Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Patents (7)
- Articles (5)
- Invited Talks (3)
- Architecture (2)
- Asphalt pavement distress data (2)
-
- Automated classification (2)
- Books (2)
- Cracking (2)
- Emerging Technologies (2)
- Information Systems (2)
- Social Implications of ICT (2)
- Surveillance (2)
- Technology (2)
- 802.11 localization (1)
- Advancements (1)
- Agricultural applications (1)
- Analysis (1)
- Automated optimization (1)
- Automotive-grade CMOS camera (1)
- Autonomous vehicle applications (1)
- Blood glucose control (1)
- Book review (1)
- Calendar (1)
- Census transform algorithm (1)
- Challenges (1)
- Chip implants (1)
- Circuit datapaths (1)
- Closed-loop verification (1)
- Cloud security (1)
- Clustering algorithms (1)
- Publication Year
Articles 1 - 30 of 39
Full-Text Articles in Engineering
Platform-Specific Code Generation From Platform-Independent Timed Models, Baekgyu Kim, Lu Feng, Oleg Sokolsky, Insup Lee
Platform-Specific Code Generation From Platform-Independent Timed Models, Baekgyu Kim, Lu Feng, Oleg Sokolsky, Insup Lee
Oleg Sokolsky
Many safety-critical real-time embedded systems need to meet stringent timing constraints such as preserving delay bounds between input and output events. In model-based development, a system is often implemented by using a code generator to automatically generate source code from system models, and integrating the generated source code with a platform. It is challenging to guarantee that the implemented systems preserve required timing constraints, because the timed behavior of the source code and the platform is closely intertwined. In this paper, we address this challenge by proposing a model transformation approach for the code generation. Our approach compensates the platform-processing …
From Requirements To Code: Model Based Development Of A Medical Cyber Physical System, Anitha Murugesan, Mats Heimdahl, Michael Whalen, Sanjai Rayadurgam, John Komp, Lian Duan, Baekgyu Kim, Oleg Sokolsky, Insup Lee
From Requirements To Code: Model Based Development Of A Medical Cyber Physical System, Anitha Murugesan, Mats Heimdahl, Michael Whalen, Sanjai Rayadurgam, John Komp, Lian Duan, Baekgyu Kim, Oleg Sokolsky, Insup Lee
Oleg Sokolsky
The advanced use of technology in medical devices has improved the way health care is delivered to patients. Unfortunately, the increased complexity of modern medical devices poses challenges for development, assurance, and regulatory approval. In an e ort to improve the safety of advanced medical devices, organizations such as FDA have supported exploration of techniques to aid in the development and regulatory approval of such systems. In an ongoing research project, our aim is to provide effective development techniques and exemplars of system development artifacts that demonstrate state of the art development techniques.
In this paper we present an end-to-end …
Verified Ros-Based Deployment Of Platform-Independent Control Systems, Wenrui Meng, Junkil Park, Oleg Sokolsky, Stephanie Weirich, Insup Lee
Verified Ros-Based Deployment Of Platform-Independent Control Systems, Wenrui Meng, Junkil Park, Oleg Sokolsky, Stephanie Weirich, Insup Lee
Oleg Sokolsky
The paper considers the problem of model-based deployment of platform-independent control code on a specific platform. The approach is based on automatic generation of platform-specific glue code from an architectural model of the system. We present a tool, ROSGen, that generates the glue code based on a declarative specification of platform interfaces. Our implementation targets the popular Robot Operating System (ROS) platform. We demonstrate that the code generation process is amenable to formal verification. The code generator is implemented in Coq and relies on the infrastructure provided by the CompCert and VST tool. We prove that the generated code always …
Verified Ros-Based Deployment Of Platform-Independent Control Systems, Wenrui Meng, Junkil Park, Oleg Sokolsky, Stephanie Weirich, Insup Lee
Verified Ros-Based Deployment Of Platform-Independent Control Systems, Wenrui Meng, Junkil Park, Oleg Sokolsky, Stephanie Weirich, Insup Lee
Oleg Sokolsky
