IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Safety Reconfiguration of Embedded Control Systems

Safety Reconfiguration of Embedded Control Systems
View Sample PDF
Author(s): Atef Gharbi (University of Carthago, Tunisia), Hamza Gharsellaoui (University of Carthago, Tunisia), Mohamed Khalgui (University of Carthago, Tunisia & CNR Research Council, Italy & Xidjian University, China)and Antonio Valentini (O3neida Europe, Belgium)
Copyright: 2013
Pages: 27
Source title: Embedded Computing Systems: Applications, Optimization, and Advanced Design
Source Author(s)/Editor(s): Mohamed Khalgui (Xidian University, China), Olfa Mosbahi (University of Carthage, Tunisia)and Antonio Valentini (O3neida Europe, Belgium)
DOI: 10.4018/978-1-4666-3922-5.ch010

Purchase

View Safety Reconfiguration of Embedded Control Systems on the publisher's website for pricing and purchasing information.

Abstract

The authors study the safety reconfiguration of embedded control systems following component-based approaches from the functional level to the operational level. At the functional level, a Control Component is defined as an event-triggered software unit characterized by an interface that supports interactions with the environment (the plant or other Control Components). They define the architecture of the Reconfiguration Agent, which is modelled by nested state machines to apply local reconfigurations. The authors propose technical solutions to implement the agent-based architecture by defining UML meta-models for both Control Components and also agents. At the operational level, a task is assumed to be a set of components having some properties independently from any real-time operating system. To guarantee safety reconfigurations of tasks at run-time, the authors define service and reconfiguration processes for tasks and use the semaphore concept to ensure safety mutual exclusions. They apply the priority ceiling protocol as a method to ensure the scheduling between periodic tasks with precedence and mutual exclusion constraints.

Related Content

Babita Srivastava. © 2024. 21 pages.
Sakuntala Rao, Shalini Chandra, Dhrupad Mathur. © 2024. 27 pages.
Satya Sekhar Venkata Gudimetla, Naveen Tirumalaraju. © 2024. 24 pages.
Neeta Baporikar. © 2024. 23 pages.
Shankar Subramanian Subramanian, Amritha Subhayan Krishnan, Arumugam Seetharaman. © 2024. 35 pages.
Charu Banga, Farhan Ujager. © 2024. 24 pages.
Munir Ahmad. © 2024. 27 pages.
Body Bottom