Next Article in Journal
What Drives Authorization in Mobile Applications? A Perspective of Privacy Boundary Management
Previous Article in Journal
Image Watermarking Approach Using a Hybrid Domain Based on Performance Parameter Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Reasoning Method between Polynomial Error Assertions

1
School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China
2
School of Innovation, Design and Engineering, Mälardalen University, 72123 Västerås, Sweden
3
School of Mathematics and Physics, Guangxi University for Nationalities, Nanning 530006, China
*
Authors to whom correspondence should be addressed.
Information 2021, 12(8), 309; https://doi.org/10.3390/info12080309
Submission received: 30 May 2021 / Revised: 25 July 2021 / Accepted: 27 July 2021 / Published: 30 July 2021

Abstract

:
Error coefficients are ubiquitous in systems. In particular, errors in reasoning verification must be considered regarding safety-critical systems. We present a reasoning method that can be applied to systems described by the polynomial error assertion (PEA). The implication relationship between PEAs can be converted to an inclusion relationship between zero sets of PEAs; the PEAs are then transformed into first-order polynomial logic. Combined with the quantifier elimination method, based on cylindrical algebraic decomposition, the judgment of the inclusion relationship between zero sets of PEAs is transformed into judgment error parameters and specific error coefficient constraints, which can be obtained by the quantifier elimination method. The proposed reasoning method is validated by proving the related theorems. An example of intercepting target objects is provided, and the correctness of our method is tested through large-scale random cases. Compared with reasoning methods without error semantics, our reasoning method has the advantage of being able to deal with error parameters.

1. Introduction

Formal verification includes two main approaches: model-checking and theorem-proving. Model-checking, proposed by Clarke and Emerson, verifies safety properties by searching the state space [1,2]. In contrast, theorem-proving uses logic and mathematical reasoning to verify the safety properties of a piece of software [3]. These two approaches have complementary advantages [4,5] and are widely used in industries [6,7,8]. Reasoning methods in theorem-proving belong to the field of deductive reasoning, comprising syntax, semantics, and reasoning rules; and numerous research studies have been conducted in this area. Labeled transition systems or their similar structures are widely used in the field of formal verification, which is a common technical method for describing the transition behavior of systems [9]. In particular, the states and transition conditions of systems are defined by two-valued logic propositions. However, two-valued or multi-valued logic is inadequate to describe the state of complex systems [10]. The real polynomial algebraic transition system extends the domain space of multivalued logic to the real number domain, which can more effectively describe complex systems and verify their safety properties [11]. Particularly in the field of hybrid system verification [12], numerous theories based on differential invariants have been proposed [13,14,15].
Semantics, grammar, and reasoning rules have been extensively studied in the field of reasoning methods [16]. However, the system parameters are sometimes not precisely determined in complex systems. In most cases, only the value ranges of these parameters are known [17,18], thereby making the reasoning and verification of these systems more complex. However, few reports on the semantic descriptions of errors have been published. For example, the Gröbner basis is widely used in polynomial-based theorem-proving methods. However, as the Gröbner basis of polynomial equations does not vary continuously along with the parameters, it significantly increases the difficulty of dealing with error parameters in reasoning methods. In engineering, absolute accuracy is neither possible nor necessary. For example, when the temperature reaches 80 °C, the system stops heating; this is called a guard condition. However, precise measurements are not possible because the measurement often contains errors. Owing to the accumulation of multiple error variables, the system may undergo the wrong transitions. This is unacceptable for safety-critical systems. For example, a guard condition is f ( x 1 , x 2 , , x n ) < 100 , where x 1 , x 2 , , x n are the values measured by instruments and f is a function of x 1 , x 2 , , x n . Because x 1 , x 2 , , x n are all measured values, the calculations cannot be completely accurate. In this way, errors may be further accumulated in the calculation of the function value f ( x 1 , x 2 , , x n ) . In other words, the calculation result may conclude that the guard condition f ( x 1 , x 2 , , x n ) < 100 is satisfied, when, in fact, it is perhaps not correct. Especially in the case of the disturbance-sensitive function, minor parameter changes can lead to completely different results. However, several studies on reasoning methods involve error parameters. The authors previously proposed a reasoning method for linear error assertion (LEA) [19]. In this method, combined with the convex properties of LEA, the conclusion that vertexes of the precursor assertion are contained in the zero set of the successor assertion can be used to determine whether there is an implication relationship between precursor assertion and successor assertion. However, zero sets of nonlinear assertions may not be a convex set, indicating that the method reported in [19] is ineffective in dealing with nonlinear error assertion.
Error semantics based on interval numbers can be transformed into an inequality relationship. This implies that some theorems of inequality-proving may be promising for nonlinear error assertions. For example, a ¯ = [ a , a + ] can be transformed into: a a ¯ a + . Quantifier elimination methods used in reasoning methods between polynomial error assertions (PEAs) are introduced in this study. The inclusion relationships of the zero sets of the PEAs are transformed into the quantifier elimination problems of semi-algebraic first-order logic. Our reasoning method can be used to verify systems described by PEAs.

2. Preliminary

2.1. Error Intervals

Errors are common and inevitable. This section presents the error semantics represented by the intervals and their operation rules. Errors were quantitatively characterized using interval numbers. The interval numbers generalize real numbers and have been successfully applied in numerous areas [20,21]. The definition and operation rules of the interval numbers are introduced below.
Let a ¯ = [ a , a + ] , b ¯ = [ b , b + ] , c be a constant.
For addition:
{ c + a ¯ = [ a + c , a + + c ] a ¯ + b ¯ = [ a + b , a + + b + ]
For subtraction:
{ a ¯ b ¯ = [ a b + , a + b ] a ¯ c = [ a c , a + c ]
For multiplication:
a ¯ b ¯ = [ min ( a b , a b + , a + b , a + b + ) , max ( a b , a b + , a + b , a + b + )
In particular, when a ¯ 0 ,   b ¯ 0 , then:
a b = [ a b , a + b + ]
when c > 0 , then:
c a ¯ = [ c a , c a + ]
when c < 0 , then:
c a ¯ = [ c a + , c a ]
and when c = 0 , then:
c a ¯ = [ 0 , 0 ] = 0
For division, when c > 0 , then:
a ¯ / c = [ a / c , a + / c ]
and when c < 0 , then:
a ¯ / c = [ a + / c , a / c ]
The error intervals generalize real numbers, where a = a + , a ¯ is the real number. However, the four arithmetic operations of the interval numbers defined above are irreversible. An example is provided as follows.
If a is a real number, then the equation a + bb = a must hold. However, if a and b are interval numbers, the previous equation does not necessarily hold.
Let a ¯ = [ a , a + ] and b ¯ = [ b , b + ] .
From the operation rules above, Formula (10) is obtained:
a ¯ + b ¯ - b ¯ = [ a + b , a + + b + ] - b ¯ = [ a + b - b + , a + + b + - b ] a ¯
Formula (10) implies that the reasoning process is irreversible (that is, the conclusion of the reasoning is only one necessary condition, and not the necessary and sufficient condition for the premise) and does not imply that the four operation rules with interval numbers are incorrect in reasoning methods. The increase in the number of operations, with interval numbers in the reasoning process, may lead to meaningless results. Therefore, it is essential to try other methods in the reasoning process, and this study provides a possible approach.

