{"title":"SoSE 2020 Authors Index","authors":"","doi":"10.1109/sose50414.2020.9130548","DOIUrl":"https://doi.org/10.1109/sose50414.2020.9130548","url":null,"abstract":"","PeriodicalId":121664,"journal":{"name":"2020 IEEE 15th International Conference of System of Systems Engineering (SoSE)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114802260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advanced Control of Heat Exchangers in Series","authors":"A. Vasickaninova, M. Bakosová, A. Mészáros","doi":"10.1109/SoSE50414.2020.9130477","DOIUrl":"https://doi.org/10.1109/SoSE50414.2020.9130477","url":null,"abstract":"The paper deals with the design and application of advanced control approaches assuming the considered controlled system is a cooling system of four heat exchangers in series. Neural network model-based predictive control (NNPC) strategy, feedback linearization control, and fuzzy PI control are chosen. The results of the proposed control strategies are studied and verified and then compared with the results obtained by a conventional PID controller and the gain scheduled PID controller. The results show that NNPC and fuzzy control can improve heat exchangers control and achieve objectives such as reducing cooling water consumption.","PeriodicalId":121664,"journal":{"name":"2020 IEEE 15th International Conference of System of Systems Engineering (SoSE)","volume":"691 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116095022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Enterprise: Engineering and Control","authors":"M. Belov, D. Novikov","doi":"10.1109/SoSE50414.2020.9130549","DOIUrl":"https://doi.org/10.1109/SoSE50414.2020.9130549","url":null,"abstract":"The paper presents a system of formal models that allows posing and solving the question of engineering and managing an Enterprise as a mathematical optimization problem. A methodological analysis is made and a qualitative formalism is developed in the form of an integrated set of structural and process models describing the Enterprise and its complex activity. A harmonized set of mathematical models and methods is synthesized. The qualitative and mathematical models and methods constitute a basic conceptual structure of ideas and approaches on how to create and optimally manage an Enterprise: the Optimal Enterprise Control Framework.","PeriodicalId":121664,"journal":{"name":"2020 IEEE 15th International Conference of System of Systems Engineering (SoSE)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116111502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anita Grontman, Lukasz Horyza, Krzystof Koczan, M. Marzec, Maciej Smiertka, M. Trybala
{"title":"Analysis of sword fencing training evaluation possibilities using Motion Capture techniques","authors":"Anita Grontman, Lukasz Horyza, Krzystof Koczan, M. Marzec, Maciej Smiertka, M. Trybala","doi":"10.1109/SoSE50414.2020.9130469","DOIUrl":"https://doi.org/10.1109/SoSE50414.2020.9130469","url":null,"abstract":"Inspired by works that included the use of Motion Capture for human body movement estimation, authors have created a program to test the correct performance of sword fencing in terms of combat sports, more specifically, the Historical European Martial Arts (HEMA). The focus is on the analysis of four actors, only one of them is a professional fencer. Each made the same motions that were recorded by the MoCap system to determine the pattern of the correct cut and show the mistakes made by amateurs.","PeriodicalId":121664,"journal":{"name":"2020 IEEE 15th International Conference of System of Systems Engineering (SoSE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122545283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Complexity Analysis Approach for Model-based System Engineering","authors":"Zhenchao Hu, Jinzhi Lu, Jinwei Chen, Xiaochen Zheng, D. Kyritsis, Hui-sheng Zhang","doi":"10.1109/SoSE50414.2020.9130478","DOIUrl":"https://doi.org/10.1109/SoSE50414.2020.9130478","url":null,"abstract":"With the increasing complexity of the highly engineered products, Model-based Systems Engineering (MBSE) is proposed to support the complexity management of the product development. As the basic of complexity management, complexity analysis is used to measure the system complexity for system solution trade-offs. Using traditional MBSE approaches, system architectures of product are formalized as MBSE models whose complexity measurement provides cues to quantitative trade-offs. In this paper, an MBSE approach is proposed to support complex analysis using qualitative and quantitative approaches. A GOPPRR approach is first proposed to support MBSE formalisms. Then a complexity measurement formula is used to calculate the structure complexity of the MBSE models. Finally, through a tool-chain developed based on Open Services for Lifecycle Collaboration (OSLC), a visualization tool is used to analyze the system complexity by measuring and visualizing the model complexity. A case study is proposed to evaluate the potentials of this approach for supporting product trade-offs. From the results, the approach enables to calculate complexity of MBSE models and virtualizes the model topologies.","PeriodicalId":121664,"journal":{"name":"2020 IEEE 15th International Conference of System of Systems Engineering (SoSE)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131634629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Youssef Damak, Y. Leroy, Guillaume Trehard, M. Jankovic
{"title":"Operational Context-Based Design Method of Autonomous Vehicles Logical Architectures","authors":"Youssef Damak, Y. Leroy, Guillaume Trehard, M. Jankovic","doi":"10.1109/SoSE50414.2020.9130533","DOIUrl":"https://doi.org/10.1109/SoSE50414.2020.9130533","url":null,"abstract":"Autonomous Vehicles (AV) exhibit new characteristics rendering its architecting process challenging. They are context-aware cyber-physical systems with a high sensitivity toward their operational context. In addition to the lack of industrial feedback, their architecture needs to be adapted to their Operational Context (OC). The current literature doesn’t provide a clear method for designing AV architecture based on their OC. This paper proposes a four steps method following the Concept of Operation approach (ConOps) and functional chain modeling to design AV architecture based on their OC and experts knowledge. The method uses a state-of the-art OC ontology for AV and improves the identification speed and coverage of the AV’s operational needs. A case study is presented addressing the proposed methods and limitations.","PeriodicalId":121664,"journal":{"name":"2020 IEEE 15th International Conference of System of Systems Engineering (SoSE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125372359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Bertolino, G. D. Angelis, F. Lonetti, V. Neves, M. Á. Olivero
{"title":"EDUFYSoS: A Factory of Educational System of Systems Case Studies","authors":"A. Bertolino, G. D. Angelis, F. Lonetti, V. Neves, M. Á. Olivero","doi":"10.1109/SoSE50414.2020.9130551","DOIUrl":"https://doi.org/10.1109/SoSE50414.2020.9130551","url":null,"abstract":"We propose a factory of educational System of Systems (SoS) case studies that can be used for evaluating SoS research results, in particular in SoS testing. The factory includes a first set of constituent systems that can collaborate within different SoS architectures to accomplish different missions. In the paper, we introduce three possible SoSs and outline their missions. For more detailed descriptions, diagrams and the source code, we refer to the online repository of EDUFYSoS. The factory is meant to provide an extensible playground, which we aim to grow to include more systems and other missions with the support of the community.","PeriodicalId":121664,"journal":{"name":"2020 IEEE 15th International Conference of System of Systems Engineering (SoSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124385309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identifying Security Issues with MBSE while Rebuilding Legacy Software Systems","authors":"Donatas Mazeika, R. Butleris","doi":"10.1109/SoSE50414.2020.9130491","DOIUrl":"https://doi.org/10.1109/SoSE50414.2020.9130491","url":null,"abstract":"in this paper, we introduce how Model-based System Engineering (MBSE) could be leveraged in order to tackle security issues while recreating legacy software systems. Originally, MBSE was dedicated to managing the complex system creation in terms of system requirements, design, analysis, verification and validation activities leaving security aspects aside. However, previous research shows that security analysis activity could be integrated into MBSE activity and powerful MBSE tools such as change impact analysis, simulation, validation, and verification could be successfully applied in cross-cutting disciplines. The paper presents guidelines on how and when to apply various security techniques (e.g. security requirements, misuse cases, attack scenarios) in the MBSE environment. The case study demonstrates and proves the adaptability of the security guidelines on the realworld software system modernization project.","PeriodicalId":121664,"journal":{"name":"2020 IEEE 15th International Conference of System of Systems Engineering (SoSE)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116967149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transformation of the UML Deployment Model into a Distributed Ledger Network Configuration","authors":"T. Górski, J. Bednarski","doi":"10.1109/SoSE50414.2020.9130492","DOIUrl":"https://doi.org/10.1109/SoSE50414.2020.9130492","url":null,"abstract":"A distributed ledger is a decentralized database spread across many participants. Various models describe software architecture and represent different architectural views. The paper concentrates on the deployment view. Model-Driven Development (MDD) is a software engineering approach that leverages models and transformations. The paper describes the UML2Deployment transformation of the distributed ledger’s deployment model into its deployment script. The deployment model, expressed in Unified Modeling Language (UML), is augmented with stereotypes and tagged values from UML Profile for Distributed Ledger Deployment. The target of the transformation is Gradle Groovy Domain Specific Language (DSL) deployment script for DLT network configuration. The transformation has been designed for R3 Corda framework. The authors propose the complete solution. The transformation has been incorporated into Visual Paradigm modeling tool.","PeriodicalId":121664,"journal":{"name":"2020 IEEE 15th International Conference of System of Systems Engineering (SoSE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126573540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Deepak K. Tosh, Oscar Galindo, V. Kreinovich, O. Kosheleva
{"title":"Towards Security of Cyber-Physical Systems using Quantum Computing Algorithms","authors":"Deepak K. Tosh, Oscar Galindo, V. Kreinovich, O. Kosheleva","doi":"10.1109/SoSE50414.2020.9130525","DOIUrl":"https://doi.org/10.1109/SoSE50414.2020.9130525","url":null,"abstract":"For cyber-physical systems (CPS), ensuring process and data security is critically important since the corresponding infrastructure needs to have high operational efficiency with no downtime. There are many techniques available that make communications in CPS environments secure – such as enabling traffic encryption between sensors and the computers processing the sensor’s data, incorporating message authentication codes to achieve integrity, etc. However, most of these techniques are dependent on some form of symmetric or asymmetric cryptographic algorithms like AES and RSA. These algorithms are under threat because of the emerging quantum computing paradigm: with quantum computing, these encryption algorithms can be potentially broken. It is therefore desirable to explore the use of quantum cryptography – which cannot be broken by quantum computing – for securing the classical communications infrastructure deployed in CPS. In this paper, we discuss possible consequences of this option. We also explain how quantum computers can help even more: namely, they can be used to maximize the system’s security where scalability is never a constraint, and to ensure we are not wasting time cycles on communicating and processing irrelevant information.","PeriodicalId":121664,"journal":{"name":"2020 IEEE 15th International Conference of System of Systems Engineering (SoSE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128361580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}