{"title":"An integrated framework of the modeling of failure-detection and fault-correction processes in software reliability analysis","authors":"J. Lo","doi":"10.1109/INDIN.2008.4618163","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618163","url":null,"abstract":"The failure-detection and fault-correction are critical processes in attaining good performance of software quality. In this paper, we propose several improvements on the conventional software reliability growth models (SRGMs) to describe actual software development process by eliminating some unrealistic assumptions. Most of these models have focused on the failure detection process and not given equal priority to modeling the fault correction process. But, most latent software errors may remain uncorrected for a long time even after they are detected, which increases their impact. The remaining software faults are often one of the most unreliable reasons for software quality. Therefore, we develop a general framework of the modeling of the failure detection and fault correction processes. Furthermore, we also analyze the effect of applying the delay-time non-homogeneous Poisson process (NHPP) models. Finally, numerical examples are shown to illustrate the results of the integration of the detection and correction process.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129797535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Control software design of positron emission tomography based on real-time Linux","authors":"Z. Ren, Xiaopeng Li, Yongfu Wang, Bangchun Wen","doi":"10.1109/INDIN.2008.4618374","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618374","url":null,"abstract":"Based on the basic principle of real-time system analysis, a multi-task framework proposed for positron emission tomography equipment is used to develop positron emission tomography real-time control system. Realization of the software part is particularly detailed and then the system flow chart of the software part is introduced in the paper and these systems for scanner bed mechanism sub-system, rod source mechanism sub-system, septa mechanism sub-system and wobble mechanism sub-system by experiment are testified to complete planned control task, expected motion control precision and executed systems stability. Experiment results shows good reliability and real-time response of the proposed positron emission tomography real-time control system based on multi-task framework.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131128734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On non-integer order rational model identification","authors":"Defeng Wu, A. Li, Zi Ma, Quanmin Zhu","doi":"10.1109/INDIN.2008.4618195","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618195","url":null,"abstract":"Main contributions include: (1) A non-integer order rational model structure is presented with justification of more general form for non-linear rational models. (2) An adaptive differential evolution algorithm is proposed and applied in parameter estimation of non-integer order rational models. The convergence and effectiveness of the proposed algorithm are validated by two simulation cases.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130865022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient calibration method for RSSI-based location algorithms","authors":"Rafael Pires, Leo Wanner, A. Frôhlich","doi":"10.1109/INDIN.2008.4618282","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618282","url":null,"abstract":"Position awareness is a desirable feature for many applications of Wireless Sensor Networks. The Received Signal Strength Indication of a radio channel provides a feasible way of estimating distance between nodes because its use doesnpsilat require any additional hardware but a radio transceiver. The main drawback of using RSSI is its instability and interference susceptibleness noticed in real environments. This work shows an evaluation of a location algorithm for wireless sensor networks and presents a new calibration approach that substantially improves the trustworthiness in its results. The results show that adequately adjusted RSSI measurements can be successfully used for localization in wireless sensor networks.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130982868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic trust model applied in mobile agent","authors":"Zhen Ye, Weiwei Song, Dayong Ye, Lei Yue","doi":"10.1109/INDIN.2008.4618159","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618159","url":null,"abstract":"A novel philosophy of secure mobile agent model which is based on trust model, risk evaluation and cryptography is proposed in this paper. Compared to current related research, our dynamic model can update in real time and is comprehensive for combining subjective and objective estimation. In addition, this model is broadly adaptive due to its flexibility. Trust and trust relationship are defined on secure problem as while as character of trust itself which are faced when analyzing mobile agent, and trust update function and recommender evaluate function which are already existent are improved. Finally, secure problems which might be brought by trust are discussed.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128730279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review and comparison of fuzzy regression models for energy consumption estimation","authors":"A. Azadeh, O. Seraj, Morteza Saberi","doi":"10.1109/INDIN.2008.4618351","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618351","url":null,"abstract":"The objective of this study is to examine the most well known fuzzy regression approaches with respect to energy consumption estimation. Furthermore there is no clear cut as to which approach is superior for energy consumption estimation. This is quite important in developing countries such China and Iran severe fluctuation for energy consumption. Where classic regression approaches do not provide a suitable prediction. In the present study, monthly data for electricity consumption in Iran are studied from 1992 to 2004. For suitable anticipation of electricity demand fluctuations, sixteen fuzzy regression models are considered in this research. Each fuzzy regression model has different approach and advantages. Auto correlation function was applied for defining input data of each of these models. By using this technique a few combinations are considered for selecting the input of each model. After calculating each model, their outputs will be an estimated function of the rate of electricity consumption in Iran. For determining the rate of error of fuzzy regression models estimations, the rate of output of each model is compared with the actual rate of monthly electricity consumption in test data. Five types of errors are considered for each model. Also an analysis of variance and Duncanpsilas multiple range tests are performed to formally select the best fuzzy regression model. The results show that Peterpsilas model is out performs the other by considerable margin.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124267541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. de M. Valentim, A. Morais, A. Guerreiro, G.B. Branddo, C. D. De Araujo
{"title":"MP-HA: Multicycles Protocol for Hospital Automation over multicast with IEEE 802.3","authors":"R. de M. Valentim, A. Morais, A. Guerreiro, G.B. Branddo, C. D. De Araujo","doi":"10.1109/INDIN.2008.4618244","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618244","url":null,"abstract":"This paper presents a multicycles protocol for hospital automation (MP-HA) that works over multicast addressing and use a master-slave architecture. The protocol creates a segmented logical network based on multicast addressing associated to hospital beds. The objective of MP-HA is to ensure the determinism on network through medium access control mechanism increasing the transmission throughput. Thus, it creates a periodical environment making use of the parallel cycles which is called multicycles.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128047324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual organization for supply chain integration","authors":"W. Wang, H. Chan","doi":"10.1109/INDIN.2008.4618219","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618219","url":null,"abstract":"This study compares two case studies in the same industry which are recently adopting the virtual organization approach in order to improve the performance of their supply chains. One enterprise tries to integrate the market side by merging a brand owner whereas another one seeks for the integration solution to stop suffering from its insufficient control over the sub-manufacturing sites that each of them is registered as an independent firm during the corporate expanding period. By participating in the two projects, our research indicates different barriers of integrating toward the upstream and downstream supply chains and provides a mutual solution by building up the e-Fashion global supply chains. Similarities and dissimilarities of both cases towards the virtual organization approach are also addressed in this paper.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"21 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126098549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ZigBee-based wireless extension of FOUNDATION fieldbus","authors":"Tang Zhong, Zeng Peng, Y. Haibin, Wang Hong","doi":"10.1109/INDIN.2008.4618184","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618184","url":null,"abstract":"Wireless communication technology can bring great benefit to industrial automation systems. But because of the large investment and widespread usage of the fieldbus technologies, wireless extension of the fieldbus is attractive and becomes the focus of researches and applications. According to the industrial communication requirements and the wireless communication characters, a ZigBee-based wireless extension of foundation fieldbus is put forward, providing wireless communication services for automatic monitoring and control for process industry. Its device types, network topology, communication model and performance are given out. When hybrid with wired foundation fieldbus, the improved application gateway is used to connect wired and wireless devices and convert communications. The gateway uses logical devices to reduce communication delay and satisfy different real-time requirements. Performance analysis shows that it can guarantee the real-time communication and improve the efficiency of automation system over the hybrid field network.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127192967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SCADA system security: Complexity, history and new developments","authors":"Ning Cai, Jidong Wang, Xinghuo Yu","doi":"10.1109/INDIN.2008.4618165","DOIUrl":"https://doi.org/10.1109/INDIN.2008.4618165","url":null,"abstract":"Over the last decade, efforts from industries and research communities have been made in addressing the security of Supervisory Control and Data Acquisition (SCADA) systems. However, the SCADA security deployed for critical infrastructures is still a challenging issue today. This paper gives an overview of the complexity of SCADA security. Products and applications in control network security are reviewed. Furthermore, new developments in SCADA security, especially the trend in technical and theoretical studies are presented. Some important topics on SCADA security are identified and highlighted and this can be served as the guide for future works in this area.","PeriodicalId":112553,"journal":{"name":"2008 6th IEEE International Conference on Industrial Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114358434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}