrial sector.  ...  The great advantage of graph-based approaches lies in combining user friendly, intuitive, visual features with formal semantics and algorithms that allow for qualitative and quantitative analysis.  ...  There still exists a gap between theoretical research and practical employment of graphical security models.  ... 
doi:10.1016/j.cosrev.2014.07.001 fatcat:aie7uxdorjclnb5ctgg5nrczqi

A review of cyber security risk assessment methods for SCADA systems

Yulia Cherdantseva, Pete Burnap, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby, Kristan Stoddart
2016 Computers & security  
We select and in-detail examine twenty-four risk assessment methods developed for or applied in the context of a SCADA system.  ...  Based on the analysis, we suggest an intuitive scheme for the categorisation of cyber security risk assessment methods for SCADA systems.  ...  An evolution graph is a directed acyclic graph which consists of the states of an elementary attack committed to achieve a final goal. Each evolution describes an attack strategy.  ... 
doi:10.1016/j.cose.2015.09.009 fatcat:cf232dewkvcndl5ctydyuywhgq
« Previous Showing results 1 — 15 out of 2,526 results