首页 > 最新文献

2019 4th International Conference on System Reliability and Safety (ICSRS)最新文献

英文 中文
Tool-Supported Dependability Analysis of Semi-Markov Processes with Application to Autonomous Driving 工具支持的半马尔可夫过程可靠性分析及其在自动驾驶中的应用
Pub Date : 2019-11-01 DOI: 10.1109/ICSRS48664.2019.8987701
Stefan Kaalen, M. Nyberg, Carl Bondesson
For all safety-critical systems, modelling approaches allowing accurate dependability analysis is of utmost importance. Moreover, in order to accurately and realistically model the real-world behaviour of safety-critical systems, Semi-Markov Processes (SMPs) are highly useful. SMPs generalize Markov processes to give more freedom in how a system can be modelled. While SMPs are highly useful, previous literature fail to provide an intuitive modelling approach for them. As the first contribution, an intuitive novel modelling approach based on transition timers is presented. Once the systems of interest has been modelled as a SMP the problem still remains to analyze the model. As the second contribution, the Matlab app “SMP-tool” is presented. SMP-tool can analyze SMPs in several manners, perhaps most importantly by performing a dependability analysis through calculating the reliability and availability. Both contributions are applied to Highway Pilot, a typical system for autonomous driving.
对于所有的安全关键系统,建模方法允许准确的可靠性分析是至关重要的。此外,为了准确和真实地模拟安全关键系统的真实行为,半马尔可夫过程(SMPs)非常有用。smp对马尔可夫过程进行了推广,在系统建模方面给予了更大的自由度。虽然smp非常有用,但以前的文献未能为它们提供直观的建模方法。作为第一个贡献,提出了一种基于过渡计时器的直观的新型建模方法。一旦感兴趣的系统被建模为SMP,问题仍然是分析模型。第二个贡献是Matlab应用程序“SMP-tool”。SMP-tool可以通过几种方式分析smp,最重要的是通过计算可靠性和可用性来执行可靠性分析。这两种贡献都应用于典型的自动驾驶系统Highway Pilot。
{"title":"Tool-Supported Dependability Analysis of Semi-Markov Processes with Application to Autonomous Driving","authors":"Stefan Kaalen, M. Nyberg, Carl Bondesson","doi":"10.1109/ICSRS48664.2019.8987701","DOIUrl":"https://doi.org/10.1109/ICSRS48664.2019.8987701","url":null,"abstract":"For all safety-critical systems, modelling approaches allowing accurate dependability analysis is of utmost importance. Moreover, in order to accurately and realistically model the real-world behaviour of safety-critical systems, Semi-Markov Processes (SMPs) are highly useful. SMPs generalize Markov processes to give more freedom in how a system can be modelled. While SMPs are highly useful, previous literature fail to provide an intuitive modelling approach for them. As the first contribution, an intuitive novel modelling approach based on transition timers is presented. Once the systems of interest has been modelled as a SMP the problem still remains to analyze the model. As the second contribution, the Matlab app “SMP-tool” is presented. SMP-tool can analyze SMPs in several manners, perhaps most importantly by performing a dependability analysis through calculating the reliability and availability. Both contributions are applied to Highway Pilot, a typical system for autonomous driving.","PeriodicalId":430931,"journal":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120856031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Lightweight Ciphers in Automotive Networks: A Preliminary Approach 汽车网络中的轻量级密码:初步方法
Pub Date : 2019-11-01 DOI: 10.1109/ICSRS48664.2019.8987693
Arcangelo Castiglione, F. Palmieri, F. Colace, Marco Lombardi, D. Santaniello
Nowadays, the growing need to connect modern vehicles through computer networks leads to increased risks of cyberattacks. The internal network, which governs the several electronic components of a vehicle, is becoming increasingly overexposed to external attacks. The Controller Area Network (CAN) protocol, used to interconnect those devices is the key point of the internal network of modern vehicles. Therefore, securing such protocol is crucial to ensure a safe driving experience. However, the CAN is a standard that has undergone little changes since it was introduced in 1983. More precisely, in an attempt to reduce latency, the transfer of information remains unencrypted, which today represents a weak point in the protocol. Hence, the need to protect communications, without introducing low-level alterations, while preserving the performance characteristics of the protocol. In this work, we investigate the possibility of using symmetric encryption algorithms for securing messages exchanged by CAN protocol. In particular, we evaluate the using of lightweight ciphers to secure CAN-level communication. Such ciphers represent a reliable solution on hardware-constrained devices, such as microcontrollers.
