共查询到20条相似文献,搜索用时 15 毫秒
1.
Maintenance as an important part in manufacturing system can keep equipment in good condition. Many maintenance policies help
to decrease the unexpected failures and reduce high operational cost such as conventional preventive maintenance. But these
conventional preventive maintenance policies have the same time interval T that may easily neglect system’s reliability, because the system deteriorates with increased usage and age. Hence, this study
has developed a reliability-centred sequential preventive maintenance model for monitored repairable deteriorating system.
It is supposed that system’s reliability could be monitored continuously and perfectly, whenever it reaches the threshold
R, the imperfect repair must be performed to restore the system. In this model, system’s failure rate function and operational
cost are both considered by the effect of system’s corresponding condition, which helps to decide the optimal reliability
threshold R and preventive maintenance cycle number. Finally, through case study, the simulation results show that the improved sequential
preventive maintenance policy is more practical and efficient. 相似文献
2.
In agile development processes, the rewards from acceptance testing are maximized by using the practice to drive the development
process. Traditionally, User Stories are used in agile projects to describe a system’s usage scenarios and are utilized as
a basis for developing acceptance tests. This paper introduces a technique that aims to achieve the benefits of acceptance
testing within large-scale development projects that deploy a V-model development process, specifically those that utilize
use case models. The approach is based on utilizing a number of artifacts: use case models supported by robustness diagrams
and domain models. The feasibility of the proposed approach is demonstrated by applying it to a real-world system—the RestoMapper
system. The results show that a comprehensive set of acceptance tests can be developed based upon use case models. 相似文献
3.
Michel Wermelinger Yijun Yu Angela Lozano Andrea Capiluppi 《Empirical Software Engineering》2011,16(5):623-666
This paper proposes to use a historical perspective on generic laws, principles, and guidelines, like Lehman’s software evolution
laws and Martin’s design principles, in order to achieve a multi-faceted process and structural assessment of a system’s architectural
evolution. We present a simple structural model with associated historical metrics and visualizations that could form part
of an architect’s dashboard. We perform such an assessment for the Eclipse SDK, as a case study of a large, complex, and long-lived
system for which sustained effective architectural evolution is paramount. The twofold aim of checking generic principles
on a well-know system is, on the one hand, to see whether there are certain lessons that could be learned for best practice
of architectural evolution, and on the other hand to get more insights about the applicability of such principles. We find
that while the Eclipse SDK does follow several of the laws and principles, there are some deviations, and we discuss areas
of architectural improvement and limitations of the assessment approach. 相似文献
4.
Peter A. Lindsay Nisansala Yatapanage Kirsten Winter 《Formal Aspects of Computing》2012,24(2):249-266
Safety analysis can be labour intensive and error prone for system designers. Moreover, even a relatively minor change to
a system’s design can necessitate a complete reworking of the system safety analysis. This paper proposes the use of Behavior
Trees and model checking to automate Cut Set Analysis (CSA) : that is, the identification of combinations of component failures
that can lead to hazardous system failures. We demonstrate an automated incremental approach to CSA, in which models are extended
incrementally and previous results incorporated in such a way as to significantly reduce the time and effort required for
the new analysis. The approach is demonstrated on a case study concerning the hydraulics systems for the Airbus A320 aircraft. 相似文献
5.
In the present paper, a three-module vibration-driven system moving on a rough horizontal plane is modeled to investigate
the relation among the system’s steady-state motion, external Coulomb’s dry friction force and internal excitations. Each
module of the system represents a vibration-driven system composed of a rigid body and a movable internal mass. Major attention
is focused on the primary resonance situation that the excitation frequency is close to the first-order natural frequency
of the system. In the case that the external friction is low, the internal excitation is weak and the stick–slip motion is
negligible, both methods of averaging and modal superposition are employed to study the steady-state motion of the system.
Through a set of algebraic equations, an approximate value of the system’s average steady-state velocity is obtained. Several
numerical examples are calculated to verify the validity of the analytical results both qualitatively and quantitatively.
It is seen that big quantitative errors will appear if stick–slip motions occur. Then, two mechanisms for the possible stick–slip
motions are put forward, which explain the errors on the average steady-state velocity. Numerical simulations verify our analysis
on the stick–slip effects and their mechanisms. Finally, to maximize the average steady-state velocity of the system, optimal
control problem is studied. It is shown that, in addition to modifying the friction coefficients, the improvement of the system’s
efficiency can be provided by changing the initial phase shifts among the three internal excitations. 相似文献
6.
