Real - time Systems

نویسندگان

  • Mathai Joseph
  • Andy Wellings
  • Steve Schneider
  • Henk Schepers
چکیده

ion The hiding operator P n A makes the events in the set A internal to the process, thus removing them from the control of the environment. The only participants will then be the components of P. From the maximal progress assumption, the internal events will occur as soon as P is ready to perform them. In general, internal events occur as soon as they are ready, unless they are pre-empted because of conflict, such as when there is a choice between events. A print spooler SPOOL and PRINTER communicate via channel print: SPOOL = in 2 ! print 3 ! SPOOL PRINTER = print 30 ! out! PRINTER The parallel combination SPOOL j[ in;print jprint;out ]j PRINTER has print as a visible channel and further processes may participate in it. Since only SPOOL and PRINTER should participate in that synchronization, we make print internal: (SPOOL j[ in;print jprint;out ]j PRINTER) n print 6.1. THE LANGUAGE OF REAL-TIME CSP 153 and the event print will occur as soon as both processes are ready to perform it. The renaming operators f (P) and f 1(P) change the names of events through the alphabet mapping function f . This allows a generic pattern of communication to be defined for use with different events. For example, a waiter responsible for table i might be described by a generic WAITER process and a renaming fi which maps any event a to ai. Thus f1(WAITER) is prepared to show a customer to table 1, but to no other table. Renaming using the inverse function f 1 allows a number of events to trigger a particular communication. If function g has g(credit card) = pay and g(cash) = pay, then the process g 1(WAITER) is prepared to engage in a credit card event or a cash event whenever WAITER is prepared to accept a pay event. The function h satisfying h(tablei) = table allows h 1(WAITER) to show a customer to any table: g (WAITER) = table 2 ! coat 5 ! order 20 ! serve 30 ! (credit card 0:01 ! tip 3 ! coat! SKIP 2 cash 0:01 ! tip 3 ! coat! SKIP) h 1(WAITER) = (table1 2 ! coat 5 ! order 20 ! serve 30 ! credit card 0:01 ! tip 3 ! coat! SKIP) 2 (table2 2 ! coat 5 ! order 20 ! serve 30 ! credit card 0:01 ! tip 3 ! coat! SKIP) .. 2 (tablen 2 ! coat 5 ! order 20 ! serve 30 ! credit card 0:01 ! tip 3 ! coat! SKIP) Recursion A recursive term μX P behaves as P, with every occurrence of X in P representing an immediate recursive invocation. Thus we will have the usual law

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Safety Verification of Real Time Systems Serving Periodic Devices

In real-time systems response to a request from a controlled object must be correct and timely. Any late response to a request from such a device might lead to a catastrophy. The possibility of a task overrun, i.e., missing the deadline for completing a requested task, must be checked and removed during the design of such systems. Safe design of real-time systems running periodic tasks under th...

متن کامل

Markovian Delay Prediction-Based Control of Networked Systems

A new Markov-based method for real time prediction of network transmission time delays is introduced. The method considers a Multi-Layer Perceptron (MLP) neural model for the transmission network, where the number of neurons in the input layer is minimized so that the required calculations are reduced and the method can be implemented in the real-time. For this purpose, the Markov process order...

متن کامل

Constrained Controller Design for Real-time Delay Recovery in Metro Systems

This study is concerned with the real-time delay recovery problem in metro loop lines. Metro is the backbone of public transportation system in large cities. A discrete event model for traffic system of metro loop lines is derived and presented. Two effective automatic controllers, linear quadratic regulator (LQR) and model predictive controller (MPC), are used to recover train delays. A newly-...

متن کامل

Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach

Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios and their main motivations. In this paper a new IDS alert correlation method is proposed that can be used to detect attack scenarios in real-time. The proposed method is based on a causal approach due to the strength of causal methods in ...

متن کامل

Real Time Dynamic Simulation of Power System Using Multiple Microcomputers

Recent developments in the design and manufacture of microcomputers together with improved simulation techniques make it possible to achieve the speed and accuracy required for the dynamic simulation of power systems in real time. This paper presents some experimental results and outlines new ideas on hardware architecture, mathematical algorithms and software development for this purpose. The ...

متن کامل

Real-time acoustic tomography system and the experience of Caspian current sea monitoring

The Acoustic Tomography (AT) systems are used to monitor long-term and continuous flow in rivers, seas and oceans. One of the disadvantages of existing systems in Iran is the inability of real-time/automated measurements. In this study, by adding a raspberry Pi computer to the system and performing the required programming, it was possible to do online monitoring. The data are transferred to th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001