Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929129
D. Ouellet, S. Givigi, A. Beaulieu
Unmanned vehicular systems are becoming increasingly pervasive in military and civilian applications where the tedious repetitive and hazardous nature of the tasks make them indispensable. A natural progression is to bestow autonomy upon these vehicles. In this case, the resultant robots must be able to deal with unexpected circumstances on their own and, more importantly, in real-time. As a case study we focus on swarms of robots, we define as the capability of robots to keep close to each other in formation, without colliding with neighbors and obstacles. We start by modeling and simulating a possible swarm solution in MathWorks Matlab™ and, then, moving on to change the algorithm in such a way that a controller written as a Finite State Machine (FSM) may be derived. We then use IBM Rational Rose Real-Time™ (RoseRT) to implement such a controller in emulation following the formalism of Model-Driven Development (MDD).
无人驾驶车辆系统在军事和民用应用中变得越来越普遍,这些任务的繁琐重复和危险性质使它们不可或缺。自然的发展是赋予这些交通工具自主权。在这种情况下,最终的机器人必须能够自己处理意外情况,更重要的是,实时处理。作为一个案例研究,我们关注的是机器人群,我们将其定义为机器人在信息中保持彼此接近,而不会与邻居和障碍物发生碰撞的能力。我们首先在MathWorks Matlab™中建模和模拟可能的群解决方案,然后继续更改算法,以便可以导出作为有限状态机(FSM)编写的控制器。然后,我们使用IBM Rational Rose Real-Time™(RoseRT)按照模型驱动开发(MDD)的形式化来模拟实现这样一个控制器。
{"title":"Control of swarms of autonomous robots using Model Driven Development - A state-based approach","authors":"D. Ouellet, S. Givigi, A. Beaulieu","doi":"10.1109/SYSCON.2011.5929129","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929129","url":null,"abstract":"Unmanned vehicular systems are becoming increasingly pervasive in military and civilian applications where the tedious repetitive and hazardous nature of the tasks make them indispensable. A natural progression is to bestow autonomy upon these vehicles. In this case, the resultant robots must be able to deal with unexpected circumstances on their own and, more importantly, in real-time. As a case study we focus on swarms of robots, we define as the capability of robots to keep close to each other in formation, without colliding with neighbors and obstacles. We start by modeling and simulating a possible swarm solution in MathWorks Matlab™ and, then, moving on to change the algorithm in such a way that a controller written as a Finite State Machine (FSM) may be derived. We then use IBM Rational Rose Real-Time™ (RoseRT) to implement such a controller in emulation following the formalism of Model-Driven Development (MDD).","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127937950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929111
S. Bakhtiari, S. Agaian, M. Jamshidi
In this paper, we introduce a system for enhancing medical images. The proposed system utilizes Ensemble Empirical Mode Decomposition (EEMD) to decompose the signal into distinct frequency components called intrinsic mode functions (IMFs). These components will be enhanced individually and then recombined to construct the enhanced image. The novelty of the proposed approach is in the method of enhancement and combination of the IMFs. The experimental results demonstrate the performance of the proposed algorithm in visualizing many details that are hidden in the original image. Compared with some existing methods, such as Histogram Equalization, LSD ACE, cascaded unsharp masking and tile-based local enhancement, the new method shows to be more effective in enhancing the images that consist of varying illumination in several regions.
{"title":"A Novel empirical mode decomposition based system for medical image enhancement","authors":"S. Bakhtiari, S. Agaian, M. Jamshidi","doi":"10.1109/SYSCON.2011.5929111","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929111","url":null,"abstract":"In this paper, we introduce a system for enhancing medical images. The proposed system utilizes Ensemble Empirical Mode Decomposition (EEMD) to decompose the signal into distinct frequency components called intrinsic mode functions (IMFs). These components will be enhanced individually and then recombined to construct the enhanced image. The novelty of the proposed approach is in the method of enhancement and combination of the IMFs. The experimental results demonstrate the performance of the proposed algorithm in visualizing many details that are hidden in the original image. Compared with some existing methods, such as Histogram Equalization, LSD ACE, cascaded unsharp masking and tile-based local enhancement, the new method shows to be more effective in enhancing the images that consist of varying illumination in several regions.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130290712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929084
B. Farroha, K. Essman, D. Farroha, A. Cohen
This paper presents an analytical investigation of the security characteristics that enable the enterprise to protect and defend itself from internal and external threats. The goal here is to develop an overarching framework that is geared towards incrementally building capabilities into the existing infrastructure through the development of security related services. The protection of data, infrastructure and user identities is at the heart of the framework where broader protection categories are further broken down into services that can be deployed individually and interact with each other to provide better services to the enterprise.
