84 research outputs found

    2nd Symposium on Management of Future motorway and urban Traffic Systems (MFTS 2018): Booklet of abstracts: Ispra, 11-12 June 2018

    Get PDF
    The Symposium focuses on future traffic management systems, covering the subjects of traffic control, estimation, and modelling of motorway and urban networks, with particular emphasis on the presence of advanced vehicle communication and automation technologies. As connectivity and automation are being progressively introduced in our transport and mobility systems, there is indeed a growing need to understand the implications and opportunities for an enhanced traffic management as well as to identify innovative ways and tools to optimise traffic efficiency. In particular the debate on centralised versus decentralised traffic management in the presence of connected and automated vehicles has started attracting the attention of the research community. In this context, the Symposium provides a remarkable opportunity to share novel ideas and discuss future research directions.JRC.C.4-Sustainable Transpor

    Virtual Structure Based Formation Tracking of Multiple Wheeled Mobile Robots: An Optimization Perspective

    Get PDF
    Today, with the increasing development of science and technology, many systems need to be optimized to find the optimal solution of the system. this kind of problem is also called optimization problem. Especially in the formation problem of multi-wheeled mobile robots, the optimization algorithm can help us to find the optimal solution of the formation problem. In this paper, the formation problem of multi-wheeled mobile robots is studied from the point of view of optimization. In order to reduce the complexity of the formation problem, we first put the robots with the same requirements into a group. Then, by using the virtual structure method, the formation problem is reduced to a virtual WMR trajectory tracking problem with placeholders, which describes the expected position of each WMR formation. By using placeholders, you can get the desired track for each WMR. In addition, in order to avoid the collision between multiple WMR in the group, we add an attraction to the trajectory tracking method. Because MWMR in the same team have different attractions, collisions can be easily avoided. Through simulation analysis, it is proved that the optimization model is reasonable and correct. In the last part, the limitations of this model and corresponding suggestions are given

    Advisory Safety System for Autonomous Vehicles under Sun-glare

    Get PDF
    Autonomous Vehicles (AVs) are expected to provide a large number of benefits such as improving comfort, vehicle safety and traffic flow. AVs use various sensors and control systems to empower driver’s decision-making under uncertainties as well as, assist the driving task under adverse conditions such as vision impairment. Excessive sunlight has been recognized as the primary source of the reduction in vision performance during daytime. Sun glare oftentimes leads to an impaired visibility for drivers and has been studied from different aspects on roadways. However, there is a lack of knowledge regarding the potential detrimental effects of natural light brightness differential, particularly sun glare on driving behavior and its possible risks. This dissertation addresses this issue by developing an integrated vehicle safety methodology as an advisory system for safe driving under sun glare. The main contribution of this research is to establish a real-time detection of the vision impairment area on roadways. This study also proposes a Collision Avoidance System Under Sun-glare (CASUS) in which upcoming possible vision impairment is detected, a warning message is sent, and the speed of vehicle is adjusted accordingly. In this context, real-world data is used to calibrate a psychophysical car-following model within VISSIM, a traffic microscopic simulation tool. Traffic safety impacts are explored through the number of conflicts extracted from the microsimulation tool and assessed by the time-to-collision indicator. Conventional/human-driven vehicles and different type of AVs are modeled for a straight segment of the TransCanada highway under various AVs penetration rates. The findings revealed a significant reduction in potential collisions due to adjustment of travel speed of AVs under the sun glare. The results also indicated that applying CASUS to the AVs with a failing sensory system improves traffic safety by providing optimal-safe speeds. Furthermore, the CASUS algorithm has the potential to be integrated into driving simulators or real vehicles to further evaluate and examine its benefits under different vision impairment scenarios

    Analysis of dynamic traffic control and management strategies

    Get PDF
    Ph.DDOCTOR OF PHILOSOPH

    Robots learn to behave: improving human-robot collaboration in flexible manufacturing applications

    Get PDF
    L'abstract è presente nell'allegato / the abstract is in the attachmen

