首页 > 最新文献

2008 6th IEEE International Conference on Industrial Informatics最新文献

英文 中文
An approach to enhance mobile multicast using context transfer 一种利用上下文传输增强移动组播的方法
Pub Date : 2008-07-13 DOI: 10.1109/INDIN.2008.4618194
A. Abdalla, W. H. Hassan, A. Mohammed, A. Ahmed, A.H. Mohd
With the advent of the handheld devices and multimedia applications, there has been an increasing interest for mobile multicast. IETF proposes two approaches. The first approach is bi-directional tunneling (BT), where the mobile node subscribes to a multicast group through its home network. The second approach is in remote subscription (RS), where the mobile node joins the multicast group via a local multicast router on the foreign link being visited. However, in BT approach the home agent is typical far and this will lead to high signaling cost at the same time the home agent represents a single point of failure and introduces scalability issues. RS approach suffers mainly from frequent tree reconstruction. The main aim for this paper is to propose a new mobile multicast approach to reduce the signaling cost and reduce the packet loss especially in case of macromibiliy. The proposed solution integrates hierarchical mobile IPv6 with mobile context transfer. This paper presents and evaluates the proposed solution. Our results shows that compared to BT approach, the proposed solution gives lower signaling cost.
随着手持设备和多媒体应用的出现,人们对移动组播越来越感兴趣。IETF提出了两种方法。第一种方法是双向隧道(BT),移动节点通过其家庭网络订阅多播组。第二种方法是远程订阅(RS),其中移动节点通过访问的外部链路上的本地多播路由器加入多播组。然而,在BT方法中,主代理是典型的远端,这将导致高信令成本,同时主代理代表单点故障并引入可伸缩性问题。RS方法的主要缺点是树木重建频繁。本文的主要目的是提出一种新的移动组播方法,以降低信令成本和减少丢包,特别是在大带宽的情况下。该方案将分层移动IPv6与移动上下文传输相结合。本文给出并评价了所提出的解决方案。结果表明,与BT方法相比,该方案具有更低的信令成本。
{"title":"An approach to enhance mobile multicast using context transfer","authors":"A. Abdalla, W. H. Hassan, A. Mohammed, A. Ahmed, A.H. Mohd","doi":"10.1109/INDIN.2008.4618194","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618194","url":null,"abstract":"With the advent of the handheld devices and multimedia applications, there has been an increasing interest for mobile multicast. IETF proposes two approaches. The first approach is bi-directional tunneling (BT), where the mobile node subscribes to a multicast group through its home network. The second approach is in remote subscription (RS), where the mobile node joins the multicast group via a local multicast router on the foreign link being visited. However, in BT approach the home agent is typical far and this will lead to high signaling cost at the same time the home agent represents a single point of failure and introduces scalability issues. RS approach suffers mainly from frequent tree reconstruction. The main aim for this paper is to propose a new mobile multicast approach to reduce the signaling cost and reduce the packet loss especially in case of macromibiliy. The proposed solution integrates hierarchical mobile IPv6 with mobile context transfer. This paper presents and evaluates the proposed solution. Our results shows that compared to BT approach, the proposed solution gives lower signaling cost.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"60 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120921804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Measuring the effort of a reconfiguration processes 度量重新配置过程的工作量
Pub Date : 2008-07-13 DOI: 10.1109/INDIN.2008.4618152
A. Farid, W. Covanich
In recent years, the fields of reconfigurable manufacturing systems, holonic manufacturing systems, multi-agent systems have made technological advances to support the ready reconfiguration of automated manufacturing systems. To help assess these advancements, a reconfigurability measurement process has been developed based upon the complementary ideas of reconfiguration potential, and ease. This work measured the reconfigurability of an automated manufacturing system as an intrinsic property of the systempsilas structure. However, it did not explicitly measure the effort required to realize a reconfiguration process. This paper recombines the concepts of reconfiguration potential and reconfiguration ease to measure the effort required to realize a specific class of reconfiguration processes. The theoretical developments are then demonstrated in an illustrative example. The paper concludes with a discussion of potential implications on adjacent research.