2.2. Polynomial Error Assertion

In this section, we introduce some of the mathematical concepts that have been established and are involved in our method (Definitions 1, 2, and 3). We also introduce the definitions of PEA and the zero set of PEAs (Definitions 4 and 5) that are contributed by this study.
Definition 1.
A real polynomial is a mathematical expression that comprises several terms. Each term includes one or more variables raised to power and is multiplied by a real coefficient. The general form of a polynomial with m terms is given by Formula (11):
f ( x 1 , x 2 , , x n ) = i = 0 m c i x 1 α i 1 x 2 α i 2 x n α i n
Let [ x 1 , , x n ] be the set of all real polynomials. An example of a real polynomial is as follows:
f 1 ( x 1 , x 2 , x 3 ) = 3 x 1 3 x 2 + x 1 2 + 2 x 2
Definition 2
(Real zero set of real polynomials, i.e., zero set of polynomials).Let f ( x 1 , , x n ) [ x 1 , , x n ] . The real zero set of f ( x 1 , , x 2 ) is expressed as (13), denoted by Z e r o ( f ) :
Z e r o ( f ) = { ( x 1 , , x n ) | f ( x 1 , , x 2 ) = 0 , a n d   ( x 1 , , x n ) n }
Definition 3
(Real zero set of polynomials group).Let  φ be a polynomial group comprising f 1 , f 2 , , f n , which is expressed as (14), and: f 1 [ x 1 , , x n ] , f 2 [ x 1 , , x n ] , , f n [ x 1 , , x n ] .
φ = { f 1 ( x 1 , , x n ) = 0 f 2 ( x 1 , , x n ) = 0 f n ( x 1 , , x n ) = 0
The real zero set of φ , denoted by Z e r o ( φ ) , satisfies Formula (15).
Z e r o ( φ ) = Z e r o ( f 1 ) Z e r o ( f 2 ) , , Z e r o ( f n )
The definition of the polynomial error assertion is provided below.
Definition 4
(Polynomial error assertion, i.e., PEA). φ ¯ is a PEA if  φ ¯ and  f 1 ¯ , f 2 ¯ , , f n ¯ satisfy Formulas (16)and (17), respectively.
φ ¯ = { f 1 ¯ ( x 1 , , x n ) = 0 f 2 ¯ ( x 1 , , x n ) = 0 f n ¯ ( x 1 , , x n ) = 0
f i ¯ ( x 1 , , x n ) = j = 0 m c i j ¯ x 1 α i j 1 x 2 α i j 2 x n α i j n , i = 1 , 2 n c j ¯ = [ c j , c j + ] j = 0 , m
Definition 5
(Real zero set of PEAs, zero set of PEAs). φ ¯ is a PEA. The real zero set of φ ¯ , denoted by  z e r o ( φ ¯ ) , satisfies Formula (18).
z e r o ( φ ¯ ) = z e r o ( f 1 ¯ ) z e r o ( f 2 ¯ ) z e r o ( f n ¯ )
In addition, z e r o ( f 1 ¯ ) , z e r o ( f 2 ¯ ) , , z e r o ( f n ¯ ) satisfies Formula (19).
z e r o ( f i ¯ ) = { ( x 1 , , x n ) | c i j c i j ¯ ,   a n d j = 0 m i c i j x 1 α i j 1 x 2 α i j 2 x n α i j n = 0 , a n d   ( x 1 , , x n ) n }
From Definition 5, z e r o ( φ ¯ ) contains all possible solutions of Formula (19) owing to the error coefficients. Therefore, all possible states of the system generated by the error parameters can be defined using z e r o ( φ ¯ ) . In engineering, if some system states are not found to be under z e r o ( φ ¯ ) , this indicates that there are non-error factors affecting the system. Moreover, determining whether there are some mechanical failures in the system is necessary.

2.3. Implication Relationships

The implication relationship between assertions is the fundamental rule in the reasoning method based on theorem-proving. We introduce the equivalent expression of the implication relationship between polynomials and zero sets in Theorems 1 and 2, respectively.
Theorem 1.
φ 1 implies  φ 2 (denoted as  φ 1 | = φ 2 ) iff Z e r o ( φ 1 ) Z e r o ( φ 2 ) , where  φ 1 and φ 2 are the two polynomials.
In Theorem 1, the comprehensible statement of the implication relationship ( φ 1 | = φ 2 ) is as follows: if φ 1 is true, then φ 2 must be true. For example, φ 1 :   x 1 = 0 , φ 2 :   x 2 3 x + 2 = 0 , then φ 1 | = φ 2 must be true. Apparently, if the formula x 1 = 0 holds, then x 2 1 = 0 must be true. The formula Z e r o ( φ 1 ) Z e r o ( φ 2 ) is obtained using Theorem 1. Indeed, Z e r o ( φ 1 ) Z e r o ( φ 2 ) must hold because { 1 } { 1 ,   2 } .
Theorem 2.
φ ¯ 1 implies  φ ¯ 2 (denoted as  φ ¯ 1 | = φ ¯ 2 ) iff Z e r o ( φ ¯ 1 ) Z e r o ( φ ¯ 2 ) , where  φ ¯ 1 and  φ ¯ 2 are the two PEAs.
The significance of Z e r o ( φ ¯ ) lies in all possible system states produced by error coefficients. Conversely, if the security state zone of the system is defined by Z e r o ( φ ¯ 2 ) , and, at a certain moment, the system state x = ( x 1 , x 2 , , x n ) satisfies ( x 1 , x 2 , , x n ) Z e r o ( φ 2 ¯ ) , then state x is unsafe for the system. If the security state zone of the system is defined by Z e r o ( φ ¯ 2 ) , and if Z e r o ( φ 1 ¯ ) Z e r o ( φ 2 ¯ ) is held, it implies that all states in Z e r o ( φ 1 ¯ ) are safe.

