首页 > 最新文献

Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control最新文献

英文 中文
An Overview of Prevention/Mitigation against Memory Corruption Attack 对内存损坏攻击的预防/缓解概述
Mahmood Khalsan, Michael Opoku Agyeman
One of the most prevalent, ancient and devastating vulnerabilities which is increasing rapidly is Memory corruption. It is a vulnerability where a memory location contents of a computer system are altered because of programming errors allowing execution of arbitrary codes. It particularly happens in low-level programming languages such as C, C++ because of their lack of memory safety. Many defend techniques against this kind of attacks have been presented and implemented to prevent it. However, an advanced version of the attack can bypass some of these techniques and harm the system. In this work, we present an overview of the Memory corruption attacks and the existing mitigation techniques for both compilers and operating systems. We hope that this survey will provide sufficient details that can be useful for researchers and system designer.
记忆损坏是最普遍、最古老、最具破坏性的漏洞之一,而且正在迅速增加。这是一种漏洞,由于允许执行任意代码的编程错误,计算机系统的内存位置内容被改变。这种情况尤其发生在C、c++等低级编程语言中,因为它们缺乏内存安全性。许多针对此类攻击的防御技术已经提出并实现以防止它。然而,攻击的高级版本可以绕过其中一些技术并损害系统。在这项工作中,我们概述了内存损坏攻击以及针对编译器和操作系统的现有缓解技术。我们希望这项调查将提供足够的细节,可以为研究人员和系统设计者有用。
{"title":"An Overview of Prevention/Mitigation against Memory Corruption Attack","authors":"Mahmood Khalsan, Michael Opoku Agyeman","doi":"10.1145/3284557.3284564","DOIUrl":"https://doi.org/10.1145/3284557.3284564","url":null,"abstract":"One of the most prevalent, ancient and devastating vulnerabilities which is increasing rapidly is Memory corruption. It is a vulnerability where a memory location contents of a computer system are altered because of programming errors allowing execution of arbitrary codes. It particularly happens in low-level programming languages such as C, C++ because of their lack of memory safety. Many defend techniques against this kind of attacks have been presented and implemented to prevent it. However, an advanced version of the attack can bypass some of these techniques and harm the system. In this work, we present an overview of the Memory corruption attacks and the existing mitigation techniques for both compilers and operating systems. We hope that this survey will provide sufficient details that can be useful for researchers and system designer.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133339336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Influence of Hydrate Moisture on the Sealing of a Nanopowder Dispersed System Based on Zirconia 水合物水分对氧化锆纳米粉体分散体系密封性的影响
A. Shylo, A. Doroshkevich, T. Konstantinova, I. Danilenko, A. Lyubchyk
The present paper is devoted to the problem of sealing zirconia nanopowder. We studied the effect of the water content in zirconia nanopowder on the process of sealing this powder. We found that the shrinkage, specific surface area and weight loss of a nanopowder system based on zirconia during sealing substantially depend from the level of ambient humidity where nanopowder is placed. By optimizing the external conditions of moisture content in a sample, the value of relative shrinkage of a nanopowder system based on ZrO2 under uniaxial pressure can be increased to 6%, while under high hydrostatic pressure sealing it can be increased up to 8%.
本文主要研究了纳米氧化锆粉体的密封问题。研究了氧化锆纳米粉中含水量对其密封过程的影响。我们发现,密封过程中基于氧化锆的纳米粉末系统的收缩率、比表面积和重量损失在很大程度上取决于纳米粉末放置的环境湿度水平。通过优化样品含水量的外部条件,ZrO2纳米粉体体系在单轴压力下的相对收缩率可提高到6%,在高静水压力密封下的相对收缩率可提高到8%。
{"title":"Influence of Hydrate Moisture on the Sealing of a Nanopowder Dispersed System Based on Zirconia","authors":"A. Shylo, A. Doroshkevich, T. Konstantinova, I. Danilenko, A. Lyubchyk","doi":"10.1145/3284557.3284726","DOIUrl":"https://doi.org/10.1145/3284557.3284726","url":null,"abstract":"The present paper is devoted to the problem of sealing zirconia nanopowder. We studied the effect of the water content in zirconia nanopowder on the process of sealing this powder. We found that the shrinkage, specific surface area and weight loss of a nanopowder system based on zirconia during sealing substantially depend from the level of ambient humidity where nanopowder is placed. By optimizing the external conditions of moisture content in a sample, the value of relative shrinkage of a nanopowder system based on ZrO2 under uniaxial pressure can be increased to 6%, while under high hydrostatic pressure sealing it can be increased up to 8%.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133569421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulating Video Capturing for Phacoemulsification Surgery Using Aftermarket Cameras 利用二手市场摄像机模拟超声乳化手术的视频采集
Soetrisno, Josiah Irma, D. H. Hareva, H. Tjahyadi
The main purposes of picture archiving systems produced by medical imaging modalities is used for diagnosis and research purposes, include in eye surgery field. In doing modern surgery such ophthalmologic, doctors operate eye's internal lens, which is small objects, so they are prone to making mistakes. The postoperative procedure is required to evaluate the intervention results. The microscope ophthalmologic surgery equipment uses trinocular which can be installed with a digital camera to record intervention activities for reflective purposes. In this study besides using that main digital camera, we explore the possibility to employ one or more aftermarket digital cameras, such as smart phone or action camera. Close-Up lens will also be used for increasing the object image obtains by the cameras. The uses of aftermarket cameras give beneficial for mobile operation-theatre or application in the rural area. The objective of this exploration is to get insight about the possibilities and functions of this kind of cameras, whether it may effectively be used. We used an image of eye rather than real eye. The results show that combining camera with close-up lens helps to obtain bigger size of images/videos although some further improvement is still required.
医学成像模式产生的图像存档系统的主要目的是用于诊断和研究目的,包括眼科手术领域。在做眼科等现代外科手术时,医生操作的是眼睛的内晶状体,这是一种很小的物体,所以他们很容易出错。需要术后手术来评估干预效果。显微镜眼科手术设备采用三棱镜,可安装数码相机记录干预活动,以达到反射目的。在本研究中,除了使用主要数码相机外,我们还探索了使用一个或多个售后数码相机的可能性,例如智能手机或运动相机。特写镜头也将用于增加相机获得的物体图像。售后摄像机的使用有利于移动手术室或农村地区的应用。这次探索的目的是了解这种相机的可能性和功能,是否可以有效地使用。我们使用了眼睛的图像,而不是真实的眼睛。结果表明,将相机与特写镜头相结合有助于获得更大尺寸的图像/视频,但仍需要进一步改进。
{"title":"Simulating Video Capturing for Phacoemulsification Surgery Using Aftermarket Cameras","authors":"Soetrisno, Josiah Irma, D. H. Hareva, H. Tjahyadi","doi":"10.1145/3284557.3284703","DOIUrl":"https://doi.org/10.1145/3284557.3284703","url":null,"abstract":"The main purposes of picture archiving systems produced by medical imaging modalities is used for diagnosis and research purposes, include in eye surgery field. In doing modern surgery such ophthalmologic, doctors operate eye's internal lens, which is small objects, so they are prone to making mistakes. The postoperative procedure is required to evaluate the intervention results. The microscope ophthalmologic surgery equipment uses trinocular which can be installed with a digital camera to record intervention activities for reflective purposes. In this study besides using that main digital camera, we explore the possibility to employ one or more aftermarket digital cameras, such as smart phone or action camera. Close-Up lens will also be used for increasing the object image obtains by the cameras. The uses of aftermarket cameras give beneficial for mobile operation-theatre or application in the rural area. The objective of this exploration is to get insight about the possibilities and functions of this kind of cameras, whether it may effectively be used. We used an image of eye rather than real eye. The results show that combining camera with close-up lens helps to obtain bigger size of images/videos although some further improvement is still required.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131475722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatio-temporal Anomaly Detection in Traffic Data 交通数据的时空异常检测
Qing Wang, Weifeng Lv, Bowen Du
Spatio-temporal data mining has received much attention in recent years in many industrial and financial applications. Anomaly detection has also become an important problem. The detection of anomalies in spatio-temporal traffic data is an important problem in the data mining and knowledge discovery community. In this paper, we first investigate multiple types of traffic data and extract different features from each type of the data. Then, we combine grid partition on the basis of Local Outlier Factor (LOF) algorithm and develop a grid-based LOF algorithm to detect the abnormal area in Beijing. Finally, we conduct extensive experiments on real-world trip data including taxi and bus data. And experimental demonstrate the effectiveness of our proposed approach.
近年来,时空数据挖掘在许多工业和金融应用中受到了广泛的关注。异常检测也成为一个重要的问题。时空交通数据的异常检测是数据挖掘和知识发现领域的一个重要问题。本文首先研究了多种类型的交通数据,并从每种类型的数据中提取不同的特征。然后,在局部离群因子(LOF)算法的基础上结合网格划分,提出了一种基于网格的LOF算法来检测北京地区的异常区域。最后,我们对包括出租车和公交车数据在内的真实旅行数据进行了广泛的实验。实验证明了该方法的有效性。
{"title":"Spatio-temporal Anomaly Detection in Traffic Data","authors":"Qing Wang, Weifeng Lv, Bowen Du","doi":"10.1145/3284557.3284725","DOIUrl":"https://doi.org/10.1145/3284557.3284725","url":null,"abstract":"Spatio-temporal data mining has received much attention in recent years in many industrial and financial applications. Anomaly detection has also become an important problem. The detection of anomalies in spatio-temporal traffic data is an important problem in the data mining and knowledge discovery community. In this paper, we first investigate multiple types of traffic data and extract different features from each type of the data. Then, we combine grid partition on the basis of Local Outlier Factor (LOF) algorithm and develop a grid-based LOF algorithm to detect the abnormal area in Beijing. Finally, we conduct extensive experiments on real-world trip data including taxi and bus data. And experimental demonstrate the effectiveness of our proposed approach.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117306839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Human-Robot Interaction Using Pointing Gestures 使用指向手势的人机交互
Michal Tölgyessy, Martin Dekan, P. Hubinský
Our research presented in this paper focuses on HRI (Human-Robot Interaction) via pointing gestures. We've designed a method where human operator points to a specific location and subsequently a mobile robot drives to the designated location. A depth sensor is used to capture operator's position and gesture. The key to our algorithm is 3D positions of operator's body joints. We further our previous research by analysis of two depth sensors, Kinect v1 and Kinect v2, in their ability to detect body joints.
我们的研究主要集中在HRI(人机交互)通过指向手势。我们设计了一种方法,人类操作员指向一个特定的位置,随后移动机器人驾驶到指定的位置。深度传感器用于捕捉操作员的位置和手势。该算法的关键是操作者身体关节的三维位置。我们通过分析Kinect v1和Kinect v2这两个深度传感器探测人体关节的能力,进一步深化了之前的研究。
{"title":"Human-Robot Interaction Using Pointing Gestures","authors":"Michal Tölgyessy, Martin Dekan, P. Hubinský","doi":"10.1145/3284557.3284718","DOIUrl":"https://doi.org/10.1145/3284557.3284718","url":null,"abstract":"Our research presented in this paper focuses on HRI (Human-Robot Interaction) via pointing gestures. We've designed a method where human operator points to a specific location and subsequently a mobile robot drives to the designated location. A depth sensor is used to capture operator's position and gesture. The key to our algorithm is 3D positions of operator's body joints. We further our previous research by analysis of two depth sensors, Kinect v1 and Kinect v2, in their ability to detect body joints.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115424304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Study of the Security Problems of Wireless Sensor Networks into the Context of the Internet of Things 物联网背景下无线传感器网络安全问题研究
Benfilali Mostefa, Gafour Abdelkader
The Internet of Things is an integral part of the Internet of the future and can defined as a global and dynamic network infrastructure based on interoperable communication protocols where real and virtual Things have an identity or address that through smart interfaces are perfectly integrated into an information network. Among the connected objects will be the Wireless Sensor Networks WSN that can generate, collect, store and share information between themselves and with the centralized authentication nodes called "Base stations". The information collected by the sensor nodes must protected against attacks and forgery in the collection and transfer of data. Because connected sensor nodes have low computing, memory, and power capabilities, and access to the radio medium is highly consumer of resources, traditional cryptographic protocols are not suitable for connected Things because of their heterogeneity. In this paper will present the various attacks against WSN in the context of IoT and proposed solutions exist in literature to securing the network against these attacks.
物联网是未来互联网不可分割的一部分,可以定义为基于互操作通信协议的全球动态网络基础设施,其中真实和虚拟的事物具有身份或地址,通过智能接口完美地集成到信息网络中。在连接的对象中,无线传感器网络WSN可以在它们之间以及与称为“基站”的集中认证节点之间生成、收集、存储和共享信息。传感器节点收集的信息在数据收集和传输过程中必须防止攻击和伪造。由于连接的传感器节点的计算、内存和功耗能力较低,并且访问无线电介质消耗大量资源,传统的加密协议由于其异构性而不适合被连接的事物。本文将介绍物联网背景下针对WSN的各种攻击,并提出文献中存在的解决方案,以保护网络免受这些攻击。
{"title":"A Study of the Security Problems of Wireless Sensor Networks into the Context of the Internet of Things","authors":"Benfilali Mostefa, Gafour Abdelkader","doi":"10.1145/3284557.3284699","DOIUrl":"https://doi.org/10.1145/3284557.3284699","url":null,"abstract":"The Internet of Things is an integral part of the Internet of the future and can defined as a global and dynamic network infrastructure based on interoperable communication protocols where real and virtual Things have an identity or address that through smart interfaces are perfectly integrated into an information network. Among the connected objects will be the Wireless Sensor Networks WSN that can generate, collect, store and share information between themselves and with the centralized authentication nodes called \"Base stations\". The information collected by the sensor nodes must protected against attacks and forgery in the collection and transfer of data. Because connected sensor nodes have low computing, memory, and power capabilities, and access to the radio medium is highly consumer of resources, traditional cryptographic protocols are not suitable for connected Things because of their heterogeneity. In this paper will present the various attacks against WSN in the context of IoT and proposed solutions exist in literature to securing the network against these attacks.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114935610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Office: A Voice-controlled Workplace for Everyone 智能办公室:适合所有人的语音控制工作场所
Z. Y. Chan, P. Shum
Home automation and the concept of Internet of Things (IoT) have been existing for more than a decade, with billions of devices connected to the internet. The conventional home automation system allows users to control household appliances such as lights, air-conditioning, surveillance camera etc. via smartphone applications, webpages and control panels. One of the major drawbacks is with the operation efficiency, where people would still need their hands on the physical interfaces to access the system. It could be quite inconvenient for specific groups such as the elderly and disabled people, who will not benefit much from such systems. In light of this, the project proposes a methodology and design of a voice-controlled environment with emphasis on speech recognition and voice control based on Amazon Alexa and Raspberry Pi. In this implementation, office users can easily control their office appliances with voice commands, where as the model can be implemented for smart home users as well. The proposed voice-controlled implementation comprises eight main features: 1) Control of wired electrical appliances; 2) Control of Radio Frequency (RF) and Infrared (IR) appliances; 3) YouTube connected entertainment system; 4) Digital memo; 5) Face recognition attendance taking system with SQL database; 6) Security surveillance; 7) Room occupancy detection; 8) Telegram-based voice-controlled text messaging. The proposed system not only saves time but also bring convenience to people.
家庭自动化和物联网(IoT)的概念已经存在了十多年,数十亿设备连接到互联网。传统的家庭自动化系统允许用户通过智能手机应用程序、网页和控制面板控制电灯、空调、监控摄像头等家用电器。其中一个主要的缺点是操作效率,人们仍然需要把手放在物理接口上才能访问系统。对于老年人和残疾人等特定群体来说,这可能会很不方便,因为他们不会从这种制度中得到太多好处。鉴于此,该项目提出了一种基于亚马逊Alexa和树莓派的语音识别和语音控制的语音控制环境的方法和设计。在此实现中,办公用户可以轻松地使用语音命令控制其办公设备,而该模型也可以为智能家居用户实现。提出的语音控制实现包括八个主要特征:1)有线电器的控制;2)控制射频(RF)和红外(IR)设备;3)连接YouTube的娱乐系统;4)数字备忘录;5)基于SQL数据库的人脸识别考勤系统;6)安全监控;7)房间占用检测;8)基于电报的语音控制短信。该系统不仅节省了时间,而且给人们带来了方便。
{"title":"Smart Office: A Voice-controlled Workplace for Everyone","authors":"Z. Y. Chan, P. Shum","doi":"10.1145/3284557.3284712","DOIUrl":"https://doi.org/10.1145/3284557.3284712","url":null,"abstract":"Home automation and the concept of Internet of Things (IoT) have been existing for more than a decade, with billions of devices connected to the internet. The conventional home automation system allows users to control household appliances such as lights, air-conditioning, surveillance camera etc. via smartphone applications, webpages and control panels. One of the major drawbacks is with the operation efficiency, where people would still need their hands on the physical interfaces to access the system. It could be quite inconvenient for specific groups such as the elderly and disabled people, who will not benefit much from such systems. In light of this, the project proposes a methodology and design of a voice-controlled environment with emphasis on speech recognition and voice control based on Amazon Alexa and Raspberry Pi. In this implementation, office users can easily control their office appliances with voice commands, where as the model can be implemented for smart home users as well. The proposed voice-controlled implementation comprises eight main features: 1) Control of wired electrical appliances; 2) Control of Radio Frequency (RF) and Infrared (IR) appliances; 3) YouTube connected entertainment system; 4) Digital memo; 5) Face recognition attendance taking system with SQL database; 6) Security surveillance; 7) Room occupancy detection; 8) Telegram-based voice-controlled text messaging. The proposed system not only saves time but also bring convenience to people.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128355640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Development of CoAP-based IoT Communication System for Smart Energy Storage System 基于coap的智能储能物联网通信系统开发
Y. Choo, Yong-jun Ha, Young-Bu Kim, Sang-Jin Lee, Hyun-Deuk Choi
Wireless Internet of Things (IoT) devices share several features such as limited energy supply, low computing power, limited memory size, and vulnerable radio communication network. IETF proposed the Constrained Application Protocol (CoAP) for this type of network. This paper presents implementation of CoAP into an embedded IoT device used for smart Energy Storage System (ESS) under microgrid environment. Confirmable message type was adopted to provide reliable communication. Since the frame size of IEEE 802.15.4 physical layer was limited to 127 bytes, the header of 6LoWPAN and UDP was compressed to reduce fragmentation and reassembly overhead. Performance of the communication service was tested by measuring round trip time between two end nodes of developed system.
无线物联网(IoT)设备有几个共同的特点,如有限的能源供应、低计算能力、有限的内存大小和易受攻击的无线电通信网络。IETF针对这种类型的网络提出了约束应用协议(CoAP)。本文介绍了在微电网环境下,将CoAP应用于智能储能系统(ESS)的嵌入式物联网设备中。采用可确认消息类型提供可靠通信。由于IEEE 802.15.4物理层的帧大小限制在127字节,因此对6LoWPAN和UDP的报头进行了压缩,以减少分片和重组开销。通过测量所开发系统两端节点之间的往返时间来测试通信服务的性能。
{"title":"Development of CoAP-based IoT Communication System for Smart Energy Storage System","authors":"Y. Choo, Yong-jun Ha, Young-Bu Kim, Sang-Jin Lee, Hyun-Deuk Choi","doi":"10.1145/3284557.3284706","DOIUrl":"https://doi.org/10.1145/3284557.3284706","url":null,"abstract":"Wireless Internet of Things (IoT) devices share several features such as limited energy supply, low computing power, limited memory size, and vulnerable radio communication network. IETF proposed the Constrained Application Protocol (CoAP) for this type of network. This paper presents implementation of CoAP into an embedded IoT device used for smart Energy Storage System (ESS) under microgrid environment. Confirmable message type was adopted to provide reliable communication. Since the frame size of IEEE 802.15.4 physical layer was limited to 127 bytes, the header of 6LoWPAN and UDP was compressed to reduce fragmentation and reassembly overhead. Performance of the communication service was tested by measuring round trip time between two end nodes of developed system.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130680525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and Integration of an IoT Device for Training Purposes of Industry 4.0 工业4.0培训用物联网设备的设计与集成
Hisham Elmoaqet, I. Ismael, Florian Patzolt, Mutaz Ryalat
Cyber-Physical Systems (CPS) fully integrate computational and physical processes. Embedded computers and networks monitor and control the physical processes, usually with feedback loops where physical processes affect computations and vice versa. Industry 4.0, otherwise known as the fourth industrial revolution, integrates people and digitally controlled machines with the internet and information technology. The most commonly used terms to describe the new development that is changing the industrial aspects, are Industry 4.0, Cyber-physical Systems, and the Internet of Things (IOT), which pave the way for smart production factories and the digital transformation. Models of CPS of Industry 4.0 (CPSI 4.0) present a high level of combination and coordination between physical and computational elements aiming to improve productivity and decrease production costs. This paper introduces a testbed for a cyber-physical system of Industry 4.0. The testbed is a serial line equipped with sensors to collect data at both the machine and system level. Various tools were utilized to aggregate, analyze, and display this data and prepare it for processing over the cloud. The implemented system leverages many of Industry 4.0 features such as predictive maintenance, Radio Frequency Identification (RFID), condition monitoring, communication technology and simple cyber-physical system security. The work presented is the basis for building a larger research testbed that could allow multidisciplinare research projects in this domain.
信息物理系统(CPS)完全集成了计算和物理过程。嵌入式计算机和网络监视和控制物理过程,通常具有反馈回路,其中物理过程影响计算,反之亦然。工业4.0,也被称为第四次工业革命,将人和数字控制机器与互联网和信息技术结合在一起。描述正在改变工业方面的新发展的最常用术语是工业4.0,网络物理系统和物联网(IOT),它们为智能生产工厂和数字化转型铺平了道路。工业4.0 (CPSI 4.0)的CPS模型呈现了物理和计算元素之间的高水平组合和协调,旨在提高生产率和降低生产成本。本文介绍了工业4.0网络物理系统的试验台。测试平台是一个串行线配备传感器收集数据在机器和系统级别。使用了各种工具来聚合、分析和显示这些数据,并为通过云进行处理做好准备。该系统利用了工业4.0的许多特性,如预测性维护、射频识别(RFID)、状态监测、通信技术和简单的网络物理系统安全。所提出的工作是建立一个更大的研究试验台的基础,该试验台可以允许该领域的多学科研究项目。
{"title":"Design and Integration of an IoT Device for Training Purposes of Industry 4.0","authors":"Hisham Elmoaqet, I. Ismael, Florian Patzolt, Mutaz Ryalat","doi":"10.1145/3284557.3284740","DOIUrl":"https://doi.org/10.1145/3284557.3284740","url":null,"abstract":"Cyber-Physical Systems (CPS) fully integrate computational and physical processes. Embedded computers and networks monitor and control the physical processes, usually with feedback loops where physical processes affect computations and vice versa. Industry 4.0, otherwise known as the fourth industrial revolution, integrates people and digitally controlled machines with the internet and information technology. The most commonly used terms to describe the new development that is changing the industrial aspects, are Industry 4.0, Cyber-physical Systems, and the Internet of Things (IOT), which pave the way for smart production factories and the digital transformation. Models of CPS of Industry 4.0 (CPSI 4.0) present a high level of combination and coordination between physical and computational elements aiming to improve productivity and decrease production costs. This paper introduces a testbed for a cyber-physical system of Industry 4.0. The testbed is a serial line equipped with sensors to collect data at both the machine and system level. Various tools were utilized to aggregate, analyze, and display this data and prepare it for processing over the cloud. The implemented system leverages many of Industry 4.0 features such as predictive maintenance, Radio Frequency Identification (RFID), condition monitoring, communication technology and simple cyber-physical system security. The work presented is the basis for building a larger research testbed that could allow multidisciplinare research projects in this domain.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125361859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Electromagnetic Sensing and Imaging for Stroke Detection 用于脑卒中检测的电磁传感与成像
Lulu Wang
Electromagnetic imaging has been investigated extensively to detect various diseases including breast cancer, stroke, lung ventilation, prostate cancer, and gastric emptying. This paper presents the compressive review on recent development in electromagnetic imaging techniques and instruments for brain stroke detection. Several electromagnetic sensing and imaging techniques, measurement systems and their biomedical applications are presented in this paper. This study also discusses the current challenges and future research directions of electromagnetic sensing and imaging techniques.
电磁成像已被广泛研究用于检测各种疾病,包括乳腺癌、中风、肺通气、前列腺癌和胃排空。本文简要介绍了脑卒中检测电磁成像技术和仪器的最新进展。本文介绍了几种电磁传感与成像技术、测量系统及其在生物医学上的应用。本文还讨论了电磁传感与成像技术目前面临的挑战和未来的研究方向。
{"title":"Electromagnetic Sensing and Imaging for Stroke Detection","authors":"Lulu Wang","doi":"10.1145/3284557.3284734","DOIUrl":"https://doi.org/10.1145/3284557.3284734","url":null,"abstract":"Electromagnetic imaging has been investigated extensively to detect various diseases including breast cancer, stroke, lung ventilation, prostate cancer, and gastric emptying. This paper presents the compressive review on recent development in electromagnetic imaging techniques and instruments for brain stroke detection. Several electromagnetic sensing and imaging techniques, measurement systems and their biomedical applications are presented in this paper. This study also discusses the current challenges and future research directions of electromagnetic sensing and imaging techniques.","PeriodicalId":272487,"journal":{"name":"Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123325144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1