98 research outputs found

    Automatic instantiation of abstract tests on specific configurations for large critical control systems

    Full text link
    Computer-based control systems have grown in size, complexity, distribution and criticality. In this paper a methodology is presented to perform an abstract testing of such large control systems in an efficient way: an abstract test is specified directly from system functional requirements and has to be instantiated in more test runs to cover a specific configuration, comprising any number of control entities (sensors, actuators and logic processes). Such a process is usually performed by hand for each installation of the control system, requiring a considerable time effort and being an error prone verification activity. To automate a safe passage from abstract tests, related to the so called generic software application, to any specific installation, an algorithm is provided, starting from a reference architecture and a state-based behavioural model of the control software. The presented approach has been applied to a railway interlocking system, demonstrating its feasibility and effectiveness in several years of testing experience

    Ensuring Cyber-Security in Smart Railway Surveillance with SHIELD

    Get PDF
    Modern railways feature increasingly complex embedded computing systems for surveillance, that are moving towards fully wireless smart-sensors. Those systems are aimed at monitoring system status from a physical-security viewpoint, in order to detect intrusions and other environmental anomalies. However, the same systems used for physical-security surveillance are vulnerable to cyber-security threats, since they feature distributed hardware and software architectures often interconnected by ‘open networks’, like wireless channels and the Internet. In this paper, we show how the integrated approach to Security, Privacy and Dependability (SPD) in embedded systems provided by the SHIELD framework (developed within the EU funded pSHIELD and nSHIELD research projects) can be applied to railway surveillance systems in order to measure and improve their SPD level. SHIELD implements a layered architecture (node, network, middleware and overlay) and orchestrates SPD mechanisms based on ontology models, appropriate metrics and composability. The results of prototypical application to a real-world demonstrator show the effectiveness of SHIELD and justify its practical applicability in industrial settings

    The dynamical evolution of protoplanetary disks and planets in dense star clusters

    Full text link
    Most stars are born in dense stellar environments where the formation and early evolution of planetary systems may be significantly perturbed by encounters with neighbouring stars. To investigate on the fate of circumstellar gas disks and planets around young stars dense stellar environments, we numerically evolve star-disk-planet systems. We use the NN-body codes NBODY6++GPU and SnIPES for the dynamical evolution of the stellar population, and the SPH-based code GaSPH for the dynamical evolution of protoplanetary disks. The secular evolution of a planetary system in a cluster differs from that of a field star. Most stellar encounters are tidal, adiabatic and nearly-parabolic. The parameters that characterize the impact of an encounter include the orientation of the protoplanetary disk and planet relative to the orbit of the encountering star, and the orbital phase and the semi-major axis of the planet. We investigate this dependence for close encounters (rp/a≀100r_p/a\leq 100, where rpr_p is the periastron distance of the encountering star and aa is the semi-major axis of the planet). We also investigate distant perturbers (rp/a≫100r_p/a\gg 100), which have a moderate effect on the dynamical evolution of the planet and the protoplanetary disk. We find that the evolution of protoplanetary disks in star clusters differs significantly from that of isolated systems. When interpreting the outcome of the planet formation process, it is thus important to consider their birth environments.Comment: 14 Pages, 11 Figures, Accepted for pubblication on MNRAS on 13 September 202

    Genuine Forgery Signature Detection using Radon Transform and K-Nearest Neighbour

    Get PDF
    Authentication is very much essential in managing security. In modern times, it is one in all priorities. With the advent of technology, dialogue with machines becomes automatic. As a result, the need for authentication for a variety of security purposes is rapidly increasing. For this reason, biometrics-based certification is gaining dramatic momentum. The proposed method describes an off-line Genuine/ Forgery signature classification system using radon transform and K-Nearest Neighbour classifier. Every signature features are extracted by radon transform and they are aligned to get the statistic information of his signature. To align the two signatures, the algorithm used is Extreme Points Warping. Many forged and genuine signatures are selected in K-Nearest Neighbour classifier training. By aligning the test signature with each and every reference signatures of the user, verification of test signature is done. Then the signature can be found whether it is genuine or forgery. A K-Nearest Neighbour is used for classification for the different datasets. The result determines how the proposed procedure is exceeds the current state-of-the-art technology. Approximately, the proposed system’s performance is 90 % in signature verification system

    Planetary Systems in a Star Cluster II: intermediate-mass black holes and planetary systems

    Full text link
    Most stars form in dense stellar environments. It is speculated that some dense star clusters may host intermediate-mass black holes (IMBHs), which may have formed from runaway collisions between high-mass stars, or from the mergers of less massive black holes. Here, we numerically explore the evolution of populations of planets in star clusters with an IMBH. We study the dynamical evolution of single-planet systems and free-floating planets, over a period of 100~Myr, in star clusters without an IMBH, and in clusters with a central IMBH of mass 100 M⊙100~M_\odot or 200 M⊙200~M_\odot. In the central region (râ‰Č0.2r\lesssim 0.2~pc), the IMBH's tidal influence on planetary systems is typically 10~times stronger than the average neighbour star. For a star cluster with a 200M⊙200M_\odot IMBH, the region in which the IMBH's influence is stronger within the virial radius (∌1\sim 1~pc). The IMBH quenches mass segregation, and the stars in the core tend to move towards intermediate regions. The ejection rate of both stars and planets is higher when an IMBH is present. The rate at which planets are expelled from their host star rate is higher for clusters with higher IMBH masses, for t<0.5trht<0.5 t_{rh}, while remains mostly constant while the star cluster fills its Roche lobe, similar to a star cluster without an IMBH. The disruption rate of planetary systems is higher in initially denser clusters, and for wider planetary orbits, but this rate is substantially enhanced by the presence of a central IMBH.Comment: 17 Pages, 39 Figures, accepted for pubblication on Monthly Notices of the Royal Astronomical Society on date 14 July 202

