首页 > 最新文献

2019 14th Annual Conference System of Systems Engineering (SoSE)最新文献

英文 中文
Stored System Inherent Availability Optimization from a System of Systems Physics of Failure Perspective 从系统物理失效角度看存储系统固有可用性优化
Pub Date : 2019-05-01 DOI: 10.1109/SYSOSE.2019.8753871
Douglas L. Van Bossuyt, B. O’Halloran, Matthew Morningstar
Stored systems of systems (SoS) such as weapons systems in magazines and storage depots, spare equipment for nuclear power plants, and other stored SoS can sit in storage for decades before use. Failures that impact inherent availability can result from diurnal temperature cycles and other storage issues. Individual storage locations within a storage facility can undergo different diurnal temperature cycles which can impact time to failure of specific systems within the SoS due to physics of failure mechanisms (e.g.: transistor failure from repeated thermal cycles). Other issues such as test and maintenance cycles; certain stored systems being the favored extended test system or in the case of weapons systems used on aircraft, favored sortie systems; and other SoS-specific issues can contribute to reduced inherent availability. This paper presents a method of optimizing contributors to inherent availability from a SoS perspective, and using both individual system failure data and SoS cost information. The result is a stored SoS that is optimized to either meet service life requirements, or a stored SoS that is optimized to extend service life beyond the design basis, or a stored SoS that is optimized to increase inherent availability while meeting service life requirements. A case study of a stored SoS weapons system for aircraft is presented to illustrate the method.
储存系统的系统(SoS),如弹药库和储存库中的武器系统,核电站的备用设备和其他储存的SoS在使用前可以在仓库中存放数十年。影响固有可用性的故障可能源于昼夜温度循环和其他存储问题。存储设施内的单个存储位置可以经历不同的昼夜温度循环,这可能会影响SoS内特定系统由于物理故障机制而失效的时间(例如:由重复热循环引起的晶体管故障)。其他问题,如测试和维护周期;某些存储系统是受青睐的扩展测试系统,或者在飞机上使用的武器系统的情况下,受青睐的出击系统;和其他特定于sos的问题可能导致固有可用性降低。本文提出了一种从系统系统的角度出发,利用单个系统故障数据和系统系统成本信息来优化系统固有可用性的方法。结果是,存储的SoS经过优化以满足使用寿命要求,或者存储的SoS经过优化以延长超出设计基础的使用寿命,或者存储的SoS经过优化以增加固有可用性,同时满足使用寿命要求。最后以某型机载SoS武器系统为例,对该方法进行了说明。
{"title":"Stored System Inherent Availability Optimization from a System of Systems Physics of Failure Perspective","authors":"Douglas L. Van Bossuyt, B. O’Halloran, Matthew Morningstar","doi":"10.1109/SYSOSE.2019.8753871","DOIUrl":"https://doi.org/10.1109/SYSOSE.2019.8753871","url":null,"abstract":"Stored systems of systems (SoS) such as weapons systems in magazines and storage depots, spare equipment for nuclear power plants, and other stored SoS can sit in storage for decades before use. Failures that impact inherent availability can result from diurnal temperature cycles and other storage issues. Individual storage locations within a storage facility can undergo different diurnal temperature cycles which can impact time to failure of specific systems within the SoS due to physics of failure mechanisms (e.g.: transistor failure from repeated thermal cycles). Other issues such as test and maintenance cycles; certain stored systems being the favored extended test system or in the case of weapons systems used on aircraft, favored sortie systems; and other SoS-specific issues can contribute to reduced inherent availability. This paper presents a method of optimizing contributors to inherent availability from a SoS perspective, and using both individual system failure data and SoS cost information. The result is a stored SoS that is optimized to either meet service life requirements, or a stored SoS that is optimized to extend service life beyond the design basis, or a stored SoS that is optimized to increase inherent availability while meeting service life requirements. A case study of a stored SoS weapons system for aircraft is presented to illustrate the method.","PeriodicalId":133413,"journal":{"name":"2019 14th Annual Conference System of Systems Engineering (SoSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128692295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Low-Cost Heterogeneous Unmanned Ground Vehicle (UGV) Testbed for Systems of Autonomous Vehicles Research 面向自主车辆系统研究的低成本异构无人地面车辆(UGV)试验台
Pub Date : 2019-05-01 DOI: 10.1109/SYSOSE.2019.8753850
A. Jaimes, Javier González, Alexander Ibarra, P. Benavidez, M. Jamshidi
Ahstract-This paper presents design of a mobile testbed of scale-sized UGVs designed for multi-agent autonomous vehicle missions. Small scale autonomous vehicles are used as a means for validating larger scale systems in a low-cost manner. This system is unique in how vehicle trajectories are managed using a mobile relative localization provider available to the system, which can be thought of as a mobile version of a Vicon or Optitrack system. A multi-agent mapping scenario is provided as an initial test of the testbed system. In the scenario, each vehicle in the testbed has roles in accurately mapping objects within an environment. Robots and data are managed with the Robot Operating System (ROS), which provides access to visualizations through Robot Visualization (RVIZ).
