66 research outputs found

    Robotic autonomous systems for earthmoving equipment operating in volatile conditions and teaming capacity: a survey

    Full text link
    Abstract There has been an increasing interest in the application of robotic autonomous systems (RASs) for construction and mining, particularly the use of RAS technologies to respond to the emergent issues for earthmoving equipment operating in volatile environments and for the need of multiplatform cooperation. Researchers and practitioners are in need of techniques and developments to deal with these challenges. To address this topic for earthmoving automation, this paper presents a comprehensive survey of significant contributions and recent advances, as reported in the literature, databases of professional societies, and technical documentation from the Original Equipment Manufacturers (OEM). In dealing with volatile environments, advances in sensing, communication and software, data analytics, as well as self-driving technologies can be made to work reliably and have drastically increased safety. It is envisaged that an automated earthmoving site within this decade will manifest the collaboration of bulldozers, graders, and excavators to undertake ground-based tasks without operators behind the cabin controls; in some cases, the machines will be without cabins. It is worth for relevant small- and medium-sized enterprises developing their products to meet the market demands in this area. The study also discusses on future directions for research and development to provide green solutions to earthmoving.</jats:p

    Privacy-aware relationship semantics–based XACML access control model for electronic health records in hybrid cloud

    Get PDF
    State-of-the-art progress in cloud computing encouraged the healthcare organizations to outsource the management of electronic health records to cloud service providers using hybrid cloud. A hybrid cloud is an infrastructure consisting of a private cloud (managed by the organization) and a public cloud (managed by the cloud service provider). The use of hybrid cloud enables electronic health records to be exchanged between medical institutions and supports multipurpose usage of electronic health records. Along with the benefits, cloud-based electronic health records also raise the problems of security and privacy specifically in terms of electronic health records access. A comprehensive and exploratory analysis of privacy-preserving solutions revealed that most current systems do not support fine-grained access control or consider additional factors such as privacy preservation and relationship semantics. In this article, we investigated the need of a privacy-aware fine-grained access control model for the hybrid cloud. We propose a privacy-aware relationship semantics–based XACML access control model that performs hybrid relationship and attribute-based access control using extensible access control markup language. The proposed approach supports fine-grained relation-based access control with state-of-the-art privacy mechanism named Anatomy for enhanced multipurpose electronic health records usage. The proposed (privacy-aware relationship semantics–based XACML access control model) model provides and maintains an efficient privacy versus utility trade-off. We formally verify the proposed model (privacy-aware relationship semantics–based XACML access control model) and implemented to check its effectiveness in terms of privacy-aware electronic health records access and multipurpose utilization. Experimental results show that in the proposed (privacy-aware relationship semantics–based XACML access control model) model, access policies based on relationships and electronic health records anonymization can perform well in terms of access policy response time and space storage

    Energy-Aware System-Level Design of Cyber-Physical Systems

    Get PDF
    Cyber-Physical Systems (CPSs) are heterogeneous systems in which one or several computational cores interact with the physical environment. This interaction is typically performed through electromechanical elements such as sensors and actuators. Many CPSs operate as part of a network and some of them present a constrained energy budget (for example, they are battery powered). Examples of energy constrained CPSs could be a mobile robot, the nodes that compose a Body Area Network or a pacemaker. The heterogeneity present in the composition of CPSs together with the constrained energy availability makes these systems challenging to design. A way to tackle both complexity and costs is the application of abstract modelling and simulation. This thesis proposed the application of modelling at the system level, taking energy consumption in the different kinds of subsystems into consideration. By adopting this cross disciplinary approach to energy consumption it is possible to decrease it effectively. The results of this thesis are a number of modelling guidelines and tool improvements to support this kind of holistic analysis, covering energy consumption in electromechanical, computation and communication subsystems. From a methodological point of view these have been framed within a V-lifecycle. Finally, this approach has been demonstrated on two case studies from the medical domain enabling the exploration of alternative systems architectures and producing energy consumption estimates to conduct trade-off analysis

    Proceedings of the 9th Arab Society for Computer Aided Architectural Design (ASCAAD) international conference 2021 (ASCAAD 2021): architecture in the age of disruptive technologies: transformation and challenges.

    Get PDF
    The ASCAAD 2021 conference theme is Architecture in the age of disruptive technologies: transformation and challenges. The theme addresses the gradual shift in computational design from prototypical morphogenetic-centered associations in the architectural discourse. This imminent shift of focus is increasingly stirring a debate in the architectural community and is provoking a much needed critical questioning of the role of computation in architecture as a sole embodiment and enactment of technical dimensions, into one that rather deliberately pursues and embraces the humanities as an ultimate aspiration

    Green Technologies for Production Processes

    Get PDF
    This book focuses on original research works about Green Technologies for Production Processes, including discrete production processes and process production processes, from various aspects that tackle product, process, and system issues in production. The aim is to report the state-of-the-art on relevant research topics and highlight the barriers, challenges, and opportunities we are facing. This book includes 22 research papers and involves energy-saving and waste reduction in production processes, design and manufacturing of green products, low carbon manufacturing and remanufacturing, management and policy for sustainable production, technologies of mitigating CO2 emissions, and other green technologies