Requirements engineering for e-business advantage 总被引:1,自引:0,他引:1
As a means of contributing to the achievement of business advantage for companies engaging in e-business, we propose a requirements
engineering framework that incorporates a business strategy dimension. We employ Jackson’s Problem Frames approach, goal modeling,
and business process modeling (BPM) to achieve this. Jackson’s context diagrams, used to represent business model context,
are integrated with goal models to describe the requirements of the business strategy. We leverage the paradigm of projection
in both approaches as a means of simultaneously decomposing both the requirement and context parts, from an abstract business
level to concrete system requirements. Our approach maintains traceability to high-level business objectives via contribution
relationship links in the goal model. We integrate use of role activity diagrams to describe business processes in detail
where needed. The feasibility of our approach is shown by a well-known case study taken from the literature. 相似文献
7.
Behavior-based systems form the basis of autonomous control for many robots, but there is a need to ensure these systems respond
in a timely manner. Unexpected latency can adversely affect the quality of an autonomous system’s operations, which in turn
can affect lives and property in the real-world. A robots ability to detect and handle external events is paramount to providing
safe and dependable operation. This paper presents a concurrent version of a behavior-based system called the Real-Time Unified
Behavior Framework, which establishes a responsive basis of behavior-based control that does not bind the system developer
to any single behavior hierarchy. The concurrent design of the framework is based on modern software engineering principles
and only specifies a functional interface for components, leaving the implementation details to the developers. In addition,
the individual behaviors are executed by a real-time scheduler, guaranteeing the responsiveness of routines that are critical
to the autonomous system’s safe operation. Experimental results demonstrate the ability of this approach to provide predictable
temporal operation, independent of fluctuations in high-level computational loads. 相似文献
8.
Automatic composition of broadcast sports video 总被引:1,自引:0,他引:1
This study examines an automatic broadcast soccer video composition system. The research is important as the ability to automatically
compose broadcast sports video will not only improve broadcast video generation efficiency, but also provides the possibility
to customize sports video broadcasting. We present a novel approach to the two major issues required in the system’s implementation,
specifically the camera view selection/switching module and the automatic replay generation module. In our implementation,
we use multi-modal framework to perform video content analysis, event and event boundary detection from the raw unedited main/sub-camera
captures. This framework explores the possible cues using mid-level representations to bridge the gap between low-level features
and high-level semantics. The video content analysis results are utilized for camera view selection/switching in the generated
video composition, and the event detection results and mid-level representations are used to generate replays which are automatically
inserted into the broadcast soccer video. Our experimental results are promising and found to be comparable to those generated
by broadcast professionals. 相似文献
9.
Robyn Lutz Ann Patterson-Hine Stacy Nelson Chad R. Frost Doron Tal Robert Harris 《Requirements Engineering》2007,12(1):41-54
This paper describes the use of Obstacle Analysis to identify anomaly handling requirements for a safety-critical, autonomous system. The software requirements for the system evolved during operations due to an on-going effort to increase the autonomous system’s robustness. The resulting increase in autonomy also increased system complexity. This investigation used Obstacle Analysis to identify and to reason incrementally about new requirements for handling failures and other anomalous events. Results reported in the paper show that Obstacle Analysis complemented standard safety-analysis techniques in identifying undesirable behaviors and ways to resolve them. The step-by-step use of Obstacle Analysis identified potential side effects and missing monitoring and control requirements. Adding an Availability Indicator and feature-interaction patterns proved useful for the analysis of obstacle resolutions. The paper discusses the consequences of these results in terms of the adoption of Obstacle Analysis to analyze anomaly handling requirements in evolving systems. 相似文献
10.
Scott A. DeLoach Walamitien H. Oyenan Eric T. Matson 《Autonomous Agents and Multi-Agent Systems》2008,16(1):13-56
Multiagent systems have become popular over the last few years for building complex, adaptive systems in a distributed, heterogeneous
setting. Multiagent systems tend to be more robust and, in many cases, more efficient than single monolithic applications.
However, unpredictable application environments make multiagent systems susceptible to individual failures that can significantly
reduce its ability to accomplish its overall goal. The problem is that multiagent systems are typically designed to work within
a limited set of configurations. Even when the system possesses the resources and computational power to accomplish its goal,
it may be constrained by its own structure and knowledge of its member’s capabilities. To overcome these problems, we are
developing a framework that allows the system to design its own organization at runtime. This paper presents a key component of that framework, a metamodel for multiagent organizations named the Organization Model
for Adaptive Computational Systems. This model defines the requisite knowledge of a system’s organizational structure and
capabilities that will allow it to reorganize at runtime and enable it to achieve its goals effectively in the face of a changing
environment and its agent’s capabilities. 相似文献
11.
