By Topic

Systems Conference (SysCon), 2014 8th Annual IEEE

Date March 31 2014-April 3 2014

Filter Results

Displaying Results 1 - 25 of 91
  • [Front cover]

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (179 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): ii
    Save to Project icon | Request Permissions | PDF file iconPDF (30 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): iii - xviii
    Save to Project icon | Request Permissions | PDF file iconPDF (123 KB)  
    Freely Available from IEEE
  • [Front matter]

    Page(s): xix - xxvi
    Save to Project icon | Request Permissions | PDF file iconPDF (946 KB)  
    Freely Available from IEEE
  • CyMRisk: An approach for computing mission risk due to cyber attacks

    Page(s): 1 - 7
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (961 KB) |  | HTML iconHTML  

    This paper provides an overview of CyMRisk, an experimental architecture for computing mission risk due to cyber attack. In its current form, the approach employs a simulation of key aspects of a target business/mission process as well as attacker behavior to estimate mission impact due to cyber attacks. In addition, CyMRisk estimates worst case attacker level of effort associated with carrying out such attacks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A security engineering process for systems of systems using security patterns

    Page(s): 8 - 11
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (733 KB) |  | HTML iconHTML  

    The creation of secure systems of systems is a complex process. A large variety of security expertise and knowledge specific for application domains is required. This is even more important if systems of systems span different application domains. Then, security threats specific to different application-domains need to be considered. One example is integrated systems for industrial production processes that interface office domains with supply chain management systems as well as a production environment. Such integrated systems of systems can perform very efficient and economic processes. However, due to the many and different domain-specific security requirements and threats security engineering needs to support requirements specification and architecture design very early in the development process in order to ensure resilience and safety of the complete system. Working with different domains implies that properties and its functionalities are specific and the engineering process used for modeling and designing the complete system has to be able to work in this context, covering all the possibilities and allowing the use of trusted solutions that are compatible with the ones of different domains. We present in this paper a security engineering process for creating secure systems of systems that cover the necessities presented above by using a series of security artifacts that contain the domain-specific security information (in terms of security properties) and provide security solutions in the form of security patterns. These patterns contain the definition of the software/hardware elements used for providing the required solution and the information of related patterns for different domains, which provides a very helpful functionality for creating a system of systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An actionable framework for system of systems and mission area security engineering

    Page(s): 12 - 17
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1321 KB) |  | HTML iconHTML  

    This paper describes an actionable engineering framework for security engineering of a system of systems (SoS). The framework is envisioned as a tool for assessing security risks to critical missions based on the contributing systems and SoS supporting them. An SoS security risk framework is needed to manage the problem of identifying the key elements of risk to SoS missions. The issue is the complexity resulting from the large number of potential logical paths through an SoS that could represent a security risk. Managing this problem then enables the application of security specific analyses to the SoS elements that have been identified as critical. The framework draws on the foundational elements of SoS SE, particularly an understanding of the SoS components, interdependencies and dynamics. The results of the analysis support investment decisions about the constituents of a SoS. The framework is a bridge between the operational and acquisition/engineering communities. While the focus of this framework is on acquisition and engineering materiel solutions, it also accommodates the consideration of non-materiel solutions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unmanned Aerial Vehicle formation flying using Linear Model Predictive Control

    Page(s): 18 - 23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (905 KB) |  | HTML iconHTML  

    A team of three Unmanned Aerial Vehicles (UAVs) accomplishes a line abreast, triangular and cross formation based on high-level Linear Model Predictive Control (LMPC). All flight tests respect Reynold's rules of flocking, where the UAVs avoid collisions with nearby flockmates, attempt to match velocity of other team members and attempt to stay close to other flockmates. A linear system identification model is at the base of the error dynamics describing the formation control algorithm. The main contribution of this paper lies in the use of LMPC to implement multiple formations on UAVs in simulation and using the Qball-X4 quadrotor. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed optimal control of a network of virtual power plants with dynamic price mechanism

    Page(s): 24 - 29
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1106 KB) |  | HTML iconHTML  

    This paper addresses a distributed control problem faced by a network of virtual power plants (VPPs). The VPP can be represented as a distributed energy management system tasked to aggregate distributed generations (DGs), loads and storage facilities to operate as a unique power plants regardless of their locations. In this framework, the main decisions that need to be established by the VPP decision maker are: 1) to decide how to fulfill its related electric demand including bilateral contracts and 2) to bid in multi-level negotiation schemes to minimize (maximize) in a cooperative way the power bought (sold) from (to) other interconnected VPPs. The proposed approach is based on a team theory framework and on dynamic price mechanism, where all VPPs' agents cooperate on the accomplishment of a common goal which is function of the subsystem state and of some controls which are shared with other subsystems. A distributed control strategy is proposed, and that includes problems in which each agent is able to communicate with other agents. Agents of the VPPs compute the control inputs at discrete time steps based on the information available to them. An example is presented to show the practical use of the method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-free tuning solution for sliding mode control of servo systems

    Page(s): 30 - 35
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (739 KB) |  | HTML iconHTML  

    This paper suggests a model-free tuning solution for a sliding mode control system (SMCS) structure dedicated to servo systems. The new SMCS structure is viewed in the framework of reference trajectory tracking using a first-order nonlinear dynamic system as a local approximation of the process model. The sliding mode control signal augments the control signal specific to a model-free PI control system (CS) structure in order to compensate for the estimation errors which affect the systematic design and performance. The derivatives in the local approximation of the process model are estimated numerically using a Savitzky-Golay filter to carry out both differentiation and smoothing. A simple design approach is proposed for the SMCS structure. The real-time experimental results concerning the speed control of a laboratory nonlinear DC servo system prove the performance improvement of the SMCS structure against a model-free PI CS structure. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient link management for the wireless communication of an ocean current turbine testbed

    Page(s): 36 - 41
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1279 KB) |  | HTML iconHTML  

    We describe a wireless link management framework for an ocean platform-to-shore communication system that uses time series forecasting to predict the available link capacity using ocean platform sensor data metrics to boost link robustness and to efficiently manage quality of service. Based on the predicted link capacity the OCTT Wireless Link (OWL) manager coordinates transmission scheduling of XML/HTTP sensor data at the web service layer and controls queue management for IP packet routing. To validate our framework, we developed a link management tool, the OCTT Wireless Link (OWL) manager to ensure optimal throughput and quality of service (QoS) for the wireless communication system linking ocean-based instrumented platforms with users on the shore. OWL applies sensor fusion to the platform attribute data which is then used to forecast the throughput of the wireless link in the harsh and rapidly fluctuating oceanic environment. OWL continually sends this forecast to the Queue Manager (QM) and when the signal power is forecast to drop outside the ideal range, using Linux networking tools, OWL provides bandwidth provisioning at the IP layer over each of the wireless radios in the network. This article describes our work on this project and experimentation with the OWL manager applied to sensory data collected from early stage OCTT platform testing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PHM-based Multi-UAV task assignment

    Page(s): 42 - 49
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (845 KB) |  | HTML iconHTML  

    This paper is relating to the application of Integrated Vehicle Health Management (IVHM) concepts based on Prognostics and Health Monitoring (PHM) techniques to Multi-UAV systems. Considering UAV as a mission critical system, it is expected and required to accomplish its operational objectives with minimal unscheduled interruptions. So that, it does make sense for UAV to take advantage of those techniques as enablers for the readiness of multi-UAV. The main goal of this paper is to apply information from a PHM system to support decision making through an IVHM framework. PHM system information, in this case, comprises UAV remaining useful life (RUL) estimations. UAV RUL is computed by means of a fault tree analysis that it is fed by a distribution function from a probability density function relating time and failure probability for each UAV critical components. The IVHM framework, in this case, it is the task assignment based on UAV health condition (RUL information) using the Receding Horizon Task Assignment (RHTA) algorithm. The study case was developed considering a team of electrical small UAVs and pitch control system was chosen as the critical system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Crowdsourcing for public safety