如今,通过计算机网络连接现代车辆的需求日益增长,导致网络攻击的风险增加。管理车辆多个电子元件的内部网络正日益暴露于外部攻击之下。控制器区域网络(CAN)协议是现代汽车内部网络的关键,用于互联这些设备。因此,确保这样的协议对于确保安全的驾驶体验至关重要。然而,自1983年推出以来,CAN是一个几乎没有变化的标准。更准确地说,为了减少延迟,信息的传输保持未加密,这在今天代表了协议的一个弱点。因此,需要在不引入低级更改的情况下保护通信,同时保留协议的性能特征。在这项工作中,我们研究了使用对称加密算法来保护通过CAN协议交换的消息的可能性。特别是,我们评估使用轻量级密码来保护can级通信。这种密码代表了硬件受限设备(如微控制器)上的可靠解决方案。
{"title":"Lightweight Ciphers in Automotive Networks: A Preliminary Approach","authors":"Arcangelo Castiglione, F. Palmieri, F. Colace, Marco Lombardi, D. Santaniello","doi":"10.1109/ICSRS48664.2019.8987693","DOIUrl":"https://doi.org/10.1109/ICSRS48664.2019.8987693","url":null,"abstract":"Nowadays, the growing need to connect modern vehicles through computer networks leads to increased risks of cyberattacks. The internal network, which governs the several electronic components of a vehicle, is becoming increasingly overexposed to external attacks. The Controller Area Network (CAN) protocol, used to interconnect those devices is the key point of the internal network of modern vehicles. Therefore, securing such protocol is crucial to ensure a safe driving experience. However, the CAN is a standard that has undergone little changes since it was introduced in 1983. More precisely, in an attempt to reduce latency, the transfer of information remains unencrypted, which today represents a weak point in the protocol. Hence, the need to protect communications, without introducing low-level alterations, while preserving the performance characteristics of the protocol. In this work, we investigate the possibility of using symmetric encryption algorithms for securing messages exchanged by CAN protocol. In particular, we evaluate the using of lightweight ciphers to secure CAN-level communication. Such ciphers represent a reliable solution on hardware-constrained devices, such as microcontrollers.","PeriodicalId":430931,"journal":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133038699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Condition Based Maintenance for Industrial Labeling Machine 工业贴标机的状态维护
Pub Date : 2019-11-01 DOI: 10.1109/ICSRS48664.2019.8987687
A. Acernese, C. D. Vecchio, M. Tipaldi, L. Glielmo
This paper reports the outcome of an industrial research on data-driven Condition Based Maintenance (CBM) for the film cutting group of labeling production lines. Objective of the study has been the prediction of erroneous labels cut. The large number of variables involved in thin labels cut (thickness comprised within 30μm and 38 μm) and the high throughput make the prediction of non conforming labels a difficult goal. To this aim, we developed a complete CBM strategy for film cutting groups. To identify failure signature, an exhaustive assessment on indices suggested in literature was done, but none of them were suitable to satisfy problem constraints. Thus we customized the most promising one (namely the root mean square value of the vibration measures) to our setting obtaining notable results. Given the lack of contributions in CBM in thin film cutting, we believe this paper might be of interest for academic researchers or people from industry dealing with similar problems.
