首页 > 最新文献

2019 IEEE 17th International Conference on Industrial Informatics (INDIN)最新文献

英文 中文
Virtual Gateway in TCMS Execution Environment based on an Integrated Architecture 基于集成体系结构的TCMS执行环境中的虚拟网关
Pub Date : 2019-07-01 DOI: 10.1109/INDIN41052.2019.8972294
Hongjie Fang, R. Obermaisser
In the railway domain, the development trend is evolving from federated to integrated architectures, which promise massive cost reduction through higher functional integration of Train Control and Monitoring Systems (TCMS). An integrated architecture means that components are integrated on a computing node, which formerly were allocated to separate computing nodes. Therefore, the execution environment needs to support communication between these components on a computing node. Based on an integrated architecture, a virtual switch supporting time-space isolation and dynamic configuration has been proposed in previous work to address the mixed criticality of TCMS applications and dynamic coupling of vehicles. However, controlled information import and export between different data flows is not addressed in the state of the art.In this paper, we propose a virtual gateway residing in the TCMS execution environment to resolve property mismatches between different data flows and prevent fault propagation between applications of different safety critical levels. We capture the properties of data flows in the gateway specification and realise the gateway services by leveraging a database in the gateway. The experimental results show the isolation and the controlled information transportation between data flows.
在铁路领域,发展趋势是从联邦式架构向集成化架构演变,通过列车控制和监控系统(TCMS)的更高功能集成度,有望大幅降低成本。集成体系结构意味着将组件集成在一个计算节点上,而以前这些组件被分配到单独的计算节点上。因此,执行环境需要支持计算节点上这些组件之间的通信。为了解决TCMS应用的混合临界性和车辆的动态耦合问题,在集成架构的基础上,提出了一种支持时空隔离和动态配置的虚拟交换机。然而,在不同数据流之间的受控信息导入和导出目前还没有得到解决。在本文中,我们提出了一个驻留在TCMS执行环境中的虚拟网关,以解决不同数据流之间的属性不匹配,并防止不同安全临界级别的应用程序之间的故障传播。我们在网关规范中捕获数据流的属性,并通过利用网关中的数据库来实现网关服务。实验结果表明,数据流之间的信息传输具有隔离性和可控性。
{"title":"Virtual Gateway in TCMS Execution Environment based on an Integrated Architecture","authors":"Hongjie Fang, R. Obermaisser","doi":"10.1109/INDIN41052.2019.8972294","DOIUrl":"https://doi.org/10.1109/INDIN41052.2019.8972294","url":null,"abstract":"In the railway domain, the development trend is evolving from federated to integrated architectures, which promise massive cost reduction through higher functional integration of Train Control and Monitoring Systems (TCMS). An integrated architecture means that components are integrated on a computing node, which formerly were allocated to separate computing nodes. Therefore, the execution environment needs to support communication between these components on a computing node. Based on an integrated architecture, a virtual switch supporting time-space isolation and dynamic configuration has been proposed in previous work to address the mixed criticality of TCMS applications and dynamic coupling of vehicles. However, controlled information import and export between different data flows is not addressed in the state of the art.In this paper, we propose a virtual gateway residing in the TCMS execution environment to resolve property mismatches between different data flows and prevent fault propagation between applications of different safety critical levels. We capture the properties of data flows in the gateway specification and realise the gateway services by leveraging a database in the gateway. The experimental results show the isolation and the controlled information transportation between data flows.","PeriodicalId":260220,"journal":{"name":"2019 IEEE 17th International Conference on Industrial Informatics (INDIN)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133885990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing a Secure, Smart Microgrid Energy Market using Distributed Ledger Technologies 利用分布式账本技术开发安全、智能的微电网能源市场
Pub Date : 2019-07-01 DOI: 10.1109/INDIN41052.2019.8972018
Lehlogonolo P. I. Ledwaba, G. Hancke, S. Isaac, H. Venter
The ability for the smart microgrid to allow for the independent generation and distribution of electrical energy makes it an attractive solution towards enabling universal access to electricity within developing economies. Distributed Ledger Technologies (DLTs) are being considered as an enabling technology for the secure energy trade market however the high processing, energy and data exchange requirements may make them unsuitable for the Industrial Internet of Things technologies used in the implementation of the microgrid and the limited connectivity infrastructure in developing technologies. This work serves to assess the suitability of DLTs for IIoT edge node operation and as a solution for the microgrid energy market by considering node transaction times, operating temperature, power consumption, processor and memory useage, in addition to mining effort and end user costs.
智能微电网允许独立发电和分配电能的能力使其成为在发展中经济体实现普遍供电的有吸引力的解决方案。分布式账本技术(dlt)被认为是安全能源交易市场的使能技术,然而,高处理、能源和数据交换要求可能使其不适合用于实施微电网的工业物联网技术和开发技术中有限的连接基础设施。这项工作旨在通过考虑节点交易时间、操作温度、功耗、处理器和内存使用,以及挖掘工作量和最终用户成本,评估dlt对IIoT边缘节点操作的适用性,以及作为微电网能源市场的解决方案。
{"title":"Developing a Secure, Smart Microgrid Energy Market using Distributed Ledger Technologies","authors":"Lehlogonolo P. I. Ledwaba, G. Hancke, S. Isaac, H. Venter","doi":"10.1109/INDIN41052.2019.8972018","DOIUrl":"https://doi.org/10.1109/INDIN41052.2019.8972018","url":null,"abstract":"The ability for the smart microgrid to allow for the independent generation and distribution of electrical energy makes it an attractive solution towards enabling universal access to electricity within developing economies. Distributed Ledger Technologies (DLTs) are being considered as an enabling technology for the secure energy trade market however the high processing, energy and data exchange requirements may make them unsuitable for the Industrial Internet of Things technologies used in the implementation of the microgrid and the limited connectivity infrastructure in developing technologies. This work serves to assess the suitability of DLTs for IIoT edge node operation and as a solution for the microgrid energy market by considering node transaction times, operating temperature, power consumption, processor and memory useage, in addition to mining effort and end user costs.","PeriodicalId":260220,"journal":{"name":"2019 IEEE 17th International Conference on Industrial Informatics (INDIN)","volume":"33 1-2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114035606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Power Consumption Optimization of a Wireless Temperature Sensor Node Using Unidirectional Communication 基于单向通信的无线温度传感器节点功耗优化
Pub Date : 2019-07-01 DOI: 10.1109/INDIN41052.2019.8972226
R. Taherkhani, S. Nihtianov
Wireless sensor networks (WSNs) are gaining increasing popularity in industry. Success of these systems depends on two very important factors: power efficiency of the sensor nodes and communication reliability. In this paper, we investigate the effect of using unidirectional (broadcasting) communication on the power consumption and reliability of a wireless sensor node. A high-precision wireless temperature sensor reported in an earlier publication is employed as a case study. First, we calculate the energy required to transmit and receive a message using Bluetooth low energy (BLE) in the physical layer without taking any reliability precautions. Then, we estimate the amount of energy required for the reliable transmission of a BLE packet using the BLE acknowledgment method and forward error correction (FEC) in the application layer. Through this paper, we show that the power consumption of a wireless temperature sensor can be reduced using broadcast communication and simultaneous forward error correction while providing enough reliability in short ranges.
无线传感器网络(WSNs)在工业中越来越受欢迎。这些系统的成功取决于两个非常重要的因素:传感器节点的功率效率和通信可靠性。在本文中,我们研究了使用单向(广播)通信对无线传感器节点功耗和可靠性的影响。在早期出版物中报道的高精度无线温度传感器被用作案例研究。首先,我们计算了在不采取任何可靠性预防措施的情况下使用蓝牙低功耗(BLE)在物理层传输和接收消息所需的能量。然后,我们在应用层使用BLE确认方法和前向纠错(FEC)来估计可靠传输BLE数据包所需的能量。通过本文,我们证明了无线温度传感器可以通过广播通信和同步前向纠错来降低功耗,同时在短距离内提供足够的可靠性。
{"title":"Power Consumption Optimization of a Wireless Temperature Sensor Node Using Unidirectional Communication","authors":"R. Taherkhani, S. Nihtianov","doi":"10.1109/INDIN41052.2019.8972226","DOIUrl":"https://doi.org/10.1109/INDIN41052.2019.8972226","url":null,"abstract":"Wireless sensor networks (WSNs) are gaining increasing popularity in industry. Success of these systems depends on two very important factors: power efficiency of the sensor nodes and communication reliability. In this paper, we investigate the effect of using unidirectional (broadcasting) communication on the power consumption and reliability of a wireless sensor node. A high-precision wireless temperature sensor reported in an earlier publication is employed as a case study. First, we calculate the energy required to transmit and receive a message using Bluetooth low energy (BLE) in the physical layer without taking any reliability precautions. Then, we estimate the amount of energy required for the reliable transmission of a BLE packet using the BLE acknowledgment method and forward error correction (FEC) in the application layer. Through this paper, we show that the power consumption of a wireless temperature sensor can be reduced using broadcast communication and simultaneous forward error correction while providing enough reliability in short ranges.","PeriodicalId":260220,"journal":{"name":"2019 IEEE 17th International Conference on Industrial Informatics (INDIN)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122854041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Formal Modeling and Analysis of SystemJ GALS Systems using Coloured Petri Nets 基于彩色Petri网的SystemJ GALS系统形式化建模与分析
Pub Date : 2019-07-01 DOI: 10.1109/INDIN41052.2019.8972025
Weiyi Zhang, Z. Salcic, Avinash Malik
SystemJ is a programming language developed for implementing safety critical cyber-physical systems, including industrial automation systems. However, the current tools do not support an efficient mechanism to verify SystemJ programs formally. This paper presents a semantics-preserving translation of the synchronous subset of SystemJ to Coloured Petri Net (CPN), which in turn enables leveraging the plethora of analysis and verification tools for CPN to verify SystemJ programs. The translation and verification approach is illustrated on a pedagogical industrial automation example of a SystemJ program.
SystemJ是一种编程语言,用于实现安全关键的网络物理系统,包括工业自动化系统。然而,当前的工具不支持有效的机制来正式验证SystemJ程序。本文提出了SystemJ的同步子集到彩色Petri网(CPN)的语义保留转换,从而能够利用CPN的大量分析和验证工具来验证SystemJ程序。以SystemJ程序的教学工业自动化实例说明了翻译和验证方法。
{"title":"Towards Formal Modeling and Analysis of SystemJ GALS Systems using Coloured Petri Nets","authors":"Weiyi Zhang, Z. Salcic, Avinash Malik","doi":"10.1109/INDIN41052.2019.8972025","DOIUrl":"https://doi.org/10.1109/INDIN41052.2019.8972025","url":null,"abstract":"SystemJ is a programming language developed for implementing safety critical cyber-physical systems, including industrial automation systems. However, the current tools do not support an efficient mechanism to verify SystemJ programs formally. This paper presents a semantics-preserving translation of the synchronous subset of SystemJ to Coloured Petri Net (CPN), which in turn enables leveraging the plethora of analysis and verification tools for CPN to verify SystemJ programs. The translation and verification approach is illustrated on a pedagogical industrial automation example of a SystemJ program.","PeriodicalId":260220,"journal":{"name":"2019 IEEE 17th International Conference on Industrial Informatics (INDIN)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127955702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of Machine Tool Anomalies from Bayesian Changepoint Recurrence Estimation 基于贝叶斯变点递归估计的机床异常检测
Pub Date : 2019-07-01 DOI: 10.1109/INDIN41052.2019.8972164
Christian Reich, Christina Nicolaou, Ahmad Mansour, Kristof Van Laerhoven
In this study, we consider the problem of detecting process-related anomalies for machine tools. The similar shape of successive sensor signals, which arises due to the same process step sequence applied to each workpiece, suggests extracting shape-related features. In recent years, shapelets dominated the field of shape-related features. Unfortunately, they involve a high computational burden due to hyperparameter optimization.We introduce alternative shape-related features relying on abrupt signal changes (changepoints) reflecting the changes of process steps. During normal operation, changepoints follow a highly recurrent pattern, i.e., appear at similar locations. Thus, being able to distinguish regular, recurrent from abnormal, non-recurrent changepoints allows detecting process anomalies.For changepoint recurrence estimation, we extend the Bayesian Online Changepoint Detection (BOCPD) method. The extension allows distinguishing normal and abnormal changepoints relying on empirical estimates of the changepoint recurrence distribution. Subsequently, changepoint-related features are introduced and compared to shapelets and wavelet-based features in a case study comprising real-world machine tool data.Qualitative results verify changepoint locations being comparable to shapelet locations found by the FLAG shapelet approach. Furthermore, quantitative results suggest superior classification performance both to shapelets and wavelet-based features.
