489 research outputs found

    PCDT: Power Cabinet Diagnosis Tool

    Get PDF

    A Methodological Approach to Knowledge-Based Engineering Systems for Manufacturing

    Get PDF
    A survey of implementations of the knowledge-based engineering approach in different technological sectors is presented. The main objectives and techniques of examined applications are pointed out to illustrate the trends and peculiarities for a number of manufacturing field. Existing methods for the development of these engineering systems are then examined in order to identify critical aspects when applied to manufacturing. A new methodological approach is proposed to overcome some specific limitations that emerged from the above-mentioned survey. The aim is to provide an innovative method for the implementation of knowledge-based engineering applications in the field of industrial production. As a starting point, the field of application of the system is defined using a spatial representation. The conceptual design phase is carried out with the aid of a matrix structure containing the most relevant elements of the system and their relations. In particular, objectives, descriptors, inputs and actions are defined and qualified using categorical attributes. The proposed method is then applied to three case studies with different locations in the applicability space. All the relevant elements of the detailed implementation of these systems are described. The relations with assumptions made during the design are highlighted to validate the effectiveness of the proposed method. The adoption of case studies with notably different applications also reveals the versatility in the application of the method

    Estimation and detection of transmission line characteristics in the copper access network

    Get PDF
    The copper access-network operators face the challenge of developing and maintaining cost-effective digital subscriber line (DSL) services that are competitive to other broadband access technologies. The way forward is dictated by the demand of ever increasing data rates on the twisted-pair copper lines. To meet this demand, a relocation of the DSL transceivers in cabinets closer to the customers are often necessary combined with a joint expansion of the accompanying optical-fiber backhaul network. The equipment of the next generation copper network are therefore becoming more scattered and geographically distributed, which increases the requirements of automated line qualification with fault detection and localization. This scenario is addressed in the first five papers of this dissertation where the focus is on estimation and detection of transmission line characteristics in the copper access network. The developed methods apply model-based optimization with an emphasis on using low-order modeling and a priori information of the given problem. More specifically, in Paper I a low-order and causal cable model is derived based on the Hilbert transform. This model is successfully applied in three contributions of this dissertation. In Paper II, a class of low-complexity unbiased estimators for the frequency-dependent characteristic impedance is presented that uses one-port measurements only. The so obtained characteristic impedance paves the way for enhanced time domain reflectometry (a.k.a. TDR) on twisted-pair lines. In Paper III, the problem of estimating a nonhomogeneous and dispersive transmission line is investigated and a space-frequency optimization approach is developed for the DSL application. The accompanying analysis shows which parameters are of interest to estimate and further suggests the introduction of the concept capacitive length that overcomes the necessity of a priori knowledge of the physical line length. In Paper IV, two methods are developed for detection and localization of load coils present in so-called loaded lines. In Paper V, line topology identification is addressed with varying degree of a priori information. In doing so, a model-based optimization approach is employed that utilizes multi-objective evolutionary computation based on one/two-port measurements. A complement to transceiver relocation that potentially enhances the total data throughput in the copper access network is dynamic spectrum management (DSM). This promising multi-user transmission technique aims at maximizing the transmission rates, and/or minimizing the power consumption, by mitigating or cancelling the dominating crosstalk interference between twisted-pair lines in the same cable binder. Hence the spectral utilization is improved by optimizing the transmit signals in order to minimize the crosstalk interference. However, such techniques rely on accurate information of the (usually) unknown crosstalk channels. This issue is the main focus of Paper VI and VII of this dissertation in which Paper VI deals with estimation of the crosstalk channels between twisted-pair lines. More specifically, an unbiased estimator for the square-magnitude of the crosstalk channels is derived from which a practical procedure is developed that can be implemented with standardized DSL modems already installed in the copper access network. In Paper VII the impact such a non-ideal estimator has on the performance of DSM is analyzed and simulated. Finally, in Paper VIII a novel echo cancellation algorithm for DMT-based DSL modems is presented

    Software Technologies - 8th International Joint Conference, ICSOFT 2013 : Revised Selected Papers

    Get PDF

    OnTrack: Reflecting on domain specific formal methods for railway designs

    Get PDF
    OnTrack is a tool that supports workflows for railway verification that has been implemented using model driven engineering frameworks. Starting with graphical scheme plans and finishing with automatically generated formal models set-up for verification, OnTrack allows railway engineers to interact with verification procedures through encapsulating formal methods. OnTrack is grounded on a domain specification language (DSL) capturing scheme plans and supports generation of various formal models using model transformations. In this paper, we detail the role model driven engineering takes within OnTrack and reflect on the use of model driven engineering concepts for developing domain specific formal methods toolsets

    Industrialising Software Development in Systems Integration

    No full text
    Compared to other disciplines, software engineering as of today is still dependent on craftsmanship of highly-skilled workers. However, with constantly increasing complexity and efforts, existing software engineering approaches appear more and more inefficient. A paradigm shift towards industrial production methods seems inevitable. Recent advances in academia and practice have lead to the availability of industrial key principles in software development as well. Specialization is represented in software product lines, standardization and systematic reuse are available with component-based development, and automation has become accessible through model-driven engineering. While each of the above is well researched in theory, only few cases of successful implementation in the industry are known. This becomes even more evident in specialized areas of software engineering such as systems integration. Today’s IT systems need to quickly adapt to new business requirements due to mergers and acquisitions and cooperations between enterprises. This certainly leads to integration efforts, i.e. joining different subsystems into a cohesive whole in order to provide new functionality. In such an environment. the application of industrial methods for software development seems even more important. Unfortunately, software development in this field is a highly complex and heterogeneous undertaking, as IT environments differ from customer to customer. In such settings, existing industrialization concepts would never break even due to one-time projects and thus insufficient economies of scale and scope. This present thesis, therefore, describes a novel approach for a more efficient implementation of prior key principles while considering the characteristics of software development for systems integration. After identifying the characteristics of the field and their affects on currently-known industrialization concepts, an organizational model for industrialized systems integration has thus been developed. It takes software product lines and adapts them in a way feasible for a systems integrator active in several business domains. The result is a three-tiered model consolidating recurring activities and reducing the efforts for individual product lines. For the implementation of component-based development, the present thesis assesses current component approaches and applies an integration metamodel to the most suitable one. This ensures a common understanding of systems integration across different product lines and thus alleviates component reuse, even across product line boundaries. The approach is furthermore aligned with the organizational model to depict in which way component-based development may be applied in industrialized systems integration. Automating software development in systems integration with model-driven engineering was found to be insufficient in its current state. The reason herefore lies in insufficient tool chains and a lack of modelling standards. As an alternative, an XML-based configuration of products within a software product line has been developed. It models a product line and its products with the help of a domain-specific language and utilizes stylesheet transformations to generate compliable artefacts. The approach has been tested for its feasibility within an exemplarily implementation following a real-world scenario. As not all aspects of industrialized systems integration could be simulated in a laboratory environment, the concept was furthermore validated during several expert interviews with industry representatives. Here, it was also possible to assess cultural and economic aspects. The thesis concludes with a detailed summary of the contributions to the field and suggests further areas of research in the context of industrialized systems integration

    SMART GRIDS LABORATORIES INVENTORY 2015

    Get PDF
    A smart electricity grid opens the door to a myriad of new applications aimed at enhancing security of supply, sustainability and market competitiveness. Gathering detailed information about smart grid laboratories activities represents a primary need. In order to obtain a better picture of the ongoing Smart Grid developments, after the successful smart grid project survey initiated in 2011, we recently launched a focused on-line survey addressed to organisations owning or running Smart Grid laboratory facilities. The main objective is to publish aggregated information on a regular basis in order to provide an overview of the current facilities, to highlight trends in research and investments and to identify existing gaps.JRC.F.3-Energy Security, Systems and Marke