    Page(s): 50 - 56
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1356 KB) |  | HTML iconHTML  

    With advances in mobile technology, the ability to get real-time geographically accurate data, including photos and videos, becomes integrated into daily activities. Businesses use this technology edge to stay ahead of their competitors. Social media has made photo and video sharing a widely accepted and adopted behavior. This real-time data and information exchange, crowdsourcing, can be used to help first responders and personnel in emergency situations caused by extreme weather such as earthquakes, hurricanes, floods, and snow storms. Using smartphones, civilians can contribute data and images to the recovery process and make it more efficient, which can ultimately save lives and decrease the economic impact caused by extreme weather conditions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Planning and learning for cooperative construction task with quadrotors

    Page(s): 57 - 64
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3196 KB) |  | HTML iconHTML  

    In this paper, we describe a stochastic learning approach for planning of assembly and construction tasks of 3-D structures using multiple quadrotors. A planning framework is proposed to generate different sets of high-level plans for the aerial robots. This architecture demonstrates significant advances in ability to quickly find good solutions for complex construction tasks, considering the real world criteria. The high-level plans are derived off-line using learning and heuristic search algorithms in a simulation environment. This process involves the planning of the sequence of maneuvers for each aerial robot, the sequence of assembly of the desired structure, and the set of trajectories for the quadrotors navigate through the moderately constrained and dynamic environment. Moreover, an efficient conflict resolution for multiple vehicles based on speed planning is proposed. The simulation results of the autonomous aerial robot construction system are presented and the obtained high-level plans are evaluated. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cost-optimal, robust charging of electrically-fueled commercial vehicle fleets via machine learning

    Page(s): 65 - 71
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (868 KB) |  | HTML iconHTML  

    Electrification for commercial vehicle fleets presents opportunity to cut emissions, reduce fuel costs, and improve operational metrics. However, infrastructure limitations in urban areas often inhibit the ability to charge a significant number of electric vehicles, especially under one roof. This paper highlights a novel controls approach developed at GE Global Research in conjunction with Columbia University to fulfill the stated needs for intelligent charging of a commercial fleet of electric vehicles. This novel approach combines traditional control techniques with machine learning algorithms to adapt to customer behavior over time. The stated controls system is designed to regulate the charging rate of multiple electric vehicle supply equipment devices (EVSEs) to facilitate cost-optimal charging subject to past and predicted building load, vehicle energy requirements, and current conditions. In this embodiment, the system is primarily designed to mitigate electric demand charges that may otherwise occur due to charging at inopportune times. The system will be deployed at a New York City FedEx Express delivery depot in partnership with the local utility, Consolidated Edison Company of New York. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can smartphones be used to detect an earthquake? Using a machine learning approach to identify an earthquake event

    Page(s): 72 - 77
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1010 KB) |  | HTML iconHTML  

    The possibility of using smart phone accelerometer to detect earthquake is investigated in this research. Experiments are designed to learn the pattern of an earthquake signal recorded from smart phone's accelerometer. The signal is processed using N-gram modeling as feature extractor for machine learning. For the classifier, this study use Naïve Bayes, Multi-Layer Perceptron (MLP), and Random Forest. Our result shows that the best classification accuracy is achieved by Random Forest method. Its accuracy reached 93.15%. It can be concluded that smart phones can be used as an earthquake detector. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FPGA implementation of multiple Pursuit-Evasion games with decentralized Learning Automata

    Page(s): 78 - 82
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1515 KB) |  | HTML iconHTML  

    This paper addresses the implementation of multiple Pursuit-Evasion (PE) games using Field Programmable Gate Array (FPGA) technology. The multi-agent game is modeled as Markov chains with each player working as a decentralized unit and using Learning Automata (LA). To take a desired action at each step for each player, an efficient Learning algorithm is used that leads to the players to evolve and adapt to the environment in order to solve difficult problems. To realize the PE game in the hardware devices, such as FPGAs in this paper, the system is optimized and designed based on the properties of the hardware technology. The implementation approaches for the realization of the main building blocks of the system are presented in detail. A modified Learning algorithm is used in the hardware implementation. This system has been developed in VHSIC Hardware Description Language (VHDL) and implemented using Xilinx Virtex 6 FPGAs. The simulation results have been achieved and presented in this paper. To prove the efficiency of the Learning algorithm designed with hardware technology, the simulation results are also presented in statistic version, which further proves that the speed of capture is decreased after using the Learning algorithm and finally converges to an equilibrium point in this multiple PE games. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structure-based analysis of dynamic engineering process behavior

    Page(s): 83 - 88
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1199 KB) |  | HTML iconHTML  

    The dynamic behavior of complex systems is a well-known challenge within engineering. The major drawback of dependency modeling approaches for system analysis such as the Design Structure Matrix is that they depict a static view on the system and therefore only allow very limited statements about the dynamic behavior of systems even though the structure mainly defines the system's behavior. Approaches to model the dynamic behavior of complex systems such as System Dynamics, do not offer the possibilities of dependency modeling, as static aspects such as the underlying structure of the system cannot be easily described. This paper proposes a framework for a structure-based analysis of the dynamic behavior of systems and combines dependency modeling approaches and System Dynamics. The framework can be used as an approach to generate dynamic system understanding, decision support through simulation experiments and benchmark different process structures by analyzing the relationship between underlying structure and dynamic behavior of the system. This allows for a projection of the performance of the system over time, based on its structure. The paper gives an overview of the framework, including the initial structural Multiple Domain Matrix model, the dynamizing and customizing of the model, model verification, the simulation of different variants of the underlying system structure and the analysis of the system structure based on the simulation results. The framework is applied within an exemplary case study where two different system structures of a design process are analyzed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling effective Product Development systems as Network-of-Networks

    Page(s): 89 - 96
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1045 KB) |  | HTML iconHTML  

    Whilst Product Development is the basis of engineering, increasingly complex products have a tendency to also increase the complexity of the Product Development process, and in many cases the process is not truly understood. There are many tools that have been developed for managing complexity, but few that are specific to Product Development and fewer still that provide pragmatic analyzes that can be used by decision-makers. This paper develops a methodology to apply a Network-of-Networks approach to data collected from a Product Development organization and provides an accompanying pragmatic analytical framework that can be used by decision-makers on all levels. It then uses an Agent-Based modelling approach to represent the knowledge diffusion within Product Development. This allows a microscopic analysis to complement the macroscopic analysis of the Network-of-Networks approach. This will allow an organization to analyze its current practices on both macro and micro scales, model dynamic changes to the structure of the organization and understand its internal dynamics, with respect to development teams and the design process. This will illuminate the complex system dynamics in Product Development that would otherwise be viewed of as unexpected consequences to a system intervention. This understanding will give greater ability to make suitable, risk-mitigating decisions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comprehensive basis for systems engineering theory

    Page(s): 97 - 102
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (974 KB) |  | HTML iconHTML  

    Given the recent systems engineering failures, we suggest that an alternative way of thinking and communicating about systems engineering is essential. We provide the language, a bit of ontology, and some key concepts that will hopefully allow us to discuss the most basic issues of systems engineering in a clear, coherent, and effective way. The main premise of our exposition is that at the core of systems engineering is the concept of organization, which we use in two ways: (1) characterizing the structure within an artifact, and (2) referring to a cultural institution within which people work together in a structured manner. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing systems engineering processes: A multi-standard approach

    Page(s): 103 - 107
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1527 KB) |  | HTML iconHTML  

    Considering that system design becomes more and more complex to manage, systems engineering standards are useful and necessary for the companies. In order to choose the right standard, this paper presents an analysis of and a detailed comparison between the current releases of the main Systems Engineering standards in system design industry, ANSI/EIA-632, ISO/IEC-15288 and IEEE-1220, and illustrates how to choose a standard on the basis of specific characteristics of the project. For cases where no standard completely satisfies the criteria, we suggest a way to extend and adapt a standard. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detailed cannibalization decision making for maintenance systems in the military context

    Page(s): 108 - 115
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1499 KB) |  | HTML iconHTML  

    Cannibalization operations are useful alternatives in military maintenance systems, when spare parts are not available for replacement. As this operation introduces additional complexity to the system, detailed cannibalization decision making was rarely studied in the literature. In this study, a stochastic model, which can be used to make cannibalization decisions in both single and multiple stage situations, was developed. For the single stage case, the problem is deterministic and can be solved using existing algorithms. For the multiple stage case, the case study indicates that cannibalization would be an effective operation for keeping a system in high reliability and availability levels, especially when passive repair is conducted and the number of spare parts is not sufficient. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GeoClouds Modcs: A perfomability evaluation tool for disaster tolerant IaaS clouds

    Page(s): 116 - 122
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1245 KB) |  | HTML iconHTML  

    Performance and availability are key aspects to evaluate the quality of cloud computing systems. The assessment of these systems should consider the effects of queuing and failure/recovery behavior of data center subsystems and disaster occurrences. Additionally, penalties may be applied if the defined quality level of SLA contracts is not satisfied. Thus, IaaS providers need to evaluate the performability level of its environment, considering, also, the possibility of disasters. A possible approach to protect cloud systems from natural disasters corresponds to the utilization of redundant data centers located far enough apart. However, the time to back up the VM data increases with the distance. To accomplish these issues, we propose a user-friendly tool, namely GeoClouds Modcs, for evaluating distributed cloud computing systems deployed into multiple data centers considering disaster occurrence. The proposed environment adopts a hybrid heterogeneous modeling approach, which includes Reliability Block Diagrams (RBD), Stochastic Petri Nets (SPN) and Cloud System High-Level models to perform the system evaluation. For specialized users, the tool also provides specific features that enable edit and evaluate the result SPN and RBD models on external evaluation tools (i.e., Mercury and TimeNET). To illustrate the proposed tool's usability, we present a case study that evaluates a cloud computing distributed in different cities considering diverse user loads. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safety management method in complex system engineering

    Page(s): 129 - 135
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1607 KB) |  | HTML iconHTML  

    The main objective of System Engineering is the successful development of complex system. It is based on the application of iterative and recursive processes on each phase or step of the system development. One critical process is the requirement management, particularly when it deals with the safety requirements. These one are non-functional requirements and are related to emergent properties, which come from the integration of the different system components. They must be identified as soon as possible, because they are guards to validate or not the system, which can require changes in system architecture. Moreover, they are formulated at system level and need to be derived at sub-system level. The objective of this paper is to propose a safety management method based on well-known safety methods, in order to organize the different tasks to make the system safe. The method focuses mainly on the definition of the system safety requirements following risk and hazard analysis, and also on their derivation according to a top-down approach. It is based on the well-known Failure Mode, Effects, and Criticality Analysis (FMECA) and the use of Fault Trees and Event Trees. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Model Driven Service Engineering approach to System of Systems

    Page(s): 136 - 145
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2719 KB) |  | HTML iconHTML  

    Dynamic requirements and the high complexity of System of Systems (SoS) represent a great challenge to system designers and developers. Focusing the attention of both the academic and the industry work, SoS has become a critical research discipline. However, over the past decade, the lack of generic mature methodology prevented the developers from easily completing large-scale heterogeneous systems (including legacy and acquired systems) integration and keeping them loosely-coupled. Since Service oriented architecture Modeling Language (SoaML) has been successfully used in Model Driven Service Engineering (MDSE) methodology, it has been possible to provide a flexible integration approach by combining complex system analysis methods and service oriented methodologies. In this article we present a Model Driven approach for service oriented SoS architecting, modeling and simulation. It uses SysML to deal with the SoS requirement complexity, SoaML to improve the IT implementation and DEVS (Discrete Event System Specification) simulation to validate the architecture design. This approach provides multi-level models, transformations between them and service implementation artifacts generation to facilitate the alignment between high-level complex business requirement and IT systems. To illustrate this approach and demonstrate its applicability we present an example which covers most of the development phases of System of Systems Engineering (SoSE). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.