首页 > 最新文献

2011 IEEE International Systems Conference最新文献

英文 中文
Remote monitoring-control system for future wearable-portable dialysis devices 未来可穿戴便携式透析设备的远程监控系统
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929063
Alexandru Soceanu, S. Congiu, N. Goga
Moving the dialysis treatment from the nephrology clinic to the patient's point of need, instead of moving patients to the nephrology clinic, is a great challenge today. The main objective of work presented in this the paper is the development of a universal system, suitable for European environment, for the management, control and monitoring of wearable and portable dialysis devices. The paper discusses its design and presents briefly the main components of the experimental Personal Health System, emphasizing also the main advantages of using such approach. The results of implementing a dialysis device simulator based on standard IEEE specification are also discussed. The system proposal is created based on collaboration among the University of Applied Sciences Munich, Germany, the University of Padova, Italy, and the University of Groningen, the Netherlands with participation of partner universities, hospitals and companies from Germany, Italy, and Romania.
将透析治疗从肾内科诊所转移到患者需要的地方,而不是将患者转移到肾内科诊所,这是今天的一个巨大挑战。本文提出的主要工作目标是开发一种适用于欧洲环境的通用系统,用于管理、控制和监测可穿戴和便携式透析设备。本文讨论了其设计,简要介绍了实验性个人健康系统的主要组成部分,并强调了采用这种方法的主要优点。本文还讨论了基于标准IEEE规范的透析装置模拟器的实现结果。该系统提案是基于德国慕尼黑应用科学大学、意大利帕多瓦大学和荷兰格罗宁根大学之间的合作而创建的,来自德国、意大利和罗马尼亚的合作大学、医院和公司也参与其中。
{"title":"Remote monitoring-control system for future wearable-portable dialysis devices","authors":"Alexandru Soceanu, S. Congiu, N. Goga","doi":"10.1109/SYSCON.2011.5929063","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929063","url":null,"abstract":"Moving the dialysis treatment from the nephrology clinic to the patient's point of need, instead of moving patients to the nephrology clinic, is a great challenge today. The main objective of work presented in this the paper is the development of a universal system, suitable for European environment, for the management, control and monitoring of wearable and portable dialysis devices. The paper discusses its design and presents briefly the main components of the experimental Personal Health System, emphasizing also the main advantages of using such approach. The results of implementing a dialysis device simulator based on standard IEEE specification are also discussed. The system proposal is created based on collaboration among the University of Applied Sciences Munich, Germany, the University of Padova, Italy, and the University of Groningen, the Netherlands with participation of partner universities, hospitals and companies from Germany, Italy, and Romania.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133955298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Computing the impact of cyber attacks on complex missions 计算网络攻击对复杂任务的影响
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929055
S. Musman, Mike Tanner, A. Temin, E. Elsaesser, Lewis Loren
This paper describes how to evaluate the impact of a cyber attack on a mission. We accomplish this by computing impact as the changes to mission measures of effectiveness, based on the reported effects of a known or suspected attack on one or more parts of the information technology (IT) supporting the mission. Our previous papers have described our goals for computing mission impact and the choices of the techniques we use for modeling missions, IT, and cyber attacks. This paper focuses on how we compute the impact of cyber attacks on IT processes and information. These computations will improve decision-making when under cyber attack by providing accurate and detailed assessments of the impact of those attacks. Although the focus of our work has been on the calculation of cyber mission impacts during mission execution, we have also demonstrated how our representations and computations can be used for performing cyber risk analysis and crown jewels analysis.
