scholarly journals Design of Secure Microcontroller-Based Systems: Application to Mobile Robots for Perimeter Monitoring

Sensors ◽  
2021 ◽  
Vol 21 (24) ◽  
pp. 8451
Author(s):  
Dmitry Levshun ◽  
Andrey Chechulin ◽  
Igor Kotenko

This paper describes an original methodology for the design of microcontroller-based physical security systems and its application for the system of mobile robots. The novelty of the proposed methodology lies in combining various design algorithms on the basis of abstract and detailed system representations. The suggested design approach, which is based on the methodology, is modular and extensible, takes into account the security of the physical layer of the system, works with the abstract system representation and is looking for a trade-off between the security of the final solution and the resources expended on it. Moreover, unlike existing solutions, the methodology has a strong focus on security. It is aimed at ensuring the protection of the system against attacks at the design stage, considers security components as an integral part of the system and checks if the system can be designed in accordance with given requirements and limitations. An experimental evaluation of the methodology was conducted with help of its software implementation that consists of Python script, PostgreSQL database, Tkinter interface and available for download on our GitHub. As a use case, the system of mobile robots for perimeter monitoring was chosen. During the experimental evaluation, the design time was measured depending on the parameters of the attacker against which system security must be ensured. Moreover, the software implementation of the methodology was analyzed in compliance with requirements and compared with analogues. The advantages and disadvantages of the methodology as well as future work directions are indicated.

2019 ◽  
Author(s):  
Vaclav Janecek

This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is framed around two main approaches shaping all ownership theories: a bottom-up and top-down approach. Via these dual lenses, the article reviews existing debates relating to four elements supporting introduction of ownership of personal data, namely the elements of control, protection, valuation, and allocation of personal data. It then explores the explanatory advantages and disadvantages of the two approaches in relation to each of these elements as well as to ownership of personal data in IoT at large. Lastly, the article outlines a revised approach to ownership of personal data in IoT that may serve as a blueprint for future work in this area and inform regulatory and policy debates.


Author(s):  
Monica Dragoicea ◽  
Joao Falcao e Cunha ◽  
Monica Viorela Alexandru ◽  
Denisa Andreea Constantinescu

This chapter discusses the development of improved citizen services taking into consideration integration of agent-based modelling and simulation experience into conceiving, design and implementation activities with a strong focus on technology enabled service systems. Service design is formalized here towards the integration of customer experience, validated through service interaction modelling. Integration of user experience at design stage in the value co-creation process is a possible immediate evolution direction of projects in the Smarter Cities perspective. Guidelines for integrating a modelling and simulation perspective in service design are presented along with the Socio-Technical Systems Engineering process. The case study presented here is dedicated to Smart Transport. The chapter opens a larger discussion on specific research directions and knowledge transfer related to Smart Transport as highlighted in EU projects.


Author(s):  
Daniel Clarke-Hagan ◽  
Michael Curran ◽  
John Spillane ◽  
Mary-Catherine Greene

The calculations of life cycle costs (LCC) and whole life costs (WLC) are important tools in the life cycle of a project. The aim of this research is to examine life cycle costing, whole life costing, and the possible advantages and disadvantages to their introduction and use. A qualitative methodology encompassing an in-depth literature review, interviews, and qualitative analysis using mind mapping software, this research is important as it can add to the industry's understanding of the design process. It highlights reasons for the success or failure of a construction project, in terms of sustainability at the design stage. Results indicate that the researched topics had many advantages but also had inherent disadvantages. It is found that the potential advantages outweighed disadvantages, but uptake within industry is still slow and that better promotion and their benefits to sustainability, the environment, society, and the industry are required.


Electronics ◽  
2020 ◽  
Vol 9 (12) ◽  
pp. 2162
Author(s):  
Changqi Sun ◽  
Cong Zhang ◽  
Naixue Xiong

Infrared and visible image fusion technologies make full use of different image features obtained by different sensors, retain complementary information of the source images during the fusion process, and use redundant information to improve the credibility of the fusion image. In recent years, many researchers have used deep learning methods (DL) to explore the field of image fusion and found that applying DL has improved the time-consuming efficiency of the model and the fusion effect. However, DL includes many branches, and there is currently no detailed investigation of deep learning methods in image fusion. In this work, this survey reports on the development of image fusion algorithms based on deep learning in recent years. Specifically, this paper first conducts a detailed investigation on the fusion method of infrared and visible images based on deep learning, compares the existing fusion algorithms qualitatively and quantitatively with the existing fusion quality indicators, and discusses various fusions. The main contribution, advantages, and disadvantages of the algorithm. Finally, the research status of infrared and visible image fusion is summarized, and future work has prospected. This research can help us realize many image fusion methods in recent years and lay the foundation for future research work.


Geosciences ◽  
2019 ◽  
Vol 9 (9) ◽  
pp. 392 ◽  
Author(s):  
Sheng Wang ◽  
Shucai Li ◽  
Liping Li ◽  
Shaoshuai Shi ◽  
Zongqing Zhou ◽  
...  

Water inrush is one of the most frequent and harmful geological disasters in tunnel construction. In order to effectively prevent and control the occurrence of water inrush, an early warning method based on fine risk evaluation and hierarchical advanced forecast is proposed. Water inrush is a complex dynamic coupling factors system, the relationship between influencing factors and water inrush is strongly nonlinear. Therefore, the efficacy coefficient model, which has the advantages of standardization, conciseness, and freedom from subjective factors, is improved nonlinearly. The fine risk evaluation theory and method based on the improved efficacy coefficient model consisted of two parts: one is static evaluation used in design stage, and the other is dynamic evaluation applied in the construction stage. The index weights are determined scientifically and reasonably by Analytical Hierarchy Process (AHP) and the entropy method. According to the fine risk evaluation results, combined with the advantages and disadvantages of various forecasting methods, a multistep hierarchical detection method of disaster resources for water inrush is proposed to identify the occurrence characteristics and failure level of disaster sources. The theory has been successfully applied to the #3 inclined well of Yuelongmen Tunnel in Cheng-Lan Railway. The evaluation results had good agreement with the actual excavation data, which indicates that the model is of high credibility and feasibility. The method could improve the prediction accuracy of water inrush and explore geometric characteristics and filling of disaster-causing structures. It is of great significance for avoiding water inrush and guiding the rapid and safe tunnel construction.


1953 ◽  
Vol 43 (2) ◽  
pp. 223-228 ◽  
Author(s):  
D. G. Armstrong ◽  
Brynmor Thomas

1. Earlier work on the digestibility of Calluna vulgaris has been briefly reviewed.2. Determination of the digestibility of heather has been made by two methods, viz. (a) the conventional procedure involving the use of metabolism crates and (b) the lignin-ratio technique applied to tethered sheep.3. A diet consisting of heather alone, and fed in metabolism crates, proved unsatisfactory as a result of low feed intake. Agreement between duplicate sheep in respect of digestive capacity was also poor.4. Satisfactory feed intakes were attained when heather was admixed at levels of 40 and 70% with hay. At both levels the digestibility of the organic matter was approximately the same, and agreement between sheep was good except for crude protein.5. The lignin-ratio technique applied to tethered sheep gave digestibility coefficients for organic matter which were consistent with those obtained by the conventional method; the values for crude protein were somewhat higher. While the organic matter of 10-year-old heather was digested to about the same extent as that of 4-year-old heather, its crude protein digestibility was rather less.6. The advantages and disadvantages of both methods have been discussed; it has been concluded that the lignin-ratio technique is likely to play a useful part in future work of this kind.7. These preliminary results suggest that heather has a higher nutritive value than earlier work would indicate, and that even the winter foliage may compare favourably with hay of moderate to poor quality.


2021 ◽  
Vol 19 (3) ◽  
pp. 55-64
Author(s):  
K. N. Maiorov ◽  

The paper examines the life cycle of field development, analyzes the processes of the field development design stage for the application of machine learning methods. For each process, relevant problems are highlighted, existing solutions based on machine learning methods, ideas and problems are proposed that could be effectively solved by machine learning methods. For the main part of the processes, examples of solutions are briefly described; the advantages and disadvantages of the approaches are identified. The most common solution method is feed-forward neural networks. Subject to preliminary normalization of the input data, this is the most versatile algorithm for regression and classification problems. However, in the problem of selecting wells for hydraulic fracturing, a whole ensemble of machine learning models was used, where, in addition to a neural network, there was a random forest, gradient boosting and linear regression. For the problem of optimizing the placement of a grid of oil wells, the disadvantages of existing solutions based on a neural network and a simple reinforcement learning approach based on Markov decision-making process are identified. A deep reinforcement learning algorithm called Alpha Zero is proposed, which has previously shown significant results in the role of artificial intelligence for games. This algorithm is a decision tree search that directs the neural network: only those branches that have received the best estimates from the neural network are considered more thoroughly. The paper highlights the similarities between the tasks for which Alpha Zero was previously used, and the task of optimizing the placement of a grid of oil producing wells. Conclusions are made about the possibility of using and modifying the algorithm of the optimization problem being solved. Аn approach is proposed to take into account symmetric states in a Monte Carlo tree to reduce the number of required simulations.


Author(s):  
Vladimir Frolov ◽  
Alexey Gennadievich Voloboy ◽  
Sergey Valentinovich Ershov ◽  
Vladimir Alexandrovich Galaktionov

Modern realistic computer graphics are based on light transport simulation. In this case, one of the main and difficult to calculate tasks is to calculate the global illumination, i.e. distribution of light in a virtual scene, taking into account multiple reflections and scattering of light and all kinds of its interaction with objects in the scene. Hundreds of publications and describing dozens of methods are devoted to this problem. In this state-of-the-art review, we would like not only to list and briefly describe these methods, but also to give some “map” of existing works, which will allow the reader to navigate, understand their advantages and disadvantages, and, thereby, choose a right method for themselves. Particular attention is paid to such characteristics of the methods as robustness and universality in relation to the used mathematical models, the transparency of the method verification, the possibility of efficient implementation on the GPU, as well as restrictions imposed on the scene or illumination phenomena. In contrast to the existing survey papers, not only the efficiency of the methods is analyzed, but also their limitations and the complexity of software implementation. In addition, we provide the results of our own numerical experiments with various methods that serve as illustrations for the conclusions.


Author(s):  
Chun-Shien Lu ◽  
Hong-Yuan Mark Liao ◽  
Jan-Ru Chen ◽  
Kuo-Chin Fan

Digital watermarking has been proposed as very useful technology in the protection of digital data such as image, audio, video, formatted documents (PDF or PS), and 3D objects. In the literature, most of the existing watermarking approaches are conducted on images. However, video is even more useful and should be protected with higher priority. In particular, video sequences usually contain rich properties that images do not have. On the other hand, the types of attacks applied on a video are much different from those applied on an image. In this chapter, we will focus ourselves specifically on video watermarking. The content of this chapter is divided into two parts. In the first part, the existing video watermarking techniques are briefly reviewed. We have pointed out their advantages and disadvantages to realize what can be done about video watermarking. In the second part, we propose a compressed domain video watermarking scheme for copyright protection. For the sake of real-time video watermark detection, our method is directly conducted in the MPEG-2 bitstream. More specifically, watermarks are inserted into the VLC domain. We shall discuss how to select proper data in a video bitstream to embed watermarks while preserving perceptual fidelity. In addition, video watermarks are embedded by a new proposed watermarking technique, which is based on the concept of communications with side information. The power of our method is reflected by its robust capability against attacks. Future work will also be pointed out to further improve the current scheme


Sign in / Sign up

Export Citation Format

Share Document