    Testing End-To-End Chains using Domain Specific Languages

    Get PDF
    Testing systems is a time consuming (and hence expensive) activity. Nevertheless, it is a very important and necessary step before using systems, especially safety critical systems. Therefore, many different test procedures are used: Unit Tests, Black-Box Tests, Software Integration Tests (SWI), Hardware-Software Integration Tests (HSI), Hardware-In-The-Loop Tests, just to name a few. Especially in the avionics domain, a variety of systems and applications communicate which each other. Furthermore, they depend and rely on the received information. However, some faults are only detected when all systems are connected and in operational mode. A new testing approach is to create model based End-To-End Chain scenarios with original and simulated equipment in any combination. The first aim is to automatically derive test data and test cases from the model, which is defined by a Domain Specific Language (DSL). Test data generators can be attached to quickly create a variety of stimuli for the systems under test. Furthermore, the system under test can be stimulated by either original equipment â which is connected to the test bench â or the test bench can simulate equipment and create inputs for the tested systems. Any mixture of simulated and original equipment is possible and can be changed on the fly. In the end, the results from the system under test are collected. These results can then be displayed back in the model. This method was used and improved in the project â E-Enabled Cabin (E-Cab)â in which the author was involved. Passengers traveling by plane are in the focus of this project. Complete services and service chains â ranging from booking at home with a computer, being en route using mobile devices to leaving the destination airport â are created and used by many systems communicating with each other. A special focus is set on a guidance scenario at an airport. The user of the system signs in to a guidance and notification system which will inform him via his own digital equipment (mobile device/smart phone). The system notifies the user about his in-time status. Either he is in-time for his flight, or he needs to hurry up and proceed to the next area or he will be too late and cannot catch his flight. The DSL itself is designed according to the comprehension of information processes. The ability of the human brain to process visual information in parallel â in contrast to sequential processing of textual information â is described and applied in the design of the DSL and the concepts of the project. The development of the DSL and the workflow is developed with the â real worldâ in mind. This means that the work fits in established workflows and enhances the current situation. As this project took place in the aircraft industry, the appropriate development standards, like DO178B and ABD100/200 (Airbus Directives ABD100/ABD200), build the foundation. The generation of clean code is established by applying generator guidelines (through coding standards) in order to create maintainable tests and test data

    An Insider Misuse Threat Detection and Prediction Language

    Get PDF
    Numerous studies indicate that amongst the various types of security threats, the problem of insider misuse of IT systems can have serious consequences for the health of computing infrastructures. Although incidents of external origin are also dangerous, the insider IT misuse problem is difficult to address for a number of reasons. A fundamental reason that makes the problem mitigation difficult relates to the level of trust legitimate users possess inside the organization. The trust factor makes it difficult to detect threats originating from the actions and credentials of individual users. An equally important difficulty in the process of mitigating insider IT threats is based on the variability of the problem. The nature of Insider IT misuse varies amongst organizations. Hence, the problem of expressing what constitutes a threat, as well as the process of detecting and predicting it are non trivial tasks that add up to the multi- factorial nature of insider IT misuse. This thesis is concerned with the process of systematizing the specification of insider threats, focusing on their system-level detection and prediction. The design of suitable user audit mechanisms and semantics form a Domain Specific Language to detect and predict insider misuse incidents. As a result, the thesis proposes in detail ways to construct standardized descriptions (signatures) of insider threat incidents, as means of aiding researchers and IT system experts mitigate the problem of insider IT misuse. The produced audit engine (LUARM – Logging User Actions in Relational Mode) and the Insider Threat Prediction and Specification Language (ITPSL) are two utilities that can be added to the IT insider misuse mitigation arsenal. LUARM is a novel audit engine designed specifically to address the needs of monitoring insider actions. These needs cannot be met by traditional open source audit utilities. ITPSL is an XML based markup that can standardize the description of incidents and threats and thus make use of the LUARM audit data. Its novelty lies on the fact that it can be used to detect as well as predict instances of threats, a task that has not been achieved to this date by a domain specific language to address threats. The research project evaluated the produced language using a cyber-misuse experiment approach derived from real world misuse incident data. The results of the experiment showed that the ITPSL and its associated audit engine LUARM provide a good foundation for insider threat specification and prediction. Some language deficiencies relate to the fact that the insider threat specification process requires a good knowledge of the software applications used in a computer system. As the language is easily expandable, future developments to improve the language towards this direction are suggested
    corecore