Computer Science ›› 2017, Vol. 44 ›› Issue (4): 100-103.doi: 10.11896/j.issn.1002-137X.2017.04.022

Previous Articles     Next Articles

Goal Oriented Approach for Analayzing Event Model of Cyber-physical Systems

LIU Chun, HUANG Ran-ran and HAN Dao-jun   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Event model of software systems can model system behaviors effectively.However,since the system structure should be known and the spatial-temporal attributes of events should be considered due to the hybrid and distributed properties of cyber-physical systems (CPS),new challenges arise when building CPS’s event model.From the angle of requirements analysis,this paper proposed a goal oriented approach to deal with the challenges.This approach defines the users’goal on CPS as the causal relationships between events,that is a goal expresses the relationship that the occurrence of an event will cause of another event.Then,it analyzes and develops the event model based on users’ requirements on CPS by means of “And/Or” decomposition.An adaptive cruise control system has been used to illustrate the proposed approach.

Key words: Cyber-physical systems,Requirements analysis,Goal oriented approach,Event model

[1] LEE E A.Cyber-physical systems-are computing foundationsadequate[C]∥Proceedings of the NSF Workshop on Cyber-Physical Systems:Research Motivation,Techniques and Roadmap.2010:6-14.
[2] LE E.Cyber physical systems:design challenges[C]∥Procee-dings of the 11th IEEE International Symposium on Object Orien-ted Real-Time Distributed Computing (ISORC’08).2008:363-369.
[3] JURETA I J,BORGIDA A,ERNST N A,et al.The requirements problem for adaptive systems[J].ACM Transactions on Management Information Systems (TMIS),2014,5(3):17.
[4] Adaptive cruise control system overview.http://sunny-day.mit.edu/safety-club/workshop5/Adaptive_Cruise_Control_Sys_ Overview.pdf.
[5] JACKSON M.Problem frames:analyzing and structuring software development problems[M].Addison-Wesley,2001.
[6] TAN Y,VURAN M C,GODDARD S.Spatial-temporal event model for cyber-physical systems[C]∥Proceedings of the 29th IEEE International Conference on Distributed Computing Systems(ICDCS’09).2009:44-50.
[7] MCCARTHY D,DAYALY U.The architecture of an active database management system[C]∥ACM SIGMOD International Conference on Managementof Data.ACM,1989:215-224.
[8] GEHANI N H,JAGADISH H V,Shmueli O.Composite event specification in active databases:model & implementation[C]∥Proceedings of the Very Large Data Bases(VLDB’92).1992:327-338.
[9] ADAIKKALAVAN R,CHAKRAVARTHY S.SnoopIB:interval-based event specification and detection for active databases[J].Data & Knowledge Engineering,2006,59(1):139-165.
[10] MOK A K,KONANA P,LIU G,et al.Specifying timing constraints and composite events:an application in the design of electronic brokerages[J].IEEE Transactions on Software Engineering,2004,30(12):841-858.
[11] TAN Y,VURAN M C,GODDARD S,et al.A concept lattice-based event model for Cyber-Physical Systems[C]∥Proceedings of the 1st ACM/IEEE International Conference on Cyber-physical Systems.2010:50-60.
[12] WANG J,CHENG L,LIU J.A new spatial-temporaleventModel based on multi-tuple for cyber-physical systems[J].International Journal of Control and Automation,2013,6(6):51-62.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .