首页 > 最新文献

2011 IEEE International Systems Conference最新文献

英文 中文
Improving the evolutionary architecting process for embedded system product lines 改进嵌入式系统产品线的演化架构过程
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929065
J. Axelsson
Many industries developing complex products based on embedded systems rely on architecting as a key activity. Furthermore, they use product line approaches to find synergies between their products. This means that they use a base platform which is adapted to different products, and the architecture of the product line thus evolves over time. In previous case studies we have seen that these companies often lack a defined process for the evolutionary architecting of these product lines. The contribution of this paper is to present such a process, which matches key characteristics of mature architecting practices. It is also discussed how this process compares to observations in industry.
许多开发基于嵌入式系统的复杂产品的行业依赖于架构设计作为一项关键活动。此外,他们使用产品线方法来寻找产品之间的协同效应。这意味着他们使用的基本平台可以适应不同的产品,因此产品线的体系结构会随着时间的推移而发展。在之前的案例研究中,我们已经看到这些公司通常缺乏一个定义好的流程来对这些产品线进行演化式的架构设计。本文的贡献在于展示了这样一个过程,它与成熟架构实践的关键特征相匹配。还讨论了该过程如何与工业观察相比较。
{"title":"Improving the evolutionary architecting process for embedded system product lines","authors":"J. Axelsson","doi":"10.1109/SYSCON.2011.5929065","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929065","url":null,"abstract":"Many industries developing complex products based on embedded systems rely on architecting as a key activity. Furthermore, they use product line approaches to find synergies between their products. This means that they use a base platform which is adapted to different products, and the architecture of the product line thus evolves over time. In previous case studies we have seen that these companies often lack a defined process for the evolutionary architecting of these product lines. The contribution of this paper is to present such a process, which matches key characteristics of mature architecting practices. It is also discussed how this process compares to observations in industry.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"23 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124450387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
System for performance analysis of priority-based radar schedulers 基于优先级的雷达调度器性能分析系统
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929090
Christopher S. Bartley, A. Rusu, Robert Russell, Daniel Urbano, Stephen Cirner
We define radar events to be an abstraction of a request sent to a physical radar machine. Radar events are assigned a priority, will require a certain amount of time to execute and may or may not need to execute before an assigned deadline. Radar schedulers attempt to schedule radar events in real time as efficiently as possible, by scheduling the highest priority events while attempting to schedule every event before its deadline. Existing radar schedulers may have several drawbacks including inefficient algorithms, difficulty of implementing and changing of scheduling algorithms, and non-automated performance analysis of such algorithms. In this paper, we propose a system that addresses all of these issues. The goals of our system are to provide new scheduling algorithm solution techniques, to reduce the amount of time it takes to implement and begin testing new scheduling algorithms, and to reduce the number of errors committed and amount of time taken during the algorithm testing phase via automation. We will show that our system is an improvement over existing radar schedulers.
我们将雷达事件定义为发送到物理雷达机器的请求的抽象。雷达事件被分配了一个优先级,需要一定的时间来执行,可能需要也可能不需要在指定的截止日期之前执行。雷达调度程序通过调度最高优先级的事件,同时试图在截止日期之前调度每个事件,尽可能有效地实时调度雷达事件。现有的雷达调度器可能存在算法效率低下、调度算法难以实现和更改以及算法的非自动化性能分析等缺点。在本文中,我们提出了一个解决所有这些问题的系统。我们系统的目标是提供新的调度算法解决方案技术,减少实现和开始测试新调度算法所需的时间,并通过自动化减少算法测试阶段所犯的错误数量和所花费的时间。我们将展示我们的系统是现有雷达调度器的改进。
{"title":"System for performance analysis of priority-based radar schedulers","authors":"Christopher S. Bartley, A. Rusu, Robert Russell, Daniel Urbano, Stephen Cirner","doi":"10.1109/SYSCON.2011.5929090","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929090","url":null,"abstract":"We define radar events to be an abstraction of a request sent to a physical radar machine. Radar events are assigned a priority, will require a certain amount of time to execute and may or may not need to execute before an assigned deadline. Radar schedulers attempt to schedule radar events in real time as efficiently as possible, by scheduling the highest priority events while attempting to schedule every event before its deadline. Existing radar schedulers may have several drawbacks including inefficient algorithms, difficulty of implementing and changing of scheduling algorithms, and non-automated performance analysis of such algorithms. In this paper, we propose a system that addresses all of these issues. The goals of our system are to provide new scheduling algorithm solution techniques, to reduce the amount of time it takes to implement and begin testing new scheduling algorithms, and to reduce the number of errors committed and amount of time taken during the algorithm testing phase via automation. We will show that our system is an improvement over existing radar schedulers.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123487895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A SD model for the electrical market considering inflation and regulation strategies 考虑通货膨胀和调控策略的电力市场SD模型
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929082
Ying Yu, Ji Zhu
A SD model is presented in this paper to study an electrical market with regulation strategies. In each time unit of the model, the Stackelberg game between the government and the grid enterprise is analyzed: in order to encourage the grid enterprise to accept the regulated price, a transfer payment considering the impacts of the inflation is made by the government firstly, and then the grid enterprise makes responsive policy under the given regulation strategies. Based on the model, a simulation is done to investigate the impact of the inflation and the regulation strategies.
本文提出了一个具有调控策略的电力市场的SD模型。在模型的每个时间单元中,分析了政府与电网企业之间的Stackelberg博弈:为了鼓励电网企业接受管制价格,政府首先进行考虑通货膨胀影响的转移支付,然后电网企业在给定的管制策略下做出响应性政策。在此基础上,对通货膨胀的影响和调控策略进行了仿真研究。
{"title":"A SD model for the electrical market considering inflation and regulation strategies","authors":"Ying Yu, Ji Zhu","doi":"10.1109/SYSCON.2011.5929082","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929082","url":null,"abstract":"A SD model is presented in this paper to study an electrical market with regulation strategies. In each time unit of the model, the Stackelberg game between the government and the grid enterprise is analyzed: in order to encourage the grid enterprise to accept the regulated price, a transfer payment considering the impacts of the inflation is made by the government firstly, and then the grid enterprise makes responsive policy under the given regulation strategies. Based on the model, a simulation is done to investigate the impact of the inflation and the regulation strategies.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"32 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131432541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An integrated component selection framework for system-level design 一个用于系统级设计的集成组件选择框架
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929038
Chad L. Calvert, G. Hamza-Lup, A. Agarwal, B. Alhalabi
The increasing system design complexity is negatively impacting the overall system design productivity by increasing the cost and time of product development. One key to overcoming these challenges is exploiting Component Based Engineering practices. Components are designed for various specifications and usually variants of each component exist with different performance and quality of service parameters. Therefore it is a challenge to select the optimum components from a component library that will satisfy all functional and non-functional system requirements. If these designs and architectural decisions are delayed, they may lead to design re-spins thereby, negatively impacting the product development cost and time. In this paper we propose an integrated framework for component selection.
不断增加的系统设计复杂性增加了产品开发的成本和时间,从而对整体系统设计生产力产生了负面影响。克服这些挑战的一个关键是利用基于组件的工程实践。组件是为各种规格而设计的,通常每个组件的变体都具有不同的性能和服务质量参数。因此,从组件库中选择最优组件以满足所有功能和非功能系统需求是一项挑战。如果这些设计和架构决策被延迟,它们可能会导致重新设计,从而对产品开发成本和时间产生负面影响。在本文中,我们提出了一个集成的组件选择框架。
{"title":"An integrated component selection framework for system-level design","authors":"Chad L. Calvert, G. Hamza-Lup, A. Agarwal, B. Alhalabi","doi":"10.1109/SYSCON.2011.5929038","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929038","url":null,"abstract":"The increasing system design complexity is negatively impacting the overall system design productivity by increasing the cost and time of product development. One key to overcoming these challenges is exploiting Component Based Engineering practices. Components are designed for various specifications and usually variants of each component exist with different performance and quality of service parameters. Therefore it is a challenge to select the optimum components from a component library that will satisfy all functional and non-functional system requirements. If these designs and architectural decisions are delayed, they may lead to design re-spins thereby, negatively impacting the product development cost and time. In this paper we propose an integrated framework for component selection.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124689114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Dynamical System approach to insider threat detection 内部威胁检测的动态系统方法
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929116
Nitin Kanaskar, J. Bian, R. Seker, Mais Nijim, N. Yilmazer
Insider attacks have the potential to inflict severe damage to an organizations reputation, intellectual property and financial assets. The primary difference between the external intrusions and the insider intrusions is that an insider wields power of knowledge about the information system resources, their environment, policies. We present an approach to detecting abnormal behavior of an insider by applying Dynamical System Theory to the insiders computer usage pattern. This is because abnormal system usage pattern is one of the necessary precursors to actual execution of an attack. A base profile of system usage pattern for an insider is created via applying dynamical system theory measures. A continuous monitoring of the insiders system usage and its comparison with this base profile is performed to identify considerable deviations. A sample system usage in terms of application system calls is collected, analyzed, and graphical results of the analysis are presented. Our results indicate that dynamical system theory has the potential of detecting suspicious insider behavior occurring prior to the actual attack execution.
内部攻击有可能对组织的声誉、知识产权和金融资产造成严重损害。外部入侵和内部入侵的主要区别在于,内部人员掌握信息系统资源、环境和政策的知识。我们将动力系统理论应用于内部人员的计算机使用模式,提出了一种检测内部人员异常行为的方法。这是因为异常的系统使用模式是实际执行攻击的必要前兆之一。通过应用动力系统理论方法,建立了内部人员系统使用模式的基本轮廓。对内部系统的使用情况进行持续监测,并将其与基本配置文件进行比较,以确定相当大的偏差。从应用程序系统调用的角度收集和分析了一个示例系统使用情况,并给出了分析的图形结果。我们的研究结果表明,动态系统理论具有在实际攻击执行之前检测可疑内部行为的潜力。
{"title":"Dynamical System approach to insider threat detection","authors":"Nitin Kanaskar, J. Bian, R. Seker, Mais Nijim, N. Yilmazer","doi":"10.1109/SYSCON.2011.5929116","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929116","url":null,"abstract":"Insider attacks have the potential to inflict severe damage to an organizations reputation, intellectual property and financial assets. The primary difference between the external intrusions and the insider intrusions is that an insider wields power of knowledge about the information system resources, their environment, policies. We present an approach to detecting abnormal behavior of an insider by applying Dynamical System Theory to the insiders computer usage pattern. This is because abnormal system usage pattern is one of the necessary precursors to actual execution of an attack. A base profile of system usage pattern for an insider is created via applying dynamical system theory measures. A continuous monitoring of the insiders system usage and its comparison with this base profile is performed to identify considerable deviations. A sample system usage in terms of application system calls is collected, analyzed, and graphical results of the analysis are presented. Our results indicate that dynamical system theory has the potential of detecting suspicious insider behavior occurring prior to the actual attack execution.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133878274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An integrated wireless indoor navigation system for visually impaired 一种为视障人士设计的集成无线室内导航系统
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929098
M. Al-Qutayri, J. Jeedella, Majid Al-Shamsi
This paper presents an integrated wireless system that helps a visually impaired person navigate within an indoor environment. The guidance process to help the person navigate uses a ZigBee wireless mesh network to localize the user and a compass to determine his/her orientation. The system uses a server to calculate an optimal path from the user's present location to the target location or item to be reached. The system receives voice commands from the visually impaired person and generates audio responses to guide the person. The mobile unit of the system is compact and requires relatively low power. Overall the system has minimal intrusion level and the results of various testing scenarios showed it was successful. The results also showed that the accuracy level depends on the available ZigBee modules within the mesh network and the particular zone.
本文介绍了一种帮助视障人士在室内环境中导航的集成无线系统。帮助人们导航的引导过程使用ZigBee无线网状网络来定位用户,并使用指南针来确定他/她的方向。该系统使用服务器计算从用户当前位置到要到达的目标位置或物品的最佳路径。该系统接收视障人士发出的语音命令,并生成音频响应来引导视障人士。该系统的移动单元结构紧凑,功耗相对较低。总体而言,该系统具有最小的入侵级别,各种测试场景的结果表明该系统是成功的。结果还表明,精度水平取决于网状网络内可用的ZigBee模块和特定区域。
{"title":"An integrated wireless indoor navigation system for visually impaired","authors":"M. Al-Qutayri, J. Jeedella, Majid Al-Shamsi","doi":"10.1109/SYSCON.2011.5929098","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929098","url":null,"abstract":"This paper presents an integrated wireless system that helps a visually impaired person navigate within an indoor environment. The guidance process to help the person navigate uses a ZigBee wireless mesh network to localize the user and a compass to determine his/her orientation. The system uses a server to calculate an optimal path from the user's present location to the target location or item to be reached. The system receives voice commands from the visually impaired person and generates audio responses to guide the person. The mobile unit of the system is compact and requires relatively low power. Overall the system has minimal intrusion level and the results of various testing scenarios showed it was successful. The results also showed that the accuracy level depends on the available ZigBee modules within the mesh network and the particular zone.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133198063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An evolving understanding for predicting emergent properties 对预测涌现特性的不断发展的理解
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929114
Susan Ferreira, J. Tejeda
Emergence is a systems concept that refers to the properties that emerge as a result of the interactions between elements of a system. Emergent properties can be desirable or undesirable. Due to the potential for adverse consequences, it is beneficial to understand the undesirable emergent properties and be able to predict them prior to their occurrence. If the undesirable emergent properties are not predicted, it is important to detect them as soon as possible after their occurrence to minimize potential negative consequences. This paper discusses how the ability to predict and detect emergent properties evolves and improves over a system's lifecycle. Factors and system characteristics which may be useful to predict emergent properties are identified and associated to stages and processes in the system's lifecycle.
涌现是一个系统概念,指的是由于系统元素之间的相互作用而产生的特性。紧急属性可以是可取的,也可以是不可取的。由于潜在的不良后果,了解不希望出现的特性并能够在它们发生之前预测它们是有益的。如果没有预测到不希望出现的紧急属性,重要的是在它们发生后尽快检测它们,以尽量减少潜在的负面后果。本文讨论了预测和检测紧急属性的能力如何在系统的生命周期中发展和改进。识别和关联到系统生命周期中的阶段和过程的可能对预测紧急特性有用的因素和系统特征。
{"title":"An evolving understanding for predicting emergent properties","authors":"Susan Ferreira, J. Tejeda","doi":"10.1109/SYSCON.2011.5929114","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929114","url":null,"abstract":"Emergence is a systems concept that refers to the properties that emerge as a result of the interactions between elements of a system. Emergent properties can be desirable or undesirable. Due to the potential for adverse consequences, it is beneficial to understand the undesirable emergent properties and be able to predict them prior to their occurrence. If the undesirable emergent properties are not predicted, it is important to detect them as soon as possible after their occurrence to minimize potential negative consequences. This paper discusses how the ability to predict and detect emergent properties evolves and improves over a system's lifecycle. Factors and system characteristics which may be useful to predict emergent properties are identified and associated to stages and processes in the system's lifecycle.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130197438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
How are you feeling? A social network model to monitor the health of post-operative patients 你感觉怎么样?术后患者健康监测的社会网络模型
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929127
J. Mulcahy, Shihong Huang, Junwei Cao, Fan Zhang
Mobile devices and cloud computing platforms have become increasing popular in recent years, as more ways in which to adopt these technologies to existing business and research models have been envisioned and implemented. What started as simply providing bandwidth and technology to mobile users in order to browse the internet from handheld devices now allows entire websites to be hosted on remote cloud platforms. Users now have the ability to trade and track stock market data from anywhere and anytime, automatically communicate data from wearable medical sensor devices, avoid vehicle collisions, track freight shipments, and a plethora of other applications. Healthcare is an area where the leveraging of these new technologies has the ability to have worldwide impact, with many exciting possibilities. However, much of the current focus is on more “doctor-centric” uses rather than “patient-centric” ones. The use of mobile devices to automatically sense and transmit data from the patient, devices to aid in dictation and communication within hospital settings, and cloud products to store patient data and other solutions help make the tasks of physicians easier, but do not necessarily improve the care given to the patient. There are bandwidth concerns, security concerns and the general cyberphobia that consumers commonly have with sharing personal information. This paper proposes a different type of solution that is more related to a social networking environment in which many people are already comfortable using. It concentrates on the collection of data from patients during a period of time that they are often suffering the most - after initial post-operative release from a hospital or clinic. It first explores technologies that are currently in use, and then describes a different model that allows the patient to control what information is being shared, who is allowed to consume this data, and how it might enhance the well-being of those that may make use of this new paradigm.
近年来,移动设备和云计算平台变得越来越流行,人们设想并实施了更多将这些技术应用于现有业务和研究模型的方法。一开始只是为移动用户提供带宽和技术,以便从手持设备浏览互联网,现在允许整个网站托管在远程云平台上。用户现在能够随时随地交易和跟踪股票市场数据,自动通信来自可穿戴医疗传感器设备的数据,避免车辆碰撞,跟踪货运以及大量其他应用程序。医疗保健是一个利用这些新技术能够产生全球影响的领域,具有许多令人兴奋的可能性。然而,目前的重点更多是“以医生为中心”的用途,而不是“以病人为中心”的用途。使用移动设备自动感知和传输来自患者的数据,使用设备在医院环境中帮助听写和通信,使用云产品存储患者数据和其他解决方案有助于简化医生的任务,但不一定能改善对患者的护理。还有带宽问题、安全问题以及消费者在分享个人信息时普遍存在的网络恐惧症。本文提出了一种不同类型的解决方案,它与许多人已经习惯使用的社交网络环境更相关。它侧重于收集患者在他们通常最痛苦的一段时间内的数据,即从医院或诊所初次术后出院后的数据。它首先探索了目前正在使用的技术,然后描述了一个不同的模型,允许患者控制哪些信息被共享,谁被允许使用这些数据,以及它如何提高那些可能利用这种新范式的人的福祉。
{"title":"How are you feeling? A social network model to monitor the health of post-operative patients","authors":"J. Mulcahy, Shihong Huang, Junwei Cao, Fan Zhang","doi":"10.1109/SYSCON.2011.5929127","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929127","url":null,"abstract":"Mobile devices and cloud computing platforms have become increasing popular in recent years, as more ways in which to adopt these technologies to existing business and research models have been envisioned and implemented. What started as simply providing bandwidth and technology to mobile users in order to browse the internet from handheld devices now allows entire websites to be hosted on remote cloud platforms. Users now have the ability to trade and track stock market data from anywhere and anytime, automatically communicate data from wearable medical sensor devices, avoid vehicle collisions, track freight shipments, and a plethora of other applications. Healthcare is an area where the leveraging of these new technologies has the ability to have worldwide impact, with many exciting possibilities. However, much of the current focus is on more “doctor-centric” uses rather than “patient-centric” ones. The use of mobile devices to automatically sense and transmit data from the patient, devices to aid in dictation and communication within hospital settings, and cloud products to store patient data and other solutions help make the tasks of physicians easier, but do not necessarily improve the care given to the patient. There are bandwidth concerns, security concerns and the general cyberphobia that consumers commonly have with sharing personal information. This paper proposes a different type of solution that is more related to a social networking environment in which many people are already comfortable using. It concentrates on the collection of data from patients during a period of time that they are often suffering the most - after initial post-operative release from a hospital or clinic. It first explores technologies that are currently in use, and then describes a different model that allows the patient to control what information is being shared, who is allowed to consume this data, and how it might enhance the well-being of those that may make use of this new paradigm.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114573821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Robust observer-based fault diagnosis for an unmanned aerial vehicle 基于观测器的无人机鲁棒故障诊断
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929077
M. M. Tousi, K. Khorasani
In this paper, a new robust fault detection and isolation (FDI) methodology for an unmanned aerial vehicle (UAV) is proposed. The fault diagnosis scheme is constructed based on observer-based techniques according to fault models corresponding to each component (actuator, sensor, and structure). The proposed fault diagnosis method takes advantage of the structural perturbation of the UAV model due to the icing (the main structural fault in aircraft), sensor, and actuator faults to reduce the error of observers that are used in the FDI module in addition to distinguishing among faults in different components. Moreover, the accuracy of the FDI module is increased by considering the structural perturbation of the UAV linear model due to wind disturbances which is the major environmental disturbance affecting an aircraft. Our envisaged FDI strategy is capable of diagnosing recurrent faults through properly designed residuals with different responses to different types of faults. Simulation results are provided to illustrate and demonstrate the effectiveness of our proposed FDI approach due to faults in sensors, actuators, and structural components of unmanned aerial vehicles.
提出了一种新的针对无人机的鲁棒故障检测与隔离方法。根据各部件(执行器、传感器和结构)对应的故障模型,基于观测器技术构建故障诊断方案。该故障诊断方法利用无人机模型因结冰(飞机主要结构故障)、传感器和执行器故障引起的结构扰动,在区分不同部件故障的基础上,减少了FDI模块中使用的观测器的误差。此外,考虑了影响飞机的主要环境扰动——风扰动对无人机线性模型的结构扰动,提高了FDI模块的精度。我们设想的FDI策略能够通过适当设计的残差对不同类型的断层具有不同的响应来诊断复发性断层。仿真结果表明,由于传感器、致动器和无人机结构部件的故障,我们提出的FDI方法是有效的。
{"title":"Robust observer-based fault diagnosis for an unmanned aerial vehicle","authors":"M. M. Tousi, K. Khorasani","doi":"10.1109/SYSCON.2011.5929077","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929077","url":null,"abstract":"In this paper, a new robust fault detection and isolation (FDI) methodology for an unmanned aerial vehicle (UAV) is proposed. The fault diagnosis scheme is constructed based on observer-based techniques according to fault models corresponding to each component (actuator, sensor, and structure). The proposed fault diagnosis method takes advantage of the structural perturbation of the UAV model due to the icing (the main structural fault in aircraft), sensor, and actuator faults to reduce the error of observers that are used in the FDI module in addition to distinguishing among faults in different components. Moreover, the accuracy of the FDI module is increased by considering the structural perturbation of the UAV linear model due to wind disturbances which is the major environmental disturbance affecting an aircraft. Our envisaged FDI strategy is capable of diagnosing recurrent faults through properly designed residuals with different responses to different types of faults. Simulation results are provided to illustrate and demonstrate the effectiveness of our proposed FDI approach due to faults in sensors, actuators, and structural components of unmanned aerial vehicles.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133930991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Energy conservation in cloud infrastructures 云基础设施的节能
Pub Date : 2011-04-04 DOI: 10.1109/SYSCON.2011.5929050
Avinash Mehta, Mukesh Menaria, S. Dangi, Shrisha Rao
With the growth of cloud computing, large scale data centers have become common in the computing industry, and there has been a significant increase in energy consumption at these data centers, which thus becomes a key issue to address. As most of the time a data center remains underutilized, a significant amount of energy can be conserved by migrating virtual machines (VM) running on underutilized machines to other machines and hibernating such underutilized machines. This paper aims to design such a strategy for energy-efficient cloud data centers. It makes use of historical traffic data from data centers and uses a service request prediction model which enables the identification of the number of active servers required at a given moment, thus making possible the hibernation of underutilized servers. The simulation results indicate that this approach brings about a significant amount of energy conservation.
随着云计算的发展,大规模数据中心在计算行业中变得越来越普遍,这些数据中心的能源消耗也显著增加,因此成为需要解决的关键问题。由于数据中心在大多数情况下都未得到充分利用,因此通过将运行在未得到充分利用的机器上的虚拟机(VM)迁移到其他机器并休眠这些未得到充分利用的机器,可以节省大量的能源。本文旨在为节能的云数据中心设计这样一种策略。它利用来自数据中心的历史流量数据,并使用服务请求预测模型,该模型能够识别给定时刻所需的活动服务器数量,从而使未充分利用的服务器休眠成为可能。仿真结果表明,该方法具有显著的节能效果。
{"title":"Energy conservation in cloud infrastructures","authors":"Avinash Mehta, Mukesh Menaria, S. Dangi, Shrisha Rao","doi":"10.1109/SYSCON.2011.5929050","DOIUrl":"https://doi.org/10.1109/SYSCON.2011.5929050","url":null,"abstract":"With the growth of cloud computing, large scale data centers have become common in the computing industry, and there has been a significant increase in energy consumption at these data centers, which thus becomes a key issue to address. As most of the time a data center remains underutilized, a significant amount of energy can be conserved by migrating virtual machines (VM) running on underutilized machines to other machines and hibernating such underutilized machines. This paper aims to design such a strategy for energy-efficient cloud data centers. It makes use of historical traffic data from data centers and uses a service request prediction model which enables the identification of the number of active servers required at a given moment, thus making possible the hibernation of underutilized servers. The simulation results indicate that this approach brings about a significant amount of energy conservation.","PeriodicalId":109868,"journal":{"name":"2011 IEEE International Systems Conference","volume":"361 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115436139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
2011 IEEE International Systems Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1