scispace - formally typeset
Search or ask a question
Topic

Control reconfiguration

About: Control reconfiguration is a research topic. Over the lifetime, 22423 publications have been published within this topic receiving 334217 citations.


Papers
More filters
Journal ArticleDOI
01 Nov 2005
TL;DR: The authors show how a modeling and simulation environment, based on the discrete event system specification formalism, can support model continuity in the design of dynamic distributed real-time systems.
Abstract: Model continuity refers to the ability to transition as much as possible a model specification through the stages of a development process. In this paper, the authors show how a modeling and simulation environment, based on the discrete event system specification formalism, can support model continuity in the design of dynamic distributed real-time systems. In designing such systems, the authors restrict such continuity to the models that implement the system's real-time control and dynamic reconfiguration. The proposed methodology supports systematic modeling of dynamic systems and adopts simulation-based tests for distributed real-time software. Model continuity is emphasized during the entire process of software development $the control models of a dynamic distributed real-time system can be designed, analyzed, and tested by simulation methods, and then smoothly transitioned from simulation to distributed execution. A dynamic team formation distributed robotic system is presented as an example to show how model continuity methodology effectively manages the complexity of developing and testing the control software for this system.

71 citations

Proceedings ArticleDOI
01 Oct 2017
TL;DR: A heuristic algorithm is proposed to determine the GCLs at runtime such that the deadlines are satisfied and the queue usage is minimized, to accommodate non-critical traffic of TSN-based Fog Computing platforms.
Abstract: Fog Computing is about to tremendously impact the industrial automation industry. While, today's industrial automation systems use proprietary technology to provide real-time and dependability guarantees, Fog Computing enables a paradigm shift from this proprietary operations technology (OT) to the usage of standard IT equipment and infrastructure. Thus, Fog Computing is one of the key elements of the Industrial Internet of Things and Industry 4.0. In particular, future Fog Computing will be enabled by: the increased usage of IP-protocols, e.g., standardized Deterministic Ethernet solutions from IEEE Time-Sensitive Networking (TSN) Task Group, upcoming 5G wireless standards, and interoperability standards such as OPC Unified Architecture (OPC UA). In this paper, we address the runtime reconfiguration of TSN-based Fog Computing platforms. We assume that the Fog Computing platform is composed of several heterogeneous Fog Nodes interconnected using TSN. The applications consist of hard real-time control tasks, which have strict timing requirements expressed as hard deadlines. For time-critical traffic, TSN uses the scheduled traffic type, which relies on Gate-Control Lists (GCLs) at each outgoing port of a network switch to decide the transmission of scheduled frames. We propose a heuristic algorithm to determine the GCLs at runtime such that the deadlines are satisfied and the queue usage is minimized, to accommodate non-critical traffic. The scheduling algorithm is part of a configuration agent that reacts to network changes and reconfigures the GCLs using the NETCONF network configuration protocol. Our experimental evaluation shows that the scheduling heuristic is able to quickly find good-quality GCLs.

71 citations

Journal ArticleDOI
TL;DR: A comprehensive review on state-of-the-art photovoltaic array reconfiguration methods through a thoroughly investigation of 125 recently published papers makes a more exhaustive classification, in which sixty-four methods are thoroughly categorized into nine groups.

71 citations

Journal ArticleDOI
TL;DR: In this paper, the authors examine reconfiguration activity by 1,256 firms based in eight South East Asian economies from 1990 to 1999 and argue that more developed infrastructure facilitates resource reconfigurative, assisting weak firms' attempts to retrench and strong firms' efforts to grow.
Abstract: Asset reconfiguration by both growth and divestiture underlies business transformation, but reconfiguration remains poorly understood in countries with limited market infrastructure. We argue that more developed infrastructure facilitates resource reconfiguration, assisting weak firms’ attempts to retrench and strong firms’ attempts to grow; in turn, market development shapes the impact of reconfiguration by enhancing the benefits of adding assets and limiting the benefits of divestitures. We examine reconfiguration activity by 1,256 firms based in eight South East Asian economies—Hong Kong, Indonesia, Korea, Malaysia, the Philippines, Singapore, Taiwan, and Thailand—from 1990 to 1999. The study contributes to theories of business dynamics in varied settings of market-based socioeconomic development. Copyright © 2011 Strategic Management Society.

71 citations

Patent
08 Nov 2002
TL;DR: In this paper, the authors proposed a protocol to protect the security of a communication between a mobile radio and a radio access network (RAN) through a connection established through the RAN to support a communication with the mobile radio.
Abstract: The invention protects the security of a communication between a mobile radio and a radio access network (RAN). A connection is established through the RAN to support a communication with the mobile radio. The connection is configured with a first security configuration. One or more messages are sent over the connection using the first security connection, each message having a message sequence number. When the connection needs to be configured to a second security configuration, an activation message sequence number associated with the reconfiguration is set. When the reconfiguration process is complete and the second security configuration is to be activated, the next message is sent over the connection with ethe activation message sequence number. Until that time and during the reconfiguration, when the mobile radio transmits a message with a message sequence number lower than the activation message sequence number to the RAN, it uses the first security configuration. An example of such a message is a cell update message or an area update message.

70 citations


Network Information
Related Topics (5)
Control theory
299.6K papers, 3.1M citations
85% related
Software
130.5K papers, 2M citations
85% related
Wireless sensor network
142K papers, 2.4M citations
84% related
Network packet
159.7K papers, 2.2M citations
83% related
Optimization problem
96.4K papers, 2.1M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023784
20221,765
2021778
2020958
2019976
20181,060