17 research outputs found

    Convergence of Intelligent Data Acquisition and Advanced Computing Systems

    Get PDF
    This book is a collection of published articles from the Sensors Special Issue on "Convergence of Intelligent Data Acquisition and Advanced Computing Systems". It includes extended versions of the conference contributions from the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS’2019), Metz, France, as well as external contributions

    Π‘ΠΈΠ½Ρ‚Π΅Π· самопровСряСмых ΠΊΠΎΠΌΠ±ΠΈΠ½Π°Ρ†ΠΈΠΎΠ½Π½Ρ‹Ρ… устройств Π½Π° основС ΠΊΠΎΠ΄ΠΎΠ² с эффСктивным ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠ΅Π½ΠΈΠ΅ΠΌ симмСтричных ошибок

    Get PDF
    The methods of fault-tolerant coding are often used in the designing of reliable and safety components of automatic control systems: both in the data transmission between system nodes, and at the level of hardware and software architecture. The redundant coding is widely used in the management of combinational logic devices control. In this case, codes, which are oriented to the error detection rather than correction of this, are in use. Such features of codes make it possible to implement the checkable automation systems with acceptable redundancy, which does not exceed the redundancy in the situation of duplication using. The paper highlights the method of the synthesis of self-checking combinational devices, which makes it possible to take into account the features of the source devices architecture, as well as the properties of error detection by redundant codes in solving the problem of the synthesis of technical means for diagnosis. The paper gives the basic information on the theory of the checkable digital systems synthesis on the basis of redundant codes with summation. The basic stages of the analysis of the diagnosis objects topologies are determined with the selection of groups of outputs β€” groups of structurally and functionally symmetrically independent devices outputs. The formulas are given to determine the presence or the absence of a symmetrical dependence of the diagnosis object outputs. The example illustrating the calculation process is given. The main stages of the analysis of the redundant codes application in the error detection on the functionally symmetric dependent outputs are formulated. The algorithm of the synthesis of the self-checking combinational devices with taking into account the object of diagnosis structure features and the redundant codes properties is proposed.ΠŸΡ€ΠΈ создании Π½Π°Π΄Π΅ΠΆΠ½Ρ‹Ρ… ΠΈ бСзопасных ΠΊΠΎΠΌΠΏΠΎΠ½Π΅Π½Ρ‚ΠΎΠ² систСм автоматичСского управлСния часто ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΡŽΡ‚ΡΡ ΠΌΠ΅Ρ‚ΠΎΠ΄Ρ‹ помСхоустойчивого кодирования β€” ΠΊΠ°ΠΊ ΠΏΡ€ΠΈ ΠΏΠ΅Ρ€Π΅Π΄Π°Ρ‡Π΅ Π΄Π°Π½Π½Ρ‹Ρ… ΠΌΠ΅ΠΆΠ΄Ρƒ ΡƒΠ·Π»Π°ΠΌΠΈ систСмы, Ρ‚Π°ΠΊ ΠΈ Π½Π° ΡƒΡ€ΠΎΠ²Π½Π΅ Π°Ρ€Ρ…ΠΈΡ‚Π΅ΠΊΡ‚ΡƒΡ€Ρ‹ Π°ΠΏΠΏΠ°Ρ€Π°Ρ‚Π½Ρ‹Ρ… ΠΈ ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΠ½Ρ‹Ρ… срСдств. Π¨ΠΈΡ€ΠΎΠΊΠΎ примСняСтся ΠΈΠ·Π±Ρ‹Ρ‚ΠΎΡ‡Π½ΠΎΠ΅ ΠΊΠΎΠ΄ΠΈΡ€ΠΎΠ²Π°Π½ΠΈΠ΅ ΠΏΡ€ΠΈ ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ контроля ΠΊΠΎΠΌΠ±ΠΈΠ½Π°Ρ†ΠΈΠΎΠ½Π½Ρ‹Ρ… логичСских устройств. ΠŸΡ€ΠΈ этом ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΡŽΡ‚ΡΡ ΠΊΠΎΠ΄Ρ‹, ΠΎΡ€ΠΈΠ΅Π½Ρ‚ΠΈΡ€ΠΎΠ²Π°Π½Π½Ρ‹Π΅ ΠΈΠΌΠ΅Π½Π½ΠΎ Π½Π° ΠΎΠ±Π½Π°Ρ€ΡƒΠΆΠ΅Π½ΠΈΠ΅, Π° Π½Π΅ исправлСниС ошибок. Π’Π°ΠΊΠΈΠ΅ особСнности ΠΊΠΎΠ΄ΠΎΠ² ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‚ Ρ€Π΅Π°Π»ΠΈΠ·ΠΎΠ²Ρ‹Π²Π°Ρ‚ΡŒ ΠΊΠΎΠ½Ρ‚Ρ€ΠΎΠ»Π΅ΠΏΡ€ΠΈΠ³ΠΎΠ΄Π½Ρ‹Π΅ систСмы Π°Π²Ρ‚ΠΎΠΌΠ°Ρ‚ΠΈΠΊΠΈ с ΠΏΡ€ΠΈΠ΅ΠΌΠ»Π΅ΠΌΠΎΠΉ ΠΈΠ·Π±Ρ‹Ρ‚ΠΎΡ‡Π½ΠΎΡΡ‚ΡŒΡŽ, Π½Π΅ ΠΏΡ€Π΅Π²Ρ‹ΡˆΠ°ΡŽΡ‰Π΅ΠΉ избыточности ΠΏΡ€ΠΈ использовании дублирования. Π’ ΡΡ‚Π°Ρ‚ΡŒΠ΅ освСщаСтся ΠΌΠ΅Ρ‚ΠΎΠ΄ синтСза самопровСряСмых ΠΊΠΎΠΌΠ±ΠΈΠ½Π°Ρ†ΠΈΠΎΠ½Π½Ρ‹Ρ… устройств, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠΉ ΡƒΡ‡ΠΈΡ‚Ρ‹Π²Π°Ρ‚ΡŒ ΠΏΡ€ΠΈ Ρ€Π΅ΡˆΠ΅Π½ΠΈΠΈ Π·Π°Π΄Π°Ρ‡ΠΈ синтСза тСхничСских срСдств диагностирования особСнности Π°Ρ€Ρ…ΠΈΡ‚Π΅ΠΊΡ‚ΡƒΡ€Ρ‹ исходных устройств, Π° Ρ‚Π°ΠΊΠΆΠ΅ свойства обнаруТСния ошибок ΠΈΠ·Π±Ρ‹Ρ‚ΠΎΡ‡Π½Ρ‹ΠΌΠΈ ΠΊΠΎΠ΄Π°ΠΌΠΈ. Π”Π°ΡŽΡ‚ΡΡ Π±Π°Π·ΠΎΠ²Ρ‹Π΅ свСдСния ΠΈΠ· Ρ‚Π΅ΠΎΡ€ΠΈΠΈ синтСза ΠΊΠΎΠ½Ρ‚Ρ€ΠΎΠ»Π΅ΠΏΡ€ΠΈΠ³ΠΎΠ΄Π½Ρ‹Ρ… дискрСтных систСм Π½Π° основС ΠΈΠ·Π±Ρ‹Ρ‚ΠΎΡ‡Π½Ρ‹Ρ… ΠΊΠΎΠ΄ΠΎΠ² с суммированиСм. ΠžΠΏΡ€Π΅Π΄Π΅Π»Π΅Π½Ρ‹ ΠΊΠ»ΡŽΡ‡Π΅Π²Ρ‹Π΅ этапы Π°Π½Π°Π»ΠΈΠ·Π° Ρ‚ΠΎΠΏΠΎΠ»ΠΎΠ³ΠΈΠΉ ΠΎΠ±ΡŠΠ΅ΠΊΡ‚ΠΎΠ² диагностирования с Π²Ρ‹Π΄Π΅Π»Π΅Π½ΠΈΠ΅ΠΌ ΡΠΏΠ΅Ρ†ΠΈΠ°Π»ΡŒΠ½Ρ‹Ρ… Π³Ρ€ΡƒΠΏΠΏ Π²Ρ‹Ρ…ΠΎΠ΄ΠΎΠ² β€” Π³Ρ€ΡƒΠΏΠΏ структурно ΠΈ Ρ„ΡƒΠ½ΠΊΡ†ΠΈΠΎΠ½Π°Π»ΡŒΠ½ΠΎ симмСтрично нСзависимых Π²Ρ‹Ρ…ΠΎΠ΄ΠΎΠ² устройств. ΠŸΡ€ΠΈΠ²ΠΎΠ΄ΡΡ‚ΡΡ Ρ„ΠΎΡ€ΠΌΡƒΠ»Ρ‹, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ ΡƒΡΡ‚Π°Π½ΠΎΠ²ΠΈΡ‚ΡŒ Π½Π°Π»ΠΈΡ‡ΠΈΠ΅ ΠΈΠ»ΠΈ отсутствиС симмСтричной зависимости Π²Ρ‹Ρ…ΠΎΠ΄ΠΎΠ² ΠΎΠ±ΡŠΠ΅ΠΊΡ‚Π° диагностирования. ДаСтся ΠΏΡ€ΠΈΠΌΠ΅Ρ€, ΠΈΠ»Π»ΡŽΡΡ‚Ρ€ΠΈΡ€ΡƒΡŽΡ‰ΠΈΠΉ процСсс вычислСний. Π‘Ρ„ΠΎΡ€ΠΌΡƒΠ»ΠΈΡ€ΠΎΠ²Π°Π½Ρ‹ основныС этапы Π°Π½Π°Π»ΠΈΠ·Π° примСнСния ΠΈΠ·Π±Ρ‹Ρ‚ΠΎΡ‡Π½Ρ‹Ρ… ΠΊΠΎΠ΄ΠΎΠ² ΠΏΡ€ΠΈ выявлСнии ошибок Π½Π° Ρ„ΡƒΠ½ΠΊΡ†ΠΈΠΎΠ½Π°Π»ΡŒΠ½ΠΎ симмСтрично зависимых Π²Ρ‹Ρ…ΠΎΠ΄Π°Ρ…. Π”Π°Π½ Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌ синтСза самопровСряСмых логичСских устройств с ΡƒΡ‡Π΅Ρ‚ΠΎΠΌ особСнностСй структуры ΠΎΠ±ΡŠΠ΅ΠΊΡ‚Π° диагностирования ΠΈ свойств ΠΈΠ·Π±Ρ‹Ρ‚ΠΎΡ‡Π½Ρ‹Ρ… ΠΊΠΎΠ΄ΠΎΠ²