本文描述了如何评估网络攻击对任务的影响。我们根据对支持任务的信息技术(IT)的一个或多个部分的已知或可疑攻击所报告的影响,通过计算影响作为任务有效性度量的变化来实现这一点。我们之前的论文描述了我们计算任务影响的目标,以及我们用于任务建模、IT和网络攻击的技术选择。本文的重点是我们如何计算网络攻击对IT流程和信息的影响。这些计算将提供对这些攻击影响的准确和详细的评估,从而在遭受网络攻击时改善决策。虽然我们的工作重点是在任务执行期间计算网络任务影响,但我们也展示了如何将我们的表示和计算用于执行网络风险分析和皇冠珠宝分析。
{"title":"Computing the impact of cyber attacks on complex missions","authors":"S. Musman, Mike Tanner, A. Temin, E. Elsaesser, Lewis Loren","doi":"10.1109/SYSCON.2011.5929055","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929055","url":null,"abstract":"This paper describes how to evaluate the impact of a cyber attack on a mission. We accomplish this by computing impact as the changes to mission measures of effectiveness, based on the reported effects of a known or suspected attack on one or more parts of the information technology (IT) supporting the mission. Our previous papers have described our goals for computing mission impact and the choices of the techniques we use for modeling missions, IT, and cyber attacks. This paper focuses on how we compute the impact of cyber attacks on IT processes and information. These computations will improve decision-making when under cyber attack by providing accurate and detailed assessments of the impact of those attacks. Although the focus of our work has been on the calculation of cyber mission impacts during mission execution, we have also demonstrated how our representations and computations can be used for performing cyber risk analysis and crown jewels analysis.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125252202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
A risk modelling approach for a Communicating System of Systems 系统的通信系统的风险建模方法
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929099
J. Aitken, R. Alexander, T. Kelly
Communicating Systems of Systems provide new methods for developing flexibility and functionality. However, these systems contain added layers of complexity due to the emergent behaviours present in the network. In order to understand the safety implications of operating these SoS this paper develops a new risk modelling technique. Building on information contained within the MODAF model of the SoS this technique provides a structure to enable the analysis of risk.
系统的通信系统为开发灵活性和功能提供了新的方法。然而,由于网络中出现的突发行为,这些系统包含了额外的复杂性层。为了了解操作这些SoS的安全含义,本文开发了一种新的风险建模技术。在SoS的MODAF模型中包含的信息的基础上,这种技术提供了一种能够分析风险的结构。
{"title":"A risk modelling approach for a Communicating System of Systems","authors":"J. Aitken, R. Alexander, T. Kelly","doi":"10.1109/SYSCON.2011.5929099","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929099","url":null,"abstract":"Communicating Systems of Systems provide new methods for developing flexibility and functionality. However, these systems contain added layers of complexity due to the emergent behaviours present in the network. In order to understand the safety implications of operating these SoS this paper develops a new risk modelling technique. Building on information contained within the MODAF model of the SoS this technique provides a structure to enable the analysis of risk.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134375160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Architecting complex embedded systems: An industrial case study 架构复杂嵌入式系统:一个工业案例研究
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929054
Håkan Gustavsson, J. Axelsson
This paper studies the current state of architecting practices in three different industrial segments which are characterized by being software-intensive. The context of the six different companies as well as the architecting practices are compared and analyzed. The methods used to solve the tasks within the architecting process are mapped to the context where it has been used in industry. An analysis of the case study indicates how different methods are more suitable in different environments. Many of the successful practices found in the study can be explained by external factors related to the context of the different companies. Others relate to the internal structure of the organization, including its maturity which is measured by assessment through an adaption of the Capability Maturity Model Integration (CMMI).
本文研究了以软件密集型为特征的三个不同行业的架构实践现状。比较和分析了六家不同公司的环境以及架构实践。用于解决架构过程中的任务的方法被映射到它在工业中使用的上下文中。案例分析表明,不同的方法更适合于不同的环境。研究中发现的许多成功实践都可以用与不同公司背景相关的外部因素来解释。其他的与组织的内部结构有关,包括成熟度,成熟度是通过能力成熟度模型集成(CMMI)的适应性评估来衡量的。
{"title":"Architecting complex embedded systems: An industrial case study","authors":"Håkan Gustavsson, J. Axelsson","doi":"10.1109/SYSCON.2011.5929054","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929054","url":null,"abstract":"This paper studies the current state of architecting practices in three different industrial segments which are characterized by being software-intensive. The context of the six different companies as well as the architecting practices are compared and analyzed. The methods used to solve the tasks within the architecting process are mapped to the context where it has been used in industry. An analysis of the case study indicates how different methods are more suitable in different environments. Many of the successful practices found in the study can be explained by external factors related to the context of the different companies. Others relate to the internal structure of the organization, including its maturity which is measured by assessment through an adaption of the Capability Maturity Model Integration (CMMI).","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115647218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimal traffic flow assignment for planned deliveries in dangerous good transportation 危险品运输中计划交付的最优交通流分配
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929051
C. Roncoli, C. Bersani, R. Sacile, R. Minciardi
In this paper, an approach to solve a flow assignment problem is proposed assuming known the whole trip planning of the fleets. The objective is to minimize both the risk of the network associated to the DG transport flow and the variance of the assigned delivery planning in respect to the expected one. Different simulation tests have been performed to evaluate the goodness of the proposed model, planning one or two deliveries from different OD pairs, varying risk values on the links of the network during the time horizon. The results demonstrates that model application guarantees a decrease of risk costs splitting flows on multiple paths avoiding to transit on links characterized by an high risk at a certain time, as well as the respect of expecting flow over each link.
本文提出了一种假设车队整体行程计划已知的流量分配问题的求解方法。目标是最小化与DG运输流程相关的网络风险,以及分配的交付计划相对于预期的差异。为了评估所提出模型的有效性,进行了不同的仿真试验,规划了不同OD对的一次或两次交付,并在时间范围内改变了网络链路上的风险值。结果表明,模型的应用保证了在多路径上分流流的风险成本的降低,避免了在一定时间内通过具有高风险特征的环节,并保证了每个环节的预期流量。
{"title":"Optimal traffic flow assignment for planned deliveries in dangerous good transportation","authors":"C. Roncoli, C. Bersani, R. Sacile, R. Minciardi","doi":"10.1109/SYSCON.2011.5929051","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929051","url":null,"abstract":"In this paper, an approach to solve a flow assignment problem is proposed assuming known the whole trip planning of the fleets. The objective is to minimize both the risk of the network associated to the DG transport flow and the variance of the assigned delivery planning in respect to the expected one. Different simulation tests have been performed to evaluate the goodness of the proposed model, planning one or two deliveries from different OD pairs, varying risk values on the links of the network during the time horizon. The results demonstrates that model application guarantees a decrease of risk costs splitting flows on multiple paths avoiding to transit on links characterized by an high risk at a certain time, as well as the respect of expecting flow over each link.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114709511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal distributed and cooperative supervisory estimation of multi-agent systems subject to unreliable information 信息不可靠的多智能体系统的最优分布与协作监督估计
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929060
M. M. Tousi, S. Azizi, K. Khorasani
In this work, a novel framework for optimal cooperative supervisory estimation of multi-agent linear time-invariant (LTI) systems is proposed which is applicable to a large class of multi-agent systems. This framework was recently developed by the authors based on the notion of sub-observers and a discrete-event system (DES) supervisory control. Each sub-observer estimates certain states that are conditioned on given inputs, outputs, and states information. Moreover, the cooperation among the sub-observers is managed by a DES supervisor. In this work, our proposed supervisory estimation framework is extended to the combinatorial optimization domain. When certain anomalies (faults) are present in the system, or the sensors and sub-observers become unreliable, the proposed optimal DES supervisor makes decisions regarding the selection and reconfiguration of sets of sub-observers to estimate all the system states, while simultaneously a performance index that incorporates the communication cost, computation cost, and reconfiguration cost, and the number of invalid state estimates is minimized. The application of our proposed methodology in a practical industrial process is demonstrated through numerical simulations.
本文提出了一种新的多智能体线性时不变(LTI)系统的最优协同监督估计框架,该框架适用于大类多智能体系统。该框架是最近由作者基于子观察者和离散事件系统(DES)监督控制的概念开发的。每个子观测器估计某些状态,这些状态取决于给定的输入、输出和状态信息。此外,各分观察员之间的合作由一名环境服务监督员管理。在这项工作中,我们提出的监督估计框架被扩展到组合优化领域。当系统中存在某些异常(故障),或者传感器和子观测器变得不可靠时,所提出的最优DES监督器做出关于子观测器集的选择和重新配置的决策来估计系统的所有状态,同时一个包含通信成本、计算成本和重新配置成本的性能指标,以及无效状态估计的数量最小化。通过数值模拟证明了我们提出的方法在实际工业过程中的应用。
{"title":"Optimal distributed and cooperative supervisory estimation of multi-agent systems subject to unreliable information","authors":"M. M. Tousi, S. Azizi, K. Khorasani","doi":"10.1109/SYSCON.2011.5929060","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929060","url":null,"abstract":"In this work, a novel framework for optimal cooperative supervisory estimation of multi-agent linear time-invariant (LTI) systems is proposed which is applicable to a large class of multi-agent systems. This framework was recently developed by the authors based on the notion of sub-observers and a discrete-event system (DES) supervisory control. Each sub-observer estimates certain states that are conditioned on given inputs, outputs, and states information. Moreover, the cooperation among the sub-observers is managed by a DES supervisor. In this work, our proposed supervisory estimation framework is extended to the combinatorial optimization domain. When certain anomalies (faults) are present in the system, or the sensors and sub-observers become unreliable, the proposed optimal DES supervisor makes decisions regarding the selection and reconfiguration of sets of sub-observers to estimate all the system states, while simultaneously a performance index that incorporates the communication cost, computation cost, and reconfiguration cost, and the number of invalid state estimates is minimized. The application of our proposed methodology in a practical industrial process is demonstrated through numerical simulations.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115554450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Systems engineering education for inexperienced students by providing hand-on practices 为没有经验的学生提供动手实践的系统工程教育
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929096
K. Shimazu, Y. Ohkami
This paper presents results and lessons learned from a trial course on systems engineering for graduate students with little experience in industries. This course provides students with hand-on education for system engineering using commercially-off-the-shelf (COTS) components and a sizable amount of development works within the limitation in one semester (26 slots of lectures).
本文介绍了为缺乏工业经验的研究生开设的系统工程试验课程的结果和经验教训。本课程为学生提供使用商用现货(COTS)组件的系统工程实践教育,并在一个学期(26个课时)的限制内进行大量的开发工作。
{"title":"Systems engineering education for inexperienced students by providing hand-on practices","authors":"K. Shimazu, Y. Ohkami","doi":"10.1109/SYSCON.2011.5929096","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929096","url":null,"abstract":"This paper presents results and lessons learned from a trial course on systems engineering for graduate students with little experience in industries. This course provides students with hand-on education for system engineering using commercially-off-the-shelf (COTS) components and a sizable amount of development works within the limitation in one semester (26 slots of lectures).","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123698528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Camera control with EMG signals using Principal Component Analysis and support vector machines 用主成分分析和支持向量机对肌电信号进行相机控制
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929070
M. S. Erkılınç, F. Sahin
The main goal of Human Computer Interface (HCI) is to improve the interactions between users and computers by making computers more usable and receptive to the user's needs. Accordingly, surveillance is one of the major areas where human computer interface is critical. Surveillance cameras are usually controlled with joysticks. For this reason, it is almost impossible to be controlled by an amputee with no finger functionality. In this paper, the Fast Fourier Transform (FFT) analysis was applied to raw EMG data and then features are extracted with Principal Component Analysis (PCA) and Simple Principal Component Analysis (SPCA). In the proposed system, in order to make a decision whether the wrist is moving right, left, up, down or neutral, multi-class Support Vector Machine is employed. Additionally to Electromyography (EMG) signals, standard datasets that involves Electroencephalography (EEG) signals is also tested with multi-class SVM to verify the system robustness. Finally, classified EMG decisions are received by the camera as movement comments. Successful operation of camera employing EMG signals has been accomplished with 81% accuracy with SPCA.
