CN107908557A - A kind of embedded software credible attribute modeling and verification method - Google Patents
A kind of embedded software credible attribute modeling and verification method Download PDFInfo
- Publication number
- CN107908557A CN107908557A CN201711122419.4A CN201711122419A CN107908557A CN 107908557 A CN107908557 A CN 107908557A CN 201711122419 A CN201711122419 A CN 201711122419A CN 107908557 A CN107908557 A CN 107908557A
- Authority
- CN
- China
- Prior art keywords
- independent operating
- subprogram
- credible
- program
- basic framework
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
- G06F11/3612—Software analysis for verifying properties of programs by runtime analysis
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Debugging And Monitoring (AREA)
Abstract
The present invention relates to a kind of modeling of embedded software credible attribute and verification method, including building embedded software subprogram, establish degree of belief and calculate function, credible preliminary association, structure accesses degree of belief evaluation subprogram, six steps such as simulation run and credible dynamic evaluation amendment.The method of the present invention is simple, operation and implementation are easy, and it is provided simultaneously with data operation, modeling, emulation, the stability and by property comprehensively detect and correct that many aspects such as monitoring and dynamical feedback amendment run program, so as on the one hand effectively simplify the structure of main program, improve the main program speed of service and data-handling capacity, and effectively raise the expansion capability of main program, on the other hand effectively raise between main program and each subprogram, the reliability and flexibility that data interaction is done between each subprogram, so as to effectively raise the stability of programming system overall operation, reliability, and effectively raise the system compatibility and expansion of program entirety.
Description
Technical field
The present invention relates to a kind of modeling of embedded software credible attribute and verification method, belong to engine production equipment and technology
Field.
Background technology
Currently in the development process for carrying out the systems such as all kinds of computer programs, automated control program, in order to improve journey
Sort run speed, data-handling efficiency, often be using as far as possible build a versatile main program frame, then based on
Embedded all kinds of need subprograms to be used in program, although this practice effectively meets to improve at program operation speed and data
The purpose of efficiency is managed, but is easily occurred between main program and subprogram, the compatibility, information between subprogram and subprogram are handed over
Mutual ability there are obstacle so that cause program run in failure rate raise, in order to overcome this problem, currently into line program
In global design exploitation, although the step of introducing Trusting eBusiness between each program, currently into credible between line program
In verification, it is only often to carry out unidirectional simple data verification to calculate, effective verification process is lacked to data validation process
Operated with follow-up reparation, thus cause in current programming system often in various degree there are system run all right it is poor,
System compatibility and expansion deficiency, so as to seriously affect programming system reliability of operation and stability, therefore are directed to this
One present situation, there is an urgent need to develop a kind of brand-new embedded program trust authentication method, to meet the needs of actual use.
The content of the invention
The object of the invention, which is that, overcomes above-mentioned deficiency, there is provided a kind of embedded software credible attribute modeling and verification method
And its preparation process.
To achieve the above object, the present invention is to be achieved through the following technical solutions:
A kind of embedded software credible attribute modeling and verification method, comprise the following steps:
The first step, builds embedded software subprogram, and according to main working program basic framework, according to using needs, establishment is extremely
A few subprogram for meeting respective independent operating needs, and parallel with one another between independent operating subprogram, while by each independence
Runtime subroutine service condition develops respective interrupt program respectively, is then embedded in by independent operating subprogram by interrupt routine
Into main working program basic framework;
Second step, establishes degree of belief and calculates function, after completing the first step, selected respectively from each independent operating subprogram respectively
Select out at least 3 groups and there is direct correlation property data group with data in main working program basic framework, so from the sub- journey of each independent operating
Sequence is selected respectively at least one set of to be embedded in other independent operating subprograms in main working program basic framework and sees directly with other
Relevance data group, then according to the data group selected, develops and runs function for the data group of credible need assessment, and
A data group of selection is subjected to credible evaluation calculating, obtains preliminary credible evaluation data value;
3rd step, credible preliminary association, the credible evaluation data value being calculated according to second step, on the one hand to each only
Vertical credible sequence between runtime subroutine and main working program basic framework, on the other hand to being embedded in main working program base
Credibility is ranked up between each independent operating subprogram within plinth frame, so that according to ranking results, to each independent operating
Priority of the program in main working program basic framework is ranked up assignment, to mutual data between each independent operating subprogram
Associated priority is ranked up assignment, so as to obtain the credible association of preliminary embedded software;
4th step, structure accesses degree of belief evaluation subprogram, after completing the 3rd step operation, first on main working program basis
Frame establish, for each independent operating subprogram by main working program basic framework into calls successfully with the frequency of failure record prison
Control subprogram, then in independent operating subprogram establish for call other independent operating subprograms into calls successfully and fail
The monitoring subroutine of number record;
5th step, simulation run, after completing the 4th step, according in actual software operating status, respectively to software systems
Open, close emulated, according to the 3rd step establish priority, to by main working program basic framework operate, successively
The priority that interrupt routine and priority operating status to independent operating subprogram emulated, is established according to the 3rd step is to embedding
The priority entered between each independent operating subprogram in main working program basic framework is emulated, and is deposited in emulation
The defects of, be returned directly in the first step, each independent operating subprogram be adjusted again;
6th step, credible dynamic evaluation amendment, after the emulation job of the 5th step is completed, software systems enter and formally make
With the stage, in formal service stage, user is directly run, so according to using needs under main working program basic framework basis
Main working program basic framework uses needs according to user afterwards, is independently transported triggering to be embedded under main working program basic framework
After the interrupt routine of row subprogram, corresponding independent operating subprogram activation independent operating subprogram related to realization is directly invoked
Data are mutually called between operation, and in independent operating subprogram activation invoked procedure, are directed to by what is established in the 4th step
Each independent operating subprogram by main working program basic framework into call successfully with the frequency of failure record monitoring subroutine, and
In independent operating subprogram establish for call other independent operating subprograms into calls successfully with the frequency of failure record monitoring
Subprogram, counts the called frequency of the sub- journey of each independent operating, then according to called frequency to each independent operating
The priority assignment of journey is modified, while calls the successfully frequency with malloc failure malloc in being called by the sub- journey of each independent operating,
The programming structure of each independent operating subprogram is adjusted and to for judging that the data group of independent operating subprogram credibility carries out
Correct, improve credible between each independent operating subprogram and main working program basic framework between each independent operating subprogram
Property.
Further, in the first step, during underway disconnected program composition, each independent operating subprogram is all provided with least
Two interrupt routines.
Further, in the second step, the used data group for credible need assessment runs letter
Number is:
Wherein:
K is that the data group of credible need assessment runs function entropy;
For data value in independent operating subprogram;
For line n m column data values in independent operating subprogram;
Further, the entropy of the data group operation function result of calculation of the credible need assessment is higher, then two
Confidence level between program is higher.
Further, there are direct correlation property data carrying out data to each independent operating subprogram in the second step
During group selection, Data duplication rate selected by each independent operating subprogram is less with 30%.
Further, in the 3rd step, when carrying out priority ranking, with by the credible need assessment of second step
The entropy of data group operation function result of calculation be criterion, the more high then priority of two of which program confidence level entropy
It is higher.
Further, in the 5th step, to defect present in emulation, it is returned directly in the first step, it is again right
When each independent operating subprogram is adjusted operation, each program Suitable content, must not account for the 50% of the total content of the program.
Further, in the 6th step, in actual operation, priority assignment is completed, and with new preferential grading
After line program sequence, the simulation run of the 5th step is no longer carried out.
Further, it is high to calling frequency in the 6th step, but independent operating of the malloc failure malloc rate more than 15%
Program, then return to the first step, which is modified.
The method of the present invention is simple, and operation and implementation are easy, and are provided simultaneously with data operation, modeling, emulation, monitoring and dynamic
The stability and by property comprehensively detect and correct that many aspects such as feedback modifiers run program, so that on the one hand effectively
The structure for simplifying main program, improve the main program speed of service and data-handling capacity, and effectively raise main program
Expansion capability, on the other hand effectively raise between main program and each subprogram, between each subprogram data interaction do it is reliable
Property and flexibility, so as to effectively raise the stability of programming system overall operation, reliability, and effectively raise program
Overall system compatibility and expansion.
Brief description of the drawings
Flow diagram when Fig. 1 is the method for the present invention zero deflection;
Fig. 2 flow diagrams there are deviation and when correcting for the method for the present invention;
Fig. 3 is invention software system structure diagram;
Fig. 4 is that the data group of credible need assessment runs functional operation logical relation schematic diagram.
Embodiment
As shown in Fig. 1-4, a kind of embedded software credible attribute modeling and verification method, comprise the following steps:
The first step, builds embedded software subprogram, and according to main working program basic framework, according to using needs, establishment is extremely
A few subprogram for meeting respective independent operating needs, and parallel with one another between independent operating subprogram, while by each independence
Runtime subroutine service condition develops respective interrupt program respectively, is then embedded in by independent operating subprogram by interrupt routine
Into main working program basic framework;
Second step, establishes degree of belief and calculates function, after completing the first step, selected respectively from each independent operating subprogram respectively
Select out at least 3 groups and there is direct correlation property data group with data in main working program basic framework, so from the sub- journey of each independent operating
Sequence is selected respectively at least one set of to be embedded in other independent operating subprograms in main working program basic framework and sees directly with other
Relevance data group, then according to the data group selected, develops and runs function for the data group of credible need assessment, and
A data group of selection is subjected to credible evaluation calculating, obtains preliminary credible evaluation data value;
3rd step, credible preliminary association, the credible evaluation data value being calculated according to second step, on the one hand to each only
Vertical credible sequence between runtime subroutine and main working program basic framework, on the other hand to being embedded in main working program base
Credibility is ranked up between each independent operating subprogram within plinth frame, so that according to ranking results, to each independent operating
Priority of the program in main working program basic framework is ranked up assignment, to mutual data between each independent operating subprogram
Associated priority is ranked up assignment, so as to obtain the credible association of preliminary embedded software;
4th step, structure accesses degree of belief evaluation subprogram, after completing the 3rd step operation, first on main working program basis
Frame establish, for each independent operating subprogram by main working program basic framework into calls successfully with the frequency of failure record prison
Control subprogram, then in independent operating subprogram establish for call other independent operating subprograms into calls successfully and fail
The monitoring subroutine of number record;
5th step, simulation run, after completing the 4th step, according in actual software operating status, respectively to software systems
Open, close emulated, according to the 3rd step establish priority, to by main working program basic framework operate, successively
The priority that interrupt routine and priority operating status to independent operating subprogram emulated, is established according to the 3rd step is to embedding
The priority entered between each independent operating subprogram in main working program basic framework is emulated, and is deposited in emulation
The defects of, be returned directly in the first step, each independent operating subprogram be adjusted again;
6th step, credible dynamic evaluation amendment, after the emulation job of the 5th step is completed, software systems enter and formally make
With the stage, in formal service stage, user is directly run, so according to using needs under main working program basic framework basis
Main working program basic framework uses needs according to user afterwards, is independently transported triggering to be embedded under main working program basic framework
After the interrupt routine of row subprogram, corresponding independent operating subprogram activation independent operating subprogram related to realization is directly invoked
Data are mutually called between operation, and in independent operating subprogram activation invoked procedure, are directed to by what is established in the 4th step
Each independent operating subprogram by main working program basic framework into call successfully with the frequency of failure record monitoring subroutine, and
In independent operating subprogram establish for call other independent operating subprograms into calls successfully with the frequency of failure record monitoring
Subprogram, counts the called frequency of the sub- journey of each independent operating, then according to called frequency to each independent operating
The priority assignment of journey is modified, while calls the successfully frequency with malloc failure malloc in being called by the sub- journey of each independent operating,
The programming structure of each independent operating subprogram is adjusted and to for judging that the data group of independent operating subprogram credibility carries out
Correct, improve credible between each independent operating subprogram and main working program basic framework between each independent operating subprogram
Property.
In the present embodiment, in the first step, during underway disconnected program composition, each independent operating subprogram be all provided with to
Few two interrupt routines.
In the present embodiment, in the second step, the used data group for credible need assessment is run
Function is:
Wherein:
K is that the data group of credible need assessment runs function entropy;
For data value in independent operating subprogram;
For line n m column data values in independent operating subprogram;
In the present embodiment, the entropy of the data group of credible need assessment operation function result of calculation is higher, then and two
Confidence level between a program is higher.
In the present embodiment, there is direct correlation property number in the second step carrying out data to each independent operating subprogram
During according to group selection, Data duplication rate selected by each independent operating subprogram is less with 30%.
In the present embodiment, in the 3rd step, when carrying out priority ranking, to be commented by the credible demand of second step
The entropy for the data group operation function result of calculation estimated is criterion, the more high then priority of two of which program confidence level entropy
Also it is higher.
In the present embodiment, in the 5th step, to defect present in emulation, it is returned directly in the first step, again
When being adjusted operation to each independent operating subprogram, each program Suitable content, must not account for the 50% of the total content of the program.
In the present embodiment, in the 6th step, in actual operation, priority assignment is completed, and with new priority
After sorting into line program, the simulation run of the 5th step is no longer carried out.
It is high to calling frequency in the 6th step in the present embodiment, but malloc failure malloc rate is more than 15% independent operating
Subprogram, then return to the first step, which is modified.
The method of the present invention is simple, and operation and implementation are easy, and are provided simultaneously with data operation, modeling, emulation, monitoring and dynamic
The stability and by property comprehensively detect and correct that many aspects such as feedback modifiers run program, so that on the one hand effectively
The structure for simplifying main program, improve the main program speed of service and data-handling capacity, and effectively raise main program
Expansion capability, on the other hand effectively raise between main program and each subprogram, between each subprogram data interaction do it is reliable
Property and flexibility, so as to effectively raise the stability of programming system overall operation, reliability, and effectively raise program
Overall system compatibility and expansion.
The basic principles, main features and the advantages of the invention have been shown and described above.The technology of the industry
Personnel are it should be appreciated that the present invention is not limited to the above embodiments, and the above embodiments and description only describe this
The principle of invention, without departing from the spirit and scope of the present invention, various changes and modifications of the present invention are possible, these changes
Change and improvement all fall within the protetion scope of the claimed invention.The claimed scope of the invention by appended claims and its
Equivalent thereof.
Claims (9)
1. a kind of embedded software credible attribute modeling and verification method, it is characterised in that:The embedded software is credible category
Property modeling comprise the following steps with verification method:
The first step, builds embedded software subprogram, according to main working program basic framework, according to needs are used, works out at least one
A subprogram for meeting respective independent operating needs, and parallel with one another between independent operating subprogram, while by each independent operating
Subprogram activation condition develops respective interrupt program respectively, is then embedded into master by interrupt routine by independent operating subprogram
In operation program basic framework;
Second step, establishes degree of belief and calculates function, after completing the first step, selected respectively from each independent operating subprogram respectively
At least 3 groups have direct correlation property data group with data in main working program basic framework, so from each independent operating subprogram point
Do not select and at least one set of be embedded in other independent operating subprograms in main working program basic framework with other and see direct correlation
Property data group, then according to the data group selected, develop and run function for the data group of credible need assessment, and will choosing
A data group selected carries out credible evaluation calculating, obtains preliminary credible evaluation data value;
3rd step, credible preliminary association, the credible evaluation data value being calculated according to second step, on the one hand to each independent fortune
Credible sequence between row subprogram and main working program basic framework, on the other hand to being embedded in main working program basis frame
Credibility is ranked up between each independent operating subprogram within frame, so that according to ranking results, to each independent operating subprogram
Priority in main working program basic framework is ranked up assignment, to mutual data correlation between each independent operating subprogram
Priority be ranked up assignment, so as to obtain the credible association of preliminary embedded software;
4th step, structure accesses degree of belief evaluation subprogram, after completing the 3rd step operation, first in main working program basic framework
Establish, it is successfully sub with the monitoring of frequency of failure record into calling by main working program basic framework for each independent operating subprogram
Program, is then established in independent operating subprogram for calling other independent operating subprograms into calling successfully and the frequency of failure
The monitoring subroutine of record;
5th step, simulation run, after completing the 4th step, according in actual software operating status, respectively the opening to software systems,
Close emulated, according to the 3rd step establish priority, to by main working program basic framework operate, successively to independence
The priority that the interrupt routine and priority operating status of runtime subroutine emulated, is established according to the 3rd step is to being embedded in master
The priority between each independent operating subprogram in operation program basic framework is emulated, and to being lacked present in emulation
Fall into, be returned directly in the first step, each independent operating subprogram is adjusted again;
6th step, credible dynamic evaluation amendment, after the emulation job of the 5th step is completed, software systems, which enter, formally uses rank
Section, in formal service stage, user is directly run, Ran Houzhu according to using needs under main working program basic framework basis
Operation program basic framework uses needs according to user, and independent operating under main working program basic framework is embedded in triggering
After the interrupt routine of program, corresponding independent operating subprogram activation independent operating subprogram activation related to realization is directly invoked
Between data mutually call, and in independent operating subprogram activation invoked procedure, by established in the 4th step for it is each solely
Vertical runtime subroutine by main working program basic framework into calling the monitoring subroutine that is successfully recorded with the frequency of failure, and in independence
On runtime subroutine establish for call other independent operating subprograms into calls successfully with the frequency of failure record the sub- journey of monitoring
Sequence, counts the called frequency of the sub- journey of each independent operating, then according to called frequency to the sub- journey of each independent operating
Priority assignment is modified, while calls the successfully frequency with malloc failure malloc in being called by the sub- journey of each independent operating, to each
The programming structure adjustment of independent operating subprogram and to for judging that the data group of independent operating subprogram credibility is modified,
Improve the credibility between each independent operating subprogram and main working program basic framework between each independent operating subprogram.
