Wednesday, January 29, 2020

The Determinacy of Existence Essay Example for Free

The Determinacy of Existence Essay In Steven Spielberg’s Artificial Intelligence: AI, the same question seems to have haunted its main character, David. As a part of the genre of science fiction, the film itself has a highly fictional character however given the developments within the fields of science and technology in the past few years along with the current threats that global warming poses to our environment and to the human race itself, it is not difficult to fathom that such an event will exist in the future. Artificial Intelligence is set within a period wherein the ocean levels have risen to the extent that it has drowned some of the cities in the world. Despite of this, the human race continues to persevere to the extent that it has been able to create human like robots. Human like here refers to the possession of the appearance, form, and function of a human being. In the film, David stands as a substitute to Henry and Monica Swinton’s son Martin who was considered terminally ill. Martin, however was healed and was sent back to live with his family. As soon as Martin started to live with his family, he resented David and the robot child was forced to be evicted from his home. In this process, David learns the tale of Pinocchio and associates the tale with his quest to find his real mother as well as his quest to turn into a â€Å"real† boy. Although, the film itself might be seen to question the relationship of human beings to technology wherein technological developments may be considered as their offsprings, as I see it the film also question life and existence itself. It might be too farfetched to contrast myself to the character David for the obvious reason that I have empirical evidence that I am not an android however as I see it, it is possible to strike a comparison between David’s quest for his mother [and hence for life itself since the mother stands as the source of life] as well as my quest for meaning. In the journal entry that I chose above, I was placed in a position where I questioned my existence and my identity itself. I have given this some thought in the following days that I have been haunted with these questions. The way I see it, all human beings are partially determined by their past [e. g. the manner in which they were socialized as well as the genetic traits that they have acquired from their family] however at the same time their existence and identity is also determined by their actions in the present. In a way, one might state that each individual is haunted by the ever occurring present since each action and each decision affects ourselves while at the same time placing a permanent mark in who we are. David, in the film Artificial Intelligence, was partially determined by his background [his existence as an artificial intelligence] however despite of this he chose to cling to the tale of Pinocchio and made it his own thereby enabling him to receive the love of human mother at the end of the film. As I see it, if we are to see David’s mother as a symbol for Eve [and hence life itself] and if we are to see ourselves as a David, each continually pursuing his dreams and aspirations, it is possible for us to receive the love of life. As I see it, it is by taking hold of one’s decisions and in a sense of one’s life that one is freed from the initial determinacy of existence. In this sense, although initially one might state that we were initially determined by our nature and the way that we were nurtured it is also possible for us to be freed from this by taking hold of one’s life and being accountable from one’s actions. The way I see it, this was the reason why David was granted the human life in the film Artificial Intelligence.

Tuesday, January 21, 2020

Saving Private Ryan Historical Review Essay -- essays research papers

Saving Private Ryan   Ã‚  Ã‚  Ã‚  Ã‚  I chose Saving Private Ryan, the 1998 movie directed by Steven Spielberg about the invasion at Normandy and a special mission that follows, as the topic of my paper. The mission is for eight men to go behind enemy lines and rescue a soldier who’s brothers have died in battle and bring him back.   Ã‚  Ã‚  Ã‚  Ã‚  The movie starts with the D-Day invasion at Normandy Beach, a very tragic and great day at the same time. Allied troops were being shot the second the landing vehicles opened, mortars were dropping all over, there was no cover, and those who sought refuge in the water were drowned by the weight of their equipment. As all of this happens, we follow members of one unit as they struggle to make their way on shore. Bodies are dropping everywhere, the wounded are piling up, and things are looking down. After intense battle and effort, however, the Allied forces finally take the beach, but not without a high cost of life.   Ã‚  Ã‚  Ã‚  Ã‚  From what I know and have heard about the D-Day invasion, the movie was very accurate on it’s portrayal of the attack. The action was so intense at the movie theater I first saw it in that a veteran got up and left for a while because he was crying so bad. I later found out that he had actually been there and that seeing it so vividly on screen had brought back too many bad memories. If that doesn’t convey realism, I don’t know what does.   Ã‚  Ã‚  Ã‚  ...

Monday, January 13, 2020

Software Testing in Safety Critical Systems

Abstract Today, many safety-critical applications are controlled by computer software. Therefore effective testing tools are required to provide a high degree of safety and to reduce severe failures too minimum. The paper examines existing regulating standards in safety-critical systems. By comparing different software testing methods the requirements and challenges in safety-critical software testing are being evaluated. The QUICKIES standard serves as the mall regulatory framework for all separately systems and provides the basis for the creation of application- and Interdependently tankards.Moreover it defines certain safety integrity levels depending on the field of application and recommends testing methods according to these levels. In model- based safety testing a usage model with restricted space state domain is used to generate representative test cases. Statistical testing is a mathematical approach that uses a high number of test cases to reach a significant result. The ma in challenge of all safety-related testing methods Is to reduce testing time and complexity without distorting the significance of the test.These can for example be transportation systems, power plants, and medical applications. As people's lives depend on the correct function of such control systems and their software, thorough testing is required before they can be admitted to operation. There are many different software testing methods. Most of them only analyze the probability of a failure but do not value its severity. However, in safety-critical systems a failure that has severe consequences, even if it is extremely rare, can not be accepted. Therefore testing in this field has to be adopted accordingly.The purpose of this paper is to find and compare the latest methods for safety-critical footwear testing and to identify the most common industry standard in this field. Moreover the requirements and challenges in safety-critical software testing will be elaborated. At the begi nning the paper will provide definitions that are required for the understanding of the subsequent chapters. After that, an introduction to the JUICE 508 safety standard, which serves as a basis for most industry-specific standards, is given.The chapter â€Å"Testing Methods† will address some of the latest safety-related software testing methods in detail. 5 Definitions 2 Definitions 2. 1 Reliability and Safety In safety critical systems both, reliability and safety are required to achieve the goals of dependability. However, reliability and safety are two different attributes of dependability. The reliability, R(t) , of a system is a function of time. It is defined as the conditional probability that the system will perform its intended function in a defined way over a given time period and under certain specified and assumed conditions.The most used parameter to characterize reliability is the Mean Time To Failure (MATT). The safety, S(t), of a system is defined as the pro bability that a system ill either perform its functions correctly or will discontinue its functions in a way that does not interrupt the operation of other systems or Jeopardize the safety of any people associated with the system [1]. Based on these definitions, in reliability testing all failures are weighted equally, whereas in safety testing the failures are weighted according to their severity.Therefore, a reliable system may be quite unsafe and a safe system may be very unreliable. 2. 2 Safety-critical System States very complex to generate. As many states are unreachable or very difficult to reach hey can be reduced to a relatively small number of representative system states. These states are grouped in three subsets: Normal State Subset (NUNS), Fail-Safe State subset (FPS) and Risky state subset (IRS). Their relationships are: s=Unusualness; 6 Their inter-dependability is described as a Markova chain (see figure 1) [2]. Figure 1 : Three-state Markova Model for Safety-critica l Systems(Source: 2. Markova Chain Usage Model The Markova chain usage model describes the possible usage of a software based on a predicted environment. It can be used to generate statistical test cases and to estimate the software reliability. In an Markova model the transition from operation I to operation J can be denoted by an ordered pair . Let be the transition probability from operation I to operation J, with and EX=I .. N p(is)=1, where n is the number of operations. The transitions and transition probabilities can be represented in the form of a matrix [3].Each specific usage of the program corresponds to a path X=(XI, XX,†¦ Xi) in the Markova chain where Xi corresponds to the I-the operation. P(Xi, X]) determines the next executed operation J after execution of operation I. Since the operations are random rabbles, each path X=(XI, XX,†¦ ) forms a stochastic process. For a particular path x=(ox, XSL ,†¦ ), the corresponding path execution probability is [3]: 7 pox pop , x 3 Standards There exist both national and international standards and guidelines at different depths and classifications which define requirements for safety-related technologies. Yester and provides the basis for the creation of application- and underspecified standards. It includes more than 500 pages of normative and informative specifications and proposals. Nowadays most safety-related standards are based on he JUICE 508 in combination with the previously applicable requirements [4]. The JUICE 508 defines so called Safety Integrity Levels (Sills) which serve as a measure for the safety requirements on a certain system. The following table shows the different SILLS as well as the corresponding probability of failure and application examples.Probability of Failure One Failure in x Years Consequences Application Example The last three parts, are informative and include practical examples which should help to simplify the application of the standard. The ‘CE 61 508 describes the complete life cycle of safety-related systems from planning to decommissioning and refers to all aspects related to the use and requirements for electrical / electronic / programmable electronic systems (E / E / PEE) for separately functions [4]. According to the focus of this paper only the parts relating to software testing are mentioned in the following paragraph. Figure 2 shows the verification and validation process in software development according to the JUICE 508 standard.The E/E/PEE system safety requirements are applied both on the system architecture and the software specifications. Every level in the system architecture verifies if it meets the requirements of the next higher layer (I. E. Coding fulfills module design requirements, module design fulfills software yester design requirements etc. ). Moreover each system architecture layer is tested by a specific test. As soon as the test circuit is closed successfully the software can be validated. The st andard also recommends and rates certain test methods according to the required SILL. In order to meet the requirements of the ‘CE standard a series.Test methods comprised in the ‘CE 61 508 are categorized as follows [6]: Failure analysis (I. E. Cause consequence programs) Dynamic analysis and testing (I. E. Test case execution from model-based test case generation) Functional and black box testing (I. . Equivalence classes and input partition testing, including boundary value analysis) Performance testing (I. E. Response timings and memory constraints) Static analysis (I. E. Static analysis of run time error behavior) 9 Figure 2: ‘CE 61 508-3 Verification and Validation Process(Source: 10 Testing Methods 4 Testing Methods There are many different software testing methods.A detailed introduction to all different methods would be far beyond the scope of this paper. Therefore the author will only mention two methods he deems most relevant in the field of safety-relat ed software testing. Finally both methods are compared and their possible application areas are evaluated. 4. 1 Model-based Safety Testing In model-based testing explicit behavior models that encode the intended behavior of a system and its environment are used. These models generate pairs of inputs and outputs. The output of such a model represents the expected output of the system under test (SOT). Mineral model-based testing method. The system safety-related behavior is defined in the safety requirements specification. Test cases are derived from a safety model that is extracted from the SHUT and from formal safety requirements. This model encodes the intended behavior and maps each possible input to the corresponding output. Safety test selection criteria relate to the functional safety of the safety- critical system, to the structure of the model (state coverage, transition coverage), and also to a well defined set of system faults.Safety test case specifications are used to fo rmalize the safety test selection criteria and render them operational. For the given safety model and the safety test case specification, an automatic safety test case generator and optimizer generates the safety test case suite. Finally, the concreted input part of a test case is submitted to the SHUT and the SOT's output is recorded. The concentration of the input part of a test case is performed by a safety test engine. Besides executing the safety case, it can also compare the output of the SHUT with the expected output as provided by the safety test case [6]. 1 Figure 3: Model-based Safety Testing according Gang You et al. (Source: Test Case Generation One of the most commonly tools for test case generation are model checking techniques. The main purpose of model checking is to verify a formal safety property (given as a logic formula) on a system model. In test case generation, model checking is used in order to find violations of certain formal safety properties. Safety mode ls of safety-critical software systems may have a huge number of states. Therefore the greatest challenge when using a model checker is to cope with the state space explosion.As a countermeasure, Gang You et al. ‘s approach applies the safety model, which is derived from SHUT and certain safety requirements. The model 12 limits the number of states by splitting them into three subsets (NUNS, FPS, IRS) containing only representative states (see 2. X). Moreover the safety model encodes he intended behavior, and from its structure, safety test cases can be derived. It thereby restricts the possible inputs into the SHUT and the set of possible separately behaviors of the SOT.Hence, to reduce the amount of testing and guarantee the quality of testing the model checker will search those most frequently entered states and generate the corresponding safety test cases without searching the whole state spaces. The selection of states is based on the safety requirements (Sills). Generall y speaking, the safety model can be seen as a test selection criterion generate safety-related test cases. Figure 4 shows the corresponding flow chart. 1 . The system safety model in the form of a finite state machine (FSML) is transformed into the input language of the model checker tool (SPIN) 2.Each test requirement of a given safety criterion is formulated as a temporal logic expression (LET). 3. Based on the Markova model of a system, the state space is divided into three subsets. 4. In term of these subsets, the negation of each expression of the formula is verified by the model checker. If there is an execution path in the model that does not satisfy the negated formula then it is presented by the model checker as a counter-example. This path becomes a test sequence that satisfies the original test requirement. 5.The inputs and outputs that form the executable test case are extracted from the counter-example or are derived by a corresponding guided simulation of the model. 13 Figure 4: Test Case Generation Framework according Gang You et al. (Source: 4. 2 Statistical Testing As already mentioned in 2. 1 reliability is defined as the conditional probability that the system will perform its intended function. This chapter will link the reliability of a system with the Markova usage model (see 2. 3). Let f: be a function that shows the failure probability of a software. The argument D represents the possible usage set of the software.Each element AXED is a usage path from quo (initial operation) to send (final operation) The relation between software reliability R and failure probability F is: R=l -F (2). In the assumed model the failure behavior of the software only depends on its usage path X and not on the input. This means that the input domain corresponding to the used X is homogeneous. The simplest way of obtaining unbiased reliability estimation of the software is to select N test paths XSL, XX, †¦ , CNN according to the usage model. The exult of the function f(Xi) is 1 if the path fails and O otherwise.Then the arithmetic 14 mean of f(Xi) is an unbiased estimate PEP(f(X)), which is the mathematical expectation of the software failure probability under transition matrix P. Hence, the software reliability can be expressed as R=l -PEP(f(X)) [3]. Critical operations are infrequently executed in real applications. This generates the problem that development organizations have to spend too much time when performing adequate statistical testing. Although one can overcome these drawbacks by increasing the execution probabilities of critical operations during statistical entire software under test. Yang Going et al. 3] found a possible approach to overcome this problem: Importance Sampling (IS) Based Safety-critical Software Statistical Testing Acceleration. IS Based Safety-critical Software Statistical Testing Acceleration This chapter presents the Is-based software statistical testing acceleration method. It ensures that the cr itical operations tested adequately by adjusting the transition probabilities in the matrix of the usage model, and at the same time, produces the unbiased reliability of the software under test. The IS technique reduces simulation run times hen estimating the probabilities of rare events by Monte Carlo simulations [3].For complex software with a large model matrix, the simulation procedure is often extremely time consuming. To overcome this problem, Yang Going et al. ‘s approach adopts a simulated annealing algorithm to calculate the optimal matrix Q. This widely used optimization method employs stochastic techniques to avoid being trapped in local optimal solution. The 16 exact mathematical explanation of this algorithm is complex and would be out of the scope of this paper. [3] 4. 3 Method Comparison Although model-based and statistical testing follow completely different approaches, the challenges are very similar.Both methods have to limit the extent and complexity of tes ting. Model-based testing reduces the number of test cases by restricting the state space domain of the Markova chain usage model. Whereas statistical testing reduces the number by changing the relation between critical and normal test cases with help off likelihood ratio. 5 Conclusion Today an increasing number of safety-critical applications are controlled by computer software. Therefore effective testing tools are required to provide a high degree of safety and to reduce severe failures to a minimum. The paper focused on

Sunday, January 5, 2020

Ancient Traders and Merchants of Mesoamerica

A strong market economy was a very important aspect of Mesoamerican cultures. Although much of our information about the market economy in Mesoamerica comes primarily from the Aztec/Mexica world during the Late Postclassic, there is clear evidence that markets played a major role throughout Mesoamerica in the diffusion of goods at least as recently as the Classic period. Further, it is clear that merchants were a high-status group of most of the Mesoamerican societies. Luxury Goods for the Elites Beginning during the Classic Period (AD 250-800/900), merchants supported urban specialists with raw materials and finished goods to convert into luxury goods for the elites, and exportable items for trade. Specific materials traded differed from region to region, but, in general, the merchant job involved acquiring, for example, coastal items such as shells, salt, exotic fish and marine mammals, and then exchanging them for materials from the inland such as precious stones, cotton and maguey fibers, cacao, tropical bird feathers, especially precious quetzal plumes, jaguar skins, and many other exotic items. Maya and Aztec Merchants Different types of merchants existed in ancient Mesoamerica: from local traders with central markets to regional merchants to the professional, long-distance merchants such as the Pochteca among the Aztecs and the Ppolom among the lowland Maya, known from Colonial records at the time of the Spanish conquest. These full-time merchants traveled over long distances and were often organized into guilds. All the information we have about their organization comes from the Late Postclassic when Spanish soldiers, missionaries, and officers--impressed with the organization of the Mesoamerican markets and merchants--left detailed documentation about their social organization and functioning. Among the Yucatec Maya, who traded along the coast with large canoes with other Maya groups as well as with Caribbean communities, these merchants were called Ppolom. The Ppolom were long-distance traders who usually came from noble families and leaded trading expeditions to acquire valuable raw materials. Probably, the most famous category of merchants in Postclassic Mesoamerica, though, was the one of the Pochteca, who were full-time, long-distance merchants as well as informants of the Aztec empire. The Spanish left a detailed description of the social and political role of this group in the Aztec society. This allowed historians and archaeologists to reconstruct in detail the lifestyle as well as the organization of the pochteca. Sources Davà ­d Carrasco (ed.), The Oxford Encyclopedia of Mesoamerican Cultures, vol. 2, Oxford University Press.