近年来,可重构制造系统、全息制造系统、多智能体系统等领域的技术进步为自动化制造系统的可重构提供了支持。为了帮助评估这些进步,基于重构潜力和易用性的互补思想,开发了可重构性测量过程。这项工作测量了自动化制造系统作为系统结构固有属性的可重构性。然而,它没有明确地度量实现重新配置过程所需的工作量。本文重新组合了重构潜力和重构容易度的概念,以度量实现特定类型重构过程所需的努力。然后用一个说明性的例子来说明理论的发展。本文最后讨论了对相邻研究的潜在影响。
{"title":"Measuring the effort of a reconfiguration processes","authors":"A. Farid, W. Covanich","doi":"10.1109/INDIN.2008.4618152","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618152","url":null,"abstract":"In recent years, the fields of reconfigurable manufacturing systems, holonic manufacturing systems, multi-agent systems have made technological advances to support the ready reconfiguration of automated manufacturing systems. To help assess these advancements, a reconfigurability measurement process has been developed based upon the complementary ideas of reconfiguration potential, and ease. This work measured the reconfigurability of an automated manufacturing system as an intrinsic property of the systempsilas structure. However, it did not explicitly measure the effort required to realize a reconfiguration process. This paper recombines the concepts of reconfiguration potential and reconfiguration ease to measure the effort required to realize a specific class of reconfiguration processes. The theoretical developments are then demonstrated in an illustrative example. The paper concludes with a discussion of potential implications on adjacent research.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"77 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121024767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Customer-oriented group maintenance model for unreliable service system 面向客户的不可靠服务系统群体维护模型
Pub Date : 2008-07-13 DOI: 10.1109/INDIN.2008.4618097
Gia-Shie Liu
This study considers a service system with multiple independent servers operating in parallel and a single Markovian queue. The servers are unreliable with identically exponentially distributed failure times but no server failures allowed during maintenance. The repair time is also assumed to follow exponential distribution. Accordingly, we formulate this model as a continuous time Markov decision process. Group maintenance policies are developed based on the number of customers dynamically in the queue, and are mathematically proved to have the property of threshold structure.
本文研究了一个具有多个独立服务器并行运行和单个马尔可夫队列的服务系统。服务器不可靠,故障时间呈指数分布,但在维护期间不允许出现服务器故障。同时假定维修时间服从指数分布。因此,我们将该模型表述为一个连续时间马尔可夫决策过程。根据队列中顾客的数量动态地制定了群体维护策略,并在数学上证明了该策略具有阈值结构的性质。
{"title":"Customer-oriented group maintenance model for unreliable service system","authors":"Gia-Shie Liu","doi":"10.1109/INDIN.2008.4618097","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618097","url":null,"abstract":"This study considers a service system with multiple independent servers operating in parallel and a single Markovian queue. The servers are unreliable with identically exponentially distributed failure times but no server failures allowed during maintenance. The repair time is also assumed to follow exponential distribution. Accordingly, we formulate this model as a continuous time Markov decision process. Group maintenance policies are developed based on the number of customers dynamically in the queue, and are mathematically proved to have the property of threshold structure.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121838369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integrating network misuse and anomaly prevention 集成网络误用和异常防范
Pub Date : 2008-07-13 DOI: 10.1109/INDIN.2008.4618168
Y.K. Penva, P. G. Bringas
Network intrusion detection systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it targets, NIDS can be oriented to detect misuses (by defining all possible attacks) or anomalies (by modelling legitimate behaviour to find those that do not fit into that model). Still, since their problem knowledge is restricted to possible attacks, misuse detection fails to notice anomalies and vice versa. Against this background, this paper proposes a third alternative that hybrids misuse and anomaly prevention. In this way, ESIDE-Depian uses a Bayesian network to learn from both anomaly and misuse knowledge in order to be able to detect either kind of attacks, known and unknown. Finally, we evaluate ESIDE-Depian against all kind of menaces to prove in which degree it has been achieved to integrate both approaches.
