首页 > 最新文献

2011 IEEE International Systems Conference最新文献

英文 中文
Developing a business case for Systems Engineering 为系统工程开发一个商业案例
Pub Date : 2012-10-11 DOI: 10.1109/MAES.2012.6328837
J. Elm, R. Rassa
Understanding the value of Systems Engineering (SE) is necessary to justify a project's investment in SE resources and activities. To identify the value of SE, the National Defense Industrial Association (NDIA), in collaboration with the Software Engineering Institute (SEI), developed and executed a survey of defense industrial contractors. [1] The survey analyzed the relationships between the SE activities applied to individual projects, and performance of those projects. Results of this survey, published in 2007 and 2008, indicated strong relationships between many SE efforts applied early in the project and the overall success of the project. Today, NDIA, in collaboration with the Institute of Electrical and Electronics Engineers Aerospace and Electronic Systems Society (IEEE-AESS) and SEI, is engaged in extending that study to build a stronger business case for the application of effective SE to product development projects.
理解系统工程(SE)的价值对于证明项目对SE资源和活动的投资是必要的。为了确定SE的价值,国防工业协会(NDIA)与软件工程研究所(SEI)合作,开发并执行了一项国防工业承包商的调查。[1]该调查分析了应用于单个项目的SE活动与这些项目的绩效之间的关系。这项调查的结果发表于2007年和2008年,表明在项目早期应用的许多SE工作与项目的整体成功之间存在很强的关系。今天,NDIA与电气和电子工程师协会航空航天和电子系统协会(IEEE-AESS)和SEI合作,致力于扩展该研究,为有效的SE应用于产品开发项目建立更强大的商业案例。
{"title":"Developing a business case for Systems Engineering","authors":"J. Elm, R. Rassa","doi":"10.1109/MAES.2012.6328837","DOIUrl":"https://doi.org/10.1109/MAES.2012.6328837","url":null,"abstract":"Understanding the value of Systems Engineering (SE) is necessary to justify a project's investment in SE resources and activities. To identify the value of SE, the National Defense Industrial Association (NDIA), in collaboration with the Software Engineering Institute (SEI), developed and executed a survey of defense industrial contractors. [1] The survey analyzed the relationships between the SE activities applied to individual projects, and performance of those projects. Results of this survey, published in 2007 and 2008, indicated strong relationships between many SE efforts applied early in the project and the overall success of the project. Today, NDIA, in collaboration with the Institute of Electrical and Electronics Engineers Aerospace and Electronic Systems Society (IEEE-AESS) and SEI, is engaged in extending that study to build a stronger business case for the application of effective SE to product development projects.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125186107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A systemic approach to managing risks of SoS 管理SoS风险的系统性方法
Pub Date : 2012-07-06 DOI: 10.1109/MAES.2012.6226691
S. Gandhi, A. Gorod, B. Sauser
The ever increasing complexity of the current dynamic environment, results in the need to engineer multiple integrated complex systems, which coexist to obtain a common goal and are known as System of Systems (SoS). In order to address the risk management challenges posed by a SoS, a holistic approach is needed, which deals with a risk that could be greater than the sum of its individual constituent risks. This paper focuses on a comparative analysis of systemic risk management with the traditional aspect being currently undertaken for SoS. This paper also highlights the importance of the application of systemic risk in the SoS domain and the understanding of interconnectedness between the various constituents of the systemic risk.
当前动态环境的复杂性不断增加,导致需要设计多个集成的复杂系统,这些系统共存以获得共同的目标,被称为系统的系统(so)。为了应对SoS带来的风险管理挑战,需要采用一种整体方法,以应对可能大于其单个构成风险总和的风险。本文着重对系统风险管理与目前对社会主义企业进行的传统风险管理进行了比较分析。本文还强调了系统风险在SoS领域应用的重要性,以及对系统风险各组成部分之间相互联系的理解。
{"title":"A systemic approach to managing risks of SoS","authors":"S. Gandhi, A. Gorod, B. Sauser","doi":"10.1109/MAES.2012.6226691","DOIUrl":"https://doi.org/10.1109/MAES.2012.6226691","url":null,"abstract":"The ever increasing complexity of the current dynamic environment, results in the need to engineer multiple integrated complex systems, which coexist to obtain a common goal and are known as System of Systems (SoS). In order to address the risk management challenges posed by a SoS, a holistic approach is needed, which deals with a risk that could be greater than the sum of its individual constituent risks. This paper focuses on a comparative analysis of systemic risk management with the traditional aspect being currently undertaken for SoS. This paper also highlights the importance of the application of systemic risk in the SoS domain and the understanding of interconnectedness between the various constituents of the systemic risk.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127039244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A statistical model for system components selection 系统组件选择的统计模型
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929037
Varuna Gupta, A. Mazouz, A. Agarwal, G. Hamza-Lup
The proposed research is aimed at enhancing system design productivity by exploiting the principle of “design and reuse” to its full potential. Specifically, we present a statistical model for selecting from a component library the optimal components for a network-on-chip architecture such that to satisfy certain system performance requirements. Our model is based on regression analysis and Taguchi's optimization technique. The model estimates the relationship between system performance and component attributes, to help the architect in the component selection process. Having such a model in the system design phase will allow the architect not only to make informed decisions when selecting components but also to exchange components with similar characteristics to fine tune system performance.
提出的研究旨在通过充分利用“设计和重用”的原则来提高系统设计的生产力。具体来说,我们提出了一个统计模型,用于从组件库中为片上网络架构选择最优组件,以满足某些系统性能要求。我们的模型是基于回归分析和田口优化技术。该模型估计了系统性能和组件属性之间的关系,以帮助架构师在组件选择过程中。在系统设计阶段拥有这样一个模型,不仅可以让架构师在选择组件时做出明智的决定,还可以交换具有相似特征的组件,以微调系统性能。
{"title":"A statistical model for system components selection","authors":"Varuna Gupta, A. Mazouz, A. Agarwal, G. Hamza-Lup","doi":"10.1109/SYSCON.2011.5929037","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929037","url":null,"abstract":"The proposed research is aimed at enhancing system design productivity by exploiting the principle of “design and reuse” to its full potential. Specifically, we present a statistical model for selecting from a component library the optimal components for a network-on-chip architecture such that to satisfy certain system performance requirements. Our model is based on regression analysis and Taguchi's optimization technique. The model estimates the relationship between system performance and component attributes, to help the architect in the component selection process. Having such a model in the system design phase will allow the architect not only to make informed decisions when selecting components but also to exchange components with similar characteristics to fine tune system performance.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"798 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124424786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic attack scenario discovering based on a new alert correlation method 基于警报关联新方法的攻击场景自动发现
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929072
A. Ebrahimi, Ahmad Habibi Zad Navin, M. Kamal Mirnia, Hadi Bahrbegi, Amir Azimi Alasti Ahrabi
In recent years, many approaches for correlating alerts and discovering attack scenarios have been proposed. However, most of them have difficulties such as high dependency to predefined correlation rule definitions and domain knowledge, huge volume of computing workload in some cases and limited capability in discovering new attack scenarios. Therefore, in this paper, we proposed a new alert correlation method to automatically extract multi-step attack scenarios. This method works based on a multi-phase process which acts on the IDS generated alerts. In normalization phase, alerts are turned to the form that can be easily processed by the proposed system. In alert Winnowing phase, for each alert is determined that it belongs to which alert sequence or attack scenario. After determining alerts scenarios, for each scenario its sub scenarios and Meta alerts are extracted. Finally, from the produced Meta alerts, the multi-step attack graph is constructed for each attack scenario. We evaluate our approach using DARPA 2000 data sets. Our experiments show our approach can effectively construct multi-step attack scenarios and give high level view of intruder intentions.
近年来,人们提出了许多关联警报和发现攻击场景的方法。然而,它们大多存在对预定义的关联规则定义和领域知识高度依赖、某些情况下计算工作量巨大、发现新攻击场景能力有限等问题。因此,本文提出了一种新的警报关联方法来自动提取多步攻击场景。此方法基于对IDS生成的警报起作用的多阶段流程。在规范化阶段,警报被转换为可被提议的系统轻松处理的形式。在警报筛选阶段,针对每个警报确定它属于哪个警报序列或攻击场景。确定警报场景后,为每个场景提取其子场景和元警报。最后,根据生成的元警报,为每个攻击场景构建多步攻击图。我们使用DARPA 2000数据集来评估我们的方法。实验结果表明,该方法可以有效地构建多步攻击场景,并给出入侵者意图的高层次视图。
{"title":"Automatic attack scenario discovering based on a new alert correlation method","authors":"A. Ebrahimi, Ahmad Habibi Zad Navin, M. Kamal Mirnia, Hadi Bahrbegi, Amir Azimi Alasti Ahrabi","doi":"10.1109/SYSCON.2011.5929072","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929072","url":null,"abstract":"In recent years, many approaches for correlating alerts and discovering attack scenarios have been proposed. However, most of them have difficulties such as high dependency to predefined correlation rule definitions and domain knowledge, huge volume of computing workload in some cases and limited capability in discovering new attack scenarios. Therefore, in this paper, we proposed a new alert correlation method to automatically extract multi-step attack scenarios. This method works based on a multi-phase process which acts on the IDS generated alerts. In normalization phase, alerts are turned to the form that can be easily processed by the proposed system. In alert Winnowing phase, for each alert is determined that it belongs to which alert sequence or attack scenario. After determining alerts scenarios, for each scenario its sub scenarios and Meta alerts are extracted. Finally, from the produced Meta alerts, the multi-step attack graph is constructed for each attack scenario. We evaluate our approach using DARPA 2000 data sets. Our experiments show our approach can effectively construct multi-step attack scenarios and give high level view of intruder intentions.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125815328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Enterprise systems governance using transactional cost analysis: An agent-based framework
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929093
H. Darabi, M. Mansouri, A. Mostashari, B. Heydari
Extended Enterprise is a set of inter-connected organizations that acts collaboratively to produce a product or deliver a service that is beyond the reach of each one of them. Using the system theory, we define the act of collaboration as a sub-system of extended enterprise entitled enterprise systems governance. In this paper, we use transactional cost analysis in order to build an analytical tool to measure the efficiency and effectiveness of governance strategies that can be used in such a system. The analysis is based on agent-based modeling method, and we will apply the method to Federal Aviation Administration NextGen Project.
扩展企业是一组相互连接的组织,它们协同工作以生产超出它们各自范围的产品或交付服务。运用系统论,我们将协作行为定义为扩展企业的一个子系统,称为企业系统治理。在本文中,我们使用交易成本分析来构建一个分析工具来衡量可以在这样一个系统中使用的治理策略的效率和有效性。该分析基于基于agent的建模方法,我们将该方法应用于联邦航空管理局的NextGen项目。
{"title":"Enterprise systems governance using transactional cost analysis: An agent-based framework","authors":"H. Darabi, M. Mansouri, A. Mostashari, B. Heydari","doi":"10.1109/SYSCON.2011.5929093","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929093","url":null,"abstract":"Extended Enterprise is a set of inter-connected organizations that acts collaboratively to produce a product or deliver a service that is beyond the reach of each one of them. Using the system theory, we define the act of collaboration as a sub-system of extended enterprise entitled enterprise systems governance. In this paper, we use transactional cost analysis in order to build an analytical tool to measure the efficiency and effectiveness of governance strategies that can be used in such a system. The analysis is based on agent-based modeling method, and we will apply the method to Federal Aviation Administration NextGen Project.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126735188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enterprise governance and boundary decisions: The case of wireless technology 企业治理和边界决策:无线技术的案例
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929118
B. Heydari, M. Finger
In this paper, the issue of boundary is investigated as an important enterprise governance problem. The Mechanism and systemic trends that affect the enterprise value chain are discussed from a system of systems perspective. Then, from the enterprise governance perspective, the value chain is divided into competition, collaboration, and observation. This division is considered as dynamic and is related to enterprise differentiating factors. The boundaries of these sections are analyzed based on a model developed within the new institutional economics framework. The paper ends with a case study for the boundary decision of the high quality wireless video service analyzed with the proposed model.
