{"id":"https://openalex.org/W7125972046","doi":"https://doi.org/10.1109/smc58881.2025.11343677","title":"Formal Modeling and Quantitative Evaluation for Online Monitoring Systems in Nuclear Facilities","display_name":"Formal Modeling and Quantitative Evaluation for Online Monitoring Systems in Nuclear Facilities","publication_year":2025,"publication_date":"2025-10-05","ids":{"openalex":"https://openalex.org/W7125972046","doi":"https://doi.org/10.1109/smc58881.2025.11343677"},"language":null,"primary_location":{"id":"doi:10.1109/smc58881.2025.11343677","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343677","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124116236","display_name":"Letian Fang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]},{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Letian Fang","raw_affiliation_strings":["East China Normal University,Shanghai Key Laboratory of Trustworthy Computing,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"East China Normal University,Shanghai Key Laboratory of Trustworthy Computing,Shanghai,China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121299458","display_name":"Wenbing Tang","orcid":null},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Wenbing Tang","raw_affiliation_strings":["Nanyang Technological University,College of Computing and Data Science,Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University,College of Computing and Data Science,Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124076303","display_name":"Xin Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]},{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Wang","raw_affiliation_strings":["East China Normal University,Shanghai Key Laboratory of Trustworthy Computing,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"East China Normal University,Shanghai Key Laboratory of Trustworthy Computing,Shanghai,China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062450501","display_name":"J. Ping Liu","orcid":"https://orcid.org/0000-0003-4009-9159"},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]},{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Liu","raw_affiliation_strings":["East China Normal University,Shanghai Key Laboratory of Trustworthy Computing,Shanghai,China"],"affiliations":[{"raw_affiliation_string":"East China Normal University,Shanghai Key Laboratory of Trustworthy Computing,Shanghai,China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5124085614","display_name":"Shengyuan Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shengyuan Wang","raw_affiliation_strings":["Tsinghua University,Department of Computer Science and Technology,China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University,Department of Computer Science and Technology,China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5124116236"],"corresponding_institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.78132875,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"5125","last_page":"5130"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.34630000591278076,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.34630000591278076,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11125","display_name":"Petri Nets in System Modeling","score":0.12409999966621399,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11357","display_name":"Risk and Safety Analysis","score":0.11590000241994858,"subfield":{"id":"https://openalex.org/subfields/1804","display_name":"Statistics, Probability and Uncertainty"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.46459999680519104},{"id":"https://openalex.org/keywords/transformation","display_name":"Transformation (genetics)","score":0.461899995803833},{"id":"https://openalex.org/keywords/modeling-language","display_name":"Modeling language","score":0.43160000443458557},{"id":"https://openalex.org/keywords/model-transformation","display_name":"Model transformation","score":0.4074999988079071},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.3873000144958496},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.35830000042915344},{"id":"https://openalex.org/keywords/formal-methods","display_name":"Formal methods","score":0.34630000591278076},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.34549999237060547},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.33340001106262207}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7958999872207642},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.46459999680519104},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.461899995803833},{"id":"https://openalex.org/C179603123","wikidata":"https://www.wikidata.org/wiki/Q1941921","display_name":"Modeling language","level":3,"score":0.43160000443458557},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4187999963760376},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.41679999232292175},{"id":"https://openalex.org/C2779791154","wikidata":"https://www.wikidata.org/wiki/Q258040","display_name":"Model transformation","level":3,"score":0.4074999988079071},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.3873000144958496},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36899998784065247},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.35830000042915344},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.34630000591278076},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.34549999237060547},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.34369999170303345},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.33340001106262207},{"id":"https://openalex.org/C489000","wikidata":"https://www.wikidata.org/wiki/Q747385","display_name":"Data flow diagram","level":2,"score":0.33230000734329224},{"id":"https://openalex.org/C110963975","wikidata":"https://www.wikidata.org/wiki/Q12070446","display_name":"Systems modeling","level":2,"score":0.32749998569488525},{"id":"https://openalex.org/C201677973","wikidata":"https://www.wikidata.org/wiki/Q1209840","display_name":"Specification language","level":2,"score":0.32739999890327454},{"id":"https://openalex.org/C50897621","wikidata":"https://www.wikidata.org/wiki/Q2665508","display_name":"Hybrid system","level":2,"score":0.3260999917984009},{"id":"https://openalex.org/C3019813237","wikidata":"https://www.wikidata.org/wiki/Q65089264","display_name":"Model validation","level":2,"score":0.3224000036716461},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.3125},{"id":"https://openalex.org/C77405623","wikidata":"https://www.wikidata.org/wiki/Q598451","display_name":"System dynamics","level":2,"score":0.31040000915527344},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.29600000381469727},{"id":"https://openalex.org/C48002344","wikidata":"https://www.wikidata.org/wiki/Q2919644","display_name":"Verification and validation","level":2,"score":0.2912999987602234},{"id":"https://openalex.org/C2987858997","wikidata":"https://www.wikidata.org/wiki/Q7312160","display_name":"Monitoring and control","level":2,"score":0.2831000089645386},{"id":"https://openalex.org/C116253237","wikidata":"https://www.wikidata.org/wiki/Q1437424","display_name":"Formal specification","level":2,"score":0.27619999647140503},{"id":"https://openalex.org/C47822265","wikidata":"https://www.wikidata.org/wiki/Q854457","display_name":"Complex system","level":2,"score":0.2761000096797943},{"id":"https://openalex.org/C126433048","wikidata":"https://www.wikidata.org/wiki/Q7921324","display_name":"Verification and validation of computer simulation models","level":2,"score":0.2721000015735626},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.2662000060081482},{"id":"https://openalex.org/C200749887","wikidata":"https://www.wikidata.org/wiki/Q1165574","display_name":"System monitoring","level":2,"score":0.25949999690055847},{"id":"https://openalex.org/C146072743","wikidata":"https://www.wikidata.org/wiki/Q192161","display_name":"Formal language","level":2,"score":0.2567000091075897},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2565999925136566},{"id":"https://openalex.org/C107645828","wikidata":"https://www.wikidata.org/wiki/Q12070446","display_name":"System model","level":2,"score":0.25369998812675476}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smc58881.2025.11343677","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343677","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.48918208479881287,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2016401589","https://openalex.org/W2081306301","https://openalex.org/W2112685917","https://openalex.org/W2592147877","https://openalex.org/W2811472820","https://openalex.org/W2945959809","https://openalex.org/W3090654214","https://openalex.org/W3157343890","https://openalex.org/W3194643341","https://openalex.org/W3201118699","https://openalex.org/W4280644919","https://openalex.org/W4288708931","https://openalex.org/W4366384071","https://openalex.org/W4387304729","https://openalex.org/W4388145615","https://openalex.org/W4396782774"],"related_works":[],"abstract_inverted_index":{"Advanced":[0],"online":[1,95,131,165],"execution":[2],"monitoring":[3,96,132,166],"is":[4],"an":[5,130,164],"essential":[6],"system":[7,133,167],"for":[8,103,168],"ensuring":[9],"the":[10,41,45,51,58,90,105,127,146,151],"safety":[11],"of":[12,20,53,60,94,113,129,150],"nuclear":[13,170],"facilities.":[14],"Formal":[15],"modeling":[16,37,76,153],"and":[17,31,84,148,155],"quantitative":[18],"evaluation":[19],"these":[21],"systems":[22],"offer":[23],"a":[24,73,101,111,169],"promising":[25],"approach":[26],"to":[27,43,87],"verifying":[28],"their":[29,161],"behaviors":[30,93],"identifying":[32],"potential":[33],"vulnerabilities.":[34],"However,":[35],"existing":[36,121],"languages":[38],"often":[39],"lack":[40],"capability":[42],"represent":[44],"system\u2019s":[46],"control":[47,85],"flow":[48,83,86],"logic.":[49],"Additionally,":[50,98],"absence":[52],"automated":[54],"transformation":[55,156],"rules":[56],"hinders":[57],"verification":[59,65,119],"generated":[61],"models":[62],"using":[63],"available":[64],"tools.":[66],"Hence,":[67],"in":[68,163],"this":[69],"paper,":[70],"we":[71,99],"propose":[72],"novel":[74],"synchronous":[75],"language,":[77],"Hybrid":[78,106],"SynLong,":[79],"which":[80],"integrates":[81],"data":[82],"effectively":[88],"describe":[89],"real-time":[91],"dynamic":[92],"systems.":[97],"present":[100],"method":[102],"converting":[104],"SynLong":[107],"language":[108,154],"model":[109,123],"into":[110],"network":[112],"stochastic":[114],"hybrid":[115],"automata,":[116],"enabling":[117],"direct":[118],"with":[120],"statistical":[122],"checkers.":[124],"In":[125],"consequence,":[126],"performance":[128],"can":[134],"be":[135],"quantitatively":[136],"evaluated":[137],"by":[138],"executing":[139],"well-defined":[140],"queries.":[141],"The":[142],"experimental":[143],"results":[144],"illustrate":[145],"effectiveness":[147],"efficiency":[149],"proposed":[152],"algorithms,":[157],"as":[158],"demonstrated":[159],"through":[160],"application":[162],"plant.":[171]},"counts_by_year":[],"updated_date":"2026-01-29T23:17:01.242718","created_date":"2026-01-29T00:00:00"}
