Distributed Real-Time Architecture for Mixed-Criticality Systems


Book Description

This book describes a cross-domain architecture and design tools for networked complex systems where application subsystems of different criticality coexist and interact on networked multi-core chips. The architecture leverages multi-core platforms for a hierarchical system perspective of mixed-criticality applications. This system perspective is realized by virtualization to establish security, safety and real-time performance. The impact further includes a reduction of time-to-market, decreased development, deployment and maintenance cost, and the exploitation of the economies of scale through cross-domain components and tools. Describes an end-to-end architecture for hypervisor-level, chip-level, and cluster level. Offers a solution for different types of resources including processors, on-chip communication, off-chip communication, and I/O. Provides a cross-domain approach with examples for wind-power, health-care, and avionics. Introduces hierarchical adaptation strategies for mixed-criticality systems Provides modular verification and certification methods for the seamless integration of mixed-criticality systems. Covers platform technologies, along with a methodology for the development process. Presents an experimental evaluation of technological results in cooperation with industrial partners. The information in this book will be extremely useful to industry leaders who design and manufacture products with distributed embedded systems in mixed-criticality use-cases. It will also benefit suppliers of embedded components or development tools used in this area. As an educational tool, this material can be used to teach students and working professionals in areas including embedded systems, computer networks, system architecture, dependability, real-time systems, and avionics, wind-power and health-care systems.




Real-time and Autonomous Systems 2022


Book Description

This book contains the results of the researchers presented at this conference, which is supported by German Society of informatics (GI) and other organisations Real-Time Systems Expert Committees. The 43rd Real-Time Systems conference on "Automation in Everyday Life" is addressing an increasingly important topic in a world that is becoming more and more networked. The solutions presented here range from hardware to system design to individual applications. The target audience is students and researchers in computer science and automation technology (partly electrical engineering), engineers, programmers and users of automation and communication systems.




Handbook of Real-Time Computing


Book Description

The aim of this handbook is to summarize the recent rapidly developed real-time computing technologies, from theories to applications. This handbook benefits the readers as a full and quick technical reference with a high-level historic review of technology, detailed technical descriptions and the latest practical applications. In general, the handbook is divided into three main parts (subjected to be modified): theory, design, and application covering different but not limited to the following topics: - Real-time operating systems - Real-time scheduling - Timing analysis - Programming languages and run-time systems - Middleware systems - Design and analysis tools - Real-time aspects of wireless sensor networks - Energy aware real-time methods




Real-Time Sensor Networks and Systems for the Industrial IoT


Book Description

The Industrial Internet of Things (Industrial IoT—IIoT) has emerged as the core construct behind the various cyber-physical systems constituting a principal dimension of the fourth Industrial Revolution. While initially born as the concept behind specific industrial applications of generic IoT technologies, for the optimization of operational efficiency in automation and control, it quickly enabled the achievement of the total convergence of Operational (OT) and Information Technologies (IT). The IIoT has now surpassed the traditional borders of automation and control functions in the process and manufacturing industry, shifting towards a wider domain of functions and industries, embraced under the dominant global initiatives and architectural frameworks of Industry 4.0 (or Industrie 4.0) in Germany, Industrial Internet in the US, Society 5.0 in Japan, and Made-in-China 2025 in China. As real-time embedded systems are quickly achieving ubiquity in everyday life and in industrial environments, and many processes already depend on real-time cyber-physical systems and embedded sensors, the integration of IoT with cognitive computing and real-time data exchange is essential for real-time analytics and realization of digital twins in smart environments and services under the various frameworks’ provisions. In this context, real-time sensor networks and systems for the Industrial IoT encompass multiple technologies and raise significant design, optimization, integration and exploitation challenges. The ten articles in this Special Issue describe advances in real-time sensor networks and systems that are significant enablers of the Industrial IoT paradigm. In the relevant landscape, the domain of wireless networking technologies is centrally positioned, as expected.




Data Science


Book Description

This book constitutes the refereed proceedings of the 6th International Conference on Data Science, ICDS 2019, held in Ningbo, China, during May 2019. The 64 revised full papers presented were carefully reviewed and selected from 210 submissions. The research papers cover the areas of Advancement of Data Science and Smart City Applications, Theory of Data Science, Data Science of People and Health, Web of Data, Data Science of Trust and Internet of Things.




Proceedings of 6th International Conference in Software Engineering for Defence Applications


Book Description

This book presents high-quality original contributions on new software engineering models, approaches, methods, and tools and their evaluation in the context of defence and security applications. In addition, important business and economic aspects are discussed, with a particular focus on cost/benefit analysis, new business models, organizational evolution, and business intelligence systems. The contents are based on presentations delivered at SEDA 2018, the 6th International Conference in Software Engineering for Defence Applications, which was held in Rome, Italy, in June 2018. This conference series represents a targeted response to the growing need for research that reports and debates the practical implications of software engineering within the defence environment and also for software performance evaluation in real settings through controlled experiments as well as case and field studies. The book will appeal to all with an interest in modeling, managing, and implementing defence-related software development products and processes in a structured and supportable way.




Ernst Denert Award for Software Engineering 2020


Book Description

This open access book provides an overview of the dissertations of the eleven nominees for the Ernst Denert Award for Software Engineering in 2020. The prize, kindly sponsored by the Gerlind & Ernst Denert Stiftung, is awarded for excellent work within the discipline of Software Engineering, which includes methods, tools and procedures for better and efficient development of high quality software. An essential requirement for the nominated work is its applicability and usability in industrial practice. The book contains eleven papers that describe the works by Jonathan Brachthäuser (EPFL Lausanne) entitled What You See Is What You Get: Practical Effect Handlers in Capability-Passing Style, Mojdeh Golagha's (Fortiss, Munich) thesis How to Effectively Reduce Failure Analysis Time?, Nikolay Harutyunyan's (FAU Erlangen-Nürnberg) work on Open Source Software Governance, Dominic Henze's (TU Munich) research about Dynamically Scalable Fog Architectures, Anne Hess's (Fraunhofer IESE, Kaiserslautern) work on Crossing Disciplinary Borders to Improve Requirements Communication, Istvan Koren's (RWTH Aachen U) thesis DevOpsUse: A Community-Oriented Methodology for Societal Software Engineering, Yannic Noller's (NU Singapore) work on Hybrid Differential Software Testing, Dominic Steinhofel's (TU Darmstadt) thesis entitled Ever Change a Running System: Structured Software Reengineering Using Automatically Proven-Correct Transformation Rules, Peter Wägemann's (FAU Erlangen-Nürnberg) work Static Worst-Case Analyses and Their Validation Techniques for Safety-Critical Systems, Michael von Wenckstern's (RWTH Aachen U) research on Improving the Model-Based Systems Engineering Process, and Franz Zieris's (FU Berlin) thesis on Understanding How Pair Programming Actually Works in Industry: Mechanisms, Patterns, and Dynamics--which actually won the award. The chapters describe key findings of the respective works, show their relevance and applicability to practice and industrial software engineering projects, and provide additional information and findings that have only been discovered afterwards, e.g. when applying the results in industry. This way, the book is not only interesting to other researchers, but also to industrial software professionals who would like to learn about the application of state-of-the-art methods in their daily work.




WirelessHARTTM


Book Description

This book presents a guideline for EWMA filter design for industrial wireless networked control system, both theoretically and practically. The filter’s key advantages are simple, effective, low computational overhead. This book also provides a guideline for practical implementation of EWMA filter for improving networked control performance of various process plants. It further discusses not only the advantages of the filter, but also the limitations and how to avoid them when implementing the filter from practical point of view.




Mission-Oriented Sensor Networks and Systems: Art and Science


Book Description

This book discusses topics in mission-oriented sensor networks and systems research and practice, enabling readers to understand the major technical and application challenges of these networks, with respect to their architectures, protocols, algorithms, and application design. It also presents novel theoretical and practical ideas, which have led to the development of solid foundations for the design, analysis, and implementation of energy-efficient, reliable, and secure mission-oriented sensor network applications. Covering various topics, including sensor node architecture, sensor deployment, mobile coverage, mission assignment, detection, localization, tracking, data dissemination, data fusion, topology control, geometric routing, location privacy, secure communication, and cryptograph, it is a valuable resource for computer scientists, researchers, and practitioners in academia and industry.




Mixed-Criticality Industrial Wireless Networks


Book Description

This open access book introduces how to manage important tasks in industrial wireless networks. Important tasks must be completed on time and with guaranteed quality; that is the consensus reached by system designers and users. However, for too long, important tasks have often been given unnecessary urgency, and people intuitively believe that important tasks should be executed first so that their performance can be guaranteed. Actually, in most cases, their performance can be guaranteed even if they are executed later, and the “early” resources can be utilized for other, more urgent tasks. Therefore, confusing importance with urgency hinders the proper use of system resources. In 2007, mixed criticality was proposed to indicate that a system may contain tasks of various importance levels. Since then, system designers and users have distinguished between importance and urgency. In the industrial field, due to the harsh environment they operate in, industrial wireless networks’ quality of service (QoS) has always been a bottleneck restricting their applications. Therefore, this book introduces criticality to label important data, which is then allocated more transmission resources, ensuring that important data’s QoS requirements can be met to the extent possible. To help readers understand how to apply mixed-criticality data to industrial wireless networks, the content is divided into three parts. First, we introduce how to integrate the model of mixed-criticality data into industrial wireless networks. Second, we explain how to analyze the schedulability of mixed-criticality data under existing scheduling algorithms. Third, we present a range of novel scheduling algorithms for mixed-criticality data. If you want to improve the QoS of industrial wireless networks, this book is for you.