The paper considers the problem of model-based deployment of platform-independent control code on a specific platform. The approach is based on automatic generation of platform-specific glue code from an architectural model of the system. We present a tool, ROSGen, that generates the glue code based on a declarative specification of platform interfaces. Our implementation targets the popular Robot Operating System (ROS) platform. We demonstrate that the code generation process is amenable to formal verification. The code generator is implemented in Coq and relies on the infrastructure provided by the CompCert and VST tool. We prove that the generated code always …
Automatic Verification Of Linear Controller Software, Miroslav Pajic, Junkil Park, Insup Lee, George Pappas, Oleg Sokolsky
Automatic Verification Of Linear Controller Software, Miroslav Pajic, Junkil Park, Insup Lee, George Pappas, Oleg Sokolsky
Oleg Sokolsky
We consider the problem of verification of software implementations of linear time-invariant controllers. Commonly, different implementations use different representations of the controller’s state, for example due to optimizations in a third-party code generator. To accommodate this variation, we exploit input-output controller specification captured by the controller’s transfer function and show how to automatically verify correctness of C code controller implementations using a Frama-C/Why3/Z3 toolchain. Scalability of the approach is evaluated using randomly generated controller specifications of realistic size.
From Requirements To Code: Model Based Development Of A Medical Cyber Physical System, Anitha Murugesan, Mats Heimdahl, Michael Whalen, Sanjai Rayadurgam, John Komp, Lian Duan, Baekgyu Kim, Oleg Sokolsky, Insup Lee
From Requirements To Code: Model Based Development Of A Medical Cyber Physical System, Anitha Murugesan, Mats Heimdahl, Michael Whalen, Sanjai Rayadurgam, John Komp, Lian Duan, Baekgyu Kim, Oleg Sokolsky, Insup Lee
Oleg Sokolsky
The advanced use of technology in medical devices has improved the way health care is delivered to patients. Unfortunately, the increased complexity of modern medical devices poses challenges for development, assurance, and regulatory approval. In an e ort to improve the safety of advanced medical devices, organizations such as FDA have supported exploration of techniques to aid in the development and regulatory approval of such systems. In an ongoing research project, our aim is to provide effective development techniques and exemplars of system development artifacts that demonstrate state of the art development techniques.
In this paper we present an end-to-end …
Platform-Specific Code Generation From Platform-Independent Timed Models, Baekgyu Kim, Lu Feng, Oleg Sokolsky, Insup Lee
Platform-Specific Code Generation From Platform-Independent Timed Models, Baekgyu Kim, Lu Feng, Oleg Sokolsky, Insup Lee
Oleg Sokolsky
Many safety-critical real-time embedded systems need to meet stringent timing constraints such as preserving delay bounds between input and output events. In model-based development, a system is often implemented by using a code generator to automatically generate source code from system models, and integrating the generated source code with a platform. It is challenging to guarantee that the implemented systems preserve required timing constraints, because the timed behavior of the source code and the platform is closely intertwined. In this paper, we address this challenge by proposing a model transformation approach for the code generation. Our approach compensates the platform-processing …
A Data-Driven Behavior Modeling And Analysis Framework For Diabetic Patients On Insulin Pumps, Sanjian Chen, Lu Feng, Michael Rickels, Amy Peleckis, Oleg Sokolsky, Insup Lee
A Data-Driven Behavior Modeling And Analysis Framework For Diabetic Patients On Insulin Pumps, Sanjian Chen, Lu Feng, Michael Rickels, Amy Peleckis, Oleg Sokolsky, Insup Lee
Oleg Sokolsky
About 30%-40% of Type 1 Diabetes (T1D) patients in the United States use insulin pumps. Current insulin infusion systems require users to manually input meal carb count and approve or modify the system-suggested meal insulin dose. Users can give correction insulin boluses at any time. Since meal carbohydrates and insulin are the two main driving forces of the glucose physiology, the user-specific eating and pump-using behavior has a great impact on the quality of glycemic control.
In this paper, we propose an “Eat, Trust, and Correct” (ETC) framework to model the T1D insulin pump users’ behavior. We use machine learning …
A Virtual Environment For Enterprise Engineering Education, Can Saygin, Benjamin Dow, Raymond Kluczny, Majdi Najm, Scott Grasman
A Virtual Environment For Enterprise Engineering Education, Can Saygin, Benjamin Dow, Raymond Kluczny, Majdi Najm, Scott Grasman
Dow Scott
Several resources highlight the need to effectively use modern technology to gain more productive and rewarding undergraduate science, mathematics, engineering, and technology education. In addition to the growth of information technology, the importance of hands-on practice and active learning has been highlighted in various resources. These factors, coupled with inadequate and insufficient real-world experiences in undergraduate education, have become a major reason for under-qualified and under-employed graduates. This paper discusses the creation of the University of Missouri Virtual Enterprise, which provides context for development of learning modules for enterprise engineering education. This approach will improve the undergraduate education experience by …
Patient-Centered Appointment Scheduling Using Agent-Based Simulation, Tammy Toscos, Ayten Turkcan, Brad Doebbeling
Patient-Centered Appointment Scheduling Using Agent-Based Simulation, Tammy Toscos, Ayten Turkcan, Brad Doebbeling
Tammy R Toscos
Enhanced access and continuity are key components of patient-centered care. Existing studies show that several interventions such as providing same day appointments, walk-in services, after-hours care, and group appointments, have been used to redesign the healthcare systems for improved access to primary care. However, an intervention focusing on a single component of care delivery (i.e. improving access to acute care) might have a negative impact other components of the system (i.e. reduced continuity of care for chronic patients). Therefore, primary care clinics should consider implementing multiple interventions tailored for their patient population needs. We collected rapid ethnography and observations to …
Wie Featured Person Of The Month Highlights (Katina Michael), Keyana Tenant, Katina Michael
Wie Featured Person Of The Month Highlights (Katina Michael), Keyana Tenant, Katina Michael
Professor Katina Michael
The WIE Featured Person of the Month is Katina Michael, editor-in-chief of IEEE Technology and Society Magazine. After working at OTIS Elevator Company and Andersen Consulting, Katina was offered and exciting graduate engineering position at Nortel in 1996; and her career has been fast track from there. Read Katina’s story on Page 7.
Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael
Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael
Professor Katina Michael
This special section is dedicated to privacy in the information age. Since the rise of mobile social media in particular and the advent of cloud computing few can dispute that the times have changed. Privacy is now understood in context, and within a framework that is completely different to what it once was. The right to be let alone physically seemingly has been replaced by the right to give away as much information as you want virtually. What safeguards can be introduced into such a society? We cannot claim to wish for privacy as a right if we ourselves do …
Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom
Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom
Professor Katina Michael
Mobile Government Briefing: Provide services anywhere any time: - Transact to enable in-field data collection, request processing, order management, approvals, edits, updates and execute actions. - What are the implications for the incorporation of rich multimedia content on devices to better serve staff and citizens? - Addressing the security challenges of various risks around data access, data transmission, and data storage for BI architecture and mobile devices
Ieee T&S Magazine: Undergoing Transformation, Katina Michael
Ieee T&S Magazine: Undergoing Transformation, Katina Michael
Professor Katina Michael
Our Magazine is in a transformative period, not only because we are ‘Going Green’ in 2013 but because we are experiencing tremendous growth in quality international submissions. This means that we are increasingly appealing to an international audience with transdisciplinary interests. This has not gone unnoticed by the media, nor by our SSIT readership or wider engineering community.
At The Tone, The Time Will Be... Unknown – A Perspective On The Evolution Of Time In Telecommunications, Robert Iannucci
At The Tone, The Time Will Be... Unknown – A Perspective On The Evolution Of Time In Telecommunications, Robert Iannucci
Robert A Iannucci
No abstract provided.
International Ict Research Collaboration: Experiences And Recommendations, Erich Prem, Emma Barron, Arcot Desai Narasimhalu, Ian Morgan
International Ict Research Collaboration: Experiences And Recommendations, Erich Prem, Emma Barron, Arcot Desai Narasimhalu, Ian Morgan
Arcot Desai NARASIMHALU
This paper presents results of a study into the collaboration experiences of researchers. The focus is on long-distance collaboration in information and communication technologies (ICT) research and technology development, i.e. between the EU on the one side and Australia, Singapore or New Zealand on the other. The aim of the study was to provide useful recommendations for researchers who engage in international collaboration and to improve the quality of international co-operation projects. The emphasis here is on the views and experiences of Europe"s international partners. The paper analysis collaboration motives, challenges, co-operation types and provides recommendations for project initiation, networking, …
Lachesis: A Job Scheduler For The Cray T3e, Allen B. Downey
Lachesis: A Job Scheduler For The Cray T3e, Allen B. Downey
Allen B. Downey
This paper presents the design and implementation of Lachesis, a job scheduler for the Cray T3E. Lachesis was developed at the San Diego Supercomputer Center (SDSC) in an attempt to correct some problems with the scheduling system Cray provides with the T3E.
Low-Cost Stereo Vision On An Fpga, Chris A. Murphy, Daniel Lindquist, Ann Marie Rynning, Thomas Cecil, Sarah Leavitt, Mark L. Chang
Low-Cost Stereo Vision On An Fpga, Chris A. Murphy, Daniel Lindquist, Ann Marie Rynning, Thomas Cecil, Sarah Leavitt, Mark L. Chang
Mark L. Chang
We present a low-cost stereo vision implementation suitable for use in autonomous vehicle applications and designed with agricultural applications in mind. This implementation utilizes the Census transform algorithm to calculate depth maps from a stereo pair of automotive-grade CMOS cameras. The final prototype utilizes commodity hardware, including a Xilinx Spartan-3 FPGA, to process 320times240 pixel images at greater than 150 frames per second and deliver them via a USB 2.0 interface.
Automated Least-Significant Bit Datapath Optimization For Fpgas, Mark L. Chang, Scott Hauck
Automated Least-Significant Bit Datapath Optimization For Fpgas, Mark L. Chang, Scott Hauck
Mark L. Chang
In this paper, we present a method for FPGA datapath precision optimization subject to user-defined area and error constraints. This work builds upon our previous research which presented a methodology for optimizing the dynamic range- the most significant bit position. In this work, we present an automated optimization technique for the least-significant bit position of circuit datapaths. We present results describing the effectiveness of our methods on typical signal and image processing kernels.
Interactionless Calendar-Based Training For 802.11 Localization, Mark Chang, Andrew J. Barry, Noah L. Tye
Interactionless Calendar-Based Training For 802.11 Localization, Mark Chang, Andrew J. Barry, Noah L. Tye
Mark L. Chang
This paper presents our work in solving one of the weakest links in 802.11-based indoor-localization: the training of ground-truth received signal strength data. While crowdsourcing this information has been demonstrated to be a viable alternative to the time consuming and accuracy-limited process of manual training, one of the chief drawbacks is the rate at which a system can be trained. We demonstrate an approach that utilizes users' calendar and appointment information to perform interactionless training of an 802.11-based indoor localization system. Our system automatically determines if a user attended a calendar event, resulting in accuracy comparable to our previously published …
Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael
Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael
Professor Katina Michael
Hacking: The Next Generation demonstrates just how hackers continue to exploit “back doors”. New ways of working and new ways of communicating have meant that the number of attack vectors continue to rise rapidly. This provides hackers with a greater number of opportunities to penetrate systems using blended approaches while organizations struggle to come up to speed with the latest technology developments and commensurate security capabilities. Dealing with anticipated threats is a lot harder than dealing with known threats.
Analysis Of Segmentation Algorithms For Pavement Distress Images, Allen Downey, Haris N. Koutsopoulos, Ibrahim El Sanhouri
Analysis Of Segmentation Algorithms For Pavement Distress Images, Allen Downey, Haris N. Koutsopoulos, Ibrahim El Sanhouri
Allen B. Downey
Collection and analysis of pavement distress data is an important component of any pavement‐management system. Various systems are currently under development that automate this process. They consist of appropriate hardware for the acquisition of pavement distress images and, in some cases, software for the analysis of the collected data. An important step in the automatic interpretation of images is segmentation, the process of extracting the objects of interest (distresses) from the background. We examine algorithms for segmenting pavement images and evaluate their effectiveness in separating the distresses from the background. The methods examined include the Otsu method, Kittler's method, a …
Primitive-Based Classification Of Pavement Cracking Images, Allen Downey
Primitive-Based Classification Of Pavement Cracking Images, Allen Downey
Allen B. Downey
Collection and analysis of pavement distress data are receiving attention for their potential to improve the quality of information on pavement condition. We present an approach for the automated classificaton of asphalt pavement distresses recorded on video or photographic film. Based on a model that describes the statistical properties of pavement images, we develop algorithms for image enhancement, segmentation, and distress classification. Image enhancement is based on subtraction of an “average” background: segmentation assigns one of four possible values to pixels based on their likelihood of belonging to the object. The classification approach proceeds in two steps: in the first …
Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael
Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael
Professor Katina Michael
Tracking and monitoring people as they operate within their personal networks benefits service providers and their constituents but involves hidden risks and costs.
Automatic identification technologies, CCTV cameras, pervasive and mobile networks, wearable computing, location-based services and social networks have traditionally served distinct purposes. However, we have observed patterns of integration, convergence and coexistence among all these innovations within the information and communication technology industry.1For example, ‘location-based social networking’ can draw on a smart phone's capacity to identify a user uniquely, locate him within 1–2m and share this information across his social network in real time. The resulting ability to …
Editorial: The Idio-Technopolis, Katina Michael
Editorial: The Idio-Technopolis, Katina Michael
Professor Katina Michael
The rapid rise of social media has brought with it an emphasis on the distinct dimensions of the whole person. Social media recognises that the individual has a personal network of extensions- a home life, a work life, a social life, a study life, a hobbyist life, and much more- some of these identities even hidden from full view. Each of these online value networks are now accessible by big business, where opinion leaders and early adopters are easily distinguishable, and where brand commentary between consumers matters manifold more than any form of targeted advertising.
Editorial: "You Talkin' To Me?", Katina Michael
Editorial: "You Talkin' To Me?", Katina Michael
Professor Katina Michael
Advancing knowledge through robust research is an honourable aim- being scientific, finding the right methodology, executing project phases meticulously, and reporting on the outcomes as objectively and accurately as possible. But may I begin my inaugural editorial by saying that an even higher ideal to advancing knowledge is critiquing it as it happens. Reflective practice is not just something to be done by academics in their teaching- reflective practice is what we should all be doing as we go about undertaking our various day-to-day work tasks. For the engineer engaged in research and development, whether in industry or government, reflective …
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
Professor Katina Michael
No abstract provided.
Embedded Systems As Datacenters, Robert Iannucci
Embedded Systems As Datacenters, Robert Iannucci
Robert A Iannucci
No abstract provided.
Platform Thinking In Embedded Systems, Robert Iannucci
Platform Thinking In Embedded Systems, Robert Iannucci
Robert A Iannucci
No abstract provided.
Transparent Fault Tolerance For Web Services Based Architectures, Vijay Dialani, Simon Miles, Luc Moreau, David De Roure, Michael Luck
Transparent Fault Tolerance For Web Services Based Architectures, Vijay Dialani, Simon Miles, Luc Moreau, David De Roure, Michael Luck
Vijay Dialani
Service-based architectures enable the development of new classes of Grid and distributed applications. One of the main capabilities provided by such systems is the dynamic and flexible integration of services, according to which services are allowed to be a part of more than one distributed system and simultaneously serve different applications. This increased flexibility in system composition makes it difficult to address classical distributed system issues such as fault-tolerance. While it is relatively easy to make an individual service fault-tolerant, improving fault-tolerance of services collaborating in multiple application scenarios is a challenging task. In this paper, we look at the …