摘要针对多智能体自动驾驶车辆任务,设计了一种按比例设计的ugv移动试验台。小型自动驾驶汽车被用作以低成本方式验证大规模系统的一种手段。该系统的独特之处在于,它使用系统可用的移动相对定位提供商来管理车辆轨迹,这可以被认为是Vicon或Optitrack系统的移动版本。提供了一个多代理映射场景作为测试平台系统的初始测试。在该场景中,测试平台中的每辆车都在准确映射环境中的对象方面发挥作用。机器人和数据由机器人操作系统(ROS)管理,该系统通过机器人可视化(RVIZ)提供可视化访问。
{"title":"Low-Cost Heterogeneous Unmanned Ground Vehicle (UGV) Testbed for Systems of Autonomous Vehicles Research","authors":"A. Jaimes, Javier González, Alexander Ibarra, P. Benavidez, M. Jamshidi","doi":"10.1109/SYSOSE.2019.8753850","DOIUrl":"https://doi.org/10.1109/SYSOSE.2019.8753850","url":null,"abstract":"Ahstract-This paper presents design of a mobile testbed of scale-sized UGVs designed for multi-agent autonomous vehicle missions. Small scale autonomous vehicles are used as a means for validating larger scale systems in a low-cost manner. This system is unique in how vehicle trajectories are managed using a mobile relative localization provider available to the system, which can be thought of as a mobile version of a Vicon or Optitrack system. A multi-agent mapping scenario is provided as an initial test of the testbed system. In the scenario, each vehicle in the testbed has roles in accurately mapping objects within an environment. Robots and data are managed with the Robot Operating System (ROS), which provides access to visualizations through Robot Visualization (RVIZ).","PeriodicalId":133413,"journal":{"name":"2019 14th Annual Conference System of Systems Engineering (SoSE)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123440850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Pipeline Approach in Identifying Important Input Features from Neural Networks 神经网络重要输入特征识别的管道方法
Pub Date : 2019-05-01 DOI: 10.1109/SYSOSE.2019.8753849
Y. He, Chih Lai, D. Martinovic-Weigelt, Zezheng Long
Neural networks are well-known for their powerful capability in producing high prediction accuracy. However, due to the non-linear calculations in the network, it is very difficult for users to understand which input features are important in leading to final predictions. In this study, we propose a two-step pipeline approach that uses two sets of linear models to estimates feature importance in the input dataset $X$ that leads to the class prediction specified in Y. More specifically, the first linear regression model derives the feature importance in $X$ in explaining the Z-code that was extracted from any hidden layer of a trained neural network. The second linear classification model captures the importance in the Z- code in predicting the target class Y. We then combine the first $X$ to $Z$ importance with the second $Z$ to $Y$ importance together to approximate the non-linear importance from $X$ to Y. The experiments conducted in this study also show that our method is sound and stable in selecting the truly important features from input datasets regardless how a neural network was constructed with different parameters such as activation functions or the number of hidden layers.
神经网络以其强大的预测能力和较高的预测精度而著称。然而,由于网络中的非线性计算,用户很难理解哪些输入特征对最终预测很重要。在本研究中,我们提出了一种两步管道方法,该方法使用两组线性模型来估计输入数据集$X$中的特征重要性,从而导致y中指定的类预测。更具体地说,第一个线性回归模型在解释从训练过的神经网络的任何隐藏层提取的z代码时派生出$X$中的特征重要性。第二线性分类模型抓住了重要性在Z -代码在预测目标类Y .然后我们结合第X Z重要性美元与美元第二Y - Z美元美元美元重要性来近似非线性重要性从X到Y美元的实验研究也表明,我们的方法是选择真正重要的健康稳定特性无论如何从输入数据集神经网络构建等不同的参数激活函数或隐藏层的数量。
{"title":"A Pipeline Approach in Identifying Important Input Features from Neural Networks","authors":"Y. He, Chih Lai, D. Martinovic-Weigelt, Zezheng Long","doi":"10.1109/SYSOSE.2019.8753849","DOIUrl":"https://doi.org/10.1109/SYSOSE.2019.8753849","url":null,"abstract":"Neural networks are well-known for their powerful capability in producing high prediction accuracy. However, due to the non-linear calculations in the network, it is very difficult for users to understand which input features are important in leading to final predictions. In this study, we propose a two-step pipeline approach that uses two sets of linear models to estimates feature importance in the input dataset $X$ that leads to the class prediction specified in Y. More specifically, the first linear regression model derives the feature importance in $X$ in explaining the Z-code that was extracted from any hidden layer of a trained neural network. The second linear classification model captures the importance in the Z- code in predicting the target class Y. We then combine the first $X$ to $Z$ importance with the second $Z$ to $Y$ importance together to approximate the non-linear importance from $X$ to Y. The experiments conducted in this study also show that our method is sound and stable in selecting the truly important features from input datasets regardless how a neural network was constructed with different parameters such as activation functions or the number of hidden layers.","PeriodicalId":133413,"journal":{"name":"2019 14th Annual Conference System of Systems Engineering (SoSE)","volume":"32 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130736282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Secure System of Systems Needing a Rapid Deployment 需要快速部署的系统的安全系统开发
Pub Date : 2019-05-01 DOI: 10.1109/SYSOSE.2019.8753857
Nan Messe, Nicolas Belloir, Vanea Chiprianov, Imane Cherfa, Régis Fleurquin, Salah Sadou
In certain cases, such as secure humanitarian corridors in a conflict zone, a special type of SoS, needing a rapid deployment, has to be developed. Because of the tense time constraint, usually only a domain expert is responsible with this development. However, many such SoSs also have to take into account the security aspect. How to help a domain expert integrate the security aspect into the rapid development of an SoS? In this proposal paper, we present an approach and a tool suite that help the domain expert tag business assets using security properties, which are then used to identify vulnerabilities and to propose possible security control mechanisms. We illustrate our proposal on a case study.
在某些情况下,例如冲突地区的安全人道主义走廊,必须发展一种需要迅速部署的特殊类型的SoS。由于时间紧迫,通常只有领域专家负责这种开发。然而,许多这样的sos也必须考虑到安全方面。如何帮助领域专家将安全方面集成到SoS的快速开发中?在本文中,我们提出了一种方法和工具套件,可以帮助领域专家使用安全属性标记业务资产,然后使用安全属性识别漏洞并提出可能的安全控制机制。我们用一个案例来说明我们的建议。
{"title":"Development of Secure System of Systems Needing a Rapid Deployment","authors":"Nan Messe, Nicolas Belloir, Vanea Chiprianov, Imane Cherfa, Régis Fleurquin, Salah Sadou","doi":"10.1109/SYSOSE.2019.8753857","DOIUrl":"https://doi.org/10.1109/SYSOSE.2019.8753857","url":null,"abstract":"In certain cases, such as secure humanitarian corridors in a conflict zone, a special type of SoS, needing a rapid deployment, has to be developed. Because of the tense time constraint, usually only a domain expert is responsible with this development. However, many such SoSs also have to take into account the security aspect. How to help a domain expert integrate the security aspect into the rapid development of an SoS? In this proposal paper, we present an approach and a tool suite that help the domain expert tag business assets using security properties, which are then used to identify vulnerabilities and to propose possible security control mechanisms. We illustrate our proposal on a case study.","PeriodicalId":133413,"journal":{"name":"2019 14th Annual Conference System of Systems Engineering (SoSE)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133879770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ORBDeepOdometry - A Feature-Based Deep Learning Approach to Monocular Visual Odometry ORBDeepOdometry -一种基于特征的深度学习方法的单目视觉里程测量
Pub Date : 2019-05-01 DOI: 10.1109/SYSOSE.2019.8753848
Karthik Sivarama Krishnan, F. Sahin
Visual Odometry (VO) is an application of computer vision which helps in autonomous navigation of Self-Driving vehicles, Robots etc. The odometry pose of the vehicle can be estimated using the consecutive frames based on monocular or stereo camera setup mounted on the vehicle. The Simultaneous Localization and Mapping (SLAM) based approaches have shown phenomenal results in predicting the vehicle odometry. Deep Learning based approaches are emerging in the field of computer vision and are outperforming other classic algorithms. But, visual odometry is one of the field where deep learning approaches have not yet been exploited largely. This paper proposes the use of Deep Learning based pipeline approach to solve the problem of visual odometry. The paper boosts the performance of deep learning approach by extracting quite more features before training the network. This paper proposes the use of ORB based feature extractor along with Convolutional Neural Network based dimensionality reduction and stacking multiple deep LSTM's for modelling the sequential data. In this case, the KITTI vision Benchmark dataset is used to model the network. The accuracy of the network is examined by calculating the error between the predicted odometry output and the ground truth odometry output. The results are compared with different Convolutional Neural Network (CNN) architectures proposed for the same task. The average translation error from the proposed system is 11.99% and the average rotational error from the proposed system is 0.0462 degrees per meter.
视觉里程计(VO)是计算机视觉的一种应用,有助于自动驾驶汽车、机器人等的自主导航。基于安装在车辆上的单目或立体摄像机的连续帧,可以估计车辆的里程计姿态。基于同时定位和映射(SLAM)的方法在预测车辆里程数方面显示出显著的效果。基于深度学习的方法正在计算机视觉领域兴起,并且优于其他经典算法。但是,视觉里程计是深度学习方法尚未得到充分利用的领域之一。本文提出使用基于深度学习的管道方法来解决视觉里程计问题。本文通过在训练网络之前提取更多的特征来提高深度学习方法的性能。本文提出利用基于ORB的特征提取器与基于卷积神经网络的降维和叠加多个深度LSTM对序列数据建模。在这种情况下,使用KITTI视觉基准数据集对网络进行建模。通过计算预测里程计输出与地真里程计输出之间的误差来检验网络的准确性。结果与针对同一任务提出的不同卷积神经网络(CNN)架构进行了比较。该系统的平均平移误差为11.99%,平均旋转误差为0.0462度/米。
{"title":"ORBDeepOdometry - A Feature-Based Deep Learning Approach to Monocular Visual Odometry","authors":"Karthik Sivarama Krishnan, F. Sahin","doi":"10.1109/SYSOSE.2019.8753848","DOIUrl":"https://doi.org/10.1109/SYSOSE.2019.8753848","url":null,"abstract":"Visual Odometry (VO) is an application of computer vision which helps in autonomous navigation of Self-Driving vehicles, Robots etc. The odometry pose of the vehicle can be estimated using the consecutive frames based on monocular or stereo camera setup mounted on the vehicle. The Simultaneous Localization and Mapping (SLAM) based approaches have shown phenomenal results in predicting the vehicle odometry. Deep Learning based approaches are emerging in the field of computer vision and are outperforming other classic algorithms. But, visual odometry is one of the field where deep learning approaches have not yet been exploited largely. This paper proposes the use of Deep Learning based pipeline approach to solve the problem of visual odometry. The paper boosts the performance of deep learning approach by extracting quite more features before training the network. This paper proposes the use of ORB based feature extractor along with Convolutional Neural Network based dimensionality reduction and stacking multiple deep LSTM's for modelling the sequential data. In this case, the KITTI vision Benchmark dataset is used to model the network. The accuracy of the network is examined by calculating the error between the predicted odometry output and the ground truth odometry output. The results are compared with different Convolutional Neural Network (CNN) architectures proposed for the same task. The average translation error from the proposed system is 11.99% and the average rotational error from the proposed system is 0.0462 degrees per meter.","PeriodicalId":133413,"journal":{"name":"2019 14th Annual Conference System of Systems Engineering (SoSE)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130636354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Metamodeling NATO Operation Orders: a proof-of-concept to deal with digitalization of the battlefield 北约作战命令元建模:处理战场数字化的概念验证
Pub Date : 2019-05-01 DOI: 10.1109/SYSOSE.2019.8753885
Nicolas Belloir, J. Buisson, O. Bartheye
Digitalization of the whole society changes the way Systems-of-Systems have to be considered. Remaining independently operated and managed, SoS increase their collaboration skills using shared or cooperated information systems. People can be seen as particular digital sub-systems due to smart equipments they can use. Military operations, which are considered as typical SoS, are no exception to this fact. New operational doctrines have to be created to take advantage of those new capabilities. In this paper, we propose to develop methods and tools inspired by software engineering to create new automated capabilities in battlefield engineering. More precisely, we explain the direction which should be considered in the area of battlefield engineering in order to deal with those new capabilities. Inspired from Model-Based Engineering, we realized a proof-of-concept showing how to change textual operation orders with graphical ones. The latter can be exported in a common standardized format, that enables digital interpretation. We present the OPORD-ML language which is based on a metamodel inspired from a NATO operation order standard. It is supported by an automatically generated tool.
整个社会的数字化改变了系统的系统必须考虑的方式。SoS保持独立运作和管理,使用共享或合作的信息系统提高他们的协作技能。人可以被视为特定的数字子系统,因为他们可以使用智能设备。被认为是典型的紧急行动的军事行动也不例外。为了利用这些新能力,必须制定新的作战原则。在本文中,我们建议开发受软件工程启发的方法和工具,以在战场工程中创建新的自动化能力。更准确地说,我们解释了在战场工程领域应该考虑的方向,以应对这些新的能力。受基于模型的工程的启发,我们实现了一个概念验证,展示了如何用图形化的操作顺序来更改文本操作顺序。后者可以以通用的标准化格式导出,从而实现数字解释。我们提出了基于受北约作战命令标准启发的元模型的OPORD-ML语言。它由自动生成的工具支持。
{"title":"Metamodeling NATO Operation Orders: a proof-of-concept to deal with digitalization of the battlefield","authors":"Nicolas Belloir, J. Buisson, O. Bartheye","doi":"10.1109/SYSOSE.2019.8753885","DOIUrl":"https://doi.org/10.1109/SYSOSE.2019.8753885","url":null,"abstract":"Digitalization of the whole society changes the way Systems-of-Systems have to be considered. Remaining independently operated and managed, SoS increase their collaboration skills using shared or cooperated information systems. People can be seen as particular digital sub-systems due to smart equipments they can use. Military operations, which are considered as typical SoS, are no exception to this fact. New operational doctrines have to be created to take advantage of those new capabilities. In this paper, we propose to develop methods and tools inspired by software engineering to create new automated capabilities in battlefield engineering. More precisely, we explain the direction which should be considered in the area of battlefield engineering in order to deal with those new capabilities. Inspired from Model-Based Engineering, we realized a proof-of-concept showing how to change textual operation orders with graphical ones. The latter can be exported in a common standardized format, that enables digital interpretation. We present the OPORD-ML language which is based on a metamodel inspired from a NATO operation order standard. It is supported by an automatically generated tool.","PeriodicalId":133413,"journal":{"name":"2019 14th Annual Conference System of Systems Engineering (SoSE)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122135311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Error Rate Analysis of Physical Layer Security for Sub-6 GHz 5G Network Planning Sub-6 GHz 5G网络规划物理层安全错误率分析
Pub Date : 2019-05-01 DOI: 10.1109/SYSOSE.2019.8753853
Patrick Ormond, Anil Kumar Yerrapragada, B. Kelley
1, This paper investigates the application of Key-based Physical Layer Security to future 5G and IoT network dimensioning, not previously considered in other works. Results indicate a Key bit Error Rate of 1% at a cell separation of 500m with a reuse of 7. A derivation for a closed form expression of the Key bit Error Rate as a function of radio network parameters is presented for a specific Precoder Matrix Index (PMI) based Physical Layer Security scheme known as MOPRO. The equation, which accounts for Rayleigh fading environments, is verified against simulated data, and shows a gain of 6dB for 1-bit codebooks over 2-bit codebooks. Also shown is a closed form statistical expression for the probability density function of the Key bit Error Rate. The expression for direct computation of Key bit Error Rate statistics points the way forward toward future physical layer security based planning in heterogeneous networks.
1、本文研究了基于密钥的物理层安全在未来5G和物联网网络维度上的应用,这是其他作品之前没有考虑到的。结果表明,在单元间隔为500米、重复使用次数为7的情况下,密钥误码率为1%。针对基于预编码器矩阵索引(PMI)的物理层安全方案MOPRO,给出了密钥误码率作为无线网络参数函数的封闭表达式的推导。该方程考虑了瑞利衰落环境,并通过模拟数据进行了验证,结果显示1位码本比2位码本的增益为6dB。还给出了密钥误码率的概率密度函数的封闭统计表达式。直接计算密钥误码率统计的表达式为未来异构网络中基于物理层安全的规划指明了方向。
{"title":"Error Rate Analysis of Physical Layer Security for Sub-6 GHz 5G Network Planning","authors":"Patrick Ormond, Anil Kumar Yerrapragada, B. Kelley","doi":"10.1109/SYSOSE.2019.8753853","DOIUrl":"https://doi.org/10.1109/SYSOSE.2019.8753853","url":null,"abstract":"1, This paper investigates the application of Key-based Physical Layer Security to future 5G and IoT network dimensioning, not previously considered in other works. Results indicate a Key bit Error Rate of 1% at a cell separation of 500m with a reuse of 7. A derivation for a closed form expression of the Key bit Error Rate as a function of radio network parameters is presented for a specific Precoder Matrix Index (PMI) based Physical Layer Security scheme known as MOPRO. The equation, which accounts for Rayleigh fading environments, is verified against simulated data, and shows a gain of 6dB for 1-bit codebooks over 2-bit codebooks. Also shown is a closed form statistical expression for the probability density function of the Key bit Error Rate. The expression for direct computation of Key bit Error Rate statistics points the way forward toward future physical layer security based planning in heterogeneous networks.","PeriodicalId":133413,"journal":{"name":"2019 14th Annual Conference System of Systems Engineering (SoSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129121705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cybersecurity as a Centralized Directed System of Systems Using SoS Explorer as a Tool 使用SoS Explorer作为工具的集中定向系统的网络安全
Pub Date : 2019-05-01 DOI: 10.1109/SYSOSE.2019.8753872
Lirim Ashiku, C. Dagli
The vast advancements in computing technology and the profound reliance on inter-connected systems has led to a significant growth of cyber-attack incidents. The incidents can propagate from within or outside of organizations, thus ensuing detrimental consequences such as business conducting disruptions, market brand degradation, settlement charges, regulatory compliance issues, etc. The ability to withstand such interference is essential to maintaining a vital and competitively advantageous organization. This paper analyzes coexisting vulnerabilities and the utilization of innovative and effective mechanisms to identify and block undesirable emergence through a centrally controlled and directed SoS approach. The paper will use SoS Explorer as a tool to architect, model and optimize the many objective cybersecurity complex system dealing with securing from exploiting threats through threat-inhibiting systems. The tool provides an intuitive and interactive visualization enabling the user to produce “what-if” analysis on various scenarios, especially for time evolving dynamics of cybersecurity, through generated optimization functional architecture solutions. The paper will further discuss vulnerability exploitation and cybersecurity implications on banking domain describing speculative observations followed by future research directions.
