A SCADE Model Verification Method Based on B-Model Transformation Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.2505.00967
Due to the limitations of SCADE models in expressing and verifying abstract specifications in safety-critical systems, this study proposes a formal verification framework based on the B-Method. By establishing a semantic equivalence transformation mechanism from SCADE models to B models, a hierarchical mapping rule set is constructed, covering type systems, control flow structures, and state machines. This effectively addresses key technical challenges such as loop-equivalent transformation proof for high-order operators and modeling of temporal logic storage structures. The proposed method innovatively leverages the abstraction capabilities of B-Method in set theory and first-order logic, overcoming the constraints of native verification tools of SCADE in complex specification descriptions. It successfully verifies abstract specifications that are difficult to model directly in SCADE. Experimental results show that the transformed B models achieve a higher defect detection rate and improved verification efficiency in the ProB verification environment compared to the native verifier of SCADE, significantly enhancing the formal verification capability of safety-critical systems. This study provides a cross-model verification paradigm for embedded control systems in avionics, rail transportation, and other domains, demonstrating substantial engineering application value.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://arxiv.org/abs/2505.00967
- https://arxiv.org/pdf/2505.00967
- OA Status
- green
- OpenAlex ID
- https://openalex.org/W4414769668
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4414769668Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48550/arxiv.2505.00967Digital Object Identifier
- Title
-
A SCADE Model Verification Method Based on B-Model TransformationWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-05-02Full publication date if available
- Authors
-
X. -L. Hou, Keming Wang, Zhao Hui-bing, Rongpei ShiList of authors in order
- Landing page
-
https://arxiv.org/abs/2505.00967Publisher landing page
- PDF URL
-
https://arxiv.org/pdf/2505.00967Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/2505.00967Direct OA link when available
- Cited by
-
0Total citation count in OpenAlex
Full payload
| id | https://openalex.org/W4414769668 |
|---|---|
| doi | https://doi.org/10.48550/arxiv.2505.00967 |
| ids.doi | https://doi.org/10.48550/arxiv.2505.00967 |
| ids.openalex | https://openalex.org/W4414769668 |
| fwci | |
| type | preprint |
| title | A SCADE Model Verification Method Based on B-Model Transformation |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T13734 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9363999962806702 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Advanced Computational Techniques and Applications |
| topics[1].id | https://openalex.org/T11986 |
| topics[1].field.id | https://openalex.org/fields/18 |
| topics[1].field.display_name | Decision Sciences |
| topics[1].score | 0.9193000197410583 |
| topics[1].domain.id | https://openalex.org/domains/2 |
| topics[1].domain.display_name | Social Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1802 |
| topics[1].subfield.display_name | Information Systems and Management |
| topics[1].display_name | Scientific Computing and Data Management |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| language | en |
| locations[0].id | pmh:oai:arXiv.org:2505.00967 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | |
| locations[0].pdf_url | https://arxiv.org/pdf/2505.00967 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | text |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | http://arxiv.org/abs/2505.00967 |
| locations[1].id | doi:10.48550/arxiv.2505.00967 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | cc-by |
| locations[1].pdf_url | |
| locations[1].version | |
| locations[1].raw_type | article |
| locations[1].license_id | https://openalex.org/licenses/cc-by |
| locations[1].is_accepted | False |
| locations[1].is_published | |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://doi.org/10.48550/arxiv.2505.00967 |
| indexed_in | arxiv, datacite |
| authorships[0].author.id | https://openalex.org/A5038996153 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-3865-8380 |
| authorships[0].author.display_name | X. -L. Hou |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Hou, Xili |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5101705666 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-1801-7508 |
| authorships[1].author.display_name | Keming Wang |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Wang, Keming |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5033315771 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Zhao Hui-bing |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Zhao, Huibing |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5082022175 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-5007-4249 |
| authorships[3].author.display_name | Rongpei Shi |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Shi, Ruiyin |
| authorships[3].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/2505.00967 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | A SCADE Model Verification Method Based on B-Model Transformation |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T06:51:31.235846 |
| primary_topic.id | https://openalex.org/T13734 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9363999962806702 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Advanced Computational Techniques and Applications |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:2505.00967 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/2505.00967 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/2505.00967 |
| primary_location.id | pmh:oai:arXiv.org:2505.00967 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | |
| primary_location.pdf_url | https://arxiv.org/pdf/2505.00967 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | text |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | http://arxiv.org/abs/2505.00967 |
| publication_date | 2025-05-02 |
| publication_year | 2025 |
| referenced_works_count | 0 |
| abstract_inverted_index.B | 38, 125 |
| abstract_inverted_index.a | 19, 29, 40, 128, 161 |
| abstract_inverted_index.By | 27 |
| abstract_inverted_index.It | 106 |
| abstract_inverted_index.as | 63 |
| abstract_inverted_index.in | 7, 13, 87, 102, 117, 137, 169 |
| abstract_inverted_index.is | 45 |
| abstract_inverted_index.of | 4, 72, 85, 96, 100, 147, 155 |
| abstract_inverted_index.on | 24 |
| abstract_inverted_index.to | 1, 37, 114, 143 |
| abstract_inverted_index.Due | 0 |
| abstract_inverted_index.The | 77 |
| abstract_inverted_index.and | 9, 53, 70, 90, 133, 173 |
| abstract_inverted_index.are | 112 |
| abstract_inverted_index.for | 67, 165 |
| abstract_inverted_index.key | 59 |
| abstract_inverted_index.set | 44, 88 |
| abstract_inverted_index.the | 2, 25, 82, 94, 123, 138, 144, 151 |
| abstract_inverted_index.ProB | 139 |
| abstract_inverted_index.This | 56, 158 |
| abstract_inverted_index.flow | 51 |
| abstract_inverted_index.from | 34 |
| abstract_inverted_index.rail | 171 |
| abstract_inverted_index.rate | 132 |
| abstract_inverted_index.rule | 43 |
| abstract_inverted_index.show | 121 |
| abstract_inverted_index.such | 62 |
| abstract_inverted_index.that | 111, 122 |
| abstract_inverted_index.this | 16 |
| abstract_inverted_index.type | 48 |
| abstract_inverted_index.SCADE | 5, 35, 101 |
| abstract_inverted_index.based | 23 |
| abstract_inverted_index.logic | 74 |
| abstract_inverted_index.model | 115 |
| abstract_inverted_index.other | 174 |
| abstract_inverted_index.proof | 66 |
| abstract_inverted_index.state | 54 |
| abstract_inverted_index.study | 17, 159 |
| abstract_inverted_index.tools | 99 |
| abstract_inverted_index.SCADE, | 148 |
| abstract_inverted_index.SCADE. | 118 |
| abstract_inverted_index.defect | 130 |
| abstract_inverted_index.formal | 20, 152 |
| abstract_inverted_index.higher | 129 |
| abstract_inverted_index.logic, | 92 |
| abstract_inverted_index.method | 79 |
| abstract_inverted_index.models | 6, 36, 126 |
| abstract_inverted_index.native | 97, 145 |
| abstract_inverted_index.theory | 89 |
| abstract_inverted_index.value. | 180 |
| abstract_inverted_index.achieve | 127 |
| abstract_inverted_index.complex | 103 |
| abstract_inverted_index.control | 50, 167 |
| abstract_inverted_index.mapping | 42 |
| abstract_inverted_index.models, | 39 |
| abstract_inverted_index.results | 120 |
| abstract_inverted_index.storage | 75 |
| abstract_inverted_index.systems | 168 |
| abstract_inverted_index.B-Method | 86 |
| abstract_inverted_index.abstract | 11, 109 |
| abstract_inverted_index.compared | 142 |
| abstract_inverted_index.covering | 47 |
| abstract_inverted_index.directly | 116 |
| abstract_inverted_index.domains, | 175 |
| abstract_inverted_index.embedded | 166 |
| abstract_inverted_index.improved | 134 |
| abstract_inverted_index.modeling | 71 |
| abstract_inverted_index.paradigm | 164 |
| abstract_inverted_index.proposed | 78 |
| abstract_inverted_index.proposes | 18 |
| abstract_inverted_index.provides | 160 |
| abstract_inverted_index.semantic | 30 |
| abstract_inverted_index.systems, | 15, 49 |
| abstract_inverted_index.systems. | 157 |
| abstract_inverted_index.temporal | 73 |
| abstract_inverted_index.verifier | 146 |
| abstract_inverted_index.verifies | 108 |
| abstract_inverted_index.B-Method. | 26 |
| abstract_inverted_index.addresses | 58 |
| abstract_inverted_index.avionics, | 170 |
| abstract_inverted_index.detection | 131 |
| abstract_inverted_index.difficult | 113 |
| abstract_inverted_index.enhancing | 150 |
| abstract_inverted_index.framework | 22 |
| abstract_inverted_index.leverages | 81 |
| abstract_inverted_index.machines. | 55 |
| abstract_inverted_index.mechanism | 33 |
| abstract_inverted_index.operators | 69 |
| abstract_inverted_index.technical | 60 |
| abstract_inverted_index.verifying | 10 |
| abstract_inverted_index.capability | 154 |
| abstract_inverted_index.challenges | 61 |
| abstract_inverted_index.efficiency | 136 |
| abstract_inverted_index.expressing | 8 |
| abstract_inverted_index.high-order | 68 |
| abstract_inverted_index.overcoming | 93 |
| abstract_inverted_index.abstraction | 83 |
| abstract_inverted_index.application | 179 |
| abstract_inverted_index.constraints | 95 |
| abstract_inverted_index.cross-model | 162 |
| abstract_inverted_index.effectively | 57 |
| abstract_inverted_index.engineering | 178 |
| abstract_inverted_index.environment | 141 |
| abstract_inverted_index.equivalence | 31 |
| abstract_inverted_index.first-order | 91 |
| abstract_inverted_index.limitations | 3 |
| abstract_inverted_index.structures, | 52 |
| abstract_inverted_index.structures. | 76 |
| abstract_inverted_index.substantial | 177 |
| abstract_inverted_index.transformed | 124 |
| abstract_inverted_index.Experimental | 119 |
| abstract_inverted_index.capabilities | 84 |
| abstract_inverted_index.constructed, | 46 |
| abstract_inverted_index.establishing | 28 |
| abstract_inverted_index.hierarchical | 41 |
| abstract_inverted_index.innovatively | 80 |
| abstract_inverted_index.successfully | 107 |
| abstract_inverted_index.verification | 21, 98, 135, 140, 153, 163 |
| abstract_inverted_index.demonstrating | 176 |
| abstract_inverted_index.descriptions. | 105 |
| abstract_inverted_index.significantly | 149 |
| abstract_inverted_index.specification | 104 |
| abstract_inverted_index.specifications | 12, 110 |
| abstract_inverted_index.transformation | 32, 65 |
| abstract_inverted_index.loop-equivalent | 64 |
| abstract_inverted_index.safety-critical | 14, 156 |
| abstract_inverted_index.transportation, | 172 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 4 |
| citation_normalized_percentile |