2. a kind of embedded software credible attribute modeling stated according to claim 1 and verification method, it is characterised in that:Described
In the first step, during underway disconnected program composition, each independent operating subprogram is all provided with least two interrupt routines.
3. a kind of embedded software credible attribute modeling stated according to claim 1 and verification method, it is characterised in that:Described
In second step, the used data group operation function for credible need assessment is:
Wherein:
K is that the data group of credible need assessment runs function entropy;
For data value in independent operating subprogram;
For line n m column data values in independent operating subprogram.
4. a kind of embedded software credible attribute modeling according to claim 3 and verification method, it is characterised in that:It is described
Credible need assessment data group operation function result of calculation entropy it is higher, then the confidence level between two programs is higher.
5. a kind of embedded software credible attribute modeling according to claim 1 and verification method, it is characterised in that:It is described
Second step, each independent operating subprogram is carried out data exist be directly linked property data group selection when, each independent operating
Data duplication rate selected by program is less with 30%.
6. a kind of embedded software credible attribute modeling according to claim 1 and verification method, it is characterised in that:It is described
The 3rd step in, when carrying out priority ranking, with by second step credible need assessment data group operation function calculate
As a result entropy is criterion, and the more high then priority of two of which program confidence level entropy is also higher.
7. a kind of embedded software credible attribute modeling according to claim 1 and verification method, it is characterised in that:It is described
The 5th step in, to defect present in emulation, be returned directly in the first step, each independent operating subprogram adjusted again
During whole operation, each program Suitable content, must not account for the 50% of the total content of the program.
8. a kind of embedded software credible attribute modeling according to claim 1 and verification method, it is characterised in that:It is described
The 6th step in, in actual operation, complete priority assignment, and with new priority into line program sort after, no longer carry out
The simulation run of 5th step.
9. a kind of embedded software credible attribute modeling according to claim 1 and verification method, it is characterised in that:It is described
The 6th step in, to calling frequency high, but malloc failure malloc rate is more than 15% independent operating subprogram, then returns to the first step, right
The independent operating subprogram is modified.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711122419.4A CN107908557B (en) | 2017-11-14 | 2017-11-14 | Embedded software credible attribute modeling and verifying method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711122419.4A CN107908557B (en) | 2017-11-14 | 2017-11-14 | Embedded software credible attribute modeling and verifying method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107908557A true CN107908557A (en) | 2018-04-13 |
CN107908557B CN107908557B (en) | 2020-10-20 |
Family
ID=61844010
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711122419.4A Active CN107908557B (en) | 2017-11-14 | 2017-11-14 | Embedded software credible attribute modeling and verifying method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107908557B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110032358A (en) * | 2019-01-03 | 2019-07-19 | 阿里巴巴集团控股有限公司 | A kind of application program generation method, device, equipment and system |
CN112506767A (en) * | 2020-12-03 | 2021-03-16 | 清华大学 | Program verification method and device based on reinforcement learning |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5490249A (en) * | 1992-12-23 | 1996-02-06 | Taligent, Inc. | Automated testing system |
US20060129892A1 (en) * | 2004-11-30 | 2006-06-15 | Microsoft Corporation | Scenario based stress testing |
CN101311898A (en) * | 2008-07-02 | 2008-11-26 | 北京大学 | Software element reliability evaluation method and system |
US20150309920A1 (en) * | 2014-04-29 | 2015-10-29 | Hitachi, Ltd. | Method and system for testing control software of a controlled system |
