首页 > 最新文献

2011 IEEE International Systems Conference最新文献

英文 中文
Risks associated with USB Hardware Trojan devices used by insiders 内部人员使用的USB硬件木马设备的相关风险
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929130
John Clark, Sylvain P. Leblanc, S. Knight
This paper extends the discussion of potential damage that can be done by Hardware Trojan Horse devices by discussing the specific risks associated with an Insider's use of such a device to circumvent established security policies, even when these are implemented with state of the art Endpoint Security Solutions. The paper argues that a specific category of Hardware Trojan Horse devices, those implemented as functional peripheral devices, are particularly dangerous when used by a malicious Insider. The research discusses the implementation of a proof of concept Hardware Trojan Horse device, implemented as a USB Human Interface Devices, that exploits unintended USB channels to exfiltrate data from a computer. The work discusses unintended USB channels, paying particular attention to the observability of the channel in operation. Various scenarios are presented to show that Hardware Trojan Horse devices implemented as peripheral devices can be used to prosecute a wide variety of attacks that are not mitigated by modern defensive techniques. The work demonstrates that a Hardware Trojan Horse device and physical access by a malicious Insider are sufficient to compromise a modern computer system. The paper argues that the study of Hardware Trojan devices must become an integral part of research on Insider Threats.
本文扩展了硬件特洛伊木马设备可能造成的潜在损害的讨论,讨论了内部人员使用此类设备规避既定安全策略所带来的特定风险,即使这些策略是用最先进的端点安全解决方案实现的。本文认为,特定类别的硬件特洛伊木马设备,那些作为功能外围设备实现的设备,在被恶意内部人员使用时特别危险。该研究讨论了概念验证硬件特洛伊木马设备的实现,该设备作为USB人机接口设备实现,利用意外的USB通道从计算机中窃取数据。该工作讨论了意外的USB通道,特别注意通道在运行中的可观察性。本文提出了各种场景,以表明作为外围设备实现的硬件特洛伊木马设备可用于执行各种现代防御技术无法减轻的攻击。这项工作表明,硬件特洛伊木马设备和恶意内部人员的物理访问足以危害现代计算机系统。本文认为,对硬件木马设备的研究必须成为内部威胁研究的重要组成部分。
{"title":"Risks associated with USB Hardware Trojan devices used by insiders","authors":"John Clark, Sylvain P. Leblanc, S. Knight","doi":"10.1109/SYSCON.2011.5929130","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929130","url":null,"abstract":"This paper extends the discussion of potential damage that can be done by Hardware Trojan Horse devices by discussing the specific risks associated with an Insider's use of such a device to circumvent established security policies, even when these are implemented with state of the art Endpoint Security Solutions. The paper argues that a specific category of Hardware Trojan Horse devices, those implemented as functional peripheral devices, are particularly dangerous when used by a malicious Insider. The research discusses the implementation of a proof of concept Hardware Trojan Horse device, implemented as a USB Human Interface Devices, that exploits unintended USB channels to exfiltrate data from a computer. The work discusses unintended USB channels, paying particular attention to the observability of the channel in operation. Various scenarios are presented to show that Hardware Trojan Horse devices implemented as peripheral devices can be used to prosecute a wide variety of attacks that are not mitigated by modern defensive techniques. The work demonstrates that a Hardware Trojan Horse device and physical access by a malicious Insider are sufficient to compromise a modern computer system. The paper argues that the study of Hardware Trojan devices must become an integral part of research on Insider Threats.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133478866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Bioconvolving: Cancelable templates for a multi-biometrics signature recognition system 生物卷积:多生物特征签名识别系统的可取消模板
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929064
E. Maiorana, P. Campisi, A. Neri
Recently, significant efforts have being dedicated to the design of algorithms and architectures able to protect biometric characteristics, in order to guarantee the necessary security and privacy to their owners. In this paper we discuss a protected on-line signature-based biometric authentication system, where the considered biometrics are secured by means of non-invertible transformations, able to generate templates from which retrieving the original information is computationally as hard as random guessing it. The advantages of using a protection method based on non-invertible transforms are exploited by presenting three different matching strategies in the transformed domain, and by proposing a multi-biometrics approach based on score-level fusion to improve the performances of the considered system. The reported experimental results, evaluated on the public MCYT signature database, show that the achievable recognition rates are only slightly affected by the proposed protection scheme, which is able to provide security and renewability for the considered biometrics.
