Reference Hub1
Safety Reconfiguration of Embedded Control Systems

Safety Reconfiguration of Embedded Control Systems

Atef Gharbi, Hamza Gharsellaoui, Mohamed Khalgui, Antonio Valentini
ISBN13: 9781466639225|ISBN10: 1466639229|EISBN13: 9781466639232
DOI: 10.4018/978-1-4666-3922-5.ch010
Cite Chapter Cite Chapter

MLA

Gharbi, Atef, et al. "Safety Reconfiguration of Embedded Control Systems." Embedded Computing Systems: Applications, Optimization, and Advanced Design, edited by Mohamed Khalgui, et al., IGI Global, 2013, pp. 184-210. https://doi.org/10.4018/978-1-4666-3922-5.ch010

APA

Gharbi, A., Gharsellaoui, H., Khalgui, M., & Valentini, A. (2013). Safety Reconfiguration of Embedded Control Systems. In M. Khalgui, O. Mosbahi, & A. Valentini (Eds.), Embedded Computing Systems: Applications, Optimization, and Advanced Design (pp. 184-210). IGI Global. https://doi.org/10.4018/978-1-4666-3922-5.ch010

Chicago

Gharbi, Atef, et al. "Safety Reconfiguration of Embedded Control Systems." In Embedded Computing Systems: Applications, Optimization, and Advanced Design, edited by Mohamed Khalgui, Olfa Mosbahi, and Antonio Valentini, 184-210. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-3922-5.ch010

Export Reference

Mendeley
Favorite

Abstract

The authors study the safety reconfiguration of embedded control systems following component-based approaches from the functional level to the operational level. At the functional level, a Control Component is defined as an event-triggered software unit characterized by an interface that supports interactions with the environment (the plant or other Control Components). They define the architecture of the Reconfiguration Agent, which is modelled by nested state machines to apply local reconfigurations. The authors propose technical solutions to implement the agent-based architecture by defining UML meta-models for both Control Components and also agents. At the operational level, a task is assumed to be a set of components having some properties independently from any real-time operating system. To guarantee safety reconfigurations of tasks at run-time, the authors define service and reconfiguration processes for tasks and use the semaphore concept to ensure safety mutual exclusions. They apply the priority ceiling protocol as a method to ensure the scheduling between periodic tasks with precedence and mutual exclusion constraints.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.