KR101664150B1 (en) * | 2016-06-13 | 2016-10-10 | (주) 피에스소프트 | Terminal software verification system and verification method |
CN106874200A (en) * | 2017-02-14 | 2017-06-20 | 南京航空航天大学 | Embedded software reliability modeling and appraisal procedure based on AADL |
CN107038111A (en) * | 2016-02-04 | 2017-08-11 | 华东师范大学 | A kind of software credibility quantitative evaluation and design method |
-
2017
- 2017-11-14 CN CN201711122419.4A patent/CN107908557B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5490249A (en) * | 1992-12-23 | 1996-02-06 | Taligent, Inc. | Automated testing system |
US20060129892A1 (en) * | 2004-11-30 | 2006-06-15 | Microsoft Corporation | Scenario based stress testing |
CN101311898A (en) * | 2008-07-02 | 2008-11-26 | 北京大学 | Software element reliability evaluation method and system |
US20150309920A1 (en) * | 2014-04-29 | 2015-10-29 | Hitachi, Ltd. | Method and system for testing control software of a controlled system |
CN107038111A (en) * | 2016-02-04 | 2017-08-11 | 华东师范大学 | A kind of software credibility quantitative evaluation and design method |
KR101664150B1 (en) * | 2016-06-13 | 2016-10-10 | (주) 피에스소프트 | Terminal software verification system and verification method |
CN106874200A (en) * | 2017-02-14 | 2017-06-20 | 南京航空航天大学 | Embedded software reliability modeling and appraisal procedure based on AADL |
Non-Patent Citations (2)
Title |
---|
康培亮: "软件可信性评估模型的研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
邵瑛: "基于Web的远程实时监测框架", 《计算机应用 信息科技》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110032358A (en) * | 2019-01-03 | 2019-07-19 | 阿里巴巴集团控股有限公司 | A kind of application program generation method, device, equipment and system |
CN112506767A (en) * | 2020-12-03 | 2021-03-16 | 清华大学 | Program verification method and device based on reinforcement learning |
CN112506767B (en) * | 2020-12-03 | 2022-07-05 | 清华大学 | Program verification method and device based on reinforcement learning |
Also Published As
Publication number | Publication date |
---|---|
CN107908557B (en) | 2020-10-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103870659B (en) | A kind of fault of numerical control machine tool analyzes method | |
CN109840157A (en) | Method, apparatus, electronic equipment and the storage medium of fault diagnosis | |
CN109150619B (en) | Fault diagnosis method and system based on network flow data | |
CN107632590B (en) | A kind of bottom event sort method priority-based | |
CN110645153B (en) | Wind generating set fault diagnosis method and device and electronic equipment | |
CN104021248B (en) | A kind of airborne machinery product FMECA analysis methods | |
CN106371422A (en) | Method for predicting key infrastructure fault propagation | |
CN107133176A (en) | A kind of spanned item mesh failure prediction method based on semi-supervised clustering data screening | |
CN107908557A (en) | A kind of embedded software credible attribute modeling and verification method | |
WO2019047070A1 (en) | Database maintenance method and system | |
CN103488562A (en) | Automated testing method and device | |
CN109714201A (en) | Network System Reliability appraisal procedure, device, computer equipment and storage medium | |
CN108197254B (en) | A kind of data recovery method based on neighbour | |
CN107203839A (en) | A kind of appraisal procedure of parts and components of diesel engine failure risk grade | |
CN114167217B (en) | Multiple fault diagnosis method for railway distribution network | |
CN115114064A (en) | Micro-service fault analysis method, system, equipment and storage medium | |
CN107102909A (en) | A kind of Fault Classification towards complex software intensive equipment system | |
CN117909864A (en) | Power failure prediction system and method | |
CN104765648A (en) | Problem node detection method and device based on real-time computing system | |
CN105911965A (en) | Method for realizing data analysis in data monitoring system | |
CN110672951B (en) | Method and device for identifying voltage fragile region of power distribution network | |
CN106875015B (en) | A kind of airplane fault diagnostic method and system | |
CN109784629B (en) | Transformer substation industrial control network fault positioning method based on neural network | |
Gupta et al. | Development of a framework for reliability centered maintenance | |
CN113032260A (en) | Fault injection simulation test method and system based on componentized distributed system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |