Modeling technology has been introduced into software testing field. However, how to carry through the testing modeling effectively is still a difficulty. Based on combination of simulation modeling technology and emb...Modeling technology has been introduced into software testing field. However, how to carry through the testing modeling effectively is still a difficulty. Based on combination of simulation modeling technology and embedded real-time software testing method, the process of simulation testing modeling is studied first. And then, the supporting environment of simulation testing modeling is put forward. Furthermore, an approach of embedded real-time software simulation testing modeling including modeling of cross-linked equipments of system under testing (SUT), test case, testing scheduling, and testing system service is brought forward. Finally, the formalized description and execution system of testing models are given, with which we can realize real-time, closed loop, mad automated system testing for embedded real-time software.展开更多
The reliability of real-time embedded software directly determines the reliability of the whole real-time embedded sys- tem, and the effective software testing is an important way to ensure software quality and reliab...The reliability of real-time embedded software directly determines the reliability of the whole real-time embedded sys- tem, and the effective software testing is an important way to ensure software quality and reliability. Based on the analysis of the characteristics of real-time embedded software, the formal method is introduced into the real-time embedded software testing field and the real-time extended finite state machine (RT-EFSM) model is studied firstly. Then, the time zone division method of real-time embedded system is presented and the definition and description methods of time-constrained transition equivalence class (timeCTEC) are presented. Furthermore, the approaches of the testing sequence and test case generation are put forward. Finally, the proposed method is applied to a typical avionics real- time embedded software testing practice and the examples of the timeCTEC, testing sequences and test cases are given. With the analysis of the testing result, the application verification shows that the proposed method can effectively describe the real-time embedded software state transition characteristics and real-time requirements and play the advantages of the formal methods in accuracy, effectiveness and the automation supporting. Combined with the testing platform, the real-time, closed loop and automated simulation testing for real-time embedded software can be realized effectively.展开更多
Virtualization has gained great acceptance in the server and cloud computing arena. In recent years, it has also been widely applied to real-time embedded systems with stringent timing constraints. We present a compre...Virtualization has gained great acceptance in the server and cloud computing arena. In recent years, it has also been widely applied to real-time embedded systems with stringent timing constraints. We present a comprehensive survey on real-time issues in virtualization for embedded systems, covering popular virtualization systems including KVM, Xen, L4 and others.展开更多
The paper presents the embedded real-time software-oriented requirements engineering environment—SREZ. It involves the whole process of software requirements engineering, including the definition, analysis and checki...The paper presents the embedded real-time software-oriented requirements engineering environment—SREZ. It involves the whole process of software requirements engineering, including the definition, analysis and checking of requirements ,specifications. We first explain the principles of the executable specification language RTRSM. Subsequently, we introduce the main functions of SREE, illustrate the methods and techniques of checking requirements specifications, especially how to perform simulation execution, combining prototyping method with RTRSM and animated representations. At last, we compare the SREE with other requirements specifications methods and make a summary for SREE's advantages.展开更多
This article presents an embedded Smart Phone Operating System (SPOS) independently designed by ZTE Corporation. The SPOS is based on single kernel architecture with its multi-task real-time kernel supporting hardware...This article presents an embedded Smart Phone Operating System (SPOS) independently designed by ZTE Corporation. The SPOS is based on single kernel architecture with its multi-task real-time kernel supporting hardware platforms and resources of mainstream mobile phones. It has remarkable advantages such as highly efficient and dynamic power management, priority - based preemptive scheduling, fast startup, a variety of drivers, and excellent system stability and operability. For the development of upper layer communication protocols and application software, the SPOS provides wireless communication interfaces and the application program framework.展开更多
By combining fault-tolerance with power management, this paper developed a new method for aperiodic task set for the problem of task scheduling and voltage allocation in embedded real-time systems. The scbedulability ...By combining fault-tolerance with power management, this paper developed a new method for aperiodic task set for the problem of task scheduling and voltage allocation in embedded real-time systems. The scbedulability of the system was analyzed through checkpointing and the energy saving was considered via dynamic voltage and frequency scaling. Simulation results showed that the proposed algorithm had better performance compared with the existing voltage allocation techniques. The proposed technique saves 51.5% energy over FT-Only and 19.9% over FT + EC on average. Therefore, the proposed method was more appropriate for aperiodic tasks in embedded real-time systems.展开更多
