Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

System of Systems Engineering, 2009. SoSE 2009. IEEE International Conference on

Date May 30 2009-June 3 2009

Filter Results

Displaying Results 1 - 25 of 39
  • The simulation of pressurized water reactor NPP physical process

    Publication Year: 2009 , Page(s): 1 - 6
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (5781 KB) |  | HTML iconHTML  

    The simulations of pressurized water reactor (PWR) nuclear power plant (NPP) is a very important domain in the society of nuclear power, and there are several problems with the current PWR-NPP simulations. First, the current physical modeling of PWR is over-simplified which can bring convenience of implementation, while severe inaccuracy is prone to be incurred at some critical situation. Second, with the development of technology, some devices are introduced into the PWR, which are not taken into consideration in the current model. To solve these problems, this paper deduced the transfer functions that can properly describe the physical process of PWP-NPP, and a Matlab implementation was given. The experiments basically demonstrated the operation of PWR-NPP and gave promising results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verification of temporal requirements of complex systems using UML patterns, application to a railway control example

    Publication Year: 2009 , Page(s): 1 - 6
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (451 KB) |  | HTML iconHTML  

    Temporal aspects have a vital importance while dealing with the verification of critical systems. Time constraints may reflect both security and performance requirements. Thereby, verifying the temporal requirements is a major task in the validation of critical systems. In this paper, we discuss a new approach for the specification of the temporal requirements within complex systems. We also sketch a global verification method integrating the specification process proposed. The specification is made in a systematic way on the basis of some generic patterns we developed. These patterns are designed starting from a classification of temporal requirements that we have established while trying to cover at best all the usual requirements one may encounter while dealing with the verification of complex systems. The verification process of a given system is performed using observers instantiated from the proper patterns of the requirements identified. Unlike several existing approaches, our approach proposes means to assist the analyst in the requirements' specification step. Moreover, it allows for the verification of various requirements at once. A use case study from the railway operation field allows the illustration of the various concepts discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Motion coordination of multi-agent formation of rovers

    Publication Year: 2009 , Page(s): 1 - 6
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (6334 KB) |  | HTML iconHTML  

    The main idea of this paper is to develop an adequate computational model under which the agents in the formation will perform to coordinate among each other. The IDs of the agents are assigned in such a way that those will be very useful in real-time application. The proposed scheme is suitable for obstacle avoidance in unknown environment as the agents adjust themselves to have more space during turning as a whole formation. Moreover the agents are free from collission among each other during navigation. The proposed method also minimizes the communication burden where the master agent informs only its motion initiative and the other agents decide their motion initiative onboard. This will reduce the dependency of the agents on the other agents while making decision. The schemes are tested with extensive simulations and the responses of the agents show satisfactory performances to deal with different environmental conditions while keeping the formation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System of systems complexity identification and control

    Publication Year: 2009 , Page(s): 1 - 6
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (7626 KB) |  | HTML iconHTML  

    System of systems deployed in dynamic, adaptable environments represent the potential for the generation of great value, power and functionality. The great potential associated with system of systems deployment is offset by the increased complexity associated with the system of systems design, development, deployment, operation and disposal. This paper explores the connection between classical systems engineering techniques of N Squared Charts and Design Structured Matrices coupled with evolutionary algorithms to address both the cognitive complexity and computational complexity associated with system of systems life-cycle events. The key aspect explored in this paper is the enhancement of human perception using computational techniques. The global organizing system relationships, associated with the system of interest, are addressed by the computational component while the local value and interface relationships are addressed by the human system designers. The proper balance of global and local system relations coupled with advanced computational techniques provides the ability to reduce system complexity and increase the effectiveness of deployed systems and systems of systems operations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simulation approach for the design of safety-relevant automotive multi-ECU systems

    Publication Year: 2009 , Page(s): 1 - 8
    Cited by:  Papers (1)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (5991 KB) |  | HTML iconHTML  

    Modern cars comprise tens of electronic control units, interconnected via automotive bus systems towards a specific system-of-systems inside the vehicle. Safety-relevant applications which are realized by these networked embedded controllers require a sophisticated process of system design. The appropriate choice of communication infrastructure and parameters at an early stage of system development significantly influences the overall application performance and reliability. Therefore, we propose the employment of distinct, well-proven system modeling techniques, using discrete event simulation and the Unified Modeling Language with real-time extensions. Our approach allows modeling the relevant aspects of in-car communication even before the first prototype vehicle is built up. Various design alternatives can easily be investigated without time- and manpower-consuming real-world system tests, yielding trustworthy results for a broad variety of aspects of automotive in-car communication. In cooperation with the German car manufacturer Audi, we applied our methodology for design of a networked airbag control system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A systems approach to governance in Maritime Transportation System of Systems

    Publication Year: 2009 , Page(s): 1 - 6
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (379 KB) |  | HTML iconHTML  

    Maritime transportation system (MTS) is a critical infrastructure system that enables economic activity through transferring goods between national and international destinations and hence, is extremely important for the U.S. National Security. This research applies a systems approach to define MTS as a system of systems (SoS). The presented definition of Maritime Transportation System of Systems (MTSoS) enables us to study its critical attributes such as resilience and security, and increases understanding of how to govern it more effectively. A variety of systems engineering models have been applied to MTS. However, it is necessary to form a structure for understanding MTSoS and to develop a new system of systems engineering (SoSE) toolset that help us in viewing interdependencies and adopting effective governance. Based on Boardman-Sauser definition of SoS, We defined MTSoS as integration of interdependent constituent systems. While each constituent system seeks its own goals, their collective body pursues a unified objective, which is transferring goods in a safe, secure, and efficient manner. This approach enables us to create a SoSE framework that can be used as a tool for more effective governance in MTSoS. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wearable knee kinematics monitoring system of MARG sensor and pressure sensor systems

    Publication Year: 2009 , Page(s): 1 - 6
    Cited by:  Papers (2)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (888 KB) |  | HTML iconHTML  

    Knee kinematics in the every daily life or during the sports activities attracts the considerable attentions. Advances in micro electro mechanical system technologies produce many types of mobile sensors. This article introduces a system-of-systems (SoS) which estimates the knee kinematics by integrating MARG sensor and pressure sensor. Each sensor is with miniature size, low power consumption and wireless data transmission. The sensors measure the different signals simultaneously, and the intelligent data analysis system derives 3-degree-of-freedom knee joint angles and the knee joint moment by integrating the different kinds of signals. And, the present SoS can be applied to almost all activities in the daily life. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dependency based framework for the evaluation of agent oriented methodologies

    Publication Year: 2009 , Page(s): 1 - 9
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (4645 KB) |  | HTML iconHTML  

    Agent oriented methodologies have become one of the most important issues of software development. Several methodologies have been proposed to guide developers through various stages of agent based system development. Deciding which methodology to select in a specific case is a critical problem. This paper presents a framework to evaluate complexity of agent oriented methodologies with a quantitative approach. This framework focuses on the lifecycle of a methodology. The proposed models of the methodology and overall process of its lifecycle is discussed thoughtfully and the complexity of the entire methodology lifecycle is calculated. This method of evaluation will be applied to several agent oriented methodologies and finally the comparison among complexity of the proposed methodologies will be performed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using RuleML to specify cross-domain information flow control policies

    Publication Year: 2009 , Page(s): 1 - 6
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (3833 KB) |  | HTML iconHTML  

    We use RuleML to write declassification policies that secure information exchanges between different security levels of disparate access control models. Such flows enable sharing task-critical information that would otherwise not be shared without human intervention. Using RuleML as a security policy specification language allows us to preserve the safety property of information flow across multiple security levels. We also provide a motivating example of our approach to dealing with this property, taken from the Maritime Domain Awareness domain. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing social life using online friend networks

