scholarly journals Testing and Formal Verification of Logarithmic Function Design

2010 ◽  
Author(s):  
Sanjeev Agarwal ◽  
Indu Bhuria ◽  
R. B. Patel ◽  
B. P. Singh
Author(s):  
Pierre-Loïc Garoche

The verification of control system software is critical to a host of technologies and industries, from aeronautics and medical technology to the cars we drive. The failure of controller software can cost people their lives. This book provides control engineers and computer scientists with an introduction to the formal techniques for analyzing and verifying this important class of software. Too often, control engineers are unaware of the issues surrounding the verification of software, while computer scientists tend to be unfamiliar with the specificities of controller software. The book provides a unified approach that is geared to graduate students in both fields, covering formal verification methods as well as the design and verification of controllers. It presents a wealth of new verification techniques for performing exhaustive analysis of controller software. These include new means to compute nonlinear invariants, the use of convex optimization tools, and methods for dealing with numerical imprecisions such as floating point computations occurring in the analyzed software. As the autonomy of critical systems continues to increase—as evidenced by autonomous cars, drones, and satellites and landers—the numerical functions in these systems are growing ever more advanced. The techniques presented here are essential to support the formal analysis of the controller software being used in these new and emerging technologies.


2001 ◽  
Author(s):  
Anand Chavan ◽  
Byoung Woo Min ◽  
Shiu-Kai Chin

Author(s):  
Keith M. Martin

This chapter discusses cryptographic mechanisms for providing data integrity. We begin by identifying different levels of data integrity that can be provided. We then look in detail at hash functions, explaining the different security properties that they have, as well as presenting several different applications of a hash function. We then look at hash function design and illustrate this by discussing the hash function SHA-3. Next, we discuss message authentication codes (MACs), presenting a basic model and discussing basic properties. We compare two different MAC constructions, CBC-MAC and HMAC. Finally, we consider different ways of using MACs together with encryption. We focus on authenticated encryption modes, and illustrate these by describing Galois Counter mode.


2021 ◽  
Vol 4 (2) ◽  
pp. 31
Author(s):  
Haoxuan Yu ◽  
Shuai Li

With the continuous development of the mining industry, the world’s major mines have gradually entered the intelligent stage. In intelligent underground mines, the operation roads of the underground transportation equipment are very complicated, and the monitoring and control of the underground traffic have become the problems to be solved in the intelligent underground mines. Therefore, on the basis of solving the practical problems of underground mines, the concept paper discusses the possibility of the communication-based train control (CBTC) system being applied to underground mines through the summary and induction of the related literature. As mining engineers, we have proposed the function design for the CBTC system to solve the problems in underground mine rail transportation, but we still need to continue to work hard for the future development of the underground mines. The concept paper serves as a guide to the Tossing out a brick to get a jade gem, and it has implications for the development and the future of underground mine transportation.


Sign in / Sign up

Export Citation Format

Share Document