The use of formal specification in software development is becoming increasingly prevalent. The Z notation is a formal method, a language, and a style for expressing formal specification of software systems. This pape...The use of formal specification in software development is becoming increasingly prevalent. The Z notation is a formal method, a language, and a style for expressing formal specification of software systems. This paper presents a part of the specification work on a hotel viproom reservation system.展开更多
Data-flow errors are prevalent in cyber-physical systems(CPS).Although various approaches based on business process modeling notation(BPMN)have been devised for CPS modeling,the absence of formal specifications compli...Data-flow errors are prevalent in cyber-physical systems(CPS).Although various approaches based on business process modeling notation(BPMN)have been devised for CPS modeling,the absence of formal specifications complicates the verification of data-flow.Formal techniques such as Petri nets are popularly used for identifying data-flow errors.However,due to their interleaving semantics,they suffer from the state-space explosion problem.As an unfolding method for Petri nets,the merged process(MP)technique can well represent concurrency relationships and thus be used to address this issue.Yet generating MP is complex and incurs substantial overhead.By designing and applyingα-deletion rules for Petri nets with data(PNDs),this work simplifies MP,thus resulting in simplified MP(SMP)that is then used to identify data-flow errors.Our approach involves converting a BPMN into a PND and then constructing its SMP.The algorithms are developed to identify data-flow errors,e.g.,redundantdata and lost-data ones.The proposed method enhances the efficiency and effectiveness of identifying data-flow errors in CPS.It is expected to prevent the problems caused by data-flow errors,e.g.,medical malpractice and economic loss in some practical CPS.Its practicality and efficiency of the proposed method through several CPS.Its significant advantages over the state of the art are demonstrated.展开更多
This paper examines the application of the Verkle tree—an efficient data structure that leverages commitments and a novel proof technique in cryptographic solutions.Unlike traditional Merkle trees,the Verkle tree sig...This paper examines the application of the Verkle tree—an efficient data structure that leverages commitments and a novel proof technique in cryptographic solutions.Unlike traditional Merkle trees,the Verkle tree significantly reduces signature size by utilizing polynomial and vector commitments.Compact proofs also accelerate the verification process,reducing computational overhead,which makes Verkle trees particularly useful.The study proposes a new approach based on a non-positional polynomial notation(NPN)employing the Chinese Remainder Theorem(CRT).CRT enables efficient data representation and verification by decomposing data into smaller,indepen-dent components,simplifying computations,reducing overhead,and enhancing scalability.This technique facilitates parallel data processing,which is especially advantageous in cryptographic applications such as commitment and proof construction in Verkle trees,as well as in systems with constrained computational resources.Theoretical foundations of the approach,its advantages,and practical implementation aspects are explored,including resistance to potential attacks,application domains,and a comparative analysis with existing methods based on well-known parameters and characteristics.An analysis of potential attacks and vulnerabilities,including greatest common divisor(GCD)attacks,approximate multiple attacks(LLL lattice-based),brute-force search for irreducible polynomials,and the estimation of their total number,indicates that no vulnerabilities have been identified in the proposed method thus far.Furthermore,the study demonstrates that integrating CRT with Verkle trees ensures high scalability,making this approach promising for blockchain systems and other distributed systems requiring compact and efficient proofs.展开更多
In Chin.Phys.B 34114704(2025),Eq.(7)and the associated unit notation were incorrect.The correct ones are present here.Since Eq.(7)is an in-built expression in the simulation package,the correction is purely typographi...In Chin.Phys.B 34114704(2025),Eq.(7)and the associated unit notation were incorrect.The correct ones are present here.Since Eq.(7)is an in-built expression in the simulation package,the correction is purely typographical and does not affect the simulation procedure,numerical results,or the conclusions.展开更多
The latest wireless broadband network standard is LTE (Long Term Evolution) which is developed by 3GPP (3rd Generation Partnership Project). It will enable mobile devices such as smart phones, tablets and laptops to a...The latest wireless broadband network standard is LTE (Long Term Evolution) which is developed by 3GPP (3rd Generation Partnership Project). It will enable mobile devices such as smart phones, tablets and laptops to access Internet at a very high speed along with lots of multimedia services. There are many issues that are yet to be solved due to dynamic complex nature of wireless systems, multimedia software applications and software requirements. Poor service quality, service disconnections due to mobility, seamless handover, handover interruption time and downward compatibility to other Radio Access Networks (RAN) are some of the key issues for the current LTE systems that are addressed very recently in the scientific literature. Formal method is one of the promising software engineering techniques that assure quality and perfection in software system models. Formal methods use mathematical language to explicitly specify system specifications and requirements that serve as initial grounds for further development and implementation. It efficiently handles all component connections and resource management parameters using discrete structures. Z Schema language is used to model static aspects of LTE communications system. All the schemas are being verified using Z/Eves toolset. The aim is to provide sound mathematical foundation for system validation and verification that eventually results in a more reliable, scalable and complete software system.展开更多
