Real - time Systems
نویسندگان
چکیده
ion The hiding operator P n A makes the events in the set A internal to the process, thus removing them from the control of the environment. The only participants will then be the components of P. From the maximal progress assumption, the internal events will occur as soon as P is ready to perform them. In general, internal events occur as soon as they are ready, unless they are pre-empted because of conflict, such as when there is a choice between events. A print spooler SPOOL and PRINTER communicate via channel print: SPOOL = in 2 ! print 3 ! SPOOL PRINTER = print 30 ! out! PRINTER The parallel combination SPOOL j[ in;print jprint;out ]j PRINTER has print as a visible channel and further processes may participate in it. Since only SPOOL and PRINTER should participate in that synchronization, we make print internal: (SPOOL j[ in;print jprint;out ]j PRINTER) n print 6.1. THE LANGUAGE OF REAL-TIME CSP 153 and the event print will occur as soon as both processes are ready to perform it. The renaming operators f (P) and f 1(P) change the names of events through the alphabet mapping function f . This allows a generic pattern of communication to be defined for use with different events. For example, a waiter responsible for table i might be described by a generic WAITER process and a renaming fi which maps any event a to ai. Thus f1(WAITER) is prepared to show a customer to table 1, but to no other table. Renaming using the inverse function f 1 allows a number of events to trigger a particular communication. If function g has g(credit card) = pay and g(cash) = pay, then the process g 1(WAITER) is prepared to engage in a credit card event or a cash event whenever WAITER is prepared to accept a pay event. The function h satisfying h(tablei) = table allows h 1(WAITER) to show a customer to any table: g (WAITER) = table 2 ! coat 5 ! order 20 ! serve 30 ! (credit card 0:01 ! tip 3 ! coat! SKIP 2 cash 0:01 ! tip 3 ! coat! SKIP) h 1(WAITER) = (table1 2 ! coat 5 ! order 20 ! serve 30 ! credit card 0:01 ! tip 3 ! coat! SKIP) 2 (table2 2 ! coat 5 ! order 20 ! serve 30 ! credit card 0:01 ! tip 3 ! coat! SKIP) .. 2 (tablen 2 ! coat 5 ! order 20 ! serve 30 ! credit card 0:01 ! tip 3 ! coat! SKIP) Recursion A recursive term μX P behaves as P, with every occurrence of X in P representing an immediate recursive invocation. Thus we will have the usual law
منابع مشابه
Safety Verification of Real Time Systems Serving Periodic Devices
In real-time systems response to a request from a controlled object must be correct and timely. Any late response to a request from such a device might lead to a catastrophy. The possibility of a task overrun, i.e., missing the deadline for completing a requested task, must be checked and removed during the design of such systems. Safe design of real-time systems running periodic tasks under th...
متن کاملMarkovian Delay Prediction-Based Control of Networked Systems
A new Markov-based method for real time prediction of network transmission time delays is introduced. The method considers a Multi-Layer Perceptron (MLP) neural model for the transmission network, where the number of neurons in the input layer is minimized so that the required calculations are reduced and the method can be implemented in the real-time. For this purpose, the Markov process order...
متن کاملConstrained Controller Design for Real-time Delay Recovery in Metro Systems
This study is concerned with the real-time delay recovery problem in metro loop lines. Metro is the backbone of public transportation system in large cities. A discrete event model for traffic system of metro loop lines is derived and presented. Two effective automatic controllers, linear quadratic regulator (LQR) and model predictive controller (MPC), are used to recover train delays. A newly-...
متن کاملReal-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach
Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios and their main motivations. In this paper a new IDS alert correlation method is proposed that can be used to detect attack scenarios in real-time. The proposed method is based on a causal approach due to the strength of causal methods in ...
متن کاملReal Time Dynamic Simulation of Power System Using Multiple Microcomputers
Recent developments in the design and manufacture of microcomputers together with improved simulation techniques make it possible to achieve the speed and accuracy required for the dynamic simulation of power systems in real time. This paper presents some experimental results and outlines new ideas on hardware architecture, mathematical algorithms and software development for this purpose. The ...
متن کاملReal-time acoustic tomography system and the experience of Caspian current sea monitoring
The Acoustic Tomography (AT) systems are used to monitor long-term and continuous flow in rivers, seas and oceans. One of the disadvantages of existing systems in Iran is the inability of real-time/automated measurements. In this study, by adding a raspberry Pi computer to the system and performing the required programming, it was possible to do online monitoring. The data are transferred to th...
متن کامل