在本研究中,我们考虑了检测机床过程相关异常的问题。由于应用于每个工件的相同加工步骤序列,导致连续传感器信号的形状相似,因此建议提取与形状相关的特征。近年来,小颗粒在形状相关特征领域占据主导地位。不幸的是,由于超参数优化,它们涉及很高的计算负担。我们引入了替代形状相关的特征依赖于突变信号的变化(变化点),反映了过程步骤的变化。在正常操作期间,变更点遵循高度循环的模式,即出现在相似的位置。因此,能够区分规则的、经常性的和异常的、非经常性的变更点,就可以检测过程异常。对于变更点递归估计,我们扩展了贝叶斯在线变更点检测(BOCPD)方法。该扩展允许根据对变更点递归分布的经验估计来区分正常和异常的变更点。随后,在包含真实机床数据的案例研究中,引入了与变化点相关的特征,并将其与shapelets和基于小波的特征进行了比较。定性结果验证了变更点位置与FLAG shapelet方法找到的shapelet位置相当。此外,定量结果表明,该方法的分类性能优于基于小波和基于小波的特征。
{"title":"Detection of Machine Tool Anomalies from Bayesian Changepoint Recurrence Estimation","authors":"Christian Reich, Christina Nicolaou, Ahmad Mansour, Kristof Van Laerhoven","doi":"10.1109/INDIN41052.2019.8972164","DOIUrl":"https://doi.org/10.1109/INDIN41052.2019.8972164","url":null,"abstract":"In this study, we consider the problem of detecting process-related anomalies for machine tools. The similar shape of successive sensor signals, which arises due to the same process step sequence applied to each workpiece, suggests extracting shape-related features. In recent years, shapelets dominated the field of shape-related features. Unfortunately, they involve a high computational burden due to hyperparameter optimization.We introduce alternative shape-related features relying on abrupt signal changes (changepoints) reflecting the changes of process steps. During normal operation, changepoints follow a highly recurrent pattern, i.e., appear at similar locations. Thus, being able to distinguish regular, recurrent from abnormal, non-recurrent changepoints allows detecting process anomalies.For changepoint recurrence estimation, we extend the Bayesian Online Changepoint Detection (BOCPD) method. The extension allows distinguishing normal and abnormal changepoints relying on empirical estimates of the changepoint recurrence distribution. Subsequently, changepoint-related features are introduced and compared to shapelets and wavelet-based features in a case study comprising real-world machine tool data.Qualitative results verify changepoint locations being comparable to shapelet locations found by the FLAG shapelet approach. Furthermore, quantitative results suggest superior classification performance both to shapelets and wavelet-based features.","PeriodicalId":260220,"journal":{"name":"2019 IEEE 17th International Conference on Industrial Informatics (INDIN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126617644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Thermal Camera-based Activity Recognition Using Discriminant Skeleton Features and RNN 基于分辨骨架特征和RNN的热像仪活动识别
Pub Date : 2019-07-01 DOI: 10.1109/INDIN41052.2019.8972082
Md. Zia Uddin, W. Khaksar, J. Tørresen
Recognizing human activities from sensor data is one of the key areas of image processing, computer vision, and pattern recognition researches today. The target of human activity recognition (HAR) is usually to detect and analyze distinguished activities from the data acquired via different sensors (e.g. thermal cameras). This work proposes a HAR approach from videos recorded via a thermal camera. Skeletons of human bodies are extracted from thermal frames using an opensource deep convolutional neural network (CNN)-based approach named OpenPose. It is generally applied on videos of typical color cameras. However, this work adopts OpenPose on thermal images to extract useful features so that the HAR system can be deployed in environments with low lights as well. Once skeletons of human silhouettes are obtained from the thermal images, robust spatiotemporal features are extracted followed by discriminant analysis. Finally, the discriminant features are fed into a deep recurrent neural network (RNN) for activity training and recognition. The proposed HAR method can be applied to monitor the users such as elderly in both bright and dark environments to prolong their independent life, unlike other typical color cameras which are generally applied in bright environments.
从传感器数据中识别人类活动是当今图像处理、计算机视觉和模式识别研究的关键领域之一。人类活动识别(HAR)的目标通常是从不同传感器(如热像仪)获取的数据中检测和分析已识别的活动。这项工作提出了一种通过热像仪记录视频的HAR方法。使用开源的基于深度卷积神经网络(CNN)的方法OpenPose从热帧中提取人体骨架。它一般应用于典型彩色摄像机的视频。然而,这项工作在热图像上采用OpenPose来提取有用的特征,以便HAR系统也可以部署在低光环境中。从热图像中获取人体轮廓骨架后,提取鲁棒时空特征,然后进行判别分析。最后,将识别特征输入到深度递归神经网络(RNN)中进行活动训练和识别。本文提出的HAR方法可以在明暗环境下对老年人等用户进行监控,延长其独立寿命,而不像其他典型的彩色摄像机一般只适用于明亮环境。
{"title":"A Thermal Camera-based Activity Recognition Using Discriminant Skeleton Features and RNN","authors":"Md. Zia Uddin, W. Khaksar, J. Tørresen","doi":"10.1109/INDIN41052.2019.8972082","DOIUrl":"https://doi.org/10.1109/INDIN41052.2019.8972082","url":null,"abstract":"Recognizing human activities from sensor data is one of the key areas of image processing, computer vision, and pattern recognition researches today. The target of human activity recognition (HAR) is usually to detect and analyze distinguished activities from the data acquired via different sensors (e.g. thermal cameras). This work proposes a HAR approach from videos recorded via a thermal camera. Skeletons of human bodies are extracted from thermal frames using an opensource deep convolutional neural network (CNN)-based approach named OpenPose. It is generally applied on videos of typical color cameras. However, this work adopts OpenPose on thermal images to extract useful features so that the HAR system can be deployed in environments with low lights as well. Once skeletons of human silhouettes are obtained from the thermal images, robust spatiotemporal features are extracted followed by discriminant analysis. Finally, the discriminant features are fed into a deep recurrent neural network (RNN) for activity training and recognition. The proposed HAR method can be applied to monitor the users such as elderly in both bright and dark environments to prolong their independent life, unlike other typical color cameras which are generally applied in bright environments.","PeriodicalId":260220,"journal":{"name":"2019 IEEE 17th International Conference on Industrial Informatics (INDIN)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126177932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Exchange Network: An Architecture for the Negotiation of Non-Repudiable Token Exchanges 交换网络:不可抵赖代币交换协商的架构
Pub Date : 2019-07-01 DOI: 10.1109/INDIN41052.2019.8972031
Emanuel Palm, O. Schelén, Ulf Bodin, Richard Hedman
Many use cases coming out of initiatives such as Industry 4.0 and Ubiquitous Computing require that systems be able to cooperate by negotiating about and agreeing on the exchange of arbitrary values. While solutions able to facilitate such negotiation exist, they tend to either be domain-specific or lack mechanisms for non-repudiation, which make them unfit for the heterogeneity and scale of many compelling applications. In this paper, we present the Exchange Network, a general-purpose and implementation-independent architecture for digital negotiation and non-repudiable exchanges of tokens, which are symbolic representations of arbitrary values. We consider the implications of implementing the architecture in three different ways, using a common database, a blockchain, and our own Signature Chain data structure, which we also describe. We demonstrate the feasibility of the architecture by outlining our own implementation of it and also describe a supply-chain scenario inspired by one transportation process at Volvo Trucks.
来自工业4.0和普适计算等计划的许多用例要求系统能够通过协商和同意任意值的交换来进行合作。虽然存在能够促进这种协商的解决方案,但它们往往是特定于领域的,或者缺乏不可否认的机制,这使得它们不适合许多引人注目的应用程序的异质性和规模。在本文中,我们提出了交换网络,这是一种通用的、独立于实现的体系结构,用于数字协商和不可抵赖的令牌交换,这些令牌是任意值的符号表示。我们考虑以三种不同的方式实现该架构的含义,使用公共数据库、区块链和我们自己的签名链数据结构,我们也会对其进行描述。我们通过概述我们自己的实现来展示该架构的可行性,并描述了受沃尔沃卡车运输过程启发的供应链场景。
{"title":"The Exchange Network: An Architecture for the Negotiation of Non-Repudiable Token Exchanges","authors":"Emanuel Palm, O. Schelén, Ulf Bodin, Richard Hedman","doi":"10.1109/INDIN41052.2019.8972031","DOIUrl":"https://doi.org/10.1109/INDIN41052.2019.8972031","url":null,"abstract":"Many use cases coming out of initiatives such as Industry 4.0 and Ubiquitous Computing require that systems be able to cooperate by negotiating about and agreeing on the exchange of arbitrary values. While solutions able to facilitate such negotiation exist, they tend to either be domain-specific or lack mechanisms for non-repudiation, which make them unfit for the heterogeneity and scale of many compelling applications. In this paper, we present the Exchange Network, a general-purpose and implementation-independent architecture for digital negotiation and non-repudiable exchanges of tokens, which are symbolic representations of arbitrary values. We consider the implications of implementing the architecture in three different ways, using a common database, a blockchain, and our own Signature Chain data structure, which we also describe. We demonstrate the feasibility of the architecture by outlining our own implementation of it and also describe a supply-chain scenario inspired by one transportation process at Volvo Trucks.","PeriodicalId":260220,"journal":{"name":"2019 IEEE 17th International Conference on Industrial Informatics (INDIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125832765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Evaluating Two Semantics for Falsification using an Autonomous Driving Example 以自动驾驶为例评估两种语义的证伪性
Pub Date : 2019-07-01 DOI: 10.1109/INDIN41052.2019.8972229
Zahra Ramezani, Nicholas Smallbone, Martin Fabian, K. Åkesson
We consider the falsification of temporal logic properties as a method to test complex systems, such as autonomous systems. Since these systems are often safety-critical, it is important to assess whether they fulfill given specifications or not. An adaptive cruise controller for an autonomous car is considered where the closed-loop model has unknown parameters and an important problem is to find parameter combinations for which given specification are broken. We assume that the closed-loop system can be simulated with the known given parameters, no other information is available to the testing framework. The specification, such as, the ability to avoid collisions, is expressed using Signal Temporal Logic (STL). In general, systems consist of a large number of parameters, and it is not possible or feasible to explicitly enumerate all combinations of the parameters. Thus, an optimization-based approach is used to guide the search for parameters that might falsify the specification. However, a key challenge is how to select the objective function such that the falsification of the specification, if it can be falsified, can be falsified using as few simulations as possible. For falsification using optimization it is required to have a measure representing the distance to the falsification of the specification. The way the measure is defined results in different objective functions used during optimization. Different measures have been proposed in the literature and in this paper the properties of the Max Semantics (MAX) and the Mean Alternative Robustness Value (MARV) semantics are discussed. After evaluating these two semantics on an adaptive cruise control example, we discuss their strengths and weaknesses to better understand the properties of the two semantics.
我们考虑时间逻辑性质的证伪作为测试复杂系统的一种方法,如自治系统。由于这些系统通常是安全关键的,因此评估它们是否满足给定的规范是很重要的。考虑了一种自动驾驶汽车自适应巡航控制器,其中闭环模型中存在未知参数,其重要问题是如何找到给定参数不符合的参数组合。我们假设闭环系统可以用已知的给定参数进行模拟,测试框架没有其他信息。规范,例如避免碰撞的能力,是使用信号时序逻辑(STL)表示的。一般来说,系统由大量参数组成,显式枚举参数的所有组合是不可能或不可行的。因此,使用基于优化的方法来指导对可能篡改规范的参数的搜索。然而,一个关键的挑战是如何选择目标函数,使规范的证伪,如果它可以证伪,可以用尽可能少的模拟证伪。对于使用优化的证伪,需要有一个表示到规范证伪的距离的度量。度量的定义方式导致在优化过程中使用不同的目标函数。文献中已经提出了不同的度量方法,本文讨论了最大语义(Max)和平均可选鲁棒值(MARV)语义的性质。在一个自适应巡航控制示例中评估了这两种语义之后,我们讨论了它们的优缺点,以更好地理解这两种语义的属性。
{"title":"Evaluating Two Semantics for Falsification using an Autonomous Driving Example","authors":"Zahra Ramezani, Nicholas Smallbone, Martin Fabian, K. Åkesson","doi":"10.1109/INDIN41052.2019.8972229","DOIUrl":"https://doi.org/10.1109/INDIN41052.2019.8972229","url":null,"abstract":"We consider the falsification of temporal logic properties as a method to test complex systems, such as autonomous systems. Since these systems are often safety-critical, it is important to assess whether they fulfill given specifications or not. An adaptive cruise controller for an autonomous car is considered where the closed-loop model has unknown parameters and an important problem is to find parameter combinations for which given specification are broken. We assume that the closed-loop system can be simulated with the known given parameters, no other information is available to the testing framework. The specification, such as, the ability to avoid collisions, is expressed using Signal Temporal Logic (STL). In general, systems consist of a large number of parameters, and it is not possible or feasible to explicitly enumerate all combinations of the parameters. Thus, an optimization-based approach is used to guide the search for parameters that might falsify the specification. However, a key challenge is how to select the objective function such that the falsification of the specification, if it can be falsified, can be falsified using as few simulations as possible. For falsification using optimization it is required to have a measure representing the distance to the falsification of the specification. The way the measure is defined results in different objective functions used during optimization. Different measures have been proposed in the literature and in this paper the properties of the Max Semantics (MAX) and the Mean Alternative Robustness Value (MARV) semantics are discussed. After evaluating these two semantics on an adaptive cruise control example, we discuss their strengths and weaknesses to better understand the properties of the two semantics.","PeriodicalId":260220,"journal":{"name":"2019 IEEE 17th International Conference on Industrial Informatics (INDIN)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126681701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Preparation for Data Mining in Chemical Plants using Big Data 基于大数据的化工厂数据挖掘的数据准备
Pub Date : 2019-07-01 DOI: 10.1109/INDIN41052.2019.8972078
Reuben Borrison, Benjamin Kloepper, Jennifer Mullen
Data preparation for data mining in industrial applications is a key success factor which requires considerable repeated efforts. Although the required activities need to be repeated in very similar fashion across many projects, details of their implementation differ and require both application understanding and experience. As a result, data preparation is done by data mining experts with a strong domain background and a good understanding of the characteristics of the data to be analyzed. Experts with these profiles usually have an engineering background and no strong expertise in distributed programming or big data technology. Unfortunately, the amount of data can be so large that distributed algorithms are required to allow for inspection of results and iteration of preparation steps. This contribution introduces an interactive data preparation workflow for signal data from chemical plants enabling domain experts without background in distributed computing and extensive programming experience to leverage the power of big data technologies.