最近,人们致力于设计能够保护生物特征的算法和架构,以保证其所有者的必要安全和隐私。在本文中,我们讨论了一个受保护的基于在线签名的生物特征认证系统,其中所考虑的生物特征通过不可逆转的转换来保护,能够生成模板,从中检索原始信息在计算上与随机猜测一样困难。利用基于不可逆变换的保护方法的优点,在变换域提出了三种不同的匹配策略,并提出了一种基于分数级融合的多生物识别方法来提高系统的性能。在MCYT公共特征库上进行的实验结果表明,所提出的保护方案对可实现的识别率影响很小,能够为所考虑的生物特征提供安全性和可再生性。
{"title":"Bioconvolving: Cancelable templates for a multi-biometrics signature recognition system","authors":"E. Maiorana, P. Campisi, A. Neri","doi":"10.1109/SYSCON.2011.5929064","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929064","url":null,"abstract":"Recently, significant efforts have being dedicated to the design of algorithms and architectures able to protect biometric characteristics, in order to guarantee the necessary security and privacy to their owners. In this paper we discuss a protected on-line signature-based biometric authentication system, where the considered biometrics are secured by means of non-invertible transformations, able to generate templates from which retrieving the original information is computationally as hard as random guessing it. The advantages of using a protection method based on non-invertible transforms are exploited by presenting three different matching strategies in the transformed domain, and by proposing a multi-biometrics approach based on score-level fusion to improve the performances of the considered system. The reported experimental results, evaluated on the public MCYT signature database, show that the achievable recognition rates are only slightly affected by the proposed protection scheme, which is able to provide security and renewability for the considered biometrics.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131330678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A mathematical foundation for TRIZ methods TRIZ方法的数学基础
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929117
K. Ariyur
TRIZ methods were developed in the erstwhile Soviet Union by Genrikh Altshuller and his students. Many proponents claim that their methods make creativity an exact science, something not conceded by others. We analyze two of the most widely used TRIZ methods here—the resolution of ‘contradictions’ and idealization in the context of optimization and decision theory. We first show that the resolution of contradictions helps improve system design through providing additional design flexibility. We also show how idealization directs system configuration so as to avoid or minimize side-effects or externalities, and therefore trade-offs and risks. We illustrate these issues in the context of a tablet counting problem.
TRIZ方法是由Genrikh Altshuller和他的学生在前苏联开发的。许多支持者声称,他们的方法使创造力成为一门精确的科学,这是其他人不承认的。我们在这里分析了两种最广泛使用的TRIZ方法——在优化和决策理论的背景下解决“矛盾”和理想化。我们首先表明,通过提供额外的设计灵活性,矛盾的解决有助于改进系统设计。我们还展示了理想化如何指导系统配置,以避免或最小化副作用或外部性,从而减少权衡和风险。我们在平板电脑计数问题的背景下说明这些问题。
{"title":"A mathematical foundation for TRIZ methods","authors":"K. Ariyur","doi":"10.1109/SYSCON.2011.5929117","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929117","url":null,"abstract":"TRIZ methods were developed in the erstwhile Soviet Union by Genrikh Altshuller and his students. Many proponents claim that their methods make creativity an exact science, something not conceded by others. We analyze two of the most widely used TRIZ methods here—the resolution of ‘contradictions’ and idealization in the context of optimization and decision theory. We first show that the resolution of contradictions helps improve system design through providing additional design flexibility. We also show how idealization directs system configuration so as to avoid or minimize side-effects or externalities, and therefore trade-offs and risks. We illustrate these issues in the context of a tablet counting problem.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115461296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-organizing Cooperative Dynamics in Government Extended Enterprises: Essential concepts 政府扩展企业的自组织合作动力学:基本概念
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929043
Lawrence John, P. McCormick, T. McCormick, J. Boardman
An extended enterprise is, by definition, both a system of systems and a complex dynamical system. We define government-run joint and interagency efforts as “government extended enterprises” (GEEs). GEEs comprise sets of effectively autonomous organizations that must cooperate voluntarily to achieve desired outcomes. Within the discipline of systems thinking, Boardman and Sauser have detailed a set of “differentiating characteristics” for systems of systems. We believe decision makers can leverage a set of four “canonical forces” to manipulate these characteristics to raise the levels of cooperation within a GEE and its operational effectiveness at the GEE level. This paper describes the concepts involved and postulates the relationships among them. A companion paper subtitled “Experimental Methodology” discusses a game theoretic methodology that executes a real-world case in an agent-based model as a proof-of-concept.
从定义上讲,扩展企业既是一个系统的系统,又是一个复杂的动态系统。我们将政府经营的联合和跨部门努力定义为“政府扩展企业”(GEEs)。gee由一系列有效的自治组织组成,这些组织必须自愿合作才能实现预期的结果。在系统思维的学科中,Boardman和Sauser详细描述了系统的系统的一组“差异化特征”。我们认为决策者可以利用一组四种“规范力量”来操纵这些特征,以提高GEE内部的合作水平及其在GEE级别上的操作效率。本文描述了所涉及的概念,并假设了它们之间的关系。一篇副标题为“实验方法论”的论文讨论了一种博弈论方法,该方法在基于代理的模型中执行一个现实世界的案例,作为概念证明。
{"title":"Self-organizing Cooperative Dynamics in Government Extended Enterprises: Essential concepts","authors":"Lawrence John, P. McCormick, T. McCormick, J. Boardman","doi":"10.1109/SYSCON.2011.5929043","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929043","url":null,"abstract":"An extended enterprise is, by definition, both a system of systems and a complex dynamical system. We define government-run joint and interagency efforts as “government extended enterprises” (GEEs). GEEs comprise sets of effectively autonomous organizations that must cooperate voluntarily to achieve desired outcomes. Within the discipline of systems thinking, Boardman and Sauser have detailed a set of “differentiating characteristics” for systems of systems. We believe decision makers can leverage a set of four “canonical forces” to manipulate these characteristics to raise the levels of cooperation within a GEE and its operational effectiveness at the GEE level. This paper describes the concepts involved and postulates the relationships among them. A companion paper subtitled “Experimental Methodology” discusses a game theoretic methodology that executes a real-world case in an agent-based model as a proof-of-concept.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127388989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Integrated tool-based approach for the conceptual design of advanced mechatronic systems 基于集成工具的先进机电系统概念设计方法
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929105
H. Anacker, R. Dorociak, R. Dumitrescu, J. Gausemeier
This contribution addresses a new approach for the domain-spanning system specification for the design of advanced mechatronic systems. Therefore two basic methods will be introduced: a language for the holistic specification of advanced mechatronic systems and a concept for the reuse of once successfully proven solutions in form of solution patterns. For both methods software tools have been developed. Moreover, a concept for the integrated tool support for the conceptual design of advanced mechatronic systems based on the coupling of these both methods and their respective software tools will be presented.
这一贡献为先进机电系统设计的领域跨越系统规范提供了一种新方法。因此,我们将介绍两种基本方法:一种用于高级机电系统整体规范的语言,以及一种以解决方案模式的形式重用成功验证过的解决方案的概念。针对这两种方法,已经开发了软件工具。此外,本文还提出了一种基于这两种方法及其各自的软件工具耦合的先进机电系统概念设计集成工具支持的概念。
{"title":"Integrated tool-based approach for the conceptual design of advanced mechatronic systems","authors":"H. Anacker, R. Dorociak, R. Dumitrescu, J. Gausemeier","doi":"10.1109/SYSCON.2011.5929105","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929105","url":null,"abstract":"This contribution addresses a new approach for the domain-spanning system specification for the design of advanced mechatronic systems. Therefore two basic methods will be introduced: a language for the holistic specification of advanced mechatronic systems and a concept for the reuse of once successfully proven solutions in form of solution patterns. For both methods software tools have been developed. Moreover, a concept for the integrated tool support for the conceptual design of advanced mechatronic systems based on the coupling of these both methods and their respective software tools will be presented.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"141 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129200930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
On formal verification of Toyota's electronic throttle controller 关于丰田电子节气门控制器的正式验证
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929080
J. Ras, A. Cheng
