16 research outputs found

    Software implementation of a secure firmware update solution in an IoT context

    Get PDF
    The present paper is concerned with the secure delivery of firmware updates to Internet of Things (IoT) devices. Additionally, it deals with the design of a safe and secure bootloader for a UHF RFID reader. A software implementation of a secure firmware update solution is performed. The results show there is space to integrate even more security features into existing devices

    Harvesting and forwarding of trees with harvestor technology on railway protection zone lines

    Get PDF
    Předmětem monografie je technologický postup údržby dřevinných porostů v ochranných pásmech podél železničních dopravních cest a následný transport a úprava vytěžené dendromasy. Těžba dříví je dosud řešena na bázi použití přenosné motorové pily. Na strmých svazích pracovníci užívají poutací arboristické systémy. Je vyřešena nová technologie těžby náletových dřevin harvestorem umístěným na plošinovém železničním vozu, kterým je po železnici dopraven na pracoviště. Detailní postavení harvestoru ke kácenému stromu zajišťuje jeho pojezd po plošině železničního vozu. Soustřeďování a odvoz vytěžené dendromasy na úložné skládky pomocí forwarderu, umístěného a stabilizovaného na plošinovém železničním vozu, tvořícího součást zvláštní soupravy, do níž je zařazen minimálně ještě jeden železniční vůz s postranicemi. Vytěžená dendromasa je sbírána drapákem hydraulického jeřábu forwarderu a ukládána na jeho ložný prostor a do úložného prostoru sousedního vozu soupravy. Po naplnění ložných prostor souprava odjíždí na železniční stanici, kde je dendromasa desintegrována přistaveným štěpkovacím strojem a ukládána do ložného prostoru odvozní automobilové soupravy. Konečným produktem technologického postupu je energetická štěpka a v některých případech i výřezy pilařské, agregátové a vlákninové. Navrženým technologickým postupem je zkrácena doba uzavírky tratí, zvýšena bezpečnost pracovníků v těžbě náletových dřevin, požadováno vybavení pracovníků kvalifikačními osvědčeními pro dané práce. Dříví vytěžené z nárostů je zpeněženo se současným úklidem pracovišť a je zajištěna ekologická čistota prací.The monograph subject consists in the technological procedure of care of tree stands in protected zones along railway lines and the subsequent transport and adjustment of felled dendromass. So far, felling is carried out on the basis of portable power saws. On steep slopes, workers use arboristic equipment systems. A new technology has been worked out of self-seeding trees using a harvester placed on a plateau wagon, which is transported to a workplace by railway. The detailed position of the harvester to a felled tree is provided by its movement on the wagon plateau. Skidding and hauling the exploited dendromass to landings is carried out by means of a forwarder placed and stabilized on a plateau wagon creating the part of a special unit where another wagon with side boards was included. The felled dendromas s is collected by a grab of the forwarder hydraulic crane and placed on its loading space and into the stowage space of the unit neighbouring wagon. After filling the loading capacity the unit leaves for a railway station where the dedromass is disintegrated by a chipping machine and placed into the loading space of a logging truck-and-trailer unit. Final products of the technological procedure are fuel chips and in some cases also saw, aggregate and pulp logs. Through the proposed technological procedure, the time of the line closure is shortened, the safety of workers felling self-seeding trees is increased and the equipment of fellers by qualification certificates for given operations is required. Wood obtained from advance growth is realized together with cleaning the workplaces and the environmentally friendly operations are provided.Published Versio

    Towards building computational agent schemes

    No full text
    A general concept of representation of connected groups of agents (schemes) within a multi-agent system is introduced and utilized for automatic building of schemes to solve a given computational task. We propose a combination of an evolutionary algorithm and a formal logic resolution system which is able to propose and verify new schemes. The approach is illustrated on simple examples.