本文将边界问题作为一个重要的企业治理问题进行研究。从系统的角度探讨了影响企业价值链的机制和系统趋势。然后,从企业治理的角度,将价值链分为竞争、协作和观察三个部分。这种划分被认为是动态的,与企业差异化因素有关。这些部分的边界是基于在新制度经济学框架内发展起来的模型来分析的。最后以高质量无线视频业务的边界决策为例,对该模型进行了分析。
{"title":"Enterprise governance and boundary decisions: The case of wireless technology","authors":"B. Heydari, M. Finger","doi":"10.1109/SYSCON.2011.5929118","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929118","url":null,"abstract":"In this paper, the issue of boundary is investigated as an important enterprise governance problem. The Mechanism and systemic trends that affect the enterprise value chain are discussed from a system of systems perspective. Then, from the enterprise governance perspective, the value chain is divided into competition, collaboration, and observation. This division is considered as dynamic and is related to enterprise differentiating factors. The boundaries of these sections are analyzed based on a model developed within the new institutional economics framework. The paper ends with a case study for the boundary decision of the high quality wireless video service analyzed with the proposed model.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114250236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An implementers' view of systems engineering for systems of systems 系统的系统的系统工程实现者的观点
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929039
J. Dahmann, G. Rebovich, J. Lane, Ralph Lowry, Kristen J. Baldwin
This paper builds on and extends U.S. Department of Defense published guidance on systems engineering (SE) of systems of systems (SoS) by developing and presenting a view of SoS SE that translates the SoS SE core elements, their interrelationships, and SoS decision-making artifacts and information from a “trapeze” model to a more familiar and intuitive time-sequenced “wave” model representation. The information is thus rendered in a form more readily usable by SoS SE practitioners in the field and one that corresponds with incremental development approaches that are the norm for SoS capability evolution. The paper describes and motivates the development of the wave model, discusses its key characteristics, and provides examples of SoS efforts that reflect this view of SoS SE. Finally, the paper describes how the information critical to successful SoS SE is created, where it fits into the wave model, how it evolves over time, and in which artifacts the information is normally contained.
本文建立并扩展了美国国防部发布的关于系统的系统工程(SE)的指南,通过开发和呈现一个将系统的系统工程(SE)核心元素、它们之间的相互关系、以及将系统的决策工件和信息从“空中飞人”模型转换为更熟悉和直观的时间顺序“波”模型表示的系统工程(SE)视图。因此,信息以一种更容易被该领域的SoS SE从业者使用的形式呈现,并且与作为SoS能力发展规范的增量开发方法相对应。本文描述并推动了波浪模型的发展,讨论了其关键特征,并提供了反映SoS SE观点的SoS努力的例子。最后,本文描述了对成功的SoS - SE至关重要的信息是如何创建的,它在哪里适合于波模型,它是如何随时间演变的,以及信息通常包含在哪些工件中。
{"title":"An implementers' view of systems engineering for systems of systems","authors":"J. Dahmann, G. Rebovich, J. Lane, Ralph Lowry, Kristen J. Baldwin","doi":"10.1109/SYSCON.2011.5929039","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929039","url":null,"abstract":"This paper builds on and extends U.S. Department of Defense published guidance on systems engineering (SE) of systems of systems (SoS) by developing and presenting a view of SoS SE that translates the SoS SE core elements, their interrelationships, and SoS decision-making artifacts and information from a “trapeze” model to a more familiar and intuitive time-sequenced “wave” model representation. The information is thus rendered in a form more readily usable by SoS SE practitioners in the field and one that corresponds with incremental development approaches that are the norm for SoS capability evolution. The paper describes and motivates the development of the wave model, discusses its key characteristics, and provides examples of SoS efforts that reflect this view of SoS SE. Finally, the paper describes how the information critical to successful SoS SE is created, where it fits into the wave model, how it evolves over time, and in which artifacts the information is normally contained.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129891774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 120
Modeling and verifying security protocols using UML 2 使用UML 2建模和验证安全协议
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929088
Sandra Smith, A. Beaulieu, W. Phillips
Large scale distributed systems often require security protocols to ensure high integrity. We present a modeling approach that uses UML 2 without extensions to support the design, composition and verification of security protocols. The approach assumes a strong threat model, in which an attacker can intercept, modify, and spoof all communications, with the exception of those protected by known-strong encryption. Through a series of models of extensively-studied protocols we demonstrate that the approach allows protocol properties to be accurately represented, and protocols to be automatically tested to detect potential security flaws. The approach benefits from the existing strong tool support for UML 2, allowing automatic generation of protocol implementations from the models.