3. Problem Descriptions

Let φ ¯ 1 and φ ¯ 2 be two PEAs; we must determine whether Z e r o ( φ 1 ¯ ) Z e r o ( φ 2 ¯ ) holds. This question has safety significance in safety-critical systems. For example, considering the safety states of the system are designed using Z e r o ( φ 2 ¯ ) according to the given error coefficients, the mechanical or electrical capability of the system meets the given design requirements and error tolerances. However, this does not mean that all possible error assignments can be met for the system design. For example, when extreme weather conditions occur, one of the error coefficients exceeds the given error range. At this time, it is necessary to identify whether the system can still not exceed the design requirements under the new parameter assignments. When φ ¯ 1 and φ ¯ 2 are both non-linear PEA, the vertex judgment method (VJM) in [19] is invalid. The idea of VJM is that φ ¯ 1 and φ ¯ 2 are linear algebraic assertions. φ ¯ 1 | = φ ¯ 2 is true if all vertices ( v 1 , v 2 , , v 2 n ) φ ¯ 1 satisfy the formula v 1 Z e r o ( φ 2 ¯ ) , v 2 Z e r o ( φ 2 ¯ ) , , v 2 n Z e r o ( φ 2 ¯ ) . However, VJM is based on convex conditions Z e r o ( φ 2 ¯ ) . The convex set has a property that all points inside it (including its boundary) can be generated finitely by its vertices. Moreover, if all the vertices of Z e r o ( φ 1 ¯ ) are within Z e r o ( φ 2 ¯ ) (including the boundary), then Z e r o ( φ 1 ¯ ) Z e r o ( φ 2 ¯ ) must hold. Unfortunately, Z e r o ( φ 2 ¯ ) is not a convex set when φ ¯ 2 is a nonlinear PEA. For example, in Formula (45) in Section 5, Z e r o ( φ 2 ¯ ) is not a convex set, and Z e r o ( φ 2 ¯ ) is shown as the red part in Figure 1. Obviously, both A and B are inside Z e r o ( φ 2 ¯ ) , but some points on the line segment of AB are no longer inside Z e r o ( φ 2 ¯ ) .
Therefore, VJM is invalid for PEA. For example, Figure 2a clearly shows that the rectangle ABCD is a convex set, and points A, B, C, and D are the vertices of the rectangle. When vertices A, B, C, and D are all inside the diamond-shaped EFGH, it can be concluded that all the points inside the rectangle ABCD are inside the diamond-shaped EFGH. However, the closed area formed by the line segments EF, FG, GH, HE (the area is shorted for EFGH) in Figure 2b is also a convex set, as seen in the red area in Figure 1. Although vertices A, B, C, and D of the rectangle ABCD are all inside the non-convex EFGH (including the boundary), the red part in the rectangle ABCD remains outside EFGH.
The following section introduces a method of identifying the relationship between non-linear PEAs and the mathematical definitions involved.

4. Reasoning Method between PEAs

4.1. Two Mathematical Definitions

The constant coefficients—the semi-algebraic system (CSS) [22] and first-order polynomial logic formulas [14]—are introduced in Definitions 6 and 7, respectively. After Definition 6, the method of transforming PEA into a CSS is provided.
Definition 6 (CSS).
Formula (20) represents the general form of a CSS:
{ p 1 ( x 1 , , x n ) = 0 , , p s ( x 1 , , x n ) = 0 , g 1 ( x 1 , , x n ) 0 , , g r ( x 1 , , x n ) 0 , g r + 1 ( x 1 , , x n ) > 0 , , g t ( x 1 , , x n ) > 0 , h 1 ( x 1 , , x n ) 0 , , h m ( x 1 , , x n ) 0 ,
Among them, p 1 , , p s , g 1 , , g t , h 1 , , h m are all real coefficient polynomials. CSS has a wide range of applications in terms of geometry, topology, and differential dynamics.
The given PEA can be transformed into a CSS. The general conversion method is as follows.
A PEA comprises multiple error polynomials. f ¯ ( x 1 , , x n ) is the error polynomial in the general form, as in Formula (17). The equivalent CSS is then shown in Formula (21):
{ j = 0 m c j ¯ x 1 α j 1 x 2 α j 2 x n α j n = 0 , c 1 + c 1 , , c j + c j , c 1 c 1 , , c j c j ,
Thus, a PEA can be transformed into an equivalent CSS.
Definition 7.
A first-order polynomial logic comprises the following four parts:
(1) 
Terms of polynomial, which comprise these variables ( x 1 , , x n or x , y , z ) in ;
(2) 
Relational symbols: = , , < , , > , ;
(3) 
Boolean connectives: , , ¬ , , ;
(4) 
Quantifiers: , .
For example, Formula (22) is a first-order polynomial logic:
x y ( ( x 2 + y 2 < 4 ) ( x 2 + y 2 > 1 ) )
Accordingly, a CSS can be equivalently transformed into a first-order polynomial logic, as shown in Formula (23):
{ x 2 + y 2 < 4 x 2 + y 2 > 1 x > 0 ( x 2 + y 2 < 4 ) ( x 2 + y 2 > 1 ) ( x > 0 )

4.2. Quantifier Elimination

This section briefly introduces the quantifier elimination method, based on cylindrical algebraic decomposition (CAD). Tarski modified the reasoning process based on first-order logic to judge the inclusion relationship of specific sets. However, Tarski’s algorithm has a high time complexity for the problem of quantifier elimination [23]. The CAD algorithm was first proposed by Collins [24] and has been further improved by many researchers. At present, it is widely used in quantifier elimination problems. Xia et al. first implemented the CAD algorithm on Maple [25]. The CAD algorithm can equivalently convert first-order polynomial logic with quantifiers into a formula without quantifiers. The algorithm first selects an appropriate projection operator (Proj), which projects a first-order logic formula with r variables to a first-order logic formula with only r − 1 variables. Then, it iteratively applies the projection operator Proj, thereby obtaining several first-order logic formulas with r − 1, r − 2, …, 1 variables. Subsequently, the real root isolation algorithm is applied to these first-order logic formulas, such that the r space is divided into several cells. All the points in a certain cell have the same sign on each subformula in this first-order polynomial logic. Hence, an arbitrary point in each cell can be selected to verify each formula in first-order polynomial logic, thereby providing an equivalent quantifier-free formula. The quantifier elimination method has been applied to many contexts [26,27,28]. Certain scholars have made some progress in the poly-complexity quantifier elimination method in the field of symbolic computation [29]. In this study, Q E (   ) denotes the quantifier elimination method.
For example, f is a first-order polynomial logic, such as in Formula (24). After eliminating the quantifier for f (denoted as Q E ( f ) ), the equivalent non-quantifier formula of f is as Formula (25):
f = y ( ( x 2 + y 2 < 1 ) ( 2 < x 3 + y < 2 ) )
f Q E ( f ) 1 < x < 1

4.3. Reasoning Method between PEAs

This section introduces some theorems proposed in this study (Lemma 1, Theorem 3, and Definitions 8 and 9), and the steps of the reasoning method between PEAs.
Lemma 1.
f 1 ¯ and f 2 ¯ are two error polynomials, expressed in Formula (26), and are arranged in the same alphabetical order. If  c 1 j ¯ c 2 j ¯ , j = 0 , 1 , , m and α 1 j 1 = α 2 j 1 , α 1 j 2 = α 2 j 2 , , α 1 j m = α 2 j m are true, then  Z e r o ( f 1 ¯ ) Z e r o ( f 2 ¯ ) must hold.
{ f 1 ¯ ( x 1 , , x n ) = j = 0 m c 1 j ¯ x 1 α 1 j 1 x 2 α 1 j 2 x n α 1 j n f 2 ¯ ( x 1 , , x n ) = j = 0 m c 2 j ¯ x 1 α 2 j 1 x 2 α 2 j 2 x n α 2 j n
Proof. 
Let c 1 j ¯ = [ c 1 j , c 1 j + ] , c 2 j ¯ = [ c 2 j , c 2 j + ] . From c 1 j ¯ c 2 j ¯ , the Formula (27) is obtained:
c 2 j ¯ = c 1 j ¯ [ c 2 j , c 1 j ] [ c 1 j + , c 1 j + ]
According to Definition 5, Formula (28) can be obtained:
Z e r o ( f 2 ¯ ) = { ( x 1 , , x n ) | c 2 j c 2 j ¯ ,   a n d j = 0 m c 2 j x 1 α 2 j 1 x 2 α 2 j 2 x n α 2 j n = 0 } = { ( x 1 , , x n ) | c 2 j ( c 1 j ¯ [ c 2 j , c 1 j ] [ c 1 j + , c 1 j + ] ) ,   a n d j = 0 m c 2 j x 1 α 2 j 1 x 2 α 2 j 2 x n α 2 j n = 0 } = Z e r o ( f 1 ¯ ) { ( x 1 , , x n ) | c 2 j ( [ c 2 j , c 1 j ] [ c 1 j + , c 1 j + ] ) , a n d   j = 0 m c 2 j x 1 α 2 j 1 x 2 α 2 j 2 x n α 2 j n = 0 }
Therefore, the formula Z e r o ( f 1 ¯ ) Z e r o ( f 2 ¯ ) holds.
For example, because [ 1 , 2 ] [ 1 , 3 ] , Formula (29) must hold.
Z e r o ( [ 1 , 2 ] x 2 5 x 1 = 0 ) Z e r o ( [ 1 , 3 ] x 2 5 x 1 = 0 )
Some symbols used in Theorem 3, and the reasoning method in this article, are provided in Definitions 7 and 8.
Definition 8.
Let  φ be the CSS equivalent to  φ ¯ , where  φ ¯ is a PEA.
For example, φ ¯ : y 2 [ c 1 , c 1 + ] x 2 + x + [ c 2 , c 2 + ] = 0 . The equivalent CSS of φ ¯ is represented by Formula (30):
φ = { y 2 c 1 x 2 + x + c 2 = 0 c 1 c 1 c 1 + c 2 c 2 c 2 +
Definition 9.
φ s is a real polynomial equation system that replaces all error coefficients in  φ ¯ with symbols.
For example, φ ¯ : y 2 [ c 1 , c 1 + ] x 2 + x + [ c 2 , c 2 + ] = 0 . Formula (31) demonstrates the symbolized Formula φ s :
φ s : y 2 c 1 x 2 + x + c 2 = 0
Theorem 4.
φ ¯ 1 and  φ ¯ 2 are two PEAs, and the error coefficients in  φ ¯ 1 and  φ ¯ 2 are provided. The equivalent CSS corresponding to  φ ¯ 2 is  φ 2 , presented in Definition 8. The symbolized formula of  φ ¯ 1 is  φ 1 s , as expressed in Definition 9.
Assuming that all the error coefficients of φ ¯ 1 are  c 11 = [ c 11 , c 11 + ] , c 12 = [ c 12 , c 12 + ] , , c 1 n = [ c 1 n , c 1 n + ] and all error coefficients of φ ¯ 2 are c 21 = [ c 21 , c 21 + ] , c 22 = [ c 22 , c 22 + ] , , c 2 m = [ c 2 m , c 2 m + ] .
Then, if Formula (32) holds, Z e r o ( φ 1 ¯ ) Z e r o ( φ 2 ¯ ) must be true:
{ c 11 , , c 1 n | ( c 11 c 11 c 11 + ) ( c 1 n c 1 n c 1 n + ) } { c 11 , , c 1 n | Q E ( x 1 , , x n , c 21 [ c 21 , c 21 + ] , , c 2 m [ c 2 m , c 2 m + ] , φ 1 s | = φ 2 ¯ ) }
Proof. 
Let φ 1 s ¯ = ( φ 1 s ( c 11 , , c 1 n ) { c 11 , , c 1 n | Q E ( x 1 , , x n , c 21 [ c 21 , c 21 + ] , , c 2 m [ c 2 m , c 2 m + ] , φ 1 s | = φ 2 ¯ ) } .
Because the quantifier elimination method ( Q E (   ) ) based on CAD can generate an equivalent quantifier-free logic constraint, Formula (33) can be obtained:
φ 1 s ¯ | = φ 2 ¯
According to Theorem 2, Formula (34) holds:
Z e r o ( φ 1 s ¯ ) Z e r o ( φ 2 ¯ )
Conversely, according to Lemma 1 and Formula (32), we obtain Formula (35):
Z e r o ( φ 1 ¯ ) = Z e r o ( φ 1 s ( c 11 c 11 c 11 + ) ( c 1 n c 1 n c 1 n + ) ) Z e r o ( φ 1 s ¯ )
From Formulas (34) and (35), Z e r o ( φ 1 ¯ ) Z e r o ( φ 2 ¯ ) holds.
Based on Theorem 3, we can obtain the reasoning method for PEAs. Steps 1–4 can determine whether Z e r o ( φ 1 ¯ ) Z e r o ( φ 2 ¯ ) is true. Some of the symbols used in the following steps are represented as follows:
φ ¯ 1 and φ ¯ 2 are two PEAs. All the error coefficients of φ ¯ 1 and φ ¯ 2 are c 11 = [ c 11 , c 11 + ] , c 12 = [ c 12 , c 12 + ] , , c 1 n = [ c 1 n , c 1 n + ] and c 21 = [ c 21 , c 21 + ] , c 22 = [ c 22 , c 22 + ] , , c 2 m = [ c 2 m , c 2 m + ] , respectively. The steps to verify whether Z e r o ( φ 1 ¯ ) Z e r o ( φ 2 ¯ ) holds are as follows:
  • Convert φ ¯ 1 , φ ¯ 2 into the symbolized formula φ 1 s , φ 2 s according to Definition 9.
  • Combine φ 1 s , φ 2 s , and the error coefficients of φ ¯ 2 to form a first-order polynomial logic, as expressed in Formula (36):
    φ 1 s φ 2 s ( c 21 c 21 c 21 + ) ( c 2 m c 2 m c 2 m + )
  • Convert ( c 21 c 21 c 21 + ) ( c 2 m c 2 m c 2 m + ) from Formula (36) into the representation with the existential quantifier . Consequently, eliminate the quantifier for the formula Q E ( x 1 , , x n , c 21 [ c 21 , c 21 + ] , , c 2 m [ c 2 m , c 2 m + ] , ( φ 1 s | = φ 2 s ) to obtain a first-order constraint containing only c 11 , , c 1 n . The result is represented by Formula (37):
    f 1 ( c 11 , , c 1 n ) f L ( c 11 , , c 1 n )
  • Finally, we determine whether Formula (38) holds. If (38) holds, then Z e r o ( φ 1 ¯ ) Z e r o ( φ 2 ¯ ) holds:
    { c 11 , , c 1 n | ( c 11 c 11 c 11 + ) ( c 1 n c 1 n c 1 n + ) } { c 11 , , c 1 n | f 1 ( c 11 , , c 1 n ) f L ( c 11 , , c 1 n ) }
When there are multiple variables in Formula (37), the interval operation rules introduced in Section 2 may be needed to judge Formula (38).
A simple example is presented below to introduce the reasoning method between PEAs.

4.4. Simple Example

φ ¯ 1 and φ ¯ 2 are two PEAs as Formula (39). Now, we must judge whether Z e r o ( φ 1 ¯ ) Z e r o ( φ 2 ¯ ) holds:
φ ¯ 1 = { x 2 + y 2 = [ 1 , 4 ] x = [ 0 , + ] y = [ 0 , + ] , φ ¯ 2 = { ( x 1 ) 2 + y 2 = [ 0 , 6 ] x = [ 0 , + ] y = [ 0 , + ]
Based on the steps described in Section 4.3, the specific steps for the example are as follows:
  • The symbolized φ ¯ 1 and φ ¯ 2 are shown in Formula (40):
    φ 1 s = { x 2 + y 2 = a x 0 y 0 , φ 2 s = { ( x 1 ) 2 + y 2 = b x 0 y 0
  • According to Step 2 in Section 4.3, Formula (41) can be obtained:
    φ 1 s φ 2 s ( c 21 c 21 c 21 + ) ( c 2 m c 2 m c 2 m + ) = ( x 2 + y 2 = a ) ( x 0 ) ( y 0 ) ( ( x 1 ) 2 + y 2 = b ) 0 b 6
  • Using the call quantifier elimination algorithm, Formula (42) can be obtained:
    Q E ( x 1 , , x n , c 21 [ c 21 , c 21 + ] , , c 2 m [ c 2 m , c 2 m + ] , φ 1 s | = φ 2 s ) = Q E ( x 1 , , x n , b [ 0 , 6 ] , ( ( x 2 + y 2 = a ) ( x 0 ) ( y 0 ) )   | = ( ( ( x 1 ) 2 + y 2 = b ) ) ( x 0 ) ( y 0 ) ) = a     5
  • Finally, [ 1 , 4 ] a     5 , i.e., 1 a 4 a   5 is found to be true. Therefore, Z e r o ( φ 1 ¯ ) Z e r o ( φ 2 ¯ ) is true.
The Maple2020 codes and the result of Step 3 are as follows:
with (RegularChains):
with (SemiAlgebraicSetTools):
R: = PolynomialRing([x, y, a, b]);
f: = &A [x, y], &E [b], (((y^2 + x^2 = a) &and (0 <= x)) &and (0 <= y)) &implies ((((x − 1)^2 + y^2 <= b) &and (0 <= b)) &and (b <= 6));
out: = QuantifierElimination(f, ‘output’ = ‘rootof’);
out: = a <= 5
Figure 3, Figure 4, Figure 5 and Figure 6, generated from Python codes, show the conclusion more clearly. The red part of Figure 3 is the area of Z e r o ( φ ¯ 1 ) . The blue part of Figure 4 is the area of Z e r o ( φ ¯ 2 ) .
Does Z e r o ( φ 1 ¯ ) Z e r o ( φ 2 ¯ ) hold? We can mix Figure 3 and Figure 4 to observe. Figure 5 is obtained by mixing Figure 3 and Figure 4. As shown in Figure 5, the red part ( Z e r o ( φ ¯ 1 ) ) is all inside Z e r o ( φ ¯ 2 ) . Furthermore, we are also interested in the boundary situation when a = 5 (variable “a” comes from Formula (40)). According to the calculation result from the Maple codes above in Section 4.4, we can conclude that when a <= 5, Z e r o ( φ 1 ¯ ) Z e r o ( φ 2 ¯ ) holds. Figure 6 shows the situation when a = 5.
In Figure 6, Z e r o ( φ 1 ¯ ) Z e r o ( φ 2 ¯ ) barely holds with the boundary condition (a = 5). This shows that, in this case, the results (a <= 5) obtained by our method are complete.

5. Example of Target Interception

5.1. Interception Verification

This section provides an example of the reasoning method between PEAs in the industry and the codes in Maple.
A self-powered flying target descends from a height of 10 km. Assuming that the expected landing point is the origin of the coordinates, the target flight path is always on a plane. The target starts to land at a horizontal distance (s) of 80 km from the point of origin, and a height (h) of 10 km in the vertical direction. After radar monitoring and system simulation, the landing trajectory of the target conforms to a PEA, which is represented by φ ¯ 1 in Formula (43):
φ ¯ 1 = { y = 10 h s 3 x 3 15 h s 4 x 4 + a ¯ 6 h s 5 x 5 a ¯ = [ 0.99 , 1.01 ]
From Formula (43), Z e r o ( φ 1 ¯ ) is obtained as shown in Formula (44):
Z e r o ( φ 1 ¯ ) = { ( x , y ) | a [ 0.99 , 1.01 ]   ,   10 h s 3 x 3 15 h s 4 x 4 + a ¯ 6 h s 5 x 5 y = 0 , 45 x 80 }
At this point, it is necessary to attempt to intercept the target at 45 km from the point of origin in the horizontal direction. This distance (45 km from the origin) is to ensure safety. This is because being too close to the ground or point of origin may make the interception process meaningless, even if it is successfully intercepted. If the target is a missile with certain lethality, enough safe distance is necessary. Therefore, a group of intercepting objects is launched from the ground, which is designed to satisfy φ ¯ 2 (a PEA with three degrees), as shown in Formula (45):
φ ¯ 2 = { y = 3 h s 2 x 2 b ¯ 2 h s 3 x 3 + 0.3 b ¯ = [ 0.95 , 1.05 ] 45 x 80
From Formula (45), Z e r o ( φ 2 ¯ ) can be obtained as Formula (46):
Z e r o ( φ 2 ¯ ) = { ( x , y ) | b [ 0.95 , 1.05 ] , 3 h s 2 x 2 b ¯ 2 h s 3 x 3 + 0.3 y = 0 , 45 x 80 }
Thereafter, we must determine whether the flying object can be intercepted under sufficiently dense launching of the interceptors. When the set of trajectories of the group of interceptors includes all possible trajectories of the target, the target can be intercepted.
That is, Z e r o ( φ 1 ¯ ) Z e r o ( φ 2 ¯ ) holds.
The specific steps and their results are provided below, according to the method discussed in Section 4.3.
  • Convert φ ¯ 1 , φ ¯ 2 in Formulas (43) and (45), respectively, into the symbolized φ 1 s , φ 2 s as shown in Formula (47).
    φ 1 s = { y = 10 h s 3 x 3 15 h s 4 x 4 + a 6 h s 5 x 5 45 x 80 , φ 2 s = { y = 3 h s 2 x 2 b 2 h s 3 x 3 + 0.3 45 x 80
  • By combining φ 1 s , φ 2 s , and the error coefficients of φ ¯ 2 , Formula (48) can be obtained.
    φ 1 s φ 2 s ( c 21 c 21 c 21 + ) ( c 2 m c 2 m c 2 m + ) = ( y = 10 h s 3 x 3 15 h s 4 x 4 + a 6 h s 5 x 5 ) ( 45 x 80 ) ( y = 3 h s 2 x 2 b 2 h s 3 x 3 + 0.3 ) ( 0.95 b 1.05 )
  • The universal quantifier acts on x and y, and the existence quantifier acts on b in Formula (48). Subsequently, we call the quantifier elimination algorithm to obtain Formula (49):
    Q E ( x 1 , , x n , c 21 [ c 21 , c 21 + ] , , c 2 m [ c 2 m , c 2 m + ] , φ 1 s | = φ 2 s ) = Q E ( ( x , y ) , b [ 0.95 , 1.05 ] , ( y = 10 h s 3 x 3 15 h s 4 x 4 + a 6 h s 5 x 5 ) ( 45 x 80 ) ( y = 3 h s 2 x 2 b 2 h s 3 x 3 + 0.3 ) ) = 0.9883 a 1.01129
  • Because a ¯ = [ 0.99 , 1.01 ] [ 0.9883 ,   1.01129 ] , we can conclude that Z e r o ( φ 1 ¯ ) Z e r o ( φ 2 ¯ ) is true. That is, φ 1 ¯   | = φ 2 ¯ holds.
In Step 3, the quantifier elimination algorithm (QE) is available in Maple2020. However, it can only handle first-order polynomial logic with integer coefficients. Hence, Formula (49) must be multiplied by an appropriate integer before calling the quantifier elimination method to obtain Formula (49) without floating-point numbers. Subsequently, the conclusion of Step 4 must divide this integer (the integer is 6000 in this case), which is not repeated here. The Maple codes of Step 3 are as follows:
with (RegularChains):
with (SemiAlgebraicSetTools):
R: = PolynomialRing ([x, y, a, b]):
f: = &A [x, y], &E [b], ‘&and’(a*x^5 – 1,200,000*x^4 + 64,000,000*x^3 – 327,680,000,000*y = 0, 45 < x, x < 80) &implies ‘&and’(−b*x^3 + 12,000*x^2 – 2,560,000*y + 768,000 = 0, 95 <= b, b <= 105):
out: = QuantifierElimination(f, ‘output’ = ‘rootof’);
out: = (5930 <= a) &and (a <= RootOf(_Z^4 – 1,428,000*_Z^3 + 620,670,000,000*_Z^2 – 7,420,070,585,984,000*_Z + 22,489,217,064,000,000,000, index = real [1])).

5.2. Simulation and Testing

The interval number in φ 2 ¯ is b ¯ = [ 0.95 , 1.05 ] . In addition, n numbers are selected randomly in intervals [ 0.95 , 1.05 ] to form n test cases ( c a s e 1 , c a s e 1 ,   , c a s e n ). These n random parameters are substituted into Formula (45) to form n polynomial equation systems, the curves of which are represented by the red parts in Figure 7 and Figure 8. Similarly, repeat the procedure for φ 1 ¯ . The n numbers are selected randomly in the interval a ¯ = [ 0.99 , 1.01 ] to form n test cases ( c a s e 1 , c a s e 2 ,   , c a s e n ). These n cases are then substituted into Formula (43). Subsequently, the n curves are drawn, as indicated by the black parts in Figure 7 and Figure 8.
Figure 7 show that, when 45 x 80 , the black area ( Z e r o ( φ 1 ¯ ) ) is inside the red area ( Z e r o ( φ 2 ¯ ) ). This shows that these interceptors can hit the target in the range of 45 km to 80 km from the point of origin in the horizontal direction, as long as these interceptors that satisfy the formula φ 2 ¯ can be launched sufficiently densely.
Furthermore, according to the result from Maple in step 4 in Section 5.1, we can conclude that when 0.9883 a 1.0112 , Z e r o ( φ 1 ¯ ) Z e r o ( φ 2 ¯ ) holds. The black part of Figure 8 is the situation with a ¯ = [ 0.999 , 1.001 ] as Z e r o ( φ 1 ¯ ) . The situation with 0.9883 a 1.0112 is shown in Figure 9.
In Figure 9, in the range of 45–80 km in the horizontal direction, the black part almost ran out of the red area. This suggests that the result ( 0.9883 a 1.0112 ) obtained by our method are also complete, as in the example in Section 4.4.

5.3. Comparison

Most reasoning methods based on theorem proofs do not contain error semantics. For polynomial systems with error coefficients, reasoning methods with error semantics have advantages over most methods without error semantics. The literature [19] is valuable for linear error assertions, but it is invalid for nonlinear PEAs. The method reported in [14] is effective for polynomial systems with a single error variable. However, there are few reports on reasoning methods with multiple error variables on PEAs. Conversely, some scholars have studied fuzzy reasoning to deal with errors [30]. This type of method provides the fuzzy degree of correctness or similar conclusions, which is different from the reasoning method proposed in this article. The proposed reasoning method can provide a deterministic answer (without a fuzzy degree) to establish whether the conclusion is correct or incorrect.

6. Conclusions

The reasoning method between PEAs, with two theorems involved, and their proofs, are proposed in this study. In addition, for non-linear assertions without polynomials, Taylor expansion can be used to expand them into polynomials for approximation. However, the quantifier elimination algorithm based on cylindrical algebraic decomposition (in the field of symbolic computation) is used in our reasoning method. Although the time complexity of our reasoning method will significantly increase with the increase in the number of variables, our reasoning method can provide a reliable and accurate answer without a fuzzy degree for the reasoning between PEAs, which is necessary in safety-critical systems. The reasoning problem of error polynomials with many variables is expected to be approximated by combining numerical calculation methods. This is also the direction of our study in the future.

Author Contributions

Conceptualization, P.W.; methodology, J.W. and N.X.; software, J.X.; formal analysis, N.X.; writing—original draft preparation, P.W.; writing—review and editing, N.X.; funding acquisition, J.X. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China under Grant No. 61772006.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data used to support the findings of this study are included within the article.

Acknowledgments

This work was supported by the National Natural Science Foundation of China under Grant No. 61772006, the Promotion Project of Basic Faculties for Young and Middle-aged College Teachers in Guangxi China Grant No. 2021KY0168, the Talent Introduction Project of Guangxi University for Nationalities China Grant No. 2020KJQD05.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Clarke, E.M.; Grumberg, O.; Peled, D. Model Checking; MIT Press: Cambridge, MA, USA, 1999. [Google Scholar]
  2. Doyen, L.; Frehse, G.; Pappas, G.J. Handbook of Model Checking; Springer International Publishing: New York, NY, USA, 2018. [Google Scholar]
  3. Fitting, M. First-order logic and automated theorem proving. Studia Log. 1998, 61, 300–302. [Google Scholar]
  4. Shankar, N. Combining theorem proving and model checking through symbolic analysis. Int. Conf. Concurr. Theory. 2000, 1877, 1–16. [Google Scholar]
  5. Uribe, T.E. Combinations of model checking and theorem proving. In Proceedings of the International Workshop on Frontiers of Combining Systems, Nancy, France, 20–24 March 2000; Springer: Berlin/Heidelberg, Germany, 2000; Volume 1794, pp. 151–170. [Google Scholar]
  6. D’Silva, V.; Kroening, D.; Weissenbacher, G. A survey of automated techniques for formal software verification. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 2008, 27, 1165–1178. [Google Scholar] [CrossRef] [Green Version]
  7. Sun, T.; Yu, W.A. Formal Verification Framework for Security Issues of Blockchain Smart Contracts. Electronics 2020, 9, 255. [Google Scholar] [CrossRef] [Green Version]
  8. Kaufmann, D. Formal Verification of Multiplier Circuits Using Computer Algebra. Ph.D. Thesis, Johannes Kepler University Linz, Linz, Austria, 2020. [Google Scholar]
  9. Katoen, J.-P. Labelled transition systems. In Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2005; Volume 3472, pp. 615–616. [Google Scholar]
  10. Wu, J. Algebraic methods for mechanical theorem proving in many-valued logics. Chin. J. Comput. 1996, 10, 773–779. [Google Scholar]
  11. Fu, J.; Wu, J.; Tan, H. A deductive approach towards reasoning about algebraic transition systems. Math. Probl. Eng. 2015, 607013. [Google Scholar] [CrossRef]
  12. Platzer, A. Logical Analysis of Hybrid Systems: Proving Theorems for Complex Dynamics; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2010. [Google Scholar]
  13. Platzer, A. A differential operator approach to equational differential invariants. In Proceedings of the International Conference on Interactive Theorem Proving, Princeton, NJ, USA, 13–15 August 2012; Springer: Berlin/Heidelberg, Germany, 2012; pp. 28–48. [Google Scholar]
  14. Liu, J.; Zhan, N.; Zhao, H. Computing semi-algebraic invariants for polynomial dynamical systems. In Proceedings of the Ninth ACM International Conference on Embedded Software, Taipei, Taiwan, 9–14 October 2011; Chakraborty, S., Jerraya, A., Baruah, S.K., Fischmeister, S., Eds.; ACM: New York, NY, USA, 2011; pp. 97–106. [Google Scholar]
  15. He, H.; Wu, J. A New Approach to Nonlinear Invariants for Hybrid Systems Based on the Citing Instances Method. Information 2020, 11, 246. [Google Scholar] [CrossRef]
  16. Rushby, J. Theorem proving for verification. In Summer School on Modeling and Verification of Parallel Processes; Springer: Berlin/Heidelberg, Germany, 2000. [Google Scholar]
  17. Chen, Z.; Zhang, T.; Li, Z. Hybrid Control Scheme Consisting of Adaptive and Optimal Controllers for Flexible-Base Flexible-Joint Space Manipulator with Uncertain Parameters. In Proceedings of the 9th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), Hangzhou, China, 26–27 August 2017; pp. 341–345. [Google Scholar] [CrossRef]
  18. Xu, T.; Yu, H.S.; Yu, J.P.; Meng, X.X. Adaptive disturbance attenuation control of two tank liquid level system with uncertain parameters based on port-controlled Hamiltonian. IEEE Access 2020, 8, 47384–47392. [Google Scholar] [CrossRef]
  19. Wu, P.; Xiong, N.; Liu, J.; Huang, L.; Ju, Z.; Ji, Y.; Wu, J. Interval Number-Based Safety Reasoning Method for Verification of Decentralized Power Systems in High-Speed Trains. Math. Probl. Eng. 2021, 6624528. [Google Scholar] [CrossRef]
  20. Wu, Y.; Xu, H.; Xu, C.; Chen, K. Uncertain multi-attributes decision making method based on interval number with probability distribution weighted operators and stochastic dominance degree. Knowl. Based Syst. 2016, 113, 199–209. [Google Scholar] [CrossRef]
  21. Liu, F.; Pedrycz, W.; Zhang, W.-G. Limited rationality and its quantification through the interval number judgments with permutations. IEEE Trans. Cybern. 2017, 47, 4025–4037. [Google Scholar] [CrossRef] [PubMed]
  22. Xia, B.; Xiao, R.; Yang, L. Solving parametric semi-algebraic systems. In Proceedings of the 7th Asian Symposium on Computer Mathematics, Seoul, Korea, 8–10 December 2005; Pae, S.-i., Park, H., Eds.; ASCM: Chicago, IL, USA, 2005. [Google Scholar]
  23. Tarski, A. A Decision Method for Elementary Algebra and Geometry; University of California Press: Berkeley, CA, USA, 1951. [Google Scholar]
  24. Arnon, D.S.; Collins, G.E.; McCallum, S. Cylindrical algebraic decomposition. I. The basic algorithm. SIAM J. Comput. 1984, 13, 865–877. [Google Scholar] [CrossRef] [Green Version]
  25. Xia, B. DISCOVERER: A tool for solving semi-algebraic systems. ACM Commun. Comput. Algebra. 2007, 41, 102–103. [Google Scholar] [CrossRef]
  26. Zhao, F.; Chen, X. Analytical and triangular solutions to operational flexibility analysis using quantifier elimination. AIChE J. 2018, 64, 3894–3911. [Google Scholar] [CrossRef]
  27. Voßwinkel, R.; Robenac, K.; Bajcinca, N. Input-to-State Stability Mapping for Nonlinear Control Systems Using Quantifier Elimination. In Proceedings of the European Control Conference (ECC), Limassol, Cyprus, 29 November 2018; pp. 906–911. [Google Scholar]
  28. Mulligan, C.; Davenport, J.; England, M. TheoryGuru: A Mathematica package to apply quantifier elimination technology to economics. In International Congress on Mathematical Software, South Bend, IN, USA, 24–27 July 2018; Springer: Cham, Switzerland, 2018. [Google Scholar] [CrossRef]
  29. Tonks, Z. A Poly-algorithmic Quantifier Elimination Package in Maple. In Maple in Mathematics Education and Research; Springer International Publishing: New York, NY, USA, 2020; pp. 171–186. [Google Scholar] [CrossRef]
  30. Wang, Y. Error Evaluation Method and Robustness Analysis of Fuzzy Reasoning. Ph.D. Thesis, Zhejiang Sci-Tech University, Hangzhou, China, 2019. [Google Scholar]
Figure 1. An example of a non-convex set.
Figure 1. An example of a non-convex set.
Information 12 00309 g001
Figure 2. An example of a failure for VJM.
Figure 2. An example of a failure for VJM.
Information 12 00309 g002
Figure 3. The area of Z e r o ( φ ¯ 1 ) .
Figure 3. The area of Z e r o ( φ ¯ 1 ) .
Information 12 00309 g003
Figure 4. The area of Z e r o ( φ ¯ 2 ) .
Figure 4. The area of Z e r o ( φ ¯ 2 ) .
Information 12 00309 g004
Figure 5. The mixture of Figure 3 and Figure 4.
Figure 5. The mixture of Figure 3 and Figure 4.
Information 12 00309 g005
Figure 6. The situation regarding a = 5.
Figure 6. The situation regarding a = 5.
Information 12 00309 g006
Figure 7. Example showing 100 curves of φ 1 ¯ and φ 2 ¯ .
Figure 7. Example showing 100 curves of φ 1 ¯ and φ 2 ¯ .
Information 12 00309 g007
Figure 8. Example showing 10,000 curves of φ 1 ¯ and φ 2 ¯ .
Figure 8. Example showing 10,000 curves of φ 1 ¯ and φ 2 ¯ .
Information 12 00309 g008
Figure 9. Example showing 10,000 curves of φ 1 ¯ and φ 2 ¯ with 0.9883 a 1.0112 .
Figure 9. Example showing 10,000 curves of φ 1 ¯ and φ 2 ¯ with 0.9883 a 1.0112 .
Information 12 00309 g009
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Wu, P.; Xiong, N.; Xiong, J.; Wu, J. Reasoning Method between Polynomial Error Assertions. Information 2021, 12, 309. https://doi.org/10.3390/info12080309

AMA Style

Wu P, Xiong N, Xiong J, Wu J. Reasoning Method between Polynomial Error Assertions. Information. 2021; 12(8):309. https://doi.org/10.3390/info12080309

Chicago/Turabian Style

Wu, Peng, Ning Xiong, Juxia Xiong, and Jinzhao Wu. 2021. "Reasoning Method between Polynomial Error Assertions" Information 12, no. 8: 309. https://doi.org/10.3390/info12080309

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop