[1]刘骁[],谢红梅[]. AADL行为模型时间一致性验证方法[J].计算机技术与发展,2017,27(07):1-5.
 LIU Xiao[],XIE Hong-mei[]. A Time Consistency Validation Approach of AADL Behavior Model[J].,2017,27(07):1-5.
点击复制

 AADL行为模型时间一致性验证方法()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年07期
页码:
1-5
栏目:
智能、算法、系统工程
出版日期:
2017-07-10

文章信息/Info

Title:
 A Time Consistency Validation Approach of AADL Behavior Model
文章编号:
1673-629X(2017)07-0001-05
作者:
 刘骁[1]谢红梅[2]
 1.南京航空航天大学 计算机科学与技术学院;2.南京航空航天大学 继续教育学院
Author(s):
 LIU Xiao[1]XIE Hong-mei[2]
关键词:
 AADL行为模型实时系统时间一致性Prolog
Keywords:
 AADL behavior modelreal-time systemtime consistencyProlog
分类号:
TP311
文献标志码:
A
摘要:
 任务关键的实时系统对时序及安全要求的特殊性,在实时系统开发的早期阶段进行体系结构的时间一致性分析,能够尽早发现系统设计时出现的有关时序的潜在问题,为此提出了基于时间约束的AADL行为模型的验证方法.针对带有时间约束的AADL行为模型时序验证问题,提出了一种基于节点转换规则的AADL行为模型分解规则,将实时系统的行为模型转换成运行时的路径集合;设计了路径集合到Prolog事实的转换算法;将实时系统的隐式时间约束和显式时间约束转换成Prolog规则,支持实时系统对两种时间约束进行验证.最后应用AADL行为模型时间一致性验证方法对船舶指控系统进行实例验证,验证了实时系统的隐式时间约束和显式时间约束,为实时系统的时序分析提供了一种新的有效途径.
Abstract:
 In the early development of real time system,a time consistency of system structure is analyzed due to the specialty of time series and security for real time system with critical tasks,which can discover the potential issue related time series in system design as soon as possible.Therefore,the validation method of AADL behavior model based on time restraint is proposed.In view of correctness verification problems of the AADL behavior model with time restriction,a kind of model decomposition rule based on node switching rule is presented to transform the AADL behavior model into execution trace set.Also a transformation algorithm from the trace set to Prolog language is designed,transforming the implicit and explicit time constraint into Prolog rules,supporting the validation of the real-time system with two time constraints.Finally,a special example of shipborne combat system with time restriction is verified by means of the time consistency validation approach of AADL behavior model.The approach verifies the implicit and explicit time constraint and provides a new effective way for the real time system of time series analysis.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(07):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(07):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(07):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(07):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(07):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(07):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(07):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(07):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(07):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(07):47.

更新日期/Last Update: 2017-08-22