期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
AADL2TASM: a Verification and Analysis Tool for AADL Models
1
作者 蒋树 胡凯 +3 位作者 杨志斌 顾斌 张腾 姜泮昌 《Journal of Donghua University(English Edition)》 EI CAS 2012年第1期94-98,共5页
Architecture analysis and design language (AADL) is an architecture description language standard for embedded real-time systems and it is widely used in safety-critical applications. For facilitating verification and... Architecture analysis and design language (AADL) is an architecture description language standard for embedded real-time systems and it is widely used in safety-critical applications. For facilitating verification and analysis, model transformation is one of the methods. A synchronous subset of AADL and a general methodology for translating the AADL subset into timed abstract state machine (TASM) were studied . Based on the atlas transformation language (ATL) framework, the associated translating tool AADL2TASM was implemented by defining the meta-model of both AADL and TASM, and the ATL transformation rules. A case study with property verification of the AADL model was also presented for validating the tool. 展开更多
关键词 architecture analysis and design language (AADL) timed abstract state machine (TASM) model transformation atlas transformation language (ATL)
下载PDF
An Analysis Method of Business Application Framework
2
作者 He Ke\|qing 1,Fan Hui hua 1,Ying Shi 2 1.Department of Computer Science, Wuhan University, Wuhan 430072, China 2.State Key Laboratory of Software Engineering, Wuhan University, Wuhan 430072, China 《Wuhan University Journal of Natural Sciences》 CAS 2001年第Z1期218-223,共6页
We discuss the evolution of object oriented software development process based on software pattern. For developing mature software framework and component, we advocate to elicit and incorporate software patterns for ... We discuss the evolution of object oriented software development process based on software pattern. For developing mature software framework and component, we advocate to elicit and incorporate software patterns for ensuing quality and reusability of software frameworks. On the analysis base of requirement specification for business application domain, we present analysis method and basic role model of software framework. We also elicit analysis pattern of framework architecture, and design basic role classes and their structure. 展开更多
关键词 object oriented software framework analysis pattern of architecture COMPONENT role model
下载PDF
Architecture-level particular risk modeling and analysis for a cyber-physical system with AADL
3
作者 Ming-rui XIAO Yun-wei DONG +2 位作者 Qian-wen GOU Feng XUE Yong-hua CHEN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2020年第11期1607-1625,共19页
Cyber-physical systems(CPSs)are becoming increasingly important in safety-critical systems.Particular risk analysis(PRA)is an essential step in the safety assessment process to guarantee the quality of a system in the... Cyber-physical systems(CPSs)are becoming increasingly important in safety-critical systems.Particular risk analysis(PRA)is an essential step in the safety assessment process to guarantee the quality of a system in the early phase of system development.Human factors like the physical environment are the most important part of particular risk assessment.Therefore,it is necessary to analyze the safety of the system considering human factor and physical factor.In this paper,we propose a new particular risk model(PRM)to improve the modeling ability of the Architecture Analysis and Design Language(AADL).An architecture-based PRA method is presented to support safety assessment for the AADL model of a cyber-physical system.To simulate the PRM with the proposed PRA method,model transformation from PRM to a deterministic and stochastic Petri net model is implemented.Finally,a case study on the power grid system of CPS is modeled and analyzed using the proposed method. 展开更多
关键词 Human-cyber-physical system(HCPS) Particular risk analysis architecture analysis and Design Language(AADL) Deterministic and stochastic Petri net(DSPN) Particular risk model
原文传递
IoT-Enabled Autonomous System Collaboration for Disaster-Area Management 被引量:2
4
作者 Abenezer Girma Niloofar Bahadori +5 位作者 Mrinmoy Sarkar Tadewos G.Tadewos Mohammad R.Behnia M.Nabil Mahmoud Ali Karimoddini Abdollah Homaifar 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第5期1249-1262,共14页
Timely investigating post-disaster situations to locate survivors and secure hazardous sources is critical,but also very challenging and risky.Despite first responders putting their lives at risk in saving others,huma... Timely investigating post-disaster situations to locate survivors and secure hazardous sources is critical,but also very challenging and risky.Despite first responders putting their lives at risk in saving others,human-physical limits cause delays in response time,resulting in fatality and property damage.In this paper,we proposed and implemented a framework intended for creating collaboration between heterogeneous unmanned vehicles and first responders to make search and rescue operations safer and faster.The framework consists of unmanned aerial vehicles(UAVs),unmanned ground vehicles(UGVs),a cloud-based remote control station(RCS).A light-weight message queuing telemetry transport(MQTT)based communication is adopted for facilitating collaboration between autonomous systems.To effectively work under unfavorable disaster conditions,antenna tracker is developed as a tool to extend network coverage to distant areas,and mobile charging points for the UAVs are also implemented.The proposed framework’s performance is evaluated in terms of end-to-end delay and analyzed using architectural analysis and design language(AADL).Experimental measurements and simulation results show that the adopted communication protocol performs more efficiently than other conventional communication protocols,and the implemented UAV control mechanisms are functioning properly.Several scenarios are implemented to validate the overall effectiveness of the proposed framework and demonstrate possible use cases. 展开更多
关键词 Architectural analysis and design language(AADL)and cloud computing disaster area management internet of things(IoT) message queuing telemetry transport(MQTT) unmanned aerial vehicle(UAV) unmanned ground vehicle(UGV)
下载PDF
Fine Mapping and Analysis of DWARF TILLER1 in Controlling Rice Architecture 被引量:3
5
作者 Wenfei Wang Huangwei Chu +1 位作者 Dabing Zhang Wanqi Liang 《Journal of Genetics and Genomics》 SCIE CAS CSCD 2013年第9期493-495,共3页
Rice is one of the most consumed staple food plants around the world, and its plant architecture is very important to improve the grain yield (Zhang et al., 2008). Plant height, leaf angle, tiller number and angle, ... Rice is one of the most consumed staple food plants around the world, and its plant architecture is very important to improve the grain yield (Zhang et al., 2008). Plant height, leaf angle, tiller number and angle, and uniformity of panicle layer all can have strong effects on grain yield (Wang and Li, 2008). During the long history of domestication, rice has been selected to develop uniform tiller height architecture that ensures panicle layer uniformity and ease of harvesting (Ma et al., 2009), and is largely determined by the synchronic culm elongation. 展开更多
关键词 DWT Fine Mapping and analysis of DWARF TILLER1 in Controlling Rice architecture
原文传递
DESIGN OF RECONFIGURABLE MANUFACTURING SYSTEMS WITH STRONGLY COUPLED NATURE 被引量:1
6
作者 LANG Sherman Y T 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2007年第1期91-95,共5页
Today's manufacturing cnvironmem forces manufacturing companies to make as many product variations as possible at affordable costs within a short time. Mass customisation is one of most important technologies for com... Today's manufacturing cnvironmem forces manufacturing companies to make as many product variations as possible at affordable costs within a short time. Mass customisation is one of most important technologies for companies to achieve their objectives. Efforts to mass customisation should be made on two aspects: (1) To modularize products and make them as less differences as possible; (2) To design manufacturing resources and make them provide as many processes variations as possible. This paper reports our recent work on aspect (2), i.e. how to design a reconfignrable manufacturing system (RMS) so that it can be competent to accomplish various processes optimally; Reconfignrable robot system (RRS) is taken as an example. RMS design involves architecture design and configuration design, and configuration design is further divided in design analysis and design synthesis. Axiomatic design theory (ADT) is applied to architecture design, the features and issues of RRS configuration design are discussed, automatic modelling method is developed for design analysis, and concurrent design methodology is presented for design synthesis. 展开更多
关键词 Mass customisation Reconfignrable manufacturing systems Reconfignrable robotic system analysis Synthesis architecture Adaptability Reconfignrability Configuration design
下载PDF
Privacy and security federated reference architecture for Internet of Things 被引量:2
7
作者 Musab KAMAL Imran RASHID +3 位作者 Waseem IQBAL Muhammad Haroon SIDDIQUI Sohaib KHAN Ijaz AHMAD 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2023年第4期481-508,共28页
Physical objects are getting connected to the Internet at an exceptional rate,making the idea of the Internet of Things(IoT)a reality.The IoT ecosystem is evident everywhere in the form of smart homes,health care syst... Physical objects are getting connected to the Internet at an exceptional rate,making the idea of the Internet of Things(IoT)a reality.The IoT ecosystem is evident everywhere in the form of smart homes,health care systems,wearables,connected vehicles,and industries.This has given rise to risks associated with the privacy and security of systems.Security issues and cyber attacks on IoT devices may potentially hinder the growth of IoT products due to deficiencies in the architecture.To counter these issues,we need to implement privacy and security right from the building blocks of IoT.The IoT architecture has evolved over the years,improving the stack of architecture with new solutions such as scalability,management,interoperability,and extensibility.This emphasizes the need to standardize and organize the IoT reference architecture in federation with privacy and security concerns.In this study,we examine and analyze 12 existing IoT reference architectures to identify their shortcomings on the basis of the requirements addressed in the standards.We propose an architecture,the privacy-federated IoT security reference architecture(PF-IoT-SRA),which interprets all the involved privacy metrics and counters major threats and attacks in the IoT communication environment.It is a step toward the standardization of the domain architecture.We effectively validate our proposed reference architecture using the architecture trade-off analysis method(ATAM),an industry-recognized scenario-based approach. 展开更多
关键词 Architecturally significant requirement(ASR) architecture trade-off analysis method(ATAM) Internet architecture board Internet of Things(IoT) Privacy enhancing technologies Privacy validation chain
原文传递
Geological Characteristics and Manifestations of Geological Processes of Sequence Boundaries and Their Vicinities
8
作者 Xiao Linping Testing Centre of Geotechnical Engineering, Southwest Jiaotong Universityand Zhao YuguangChengdu Institute of Mineral Resources, Chinese Academy of Geological Sciences, Chengdu, Sichuan, 610082 Liu Xinzhu 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 1997年第4期386-394,共9页
This paper discusses the geological characteristics and architectures of sequence boundaries and their vicinities and has proposed a classification scheme for the sequence boundaries, which can thus be grouped into th... This paper discusses the geological characteristics and architectures of sequence boundaries and their vicinities and has proposed a classification scheme for the sequence boundaries, which can thus be grouped into three types and eight categories: type I includes exposed truncated surface, palaeosol surface, palaeokarst surface and exposed surface; type Ⅱ boundaries include structural transitional surface during sea-level fall and transgressive onlap surface; and type Ⅲ includes submarine erosional diagenetic diastem and event surface. A study has been made for the three major boundaries lying between the Permian and pre-Permian, the Permian and Triassic, and the Middle and Lower Triassic respectively in terms of multiple disciplines such as lithostratigraphy, biostratigraphy, magnetostratigraphy and carbon and oxygen isotopic geology. These three boundaries are ascribed to type I , typeⅡ and typeⅢ, respectively. 展开更多
关键词 sequence boundaries architectural analysis biotic succession magnetopolarity superperiod carbon and oxygen isotopes
下载PDF
Integrating behavior analysis into architectural modeling
9
作者 Luxi CHEN Linpeng HUANG +1 位作者 Chen LI Tao ZAN 《Frontiers of Computer Science》 SCIE EI CSCD 2015年第1期15-33,共19页
Architectural modeling and behavior analysis are two important concerns in the software development. They are often implemented separately, and specified by their own supporting notations. Architectural modeling helps... Architectural modeling and behavior analysis are two important concerns in the software development. They are often implemented separately, and specified by their own supporting notations. Architectural modeling helps to guarantee the system design to satisfy the requirement, and behavior analysis can ensure the interaction correctness. To improve the trustworthiness, methods trying to combine architectural modeling and behavior analysis notations together have been proposed, e.g., establishing a one-way mapping relation. However, the one-way relation cannot ensure updating one notation specifications in accordance with the other one, which results in inconsistency problems. In this paper, we present an approach to integrating behavior analysis into architectural modeling, which establishes the interoperability between architectural modeling notation and behavior analysis notation by a bidirectional mapping. The architecture is specified by the modeling language, architecture analysis and design language (AADL), and then mapped to behavior analysis notation, Darwin/FSP (finite state process) through the bidirectional transformation. The bidirectional transformarion provides traceability, which makes behavior analysis result provided by a model checker can be traced and reflected back to the original AADL specifications. In this way, the behavior analysis is integrated into architectural modeling. The feasibility of our approach is shown by a control system example. 展开更多
关键词 software architecture component behavior bidirectional transformation architecture analysis and design language (AADL) model checking
原文传递
Towards a verified compiler prototype for the synchronous language SIGNAL 被引量:7
10
作者 Zhibin YANG Jean-Paul BODEVEIX +3 位作者 Mamoun FILALI Kai HU Yongwang ZHAO Dianfu MA 《Frontiers of Computer Science》 SCIE EI CSCD 2016年第1期37-53,共17页
SIGNAL belongs to the synchronous languages family which are widely used in the design of safety-critical real-time systems such as avionics, space systems, and nu- clear power plants. This paper reports a compiler pr... SIGNAL belongs to the synchronous languages family which are widely used in the design of safety-critical real-time systems such as avionics, space systems, and nu- clear power plants. This paper reports a compiler prototype for SIGNAL. Compared with the existing SIGNAL com- piler, we propose a new intermediate representation (named S-CGA, a variant of clocked guarded actions), to integrate more synchronous programs into our compiler prototype in the future. The front-end of the compiler, i.e., the transla- tion from SIGNAL to S-CGA, is presented. As well, the proof of semantics preservation is mechanized in the theo- rem prover Coq. Moreover, we present the back-end of the compiler, including sequential code generation and multi- threaded code generation with time-predictable properties. With the rising importance of multi-core processors in safety- critical embedded systems or cyber-physical systems (CPS), there is a growing need for model-driven generation of multi- threaded code and thus mapping on multi-core. We propose a time-predictable multi-core architecture model in archi- tecture analysis and design language (AADL), and map the multi-threaded code to this model. 展开更多
关键词 synchronous languages SIGNAL guarded ac-tions verified compiler COQ architecture analysis and designlanguage (AADL)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部