首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 218 毫秒
1.
嵌入式实时开发是当今计算机应用研究的热点,该文结合模型驱动架构的系统无关模型和系统相关模型思想,提出了一种基于平台设计的快速开发嵌入式实时系统的方法:首先采用实时应用接口RTAI将嵌入式Linux改造成具有硬实时性能的实时操作系统平台;然后利用Matlab/Simulink/RTW和RTAI-Lab工具对实际系统进行快速化建模、仿真和驱动开发,并自动生成实时的可执行代码;最后将代码加载到嵌入式实时系统.通过倒立摆嵌入式实时控制器系统设计实例说明了这种方法可以有效降低系统设计复杂度,提高嵌入式软件的开发效率.  相似文献   

2.
针对星载或机载高分辨率合成孔径雷达(synthetic aperture radar,SAR)实时成像后的大幅宽SAR图像舰船实时检测的应用需求,传统的基于FPGA+DSP的嵌入式系统很难同时实现SAR成像处理和基于人工智能技术的大幅宽SAR图像舰船实时检测,为此设计了一种基于3U VPX FPGA+GPU架构的大幅宽SAR图像嵌入式舰船实时检测系统;提出了一种基于YOLOv5s的舰船检测模型,采用基于L2-范数稀疏性惩罚的缩放因子控制法进行轻量化,轻量化舰船检测模型的参数量减小了47.39%,计算量减少了18.67%,平均检测精度为0.968;将轻量化舰船检测模型应用于大幅宽SAR图像嵌入式舰船实时检测系统,并针对典型的10 km×10 km的大幅宽图像应用场景,设计开发基于多线程技术和基于GPU的众核并行计算技术的大幅宽SAR图像嵌入式实时检测系统软件;通过公开的SAR数据集进行功能验证和性能评估,该系统能够满足不同分辨率的大幅宽SAR图像舰船实时检测需求。  相似文献   

3.
介绍了一种基于RTW Embedded Coder和嵌入式操作系统VxWorks的实时仿真方法.在一些实时性要求较高的仿真系统中,怎样能够在不加大开发难度的情况下提高仿真的实时性是一个需要解决的问题.Matlab中的RTW是专门为实时仿真设计开发的.VxWorks是一个非常实时的嵌入式开发系统,利用代码生成工具将ERT嵌入式目标自动生成优化的嵌入式实时C代码,下载到VxWoks嵌入式实时操作系统下运行,主机运行Simulink模型,目标机运行实时代码,保证了实时性.同时提供了利用C-API接口实现在线调参的方法,与传统的基于Tornado实时目标和VxWorks的实时仿真方法相比,更加利于对模型参数进行访问.  相似文献   

4.
基于CSP的构件化嵌入式软件能耗分析与评估方法研究   总被引:1,自引:0,他引:1  
随着嵌入式系统的发展,构件化软件开发技术已成为嵌入式软件开发的发展趋势.嵌入式系统通常是能源有限系统,如何在构件化嵌入式系统开发前期对其能耗进行分析与评估,发现系统能耗特性设计缺陷,从而提高开发效率,降低开发成本,已成为嵌入式系统设计的一个挑战.文中从构件化嵌入式软件体系结构出发,采用基于路径的系统能耗分析评估方法,在嵌入式系统架构设计阶段对其能耗特性进行分析与评估.在此评估体系中,软件体系结构应用进程代数语言CSP进行形式化描述,能耗特性在构件接口级别定义,最终建立了以CSP迹模型为基础的基于路径的系统能耗分析评估模型.文章最后通过案例分析验证了该模型分析方法的正确性和有效性.  相似文献   

5.
为保证嵌入式实时软件的功能安全和实时性,基于模型驱动开发方法,研究了嵌入式实时软件的模型开发环境的体系结构,设计了一个嵌入式实时软件模型开发环境的原型MDE环境.其中应用任务模型使用两层模型机制:上层模型用于建模应用任务的功能行为与性能特征并支持形式化功能安全验证和实时性分析,下层模型用于模型测试和自动生成支持嵌入式实时操作系统API接口和驱动函数接口的应用任务源代码.通过工具集成实现了建模、分析验证、代码生成和测试等嵌入式实时软件的完整模型化开发过程,为将来进一步完善和改进嵌入式实时软件模型开发环境的构建技术提供了应用验证.  相似文献   

6.
针对传统测评方法依赖模拟环境来仿真真实网络流量的现状,提出一种基于OpenFlow的入侵检测评估系统.该系统基于软件定义网络技术(OpenFlow)的入侵检测评估模型,随后对该模型的框架、设置方法、具体工作过程等进行详细阐述,设计了基于该模型的测评系统,该系统利用OpenFlow灵活的网络控制能力为IDS测评搭建真实可控的网络环境,提供入侵检测所需的真实网络流量和攻击数据.最后利用该测评系统对该模型进行试验仿真,实验结果表明传统方法相比,本文提出的基于OpenFlow的入侵检测评估模型在测评效果和准确性上有较好的性能.  相似文献   