人机界面(HCI)的主要目标是通过使计算机更易于使用和接受用户的需求来改善用户和计算机之间的交互。因此,监控是人机界面至关重要的主要领域之一。监控摄像机通常用操纵杆控制。由于这个原因,一个没有手指功能的截肢者几乎不可能控制它。本文首先对原始肌电数据进行快速傅里叶变换(FFT)分析,然后利用主成分分析(PCA)和简单主成分分析(SPCA)提取特征。在该系统中,为了判断手腕是右、左、上、下运动还是中立运动,采用了多类支持向量机。除了肌电图(Electromyography, EMG)信号外,还对涉及脑电图(Electroencephalography, EEG)信号的标准数据集进行了多类支持向量机测试,以验证系统的鲁棒性。最后,分类的肌电图决定被相机接收为运动评论。利用肌电信号的相机在SPCA下成功运行,准确率达到81%。
{"title":"Camera control with EMG signals using Principal Component Analysis and support vector machines","authors":"M. S. Erkılınç, F. Sahin","doi":"10.1109/SYSCON.2011.5929070","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929070","url":null,"abstract":"The main goal of Human Computer Interface (HCI) is to improve the interactions between users and computers by making computers more usable and receptive to the user's needs. Accordingly, surveillance is one of the major areas where human computer interface is critical. Surveillance cameras are usually controlled with joysticks. For this reason, it is almost impossible to be controlled by an amputee with no finger functionality. In this paper, the Fast Fourier Transform (FFT) analysis was applied to raw EMG data and then features are extracted with Principal Component Analysis (PCA) and Simple Principal Component Analysis (SPCA). In the proposed system, in order to make a decision whether the wrist is moving right, left, up, down or neutral, multi-class Support Vector Machine is employed. Additionally to Electromyography (EMG) signals, standard datasets that involves Electroencephalography (EEG) signals is also tested with multi-class SVM to verify the system robustness. Finally, classified EMG decisions are received by the camera as movement comments. Successful operation of camera employing EMG signals has been accomplished with 81% accuracy with SPCA.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121377283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Agile development for system of systems: Cyber security integration into information repositories architecture 系统的系统的敏捷开发:将网络安全集成到信息存储库架构中
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929083
D. Farroha, B. Farroha
In order to meet the mission needs of today and keep up with the pace of technological advances, adapting the Enterprise Systems Engineering (ESE) process in a time constrained mission-centric environment is critical to leverage the efficient delivery of new capabilities in a Net Centric environment. Agility (contemporary) versus rigidity (traditional) are approaches that have their trade-offs but to meet the demands and needs of our war-fighters, we must have an ESE process that allows us to deliver quality capabilities to the tactical edge. Governance plays a significant role and testing services needs to be addressed different from the traditional T&E of stovepiped systems. The traditional approach of building systems to deliver a specific function is being changed to an approach of architecting services. ESE utilizes defined processes that use managerial and technical tools to analyze problems and provide structure to the overall process of planning, procuring, designing, implementing and testing an enterprise system. Adding agility and assurance to the traditional and ESE is the process by which we build quality into complex systems while delivering functionality and security of contents in a manageable timeframe and stay flexible to meet emerging requirements. This study is based on architecting the GIG which is the ultimate complex system. Utilizing the DoD's framework to facilitate information sharing; which starts with data discovery and access, we analyzed several concepts to achieve agility and higher level of security in Information Sharing Systems. The concept of the GIG also ensures that systems are not only robust but also incorporate the flexibility needed to satisfy needs that evolve during the system's life.