网络入侵检测系统(NIDS)旨在防止网络攻击和未经授权的远程使用计算机。更准确地说,根据它所针对的攻击类型,NIDS可以定向检测滥用(通过定义所有可能的攻击)或异常(通过对合法行为进行建模以发现那些不符合该模型的行为)。但是,由于它们的问题知识仅限于可能的攻击,因此误用检测无法注意到异常,反之亦然。在此背景下,本文提出了误用与异常预防相结合的第三种方案。通过这种方式,side - depian使用贝叶斯网络从异常和误用知识中学习,以便能够检测已知和未知的任何一种攻击。最后,我们评估了side - depian对各种威胁的影响,以证明在何种程度上实现了两种方法的整合。
{"title":"Integrating network misuse and anomaly prevention","authors":"Y.K. Penva, P. G. Bringas","doi":"10.1109/INDIN.2008.4618168","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618168","url":null,"abstract":"Network intrusion detection systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it targets, NIDS can be oriented to detect misuses (by defining all possible attacks) or anomalies (by modelling legitimate behaviour to find those that do not fit into that model). Still, since their problem knowledge is restricted to possible attacks, misuse detection fails to notice anomalies and vice versa. Against this background, this paper proposes a third alternative that hybrids misuse and anomaly prevention. In this way, ESIDE-Depian uses a Bayesian network to learn from both anomaly and misuse knowledge in order to be able to detect either kind of attacks, known and unknown. Finally, we evaluate ESIDE-Depian against all kind of menaces to prove in which degree it has been achieved to integrate both approaches.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124931918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Engineering materials test process monitor system based on CSDA architecture 基于CSDA架构的工程材料试验过程监控系统
Pub Date : 2008-07-13 DOI: 10.1109/INDIN.2008.4618361
Gao Hongli, Luan Xu, Zhang Ni
Based on the analysis to the features of engineering materials test monitoring system, a new CSDA (Client Server Database Application for control) architecture is proposed. Apart from the conventional 3-tier C/S architecturepsilas components, the new CSDA architecture includes a new control application part. Applying this architecture, an industrial network is constructed, which closely combines the control network with the information network. Taking the high-frequency fatigue test system as an example, the application of the CSDA architecture is studied in details. The high-performance of the system demonstrates the feasibility and potential of the proposed architecture.
在分析工程材料试验监控系统特点的基础上,提出了一种新的CSDA (Client - Server - Database Application for control)体系结构。除了传统的三层C/S架构替换组件外,新的CSDA架构还包括一个新的控制应用部分。应用这一体系结构,构建了控制网络与信息网络紧密结合的工业网络。以某高频疲劳试验系统为例,详细研究了CSDA体系结构的应用。系统的性能验证了该体系结构的可行性和潜力。
{"title":"Engineering materials test process monitor system based on CSDA architecture","authors":"Gao Hongli, Luan Xu, Zhang Ni","doi":"10.1109/INDIN.2008.4618361","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618361","url":null,"abstract":"Based on the analysis to the features of engineering materials test monitoring system, a new CSDA (Client Server Database Application for control) architecture is proposed. Apart from the conventional 3-tier C/S architecturepsilas components, the new CSDA architecture includes a new control application part. Applying this architecture, an industrial network is constructed, which closely combines the control network with the information network. Taking the high-frequency fatigue test system as an example, the application of the CSDA architecture is studied in details. The high-performance of the system demonstrates the feasibility and potential of the proposed architecture.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125237831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OCARI: Optimization of communication for Ad hoc reliable industrial networks OCARI: Ad hoc可靠工业网络的通信优化
Pub Date : 2008-07-13 DOI: 10.1109/INDIN.2008.4618189
Tuan Dang, C. Devic
In this paper we present an industrial development of a wireless sensors network technology called OCARItrade. It targets applications in harsh environments in power plants and in warships. OCARI is a radio communication technology that supports mesh topology and power-aware ad hoc routing protocol aiming at maximizing the network lifetime. It is based on IEEE 802.15.4 PITY layer with full deterministic MAC layer for time-constrained communication. During the non time constrained communication period, its ad hoc routing strategy uses an energy-aware OLSR proactive protocol. OCARI application layer is based on ZigBee APS and APL primitives and profiles to provide a maximum compatibility with ZigBee applications. To fully assess this technology, extensive tests will be done in industrial facility at EDIT R&D as well as at DCNS. Our objective is then to promote this specification as an open standard of industrial wireless technology.