7.
介绍了一种基于PTW Embedded Coder和嵌入式操作系统VxWorks的实时仿真方法。在一些实时性要求较高的仿真系统中,怎样能够在不加大开发难度的情况下提高仿真的实时性是一个需要解决的问题。Mathb中的RTW是专门为实时仿真设计开发的,VxWorks是一个非常实时的嵌入式开发系统,利用代码生成工具将ERT嵌入式目标自动生成优化的嵌入式实时C代码,下载到VxWoks嵌入式实时操作系统下运行。主机运行Simulink模型,目标机运行实时代码.保证了实时性。同时提供了利用C—API接口实现在线调参的方法,与传统的基于Tornado实时目标和VxWorks的实时仿真方法相比,更加利于对模型参数进行访问。  相似文献   

8.
为了解决航拍图像地面车辆目标实时检测和识别的问题,引入先进的人工智能技术,设计了一种基于深度学习的无人机航拍图像车辆目标检测嵌入式GPU系统.论文首先基于YOLOv3算法实现地面车辆目标检测技术,在GPU服务器上对地面车辆目标进行离线训练,通过自学习和迭代优化网络神经元权重,得到针对特定应用场景的网络模型;然后在嵌入式GPU平台上部属训练好的网络模型,实现无人机航拍图像的实时在线检测.实验结果表明,在NVIDIA TX2平台上实现了25帧/s的检测速率,基本满足地面车辆目标检测的需求.该嵌入式系统为无人机航拍图像在智慧交通领域的应用提供了一种解决方案.  相似文献   

9.
量子框架是基于有限状态机理论,完整的嵌入式系统实现技术,用以设计能与任何RTOS一起工作的活动对象.本文在研究量子框架的基础上,采用UML中的状态图对AMT系统中的活动对象进行行为建模.模型数据经XSLT转换为符合QF规范的嵌入式代码,实现了从建模到嵌入式代码的自动生成的功能,大大提高了嵌入式系统的开发效率.  相似文献   

10.
随着工业化和信息化深度融合以及系统网络互联的快速发展,工业嵌入式PLC控制系统中信息安全问题备受关注.针对嵌入式控制系统信息安全问题,设计了两级信息安全恢复控制机制:内环基于攻击特征库检测可识别入侵,并对比安全策略库制定安全策略;外环基于系统模型检测不可识别入侵,使用冗余技术进行处理.在构建的基于CortexA8-Linux的嵌入式PLC平台上,对信息安全策略进行实现并验证.实验结果表明,系统在保证实时性需求的同时,具有良好检测并处理其外部入侵的性能.  相似文献   

11.
Jing Cao  Albert Nymeyer 《Computing》2013,95(7):567-610
A new web service can be built by combining existing web services and coordinating their actions by a ‘mediator’. This work presents a formal design methodology based on model checking that generates all the mediator designs that meet requirements specified by a user. The methodology allows the user to explore the designs in search of the mediator that offers the best theoretical performance. Markov models of various measures of performance are considered. Each measure may result in a different ranking of the mediator designs (from best to worst for example). From these rankings the user can select the design that at least theoretically best fits the purpose. The novelty of this work is the use of model checking and Markov analysis in a single formal framework to generate, explore, and select from a set of provably-correct mediators—while still in the design stage of development.  相似文献   

12.
Probabilistic model checking is a formal verification technique for establishing the correctness, performance and reliability of systems which exhibit stochastic behaviour. As in conventional verification, a precise mathematical model of a real-life system is constructed first, and, given formal specifications of one or more properties of this system, an analysis of these properties is performed. The exploration of the system model is exhaustive and involves a combination of graph-theoretic algorithms and numerical methods. In this paper, we give a brief overview of the probabilistic model checker PRISM (www.cs.bham.ac.uk/~dxp/prism) implemented at the University of Birmingham. PRISM supports a range of probabilistic models and specification languages based on temporal logic, and has been recently extended with costs and rewards. We describe our experience with using PRISM to analyse a number of case studies from a wide range of application domains. We demonstrate the usefulness of probabilistic model checking techniques in detecting flaws and unusual trends, focusing mainly on the quantitative analysis of a range of best, worst and average-case system characteristics.  相似文献   