This practice paper examines Toyota's electronic throttle controller (ETC) problem. ETC for passenger cars is a safety-critical, embedded control system and it must meet very high reliability and safety requirements. ETC systems continue to increase in complexity, making formal specification and verification processes an essential component of the development of safer systems. There are two ways to represent the real-time system. Firstly, we can describe the system's structure and function by detailing its electrical, mechanical, and other components. Secondly, the real-time system's behavior as it responds to actions and events can be described. Then we can compare the system's specification to the safety assertion to show that the system meets the safety properties. This paper describes two research threads. In the first, we present the specification of Toyota's electronic throttle control (ETC) system including the timing constraints. The second thread, which will be explored in a longer version of this paper, evaluates the use of conventional design versus electronic engine control by applying classical control theory.1
本文对丰田汽车的电子节气门控制器(ETC)问题进行了研究。乘用车ETC是一个安全关键的嵌入式控制系统,它必须满足非常高的可靠性和安全性要求。ETC系统的复杂性不断增加,使正式规格和核查过程成为开发更安全系统的重要组成部分。有两种表示实时系统的方法。首先,我们可以通过详细描述系统的电气、机械和其他组件来描述系统的结构和功能。其次,实时系统在响应动作和事件时的行为可以被描述。然后,我们可以将系统的规格与安全断言进行比较,以表明系统满足安全属性。本文描述了两个研究思路。本文首先介绍了丰田汽车电子节气门控制系统(ETC)的技术指标,包括时序约束。第二条线索将在本文的较长版本中进行探讨,通过应用经典控制理论来评估传统设计与电子发动机控制的使用
{"title":"On formal verification of Toyota's electronic throttle controller","authors":"J. Ras, A. Cheng","doi":"10.1109/SYSCON.2011.5929080","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929080","url":null,"abstract":"This practice paper examines Toyota's electronic throttle controller (ETC) problem. ETC for passenger cars is a safety-critical, embedded control system and it must meet very high reliability and safety requirements. ETC systems continue to increase in complexity, making formal specification and verification processes an essential component of the development of safer systems. There are two ways to represent the real-time system. Firstly, we can describe the system's structure and function by detailing its electrical, mechanical, and other components. Secondly, the real-time system's behavior as it responds to actions and events can be described. Then we can compare the system's specification to the safety assertion to show that the system meets the safety properties. This paper describes two research threads. In the first, we present the specification of Toyota's electronic throttle control (ETC) system including the timing constraints. The second thread, which will be explored in a longer version of this paper, evaluates the use of conventional design versus electronic engine control by applying classical control theory.1","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125441237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Petri Net-T3SD policy driven method for IT infrastructure selection in smart grid 智能电网IT基础设施选择的Petri Net-T3SD策略驱动方法
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929112
M.A. Zamani, A. Fereidunian, S. S. Mansouri, M. A. Sharifi K., F. Boroomand, H. Lesani
This paper presents a novel expert system referred as Petri Net equipped Tricotyledon Theory of System Design (PN-T3SD) to select a proper IT infrastructure for smart grid. The proposed PN-T3SD is a policy-driven decision making method - combining the ideas from Petri nets and Wymorian T3SD- that can change the result of decision making according to the utility's policy. The PN-T3SD is applied to the practical data of the Greater Tehran Electrical Distribution Company (GTEDC). Three Alternatives of Spread Spectrum (SS), Distribution Line Carrier (DLC) and Leased Line (LL) are selected as proposed IT infrastructure. The implemented results are examined by developed policies scenarios.
本文提出了一种基于三叶系统设计理论(PN-T3SD)的Petri网专家系统来为智能电网选择合适的IT基础设施。提出的PN-T3SD是一种政策驱动的决策方法,结合了Petri网和Wymorian T3SD的思想,可以根据公用事业公司的政策改变决策结果。PN-T3SD用于大德黑兰配电公司(GTEDC)的实际数据。扩展频谱(SS)、分配线路载波(DLC)和租用线路(LL)三种替代方案被选择作为拟议的IT基础设施。通过开发的策略场景检查实现的结果。
{"title":"A Petri Net-T3SD policy driven method for IT infrastructure selection in smart grid","authors":"M.A. Zamani, A. Fereidunian, S. S. Mansouri, M. A. Sharifi K., F. Boroomand, H. Lesani","doi":"10.1109/SYSCON.2011.5929112","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929112","url":null,"abstract":"This paper presents a novel expert system referred as Petri Net equipped Tricotyledon Theory of System Design (PN-T3SD) to select a proper IT infrastructure for smart grid. The proposed PN-T3SD is a policy-driven decision making method - combining the ideas from Petri nets and Wymorian T3SD- that can change the result of decision making according to the utility's policy. The PN-T3SD is applied to the practical data of the Greater Tehran Electrical Distribution Company (GTEDC). Three Alternatives of Spread Spectrum (SS), Distribution Line Carrier (DLC) and Leased Line (LL) are selected as proposed IT infrastructure. The implemented results are examined by developed policies scenarios.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"123 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114114164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimization in radiosurgery treatment planning 放射外科治疗方案的优化
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929035
H. Marzi, Y. Lian
Gamma knife radiation treatment is an alternative to treating brain tumors with surgery. Currently, treatment planning is a manual and time-consuming task that involves an iterative process of shot selection and placement. In this study Genetic Algorithm (GA) is introduced to automatically select shot location and shot size for radiosurgery treatment planning, which will make planning process simpler, less time-consuming and more effective. First, a distance transformation/coding method is used to generate the skeleton of the target. Then, along the skeleton, the GA-based shot placement algorithm is applied to find the best location to place a shot. By continuously iterating the algorithm, the number, size and the location of all the shots are generated. The proposed GA-based model has been tested using numerous simulated targets with different shapes and sizes. Results demonstrate that the GA-based shot location and size determination can speed up the process of shot placement.
伽玛刀放射治疗是手术治疗脑肿瘤的另一种选择。目前,治疗计划是一项手动且耗时的任务,涉及到反复选择和放置的过程。本研究引入遗传算法(Genetic Algorithm, GA)自动选择放射线外科治疗计划的拍摄位置和拍摄尺寸,使计划过程更简单、更省时、更有效。首先,采用距离变换/编码方法生成目标骨架;然后,沿着骨架,应用基于ga的镜头放置算法来寻找放置镜头的最佳位置。通过不断迭代算法,生成所有镜头的数量、大小和位置。本文提出的基于遗传算法的模型已经在不同形状和大小的仿真目标上进行了测试。结果表明,基于遗传算法的击球位置和尺寸确定可以加快击球位置的确定过程。
{"title":"Optimization in radiosurgery treatment planning","authors":"H. Marzi, Y. Lian","doi":"10.1109/SYSCON.2011.5929035","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929035","url":null,"abstract":"Gamma knife radiation treatment is an alternative to treating brain tumors with surgery. Currently, treatment planning is a manual and time-consuming task that involves an iterative process of shot selection and placement. In this study Genetic Algorithm (GA) is introduced to automatically select shot location and shot size for radiosurgery treatment planning, which will make planning process simpler, less time-consuming and more effective. First, a distance transformation/coding method is used to generate the skeleton of the target. Then, along the skeleton, the GA-based shot placement algorithm is applied to find the best location to place a shot. By continuously iterating the algorithm, the number, size and the location of all the shots are generated. The proposed GA-based model has been tested using numerous simulated targets with different shapes and sizes. Results demonstrate that the GA-based shot location and size determination can speed up the process of shot placement.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125254645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Applying a robust design approach to improve online systems engineering education 应用稳健的设计方法改进在线系统工程教育
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929103
A. Squires, R. Cloutier
The goal of robust design is to develop a system that performs optimally under a broad range of varying conditions including environmental conditions. A robust design is one that seeks to perform the ideal function while being insensitive to variations in environmental noise - uncontrollable factors that exist outside of the system, yet impact the ability of the system to perform the ideal function. This paper introduces a robust design framework for online systems engineering education and demonstrates its use. Combining observation and experimental design concepts, the framework is applied to the challenge of improving online course design by investigating the impact of the pedagogy used to deliver course lectures and discuss course content on student satisfaction and learning. The goal is to identify an approach for optimizing the student's learning experience and their development of system engineering competency knowledge by analyzing the student's self-perceived gain in competency knowledge related to system concepts and architectures, in a context where the students' age and years of systems engineering experience vary.
