Douglas L. Van Bossuyt, B. O’Halloran, Matthew Morningstar
{"title":"Stored System Inherent Availability Optimization from a System of Systems Physics of Failure Perspective","authors":"Douglas L. Van Bossuyt, B. O’Halloran, Matthew Morningstar","doi":"10.1109/SYSOSE.2019.8753871","DOIUrl":"https://doi.org/10.1109/SYSOSE.2019.8753871","url":null,"abstract":"Stored systems of systems (SoS) such as weapons systems in magazines and storage depots, spare equipment for nuclear power plants, and other stored SoS can sit in storage for decades before use. Failures that impact inherent availability can result from diurnal temperature cycles and other storage issues. Individual storage locations within a storage facility can undergo different diurnal temperature cycles which can impact time to failure of specific systems within the SoS due to physics of failure mechanisms (e.g.: transistor failure from repeated thermal cycles). Other issues such as test and maintenance cycles; certain stored systems being the favored extended test system or in the case of weapons systems used on aircraft, favored sortie systems; and other SoS-specific issues can contribute to reduced inherent availability. This paper presents a method of optimizing contributors to inherent availability from a SoS perspective, and using both individual system failure data and SoS cost information. The result is a stored SoS that is optimized to either meet service life requirements, or a stored SoS that is optimized to extend service life beyond the design basis, or a stored SoS that is optimized to increase inherent availability while meeting service life requirements. A case study of a stored SoS weapons system for aircraft is presented to illustrate the method.","PeriodicalId":133413,"journal":{"name":"2019 14th Annual Conference System of Systems Engineering (SoSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128692295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Jaimes, Javier González, Alexander Ibarra, P. Benavidez, M. Jamshidi
{"title":"Low-Cost Heterogeneous Unmanned Ground Vehicle (UGV) Testbed for Systems of Autonomous Vehicles Research","authors":"A. Jaimes, Javier González, Alexander Ibarra, P. Benavidez, M. Jamshidi","doi":"10.1109/SYSOSE.2019.8753850","DOIUrl":"https://doi.org/10.1109/SYSOSE.2019.8753850","url":null,"abstract":"Ahstract-This paper presents design of a mobile testbed of scale-sized UGVs designed for multi-agent autonomous vehicle missions. Small scale autonomous vehicles are used as a means for validating larger scale systems in a low-cost manner. This system is unique in how vehicle trajectories are managed using a mobile relative localization provider available to the system, which can be thought of as a mobile version of a Vicon or Optitrack system. A multi-agent mapping scenario is provided as an initial test of the testbed system. In the scenario, each vehicle in the testbed has roles in accurately mapping objects within an environment. Robots and data are managed with the Robot Operating System (ROS), which provides access to visualizations through Robot Visualization (RVIZ).","PeriodicalId":133413,"journal":{"name":"2019 14th Annual Conference System of Systems Engineering (SoSE)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123440850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. He, Chih Lai, D. Martinovic-Weigelt, Zezheng Long
{"title":"A Pipeline Approach in Identifying Important Input Features from Neural Networks","authors":"Y. He, Chih Lai, D. Martinovic-Weigelt, Zezheng Long","doi":"10.1109/SYSOSE.2019.8753849","DOIUrl":"https://doi.org/10.1109/SYSOSE.2019.8753849","url":null,"abstract":"Neural networks are well-known for their powerful capability in producing high prediction accuracy. However, due to the non-linear calculations in the network, it is very difficult for users to understand which input features are important in leading to final predictions. In this study, we propose a two-step pipeline approach that uses two sets of linear models to estimates feature importance in the input dataset $X$ that leads to the class prediction specified in Y. More specifically, the first linear regression model derives the feature importance in $X$ in explaining the Z-code that was extracted from any hidden layer of a trained neural network. The second linear classification model captures the importance in the Z- code in predicting the target class Y. We then combine the first $X$ to $Z$ importance with the second $Z$ to $Y$ importance together to approximate the non-linear importance from $X$ to Y. The experiments conducted in this study also show that our method is sound and stable in selecting the truly important features from input datasets regardless how a neural network was constructed with different parameters such as activation functions or the number of hidden layers.","PeriodicalId":133413,"journal":{"name":"2019 14th Annual Conference System of Systems Engineering (SoSE)","volume":"32 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130736282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nan Messe, Nicolas Belloir, Vanea Chiprianov, Imane Cherfa, Régis Fleurquin, Salah Sadou
{"title":"Development of Secure System of Systems Needing a Rapid Deployment","authors":"Nan Messe, Nicolas Belloir, Vanea Chiprianov, Imane Cherfa, Régis Fleurquin, Salah Sadou","doi":"10.1109/SYSOSE.2019.8753857","DOIUrl":"https://doi.org/10.1109/SYSOSE.2019.8753857","url":null,"abstract":"In certain cases, such as secure humanitarian corridors in a conflict zone, a special type of SoS, needing a rapid deployment, has to be developed. Because of the tense time constraint, usually only a domain expert is responsible with this development. However, many such SoSs also have to take into account the security aspect. How to help a domain expert integrate the security aspect into the rapid development of an SoS? In this proposal paper, we present an approach and a tool suite that help the domain expert tag business assets using security properties, which are then used to identify vulnerabilities and to propose possible security control mechanisms. We illustrate our proposal on a case study.","PeriodicalId":133413,"journal":{"name":"2019 14th Annual Conference System of Systems Engineering (SoSE)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133879770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ORBDeepOdometry - A Feature-Based Deep Learning Approach to Monocular Visual Odometry","authors":"Karthik Sivarama Krishnan, F. Sahin","doi":"10.1109/SYSOSE.2019.8753848","DOIUrl":"https://doi.org/10.1109/SYSOSE.2019.8753848","url":null,"abstract":"Visual Odometry (VO) is an application of computer vision which helps in autonomous navigation of Self-Driving vehicles, Robots etc. The odometry pose of the vehicle can be estimated using the consecutive frames based on monocular or stereo camera setup mounted on the vehicle. The Simultaneous Localization and Mapping (SLAM) based approaches have shown phenomenal results in predicting the vehicle odometry. Deep Learning based approaches are emerging in the field of computer vision and are outperforming other classic algorithms. But, visual odometry is one of the field where deep learning approaches have not yet been exploited largely. This paper proposes the use of Deep Learning based pipeline approach to solve the problem of visual odometry. The paper boosts the performance of deep learning approach by extracting quite more features before training the network. This paper proposes the use of ORB based feature extractor along with Convolutional Neural Network based dimensionality reduction and stacking multiple deep LSTM's for modelling the sequential data. In this case, the KITTI vision Benchmark dataset is used to model the network. The accuracy of the network is examined by calculating the error between the predicted odometry output and the ground truth odometry output. The results are compared with different Convolutional Neural Network (CNN) architectures proposed for the same task. The average translation error from the proposed system is 11.99% and the average rotational error from the proposed system is 0.0462 degrees per meter.","PeriodicalId":133413,"journal":{"name":"2019 14th Annual Conference System of Systems Engineering (SoSE)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130636354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Metamodeling NATO Operation Orders: a proof-of-concept to deal with digitalization of the battlefield","authors":"Nicolas Belloir, J. Buisson, O. Bartheye","doi":"10.1109/SYSOSE.2019.8753885","DOIUrl":"https://doi.org/10.1109/SYSOSE.2019.8753885","url":null,"abstract":"Digitalization of the whole society changes the way Systems-of-Systems have to be considered. Remaining independently operated and managed, SoS increase their collaboration skills using shared or cooperated information systems. People can be seen as particular digital sub-systems due to smart equipments they can use. Military operations, which are considered as typical SoS, are no exception to this fact. New operational doctrines have to be created to take advantage of those new capabilities. In this paper, we propose to develop methods and tools inspired by software engineering to create new automated capabilities in battlefield engineering. More precisely, we explain the direction which should be considered in the area of battlefield engineering in order to deal with those new capabilities. Inspired from Model-Based Engineering, we realized a proof-of-concept showing how to change textual operation orders with graphical ones. The latter can be exported in a common standardized format, that enables digital interpretation. We present the OPORD-ML language which is based on a metamodel inspired from a NATO operation order standard. It is supported by an automatically generated tool.","PeriodicalId":133413,"journal":{"name":"2019 14th Annual Conference System of Systems Engineering (SoSE)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122135311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Patrick Ormond, Anil Kumar Yerrapragada, B. Kelley
{"title":"Error Rate Analysis of Physical Layer Security for Sub-6 GHz 5G Network Planning","authors":"Patrick Ormond, Anil Kumar Yerrapragada, B. Kelley","doi":"10.1109/SYSOSE.2019.8753853","DOIUrl":"https://doi.org/10.1109/SYSOSE.2019.8753853","url":null,"abstract":"1, This paper investigates the application of Key-based Physical Layer Security to future 5G and IoT network dimensioning, not previously considered in other works. Results indicate a Key bit Error Rate of 1% at a cell separation of 500m with a reuse of 7. A derivation for a closed form expression of the Key bit Error Rate as a function of radio network parameters is presented for a specific Precoder Matrix Index (PMI) based Physical Layer Security scheme known as MOPRO. The equation, which accounts for Rayleigh fading environments, is verified against simulated data, and shows a gain of 6dB for 1-bit codebooks over 2-bit codebooks. Also shown is a closed form statistical expression for the probability density function of the Key bit Error Rate. The expression for direct computation of Key bit Error Rate statistics points the way forward toward future physical layer security based planning in heterogeneous networks.","PeriodicalId":133413,"journal":{"name":"2019 14th Annual Conference System of Systems Engineering (SoSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129121705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity as a Centralized Directed System of Systems Using SoS Explorer as a Tool","authors":"Lirim Ashiku, C. Dagli","doi":"10.1109/SYSOSE.2019.8753872","DOIUrl":"https://doi.org/10.1109/SYSOSE.2019.8753872","url":null,"abstract":"The vast advancements in computing technology and the profound reliance on inter-connected systems has led to a significant growth of cyber-attack incidents. The incidents can propagate from within or outside of organizations, thus ensuing detrimental consequences such as business conducting disruptions, market brand degradation, settlement charges, regulatory compliance issues, etc. The ability to withstand such interference is essential to maintaining a vital and competitively advantageous organization. This paper analyzes coexisting vulnerabilities and the utilization of innovative and effective mechanisms to identify and block undesirable emergence through a centrally controlled and directed SoS approach. The paper will use SoS Explorer as a tool to architect, model and optimize the many objective cybersecurity complex system dealing with securing from exploiting threats through threat-inhibiting systems. The tool provides an intuitive and interactive visualization enabling the user to produce “what-if” analysis on various scenarios, especially for time evolving dynamics of cybersecurity, through generated optimization functional architecture solutions. The paper will further discuss vulnerability exploitation and cybersecurity implications on banking domain describing speculative observations followed by future research directions.","PeriodicalId":133413,"journal":{"name":"2019 14th Annual Conference System of Systems Engineering (SoSE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125805224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Keonho Park, Sungchul Jung, Seungtaik Kim, Jongsun Ko
{"title":"Generated Voltage Control of EV PMSM for Maximizing Energy Recovery Rate using Switched Resonant L-C","authors":"Keonho Park, Sungchul Jung, Seungtaik Kim, Jongsun Ko","doi":"10.1109/SYSOSE.2019.8753832","DOIUrl":"https://doi.org/10.1109/SYSOSE.2019.8753832","url":null,"abstract":"In this paper, we study the method of increasing the energy recovery rate by controlling the voltage which generated by the electric vehicle at the regenerative braking. The method includes an L-C resonance circuit and voltage control to make the battery chargeable. Thus, it is possible to increase the energy recovery and eventually increases the travel distance of the EV. The voltage of the resonant circuit is analyzed using a proposed algorithm with PI and reverse-PI duty controller. Unlike the previous studies have verified the voltage control algorithm only through the simulation, the control algorithm was verified through the experiment using M-G set.","PeriodicalId":133413,"journal":{"name":"2019 14th Annual Conference System of Systems Engineering (SoSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126005766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Patrick Ormond, Anil Kumar Yerrapragada, B. Kelley
{"title":"On the Application of MIMO Space-Time Coding to Physical Layer Security in sub-6 GHz 5G","authors":"Patrick Ormond, Anil Kumar Yerrapragada, B. Kelley","doi":"10.1109/SYSOSE.2019.8753826","DOIUrl":"https://doi.org/10.1109/SYSOSE.2019.8753826","url":null,"abstract":"This paper investigates the application and performance improvement of MIMO Space Time Block Coding (STBC) for Physical Layer Security. The paper analyzes a Precoder Matrix Index (PMI) based scheme called Private Random Precoding (PRP). Key-based Physical Layer Security protects against eavesdroppers in wireless communication links, invaluable in emerging 5G and IoT networks. This paper derives improvements in PRP based on STBC. Also presented are simulation results which show as much as 7 dB improvement in Key bit Error Rate performance vs SINR of the enhanced PRP-STBC scheme for a 1-bit codebook at the cost of decreased transmission rate. In addition, the paper derives a closed form expression for the Key bit Error Rate for both the PRP and enhanced PRP-STBC schemes as a function of dense 5G cellular geometries. Furthermore, we present the effective information rate of the PRP key based communication framework in low SNR scenarios.","PeriodicalId":133413,"journal":{"name":"2019 14th Annual Conference System of Systems Engineering (SoSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121498883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}