This paper describes a model for the assessment and certification of safety-critical programmable electronic systems in the
transportation industries. The proposed model is founded on the significant commonalities between emerging international safety-related
standards in the automotive, railway and aerospace industries. It contains a system development and a safety assessment process
which rationalise and unify the common requirements among the standards in these areas. In addition, it defines an evolutionary
process for the development of the system’s safety case. The safety case process shows how the evidence produced in the progression
of safety assessment can be structured in order to form an overall argument about the safety of the system. We conclude that
it is possible to use this model as the basis of a generic approach to the certification of systems across the transportation
sector. 相似文献
12.
Frada Burstein Julie Cowie Arkady Zaslavsky Jocelyn San Pedro 《Information Systems and E-Business Management》2008,6(3):257-278
Mobile users making real-time decisions based on current information need confidence that their context has been taken into
consideration in producing the system’s recommendations. This chapter reviews current use of mobile technologies for context-aware
real-time decision support. Specifically, it describes a framework for assessing the impact of mobility in decision making.
The framework uses dynamic context model of data quality to represent uncertainties in the mobile decision-making environment.
This framework can be used for developing visual interactive displays for communicating to the user relevant changes in data
quality when working in mobile environments. As an illustration, this chapter proposes a real-time decision support procedure
for on-the-spot assistance to the mobile consumer when choosing the best payment option to efficiently manage their budget.
The proposed procedure is based on multi-attribute decision analysis, scenario reasoning, and a quality of data framework.
The feasibility of the approach is demonstrated with a mobile decision-support system prototype implementation.
This article is part of the “Handbook on Decision Support Systems” edited by Frada Burstein and Clyde W. Holsapple (2008)
Springer. 相似文献
13.
In today’s dynamic business environments, organizations are under pressure to modernize their existing software systems in
order to respond to changing business demands. Service oriented architectures provide a composition framework to create new
business functionalities from autonomous building blocks called services, enabling organizations to quickly adapt to changing
conditions and requirements. Characteristics of services offer the promise of leveraging the value of enterprise systems through
source code reuse. In this respect, existing system components can be used as the foundation of newly created services. However, one problem
to overcome is the lack of business semantics to support the reuse of existing source code. Without sufficient semantic knowledge
about the code in the context of business functionality, it would be impossible to utilize source code components in services
development. In this paper, we present an automated approach to enrich source code components with business semantics. Our
approach is based on the idea that the gap between the two ends of an enterprise system—(1) services as processes and (2)
source code—can be bridged via similarity of data definitions used in both ends. We evaluate our approach in the framework
of a commercial enterprise systems application. Initial results indicate that the proposed approach is useful for annotating
source code components with business specific knowledge. 相似文献
14.
Two basic requirements from a system’s conceptual model are correctness and comprehensibility. Most modeling methodologies
satisfy only one of these apparently contradicting requirements, usually comprehensibility, leaving aside problems of correctness
and ambiguousness that are associated with expressiveness. Some formal modeling languages do exist, but in these languages
a complete model of a complex system is fairly complicated to understand. Object-process methodology (OPM) is a holistic systems
modeling methodology that combines the two major aspects of a system—structure and behavior—in one model, providing mechanisms
to manage the complexity of the model using refinement-abstraction operations, which divide a complex system into many interconnected
diagrams. Although the basic syntax and semantics of an OPM model are defined, they are incomplete and leave room for incorrect
or ambiguous models. This work advances the formal definition of OPM by providing a graph grammar for creating and checking
OPM diagrams. The grammar provides a validation methodology of the semantic and syntactic correctness of a single object-process
diagram. 相似文献
15.
Kristiina Jokinen 《Universal Access in the Information Society》2006,4(4):374-392
This article describes the User Model component of AthosMail, a speech-based interactive e-mail application developed in the context of the EU project DUMAS. The focus is on the system’s adaptive capabilities and user expertise modelling, exemplified through the User Model parameters dealing with initiative and explicitness of the system responses. The purpose of the conducted research was to investigate how the users could interact with a system in a more natural way, and the two aspects that mainly influence the system’s interaction capabilities, and thus the naturalness of the dialogue as a whole, are considered to be the dialogue control and the amount of information provided to the user. The User Model produces recommendations of the system’s appropriate reaction depending on the user’s observed competence level, monitored and computed on the basis of the user’s interaction with the system. The article also discusses methods for the evaluation of adaptive user models and presents results from the AthosMail evaluation.The research was done while the author was affiliated with the University of Art and Design Helsinki as the scientific coordinator of the DUMAS project. 相似文献
16.