计算技术的巨大进步和对互联系统的深刻依赖导致了网络攻击事件的显著增长。这些事件可以从组织内部或外部传播,从而产生有害的后果,如业务中断、市场品牌退化、结算费用、法规遵从性问题等。承受这种干扰的能力对于维持一个充满活力和竞争优势的组织是必不可少的。本文分析了共存的脆弱性,并利用创新和有效的机制,通过集中控制和指导的SoS方法来识别和阻止不良的出现。本文将使用SoS Explorer作为构建、建模和优化许多客观网络安全复杂系统的工具,通过威胁抑制系统来防止利用威胁。该工具通过生成优化功能架构解决方案,提供直观和交互式的可视化功能,使用户能够对各种场景进行“假设”分析,特别是针对网络安全的时间演变动态。本文将进一步讨论银行领域的漏洞利用和网络安全影响,描述投机性观察结果,以及未来的研究方向。
{"title":"Cybersecurity as a Centralized Directed System of Systems Using SoS Explorer as a Tool","authors":"Lirim Ashiku, C. Dagli","doi":"10.1109/SYSOSE.2019.8753872","DOIUrl":"https://doi.org/10.1109/SYSOSE.2019.8753872","url":null,"abstract":"The vast advancements in computing technology and the profound reliance on inter-connected systems has led to a significant growth of cyber-attack incidents. The incidents can propagate from within or outside of organizations, thus ensuing detrimental consequences such as business conducting disruptions, market brand degradation, settlement charges, regulatory compliance issues, etc. The ability to withstand such interference is essential to maintaining a vital and competitively advantageous organization. This paper analyzes coexisting vulnerabilities and the utilization of innovative and effective mechanisms to identify and block undesirable emergence through a centrally controlled and directed SoS approach. The paper will use SoS Explorer as a tool to architect, model and optimize the many objective cybersecurity complex system dealing with securing from exploiting threats through threat-inhibiting systems. The tool provides an intuitive and interactive visualization enabling the user to produce “what-if” analysis on various scenarios, especially for time evolving dynamics of cybersecurity, through generated optimization functional architecture solutions. The paper will further discuss vulnerability exploitation and cybersecurity implications on banking domain describing speculative observations followed by future research directions.","PeriodicalId":133413,"journal":{"name":"2019 14th Annual Conference System of Systems Engineering (SoSE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125805224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Generated Voltage Control of EV PMSM for Maximizing Energy Recovery Rate using Switched Resonant L-C 基于开关谐振L-C的EV永磁同步电机电压控制以实现能量回收率最大化
Pub Date : 2019-05-01 DOI: 10.1109/SYSOSE.2019.8753832
Keonho Park, Sungchul Jung, Seungtaik Kim, Jongsun Ko
In this paper, we study the method of increasing the energy recovery rate by controlling the voltage which generated by the electric vehicle at the regenerative braking. The method includes an L-C resonance circuit and voltage control to make the battery chargeable. Thus, it is possible to increase the energy recovery and eventually increases the travel distance of the EV. The voltage of the resonant circuit is analyzed using a proposed algorithm with PI and reverse-PI duty controller. Unlike the previous studies have verified the voltage control algorithm only through the simulation, the control algorithm was verified through the experiment using M-G set.
本文研究了通过控制电动汽车再生制动时产生的电压来提高能量回收率的方法。该方法包括L-C谐振电路和使电池可充电的电压控制。这样,就有可能增加能量回收,最终增加电动汽车的行驶距离。采用PI和逆PI占空控制器对谐振电路的电压进行了分析。与以往的研究仅通过仿真验证电压控制算法不同,本文通过M-G集的实验验证了控制算法。
{"title":"Generated Voltage Control of EV PMSM for Maximizing Energy Recovery Rate using Switched Resonant L-C","authors":"Keonho Park, Sungchul Jung, Seungtaik Kim, Jongsun Ko","doi":"10.1109/SYSOSE.2019.8753832","DOIUrl":"https://doi.org/10.1109/SYSOSE.2019.8753832","url":null,"abstract":"In this paper, we study the method of increasing the energy recovery rate by controlling the voltage which generated by the electric vehicle at the regenerative braking. The method includes an L-C resonance circuit and voltage control to make the battery chargeable. Thus, it is possible to increase the energy recovery and eventually increases the travel distance of the EV. The voltage of the resonant circuit is analyzed using a proposed algorithm with PI and reverse-PI duty controller. Unlike the previous studies have verified the voltage control algorithm only through the simulation, the control algorithm was verified through the experiment using M-G set.","PeriodicalId":133413,"journal":{"name":"2019 14th Annual Conference System of Systems Engineering (SoSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126005766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the Application of MIMO Space-Time Coding to Physical Layer Security in sub-6 GHz 5G MIMO空时编码在sub-6 GHz 5G物理层安全中的应用
Pub Date : 2019-05-01 DOI: 10.1109/SYSOSE.2019.8753826
Patrick Ormond, Anil Kumar Yerrapragada, B. Kelley
This paper investigates the application and performance improvement of MIMO Space Time Block Coding (STBC) for Physical Layer Security. The paper analyzes a Precoder Matrix Index (PMI) based scheme called Private Random Precoding (PRP). Key-based Physical Layer Security protects against eavesdroppers in wireless communication links, invaluable in emerging 5G and IoT networks. This paper derives improvements in PRP based on STBC. Also presented are simulation results which show as much as 7 dB improvement in Key bit Error Rate performance vs SINR of the enhanced PRP-STBC scheme for a 1-bit codebook at the cost of decreased transmission rate. In addition, the paper derives a closed form expression for the Key bit Error Rate for both the PRP and enhanced PRP-STBC schemes as a function of dense 5G cellular geometries. Furthermore, we present the effective information rate of the PRP key based communication framework in low SNR scenarios.
本文研究了MIMO空时块编码(STBC)在物理层安全中的应用及其性能改进。本文分析了一种基于预编码器矩阵索引(PMI)的私有随机预编码(PRP)方案。基于密钥的物理层安全可以防止无线通信链路中的窃听者,这在新兴的5G和物联网网络中非常宝贵。本文提出了基于STBC的PRP改进方法。仿真结果表明,对于1位码本,增强PRP-STBC方案的密钥误码率性能比SINR提高了7 dB,但代价是传输速率降低。此外,本文导出了PRP和增强型PRP- stbc方案的密钥误码率作为密集5G蜂窝几何形状函数的封闭形式表达式。此外,我们还给出了低信噪比下基于PRP密钥的通信框架的有效信息率。
{"title":"On the Application of MIMO Space-Time Coding to Physical Layer Security in sub-6 GHz 5G","authors":"Patrick Ormond, Anil Kumar Yerrapragada, B. Kelley","doi":"10.1109/SYSOSE.2019.8753826","DOIUrl":"https://doi.org/10.1109/SYSOSE.2019.8753826","url":null,"abstract":"This paper investigates the application and performance improvement of MIMO Space Time Block Coding (STBC) for Physical Layer Security. The paper analyzes a Precoder Matrix Index (PMI) based scheme called Private Random Precoding (PRP). Key-based Physical Layer Security protects against eavesdroppers in wireless communication links, invaluable in emerging 5G and IoT networks. This paper derives improvements in PRP based on STBC. Also presented are simulation results which show as much as 7 dB improvement in Key bit Error Rate performance vs SINR of the enhanced PRP-STBC scheme for a 1-bit codebook at the cost of decreased transmission rate. In addition, the paper derives a closed form expression for the Key bit Error Rate for both the PRP and enhanced PRP-STBC schemes as a function of dense 5G cellular geometries. Furthermore, we present the effective information rate of the PRP key based communication framework in low SNR scenarios.","PeriodicalId":133413,"journal":{"name":"2019 14th Annual Conference System of Systems Engineering (SoSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121498883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 14th Annual Conference System of Systems Engineering (SoSE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1