CN107908557A - A kind of embedded software credible attribute modeling and verification method - Google Patents

A kind of embedded software credible attribute modeling and verification method Download PDF

Info

Publication number
CN107908557A
CN107908557A CN201711122419.4A CN201711122419A CN107908557A CN 107908557 A CN107908557 A CN 107908557A CN 201711122419 A CN201711122419 A CN 201711122419A CN 107908557 A CN107908557 A CN 107908557A
Authority
CN
China
Prior art keywords
independent operating
subprogram
credible
program
basic framework
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711122419.4A
Other languages
Chinese (zh)
Other versions
CN107908557B (en
Inventor
邵瑛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Technical Institute of Electronics and Information
Original Assignee
Shanghai Technical Institute of Electronics and Information
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Technical Institute of Electronics and Information filed Critical Shanghai Technical Institute of Electronics and Information
Priority to CN201711122419.4A priority Critical patent/CN107908557B/en
Publication of CN107908557A publication Critical patent/CN107908557A/en
Application granted granted Critical
Publication of CN107908557B publication Critical patent/CN107908557B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • G06F11/3612Software analysis for verifying properties of programs by runtime analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The present invention relates to a kind of modeling of embedded software credible attribute and verification method, including building embedded software subprogram, establish degree of belief and calculate function, credible preliminary association, structure accesses degree of belief evaluation subprogram, six steps such as simulation run and credible dynamic evaluation amendment.The method of the present invention is simple, operation and implementation are easy, and it is provided simultaneously with data operation, modeling, emulation, the stability and by property comprehensively detect and correct that many aspects such as monitoring and dynamical feedback amendment run program, so as on the one hand effectively simplify the structure of main program, improve the main program speed of service and data-handling capacity, and effectively raise the expansion capability of main program, on the other hand effectively raise between main program and each subprogram, the reliability and flexibility that data interaction is done between each subprogram, so as to effectively raise the stability of programming system overall operation, reliability, and effectively raise the system compatibility and expansion of program entirety.

