992 resultados para Integrity Systems


Relevância:

70.00% 70.00%

Publicador:

Resumo:

Distributed real-time embedded systems are becoming increasingly important to society. More demands will be made on them and greater reliance will be placed on the delivery of their services. A relevant subset of them is high-integrity or hard real-time systems, where failure can cause loss of life, environmental harm, or significant financial loss. Additionally, the evolution of communication networks and paradigms as well as the necessity of demanding processing power and fault tolerance, motivated the interconnection between electronic devices; many of the communications have the possibility of transferring data at a high speed. The concept of distributed systems emerged as systems where different parts are executed on several nodes that interact with each other via a communication network. Java’s popularity, facilities and platform independence have made it an interesting language for the real-time and embedded community. This was the motivation for the development of RTSJ (Real-Time Specification for Java), which is a language extension intended to allow the development of real-time systems. The use of Java in the development of high-integrity systems requires strict development and testing techniques. However, RTJS includes a number of language features that are forbidden in such systems. In the context of the HIJA project, the HRTJ (Hard Real-Time Java) profile was developed to define a robust subset of the language that is amenable to static analysis for high-integrity system certification. Currently, a specification under the Java community process (JSR- 302) is being developed. Its purpose is to define those capabilities needed to create safety critical applications with Java technology called Safety Critical Java (SCJ). However, neither RTSJ nor its profiles provide facilities to develop distributed realtime applications. This is an important issue, as most of the current and future systems will be distributed. The Distributed RTSJ (DRTSJ) Expert Group was created under the Java community process (JSR-50) in order to define appropriate abstractions to overcome this problem. Currently there is no formal specification. The aim of this thesis is to develop a communication middleware that is suitable for the development of distributed hard real-time systems in Java, based on the integration between the RMI (Remote Method Invocation) model and the HRTJ profile. It has been designed and implemented keeping in mind the main requirements such as the predictability and reliability in the timing behavior and the resource usage. iThe design starts with the definition of a computational model which identifies among other things: the communication model, most appropriate underlying network protocols, the analysis model, and a subset of Java for hard real-time systems. In the design, the remote references are the basic means for building distributed applications which are associated with all non-functional parameters and resources needed to implement synchronous or asynchronous remote invocations with real-time attributes. The proposed middleware separates the resource allocation from the execution itself by defining two phases and a specific threading mechanism that guarantees a suitable timing behavior. It also includes mechanisms to monitor the functional and the timing behavior. It provides independence from network protocol defining a network interface and modules. The JRMP protocol was modified to include two phases, non-functional parameters, and message size optimizations. Although serialization is one of the fundamental operations to ensure proper data transmission, current implementations are not suitable for hard real-time systems and there are no alternatives. This thesis proposes a predictable serialization that introduces a new compiler to generate optimized code according to the computational model. The proposed solution has the advantage of allowing us to schedule the communications and to adjust the memory usage at compilation time. In order to validate the design and the implementation a demanding validation process was carried out with emphasis in the functional behavior, the memory usage, the processor usage (the end-to-end response time and the response time in each functional block) and the network usage (real consumption according to the calculated consumption). The results obtained in an industrial application developed by Thales Avionics (a Flight Management System) and in exhaustive tests show that the design and the prototype are reliable for industrial applications with strict timing requirements. Los sistemas empotrados y distribuidos de tiempo real son cada vez más importantes para la sociedad. Su demanda aumenta y cada vez más dependemos de los servicios que proporcionan. Los sistemas de alta integridad constituyen un subconjunto de gran importancia. Se caracterizan por que un fallo en su funcionamiento puede causar pérdida de vidas humanas, daños en el medio ambiente o cuantiosas pérdidas económicas. La necesidad de satisfacer requisitos temporales estrictos, hace más complejo su desarrollo. Mientras que los sistemas empotrados se sigan expandiendo en nuestra sociedad, es necesario garantizar un coste de desarrollo ajustado mediante el uso técnicas adecuadas en su diseño, mantenimiento y certificación. En concreto, se requiere una tecnología flexible e independiente del hardware. La evolución de las redes y paradigmas de comunicación, así como la necesidad de mayor potencia de cómputo y de tolerancia a fallos, ha motivado la interconexión de dispositivos electrónicos. Los mecanismos de comunicación permiten la transferencia de datos con alta velocidad de transmisión. En este contexto, el concepto de sistema distribuido ha emergido como sistemas donde sus componentes se ejecutan en varios nodos en paralelo y que interactúan entre ellos mediante redes de comunicaciones. Un concepto interesante son los sistemas de tiempo real neutrales respecto a la plataforma de ejecución. Se caracterizan por la falta de conocimiento de esta plataforma durante su diseño. Esta propiedad es relevante, por que conviene que se ejecuten en la mayor variedad de arquitecturas, tienen una vida media mayor de diez anos y el lugar ˜ donde se ejecutan puede variar. El lenguaje de programación Java es una buena base para el desarrollo de este tipo de sistemas. Por este motivo se ha creado RTSJ (Real-Time Specification for Java), que es una extensión del lenguaje para permitir el desarrollo de sistemas de tiempo real. Sin embargo, RTSJ no proporciona facilidades para el desarrollo de aplicaciones distribuidas de tiempo real. Es una limitación importante dado que la mayoría de los actuales y futuros sistemas serán distribuidos. El grupo DRTSJ (DistributedRTSJ) fue creado bajo el proceso de la comunidad de Java (JSR-50) con el fin de definir las abstracciones que aborden dicha limitación, pero en la actualidad aun no existe una especificacion formal. El objetivo de esta tesis es desarrollar un middleware de comunicaciones para el desarrollo de sistemas distribuidos de tiempo real en Java, basado en la integración entre el modelo de RMI (Remote Method Invocation) y el perfil HRTJ. Ha sido diseñado e implementado teniendo en cuenta los requisitos principales, como la predecibilidad y la confiabilidad del comportamiento temporal y el uso de recursos. El diseño parte de la definición de un modelo computacional el cual identifica entre otras cosas: el modelo de comunicaciones, los protocolos de red subyacentes más adecuados, el modelo de análisis, y un subconjunto de Java para sistemas de tiempo real crítico. En el diseño, las referencias remotas son el medio básico para construcción de aplicaciones distribuidas las cuales son asociadas a todos los parámetros no funcionales y los recursos necesarios para la ejecución de invocaciones remotas síncronas o asíncronas con atributos de tiempo real. El middleware propuesto separa la asignación de recursos de la propia ejecución definiendo dos fases y un mecanismo de hebras especifico que garantiza un comportamiento temporal adecuado. Además se ha incluido mecanismos para supervisar el comportamiento funcional y temporal. Se ha buscado independencia del protocolo de red definiendo una interfaz de red y módulos específicos. También se ha modificado el protocolo JRMP para incluir diferentes fases, parámetros no funcionales y optimizaciones de los tamaños de los mensajes. Aunque la serialización es una de las operaciones fundamentales para asegurar la adecuada transmisión de datos, las actuales implementaciones no son adecuadas para sistemas críticos y no hay alternativas. Este trabajo propone una serialización predecible que ha implicado el desarrollo de un nuevo compilador para la generación de código optimizado acorde al modelo computacional. La solución propuesta tiene la ventaja que en tiempo de compilación nos permite planificar las comunicaciones y ajustar el uso de memoria. Con el objetivo de validar el diseño e implementación se ha llevado a cabo un exigente proceso de validación con énfasis en: el comportamiento funcional, el uso de memoria, el uso del procesador (tiempo de respuesta de extremo a extremo y en cada uno de los bloques funcionales) y el uso de la red (consumo real conforme al estimado). Los buenos resultados obtenidos en una aplicación industrial desarrollada por Thales Avionics (un sistema de gestión de vuelo) y en las pruebas exhaustivas han demostrado que el diseño y el prototipo son fiables para aplicaciones industriales con estrictos requisitos temporales.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

La corrupción sigue siendo uno de los principales problemas del Estado de Derecho en el siglo XXI. Su incidencia reduce la eficacia de la inversión, aumenta el valor de los bienes y servicios, reduce la competitividad de las empresas, vulnera la confianza de los ciudadanos en el ordenamiento jurídico y sobre todo condena a la miseria a quienes deben ser destinatarios de las políticas públicas.Sin embrago, la lucha que han realizado muchos gobiernos y funcionarios judiciales contra este fenómeno ha modificado sus formas de aparición, pues es cada vez menos frecuente la apropiación directa de los caudales públicos o la entrega de sobornos a los funcionarios, prefiriéndose métodos mucho más sutiles como los sobrecostos, la subcontratación masiva o la constitución de complicadas sociedades, en las cuales tienen participación los funcionarios públicos o sus familias.Este libro constituye un esfuerzo por el estudio jurídico y criminológico de la corrupción y los delitos contra la administración pública en Europa y Latinoamérica y reúne la selección de los temas penales más relevantes de la tesis doctoral del profesor Carlos Guillermo Castro Cuenca, denominada Aproximación a la Corrupción en la contratación pública y defendida en la universidad de Salamanca en febrero de 2008, con lo cual obtuvo la calificación de sobresaliente por unanimidad.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Abstract. The ASSERT project de?ned new software engineering methods and tools for the development of critical embedded real-time systems in the space domain. The ASSERT model-driven engineering process was one of the achievements of the project and is based on the concept of property- preserving model transformations. The key element of this process is that non-functional properties of the software system must be preserved during model transformations. Properties preservation is carried out through model transformations compliant with the Ravenscar Pro?le and provides a formal basis to the process. In this way, the so-called Ravenscar Computational Model is central to the whole ASSERT process. This paper describes the work done in the HWSWCO study, whose main objective has been to address the integration of the Hardware/Software co-design phase in the ASSERT process. In order to do that, non-functional properties of the software system must also be preserved during hardware synthesis. Keywords : Ada 2005, Ravenscar pro?le, Hardware/Software co-design, real- time systems, high-integrity systems, ORK

Relevância:

40.00% 40.00%

Publicador:

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper presents the application of artificial immune systems for analysis of the structural integrity of a building. Inspired by a biological process, it uses the negative selection algorithm to perform the identification and characterization of structural failure. This paper presents the application of artificial immune systems for analysis of the structural integrity of a building. Inspired by a biological process, it uses the negative selection algorithm to perform the identification and characterization of structural failure. This methodology can assist professionals in the inspection of mechanical and civil structures, to identify and characterize flaws, in order to perform preventative maintenance to ensure the integrity of the structure and decision-making. In order to evaluate the methodology was made modeling a two-story building and several situations were simulated (base-line condition and improper conditions), yielding a database of signs, which were used as input data for the negative selection algorithm. The results obtained by the present method efficiency, robustness and accuracy.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Cost, performance and availability considerations are forcing even the most conservative high-integrity embedded real-time systems industry to migrate from simple hardware processors to ones equipped with caches and other acceleration features. This migration disrupts the practices and solutions that industry had developed and consolidated over the years to perform timing analysis. Industry that are confident with the efficiency/effectiveness of their verification and validation processes for old-generation processors, do not have sufficient insight on the effects of the migration to cache-equipped processors. Caches are perceived as an additional source of complexity, which has potential for shattering the guarantees of cost- and schedule-constrained qualification of their systems. The current industrial approach to timing analysis is ill-equipped to cope with the variability incurred by caches. Conversely, the application of advanced WCET analysis techniques on real-world industrial software, developed without analysability in mind, is hardly feasible. We propose a development approach aimed at minimising the cache jitters, as well as at enabling the application of advanced WCET analysis techniques to industrial systems. Our approach builds on:(i) identification of those software constructs that may impede or complicate timing analysis in industrial-scale systems; (ii) elaboration of practical means, under the model-driven engineering (MDE) paradigm, to enforce the automated generation of software that is analyzable by construction; (iii) implementation of a layout optimisation method to remove cache jitters stemming from the software layout in memory, with the intent of facilitating incremental software development, which is of high strategic interest to industry. The integration of those constituents in a structured approach to timing analysis achieves two interesting properties: the resulting software is analysable from the earliest releases onwards - as opposed to becoming so only when the system is final - and more easily amenable to advanced timing analysis by construction, regardless of the system scale and complexity.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The development of High-Integrity Real-Time Systems has a high footprint in terms of human, material and schedule costs. Factoring functional, reusable logic in the application favors incremental development and contains costs. Yet, achieving incrementality in the timing behavior is a much harder problem. Complex features at all levels of the execution stack, aimed to boost average-case performance, exhibit timing behavior highly dependent on execution history, which wrecks time composability and incrementaility with it. Our goal here is to restitute time composability to the execution stack, working bottom up across it. We first characterize time composability without making assumptions on the system architecture or the software deployment to it. Later, we focus on the role played by the real-time operating system in our pursuit. Initially we consider single-core processors and, becoming less permissive on the admissible hardware features, we devise solutions that restore a convincing degree of time composability. To show what can be done for real, we developed TiCOS, an ARINC-compliant kernel, and re-designed ORK+, a kernel for Ada Ravenscar runtimes. In that work, we added support for limited-preemption to ORK+, an absolute premiere in the landscape of real-word kernels. Our implementation allows resource sharing to co-exist with limited-preemptive scheduling, which extends state of the art. We then turn our attention to multicore architectures, first considering partitioned systems, for which we achieve results close to those obtained for single-core processors. Subsequently, we shy away from the over-provision of those systems and consider less restrictive uses of homogeneous multiprocessors, where the scheduling algorithm is key to high schedulable utilization. To that end we single out RUN, a promising baseline, and extend it to SPRINT, which supports sporadic task sets, hence matches real-world industrial needs better. To corroborate our results we present findings from real-world case studies from avionic industry.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This project determined if the performance based septic system, proposed for a development on Black Hammock Island in Jacksonville, Florida, is the best choice to prevent environmental contamination from septic tanks and if adequate regulatory policy exists. Research shows a central wastewater treatment plant provides the most efficient pollutant removal but can be cost prohibitive. This project found performance based systems surpasses conventional septic system performance and are more suited and economical to remote areas without sewer service. This project finds current regulations to be inadequate and supports ordinance changes proposed by the Mayor of Jacksonville to enhance the current policy and provide more adequate and meaningful regulation.

Relevância:

40.00% 40.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The increasing adoption of information systems in healthcare has led to a scenario where patient information security is more and more being regarded as a critical issue. Allowing patient information to be in jeopardy may lead to irreparable damage, physically, morally, and socially to the patient, potentially shaking the credibility of the healthcare institution. Medical images play a crucial role in such context, given their importance in diagnosis, treatment, and research. Therefore, it is vital to take measures in order to prevent tampering and determine their provenance. This demands adoption of security mechanisms to assure information integrity and authenticity. There are a number of works done in this field, based on two major approaches: use of metadata and use of watermarking. However, there still are limitations for both approaches that must be properly addressed. This paper presents a new method using cryptographic means to improve trustworthiness of medical images, providing a stronger link between the image and the information on its integrity and authenticity, without compromising image quality to the end user. Use of Digital Imaging and Communications in Medicine structures is also an advantage for ease of development and deployment.

Relevância:

30.00% 30.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Objectives. To test the null hypothesis that continuity of resin cement/dentin interfaces is not affected by location along the root canal walls or water storage for 3 months when bonding fiber posts into root canals. Methods. Fiber posts were luted to bovine incisors using four resinous luting systems: Multilink, Variolink II, Enforce Dual and Enforce PV. After cementation, roots were longitudinally sectioned and epoxy resin replicas were prepared for SEM analysis (baseline). The original halves were immersed in solvent, replicated and evaluated. After 3 months water storage and a second solvent immersion, a new set of replicas were made and analyzed. The ratio (%) between the length (mm) of available bonding interface and the actual extension of bonded cement/dentin interface was calculated. Results. Significant lower percent values of bond integrity were found for Multilink (8.25%) and Variolink 11 (10.08%) when compared to Enforce Dual (25.11%) and Enforce PV (27.0%) at baseline analysis. The same trend was observed after immersion in solvent, with no significant changes. However, bond integrity was significantly reduced after 3 months water storage and a second solvent immersion to values below 5% (Multilink = 3.31%, Variolink=1.87%, Enforce Dual=1.20%, and Enforce PV=0.75%). The majority of gaps were depicted at the apical and middle thirds at baseline and after immersion in solvent. After 3 months, gaps were also detected at the cervical third. Significance. Bond integrity at the cement/dentin interface was surprisingly low after cementation of fiber posts to root canals with all resin cements. That was not significantly altered after immersion in solvent, but was further compromised after 3 months water storage. Gaps were mainly seen at middle and apical thirds throughout the experiment and extended to the cervical third after water storage for 3 months. Bond integrity of fiber posts luted to root canals was affected both by location and water storage. (C) 2007 Academy of Dental Materials. Published by Elsevier Ltd. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Purpose: The objective of this study was to evaluate the stress on the cortical bone around single body dental implants supporting mandibular complete fixed denture with rigid (Neopronto System-Neodent) or semirigid splinting system (Barra Distal System-Neodent). Methods and Materials: Stress levels on several system components were analyzed through finite element analysis. Focusing on stress concentration at cortical bone around single body dental implants supporting mandibular complete fixed dentures with rigid ( Neopronto System-Neodent) or semirigid splinting system ( Barra Distal System-Neodent), after axial and oblique occlusal loading simulation, applied in the last cantilever element. Results: The results showed that semirigid implant splinting generated lower von Mises stress in the cortical bone under axial loading. Rigid implant splinting generated higher von Mises stress in the cortical bone under oblique loading. Conclusion: It was concluded that the use of a semirigid system for rehabilitation of edentulous mandibles by means of immediate implant-supported fixed complete denture is recommended, because it reduces stress concentration in the cortical bone. As a consequence, bone level is better preserved, and implant survival is improved. Nevertheless, for both situations the cortical bone integrity was protected, because the maximum stress level findings were lower than those pointed in the literature as being harmful. The maximum stress limit for cortical bone (167 MPa) represents the threshold between plastic and elastic state for a given material. Because any force is applied to an object, and there is no deformation, we can conclude that the elastic threshold was not surpassed, keeping its structural integrity. If the force is higher than the plastic threshold, the object will suffer permanent deformation. In cortical bone, this represents the beginning of bone resorption and/or remodeling processes, which, according to our simulated loading, would not occur. ( Implant Dent 2010; 19:39-49)