    Social work with airports passengers

    Get PDF
    Social work at the airport is in to offer to passengers social services. The main methodological position is that people are under stress, which characterized by a particular set of characteristics in appearance and behavior. In such circumstances passenger attracts in his actions some attention. Only person whom he trusts can help him with the documents or psychologically

    Reasoning Under Uncertainty in Cyber-Physical Systems: Toward Efficient and Secure Operation

    Full text link
    The increased sensing, processing, communication, and control capabilities introduced by cyber-physical systems bring many potential improvements to the operation of society's systems, but also introduce questions as to how one can ensure their efficient and secure operation. This dissertation investigates three questions related to decision-making under uncertainty in cyber-physical systems settings. First, in the context of power systems and electricity markets, how can one design algorithms that guide self-interested agents to a socially optimal and physically feasible outcome, subject to the fact that agents only possess localized information of the system and can only react to local signals? The proposed algorithms, investigated in the context of two distinct models, are iterative in nature and involve the exchange of messages between agents. The first model consists of a network of interconnected power systems controlled by a collection of system operators. Each system operator possesses knowledge of its own localized region and aims to prescribe the cost minimizing set of net injections for its buses. By using relative voltage angles as messages, system operators iteratively communicate to reach a social-cost minimizing and physically feasible set of injections for the whole network. The second model consists of a market operator and market participants (distribution, generation, and transmission companies). Using locational marginal pricing, the market operator is able to guide the market participants to a competitive equilibrium, which, under an assumption on the positivity of prices, is shown to be a globally optimal solution to the non-convex social-welfare maximization problem. Common to both algorithms is the use of a quadratic power flow approximation that preserves important non-linearities (power losses) while maintaining desirable mathematical properties that permit convergence under natural conditions. Second, when a system is under attack from a malicious agent, what models are appropriate for performing real-time and scalable threat assessment and response selection when we only have partial information about the attacker's intent and capabilities? The proposed model, termed the dynamic security model, is based on a type of attack graph, termed a condition dependency graph, and describes how an attacker can infiltrate a cyber network. By embedding a state space on the graph, the model is able to quantify the attacker's progression. Consideration of multiple attacker types, corresponding to attack strategies, allows one to model the defender's uncertainty of the attacker's true strategy/intent. Using noisy security alerts, the defender maintains a belief over both the capabilities/progression of the attacker (via a security state) and its strategy (attacker type). An online, tree-based search method, termed the online defense algorithm, is developed that takes advantage of the model's structure, permitting scalable computation of defense policies. Finally, in partially observable sequential decision-making environments, specifically partially observable Markov decision processes (POMDPs), under what conditions do optimal policies possess desirable structure? Motivated by the dynamic security model, we investigate settings where the underlying state space is partially ordered (i.e. settings where one cannot always say whether one state is better or worse than another state). The contribution lies in the derivation of natural conditions on the problem's parameters such that optimal policies are monotone in the belief for a class of two-action POMDPs. The extension to the partially ordered setting requires defining a new stochastic order, termed the generalized monotone likelihood ratio, and a corresponding class of order-preserving matrices, termed generalized totally positive of order 2.PHDElectrical Engineering: SystemsUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttps://deepblue.lib.umich.edu/bitstream/2027.42/144026/1/miehling_1.pd

    IoT-driven scheduling of residential HVAC and virtual bus lanes for energy savings

    Get PDF
    The availability of commodity Internet connection and the decrease in price and form factor of consumer electronics led to the emergence of Internet of Things (IoT), with which our world becomes more connected and instrumented. IoT is a great vehicle for enabling solutions to problems in the connected environment that surrounds us (i.e., smart homes and smart cities). An example is the use of sensors and IoT to address issues related to energy efficiency, the broad area of this dissertation. Our hypothesis is that data processing and decision making need to be carried out at the network edge, specifically as close to the physical system as possible, where data are generated and used, to produce results in real-time and make sure the data is not exposed to privacy and security risks. To this end, we propose to leverage scheduling principles and statistical techniques in the context of two applications, namely aiming to reduce duty cycle of HVAC (Heating, Ventilation, and Air Conditioning) systems in smart homes and to mitigate road congestion in smart cities. The common goal in these two aims is the reduction of energy consumption and the reduction of atmospheric pollution. To achieve our first aim we propose intelligent scheduling of the duty cycles of HVAC systems in residential buildings. Our solution combines linear and polynomial regression enabled estimator that drives the calculations about the amounts of time thermally conditioned air should be supplied to each room. The output from our estimator is fed into our scheduler based on integer linear programming to decrease the duty cycle of the home's HVAC systems. We evaluate the effectiveness and efficiency of our HVAC solution with a dataset collected from several residential houses in the state of Pennsylvania. To achieve the second aim, we propose the concept of virtual bus lanes, that combines on-demand creation of bus lanes with dynamic control of traffic lights. Moreover, we propose to guide drivers through less congested routes using light boards that provide to drivers information in real-time for such routes. Our methods are anchored to priority scheduling, incremental windowed-based aggregation, and shortest path first Dijkstra's algorithm. We evaluate the effectiveness and efficiency of our virtual bus lanes solution with a real dataset from the city of Beijing, China, and a synthetic traffic scenario from the city of Luxembourg
    corecore