Finding crucial vertices is a key problem for improving the reliability and ensuring the effective operation of networks,solved by approaches based on multiple attribute decision that suffer from ignoring the correlat...Finding crucial vertices is a key problem for improving the reliability and ensuring the effective operation of networks,solved by approaches based on multiple attribute decision that suffer from ignoring the correlation among each attribute or the heterogeneity between attribute and structure. To overcome these problems, a novel vertex centrality approach, called VCJG, is proposed based on joint nonnegative matrix factorization and graph embedding. The potential attributes with linearly independent and the structure information are captured automatically in light of nonnegative matrix factorization for factorizing the weighted adjacent matrix and the structure matrix, which is generated by graph embedding. And the smoothness strategy is applied to eliminate the heterogeneity between attributes and structure by joint nonnegative matrix factorization. Then VCJG integrates the above steps to formulate an overall objective function, and obtain the ultimately potential attributes fused the structure information of network through optimizing the objective function. Finally, the attributes are combined with neighborhood rules to evaluate vertex's importance. Through comparative analyses with experiments on nine real-world networks, we demonstrate that the proposed approach outperforms nine state-of-the-art algorithms for identification of vital vertices with respect to correlation, monotonicity and accuracy of top-10 vertices ranking.展开更多
Because of limited resource of embedded platforms, the computational complexity of advanced control algorithms raises significant challenges for the use of embedded systems in complex control field. A Scilab/Scicos ba...Because of limited resource of embedded platforms, the computational complexity of advanced control algorithms raises significant challenges for the use of embedded systems in complex control field. A Scilab/Scicos based embedded controller is developed on which various control software can be easily modeled, simulated, implemented, and evaluated to meet the ever-expanding requirements of industrial control applications. Built on the Cirrus Logic EP9315 ARM systems-on-chip board, this embedded controller is possible to develop complex embedded control systems that employ advanced control strategies in a rapid and cost-efficient fashion. Due to the free and open source nature of the software packages used, the cost of the embedded controller is minimized.展开更多
Complex event processing (CEP) can extract meaningful events for real-time locating system (RTLS) applications. To identify complex event accurately in RTLS, we propose a new RFID complex event processing method GEEP,...Complex event processing (CEP) can extract meaningful events for real-time locating system (RTLS) applications. To identify complex event accurately in RTLS, we propose a new RFID complex event processing method GEEP, which is based on the timed automata (TA) theory. By devising RFID locating application into complex events, we model the timing diagram of RFID data streams based on the TA. We optimize the constraint of the event streams and propose a novel method to derive the constraint between objects, as well as the constraint between object and location. Experiments prove the proposed method reduces the cost of RFID complex event processing, and improves the efficiency of the RTLS.展开更多
This paper describes specific constraints of vision systems that are dedicated to be embedded in mobile robots. If PC-based hardware architecture is convenient in this field because of its versatility, flexibility, pe...This paper describes specific constraints of vision systems that are dedicated to be embedded in mobile robots. If PC-based hardware architecture is convenient in this field because of its versatility, flexibility, performance, and cost, current real-time operating systems are not completely adapted to long processing with varying duration, and it is often necessary to oversize the system to guarantee fail-safe functioning. Also, interactions with other robotic tasks having more priority are difficult to handle. To answer this problem, we have developed a dynamically reconfigurable vision processing system, based on the innovative features of Cleopatre real-time applicative layer concerning scheduling and fault tolerance. This framework allows to define emergency and optional tasks to ensure a minimal quality of service for the other subsystems of the robot, while allowing to adapt dynamically vision processing chain to an exceptional overlasting vision process or processor overload. Thus, it allows a better cohabitation of several subsystems in a single hardware, and to develop less expensive but safe systems, as they will be designed for the regular case and not rare exceptional ones. Finally, it brings a new way to think and develop vision systems, with pairs of complementary operators.展开更多
This paper puts forward a new scheme of Embedded Numerical Control System based on ARM and DSP,which is at the base of research on traditional numerical control system and embedded technology.And the paper also descri...This paper puts forward a new scheme of Embedded Numerical Control System based on ARM and DSP,which is at the base of research on traditional numerical control system and embedded technology.And the paper also describes the develop- ment of hardware and software platform.All the development and realization are based on the idea of module design.The embed- ded numerical control system,using ARM and DSP to construct the main control platform,realizes the real-time operation of sys- tem and improves the stability and reliability with the modular designing ideas of hardware and software and with the support of embedded real-time operating system(uc/os-Ⅱ).And the system could realize the multi-network supporting,which is also accord with the development of modularization,flexibility and latticing of numerical control system.展开更多
Today, the number of embedded system was applied in the field of automation and control has far exceeded a variety of general-purpose computer. Embedded system is gradually penetrated into all fields of human society,...Today, the number of embedded system was applied in the field of automation and control has far exceeded a variety of general-purpose computer. Embedded system is gradually penetrated into all fields of human society, and ubiquitous embedded applications constitute the 'ubiquitous' computing era. Embedded operating system is the core of the em-bedded system, and it directly affects the performance of the whole system. Our Liaoning Provincial Key Laboratory of Embedded Technology has successfully developed five kinds of device-level embedded operating systems by more than ten years’ efforts, and these systems are Webit 5.0, Worix, μKernel, iDCX 128 and μc/os-II 128. This paper mainly analyses and compares the implementation mechanism and performance of these five kinds of device-level embedded operating systems in detail.展开更多
Graphic processing units (GPUs) have been widely recognized as cost-efficient co-processors with acceptable size, weight, and power consumption. However, adopting GPUs in real-time systems is still challenging, due ...Graphic processing units (GPUs) have been widely recognized as cost-efficient co-processors with acceptable size, weight, and power consumption. However, adopting GPUs in real-time systems is still challenging, due to the lack in framework for real-time analysis. In order to guarantee real-time requirements while maintaining system utilization ~in modern heterogeneous systems, such as multicore multi-GPU systems, a novel suspension-based k-exclusion real-time locking protocol and the associated suspension-aware schedulability analysis are proposed. The proposed protocol provides a synchronization framework that enables multiple GPUs to be efficiently integrated in multicore real-time systems. Comparative evaluations show that the proposed methods improve upon the existing work in terms of schedulability.展开更多
For the purpose of the monitor system in digital protection, the embedded real-time operating system (RTOS) and the embedded GUI (Graphical User Interface) is introduced to design the monitor system. Combining the nec...For the purpose of the monitor system in digital protection, the embedded real-time operating system (RTOS) and the embedded GUI (Graphical User Interface) is introduced to design the monitor system. Combining the necessity and the application value of the operation system, the choice of embedded Linux and Qt/Embedded is completely viable for the monitor system in digital protection for generator-transformer sets. The design with embedded Linux and embedded GUI enriches system information, increases developing efficiency and improve the generality.展开更多
The choice of methods or design languages is a crucial phase in the development of systems and software, also for real time and embedded systems. An open question that remains in the design of these types of systems i...The choice of methods or design languages is a crucial phase in the development of systems and software, also for real time and embedded systems. An open question that remains in the design of these types of systems is to build a method, or to choose one among those existing, capable to cover the life cycle of a project, and particularly the development phases. This article contributes to answer the question, by proposing an approach based on a multi-criteria comparative study, of few languages and methods dedicated to the design of real time and embedded systems. The underlying objective of this work is to present to designers a wide range of approaches, and elements that can guide their choices. In order to reach this goal, we propose different comparison criteria. Each criterion is divided into sub-criteria, so that the designers can refine their choices according to the qualities they prefer and wish to have in the method or language. We also define a rating scale which is used to assess the retained languages and methods. The scores obtained from this assessment are presented in tables, one table per criterion, followed by a summary table giving the overall scores. Graphics built from these tables are provided and intend to facilitate the judgement and thus the choice of the designers.展开更多
High quality of security and guaranteed real-time requirements are two key goals of mission- critical embedded storage systems. But most existing real-time disk scheduling algorithms do not consider improving security...High quality of security and guaranteed real-time requirements are two key goals of mission- critical embedded storage systems. But most existing real-time disk scheduling algorithms do not consider improving security performance of disk requests. A security-aware periodic-write (SAPW) scheduling algorithm is proposed to judiciously select appropriate security level for each disk request to maximize security value of N periodic disk users, while without sacrificing timing constraint of each user. Simulation results show the significant effectiveness of SAPW algorithm, and the average security improvement is up to 223.6% over other three algorithms.展开更多
With the development of smart grid, operation and control of a power system can be realized through the power communication network, especially the power production and enterprise management business involve a large a...With the development of smart grid, operation and control of a power system can be realized through the power communication network, especially the power production and enterprise management business involve a large amount of sensitive information, and the requirements for data security and real-time transmission are gradually improved. In this paper, a new 9-dimensional(9D) complex chaotic system with quaternion is proposed for the encryption of smart grid data. Firstly, we present the mathematical model of the system, and analyze its attractors, bifurcation diagram, complexity,and 0–1 test. Secondly, the pseudo-random sequences are generated by the new chaotic system to encrypt power data.Finally, the proposed encryption algorithm is verified with power data and images in the smart grid, which can ensure the encryption security and real time. The verification results show that the proposed encryption scheme is technically feasible and available for power data and image encryption in smart grid.展开更多
Severe well interference through complex fracture networks(CFNs)can be observed among multi-well pads in low permeability reservoirs.The well interference analysis between multi-fractured horizontal wells(MFHWs)is vit...Severe well interference through complex fracture networks(CFNs)can be observed among multi-well pads in low permeability reservoirs.The well interference analysis between multi-fractured horizontal wells(MFHWs)is vitally important for reservoir effective development.Well interference has been historically investigated by pressure transient analysis,while it has shown that rate transient analysis has great potential in well interference diagnosis.However,the impact of complex fracture networks(CFNs)on rate transient behavior of parent well and child well in unconventional reservoirs is still not clear.To further investigate,this paper develops an integrated approach combining pressure and rate transient analysis for well interference diagnosis considering CFNs.To perform multi-well simulation considering CFNs,non-intrusive embedded discrete fracture model approach was applied for coupling fracture with reservoir models.The impact of CFN including natural fractures and frac-hits on pressure and rate transient behavior in multi-well system was investigated.On a logelog plot,interference flow and compound linear flow are two new flow regimes caused by nearby producers.When both NFs and frac-hits are present in the reservoir,frac-hits have a greater impact on well#1 which contains frac-hits,and NFs have greater impact on well#3 which does not have frac-hits.For all well producing circumstances,it might be challenging to see divergence during pseudosteady state flow brought on by frac-hits on the logelog plot.Besides,when NFs occur,reservoir depletion becomes noticeable in comparison to frac-hits in pressure distribution.Application of this integrated approach demonstrates that it works well to characterize the well interference among different multi-fractured horizontal wells in a well pad.Better reservoir evaluation can be acquired based on the new features observed in the novel model,demonstrating the practicability of the proposed approach.The findings of this study can help for better evaluating well interference degree in multi-well systems combing PTA and RTA,which can reduce the uncertainty and improve the accuracy of the well interference analysis based on both field pressure and rate data.展开更多
Role-based network embedding aims to embed role-similar nodes into a similar embedding space,which is widely used in graph mining tasks such as role classification and detection.Roles are sets of nodes in graph networ...Role-based network embedding aims to embed role-similar nodes into a similar embedding space,which is widely used in graph mining tasks such as role classification and detection.Roles are sets of nodes in graph networks with similar structural patterns and functions.However,the rolesimilar nodes may be far away or even disconnected from each other.Meanwhile,the neighborhood node features and noise also affect the result of the role-based network embedding,which are also challenges of current network embedding work.In this paper,we propose a Role-based network Embedding via Quantum walk with weighted Features fusion(REQF),which simultaneously considers the influence of global and local role information,node features,and noise.Firstly,we capture the global role information of nodes via quantum walk based on its superposition property which emphasizes the local role information via biased quantum walk.Secondly,we utilize the quantum walkweighted characteristic function to extract and fuse features of nodes and their neighborhood by different distributions which contain role information implicitly.Finally,we leverage the Variational Auto-Encoder(VAE)to reduce the effect of noise.We conduct extensive experiments on seven real-world datasets,and the results show that REQF is more effective at capturing role information in the network,which outperforms the best baseline by up to 14.6% in role classification,and 23% in role detection on average.展开更多
Well interference has become a common phenomenon with the increasing scale of horizontal well fracturing.Recent studies on well interference in horizontal wells do not properly reflect the physical model of the postfr...Well interference has become a common phenomenon with the increasing scale of horizontal well fracturing.Recent studies on well interference in horizontal wells do not properly reflect the physical model of the postfracturing well groups and the realistic fracturing process of infill wells.Establishing the correspondence between well interference causative factors and manifestations is of great significance for infill well deployment and secondary oil recovery.In this work,we develop a numerical model that considers low velocity non-Darcy seepage inshale reservoirs to study the inter-well interferencephenomenon that occurs in theSantanghufield,andconstruct an explicit hydraulic fracture and complex natural fracture network model with an embedded discrete fracture model,focusing on the effect of fracture network morphology on well interactions.The model also considers a multi-segment wellbore model to accommodate the effect of inter-well crossflow on wellbore tubular flow.The changes in formation pressure and water saturation during fracturing are performed by controlling the injection pressure and water injection rate.The result shows that the shape of the fracture network generated by the infill well with the old well determines the subsequent fluid and oil-increasing performance of the disturbed well.The synergistic production or competitive relationship formed by fractures with different connectivity between the two wells determines the positive and negative effects of the interference.The paper also investigates the adaptation study of water injection huff and puff schemes for well groups with different connectivity,and demonstrated a potential yield increase of up to 10.85%under adaptation injection.This method of identifying well interference based on the production dynamics of affected wells and the subsequent corresponding water injection method provides valuable references for the selection of secondary oil recovery measures.展开更多
文摘Modeling technology has been introduced into software testing field. However, how to carry through the testing modeling effectively is still a difficulty. Based on combination of simulation modeling technology and embedded real-time software testing method, the process of simulation testing modeling is studied first. And then, the supporting environment of simulation testing modeling is put forward. Furthermore, an approach of embedded real-time software simulation testing modeling including modeling of cross-linked equipments of system under testing (SUT), test case, testing scheduling, and testing system service is brought forward. Finally, the formalized description and execution system of testing models are given, with which we can realize real-time, closed loop, mad automated system testing for embedded real-time software.
基金supported by the Aviation Science Foundation of China
文摘The reliability of real-time embedded software directly determines the reliability of the whole real-time embedded sys- tem, and the effective software testing is an important way to ensure software quality and reliability. Based on the analysis of the characteristics of real-time embedded software, the formal method is introduced into the real-time embedded software testing field and the real-time extended finite state machine (RT-EFSM) model is studied firstly. Then, the time zone division method of real-time embedded system is presented and the definition and description methods of time-constrained transition equivalence class (timeCTEC) are presented. Furthermore, the approaches of the testing sequence and test case generation are put forward. Finally, the proposed method is applied to a typical avionics real- time embedded software testing practice and the examples of the timeCTEC, testing sequences and test cases are given. With the analysis of the testing result, the application verification shows that the proposed method can effectively describe the real-time embedded software state transition characteristics and real-time requirements and play the advantages of the formal methods in accuracy, effectiveness and the automation supporting. Combined with the testing platform, the real-time, closed loop and automated simulation testing for real-time embedded software can be realized effectively.
文摘Virtualization has gained great acceptance in the server and cloud computing arena. In recent years, it has also been widely applied to real-time embedded systems with stringent timing constraints. We present a comprehensive survey on real-time issues in virtualization for embedded systems, covering popular virtualization systems including KVM, Xen, L4 and others.
基金Supported by the National Natural Science Foun-dation of China(69873035) the K.C. Wong Education Foundation,Hong Kong,China
文摘The paper presents the embedded real-time software-oriented requirements engineering environment—SREZ. It involves the whole process of software requirements engineering, including the definition, analysis and checking of requirements ,specifications. We first explain the principles of the executable specification language RTRSM. Subsequently, we introduce the main functions of SREE, illustrate the methods and techniques of checking requirements specifications, especially how to perform simulation execution, combining prototyping method with RTRSM and animated representations. At last, we compare the SREE with other requirements specifications methods and make a summary for SREE's advantages.
文摘This article presents an embedded Smart Phone Operating System (SPOS) independently designed by ZTE Corporation. The SPOS is based on single kernel architecture with its multi-task real-time kernel supporting hardware platforms and resources of mainstream mobile phones. It has remarkable advantages such as highly efficient and dynamic power management, priority - based preemptive scheduling, fast startup, a variety of drivers, and excellent system stability and operability. For the development of upper layer communication protocols and application software, the SPOS provides wireless communication interfaces and the application program framework.
基金The National Natural Science Foundationof China(No.60873030 )the National High-Tech Research and Development Plan of China(863 Program)(No.2007AA01Z309)
文摘By combining fault-tolerance with power management, this paper developed a new method for aperiodic task set for the problem of task scheduling and voltage allocation in embedded real-time systems. The scbedulability of the system was analyzed through checkpointing and the energy saving was considered via dynamic voltage and frequency scaling. Simulation results showed that the proposed algorithm had better performance compared with the existing voltage allocation techniques. The proposed technique saves 51.5% energy over FT-Only and 19.9% over FT + EC on average. Therefore, the proposed method was more appropriate for aperiodic tasks in embedded real-time systems.