Description

A kind of embedded software credible attribute modeling and verification method
Technical field
The present invention relates to a kind of modeling of embedded software credible attribute and verification method, belong to engine production equipment and technology Field.
Background technology
Currently in the development process for carrying out the systems such as all kinds of computer programs, automated control program, in order to improve journey Sort run speed, data-handling efficiency, often be using as far as possible build a versatile main program frame, then based on Embedded all kinds of need subprograms to be used in program, although this practice effectively meets to improve at program operation speed and data The purpose of efficiency is managed, but is easily occurred between main program and subprogram, the compatibility, information between subprogram and subprogram are handed over Mutual ability there are obstacle so that cause program run in failure rate raise, in order to overcome this problem, currently into line program In global design exploitation, although the step of introducing Trusting eBusiness between each program, currently into credible between line program In verification, it is only often to carry out unidirectional simple data verification to calculate, effective verification process is lacked to data validation process Operated with follow-up reparation, thus cause in current programming system often in various degree there are system run all right it is poor, System compatibility and expansion deficiency, so as to seriously affect programming system reliability of operation and stability, therefore are directed to this One present situation, there is an urgent need to develop a kind of brand-new embedded program trust authentication method, to meet the needs of actual use.
The content of the invention
The object of the invention, which is that, overcomes above-mentioned deficiency, there is provided a kind of embedded software credible attribute modeling and verification method And its preparation process.
To achieve the above object, the present invention is to be achieved through the following technical solutions:
A kind of embedded software credible attribute modeling and verification method, comprise the following steps:
The first step, builds embedded software subprogram, and according to main working program basic framework, according to using needs, establishment is extremely A few subprogram for meeting respective independent operating needs, and parallel with one another between independent operating subprogram, while by each independence Runtime subroutine service condition develops respective interrupt program respectively, is then embedded in by independent operating subprogram by interrupt routine Into main working program basic framework;
Second step, establishes degree of belief and calculates function, after completing the first step, selected respectively from each independent operating subprogram respectively Select out at least 3 groups and there is direct correlation property data group with data in main working program basic framework, so from the sub- journey of each independent operating Sequence is selected respectively at least one set of to be embedded in other independent operating subprograms in main working program basic framework and sees directly with other Relevance data group, then according to the data group selected, develops and runs function for the data group of credible need assessment, and A data group of selection is subjected to credible evaluation calculating, obtains preliminary credible evaluation data value;
3rd step, credible preliminary association, the credible evaluation data value being calculated according to second step, on the one hand to each only Vertical credible sequence between runtime subroutine and main working program basic framework, on the other hand to being embedded in main working program base Credibility is ranked up between each independent operating subprogram within plinth frame, so that according to ranking results, to each independent operating Priority of the program in main working program basic framework is ranked up assignment, to mutual data between each independent operating subprogram Associated priority is ranked up assignment, so as to obtain the credible association of preliminary embedded software;
4th step, structure accesses degree of belief evaluation subprogram, after completing the 3rd step operation, first on main working program basis Frame establish, for each independent operating subprogram by main working program basic framework into calls successfully with the frequency of failure record prison Control subprogram, then in independent operating subprogram establish for call other independent operating subprograms into calls successfully and fail The monitoring subroutine of number record;
5th step, simulation run, after completing the 4th step, according in actual software operating status, respectively to software systems Open, close emulated, according to the 3rd step establish priority, to by main working program basic framework operate, successively The priority that interrupt routine and priority operating status to independent operating subprogram emulated, is established according to the 3rd step is to embedding The priority entered between each independent operating subprogram in main working program basic framework is emulated, and is deposited in emulation The defects of, be returned directly in the first step, each independent operating subprogram be adjusted again;
