Pub Date : 2020-06-01DOI: 10.1109/sose50414.2020.9130548
{"title":"SoSE 2020 Authors Index","authors":"","doi":"10.1109/sose50414.2020.9130548","DOIUrl":"https://doi.org/10.1109/sose50414.2020.9130548","url":null,"abstract":"","PeriodicalId":121664,"journal":{"name":"2020 IEEE 15th International Conference of System of Systems Engineering (SoSE)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114802260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/SoSE50414.2020.9130477
A. Vasickaninova, M. Bakosová, A. Mészáros
The paper deals with the design and application of advanced control approaches assuming the considered controlled system is a cooling system of four heat exchangers in series. Neural network model-based predictive control (NNPC) strategy, feedback linearization control, and fuzzy PI control are chosen. The results of the proposed control strategies are studied and verified and then compared with the results obtained by a conventional PID controller and the gain scheduled PID controller. The results show that NNPC and fuzzy control can improve heat exchangers control and achieve objectives such as reducing cooling water consumption.
{"title":"Advanced Control of Heat Exchangers in Series","authors":"A. Vasickaninova, M. Bakosová, A. Mészáros","doi":"10.1109/SoSE50414.2020.9130477","DOIUrl":"https://doi.org/10.1109/SoSE50414.2020.9130477","url":null,"abstract":"The paper deals with the design and application of advanced control approaches assuming the considered controlled system is a cooling system of four heat exchangers in series. Neural network model-based predictive control (NNPC) strategy, feedback linearization control, and fuzzy PI control are chosen. The results of the proposed control strategies are studied and verified and then compared with the results obtained by a conventional PID controller and the gain scheduled PID controller. The results show that NNPC and fuzzy control can improve heat exchangers control and achieve objectives such as reducing cooling water consumption.","PeriodicalId":121664,"journal":{"name":"2020 IEEE 15th International Conference of System of Systems Engineering (SoSE)","volume":"691 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116095022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/SoSE50414.2020.9130549
M. Belov, D. Novikov
The paper presents a system of formal models that allows posing and solving the question of engineering and managing an Enterprise as a mathematical optimization problem. A methodological analysis is made and a qualitative formalism is developed in the form of an integrated set of structural and process models describing the Enterprise and its complex activity. A harmonized set of mathematical models and methods is synthesized. The qualitative and mathematical models and methods constitute a basic conceptual structure of ideas and approaches on how to create and optimally manage an Enterprise: the Optimal Enterprise Control Framework.
{"title":"Optimal Enterprise: Engineering and Control","authors":"M. Belov, D. Novikov","doi":"10.1109/SoSE50414.2020.9130549","DOIUrl":"https://doi.org/10.1109/SoSE50414.2020.9130549","url":null,"abstract":"The paper presents a system of formal models that allows posing and solving the question of engineering and managing an Enterprise as a mathematical optimization problem. A methodological analysis is made and a qualitative formalism is developed in the form of an integrated set of structural and process models describing the Enterprise and its complex activity. A harmonized set of mathematical models and methods is synthesized. The qualitative and mathematical models and methods constitute a basic conceptual structure of ideas and approaches on how to create and optimally manage an Enterprise: the Optimal Enterprise Control Framework.","PeriodicalId":121664,"journal":{"name":"2020 IEEE 15th International Conference of System of Systems Engineering (SoSE)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116111502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/SoSE50414.2020.9130469
Anita Grontman, Lukasz Horyza, Krzystof Koczan, M. Marzec, Maciej Smiertka, M. Trybala
Inspired by works that included the use of Motion Capture for human body movement estimation, authors have created a program to test the correct performance of sword fencing in terms of combat sports, more specifically, the Historical European Martial Arts (HEMA). The focus is on the analysis of four actors, only one of them is a professional fencer. Each made the same motions that were recorded by the MoCap system to determine the pattern of the correct cut and show the mistakes made by amateurs.
{"title":"Analysis of sword fencing training evaluation possibilities using Motion Capture techniques","authors":"Anita Grontman, Lukasz Horyza, Krzystof Koczan, M. Marzec, Maciej Smiertka, M. Trybala","doi":"10.1109/SoSE50414.2020.9130469","DOIUrl":"https://doi.org/10.1109/SoSE50414.2020.9130469","url":null,"abstract":"Inspired by works that included the use of Motion Capture for human body movement estimation, authors have created a program to test the correct performance of sword fencing in terms of combat sports, more specifically, the Historical European Martial Arts (HEMA). The focus is on the analysis of four actors, only one of them is a professional fencer. Each made the same motions that were recorded by the MoCap system to determine the pattern of the correct cut and show the mistakes made by amateurs.","PeriodicalId":121664,"journal":{"name":"2020 IEEE 15th International Conference of System of Systems Engineering (SoSE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122545283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the increasing complexity of the highly engineered products, Model-based Systems Engineering (MBSE) is proposed to support the complexity management of the product development. As the basic of complexity management, complexity analysis is used to measure the system complexity for system solution trade-offs. Using traditional MBSE approaches, system architectures of product are formalized as MBSE models whose complexity measurement provides cues to quantitative trade-offs. In this paper, an MBSE approach is proposed to support complex analysis using qualitative and quantitative approaches. A GOPPRR approach is first proposed to support MBSE formalisms. Then a complexity measurement formula is used to calculate the structure complexity of the MBSE models. Finally, through a tool-chain developed based on Open Services for Lifecycle Collaboration (OSLC), a visualization tool is used to analyze the system complexity by measuring and visualizing the model complexity. A case study is proposed to evaluate the potentials of this approach for supporting product trade-offs. From the results, the approach enables to calculate complexity of MBSE models and virtualizes the model topologies.
随着高度工程化产品复杂性的增加,基于模型的系统工程(MBSE)被提出来支持产品开发的复杂性管理。复杂性分析是复杂性管理的基础,用于衡量系统解决方案的复杂性。使用传统的MBSE方法,产品的系统架构被形式化为MBSE模型,其复杂性度量为定量权衡提供线索。在本文中,提出了一种MBSE方法来支持使用定性和定量方法的复杂分析。首先提出了一种支持MBSE形式化的GOPPRR方法。然后用复杂度度量公式计算了MBSE模型的结构复杂度。最后,通过基于生命周期协作开放服务(Open Services for Lifecycle Collaboration, OSLC)开发的工具链,通过测量和可视化模型复杂性,使用可视化工具分析系统复杂性。提出了一个案例研究来评估这种方法在支持产品权衡方面的潜力。根据结果,该方法可以计算MBSE模型的复杂性并对模型拓扑进行虚拟化。
{"title":"A Complexity Analysis Approach for Model-based System Engineering","authors":"Zhenchao Hu, Jinzhi Lu, Jinwei Chen, Xiaochen Zheng, D. Kyritsis, Hui-sheng Zhang","doi":"10.1109/SoSE50414.2020.9130478","DOIUrl":"https://doi.org/10.1109/SoSE50414.2020.9130478","url":null,"abstract":"With the increasing complexity of the highly engineered products, Model-based Systems Engineering (MBSE) is proposed to support the complexity management of the product development. As the basic of complexity management, complexity analysis is used to measure the system complexity for system solution trade-offs. Using traditional MBSE approaches, system architectures of product are formalized as MBSE models whose complexity measurement provides cues to quantitative trade-offs. In this paper, an MBSE approach is proposed to support complex analysis using qualitative and quantitative approaches. A GOPPRR approach is first proposed to support MBSE formalisms. Then a complexity measurement formula is used to calculate the structure complexity of the MBSE models. Finally, through a tool-chain developed based on Open Services for Lifecycle Collaboration (OSLC), a visualization tool is used to analyze the system complexity by measuring and visualizing the model complexity. A case study is proposed to evaluate the potentials of this approach for supporting product trade-offs. From the results, the approach enables to calculate complexity of MBSE models and virtualizes the model topologies.","PeriodicalId":121664,"journal":{"name":"2020 IEEE 15th International Conference of System of Systems Engineering (SoSE)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131634629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/SoSE50414.2020.9130533
Youssef Damak, Y. Leroy, Guillaume Trehard, M. Jankovic
Autonomous Vehicles (AV) exhibit new characteristics rendering its architecting process challenging. They are context-aware cyber-physical systems with a high sensitivity toward their operational context. In addition to the lack of industrial feedback, their architecture needs to be adapted to their Operational Context (OC). The current literature doesn’t provide a clear method for designing AV architecture based on their OC. This paper proposes a four steps method following the Concept of Operation approach (ConOps) and functional chain modeling to design AV architecture based on their OC and experts knowledge. The method uses a state-of the-art OC ontology for AV and improves the identification speed and coverage of the AV’s operational needs. A case study is presented addressing the proposed methods and limitations.
{"title":"Operational Context-Based Design Method of Autonomous Vehicles Logical Architectures","authors":"Youssef Damak, Y. Leroy, Guillaume Trehard, M. Jankovic","doi":"10.1109/SoSE50414.2020.9130533","DOIUrl":"https://doi.org/10.1109/SoSE50414.2020.9130533","url":null,"abstract":"Autonomous Vehicles (AV) exhibit new characteristics rendering its architecting process challenging. They are context-aware cyber-physical systems with a high sensitivity toward their operational context. In addition to the lack of industrial feedback, their architecture needs to be adapted to their Operational Context (OC). The current literature doesn’t provide a clear method for designing AV architecture based on their OC. This paper proposes a four steps method following the Concept of Operation approach (ConOps) and functional chain modeling to design AV architecture based on their OC and experts knowledge. The method uses a state-of the-art OC ontology for AV and improves the identification speed and coverage of the AV’s operational needs. A case study is presented addressing the proposed methods and limitations.","PeriodicalId":121664,"journal":{"name":"2020 IEEE 15th International Conference of System of Systems Engineering (SoSE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125372359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/SoSE50414.2020.9130551
A. Bertolino, G. D. Angelis, F. Lonetti, V. Neves, M. Á. Olivero
We propose a factory of educational System of Systems (SoS) case studies that can be used for evaluating SoS research results, in particular in SoS testing. The factory includes a first set of constituent systems that can collaborate within different SoS architectures to accomplish different missions. In the paper, we introduce three possible SoSs and outline their missions. For more detailed descriptions, diagrams and the source code, we refer to the online repository of EDUFYSoS. The factory is meant to provide an extensible playground, which we aim to grow to include more systems and other missions with the support of the community.
{"title":"EDUFYSoS: A Factory of Educational System of Systems Case Studies","authors":"A. Bertolino, G. D. Angelis, F. Lonetti, V. Neves, M. Á. Olivero","doi":"10.1109/SoSE50414.2020.9130551","DOIUrl":"https://doi.org/10.1109/SoSE50414.2020.9130551","url":null,"abstract":"We propose a factory of educational System of Systems (SoS) case studies that can be used for evaluating SoS research results, in particular in SoS testing. The factory includes a first set of constituent systems that can collaborate within different SoS architectures to accomplish different missions. In the paper, we introduce three possible SoSs and outline their missions. For more detailed descriptions, diagrams and the source code, we refer to the online repository of EDUFYSoS. The factory is meant to provide an extensible playground, which we aim to grow to include more systems and other missions with the support of the community.","PeriodicalId":121664,"journal":{"name":"2020 IEEE 15th International Conference of System of Systems Engineering (SoSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124385309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/SoSE50414.2020.9130491
Donatas Mazeika, R. Butleris
in this paper, we introduce how Model-based System Engineering (MBSE) could be leveraged in order to tackle security issues while recreating legacy software systems. Originally, MBSE was dedicated to managing the complex system creation in terms of system requirements, design, analysis, verification and validation activities leaving security aspects aside. However, previous research shows that security analysis activity could be integrated into MBSE activity and powerful MBSE tools such as change impact analysis, simulation, validation, and verification could be successfully applied in cross-cutting disciplines. The paper presents guidelines on how and when to apply various security techniques (e.g. security requirements, misuse cases, attack scenarios) in the MBSE environment. The case study demonstrates and proves the adaptability of the security guidelines on the realworld software system modernization project.
{"title":"Identifying Security Issues with MBSE while Rebuilding Legacy Software Systems","authors":"Donatas Mazeika, R. Butleris","doi":"10.1109/SoSE50414.2020.9130491","DOIUrl":"https://doi.org/10.1109/SoSE50414.2020.9130491","url":null,"abstract":"in this paper, we introduce how Model-based System Engineering (MBSE) could be leveraged in order to tackle security issues while recreating legacy software systems. Originally, MBSE was dedicated to managing the complex system creation in terms of system requirements, design, analysis, verification and validation activities leaving security aspects aside. However, previous research shows that security analysis activity could be integrated into MBSE activity and powerful MBSE tools such as change impact analysis, simulation, validation, and verification could be successfully applied in cross-cutting disciplines. The paper presents guidelines on how and when to apply various security techniques (e.g. security requirements, misuse cases, attack scenarios) in the MBSE environment. The case study demonstrates and proves the adaptability of the security guidelines on the realworld software system modernization project.","PeriodicalId":121664,"journal":{"name":"2020 IEEE 15th International Conference of System of Systems Engineering (SoSE)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116967149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/SoSE50414.2020.9130492
T. Górski, J. Bednarski
A distributed ledger is a decentralized database spread across many participants. Various models describe software architecture and represent different architectural views. The paper concentrates on the deployment view. Model-Driven Development (MDD) is a software engineering approach that leverages models and transformations. The paper describes the UML2Deployment transformation of the distributed ledger’s deployment model into its deployment script. The deployment model, expressed in Unified Modeling Language (UML), is augmented with stereotypes and tagged values from UML Profile for Distributed Ledger Deployment. The target of the transformation is Gradle Groovy Domain Specific Language (DSL) deployment script for DLT network configuration. The transformation has been designed for R3 Corda framework. The authors propose the complete solution. The transformation has been incorporated into Visual Paradigm modeling tool.
分布式账本是一个分散的数据库,分布在许多参与者之间。各种模型描述了软件体系结构,并表示了不同的体系结构视图。本文主要讨论部署视图。模型驱动开发(MDD)是一种利用模型和转换的软件工程方法。本文描述了将分布式账本的部署模型转换为部署脚本的UML2Deployment过程。用统一建模语言(UML)表示的部署模型,使用来自UML Profile for Distributed Ledger deployment的原型和标记值进行扩充。转换的目标是用于DLT网络配置的Gradle Groovy领域特定语言(DSL)部署脚本。该转换是为R3 Corda框架设计的。作者提出了完整的解决方案。该转换已被合并到Visual Paradigm建模工具中。
{"title":"Transformation of the UML Deployment Model into a Distributed Ledger Network Configuration","authors":"T. Górski, J. Bednarski","doi":"10.1109/SoSE50414.2020.9130492","DOIUrl":"https://doi.org/10.1109/SoSE50414.2020.9130492","url":null,"abstract":"A distributed ledger is a decentralized database spread across many participants. Various models describe software architecture and represent different architectural views. The paper concentrates on the deployment view. Model-Driven Development (MDD) is a software engineering approach that leverages models and transformations. The paper describes the UML2Deployment transformation of the distributed ledger’s deployment model into its deployment script. The deployment model, expressed in Unified Modeling Language (UML), is augmented with stereotypes and tagged values from UML Profile for Distributed Ledger Deployment. The target of the transformation is Gradle Groovy Domain Specific Language (DSL) deployment script for DLT network configuration. The transformation has been designed for R3 Corda framework. The authors propose the complete solution. The transformation has been incorporated into Visual Paradigm modeling tool.","PeriodicalId":121664,"journal":{"name":"2020 IEEE 15th International Conference of System of Systems Engineering (SoSE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126573540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-01DOI: 10.1109/SoSE50414.2020.9130525
Deepak K. Tosh, Oscar Galindo, V. Kreinovich, O. Kosheleva
For cyber-physical systems (CPS), ensuring process and data security is critically important since the corresponding infrastructure needs to have high operational efficiency with no downtime. There are many techniques available that make communications in CPS environments secure – such as enabling traffic encryption between sensors and the computers processing the sensor’s data, incorporating message authentication codes to achieve integrity, etc. However, most of these techniques are dependent on some form of symmetric or asymmetric cryptographic algorithms like AES and RSA. These algorithms are under threat because of the emerging quantum computing paradigm: with quantum computing, these encryption algorithms can be potentially broken. It is therefore desirable to explore the use of quantum cryptography – which cannot be broken by quantum computing – for securing the classical communications infrastructure deployed in CPS. In this paper, we discuss possible consequences of this option. We also explain how quantum computers can help even more: namely, they can be used to maximize the system’s security where scalability is never a constraint, and to ensure we are not wasting time cycles on communicating and processing irrelevant information.
{"title":"Towards Security of Cyber-Physical Systems using Quantum Computing Algorithms","authors":"Deepak K. Tosh, Oscar Galindo, V. Kreinovich, O. Kosheleva","doi":"10.1109/SoSE50414.2020.9130525","DOIUrl":"https://doi.org/10.1109/SoSE50414.2020.9130525","url":null,"abstract":"For cyber-physical systems (CPS), ensuring process and data security is critically important since the corresponding infrastructure needs to have high operational efficiency with no downtime. There are many techniques available that make communications in CPS environments secure – such as enabling traffic encryption between sensors and the computers processing the sensor’s data, incorporating message authentication codes to achieve integrity, etc. However, most of these techniques are dependent on some form of symmetric or asymmetric cryptographic algorithms like AES and RSA. These algorithms are under threat because of the emerging quantum computing paradigm: with quantum computing, these encryption algorithms can be potentially broken. It is therefore desirable to explore the use of quantum cryptography – which cannot be broken by quantum computing – for securing the classical communications infrastructure deployed in CPS. In this paper, we discuss possible consequences of this option. We also explain how quantum computers can help even more: namely, they can be used to maximize the system’s security where scalability is never a constraint, and to ensure we are not wasting time cycles on communicating and processing irrelevant information.","PeriodicalId":121664,"journal":{"name":"2020 IEEE 15th International Conference of System of Systems Engineering (SoSE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128361580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}