首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Preventive maintenance scheduling for repairable system with deterioration   总被引:4,自引:1,他引:3  
Maintenance as an important part in manufacturing system can keep equipment in good condition. Many maintenance policies help to decrease the unexpected failures and reduce high operational cost such as conventional preventive maintenance. But these conventional preventive maintenance policies have the same time interval T that may easily neglect system’s reliability, because the system deteriorates with increased usage and age. Hence, this study has developed a reliability-centred sequential preventive maintenance model for monitored repairable deteriorating system. It is supposed that system’s reliability could be monitored continuously and perfectly, whenever it reaches the threshold R, the imperfect repair must be performed to restore the system. In this model, system’s failure rate function and operational cost are both considered by the effect of system’s corresponding condition, which helps to decide the optimal reliability threshold R and preventive maintenance cycle number. Finally, through case study, the simulation results show that the improved sequential preventive maintenance policy is more practical and efficient.  相似文献   

2.
In agile development processes, the rewards from acceptance testing are maximized by using the practice to drive the development process. Traditionally, User Stories are used in agile projects to describe a system’s usage scenarios and are utilized as a basis for developing acceptance tests. This paper introduces a technique that aims to achieve the benefits of acceptance testing within large-scale development projects that deploy a V-model development process, specifically those that utilize use case models. The approach is based on utilizing a number of artifacts: use case models supported by robustness diagrams and domain models. The feasibility of the proposed approach is demonstrated by applying it to a real-world system—the RestoMapper system. The results show that a comprehensive set of acceptance tests can be developed based upon use case models.  相似文献   

3.
This paper proposes to use a historical perspective on generic laws, principles, and guidelines, like Lehman’s software evolution laws and Martin’s design principles, in order to achieve a multi-faceted process and structural assessment of a system’s architectural evolution. We present a simple structural model with associated historical metrics and visualizations that could form part of an architect’s dashboard. We perform such an assessment for the Eclipse SDK, as a case study of a large, complex, and long-lived system for which sustained effective architectural evolution is paramount. The twofold aim of checking generic principles on a well-know system is, on the one hand, to see whether there are certain lessons that could be learned for best practice of architectural evolution, and on the other hand to get more insights about the applicability of such principles. We find that while the Eclipse SDK does follow several of the laws and principles, there are some deviations, and we discuss areas of architectural improvement and limitations of the assessment approach.  相似文献   

4.
Safety analysis can be labour intensive and error prone for system designers. Moreover, even a relatively minor change to a system’s design can necessitate a complete reworking of the system safety analysis. This paper proposes the use of Behavior Trees and model checking to automate Cut Set Analysis (CSA) : that is, the identification of combinations of component failures that can lead to hazardous system failures. We demonstrate an automated incremental approach to CSA, in which models are extended incrementally and previous results incorporated in such a way as to significantly reduce the time and effort required for the new analysis. The approach is demonstrated on a case study concerning the hydraulics systems for the Airbus A320 aircraft.  相似文献   

5.
In the present paper, a three-module vibration-driven system moving on a rough horizontal plane is modeled to investigate the relation among the system’s steady-state motion, external Coulomb’s dry friction force and internal excitations. Each module of the system represents a vibration-driven system composed of a rigid body and a movable internal mass. Major attention is focused on the primary resonance situation that the excitation frequency is close to the first-order natural frequency of the system. In the case that the external friction is low, the internal excitation is weak and the stick–slip motion is negligible, both methods of averaging and modal superposition are employed to study the steady-state motion of the system. Through a set of algebraic equations, an approximate value of the system’s average steady-state velocity is obtained. Several numerical examples are calculated to verify the validity of the analytical results both qualitatively and quantitatively. It is seen that big quantitative errors will appear if stick–slip motions occur. Then, two mechanisms for the possible stick–slip motions are put forward, which explain the errors on the average steady-state velocity. Numerical simulations verify our analysis on the stick–slip effects and their mechanisms. Finally, to maximize the average steady-state velocity of the system, optimal control problem is studied. It is shown that, in addition to modifying the friction coefficients, the improvement of the system’s efficiency can be provided by changing the initial phase shifts among the three internal excitations.  相似文献   

6.
Requirements engineering for e-business advantage   总被引:1,自引:0,他引:1  
As a means of contributing to the achievement of business advantage for companies engaging in e-business, we propose a requirements engineering framework that incorporates a business strategy dimension. We employ Jackson’s Problem Frames approach, goal modeling, and business process modeling (BPM) to achieve this. Jackson’s context diagrams, used to represent business model context, are integrated with goal models to describe the requirements of the business strategy. We leverage the paradigm of projection in both approaches as a means of simultaneously decomposing both the requirement and context parts, from an abstract business level to concrete system requirements. Our approach maintains traceability to high-level business objectives via contribution relationship links in the goal model. We integrate use of role activity diagrams to describe business processes in detail where needed. The feasibility of our approach is shown by a well-known case study taken from the literature.  相似文献   

7.
Behavior-based systems form the basis of autonomous control for many robots, but there is a need to ensure these systems respond in a timely manner. Unexpected latency can adversely affect the quality of an autonomous system’s operations, which in turn can affect lives and property in the real-world. A robots ability to detect and handle external events is paramount to providing safe and dependable operation. This paper presents a concurrent version of a behavior-based system called the Real-Time Unified Behavior Framework, which establishes a responsive basis of behavior-based control that does not bind the system developer to any single behavior hierarchy. The concurrent design of the framework is based on modern software engineering principles and only specifies a functional interface for components, leaving the implementation details to the developers. In addition, the individual behaviors are executed by a real-time scheduler, guaranteeing the responsiveness of routines that are critical to the autonomous system’s safe operation. Experimental results demonstrate the ability of this approach to provide predictable temporal operation, independent of fluctuations in high-level computational loads.  相似文献   

8.
Automatic composition of broadcast sports video   总被引:1,自引:0,他引:1  
This study examines an automatic broadcast soccer video composition system. The research is important as the ability to automatically compose broadcast sports video will not only improve broadcast video generation efficiency, but also provides the possibility to customize sports video broadcasting. We present a novel approach to the two major issues required in the system’s implementation, specifically the camera view selection/switching module and the automatic replay generation module. In our implementation, we use multi-modal framework to perform video content analysis, event and event boundary detection from the raw unedited main/sub-camera captures. This framework explores the possible cues using mid-level representations to bridge the gap between low-level features and high-level semantics. The video content analysis results are utilized for camera view selection/switching in the generated video composition, and the event detection results and mid-level representations are used to generate replays which are automatically inserted into the broadcast soccer video. Our experimental results are promising and found to be comparable to those generated by broadcast professionals.  相似文献   

9.
This paper describes the use of Obstacle Analysis to identify anomaly handling requirements for a safety-critical, autonomous system. The software requirements for the system evolved during operations due to an on-going effort to increase the autonomous system’s robustness. The resulting increase in autonomy also increased system complexity. This investigation used Obstacle Analysis to identify and to reason incrementally about new requirements for handling failures and other anomalous events. Results reported in the paper show that Obstacle Analysis complemented standard safety-analysis techniques in identifying undesirable behaviors and ways to resolve them. The step-by-step use of Obstacle Analysis identified potential side effects and missing monitoring and control requirements. Adding an Availability Indicator and feature-interaction patterns proved useful for the analysis of obstacle resolutions. The paper discusses the consequences of these results in terms of the adoption of Obstacle Analysis to analyze anomaly handling requirements in evolving systems.  相似文献   

10.
Multiagent systems have become popular over the last few years for building complex, adaptive systems in a distributed, heterogeneous setting. Multiagent systems tend to be more robust and, in many cases, more efficient than single monolithic applications. However, unpredictable application environments make multiagent systems susceptible to individual failures that can significantly reduce its ability to accomplish its overall goal. The problem is that multiagent systems are typically designed to work within a limited set of configurations. Even when the system possesses the resources and computational power to accomplish its goal, it may be constrained by its own structure and knowledge of its member’s capabilities. To overcome these problems, we are developing a framework that allows the system to design its own organization at runtime. This paper presents a key component of that framework, a metamodel for multiagent organizations named the Organization Model for Adaptive Computational Systems. This model defines the requisite knowledge of a system’s organizational structure and capabilities that will allow it to reorganize at runtime and enable it to achieve its goals effectively in the face of a changing environment and its agent’s capabilities.  相似文献   

