Editorial Intelligent Modeling and Verification...

3
Editorial Intelligent Modeling and Verification 2014 Guiming Luo, 1 Xiaoyu Song, 2 Xiaojing Yang, 3 and Krishnaiyan Thulasiraman 4 1 School of Soſtware, Tsinghua University, Beijing 100084, China 2 Maseeh College of Electrical and Computer Engineering, Portland State University, P.O. Box 751, Portland, OR 97207, USA 3 Department of Mathematical Sciences, Tsinghua University, Beijing 100084, China 4 School of Computer Science, University of Oklahoma, 200 Felgar Street, Room 114, Norman, OK 73019, USA Correspondence should be addressed to Guiming Luo; [email protected] Received 24 September 2014; Accepted 24 September 2014; Published 22 December 2014 Copyright © 2014 Guiming Luo et al. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Aſter the success of the previous special issue Intelligent Modeling and Verification, which was published last year, we are pleased to announce that the new special issue Intelligent Modeling and Verification 2014 is finally here. rough an extensive peer-review process, 32 papers were selected for publication in the new special issue. A total of 16 papers describe optimal system mod- eling. ey focus on system modeling, optimal filtering and scheduling, image modeling, pattern recognition, and network modeling. Based on the total variation model, the paper entitled Total variation based perceptual image quality assessment modeling ” by Y. Wu et al. proposes a new way to assess perceptual image quality in spatial domains. A cluster for use in the film industry is constructed in the paper entitled Precomputed clustering for movie recommendation system in real time” (B. Li et al.) by implementing a distance matrix based on machine learning techniques. e paper entitled Unified mathematical framework for slicing and symmetry reduction over event structures” by X. Gao et al. introduces sliced and symmetric quotient reduction models of event structures and presents some corresponding algorithms. Based on the consideration of sharing and real number matrix encoding, the correlation models of virtual resources and the genetic algorithm are presented in “Multitask oriented virtual resource integration and optimal scheduling in cloud manufacturing ” (Z. Cheng et al.). e paper entitled “Optimal spatial matrix filter design for array signal preprocessing by H. Zhang et al. illustrates a technique for designing a spatial matrix filter based on convex programming. In the paper entitled “Constitutive relation of engineering material based on SIR model and HAM” by H. He et al., a dynamic stress-strain model is established according to the homotopy analysis method, and an analytical solution is presented. e paper entitled “e application of pattern recognition in electrofacies analysis” by H. Li et al. introduces the KMRIC algorithm and AKM algorithm. Combining the multigran- ulations rough set with evidence theory, M. Yan constructs the multigranulations method of the belief and plausibility reductions in the paper entitled “Multigranulations rough set method of attribute reduction in information systems based on evidence theory.” Complicated data modeling and adaptive filtering are the main areas of focus for the papers A new subband adaptive filtering algorithm for sparse sys- tem identification with impulsive noise” (Y.-S. Choi ), “A nonlinear multiparameters temperature error modeling and compensation of POS applied in airborne remote sensing system” (J. Li et al.), and “Robustness analysis of floating- point programs by self-composition” (L. Chen et al.). In order to avoid routing livelock and guarantee multiple terminals’ satisfaction, network modeling and scheduling are investi- gated in “Adaptive fault-tolerant routing in 2D mesh with cracky rectangular model” (Y. Yang et al.), “A bio-inspired QoS- oriented handover model in heterogeneous wireless networks(D. Tian et al.), and “An efficient multitask scheduling model for wireless sensor networks” (H. Yin et al.). Aſter analyzing the frequencies of CVSS metrics, a vulnerability rating approach is proposed in the paper entitled “A soſtware vulnerability rating approach based on the vulnerability database” (J. Luo et al.). Based on the comprehensive dictionary of Chinese words, “Reconstruction of uncertain historical evolution of the polysyllablization of Chinese lexis” (B. Qiu and J. Li) presents a new mapping approach from words to their occurrence times. Hindawi Publishing Corporation Journal of Applied Mathematics Volume 2014, Article ID 632027, 2 pages http://dx.doi.org/10.1155/2014/632027

Transcript of Editorial Intelligent Modeling and Verification...