本文报道了标签生产线切膜组数据驱动状态维护(CBM)的工业研究结果。本研究的目的是预测错误的标签切割。薄标签切割(厚度在30μm到38 μm之间)涉及的变量多,且高通量使得不合格标签的预测成为一个困难的目标。为此,我们为胶片切割组制定了完整的CBM策略。为了识别故障特征,对文献中提出的指标进行了详尽的评估,但没有一个指标适合满足问题约束。因此,我们根据我们的设置定制了最有希望的一个(即振动措施的均方根值),获得了显著的结果。鉴于CBM在薄膜切割中的贡献不足,我们相信这篇论文可能会引起学术研究人员或处理类似问题的工业人员的兴趣。
{"title":"Condition Based Maintenance for Industrial Labeling Machine","authors":"A. Acernese, C. D. Vecchio, M. Tipaldi, L. Glielmo","doi":"10.1109/ICSRS48664.2019.8987687","DOIUrl":"https://doi.org/10.1109/ICSRS48664.2019.8987687","url":null,"abstract":"This paper reports the outcome of an industrial research on data-driven Condition Based Maintenance (CBM) for the film cutting group of labeling production lines. Objective of the study has been the prediction of erroneous labels cut. The large number of variables involved in thin labels cut (thickness comprised within 30μm and 38 μm) and the high throughput make the prediction of non conforming labels a difficult goal. To this aim, we developed a complete CBM strategy for film cutting groups. To identify failure signature, an exhaustive assessment on indices suggested in literature was done, but none of them were suitable to satisfy problem constraints. Thus we customized the most promising one (namely the root mean square value of the vibration measures) to our setting obtaining notable results. Given the lack of contributions in CBM in thin film cutting, we believe this paper might be of interest for academic researchers or people from industry dealing with similar problems.","PeriodicalId":430931,"journal":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114529306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from the Chairman 主席致辞
Pub Date : 2019-11-01 DOI: 10.1109/icsrs48664.2019.8987720
Denis O'Brien
{"title":"Message from the Chairman","authors":"Denis O'Brien","doi":"10.1109/icsrs48664.2019.8987720","DOIUrl":"https://doi.org/10.1109/icsrs48664.2019.8987720","url":null,"abstract":"","PeriodicalId":430931,"journal":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115049029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implicit 4DVar Particle Filter State Estimation of Dynamic Power Systems: Preliminary Results 动态电力系统隐式4DVar粒子滤波状态估计:初步结果
Pub Date : 2019-11-01 DOI: 10.1109/ICSRS48664.2019.8987651
B. Uzunoğlu
Dynamic state estimation for near real-time applications in power systems is becomingly increasingly important with the integration of variable wind and solar power generation that can be employed even at disaster conditions. New advanced state estimation tools that will replace the old generation must be developed in a general mathematical framework to assess complexity tradeoffs and addressing nonlinearity and non-normal behaviour while exploiting legacy software. Such a framework must also satisfy the power industry requirement for cautious evolutionary change rather than a revolutionary approach. Implicit Particle Filtering (IPF) is a sequential Monte Carlo method for data assimilation that uses an implicit step to select particles from the high-probability region of the implicit distribution. This work develops the formulation of IPF as for the estimation of the states of a power system and presents the first IPF application study on a power system state estimation. The approach is analyzed using a simulation of a three-node benchmark power system. For implicit function four dimensional variational data assimilation is used. The proposed algorithm is also non-intrusive for communications since the algorithm developed will have the flexibility to address multilevel heterogeneous wireless networks in the integration of different data packets.
随着可变风能和太阳能发电的集成,动态状态估计在电力系统中的近实时应用变得越来越重要,即使在灾害条件下也可以使用。新的高级状态估计工具将取代旧的一代,必须在一个通用的数学框架中开发,以评估复杂性权衡,并在利用遗留软件的同时解决非线性和非正常行为。这样的框架还必须满足电力行业对谨慎渐进变革的要求,而不是一种革命性的方法。隐式粒子滤波(IPF)是一种用于数据同化的序列蒙特卡罗方法,它使用隐式步骤从隐式分布的高概率区域中选择粒子。本文发展了IPF用于电力系统状态估计的公式,并首次提出了IPF在电力系统状态估计中的应用研究。通过对三节点基准电力系统的仿真,对该方法进行了分析。对于隐函数,采用四维变分数据同化。所提出的算法对于通信也是非侵入性的,因为所开发的算法将具有在不同数据包集成中处理多级异构无线网络的灵活性。
{"title":"Implicit 4DVar Particle Filter State Estimation of Dynamic Power Systems: Preliminary Results","authors":"B. Uzunoğlu","doi":"10.1109/ICSRS48664.2019.8987651","DOIUrl":"https://doi.org/10.1109/ICSRS48664.2019.8987651","url":null,"abstract":"Dynamic state estimation for near real-time applications in power systems is becomingly increasingly important with the integration of variable wind and solar power generation that can be employed even at disaster conditions. New advanced state estimation tools that will replace the old generation must be developed in a general mathematical framework to assess complexity tradeoffs and addressing nonlinearity and non-normal behaviour while exploiting legacy software. Such a framework must also satisfy the power industry requirement for cautious evolutionary change rather than a revolutionary approach. Implicit Particle Filtering (IPF) is a sequential Monte Carlo method for data assimilation that uses an implicit step to select particles from the high-probability region of the implicit distribution. This work develops the formulation of IPF as for the estimation of the states of a power system and presents the first IPF application study on a power system state estimation. The approach is analyzed using a simulation of a three-node benchmark power system. For implicit function four dimensional variational data assimilation is used. The proposed algorithm is also non-intrusive for communications since the algorithm developed will have the flexibility to address multilevel heterogeneous wireless networks in the integration of different data packets.","PeriodicalId":430931,"journal":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131964415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilience Assessment of China's Natural Gas Supply System Based on Ecological Network Analysis 基于生态网络分析的中国天然气供应系统弹性评价
Pub Date : 2019-11-01 DOI: 10.1109/ICSRS48664.2019.8987713
Xueyi Li, Jinjun Zhang, Huai Su, E. Zio
Natural gas is of vital importance to China's economy and social stability. Faced with the current severe situation of tight balance of natural gas supply in China, given the high complexity and uncertainty of the natural gas supply system, the stable supply of natural gas faces enormous challenges. How to improve its supply resilience is the key to be solved urgently. In this paper, the connotation of natural gas supply resilience is defined and a systematic resilience assessment method is proposed based on ecological network analysis. All results are calculated by publicly available data. From the static perspective, it is found that the Chinese natural gas supply resilience increases during 2016–2020. From the dynamic perspective, the characteristics of the restoration of Chinese natural gas supply system is revealed. Based on the results, suggestions are proposed to improve China's natural gas supply resilience. The ENA model developed in this paper is a new perspective for natural gas supply resilience assessment, which can be used as guidance for policy making.
天然气对中国的经济和社会稳定至关重要。面对当前中国天然气供应紧张的严峻形势,鉴于天然气供应系统的高度复杂性和不确定性,天然气的稳定供应面临巨大挑战。如何提高其供给弹性是亟待解决的关键问题。界定了天然气供应弹性的内涵,提出了基于生态网络分析的系统弹性评价方法。所有结果均由公开数据计算得出。从静态角度分析,发现2016-2020年中国天然气供应弹性增强。从动态的角度,揭示了我国天然气供应系统恢复的特点。在此基础上,提出了提高中国天然气供应弹性的建议。本文建立的ENA模型为天然气供应弹性评估提供了一个新的视角,可为政策制定提供指导。
{"title":"Resilience Assessment of China's Natural Gas Supply System Based on Ecological Network Analysis","authors":"Xueyi Li, Jinjun Zhang, Huai Su, E. Zio","doi":"10.1109/ICSRS48664.2019.8987713","DOIUrl":"https://doi.org/10.1109/ICSRS48664.2019.8987713","url":null,"abstract":"Natural gas is of vital importance to China's economy and social stability. Faced with the current severe situation of tight balance of natural gas supply in China, given the high complexity and uncertainty of the natural gas supply system, the stable supply of natural gas faces enormous challenges. How to improve its supply resilience is the key to be solved urgently. In this paper, the connotation of natural gas supply resilience is defined and a systematic resilience assessment method is proposed based on ecological network analysis. All results are calculated by publicly available data. From the static perspective, it is found that the Chinese natural gas supply resilience increases during 2016–2020. From the dynamic perspective, the characteristics of the restoration of Chinese natural gas supply system is revealed. Based on the results, suggestions are proposed to improve China's natural gas supply resilience. The ENA model developed in this paper is a new perspective for natural gas supply resilience assessment, which can be used as guidance for policy making.","PeriodicalId":430931,"journal":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116771822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Embedded Intrusion Detection System for Detecting Attacks over CAN-BUS 基于can总线的嵌入式入侵检测系统
Pub Date : 2019-11-01 DOI: 10.1109/ICSRS48664.2019.8987605
M. Casillo, Simone Coppola, M. D. Santo, F. Pascale, Emanuele Santonicola
The increasing number of connected cars introduced new cyber-attacks strategies that give life to potentially devastating scenarios on everyday life. In fat, the connected cars show many vulnerabilities and are not conform to the policies defined in the AIC Model (availability, integrity and confidentiality). On the other hand, the advantages related to cars connected are very useful for implementing new innovative scenarios providing, for example, context and situation awareness in some operative scenarios. The main problem relies in the introduction of effective techniques that works in well-known framework (PC, Smartphone, …) in a real challenging environment as the automotive. In this scenario, the main parameter to consider is that of the quick ability to identify and react a possible attack. So in this paper, an embedded Intrusion Detection System for Automotive is introduced. It works adopting a Bayesian Network approach for the quick identification of malicious messages on the controller Area Network (CAN-Bus). The first experimental results, obtained in a real scenario, seems to be real interesting.
越来越多的联网汽车引入了新的网络攻击策略,给日常生活带来了潜在的破坏性场景。总之,联网汽车显示出许多漏洞,并且不符合AIC模型中定义的策略(可用性,完整性和机密性)。另一方面,与汽车联网相关的优势对于实施新的创新场景非常有用,例如,在某些操作场景中提供上下文和情境感知。主要问题在于,在汽车等具有挑战性的环境中,如何引入在知名框架(PC、智能手机等)中工作的有效技术。在这种情况下,要考虑的主要参数是快速识别和应对可能的攻击的能力。因此,本文介绍了一种嵌入式汽车入侵检测系统。该算法采用贝叶斯网络方法快速识别控制器局域网(can总线)上的恶意消息。在真实场景中获得的第一个实验结果似乎非常有趣。
{"title":"Embedded Intrusion Detection System for Detecting Attacks over CAN-BUS","authors":"M. Casillo, Simone Coppola, M. D. Santo, F. Pascale, Emanuele Santonicola","doi":"10.1109/ICSRS48664.2019.8987605","DOIUrl":"https://doi.org/10.1109/ICSRS48664.2019.8987605","url":null,"abstract":"The increasing number of connected cars introduced new cyber-attacks strategies that give life to potentially devastating scenarios on everyday life. In fat, the connected cars show many vulnerabilities and are not conform to the policies defined in the AIC Model (availability, integrity and confidentiality). On the other hand, the advantages related to cars connected are very useful for implementing new innovative scenarios providing, for example, context and situation awareness in some operative scenarios. The main problem relies in the introduction of effective techniques that works in well-known framework (PC, Smartphone, …) in a real challenging environment as the automotive. In this scenario, the main parameter to consider is that of the quick ability to identify and react a possible attack. So in this paper, an embedded Intrusion Detection System for Automotive is introduced. It works adopting a Bayesian Network approach for the quick identification of malicious messages on the controller Area Network (CAN-Bus). The first experimental results, obtained in a real scenario, seems to be real interesting.","PeriodicalId":430931,"journal":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126215795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Selective Duplication and Selective Comparison for Data Flow Error Detection 数据流错误检测的选择性复制和选择性比较
Pub Date : 2019-11-01 DOI: 10.1109/ICSRS48664.2019.8987731
Venu Babu Thati, J. Vankeirsbilck, J. Boydens, D. Pissoort
Embedded systems' hardware can be impacted by soft errors, which can cause data flow errors in the systems' software. In this paper, we present a novel software-based approach to counter data flow errors, called Selective Duplication and Selective Comparison (SDSC). First, we validated our SDSC technique by implementing it for six case studies and submitting it to a fault injection campaign. Next, we measured its execution time overhead. To put the measured results into perspective, we compared them to those of two established techniques, called Critical Block Duplication (CBD) and near Zero silent Data Corruption (nZDC). The results show that our SDSC technique has a higher error detection ratio with a lower silent data corruption compared to both the CBD and nZDC techniques. This does, however, come with a slightly higher execution time overhead.
