fond
Model Checking Contest 2018
8th edition, Bratislava, Slovakia, June 26, 2018
Execution of r141-qhx2-152673582600067
Last Updated
June 26, 2018

About the Execution of ITS-Tools.L for QuasiCertifProtocol-PT-06

Execution Summary
Max Memory
Used (MB)
Time wait (ms) CPU Usage (ms) I/O Wait (ms) Computed Result Execution
Status
15753.280 575811.00 582521.00 3739.30 TFTFFTTFFTTTFTFF normal

Execution Chart

We display below the execution chart for this examination (boot time has been removed).

Trace from the execution

Waiting for the VM to be ready (probing ssh)
.........................................................................................................................................
/home/mcc/execution
total 400K
-rw-r--r-- 1 mcc users 5.9K May 15 18:54 CTLCardinality.txt
-rw-r--r-- 1 mcc users 30K May 15 18:54 CTLCardinality.xml
-rw-r--r-- 1 mcc users 5.4K May 15 18:54 CTLFireability.txt
-rw-r--r-- 1 mcc users 31K May 15 18:54 CTLFireability.xml
-rw-r--r-- 1 mcc users 4.0K May 15 18:50 GenericPropertiesDefinition.xml
-rw-r--r-- 1 mcc users 6.4K May 15 18:50 GenericPropertiesVerdict.xml
-rw-r--r-- 1 mcc users 3.2K May 26 09:27 LTLCardinality.txt
-rw-r--r-- 1 mcc users 14K May 26 09:27 LTLCardinality.xml
-rw-r--r-- 1 mcc users 3.1K May 26 09:27 LTLFireability.txt
-rw-r--r-- 1 mcc users 15K May 26 09:27 LTLFireability.xml
-rw-r--r-- 1 mcc users 7.1K May 15 18:54 ReachabilityCardinality.txt
-rw-r--r-- 1 mcc users 33K May 15 18:54 ReachabilityCardinality.xml
-rw-r--r-- 1 mcc users 116 May 15 18:54 ReachabilityDeadlock.txt
-rw-r--r-- 1 mcc users 354 May 15 18:54 ReachabilityDeadlock.xml
-rw-r--r-- 1 mcc users 5.0K May 15 18:54 ReachabilityFireability.txt
-rw-r--r-- 1 mcc users 26K May 15 18:54 ReachabilityFireability.xml
-rw-r--r-- 1 mcc users 2.6K May 15 18:54 UpperBounds.txt
-rw-r--r-- 1 mcc users 6.3K May 15 18:54 UpperBounds.xml
-rw-r--r-- 1 mcc users 5 May 15 18:50 equiv_col
-rw-r--r-- 1 mcc users 3 May 15 18:50 instance
-rw-r--r-- 1 mcc users 6 May 15 18:50 iscolored
-rw-r--r-- 1 mcc users 153K May 15 18:50 model.pnml
=====================================================================
Generated by BenchKit 2-3637
Executing tool itstoolsl
Input is QuasiCertifProtocol-PT-06, examination is CTLFireability
Time confinement is 3600 seconds
Memory confinement is 16384 MBytes
Number of cores is 4
Run identifier is r141-qhx2-152673582600067
=====================================================================


--------------------
content from stdout:

=== Data for post analysis generated by BenchKit (invocation template)

The expected result is a vector of booleans
BOOL_VECTOR

here is the order used to build the result vector(from text file)
FORMULA_NAME QuasiCertifProtocol-PT-06-CTLFireability-00
FORMULA_NAME QuasiCertifProtocol-PT-06-CTLFireability-01
FORMULA_NAME QuasiCertifProtocol-PT-06-CTLFireability-02
FORMULA_NAME QuasiCertifProtocol-PT-06-CTLFireability-03
FORMULA_NAME QuasiCertifProtocol-PT-06-CTLFireability-04
FORMULA_NAME QuasiCertifProtocol-PT-06-CTLFireability-05
FORMULA_NAME QuasiCertifProtocol-PT-06-CTLFireability-06
FORMULA_NAME QuasiCertifProtocol-PT-06-CTLFireability-07
FORMULA_NAME QuasiCertifProtocol-PT-06-CTLFireability-08
FORMULA_NAME QuasiCertifProtocol-PT-06-CTLFireability-09
FORMULA_NAME QuasiCertifProtocol-PT-06-CTLFireability-10
FORMULA_NAME QuasiCertifProtocol-PT-06-CTLFireability-11
FORMULA_NAME QuasiCertifProtocol-PT-06-CTLFireability-12
FORMULA_NAME QuasiCertifProtocol-PT-06-CTLFireability-13
FORMULA_NAME QuasiCertifProtocol-PT-06-CTLFireability-14
FORMULA_NAME QuasiCertifProtocol-PT-06-CTLFireability-15

=== Now, execution of the tool begins

BK_START 1527893470344

Converted graph to binary with : CommandLine [args=[/home/mcc/BenchKit/itstools/plugins/fr.lip6.move.gal.louvain.binaries_1.0.0.201805241334/bin/convert-linux64, -i, /tmp/graph3003966472176030438.txt, -o, /tmp/graph3003966472176030438.bin, -w, /tmp/graph3003966472176030438.weights], workingDir=null]
Built communities with : CommandLine [args=[/home/mcc/BenchKit/itstools/plugins/fr.lip6.move.gal.louvain.binaries_1.0.0.201805241334/bin/louvain-linux64, /tmp/graph3003966472176030438.bin, -l, -1, -v, -w, /tmp/graph3003966472176030438.weights, -q, 0, -e, 0.001], workingDir=null]
Invoking ITS tools like this :CommandLine [args=[/home/mcc/BenchKit/itstools/plugins/fr.lip6.move.gal.itstools.binaries_1.0.0.201805241334/bin/its-ctl-linux64, --gc-threshold, 2000000, --quiet, -i, /home/mcc/execution/CTLFireability.pnml.gal, -t, CGAL, -ctl, /home/mcc/execution/CTLFireability.ctl], workingDir=/home/mcc/execution]

its-ctl command run as :

/home/mcc/BenchKit/itstools/plugins/fr.lip6.move.gal.itstools.binaries_1.0.0.201805241334/bin/its-ctl-linux64 --gc-threshold 2000000 --quiet -i /home/mcc/execution/CTLFireability.pnml.gal -t CGAL -ctl /home/mcc/execution/CTLFireability.ctl
No direction supplied, using forward translation only.
Parsed 16 CTL formulae.
built 20 ordering constraints for composite.
built 35 ordering constraints for composite.
built 20 ordering constraints for composite.
built 19 ordering constraints for composite.
built 20 ordering constraints for composite.
built 20 ordering constraints for composite.
built 20 ordering constraints for composite.
built 20 ordering constraints for composite.
built 20 ordering constraints for composite.
Model ,|S| ,Time ,Mem(kb) ,fin. SDD ,fin. DDD ,peak SDD ,peak DDD ,SDD Hom ,SDD cache peak ,DDD Hom ,DDD cachepeak ,SHom cache
reachable,2.27196e+06,77.0202,1017056,65793,4747,1.99812e+06,85835,572,5.56853e+06,101,2.98606e+06,0


Converting to forward existential form...Done !
original formula: !(E(!((((((((((((((((u1.c1_0>=1)&&(i2.u17.n9_3_0>=1))&&(i2.u17.n9_2_0>=1))&&(i2.u17.n9_1_0>=1))&&(i2.u17.n9_0_0>=1))&&(i2.u17.n9_6_0>=1))&&(i2.u17.n9_5_0>=1))&&(i2.u17.n9_4_0>=1))||((((((((i2.u19.n9_3_5>=1)&&(i2.u19.n9_4_5>=1))&&(i2.u19.n9_5_5>=1))&&(i2.u19.n9_6_5>=1))&&(i2.u19.n9_0_5>=1))&&(u1.c1_5>=1))&&(i2.u19.n9_2_5>=1))&&(i2.u19.n9_1_5>=1)))||((((((((i2.u16.n9_2_6>=1)&&(i2.u16.n9_3_6>=1))&&(i2.u16.n9_4_6>=1))&&(i2.u16.n9_5_6>=1))&&(i2.u16.n9_6_6>=1))&&(u1.c1_6>=1))&&(i2.u16.n9_0_6>=1))&&(i2.u16.n9_1_6>=1)))||((((((((i2.u21.n9_6_3>=1)&&(i2.u21.n9_5_3>=1))&&(u1.c1_3>=1))&&(i2.u21.n9_0_3>=1))&&(i2.u21.n9_3_3>=1))&&(i2.u21.n9_4_3>=1))&&(i2.u21.n9_1_3>=1))&&(i2.u21.n9_2_3>=1)))||((((((((i2.u20.n9_5_4>=1)&&(i2.u20.n9_4_4>=1))&&(i2.u20.n9_6_4>=1))&&(u1.c1_4>=1))&&(i2.u20.n9_1_4>=1))&&(i2.u20.n9_0_4>=1))&&(i2.u20.n9_3_4>=1))&&(i2.u20.n9_2_4>=1)))||((((((((i2.u18.n9_2_1>=1)&&(i2.u18.n9_1_1>=1))&&(i2.u18.n9_0_1>=1))&&(u1.c1_1>=1))&&(i2.u18.n9_6_1>=1))&&(i2.u18.n9_5_1>=1))&&(i2.u18.n9_4_1>=1))&&(i2.u18.n9_3_1>=1)))||((((((((i2.u15.n9_6_2>=1)&&(i2.u15.n9_0_2>=1))&&(i2.u15.n9_1_2>=1))&&(u1.c1_2>=1))&&(i2.u15.n9_4_2>=1))&&(i2.u15.n9_5_2>=1))&&(i2.u15.n9_2_2>=1))&&(i2.u15.n9_3_2>=1)))&&(i4.u14.a5>=1))) U ((((((((((i4.u31.s4_0>=1)&&(u0.malicious_reservoir>=1))||((i3.u9.s4_1>=1)&&(u0.malicious_reservoir>=1)))||((i7.u8.s4_2>=1)&&(u0.malicious_reservoir>=1)))||((i5.u11.s4_3>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i6.u10.s4_4>=1)))||((i8.u12.s4_5>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i9.u13.s4_6>=1)))&&(i4.u14.a4>=1))&&(!(((((((i2.u43.s6_5>=1)||(i2.u6.s6_4>=1))||(i2.u7.s6_6>=1))||(i2.u3.s6_1>=1))||(i2.u2.s6_0>=1))||(i2.u5.s6_3>=1))||(i2.u4.s6_2>=1))))))
=> equivalent forward existential formula: [(FwdU(Init,!((((((((((((((((u1.c1_0>=1)&&(i2.u17.n9_3_0>=1))&&(i2.u17.n9_2_0>=1))&&(i2.u17.n9_1_0>=1))&&(i2.u17.n9_0_0>=1))&&(i2.u17.n9_6_0>=1))&&(i2.u17.n9_5_0>=1))&&(i2.u17.n9_4_0>=1))||((((((((i2.u19.n9_3_5>=1)&&(i2.u19.n9_4_5>=1))&&(i2.u19.n9_5_5>=1))&&(i2.u19.n9_6_5>=1))&&(i2.u19.n9_0_5>=1))&&(u1.c1_5>=1))&&(i2.u19.n9_2_5>=1))&&(i2.u19.n9_1_5>=1)))||((((((((i2.u16.n9_2_6>=1)&&(i2.u16.n9_3_6>=1))&&(i2.u16.n9_4_6>=1))&&(i2.u16.n9_5_6>=1))&&(i2.u16.n9_6_6>=1))&&(u1.c1_6>=1))&&(i2.u16.n9_0_6>=1))&&(i2.u16.n9_1_6>=1)))||((((((((i2.u21.n9_6_3>=1)&&(i2.u21.n9_5_3>=1))&&(u1.c1_3>=1))&&(i2.u21.n9_0_3>=1))&&(i2.u21.n9_3_3>=1))&&(i2.u21.n9_4_3>=1))&&(i2.u21.n9_1_3>=1))&&(i2.u21.n9_2_3>=1)))||((((((((i2.u20.n9_5_4>=1)&&(i2.u20.n9_4_4>=1))&&(i2.u20.n9_6_4>=1))&&(u1.c1_4>=1))&&(i2.u20.n9_1_4>=1))&&(i2.u20.n9_0_4>=1))&&(i2.u20.n9_3_4>=1))&&(i2.u20.n9_2_4>=1)))||((((((((i2.u18.n9_2_1>=1)&&(i2.u18.n9_1_1>=1))&&(i2.u18.n9_0_1>=1))&&(u1.c1_1>=1))&&(i2.u18.n9_6_1>=1))&&(i2.u18.n9_5_1>=1))&&(i2.u18.n9_4_1>=1))&&(i2.u18.n9_3_1>=1)))||((((((((i2.u15.n9_6_2>=1)&&(i2.u15.n9_0_2>=1))&&(i2.u15.n9_1_2>=1))&&(u1.c1_2>=1))&&(i2.u15.n9_4_2>=1))&&(i2.u15.n9_5_2>=1))&&(i2.u15.n9_2_2>=1))&&(i2.u15.n9_3_2>=1)))&&(i4.u14.a5>=1)))) * ((((((((((i4.u31.s4_0>=1)&&(u0.malicious_reservoir>=1))||((i3.u9.s4_1>=1)&&(u0.malicious_reservoir>=1)))||((i7.u8.s4_2>=1)&&(u0.malicious_reservoir>=1)))||((i5.u11.s4_3>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i6.u10.s4_4>=1)))||((i8.u12.s4_5>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i9.u13.s4_6>=1)))&&(i4.u14.a4>=1))&&(!(((((((i2.u43.s6_5>=1)||(i2.u6.s6_4>=1))||(i2.u7.s6_6>=1))||(i2.u3.s6_1>=1))||(i2.u2.s6_0>=1))||(i2.u5.s6_3>=1))||(i2.u4.s6_2>=1)))))] = FALSE
(forward)formula 0,1,77.3835,1017056,1,0,1.99812e+06,85835,655,5.56853e+06,110,2.98606e+06,16502
FORMULA QuasiCertifProtocol-PT-06-CTLFireability-00 TRUE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is TRUE !

