https://www.mdu.se/

mdh.sePublikasjoner
Endre søk
Link to record
Permanent link

Direct link
Alternativa namn
Publikasjoner (10 av 127) Visa alla publikasjoner
Ali, N., Lundqvist, K. & Hänninen, K. (2024). Mitigation Ontology For Analysis of Safety-Critical Systems. In: Kolowrocki, Magryta-Mut (Ed.), Advances in Reliability, Safety Advances in Reliability, Safety and Security, Part 2: . Paper presented at The 34th European Safety and Reliability Conference, 2024.
Åpne denne publikasjonen i ny fane eller vindu >>Mitigation Ontology For Analysis of Safety-Critical Systems
2024 (engelsk)Inngår i: Advances in Reliability, Safety Advances in Reliability, Safety and Security, Part 2 / [ed] Kolowrocki, Magryta-Mut, 2024Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

This study introduces a Mitigation Ontology (MO) designed for the analysis of safety-critical systems. Recognizing the paramount importance of systematically addressing potential risks and hazards in complex systems, the proposed ontology serves as a structured framework for comprehensively modeling and analyzing mitigation strategies. Leveraging ontological principles, the framework enables a precise representation of safety-critical information, emphasizing the relationships and dependencies among various mitigation elements. To encapsulate the essence of safety-critical systems and support understanding of the mechanisms of situations, events, and associated hazards, we propose a hazard and mitigation domain ontology, i.e., the MO to provide a combined ontological interpretation of hazard and mitigation strategies. The MO facilitates a more thorough and standardized analysis of safety measures, contributing to enhanced understanding, communication, and implementation of mitigation strategies in software and hardware levels of safety-critical systems. The MO is grounded on Unified Foundational Ontology (UFO) and based on widely accepted standards, and scientific guides. We demonstrate our proposed ontology in the autonomous vehicle domain to check how it can help to analyze the safety of real-world safety-critical systems. Through the ontology instantiation process for a case study from the autonomous vehicle domain, we have verified that safety-critical related hazards, causes and consequences, and other entities contributing to hazards were well identified. we have seen that the MO offers a shared vocabulary that facilitates communication among diverse communities, preventing misunderstandings among engineers and stakeholders involved in safety-critical systems. Additionally, the conceptual model serves as a reference point for developers of safety-critical systems, enabling them to systematically extract and analyze safety requirements specifications and provide safety mechanisms.

HSV kategori
Identifikatorer
urn:nbn:se:mdh:diva-69313 (URN)978-83-68136-14-2 (ISBN)978-83-68136-01-2 (ISBN)
Konferanse
The 34th European Safety and Reliability Conference, 2024
Tilgjengelig fra: 2024-12-06 Laget: 2024-12-06 Sist oppdatert: 2024-12-06bibliografisk kontrollert
Gu, R., Baranov, E., Ameri, A., Enoiu, E. P., Curuklu, B., Seceleanu, C., . . . Lundqvist, K. (2024). Synthesis and Verification of Mission Plans for Multiple Autonomous Agents under Complex Road Conditions. ACM Transactions on Software Engineering and Methodology, 33(7), 1-46, Article ID 173.
Åpne denne publikasjonen i ny fane eller vindu >>Synthesis and Verification of Mission Plans for Multiple Autonomous Agents under Complex Road Conditions
Vise andre…
2024 (engelsk)Inngår i: ACM Transactions on Software Engineering and Methodology, ISSN 1049-331X, Vol. 33, nr 7, s. 1-46, artikkel-id 173Artikkel i tidsskrift (Annet vitenskapelig) Published
Abstract [en]

Mission planning for multi-agent autonomous systems aims to generate feasible and optimal mission plans that satisfy the given requirements. In this article, we propose a mission-planning methodology that combines (i) a path-planning algorithm for synthesizing path plans that are safe in environments with complex road conditions, and (ii) a task-scheduling method for synthesizing task plans that schedule the tasks in the right and fastest order, taking into account the planned paths. The task-scheduling method is based on model checking, which provides means of automatically generating task execution orders that satisfy the requirements and ensure the correctness and efficiency of the plans by construction. We implement our approach in a tool named MALTA, which offers a user-friendly GUI for configuring mission requirements,  a module for path planning, an integration with the model checker UPPAAL, and functions for automatic generation of formal models, and parsing of the execution traces of models. Experiments with the tool demonstrate its applicability and performance in various configurations of an industrial case study of an autonomous quarry. We also show the adaptability of our tool by employing it on a special case of the industrial case study.