稳健设计的目标是开发一种在包括环境条件在内的各种不同条件下表现最佳的系统。一个稳健的设计是寻求执行理想的功能,同时对环境噪声的变化不敏感-存在于系统外部的不可控因素,但影响系统执行理想功能的能力。本文介绍了一种用于在线系统工程教育的鲁棒设计框架,并演示了其应用。结合观察和实验设计概念,该框架通过调查用于提供课程讲座和讨论课程内容的教学方法对学生满意度和学习的影响,应用于改进在线课程设计的挑战。目标是通过分析学生在与系统概念和架构相关的能力知识方面的自我感知增益,在学生年龄和系统工程经验年数不同的环境中,确定一种方法来优化学生的学习经验和他们对系统工程能力知识的发展。
{"title":"Applying a robust design approach to improve online systems engineering education","authors":"A. Squires, R. Cloutier","doi":"10.1109/SYSCON.2011.5929103","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929103","url":null,"abstract":"The goal of robust design is to develop a system that performs optimally under a broad range of varying conditions including environmental conditions. A robust design is one that seeks to perform the ideal function while being insensitive to variations in environmental noise - uncontrollable factors that exist outside of the system, yet impact the ability of the system to perform the ideal function. This paper introduces a robust design framework for online systems engineering education and demonstrates its use. Combining observation and experimental design concepts, the framework is applied to the challenge of improving online course design by investigating the impact of the pedagogy used to deliver course lectures and discuss course content on student satisfaction and learning. The goal is to identify an approach for optimizing the student's learning experience and their development of system engineering competency knowledge by analyzing the student's self-perceived gain in competency knowledge related to system concepts and architectures, in a context where the students' age and years of systems engineering experience vary.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132582139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Systems engineering approach to CPU scheduling for mobile multimedia systems 移动多媒体系统CPU调度的系统工程方法
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929106
Abbas A. Al-Muhsen, R. Babiceanu
In the ever-increasing digital world, mobile devices, such as smartphones and tablet computers are on the trend to become the most used electronic devices. Multimedia applications running on these devices require appropriate operating system support. These types of applications are often characterized as soft real-time applications since missing deadlines is not critical, even the quality of service decreases. One limitation of the capabilities of these devices comes from their power source: they are all battery-powered, with a restricted battery energy budget. An important part of the total power is used by the CPU of these devices, so by controlling the power consumed by the CPU, the overall power used by the mobile device will be significantly reduced. This work proposes a systems engineering modeling approach that integrates soft-real time CPU scheduling methodologies with dynamic voltage scaling approaches with the objective of achieving energy savings while providing a high-quality level of service.
在日益增长的数字世界中,移动设备,如智能手机和平板电脑正成为使用最多的电子设备。在这些设备上运行的多媒体应用程序需要适当的操作系统支持。这些类型的应用程序通常被描述为软实时应用程序,因为错过最后期限并不重要,甚至服务质量也会下降。这些设备功能的一个限制来自于它们的电源:它们都是电池供电的,电池能量预算有限。这些设备的CPU功耗占总功耗的重要部分,因此通过控制CPU功耗,移动设备的总功耗将显著降低。这项工作提出了一种系统工程建模方法,该方法将软实时CPU调度方法与动态电压缩放方法集成在一起,目的是在提供高质量服务的同时实现节能。
{"title":"Systems engineering approach to CPU scheduling for mobile multimedia systems","authors":"Abbas A. Al-Muhsen, R. Babiceanu","doi":"10.1109/SYSCON.2011.5929106","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929106","url":null,"abstract":"In the ever-increasing digital world, mobile devices, such as smartphones and tablet computers are on the trend to become the most used electronic devices. Multimedia applications running on these devices require appropriate operating system support. These types of applications are often characterized as soft real-time applications since missing deadlines is not critical, even the quality of service decreases. One limitation of the capabilities of these devices comes from their power source: they are all battery-powered, with a restricted battery energy budget. An important part of the total power is used by the CPU of these devices, so by controlling the power consumed by the CPU, the overall power used by the mobile device will be significantly reduced. This work proposes a systems engineering modeling approach that integrates soft-real time CPU scheduling methodologies with dynamic voltage scaling approaches with the objective of achieving energy savings while providing a high-quality level of service.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133504345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2011 IEEE International Systems Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1