    Publication Year: 2009 , Page(s): 1 - 5
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (258 KB) |  | HTML iconHTML  

    This paper presents an online application which ties to the popular social network Facebook. It aggregates data from other systems, including Yahoo! Local and Google Maps, to provide relevant information to users. This system of systems functions as an add-on to each user's Facebook profile. The user is able to store ratings, reviews, and places where he likes to go. Our proposed system uses all this data to create a profile of the user. It also takes into consideration the information from the user's network of friends in Facebook. This information is then combined with businesses information from Yahoo!. All the information gathered in the users profile is then used to recommend interesting places for him to visit when he logs in to our proposed system next time. Our system can display either places highly recommended by one's friends, or places which will hold a special event. The maps of business locations are automatically rendered using Google Maps APIs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent agent control using simple logic-based hierarchical planning

    Publication Year: 2009 , Page(s): 1 - 5
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (2168 KB) |  | HTML iconHTML  

    We present a detailed case study of how DTGolog - a logic-based decision theoretic planner based on the language of situation calculus - can be adapted to solve a limited but common and useful form of hierarchical planning, and demonstrate how it can be applied to the task of intelligent robot programming and control. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A physics of interdependence for human-robot-machine organizations

    Publication Year: 2009 , Page(s): 1 - 6
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (605 KB) |  | HTML iconHTML  

    We report progress on constructing a physics of interdependence for human-robot-machine organizations. Until now, organizational theory has failed. Similarly, while organizations of agent-based models produce interesting results, they are not predictive. We are integrating mathematics and measurement into a new model of interdependence in organizations based on the conservation of information that offers new insights and directions for research. However, it remains high-risk research. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A system of systems approach to modeling and analysis of P2P overlays for WSNs

    Publication Year: 2009 , Page(s): 1 - 6
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (11225 KB) |  | HTML iconHTML  

    Peer-to-peer networks have been used efficiently as building blocks for large-scale distributed network applications in wired networks. With large scale wireless sensor networks becoming even more realistic, it is pertinent to build distributed network applications in WSNs as well. In this paper, we extend the peer-to-peer overlayed network to provide a platform for different distributed applications over wireless sensor networks. We also illustrate the use of a system of systems approach to study the performance of wireless sensor networks using suitable mathematical models and simulation. We illustrate the efficiency of the model via simulation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data mining strategies and techniques for CRM systems

    Publication Year: 2009 , Page(s): 1 - 5
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (363 KB) |  | HTML iconHTML  

    Whenever millions of data is being stored in database regularly, data mining is responsible to discover the hidden knowledge, rules and patterns from it. Data mining is going to be involved in every organization for extracting extra information which are not visible for everyone. Organizations always planning to get useful information from it. Though, study on customer relationship management (CRM) is reaching more practical and attractive factor for the growth of every organization in the same way, discovery the hidden gold is also supporting to achieve the goal and for the success of organization. The main critical success factor for any (CRM) includes, marketing management, customer support management, sales management and facilities management, etc. In this paper we proposed, analyzed and validated that data mining is also a major success factor in the success of CRM. We first presented the CRM model and then explained the main role of each feature, then we add data mining feature in the CRM model. Further more, we applied data mining strategies and techniques for the generation of new rules and patterns. We talk about that within the boundaries of CRM strategies the data mining tool also play an affective and valuable role for the establishment and growth of the organization. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling the characteristics of system of systems

    Publication Year: 2009 , Page(s): 1 - 6
    Cited by:  Papers (7)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (160 KB) |  | HTML iconHTML  

    The term system of systems (SoS) has become a quite common expression with no single accepted definition. Based on analysis, five characteristics have been identified from an assortment of SoS descriptions. These characteristics are named autonomy, belonging, connectivity, diversity, and emergence, whose degrees of strength determines the foundation of any SoS. To utilize these characteristics, concrete definitions are presented in context and then applied to the development of a theoretical model. The resulting model forms the basis of a generic SoS instantiated as an agent-based modeling simulation. This simulation demonstrates the appropriateness of the characteristics and can be used to explore further aspects of a SoS. Modeling and experimenting on these characteristics will contribute to the field of systems engineering by providing a means to increase our understanding of SoS. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guarding the guard: Using meta formal specifications to guard assertions

    Publication Year: 2009 , Page(s): 1 - 5
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (5925 KB) |  | HTML iconHTML  

    The promise of formal verification of system-of-systems is in harnessing the power and accuracy of modern day computers to create trust-worthy systems. The success of formal verification techniques depends, to large degree, on the existence of a sound and complete collection of formally written requirements. To date, there is no known methodology for assuring that a collection of requirements, formal or otherwise, is complete. The use of meta-assertions suggested in this paper is a step in that direction. As their name suggests, meta-assertions are (second level) assertions about (first-level) assertions. While first-level assertions are formal, executable statements about desired or undesired system behavior, second-level (meta)-assertions are formal and executable statements about desired or undesired behavior of level-one assertions. This paper examines an example of meta-assertions and discusses their use within a run-time verification environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TLtoSQL: Rapid post-mortem verification using temporal logic to SQL code generation in the Eclipse PDE

    Publication Year: 2009 , Page(s): 1 - 5
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (2977 KB) |  | HTML iconHTML  

    This paper addresses the need for formal specification and high-level verification of requirements of complex reactive system of systems. It describes a technique and the associated TLtoSQL tool-set that consists of four plugins for the popular Eclipse environment: (i) a database tool that records JUnit tests in an JDBC compliant database, (ii) a graphical editor for propositional linear-time temporal logic (PLTL) and metric temporal logic (MTL) formal specifications, (iii) an automatic code generator that converts such PLTL and MTL specifications into Standard Query Language (SQL) code, (iv) a database engine that executes the generated SQL of (iii) on database tables of (i) thereby yielding a form of verification we call post-mortem verification. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for a junior level design course

    Publication Year: 2009 , Page(s): 1 - 6
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (5192 KB) |  | HTML iconHTML  

    Engineering design courses' content and timing have been the subject of debate for a long time. What is the appropriate content of an engineering design course and when is the appropriate time to introduce it in the curriculum? In this paper we present a look at a one semester junior level design course offered at New Mexico Tech, in which we propose a framework for introducing design in an engineering curriculum at that level. Furthermore, we present three years of system of systems projects within this framework. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Validation Metrics Framework for safety-critical software-intensive Systems

    Publication Year: 2009 , Page(s): 1 - 8
    Cited by:  Papers (1)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (8797 KB) |  | HTML iconHTML  

    As software complexity continues to increase in today's systems of systems, conveyance of stakeholder requirements, development to these requirements, and validation of these requirements has become exceedingly more difficult. Safety-critical software-intensive systems of systems require significant verification to ensure that they function as per requirements. Verification is only one portion of ensuring systems function correctly and is typically a well defined activity for software development. Validation is the other portion of ensuring that software is developed to the customer's satisfaction, however is not so well defined. The traditional validation model of matching system specification to stakeholder requirements and expectations does not cater for software safety, where stakeholder requirements and expectations are simply that of a ldquosaferdquo system. We introduce a new model for validation of software safety requirements by proxy. Measurement of software safety is a relatively unexplored aspect of software engineering. Proactive validation of software safety requirements necessitates metrics acting as indicators of requirements validity. This paper presents the Validation Metrics Framework, which is based on a new model for validation of software safety requirements. We demonstrate the application of the framework with a representative safety-critical software-intensive system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Human health monitoring system of systems by non-contacted senors

    Publication Year: 2009 , Page(s): 1 - 5
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (386 KB) |  | HTML iconHTML  

    This paper describes a system of systems for health care of elderly. The system consists of three systems: one is the system that detects heart rate and it provides the condition of autonomous nerve system. The second one is the system detecting respiration. Third one is the system detecting cough with phlegm to suction. In them we empty non-contacted three senors such as an ultrasonic oscillosensor touched to bed frame, an air pressure with an air tube in matress in bed and PCM Recorder with microphone. The system of systems can detect fundamental biosignals of heart rate, respiration and cough with phlegm to suction, and it provides the condition of primary biosignal of heart and respiration as well as autonomous nerve system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Standards interoperability: Applying software safety assurance standards to the evolution of legacy software

    Publication Year: 2009 , Page(s): 1 - 8
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (2636 KB) |  | HTML iconHTML  

    In this paper we treat software evolution from the perspective of standards interoperability. We address the issue of how to apply contemporary software safety assurance standards to legacy safety-critical systems, with the aim of re-certifying the legacy systems to the contemporary standards. We present a model to capture the relationships between pre- and post-modification software and standards, and a framework to provide guidance on how to achieve airworthiness certification for modified legacy software, whilst maximizing the use of software products from the previous development. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The verification and validation of software architecture for systems of systems

    Publication Year: 2009 , Page(s): 1 - 6
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (4329 KB) |  | HTML iconHTML  

    In this paper we discuss the verification and validation of software architecture for system of systems. Software architecture plays a vital role in the systematic construction of large systems of systems; it defines the design space and provides a road map leading to the successful construction of system of systems that meet the functional and non-functional requirements. Moreover, a good architecture must allow the system of systems to evolve to meet new requirements due to change in mission. This paper introduces a mathematical model to tie the non-functional requirements of software systems to their architecture, and presents an approach to evaluate the quality of software architecture in light of meeting the requirements. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software reuse in the IV&V of system of systems

    Publication Year: 2009 , Page(s): 1 - 5
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (2099 KB) |  | HTML iconHTML  

    In this paper we address the need to increase the effectiveness and productivity of independent verification and validation (IV&V) of complex system-of-systems software via software reuse. We build upon our previous work on computer-aided IV&V techniques that advocate the use of a system reference model (SRM) to capture the IV&V team's understanding of the problem. An SRM is composed of use cases, Unified Modeling Language (UML) artifacts (e.g., activity diagrams, sequence diagrams, and class diagrams), and executable statechart-based assertions. Each statechart-based assertion is accompanied by a set of test scenarios, which is indispensable for a precise description of the required behaviors that satisfy the system goals. This paper describes a framework for reusing the SRM artifacts in the IV&V of system-of-systems software and presents a high-level architecture of a software reuse environment to support the framework. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Statechart based formal modeling of workflow processes

    Publication Year: 2009 , Page(s): 1 - 5
    Cited by:  Papers (1)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (2185 KB) |  | HTML iconHTML  

    This paper describes a formal methods approach to process engineering. The approach involves statechart based formal process modeling as well as the use of embedded assertion statecharts to ensure the modeled process adheres to stated requirements. This approach can help the process engineer develop and maintain a process. The formal nature of our approach can also help the process engineer to reason about the process. We apply this approach to the Unified Cross Domain Management Office's cross domain solution workflow process. This is a key process in the development, implementation, and certification and accreditation of cross domain solutions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An evidence generation model for web services

    Publication Year: 2009 , Page(s): 1 - 6
    Cited by:  Papers (2)
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (836 KB) |  | HTML iconHTML  

    As multi-participant transactions migrate to Web services, there is a potential for some of these parties to not fulfill their obligations or to achieve unintended objectives. Preserving evidence of service behavior of all participating actors can resolve such shortcomings. In order to achieve that, we propose a three-layered framework to preserve evidence of service behaviors in a non-refutable way. The lowest layer of our framework that preserves evidence of pair-wise participant using cryptographically secured forensic Web services (FWS). The second layer uses this pair-wise evidence to derive evidence of complex actions and the top generate evidence of complex transactional behavior. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.