本文介绍了一种名为OCARItrade的无线传感器网络技术的工业发展。它的目标是在发电厂和军舰等恶劣环境下的应用。OCARI是一种无线电通信技术,支持网格拓扑和功率感知自组织路由协议,旨在最大化网络生命周期。它基于IEEE 802.15.4 PITY层,具有完全确定性的MAC层,用于有时间限制的通信。在无时间约束的通信期间,其自组织路由策略使用能量感知的OLSR主动协议。OCARI应用层基于ZigBee APS和APL原语和配置文件,以提供与ZigBee应用程序的最大兼容性。为了充分评估这项技术,将在EDIT研发中心和DCNS的工业设施中进行广泛的测试。我们的目标是将此规范推广为工业无线技术的开放标准。
{"title":"OCARI: Optimization of communication for Ad hoc reliable industrial networks","authors":"Tuan Dang, C. Devic","doi":"10.1109/INDIN.2008.4618189","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618189","url":null,"abstract":"In this paper we present an industrial development of a wireless sensors network technology called OCARItrade. It targets applications in harsh environments in power plants and in warships. OCARI is a radio communication technology that supports mesh topology and power-aware ad hoc routing protocol aiming at maximizing the network lifetime. It is based on IEEE 802.15.4 PITY layer with full deterministic MAC layer for time-constrained communication. During the non time constrained communication period, its ad hoc routing strategy uses an energy-aware OLSR proactive protocol. OCARI application layer is based on ZigBee APS and APL primitives and profiles to provide a maximum compatibility with ZigBee applications. To fully assess this technology, extensive tests will be done in industrial facility at EDIT R&D as well as at DCNS. Our objective is then to promote this specification as an open standard of industrial wireless technology.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122505803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Design of RF MEMS phase shifter based on saw-shaped CPW 基于锯齿形CPW的射频MEMS移相器设计
Pub Date : 2008-07-13 DOI: 10.1109/INDIN.2008.4618087
K. Tang, Qun Wu, Guohui Yang, Xun-jun He, J. Fu, Lewei Li
The operating principle of the RF MEMS phase shifter is described. Then the equivalent circuit of the MEMS phase shifter has been established and the capacitances of the MEMS bridges in both ldquouprdquo and ldquodownrdquo state are analyzed. Then the approach of using the saw-shaped CPW to decrease the return loss introduced by the insulation layer is proposed. By using network theory, the circuit simulation tool and CST microwave studio simulation tool, the proposed RF MEMS phase shifter is modeled. Simulation results show that the proposed model has the return loss less than -10 dB and the insertion loss more than -2 dB in 2 GRz bandwidth range. At the same time, for one RF MEMS switch-type bridge, as high as 22.5 degrees phase shift is realized.
介绍了射频MEMS移相器的工作原理。然后建立了MEMS移相器的等效电路,分析了两种状态下MEMS桥的电容。在此基础上,提出了利用锯齿形CPW减小绝缘层带来的回波损耗的方法。利用网络理论、电路仿真工具和CST微波工作室仿真工具,对所提出的射频MEMS移相器进行了建模。仿真结果表明,在2 GRz带宽范围内,该模型的回波损耗小于-10 dB,插入损耗大于-2 dB。同时,对于一个RF MEMS开关型桥,可以实现高达22.5度的相移。
{"title":"Design of RF MEMS phase shifter based on saw-shaped CPW","authors":"K. Tang, Qun Wu, Guohui Yang, Xun-jun He, J. Fu, Lewei Li","doi":"10.1109/INDIN.2008.4618087","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618087","url":null,"abstract":"The operating principle of the RF MEMS phase shifter is described. Then the equivalent circuit of the MEMS phase shifter has been established and the capacitances of the MEMS bridges in both ldquouprdquo and ldquodownrdquo state are analyzed. Then the approach of using the saw-shaped CPW to decrease the return loss introduced by the insulation layer is proposed. By using network theory, the circuit simulation tool and CST microwave studio simulation tool, the proposed RF MEMS phase shifter is modeled. Simulation results show that the proposed model has the return loss less than -10 dB and the insertion loss more than -2 dB in 2 GRz bandwidth range. At the same time, for one RF MEMS switch-type bridge, as high as 22.5 degrees phase shift is realized.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"580 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122843300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Structural Health Monitoring system considering fault-tolerance 考虑容错的结构健康监测系统
Pub Date : 2008-07-13 DOI: 10.1109/INDIN.2008.4618118
Y. Matsushiba, H. Nishi
Structural health monitoring (SHM) system uses a number of sensors for a precise prediction. This prediction enables to provide early indication of vulnerability of a structure and the timing of reinforcement in order to prevent future collapse. SHM systems are now widely spreading in infrastructures. However, conventional SHM systems did not take account of accidental collapse. There is a possibility that sensor node goes down or network goes offline. If sensor nodes are broken by damage, important data, stored in the nodes will have lost. To prevent the data loss, this paper proposes data-distributed fault-tolerant sensor network system for a SHM system. Proposed system consists of three functions, PING (Packet InterNet Groper) based network monitoring function (PNM), backup node selecting function (BNS) and socket communication function. Proposed system is implemented on PCs and practically evaluated in a laboratory environment on terminals of KNIVES, which is a test bed of sensor network system. As a result, Data sharing process on PC and KNIVES was confirmed and proposed method can provide a light-weight fault-tolerant system taking account of accidental collapse.