11.
This paper describes a model for the assessment and certification of safety-critical programmable electronic systems in the transportation industries. The proposed model is founded on the significant commonalities between emerging international safety-related standards in the automotive, railway and aerospace industries. It contains a system development and a safety assessment process which rationalise and unify the common requirements among the standards in these areas. In addition, it defines an evolutionary process for the development of the system’s safety case. The safety case process shows how the evidence produced in the progression of safety assessment can be structured in order to form an overall argument about the safety of the system. We conclude that it is possible to use this model as the basis of a generic approach to the certification of systems across the transportation sector.  相似文献   

12.
Mobile users making real-time decisions based on current information need confidence that their context has been taken into consideration in producing the system’s recommendations. This chapter reviews current use of mobile technologies for context-aware real-time decision support. Specifically, it describes a framework for assessing the impact of mobility in decision making. The framework uses dynamic context model of data quality to represent uncertainties in the mobile decision-making environment. This framework can be used for developing visual interactive displays for communicating to the user relevant changes in data quality when working in mobile environments. As an illustration, this chapter proposes a real-time decision support procedure for on-the-spot assistance to the mobile consumer when choosing the best payment option to efficiently manage their budget. The proposed procedure is based on multi-attribute decision analysis, scenario reasoning, and a quality of data framework. The feasibility of the approach is demonstrated with a mobile decision-support system prototype implementation. This article is part of the “Handbook on Decision Support Systems” edited by Frada Burstein and Clyde W. Holsapple (2008) Springer.  相似文献   

13.
In today’s dynamic business environments, organizations are under pressure to modernize their existing software systems in order to respond to changing business demands. Service oriented architectures provide a composition framework to create new business functionalities from autonomous building blocks called services, enabling organizations to quickly adapt to changing conditions and requirements. Characteristics of services offer the promise of leveraging the value of enterprise systems through source code reuse. In this respect, existing system components can be used as the foundation of newly created services. However, one problem to overcome is the lack of business semantics to support the reuse of existing source code. Without sufficient semantic knowledge about the code in the context of business functionality, it would be impossible to utilize source code components in services development. In this paper, we present an automated approach to enrich source code components with business semantics. Our approach is based on the idea that the gap between the two ends of an enterprise system—(1) services as processes and (2) source code—can be bridged via similarity of data definitions used in both ends. We evaluate our approach in the framework of a commercial enterprise systems application. Initial results indicate that the proposed approach is useful for annotating source code components with business specific knowledge.  相似文献   

14.
Two basic requirements from a system’s conceptual model are correctness and comprehensibility. Most modeling methodologies satisfy only one of these apparently contradicting requirements, usually comprehensibility, leaving aside problems of correctness and ambiguousness that are associated with expressiveness. Some formal modeling languages do exist, but in these languages a complete model of a complex system is fairly complicated to understand. Object-process methodology (OPM) is a holistic systems modeling methodology that combines the two major aspects of a system—structure and behavior—in one model, providing mechanisms to manage the complexity of the model using refinement-abstraction operations, which divide a complex system into many interconnected diagrams. Although the basic syntax and semantics of an OPM model are defined, they are incomplete and leave room for incorrect or ambiguous models. This work advances the formal definition of OPM by providing a graph grammar for creating and checking OPM diagrams. The grammar provides a validation methodology of the semantic and syntactic correctness of a single object-process diagram.  相似文献   

15.
This article describes the User Model component of AthosMail, a speech-based interactive e-mail application developed in the context of the EU project DUMAS. The focus is on the system’s adaptive capabilities and user expertise modelling, exemplified through the User Model parameters dealing with initiative and explicitness of the system responses. The purpose of the conducted research was to investigate how the users could interact with a system in a more natural way, and the two aspects that mainly influence the system’s interaction capabilities, and thus the naturalness of the dialogue as a whole, are considered to be the dialogue control and the amount of information provided to the user. The User Model produces recommendations of the system’s appropriate reaction depending on the user’s observed competence level, monitored and computed on the basis of the user’s interaction with the system. The article also discusses methods for the evaluation of adaptive user models and presents results from the AthosMail evaluation.The research was done while the author was affiliated with the University of Art and Design Helsinki as the scientific coordinator of the DUMAS project.  相似文献   