Page 1: Editorial Intelligent Modeling and Verification 2014downloads.hindawi.com/journals/jam/2014/632027.pdfanalysis method, and an analytical solution is presented. e paper entitled e application

EditorialIntelligent Modeling and Verification 2014

Guiming Luo,1 Xiaoyu Song,2 Xiaojing Yang,3 and Krishnaiyan Thulasiraman4

1School of Software, Tsinghua University, Beijing 100084, China2Maseeh College of Electrical and Computer Engineering, Portland State University, P.O. Box 751, Portland, OR 97207, USA3Department of Mathematical Sciences, Tsinghua University, Beijing 100084, China4School of Computer Science, University of Oklahoma, 200 Felgar Street, Room 114, Norman, OK 73019, USA

Correspondence should be addressed to Guiming Luo; [email protected]

Received 24 September 2014; Accepted 24 September 2014; Published 22 December 2014

Copyright © 2014 Guiming Luo et al. This is an open access article distributed under the Creative Commons Attribution License,which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

After the success of the previous special issue IntelligentModeling and Verification, which was published last year, weare pleased to announce that the new special issue IntelligentModeling and Verification 2014 is finally here. Through anextensive peer-review process, 32 papers were selected forpublication in the new special issue.

A total of 16 papers describe optimal system mod-eling. They focus on system modeling, optimal filteringand scheduling, image modeling, pattern recognition, andnetwork modeling.

Based on the total variation model, the paper entitled“Total variation based perceptual image quality assessmentmodeling” by Y. Wu et al. proposes a new way to assessperceptual image quality in spatial domains. A cluster foruse in the film industry is constructed in the paper entitled“Precomputed clustering for movie recommendation system inreal time” (B. Li et al.) by implementing a distance matrixbased on machine learning techniques. The paper entitled“Unified mathematical framework for slicing and symmetryreduction over event structures” by X. Gao et al. introducessliced and symmetric quotient reduction models of eventstructures and presents some corresponding algorithms.Based on the consideration of sharing and real numbermatrix encoding, the correlation models of virtual resourcesand the genetic algorithmare presented in “Multitask orientedvirtual resource integration and optimal scheduling in cloudmanufacturing” (Z. Cheng et al.).The paper entitled “Optimalspatial matrix filter design for array signal preprocessing”by H. Zhang et al. illustrates a technique for designing aspatial matrix filter based on convex programming. In thepaper entitled “Constitutive relation of engineering materialbased on SIR model and HAM” by H. He et al., a dynamic

stress-strain model is established according to the homotopyanalysis method, and an analytical solution is presented.The paper entitled “The application of pattern recognition inelectrofacies analysis” by H. Li et al. introduces the KMRICalgorithm and AKM algorithm. Combining the multigran-ulations rough set with evidence theory, M. Yan constructsthe multigranulations method of the belief and plausibilityreductions in the paper entitled “Multigranulations roughset method of attribute reduction in information systemsbased on evidence theory.” Complicated data modeling andadaptive filtering are the main areas of focus for the papers“A new subband adaptive filtering algorithm for sparse sys-tem identification with impulsive noise” (Y.-S. Choi ), “Anonlinear multiparameters temperature error modeling andcompensation of POS applied in airborne remote sensingsystem” (J. Li et al.), and “Robustness analysis of floating-point programs by self-composition” (L. Chen et al.). In orderto avoid routing livelock and guarantee multiple terminals’satisfaction, network modeling and scheduling are investi-gated in “Adaptive fault-tolerant routing in 2D mesh withcracky rectangularmodel” (Y. Yang et al.), “Abio-inspiredQoS-oriented handover model in heterogeneous wireless networks”(D. Tian et al.), and “An efficient multitask scheduling modelforwireless sensor networks” (H. Yin et al.). After analyzing thefrequencies of CVSS metrics, a vulnerability rating approachis proposed in the paper entitled “A software vulnerabilityrating approach based on the vulnerability database” (J. Luoet al.). Based on the comprehensive dictionary of Chinesewords, “Reconstruction of uncertain historical evolution of thepolysyllablization of Chinese lexis” (B. Qiu and J. Li) presentsa new mapping approach from words to their occurrencetimes.