结构健康监测(SHM)系统采用多个传感器进行精确预测。这种预测能够提供结构脆弱性的早期指示和加固的时机,以防止未来的倒塌。SHM系统目前在基础设施中广泛应用。然而,传统的SHM系统没有考虑意外坍塌。存在传感器节点故障或网络离线的可能性。如果传感器节点被损坏,存储在节点上的重要数据就会丢失。为了防止数据丢失,本文提出了一种数据分布式容错传感器网络系统。该系统包括基于PING (Packet InterNet Groper)的网络监控功能(PNM)、备份节点选择功能(BNS)和套接字通信功能三个部分。本文提出的系统在pc上实现,并在实验室环境中对作为传感器网络系统测试平台的刀具终端进行了实际评估。验证了PC和KNIVES的数据共享过程,提出的方法可以提供考虑意外崩溃的轻量级容错系统。
{"title":"Structural Health Monitoring system considering fault-tolerance","authors":"Y. Matsushiba, H. Nishi","doi":"10.1109/INDIN.2008.4618118","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618118","url":null,"abstract":"Structural health monitoring (SHM) system uses a number of sensors for a precise prediction. This prediction enables to provide early indication of vulnerability of a structure and the timing of reinforcement in order to prevent future collapse. SHM systems are now widely spreading in infrastructures. However, conventional SHM systems did not take account of accidental collapse. There is a possibility that sensor node goes down or network goes offline. If sensor nodes are broken by damage, important data, stored in the nodes will have lost. To prevent the data loss, this paper proposes data-distributed fault-tolerant sensor network system for a SHM system. Proposed system consists of three functions, PING (Packet InterNet Groper) based network monitoring function (PNM), backup node selecting function (BNS) and socket communication function. Proposed system is implemented on PCs and practically evaluated in a laboratory environment on terminals of KNIVES, which is a test bed of sensor network system. As a result, Data sharing process on PC and KNIVES was confirmed and proposed method can provide a light-weight fault-tolerant system taking account of accidental collapse.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134015890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Unfolding enhancements speed FSM based simulation 展开增强基于FSM的仿真速度
Pub Date : 2008-07-13 DOI: 10.1109/INDIN.2008.4618236
P. Radcliffe
Simulation of real systems such as communications protocols can prove a system will work before any implementation, and test all possible operational states faster and more cheaply than could be achieved with a real physical system. This checking is usually performed by creating a reachability tree that shows all possible outcomes starting from one initial state and checking that all sequences result in an acceptable outcome. Examining the full reachability tree of a system described by Finite State Machines (FSMs) or Petri nets can guarantee the discovery of all incorrect behavior, but can take excessive computing time. Unfolding the reachability tree of a system described by Petri nets has been shown to dramatically reduce the simulation time. This paper shows several advantages if this unfolding is applied to an FSM model of a system instead. Such an approach allows fast discovery of deadlock, and livelock caused by true livelock or by unfairness in the simulation The unfolding method is extended to show how a system can be tested for all possible ldquounexpected inputsrdquo and ldquoany initial staterdquo, both of which are essential when analyzing the robustness of real world protocols. The method is applied to a communications protocol called 2-wire TIA where the simulation speed up was estimated to be a factor of 1.8 billion.
