Dependency analysis can better help neural network to capture semantic features in sentences, so as to extract entity relation. Currently, hard pruning strategies and soft pruning strategies based on dependency tree structure coding have been proposed to balance beneficial additional information and adverse interference in extraction tasks. A new model based on graph convolutional networks, which uses a variety of representations describing dependency trees from different perspectives and combining these representations to obtain a better sentence representation for relation classification is proposed. A newly defined module is added, and this module uses the attention mechanism to capture deeper semantic features from the context representation as the global semantic features of the input text, thus helping the model to capture deeper semantic information at the sentence level for relational extraction tasks. In order to get more information about a given entity pair from the input sentence, the authors also model implicit co-references (references) to entities. This model can extract semantic features related to the relationship between entities from sentences to the maximum extent. The results show that the model in this paper achieves good results on SemEval2010-Task8 and KBP37 datasets.
{"title":"Multiple dependence representation of attention graph convolutional network relation extraction model","authors":"Zhao Liangfu, Xiong Yujie, Gao Yongbin, Yu Wenjun","doi":"10.1049/cps2.12080","DOIUrl":"10.1049/cps2.12080","url":null,"abstract":"<p>Dependency analysis can better help neural network to capture semantic features in sentences, so as to extract entity relation. Currently, hard pruning strategies and soft pruning strategies based on dependency tree structure coding have been proposed to balance beneficial additional information and adverse interference in extraction tasks. A new model based on graph convolutional networks, which uses a variety of representations describing dependency trees from different perspectives and combining these representations to obtain a better sentence representation for relation classification is proposed. A newly defined module is added, and this module uses the attention mechanism to capture deeper semantic features from the context representation as the global semantic features of the input text, thus helping the model to capture deeper semantic information at the sentence level for relational extraction tasks. In order to get more information about a given entity pair from the input sentence, the authors also model implicit co-references (references) to entities. This model can extract semantic features related to the relationship between entities from sentences to the maximum extent. The results show that the model in this paper achieves good results on SemEval2010-Task8 and KBP37 datasets.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 3","pages":"247-257"},"PeriodicalIF":1.7,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12080","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135590945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongjin Yao, Yisheng Li, Yunpeng Sun, Zhichao Lian
Recent work has shown that deep reinforcement learning (DRL) is vulnerable to adversarial attacks, so that exploiting vulnerabilities in DRL systems through adversarial attack techniques has become a necessary prerequisite for building robust DRL systems. Compared to traditional deep learning systems, DRL systems are characterised by long sequential decisions rather than one-step decision, so attackers must perform multi-step attacks on them. To successfully attack a DRL system, the number of attacks must be minimised to avoid detecting by the victim agent and to ensure the effectiveness of the attack. Some selective attack methods proposed in recent researches, that is, attacking an agent at partial time steps, are not applicable to real-time attack scenarios, although they can avoid detecting by the victim agent. A real-time selective attack method that is applicable to environments with discrete action spaces is proposed. Firstly, the optimal attack threshold T for performing selective attacks in the environment Env is determined. Then, the observation states corresponding to when the value of the action preference function of the victim agent in multiple eposides exceeds the threshold T are added to the training set according to this threshold. Finally, a universal perturbation is generated based on this training set, and it is used to perform real-time selective attacks on the victim agent. Comparative experiments show that our attack method can perform real-time attacks while maintaining the attack effect and stealthiness.
最近的研究表明,深度强化学习(DRL)很容易受到对抗性攻击,因此通过对抗性攻击技术利用DRL系统中的漏洞已成为构建稳健的DRL系统的必要前提。与传统的深度学习系统相比,DRL 系统的特点是长序列决策而非一步决策,因此攻击者必须对其实施多步骤攻击。要成功攻击 DRL 系统,必须尽量减少攻击次数,以避免被受害代理检测到,并确保攻击的有效性。近期研究中提出的一些选择性攻击方法,即在部分时间步骤攻击一个代理,虽然可以避免被受害代理检测到,但不适用于实时攻击场景。本文提出了一种适用于离散行动空间环境的实时选择性攻击方法。首先,确定在环境 Env 中进行选择性攻击的最佳攻击阈值 T。然后,根据该阈值,将多个外延中受害代理的行动偏好函数值超过阈值 T 时对应的观测状态添加到训练集中。最后,根据该训练集生成通用扰动,并利用它对受害代理进行实时选择性攻击。对比实验表明,我们的攻击方法可以在保持攻击效果和隐蔽性的同时进行实时攻击。
{"title":"Selective real-time adversarial perturbations against deep reinforcement learning agents","authors":"Hongjin Yao, Yisheng Li, Yunpeng Sun, Zhichao Lian","doi":"10.1049/cps2.12065","DOIUrl":"10.1049/cps2.12065","url":null,"abstract":"<p>Recent work has shown that deep reinforcement learning (DRL) is vulnerable to adversarial attacks, so that exploiting vulnerabilities in DRL systems through adversarial attack techniques has become a necessary prerequisite for building robust DRL systems. Compared to traditional deep learning systems, DRL systems are characterised by long sequential decisions rather than one-step decision, so attackers must perform multi-step attacks on them. To successfully attack a DRL system, the number of attacks must be minimised to avoid detecting by the victim agent and to ensure the effectiveness of the attack. Some selective attack methods proposed in recent researches, that is, attacking an agent at partial time steps, are not applicable to real-time attack scenarios, although they can avoid detecting by the victim agent. A real-time selective attack method that is applicable to environments with discrete action spaces is proposed. Firstly, the optimal attack threshold <i>T</i> for performing selective attacks in the environment <i>Env</i> is determined. Then, the observation states corresponding to when the value of the action preference function of the victim agent in multiple eposides exceeds the threshold <i>T</i> are added to the training set according to this threshold. Finally, a universal perturbation is generated based on this training set, and it is used to perform real-time selective attacks on the victim agent. Comparative experiments show that our attack method can perform real-time attacks while maintaining the attack effect and stealthiness.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 1","pages":"41-49"},"PeriodicalIF":1.5,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12065","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136061808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yongquan Wu, Xuan Zhao, Xinsheng Zhang, Tao Long, Ping Luo
Single-image dehazing is a highly challenging ill-posed task in the field of computer vision. To address this, a new image dehazing model with feature attention, named feature attention gated context aggregation network (FAGCA-Net), is proposed to tackle the issues of incomplete or over-dehazing caused by the original model's inability to handle non-uniform haze density distributions. A feature attention module that combines channel attention and spatial attention is introduced. Additionally, the authors propose a new extended attention convolutional block, which not only addresses the grid artefacts caused by the extended convolution but also provides added flexibility in handling different types of feature information. At the same time, in addition to the input image itself, incorporating the dark channel and edge channel of the image as the final input of the model is helpful for the model learning process. To demonstrate the robustness of the new model, it is applied to two completely different dehazing datasets, and it achieves significant dehazing performance improvement over the original model. Finally, to verify the effectiveness of the model in practical production processes, the authors apply it as an image preprocessing step to a set of UAV (Unmanned Aerial Vehicle) images of foreign objects. The result shows that the UAV images after being processed by FAGCA-Net for haze removal have a better impact on subsequent usage.
{"title":"Feature attention gated context aggregation network for single image dehazing and its application on unmanned aerial vehicle images","authors":"Yongquan Wu, Xuan Zhao, Xinsheng Zhang, Tao Long, Ping Luo","doi":"10.1049/cps2.12076","DOIUrl":"10.1049/cps2.12076","url":null,"abstract":"<p>Single-image dehazing is a highly challenging ill-posed task in the field of computer vision. To address this, a new image dehazing model with feature attention, named feature attention gated context aggregation network (FAGCA-Net), is proposed to tackle the issues of incomplete or over-dehazing caused by the original model's inability to handle non-uniform haze density distributions. A feature attention module that combines channel attention and spatial attention is introduced. Additionally, the authors propose a new extended attention convolutional block, which not only addresses the grid artefacts caused by the extended convolution but also provides added flexibility in handling different types of feature information. At the same time, in addition to the input image itself, incorporating the dark channel and edge channel of the image as the final input of the model is helpful for the model learning process. To demonstrate the robustness of the new model, it is applied to two completely different dehazing datasets, and it achieves significant dehazing performance improvement over the original model. Finally, to verify the effectiveness of the model in practical production processes, the authors apply it as an image preprocessing step to a set of UAV (Unmanned Aerial Vehicle) images of foreign objects. The result shows that the UAV images after being processed by FAGCA-Net for haze removal have a better impact on subsequent usage.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 3","pages":"218-227"},"PeriodicalIF":1.7,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12076","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136375950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cyberattacks on cyber-physical systems (CPS) have the potential to cause widespread disruption and affect the safety of millions of people. Machine learning can be an effective tool for detecting attacks on CPS, including the most stealthy types of attacks, known as covert channel attacks. In this study, the authors describe a novel hierarchical ensemble architecture for detecting covert channel attacks in CPS. Our proposed approach uses a combination of TCP payload entropy and network flows for feature engineering. Our approach achieves high detection performance, shortens the model training duration, and shows promise for effective detection of covert channel communications. This novel architecture closely mirrors the CPS attack stages in real-life, providing flexibility and adaptability in detecting new types of attacks.
{"title":"Detecting covert channel attacks on cyber-physical systems","authors":"Hongwei Li, Danai Chasaki","doi":"10.1049/cps2.12078","DOIUrl":"10.1049/cps2.12078","url":null,"abstract":"<p>Cyberattacks on cyber-physical systems (CPS) have the potential to cause widespread disruption and affect the safety of millions of people. Machine learning can be an effective tool for detecting attacks on CPS, including the most stealthy types of attacks, known as covert channel attacks. In this study, the authors describe a novel hierarchical ensemble architecture for detecting covert channel attacks in CPS. Our proposed approach uses a combination of TCP payload entropy and network flows for feature engineering. Our approach achieves high detection performance, shortens the model training duration, and shows promise for effective detection of covert channel communications. This novel architecture closely mirrors the CPS attack stages in real-life, providing flexibility and adaptability in detecting new types of attacks.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 3","pages":"228-237"},"PeriodicalIF":1.7,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12078","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136308695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The dimension of relevant text feature space and feature weight of substation main equipment defect information is high, so it is difficult to accurately select mining features. The Natural Language Processing (NLP) medium and short-term neural network model is used to realise the defect information text feature word segmentation in the log. After extracting the text features of defect information of main substation equipment with high categories to form the feature space; the TF-IDF algorithm is designed to calculate the importance weight of text keywords, judge the criticality of defect information text feature vocabulary, accurately locate defect information text features, and realise defect information text feature mining. Experiments show that the algorithm has high precision for specific word segmentation of massive substation main equipment log information.
{"title":"Feature selection algorithm for substation main equipment defect text mining based on natural language processing","authors":"Xiaoqing Mai, Tianhu Zhang, Changwu Hu, Yan Zhang","doi":"10.1049/cps2.12079","DOIUrl":"10.1049/cps2.12079","url":null,"abstract":"<p>The dimension of relevant text feature space and feature weight of substation main equipment defect information is high, so it is difficult to accurately select mining features. The Natural Language Processing (NLP) medium and short-term neural network model is used to realise the defect information text feature word segmentation in the log. After extracting the text features of defect information of main substation equipment with high categories to form the feature space; the TF-IDF algorithm is designed to calculate the importance weight of text keywords, judge the criticality of defect information text feature vocabulary, accurately locate defect information text features, and realise defect information text feature mining. Experiments show that the algorithm has high precision for specific word segmentation of massive substation main equipment log information.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 3","pages":"238-246"},"PeriodicalIF":1.7,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12079","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136312991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yue Meng, Yu Song, Yuquan Chen, Xin Zhang, Mei Wu, Biao Du
The authors propose a novel object detection algorithm for identifying bird nests in medium voltage power line aerial images, which is crucial for ensuring the safe operation of the power grid. The algorithm utilises an improved Swin Transformer as the main feature extraction network of Fast R-CNN, further enhanced with a channel attention and modified binary self-attention mechanism to improve the feature representation ability. The proposed algorithm is evaluated on a newly constructed image dataset of medium voltage transmission lines containing bird nests, which are annotated and classified. Experimental results show that the proposed algorithm achieves satisfied accuracy and robustness in recognising bird nests compared to traditional algorithms.
{"title":"A swin transformer based bird nest detection approach with unmanned aerial vehicle images for power distribution and pole towers","authors":"Yue Meng, Yu Song, Yuquan Chen, Xin Zhang, Mei Wu, Biao Du","doi":"10.1049/cps2.12073","DOIUrl":"10.1049/cps2.12073","url":null,"abstract":"<p>The authors propose a novel object detection algorithm for identifying bird nests in medium voltage power line aerial images, which is crucial for ensuring the safe operation of the power grid. The algorithm utilises an improved Swin Transformer as the main feature extraction network of Fast R-CNN, further enhanced with a channel attention and modified binary self-attention mechanism to improve the feature representation ability. The proposed algorithm is evaluated on a newly constructed image dataset of medium voltage transmission lines containing bird nests, which are annotated and classified. Experimental results show that the proposed algorithm achieves satisfied accuracy and robustness in recognising bird nests compared to traditional algorithms.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"184-193"},"PeriodicalIF":1.5,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12073","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135107852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An asymmetric semantic multi-level segmentation method based on depth learning is proposed in order to improve the precision and effect of semantic segmentation. A ‘content tree’ structure and an adjacency matrix are constructed to represent the parent-child relationship between each image sub region in a complete image. Through multiple combinations of spatial attention mechanism and channel attention mechanism, the similarity semantic features of the target object can be selectively aggregated, so as to enhance its feature expression and avoid the impact of significant objects. The asymmetric semantic segmentation model asymmetric pyramid feature convolutional network (APFCN) is constructed, and the path feature extraction and parameter adjustment are realised through APFCN. On the basis of APFCN network, a full convolution network is introduced for end-to-end image semantic segmentation. Combining the advantages of convolution network in extracting image features and the advantages of short-term and short-term memory network in solving long-term dependence, an end-to-end hybrid depth network is constructed for image semantic multi-level segmentation. The experimental results show that the mean intersection over Union value and mean pixel accuracy value are higher than that of the literature method, both of which are increased by more than 3%, and the segmentation effect is good.
{"title":"A multilevel segmentation method of asymmetric semantics based on deep learning","authors":"Angxin Liu, Yongbiao Yang","doi":"10.1049/cps2.12075","DOIUrl":"10.1049/cps2.12075","url":null,"abstract":"<p>An asymmetric semantic multi-level segmentation method based on depth learning is proposed in order to improve the precision and effect of semantic segmentation. A ‘content tree’ structure and an adjacency matrix are constructed to represent the parent-child relationship between each image sub region in a complete image. Through multiple combinations of spatial attention mechanism and channel attention mechanism, the similarity semantic features of the target object can be selectively aggregated, so as to enhance its feature expression and avoid the impact of significant objects. The asymmetric semantic segmentation model asymmetric pyramid feature convolutional network (APFCN) is constructed, and the path feature extraction and parameter adjustment are realised through APFCN. On the basis of APFCN network, a full convolution network is introduced for end-to-end image semantic segmentation. Combining the advantages of convolution network in extracting image features and the advantages of short-term and short-term memory network in solving long-term dependence, an end-to-end hybrid depth network is constructed for image semantic multi-level segmentation. The experimental results show that the mean intersection over Union value and mean pixel accuracy value are higher than that of the literature method, both of which are increased by more than 3%, and the segmentation effect is good.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"194-205"},"PeriodicalIF":1.5,"publicationDate":"2023-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12075","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135437827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Li Ying, Zhao Lei, Geng Junwei, Hu Jinhui, Ma Lei, Zhao Zilong
In industrial environments, workers should wear workwear for safety considerations. For the same reason, smoking is also prohibited. Due to the supervision of monitoring devices, workers have reduced smoking behaviours and started wearing workwear. To meet the requirements for detecting these behaviours in real-time monitoring videos with high speed and accuracy, the authors proposed an improved YOLOv5 model with the Triplet Attention mechanism. This mechanism strengthens the connection between channel and spatial dimensions, focuses the network on important parts, and improves feature extraction. Compared to the original YOLOv5 model, the addition of the mechanism increases the parameters by only 0.04%. The recall rate of the YOLOv5 model is enhanced while its prediction speed is maintained with only a minimal increase in parameters. Experiment results show that, compared to the original model, the improved YOLOv5 has a recall rate of 78.8%, 91%, and 89.3% for detecting smoking behaviour, not wearing helmets, and inappropriate workwear, respectively.
{"title":"Unsafe behaviour detection with the improved YOLOv5 model","authors":"Li Ying, Zhao Lei, Geng Junwei, Hu Jinhui, Ma Lei, Zhao Zilong","doi":"10.1049/cps2.12070","DOIUrl":"10.1049/cps2.12070","url":null,"abstract":"<p>In industrial environments, workers should wear workwear for safety considerations. For the same reason, smoking is also prohibited. Due to the supervision of monitoring devices, workers have reduced smoking behaviours and started wearing workwear. To meet the requirements for detecting these behaviours in real-time monitoring videos with high speed and accuracy, the authors proposed an improved YOLOv5 model with the Triplet Attention mechanism. This mechanism strengthens the connection between channel and spatial dimensions, focuses the network on important parts, and improves feature extraction. Compared to the original YOLOv5 model, the addition of the mechanism increases the parameters by only 0.04%. The recall rate of the YOLOv5 model is enhanced while its prediction speed is maintained with only a minimal increase in parameters. Experiment results show that, compared to the original model, the improved YOLOv5 has a recall rate of 78.8%, 91%, and 89.3% for detecting smoking behaviour, not wearing helmets, and inappropriate workwear, respectively.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 1","pages":"87-98"},"PeriodicalIF":1.5,"publicationDate":"2023-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12070","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135438294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Katherine van-Lopik, Steven Hayward, Rebecca Grant, Laura McGirr, Paul Goodall, Yan Jin, Mark Price, Andrew A. West, Paul P. Conway
Within the Industry 4.0 landscape, humans collaborate with cyber and physical elements to form human-cyber-physical systems (HCPS). These environments are increasingly complex and challenging workspaces due to increasing levels of automation and data availability. An effective system design requires suitable frameworks that consider human activities and needs whilst supporting overall system efficacy. Although several reviews of frameworks for technology were identified, none of these focused on the human in the system (moving towards Industry 5). The critical literature review presented provides a summary of HCPS frameworks, maps the considerations for a human in HCPS, and provides insight for future framework and system development. The challenges, recommendations, and areas for further research are discussed.
{"title":"A review of design frameworks for human-cyber-physical systems moving from industry 4 to 5","authors":"Katherine van-Lopik, Steven Hayward, Rebecca Grant, Laura McGirr, Paul Goodall, Yan Jin, Mark Price, Andrew A. West, Paul P. Conway","doi":"10.1049/cps2.12077","DOIUrl":"10.1049/cps2.12077","url":null,"abstract":"<p>Within the Industry 4.0 landscape, humans collaborate with cyber and physical elements to form human-cyber-physical systems (HCPS). These environments are increasingly complex and challenging workspaces due to increasing levels of automation and data availability. An effective system design requires suitable frameworks that consider human activities and needs whilst supporting overall system efficacy. Although several reviews of frameworks for technology were identified, none of these focused on the human in the system (moving towards Industry 5). The critical literature review presented provides a summary of HCPS frameworks, maps the considerations for a human in HCPS, and provides insight for future framework and system development. The challenges, recommendations, and areas for further research are discussed.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"169-183"},"PeriodicalIF":1.5,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12077","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134971012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Online presence is becoming an important part of everyday's life and online communities may represent a significant source of engagement for the elderlies. Nevertheless, many may struggle to be online due to a lack of expertise, and a decentralised architecture may provide a solution by removing intermediaries, such as a webmaster, while not requiring expensive cloud solutions. However, issues concerning accessibility, security, and user experience have to be tackled. The paper focuses mainly on three issues: providing a human-readable domain, moderating content, and creating a reward system based on user reputation. An architecture is proposed based on Ethereum and Swarm. Smart contracts provide an automated set of rules to handle enterprise registration, content creation, and decision-making process, while Swarm serves both as distributed storage and the web host. Besides, in combination with Ethereum Name Service, Swarm provides a secure, distributed, and human-readable point of access to the web interface. The paper also describes an innovative two-token system where one token is meant to be a trustworthy reputation metre and the other is a spendable coin to get rewards. The final result is a fully decentralised, authenticated and moderated platform where users can aggregate and share their content presentations on the Internet.
{"title":"SwarmAd: A decentralised content management system","authors":"Tommaso Baldo, Mauro Migliardi","doi":"10.1049/cps2.12071","DOIUrl":"10.1049/cps2.12071","url":null,"abstract":"<p>Online presence is becoming an important part of everyday's life and online communities may represent a significant source of engagement for the elderlies. Nevertheless, many may struggle to be online due to a lack of expertise, and a decentralised architecture may provide a solution by removing intermediaries, such as a webmaster, while not requiring expensive cloud solutions. However, issues concerning accessibility, security, and user experience have to be tackled. The paper focuses mainly on three issues: providing a human-readable domain, moderating content, and creating a reward system based on user reputation. An architecture is proposed based on Ethereum and Swarm. Smart contracts provide an automated set of rules to handle enterprise registration, content creation, and decision-making process, while Swarm serves both as distributed storage and the web host. Besides, in combination with Ethereum Name Service, Swarm provides a secure, distributed, and human-readable point of access to the web interface. The paper also describes an innovative two-token system where one token is meant to be a trustworthy reputation metre and the other is a spendable coin to get rewards. The final result is a fully decentralised, authenticated and moderated platform where users can aggregate and share their content presentations on the Internet.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"102-114"},"PeriodicalIF":1.5,"publicationDate":"2023-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12071","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81441781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}