    Architectural Support for Hypervisor-Level Intrusion Tolerance in MPSoCs

    Get PDF
    Increasingly, more aspects of our lives rely on the correctness and safety of computing systems, namely in the embedded and cyber-physical (CPS) domains, which directly affect the physical world. While systems have been pushed to their limits of functionality and efficiency, security threats and generic hardware quality have challenged their safety. Leveraging the enormous modular power, diversity and flexibility of these systems, often deployed in multi-processor systems-on-chip (MPSoC), requires careful orchestration of complex and heterogeneous resources, a task left to low-level software, e.g., hypervisors. In current architectures, this software forms a single point of failure (SPoF) and a worthwhile target for attacks: once compromised, adversaries can gain access to all information and full control over the platform and the environment it controls, for instance by means of privilege escalation and resource allocation. Currently, solutions to protect low-level software often rely on a simpler, underlying trusted layer which is often a SPoF itself and/or exhibits downgraded performance. Architectural hybridization allows for the introduction of trusted-trustworthy components, which combined with fault and intrusion tolerance (FIT) techniques leveraging replication, are capable of safely handling critical operations, thus eliminating SPoFs. Performing quorum-based consensus on all critical operations, in particular privilege management, ensures no compromised low-level software can single handedly manipulate privilege escalation or resource allocation to negatively affect other system resources by propagating faults or further extend an adversary’s control. However, the performance impact of traditional Byzantine fault tolerant state-machine replication (BFT-SMR) protocols is prohibitive in the context of MPSoCs due to the high costs of cryptographic operations and the quantity of messages exchanged. Furthermore, fault isolation, one of the key prerequisites in FIT, presents a complicated challenge to tackle, given the whole system resides within one chip in such platforms. There is so far no solution completely and efficiently addressing the SPoF issue in critical low-level management software. It is our aim, then, to devise such a solution that, additionally, reaps benefit of the tight-coupled nature of such manycore systems. In this thesis we present two architectures, using trusted-trustworthy mechanisms and consensus protocols, capable of protecting all software layers, specifically at low level, by performing critical operations only when a majority of correct replicas agree to their execution: iBFT and Midir. Moreover, we discuss ways in which these can be used at application level on the example of replicated applications sharing critical data structures. It then becomes possible to confine software-level faults and some hardware faults to the individual tiles of an MPSoC, converting tiles into fault containment domains, thus, enabling fault isolation and, consequently, making way to high-performance FIT at the lowest level

    Architectural Support for Hypervisor-Level Intrusion Tolerance in MPSoCs

    Get PDF
    Increasingly, more aspects of our lives rely on the correctness and safety of computing systems, namely in the embedded and cyber-physical (CPS) domains, which directly affect the physical world. While systems have been pushed to their limits of functionality and efficiency, security threats and generic hardware quality have challenged their safety. Leveraging the enormous modular power, diversity and flexibility of these systems, often deployed in multi-processor systems-on-chip (MPSoC), requires careful orchestration of complex and heterogeneous resources, a task left to low-level software, e.g., hypervisors. In current architectures, this software forms a single point of failure (SPoF) and a worthwhile target for attacks: once compromised, adversaries can gain access to all information and full control over the platform and the environment it controls, for instance by means of privilege escalation and resource allocation. Currently, solutions to protect low-level software often rely on a simpler, underlying trusted layer which is often a SPoF itself and/or exhibits downgraded performance. Architectural hybridization allows for the introduction of trusted-trustworthy components, which combined with fault and intrusion tolerance (FIT) techniques leveraging replication, are capable of safely handling critical operations, thus eliminating SPoFs. Performing quorum-based consensus on all critical operations, in particular privilege management, ensures no compromised low-level software can single handedly manipulate privilege escalation or resource allocation to negatively affect other system resources by propagating faults or further extend an adversary’s control. However, the performance impact of traditional Byzantine fault tolerant state-machine replication (BFT-SMR) protocols is prohibitive in the context of MPSoCs due to the high costs of cryptographic operations and the quantity of messages exchanged. Furthermore, fault isolation, one of the key prerequisites in FIT, presents a complicated challenge to tackle, given the whole system resides within one chip in such platforms. There is so far no solution completely and efficiently addressing the SPoF issue in critical low-level management software. It is our aim, then, to devise such a solution that, additionally, reaps benefit of the tight-coupled nature of such manycore systems. In this thesis we present two architectures, using trusted-trustworthy mechanisms and consensus protocols, capable of protecting all software layers, specifically at low level, by performing critical operations only when a majority of correct replicas agree to their execution: iBFT and Midir. Moreover, we discuss ways in which these can be used at application level on the example of replicated applications sharing critical data structures. It then becomes possible to confine software-level faults and some hardware faults to the individual tiles of an MPSoC, converting tiles into fault containment domains, thus, enabling fault isolation and, consequently, making way to high-performance FIT at the lowest level

    Advanced Modeling, Control, and Optimization Methods in Power Hybrid Systems - 2021

    Get PDF
    The climate changes that are becoming visible today are a challenge for the global research community. In this context, renewable energy sources, fuel cell systems and other energy generating sources must be optimally combined and connected to the grid system using advanced energy transaction methods. As this reprint presents the latest solutions in the implementation of fuel cell and renewable energy in mobile and stationary applications such as hybrid and microgrid power systems based on the Energy Internet, blockchain technology and smart contracts, we hope that they will be of interest to readers working in the related fields mentioned above

    Cybersecurity of Digital Service Chains

    Get PDF
    This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems
    corecore