***************************************

original formula: A(!(((((((((i4.u14.a1>=1)&&(i3.u23.n2_1>=1))&&(i4.u22.n2_0>=1))&&(i5.u26.n2_3>=1))&&(i7.u28.n2_2>=1))&&(i8.u25.n2_5>=1))&&(i6.u35.n2_4>=1))&&(i9.u27.n2_6>=1))) U AG((((((((((u0.malicious_reservoir>=1)&&(i2.u5.s6_3>=1))||((u0.malicious_reservoir>=1)&&(i2.u4.s6_2>=1)))||((i2.u3.s6_1>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i2.u2.s6_0>=1)))||((u0.malicious_reservoir>=1)&&(i2.u7.s6_6>=1)))||((u0.malicious_reservoir>=1)&&(i2.u43.s6_5>=1)))||((u0.malicious_reservoir>=1)&&(i2.u6.s6_4>=1)))||(((((((i2.u43.s6_5>=1)||(i2.u6.s6_4>=1))||(i2.u7.s6_6>=1))||(i2.u3.s6_1>=1))||(i2.u2.s6_0>=1))||(i2.u5.s6_3>=1))||(i2.u4.s6_2>=1)))))
=> equivalent forward existential formula: [((Init * !(EG(!(!(E(TRUE U !((((((((((u0.malicious_reservoir>=1)&&(i2.u5.s6_3>=1))||((u0.malicious_reservoir>=1)&&(i2.u4.s6_2>=1)))||((i2.u3.s6_1>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i2.u2.s6_0>=1)))||((u0.malicious_reservoir>=1)&&(i2.u7.s6_6>=1)))||((u0.malicious_reservoir>=1)&&(i2.u43.s6_5>=1)))||((u0.malicious_reservoir>=1)&&(i2.u6.s6_4>=1)))||(((((((i2.u43.s6_5>=1)||(i2.u6.s6_4>=1))||(i2.u7.s6_6>=1))||(i2.u3.s6_1>=1))||(i2.u2.s6_0>=1))||(i2.u5.s6_3>=1))||(i2.u4.s6_2>=1)))))))))) * !(E(!(!(E(TRUE U !((((((((((u0.malicious_reservoir>=1)&&(i2.u5.s6_3>=1))||((u0.malicious_reservoir>=1)&&(i2.u4.s6_2>=1)))||((i2.u3.s6_1>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i2.u2.s6_0>=1)))||((u0.malicious_reservoir>=1)&&(i2.u7.s6_6>=1)))||((u0.malicious_reservoir>=1)&&(i2.u43.s6_5>=1)))||((u0.malicious_reservoir>=1)&&(i2.u6.s6_4>=1)))||(((((((i2.u43.s6_5>=1)||(i2.u6.s6_4>=1))||(i2.u7.s6_6>=1))||(i2.u3.s6_1>=1))||(i2.u2.s6_0>=1))||(i2.u5.s6_3>=1))||(i2.u4.s6_2>=1))))))) U (!(!(((((((((i4.u14.a1>=1)&&(i3.u23.n2_1>=1))&&(i4.u22.n2_0>=1))&&(i5.u26.n2_3>=1))&&(i7.u28.n2_2>=1))&&(i8.u25.n2_5>=1))&&(i6.u35.n2_4>=1))&&(i9.u27.n2_6>=1)))) * !(!(E(TRUE U !((((((((((u0.malicious_reservoir>=1)&&(i2.u5.s6_3>=1))||((u0.malicious_reservoir>=1)&&(i2.u4.s6_2>=1)))||((i2.u3.s6_1>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i2.u2.s6_0>=1)))||((u0.malicious_reservoir>=1)&&(i2.u7.s6_6>=1)))||((u0.malicious_reservoir>=1)&&(i2.u43.s6_5>=1)))||((u0.malicious_reservoir>=1)&&(i2.u6.s6_4>=1)))||(((((((i2.u43.s6_5>=1)||(i2.u6.s6_4>=1))||(i2.u7.s6_6>=1))||(i2.u3.s6_1>=1))||(i2.u2.s6_0>=1))||(i2.u5.s6_3>=1))||(i2.u4.s6_2>=1)))))))))))] != FALSE
Reverse transition relation is NOT exact ! Due to transitions malC1_2, malC1_1, malC1_0, malC1_6, malC1_5, malC1_4, malC1_3, malS6_3, malS6_2, malS6_1, malS6_0, malS6_6, malS6_5, malS6_4, malS3_4, malS3_3, malS3_6, malS3_5, malS2_1, malS2_0, malS2_3, malS2_2, malS2_5, malS2_4, malS1_0, malS2_6, malS1_2, malS1_1, malS1_4, malS1_3, malS4_0, malS4_1, malS4_2, malS4_3, malS4_4, malS4_5, malS4_6, malS3_0, malS3_1, malS3_2, malS1_5, malS1_6, u0.malS5_0, u0.malS5_1, u0.malS5_2, u0.malS5_3, u0.malS5_4, u0.malS5_5, u0.malS5_6, i4.u14.malA1, i4.u14.malA4, i4.u14.malA2, i4.u14.malA5, i4.u14.malA3, Intersection with reachable at each step enabled. (destroyed/reverse/intersect/total) :0/62/54/116
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
Using saturation style SCC detection
(forward)formula 1,0,245.791,1735156,1,0,3.77039e+06,228308,2867,7.78418e+06,838,3.25837e+06,6498588
FORMULA QuasiCertifProtocol-PT-06-CTLFireability-01 FALSE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is FALSE !

***************************************

original formula: ((!((((((((((((i4.u14.a1>=1)&&(i3.u23.n2_1>=1))&&(i4.u22.n2_0>=1))&&(i5.u26.n2_3>=1))&&(i7.u28.n2_2>=1))&&(i8.u25.n2_5>=1))&&(i6.u35.n2_4>=1))&&(i9.u27.n2_6>=1))&&((((((((i3.u24.s3_1>=1)&&(i3.u32.n5_1>=1))||((i7.u40.n5_2>=1)&&(i7.u36.s3_2>=1)))||((i5.u34.s3_3>=1)&&(i5.u30.n5_3>=1)))||((i6.u29.n5_4>=1)&&(i6.u38.s3_4>=1)))||((i4.u31.s3_0>=1)&&(i4.u31.n5_0>=1)))||((i8.u41.n5_5>=1)&&(i8.u39.s3_5>=1)))||((i9.u42.n5_6>=1)&&(i9.u33.s3_6>=1))))||((((((((i3.u32.n6_1>=1)&&(i4.u31.n6_0>=1))&&(i4.u14.a5>=1))&&(i9.u42.n6_6>=1))&&(i8.u41.n6_5>=1))&&(i6.u29.n6_4>=1))&&(i5.u30.n6_3>=1))&&(i7.u40.n6_2>=1)))||(((((((((i7.u28.n1_2>=1)&&(i7.u28.Sstart_2>=1))||((i3.u23.Sstart_1>=1)&&(i3.u23.n1_1>=1)))||((i4.u22.n1_0>=1)&&(i4.u22.Sstart_0>=1)))||((i9.u27.Sstart_6>=1)&&(i9.u27.n1_6>=1)))||((i8.u25.Sstart_5>=1)&&(i8.u25.n1_5>=1)))||((i6.u35.Sstart_4>=1)&&(i6.u35.n1_4>=1)))||((i5.u26.Sstart_3>=1)&&(i5.u26.n1_3>=1)))&&((i4.u14.a4>=1)&&((((((((i7.u28.n1_2>=1)&&(i7.u28.Sstart_2>=1))||((i3.u23.Sstart_1>=1)&&(i3.u23.n1_1>=1)))||((i4.u22.n1_0>=1)&&(i4.u22.Sstart_0>=1)))||((i9.u27.Sstart_6>=1)&&(i9.u27.n1_6>=1)))||((i8.u25.Sstart_5>=1)&&(i8.u25.n1_5>=1)))||((i6.u35.Sstart_4>=1)&&(i6.u35.n1_4>=1)))||((i5.u26.Sstart_3>=1)&&(i5.u26.n1_3>=1))))))) * (A(((((((((i7.u28.n1_2>=1)&&(i7.u28.Sstart_2>=1))||((i3.u23.Sstart_1>=1)&&(i3.u23.n1_1>=1)))||((i4.u22.n1_0>=1)&&(i4.u22.Sstart_0>=1)))||((i9.u27.Sstart_6>=1)&&(i9.u27.n1_6>=1)))||((i8.u25.Sstart_5>=1)&&(i8.u25.n1_5>=1)))||((i6.u35.Sstart_4>=1)&&(i6.u35.n1_4>=1)))||((i5.u26.Sstart_3>=1)&&(i5.u26.n1_3>=1))) U ((((((((i3.u24.s3_1>=1)&&(i3.u32.n5_1>=1))||((i7.u40.n5_2>=1)&&(i7.u36.s3_2>=1)))||((i5.u34.s3_3>=1)&&(i5.u30.n5_3>=1)))||((i6.u29.n5_4>=1)&&(i6.u38.s3_4>=1)))||((i4.u31.s3_0>=1)&&(i4.u31.n5_0>=1)))||((i8.u41.n5_5>=1)&&(i8.u39.s3_5>=1)))||((i9.u42.n5_6>=1)&&(i9.u33.s3_6>=1)))) + !(((((((((((u0.s5_0>=1)&&(u0.malicious_reservoir>=1))||((u0.malicious_reservoir>=1)&&(u0.s5_1>=1)))||((u0.malicious_reservoir>=1)&&(u0.s5_2>=1)))||((u0.s5_3>=1)&&(u0.malicious_reservoir>=1)))||((u0.s5_4>=1)&&(u0.malicious_reservoir>=1)))||((u0.s5_5>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(u0.s5_6>=1)))&&(((((((i9.u13.s4_6>=1)||(i7.u8.s4_2>=1))||(i5.u11.s4_3>=1))||(i6.u10.s4_4>=1))||(i8.u12.s4_5>=1))||(i4.u31.s4_0>=1))||(i3.u9.s4_1>=1)))&&(i4.u14.a4>=1))))) * (EF(AX((i4.u22.Astart>=1))) + EG(!((((((((((i4.u31.s4_0>=1)&&(u0.malicious_reservoir>=1))||((i3.u9.s4_1>=1)&&(u0.malicious_reservoir>=1)))||((i7.u8.s4_2>=1)&&(u0.malicious_reservoir>=1)))||((i5.u11.s4_3>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i6.u10.s4_4>=1)))||((i8.u12.s4_5>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i9.u13.s4_6>=1)))||(i4.u14.a5>=1))))))
=> equivalent forward existential formula: ([(FwdU((Init * (!((((((((((((i4.u14.a1>=1)&&(i3.u23.n2_1>=1))&&(i4.u22.n2_0>=1))&&(i5.u26.n2_3>=1))&&(i7.u28.n2_2>=1))&&(i8.u25.n2_5>=1))&&(i6.u35.n2_4>=1))&&(i9.u27.n2_6>=1))&&((((((((i3.u24.s3_1>=1)&&(i3.u32.n5_1>=1))||((i7.u40.n5_2>=1)&&(i7.u36.s3_2>=1)))||((i5.u34.s3_3>=1)&&(i5.u30.n5_3>=1)))||((i6.u29.n5_4>=1)&&(i6.u38.s3_4>=1)))||((i4.u31.s3_0>=1)&&(i4.u31.n5_0>=1)))||((i8.u41.n5_5>=1)&&(i8.u39.s3_5>=1)))||((i9.u42.n5_6>=1)&&(i9.u33.s3_6>=1))))||((((((((i3.u32.n6_1>=1)&&(i4.u31.n6_0>=1))&&(i4.u14.a5>=1))&&(i9.u42.n6_6>=1))&&(i8.u41.n6_5>=1))&&(i6.u29.n6_4>=1))&&(i5.u30.n6_3>=1))&&(i7.u40.n6_2>=1)))||(((((((((i7.u28.n1_2>=1)&&(i7.u28.Sstart_2>=1))||((i3.u23.Sstart_1>=1)&&(i3.u23.n1_1>=1)))||((i4.u22.n1_0>=1)&&(i4.u22.Sstart_0>=1)))||((i9.u27.Sstart_6>=1)&&(i9.u27.n1_6>=1)))||((i8.u25.Sstart_5>=1)&&(i8.u25.n1_5>=1)))||((i6.u35.Sstart_4>=1)&&(i6.u35.n1_4>=1)))||((i5.u26.Sstart_3>=1)&&(i5.u26.n1_3>=1)))&&((i4.u14.a4>=1)&&((((((((i7.u28.n1_2>=1)&&(i7.u28.Sstart_2>=1))||((i3.u23.Sstart_1>=1)&&(i3.u23.n1_1>=1)))||((i4.u22.n1_0>=1)&&(i4.u22.Sstart_0>=1)))||((i9.u27.Sstart_6>=1)&&(i9.u27.n1_6>=1)))||((i8.u25.Sstart_5>=1)&&(i8.u25.n1_5>=1)))||((i6.u35.Sstart_4>=1)&&(i6.u35.n1_4>=1)))||((i5.u26.Sstart_3>=1)&&(i5.u26.n1_3>=1))))))) * (!((E(!(((((((((i3.u24.s3_1>=1)&&(i3.u32.n5_1>=1))||((i7.u40.n5_2>=1)&&(i7.u36.s3_2>=1)))||((i5.u34.s3_3>=1)&&(i5.u30.n5_3>=1)))||((i6.u29.n5_4>=1)&&(i6.u38.s3_4>=1)))||((i4.u31.s3_0>=1)&&(i4.u31.n5_0>=1)))||((i8.u41.n5_5>=1)&&(i8.u39.s3_5>=1)))||((i9.u42.n5_6>=1)&&(i9.u33.s3_6>=1)))) U (!(((((((((i7.u28.n1_2>=1)&&(i7.u28.Sstart_2>=1))||((i3.u23.Sstart_1>=1)&&(i3.u23.n1_1>=1)))||((i4.u22.n1_0>=1)&&(i4.u22.Sstart_0>=1)))||((i9.u27.Sstart_6>=1)&&(i9.u27.n1_6>=1)))||((i8.u25.Sstart_5>=1)&&(i8.u25.n1_5>=1)))||((i6.u35.Sstart_4>=1)&&(i6.u35.n1_4>=1)))||((i5.u26.Sstart_3>=1)&&(i5.u26.n1_3>=1)))) * !(((((((((i3.u24.s3_1>=1)&&(i3.u32.n5_1>=1))||((i7.u40.n5_2>=1)&&(i7.u36.s3_2>=1)))||((i5.u34.s3_3>=1)&&(i5.u30.n5_3>=1)))||((i6.u29.n5_4>=1)&&(i6.u38.s3_4>=1)))||((i4.u31.s3_0>=1)&&(i4.u31.n5_0>=1)))||((i8.u41.n5_5>=1)&&(i8.u39.s3_5>=1)))||((i9.u42.n5_6>=1)&&(i9.u33.s3_6>=1)))))) + EG(!(((((((((i3.u24.s3_1>=1)&&(i3.u32.n5_1>=1))||((i7.u40.n5_2>=1)&&(i7.u36.s3_2>=1)))||((i5.u34.s3_3>=1)&&(i5.u30.n5_3>=1)))||((i6.u29.n5_4>=1)&&(i6.u38.s3_4>=1)))||((i4.u31.s3_0>=1)&&(i4.u31.n5_0>=1)))||((i8.u41.n5_5>=1)&&(i8.u39.s3_5>=1)))||((i9.u42.n5_6>=1)&&(i9.u33.s3_6>=1))))))) + !(((((((((((u0.s5_0>=1)&&(u0.malicious_reservoir>=1))||((u0.malicious_reservoir>=1)&&(u0.s5_1>=1)))||((u0.malicious_reservoir>=1)&&(u0.s5_2>=1)))||((u0.s5_3>=1)&&(u0.malicious_reservoir>=1)))||((u0.s5_4>=1)&&(u0.malicious_reservoir>=1)))||((u0.s5_5>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(u0.s5_6>=1)))&&(((((((i9.u13.s4_6>=1)||(i7.u8.s4_2>=1))||(i5.u11.s4_3>=1))||(i6.u10.s4_4>=1))||(i8.u12.s4_5>=1))||(i4.u31.s4_0>=1))||(i3.u9.s4_1>=1)))&&(i4.u14.a4>=1)))))),TRUE) * !(EX(!((i4.u22.Astart>=1)))))] != FALSE + [FwdG((Init * (!((((((((((((i4.u14.a1>=1)&&(i3.u23.n2_1>=1))&&(i4.u22.n2_0>=1))&&(i5.u26.n2_3>=1))&&(i7.u28.n2_2>=1))&&(i8.u25.n2_5>=1))&&(i6.u35.n2_4>=1))&&(i9.u27.n2_6>=1))&&((((((((i3.u24.s3_1>=1)&&(i3.u32.n5_1>=1))||((i7.u40.n5_2>=1)&&(i7.u36.s3_2>=1)))||((i5.u34.s3_3>=1)&&(i5.u30.n5_3>=1)))||((i6.u29.n5_4>=1)&&(i6.u38.s3_4>=1)))||((i4.u31.s3_0>=1)&&(i4.u31.n5_0>=1)))||((i8.u41.n5_5>=1)&&(i8.u39.s3_5>=1)))||((i9.u42.n5_6>=1)&&(i9.u33.s3_6>=1))))||((((((((i3.u32.n6_1>=1)&&(i4.u31.n6_0>=1))&&(i4.u14.a5>=1))&&(i9.u42.n6_6>=1))&&(i8.u41.n6_5>=1))&&(i6.u29.n6_4>=1))&&(i5.u30.n6_3>=1))&&(i7.u40.n6_2>=1)))||(((((((((i7.u28.n1_2>=1)&&(i7.u28.Sstart_2>=1))||((i3.u23.Sstart_1>=1)&&(i3.u23.n1_1>=1)))||((i4.u22.n1_0>=1)&&(i4.u22.Sstart_0>=1)))||((i9.u27.Sstart_6>=1)&&(i9.u27.n1_6>=1)))||((i8.u25.Sstart_5>=1)&&(i8.u25.n1_5>=1)))||((i6.u35.Sstart_4>=1)&&(i6.u35.n1_4>=1)))||((i5.u26.Sstart_3>=1)&&(i5.u26.n1_3>=1)))&&((i4.u14.a4>=1)&&((((((((i7.u28.n1_2>=1)&&(i7.u28.Sstart_2>=1))||((i3.u23.Sstart_1>=1)&&(i3.u23.n1_1>=1)))||((i4.u22.n1_0>=1)&&(i4.u22.Sstart_0>=1)))||((i9.u27.Sstart_6>=1)&&(i9.u27.n1_6>=1)))||((i8.u25.Sstart_5>=1)&&(i8.u25.n1_5>=1)))||((i6.u35.Sstart_4>=1)&&(i6.u35.n1_4>=1)))||((i5.u26.Sstart_3>=1)&&(i5.u26.n1_3>=1))))))) * (!((E(!(((((((((i3.u24.s3_1>=1)&&(i3.u32.n5_1>=1))||((i7.u40.n5_2>=1)&&(i7.u36.s3_2>=1)))||((i5.u34.s3_3>=1)&&(i5.u30.n5_3>=1)))||((i6.u29.n5_4>=1)&&(i6.u38.s3_4>=1)))||((i4.u31.s3_0>=1)&&(i4.u31.n5_0>=1)))||((i8.u41.n5_5>=1)&&(i8.u39.s3_5>=1)))||((i9.u42.n5_6>=1)&&(i9.u33.s3_6>=1)))) U (!(((((((((i7.u28.n1_2>=1)&&(i7.u28.Sstart_2>=1))||((i3.u23.Sstart_1>=1)&&(i3.u23.n1_1>=1)))||((i4.u22.n1_0>=1)&&(i4.u22.Sstart_0>=1)))||((i9.u27.Sstart_6>=1)&&(i9.u27.n1_6>=1)))||((i8.u25.Sstart_5>=1)&&(i8.u25.n1_5>=1)))||((i6.u35.Sstart_4>=1)&&(i6.u35.n1_4>=1)))||((i5.u26.Sstart_3>=1)&&(i5.u26.n1_3>=1)))) * !(((((((((i3.u24.s3_1>=1)&&(i3.u32.n5_1>=1))||((i7.u40.n5_2>=1)&&(i7.u36.s3_2>=1)))||((i5.u34.s3_3>=1)&&(i5.u30.n5_3>=1)))||((i6.u29.n5_4>=1)&&(i6.u38.s3_4>=1)))||((i4.u31.s3_0>=1)&&(i4.u31.n5_0>=1)))||((i8.u41.n5_5>=1)&&(i8.u39.s3_5>=1)))||((i9.u42.n5_6>=1)&&(i9.u33.s3_6>=1)))))) + EG(!(((((((((i3.u24.s3_1>=1)&&(i3.u32.n5_1>=1))||((i7.u40.n5_2>=1)&&(i7.u36.s3_2>=1)))||((i5.u34.s3_3>=1)&&(i5.u30.n5_3>=1)))||((i6.u29.n5_4>=1)&&(i6.u38.s3_4>=1)))||((i4.u31.s3_0>=1)&&(i4.u31.n5_0>=1)))||((i8.u41.n5_5>=1)&&(i8.u39.s3_5>=1)))||((i9.u42.n5_6>=1)&&(i9.u33.s3_6>=1))))))) + !(((((((((((u0.s5_0>=1)&&(u0.malicious_reservoir>=1))||((u0.malicious_reservoir>=1)&&(u0.s5_1>=1)))||((u0.malicious_reservoir>=1)&&(u0.s5_2>=1)))||((u0.s5_3>=1)&&(u0.malicious_reservoir>=1)))||((u0.s5_4>=1)&&(u0.malicious_reservoir>=1)))||((u0.s5_5>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(u0.s5_6>=1)))&&(((((((i9.u13.s4_6>=1)||(i7.u8.s4_2>=1))||(i5.u11.s4_3>=1))||(i6.u10.s4_4>=1))||(i8.u12.s4_5>=1))||(i4.u31.s4_0>=1))||(i3.u9.s4_1>=1)))&&(i4.u14.a4>=1)))))),!((((((((((i4.u31.s4_0>=1)&&(u0.malicious_reservoir>=1))||((i3.u9.s4_1>=1)&&(u0.malicious_reservoir>=1)))||((i7.u8.s4_2>=1)&&(u0.malicious_reservoir>=1)))||((i5.u11.s4_3>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i6.u10.s4_4>=1)))||((i8.u12.s4_5>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i9.u13.s4_6>=1)))||(i4.u14.a5>=1))))] != FALSE)
(forward)formula 2,1,376.102,2431288,1,0,5.0243e+06,297526,1621,1.19186e+07,344,5.35718e+06,1563103
FORMULA QuasiCertifProtocol-PT-06-CTLFireability-02 TRUE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is TRUE !

***************************************

original formula: E(AF((((((((((u0.malicious_reservoir>=1)&&(i2.u5.s6_3>=1))||((u0.malicious_reservoir>=1)&&(i2.u4.s6_2>=1)))||((i2.u3.s6_1>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i2.u2.s6_0>=1)))||((u0.malicious_reservoir>=1)&&(i2.u7.s6_6>=1)))||((u0.malicious_reservoir>=1)&&(i2.u43.s6_5>=1)))||((u0.malicious_reservoir>=1)&&(i2.u6.s6_4>=1)))&&(i4.u14.a2>=1))) U !(((((((((((u0.s5_0>=1)&&(u0.malicious_reservoir>=1))||((u0.malicious_reservoir>=1)&&(u0.s5_1>=1)))||((u0.malicious_reservoir>=1)&&(u0.s5_2>=1)))||((u0.s5_3>=1)&&(u0.malicious_reservoir>=1)))||((u0.s5_4>=1)&&(u0.malicious_reservoir>=1)))||((u0.s5_5>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(u0.s5_6>=1)))&&((((((((i3.u24.s3_1>=1)&&(i3.u32.n5_1>=1))||((i7.u40.n5_2>=1)&&(i7.u36.s3_2>=1)))||((i5.u34.s3_3>=1)&&(i5.u30.n5_3>=1)))||((i6.u29.n5_4>=1)&&(i6.u38.s3_4>=1)))||((i4.u31.s3_0>=1)&&(i4.u31.n5_0>=1)))||((i8.u41.n5_5>=1)&&(i8.u39.s3_5>=1)))||((i9.u42.n5_6>=1)&&(i9.u33.s3_6>=1))))||((((((((i4.u22.Sstart_0>=1)&&(u0.malicious_reservoir>=1))||((i7.u28.Sstart_2>=1)&&(u0.malicious_reservoir>=1)))||((i3.u23.Sstart_1>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i6.u35.Sstart_4>=1)))||((u0.malicious_reservoir>=1)&&(i5.u26.Sstart_3>=1)))||((u0.malicious_reservoir>=1)&&(i8.u25.Sstart_5>=1)))||((i9.u27.Sstart_6>=1)&&(u0.malicious_reservoir>=1))))))
=> equivalent forward existential formula: [(FwdU(Init,!(EG(!((((((((((u0.malicious_reservoir>=1)&&(i2.u5.s6_3>=1))||((u0.malicious_reservoir>=1)&&(i2.u4.s6_2>=1)))||((i2.u3.s6_1>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i2.u2.s6_0>=1)))||((u0.malicious_reservoir>=1)&&(i2.u7.s6_6>=1)))||((u0.malicious_reservoir>=1)&&(i2.u43.s6_5>=1)))||((u0.malicious_reservoir>=1)&&(i2.u6.s6_4>=1)))&&(i4.u14.a2>=1)))))) * !(((((((((((u0.s5_0>=1)&&(u0.malicious_reservoir>=1))||((u0.malicious_reservoir>=1)&&(u0.s5_1>=1)))||((u0.malicious_reservoir>=1)&&(u0.s5_2>=1)))||((u0.s5_3>=1)&&(u0.malicious_reservoir>=1)))||((u0.s5_4>=1)&&(u0.malicious_reservoir>=1)))||((u0.s5_5>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(u0.s5_6>=1)))&&((((((((i3.u24.s3_1>=1)&&(i3.u32.n5_1>=1))||((i7.u40.n5_2>=1)&&(i7.u36.s3_2>=1)))||((i5.u34.s3_3>=1)&&(i5.u30.n5_3>=1)))||((i6.u29.n5_4>=1)&&(i6.u38.s3_4>=1)))||((i4.u31.s3_0>=1)&&(i4.u31.n5_0>=1)))||((i8.u41.n5_5>=1)&&(i8.u39.s3_5>=1)))||((i9.u42.n5_6>=1)&&(i9.u33.s3_6>=1))))||((((((((i4.u22.Sstart_0>=1)&&(u0.malicious_reservoir>=1))||((i7.u28.Sstart_2>=1)&&(u0.malicious_reservoir>=1)))||((i3.u23.Sstart_1>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i6.u35.Sstart_4>=1)))||((u0.malicious_reservoir>=1)&&(i5.u26.Sstart_3>=1)))||((u0.malicious_reservoir>=1)&&(i8.u25.Sstart_5>=1)))||((i9.u27.Sstart_6>=1)&&(u0.malicious_reservoir>=1))))))] != FALSE
(forward)formula 3,0,407.894,2431288,1,0,5.0243e+06,297526,2339,1.19186e+07,479,5.35718e+06,3196285
FORMULA QuasiCertifProtocol-PT-06-CTLFireability-03 FALSE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is FALSE !

***************************************

original formula: (AG(((!(((((((((i5.u34.n3_3>=1)&&(i5.u26.s2_3>=1))||((i7.u36.n3_2>=1)&&(i7.u28.s2_2>=1)))||((i3.u24.n3_1>=1)&&(i3.u23.s2_1>=1)))||((i4.u22.s2_0>=1)&&(i4.u37.n3_0>=1)))||((i6.u35.s2_4>=1)&&(i6.u38.n3_4>=1)))||((i8.u39.n3_5>=1)&&(i8.u25.s2_5>=1)))||((i9.u33.n3_6>=1)&&(i9.u27.s2_6>=1)))||((((((((i4.u31.s4_0>=1)&&(u0.malicious_reservoir>=1))||((i3.u9.s4_1>=1)&&(u0.malicious_reservoir>=1)))||((i7.u8.s4_2>=1)&&(u0.malicious_reservoir>=1)))||((i5.u11.s4_3>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i6.u10.s4_4>=1)))||((i8.u12.s4_5>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i9.u13.s4_6>=1)))))||((((((((((u1.c1_2>=1)&&(u0.malicious_reservoir>=1))||((u0.malicious_reservoir>=1)&&(u1.c1_1>=1)))||((u0.malicious_reservoir>=1)&&(u1.c1_0>=1)))||((u0.malicious_reservoir>=1)&&(u1.c1_6>=1)))||((u1.c1_5>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(u1.c1_4>=1)))||((u0.malicious_reservoir>=1)&&(u1.c1_3>=1)))||((((((((((((((i2.u6.n8_4_6>=1)&&(i2.u6.n8_4_5>=1))&&(i2.u6.n8_4_4>=1))&&(i2.u6.n8_4_3>=1))&&(i2.u6.n8_4_2>=1))&&(i2.u6.n8_4_1>=1))&&(i2.u6.n8_4_0>=1))&&(u0.s5_4>=1))||((((((((i2.u5.n8_3_3>=1)&&(i2.u5.n8_3_4>=1))&&(i2.u5.n8_3_5>=1))&&(i2.u5.n8_3_6>=1))&&(u0.s5_3>=1))&&(i2.u5.n8_3_0>=1))&&(i2.u5.n8_3_1>=1))&&(i2.u5.n8_3_2>=1)))||((((((((i2.u7.n8_6_6>=1)&&(i2.u7.n8_6_4>=1))&&(i2.u7.n8_6_5>=1))&&(i2.u7.n8_6_2>=1))&&(i2.u7.n8_6_3>=1))&&(i2.u7.n8_6_0>=1))&&(i2.u7.n8_6_1>=1))&&(u0.s5_6>=1)))||((((((((i2.u43.n8_5_4>=1)&&(i2.u43.n8_5_3>=1))&&(i2.u43.n8_5_2>=1))&&(i2.u43.n8_5_1>=1))&&(i2.u43.n8_5_0>=1))&&(u0.s5_5>=1))&&(i2.u43.n8_5_5>=1))&&(i2.u43.n8_5_6>=1)))||((((((((i2.u2.n8_0_1>=1)&&(i2.u2.n8_0_0>=1))&&(u0.s5_0>=1))&&(i2.u2.n8_0_6>=1))&&(i2.u2.n8_0_3>=1))&&(i2.u2.n8_0_2>=1))&&(i2.u2.n8_0_5>=1))&&(i2.u2.n8_0_4>=1)))||((((((((u0.s5_2>=1)&&(i2.u4.n8_2_4>=1))&&(i2.u4.n8_2_5>=1))&&(i2.u4.n8_2_6>=1))&&(i2.u4.n8_2_0>=1))&&(i2.u4.n8_2_1>=1))&&(i2.u4.n8_2_2>=1))&&(i2.u4.n8_2_3>=1)))||((((((((i2.u3.n8_1_6>=1)&&(i2.u3.n8_1_5>=1))&&(i2.u3.n8_1_2>=1))&&(i2.u3.n8_1_1>=1))&&(i2.u3.n8_1_4>=1))&&(i2.u3.n8_1_3>=1))&&(i2.u3.n8_1_0>=1))&&(u0.s5_1>=1))))&&(i4.u14.a5>=1)))) * (!((i4.u14.a2>=1)) + ((EX((i4.u14.a1>=1)) + !(((((((((i3.u32.n6_1>=1)&&(i4.u31.n6_0>=1))&&(i4.u14.a5>=1))&&(i9.u42.n6_6>=1))&&(i8.u41.n6_5>=1))&&(i6.u29.n6_4>=1))&&(i5.u30.n6_3>=1))&&(i7.u40.n6_2>=1)))) + !(((((((((i3.u32.n6_1>=1)&&(i4.u31.n6_0>=1))&&(i4.u14.a5>=1))&&(i9.u42.n6_6>=1))&&(i8.u41.n6_5>=1))&&(i6.u29.n6_4>=1))&&(i5.u30.n6_3>=1))&&(i7.u40.n6_2>=1))))))
=> equivalent forward existential formula: ([(FwdU(Init,TRUE) * !(((!(((((((((i5.u34.n3_3>=1)&&(i5.u26.s2_3>=1))||((i7.u36.n3_2>=1)&&(i7.u28.s2_2>=1)))||((i3.u24.n3_1>=1)&&(i3.u23.s2_1>=1)))||((i4.u22.s2_0>=1)&&(i4.u37.n3_0>=1)))||((i6.u35.s2_4>=1)&&(i6.u38.n3_4>=1)))||((i8.u39.n3_5>=1)&&(i8.u25.s2_5>=1)))||((i9.u33.n3_6>=1)&&(i9.u27.s2_6>=1)))||((((((((i4.u31.s4_0>=1)&&(u0.malicious_reservoir>=1))||((i3.u9.s4_1>=1)&&(u0.malicious_reservoir>=1)))||((i7.u8.s4_2>=1)&&(u0.malicious_reservoir>=1)))||((i5.u11.s4_3>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i6.u10.s4_4>=1)))||((i8.u12.s4_5>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i9.u13.s4_6>=1)))))||((((((((((u1.c1_2>=1)&&(u0.malicious_reservoir>=1))||((u0.malicious_reservoir>=1)&&(u1.c1_1>=1)))||((u0.malicious_reservoir>=1)&&(u1.c1_0>=1)))||((u0.malicious_reservoir>=1)&&(u1.c1_6>=1)))||((u1.c1_5>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(u1.c1_4>=1)))||((u0.malicious_reservoir>=1)&&(u1.c1_3>=1)))||((((((((((((((i2.u6.n8_4_6>=1)&&(i2.u6.n8_4_5>=1))&&(i2.u6.n8_4_4>=1))&&(i2.u6.n8_4_3>=1))&&(i2.u6.n8_4_2>=1))&&(i2.u6.n8_4_1>=1))&&(i2.u6.n8_4_0>=1))&&(u0.s5_4>=1))||((((((((i2.u5.n8_3_3>=1)&&(i2.u5.n8_3_4>=1))&&(i2.u5.n8_3_5>=1))&&(i2.u5.n8_3_6>=1))&&(u0.s5_3>=1))&&(i2.u5.n8_3_0>=1))&&(i2.u5.n8_3_1>=1))&&(i2.u5.n8_3_2>=1)))||((((((((i2.u7.n8_6_6>=1)&&(i2.u7.n8_6_4>=1))&&(i2.u7.n8_6_5>=1))&&(i2.u7.n8_6_2>=1))&&(i2.u7.n8_6_3>=1))&&(i2.u7.n8_6_0>=1))&&(i2.u7.n8_6_1>=1))&&(u0.s5_6>=1)))||((((((((i2.u43.n8_5_4>=1)&&(i2.u43.n8_5_3>=1))&&(i2.u43.n8_5_2>=1))&&(i2.u43.n8_5_1>=1))&&(i2.u43.n8_5_0>=1))&&(u0.s5_5>=1))&&(i2.u43.n8_5_5>=1))&&(i2.u43.n8_5_6>=1)))||((((((((i2.u2.n8_0_1>=1)&&(i2.u2.n8_0_0>=1))&&(u0.s5_0>=1))&&(i2.u2.n8_0_6>=1))&&(i2.u2.n8_0_3>=1))&&(i2.u2.n8_0_2>=1))&&(i2.u2.n8_0_5>=1))&&(i2.u2.n8_0_4>=1)))||((((((((u0.s5_2>=1)&&(i2.u4.n8_2_4>=1))&&(i2.u4.n8_2_5>=1))&&(i2.u4.n8_2_6>=1))&&(i2.u4.n8_2_0>=1))&&(i2.u4.n8_2_1>=1))&&(i2.u4.n8_2_2>=1))&&(i2.u4.n8_2_3>=1)))||((((((((i2.u3.n8_1_6>=1)&&(i2.u3.n8_1_5>=1))&&(i2.u3.n8_1_2>=1))&&(i2.u3.n8_1_1>=1))&&(i2.u3.n8_1_4>=1))&&(i2.u3.n8_1_3>=1))&&(i2.u3.n8_1_0>=1))&&(u0.s5_1>=1))))&&(i4.u14.a5>=1)))))] = FALSE * [((((Init * !(!((i4.u14.a2>=1)))) * !(!(((((((((i3.u32.n6_1>=1)&&(i4.u31.n6_0>=1))&&(i4.u14.a5>=1))&&(i9.u42.n6_6>=1))&&(i8.u41.n6_5>=1))&&(i6.u29.n6_4>=1))&&(i5.u30.n6_3>=1))&&(i7.u40.n6_2>=1))))) * !(!(((((((((i3.u32.n6_1>=1)&&(i4.u31.n6_0>=1))&&(i4.u14.a5>=1))&&(i9.u42.n6_6>=1))&&(i8.u41.n6_5>=1))&&(i6.u29.n6_4>=1))&&(i5.u30.n6_3>=1))&&(i7.u40.n6_2>=1))))) * !(EX((i4.u14.a1>=1))))] = FALSE)
(forward)formula 4,0,412.14,2431288,1,0,5.0243e+06,297526,2892,1.19186e+07,600,5.35718e+06,3386796
FORMULA QuasiCertifProtocol-PT-06-CTLFireability-04 FALSE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is FALSE !

***************************************

original formula: EG(((!((((((((((i3.u32.n6_1>=1)&&(i4.u31.n6_0>=1))&&(i4.u14.a5>=1))&&(i9.u42.n6_6>=1))&&(i8.u41.n6_5>=1))&&(i6.u29.n6_4>=1))&&(i5.u30.n6_3>=1))&&(i7.u40.n6_2>=1))||(i4.u14.a2>=1))) + AF(((((((((i4.u31.s4_0>=1)&&(u0.malicious_reservoir>=1))||((i3.u9.s4_1>=1)&&(u0.malicious_reservoir>=1)))||((i7.u8.s4_2>=1)&&(u0.malicious_reservoir>=1)))||((i5.u11.s4_3>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i6.u10.s4_4>=1)))||((i8.u12.s4_5>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i9.u13.s4_6>=1))))) + E(((((((((((((((u1.c1_0>=1)&&(i2.u17.n9_3_0>=1))&&(i2.u17.n9_2_0>=1))&&(i2.u17.n9_1_0>=1))&&(i2.u17.n9_0_0>=1))&&(i2.u17.n9_6_0>=1))&&(i2.u17.n9_5_0>=1))&&(i2.u17.n9_4_0>=1))||((((((((i2.u19.n9_3_5>=1)&&(i2.u19.n9_4_5>=1))&&(i2.u19.n9_5_5>=1))&&(i2.u19.n9_6_5>=1))&&(i2.u19.n9_0_5>=1))&&(u1.c1_5>=1))&&(i2.u19.n9_2_5>=1))&&(i2.u19.n9_1_5>=1)))||((((((((i2.u16.n9_2_6>=1)&&(i2.u16.n9_3_6>=1))&&(i2.u16.n9_4_6>=1))&&(i2.u16.n9_5_6>=1))&&(i2.u16.n9_6_6>=1))&&(u1.c1_6>=1))&&(i2.u16.n9_0_6>=1))&&(i2.u16.n9_1_6>=1)))||((((((((i2.u21.n9_6_3>=1)&&(i2.u21.n9_5_3>=1))&&(u1.c1_3>=1))&&(i2.u21.n9_0_3>=1))&&(i2.u21.n9_3_3>=1))&&(i2.u21.n9_4_3>=1))&&(i2.u21.n9_1_3>=1))&&(i2.u21.n9_2_3>=1)))||((((((((i2.u20.n9_5_4>=1)&&(i2.u20.n9_4_4>=1))&&(i2.u20.n9_6_4>=1))&&(u1.c1_4>=1))&&(i2.u20.n9_1_4>=1))&&(i2.u20.n9_0_4>=1))&&(i2.u20.n9_3_4>=1))&&(i2.u20.n9_2_4>=1)))||((((((((i2.u18.n9_2_1>=1)&&(i2.u18.n9_1_1>=1))&&(i2.u18.n9_0_1>=1))&&(u1.c1_1>=1))&&(i2.u18.n9_6_1>=1))&&(i2.u18.n9_5_1>=1))&&(i2.u18.n9_4_1>=1))&&(i2.u18.n9_3_1>=1)))||((((((((i2.u15.n9_6_2>=1)&&(i2.u15.n9_0_2>=1))&&(i2.u15.n9_1_2>=1))&&(u1.c1_2>=1))&&(i2.u15.n9_4_2>=1))&&(i2.u15.n9_5_2>=1))&&(i2.u15.n9_2_2>=1))&&(i2.u15.n9_3_2>=1))) U ((((((((u1.c1_2>=1)&&(u0.malicious_reservoir>=1))||((u0.malicious_reservoir>=1)&&(u1.c1_1>=1)))||((u0.malicious_reservoir>=1)&&(u1.c1_0>=1)))||((u0.malicious_reservoir>=1)&&(u1.c1_6>=1)))||((u1.c1_5>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(u1.c1_4>=1)))||((u0.malicious_reservoir>=1)&&(u1.c1_3>=1))))))
=> equivalent forward existential formula: [FwdG(Init,((!((((((((((i3.u32.n6_1>=1)&&(i4.u31.n6_0>=1))&&(i4.u14.a5>=1))&&(i9.u42.n6_6>=1))&&(i8.u41.n6_5>=1))&&(i6.u29.n6_4>=1))&&(i5.u30.n6_3>=1))&&(i7.u40.n6_2>=1))||(i4.u14.a2>=1))) + !(EG(!(((((((((i4.u31.s4_0>=1)&&(u0.malicious_reservoir>=1))||((i3.u9.s4_1>=1)&&(u0.malicious_reservoir>=1)))||((i7.u8.s4_2>=1)&&(u0.malicious_reservoir>=1)))||((i5.u11.s4_3>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i6.u10.s4_4>=1)))||((i8.u12.s4_5>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i9.u13.s4_6>=1))))))) + E(((((((((((((((u1.c1_0>=1)&&(i2.u17.n9_3_0>=1))&&(i2.u17.n9_2_0>=1))&&(i2.u17.n9_1_0>=1))&&(i2.u17.n9_0_0>=1))&&(i2.u17.n9_6_0>=1))&&(i2.u17.n9_5_0>=1))&&(i2.u17.n9_4_0>=1))||((((((((i2.u19.n9_3_5>=1)&&(i2.u19.n9_4_5>=1))&&(i2.u19.n9_5_5>=1))&&(i2.u19.n9_6_5>=1))&&(i2.u19.n9_0_5>=1))&&(u1.c1_5>=1))&&(i2.u19.n9_2_5>=1))&&(i2.u19.n9_1_5>=1)))||((((((((i2.u16.n9_2_6>=1)&&(i2.u16.n9_3_6>=1))&&(i2.u16.n9_4_6>=1))&&(i2.u16.n9_5_6>=1))&&(i2.u16.n9_6_6>=1))&&(u1.c1_6>=1))&&(i2.u16.n9_0_6>=1))&&(i2.u16.n9_1_6>=1)))||((((((((i2.u21.n9_6_3>=1)&&(i2.u21.n9_5_3>=1))&&(u1.c1_3>=1))&&(i2.u21.n9_0_3>=1))&&(i2.u21.n9_3_3>=1))&&(i2.u21.n9_4_3>=1))&&(i2.u21.n9_1_3>=1))&&(i2.u21.n9_2_3>=1)))||((((((((i2.u20.n9_5_4>=1)&&(i2.u20.n9_4_4>=1))&&(i2.u20.n9_6_4>=1))&&(u1.c1_4>=1))&&(i2.u20.n9_1_4>=1))&&(i2.u20.n9_0_4>=1))&&(i2.u20.n9_3_4>=1))&&(i2.u20.n9_2_4>=1)))||((((((((i2.u18.n9_2_1>=1)&&(i2.u18.n9_1_1>=1))&&(i2.u18.n9_0_1>=1))&&(u1.c1_1>=1))&&(i2.u18.n9_6_1>=1))&&(i2.u18.n9_5_1>=1))&&(i2.u18.n9_4_1>=1))&&(i2.u18.n9_3_1>=1)))||((((((((i2.u15.n9_6_2>=1)&&(i2.u15.n9_0_2>=1))&&(i2.u15.n9_1_2>=1))&&(u1.c1_2>=1))&&(i2.u15.n9_4_2>=1))&&(i2.u15.n9_5_2>=1))&&(i2.u15.n9_2_2>=1))&&(i2.u15.n9_3_2>=1))) U ((((((((u1.c1_2>=1)&&(u0.malicious_reservoir>=1))||((u0.malicious_reservoir>=1)&&(u1.c1_1>=1)))||((u0.malicious_reservoir>=1)&&(u1.c1_0>=1)))||((u0.malicious_reservoir>=1)&&(u1.c1_6>=1)))||((u1.c1_5>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(u1.c1_4>=1)))||((u0.malicious_reservoir>=1)&&(u1.c1_3>=1))))))] != FALSE
(forward)formula 5,1,455.071,2431288,1,0,5.0243e+06,297526,3352,1.19186e+07,702,5.35718e+06,4027960
FORMULA QuasiCertifProtocol-PT-06-CTLFireability-05 TRUE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is TRUE !

***************************************

original formula: AG(!(EG((i4.u14.a3>=1))))
=> equivalent forward existential formula: [FwdG(FwdU(Init,TRUE),(i4.u14.a3>=1))] = FALSE
dead was empty
(forward)formula 6,1,455.078,2431288,1,0,5.0243e+06,297526,3353,1.19186e+07,702,5.35718e+06,4030233
FORMULA QuasiCertifProtocol-PT-06-CTLFireability-06 TRUE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is TRUE !

***************************************

original formula: (((AG(!((i4.u14.a3>=1))) * EF(!(((((((((i4.u22.Sstart_0>=1)&&(u0.malicious_reservoir>=1))||((i7.u28.Sstart_2>=1)&&(u0.malicious_reservoir>=1)))||((i3.u23.Sstart_1>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i6.u35.Sstart_4>=1)))||((u0.malicious_reservoir>=1)&&(i5.u26.Sstart_3>=1)))||((u0.malicious_reservoir>=1)&&(i8.u25.Sstart_5>=1)))||((i9.u27.Sstart_6>=1)&&(u0.malicious_reservoir>=1)))))) + EX(((((((((i3.u32.n6_1>=1)&&(i4.u31.n6_0>=1))&&(i4.u14.a5>=1))&&(i9.u42.n6_6>=1))&&(i8.u41.n6_5>=1))&&(i6.u29.n6_4>=1))&&(i5.u30.n6_3>=1))&&(i7.u40.n6_2>=1)))) * EX(((!(((((((((i4.u22.Sstart_0>=1)&&(u0.malicious_reservoir>=1))||((i7.u28.Sstart_2>=1)&&(u0.malicious_reservoir>=1)))||((i3.u23.Sstart_1>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i6.u35.Sstart_4>=1)))||((u0.malicious_reservoir>=1)&&(i5.u26.Sstart_3>=1)))||((u0.malicious_reservoir>=1)&&(i8.u25.Sstart_5>=1)))||((i9.u27.Sstart_6>=1)&&(u0.malicious_reservoir>=1)))&&((((((((u0.malicious_reservoir>=1)&&(i3.u23.s2_1>=1))||((u0.malicious_reservoir>=1)&&(i4.u22.s2_0>=1)))||((u0.malicious_reservoir>=1)&&(i5.u26.s2_3>=1)))||((i7.u28.s2_2>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i8.u25.s2_5>=1)))||((i6.u35.s2_4>=1)&&(u0.malicious_reservoir>=1)))||((i9.u27.s2_6>=1)&&(u0.malicious_reservoir>=1)))))&&((!((((((((((((((u1.c1_0>=1)&&(i2.u17.n9_3_0>=1))&&(i2.u17.n9_2_0>=1))&&(i2.u17.n9_1_0>=1))&&(i2.u17.n9_0_0>=1))&&(i2.u17.n9_6_0>=1))&&(i2.u17.n9_5_0>=1))&&(i2.u17.n9_4_0>=1))||((((((((i2.u19.n9_3_5>=1)&&(i2.u19.n9_4_5>=1))&&(i2.u19.n9_5_5>=1))&&(i2.u19.n9_6_5>=1))&&(i2.u19.n9_0_5>=1))&&(u1.c1_5>=1))&&(i2.u19.n9_2_5>=1))&&(i2.u19.n9_1_5>=1)))||((((((((i2.u16.n9_2_6>=1)&&(i2.u16.n9_3_6>=1))&&(i2.u16.n9_4_6>=1))&&(i2.u16.n9_5_6>=1))&&(i2.u16.n9_6_6>=1))&&(u1.c1_6>=1))&&(i2.u16.n9_0_6>=1))&&(i2.u16.n9_1_6>=1)))||((((((((i2.u21.n9_6_3>=1)&&(i2.u21.n9_5_3>=1))&&(u1.c1_3>=1))&&(i2.u21.n9_0_3>=1))&&(i2.u21.n9_3_3>=1))&&(i2.u21.n9_4_3>=1))&&(i2.u21.n9_1_3>=1))&&(i2.u21.n9_2_3>=1)))||((((((((i2.u20.n9_5_4>=1)&&(i2.u20.n9_4_4>=1))&&(i2.u20.n9_6_4>=1))&&(u1.c1_4>=1))&&(i2.u20.n9_1_4>=1))&&(i2.u20.n9_0_4>=1))&&(i2.u20.n9_3_4>=1))&&(i2.u20.n9_2_4>=1)))||((((((((i2.u18.n9_2_1>=1)&&(i2.u18.n9_1_1>=1))&&(i2.u18.n9_0_1>=1))&&(u1.c1_1>=1))&&(i2.u18.n9_6_1>=1))&&(i2.u18.n9_5_1>=1))&&(i2.u18.n9_4_1>=1))&&(i2.u18.n9_3_1>=1)))||((((((((i2.u15.n9_6_2>=1)&&(i2.u15.n9_0_2>=1))&&(i2.u15.n9_1_2>=1))&&(u1.c1_2>=1))&&(i2.u15.n9_4_2>=1))&&(i2.u15.n9_5_2>=1))&&(i2.u15.n9_2_2>=1))&&(i2.u15.n9_3_2>=1))))||(((((((((i4.u22.Sstart_0>=1)&&(u0.malicious_reservoir>=1))||((i7.u28.Sstart_2>=1)&&(u0.malicious_reservoir>=1)))||((i3.u23.Sstart_1>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i6.u35.Sstart_4>=1)))||((u0.malicious_reservoir>=1)&&(i5.u26.Sstart_3>=1)))||((u0.malicious_reservoir>=1)&&(i8.u25.Sstart_5>=1)))||((i9.u27.Sstart_6>=1)&&(u0.malicious_reservoir>=1)))&&(i4.u14.a5>=1))))))
=> equivalent forward existential formula: (([(FwdU((Init * !(EX(((((((((i3.u32.n6_1>=1)&&(i4.u31.n6_0>=1))&&(i4.u14.a5>=1))&&(i9.u42.n6_6>=1))&&(i8.u41.n6_5>=1))&&(i6.u29.n6_4>=1))&&(i5.u30.n6_3>=1))&&(i7.u40.n6_2>=1))))),TRUE) * (i4.u14.a3>=1))] = FALSE * [((Init * !(EX(((((((((i3.u32.n6_1>=1)&&(i4.u31.n6_0>=1))&&(i4.u14.a5>=1))&&(i9.u42.n6_6>=1))&&(i8.u41.n6_5>=1))&&(i6.u29.n6_4>=1))&&(i5.u30.n6_3>=1))&&(i7.u40.n6_2>=1))))) * !(E(TRUE U !(((((((((i4.u22.Sstart_0>=1)&&(u0.malicious_reservoir>=1))||((i7.u28.Sstart_2>=1)&&(u0.malicious_reservoir>=1)))||((i3.u23.Sstart_1>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i6.u35.Sstart_4>=1)))||((u0.malicious_reservoir>=1)&&(i5.u26.Sstart_3>=1)))||((u0.malicious_reservoir>=1)&&(i8.u25.Sstart_5>=1)))||((i9.u27.Sstart_6>=1)&&(u0.malicious_reservoir>=1)))))))] = FALSE) * [(Init * !(EX(((!(((((((((i4.u22.Sstart_0>=1)&&(u0.malicious_reservoir>=1))||((i7.u28.Sstart_2>=1)&&(u0.malicious_reservoir>=1)))||((i3.u23.Sstart_1>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i6.u35.Sstart_4>=1)))||((u0.malicious_reservoir>=1)&&(i5.u26.Sstart_3>=1)))||((u0.malicious_reservoir>=1)&&(i8.u25.Sstart_5>=1)))||((i9.u27.Sstart_6>=1)&&(u0.malicious_reservoir>=1)))&&((((((((u0.malicious_reservoir>=1)&&(i3.u23.s2_1>=1))||((u0.malicious_reservoir>=1)&&(i4.u22.s2_0>=1)))||((u0.malicious_reservoir>=1)&&(i5.u26.s2_3>=1)))||((i7.u28.s2_2>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i8.u25.s2_5>=1)))||((i6.u35.s2_4>=1)&&(u0.malicious_reservoir>=1)))||((i9.u27.s2_6>=1)&&(u0.malicious_reservoir>=1)))))&&((!((((((((((((((u1.c1_0>=1)&&(i2.u17.n9_3_0>=1))&&(i2.u17.n9_2_0>=1))&&(i2.u17.n9_1_0>=1))&&(i2.u17.n9_0_0>=1))&&(i2.u17.n9_6_0>=1))&&(i2.u17.n9_5_0>=1))&&(i2.u17.n9_4_0>=1))||((((((((i2.u19.n9_3_5>=1)&&(i2.u19.n9_4_5>=1))&&(i2.u19.n9_5_5>=1))&&(i2.u19.n9_6_5>=1))&&(i2.u19.n9_0_5>=1))&&(u1.c1_5>=1))&&(i2.u19.n9_2_5>=1))&&(i2.u19.n9_1_5>=1)))||((((((((i2.u16.n9_2_6>=1)&&(i2.u16.n9_3_6>=1))&&(i2.u16.n9_4_6>=1))&&(i2.u16.n9_5_6>=1))&&(i2.u16.n9_6_6>=1))&&(u1.c1_6>=1))&&(i2.u16.n9_0_6>=1))&&(i2.u16.n9_1_6>=1)))||((((((((i2.u21.n9_6_3>=1)&&(i2.u21.n9_5_3>=1))&&(u1.c1_3>=1))&&(i2.u21.n9_0_3>=1))&&(i2.u21.n9_3_3>=1))&&(i2.u21.n9_4_3>=1))&&(i2.u21.n9_1_3>=1))&&(i2.u21.n9_2_3>=1)))||((((((((i2.u20.n9_5_4>=1)&&(i2.u20.n9_4_4>=1))&&(i2.u20.n9_6_4>=1))&&(u1.c1_4>=1))&&(i2.u20.n9_1_4>=1))&&(i2.u20.n9_0_4>=1))&&(i2.u20.n9_3_4>=1))&&(i2.u20.n9_2_4>=1)))||((((((((i2.u18.n9_2_1>=1)&&(i2.u18.n9_1_1>=1))&&(i2.u18.n9_0_1>=1))&&(u1.c1_1>=1))&&(i2.u18.n9_6_1>=1))&&(i2.u18.n9_5_1>=1))&&(i2.u18.n9_4_1>=1))&&(i2.u18.n9_3_1>=1)))||((((((((i2.u15.n9_6_2>=1)&&(i2.u15.n9_0_2>=1))&&(i2.u15.n9_1_2>=1))&&(u1.c1_2>=1))&&(i2.u15.n9_4_2>=1))&&(i2.u15.n9_5_2>=1))&&(i2.u15.n9_2_2>=1))&&(i2.u15.n9_3_2>=1))))||(((((((((i4.u22.Sstart_0>=1)&&(u0.malicious_reservoir>=1))||((i7.u28.Sstart_2>=1)&&(u0.malicious_reservoir>=1)))||((i3.u23.Sstart_1>=1)&&(u0.malicious_reservoir>=1)))||((u0.malicious_reservoir>=1)&&(i6.u35.Sstart_4>=1)))||((u0.malicious_reservoir>=1)&&(i5.u26.Sstart_3>=1)))||((u0.malicious_reservoir>=1)&&(i8.u25.Sstart_5>=1)))||((i9.u27.Sstart_6>=1)&&(u0.malicious_reservoir>=1)))&&(i4.u14.a5>=1)))))))] = FALSE)
(forward)formula 7,0,470.579,2431288,1,0,5.0243e+06,297526,3391,1.19186e+07,702,5.35718e+06,4075329
FORMULA QuasiCertifProtocol-PT-06-CTLFireability-07 FALSE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is FALSE !

***************************************

original formula: EF(((EF(((i9.u27.Sstart_6>=1)&&(u0.malicious_reservoir>=1))) * ((((((((i2.u20.n9_5_4>=1)&&(i2.u20.n9_4_4>=1))&&(i2.u20.n9_6_4>=1))&&(u1.c1_4>=1))&&(i2.u20.n9_1_4>=1))&&(i2.u20.n9_0_4>=1))&&(i2.u20.n9_3_4>=1))&&(i2.u20.n9_2_4>=1))) * A(((u0.malicious_reservoir>=1)&&(i6.u10.s4_4>=1)) U (i4.u14.a1>=1))))
=> equivalent forward existential formula: [(((FwdU(Init,TRUE) * (E(TRUE U ((i9.u27.Sstart_6>=1)&&(u0.malicious_reservoir>=1))) * ((((((((i2.u20.n9_5_4>=1)&&(i2.u20.n9_4_4>=1))&&(i2.u20.n9_6_4>=1))&&(u1.c1_4>=1))&&(i2.u20.n9_1_4>=1))&&(i2.u20.n9_0_4>=1))&&(i2.u20.n9_3_4>=1))&&(i2.u20.n9_2_4>=1)))) * !(EG(!((i4.u14.a1>=1))))) * !(E(!((i4.u14.a1>=1)) U (!(((u0.malicious_reservoir>=1)&&(i6.u10.s4_4>=1))) * !((i4.u14.a1>=1))))))] != FALSE
(forward)formula 8,0,475.656,2431288,1,0,5.0243e+06,297526,3417,1.19186e+07,703,5.35718e+06,4198474
FORMULA QuasiCertifProtocol-PT-06-CTLFireability-08 FALSE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is FALSE !

***************************************

original formula: !((!(EG(!((i2.u2.s6_0>=1)))) + (((((((((i3.u9.n7_1_1>=1)&&(i7.u8.n7_2_1>=1))&&(i5.u11.n7_3_1>=1))&&(i6.u10.n7_4_1>=1))&&(i8.u12.n7_5_1>=1))&&(i9.u13.n7_6_1>=1))&&(i2.u5.Cstart_1>=1))&&(i4.u31.n7_0_1>=1))||(((i7.u28.Sstart_2>=1)&&(u0.malicious_reservoir>=1))&&((((((((i2.u16.n9_2_6>=1)&&(i2.u16.n9_3_6>=1))&&(i2.u16.n9_4_6>=1))&&(i2.u16.n9_5_6>=1))&&(i2.u16.n9_6_6>=1))&&(u1.c1_6>=1))&&(i2.u16.n9_0_6>=1))&&(i2.u16.n9_1_6>=1))))))
=> equivalent forward existential formula: [FwdG((Init * !((((((((((i3.u9.n7_1_1>=1)&&(i7.u8.n7_2_1>=1))&&(i5.u11.n7_3_1>=1))&&(i6.u10.n7_4_1>=1))&&(i8.u12.n7_5_1>=1))&&(i9.u13.n7_6_1>=1))&&(i2.u5.Cstart_1>=1))&&(i4.u31.n7_0_1>=1))||(((i7.u28.Sstart_2>=1)&&(u0.malicious_reservoir>=1))&&((((((((i2.u16.n9_2_6>=1)&&(i2.u16.n9_3_6>=1))&&(i2.u16.n9_4_6>=1))&&(i2.u16.n9_5_6>=1))&&(i2.u16.n9_6_6>=1))&&(u1.c1_6>=1))&&(i2.u16.n9_0_6>=1))&&(i2.u16.n9_1_6>=1)))))),!((i2.u2.s6_0>=1)))] != FALSE
(forward)formula 9,1,485.184,2431288,1,0,5.0243e+06,297526,3476,1.19186e+07,704,5.35718e+06,4739248
FORMULA QuasiCertifProtocol-PT-06-CTLFireability-09 TRUE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is TRUE !

***************************************

original formula: (EG((((((((((i2.u43.n8_5_4>=1)&&(i2.u43.n8_5_3>=1))&&(i2.u43.n8_5_2>=1))&&(i2.u43.n8_5_1>=1))&&(i2.u43.n8_5_0>=1))&&(u0.s5_5>=1))&&(i2.u43.n8_5_5>=1))&&(i2.u43.n8_5_6>=1))||(((((((((i8.u12.n7_5_6>=1)&&(i9.u13.n7_6_6>=1))&&(i2.u43.Cstart_6>=1))&&(i3.u9.n7_1_6>=1))&&(i7.u8.n7_2_6>=1))&&(i5.u11.n7_3_6>=1))&&(i6.u10.n7_4_6>=1))&&(i4.u31.n7_0_6>=1))||(i4.u14.a1>=1)))) + !(AF(EG(((i3.u23.Sstart_1>=1)&&(i3.u23.n1_1>=1))))))
=> equivalent forward existential formula: ([FwdG(Init,(((((((((i2.u43.n8_5_4>=1)&&(i2.u43.n8_5_3>=1))&&(i2.u43.n8_5_2>=1))&&(i2.u43.n8_5_1>=1))&&(i2.u43.n8_5_0>=1))&&(u0.s5_5>=1))&&(i2.u43.n8_5_5>=1))&&(i2.u43.n8_5_6>=1))||(((((((((i8.u12.n7_5_6>=1)&&(i9.u13.n7_6_6>=1))&&(i2.u43.Cstart_6>=1))&&(i3.u9.n7_1_6>=1))&&(i7.u8.n7_2_6>=1))&&(i5.u11.n7_3_6>=1))&&(i6.u10.n7_4_6>=1))&&(i4.u31.n7_0_6>=1))||(i4.u14.a1>=1))))] != FALSE + [FwdG(Init,!(EG(((i3.u23.Sstart_1>=1)&&(i3.u23.n1_1>=1)))))] != FALSE)
dead was empty
(forward)formula 10,1,485.229,2431288,1,0,5.0243e+06,297526,3530,1.19186e+07,706,5.35718e+06,4751043
FORMULA QuasiCertifProtocol-PT-06-CTLFireability-10 TRUE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is TRUE !

***************************************

original formula: !(E((((u0.malicious_reservoir>=1)&&(i5.u34.s3_3>=1))&&(((i8.u41.n5_5>=1)&&(i8.u39.s3_5>=1))||((i9.u27.s2_6>=1)&&(u0.malicious_reservoir>=1)))) U AF((i2.u6.s6_4>=1))))
=> equivalent forward existential formula: [(FwdU(Init,(((u0.malicious_reservoir>=1)&&(i5.u34.s3_3>=1))&&(((i8.u41.n5_5>=1)&&(i8.u39.s3_5>=1))||((i9.u27.s2_6>=1)&&(u0.malicious_reservoir>=1))))) * !(EG(!((i2.u6.s6_4>=1)))))] = FALSE
(forward)formula 11,1,549.335,2431288,1,0,5.0243e+06,297526,3566,1.19186e+07,707,5.35718e+06,5507912
FORMULA QuasiCertifProtocol-PT-06-CTLFireability-11 TRUE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is TRUE !

***************************************

original formula: AG(A(((u0.malicious_reservoir>=1)&&(u0.s5_2>=1)) U !(((u0.malicious_reservoir>=1)&&(i2.u5.s6_3>=1)))))
=> equivalent forward existential formula: ([(FwdU(FwdU(Init,TRUE),!(!(((u0.malicious_reservoir>=1)&&(i2.u5.s6_3>=1))))) * (!(((u0.malicious_reservoir>=1)&&(u0.s5_2>=1))) * !(!(((u0.malicious_reservoir>=1)&&(i2.u5.s6_3>=1))))))] = FALSE * [FwdG(FwdU(Init,TRUE),!(!(((u0.malicious_reservoir>=1)&&(i2.u5.s6_3>=1)))))] = FALSE)
dead was empty
(forward)formula 12,0,553.623,2431288,1,0,5.0243e+06,297526,3604,1.19186e+07,712,5.35718e+06,5789602
FORMULA QuasiCertifProtocol-PT-06-CTLFireability-12 FALSE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is FALSE !

***************************************

original formula: (!(AX(EF(((i3.u9.s4_1>=1)&&(u0.malicious_reservoir>=1))))) + (!(EG(((i2.u4.s6_2>=1)||((i4.u22.n1_0>=1)&&(i4.u22.Sstart_0>=1))))) * ((((((((((u1.c1_0>=1)&&(i2.u17.n9_3_0>=1))&&(i2.u17.n9_2_0>=1))&&(i2.u17.n9_1_0>=1))&&(i2.u17.n9_0_0>=1))&&(i2.u17.n9_6_0>=1))&&(i2.u17.n9_5_0>=1))&&(i2.u17.n9_4_0>=1))&&((u0.s5_4>=1)&&(u0.malicious_reservoir>=1))) + (((!((u0.malicious_reservoir>=1)&&(i5.u26.s2_3>=1)))||(((((((((i2.u6.n8_4_6>=1)&&(i2.u6.n8_4_5>=1))&&(i2.u6.n8_4_4>=1))&&(i2.u6.n8_4_3>=1))&&(i2.u6.n8_4_2>=1))&&(i2.u6.n8_4_1>=1))&&(i2.u6.n8_4_0>=1))&&(u0.s5_4>=1))||((i4.u22.Sstart_0>=1)&&(u0.malicious_reservoir>=1)))) * EF((i6.u10.s4_4>=1))))))
=> equivalent forward existential formula: ([FwdG((Init * !(!(!(EX(!(E(TRUE U ((i3.u9.s4_1>=1)&&(u0.malicious_reservoir>=1))))))))),((i2.u4.s6_2>=1)||((i4.u22.n1_0>=1)&&(i4.u22.Sstart_0>=1))))] = FALSE * ([(((Init * !(!(!(EX(!(E(TRUE U ((i3.u9.s4_1>=1)&&(u0.malicious_reservoir>=1))))))))) * !((((((((((u1.c1_0>=1)&&(i2.u17.n9_3_0>=1))&&(i2.u17.n9_2_0>=1))&&(i2.u17.n9_1_0>=1))&&(i2.u17.n9_0_0>=1))&&(i2.u17.n9_6_0>=1))&&(i2.u17.n9_5_0>=1))&&(i2.u17.n9_4_0>=1))&&((u0.s5_4>=1)&&(u0.malicious_reservoir>=1))))) * !(((!((u0.malicious_reservoir>=1)&&(i5.u26.s2_3>=1)))||(((((((((i2.u6.n8_4_6>=1)&&(i2.u6.n8_4_5>=1))&&(i2.u6.n8_4_4>=1))&&(i2.u6.n8_4_3>=1))&&(i2.u6.n8_4_2>=1))&&(i2.u6.n8_4_1>=1))&&(i2.u6.n8_4_0>=1))&&(u0.s5_4>=1))||((i4.u22.Sstart_0>=1)&&(u0.malicious_reservoir>=1))))))] = FALSE * [(((Init * !(!(!(EX(!(E(TRUE U ((i3.u9.s4_1>=1)&&(u0.malicious_reservoir>=1))))))))) * !((((((((((u1.c1_0>=1)&&(i2.u17.n9_3_0>=1))&&(i2.u17.n9_2_0>=1))&&(i2.u17.n9_1_0>=1))&&(i2.u17.n9_0_0>=1))&&(i2.u17.n9_6_0>=1))&&(i2.u17.n9_5_0>=1))&&(i2.u17.n9_4_0>=1))&&((u0.s5_4>=1)&&(u0.malicious_reservoir>=1))))) * !(E(TRUE U (i6.u10.s4_4>=1))))] = FALSE))
dead was empty
(forward)formula 13,1,554.952,2431288,1,0,5.0243e+06,297526,3619,1.19186e+07,714,5.35718e+06,5897165
FORMULA QuasiCertifProtocol-PT-06-CTLFireability-13 TRUE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is TRUE !

***************************************

original formula: AF(((i8.u41.n5_5>=1)&&(i8.u39.s3_5>=1)))
=> equivalent forward existential formula: [FwdG(Init,!(((i8.u41.n5_5>=1)&&(i8.u39.s3_5>=1))))] = FALSE
(forward)formula 14,0,554.977,2431288,1,0,5.0243e+06,297526,3633,1.19186e+07,714,5.35718e+06,5899864
FORMULA QuasiCertifProtocol-PT-06-CTLFireability-14 FALSE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is FALSE !

***************************************

original formula: (AF((((i7.u8.s4_2>=1)&&(u0.malicious_reservoir>=1))&&((u1.c1_2>=1)&&(u0.malicious_reservoir>=1)))) * !(EF(((i4.u14.a3>=1)||(((u0.malicious_reservoir>=1)&&(u1.c1_1>=1))||((u0.malicious_reservoir>=1)&&(i2.u5.s6_3>=1)))))))
=> equivalent forward existential formula: ([FwdG(Init,!((((i7.u8.s4_2>=1)&&(u0.malicious_reservoir>=1))&&((u1.c1_2>=1)&&(u0.malicious_reservoir>=1)))))] = FALSE * [(FwdU(Init,TRUE) * ((i4.u14.a3>=1)||(((u0.malicious_reservoir>=1)&&(u1.c1_1>=1))||((u0.malicious_reservoir>=1)&&(i2.u5.s6_3>=1)))))] = FALSE)
(forward)formula 15,0,555.546,2431288,1,0,5.0243e+06,297526,3638,1.19186e+07,714,5.35718e+06,5905619
FORMULA QuasiCertifProtocol-PT-06-CTLFireability-15 FALSE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is FALSE !

***************************************

ITS tools runner thread asked to quit. Dying gracefully.

BK_STOP 1527894046155

--------------------
content from stderr:

+ export BINDIR=/home/mcc/BenchKit/
+ BINDIR=/home/mcc/BenchKit/
++ pwd
+ export MODEL=/home/mcc/execution
+ MODEL=/home/mcc/execution
+ /home/mcc/BenchKit//runeclipse.sh /home/mcc/execution CTLFireability -its -ltsminpath /home/mcc/BenchKit//lts_install_dir/ -louvain -smt
+ ulimit -s 65536
+ [[ -z '' ]]
+ export LTSMIN_MEM_SIZE=8589934592
+ LTSMIN_MEM_SIZE=8589934592
+ /home/mcc/BenchKit//itstools/its-tools -consoleLog -data /home/mcc/execution/workspace -pnfolder /home/mcc/execution -examination CTLFireability -z3path /home/mcc/BenchKit//z3/bin/z3 -yices2path /home/mcc/BenchKit//yices/bin/yices -its -ltsminpath /home/mcc/BenchKit//lts_install_dir/ -louvain -smt -vmargs -Dosgi.locking=none -Declipse.stateSaveDelayInterval=-1 -Dosgi.configuration.area=/tmp/.eclipse -Xss8m -Xms40m -Xmx8192m -Dfile.encoding=UTF-8 -Dosgi.requiredJavaVersion=1.6
Jun 01, 2018 10:51:26 PM fr.lip6.move.gal.application.Application start
INFO: Running its-tools with arguments : [-pnfolder, /home/mcc/execution, -examination, CTLFireability, -z3path, /home/mcc/BenchKit//z3/bin/z3, -yices2path, /home/mcc/BenchKit//yices/bin/yices, -its, -ltsminpath, /home/mcc/BenchKit//lts_install_dir/, -louvain, -smt]
Jun 01, 2018 10:51:26 PM fr.lip6.move.gal.application.MccTranslator transformPNML
INFO: Parsing pnml file : /home/mcc/execution/model.pnml
Jun 01, 2018 10:51:26 PM fr.lip6.move.gal.nupn.PTNetReader loadFromXML
INFO: Load time of PNML (sax parser for PT used): 159 ms
Jun 01, 2018 10:51:26 PM fr.lip6.move.gal.pnml.togal.PTGALTransformer handlePage
INFO: Transformed 270 places.
Jun 01, 2018 10:51:26 PM fr.lip6.move.gal.pnml.togal.PTGALTransformer handlePage
INFO: Transformed 116 transitions.
Jun 01, 2018 10:51:26 PM fr.lip6.move.serialization.SerializationUtil systemToFile
INFO: Time to serialize gal into /home/mcc/execution/model.pnml.img.gal : 26 ms
Jun 01, 2018 10:51:27 PM fr.lip6.move.gal.application.MccTranslator applyOrder
INFO: Applying decomposition
Jun 01, 2018 10:51:27 PM fr.lip6.move.gal.instantiate.GALRewriter flatten
INFO: Flatten gal took : 93 ms
Jun 01, 2018 10:51:27 PM fr.lip6.move.gal.instantiate.GALRewriter flatten
INFO: Flatten gal took : 53 ms
Begin: Fri Jun 1 22:51:27 2018

Computation of communities with the Newman-Girvan Modularity quality function

level 0:
start computation: Fri Jun 1 22:51:27 2018
network size: 270 nodes, 1720 links, 232 weight
quality increased from -0.0485634 to 0.456209
end computation: Fri Jun 1 22:51:27 2018
level 1:
start computation: Fri Jun 1 22:51:27 2018
network size: 44 nodes, 500 links, 232 weight
quality increased from 0.456209 to 0.496649
end computation: Fri Jun 1 22:51:27 2018
level 2:
start computation: Fri Jun 1 22:51:27 2018
network size: 21 nodes, 271 links, 232 weight
quality increased from 0.496649 to 0.527451
end computation: Fri Jun 1 22:51:27 2018
level 3:
start computation: Fri Jun 1 22:51:27 2018
network size: 10 nodes, 80 links, 232 weight
quality increased from 0.527451 to 0.527451
end computation: Fri Jun 1 22:51:27 2018
End: Fri Jun 1 22:51:27 2018
Total duration: 0 sec
0.527451
Jun 01, 2018 10:51:27 PM fr.lip6.move.gal.instantiate.CompositeBuilder decomposeWithOrder
INFO: Decomposing Gal with order
Jun 01, 2018 10:51:27 PM fr.lip6.move.gal.instantiate.GALRewriter flatten
INFO: Flatten gal took : 82 ms
Jun 01, 2018 10:51:27 PM fr.lip6.move.gal.instantiate.CompositeBuilder rewriteArraysToAllowPartition
INFO: Rewriting arrays to variables to allow decomposition.
Jun 01, 2018 10:51:27 PM fr.lip6.move.gal.instantiate.Instantiator fuseIsomorphicEffects
INFO: Removed a total of 53 redundant transitions.
Jun 01, 2018 10:51:28 PM fr.lip6.move.serialization.SerializationUtil systemToFile
INFO: Time to serialize gal into /home/mcc/execution/CTLFireability.pnml.gal : 56 ms
Jun 01, 2018 10:51:28 PM fr.lip6.move.serialization.SerializationUtil serializePropertiesForITSCTLTools
INFO: Time to serialize properties into /home/mcc/execution/CTLFireability.ctl : 10 ms

Sequence of Actions to be Executed by the VM

This is useful if one wants to reexecute the tool in the VM from the submitted image disk.

set -x
# this is for BenchKit: configuration of major elements for the test
export BK_INPUT="QuasiCertifProtocol-PT-06"
export BK_EXAMINATION="CTLFireability"
export BK_TOOL="itstoolsl"
export BK_RESULT_DIR="/tmp/BK_RESULTS/OUTPUTS"
export BK_TIME_CONFINEMENT="3600"
export BK_MEMORY_CONFINEMENT="16384"

# this is specific to your benchmark or test

export BIN_DIR="$HOME/BenchKit/bin"

# remove the execution directoty if it exists (to avoid increse of .vmdk images)
if [ -d execution ] ; then
rm -rf execution
fi

tar xzf /home/mcc/BenchKit/INPUTS/QuasiCertifProtocol-PT-06.tgz
mv QuasiCertifProtocol-PT-06 execution
cd execution
pwd
ls -lh

# this is for BenchKit: explicit launching of the test
echo "====================================================================="
echo " Generated by BenchKit 2-3637"
echo " Executing tool itstoolsl"
echo " Input is QuasiCertifProtocol-PT-06, examination is CTLFireability"
echo " Time confinement is $BK_TIME_CONFINEMENT seconds"
echo " Memory confinement is 16384 MBytes"
echo " Number of cores is 4"
echo " Run identifier is r141-qhx2-152673582600067"
echo "====================================================================="
echo
echo "--------------------"
echo "content from stdout:"
echo
echo "=== Data for post analysis generated by BenchKit (invocation template)"
echo
if [ "CTLFireability" = "UpperBounds" ] ; then
echo "The expected result is a vector of positive values"
echo NUM_VECTOR
elif [ "CTLFireability" != "StateSpace" ] ; then
echo "The expected result is a vector of booleans"
echo BOOL_VECTOR
else
echo "no data necessary for post analysis"
fi
echo
if [ -f "CTLFireability.txt" ] ; then
echo "here is the order used to build the result vector(from text file)"
for x in $(grep Property CTLFireability.txt | cut -d ' ' -f 2 | sort -u) ; do
echo "FORMULA_NAME $x"
done
elif [ -f "CTLFireability.xml" ] ; then # for cunf (txt files deleted;-)
echo echo "here is the order used to build the result vector(from xml file)"
for x in $(grep '' CTLFireability.xml | cut -d '>' -f 2 | cut -d '<' -f 1 | sort -u) ; do
echo "FORMULA_NAME $x"
done
fi
echo
echo "=== Now, execution of the tool begins"
echo
echo -n "BK_START "
date -u +%s%3N
echo
timeout -s 9 $BK_TIME_CONFINEMENT bash -c "/home/mcc/BenchKit/BenchKit_head.sh 2> STDERR ; echo ; echo -n \"BK_STOP \" ; date -u +%s%3N"
if [ $? -eq 137 ] ; then
echo
echo "BK_TIME_CONFINEMENT_REACHED"
fi
echo
echo "--------------------"
echo "content from stderr:"
echo
cat STDERR ;