110,229 research outputs found

    Implementation of cryptography algorithms in SCADAKratos application

    Get PDF
    This paper studies cryptography algorithms to be implemented into the SCADAKratos application of thermal vacuum chamber (TVC) system. SCADAKratos application is used to control and monitor the operations of the TVC which is a satellite test equipment that is located at the Malaysia Space Centre, Banting, Malaysia. The security features had been put aside during the development as it was claimed that there is no threat to the system since the system is operated internally. However, during service and troubleshooting by the manufacturer, the system will be accessed through public network. Besides that, the system also can be accessed remotely during operation for control and monitoring purpose. In addition, the testing data results also need to be transferred to the customer through the internet as it is easier and faster. The remote access through public network will cause the TVC system to face a risk to any threat and attack. Therefore, the implementation of cryptography algorithm into TVC system is needed in order to secure and protect the system from unauthorized access. This paper explains the architecture of SCADAKratos application of TVC system and how the cryptography algorithms could be implemented through this application. Secure Hash Algorithm (SHA-1) and AES algorithm (AES) are chosen as the encryption technique which will be applied in the TVC system. Simulation result shows that this technique is feasible for the mentioned implementation

    Vision-based autonomous aircraft payload delivery system

    Get PDF
    This research sought to design and develop an autonomous aircraft payload delivery system which utilised an onboard computer vision system for drop-zone identification. The research was tasked at achieving a modular system which could be used in the delivery of a given payload within a 5 m radius of designated drop-zone identifier. An integrated system was developed, where an autonomous flight controller, an onboard companion computer and computer vision system formed the physical hardware utilised to achieve the desired objectives. A Linux-based Robotic Operating System software architecture was used to develop the control algorithms which governed the autonomous flight control, object recognition and tracking through image processing, and payload release trajectory modelling of the system. The hardware and software architectures were integrated into a remote control fixed-wing aircraft for testing. Implementation of the system through simulation and physical testing proved successful and payload delivery was achieved at an altitude of 75 m, within an average displacement of 1.82 m from the true drop-zone location, where drop-zone detection and location were determined through autonomous survey over the approximate drop-zone’s location. This research furthered the development of autonomous aircraft delivery systems by introducing computer vision as a means of drop-zone location confirmation and authentication, allowing for greater payload delivery security and efficiency. The results gathered in this research illustrated the possible applications of modular airborne payload delivery systems into Industry 4.0 through the use of such a system in the service delivery sector

    Performance evaluation of a distributed integrative architecture for robotics

    Get PDF
    The eld of robotics employs a vast amount of coupled sub-systems. These need to interact cooperatively and concurrently in order to yield the desired results. Some hybrid algorithms also require intensive cooperative interactions internally. The architecture proposed lends it- self amenable to problem domains that require rigorous calculations that are usually impeded by the capacity of a single machine, and incompatibility issues between software computing elements. Implementations are abstracted away from the physical hardware for ease of de- velopment and competition in simulation leagues. Monolithic developments are complex, and the desire for decoupled architectures arises. Decoupling also lowers the threshold for using distributed and parallel resources. The ability to re-use and re-combine components on de- mand, therefore is essential, while maintaining the necessary degree of interaction. For this reason we propose to build software components on top of a Service Oriented Architecture (SOA) using Web Services. An additional bene t is platform independence regarding both the operating system and the implementation language. The robot soccer platform as well as the associated simulation leagues are the target domain for the development. Furthermore are machine vision and remote process control related portions of the architecture currently in development and testing for industrial environments. We provide numerical data based on the Python frameworks ZSI and SOAPpy undermining the suitability of this approach for the eld of robotics. Response times of signi cantly less than 50 ms even for fully interpreted, dynamic languages provides hard information showing the feasibility of Web Services based SOAs even in time critical robotic applications

    Robot Control for Remote Ophthalmology and Pediatric Physical Rehabilitation

    Get PDF
    The development of a robotic slit-lamp for remote ophthalmology is the primary purpose of this work. In addition to novel mechanical designs and implementation, it was also a goal to develop a control system that was flexible enough to be adapted with minimal user adjustment to various styles and configurations of slit-lamps. The system was developed with intentions of commercialization, so common hardware was used for all components to minimize the costs. In order to improve performance using this low-cost hardware, investigations were made to attempt to achieve better performance by applying control theory algorithms in the system software. Ultimately, the controller was to be flexible enough to be applied to other areas of human-robot interaction including pediatric rehabilitation via the use of humanoid robotic aids. This application especially requires a robust controller to facilitate safe interaction. Though all of the prototypes were successfully developed and made to work sufficiently with the control hardware, the application of advanced control did not yield notable gains as was hoped. Further investigations were made attempting to alter the performance of the control system, but the components selected did not have the physical capabilities for improved response above the original software implemented. Despite this disappointment, numerous novel advances were made in the area of teleoperated ophthalmic technology and pediatric physical rehabilitation tools. This includes a system that is used to remote control a slit-lamp and lens for examinations and some laser procedures. Secondly, a series of of humanoid systems suitable for both medical research and therapeutic modeling were developed. This included a robotic face used as an interactive system for ophthalmic testing and training. It can also be used as one component in an interactive humanoid robotic system that includes hands and arms to allow use of teaching sign language, social skills or modeling occupational therapy tasks. Finally, a humanoid system is presented that can serve as a customized surrogate between a therapist and client to model physical therapy tasks in a realistic manner. These systems are all functional, safe and low-cost to allow for feasible implementation with patients in the near future

    TrusNet: Peer-to-Peer Cryptographic Authentication

    Get PDF
    Originally, the Internet was meant as a general purpose communication protocol, transferring primarily text documents between interested parties. Over time, documents expanded to include pictures, videos and even web pages. Increasingly, the Internet is being used to transfer a new kind of data which it was never designed for. In most ways, this new data type fits in naturally to the Internet, taking advantage of the near limit-less expanse of the protocol. Hardware protocols, unlike previous data types, provide a unique set security problem. Much like financial data, hardware protocols extended across the Internet must be protected with authentication. Currently, systems which do authenticate do so through a central server, utilizing a similar authentication model to the HTTPS protocol. This hierarchical model is often at odds with the needs of hardware protocols, particularly in ad-hoc networks where peer-to-peer communication is prioritized over a hierarchical model. Our project attempts to implement a peer-to-peer cryptographic authentication protocol to be used to protect hardware protocols extending over the Internet. The TrusNet project uses public-key cryptography to authenticate nodes on a distributed network, with each node locally managing a record of the public keys of nodes which it has encountered. These keys are used to secure data transmission between nodes and to authenticate the identities of nodes. TrusNet is designed to be used on multiple different types of network interfaces, but currently only has explicit hooks for Internet Protocol connections. As of June 2016, TrusNet has successfully achieved a basic authentication and communication protocol on Windows 7, OSX, Linux 14 and the Intel Edison. TrusNet uses RC-4 as its stream cipher and RSA as its public-key algorithm, although both of these are easily configurable. Along with the library, TrusNet also enables the building of a unit testing suite, a simple UI application designed to visualize the basics of the system and a build with hooks into the I/O pins of the Intel Edison allowing for a basic demonstration of the system

    Computer-Aided System for Wind Turbine Data Analysis

    Get PDF
    Context: The current work on wind turbine failure detection focuses on researching suitable signal processing algorithms and developing efficient diagnosis algorithms. The laboratory research would involve large and complex data, and it can be a daunting task. Aims: To develop a Computer-Aided system for assisting experts to conduct an efficient laboratory research on wind turbine data analysis. System is expected to provide data visualization, data manipulation, massive data processing and wind turbine failure detection. Method: 50G off-line SCADA data and 4 confident diagnosis algorithms were used in this project. Apart from the instructions from supervisor, this project also gained help from two experts from Engineering Department. Java and Microsoft SQL database were used to develop the system. Results: Data visualization provided 6 different charting solutions and together with robust user interactions. 4 failure diagnosis solutions and data manipulations were provided in the system. In addition, dedicated database server and Matlab API with Java RMI were used to resolve the massive data processing problem. Conclusions: Almost all of the deliverables were completed. Friendly GUI and useful functionalities make user feel more comfortable. The final product does enable experts to conduct an efficient laboratory research. The end of this project also gave some potential extensions of the system

    Hypersonic Research Vehicle (HRV) real-time flight test support feasibility and requirements study. Part 2: Remote computation support for flight systems functions

    Get PDF
    The requirements are assessed for the use of remote computation to support HRV flight testing. First, remote computational requirements were developed to support functions that will eventually be performed onboard operational vehicles of this type. These functions which either cannot be performed onboard in the time frame of initial HRV flight test programs because the technology of airborne computers will not be sufficiently advanced to support the computational loads required, or it is not desirable to perform the functions onboard in the flight test program for other reasons. Second, remote computational support either required or highly desirable to conduct flight testing itself was addressed. The use is proposed of an Automated Flight Management System which is described in conceptual detail. Third, autonomous operations is discussed and finally, unmanned operations
    • …
    corecore