嵌入式系统的硬件可能会受到软错误的影响,从而导致系统软件的数据流错误。在本文中,我们提出了一种新的基于软件的方法来对抗数据流错误,称为选择性复制和选择性比较(SDSC)。首先,我们通过在六个案例研究中实现SDSC技术并将其提交到故障注入活动中来验证我们的SDSC技术。接下来,我们测量了它的执行时间开销。为了正确看待测量结果,我们将它们与两种已建立的技术进行了比较,这两种技术称为关键块复制(CBD)和接近零无声数据损坏(nZDC)。结果表明,与CBD和nZDC技术相比,我们的SDSC技术具有更高的错误检测率和更低的无声数据损坏。然而,这确实带来了稍高的执行时间开销。
{"title":"Selective Duplication and Selective Comparison for Data Flow Error Detection","authors":"Venu Babu Thati, J. Vankeirsbilck, J. Boydens, D. Pissoort","doi":"10.1109/ICSRS48664.2019.8987731","DOIUrl":"https://doi.org/10.1109/ICSRS48664.2019.8987731","url":null,"abstract":"Embedded systems' hardware can be impacted by soft errors, which can cause data flow errors in the systems' software. In this paper, we present a novel software-based approach to counter data flow errors, called Selective Duplication and Selective Comparison (SDSC). First, we validated our SDSC technique by implementing it for six case studies and submitting it to a fault injection campaign. Next, we measured its execution time overhead. To put the measured results into perspective, we compared them to those of two established techniques, called Critical Block Duplication (CBD) and near Zero silent Data Corruption (nZDC). The results show that our SDSC technique has a higher error detection ratio with a lower silent data corruption compared to both the CBD and nZDC techniques. This does, however, come with a slightly higher execution time overhead.","PeriodicalId":430931,"journal":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132641986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
About Spare Parts Cannibalization for Rotable Items a Preliminary Approach for Inventory Control 关于可循环项目的备件拆分——库存控制的初步方法
Pub Date : 2019-11-01 DOI: 10.1109/ICSRS48664.2019.8987640
G. D. Gravio, L. Venanzi, F. Costantino, R. Patriarca, M. Tronci
Inventory management is a core business activity especially in case of high-value spare-parts. An optimal inventory management strategy can generate relevant savings, while ensuring high service levels. This research aims to develop a systemic approach to combine reliability and maintainability parameters and define optimal stock levels for rotable items. The research starts from the METRIC (Multi-Echelon Technique for Recoverable Item Control), and enhances its formulation through a cannibalization modelling perspective. Cannibalization is a policy used as a complementary approach to traditional spare parts management usually adopted in case of inventory shortage. This research aims at modelling cannibalization in a systemic model in order to estimate its benefits in terms of stock reduction. This paper presents a METRIC-like analytical formulation and tests it in a real case scenario. The preliminary case study refers to an inventory management problem for a civil aviation company and confirms the benefits of the proposed cannibalization approach.