HSV kategori
Identifikatorer
urn:nbn:se:mdh:diva-58047 (URN)10.1145/3672445 (DOI)2-s2.0-85202215443 (Scopus ID)
Tilgjengelig fra: 2022-04-20 Laget: 2022-04-20 Sist oppdatert: 2024-12-09bibliografisk kontrollert
Adach, M., Ali, N., Hänninen, K. & Lundqvist, K. (2023). Hazard Analysis on a System of Systems using the Hazard Ontology. In: 2023 18th Annual System of Systems Engineering Conference, SoSe 2023: . Paper presented at 18th Annual System of Systems Engineering Conference, SoSe 2023, Lille 14 June 2023 through 16 June 2023. Institute of Electrical and Electronics Engineers Inc.
Åpne denne publikasjonen i ny fane eller vindu >>Hazard Analysis on a System of Systems using the Hazard Ontology
2023 (engelsk)Inngår i: 2023 18th Annual System of Systems Engineering Conference, SoSe 2023, Institute of Electrical and Electronics Engineers Inc. , 2023Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Today, well-established hazard analysis techniques are available and widely used to identify hazards for single systems in various industries. However, hazard analysis techniques for a System of Systems (SoS) are not properly investigated. SoS is a complex system where multiple systems work together to achieve a common goal. However, the interaction between systems may lead to unforeseen interactions and interdependencies between systems. This increases the difficulty of identifying and assessing system failures and potential safety hazards. In this paper, we explore whether Hazard Ontology (HO) can be applied to an SoS and whether it can identify emergent hazards, their causes, sources, and consequences. To conduct our exploration, we apply the HO to a quarry automation site (an SoS) from the construction equipment domain. The results indicate that the HO is a promising technique that facilitates the identification of emergent hazards and their components. 

sted, utgiver, år, opplag, sider
Institute of Electrical and Electronics Engineers Inc., 2023
Emneord
a system of systems, hazard analysis, Hazard Ontology, hazards, safety, Construction equipment, System of systems, A system of system, Analysis techniques, Hazards analysis, Multiple systems, Ontology's, Potential safety hazards, System failures, System-of-systems, Ontology
HSV kategori
Identifikatorer
urn:nbn:se:mdh:diva-63956 (URN)10.1109/SoSE59841.2023.10178442 (DOI)2-s2.0-85166734605 (Scopus ID)9798350327236 (ISBN)
Konferanse
18th Annual System of Systems Engineering Conference, SoSe 2023, Lille 14 June 2023 through 16 June 2023
Tilgjengelig fra: 2023-08-16 Laget: 2023-08-16 Sist oppdatert: 2023-09-15bibliografisk kontrollert
Adach, M., Hänninen, K. & Lundqvist, K. (2022). A Combined Security Ontology based on the Unified Foundational Ontology. In: Proceedings - 16th IEEE International Conference on Semantic Computing, ICSC 2022: . Paper presented at 16th IEEE International Conference on Semantic Computing, ICSC 2022, 26 January 2022 through 28 January 2022 (pp. 187-194). Institute of Electrical and Electronics Engineers Inc.
Åpne denne publikasjonen i ny fane eller vindu >>A Combined Security Ontology based on the Unified Foundational Ontology
2022 (engelsk)Inngår i: Proceedings - 16th IEEE International Conference on Semantic Computing, ICSC 2022, Institute of Electrical and Electronics Engineers Inc. , 2022, s. 187-194Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

While ontology comparison and alignment have been extensively researched in the last decade, there are still some challenges to these disciplines, such as incomplete ontologies, those that cover only a portion of a domain, and differences in domain modeling due to varying viewpoints. Although the literature has compared ontological concepts from the same domain, comparisons of concepts from different domains (e.g., security and safety) remain unexplored. To compare the concepts of security and safety domains, a security ontology must first be created to bridge the gap between these domains. Therefore, this paper presents a Combined Security Ontology (CSO) based on the Unified Foundational Ontology (UFO) that could be compared to or aligned with other ontologies. This CSO includes the core ontological concepts and their respective relationships that had been extracted through a previous systematic literature review. The CSO concepts and their relationships were mapped to the UFO to get a common terminology that facilitates to bridge the gap between the security and safety domains. Since the proposed CSO is based on the UFO, it could be compared to or aligned with other ontologies from different domains.

sted, utgiver, år, opplag, sider
Institute of Electrical and Electronics Engineers Inc., 2022
Emneord
security concepts, security ontology, security relationships, UFO ontology, Different domains, Domain model, Foundational ontologies, Ontology's, Ontology-based, Security concept, Security ontologies, Security relationship, Systematic literature review, Unified foundational ontology ontology, Ontology
HSV kategori
Identifikatorer
urn:nbn:se:mdh:diva-58058 (URN)10.1109/ICSC52841.2022.00039 (DOI)000835706300031 ()2-s2.0-85127609492 (Scopus ID)9781665434188 (ISBN)
Konferanse
16th IEEE International Conference on Semantic Computing, ICSC 2022, 26 January 2022 through 28 January 2022
Tilgjengelig fra: 2022-04-20 Laget: 2022-04-20 Sist oppdatert: 2023-08-16bibliografisk kontrollert
Bergler, M., Kolagari, R. T. & Lundqvist, K. (2022). Case Study on the Use of the SafeML Approach in Training Autonomous Driving Vehicles. In: Lect. Notes Comput. Sci.: . Paper presented at 21st International Conference on Image Analysis and Processing, ICIAP 2022 (pp. 87-97). Springer Science and Business Media Deutschland GmbH
Åpne denne publikasjonen i ny fane eller vindu >>Case Study on the Use of the SafeML Approach in Training Autonomous Driving Vehicles
2022 (engelsk)Inngår i: Lect. Notes Comput. Sci., Springer Science and Business Media Deutschland GmbH , 2022, s. 87-97Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

The development quality for the control software for autonomous vehicles is rapidly progressing, so that the control units in the field generally perform very reliably. Nevertheless, fatal misjudgments occasionally occur putting people at risk: such as the recent accident in which a Tesla vehicle in Autopilot mode rammed a police vehicle. Since the object recognition software which is a part of the control software is based on machine learning (ML) algorithms at its core, one can distinguish a training phase from a deployment phase of the software. In this paper we investigate to what extent the deployment phase has an impact on the robustness and reliability of the software; because just as traditional, software based on ML degrades with time. A widely known effect is the so-called concept drift: in this case, one finds that the deployment conditions in the field have changed and the software, based on the outdated training data, no longer responds adequately to the current field situation. In a previous research paper, we developed the SafeML approach with colleagues from the University of Hull, where datasets are compared for their statistical distance measures. In doing so, we detected that for simple, benchmark data, the statistical distance correlates with the classification accuracy in the field. The contribution of this paper is to analyze the applicability of the SafeML approach to complex, multidimensional data used in autonomous driving. In our analysis, we found that the SafeML approach can be used for this data as well. In practice, this would mean that a vehicle could constantly check itself and detect concept drift situation early. © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.

sted, utgiver, år, opplag, sider
Springer Science and Business Media Deutschland GmbH, 2022
Serie
Lecture Notes in Computer Science, ISSN 0302-9743 ; 13233 LNCS
Emneord
Automotive, Autonomous driving, Machine learning, SafeML, Safety
HSV kategori
Identifikatorer
urn:nbn:se:mdh:diva-58657 (URN)10.1007/978-3-031-06433-3_8 (DOI)000870308100008 ()2-s2.0-85131150606 (Scopus ID)9783031064326 (ISBN)
Konferanse
21st International Conference on Image Analysis and Processing, ICIAP 2022
Tilgjengelig fra: 2022-06-08 Laget: 2022-06-08 Sist oppdatert: 2022-11-09bibliografisk kontrollert
Adach, M., Hänninen, K. & Lundqvist, K. (2022). Concepts and Relationships in Safety and Security Ontologies: A Comparative Study. In: 2022 6th International Conference on System Reliability and Safety, ICSRS 2022: . Paper presented at 6th International Conference on System Reliability and Safety, ICSRS 2022, Venice, 23 November 2022 through 25 November 2022 (pp. 357-364). Institute of Electrical and Electronics Engineers Inc.
Åpne denne publikasjonen i ny fane eller vindu >>Concepts and Relationships in Safety and Security Ontologies: A Comparative Study
2022 (engelsk)Inngår i: 2022 6th International Conference on System Reliability and Safety, ICSRS 2022, Institute of Electrical and Electronics Engineers Inc. , 2022, s. 357-364Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Safety and security ontologies quickly become essential support for integrating heterogeneous knowledge from various sources. Today, there is little standardization of ontologies and almost no discussion of how to compare concepts and their relationships, establish a general approach to create relationships or model them in general. However, concepts with similar names are not semantically similar or compatible in some cases. In this case, the problem of correspondence arises among the concepts and relationships found in the ontologies. To solve this problem, a comparison between the Hazard Ontology (HO) and the Combined Security Ontology (CSO) is proposed, in which the value of equivalence between their concepts and their relationships was extracted and analyzed. Although the HO covers the concepts related to the safety domain and the CSO includes securityrelated concepts, both are based on the Unified Foundational Ontology (UFO). For this study, HO and CSO were compared, and the results were summarized in the form of comparison tables. Our main contribution involves the comparisons among the concepts in HO and CSO to identify equivalences and differences between the two. Due to the increasing number of ontologies, their mapping, merging, and alignment are primary challenges in bridging the gaps that exist between the safety and security domains. 

sted, utgiver, år, opplag, sider
Institute of Electrical and Electronics Engineers Inc., 2022
Emneord
Combined Security Ontology, comparison, concepts, Hazard Ontology, relationships, safety, security, Hazards, Comparatives studies, Concept, Ontology's, Relationship, Safety and securities, Security ontologies, Ontology
HSV kategori
Identifikatorer
urn:nbn:se:mdh:diva-62283 (URN)10.1109/ICSRS56243.2022.10067740 (DOI)000981836500052 ()2-s2.0-85151690593 (Scopus ID)9781665470926 (ISBN)
Konferanse
6th International Conference on System Reliability and Safety, ICSRS 2022, Venice, 23 November 2022 through 25 November 2022
Tilgjengelig fra: 2023-04-19 Laget: 2023-04-19 Sist oppdatert: 2023-08-16bibliografisk kontrollert
Gu, R., Jensen, P. G., Seceleanu, C., Enoiu, E. P. & Lundqvist, K. (2022). Correctness-Guaranteed Strategy Synthesis and Compression for Multi-Agent Autonomous Systems. Science of Computer Programming, Article ID 102894.
Åpne denne publikasjonen i ny fane eller vindu >>Correctness-Guaranteed Strategy Synthesis and Compression for Multi-Agent Autonomous Systems
Vise andre…
2022 (engelsk)Inngår i: Science of Computer Programming, ISSN 0167-6423, E-ISSN 1872-7964, artikkel-id 102894Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Planning is a critical function of multi-agent autonomous systems, which includes path finding and task scheduling. Exhaustive search-based methods such as model checking and algorithmic game theory can solve simple instances of multi-agent planning. However, these methods suffer from the state-space explosion when the number of agents is large. Learning-based methods can alleviate this problem but lack a guarantee of the correctness of the results. In this paper, we introduce MoCReL, a new version of our previously proposed method that combines model checking with reinforcement learning in solving the planning problem. The approach takes advantage of reinforcement learning to synthesize path plans and task schedules for large numbers of autonomous agents, and of model checking to verify the correctness of the synthesized strategies. Further, MoCReL can compress large strategies into smaller ones that have down to 0.05% of the original sizes, while preserving their correctness, which we show in this paper. MoCReL is integrated into a new version of UPPAAL Stratego that supports calling external libraries when running learning and verification of timed games models. 

HSV kategori
Identifikatorer
urn:nbn:se:mdh:diva-58045 (URN)10.1016/j.scico.2022.102894 (DOI)000878770800001 ()2-s2.0-85141847506 (Scopus ID)
Tilgjengelig fra: 2022-04-19 Laget: 2022-04-19 Sist oppdatert: 2023-04-12bibliografisk kontrollert
Adach, M., Hänninen, K. & Lundqvist, K. (2022). Security Ontologies: A Systematic Literature Review. In: Lecture Notes In Computer Science: 26th International Conference on Enterprise Design, Operations, and Computing, EDOC 2022. Paper presented at 26th International Conference on Enterprise Design, Operations, and Computing, EDOC 2022, Bozen-Bolzano, Italy, 3-7 October, 2022 (pp. 36-53). Springer Science and Business Media Deutschland GmbH
Åpne denne publikasjonen i ny fane eller vindu >>Security Ontologies: A Systematic Literature Review
2022 (engelsk)Inngår i: Lecture Notes In Computer Science: 26th International Conference on Enterprise Design, Operations, and Computing, EDOC 2022, Springer Science and Business Media Deutschland GmbH , 2022, s. 36-53Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Security ontologies have been developed to facilitate the organization and management of security knowledge. A comparison and evaluation of how these ontologies relate to one another is challenging due to their structure, size, complexity, and level of expressiveness. Differences between ontologies can be found on both the ontological and linguistic levels, resulting in errors and inconsistencies (i.e., different concept hierarchies, types of concepts, definitions) when comparing and aligning them. Moreover, many concepts related to security ontologies have not been thoroughly explored and do not fully meet security standards. By using standards, we can ensure that concepts and definitions are unified and coherent. In this study, we address these deficiencies by reviewing existing security ontologies to identify core concepts and relationships. The primary objective of the systematic literature review is to identify core concepts and relationships that are used to describe security issues. We further analyse and map these core concepts and relationships to five security standards (i.e., NIST SP 800-160, NIST SP 800-30 rev.1, NIST SP 800-27 rev.A, ISO/IEC 27001 and NISTIR 8053). As a contribution, this paper provides a set of core concepts and relationships that comply with the standards mentioned above and allow for a new security ontology to be developed.

sted, utgiver, år, opplag, sider
Springer Science and Business Media Deutschland GmbH, 2022
Serie
Lecture Notes in Computer Science, ISSN 0302-9743 ; 13585 LNCS
Emneord
Concepts, Ontologies, Relationships, Security ontology, Security standards, ISO Standards, Concept, Concept hierarchies, Ontology's, Organization and management, Relationship, Security ontologies, Size complexity, Structure sizes, Systematic literature review, Ontology
HSV kategori
Identifikatorer
urn:nbn:se:mdh:diva-60551 (URN)10.1007/978-3-031-17604-3_3 (DOI)000893215100003 ()2-s2.0-85140464807 (Scopus ID)9783031176036 (ISBN)
Konferanse
26th International Conference on Enterprise Design, Operations, and Computing, EDOC 2022, Bozen-Bolzano, Italy, 3-7 October, 2022
Tilgjengelig fra: 2022-11-03 Laget: 2022-11-03 Sist oppdatert: 2023-08-16bibliografisk kontrollert
Gu, R., Jensen, P. G., Poulsen, D. B., Seceleanu, C., Enoiu, E. P. & Lundqvist, K. (2022). Verifiable strategy synthesis for multiple autonomous agents: a scalable approach. International Journal on Software Tools for Technology Transfer, 24(3), 395-414
Åpne denne publikasjonen i ny fane eller vindu >>Verifiable strategy synthesis for multiple autonomous agents: a scalable approach
Vise andre…
2022 (engelsk)Inngår i: International Journal on Software Tools for Technology Transfer, ISSN 1433-2779, E-ISSN 1433-2787, Vol. 24, nr 3, s. 395-414Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

Path planning and task scheduling are two challenging problems in the design of multiple autonomous agents. Both problems can be solved by the use of exhaustive search techniques such as model checking and algorithmic game theory. However, model checking suffers from the infamous state-space explosion problem that makes it inefficient at solving the problems when the number of agents is large, which is often the case in realistic scenarios. In this paper, we propose a new version of our novel approach called MCRL that integrates model checking and reinforcement learning to alleviate this scalability limitation. We apply this new technique to synthesize path planning and task scheduling strategies for multiple autonomous agents. Our method is capable of handling a larger number of agents if compared to what is feasibly handled by the model-checking technique alone. Additionally, MCRL also guarantees the correctness of the synthesis results via post-verification. The method is implemented in UPPAAL STRATEGO and leverages our tool MALTA for model generation, such that one can use the method with less effort of model construction and higher efficiency of learning than those of the original MCRL. We demonstrate the feasibility of our approach on an industrial case study: an autonomous quarry, and discuss the strengths and weaknesses of the methods.

sted, utgiver, år, opplag, sider
Springer Berlin/Heidelberg, 2022
HSV kategori
Identifikatorer
urn:nbn:se:mdh:diva-58044 (URN)10.1007/s10009-022-00657-z (DOI)000776947000001 ()2-s2.0-85127454588 (Scopus ID)
Tilgjengelig fra: 2022-04-19 Laget: 2022-04-19 Sist oppdatert: 2024-01-17bibliografisk kontrollert
Seceleanu, C., Enoiu, E. P., Carlson, J., Lundqvist, K., Sentilles, S., Behnam, M. & Capannini, G. (2021). Assured Cloud Platforms for Industrial Cyber-Physical Systems: The ACICS Approach. In: ACM International Conference Proceeding Series: . Paper presented at 7th Conference on the Engineering of Computer Based Systems, ECBS 2021, 26 May 2021 through 27 May 2021. Association for Computing Machinery
Åpne denne publikasjonen i ny fane eller vindu >>Assured Cloud Platforms for Industrial Cyber-Physical Systems: The ACICS Approach
Vise andre…
2021 (engelsk)Inngår i: ACM International Conference Proceeding Series, Association for Computing Machinery , 2021Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

With the emergence of "Industry 4.0", the integration of cloud technologies and industrial cyber-physical systems becomes increasingly important to boost productivity. The industrial cyber-physical systems infrastructures and their fusion with the cloud lead to massive amounts of data acquired for controlling particular processes, but also for supporting decision-making. Although cloud-assisted systems are increasingly important in many domains, and ensuring their dependability is crucial, existing platforms do not provide satisfactory support to meet the dependability demands of industrial applications. The overall goal of the ACICS project is to provide models, methods and tools that facilitate a substantial increase of dependability of cloud-based platforms for industrial cyber-physical applications, with respect to consistency, security and interoperability of data, timing predictability of using shared virtual resources, together with a framework of guaranteeing quality-of-service enforcement by formal analysis and verification. In this paper, we present the main conceptual ideas behind the ACICS approach.

sted, utgiver, år, opplag, sider
Association for Computing Machinery, 2021
Emneord
Decision making, Embedded systems, Interoperability, Quality control, Quality of service, Cloud based platforms, Cloud platforms, Cloud technologies, Cyber physicals, Formal analysis, Virtual resource, Cyber Physical System
HSV kategori
Identifikatorer
urn:nbn:se:mdh:diva-58794 (URN)10.1145/3459960.3459968 (DOI)2-s2.0-85107230966 (Scopus ID)9781450390576 (ISBN)
Konferanse
7th Conference on the Engineering of Computer Based Systems, ECBS 2021, 26 May 2021 through 27 May 2021
Merknad

Conference code: 169185; Export Date: 8 June 2022; Conference Paper; Funding details: Stiftelsen för Kunskaps- och Kompetensutveckling, KKS; Funding text 1: We gratefully acknowledge the support of the Swedish Knowledge Foundation (KKS), via the synergy project ACICS.

Tilgjengelig fra: 2022-07-13 Laget: 2022-07-13 Sist oppdatert: 2022-11-08bibliografisk kontrollert
Organisasjoner
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0000-0003-0904-3712