56,049 research outputs found

    Special Session on Industry 4.0

    Get PDF
    No abstract available

    Mapping Big Data into Knowledge Space with Cognitive Cyber-Infrastructure

    Full text link
    Big data research has attracted great attention in science, technology, industry and society. It is developing with the evolving scientific paradigm, the fourth industrial revolution, and the transformational innovation of technologies. However, its nature and fundamental challenge have not been recognized, and its own methodology has not been formed. This paper explores and answers the following questions: What is big data? What are the basic methods for representing, managing and analyzing big data? What is the relationship between big data and knowledge? Can we find a mapping from big data into knowledge space? What kind of infrastructure is required to support not only big data management and analysis but also knowledge discovery, sharing and management? What is the relationship between big data and science paradigm? What is the nature and fundamental challenge of big data computing? A multi-dimensional perspective is presented toward a methodology of big data computing.Comment: 59 page

    Supporting adaptiveness of cyber-physical processes through action-based formalisms

    Get PDF
    Cyber Physical Processes (CPPs) refer to a new generation of business processes enacted in many application environments (e.g., emergency management, smart manufacturing, etc.), in which the presence of Internet-of-Things devices and embedded ICT systems (e.g., smartphones, sensors, actuators) strongly influences the coordination of the real-world entities (e.g., humans, robots, etc.) inhabitating such environments. A Process Management System (PMS) employed for executing CPPs is required to automatically adapt its running processes to anomalous situations and exogenous events by minimising any human intervention. In this paper, we tackle this issue by introducing an approach and an adaptive Cognitive PMS, called SmartPM, which combines process execution monitoring, unanticipated exception detection and automated resolution strategies leveraging on three well-established action-based formalisms developed for reasoning about actions in Artificial Intelligence (AI), including the situation calculus, IndiGolog and automated planning. Interestingly, the use of SmartPM does not require any expertise of the internal working of the AI tools involved in the system

    Cyber-Virtual Systems: Simulation, Validation & Visualization

    Full text link
    We describe our ongoing work and view on simulation, validation and visualization of cyber-physical systems in industrial automation during development, operation and maintenance. System models may represent an existing physical part - for example an existing robot installation - and a software simulated part - for example a possible future extension. We call such systems cyber-virtual systems. In this paper, we present the existing VITELab infrastructure for visualization tasks in industrial automation. The new methodology for simulation and validation motivated in this paper integrates this infrastructure. We are targeting scenarios, where industrial sites which may be in remote locations are modeled and visualized from different sites anywhere in the world. Complementing the visualization work, here, we are also concentrating on software modeling challenges related to cyber-virtual systems and simulation, testing, validation and verification techniques for them. Software models of industrial sites require behavioural models of the components of the industrial sites such as models for tools, robots, workpieces and other machinery as well as communication and sensor facilities. Furthermore, collaboration between sites is an important goal of our work.Comment: Preprint, 9th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE 2014

    Numerical simulation of electric signal in the cyber-physical immunosensor system on rectangular lattice in R package

    Get PDF
    Проведено чисельне моделювання електричного сигналу з перетворювача в кіберфізичній імуносенсорній системі на прямокутній решітці з використанням диференціальних рівнянь із запізненням за допомогою пакета R. Описано функціональні можливості пакета R як середовища програмування для статистичного аналізу даних, наведено корисні сайти, списки посилань і документація пакета R. У вигляді таблиці представлено назви параметрів моделі імуносенсора на прямокутній решітці з використанням диференціальних рівнянь із запізненням та їх числові значення в пакеті R. Реалізовано комп’ютерну програму «Чисельний аналіз електричного сигналу з перетворювача, який характеризує кількість флуоресціюючих пікселів в імуносенсорі на прямокутній решітці з використанням диференціальних рівнянь із запізненням». Розроблена комп’ютерна програма дає змогу провести дослідження стійкості імуносенсорних систем, які широко використовуються для отримання діагностичної інформації з метою оцінювання критичних станів при серцево-судинних захворюваннях, величини інсуліну при вимірюванні величини глюкози в крові та виявлення кількісних показників у деяких фармацевтичних сполуках. Наведено фрагмент лістингу комп’ютерної програми в пакеті R для отримання електричного сигналу з перетворювача, який характеризує кількість флуоресціюючих пікселів у кіберфізичній імуносенсорній системі на прямокутній решітці з використанням диференціальних рівнянь із запізненням. Проведено чисельне моделювання для електричного сигналу з перетворювача в імуносенсорі на прямокутній решітці з використанням диференціальних рівнянь із запізненням. Проаналізовано зміни отриманого електричного сигналу, які відповідають кількості флуоресціюючих пікселів у кіберфізичній імуносенсорній системі. Обгрунтовано використання пакета R як вільнопоширюваного програмного забезпечення з графічною візуалізацією результатів аналізу.The numerical simulation of electric signal from the converter in the cyber-physical immunosensor system on rectangular lattice using differential equations with delay by means of R package is carried out in this paper. The functional features of R package as a programming environment for statistical data analysis are described, useful sites, references lists and documentation of R package are given. The names of parameters of the immunosensor model on rectangular lattice using the differential equations with delay and their numerical values in the package R are presented in the form of the table. The computer program «Numerical analysis of the electrical signal from the converter that characterizes the number of fluorescing pixels in the immunosensor on rectangular lattice using delayed differential equations» is implemented. The developed computer program makes it possible to carry out the investigation of the stability of immunosensory systems, which are widely used to obtain diagnostic information in order to evaluate critical states of cardiovascular disease, insulin values while measuring blood glucose values and identify quantitative indicators in some рharmaceutics compounds. The fragment of computer program listing in R package for obtaining the electrical signal from converter characterizing the number of fluorescent pixels in cyber-physical immunosensor system on rectangular lattice using delayed differential equations is presented. Numerical simulation for the electric signal from the converter in the immunosensor on rectangular lattice using the delayed differential equations is carried out. The changes of the received electrical signal corresponding to the number of fluorescent pixels in the cyber-physical immunosensory system are analyzed. The use of R package as a freely distributed software with graphical visualization of the analysis results is substantiated

    Assessing and augmenting SCADA cyber security: a survey of techniques

    Get PDF
    SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability
    corecore