    Software implementation of secure firmware update in IoT concept

    No full text
    This paper focuses on a survey of secure firmware update in the Internet of Things, design and description of safe and secure bootloader implementation on RFID UHF reader, encryption with AES-CCM and versioning with use of external backup flash memory device. In the case of problems with HW compatibility or other unexpected errors with new FW version, it is possible to downgrade to previous FW image, including the factory image. Authentication is provided by the UHF RFID service tag used to extract unique initialization vector of the encryption algorithm for each update session. The results show slower update speed with this new upgrade method of approximately 27% compared to older one, using the only AES-CBC algorithm

    Bang 3: A computational multi-agent system

    No full text
    A multi-agent system targeted toward the area of computational intelligence modeling is presented. The purpose of the system is to allow both experiments and high-performance distributed computations employing hybrid computational models. The focus of the system is the interchangeability of computational components, their autonomous behavior, and emergence of new models. 1. Computational Intelligence Bang 3 is a platform for the development of Multi-Agent Systems (MAS) [3]. Its main areas of application are computational intelligence methods (genetic algorithms, neural networks, fuzzy controllers) on single machines and clusters of workstations. Hybrid models, including combinations of artificial intelligence methods such as neural networks, genetic algorithms and fuzzy logic controllers, seem to be a promising and extensively studied research area [1]. We have designed a distributed multi-agent system [4] called Bang 3 that provides a support for an easy creation of hybrid AI models by means of autonomous software agents [2]. Besides serving as an experimental tool and a distributed computational environment, this system should also allow to create new agent classes consisting of several cooperating agents. The MAS scheme is a concept for describing the relations within such a set of agents. The basic motivation for schemes is to describe various computational methods. It should be easy to ‘connect ’ a particular computational method (implemented as an agent) into hybrid methods, using schemes description. The scheme description should be strong enough to describe all the necessary relations within a set of agents that need to communicate one with another in a general manner. Here we show, how two computational intelligence methods — artificial neural network of the RBF type, and

    LoRa as a complement to the existing access system infrastructure

    No full text
    Wireless Sensor Networks (WSN) play an important role in the Internet of Things (IoT). For smart buildings, they provide a convenient way to collect data from sensors and control electronic devices in and around buildings. This paper describes a solution in which the existing access system infrastructure, based on the RS485 protocol, is extended by the LoRa wireless sensor network, sensor nodes for temperature and humidity measurement and the LoRa communication gateway. Operational measurements on one floor of the CTU in Prague block show that depending on the data rate used in the RS485 network and the data rate reserve used, which precedes the failure of the access system control function, it is possible to operate tens to hundreds of sensor nodes simultaneously transmitting their data. The results show that WSN can be used effectively in the existing RS485 infrastructure.Bezdrátové senzorové sítě (WSN - The Wireless Sensor Network) hrají důležitou roli v konceptu internetu věcí (IoT). Inteligentním budovám poskytují pohodlný způsob shromažďování dat ze senzorů a ovládání elektronických zařízení v budovách a i v jejich okolí. Tento článek popisuje návrh a ověření proveditelnosti řešení, ve kterém je stávající infrastruktura přístupového systému, založená a průmyslové sběrnici RS485, rozšířena o bezdrátovou senzorovou síť LoRa s uzly se senzory pro měření teploty a vlhkosti a komunikační bránu LoRa. Provozní měření na jednom patře bloku ČVUT v Praze ukazuje, že v závislosti na použité datové rychlosti sběrnice RS485 a použité rezervě datové rychlosti, která předchází selhání funkce řízení přístupového systému, je možno provozovat desítky až stovky senzorových uzlů současně vysílajících svá data. Výsledky dokazují, že WSN lze efektivně použít ve stávající infrastruktuře RS485

    Optical Polymer Waveguides Fabricated by Roll-to-Plate Nanoimprinting Technique

    No full text
    The paper reports on the properties of UV-curable inorganic-organic hybrid polymer multimode optical channel waveguides fabricated by roll-to-plate (R2P) nanoimprinting. We measured transmission spectra, refractive indices of the applied polymer materials, and optimized the R2P fabrication process. Optical losses of the waveguides were measured by the cut-back method at wavelengths of 532, 650, 850, 1310, and 1550 nm. The lowest optical losses were measured at 850 nm and the lowest average value was 0.19 dB/cm, and optical losses at 1310 nm were 0.42 dB/cm and 0.25 dB/cm at 650 nm respectively. The study has demonstrated that nanoimprinting has great potential for the implementation of optical polymer waveguides not only for optical interconnection applications

    Software Implementation of a Secure Firmware Update Solution in an IOT Context

    Get PDF
    The present paper is concerned with the secure delivery of firmware updates to Internet of Things (IoT) devices. Additionally, it deals with the design of a safe and secure bootloader for a UHF RFID reader. A software implementation of a secure firmware update solution is performed. The results show there is space to integrate even more security features into existing devices
    corecore