库存管理是一项核心业务活动,特别是在高价值备件的情况下。一个最佳的库存管理策略可以产生相关的节省,同时确保高服务水平。本研究旨在建立一个系统的方法,结合可靠性和可维护性参数,并确定最佳库存水平的旋转项目。本研究从可回收物品控制的多梯次技术(multi - echelical Technique for Recoverable Item Control)出发,通过同类相食的建模视角对其进行了改进。同类相食是在库存短缺的情况下,作为传统备件管理的一种补充策略。本研究的目的是在一个系统模型中建立同类相食的模型,以估计其在种群减少方面的效益。本文提出了一个类似度量的解析公式,并在实际情况下进行了测试。初步的案例研究涉及民用航空公司的库存管理问题,并证实了拟议的同类相食方法的好处。
{"title":"About Spare Parts Cannibalization for Rotable Items a Preliminary Approach for Inventory Control","authors":"G. D. Gravio, L. Venanzi, F. Costantino, R. Patriarca, M. Tronci","doi":"10.1109/ICSRS48664.2019.8987640","DOIUrl":"https://doi.org/10.1109/ICSRS48664.2019.8987640","url":null,"abstract":"Inventory management is a core business activity especially in case of high-value spare-parts. An optimal inventory management strategy can generate relevant savings, while ensuring high service levels. This research aims to develop a systemic approach to combine reliability and maintainability parameters and define optimal stock levels for rotable items. The research starts from the METRIC (Multi-Echelon Technique for Recoverable Item Control), and enhances its formulation through a cannibalization modelling perspective. Cannibalization is a policy used as a complementary approach to traditional spare parts management usually adopted in case of inventory shortage. This research aims at modelling cannibalization in a systemic model in order to estimate its benefits in terms of stock reduction. This paper presents a METRIC-like analytical formulation and tests it in a real case scenario. The preliminary case study refers to an inventory management problem for a civil aviation company and confirms the benefits of the proposed cannibalization approach.","PeriodicalId":430931,"journal":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128747739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic Mapping for Model Transformation Between AADL2 and HiP-HOPS AADL2和hip - hop之间模型转换的语义映射
Pub Date : 2019-11-01 DOI: 10.1109/ICSRS48664.2019.8987619
Zhibao Mian, Y. Gao, Xiaodong Shi, Cairong Tang
Currently, AADL has gradually become as one of the standards for the architecture design of complex embedded system. It is widely used in aerospace, automotive electronics and other fields for the design and analysis of high dependability-critical systems. Although the Error Model annex (EMA) of AADL can well support AADL error modeling, there is still a lack of technical method for multiobjective (based on dependability and cost) architecture optimisation analysis for dependable system. In order to achieve the optimisation analysis of AADL model, an effective method is to transform the AADL model into other equivalent models. This paper introduces the preliminary work of transforming AADL2 dependability model into a mature optimisation analysis tool model –– HiP-HOPS model, and analyses the semantic mapping relationship between the two different models. Model transformation can not only integrate the dependability modeling field to the analysis field, but also enables the optimisation analysis process simple and effective. This also brings good technical and engineering value under the current economic and technological situation.
目前,AADL已逐渐成为复杂嵌入式系统体系结构设计的标准之一。它广泛应用于航空航天、汽车电子等领域,用于高可靠性关键系统的设计和分析。虽然AADL的误差模型附件(EMA)可以很好地支持AADL误差建模,但目前还缺乏针对可靠系统的多目标(基于可靠性和成本)架构优化分析的技术方法。为了实现AADL模型的优化分析,将AADL模型转化为其他等效模型是一种有效的方法。本文介绍了将AADL2可靠性模型转化为成熟的优化分析工具模型——HiP-HOPS模型的初步工作,并分析了两种模型之间的语义映射关系。模型转换不仅可以将可靠性建模领域与分析领域相结合,而且可以使优化分析过程简单有效。在当前经济技术形势下,具有良好的技术和工程价值。
{"title":"Semantic Mapping for Model Transformation Between AADL2 and HiP-HOPS","authors":"Zhibao Mian, Y. Gao, Xiaodong Shi, Cairong Tang","doi":"10.1109/ICSRS48664.2019.8987619","DOIUrl":"https://doi.org/10.1109/ICSRS48664.2019.8987619","url":null,"abstract":"Currently, AADL has gradually become as one of the standards for the architecture design of complex embedded system. It is widely used in aerospace, automotive electronics and other fields for the design and analysis of high dependability-critical systems. Although the Error Model annex (EMA) of AADL can well support AADL error modeling, there is still a lack of technical method for multiobjective (based on dependability and cost) architecture optimisation analysis for dependable system. In order to achieve the optimisation analysis of AADL model, an effective method is to transform the AADL model into other equivalent models. This paper introduces the preliminary work of transforming AADL2 dependability model into a mature optimisation analysis tool model –– HiP-HOPS model, and analyses the semantic mapping relationship between the two different models. Model transformation can not only integrate the dependability modeling field to the analysis field, but also enables the optimisation analysis process simple and effective. This also brings good technical and engineering value under the current economic and technological situation.","PeriodicalId":430931,"journal":{"name":"2019 4th International Conference on System Reliability and Safety (ICSRS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128117904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 4th International Conference on System Reliability and Safety (ICSRS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1