{"title":"Development of an integrated security framework to enable the control and security of a heterogeneous enterprise","authors":"B. Farroha, K. Essman, D. Farroha, A. Cohen","doi":"10.1109/SYSCON.2011.5929084","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929084","url":null,"abstract":"This paper presents an analytical investigation of the security characteristics that enable the enterprise to protect and defend itself from internal and external threats. The goal here is to develop an overarching framework that is geared towards incrementally building capabilities into the existing infrastructure through the development of security related services. The protection of data, infrastructure and user identities is at the heart of the framework where broader protection categories are further broken down into services that can be deployed individually and interact with each other to provide better services to the enterprise.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127557898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-04DOI: 10.1109/SYSCON.2011.5929128
G. Foster, Annette Helm
In large systems such as weapons systems or enterprise business systems, validation of the requirements and verification of system performance are often performed by completely separate and independent teams. This often results in greater resources being used, which results in greater cost of acquisition. However, by tailoring the requirements validation process during the systems engineering and detailed design efforts to produce reusable models of the system software, these models can then be reused to increase the level of automation in the scenario planning, execution, and analysis during Test and Evaluation (T&E). We present our method of reusing engineering models to provide increased analysis coverage during system verification. We also describe our automated retest capability and discuss policy issues related to automated testing of components on the desktop.
{"title":"An approach toward reuse of engineering models in the automation of system verification","authors":"G. Foster, Annette Helm","doi":"10.1109/SYSCON.2011.5929128","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929128","url":null,"abstract":"In large systems such as weapons systems or enterprise business systems, validation of the requirements and verification of system performance are often performed by completely separate and independent teams. This often results in greater resources being used, which results in greater cost of acquisition. However, by tailoring the requirements validation process during the systems engineering and detailed design efforts to produce reusable models of the system software, these models can then be reused to increase the level of automation in the scenario planning, execution, and analysis during Test and Evaluation (T&E). We present our method of reusing engineering models to provide increased analysis coverage during system verification. We also describe our automated retest capability and discuss policy issues related to automated testing of components on the desktop.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129969443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-04-01DOI: 10.1109/SYSCON.2011.5929066
A. Squires, Nicole Hutchison, A. Pyster, D. Olwell, Stephanie Enck, Timothy L. J. Ferris, D. Gelosh
This paper reviews the progress and content of the Systems Engineering Body of Knowledge (SEBoK) and the Graduate Reference Curriculum for Systems Engineering (GRCSE™) products being developed as part of the Body of Knowledge and Curriculum to Advance Systems Engineering (BKCASE™) project initiated in September 2009. The version 0.25 of each product was released for limited review in fall 2010; version 0.5 of each product will be released for public review in fall 2011; and final version 1.0 of each product are due out in fall 2012. This paper reviews how these products differ from and build upon existing products, and recounts lessons learned after the first 15 months on the project.
{"title":"Work in process: A Body of Knowledge and Curriculum to Advance Systems Engineering (BKCASE™)","authors":"A. Squires, Nicole Hutchison, A. Pyster, D. Olwell, Stephanie Enck, Timothy L. J. Ferris, D. Gelosh","doi":"10.1109/SYSCON.2011.5929066","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929066","url":null,"abstract":"This paper reviews the progress and content of the Systems Engineering Body of Knowledge (SEBoK) and the Graduate Reference Curriculum for Systems Engineering (GRCSE™) products being developed as part of the Body of Knowledge and Curriculum to Advance Systems Engineering (BKCASE™) project initiated in September 2009. The version 0.25 of each product was released for limited review in fall 2010; version 0.5 of each product will be released for public review in fall 2011; and final version 1.0 of each product are due out in fall 2012. This paper reviews how these products differ from and build upon existing products, and recounts lessons learned after the first 15 months on the project.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132305445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}