117,402 research outputs found

    Safe, Remote-Access Swarm Robotics Research on the Robotarium

    Get PDF
    This paper describes the development of the Robotarium -- a remotely accessible, multi-robot research facility. The impetus behind the Robotarium is that multi-robot testbeds constitute an integral and essential part of the multi-agent research cycle, yet they are expensive, complex, and time-consuming to develop, operate, and maintain. These resource constraints, in turn, limit access for large groups of researchers and students, which is what the Robotarium is remedying by providing users with remote access to a state-of-the-art multi-robot test facility. This paper details the design and operation of the Robotarium as well as connects these to the particular considerations one must take when making complex hardware remotely accessible. In particular, safety must be built in already at the design phase without overly constraining which coordinated control programs the users can upload and execute, which calls for minimally invasive safety routines with provable performance guarantees.Comment: 13 pages, 7 figures, 3 code samples, 72 reference

    Federated Embedded Systems – a review of the literature in related fields

    Get PDF
    This report is concerned with the vision of smart interconnected objects, a vision that has attracted much attention lately. In this paper, embedded, interconnected, open, and heterogeneous control systems are in focus, formally referred to as Federated Embedded Systems. To place FES into a context, a review of some related research directions is presented. This review includes such concepts as systems of systems, cyber-physical systems, ubiquitous computing, internet of things, and multi-agent systems. Interestingly, the reviewed fields seem to overlap with each other in an increasing number of ways

    Smart Technologies for Environmental Safety and Knowledge Enhancement in Intermodal Transport

    Get PDF
    International concerns about security in transport systems are leading to a new international regulation in this field. This introduces new requirements for operators and authorities as well as it opens new challenges, in particular when referred to seaports and maritime transport in the Mediterranean area, where many seaport terminals and infrastructures are affected by a noteworthy technological divide from North European contexts. In such contexts, the adoption of the new regulations can represent the right chance for upgrading the local operative standards, increasing latu sensu the quality of maritime transport performances, while conferring a greater level to security and safety checks. This paper explores the chances for increasing the level of Mediterranean seaport competitiveness allowed by technological innovations in transport systems, both in operations and organization of these infrastructures. The aim of the work is to study the effects of the adoption of technological solutions such as wireless communications and radiofrequency identification on the competitiveness of Mediterranean seaport infrastructures. Technological solutions designed to identify good items help operators in organizing activities in terminals and make maritime transport faster in delivering goods, by cutting the handling time and costs in seaport terminals. Seaports that adopt this kind of technologies, and the surrounding economic areas connected to seaports, have a greater attractiveness on shipping companies and operators, since they allow faster handling activities and easier checks on goods. Besides, the analysis of direct and indirect effects of the use of such technologies specifically focuses on the contribution that the use of these solutions gives in ensuring higher security levels, by increasing the level of information and knowledge associated to goods. The different types of security provided (e.g. for people, environment and goods) and the extreme flexibility of the technologies involved give the overall worth of the challenge. It seems to be a great chance of growth for the Mediterranean area, more than a mere compliance to the international security regulations.

    Patterns of information security postures for socio-technical systems and systems-of-systems

    Get PDF
    This paper describes a proposal to develop patterns of security postures for computer based socio-technical systems and systems-of-systems. Such systems typically span many organisational boundaries, integrating multiple computer systems, infrastructures and organisational processes. The paper describes the motivation for the proposed work, and our approach to the development, specification, integration and validation of security patterns for socio-technical and system-of-system scale systems

    Training of Crisis Mappers and Map Production from Multi-sensor Data: Vernazza Case Study (Cinque Terre National Park, Italy)

    Get PDF
    This aim of paper is to presents the development of a multidisciplinary project carried out by the cooperation between Politecnico di Torino and ITHACA (Information Technology for Humanitarian Assistance, Cooperation and Action). The goal of the project was the training in geospatial data acquiring and processing for students attending Architecture and Engineering Courses, in order to start up a team of "volunteer mappers". Indeed, the project is aimed to document the environmental and built heritage subject to disaster; the purpose is to improve the capabilities of the actors involved in the activities connected in geospatial data collection, integration and sharing. The proposed area for testing the training activities is the Cinque Terre National Park, registered in the World Heritage List since 1997. The area was affected by flood on the 25th of October 2011. According to other international experiences, the group is expected to be active after emergencies in order to upgrade maps, using data acquired by typical geomatic methods and techniques such as terrestrial and aerial Lidar, close-range and aerial photogrammetry, topographic and GNSS instruments etc.; or by non conventional systems and instruments such us UAV, mobile mapping etc. The ultimate goal is to implement a WebGIS platform to share all the data collected with local authorities and the Civil Protectio

    From Agent Game Protocols to Implementable Roles

    Get PDF
    kostas.stathis-at-cs.rhul.ac.uk Abstract. We present a formal framework for decomposing agent interaction protocols to the roles their participants should play. The framework allows an Authority Agent that knows a protocol to compute the protocol’s roles so that it can allocate them to interested parties. We show how the Authority Agent can use the role descriptions to identify problems with the protocol and repair it on the fly, to ensure that participants will be able to implement their role requirements without compromising the protocol’s interactions. Our representation of agent interaction protocols is a game-based one and the decomposition of a game protocol into its constituent roles is based upon the branching bisimulation equivalence reduction of the game. The work extends our previous work on using games to admit agents in an artificial society by checking their competence according to the society rules. The applicability of the overall approach is illustrated by showing how to decompose the NetBill protocol into its roles. We also show how to automatically repair the interactions of a protocol that cannot be implemented in its original form.
    corecore