1,580 research outputs found

    Model-Based Engineering of Collaborative Embedded Systems

    Get PDF
    This Open Access book presents the results of the "Collaborative Embedded Systems" (CrESt) project, aimed at adapting and complementing the methodology underlying modeling techniques developed to cope with the challenges of the dynamic structures of collaborative embedded systems (CESs) based on the SPES development methodology. In order to manage the high complexity of the individual systems and the dynamically formed interaction structures at runtime, advanced and powerful development methods are required that extend the current state of the art in the development of embedded systems and cyber-physical systems. The methodological contributions of the project support the effective and efficient development of CESs in dynamic and uncertain contexts, with special emphasis on the reliability and variability of individual systems and the creation of networks of such systems at runtime. The project was funded by the German Federal Ministry of Education and Research (BMBF), and the case studies are therefore selected from areas that are highly relevant for Germanyā€™s economy (automotive, industrial production, power generation, and robotics). It also supports the digitalization of complex and transformable industrial plants in the context of the German government's "Industry 4.0" initiative, and the project results provide a solid foundation for implementing the German government's high-tech strategy "Innovations for Germany" in the coming years

    A Paradigm for Safe Adaptation of Collaborating Robots

    Get PDF
    The dynamic forces that transit back and forth traditional boundaries of system development have led to the emergence of digital ecosystems. Within these, business gains are achieved through the development of intelligent control that requires a continuous design and runtime co-engineering process endangered by malicious attacks. The possibility of inserting specially crafted faults capable to exploit the nature of unknown evolving intelligent behavior raises the necessity of malicious behavior detection at runtime.Adjusting to the needs and opportunities of fast AI development within digital ecosystems, in this paper, we envision a novel method and framework for runtime predictive evaluation of intelligent robots' behavior for assuring a cooperative safe adjustment

    Proceedings of the 11th European Agent Systems Summer School Student Session

    Get PDF
    This volume contains the papers presented at the Student Session of the 11th European Agent Systems Summer School (EASSS) held on 2nd of September 2009 at Educatorio della Providenza, Turin, Italy. The Student Session, organised by students, is designed to encourage student interaction and feedback from the tutors. By providing the students with a conference-like setup, both in the presentation and in the review process, students have the opportunity to prepare their own submission, go through the selection process and present their work to each other and their interests to their fellow students as well as internationally leading experts in the agent field, both from the theoretical and the practical sector. Table of Contents: Andrew Koster, Jordi Sabater Mir and Marco Schorlemmer, Towards an inductive algorithm for learning trust alignment . . . 5; Angel Rolando Medellin, Katie Atkinson and Peter McBurney, A Preliminary Proposal for Model Checking Command Dialogues. . . 12; Declan Mungovan, Enda Howley and Jim Duggan, Norm Convergence in Populations of Dynamically Interacting Agents . . . 19; Akın GĆ¼nay, Argumentation on Bayesian Networks for Distributed Decision Making . . 25; Michael Burkhardt, Marco Luetzenberger and Nils Masuch, Towards Toolipse 2: Tool Support for the JIAC V Agent Framework . . . 30; Joseph El Gemayel, The Tenacity of Social Actors . . . 33; Cristian Gratie, The Impact of Routing on Traffic Congestion . . . 36; Andrei-Horia Mogos and Monica Cristina Voinescu, A Rule-Based Psychologist Agent for Improving the Performances of a Sportsman . . . 39; --Autonomer Agent,Agent,KĆ¼nstliche Intelligenz

    Digital Twins and the Future of their Use Enabling Shift Left and Shift Right Cybersecurity Operations

    Full text link
    Digital Twins (DTs), optimize operations and monitor performance in Smart Critical Systems (SCS) domains like smart grids and manufacturing. DT-based cybersecurity solutions are in their infancy, lacking a unified strategy to overcome challenges spanning next three to five decades. These challenges include reliable data accessibility from Cyber-Physical Systems (CPS), operating in unpredictable environments. Reliable data sources are pivotal for intelligent cybersecurity operations aided with underlying modeling capabilities across the SCS lifecycle, necessitating a DT. To address these challenges, we propose Security Digital Twins (SDTs) collecting realtime data from CPS, requiring the Shift Left and Shift Right (SLSR) design paradigm for SDT to implement both design time and runtime cybersecurity operations. Incorporating virtual CPS components (VC) in Cloud/Edge, data fusion to SDT models is enabled with high reliability, providing threat insights and enhancing cyber resilience. VC-enabled SDT ensures accurate data feeds for security monitoring for both design and runtime. This design paradigm shift propagates innovative SDT modeling and analytics for securing future critical systems. This vision paper outlines intelligent SDT design through innovative techniques, exploring hybrid intelligence with data-driven and rule-based semantic SDT models. Various operational use cases are discussed for securing smart critical systems through underlying modeling and analytics capabilities.Comment: IEEE Submitted Paper: Trust, Privacy and Security in Intelligent Systems, and Application

    Simultaneous Localization and Mapping and Tag-Based Navigation for Unmanned Aerial Vehicles

    Get PDF
    This paper presents navigation techniques for an Unmanned Aerial Vehicle (UAV) in a virtual simulation of an indoor environment using Simultaneous Localization and Mapping (SLAM) and April Tag markers to reach a target destination. In many cases, UAVs can access locations that are inaccessible to people or regular vehicles in indoor environments, making them valuable for surveillance purposes. This study employs the Robot Operating System (ROS) to simulate SLAM techniques using LIDAR and GMapping packages for UAV navigation in two different environments. In the Tag-based simulation, the input topic for April Tag in ROS is camera images, and the calibration of position with a tag is done through assigning a message to each ID and its marker image. On the other hand, navigation in SLAM was achieved using a global and local planner algorithm. For localization, an Adaptive Monte-Carlo Localization (AMCL) technique has been used to identify factors contributing to inconsistent mapping results, such as heavy computational load, grid mapping accuracy, and inadequate UAV localization. Furthermore, this study analyzed the April Tag-based navigation algorithm, which showed satisfactory outcomes due to its lighter computing requirements. It can be ascertained that by using ROS packages, the simulation of SLAM and Tag-based UAV navigation inside a building can be achieved. &nbsp

    Wireless Communication Technologies for Safe Cooperative Cyber Physical Systems

    Get PDF
    Cooperative Cyber-Physical Systems (Co-CPSs) can be enabled using wireless communication technologies, which in principle should address reliability and safety challenges. Safety for Co-CPS enabled by wireless communication technologies is a crucial aspect and requires new dedicated design approaches. In this paper, we provide an overview of five Co-CPS use cases, as introduced in our SafeCOP EU project, and analyze their safety design requirements. Next, we provide a comprehensive analysis of the main existing wireless communication technologies giving details about the protocols developed within particular standardization bodies. We also investigate to what extent they address the non-functional requirements in terms of safety, security and real time, in the different application domains of each use case. Finally, we discuss general recommendations about the use of different wireless communication technologies showing their potentials in the selected real-world use cases. The discussion is provided under consideration in the 5G standardization process within 3GPP, whose current efforts are inline to current gaps in wireless communications protocols for Co-CPSs including many future use casesinfo:eu-repo/semantics/publishedVersio

    Simultaneous Localization and Mapping and Tag-Based Navigation for Unmanned Aerial Vehicles

    Get PDF
    This paper presents navigation techniques for an Unmanned Aerial Vehicle (UAV) in a virtual simulation of an indoor environment using Simultaneous Localization and Mapping (SLAM) and April Tag markers to reach a target destination. In many cases, UAVs can access locations that are inaccessible to people or regular vehicles in indoor environments, making them valuable for surveillance purposes. This study employs the Robot Operating System (ROS) to simulate SLAM techniques using LIDAR and GMapping packages for UAV navigation in two different environments. In the Tag-based simulation, the input topic for April Tag in ROS is camera images, and the calibration of position with a tag is done through assigning a message to each ID and its marker image. On the other hand, navigation in SLAM was achieved using a global and local planner algorithm. For localization, an Adaptive Monte-Carlo Localization (AMCL) technique has been used to identify factors contributing to inconsistent mapping results, such as heavy computational load, grid mapping accuracy, and inadequate UAV localization. Furthermore, this study analyzed the April Tag-based navigation algorithm, which showed satisfactory outcomes due to its lighter computing requirements. It can be ascertained that by using ROS packages, the simulation of SLAM and Tag-based UAV navigation inside a building can be achieved. &nbsp

    From Digital Twins to Digital Selves and Beyond

    Get PDF
    This open access book aims at deepening the understanding of the relation between cyber-physical systems (CPSs) as socio-technical systems and their digital representations with intertwined artificial intelligence (AI). The authors describe why it is crucial for digital selves to be able to develop emotional behavior and why a humanity-inspired AI is necessary so that humans and humanoids can coexist. The introductory chapter describes major milestones in computer science which form the basis for the implementation of digital twins and digital selves. The subsequent Part I then lays the foundation to develop a socio-technical understanding of the nature of digital twins as representations and trans-human development objects. Following the conceptual understanding of digital twins and how they could be engineered according to cognitive and organizational structures, Part II forms the groundwork for understanding social behavior and its modeling. It discusses various perception-based socio-emotional approaches before sketching behavior-relevant models and their simulation capabilities. In particular, it is shown how emotions can substantially influence the collective behavior of artificial actors. Part III eventually presents a symbiosis showing under which preconditions digital selves might construct and produce digital twins as integrated design elements in trans-human ecosystems. The chapters in this part are dedicated to opportunities and modes of co-creating reflective socio-trans-human systems based on digital twin models, exploring mutual control and continuous development. The final epilog is congenitally speculative in its nature by presenting thoughts on future developments of artificial life in computational substrates. The book is written for researchers and professionals in areas like cyber-physical systems, robotics, social simulation or systems engineering, interested to take a speculative look into the future of digital twins and autonomous agents. It also touches upon philosophical aspects of digital twins, digital selves and humanoids
    • ā€¦
    corecore