Guqin music is a precious cultural heritage of China. The notation of Guqin is very special, which records its playing methods and techniques. For the purpose of preserving the guqin art, the digitalization of guqin n...Guqin music is a precious cultural heritage of China. The notation of Guqin is very special, which records its playing methods and techniques. For the purpose of preserving the guqin art, the digitalization of guqin notation and an interpretation method of guqin notation were conducted. By using this interpretation method, raw images of handwritten notations are transformed into structural data that can be processed and analyzed by computers easily. The method decomposes each single complex character of guqin notations into simple radicals and finds the structure of the character. According to the radicals and the structure, the character is interpreted into meaningful codes. The experimental results show our method is effective.展开更多
This paper presents an augmented framework for analyzing Safety Critical Systems (SCSs) formally. Due to high risk of failure, development process of SCSs is required more attention. Model driven approaches are the on...This paper presents an augmented framework for analyzing Safety Critical Systems (SCSs) formally. Due to high risk of failure, development process of SCSs is required more attention. Model driven approaches are the one of ways to develop SCSs for accomplishing critical and complex function what SCSs are supposed to do. Two model driven approaches: Unified Modeling Language (UML) and Formal Methods are combined in proposed framework which enables the analysis, designing and testing safety properties of SCSs more rigorously in order to reduce the ambiguities and enhance the correctness and completeness of SCSs. A real time case study has been discussed in order to validate the proposed framework.展开更多
DP enhanced notations are the new technical application on traditional DP system in order to adapt to higher requirements on offshore unit. But they are very complicated to apply. This article introduces the general o...DP enhanced notations are the new technical application on traditional DP system in order to adapt to higher requirements on offshore unit. But they are very complicated to apply. This article introduces the general of DP enhanced notations. At the same time, it provides a case, based on 145 m DSV built in a yard located at Shanghai, China. This case shows main settings for control systems and auxiliary systems of DNV "DYNPOS-ER". DP analysis and FMEA reports show all these setting can fulfill the requirements of Rules and diving operations.展开更多
Formal methods are the mathematically techniques and tools which are used at early stages of software development lifecycle processes. The utter need of using formal methods in safety critical system leads to accuracy...Formal methods are the mathematically techniques and tools which are used at early stages of software development lifecycle processes. The utter need of using formal methods in safety critical system leads to accuracy, consistency and correctness in proposed system. In safety critical real time application, requirements should be unambiguous and very accurate which can be achieved by using mathematical theorems. There is utter need to focus on the requirement phase which is the most critical phase of SDLC. This paper focuses on the use of Z notation for incorporating the accuracy, consistency, and eliminates ambiguity in safety critical system: Road Traffic Management System as a case study. The syntax, semantics, type checking and domain checking are further verified by using Z/EVES: a Z notation type checker tool.展开更多
While Bronze Age Proto-Sinaic and Proto-Canaanite syllabic inscriptions were found engraved on fragments of pottery and stone,evidence of early alphabetic script was also inscribed in ink onto a massive parchment scro...While Bronze Age Proto-Sinaic and Proto-Canaanite syllabic inscriptions were found engraved on fragments of pottery and stone,evidence of early alphabetic script was also inscribed in ink onto a massive parchment scroll,known as the Torah.Albeit the contours of those original characters transformed over time,it took the clairvoyant genius of Moses,and later the scribes of Ancient Israel,to configure and adapt ancient semitic prototypes into phonetic letters,producing the greatest literary document in the history of the world,the Bible.This article summarizes the acoustic properties of that alphabet,with further historical considerations.展开更多
A transformation way of the Navier-Stokes differential equation was presented. The obtained result is the Cauchy momentum equation. The transformation was performed using a novel shorten mathematical notation presente...A transformation way of the Navier-Stokes differential equation was presented. The obtained result is the Cauchy momentum equation. The transformation was performed using a novel shorten mathematical notation presented at the beginning of the transformation.展开更多
This paper introduces the base-X notation and discusses the conversion between numbers of different bases. It also introduces the tri-value logic that is associated with the base-3 system.
Objectives:The aim of this study was to investigate and develop a data storage and exchange format for the process of automatic systematic reviews(ASR)of traditional Chinese medicine(TCM).Methods:A lightweight and com...Objectives:The aim of this study was to investigate and develop a data storage and exchange format for the process of automatic systematic reviews(ASR)of traditional Chinese medicine(TCM).Methods:A lightweight and commonly used data format,namely,JavaScript Object Notation(JSON),was introduced in this study.We designed a fully described data structure to collect TCM clinical trial information based on the JSON syntax.Results:A smart and powerful data format,JSON-ASR,was developed.JSON-ASR uses a plain-text data format in the form of key/value pairs and consists of six sections and more than 80 preset pairs.JSON-ASR adopts extensible structured arrays to support the situations of multi-groups and multi-outcomes.Conclusion:JSON-ASR has the characteristics of light weight,flexibility,and good scalability,which is suitable for the complex data of clinical evidence.展开更多
The User Interface Transition Diagram (UITD) is a formal modeling notation that simplifies the specification and design of user-system interactions. It is a valuable communication tool for technical and non-technical ...The User Interface Transition Diagram (UITD) is a formal modeling notation that simplifies the specification and design of user-system interactions. It is a valuable communication tool for technical and non-technical stakeholders during the requirements elicitation phase, as it provides a simple yet technically complete notation that is easy to understand. In this paper, we investigated the efficiency of creating UITDs using draw.io, a widely used diagramming software, compared to a dedicated UITD editor. We conducted a study to compare the time required to use each tool to complete the task of creating a medium size UITD, as well as the subjective ease of use and satisfaction of participants with the dedicated Editor. Our results show that the UITD editor is more efficient and preferred by participants, highlighting the importance of using specialized tools for creating formal models such as UITDs. The findings of this study have implications for software developers, designers, and other stakeholders involved in the specification and design of user-system interactions.展开更多
Based on quantum mechanical representation and operator theory,this paper restates the two new convolutions of fractional Fourier transform(FrFT)by making full use of the conversion relationship between two mutual con...Based on quantum mechanical representation and operator theory,this paper restates the two new convolutions of fractional Fourier transform(FrFT)by making full use of the conversion relationship between two mutual conjugates:coordinate representation and momentum representation.This paper gives full play to the efficiency of Dirac notation and proves the convolutions of fractional Fourier transform from the perspective of quantum optics,a field that has been developing rapidly.These two new convolution methods have potential value in signal processing.展开更多
This paper presents a framework of the distributed concurrent multi-port-testing test system (CMPT-TS) for IP routers under development at Sichuan Network Communication Key Laboratory. Having analyzed the actuality of...This paper presents a framework of the distributed concurrent multi-port-testing test system (CMPT-TS) for IP routers under development at Sichuan Network Communication Key Laboratory. Having analyzed the actuality of concurrent testing for routers, this paper develops a distributed architecture of CMPT-TS and discusses its functional components in detail. Moreover, a new test definition language, CMPT definition language, is also introduced simply.展开更多
AJAX(asynchronous javascript and XML)是当前B/S系统中广泛采用的异步处理技术,WCF(windows communication foundation)使人们使用不同的技术构建分布式应用系统更加容易,笔者提出了AJAX与WCF两种交互方法的具体实现,并给出在WCF框架...AJAX(asynchronous javascript and XML)是当前B/S系统中广泛采用的异步处理技术,WCF(windows communication foundation)使人们使用不同的技术构建分布式应用系统更加容易,笔者提出了AJAX与WCF两种交互方法的具体实现,并给出在WCF框架中实现AJAX技术的一种编程模型.展开更多
文摘The use of formal specification in software development is becoming increasingly prevalent. The Z notation is a formal method, a language, and a style for expressing formal specification of software systems. This paper presents a part of the specification work on a hotel viproom reservation system.
基金supported by the National Natural Science Foundation of China(62402415)in part by the Natural Science Foundation of Shandong Province of China(ZR2024MF129)in part by State Key Laboratory of Massive Personalized Customization System and Technology(No.H&C-MPC-2023-02-03).
文摘Data-flow errors are prevalent in cyber-physical systems(CPS).Although various approaches based on business process modeling notation(BPMN)have been devised for CPS modeling,the absence of formal specifications complicates the verification of data-flow.Formal techniques such as Petri nets are popularly used for identifying data-flow errors.However,due to their interleaving semantics,they suffer from the state-space explosion problem.As an unfolding method for Petri nets,the merged process(MP)technique can well represent concurrency relationships and thus be used to address this issue.Yet generating MP is complex and incurs substantial overhead.By designing and applyingα-deletion rules for Petri nets with data(PNDs),this work simplifies MP,thus resulting in simplified MP(SMP)that is then used to identify data-flow errors.Our approach involves converting a BPMN into a PND and then constructing its SMP.The algorithms are developed to identify data-flow errors,e.g.,redundantdata and lost-data ones.The proposed method enhances the efficiency and effectiveness of identifying data-flow errors in CPS.It is expected to prevent the problems caused by data-flow errors,e.g.,medical malpractice and economic loss in some practical CPS.Its practicality and efficiency of the proposed method through several CPS.Its significant advantages over the state of the art are demonstrated.
基金funded by the Ministry of Science and Higher Education of Kazakhstan and carried out within the framework of the project AP23488112“Development and study of a quantum-resistant digital signature scheme based on a Verkle tree”at the Institute of Information and Computational Technologies.
文摘This paper examines the application of the Verkle tree—an efficient data structure that leverages commitments and a novel proof technique in cryptographic solutions.Unlike traditional Merkle trees,the Verkle tree significantly reduces signature size by utilizing polynomial and vector commitments.Compact proofs also accelerate the verification process,reducing computational overhead,which makes Verkle trees particularly useful.The study proposes a new approach based on a non-positional polynomial notation(NPN)employing the Chinese Remainder Theorem(CRT).CRT enables efficient data representation and verification by decomposing data into smaller,indepen-dent components,simplifying computations,reducing overhead,and enhancing scalability.This technique facilitates parallel data processing,which is especially advantageous in cryptographic applications such as commitment and proof construction in Verkle trees,as well as in systems with constrained computational resources.Theoretical foundations of the approach,its advantages,and practical implementation aspects are explored,including resistance to potential attacks,application domains,and a comparative analysis with existing methods based on well-known parameters and characteristics.An analysis of potential attacks and vulnerabilities,including greatest common divisor(GCD)attacks,approximate multiple attacks(LLL lattice-based),brute-force search for irreducible polynomials,and the estimation of their total number,indicates that no vulnerabilities have been identified in the proposed method thus far.Furthermore,the study demonstrates that integrating CRT with Verkle trees ensures high scalability,making this approach promising for blockchain systems and other distributed systems requiring compact and efficient proofs.
文摘In Chin.Phys.B 34114704(2025),Eq.(7)and the associated unit notation were incorrect.The correct ones are present here.Since Eq.(7)is an in-built expression in the simulation package,the correction is purely typographical and does not affect the simulation procedure,numerical results,or the conclusions.
文摘The latest wireless broadband network standard is LTE (Long Term Evolution) which is developed by 3GPP (3rd Generation Partnership Project). It will enable mobile devices such as smart phones, tablets and laptops to access Internet at a very high speed along with lots of multimedia services. There are many issues that are yet to be solved due to dynamic complex nature of wireless systems, multimedia software applications and software requirements. Poor service quality, service disconnections due to mobility, seamless handover, handover interruption time and downward compatibility to other Radio Access Networks (RAN) are some of the key issues for the current LTE systems that are addressed very recently in the scientific literature. Formal method is one of the promising software engineering techniques that assure quality and perfection in software system models. Formal methods use mathematical language to explicitly specify system specifications and requirements that serve as initial grounds for further development and implementation. It efficiently handles all component connections and resource management parameters using discrete structures. Z Schema language is used to model static aspects of LTE communications system. All the schemas are being verified using Z/Eves toolset. The aim is to provide sound mathematical foundation for system validation and verification that eventually results in a more reliable, scalable and complete software system.
基金National Natural Science Foundation of China(No.6097507)
文摘Guqin music is a precious cultural heritage of China. The notation of Guqin is very special, which records its playing methods and techniques. For the purpose of preserving the guqin art, the digitalization of guqin notation and an interpretation method of guqin notation were conducted. By using this interpretation method, raw images of handwritten notations are transformed into structural data that can be processed and analyzed by computers easily. The method decomposes each single complex character of guqin notations into simple radicals and finds the structure of the character. According to the radicals and the structure, the character is interpreted into meaningful codes. The experimental results show our method is effective.
文摘This paper presents an augmented framework for analyzing Safety Critical Systems (SCSs) formally. Due to high risk of failure, development process of SCSs is required more attention. Model driven approaches are the one of ways to develop SCSs for accomplishing critical and complex function what SCSs are supposed to do. Two model driven approaches: Unified Modeling Language (UML) and Formal Methods are combined in proposed framework which enables the analysis, designing and testing safety properties of SCSs more rigorously in order to reduce the ambiguities and enhance the correctness and completeness of SCSs. A real time case study has been discussed in order to validate the proposed framework.
文摘DP enhanced notations are the new technical application on traditional DP system in order to adapt to higher requirements on offshore unit. But they are very complicated to apply. This article introduces the general of DP enhanced notations. At the same time, it provides a case, based on 145 m DSV built in a yard located at Shanghai, China. This case shows main settings for control systems and auxiliary systems of DNV "DYNPOS-ER". DP analysis and FMEA reports show all these setting can fulfill the requirements of Rules and diving operations.
文摘Formal methods are the mathematically techniques and tools which are used at early stages of software development lifecycle processes. The utter need of using formal methods in safety critical system leads to accuracy, consistency and correctness in proposed system. In safety critical real time application, requirements should be unambiguous and very accurate which can be achieved by using mathematical theorems. There is utter need to focus on the requirement phase which is the most critical phase of SDLC. This paper focuses on the use of Z notation for incorporating the accuracy, consistency, and eliminates ambiguity in safety critical system: Road Traffic Management System as a case study. The syntax, semantics, type checking and domain checking are further verified by using Z/EVES: a Z notation type checker tool.
文摘While Bronze Age Proto-Sinaic and Proto-Canaanite syllabic inscriptions were found engraved on fragments of pottery and stone,evidence of early alphabetic script was also inscribed in ink onto a massive parchment scroll,known as the Torah.Albeit the contours of those original characters transformed over time,it took the clairvoyant genius of Moses,and later the scribes of Ancient Israel,to configure and adapt ancient semitic prototypes into phonetic letters,producing the greatest literary document in the history of the world,the Bible.This article summarizes the acoustic properties of that alphabet,with further historical considerations.
文摘A transformation way of the Navier-Stokes differential equation was presented. The obtained result is the Cauchy momentum equation. The transformation was performed using a novel shorten mathematical notation presented at the beginning of the transformation.
文摘This paper introduces the base-X notation and discusses the conversion between numbers of different bases. It also introduces the tri-value logic that is associated with the base-3 system.
基金the National Key R&D Program of China(Grant no.2019YFC1709803)National Natural Science Foundation of China(Grant no.81873183).
文摘Objectives:The aim of this study was to investigate and develop a data storage and exchange format for the process of automatic systematic reviews(ASR)of traditional Chinese medicine(TCM).Methods:A lightweight and commonly used data format,namely,JavaScript Object Notation(JSON),was introduced in this study.We designed a fully described data structure to collect TCM clinical trial information based on the JSON syntax.Results:A smart and powerful data format,JSON-ASR,was developed.JSON-ASR uses a plain-text data format in the form of key/value pairs and consists of six sections and more than 80 preset pairs.JSON-ASR adopts extensible structured arrays to support the situations of multi-groups and multi-outcomes.Conclusion:JSON-ASR has the characteristics of light weight,flexibility,and good scalability,which is suitable for the complex data of clinical evidence.
文摘The User Interface Transition Diagram (UITD) is a formal modeling notation that simplifies the specification and design of user-system interactions. It is a valuable communication tool for technical and non-technical stakeholders during the requirements elicitation phase, as it provides a simple yet technically complete notation that is easy to understand. In this paper, we investigated the efficiency of creating UITDs using draw.io, a widely used diagramming software, compared to a dedicated UITD editor. We conducted a study to compare the time required to use each tool to complete the task of creating a medium size UITD, as well as the subjective ease of use and satisfaction of participants with the dedicated Editor. Our results show that the UITD editor is more efficient and preferred by participants, highlighting the importance of using specialized tools for creating formal models such as UITDs. The findings of this study have implications for software developers, designers, and other stakeholders involved in the specification and design of user-system interactions.
基金National Natural Science Foundation of China(Grant Number:11304126)College Students' Innovation Training Program(Grant Number:202110299696X)。
文摘Based on quantum mechanical representation and operator theory,this paper restates the two new convolutions of fractional Fourier transform(FrFT)by making full use of the conversion relationship between two mutual conjugates:coordinate representation and momentum representation.This paper gives full play to the efficiency of Dirac notation and proves the convolutions of fractional Fourier transform from the perspective of quantum optics,a field that has been developing rapidly.These two new convolution methods have potential value in signal processing.
文摘This paper presents a framework of the distributed concurrent multi-port-testing test system (CMPT-TS) for IP routers under development at Sichuan Network Communication Key Laboratory. Having analyzed the actuality of concurrent testing for routers, this paper develops a distributed architecture of CMPT-TS and discusses its functional components in detail. Moreover, a new test definition language, CMPT definition language, is also introduced simply.
文摘AJAX(asynchronous javascript and XML)是当前B/S系统中广泛采用的异步处理技术,WCF(windows communication foundation)使人们使用不同的技术构建分布式应用系统更加容易,笔者提出了AJAX与WCF两种交互方法的具体实现,并给出在WCF框架中实现AJAX技术的一种编程模型.