    Linking the formation and fate of exo-Kuiper belts within solar system analogues

    Get PDF
    Abstract Escalating observations of exo-minor planets and their destroyed remnants both passing through the solar system and within white dwarf planetary systems motivate an understanding of the orbital history and fate of exo-Kuiper belts and planetesimal discs. Here we explore how the structure of a 40 − 1000 au annulus of planetesimals orbiting inside of a solar system analogue that is itself initially embedded within a stellar cluster environment varies as the star evolves through all of its stellar phases. We attempt this computationally challenging link in four parts: (1) by performing stellar cluster simulations lasting 100 Myr, (2) by making assumptions about the subsequent quiescent 11 Gyr main-sequence evolution, (3) by performing simulations throughout the giant branch phases of evolution, and (4) by making assumptions about the belt’s evolution during the white dwarf phase. Throughout these stages, we estimate the planetesimals’ gravitational responses to analogues of the four solar system giant planets, as well as to collisional grinding, Galactic tides, stellar flybys, and stellar radiation. We find that the imprint of stellar cluster dynamics on the architecture of ≳ 100 km-sized exo-Kuiper belt planetesimals is retained throughout all phases of stellar evolution unless violent gravitational instabilities are triggered either (1) amongst the giant planets, or (2) due to a close (â‰Ș103 au) stellar flyby. In the absence of these instabilities, these minor planets simply double their semimajor axis while retaining their primordial post-cluster eccentricity and inclination distributions, with implications for the free-floating planetesimal population and metal-polluted white dwarfs

    A Hardware-in-the-Loop Water Distribution Testbed Dataset for Cyber-Physical Security Testing

    Get PDF
    This paper presents a dataset to support researchers in the validation process of solutions such as Intrusion Detection Systems (IDS) based on artificial intelligence and machine learning techniques for the detection and categorization of threats in Cyber Physical Systems (CPS). To this end, data were acquired from a hardware-in-the-loop Water Distribution Testbed (WDT) which emulates water flowing between eight tanks via solenoid-valves, pumps, pressure and flow sensors. The testbed is composed of a real subsystem that is virtually connected to a simulated one. The proposed dataset encompasses both physical and network data in order to highlight the consequences of attacks in the physical process as well as in network traffic behaviour. Simulations data are organized in four different acquisitions for a total duration of 2 hours by considering normal scenario and multiple anomalies due to cyber and physical attacks

    A Survey on Audio-Video based Defect Detection through Deep Learning in Railway Maintenance

    Get PDF
    Within Artificial Intelligence, Deep Learning (DL) represents a paradigm that has been showing unprecedented performance in image and audio processing by supporting or even replacing humans in defect and anomaly detection. The Railway sector is expected to benefit from DL applications, especially in predictive maintenance applications, where smart audio and video sensors can be leveraged yet kept distinct from safety-critical functions. Such separation is crucial, as it allows for improving system dependability with no impact on its safety certification. This is further supported by the development of DL in other transportation domains, such as automotive and avionics, opening for knowledge transfer opportunities and highlighting the potential of such a paradigm in railways. In order to summarize the recent state-of-the-art while inquiring about future opportunities, this paper reviews DL approaches for the analysis of data generated by acoustic and visual sensors in railway maintenance applications that have been published until August 31st, 2021. In this paper, the current state of the research is investigated and evaluated using a structured and systematic method, in order to highlight promising approaches and successful applications, as well as to identify available datasets, current limitations, open issues, challenges, and recommendations about future research directions

    Providing Authentication and Privacy for University Certificates using Smart Contracts in Blockchain Technology

    Get PDF
    Traditional ways of distributing and verifying academic certificates are not efficient. Certificates are distributed as hard copy. Verifying the integrity of the certificate is a time and resource consuming process. As a result, forged certificates have become common. It is very difficult to differentiate between a real and a forged certificate. Through our system, we intend to make the certificate generation, distribution, and verification process seamless. Any student can enter his or her personal details, academic coursework details, and the university code, and thus submit a certificate request to the university. University admins can verify the certificate requests, and approve or reject the requests as per their policy. Any student or third party could verify the integrity of the certificate by entering the details of the certificate under scrutiny into the system. Data required to verify the integrity of the certificate will be stored on a blockchain. All verification data will be stored on the blockchain, so it will be tamper proof. This eliminates or limits the case of forged certificates to a large extend
    • 

    corecore