Fuzzy coloured petri nets‐based method to analyse and verify the functionality of software

Some types of software systems, like event‐based and non‐deterministic ones, are usually specified as rules so that we can analyse the system behaviour by drawing inferences from firing the rules. However, when the fuzzy rules are used for the specification of non‐deterministic behaviour and they co...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:CAAI Transactions on Intelligence Technology Jg. 8; H. 3; S. 863 - 879
Hauptverfasser: Chavoshi, Mina, Babamir, Seyed Morteza
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Beijing John Wiley & Sons, Inc 01.09.2023
Wiley
Schlagworte:
ISSN:2468-6557, 2468-2322
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Some types of software systems, like event‐based and non‐deterministic ones, are usually specified as rules so that we can analyse the system behaviour by drawing inferences from firing the rules. However, when the fuzzy rules are used for the specification of non‐deterministic behaviour and they contain a large number of variables, they constitute a complex form that is difficult to understand and infer. A solution is to visualise the system specification with the capability of automatic rule inference. In this study, by representing a high‐level system specification, the authors visualise rule representation and firing using fuzzy coloured Petri‐nets . Already, several fuzzy Petri‐nets‐based methods have been presented, but they either do not support a large number of rules and variables or do not consider significant cases like (a) the weight of the premise's propositions in the occurrence of the rule conclusion, (b) the weight of conclusion's proposition, (c) threshold values for premise and conclusion's propositions of the rule, and (d) the certainty factor (CF) for the rule or the conclusion's proposition. By considering cases (a)–(d), a wider variety of fuzzy rules are supported. The authors applied their model to the analysis of attacks against a part of a real secure water treatment system. In another real experiment, the authors applied the model to the two scenarios from their previous work and analysed the results.
Bibliographie:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2468-6557
2468-2322
DOI:10.1049/cit2.12251