Hindawi Publishing CorporationJournal of Applied MathematicsVolume 2014, Article ID 632027, 2 pageshttp://dx.doi.org/10.1155/2014/632027

Page 2: Editorial Intelligent Modeling and Verification 2014downloads.hindawi.com/journals/jam/2014/632027.pdfanalysis method, and an analytical solution is presented. e paper entitled e application

2 Journal of Applied Mathematics

The remaining 16 papers focus on the fields of formalmodeling, checking, and verification.

A hybrid I/O automata model for an automated guidedvehicle system is introduced in the paper entitled “A casestudy on formal analysis of an automated guided vehiclesystem” (J. Zhang et al.). The hybrid automaton and Taylorapproximation are studied in the paper entitled “Approximateequivalence of the hybrid automata with Taylor theory” (A.He et al.). Based on middle-model methodology, “Semanticconsistency checking in building ontology from heterogeneoussources” (S. Yang et al.) proposes a model checkingmethod tohandle semantic consistency. Using theHOL theorem prover,the higher-order logic formalization of the function vectorand the function matrix theories are proposed in the paperentitled “Formalization of function matrix theory in HOL”(Z. Shi et al.). Combining the extended modeling languageCSP# and linear temporal logic LTL, “Formal analysis offairness for optimistic multiparty contract signing protocol”(by X. Li et al.) verifies the fairness of OMPCS protocols.Embedded systemmodeling and verification using Petri Netsare explored in the following papers: “Modeling, design, andimplementation of a cloud workflow engine based on Aneka”(J. Zhou et al.), “Test purpose oriented I/O conformance testselection with colored Petri Nets” (J. Liu et al.), and “Modelinga heterogeneous embedded system in coloured petri Nets”(H. Zhang et al.). Based on the strand space model, “For-mal modeling and analysis of fairness characterization of E-commerce protocols” (C. Zhang et al.) proposes a verificationmethod for fairness performance. An approach exploitingthe power of polynomial ring algebra is introduced in thepaper entitled “Groebner bases based verification solutionfor SystemVerilog concurrent assertions” (N. Zhou et al.)to perform SystemVerilog assertion verification over digitalcircuit systems. The paper entitled “Functional verificationof high performance adders in Coq” (Q. Wang et al.) pro-poses a systematic method to formalize and verify addersin formal proof assistant Coq. A technique for reducingthe LTL formula is proposed in “Counterexample-preservingreduction for symbolic model checking” (W. Liu et al.). In thepaper “Compositional abstraction refinement for component-based systems” (L. Zhang et al.), the invariant strengtheningand state partitioning techniques help to strengthen theabstraction and find counterexamples. The paper entitled“Terminal satisfiability in GSTE” (Y. Xu et al.) gives a six-tuple definition and presents a new algorithm for modelchecking terminal satisfiability. The paper entitled “Towardslight-weight probabilistic model checking” (S. Konur) presentsa methodology to facilitate probabilistic model checking fornonexperts. A machine closed theorem proof of TLA+ in thetheorem proving system Coq is presented in “Formal proof ofa machine closed theorem in Coq” (H. Wan et al.).

Acknowledgments

We sincerely thank the researchers who contributed to thisspecial issue for their inspiring work, as well as the anony-mous reviewers for their diligent assistance. In addition, wewould like to express our appreciation for the editorial board

members of this journal, who provided valuable help andsupport throughout the preparation of this special issue.

Guiming LuoXiaoyu Song

Xiaojing YangKrishnaiyan Thulasiraman

Page 3: Editorial Intelligent Modeling and Verification 2014downloads.hindawi.com/journals/jam/2014/632027.pdfanalysis method, and an analytical solution is presented. e paper entitled e application

Submit your manuscripts athttp://www.hindawi.com

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

MathematicsJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Mathematical Problems in Engineering

Hindawi Publishing Corporationhttp://www.hindawi.com

Differential EquationsInternational Journal of

Volume 2014

Applied MathematicsJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Probability and StatisticsHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Mathematical PhysicsAdvances in

Complex AnalysisJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

OptimizationJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

CombinatoricsHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

International Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Operations ResearchAdvances in

Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Function Spaces

Abstract and Applied AnalysisHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

International Journal of Mathematics and Mathematical Sciences

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

The Scientific World JournalHindawi Publishing Corporation http://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Algebra

Discrete Dynamics in Nature and Society

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Decision SciencesAdvances in

Discrete MathematicsJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com

Volume 2014 Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Stochastic AnalysisInternational Journal of