Data flow processing is a common task of embedded systems which is usually modeled as a pipeline. Errors in a block of this pipeline can be propagated through it thus leading to unexpected and erroneous behaviors. For...
详细信息
Data flow processing is a common task of embedded systems which is usually modeled as a pipeline. Errors in a block of this pipeline can be propagated through it thus leading to unexpected and erroneous behaviors. For safety related applications, this pipeline has to be able to identify and react to failures. The DMOSES model-driven development method uses deterministic UML activities to describe and implement data flow processing. This method ensures deterministic behavior of concurrent processing. Design by Contract defines formal, precise and verifiable interfaces for software components. We propose a development method for safe data flow processing based on the integration of this concept in deterministic UML activities. This integration allows the identification of errors by detection of contracts violation. This paper presents an extension of the DMOSES tool for contracts verification at the model level and their monitoring at runtime.
Previously published results on the operation of superregenerative receivers rely on some approximations to obtain analytic results. In this paper we investigate the linear superregenerative receiver in the sinusoidal...
详细信息
Previously published results on the operation of superregenerative receivers rely on some approximations to obtain analytic results. In this paper we investigate the linear superregenerative receiver in the sinusoidal steady state without any approximations. A frequency-domain formulation allows us to efficiently compute the relevant waveforms in the time and the frequency domains. One of the main results is the ability to efficiently predict the exact envelope and the instantaneous phase and frequency of the generated waveforms. This approach is used to analyze the receiver under various operating conditions. A comparison of the results with those obtained with prior techniques is provided.
The standard IEC/EN 61508 defines the requirements for safety systems to be applied to industrial plant safety independently of the application. It is not only intended as a basis for the development of future applica...
详细信息
ISBN:
(纸本)9784883254194
The standard IEC/EN 61508 defines the requirements for safety systems to be applied to industrial plant safety independently of the application. It is not only intended as a basis for the development of future application orientated standards, but also as a basis of all safety related electrical, electronic and programmable electronic systems, in order to apply it to safety critical applications. The purpose of this paper is to describe the SILCas tool which enables the user to determine the Safety Integrity Level (SIL) and the probability of failure on demand (PFD) for entire SIFs (consisting of sensor, signal processing, actuator) and for different system architectures.
This paper presents a new tuning method based on model parameters identified in closed-loop. For classical controllers such as PI(D) controllers a large number of simple tuning methods for various application areas ex...
详细信息
ISBN:
(纸本)9781849192521
This paper presents a new tuning method based on model parameters identified in closed-loop. For classical controllers such as PI(D) controllers a large number of simple tuning methods for various application areas exist. However, when it comes to designing a generalised predictive controller (GPC) four parameters have to be specified. To choose those parameters is not a trivial task since they are not directly related to control or regulation performance. The presented tuning method exploits model-parameters to select suitable controller parameters. Additionally, a Rhinehart filter is incorporated in the design to decrease the impact of noise, therefore, a fifth parameter has to be optimised. The proposed method has been tested in simulation and on a real system.
This paper presents a new tuning method based on model parameters identified in closed-loop. For classical controllers such as PI(D) controllers a large number of simple tuning methods for various application areas ex...
This paper presents a new tuning method based on model parameters identified in closed-loop. For classical controllers such as PI(D) controllers a large number of simple tuning methods for various application areas exist. However, when it comes to designing a generalised predictive controller (GPC) four parameters have to be specified. To choose those parameters is not a trivial task since they are not directly related to control or regulation performance. The presented tuning method exploits model-parameters to select suitable controller parameters. Additionally, a Rhinehart filter is incorporated in the design to decrease the impact of noise, therefore, a fifth parameter has to be optimised. The proposed method has been tested in simulation and on a real system.
This paper presents a method for automatic reconstruction of polymorphic class hierarchies from the assembly code obtained by compiling a C++ program. If the program is compiled with run-time type information (RTTI), ...
详细信息
This paper presents a method for automatic reconstruction of polymorphic class hierarchies from the assembly code obtained by compiling a C++ program. If the program is compiled with run-time type information (RTTI), class hierarchy is reconstructed via analysis of RTTI structures. In case RTTI structures are missing in the assembly, a technique based on the analysis of virtual function tables, constructors and destructors is used. A tool for automatic reconstruction of polymorphic class hierarchies that implements the described technique is presented. This tool is implemented as a plug in for IDA Pro Interactive Disassembler. Experimental study of the tool is provided.
To extract feature parameters of Pseudo-code binary phase modulation combined with sine frequency modulation continuous wave(PRBC-SFMCW), the linear decomposition techniques using Quadrature Mirror Filter Bank Tree (Q...
详细信息
To extract feature parameters of Pseudo-code binary phase modulation combined with sine frequency modulation continuous wave(PRBC-SFMCW), the linear decomposition techniques using Quadrature Mirror Filter Bank Tree (QMFBT) is adopted. With this method, the intercepted signal is decomposed and analyzed by QMFBT. Then according to the feature of PRBC-SFMCW signal contained in different time-frequency layers the algorithm of feature parameter extraction on an appropriate time-frequency layer is presented. The analysis and simulation results show that the SNR of PRBC-SFMCW signal is improved after decomposition. At the same time, the across section disappear and parameters can be estimated accurately in a low SNR condition.
Decompilation is reconstruction of a program in a high-level language from a program in a low-level language. In most cases static decompilation is unable to completely reconstruct high-level data types due to loss of...
详细信息
Decompilation is reconstruction of a program in a high-level language from a program in a low-level language. In most cases static decompilation is unable to completely reconstruct high-level data types due to loss of typing information during compilation. We present several profile-based techniques that help to recover high-level types. The techniques include pointer/integer determination by value profiling and composite type identification by heap profiling.
The new software retesting concept which bases on the idea of the hidden program errors detection was described in this paper. Purpose of this concept is the program hidden errors identification after basic testing. A...
详细信息
ISBN:
(纸本)9781605580760
The new software retesting concept which bases on the idea of the hidden program errors detection was described in this paper. Purpose of this concept is the program hidden errors identification after basic testing. As a result, the software life cycle was supplemented, because customer realizes retesting at incoming inspection stage. We use special architecture of artificial neural net for estimation of the software retesting necessity. It is a multi-layer- perceptron, which is composed with a simple Rosenblatt perceptron. The most effective training algorithms for this architecture are CGB on base conjugate-gradient method, one-step algorithm of secant method, algorithm SCG and threshold back-propagation error algorithm. The trained neural net gives information about total quantity and importance of the different levels errors in program. Copyright 2008 ACM.
In this paper we describe a method for simulation-based verification of microprocessor units based on cycle-accurate contract specifications. Such specifications describe behavior of a unit in the form of precondition...
详细信息
暂无评论