3,828 research outputs found

    Gardening Cyber-Physical Systems

    No full text
    cote interne IRCAM: Stepney12aNational audienceToday’s artefacts, from small devices to buildings and cities, are, or are becoming, cyber-physical socio-technical systems, with tightly interwoven material and computational parts. Currently, we have to la- boriously build such systems, component by component, and the results are often difficult to maintain, adapt, and reconfigure. Even “soft”ware is brittle and non-trivial to adapt and change. If we look to nature, how- ever, large complex organisms grow, adapt to their environment, and repair themselves when damaged. In this position paper, we present Gro-CyPhy, an unconventional computational framework for growing cyber-physical systems from com- putational seeds, and gardening the growing systems, in order to adapt them to specific needs. The Gro-CyPhy architecture comprises: a Seed Factory, a process for designing specific computational seeds to meet cyber-physical system requirements; a Growth Engine, providing the computational processes that grow seeds in simulation; and a Computational Garden, where mul- tiple seeds can be planted and grown in concert, and where a high-level gardener can shape them into complex cyber-physical systems. We outline how the Gro-CyPhy architecture might be applied to a significant exemplar application: a (simulated) skyscraper, comprising several mutually interdependent physical and virtual subsystems, such as the shell of exterior and interior walls, electrical power and data net- works, plumbing and rain-water harvesting, heating and air-conditioning systems, and building management control systems

    Email Babel: Does Language Affect Criminal Activity in Compromised Webmail Accounts?

    Full text link
    We set out to understand the effects of differing language on the ability of cybercriminals to navigate webmail accounts and locate sensitive information in them. To this end, we configured thirty Gmail honeypot accounts with English, Romanian, and Greek language settings. We populated the accounts with email messages in those languages by subscribing them to selected online newsletters. We hid email messages about fake bank accounts in fifteen of the accounts to mimic real-world webmail users that sometimes store sensitive information in their accounts. We then leaked credentials to the honey accounts via paste sites on the Surface Web and the Dark Web, and collected data for fifteen days. Our statistical analyses on the data show that cybercriminals are more likely to discover sensitive information (bank account information) in the Greek accounts than the remaining accounts, contrary to the expectation that Greek ought to constitute a barrier to the understanding of non-Greek visitors to the Greek accounts. We also extracted the important words among the emails that cybercriminals accessed (as an approximation of the keywords that they searched for within the honey accounts), and found that financial terms featured among the top words. In summary, we show that language plays a significant role in the ability of cybercriminals to access sensitive information hidden in compromised webmail accounts

    Robotic Remote Surveillance and Control through Speech Recognition

    Get PDF
    This paper deals with the remote based robotic surveillance system and control through speech processing. Robotic remote surveillance and control through speech recognition is a kind of simple Cyber Physical system. Cyber Physical system is connection between cyber world and physical world around us. Sensors in network map the physical parameters in digital, share the information with processors and CPS intelligently makes the decision after computing. Finally the decision command is translated into physical world by actuators. The speech commands from a user’s distant location are carried over wirelessly to a multifunctional robot unit. Robotic arm over a base will act for voice commands sent over media. Desired surveillance will be facilitated by movement of robot and installed surveillance unit. Video stream feed to user is sensing of physical environment while actions of arm represent the role of actuator. This system used in the heavy industry in any environment

    Does the Concept of “Community of Practice” Show New Trajectories for the Evolution of Industrial Districts?

    Get PDF
    The aim of this paper is to find a framework that could be useful to evaluate the utility of the concept of “Community of Practice” (CoP) for understanding the dynamics of knowledge creation and sharing in Industrial Districts (IDs). The CoP concept stems from the managerial experience of large corporations, which have found in it a kind of “living repository” of knowledge. The source of the concept of agglomeration of firms in ID is completely different. Anyway, many similarities can be found between the concepts of ID and CoP, as well then some differences. The paper proceeds as follows. First, it explains the three main concepts useful for understanding further argumentations: knowledge, ID, CoP. Next, it offers a framework to put in comparison the two concepts of ID and CoP. In the end, an example of how the applications of tools, coming from the CoP concept, can be useful to formulate some hypotheses on the evolutionary behaviour of IDs is shown.Community of Practice, Industrial District, Knowledge, Learning

    Cyber retailing in the UK: the potential of the internet as a retail channel

    Get PDF
    A myriad opinions has been propounded to explain how “cyberspace” can be exploited by commercial organisations. For the most part they are speculative, visionary or promotional. This work seeks to redress the balance by focusing on the utilisation of the Internet within the UK retail sector and examining its potential as a new retail channel. The paper presents an exploratory study using qualitative and quantitative methods: an online survey of retail Web activities followed by in-depth interviews. This approach provides a framework of current retail usage of the Internet and explores retailers’ perceptions of the inhibitors and facilitators to its development. It concludes with an emerging model that explains why current levels of retailing on the Internet are low and provides guidance for retailers wishing to increase their level of Internet activity

    Digital Twin and Blockchain Extension in Smart Buildings Platform as Cyber-Physical Systems

    Get PDF
    Cyber-physical systems is integrated computation with the physical world. CPS increasing in a wide range of applications, from smart homes to smart buildings. Digital twins are promising way to solve challenges with combination of CPS, 3D technology, and IoT. The system provides users with immersive interfaces to control and interact with devices within the smart building environment. Blockchain was chosen to secure user data using cryptographic algorithms and ensure data protection against manipulation, spying, and theft. Average load testing data for digital twin platform implemented in smart buildings range from 1 to 11 floors. The results reveal a gradual increase in average test times as the buildings' size and complexity grow, with the following values: 5.663s for 1 floor until 11 floors 7.294s. The data obtained from of the blockchain test using Hyperledger Besu provide essential insights into the system's performance with several bandwidth that used in the system. Average time for each test trial ranged from 1.066 seconds to 2.006 seconds, showing slight variations based on the bandwidth used. However, transactions per second (TPS) values were relatively fast, ranging from 1.066 tps to 0.499 tps with positive aspect of the retention rate for all trials was 100% success

    Preserving the Integrity of Li Yu's Craft Aesthetics using the Digital Information Technology

    Get PDF
    Preserving the integrity of ancient aesthetic works has become a greater matter of concern in the modern digital age. As the internet is streaming with data that are collected from multiple sources, it imposes a severe threat to the integrity and security of the original aesthetic of many craft works. This paper proposes a novel framework that attempts to preserve Li Yu's craft aesthetics, which can be explored from his wide range of literary collections. As the author is popular for his excellence in many art forms like gardening, theatre arts, etc, recreation of his work is a major problem of concern. The framework initially pre-processed the corpus to extract keywords, which are then subjected to a semantic vector to find the closely related as well as differing words. Then, these words are subjected to geometric perturbations to impart versatility to the training phase. The text under screening is fed to the classification phase to find whether it is an altered or modified work of Li Yu, thus isolating the author's work from being reproduced, which greatly affects the aesthetics. As a future extension, the work can be trained with different classifiers to develop a defrauding system
    • …
    corecore