6th step, credible dynamic evaluation amendment, after the emulation job of the 5th step is completed, software systems enter and formally make With the stage, in formal service stage, user is directly run, so according to using needs under main working program basic framework basis Main working program basic framework uses needs according to user afterwards, is independently transported triggering to be embedded under main working program basic framework After the interrupt routine of row subprogram, corresponding independent operating subprogram activation independent operating subprogram related to realization is directly invoked Data are mutually called between operation, and in independent operating subprogram activation invoked procedure, are directed to by what is established in the 4th step Each independent operating subprogram by main working program basic framework into call successfully with the frequency of failure record monitoring subroutine, and In independent operating subprogram establish for call other independent operating subprograms into calls successfully with the frequency of failure record monitoring Subprogram, counts the called frequency of the sub- journey of each independent operating, then according to called frequency to each independent operating The priority assignment of journey is modified, while calls the successfully frequency with malloc failure malloc in being called by the sub- journey of each independent operating, The programming structure of each independent operating subprogram is adjusted and to for judging that the data group of independent operating subprogram credibility carries out Correct, improve credible between each independent operating subprogram and main working program basic framework between each independent operating subprogram Property.
Further, in the first step, during underway disconnected program composition, each independent operating subprogram is all provided with least Two interrupt routines.
Further, in the second step, the used data group for credible need assessment runs letter
Number is:
Wherein:
K is that the data group of credible need assessment runs function entropy;
For data value in independent operating subprogram;
For line n m column data values in independent operating subprogram;
Further, the entropy of the data group operation function result of calculation of the credible need assessment is higher, then two Confidence level between program is higher.
Further, there are direct correlation property data carrying out data to each independent operating subprogram in the second step During group selection, Data duplication rate selected by each independent operating subprogram is less with 30%.
Further, in the 3rd step, when carrying out priority ranking, with by the credible need assessment of second step The entropy of data group operation function result of calculation be criterion, the more high then priority of two of which program confidence level entropy It is higher.
Further, in the 5th step, to defect present in emulation, it is returned directly in the first step, it is again right When each independent operating subprogram is adjusted operation, each program Suitable content, must not account for the 50% of the total content of the program.
Further, in the 6th step, in actual operation, priority assignment is completed, and with new preferential grading After line program sequence, the simulation run of the 5th step is no longer carried out.
Further, it is high to calling frequency in the 6th step, but independent operating of the malloc failure malloc rate more than 15% Program, then return to the first step, which is modified.
The method of the present invention is simple, and operation and implementation are easy, and are provided simultaneously with data operation, modeling, emulation, monitoring and dynamic The stability and by property comprehensively detect and correct that many aspects such as feedback modifiers run program, so that on the one hand effectively The structure for simplifying main program, improve the main program speed of service and data-handling capacity, and effectively raise main program Expansion capability, on the other hand effectively raise between main program and each subprogram, between each subprogram data interaction do it is reliable Property and flexibility, so as to effectively raise the stability of programming system overall operation, reliability, and effectively raise program Overall system compatibility and expansion.
Brief description of the drawings
Flow diagram when Fig. 1 is the method for the present invention zero deflection;
Fig. 2 flow diagrams there are deviation and when correcting for the method for the present invention;
Fig. 3 is invention software system structure diagram;
Fig. 4 is that the data group of credible need assessment runs functional operation logical relation schematic diagram.
Embodiment
As shown in Fig. 1-4, a kind of embedded software credible attribute modeling and verification method, comprise the following steps:
The first step, builds embedded software subprogram, and according to main working program basic framework, according to using needs, establishment is extremely A few subprogram for meeting respective independent operating needs, and parallel with one another between independent operating subprogram, while by each independence Runtime subroutine service condition develops respective interrupt program respectively, is then embedded in by independent operating subprogram by interrupt routine Into main working program basic framework;
Second step, establishes degree of belief and calculates function, after completing the first step, selected respectively from each independent operating subprogram respectively Select out at least 3 groups and there is direct correlation property data group with data in main working program basic framework, so from the sub- journey of each independent operating Sequence is selected respectively at least one set of to be embedded in other independent operating subprograms in main working program basic framework and sees directly with other Relevance data group, then according to the data group selected, develops and runs function for the data group of credible need assessment, and A data group of selection is subjected to credible evaluation calculating, obtains preliminary credible evaluation data value;
3rd step, credible preliminary association, the credible evaluation data value being calculated according to second step, on the one hand to each only Vertical credible sequence between runtime subroutine and main working program basic framework, on the other hand to being embedded in main working program base Credibility is ranked up between each independent operating subprogram within plinth frame, so that according to ranking results, to each independent operating Priority of the program in main working program basic framework is ranked up assignment, to mutual data between each independent operating subprogram Associated priority is ranked up assignment, so as to obtain the credible association of preliminary embedded software;
4th step, structure accesses degree of belief evaluation subprogram, after completing the 3rd step operation, first on main working program basis Frame establish, for each independent operating subprogram by main working program basic framework into calls successfully with the frequency of failure record prison Control subprogram, then in independent operating subprogram establish for call other independent operating subprograms into calls successfully and fail The monitoring subroutine of number record;
5th step, simulation run, after completing the 4th step, according in actual software operating status, respectively to software systems Open, close emulated, according to the 3rd step establish priority, to by main working program basic framework operate, successively The priority that interrupt routine and priority operating status to independent operating subprogram emulated, is established according to the 3rd step is to embedding The priority entered between each independent operating subprogram in main working program basic framework is emulated, and is deposited in emulation The defects of, be returned directly in the first step, each independent operating subprogram be adjusted again;
6th step, credible dynamic evaluation amendment, after the emulation job of the 5th step is completed, software systems enter and formally make With the stage, in formal service stage, user is directly run, so according to using needs under main working program basic framework basis Main working program basic framework uses needs according to user afterwards, is independently transported triggering to be embedded under main working program basic framework After the interrupt routine of row subprogram, corresponding independent operating subprogram activation independent operating subprogram related to realization is directly invoked Data are mutually called between operation, and in independent operating subprogram activation invoked procedure, are directed to by what is established in the 4th step Each independent operating subprogram by main working program basic framework into call successfully with the frequency of failure record monitoring subroutine, and In independent operating subprogram establish for call other independent operating subprograms into calls successfully with the frequency of failure record monitoring Subprogram, counts the called frequency of the sub- journey of each independent operating, then according to called frequency to each independent operating The priority assignment of journey is modified, while calls the successfully frequency with malloc failure malloc in being called by the sub- journey of each independent operating, The programming structure of each independent operating subprogram is adjusted and to for judging that the data group of independent operating subprogram credibility carries out Correct, improve credible between each independent operating subprogram and main working program basic framework between each independent operating subprogram Property.
In the present embodiment, in the first step, during underway disconnected program composition, each independent operating subprogram be all provided with to Few two interrupt routines.
In the present embodiment, in the second step, the used data group for credible need assessment is run
Function is:
Wherein:
K is that the data group of credible need assessment runs function entropy;
For data value in independent operating subprogram;
For line n m column data values in independent operating subprogram;
In the present embodiment, the entropy of the data group of credible need assessment operation function result of calculation is higher, then and two Confidence level between a program is higher.
In the present embodiment, there is direct correlation property number in the second step carrying out data to each independent operating subprogram During according to group selection, Data duplication rate selected by each independent operating subprogram is less with 30%.
In the present embodiment, in the 3rd step, when carrying out priority ranking, to be commented by the credible demand of second step The entropy for the data group operation function result of calculation estimated is criterion, the more high then priority of two of which program confidence level entropy Also it is higher.
In the present embodiment, in the 5th step, to defect present in emulation, it is returned directly in the first step, again When being adjusted operation to each independent operating subprogram, each program Suitable content, must not account for the 50% of the total content of the program.
In the present embodiment, in the 6th step, in actual operation, priority assignment is completed, and with new priority After sorting into line program, the simulation run of the 5th step is no longer carried out.
It is high to calling frequency in the 6th step in the present embodiment, but malloc failure malloc rate is more than 15% independent operating Subprogram, then return to the first step, which is modified.
The method of the present invention is simple, and operation and implementation are easy, and are provided simultaneously with data operation, modeling, emulation, monitoring and dynamic The stability and by property comprehensively detect and correct that many aspects such as feedback modifiers run program, so that on the one hand effectively The structure for simplifying main program, improve the main program speed of service and data-handling capacity, and effectively raise main program Expansion capability, on the other hand effectively raise between main program and each subprogram, between each subprogram data interaction do it is reliable Property and flexibility, so as to effectively raise the stability of programming system overall operation, reliability, and effectively raise program Overall system compatibility and expansion.
The basic principles, main features and the advantages of the invention have been shown and described above.The technology of the industry Personnel are it should be appreciated that the present invention is not limited to the above embodiments, and the above embodiments and description only describe this The principle of invention, without departing from the spirit and scope of the present invention, various changes and modifications of the present invention are possible, these changes Change and improvement all fall within the protetion scope of the claimed invention.The claimed scope of the invention by appended claims and its Equivalent thereof.

Claims (9)

1. a kind of embedded software credible attribute modeling and verification method, it is characterised in that:The embedded software is credible category Property modeling comprise the following steps with verification method:
The first step, builds embedded software subprogram, according to main working program basic framework, according to needs are used, works out at least one A subprogram for meeting respective independent operating needs, and parallel with one another between independent operating subprogram, while by each independent operating Subprogram activation condition develops respective interrupt program respectively, is then embedded into master by interrupt routine by independent operating subprogram In operation program basic framework;
Second step, establishes degree of belief and calculates function, after completing the first step, selected respectively from each independent operating subprogram respectively At least 3 groups have direct correlation property data group with data in main working program basic framework, so from each independent operating subprogram point Do not select and at least one set of be embedded in other independent operating subprograms in main working program basic framework with other and see direct correlation Property data group, then according to the data group selected, develop and run function for the data group of credible need assessment, and will choosing A data group selected carries out credible evaluation calculating, obtains preliminary credible evaluation data value;
3rd step, credible preliminary association, the credible evaluation data value being calculated according to second step, on the one hand to each independent fortune Credible sequence between row subprogram and main working program basic framework, on the other hand to being embedded in main working program basis frame Credibility is ranked up between each independent operating subprogram within frame, so that according to ranking results, to each independent operating subprogram Priority in main working program basic framework is ranked up assignment, to mutual data correlation between each independent operating subprogram Priority be ranked up assignment, so as to obtain the credible association of preliminary embedded software;
4th step, structure accesses degree of belief evaluation subprogram, after completing the 3rd step operation, first in main working program basic framework Establish, it is successfully sub with the monitoring of frequency of failure record into calling by main working program basic framework for each independent operating subprogram Program, is then established in independent operating subprogram for calling other independent operating subprograms into calling successfully and the frequency of failure The monitoring subroutine of record;
5th step, simulation run, after completing the 4th step, according in actual software operating status, respectively the opening to software systems, Close emulated, according to the 3rd step establish priority, to by main working program basic framework operate, successively to independence The priority that the interrupt routine and priority operating status of runtime subroutine emulated, is established according to the 3rd step is to being embedded in master The priority between each independent operating subprogram in operation program basic framework is emulated, and to being lacked present in emulation Fall into, be returned directly in the first step, each independent operating subprogram is adjusted again;
6th step, credible dynamic evaluation amendment, after the emulation job of the 5th step is completed, software systems, which enter, formally uses rank Section, in formal service stage, user is directly run, Ran Houzhu according to using needs under main working program basic framework basis Operation program basic framework uses needs according to user, and independent operating under main working program basic framework is embedded in triggering After the interrupt routine of program, corresponding independent operating subprogram activation independent operating subprogram activation related to realization is directly invoked Between data mutually call, and in independent operating subprogram activation invoked procedure, by established in the 4th step for it is each solely Vertical runtime subroutine by main working program basic framework into calling the monitoring subroutine that is successfully recorded with the frequency of failure, and in independence On runtime subroutine establish for call other independent operating subprograms into calls successfully with the frequency of failure record the sub- journey of monitoring Sequence, counts the called frequency of the sub- journey of each independent operating, then according to called frequency to the sub- journey of each independent operating Priority assignment is modified, while calls the successfully frequency with malloc failure malloc in being called by the sub- journey of each independent operating, to each The programming structure adjustment of independent operating subprogram and to for judging that the data group of independent operating subprogram credibility is modified, Improve the credibility between each independent operating subprogram and main working program basic framework between each independent operating subprogram.
2. a kind of embedded software credible attribute modeling stated according to claim 1 and verification method, it is characterised in that:Described In the first step, during underway disconnected program composition, each independent operating subprogram is all provided with least two interrupt routines.
3. a kind of embedded software credible attribute modeling stated according to claim 1 and verification method, it is characterised in that:Described In second step, the used data group operation function for credible need assessment is:
Wherein:
K is that the data group of credible need assessment runs function entropy;
For data value in independent operating subprogram;
For line n m column data values in independent operating subprogram.
4. a kind of embedded software credible attribute modeling according to claim 3 and verification method, it is characterised in that:It is described Credible need assessment data group operation function result of calculation entropy it is higher, then the confidence level between two programs is higher.
5. a kind of embedded software credible attribute modeling according to claim 1 and verification method, it is characterised in that:It is described Second step, each independent operating subprogram is carried out data exist be directly linked property data group selection when, each independent operating Data duplication rate selected by program is less with 30%.
6. a kind of embedded software credible attribute modeling according to claim 1 and verification method, it is characterised in that:It is described The 3rd step in, when carrying out priority ranking, with by second step credible need assessment data group operation function calculate As a result entropy is criterion, and the more high then priority of two of which program confidence level entropy is also higher.
7. a kind of embedded software credible attribute modeling according to claim 1 and verification method, it is characterised in that:It is described The 5th step in, to defect present in emulation, be returned directly in the first step, each independent operating subprogram adjusted again During whole operation, each program Suitable content, must not account for the 50% of the total content of the program.
8. a kind of embedded software credible attribute modeling according to claim 1 and verification method, it is characterised in that:It is described The 6th step in, in actual operation, complete priority assignment, and with new priority into line program sort after, no longer carry out The simulation run of 5th step.
9. a kind of embedded software credible attribute modeling according to claim 1 and verification method, it is characterised in that:It is described The 6th step in, to calling frequency high, but malloc failure malloc rate is more than 15% independent operating subprogram, then returns to the first step, right The independent operating subprogram is modified.
CN201711122419.4A 2017-11-14 2017-11-14 Embedded software credible attribute modeling and verifying method Active CN107908557B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711122419.4A CN107908557B (en) 2017-11-14 2017-11-14 Embedded software credible attribute modeling and verifying method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711122419.4A CN107908557B (en) 2017-11-14 2017-11-14 Embedded software credible attribute modeling and verifying method

Publications (2)

Publication Number Publication Date
CN107908557A true CN107908557A (en) 2018-04-13
CN107908557B CN107908557B (en) 2020-10-20

Family

ID=61844010

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711122419.4A Active CN107908557B (en) 2017-11-14 2017-11-14 Embedded software credible attribute modeling and verifying method

Country Status (1)

Country Link
CN (1) CN107908557B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110032358A (en) * 2019-01-03 2019-07-19 阿里巴巴集团控股有限公司 A kind of application program generation method, device, equipment and system
CN112506767A (en) * 2020-12-03 2021-03-16 清华大学 Program verification method and device based on reinforcement learning

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5490249A (en) * 1992-12-23 1996-02-06 Taligent, Inc. Automated testing system
US20060129892A1 (en) * 2004-11-30 2006-06-15 Microsoft Corporation Scenario based stress testing
CN101311898A (en) * 2008-07-02 2008-11-26 北京大学 Software element reliability evaluation method and system
US20150309920A1 (en) * 2014-04-29 2015-10-29 Hitachi, Ltd. Method and system for testing control software of a controlled system
KR101664150B1 (en) * 2016-06-13 2016-10-10 (주) 피에스소프트 Terminal software verification system and verification method
CN106874200A (en) * 2017-02-14 2017-06-20 南京航空航天大学 Embedded software reliability modeling and appraisal procedure based on AADL
CN107038111A (en) * 2016-02-04 2017-08-11 华东师范大学 A kind of software credibility quantitative evaluation and design method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5490249A (en) * 1992-12-23 1996-02-06 Taligent, Inc. Automated testing system
US20060129892A1 (en) * 2004-11-30 2006-06-15 Microsoft Corporation Scenario based stress testing
CN101311898A (en) * 2008-07-02 2008-11-26 北京大学 Software element reliability evaluation method and system
US20150309920A1 (en) * 2014-04-29 2015-10-29 Hitachi, Ltd. Method and system for testing control software of a controlled system
CN107038111A (en) * 2016-02-04 2017-08-11 华东师范大学 A kind of software credibility quantitative evaluation and design method
KR101664150B1 (en) * 2016-06-13 2016-10-10 (주) 피에스소프트 Terminal software verification system and verification method
CN106874200A (en) * 2017-02-14 2017-06-20 南京航空航天大学 Embedded software reliability modeling and appraisal procedure based on AADL

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
康培亮: "软件可信性评估模型的研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
邵瑛: "基于Web的远程实时监测框架", 《计算机应用 信息科技》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110032358A (en) * 2019-01-03 2019-07-19 阿里巴巴集团控股有限公司 A kind of application program generation method, device, equipment and system
CN112506767A (en) * 2020-12-03 2021-03-16 清华大学 Program verification method and device based on reinforcement learning
CN112506767B (en) * 2020-12-03 2022-07-05 清华大学 Program verification method and device based on reinforcement learning

Also Published As

Publication number Publication date
CN107908557B (en) 2020-10-20

Similar Documents

Publication Publication Date Title
CN103870659B (en) A kind of fault of numerical control machine tool analyzes method
CN109840157A (en) Method, apparatus, electronic equipment and the storage medium of fault diagnosis
CN109150619B (en) Fault diagnosis method and system based on network flow data
CN107632590B (en) A kind of bottom event sort method priority-based
CN110645153B (en) Wind generating set fault diagnosis method and device and electronic equipment
CN104021248B (en) A kind of airborne machinery product FMECA analysis methods
CN106371422A (en) Method for predicting key infrastructure fault propagation
CN107133176A (en) A kind of spanned item mesh failure prediction method based on semi-supervised clustering data screening
CN107908557A (en) A kind of embedded software credible attribute modeling and verification method
WO2019047070A1 (en) Database maintenance method and system
CN103488562A (en) Automated testing method and device
CN109714201A (en) Network System Reliability appraisal procedure, device, computer equipment and storage medium
CN108197254B (en) A kind of data recovery method based on neighbour
CN107203839A (en) A kind of appraisal procedure of parts and components of diesel engine failure risk grade
CN114167217B (en) Multiple fault diagnosis method for railway distribution network
CN115114064A (en) Micro-service fault analysis method, system, equipment and storage medium
CN107102909A (en) A kind of Fault Classification towards complex software intensive equipment system
CN117909864A (en) Power failure prediction system and method
CN104765648A (en) Problem node detection method and device based on real-time computing system
CN105911965A (en) Method for realizing data analysis in data monitoring system
CN110672951B (en) Method and device for identifying voltage fragile region of power distribution network
CN106875015B (en) A kind of airplane fault diagnostic method and system
CN109784629B (en) Transformer substation industrial control network fault positioning method based on neural network
Gupta et al. Development of a framework for reliability centered maintenance
CN113032260A (en) Fault injection simulation test method and system based on componentized distributed system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant