The document discusses the similarities between biological immunity and software resilience. It proposes that biological systems are resilient, with the immune system being a prime example due to its ability to adapt, make decisions through distributed agents, and defend the body through learning. An actor-based model is presented as a way to engineer resilience into software by drawing inspiration from immune system principles like replication, containment, and delegation. A bio-inspired architecture is described that uses supervisor actors to detect changes and spawn helper/killer actors to address issues while maintaining system function. Future work areas are identified like automatic failure recognition, dynamic learning, and multi-layer management of failures.
Hot Stand-By Disaster Recovery Solutions for Ensuring the Resilience of Railw...SERENEWorkshop
Specifications of modern railway control systems often include resilience requirements in order to quickly and safely recovery from disasters (e.g. system-level failures). To that aim, spatial redundancy is required, with main and backup systems installed in fully isolated buildings, together with very short switchover times from main to backup systems in case of disasters. In order to fulfil those requirements, Ansaldo STS has developed a system-level hot stand-by solution allowing to quickly and smoothly switch from the main system to the back-up one, ensuring the necessary continuity of service and transparency to train supervisors and other operators. The functional architecture of such a solution is able to keep aligned the safety-critical nucleuses, typically based on N-modular redundancy (i.e. ‘KooM’ voting), of the main and the back-up systems. Such a coherent alignment must be kept in terms of both interfaced field devices (e.g. interlocking signals, track circuits, switch points, etc.) – on the ‘bottom’ level – and control room Human Machine Interfaces (HMI) – on the ‘top’ level. The solution is based on heterogeneous and redundant network links (copper/fiber Ethernet/HyperRing) at different levels of system architecture. In this speech, the reference architecture and the fault-tolerance functionalities for disaster recovery are provided, considering the requirements of real railway and mass-transit installations.
SERENE 2014 School: Measurement-Driven Resilience Design of Cloud-Based Cyber...SERENEWorkshop
SERENE 2014 School on Engineering Resilient Cyber Physical Systems
Talk: Measurement-Driven Resilience Design of Cloud-Based Cyber-Physical Systems, by Imre Kocsis
Hot Stand-By Disaster Recovery Solutions for Ensuring the Resilience of Railw...SERENEWorkshop
Specifications of modern railway control systems often include resilience requirements in order to quickly and safely recovery from disasters (e.g. system-level failures). To that aim, spatial redundancy is required, with main and backup systems installed in fully isolated buildings, together with very short switchover times from main to backup systems in case of disasters. In order to fulfil those requirements, Ansaldo STS has developed a system-level hot stand-by solution allowing to quickly and smoothly switch from the main system to the back-up one, ensuring the necessary continuity of service and transparency to train supervisors and other operators. The functional architecture of such a solution is able to keep aligned the safety-critical nucleuses, typically based on N-modular redundancy (i.e. ‘KooM’ voting), of the main and the back-up systems. Such a coherent alignment must be kept in terms of both interfaced field devices (e.g. interlocking signals, track circuits, switch points, etc.) – on the ‘bottom’ level – and control room Human Machine Interfaces (HMI) – on the ‘top’ level. The solution is based on heterogeneous and redundant network links (copper/fiber Ethernet/HyperRing) at different levels of system architecture. In this speech, the reference architecture and the fault-tolerance functionalities for disaster recovery are provided, considering the requirements of real railway and mass-transit installations.
SERENE 2014 School: Measurement-Driven Resilience Design of Cloud-Based Cyber...SERENEWorkshop
SERENE 2014 School on Engineering Resilient Cyber Physical Systems
Talk: Measurement-Driven Resilience Design of Cloud-Based Cyber-Physical Systems, by Imre Kocsis
Serene 2015
Davide Scaramuzza
Abstract: With drones becoming more and more popular, safety is a big concern. A critical situation occurs when a drone temporarily loses its GPS position information, which might lead it to crash. This can happen, for instance, when flying close to buildings where GPS signal is lost. In such situations, it is desirable that the drone can rely on fall-back systems and regain stable flight as soon as possible. In this talk, I will present novel methods to automatically recover and stabilize a quadrotor from any initial condition or execute emergency landing. On the one hand, this new technology will allow quadrotors to be launched by simply tossing them in the air, like a “baseball ball”. On the other hand, it will allow them to recover back into stable flight or land on a safe area after a system failure. Since this technology does not rely on any external infrastructure, such as GPS, it enables the safe use of drones in both indoor and outdoor environments. Thus, it can become relevant for commercial use of drones, such as parcel delivery.
Recent videos:
Automatic failure recovery without GPS: https://youtu.be/pGU1s6Y55JI
Autonomous Landing-site detection and landing: https://youtu.be/phaBKFwfcJ4
Future Research in (Software) ResilienceHenry Muccini
These slides have been presented at SERENE 2012 (serene.uni.lu/Workshops/SERENE_2012), the 4th 4th International Workshop on
Software Engineering for Resilient Systems. It analyses the state of the art in software engineering for resilient systems and potential future research directions on the topic.
SERENE 2014 Workshop: Paper "Adaptive Domain-Specific Service Monitoring"SERENEWorkshop
SERENE 2014 - 6th International Workshop on Software Engineering for Resilient Systems
http://serene.disim.univaq.it/
Session 4: Monitoring
Paper 2: Adaptive Domain-Specific Service Monitoring
SERENE 2014 Workshop: Paper "Simulation Testing and Model Checking: A Case St...SERENEWorkshop
SERENE 2014 - 6th International Workshop on Software Engineering for Resilient Systems
http://serene.disim.univaq.it/
Session 3: Verification and Validation
Paper 2: Simulation Testing and Model Checking: A Case Study Comparing these Approaches
SERENE 2014 Workshop: Paper "Advanced Modelling, Simulation and Verification ...SERENEWorkshop
SERENE 2014 - 6th International Workshop on Software Engineering for Resilient Systems
http://serene.disim.univaq.it/
Session 3: Verification and Validation
Paper 3: Advanced Modelling, Simulation and Verification for Future Traffic Regulation Optimisation
SERENE 2014 Workshop: Paper "Combined Error Propagation Analysis and Runtime ...SERENEWorkshop
SERENE 2014 - 6th International Workshop on Software Engineering for Resilient Systems
http://serene.disim.univaq.it/
Session 4: Monitoring
Paper 3: Combined Error Propagation Analysis and Runtime Event Detection in Process-driven Systems
SERENE 2014 Workshop: Paper "Using Instrumentation for Quality Assessment of ...SERENEWorkshop
SERENE 2014 - 6th International Workshop on Software Engineering for Resilient Systems
http://serene.disim.univaq.it/
Session 4: Monitoring
Paper 1: Using Instrumentation for Quality Assessment of Resilient Software in Embedded Systems
SERENE 2014 Workshop: Panel on "Views on Runtime Resilience Assessment of Dyn...SERENEWorkshop
SERENE 2014 - 6th International Workshop on Software Engineering for Resilient Systems
http://serene.disim.univaq.it/
Panel: Views on Runtime Resilience Assessment of Dynamic Software Systems
SERENE 2014 Workshop: Paper "Verification and Validation of a Pressure Contro...SERENEWorkshop
SERENE 2014 - 6th International Workshop on Software Engineering for Resilient Systems
http://serene.disim.univaq.it/
Session 3: Verification and Validation
Paper 1: Verification and Validation of a Pressure Control Unit for Hydraulic Systems
SERENE 2014 Workshop: Paper "Formal Fault Tolerance Analysis of Algorithms fo...SERENEWorkshop
SERENE 2014 - 6th International Workshop on Software Engineering for Resilient Systems
http://serene.disim.univaq.it/
Session 2: Analysis of Resilience
Paper : Formal Fault Tolerance Analysis of Algorithms for Redundant Systems in Early Design Stages
SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...SERENEWorkshop
SERENE 2014 School on Engineering Resilient Cyber Physical Systems
Talk: Resilience in Cyber-Physical Systems: Challenges and Opportunities, by Gabor Karsai
SmartSociety – A Platform for Collaborative People-Machine ComputationHong-Linh Truong
We present the SmartSociety Platform for Collaborative People-Machine computation carried out in the FET SmartSociety project: http://www.smart-society-project.eu/
There is no impenetrable system - So, why we are still waiting to get breached?Nane Kratzke
This is some input for a panel discussion about "Security and Safety in Cloud-based Systems and Services" (9th International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2018) in Barcelona, Spain in February 2018).
Although it might be hard to accept. By principle, attackers can establish footholds in our systems whenever they want (zero-day exploits). Cloud application security engineering efforts focus to harden the "fortress walls". Therefore, cloud applications rely on these defensive walls but seldom attack intruders actively. There is the somehow the need for a more reactive component. A component that could be inspired by biological systems. Biological systems consider by design that defensive "walls" can be breached at several layers. So, biological systems provide an additional active defense system to attack potential successful intruders - an immune system. Although several experts find this approach "intriguing", there are follow-up questions arising. What is about exploits that adapt to bio-inspired systems? How to protect the immune system against direct attacks? Are cloud immune systems prone to phenomenons like fever (running hot) or auto-immune diseases (self-attacking)?
Artificial intelligence is rapidly transforming the technological landscape, enhancing efficiency and precision across numerous sectors. However, the rise of AI and machine learning systems has also introduced a new set of security threats, making the development of advanced security techniques for AI systems more critical than ever.
Operationalise with alerting, custom dashboards, and timelinesElasticsearch
Fine-tune your incident response processes by monitoring non-compliance, alerting on outlier activity, and customising drilldowns to automate response actions. See how Elastic gives your security team the customised visualisations and workflows you need to improve efficiency, streamline collaboration, and truly operationalise your security insights.
Serene 2015
Davide Scaramuzza
Abstract: With drones becoming more and more popular, safety is a big concern. A critical situation occurs when a drone temporarily loses its GPS position information, which might lead it to crash. This can happen, for instance, when flying close to buildings where GPS signal is lost. In such situations, it is desirable that the drone can rely on fall-back systems and regain stable flight as soon as possible. In this talk, I will present novel methods to automatically recover and stabilize a quadrotor from any initial condition or execute emergency landing. On the one hand, this new technology will allow quadrotors to be launched by simply tossing them in the air, like a “baseball ball”. On the other hand, it will allow them to recover back into stable flight or land on a safe area after a system failure. Since this technology does not rely on any external infrastructure, such as GPS, it enables the safe use of drones in both indoor and outdoor environments. Thus, it can become relevant for commercial use of drones, such as parcel delivery.
Recent videos:
Automatic failure recovery without GPS: https://youtu.be/pGU1s6Y55JI
Autonomous Landing-site detection and landing: https://youtu.be/phaBKFwfcJ4
Future Research in (Software) ResilienceHenry Muccini
These slides have been presented at SERENE 2012 (serene.uni.lu/Workshops/SERENE_2012), the 4th 4th International Workshop on
Software Engineering for Resilient Systems. It analyses the state of the art in software engineering for resilient systems and potential future research directions on the topic.
SERENE 2014 Workshop: Paper "Adaptive Domain-Specific Service Monitoring"SERENEWorkshop
SERENE 2014 - 6th International Workshop on Software Engineering for Resilient Systems
http://serene.disim.univaq.it/
Session 4: Monitoring
Paper 2: Adaptive Domain-Specific Service Monitoring
SERENE 2014 Workshop: Paper "Simulation Testing and Model Checking: A Case St...SERENEWorkshop
SERENE 2014 - 6th International Workshop on Software Engineering for Resilient Systems
http://serene.disim.univaq.it/
Session 3: Verification and Validation
Paper 2: Simulation Testing and Model Checking: A Case Study Comparing these Approaches
SERENE 2014 Workshop: Paper "Advanced Modelling, Simulation and Verification ...SERENEWorkshop
SERENE 2014 - 6th International Workshop on Software Engineering for Resilient Systems
http://serene.disim.univaq.it/
Session 3: Verification and Validation
Paper 3: Advanced Modelling, Simulation and Verification for Future Traffic Regulation Optimisation
SERENE 2014 Workshop: Paper "Combined Error Propagation Analysis and Runtime ...SERENEWorkshop
SERENE 2014 - 6th International Workshop on Software Engineering for Resilient Systems
http://serene.disim.univaq.it/
Session 4: Monitoring
Paper 3: Combined Error Propagation Analysis and Runtime Event Detection in Process-driven Systems
SERENE 2014 Workshop: Paper "Using Instrumentation for Quality Assessment of ...SERENEWorkshop
SERENE 2014 - 6th International Workshop on Software Engineering for Resilient Systems
http://serene.disim.univaq.it/
Session 4: Monitoring
Paper 1: Using Instrumentation for Quality Assessment of Resilient Software in Embedded Systems
SERENE 2014 Workshop: Panel on "Views on Runtime Resilience Assessment of Dyn...SERENEWorkshop
SERENE 2014 - 6th International Workshop on Software Engineering for Resilient Systems
http://serene.disim.univaq.it/
Panel: Views on Runtime Resilience Assessment of Dynamic Software Systems
SERENE 2014 Workshop: Paper "Verification and Validation of a Pressure Contro...SERENEWorkshop
SERENE 2014 - 6th International Workshop on Software Engineering for Resilient Systems
http://serene.disim.univaq.it/
Session 3: Verification and Validation
Paper 1: Verification and Validation of a Pressure Control Unit for Hydraulic Systems
SERENE 2014 Workshop: Paper "Formal Fault Tolerance Analysis of Algorithms fo...SERENEWorkshop
SERENE 2014 - 6th International Workshop on Software Engineering for Resilient Systems
http://serene.disim.univaq.it/
Session 2: Analysis of Resilience
Paper : Formal Fault Tolerance Analysis of Algorithms for Redundant Systems in Early Design Stages
SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...SERENEWorkshop
SERENE 2014 School on Engineering Resilient Cyber Physical Systems
Talk: Resilience in Cyber-Physical Systems: Challenges and Opportunities, by Gabor Karsai
SmartSociety – A Platform for Collaborative People-Machine ComputationHong-Linh Truong
We present the SmartSociety Platform for Collaborative People-Machine computation carried out in the FET SmartSociety project: http://www.smart-society-project.eu/
There is no impenetrable system - So, why we are still waiting to get breached?Nane Kratzke
This is some input for a panel discussion about "Security and Safety in Cloud-based Systems and Services" (9th International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2018) in Barcelona, Spain in February 2018).
Although it might be hard to accept. By principle, attackers can establish footholds in our systems whenever they want (zero-day exploits). Cloud application security engineering efforts focus to harden the "fortress walls". Therefore, cloud applications rely on these defensive walls but seldom attack intruders actively. There is the somehow the need for a more reactive component. A component that could be inspired by biological systems. Biological systems consider by design that defensive "walls" can be breached at several layers. So, biological systems provide an additional active defense system to attack potential successful intruders - an immune system. Although several experts find this approach "intriguing", there are follow-up questions arising. What is about exploits that adapt to bio-inspired systems? How to protect the immune system against direct attacks? Are cloud immune systems prone to phenomenons like fever (running hot) or auto-immune diseases (self-attacking)?
Artificial intelligence is rapidly transforming the technological landscape, enhancing efficiency and precision across numerous sectors. However, the rise of AI and machine learning systems has also introduced a new set of security threats, making the development of advanced security techniques for AI systems more critical than ever.
Operationalise with alerting, custom dashboards, and timelinesElasticsearch
Fine-tune your incident response processes by monitoring non-compliance, alerting on outlier activity, and customising drilldowns to automate response actions. See how Elastic gives your security team the customised visualisations and workflows you need to improve efficiency, streamline collaboration, and truly operationalise your security insights.
TAROT2013 Testing School - Antonia Bertolino presentationHenry Muccini
TAROT 2013 9th International Summer School on Training And Research On Testing, Volterra, Italy, 9-13 July, 2013
These slides summarize Paolo Tonella's presentation about "Academic developments in search based testing for the Future Internet."
Unlimited Attempts AllowedDetails
Virtual Labs: Sniffing & Social Engineering
Consider what you have learned so far about Sniffing and Social Engineering as you review the objectives and scenario below. Complete the lab that follows on EC-Council's website using the link below.
Objective
Social engineering is the art of convincing people to reveal confidential information. Social engineers depend on the fact that people know certain valuable information yet are generally careless in protecting it.
The objective of this lab is to:
Detect phishing sites
Protect the network from phishing attacks
Perform Credential Harvesting
Perform security assessment on a machine using a payload generated by SET
Scenario
Social engineering is the art of convincing people to reveal sensitive information in order to perform some malicious action. Organizations fall victim to social engineering tricks despite having security policies and best security solutions in place, as social engineering targets people’s weaknesses or good nature. Reconnaissance and social engineering is generally an essential component of any information security attack.
Cybercriminals are increasingly utilizing social engineering techniques to exploit the most vulnerable link in information system security: employees. Social engineering can take many forms, including phishing emails, fake sites, and impersonation.
McAfee's new “Hacking the Human Operating System” whitepaper focuses on the use of social engineering to attack home and business users and finds once again that people are the weakest link. The McAfee report points out that there are many organizations who develop and deliver user awareness programs into their business areas, but the effectiveness of such programs varies, and in some identified cases, even after the security training has been delivered, it has done very little to educate their end-users with any valued security awareness to mitigate the threat of the social engineering attack.
It is essential for you as an expert Ethical Hacker and Penetration Tester, to assess the preparedness of your organization or the target of evaluation against the social engineering attacks.
Though social engineering primarily requires soft skills, the labs in this module demonstrate some techniques that facilitate or automate certain facets of social engineering attacks.
Week 7 Lab Assignment 1: Protect the Network
Lab Task:
The objective of this lab is to help students learn how to:
Clone a website
Obtain username and passwords using Credential Harvester method
Generate reports for a conducted penetration test
Lab Description:
Social Engineering is an ever-growing threat to organizations all over the world. Social Engineering attacks are used to compromise companies every day. Even though there are many hacking tools available throughout underground hacking communities, Social Engineering Toolkit (SET) is a boon to attackers, as it is freely available and ...
Top 10 Read Articles in International Journal of Security, Privacy and Trust ...ClaraZara1
With the simplicity of transmission of data over the web increasing, there has more prominent need for adequate security mechanisms. Trust management is essential to the security framework of any network. In most traditional networks both wired and wireless centralized entities play pivotal roles in trust management. The International Journal of Security, Privacy and Trust Management ( IJSPTM ) is an open access peer reviewed journal that provides a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals.
Operationalize with alerting, custom dashboards, and timelinesElasticsearch
See how Elastic gives your security team customized visualizations and workflows you need to improve efficiency, streamline collaboration, and truly operationalize your security insights.
A look at the shifting architecture of embedded systems (particularly in light of IoT and wearables), how ecosystems are built and how the industry is evolving
Similar to Biological Immunity and Software Resilience: Two Faces of the Same Coin? (20)
Professional air quality monitoring systems provide immediate, on-site data for analysis, compliance, and decision-making.
Monitor common gases, weather parameters, particulates.
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...Ana Luísa Pinho
Functional Magnetic Resonance Imaging (fMRI) provides means to characterize brain activations in response to behavior. However, cognitive neuroscience has been limited to group-level effects referring to the performance of specific tasks. To obtain the functional profile of elementary cognitive mechanisms, the combination of brain responses to many tasks is required. Yet, to date, both structural atlases and parcellation-based activations do not fully account for cognitive function and still present several limitations. Further, they do not adapt overall to individual characteristics. In this talk, I will give an account of deep-behavioral phenotyping strategies, namely data-driven methods in large task-fMRI datasets, to optimize functional brain-data collection and improve inference of effects-of-interest related to mental processes. Key to this approach is the employment of fast multi-functional paradigms rich on features that can be well parametrized and, consequently, facilitate the creation of psycho-physiological constructs to be modelled with imaging data. Particular emphasis will be given to music stimuli when studying high-order cognitive mechanisms, due to their ecological nature and quality to enable complex behavior compounded by discrete entities. I will also discuss how deep-behavioral phenotyping and individualized models applied to neuroimaging data can better account for the subject-specific organization of domain-general cognitive systems in the human brain. Finally, the accumulation of functional brain signatures brings the possibility to clarify relationships among tasks and create a univocal link between brain systems and mental functions through: (1) the development of ontologies proposing an organization of cognitive processes; and (2) brain-network taxonomies describing functional specialization. To this end, tools to improve commensurability in cognitive science are necessary, such as public repositories, ontology-based platforms and automated meta-analysis tools. I will thus discuss some brain-atlasing resources currently under development, and their applicability in cognitive as well as clinical neuroscience.
Richard's aventures in two entangled wonderlandsRichard Gill
Since the loophole-free Bell experiments of 2020 and the Nobel prizes in physics of 2022, critics of Bell's work have retreated to the fortress of super-determinism. Now, super-determinism is a derogatory word - it just means "determinism". Palmer, Hance and Hossenfelder argue that quantum mechanics and determinism are not incompatible, using a sophisticated mathematical construction based on a subtle thinning of allowed states and measurements in quantum mechanics, such that what is left appears to make Bell's argument fail, without altering the empirical predictions of quantum mechanics. I think however that it is a smoke screen, and the slogan "lost in math" comes to my mind. I will discuss some other recent disproofs of Bell's theorem using the language of causality based on causal graphs. Causal thinking is also central to law and justice. I will mention surprising connections to my work on serial killer nurse cases, in particular the Dutch case of Lucia de Berk and the current UK case of Lucy Letby.
The ability to recreate computational results with minimal effort and actionable metrics provides a solid foundation for scientific research and software development. When people can replicate an analysis at the touch of a button using open-source software, open data, and methods to assess and compare proposals, it significantly eases verification of results, engagement with a diverse range of contributors, and progress. However, we have yet to fully achieve this; there are still many sociotechnical frictions.
Inspired by David Donoho's vision, this talk aims to revisit the three crucial pillars of frictionless reproducibility (data sharing, code sharing, and competitive challenges) with the perspective of deep software variability.
Our observation is that multiple layers — hardware, operating systems, third-party libraries, software versions, input data, compile-time options, and parameters — are subject to variability that exacerbates frictions but is also essential for achieving robust, generalizable results and fostering innovation. I will first review the literature, providing evidence of how the complex variability interactions across these layers affect qualitative and quantitative software properties, thereby complicating the reproduction and replication of scientific studies in various fields.
I will then present some software engineering and AI techniques that can support the strategic exploration of variability spaces. These include the use of abstractions and models (e.g., feature models), sampling strategies (e.g., uniform, random), cost-effective measurements (e.g., incremental build of software configurations), and dimensionality reduction methods (e.g., transfer learning, feature selection, software debloating).
I will finally argue that deep variability is both the problem and solution of frictionless reproducibility, calling the software science community to develop new methods and tools to manage variability and foster reproducibility in software systems.
Exposé invité Journées Nationales du GDR GPL 2024
This presentation explores a brief idea about the structural and functional attributes of nucleotides, the structure and function of genetic materials along with the impact of UV rays and pH upon them.
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...University of Maribor
Slides from talk:
Aleš Zamuda: Remote Sensing and Computational, Evolutionary, Supercomputing, and Intelligent Systems.
11th International Conference on Electrical, Electronics and Computer Engineering (IcETRAN), Niš, 3-6 June 2024
Inter-Society Networking Panel GRSS/MTT-S/CIS Panel Session: Promoting Connection and Cooperation
https://www.etran.rs/2024/en/home-english/
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...Sérgio Sacani
We characterize the earliest galaxy population in the JADES Origins Field (JOF), the deepest
imaging field observed with JWST. We make use of the ancillary Hubble optical images (5 filters
spanning 0.4−0.9µm) and novel JWST images with 14 filters spanning 0.8−5µm, including 7 mediumband filters, and reaching total exposure times of up to 46 hours per filter. We combine all our data
at > 2.3µm to construct an ultradeep image, reaching as deep as ≈ 31.4 AB mag in the stack and
30.3-31.0 AB mag (5σ, r = 0.1” circular aperture) in individual filters. We measure photometric
redshifts and use robust selection criteria to identify a sample of eight galaxy candidates at redshifts
z = 11.5 − 15. These objects show compact half-light radii of R1/2 ∼ 50 − 200pc, stellar masses of
M⋆ ∼ 107−108M⊙, and star-formation rates of SFR ∼ 0.1−1 M⊙ yr−1
. Our search finds no candidates
at 15 < z < 20, placing upper limits at these redshifts. We develop a forward modeling approach to
infer the properties of the evolving luminosity function without binning in redshift or luminosity that
marginalizes over the photometric redshift uncertainty of our candidate galaxies and incorporates the
impact of non-detections. We find a z = 12 luminosity function in good agreement with prior results,
and that the luminosity function normalization and UV luminosity density decline by a factor of ∼ 2.5
from z = 12 to z = 14. We discuss the possible implications of our results in the context of theoretical
models for evolution of the dark matter halo mass function.
Phenomics assisted breeding in crop improvementIshaGoswami9
As the population is increasing and will reach about 9 billion upto 2050. Also due to climate change, it is difficult to meet the food requirement of such a large population. Facing the challenges presented by resource shortages, climate
change, and increasing global population, crop yield and quality need to be improved in a sustainable way over the coming decades. Genetic improvement by breeding is the best way to increase crop productivity. With the rapid progression of functional
genomics, an increasing number of crop genomes have been sequenced and dozens of genes influencing key agronomic traits have been identified. However, current genome sequence information has not been adequately exploited for understanding
the complex characteristics of multiple gene, owing to a lack of crop phenotypic data. Efficient, automatic, and accurate technologies and platforms that can capture phenotypic data that can
be linked to genomics information for crop improvement at all growth stages have become as important as genotyping. Thus,
high-throughput phenotyping has become the major bottleneck restricting crop breeding. Plant phenomics has been defined as the high-throughput, accurate acquisition and analysis of multi-dimensional phenotypes
during crop growing stages at the organism level, including the cell, tissue, organ, individual plant, plot, and field levels. With the rapid development of novel sensors, imaging technology,
and analysis methods, numerous infrastructure platforms have been developed for phenotyping.
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...Wasswaderrick3
In this book, we use conservation of energy techniques on a fluid element to derive the Modified Bernoulli equation of flow with viscous or friction effects. We derive the general equation of flow/ velocity and then from this we derive the Pouiselle flow equation, the transition flow equation and the turbulent flow equation. In the situations where there are no viscous effects , the equation reduces to the Bernoulli equation. From experimental results, we are able to include other terms in the Bernoulli equation. We also look at cases where pressure gradients exist. We use the Modified Bernoulli equation to derive equations of flow rate for pipes of different cross sectional areas connected together. We also extend our techniques of energy conservation to a sphere falling in a viscous medium under the effect of gravity. We demonstrate Stokes equation of terminal velocity and turbulent flow equation. We look at a way of calculating the time taken for a body to fall in a viscous medium. We also look at the general equation of terminal velocity.
Biological Immunity and Software Resilience: Two Faces of the Same Coin?
1. Università
degli
Studi
dell’Aquila
Software
Engineering
for
Resilient
Systems
7th
International
Workshop
on
Software
Engineering
for
Resilient
Systems,
7-‐8th
September 2015, Paris
Biological
Immunity
and
Software
Resilience:
two
faces
of
the
same
coin?
Marco
Autili,
Amleto
Di
Salle,
Francesco
Gallo,
Alexander
Perucci,
Massimo
Tivoli
2. 7th
International
Workshop
on
Software
Engineering
for
Resilient
Systems,
7-‐8th
September 2015, Paris
Massimo Tivoli
PhD / Associate Professor
Dep. of Information Engineering,
Computer Science and Mathematics –
University of L’Aquila
Marco Autili
PhD / Assistant Professor
Dep. of Information Engineering,
Computer Science and Mathematics –
University of L’Aquila
Amleto Di Salle
PhD
Dep. of Information Engineering,
Computer Science and Mathematics –
University of L’Aquila
Alexander Perucci
PhD Student
Dep. of Information Engineering,
Computer Science and Mathematics –
University of L’Aquila
Francesco Gallo
PhD / Research Fellow
Dep. of Information Engineering,
Computer Science and Mathematics –
University of L’Aquila
3. Roadmap
• Introduction
• Software Resilience
• Immune System Actor Model Overview
• Bio-inspired concept architecture for resilient
systems
• Consideration and Future Works
7th
International
Workshop
on
Software
Engineering
for
Resilient
Systems,
7-‐8th
September 2015, Paris
4. Roadmap
• Introduction
• Software Resilience
• Immune System
• Actor Model Overview
• Bio-inspired concept architecture for resilient systems
• Consideration and Future Works
7th
International
Workshop
on
Software
Engineering
for
Resilient
Systems,
7-‐8th
September 2015, Paris
5. Roadmap
• Introduction
• Software Resilience
• Immune System
• Actor Model Overview
• Bio-inspired concept architecture for resilient systems
• Consideration and Future Works
7th
International
Workshop
on
Software
Engineering
for
Resilient
Systems,
7-‐8th
September 2015, Paris
6. Roadmap
• Introduction
• Software Resilience
• Immune System
• Actor Model Overview
• Bio-inspired concept architecture for resilient systems
• Consideration and Future Works
7th
International
Workshop
on
Software
Engineering
for
Resilient
Systems,
7-‐8th
September 2015, Paris
7. Introduction
Biological Immunity and Software Resilience are two faces of the same coin?
7th
International
Workshop
on
Software
Engineering
for
Resilient
Systems,
7-‐8th
September 2015, Paris
8. Introduction
Biological Immunity and Software Resilience are two faces of the same coin?
?
7th
International
Workshop
on
Software
Engineering
for
Resilient
Systems,
7-‐8th
September 2015, Paris
9. Introduction – Software Resilience
Resilient systems have the ability to endure and successfully recover from
disturbances by identifying problems and mobilizing the available resources to
cope with the disturbance. Resiliency lets a system recover from disruptions,
variations, and a degradation of expected working conditions1.
[1] - Synergy between biology and systems resilience - Ashik Chandra
7th
International
Workshop
on
Software
Engineering
for
Resilient
Systems,
7-‐8th
September 2015, Paris
10. Introduction - Immune System
?
Biological systems are resilient?
And in particular, Immune System is resilient?
7th
International
Workshop
on
Software
Engineering
for
Resilient
Systems,
7-‐8th
September 2015, Paris
11. Introduction - Immune System
?
Immune systems are highly adaptive and scalable, with the ability to cope with
multiple data sources, fuse information together, makes decisions, have
multiple interacting agents, operate in a distributed manner over a multiple
scales, and have a memory structure to facilitate learning in order to defence
body against infectious organism (pathogens) and other invaders.
Biological systems are resilient?
And in particular, Immune System is resilient?
7th
International
Workshop
on
Software
Engineering
for
Resilient
Systems,
7-‐8th
September 2015, Paris
12. Introduction - Immune System
?
7th
International
Workshop
on
Software
Engineering
for
Resilient
Systems,
7-‐8th
September 2015, Paris
13. Introduction - System Resilient and Immune System
?
Biological systems are resilient?
And in particular, Immune System is resilient?
Resilient systems have the ability to endure and successfully recover from
disturbances by identifying problems and mobilizing the available resources to
cope with the disturbance. Resiliency lets a system recover from disruptions,
variations, and a degradation of expected working conditions.
Immune systems are highly adaptive and scalable, with the ability to cope with
multiple data sources, fuse information together, makes decisions, have
multiple interacting agents, operate in a distributed manner over a multiple
scales, and have a memory structure to facilitate learning in order to defence
body against infectious organism (pathogens) and other invaders.
7th
International
Workshop
on
Software
Engineering
for
Resilient
Systems,
7-‐8th
September 2015, Paris
14. Introduction – System Resilient and Immune System
?
Biological systems are resilient?
And in particular, Immune System is resilient?
Resilient systems have the ability to endure and successfully recover from
disturbances by identifying problems and mobilizing the available resources to
cope with the disturbance. Resiliency lets a system recover from disruptions,
variations, and a degradation of expected working conditions.
Immune systems are highly adaptive and scalable, with the ability to cope with
multiple data sources, fuse information together, makes decisions, have
multiple interacting agents, operate in a distributed manner over a multiple
scales, and have a memory structure to facilitate learning in order to defence
body against infectious organism (pathogens) and other invaders.
May be Yes
7th
International
Workshop
on
Software
Engineering
for
Resilient
Systems,
7-‐8th
September 2015, Paris
15. Actor Model Overview
How
we
combine
Immune System
and
Resilient
Software?
Actor Model is a formal mathematical model of concurrent computation, and
actually several programming language employing the notion of actor (ex.
Java, Scala)
The Actor Model is characterized by:
• inherent concurrency of computation within and among Actors,
• dynamic creation/replication of Actors,
• interaction only through direct asynchronous message passing.
Resilience is achieved through replication, containment, isolation and
delegation mechanisms.
7th
International
Workshop
on
Software
Engineering
for
Resilient
Systems,
7-‐8th
September 2015, Paris
16. Actor Model Overview
We focus on the Akka toolkit2, which is a framework that natively permits a
programming style based on the Actor Model.
The Actor Model is characterized by:
• inherent concurrency of computation within and among Actors,
• dynamic creation/replication of Actors,
• interaction only through direct asynchronous message passing.
Resilience is achieved through replication, containment, isolation and
delegation mechanisms.
7th
International
Workshop
on
Software
Engineering
for
Resilient
Systems,
7-‐8th
September 2015, Paris
[2] - http://akka.io
17. Bio-‐inspired
concept
architecture
for
resilient
systems
-‐ I
?
-‐ The System actor creates the KillerSupervisor ,
HelperSupervisor and ConsumerSupervisoractors
- The supervisor actors are in charge of detecting
changes, intrusions, failures, and undesired behaviours
- Supervisor actors are in charge of creating respective
sub actors, namely KillerActor ,
HelperActor and
ConsumerActor
-‐ Each message activates specific instances of
HelperActor and
KillerActor
7th
International
Workshop
on
Software
Engineering
for
Resilient
Systems,
7-‐8th
September 2015, Paris
18. Bio-inspired concept architecture for resilient systems - II
Agility:
undesired behaviours or changes represent the software
counterpart of pathogens.
Redundancy:
Akka toolkit offers persistence.
Dynamic learning:
if some change or undesired behaviour occurs at run time,
and the affected actor is not able to manage it, the actor
initially treats it as an unknown message.
Flexibility:
the actors can be dynamically produced or replicated, without
blocking the system.
Robustness:
it uses the let it crash policy to manage the programmed
death of faulty components that can be dynamically killed or
stopped for preserving the system functioning
7th
International
Workshop
on
Software
Engineering
for
Resilient
Systems,
7-‐8th
September 2015, Paris
19. Consideration and Future Works - I
From our point view…..YES
Biological Immunity and Software Resilience are two faces of the same coin?
7th
International
Workshop
on
Software
Engineering
for
Resilient
Systems,
7-‐8th
September 2015, Paris
20. Consideration and Future Works - II
- automatic recognition of software failures/changes;
- dynamic learning of the solutions required to correctly react to the recognized failures/changes;
- modular actuation of the (learned) solution, without compromising the over all system function;
- self-stabilization of the self-*actions;
- multilayer management of failures/changes (and related strategies) in a modular, yet cohesive, way
depending on the affected layer(s), e.g., application, middleware, operating system, network layer.
7th
International
Workshop
on
Software
Engineering
for
Resilient
Systems,
7-‐8th
September 2015, Paris
21. Consideration and Future Works - II
- automatic recognition of software failures/changes;
- dynamic learning of the solutions required to correctly react to the recognized failures/changes;
- modular actuation of the (learned) solution, without compromising the over all system function;
- self-stabilization of the self-*actions;
- multilayer management of failures/changes (and related strategies) in a modular, yet cohesive, way
depending on the affected layer(s), e.g., application, middleware, operating system, network layer.
The opportunity to explore to use our formalism to create executable software models of biological
systems can be used for predictions, preparation and elimination of unnecessary, dangerous or
unethical laboratory experiments
7th
International
Workshop
on
Software
Engineering
for
Resilient
Systems,
7-‐8th
September 2015, Paris
22. THANKS
FOR
YOUR
ATTENTION!!!
Question?
7th
International
Workshop
on
Software
Engineering
for
Resilient
Systems,
7-‐8th
September 2015, Paris