1,075 research outputs found

    Cyber-physical systems in food production chain

    Get PDF
    The article reviews the state-of-the-science in the field of cyber-physical systems (CPSs). CPSs are intelligent systems that include physical, biological and computational components using engineering networks. CPSs are able to integrate into production processes, improve the exchange of information between industrial equipment, qualitatively transform production chains, and effectively manage business and customers. This is possible due to the ability of CPSs to manage ongoing processes through automatic monitoring and controlling the entire production process and adjusting the production to meet customer preferences. A comprehensive review identified key technology trends underlying CPSs. These are artificial intelligence, machine learning, big data analytics, augmented reality, Internet of things, quantum computing, fog computing, 3D printing, modeling and simulators, automatic object identifiers (RFID tags). CPSs will help to improve the control and traceability of production operations: they can collect information about raw materials, temperature and technological conditions, the degree of food product readiness, thereby increasing the quality of food products. Based on the results, terms and definitions, and potential application of cyber-physical systems in general and their application in food systems in particular were identified and discussed with an emphasis on food production (including meat products).The article reviews the state-of-the-science in the field of cyber-physical systems (CPSs). CPSs are intelligent systems that include physical, biological and computational components using engineering networks. CPSs are able to integrate into production processes, improve the exchange of information between industrial equipment, qualitatively transform production chains, and effectively manage business and customers. This is possible due to the ability of CPSs to manage ongoing processes through automatic monitoring and controlling the entire production process and adjusting the production to meet customer preferences. A comprehensive review identified key technology trends underlying CPSs. These are artificial intelligence, machine learning, big data analytics, augmented reality, Internet of things, quantum computing, fog computing, 3D printing, modeling and simulators, automatic object identifiers (RFID tags). CPSs will help to improve the control and traceability of production operations: they can collect information about raw materials, temperature and technological conditions, the degree of food product readiness, thereby increasing the quality of food products. Based on the results, terms and definitions, and potential application of cyber-physical systems in general and their application in food systems in particular were identified and discussed with an emphasis on food production (including meat products)

    A New Concept for Permanent Geometric Reference Points made from RFID tags for Composite Aircraft Components

    Get PDF
    This work presents a new concept for permanent markers consisting of RFID tags built into aircraft components made from fibre reinforced plastics. The novelty of this concept lies in the antenna design, which represents a geometric point that can be accessed using commonly employed non-destructive testing (NDT) methods, specifically suited for thermovision. These geometric points provide a reliable frame of reference for accurate data localization throughout the entire life cycle of the components. Initial results obtained with an antenna design incorporated into a glass-reinforced epoxy laminate quantify the anticipated localization accuracy achieved through our concept. We utilize a geometrically calibrated, off-the-shelf bolometer and standard lock-in thermography in our approach

    Beam scanning by liquid-crystal biasing in a modified SIW structure

    Get PDF
    A fixed-frequency beam-scanning 1D antenna based on Liquid Crystals (LCs) is designed for application in 2D scanning with lateral alignment. The 2D array environment imposes full decoupling of adjacent 1D antennas, which often conflicts with the LC requirement of DC biasing: the proposed design accommodates both. The LC medium is placed inside a Substrate Integrated Waveguide (SIW) modified to work as a Groove Gap Waveguide, with radiating slots etched on the upper broad wall, that radiates as a Leaky-Wave Antenna (LWA). This allows effective application of the DC bias voltage needed for tuning the LCs. At the same time, the RF field remains laterally confined, enabling the possibility to lay several antennas in parallel and achieve 2D beam scanning. The design is validated by simulation employing the actual properties of a commercial LC medium

    Theoretical Limits of Backscatter Communications

    Full text link
    Backscatter communication is a hot candidate for future IoT systems. It offers the possibility for connectivity with tiny amounts of energy that can be easily obtained from energy harvesting. This is possible as backscatter devices do not actively transmit electromagnetic waves. Instead they only reflect existing electromagnetic waves by changing the antenna load. This fact leads to significant differences compared to classical communication wrt. the modulation schemes and achievable data rates. However, to our best knowledge nobody has so far systematically analyzed the achievable data rates and transmit ranges for different parameter configurations. Within this paper we derive theoretical bounds for backscatter communications based on classical information theory. We then use these bounds to analyze how different parameters - e.g. the distance, the frequency, or the transmit power - affect the achievable data rates. The bounds are derived for mono-static configuration, as well as for bi-static configurations. This allows feasibility analyses for different use-cases that are currently discussed in 3GPP and IEEE 802.Comment: v2: Subsection IV G "Influence of the Distance in a Bi-static Configuration" replaced by a new subsection about an Ambient Backscattering Configuration (Subsection IV G "Influence of the Distance in an Ambient Backscattering Configuration"