16.
Organisational adaptation of multi-agent systems in a peer-to-peer scenario   总被引:2,自引:1,他引:1  
Organisations in multi-agent systems (MAS) have proven to be successful in regulating agent societies. Nevertheless, changes in agents’ behaviour or in the dynamics of the environment may lead to a poor fulfilment of the system’s purposes, and so the entire organisation needs to be adapted. In this paper we focus on endowing the organisation with adaptation capabilities, instead of expecting agents to be capable of adapting the organisation by themselves. We regard this organisational adaptation as an assisting service provided by what we call the Assistance Layer. Our generic Two Level Assisted MAS Architecture (2-LAMA) incorporates such a layer. We empirically evaluate this approach by means of an agent-based simulator we have developed for the P2P sharing network domain. This simulator implements 2-LAMA architecture and supports the comparison between different adaptation methods, as well as, with the standard BitTorrent protocol. In particular, we present two alternatives to perform norm adaptation and one method to adapt agents’ relationships. The results show improved performance and demonstrate that the cost of introducing an additional layer in charge of the system’s adaptation is lower than its benefits.  相似文献   

17.
As an important technology for predictive maintenance, failure prognosis has attracted more and more attentions in recent years. Real-time reliability prediction is one effective solution to failure prognosis. Considering a dynamic system that is composed of normal, deteriorating and unreliable components, this paper proposes an integrated approach to perform real-time reliability prediction for such a class of systems. For a deteriorating component, the degradation is modeled by a time-varying fault process which is a linear or approximately linear function of time. The behavior of an unreliable component is described by a random variable which has two possible values corresponding to the operating and malfunction conditions of this component. The whole proposed approach contains three algorithms. A modified interacting multiple model particle filter is adopted to estimate the dynamic system’s state variables and the unmeasurable time-varying fault. An exponential smoothing algorithm named the Holt’s method is used to predict the fault process. In the end, the system’s reliability is predicted in real time by use of the Monte Carlo strategy. The proposed approach can effectively predict the impending failure of a dynamic system, which is verified by computer simulations based on a three-vessel water tank system.  相似文献   

18.
In this paper we describe the process of a multi-disciplinary medical team meeting (MDTM), its functions and operation in colocated and teleconference discussions. Our goal is to identify the elements and mechanics of operation that enhance or threaten the dependability of the MDTM as a “system” and propose technologies and measures to make this system more reliable. In particular, we assess the effect of adding teleconferencing to the MDTM, and identify strengths and vulnerabilities introduced into the system by the addition of teleconferencing technology. We show that, with respect to the system’s external task environment, rhythms of execution of pre-meeting and post-meeting activities are critical for MDTM success and that the extension of the MDTM to wider geographic locations with teleconferencing might disrupt such rhythms thereby posing potential threats to dependability. On the other hand, an analysis of vocalisation patterns demonstrates that despite difficulties related to coordination and awareness in video-mediated communication (evidenced by increased time spent in case discussion, longer turns, decreased turn frequency and near lack of informal exchanges) the overall case discussion structure is unaffected by the addition of teleconferencing technology into proceedings.  相似文献   

19.
The LOCKSS system is a world-wide peer-to-peer system for the preservation of academic journals and other archival information published on the Web. The system is deployed at over 200 libraries around the world and currently preserving titles of publishers representing more than 2000 academic titles. It consists of a large number of independent, low-cost, persistent Web caches that cooperate to detect and repair damage to their content by voting in “opinion polls.” Based on our experience working with the LOCKSS system, in this paper, we identify and characterize a fundamental tradeoff in the system’s ability to defend against adversaries with competing goals. In particular, the techniques used to defend against adversaries attempting stealth modification of content being preserved in the system are at odds with those used to identify nuisance adversaries simply trying to disrupt system procedures. We show that with a simple change to the design of the system’s preservation protocol we are able to create moderately strong defense against both of these competing adversaries simultaneously.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号