在工业应用中,数据挖掘的数据准备是成功的关键因素,需要大量的重复努力。尽管所需的活动需要在许多项目中以非常相似的方式重复,但其实现的细节是不同的,并且需要应用程序理解和经验。因此,数据准备是由具有强大领域背景和对要分析的数据特征有很好理解的数据挖掘专家完成的。这些专家通常具有工程背景,但在分布式编程或大数据技术方面没有很强的专业知识。不幸的是,数据量可能非常大,以至于需要分布式算法来检查结果和迭代准备步骤。这一贡献为化工厂的信号数据引入了一个交互式数据准备工作流程,使没有分布式计算背景和丰富编程经验的领域专家能够利用大数据技术的力量。
{"title":"Data Preparation for Data Mining in Chemical Plants using Big Data","authors":"Reuben Borrison, Benjamin Kloepper, Jennifer Mullen","doi":"10.1109/INDIN41052.2019.8972078","DOIUrl":"https://doi.org/10.1109/INDIN41052.2019.8972078","url":null,"abstract":"Data preparation for data mining in industrial applications is a key success factor which requires considerable repeated efforts. Although the required activities need to be repeated in very similar fashion across many projects, details of their implementation differ and require both application understanding and experience. As a result, data preparation is done by data mining experts with a strong domain background and a good understanding of the characteristics of the data to be analyzed. Experts with these profiles usually have an engineering background and no strong expertise in distributed programming or big data technology. Unfortunately, the amount of data can be so large that distributed algorithms are required to allow for inspection of results and iteration of preparation steps. This contribution introduces an interactive data preparation workflow for signal data from chemical plants enabling domain experts without background in distributed computing and extensive programming experience to leverage the power of big data technologies.","PeriodicalId":260220,"journal":{"name":"2019 IEEE 17th International Conference on Industrial Informatics (INDIN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127297450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptographic Strength and Machine Learning Security for Low Complexity IoT Sensors 低复杂度物联网传感器的加密强度和机器学习安全性
Pub Date : 2019-07-01 DOI: 10.1109/INDIN41052.2019.8972053
J. Long, Sam Matsumoto
Hacking of every-day sensors is now a common problem with a disproportionate impact over life-critical assets. It is precisely because they are low-cost and low-complexity that these sensors make such easy targets that this problem will grow exponentially as sensors become more indispensable to modern life. This paper examines the impact of sensor hacking and offers a two-phase approach to security: a low-cost authentication scheme and a novel Machine Learning approach using a Malware Predictive Interpreter.
对日常传感器的黑客攻击现在是一个普遍问题,对生命攸关的资产造成了不成比例的影响。正是因为这些传感器成本低、复杂度低,所以很容易成为攻击目标。随着传感器在现代生活中变得越来越不可或缺,这个问题将呈指数级增长。本文研究了传感器黑客的影响,并提供了一种两阶段的安全方法:一种低成本的身份验证方案和一种使用恶意软件预测解释器的新型机器学习方法。
{"title":"Cryptographic Strength and Machine Learning Security for Low Complexity IoT Sensors","authors":"J. Long, Sam Matsumoto","doi":"10.1109/INDIN41052.2019.8972053","DOIUrl":"https://doi.org/10.1109/INDIN41052.2019.8972053","url":null,"abstract":"Hacking of every-day sensors is now a common problem with a disproportionate impact over life-critical assets. It is precisely because they are low-cost and low-complexity that these sensors make such easy targets that this problem will grow exponentially as sensors become more indispensable to modern life. This paper examines the impact of sensor hacking and offers a two-phase approach to security: a low-cost authentication scheme and a novel Machine Learning approach using a Malware Predictive Interpreter.","PeriodicalId":260220,"journal":{"name":"2019 IEEE 17th International Conference on Industrial Informatics (INDIN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125068867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 IEEE 17th International Conference on Industrial Informatics (INDIN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1