    Analysis of safety critical plc code against IEC 1508 development techniques

    Get PDF
    The aim of this thesis is to assess the applicability of recommended software development techniques defined in IEC 1508 [8] to PLC (Programmable Logic Controller) code developed for offshore oil platforms. The draft standard TEC 1508 contains specific recommendations which have the objective of improving the safety characteristics of safety critical code The recommended techniques could have one of the following characteristics with regard to offshore PLC code: β€’ They are already used in the development of code. β€’ They could be used in the development of the code. β€’ They could not be used due to the application domain. β€’ They could not be used due to the specific programming environment analysed. It was the aim of the thesis to characterise a subset of the IEC 1508 techniques into the above categories. The analysis was requested by the Health and Safety Executive (HSE) Offshore Division. The analysis has been performed using two major case studies, taken from live industrial safety-critical systems operating on a North Sea Oil Platform; they both comprise 300K lines of code in total. Both systems were written in three high level PLC languages. It was decided to translate the code into one language, so the analysis was undertaken in terms of a single language. A translator has been written, and a number of static analysis tools, therefore allowing all the code to be analysed. The key twenty two recommendations from IEC 1508 have been selected, and the case study systems correspondingly analysed, using a modified Goal Question Metric (GQM) approach as a unified framework. The overall analysis method has been found to be successful in supporting the detailed analysis of IEC 1508 recommendations. The thesis presents detailed conclusions on each analysed technique, as well as more general observations on the PLC code

    IS Reviews 1999

    Get PDF

    Organizational resilience through quality management: a study on the impact of the implementation of quality management principles on resourcefulness

    Get PDF
    As Darwin noted, β€œit's not the strongest species that survive, nor the most intelligent, but the most responsive to change”. Organizations have long been investing heavily to ascertain a better future, in particular, they have embraced quality management systems in pursuit of their goals. However, change and adverse conditions necessitate not only quality and high performance, but also resilience. This research aims to investigate the relationship between quality management and organizational resilience. It examines the impact ISO 9001 implementation has on resourcefulness (the main component of resilience) in public organizations. It also examines how organizational structure affects the relationship between ISO 9001 implementation and resourcefulness. Using semi-structured interviews, the research seeks to address the gap in the literature regarding the potential impact quality management initiatives have on resourcefulness. The study contributes to the body of knowledge by integrating and expanding the literature on resourcefulness. It will also provide empirical evidence on the proposed relationships. For more robustness, an insider-outsider approach is used for knowledgeable reflection on the findings by a senior and experienced member of the studied organization. The findings show that ISO does positively impact resilience within the context of the research. However, the impact attenuates under routine-based environments, while it flourishes under process-orientation. The findings demonstrate that the organizational structure plays the most important role when it comes to organizational resilience, indirectly by facilitating the implementation of the quality management system and directly by enhancing resourcefulness; thus, resilience

    Cognitive Behavioral Therapy

    Get PDF
    Cognitive behavioral therapy (CBT) is a modern type of short-term psychotherapy that integrates cognitive and behavioral theories. The CBT approach is effective in the treatment of a wide range of mental issues and conditions, such as generalized anxiety disorders, general or post-traumatic stress, panic attacks, depression, eating and sleep dysfunctions, obsessive–compulsive disorders, and substance dependence. CBT is also effective as an intervention for psychotic, personality, and bipolar disorders or to approach fatigue and chronic pain conditions especially if associated with distress. This book explains both theoretical and practical aspects of CBT, along with case examples, and contains useful tools and specific interventions for different psychological situations

    Data Service Outsourcing and Privacy Protection in Mobile Internet

    Get PDF
    Mobile Internet data have the characteristics of large scale, variety of patterns, and complex association. On the one hand, it needs efficient data processing model to provide support for data services, and on the other hand, it needs certain computing resources to provide data security services. Due to the limited resources of mobile terminals, it is impossible to complete large-scale data computation and storage. However, outsourcing to third parties may cause some risks in user privacy protection. This monography focuses on key technologies of data service outsourcing and privacy protection, including the existing methods of data analysis and processing, the fine-grained data access control through effective user privacy protection mechanism, and the data sharing in the mobile Internet
    corecore