    Complementary RFID tag antennas

    Get PDF
    This thesis is mainly concerned with the investigation of a systematic approach to selecting tag antennas whose electromagnetic properties are compatible with the platforms on which they are supported and the immediate environment in which they are to be operated. The work is divided into three parts. The first two explore the design and optimisation of Radio Frequency Identification (RFID) tag antennas: firstly, in this section, behaviour of an electric dipole is explored. Secondly, a novel dual band Slot Patch Antenna (SPA) antenna is designed and developed, which employs various resonant slots to perturb the tuning and impedance of a conventional slotline. The third investigates its operation within a roll cage. Complementary dipole and Slot Patch Antennas (SPA) are investigated to obtain a range of options on antenna configurations that, at certain selected frequency bands, give optimum interaction with the antenna support material. This requires that the regions of Perfect Electric Conductor (PEC) and free space dielectric substrate in both antennas be interchanged. The antennas are truncated of the otherwise infinite perfect electric conductor and dielectric substrate. The radar cross sections (RCS) are predicted under various load conditions and orientations when the models are illuminated with plane wave. The convergence of this method has been found to depend on the load conditions and the substrate thickness and permittivity. The RCS at boresight is found to depend on the radiating elements. The effects of various possible mounting platforms are predicted. The feasibility of reading tags through wire meshes such as those on a roll cage is investigated. The cages, of various mesh sizes, exhibit transmission responses characterised by frequency spacing of approximately half the first resonant frequency. The insertion loss is found to decrease with increasing mesh size. Also, the standing waves inside the cage exhibit nulls whose voltage standing wave ratio (v.s.w.r.) decreases with increasing mesh sizes. The distance, or range, over which the tag surveillance operates, is approximated in proportion to the amplitude of the standing wave at the position of the tag with peaks and nulls occurring at every half wavelength. The effects on the read range of either electromagnetic absorber or scatterer packing the space with the roll cage are also investigated

    Efficient Security Protocols for Constrained Devices

    Get PDF
    During the last decades, more and more devices have been connected to the Internet.Today, there are more devices connected to the Internet than humans.An increasingly more common type of devices are cyber-physical devices.A device that interacts with its environment is called a cyber-physical device.Sensors that measure their environment and actuators that alter the physical environment are both cyber-physical devices.Devices connected to the Internet risk being compromised by threat actors such as hackers.Cyber-physical devices have become a preferred target for threat actors since the consequence of an intrusion disrupting or destroying a cyber-physical system can be severe.Cyber attacks against power and energy infrastructure have caused significant disruptions in recent years.Many cyber-physical devices are categorized as constrained devices.A constrained device is characterized by one or more of the following limitations: limited memory, a less powerful CPU, or a limited communication interface.Many constrained devices are also powered by a battery or energy harvesting, which limits the available energy budget.Devices must be efficient to make the most of the limited resources.Mitigating cyber attacks is a complex task, requiring technical and organizational measures.Constrained cyber-physical devices require efficient security mechanisms to avoid overloading the systems limited resources.In this thesis, we present research on efficient security protocols for constrained cyber-physical devices.We have implemented and evaluated two state-of-the-art protocols, OSCORE and Group OSCORE.These protocols allow end-to-end protection of CoAP messages in the presence of untrusted proxies.Next, we have performed a formal protocol verification of WirelessHART, a protocol for communications in an industrial control systems setting.In our work, we present a novel attack against the protocol.We have developed a novel architecture for industrial control systems utilizing the Digital Twin concept.Using a state synchronization protocol, we propagate state changes between the digital and physical twins.The Digital Twin can then monitor and manage devices.We have also designed a protocol for secure ownership transfer of constrained wireless devices. Our protocol allows the owner of a wireless sensor network to transfer control of the devices to a new owner.With a formal protocol verification, we can guarantee the security of both the old and new owners.Lastly, we have developed an efficient Private Stream Aggregation (PSA) protocol.PSA allows devices to send encrypted measurements to an aggregator.The aggregator can combine the encrypted measurements and calculate the decrypted sum of the measurements.No party will learn the measurement except the device that generated it

