skip to main content
10.1109/ICSE-Companion.2019.00085acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

An artificial intelligence-based model-driven approach for exposing off-nominal behaviors

Published: 25 May 2019 Publication History

Abstract

With an increase in the automation of cyber-physical systems (e.g., automated vehicles and robots), quality problems such as off-nominal behaviors (ONBs) have also increased. While there are techniques that can find ONBs at the requirements engineering stage as it reduces the cost of addressing defects early in development, they do not meet the current industrial needs and often ignore functional safety. These techniques suffer from limitations such as scalability, need for significant human effort and inability to detect overlooked or unknown ONBs. To address these limitations we need a technique that analyzes requirements with respect to functional safety, but with less human effort. To achieve this, we propose our artificial intelligence-based model-driven methodology that provides a means to find ONBs during requirements engineering with minimal human effort. Our methodology utilizes existing approaches such as causal component model (CCM) and systems theoretic process analysis (STPA). We describe the details of each step of our approach and how our approach would support finding ONBs. Using our research and the results of our studies, we intend to provide empirical evidence that considering ONBs during requirements engineering stage and analyzing requirements with respect to functional safety can help create more robust designs and higher-quality products.

References

[1]
D. Aceituna and H. Do, "Exposing the susceptibility of off-nominal behaviors in reactive system requirements," in RE'15, 2015, pp. 136--145.
[2]
N. T. S. Board, "Preliminary report, highway, hwy18mh010," National Transpotation Safety Board, https://www.ntsb.gov/investigations/AccidentReports/Reports/HWY18MH010-prelim.pdf, accessed 2018-11-15.
[3]
S. Veram, S. Lozito, T. Kozon, D. Ballinger, and H. Resnick, "Procedures for off-nominal cases: Very closely spaced parallel runway operations," in DASC'08, 2008, pp. 2.C.4-1--2.C.4-11.
[4]
T. Kurtoglu and I. Y. Tumer, "A graph-based fault identification and propagation framework for functional design of complex systems," Journal of mechanical design, vol. 130, no. 5, p. 051401, 2008.
[5]
J. Day, K. Donahue, M. Ingham, A. Kadesch, A. Kennedy, and E. Post, "Modeling off-nominal behavior in sysml," in Infotech@ Aerospace 2012, 2012.
[6]
A. Sutcliffe and P. Sawyer, "Requirements elicitation: Towards the unknown unknowns," in RE'13. IEEE, 2013, pp. 92--104.
[7]
J. Cleland-Huang and M. Vierhauser, "Discovering, analyzing, and managing safety stories in agile projects," in RE'18, 2018, pp. 262--273.
[8]
N. Leveson and J. Thomas, "An STPA primer," Cambridge, MA, 2013.
[9]
J. Pennington, R. Socher, and C. D. Manning, "Glove: Global vectors for word representation," in Empirical Methods in Natural Language Processing (EMNLP), 2014, pp. 1532--1543.
[10]
J. Schmidhuber, "Deep learning in neural networks: An overview," Neural Networks, vol. 61, pp. 85 -- 117, 2015.
[11]
Y. Mu, Y. Wang, and J. Guo, "Extracting software functional requirements from free text documents," in ICIMT'09, 2009, pp. 194--198.
[12]
I. S. Bajwa, B. Bordbar, M. Lee, and K. Anastasakis, "Nl2 alloy: A tool to generate alloy from nl constraints," Journal of Digital Information Management, vol. 10, no. 6, p. 365, 2012.
[13]
J. Lee and J.-Y. Kuo, "New approach to requirements trade-off analysis for complex systems," IEEE Transactions on Knowledge and Data Engineering, vol. 10, no. 4, pp. 551--562, 1998.
[14]
G. Ruhe, A. Eberlein, and D. Pfahl, "Trade-off analysis for requirements selection," International Journal of Software Engineering and Knowledge Engineering, vol. 13, no. 04, pp. 345--366, 2003.
[15]
L. Dariz, M. Selvatici, M. Ruggeri, G. Costantino, and F. Martinelli, "Trade-off analysis of safety and security in can bus communication," in MT-ITS'17, 2017, pp. 226--231.
[16]
A. Sherer, J. Rose, and R. Oddone, "Ensuring functional safety compliance for iso 26262," in ADAC'15. ACM, 2015, p. 98.
[17]
K. Madala, H. Do, and D. Aceituna, "A combinatorial approach for exposing off-nominal behaviors," in ICSE'18, 2018, pp. 910--920.
[18]
N. G. Leveson, "Safety analysis in early concept development and requirements generation," in INCOSE International Symposium, 2018.
[19]
K. Madala, D. Gaither, R. Nielsen, and H. Do, "Automated identification of component state transition model elements from requirements," in AIRE'17, 2017, pp. 386--392.
[20]
K. Madala, S. Piparia, H. Do, and R. Bryce, "Finding component state transition model elements using neural networks: An empirical study," in AIRE'18, 2018, pp. 54--61.
[21]
K. Madala, H. Do, and D. Aceituna, "Hierarchical model exploration for exposing off-nominal behaviors," in MoDeVVa @ MODELS'17, 2017.
[22]
Y. Lei, R. Kacker, D. R. Kuhn, V. Okun, and J. Lawrence, "Ipog: A general strategy for t-way software testing," in ECBS'07. IEEE, 2007, pp. 549--556.
[23]
D. Aceituna, K. Madala, and H. Do, "Deriving functional safety requirements using undesired combination state templates," in RESACS'18, 2018, pp. 1--8.
[24]
R. Agrawal, R. Srikant et al., "Fast algorithms for mining association rules," in VLDB'94, vol. 1215, 1994, pp. 487--499.
[25]
K. Madala, H. Do, and D. Aceituna, "A knowledge acquisition approach for off-nominal behaviors," in RESACS'18, 2018, pp. 36--43.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICSE '19: Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings
May 2019
369 pages

Sponsors

Publisher

IEEE Press

Publication History

Published: 25 May 2019

Check for updates

Qualifiers

  • Research-article

Conference

ICSE '19
Sponsor:

Acceptance Rates

Overall Acceptance Rate 276 of 1,856 submissions, 15%

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 56
    Total Downloads
  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media