Cloud computing is the pradigim where service providers carry-on computational tasks for their customers. Multi-access Edge computing (MEC) is a recent form of service where the computational tasks are carried in a di...
详细信息
This paper provides a future looking perspective on the evolution of cloud-native technologies in the design, operation, and maintenance of industrial control systems with aging device communication protocols. First a...
详细信息
ISBN:
(数字)9798331529604
ISBN:
(纸本)9798331529611
This paper provides a future looking perspective on the evolution of cloud-native technologies in the design, operation, and maintenance of industrial control systems with aging device communication protocols. First a look at traditional control system design patterns and technologies before the Industry 4.0 shift. Then consider how advancedcomputing and networking power introduced with Industry 4.0 changed control systems in the past 10 years. Finally, a look at how the shift towards cloud-native technologies, big data processing, AI, and advanced computer-aided learning algorithms are challenged by the data modeling and transport norms of today's systems. This paper is a work in progress and draws no conclusions on the future. The purpose of this paper is to bring academic discussion into the needs for communication standardization in the evolving space of cloud-based control system design.
作者:
Gao, YudaLuo, YanhuaInstitute of Fiber Optics
Key Laboratory of Specialty Fiber Optics and Optical Access Networks Joint International Research Laboratory of Specialty Fiber Optics and Advanced Communication Shanghai Institute for Advanced Communication and Data Science Shanghai University Shanghai200444 China
Sensors based on optical fiber interference structures offer benefits such as high sensitivity, simple fabrication and good compatibility, and are widely used in fields like biological monitoring, chemical engineering...
详细信息
In today’s digital landscape, securing sensitive information has become an essential priority in the modern digital era for both individuals and organizations. This project introduces a comprehensive web application ...
详细信息
The project focuses on the design, development, and implementation of an Autonomous Mobile Robot (AMR) system specifically tailored for warehouse environments. The escalating demand for efficient warehouse management,...
详细信息
Cloud computing (CC) remains as a chief research area for analysts because of its numerous applications and advantages. The dispersed nature of CC and its dependence on internet service poses several attacks and chall...
详细信息
This paper presents a novel approach for air pollution monitoring using Photonic Crystal Fiber (PCF) with unique optical properties. Through Finite Element Method (FEM) simulations in COMSOL, the study explores how th...
详细信息
The Industrial Internet of Things (IIoT) has become a crucial technology driving the transformation of manufacturing towards intelligence. Traditional industrial networks primarily focus on data collection, whereas em...
详细信息
This paper presents a comprehensive study on efficient storage strategies and anomaly detection techniques tailored for multi-source heterogeneous subway monitoring data. By leveraging advanced deep learning models, w...
详细信息
Subtractive manufacturing systems, specifically, computer numerical control machines, have revolutionized the manufacturing industry. Computer numerical control machining is the preferred method for producing finished...
详细信息
Subtractive manufacturing systems, specifically, computer numerical control machines, have revolutionized the manufacturing industry. Computer numerical control machining is the preferred method for producing finished parts due to its efficiency, speed and suitability for high-volume production. Securing computer numerical control machines is a priority. Compromises or disruptions of these machines can result in significant downtime, loss of productivity and financial loss. This study examines the vulnerabilities and risks associated with computer numerical control machines, in particular, systems utilizing the LBP16 protocol for controller-machine communications. The study reveals that an adversary can execute cyber-physical attacks such as sabotage and denial of service. The potential security threats emphasize the importance of implementing robust security measures to mitigate the cyber risks to computer numerical control machines.
暂无评论