The integration of private fifth-generation (5G) networks with standardized publish-subscribe (PubSub) communication models offers clear benefits for Industry 4.0 applications. While PubSub models ensure vendor-neutra...
详细信息
ISBN:
(纸本)9798350304060;9798350304053
The integration of private fifth-generation (5G) networks with standardized publish-subscribe (PubSub) communication models offers clear benefits for Industry 4.0 applications. While PubSub models ensure vendor-neutral interoperability, backward compatibility, and mature information modeling, the use of 5G non-public networks (NPN) provides dedicated coverage, exclusive capacity, intrinsic controllability, and customized service and operation. In addition, the combination of PubSub protocols and 5G provides a complete communication stack for industrial automation, where PubSub protocols operate on higher OSI layers, and 5G operates on lower layers. However, the practical implications of the integration of PubSub models with 5G systems remain largely unaddressed in the existing literature. To the best of the authors' knowledge, this paper presents the first empirical evaluation of the integration of private 5G with a PubSub protocol, namely open platform communication unified architecture (OPC-UA), in a real production environment. The proposed solution for 5G and OPC-UA integration relies on layer 2 (L2) connectivity over a virtual extensible local area network (VXLAN) tunnel. Evaluation results demonstrate the feasibility of such integration in the context of a soft real-time additive manufacturing (AM) use case for laser metal deposition (LMD)-based manufacturing.
The integration of Digital Twins (DTs) with Extended reality (XR) technologies, such as Virtual reality (VR) and Augmented reality (AR), is transforming industries by enabling more immersive, interactive experiences a...
详细信息
The rise in UAV capabilities has significantly boosted aerial monitoring activities in recent years. This surge in unmanned aerial vehicles has increased attention towards monitoring tasks in vital areas, such as urba...
详细信息
ISBN:
(纸本)9798350357899;9798350357882
The rise in UAV capabilities has significantly boosted aerial monitoring activities in recent years. This surge in unmanned aerial vehicles has increased attention towards monitoring tasks in vital areas, such as urban spaces for security, surveillance or Internet of the Things applications. In this sense, we propose an open-source software-in-the-loop approach that integrates the complete navigation experience, accounting for potential wind-related effects, and providing realistic 3D modeling of scenarios encompassing open spaces in city landscapes. Our work introduces a wind perturbation estimation strategy, which models the wind effect as an external force along the Zaxis based on altitude variations from real flights. Validation was conducted using real data flights with a quadrotor aiding the navigation with Ardupilot and QgroundControl as a ground station. To complement the experiments we include a small test with a fixed-wing plane to asses the software-in-the-loop accuracy on larger trajectories. Results demonstrate successful tracking of altitude variations, yielding errors below 10% relative to the home position in experiments with average trajectory lengths of 150 m in two scenarios in Quito. The software-in-the-loop simulation aimed to replicate wind conditions specific to the date and time of real data acquisition, providing a platform to emulate possible improvements and assess UAV performance before deployment in actual missions. This research not only contributes to the optimization of monitoring capabilities but also serves as a valuable tool for assessing UAV missions in diverse and dynamic environments.
Today's edge networks continue to see an increasing number of deployed IoT devices. These IoT devices aim to increase productivity and efficiency;however, they are plagued by a myriad of vulnerabilities. Industry ...
详细信息
ISBN:
(纸本)9781665441889
Today's edge networks continue to see an increasing number of deployed IoT devices. These IoT devices aim to increase productivity and efficiency;however, they are plagued by a myriad of vulnerabilities. Industry and academia have proposed protecting these devices by deploying a "bolt-on" security gateway to these edge networks. The gateway applies security protections at the network level. While security gateways are an attractive solution, they raise a fundamental concern: Can the bolt-on security gateway be trusted? This paper identifies key challenges in realizing this goal and sketches a roadmap for providing trust in bolt-on edge IoT security gateways. Specifically, we show the promise of using a micro-hypervisor driven approach for delivering practical (deployable today) trust that is catered to both end-users and gateway vendors alike in terms of cost, generality, capabilities, and performance. We describe the challenges in establishing trust on today's edge security gateways, formalize the adversary and trust properties, describe our system architecture, encode and prove our architecture trust properties using the Alloy formal modeling language. We foresee our trustworthy security gateway architecture becoming a practical and extensible formal foundation towards realizing robust trust properties on today's edge security gateway implementations.
Edge computing could benefit many artificial intelligence applications compared to centralized solutions. However, achieving acceptable performance within typical edge devices' computational power limitations is c...
详细信息
ISBN:
(纸本)9798350344868;9798350344851
Edge computing could benefit many artificial intelligence applications compared to centralized solutions. However, achieving acceptable performance within typical edge devices' computational power limitations is challenging. This research investigates a promising approach to enhance the processing capabilities of edge devices by using the RISC-V Custom Function Unit (CFU) extension to offload computation to dedicated accelerator hardware. The approach was tested on the Automatic Modulation Recognition problem. To solve the problem, we designed a simple Convolutional Neural Network (CNN), which classifies ten different modulations with an accuracy of similar to 91% at signal-to-noise ratios greater than 0. Then, we developed and synthesized on an FPGA a custom CFU for the RISC-V processor to accelerate the convolutional layer, the most computationally demanding part of the CNN. The inference speedup gained is approximately 144 times - two orders of magnitude, and the inference wall time on the development board is 65 ms. This opens many new applications for such CNNs. Similar approaches to accelerators would be beneficial for other types of neural nets.
Nowadays, heterogeneous embedded platforms are extensively used in various low-latency applications, including the automotive industry, real-time IoT systems, and automated factories. These platforms utilize specific ...
Nowadays, heterogeneous embedded platforms are extensively used in various low-latency applications, including the automotive industry, real-time IoT systems, and automated factories. These platforms utilize specific components, such as CPUs, GPUs, and neural network accelerators for efficient task processing and to solve specific problems with a lower power consumption compared to more traditional systems. However, since these accelerators share resources such as the global memory, it is crucial to understand how workloads behave under high computational loads to determine how parallel computational engines on modern platforms can interfere and adversely affect the system's predictability and performance. One area that remains unclear is the interference effect on shared memory resources between the CPU and GPU: more specifically, the latency degradation experienced by GPU kernels when memory-intensive CPU applications run concurrently. In this work, we first analyze the metrics that characterize the behavior of different kernels under various board conditions caused by CPU memory-intensive workloads on a Nvidia Jetson Xavier. Then, we exploit various machine learning methodologies aiming to estimate the latency degradation of kernels based on their metrics. As a result of this, we are able to identify the metrics that could potentially have the most significant impact when predicting the kernels completion latency degradation.
Telexistence refers to various technologies that enable a high sense of embodiment and interaction capabilities with remote environments. Although numerous telexistence systems have been explored in previous works of ...
Telexistence refers to various technologies that enable a high sense of embodiment and interaction capabilities with remote environments. Although numerous telexistence systems have been explored in previous works of literature, no prior studies have investigated the usability of telexistence systems for daily use. Therefore, this study focuses on Piton, which is a novel wearable telexistence robot which has a high degree of freedom in a snake-shaped design. Piton offers a unique opportunity for remote interaction and manipulation in diverse environments, owing to its flexible movement, which enables users to adapt to various scenarios with ease. The robot's wearability is also an essential feature that allows the user to wear it as a backpack. However, despite its promising features, deeper investigation is necessary to explore potential use cases for Piton in users' daily lives and the challenge of Piton.
As e-commerce continues to grow, it is crucial to ensure accessibility for all users, including individuals with hearing impairments. Current web and mobile platforms often lack adequate support for sign language user...
详细信息
The proceedings contain 35 papers. The topics discussed include: can embeddedreal-time Linux system effectively support multipath transmission? an experimental study;attacker localization with machine learning in RS-...
ISBN:
(纸本)9781665464321
The proceedings contain 35 papers. The topics discussed include: can embeddedreal-time Linux system effectively support multipath transmission? an experimental study;attacker localization with machine learning in RS-485 industrial control networks;electricity theft detection for smart homes with knowledge-based synthetic attack data;static analysis of packet forwarding and filtering configurations in industrial networks;safety and security requirements in AAS integration: use case demonstration;zero-delay roaming for mobile robots enabled by wireless TSN redundancy;predicting wireless channel quality by means of moving averages and regression models;buffer management for TSN-enabled end stations;TSN scheduler benchmarking;deterministic local cloud for industrial applications;a safety and security requirements management methodology in reconfigurable collaborative human-robot application;managing 5g non-public networks from industrial automation systems;evaluation of control-to-control communication in industrial 5G network;Bayesian measurement noise estimation in ultra-wide band systems for clock synchronization;and assessment of time performance of lightweight virtualization for edge computingapplications.
This paper presents a multifunctional quadruped robot, specifically engineered for comprehensive air quality monitoring and emergency assistance. Designed to navigate through urban environments, the robot autonomously...
详细信息
ISBN:
(纸本)9798350330656;9798350330649
This paper presents a multifunctional quadruped robot, specifically engineered for comprehensive air quality monitoring and emergency assistance. Designed to navigate through urban environments, the robot autonomously collects and transmits real-time air quality data to a centralized database. This interdisciplinary paper integrates robotics, environmental science, and emergency response protocols to propose novel solutions for smart city infrastructure, public health, and disaster management. Specifically, this research highlights the critical role that autonomous systems play in monitoring environmental conditions and advancing safety protocols. This research leverages a comprehensive array of sensors including CO2 (MH-Z19), particle (SDS 011), GPS (ADA 746), DHT 22, MQ 9, and ADS 1115 converter, each meticulously implemented to ensure precise environmental data collection and analysis. Furthermore, the integration of cutting-edge technologies such as Robot Operating System (ROS),.NET MAUI, Python, and MariaDB establishes a robust framework for seamless operation, data processing, and secure storage within the quadruped robot system.
暂无评论