This paper describes the joint effort of the two FP7 EU projects CLERECO and MoRV toward the definition of an extended reliability information exchange format able to manage reliability information for the full system...
详细信息
ISBN:
(纸本)9781509015085
This paper describes the joint effort of the two FP7 EU projects CLERECO and MoRV toward the definition of an extended reliability information exchange format able to manage reliability information for the full system stack, from technology up to the software level. The paper starts from the RIIF language initiative, proposing a set of new features to improve the expression power of the language and to extend it to the software layer of a system. The proposed extended reliability information exchange format named RIIF-2 has the potential to support the development of next generation reliability analysis tools that will help to fully include reliability evaluation into an automated design flow, pushing cross-layer reliability considerations at the same level of importance as area, timing and power consumption when performing design exploration for new products.
Safety or mission critical systems are those where failures should be avoided at all costs. engineering processes, techniques and tools are, however, not perfect, and lead to software and systems with flaws. This pape...
详细信息
In this paper, an achievability region and a converse region for the two-user Gaussian interference channel with noisy channel-output feedback (G-IC-NOF) are presented. The achievability region is obtained using a ran...
详细信息
In this paper, an achievability region and a converse region for the two-user Gaussian interference channel with noisy channel-output feedback (G-IC-NOF) are presented. The achievability region is obtained using a random coding argument and three well-known techniques: rate splitting, superposition coding and backward decoding. The converse region is obtained using some of the existing perfect-output feedback outer-bounds as well as a set of new outer-bounds that are obtained by using genie-aided models of the original G-IC-NOF. Finally, it is shown that the achievability region and the converse region approximate the capacity region of the G-IC-NOF to within a constant gap in bits per channel use.
This paper presents a new robust fuzzy control of energy management strategy for the stand-alone hybrid power systems. It consists of two levels named centralized fuzzy supervisory control which generates the power re...
This paper presents a new robust fuzzy control of energy management strategy for the stand-alone hybrid power systems. It consists of two levels named centralized fuzzy supervisory control which generates the power references for each decentralized robust fuzzy control. Hybrid power systems comprises: a photovoltaic panel and wind turbine as renewable sources, a micro turbine generator and a battery storage system. The proposed control strategy is able to satisfy the load requirements based on a fuzzy supervisor controller and manage power flows between the different energy sources and the storage unit by respecting the state of charge and the variation of wind speed and irradiance. Centralized controller is designed based on If-Then fuzzy rules to manage and optimize the hybrid power system production by generating the reference power for photovoltaic panel and wind turbine. Decentralized controller is based on the Takagi-Sugeno fuzzy model and permits us to stabilize each photovoltaic panel and wind turbine in presence of disturbances and parametric uncertainties and to optimize the tracking reference which is given by the centralized controller level. The sufficient conditions stability are formulated in the format of linear matrix inequalities using the Lyapunov stability theory. The effectiveness of the proposed Strategy is finally demonstrated through a SAHPS (stand-alone hybrid power systems) to illustrate the effectiveness of the overall proposed method.
Safety or mission critical systems are those where failures should be avoided at all costs. engineering processes, techniques and tools are, however, not perfect, and lead to software and systems with flaws. This pape...
详细信息
Safety or mission critical systems are those where failures should be avoided at all costs. engineering processes, techniques and tools are, however, not perfect, and lead to software and systems with flaws. This paper presents an analysis of the impact of late found issues versus the fault types for critical aerospace systems. These issues are the indep.ndently detected faults that remain once the engineering processes that are required by European space standards have been applied and the engineering teams have performed their verification and validation activities. This study presents the analysis of the fault impact versus fault type distribution according to the detection phases and to the issues severity/type and presents recommendations to improve space systems engineering.
Classification techniques based on Artificial Intelligence are computational tools that have been applied to detection of intrusions (IDS) with encouraging results. They are able to solve problems related to informati...
详细信息
This work presents a strategy to estimate and to correct dynamics variations in nonlinear time variant systems. This correction is carried out by estimating the internal parameters of the process and determining the d...
详细信息
This work presents a strategy to estimate and to correct dynamics variations in nonlinear time variant systems. This correction is carried out by estimating the internal parameters of the process and determining the d...
详细信息
This work presents a strategy to estimate and to correct dynamics variations in nonlinear time variant systems. This correction is carried out by estimating the internal parameters of the process and determining the differences with an available nonlinear model of the system. The proposed approach has a double functionality; on the one hand, it allows a better performance of using nonlinear models for control purposes, like for nonlinear predictive controllers; and on the other hand, it can be used as a diagnosis mechanism since it provides relevant information about the current state of the system. Thus, in order to use this technique with nonlinear time variant systems, a nonlinear model predictive control strategy has been used. The estimator proposed within the framework of this work is similar to the Moving Horizon Estimation strategy. Experimental results on a real tank process are presented to show the main properties of the proposed architecture.
Classification techniques based on Artificial Intelligence are computational tools that have been applied todetection of intrusions(IDS) with encouraging results. They are able tosolve problems related toinformation s...
详细信息
Classification techniques based on Artificial Intelligence are computational tools that have been applied todetection of intrusions(IDS) with encouraging results. They are able tosolve problems related toinformation security in an efficient way. The intrusion detection implies the use of huge amount of information. For this reason heuristic methodologies have been proposed. In this paper, decision trees, Naive Bayes, and supervised classifying systems UCS, are combined toimprove the performance of a classifier. In order tovalidate the system, a scenariobased on real data of the NSL-KDD99 datasetis used.
T Clouds was an EU project (2010-2013) targeted at improving the security and the dep.ndability of cloud infrastructures and services, especially for supporting critical applications. During the project, the participa...
详细信息
T Clouds was an EU project (2010-2013) targeted at improving the security and the dep.ndability of cloud infrastructures and services, especially for supporting critical applications. During the project, the participants of the consortium developed a platform containing a portfolio of solutions for improving the state of the art in cloud security and dep.ndability. Here we present an overview of these solutions and two examples of how they can be integrated to provide security for critical cloud-based applications. Copyright ACM, 2013.
暂无评论