对真实系统(如通信协议)的模拟可以在任何实现之前证明系统可以工作,并且比使用真实物理系统更快、更便宜地测试所有可能的操作状态。这种检查通常通过创建一个可达性树来执行,该树显示从一个初始状态开始的所有可能的结果,并检查所有序列是否产生可接受的结果。检查由有限状态机(fsm)或Petri网描述的系统的完整可达性树可以保证发现所有不正确的行为,但可能会花费过多的计算时间。利用Petri网对系统的可达性树进行展开,可以大大缩短仿真时间。本文展示了将这种展开应用于系统的FSM模型的几个优点。这种方法可以快速发现死锁,以及由真实的活锁或模拟中的不公平引起的活锁。展开方法扩展到显示如何测试系统的所有可能的非预期输入和初始状态,这两者在分析真实世界协议的鲁棒性时都是必不可少的。该方法应用于称为2线TIA的通信协议,其中仿真速度估计为18亿倍。
{"title":"Unfolding enhancements speed FSM based simulation","authors":"P. Radcliffe","doi":"10.1109/INDIN.2008.4618236","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618236","url":null,"abstract":"Simulation of real systems such as communications protocols can prove a system will work before any implementation, and test all possible operational states faster and more cheaply than could be achieved with a real physical system. This checking is usually performed by creating a reachability tree that shows all possible outcomes starting from one initial state and checking that all sequences result in an acceptable outcome. Examining the full reachability tree of a system described by Finite State Machines (FSMs) or Petri nets can guarantee the discovery of all incorrect behavior, but can take excessive computing time. Unfolding the reachability tree of a system described by Petri nets has been shown to dramatically reduce the simulation time. This paper shows several advantages if this unfolding is applied to an FSM model of a system instead. Such an approach allows fast discovery of deadlock, and livelock caused by true livelock or by unfairness in the simulation The unfolding method is extended to show how a system can be tested for all possible ldquounexpected inputsrdquo and ldquoany initial staterdquo, both of which are essential when analyzing the robustness of real world protocols. The method is applied to a communications protocol called 2-wire TIA where the simulation speed up was estimated to be a factor of 1.8 billion.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115069234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Kinematics control for a 6-DOF space manipulator based on ARM processor and FPGA Co-processor 基于ARM处理器和FPGA协处理器的六自由度空间机械臂运动学控制
Pub Date : 2008-07-13 DOI: 10.1109/INDIN.2008.4618080
Zheng Yili, Sun Hanxu, Jia Qingxuan, Shi Guozhen
Based on ARM processor and FPGA co-processor, kinematics control for a 6-DOF (degree of freedom) space manipulator is realized in this paper. The ARM processor uses AT91FR40162, which mainly takes charge of the tractory planning for the space manipulator. Meanwhile, using the CORDIC (Coordinate Rotation Digital Computer) algorithm, the forward and inverse kinematics computation of the space manipulator are implemented in FPGA. This approach can effectively reduce the calculation time of kinematics control and optimize real-time performance of the space manipulator. The principle and architecture of CORDIC IP core are presented, and CORDIC-based pipelines for the kinematics computation are depicted. Furthermore, a novel fault-tolerance central controller for the space manipulator using ARM processor and FPGA co-processor is developed and the control flow is presented particularly. The ground simulative zero-gravity experiment shows that the performance of the central controller meets the real-time and accuracy requirement of the space manipulator.
基于ARM处理器和FPGA协处理器,实现了六自由度空间机械臂的运动学控制。ARM处理器采用AT91FR40162,主要负责空间机械臂的工厂规划。同时,利用坐标旋转数字计算机(CORDIC)算法,在FPGA上实现了空间机械臂的正逆运动学计算。该方法可有效减少空间机械臂运动控制的计算时间,优化空间机械臂的实时性。介绍了CORDIC IP核的工作原理和体系结构,描述了基于CORDIC的运动学计算流水线。在此基础上,提出了一种基于ARM处理器和FPGA协处理器的空间机械臂容错中央控制器,并详细介绍了其控制流程。地面模拟零重力实验表明,该中央控制器的性能满足空间机械臂的实时性和精度要求。
{"title":"Kinematics control for a 6-DOF space manipulator based on ARM processor and FPGA Co-processor","authors":"Zheng Yili, Sun Hanxu, Jia Qingxuan, Shi Guozhen","doi":"10.1109/INDIN.2008.4618080","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618080","url":null,"abstract":"Based on ARM processor and FPGA co-processor, kinematics control for a 6-DOF (degree of freedom) space manipulator is realized in this paper. The ARM processor uses AT91FR40162, which mainly takes charge of the tractory planning for the space manipulator. Meanwhile, using the CORDIC (Coordinate Rotation Digital Computer) algorithm, the forward and inverse kinematics computation of the space manipulator are implemented in FPGA. This approach can effectively reduce the calculation time of kinematics control and optimize real-time performance of the space manipulator. The principle and architecture of CORDIC IP core are presented, and CORDIC-based pipelines for the kinematics computation are depicted. Furthermore, a novel fault-tolerance central controller for the space manipulator using ARM processor and FPGA co-processor is developed and the control flow is presented particularly. The ground simulative zero-gravity experiment shows that the performance of the central controller meets the real-time and accuracy requirement of the space manipulator.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114138866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2008 6th IEEE International Conference on Industrial Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1