基金Project supported by the National Natural Science Foundation of China (Grant Nos.62162040 and 11861045)。
文摘Finding crucial vertices is a key problem for improving the reliability and ensuring the effective operation of networks,solved by approaches based on multiple attribute decision that suffer from ignoring the correlation among each attribute or the heterogeneity between attribute and structure. To overcome these problems, a novel vertex centrality approach, called VCJG, is proposed based on joint nonnegative matrix factorization and graph embedding. The potential attributes with linearly independent and the structure information are captured automatically in light of nonnegative matrix factorization for factorizing the weighted adjacent matrix and the structure matrix, which is generated by graph embedding. And the smoothness strategy is applied to eliminate the heterogeneity between attributes and structure by joint nonnegative matrix factorization. Then VCJG integrates the above steps to formulate an overall objective function, and obtain the ultimately potential attributes fused the structure information of network through optimizing the objective function. Finally, the attributes are combined with neighborhood rules to evaluate vertex's importance. Through comparative analyses with experiments on nine real-world networks, we demonstrate that the proposed approach outperforms nine state-of-the-art algorithms for identification of vital vertices with respect to correlation, monotonicity and accuracy of top-10 vertices ranking.
基金supported in part by the National Natural Science Foundation under Grant No.61070003,No.61272020,and No.61071128Zhejiang Provincial Natural Science Foundation under Grant No.R1090052 and No.Y1101184
文摘Because of limited resource of embedded platforms, the computational complexity of advanced control algorithms raises significant challenges for the use of embedded systems in complex control field. A Scilab/Scicos based embedded controller is developed on which various control software can be easily modeled, simulated, implemented, and evaluated to meet the ever-expanding requirements of industrial control applications. Built on the Cirrus Logic EP9315 ARM systems-on-chip board, this embedded controller is possible to develop complex embedded control systems that employ advanced control strategies in a rapid and cost-efficient fashion. Due to the free and open source nature of the software packages used, the cost of the embedded controller is minimized.
文摘Complex event processing (CEP) can extract meaningful events for real-time locating system (RTLS) applications. To identify complex event accurately in RTLS, we propose a new RFID complex event processing method GEEP, which is based on the timed automata (TA) theory. By devising RFID locating application into complex events, we model the timing diagram of RFID data streams based on the TA. We optimize the constraint of the event streams and propose a novel method to derive the constraint between objects, as well as the constraint between object and location. Experiments prove the proposed method reduces the cost of RFID complex event processing, and improves the efficiency of the RTLS.
基金This work was supported by the French research office(No.01 K 0742)under the Cléopatre project.
文摘This paper describes specific constraints of vision systems that are dedicated to be embedded in mobile robots. If PC-based hardware architecture is convenient in this field because of its versatility, flexibility, performance, and cost, current real-time operating systems are not completely adapted to long processing with varying duration, and it is often necessary to oversize the system to guarantee fail-safe functioning. Also, interactions with other robotic tasks having more priority are difficult to handle. To answer this problem, we have developed a dynamically reconfigurable vision processing system, based on the innovative features of Cleopatre real-time applicative layer concerning scheduling and fault tolerance. This framework allows to define emergency and optional tasks to ensure a minimal quality of service for the other subsystems of the robot, while allowing to adapt dynamically vision processing chain to an exceptional overlasting vision process or processor overload. Thus, it allows a better cohabitation of several subsystems in a single hardware, and to develop less expensive but safe systems, as they will be designed for the regular case and not rare exceptional ones. Finally, it brings a new way to think and develop vision systems, with pairs of complementary operators.
文摘This paper puts forward a new scheme of Embedded Numerical Control System based on ARM and DSP,which is at the base of research on traditional numerical control system and embedded technology.And the paper also describes the develop- ment of hardware and software platform.All the development and realization are based on the idea of module design.The embed- ded numerical control system,using ARM and DSP to construct the main control platform,realizes the real-time operation of sys- tem and improves the stability and reliability with the modular designing ideas of hardware and software and with the support of embedded real-time operating system(uc/os-Ⅱ).And the system could realize the multi-network supporting,which is also accord with the development of modularization,flexibility and latticing of numerical control system.
文摘Today, the number of embedded system was applied in the field of automation and control has far exceeded a variety of general-purpose computer. Embedded system is gradually penetrated into all fields of human society, and ubiquitous embedded applications constitute the 'ubiquitous' computing era. Embedded operating system is the core of the em-bedded system, and it directly affects the performance of the whole system. Our Liaoning Provincial Key Laboratory of Embedded Technology has successfully developed five kinds of device-level embedded operating systems by more than ten years’ efforts, and these systems are Webit 5.0, Worix, μKernel, iDCX 128 and μc/os-II 128. This paper mainly analyses and compares the implementation mechanism and performance of these five kinds of device-level embedded operating systems in detail.
基金supported by the National Natural Science Foundation of China under Grant No.61003032/F020207
文摘Graphic processing units (GPUs) have been widely recognized as cost-efficient co-processors with acceptable size, weight, and power consumption. However, adopting GPUs in real-time systems is still challenging, due to the lack in framework for real-time analysis. In order to guarantee real-time requirements while maintaining system utilization ~in modern heterogeneous systems, such as multicore multi-GPU systems, a novel suspension-based k-exclusion real-time locking protocol and the associated suspension-aware schedulability analysis are proposed. The proposed protocol provides a synchronization framework that enables multiple GPUs to be efficiently integrated in multicore real-time systems. Comparative evaluations show that the proposed methods improve upon the existing work in terms of schedulability.
文摘For the purpose of the monitor system in digital protection, the embedded real-time operating system (RTOS) and the embedded GUI (Graphical User Interface) is introduced to design the monitor system. Combining the necessity and the application value of the operation system, the choice of embedded Linux and Qt/Embedded is completely viable for the monitor system in digital protection for generator-transformer sets. The design with embedded Linux and embedded GUI enriches system information, increases developing efficiency and improve the generality.
文摘The choice of methods or design languages is a crucial phase in the development of systems and software, also for real time and embedded systems. An open question that remains in the design of these types of systems is to build a method, or to choose one among those existing, capable to cover the life cycle of a project, and particularly the development phases. This article contributes to answer the question, by proposing an approach based on a multi-criteria comparative study, of few languages and methods dedicated to the design of real time and embedded systems. The underlying objective of this work is to present to designers a wide range of approaches, and elements that can guide their choices. In order to reach this goal, we propose different comparison criteria. Each criterion is divided into sub-criteria, so that the designers can refine their choices according to the qualities they prefer and wish to have in the method or language. We also define a rating scale which is used to assess the retained languages and methods. The scores obtained from this assessment are presented in tables, one table per criterion, followed by a summary table giving the overall scores. Graphics built from these tables are provided and intend to facilitate the judgement and thus the choice of the designers.
基金supported by the National 863 Program under Grant No.2006AA01Z173 and 2007AA01Z131
文摘High quality of security and guaranteed real-time requirements are two key goals of mission- critical embedded storage systems. But most existing real-time disk scheduling algorithms do not consider improving security performance of disk requests. A security-aware periodic-write (SAPW) scheduling algorithm is proposed to judiciously select appropriate security level for each disk request to maximize security value of N periodic disk users, while without sacrificing timing constraint of each user. Simulation results show the significant effectiveness of SAPW algorithm, and the average security improvement is up to 223.6% over other three algorithms.
基金Project supported by the International Collaborative Research Project of Qilu University of Technology (Grant No.QLUTGJHZ2018020)the Project of Youth Innovation and Technology Support Plan for Colleges and Universities in Shandong Province,China (Grant No.2021KJ025)the Major Scientific and Technological Innovation Projects of Shandong Province,China (Grant Nos.2019JZZY010731 and 2020CXGC010901)。
文摘With the development of smart grid, operation and control of a power system can be realized through the power communication network, especially the power production and enterprise management business involve a large amount of sensitive information, and the requirements for data security and real-time transmission are gradually improved. In this paper, a new 9-dimensional(9D) complex chaotic system with quaternion is proposed for the encryption of smart grid data. Firstly, we present the mathematical model of the system, and analyze its attractors, bifurcation diagram, complexity,and 0–1 test. Secondly, the pseudo-random sequences are generated by the new chaotic system to encrypt power data.Finally, the proposed encryption algorithm is verified with power data and images in the smart grid, which can ensure the encryption security and real time. The verification results show that the proposed encryption scheme is technically feasible and available for power data and image encryption in smart grid.
基金The authors are grateful to the financial support from China Postdoctoral Science Foundation(2022M712645)Opening Fund of Key Laboratory of Enhanced Oil Recovery(Northeast Petroleum University),Ministry of Education(NEPU-EOR-2021-03).
文摘Severe well interference through complex fracture networks(CFNs)can be observed among multi-well pads in low permeability reservoirs.The well interference analysis between multi-fractured horizontal wells(MFHWs)is vitally important for reservoir effective development.Well interference has been historically investigated by pressure transient analysis,while it has shown that rate transient analysis has great potential in well interference diagnosis.However,the impact of complex fracture networks(CFNs)on rate transient behavior of parent well and child well in unconventional reservoirs is still not clear.To further investigate,this paper develops an integrated approach combining pressure and rate transient analysis for well interference diagnosis considering CFNs.To perform multi-well simulation considering CFNs,non-intrusive embedded discrete fracture model approach was applied for coupling fracture with reservoir models.The impact of CFN including natural fractures and frac-hits on pressure and rate transient behavior in multi-well system was investigated.On a logelog plot,interference flow and compound linear flow are two new flow regimes caused by nearby producers.When both NFs and frac-hits are present in the reservoir,frac-hits have a greater impact on well#1 which contains frac-hits,and NFs have greater impact on well#3 which does not have frac-hits.For all well producing circumstances,it might be challenging to see divergence during pseudosteady state flow brought on by frac-hits on the logelog plot.Besides,when NFs occur,reservoir depletion becomes noticeable in comparison to frac-hits in pressure distribution.Application of this integrated approach demonstrates that it works well to characterize the well interference among different multi-fractured horizontal wells in a well pad.Better reservoir evaluation can be acquired based on the new features observed in the novel model,demonstrating the practicability of the proposed approach.The findings of this study can help for better evaluating well interference degree in multi-well systems combing PTA and RTA,which can reduce the uncertainty and improve the accuracy of the well interference analysis based on both field pressure and rate data.
基金supported in part by the National Nature Science Foundation of China(Grant 62172065)the Natural Science Foundation of Chongqing(Grant cstc2020jcyjmsxmX0137).
文摘Role-based network embedding aims to embed role-similar nodes into a similar embedding space,which is widely used in graph mining tasks such as role classification and detection.Roles are sets of nodes in graph networks with similar structural patterns and functions.However,the rolesimilar nodes may be far away or even disconnected from each other.Meanwhile,the neighborhood node features and noise also affect the result of the role-based network embedding,which are also challenges of current network embedding work.In this paper,we propose a Role-based network Embedding via Quantum walk with weighted Features fusion(REQF),which simultaneously considers the influence of global and local role information,node features,and noise.Firstly,we capture the global role information of nodes via quantum walk based on its superposition property which emphasizes the local role information via biased quantum walk.Secondly,we utilize the quantum walkweighted characteristic function to extract and fuse features of nodes and their neighborhood by different distributions which contain role information implicitly.Finally,we leverage the Variational Auto-Encoder(VAE)to reduce the effect of noise.We conduct extensive experiments on seven real-world datasets,and the results show that REQF is more effective at capturing role information in the network,which outperforms the best baseline by up to 14.6% in role classification,and 23% in role detection on average.
基金This work is supported by Open Fund Project“Study on Multiphase Flow Semi-Analytical Method for Horizontal Wells of Continental Shale Condensate Gas”of Sinopec Key Laboratory of Shale Oil/Gas Exploration and Production Technology.
文摘Well interference has become a common phenomenon with the increasing scale of horizontal well fracturing.Recent studies on well interference in horizontal wells do not properly reflect the physical model of the postfracturing well groups and the realistic fracturing process of infill wells.Establishing the correspondence between well interference causative factors and manifestations is of great significance for infill well deployment and secondary oil recovery.In this work,we develop a numerical model that considers low velocity non-Darcy seepage inshale reservoirs to study the inter-well interferencephenomenon that occurs in theSantanghufield,andconstruct an explicit hydraulic fracture and complex natural fracture network model with an embedded discrete fracture model,focusing on the effect of fracture network morphology on well interactions.The model also considers a multi-segment wellbore model to accommodate the effect of inter-well crossflow on wellbore tubular flow.The changes in formation pressure and water saturation during fracturing are performed by controlling the injection pressure and water injection rate.The result shows that the shape of the fracture network generated by the infill well with the old well determines the subsequent fluid and oil-increasing performance of the disturbed well.The synergistic production or competitive relationship formed by fractures with different connectivity between the two wells determines the positive and negative effects of the interference.The paper also investigates the adaptation study of water injection huff and puff schemes for well groups with different connectivity,and demonstrated a potential yield increase of up to 10.85%under adaptation injection.This method of identifying well interference based on the production dynamics of affected wells and the subsequent corresponding water injection method provides valuable references for the selection of secondary oil recovery measures.