13.
We report on a case study in applying different formal methods to model and verify an architecture for administrating digital signatures. The architecture comprises several concurrently executing systems that authenticate users and generate and store digital signatures by passing security relevant data through a tightly controlled interface. The architecture is interesting from a formal-methods perspective as it involves complex operations on data as well as process coordination and hence is a candidate for both data-oriented and process-oriented formal methods. We have built and verified two models of the signature architecture using two representative formal methods. In the first, we specify a data model of the architecture in Z that we extend to a trace model and interactively verify by theorem proving. In the second, we model the architecture as a system of communicating processes that we verify by finite-state model checking. We provide a detailed comparison of these two different approaches to formalization (infinite state with rich data types versus finite state) and verification (theorem proving versus model checking). Contrary to common belief, our case study suggests that Z is well suited for temporal reasoning about process models with complex operations on data. Moreover, our comparison highlights the advantages of proving theorems about such models and provides evidence that, in the hands of an experienced user, theorem proving may be neither substantially more time-consuming nor more complex than model checking.  相似文献   

14.
In the past, applying formal analysis, such as model checking, to industrial problems required a team of formal methods experts and a great deal of effort. Model checking has become popular, because model checkers have evolved to allow domain-experts, who lack model checking expertise, to analyze their systems. What made this shift possible and what roles did models play in this? That is the main question we consider here. We survey approaches that transform domain-specific input models into alternative forms that are invisible to the user and which are amenable to model checking using existing techniques—we refer to these as hidden models. We observe that keeping these models hidden from the user is in fact paramount to the success of the domain-specific model checker. We illustrate the value of hidden models by surveying successful examples of their use in different areas of model checking (hardware and software) and how a lack of suitable models hamper a new area (biological systems).  相似文献   

15.
针对二进制程序脆弱性分析的实际需求,提出了一种基于模型检测的二进制程序脆弱性分析框架。首先定义了二进制程序的抽象模型,描述了基于有限状态自动机的软件脆弱性形式化表示和基于事件系统的软件安全属性表示方法。在此基础上,提出了基于模型检测的脆弱性分析过程和算法。根据该分析框架,设计并实现了二进制程序脆弱性分析工具原型。通过脆弱性分析实验,详细说明了该框架的工作原理,验证了该分析方法的有效性。  相似文献   

16.
17.
精化UML模型   总被引:3,自引:0,他引:3  
本文通过融合UML用例图、类图、顺序图和状态图,得到一个软件系统的需求模型和设计模型,给出了需求模型和设计模型的协调性条件及精化规则。这样,我们可以从软件开发的需求分析和设计阶段检查模型的协调性,通过协调地精化模型后生成代码。用这种方法,我们可在软件设计的早期阶段发现不协调问题,减少生成代码后除错所产生的代价。  相似文献   

18.
Symbolic model checking based on binary decision diagrams is a powerful formal verification technique for reactive systems. In this paper, we present various optimizations for improving the time and space efficiency of symbolic modal checking for systems specified as statecharts. We used these techniques in our analyses of the models of a collision avoidance system and a fault-tolerant electrical power distribution (EPD) system, both used on commercial aircraft. The techniques together reduce the time and space requirements by orders of magnitude, making feasible some analysis that was previously intractable. We also elaborate on the results of verifying the EPD model. The analysis disclosed subtle modeling and logical flaws not found by simulation  相似文献   

19.
王红英  张桂戌 《微机发展》2007,17(4):182-185
UML广泛应用于软件建模,但缺乏有效的模型检测的方法,使用形式化方法对UML模型进行分析,可以发现UML模型的设计问题,提高UML模型的质量。对象着色Petri网是一种拥有接口库所的模块化着色Petri网,既是一种图形化建模工具,又是具有严格的语法语义定义的形式化方法。通过引入事件托肯,改进了将UML模型转换为对象着色Petri网的方法,结合实例将UML状态图和协作图映射为对象着色Petri网模型。并用着色Petri网的方法和工具对模型进行了分析,验证了模型的一系列性质。  相似文献   

20.
Software verification methods are used only sparingly in industrial software development today. The most successful methods are based on the use of model checking. There are, however, many hurdles to overcome before the use of model checking tools can truly become mainstream. To use a model checker, the user must first define a formal model of the application, and to do so requires specialized knowledge of both the application and of model checking techniques. For larger applications, the effort to manually construct a formal model can take a considerable investment of time and expertise, which can rarely be afforded. Worse, it is hard to secure that a manually constructed model can keep pace with the typical software application, as it evolves from the concept stage to the product stage. We describe a verification method that requires far less specialized knowledge in model construction. It allows us to extract models mechanically from source code. The model construction process now becomes easily repeatable, as the application itself continues to evolve. Once the model is constructed, existing model checking techniques allow us to perform all checks in a mechanical fashion, achieving nearly complete automation. The level of thoroughness that can be achieved with this new type of software testing is significantly greater than for conventional techniques. We report on the application of this method in the verification of the call processing software for a new telephone switch that was developed at Lucent Technologies  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号