    Detection of Surface Cracks in Metals using Microwave and Millimeter-Wave Nondestructive Testing Techniques-A Review

    Get PDF
    Integrity Assessment of Metallic Structures Requires Inspection Tools Capable of Detecting and Evaluating Cracks Reliably. to This End, Many Microwave and Millimeter-Wave Nondestructive Testing and Evaluation (NDT&E) Methods Have Been Developed and Applied Successfully in the Past. Detection of Fatigue Cracks with Widths Less Than 5 Μ M using Noncontact Microwave-Based Inspection Methods Was Demonstrated in the 1970s. Since their Introduction, These Methods Have Evolved Considerably Toward Enhancing the Detection Sensitivity and Resolution. Undertaking Key Application Challenges Has Attracted Considerable Attention in the Past Three Decades and Led to the Development of the Near-Field Techniques for Crack Detection. to Address a Need that Cannot Be Fulfilled by Other NDT&E Modalities, Innovative Noncontact Microwave and Millimeter-Wave NDT&E Methods Were Devised Recently to Detect Cracks of Arbitrary Orientations under Thick Dielectric Structures. While the Reported Methods Share the Same Underlying Physical Principles, They Vary Considerably in Terms of the Devised Probes/sensors and the Application Procedure. Consequently, their Sensitivity and Resolution as Well as their Limitations Vary. This Article Reviews the Various Crack Detection Methods Developed To-Date and Compares Them in Terms of Common Performance Metrics. This Comprehensive Review is Augmented with Experimental Comparisons and Benchmarking Aimed to Benefit NDT&E Practitioners and Researchers Alike

    Improving approaches to material inventory management in construction industry in the UK

    Get PDF
    Materials used in construction constitute a major proportion of the total cost of construction projects. An important factor of great concern that adversely affects construction projects is the location and tracking of materials, which normally come in bulk with minimal identification. There is inadequate integration of modern wireless technologies (such as Radio Frequency Identification (RFID), Personal Digital Assistant (PDA) or Just-in-Time (JIT)) into project management systems for easier and faster materials management and tracking and to overcome human error. This research focuses on improving approaches to material inventory management in the UK construction industry through the formulation of RFID-based materials management tracking process system with projects. Existing literature review identified many challenges/problems in material inventory management on construction projects, such as supply delays, shortages, price fluctuations, wastage and damage, and insufficient storage space. Six construction projects were selected as exploratory case studies and cross-case analysis was used to investigate approaches to material inventory management practices: problems, implementation of ICT, and the potential for using emerging wireless technologies and systems (such as RFID and PDA) for materials tracking. Findings showed that there were similar problems of storage constraints and logistics with most of the construction projects. The synthesis of good practices required the implementation of RFID-facilitated construction management of materials tracking system to make material handling easier, quicker, more efficient and less paperwork. There was also a recommendation to implement Information and Communication Technology (ICT) tools to integrate plant, labour and materials into one system. The findings from the cases studies and the literature review were used to formulate a process for real-time material tracking using Radio Frequency Identification (RFID) that can improve material inventory management in the UK construction industry. Testing and validation undertaken assisted in formulating a process that can be useful, functional and acceptable for a possible process system’s development. Finally, research achievements/contributions to knowledge, and limitations were discussed and some suggestions for further research were outlined

    Advanced Technologies in Sheep Extensive Farming on a Climate Change Context

    Get PDF
    Climate change represents a serious issue that negatively impacts the animals’ performance. Sheep production from Mediterranean region is mainly characterized by extensive farming system that during summer are exposed to high temperature. The explored new technologies to monitoring animal welfare and environment could mitigate the impact of climate change supporting the sustainability of animal production and ensuring food security. The present chapter will summarize the more recent advanced technologies based on passive sensors, wearable sensors, and the combination of different technologies with the latest machine learning protocol tested for sheep farming aimed at monitoring animal welfare. A focus on the precision technologies solution to detect heat stress will be presented
    corecore