为了满足当今的任务需求并跟上技术进步的步伐,在时间有限的任务中心环境中调整企业系统工程(ESE)过程对于在网络中心环境中利用新功能的有效交付至关重要。敏捷性(现代)与刚性(传统)是有其权衡的方法,但为了满足我们的作战人员的需求和需要,我们必须有一个ESE过程,使我们能够向战术优势交付高质量的能力。治理扮演着重要的角色,测试服务需要与烟囱系统的传统T&E不同。构建系统以交付特定功能的传统方法正在转变为构建服务的方法。ESE利用已定义的过程,这些过程使用管理和技术工具来分析问题,并为企业系统的规划、采购、设计、实施和测试的整个过程提供结构。将敏捷性和保证性添加到传统和ESE的过程中,我们将质量构建到复杂的系统中,同时在可管理的时间框架内交付功能和内容安全性,并保持灵活性以满足新出现的需求。本研究的基础是构建GIG,这是一个终极的复杂系统。利用国防部的框架促进信息共享;从数据发现和访问开始,我们分析了信息共享系统中实现敏捷性和更高级别安全性的几个概念。GIG的概念还确保系统不仅健壮,而且具有灵活性,以满足在系统生命周期中不断发展的需求。
{"title":"Agile development for system of systems: Cyber security integration into information repositories architecture","authors":"D. Farroha, B. Farroha","doi":"10.1109/SYSCON.2011.5929083","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929083","url":null,"abstract":"In order to meet the mission needs of today and keep up with the pace of technological advances, adapting the Enterprise Systems Engineering (ESE) process in a time constrained mission-centric environment is critical to leverage the efficient delivery of new capabilities in a Net Centric environment. Agility (contemporary) versus rigidity (traditional) are approaches that have their trade-offs but to meet the demands and needs of our war-fighters, we must have an ESE process that allows us to deliver quality capabilities to the tactical edge. Governance plays a significant role and testing services needs to be addressed different from the traditional T&E of stovepiped systems. The traditional approach of building systems to deliver a specific function is being changed to an approach of architecting services. ESE utilizes defined processes that use managerial and technical tools to analyze problems and provide structure to the overall process of planning, procuring, designing, implementing and testing an enterprise system. Adding agility and assurance to the traditional and ESE is the process by which we build quality into complex systems while delivering functionality and security of contents in a manageable timeframe and stay flexible to meet emerging requirements. This study is based on architecting the GIG which is the ultimate complex system. Utilizing the DoD's framework to facilitate information sharing; which starts with data discovery and access, we analyzed several concepts to achieve agility and higher level of security in Information Sharing Systems. The concept of the GIG also ensures that systems are not only robust but also incorporate the flexibility needed to satisfy needs that evolve during the system's life.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130742619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Predictive engineering of an of an unmanned aerial system (UAS) using the Architecture Analysis and Design Language (AADL) 基于体系结构分析与设计语言(AADL)的无人机系统预测工程
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929086
Jeanette B. Barott, D. Gluch, Savannah L. Kirby
In this paper, we describe the results of applying predictive software-dependent system engineering practices using the SAE International Architectural Analysis and Design Language (AADL) in the modeling and analysis of an unmanned aerial system (UAS), part of a search and rescue (SAR) system. The SAR system embodies many of the challenges associated with engineering complex software-dependent systems, such as achieving stringent performance requirements and ensuring effective resource utilization. The results of this work demonstrated that model-based software system engineering practices employing the AADL can be used to analyze important system aspects early in architectural development, and can be an integral element in making informed decisions throughout an engineering effort.
在本文中,我们描述了使用SAE国际建筑分析和设计语言(AADL)在无人驾驶飞机系统(UAS)的建模和分析中应用预测软件依赖系统工程实践的结果,该系统是搜索和救援(SAR)系统的一部分。SAR系统体现了与复杂软件相关的工程系统相关的许多挑战,例如实现严格的性能要求和确保有效的资源利用。这项工作的结果表明,采用AADL的基于模型的软件系统工程实践可以用于在架构开发的早期分析重要的系统方面,并且可以在整个工程工作中做出明智的决策。
{"title":"Predictive engineering of an of an unmanned aerial system (UAS) using the Architecture Analysis and Design Language (AADL)","authors":"Jeanette B. Barott, D. Gluch, Savannah L. Kirby","doi":"10.1109/SYSCON.2011.5929086","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929086","url":null,"abstract":"In this paper, we describe the results of applying predictive software-dependent system engineering practices using the SAE International Architectural Analysis and Design Language (AADL) in the modeling and analysis of an unmanned aerial system (UAS), part of a search and rescue (SAR) system. The SAR system embodies many of the challenges associated with engineering complex software-dependent systems, such as achieving stringent performance requirements and ensuring effective resource utilization. The results of this work demonstrated that model-based software system engineering practices employing the AADL can be used to analyze important system aspects early in architectural development, and can be an integral element in making informed decisions throughout an engineering effort.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130590027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2011 IEEE International Systems Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1