大型分布式系统通常需要安全协议来确保高完整性。我们提出了一种建模方法,它使用UML 2而不进行扩展来支持安全协议的设计、组合和验证。该方法假设了一个强大的威胁模型,攻击者可以拦截、修改和欺骗所有通信,但那些受已知强加密保护的通信除外。通过一系列广泛研究的协议模型,我们证明了该方法可以准确地表示协议属性,并且可以自动测试协议以检测潜在的安全缺陷。该方法受益于UML 2现有的强大工具支持,允许从模型中自动生成协议实现。
{"title":"Modeling and verifying security protocols using UML 2","authors":"Sandra Smith, A. Beaulieu, W. Phillips","doi":"10.1109/SYSCON.2011.5929088","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929088","url":null,"abstract":"Large scale distributed systems often require security protocols to ensure high integrity. We present a modeling approach that uses UML 2 without extensions to support the design, composition and verification of security protocols. The approach assumes a strong threat model, in which an attacker can intercept, modify, and spoof all communications, with the exception of those protected by known-strong encryption. Through a series of models of extensively-studied protocols we demonstrate that the approach allows protocol properties to be accurately represented, and protocols to be automatically tested to detect potential security flaws. The approach benefits from the existing strong tool support for UML 2, allowing automatic generation of protocol implementations from the models.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127038213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Using PCA and Pareto optimality to select flexible manufacturing systems 利用主成分分析和帕累托最优选择柔性制造系统
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929062
K. Rezaie, A. Haeri
Flexible manufacturing systems (FMS) attract more attention in recent years. Design and establishing of a FMS need much investment. So it is necessary to make best decision for selection of a FMS alternative. In this paper an approach for selecting a FMS alternative on the basis of the performance criteria is presented. Six input and output factors are used for FMS selection. Initially the approach use Principle Component Analysis (PCA) for decreasing number of criteria. After performing PCA two criteria are generated instead of initial six criteria. After that Pareto optimality and Pareto front concepts are used for rank FMS alternatives on the basis of the two new criteria. The proposed approach is performed on a data set that contains specification of 12 FMS alternatives. At the end suggestions for future research is mentioned.
柔性制造系统(FMS)近年来受到越来越多的关注。FMS的设计和建立需要大量的投资。因此,有必要对FMS方案的选择进行最佳决策。本文提出了一种基于性能标准的FMS备选方案的选择方法。6个输入和输出因素用于FMS选择。最初,该方法使用主成分分析(PCA)来减少标准的数量。执行PCA后,生成两个标准,而不是最初的六个标准。在此基础上,利用Pareto最优性和Pareto前沿概念对FMS备选方案进行排序。提出的方法在包含12个FMS备选方案规范的数据集上执行。最后对今后的研究提出了建议。
{"title":"Using PCA and Pareto optimality to select flexible manufacturing systems","authors":"K. Rezaie, A. Haeri","doi":"10.1109/SYSCON.2011.5929062","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929062","url":null,"abstract":"Flexible manufacturing systems (FMS) attract more attention in recent years. Design and establishing of a FMS need much investment. So it is necessary to make best decision for selection of a FMS alternative. In this paper an approach for selecting a FMS alternative on the basis of the performance criteria is presented. Six input and output factors are used for FMS selection. Initially the approach use Principle Component Analysis (PCA) for decreasing number of criteria. After performing PCA two criteria are generated instead of initial six criteria. After that Pareto optimality and Pareto front concepts are used for rank FMS alternatives on the basis of the two new criteria. The proposed approach is performed on a data set that contains specification of 12 FMS alternatives. At the end suggestions for future research is mentioned.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125765517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fast mixed-signal simulation using SystemC 基于SystemC的快速混合信号仿真
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929046
Stefan Hoelldampf, D. Zaum, I. Neumann, M. Olbrich, E. Barke
Today's simulation tools can not keep up with novel design methodologies at system level such as TLM. We propose to automatically precompute numerical models from analog netlists and interface a simulation kernel via SystemC to the digital domain. Our simulation system has performed orders of magnitude faster compared to traditional analog circuit simulators interfaced to SystemC while keeping full accuracy.
目前的仿真工具无法跟上系统级设计方法(如TLM)的发展。我们建议从模拟网表中自动预计算数值模型,并通过SystemC将仿真内核接口到数字域。与SystemC接口的传统模拟电路模拟器相比,我们的仿真系统的执行速度快了几个数量级,同时保持了完全的精度。
{"title":"Fast mixed-signal simulation using SystemC","authors":"Stefan Hoelldampf, D. Zaum, I. Neumann, M. Olbrich, E. Barke","doi":"10.1109/SYSCON.2011.5929046","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929046","url":null,"abstract":"Today's simulation tools can not keep up with novel design methodologies at system level such as TLM. We propose to automatically precompute numerical models from analog netlists and interface a simulation kernel via SystemC to the digital domain. Our simulation system has performed orders of magnitude faster compared to traditional analog circuit simulators interfaced to SystemC while keeping full accuracy.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131637287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2011 IEEE International Systems Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1