Jordi Campos Marc Esteva Maite López-Sánchez Javier Morales Maria Salamó 《Computing》2011,91(2):169-215
Organisations in multi-agent systems (MAS) have proven to be successful in regulating agent societies. Nevertheless, changes
in agents’ behaviour or in the dynamics of the environment may lead to a poor fulfilment of the system’s purposes, and so
the entire organisation needs to be adapted. In this paper we focus on endowing the organisation with adaptation capabilities,
instead of expecting agents to be capable of adapting the organisation by themselves. We regard this organisational adaptation
as an assisting service provided by what we call the Assistance Layer. Our generic Two Level Assisted MAS Architecture (2-LAMA) incorporates such a layer. We empirically evaluate this approach
by means of an agent-based simulator we have developed for the P2P sharing network domain. This simulator implements 2-LAMA
architecture and supports the comparison between different adaptation methods, as well as, with the standard BitTorrent protocol.
In particular, we present two alternatives to perform norm adaptation and one method to adapt agents’ relationships. The results
show improved performance and demonstrate that the cost of introducing an additional layer in charge of the system’s adaptation
is lower than its benefits. 相似文献
17.
As an important technology for predictive maintenance, failure prognosis has attracted more and more attentions in recent
years. Real-time reliability prediction is one effective solution to failure prognosis. Considering a dynamic system that
is composed of normal, deteriorating and unreliable components, this paper proposes an integrated approach to perform real-time
reliability prediction for such a class of systems. For a deteriorating component, the degradation is modeled by a time-varying
fault process which is a linear or approximately linear function of time. The behavior of an unreliable component is described
by a random variable which has two possible values corresponding to the operating and malfunction conditions of this component.
The whole proposed approach contains three algorithms. A modified interacting multiple model particle filter is adopted to
estimate the dynamic system’s state variables and the unmeasurable time-varying fault. An exponential smoothing algorithm
named the Holt’s method is used to predict the fault process. In the end, the system’s reliability is predicted in real time
by use of the Monte Carlo strategy. The proposed approach can effectively predict the impending failure of a dynamic system,
which is verified by computer simulations based on a three-vessel water tank system. 相似文献
18.
In this paper we describe the process of a multi-disciplinary medical team meeting (MDTM), its functions and operation in
colocated and teleconference discussions. Our goal is to identify the elements and mechanics of operation that enhance or
threaten the dependability of the MDTM as a “system” and propose technologies and measures to make this system more reliable.
In particular, we assess the effect of adding teleconferencing to the MDTM, and identify strengths and vulnerabilities introduced
into the system by the addition of teleconferencing technology. We show that, with respect to the system’s external task environment,
rhythms of execution of pre-meeting and post-meeting activities are critical for MDTM success and that the extension of the
MDTM to wider geographic locations with teleconferencing might disrupt such rhythms thereby posing potential threats to dependability.
On the other hand, an analysis of vocalisation patterns demonstrates that despite difficulties related to coordination and
awareness in video-mediated communication (evidenced by increased time spent in case discussion, longer turns, decreased turn
frequency and near lack of informal exchanges) the overall case discussion structure is unaffected by the addition of teleconferencing
technology into proceedings. 相似文献
19.
The LOCKSS system is a world-wide peer-to-peer system for the preservation of academic journals and other archival information
published on the Web. The system is deployed at over 200 libraries around the world and currently preserving titles of publishers
representing more than 2000 academic titles. It consists of a large number of independent, low-cost, persistent Web caches
that cooperate to detect and repair damage to their content by voting in “opinion polls.” Based on our experience working
with the LOCKSS system, in this paper, we identify and characterize a fundamental tradeoff in the system’s ability to defend
against adversaries with competing goals. In particular, the techniques used to defend against adversaries attempting stealth
modification of content being preserved in the system are at odds with those used to identify nuisance adversaries simply
trying to disrupt system procedures. We show that with a simple change to the design of the system’s preservation protocol
we are able to create moderately strong defense against both of these competing adversaries simultaneously. 相似文献