925 research outputs found

    Modelling Provenance of Sensor Data for Food Safety Compliance Checking

    Get PDF
    The research described here was funded by an award made by the RCUK IT as a Utility Network+ (EP/K003569/1) and the UK Food Standards Agency. We thank the owner and staff of Rye & Soda restaurant, Aberdeen for their support throughout the project.Postprin

    Semantic Modelling of Plans and Execution Traces for Enhancing Transparency of IoT Systems

    Get PDF
    The work described here was funded by the award made by the RCUK Digital Economy programme to the University of Aberdeen (EP/N028074/1), a SICSA PECE travel award, the Defense Advanced Research Projects Agency with award W911NF-18-1-0027, the SIMPLEX program with award W911NF-15-1-0555 and from the National Institutes of Health under awards 1U01CA196387 and 1R01GM117097.Postprin

    Blockchain-Supported Food Supply Chain Reference Architecture

    Get PDF
    Department of Management EngineeringA food security issue increased rapidly due to numerous food frauds and tragic incidents and overall growth in the scale of food supply chain network in the last years. Since the recent evolution of Blockchain technology, it promises high potential ability to guarantee and trace the originality of products in supply chain network The main purpose of this research work is to build general Blockchain-supported food supply chain reference architecture model along with supplementary guidelines which could be applied in real-life supply chain cases with or without customization or inspire their design of supply chain system. A case driven bottom-up approach is used to create the reference architecture with the help of BOAT framework as a base tool to align the case details. A total of three food supply chain cases were utilized for the development of reference architecture and third case study of Mongolian meat trade supply chain was examined with the proposed solution and finally evaluated by the local experts. I believe this reference framework will help fellow researchers and industry practitioners to use this as a base knowledge without beginning from the scratches because current literature lacks extremely in this field. In overall, I expect this work will contribute to the current literature in the followings: 1. To expand the implementation mechanism of Blockchain solutions in general supply chain cases especially in food supply chain. 2. To provide practical exemplary implementation of real life case scenarios 3. To provide detailed analysis of benefits and weaknesses of using Blockchain in food supply chainope

    Real-Time Anomaly Detection in Cold Chain Transportation Using IoT Technology

    Get PDF
    There are approximately 88 million tonnes of food waste generated annually in the EU alone. Food spoilage during distribution accounts for some of this waste. To minimise this spoilage, it is of utmost importance to maintain the cold chain during the transportation of perishable foods such as meats, fruits, and vegetables. However, these products are often unfortunately wasted in large quantities when unpredictable failures occur in the refrigeration units of transport vehicles. This work proposes a real-time IoT anomaly detection system to detect equipment failures and provide decision support options to warehouse staff and delivery drivers, thus reducing potential food wastage. We developed a bespoke Internet of Things (IoT) solution for real-time product monitoring and alerting during cold chain transportation, which is based on the Digital Matter Eagle cellular data logger and two temperature probes. A visual dashboard was developed to allow logistics staff to perform monitoring, and business-defined temperature thresholds were used to develop a text and email decision support system, notifying relevant staff members if anomalies were detected. The IoT anomaly detection system was deployed with Musgrave Marketplace, Ireland’s largest grocery distributor, in three of their delivery vans operating in the greater Belfast area. Results show that the LTE-M cellular IoT system is power efficient and avoids sending false alerts due to the novel alerting system which was developed based on trip detection

    Adaptive Architecture:Regulating human building interaction

    Get PDF
    In this paper, we explore the regulatory, technical and interactional implications of Adaptive Architecture (AA) and how it will recalibrate the nature of human-building interaction. We comprehensively unpack the emergence and history of this novel concept, reflecting on the current state of the art and policy foundations supporting it. As AA is underpinned by the Internet of Things (IoT), we consider how regulatory and surveillance issues posed by the IoT are manifesting in the built environment. In our analysis, we utilise a prominent architectural model, Stuart Brand’s Shearing Layers, to understand temporal change and informational flows across different physical layers of a building. We use three AA applications to situate our analysis, namely a smart IoT security camera; an AA research prototype; and an AA commercial deployment. Focusing on emerging information privacy and security regulations, particularly the EU General Data Protection Regulation 2016, we examine AA from 5 perspectives: physical & information security risks; challenges of establishing responsibility; enabling occupant rights over flows, collection, use & control of personal data; addressing increased visibility of emotions and bodies; understanding surveillance of everyday routine activities. We conclude with key challenges for AA regulation and the future of human–building interaction

    Resilience, reliability, and coordination in autonomous multi-agent systems

    Get PDF
    Acknowledgements The research reported in this paper was funded and supported by various grants over the years: Robotics and AI in Nuclear (RAIN) Hub (EP/R026084/1); Future AI and Robotics for Space (FAIR-SPACE) Hub (EP/R026092/1); Offshore Robotics for Certification of Assets (ORCA) Hub (EP/R026173/1); the Royal Academy of Engineering under the Chair in Emerging Technologies scheme; Trustworthy Autonomous Systems “Verifiability Node” (EP/V026801); Scrutable Autonomous Systems (EP/J012084/1); Supporting Security Policy with Effective Digital Intervention (EP/P011829/1); The International Technology Alliance in Network and Information Sciences.Peer reviewedPostprin
    • …
    corecore