By Topic

Systems Conference (SysCon), 2011 IEEE International

Date 4-7 April 2011

Filter Results

Displaying Results 1 - 25 of 104
  • [Front cover]

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (343 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): ii
    Save to Project icon | Request Permissions | PDF file iconPDF (32 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): iii - xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (363 KB)  
    Freely Available from IEEE
  • Conference chair welcome message

    Page(s): xv - xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (90 KB)  
    Freely Available from IEEE
  • A statistical model for system components selection

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (292 KB) |  | HTML iconHTML  

    The proposed research is aimed at enhancing system design productivity by exploiting the principle of “design and reuse” to its full potential. Specifically, we present a statistical model for selecting from a component library the optimal components for a network-on-chip architecture such that to satisfy certain system performance requirements. Our model is based on regression analysis and Taguchi's optimization technique. The model estimates the relationship between system performance and component attributes, to help the architect in the component selection process. Having such a model in the system design phase will allow the architect not only to make informed decisions when selecting components but also to exchange components with similar characteristics to fine tune system performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sensor integration and analysis for visual identification of environmental patterns

    Page(s): 7 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (939 KB) |  | HTML iconHTML  

    Sensor data integration is crucial for the analysis and identification of environmental patterns. In this research project, publicly available datasets of environmental sensor data are integrated with Google Earth. Information on environmental patterns is identified, analyzed, and presented on the Web in response to user queries. This prototype demonstrates how sensor data can be integrated with Google Earth to enable the geographic and temporal context display of environmental data, with an interactive format, for users to analyze and identify environmental patterns in real-time. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A microcontroller-based multi-function solar tracking system

    Page(s): 13 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (782 KB) |  | HTML iconHTML  

    Renewable energy solutions are becoming increasingly popular. Photovoltaic (solar) systems are but one example. Maximizing power output from a solar system is desirable to increase efficiency. In order to maximize power output from solar panels, one needs to keep the panels aligned with the sun. As such, a means of tracking the sun is required. This is definitely a more cost effective solution than purchasing additional solar panels. It has been estimated that the yield from solar panels can be increased by 30 to 60 percent by utilizing a tracking system instead of a stationary array. In this paper, a prototype for a microcontroller-based multi-function solar tracking system is described, which will keep the solar panels aligned with the sun in order to maximize efficiency. The maximum power point tracking (MPPT) data can be transmitted in real time to other solar systems in need of this data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An integrated wireless indoor navigation system for visually impaired

    Page(s): 17 - 23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (912 KB) |  | HTML iconHTML  

    This paper presents an integrated wireless system that helps a visually impaired person navigate within an indoor environment. The guidance process to help the person navigate uses a ZigBee wireless mesh network to localize the user and a compass to determine his/her orientation. The system uses a server to calculate an optimal path from the user's present location to the target location or item to be reached. The system receives voice commands from the visually impaired person and generates audio responses to guide the person. The mobile unit of the system is compact and requires relatively low power. Overall the system has minimal intrusion level and the results of various testing scenarios showed it was successful. The results also showed that the accuracy level depends on the available ZigBee modules within the mesh network and the particular zone. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing the influence of Zeroth Responders on resilience of the Maritime Port Enterprise

    Page(s): 24 - 27
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1258 KB) |  | HTML iconHTML  

    Zeroth Responders are defined as the individuals who respond spontaneously prior to a coordinated response group. Their influence in both natural and man-made disaster response has been drawing attention to an increasing number of governmental, private and communities' stakeholders. To effectively evaluate the influence of Zeroth Responder, and to better understand the challenge stated in the 2010 Department of Homeland Security (DHS) Quadrennial Homeland Security Review Report (QHSR): “neighbor-to-neighbor assistance, when done safely, decreases the burden on first responders, and individuals should be seen as force multipliers who may also offer specialized knowledge and skills”, this paper develops a quantitative resilience model that can be used to compute resilience figures-of-merit with focus of Zeroth Responders' influence on the Maritime Port Enterprise. An initial Small Vessel Security threat scenario “Use of Waterborne Improvised Explosive Devices (WBIED)” is modeled to quantify the resilience on a port transportation network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bounding inertial drift with human gait dynamics for personal navigation

    Page(s): 28 - 33
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1280 KB) |  | HTML iconHTML  

    The integration of inertial measurements to estimate position and orientation is limited in its accuracy by the biases in the inertial instruments. The gyroscopes and accelerometers used in personal navigation systems do not have extremely high fidelity. The drift in position estimates grows as the cube of time elapsed without absolute measurements such as GPS to bound it. However, one source of inertial aiding has largely been overlooked, which is the unique dynamics of gait for each individual. Based on the record of inertial measurements in walking or running, the relationships between stride length and stride interval for individuals is developed. We designed an integrated system with corrected human gait model to limit the drift of inertial integration with the assistance of this relationship. Analysing in individual step and corrected with gait model can effectively minimize the error of position estimating. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Complex automation of a technological process on the basis of control systems with a three level structure

    Page(s): 34 - 37
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (525 KB) |  | HTML iconHTML  

    Modern control methods are suitable for increasing production capabilities of industrial enterprises by employing information technologies, which are often used for modernization of industrial processes without the need of acquiring new equipment. Therefore, automation of the industrial lines is one of the most important directions of the technological progress, as it leads to improvement and modernization of industrial processes. The technological process of tellurium production includes a number of stages, which require automatic regulation of many parameters with a high degree of precision. In this work, we analyze and propose a unified concept of application of modern automation techniques that can be used to build a three-level hieratical control system intended for improving the quality of product. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring and management approach for cyber security events over complex systems

    Page(s): 38 - 45
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1081 KB) |  | HTML iconHTML  

    DoD, agency and commercial operations centers that manage complex enterprise systems face the problem of protecting both the systems and the data they carry against cyber attacks while, at the same time, providing high quality end-to-end services that meet service level agreements and help ensure mission success. Presently there exists no comprehensive tool suite that encompasses the procedures, methods, and policies to provide an effective enterprise cyber security monitoring and management solution. This paper provides a basis from which to fill that void by introducing a new framework for monitoring and managing cyber security events in complex systems. We demonstrate application of this framework using several realistic scenarios. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing the impact of cyber attacks on complex missions

    Page(s): 46 - 51
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (655 KB)  

    This paper describes how to evaluate the impact of a cyber attack on a mission. We accomplish this by computing impact as the changes to mission measures of effectiveness, based on the reported effects of a known or suspected attack on one or more parts of the information technology (IT) supporting the mission. Our previous papers have described our goals for computing mission impact and the choices of the techniques we use for modeling missions, IT, and cyber attacks. This paper focuses on how we compute the impact of cyber attacks on IT processes and information. These computations will improve decision-making when under cyber attack by providing accurate and detailed assessments of the impact of those attacks. Although the focus of our work has been on the calculation of cyber mission impacts during mission execution, we have also demonstrated how our representations and computations can be used for performing cyber risk analysis and crown jewels analysis. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic attack scenario discovering based on a new alert correlation method

    Page(s): 52 - 58
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (709 KB) |  | HTML iconHTML  

    In recent years, many approaches for correlating alerts and discovering attack scenarios have been proposed. However, most of them have difficulties such as high dependency to predefined correlation rule definitions and domain knowledge, huge volume of computing workload in some cases and limited capability in discovering new attack scenarios. Therefore, in this paper, we proposed a new alert correlation method to automatically extract multi-step attack scenarios. This method works based on a multi-phase process which acts on the IDS generated alerts. In normalization phase, alerts are turned to the form that can be easily processed by the proposed system. In alert Winnowing phase, for each alert is determined that it belongs to which alert sequence or attack scenario. After determining alerts scenarios, for each scenario its sub scenarios and Meta alerts are extracted. Finally, from the produced Meta alerts, the multi-step attack graph is constructed for each attack scenario. We evaluate our approach using DARPA 2000 data sets. Our experiments show our approach can effectively construct multi-step attack scenarios and give high level view of intruder intentions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A model driven framework for N-version programming

    Page(s): 59 - 65
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1250 KB) |  | HTML iconHTML  

    Complex systems-of-systems (SoS) requiring fault-tolerance and high reliability often require redundant systems. The concept of redundancy that includes components with differing failure modes is well understood in the realm of hardware design. N-version programming, although shown to produce significant gains in software reliability over single-version fault tolerant techniques, is not widely accepted or applied. This is due, in part, to N-version programming's lengthy development time and its inherent problems with version independence. Model Driven Software Development (MDSD) is a process that promises gains in software productivity and quality. While progress in MDSD has witnessed the expansion of the supporting Unified Modeling Language profile for modeling fault tolerant characteristics, and the development of specific design patterns for the production of fault tolerant software, MDSD's support in the generation and testing of fault tolerant applications is not evident or explicitly defined. This paper discusses the development of a fault tolerant MDSD framework, which enables users to design, implement and test fault tolerant applications using the N-version modeling technique. The framework closes the gap between existing modeling patterns and the practical application of fault tolerant MDSD, and supports follow-on research to address specific questions relating to the benefits of MDSD within the fault tolerance software domain. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attribute-oriented modeling — Another dimension for Model-Based Systems Engineering

    Page(s): 66 - 71
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (645 KB)  

    This paper presents a new approach to Model-Based Systems Engineering (MBSE) called “Attribute-Oriented Modeling.” This approach is used with a modeling language such as UML. The central concept of this approach is that model elements used in models of systems in a particular domain should be defined with a set of attributes that the system components to be modeled possess. The model of a system is created by specifying, for each component in the system, the values of the attributes that the model element that represents the component has. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and verifying security protocols using UML 2

    Page(s): 72 - 79
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (636 KB) |  | HTML iconHTML  

    Large scale distributed systems often require security protocols to ensure high integrity. We present a modeling approach that uses UML 2 without extensions to support the design, composition and verification of security protocols. The approach assumes a strong threat model, in which an attacker can intercept, modify, and spoof all communications, with the exception of those protected by known-strong encryption. Through a series of models of extensively-studied protocols we demonstrate that the approach allows protocol properties to be accurately represented, and protocols to be automatically tested to detect potential security flaws. The approach benefits from the existing strong tool support for UML 2, allowing automatic generation of protocol implementations from the models. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization and control of hydrogen and energy flows in a Green Hydrogen Refuelling Stations

    Page(s): 80 - 85
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (812 KB) |  | HTML iconHTML  

    In this paper, an optimization model of Green Hydrogen Refuelling Station (GHRS) is presented. The GHRS is powered completely by a wind farm to satisfy predefined hydrogen fuel and electrical energy demands. The model based on a mathematical programming is developed to control both energy and hydrogen flows exchanged among the system components. The optimization model has been applied on one week basis to a case study in the province of Savona, Italy. Optimal results are reported taking into account the presence of an additional hydrogen industrial market and a connection with the electrical network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal control of a regional power microgrid network driven by wind and solar energy

    Page(s): 86 - 90
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (652 KB) |  | HTML iconHTML  

    In this paper, a model to support optimal decisions in a network of microgrids is formalized as an original discrete and centralized problem defined here as cooperative network of smart power grids problem. The control variables are the instantaneous flows of power in the network of microgrids, which can be obtained from the solution of a linear quadratic Gaussian (LQG) problem on a fixed time horizon. The state is represented by the energy stored in each microgrid. The goal is to minimize the variations of the energy stored in each storage device from a reference value, as well as to minimize the exchange of power between the microgrids. An application of the model is proposed taking into account wind and solar data in three sites in Liguria region (Castellari, Capo Vado and Savona). It is assumed that each microgrid is composed by a renewable hybrid energy system, a cluster of 100 households and a storage device. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Factors affect on the UFLS: Experimental results

    Page(s): 91 - 96
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (707 KB) |  | HTML iconHTML  

    Under Frequency Load Shedding, UFLS, is the last step and the most extreme in protecting electric power systems from black outs and severe damages. The nature of the load and the system voltage play very important roles in the dynamics of the power system. In the present paper, the frequency variation during overloading and the subsequent load shedding is examined experimentally for a single machine system loaded with loads of different natures (resistive and induction machine).The obtained results demonstrate a considerable change in frequency behavior when using different load models. This may be a significant step in minimizing load to be shed if the load model could be estimated adaptively. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing live migration of virtual machines across wide area networks using integrated replication and scheduling

    Page(s): 97 - 102
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (675 KB) |  | HTML iconHTML  

    Migrating virtual machines (VM) at run time within acceptable time limits is significantly challenging due to large size of the virtual disk files. In this paper, we propose our framework called cloudspider to overcome this challenge by combining replication and scheduling of VM images into a common framework. In particular, we replicate VM images apriori onto a few chosen cloud sites and select one of the replicas of the VM image to be the primary copy. Based on dynamically changing cost parameters at these cloud sites, the scheduler can appropriately select a different replica of a VM image to be the primary copy. The updates at the primary copy are incrementally propagated to the remaining copies. In order to bring down the cost of storage requirement due to the additional replicas our work proposes the use of deduplication techniques. In this paper we address the question of replica placement of VM images when disparate VM images have varying degrees of commonality and latency requirements. The replication algorithm has been implemented and tested using an open-source cloud simulator called CloudSim and the initial results are quite promising. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of an integrated security framework to enable the control and security of a heterogeneous enterprise

    Page(s): 103 - 108
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1482 KB) |  | HTML iconHTML  

    This paper presents an analytical investigation of the security characteristics that enable the enterprise to protect and defend itself from internal and external threats. The goal here is to develop an overarching framework that is geared towards incrementally building capabilities into the existing infrastructure through the development of security related services. The protection of data, infrastructure and user identities is at the heart of the framework where broader protection categories are further broken down into services that can be deployed individually and interact with each other to provide better services to the enterprise. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enterprise systems governance using transactional cost analysis: An agent-based framework

    Page(s): 109 - 114
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (720 KB) |  | HTML iconHTML  

    Extended Enterprise is a set of inter-connected organizations that acts collaboratively to produce a product or deliver a service that is beyond the reach of each one of them. Using the system theory, we define the act of collaboration as a sub-system of extended enterprise entitled enterprise systems governance. In this paper, we use transactional cost analysis in order to build an analytical tool to measure the efficiency and effectiveness of governance strategies that can be used in such a system. The analysis is based on agent-based modeling method, and we will apply the method to Federal Aviation Administration NextGen Project. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web services for handheld tactical systems

    Page(s): 115 - 122
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (894 KB)  

    Service-Oriented Architecture (SOA) is an architectural pattern for constructing and deploying systems characterized by components called services that can be composed into applications using standard interface formats. While service orientation can reduce integration cost and enhance agility in response to changing situations, it has not been widely applied to support mobile users in ad hoc, wireless computing environments common to tactical military situations and first responders to humanitarian disasters. These environments are impoverished in terms of computational resources and network characteristics. This paper describes a set of prototypes that demonstrate the use of SOA in tactical environments in which users are employing handheld devices to obtain situational awareness data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SOA migration case studies and lessons learned

    Page(s): 123 - 128
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (672 KB) |  | HTML iconHTML  

    Service-Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing enterprise systems where business needs and technical solutions are closely aligned. SOA offers a number of potential benefits, such as cost-efficiency and agility. To exploit the benefits that SOA offers, several organizations are adopting a services model for leveraging their existing legacy systems. Migration to SOA can give new life to the existing legacy, but if not done correctly the migration can also lead to failure. There are several factors for this, such as technology selection, migration approach, type of legacy system, and SOA governance. One way to learn how to achieve success and avoid failure is through a thorough analysis of existing work in this field. This paper reports on a study that analyzed existing SOA migration projects to learn from them the factors that influence the success or failure of their efforts. A mechanism called the Evolution Process Framework for SOA was used to structure the analysis. Three SOA migration case studies and one experience report were analyzed. Lessons learned from each study are summarized, with crosscutting issues distilled from across all four studies presented. One of the most important lessons learned is the significance of well-defined policies and procedures for defining, publishing, and maintaining services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.