13 research outputs found

    Internet of Things (IoT) for Automated and Smart Applications

    Get PDF
    Internet of Things (IoT) is a recent technology paradigm that creates a global network of machines and devices that are capable of communicating with each other. Security cameras, sensors, vehicles, buildings, and software are examples of devices that can exchange data between each other. IoT is recognized as one of the most important areas of future technologies and is gaining vast recognition in a wide range of applications and fields related to smart homes and cities, military, education, hospitals, homeland security systems, transportation and autonomous connected cars, agriculture, intelligent shopping systems, and other modern technologies. This book explores the most important IoT automated and smart applications to help the reader understand the principle of using IoT in such applications

    Wireless innovation for smart independent living

    Get PDF

    Deep Learning -Powered Computational Intelligence for Cyber-Attacks Detection and Mitigation in 5G-Enabled Electric Vehicle Charging Station

    Get PDF
    An electric vehicle charging station (EVCS) infrastructure is the backbone of transportation electrification. However, the EVCS has various cyber-attack vulnerabilities in software, hardware, supply chain, and incumbent legacy technologies such as network, communication, and control. Therefore, proactively monitoring, detecting, and defending against these attacks is very important. The state-of-the-art approaches are not agile and intelligent enough to detect, mitigate, and defend against various cyber-physical attacks in the EVCS system. To overcome these limitations, this dissertation primarily designs, develops, implements, and tests the data-driven deep learning-powered computational intelligence to detect and mitigate cyber-physical attacks at the network and physical layers of 5G-enabled EVCS infrastructure. Also, the 5G slicing application to ensure the security and service level agreement (SLA) in the EVCS ecosystem has been studied. Various cyber-attacks such as distributed denial of services (DDoS), False data injection (FDI), advanced persistent threats (APT), and ransomware attacks on the network in a standalone 5G-enabled EVCS environment have been considered. Mathematical models for the mentioned cyber-attacks have been developed. The impact of cyber-attacks on the EVCS operation has been analyzed. Various deep learning-powered intrusion detection systems have been proposed to detect attacks using local electrical and network fingerprints. Furthermore, a novel detection framework has been designed and developed to deal with ransomware threats in high-speed, high-dimensional, multimodal data and assets from eccentric stakeholders of the connected automated vehicle (CAV) ecosystem. To mitigate the adverse effects of cyber-attacks on EVCS controllers, novel data-driven digital clones based on Twin Delayed Deep Deterministic Policy Gradient (TD3) Deep Reinforcement Learning (DRL) has been developed. Also, various Bruteforce, Controller clones-based methods have been devised and tested to aid the defense and mitigation of the impact of the attacks of the EVCS operation. The performance of the proposed mitigation method has been compared with that of a benchmark Deep Deterministic Policy Gradient (DDPG)-based digital clones approach. Simulation results obtained from the Python, Matlab/Simulink, and NetSim software demonstrate that the cyber-attacks are disruptive and detrimental to the operation of EVCS. The proposed detection and mitigation methods are effective and perform better than the conventional and benchmark techniques for the 5G-enabled EVCS

    Service Embedding in IoT Networks

    Get PDF

    Human-in-the-Loop Cyber-Physical-Systems based on Smartphones

    Get PDF
    Tese de doutoramento em Ciências e Tecnologias da Informação, apresentada ao Departamento de Engenharia Informática da Faculdade de Ciências e Tecnologia da Universidade de CoimbraTechnological devices increasingly become smaller, more mobile, powerful and efficient. However, each time we have to hurdle through unintuitive menus, errors and incompatibilities we become stressed by our technology. As first put forward by the renowned computer scientist Mark Weiser, the ultimate form of computers may be an extension of our subconscious. The ideal computer would be capable of truly understanding people's unconscious actions and desires. Instead of humans adapting to technology and learning how to use it, it would be technology that would adapt to the disposition and uniqueness of each human being. This thesis focuses on the realm of Human-in-the-loop Cyber-Physical Systems (HiTLCPSs). HiTLCPSs infer the users’ intents, psychological states, emotions and actions, using this information to determine the system's behavior. This involves using a large variety of sensors and mobile devices to monitor and evaluate human nature. Therefore, this technology has strong ties with wireless sensor networks, robotics, machine-learning and the Internet of Things. In particular, our work focuses on the usage of smartphones within these systems. It begins by describing a framework to understand the principles and theory of HiTLCPSs. It provides some insights into current research being done on this topic, its challenges, and requirements. Another of the thesis' objectives is to present our innovative taxonomy of human roles, where we attempt to understand how a human may interact with HiTLCPSs and how to best explore this resource. This thesis also describes concrete examples of the practical usage of HiTL paradigms. As such, we included a comprehensive description of our research work and associated prototypes, where the major theoretical concepts behind HiTLCPS were applied and evaluated to specific scenarios. Finally, we discuss our personal view on the future and evolution of these systems.A tecnologia tem vindo a tornar-se cada vez mais pequena, móvel, poderosa e eficiente. No entanto, lidar com menus pouco intuitivos, erros, e incompatibilidades, causa frustração aos seus utilizadores. Segundo o reconhecido cientista Mark Weiser, os computadores do futuro poderão vir a existir como se fossem uma extensão do nosso subconsciente. O computador ideal seria capaz de entender, em toda a sua plenitude, as ações e os desejos inconscientes dos seres humanos. Em vez de serem os humanos a adaptarem-se à tecnologia e a aprender a usá-la, seria a tecnologia a aprender a adaptar-se à disposição e individualidade de cada ser humano. Esta tese foca-se na área dos Human-in-the-loop Cyber-Physical Systems (HiTLCPSs). Os HiTLCPSs inferem as intenções, estados psicológicos, emoções e ações dos seus utilizadores, usando esta informação para determinar o comportamento do sistema ciber-físico. Isto envolve a utilização de uma grande variedade de sensores e dispositivos móveis que monitorizam e avaliam a natureza humana. Assim sendo, esta tecnologia tem fortes ligações com redes de sensores sem fios, robótica, algoritmos de aprendizagem de máquina e a Internet das Coisas. Em particular, o nosso trabalho focou-se na utilização de smartphones dentro destes sistemas. Começamos por descrever uma estrutura para compreender os princípios e teoria associados aos HiTLCPSs. Esta análise permitiu-nos adquirir alguma clareza sobre a investigação a ser feita sobre este tópico, e sobre os seus desafios e requisitos. Outro dos objetivos desta tese é o de apresentar a nossa inovadora taxonomia sobre os papeis do ser humano nos HiTLCPSs, onde tentamos perceber as possíveis interações do ser humano com estes sistemas e as melhores formas de explorar este recurso. Esta tese também descreve exemplos concretos da utilização prática dos paradigmas HiTL. Desta forma, incluímos uma descrição do nosso trabalho experimental e dos protótipos que lhe estão associados, onde os conceitos teóricos dos HiTLCPSs foram aplicados e avaliados em diversos casos de estudo. Por fim, apresentamos a nossa perspetiva pessoal sobre o futuro e evolução destes sistemas.Fundação Luso-Americana para o DesenvolvimentoFP7-ICT-2007-2 GINSENG projectiCIS project (CENTRO-07-ST24-FEDER-002003)SOCIALITE project (PTDC/EEI-SCR/2072/2014

    Safety and Reliability - Safe Societies in a Changing World

    Get PDF
    The contributions cover a wide range of methodologies and application areas for safety and reliability that contribute to safe societies in a changing world. These methodologies and applications include: - foundations of risk and reliability assessment and management - mathematical methods in reliability and safety - risk assessment - risk management - system reliability - uncertainty analysis - digitalization and big data - prognostics and system health management - occupational safety - accident and incident modeling - maintenance modeling and applications - simulation for safety and reliability analysis - dynamic risk and barrier management - organizational factors and safety culture - human factors and human reliability - resilience engineering - structural reliability - natural hazards - security - economic analysis in risk managemen

    Low-Cost Inventions and Patents

    Get PDF
    Inventions have led to the technological advances of mankind. There are inventions of all kinds, some of which have lasted hundreds of years or even longer. Low-cost technologies are expected to be easy to build, have little or no energy consumption, and be easy to maintain and operate. The use of sustainable technologies is essential in order to move towards a greater global coverage of technology, and therefore to improve human quality of life. Low-cost products always respond to a specific need, even if no in-depth analysis of the situation or possible solutions has been carried out. It is a consensus in all industrialized countries that patents have a decisive influence on the organization of the economy, as they are a key element in promoting technological innovation. Patents must aim to promote the technological development of countries, starting from their industrial situations

    Smart Urban Water Networks

    Get PDF
    This book presents the paper form of the Special Issue (SI) on Smart Urban Water Networks. The number and topics of the papers in the SI confirm the growing interest of operators and researchers for the new paradigm of smart networks, as part of the more general smart city. The SI showed that digital information and communication technology (ICT), with the implementation of smart meters and other digital devices, can significantly improve the modelling and the management of urban water networks, contributing to a radical transformation of the traditional paradigm of water utilities. The paper collection in this SI includes different crucial topics such as the reliability, resilience, and performance of water networks, innovative demand management, and the novel challenge of real-time control and operation, along with their implications for cyber-security. The SI collected fourteen papers that provide a wide perspective of solutions, trends, and challenges in the contest of smart urban water networks. Some solutions have already been implemented in pilot sites (i.e., for water network partitioning, cyber-security, and water demand disaggregation and forecasting), while further investigations are required for other methods, e.g., the data-driven approaches for real time control. In all cases, a new deal between academia, industry, and governments must be embraced to start the new era of smart urban water systems

    Proceedings of the 19th Sound and Music Computing Conference

    Get PDF
    Proceedings of the 19th Sound and Music Computing Conference - June 5-12, 2022 - Saint-Étienne (France). https://smc22.grame.f
    corecore