1,654 results on '"Mission critical"'
Search Results
2. Entropy service for secure real‐time mission critical communications.
- Author
-
Zeydan, Engin, Turk, Yekta, and Tasbag, Yaman Yagiz
- Subjects
- *
ENTROPY , *TELECOMMUNICATION systems , *COMPUTATIONAL complexity , *NUMBER systems , *FIRST responders - Abstract
Real Time Mission Critical Communication (RTMCC) in emergency situations can include real‐time video and audio calls between peers and first responders all occurring simultaneously. RTMCC also requires secure end‐to‐end (E2E) group communication (GC) sessions against potential security threats during such incidents. In this paper, we explore all aspects of the possible methods that are suitable for a software implementation of for session key change during GC in E2E encryption of RTMCC. Later, we introduce our Entropy Service concept, which can be very effective in secure E2E RTMCC sessions. The proposed method ensures E2E security in real‐time communication systems while allowing very fast session key change for clients involved in an RTMCC session with a computational complexity of 풪(1). Our experimental results show that the proposed Entropy Service can reduce total time by 99.6% and 99.2%, the idle time by 99.4% and 98.99%, and the number of messages by 51.4% and 35.33% compared to the key refreshing and hash methods, respectively, when the number of users in the system increases to 45. These results show that both communication and computation complexity are significantly reduced with the proposed RTMCC session key change. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
3. Research on FN-Based MCVideo Service for Railway Communication System
- Author
-
Wang, Qingqing, Li, Mingchun, Sun, Bin, Ding, Jianwen, Zhong, Zhangdui, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zhang, Junjie James, Series Editor, Liu, Baoming, editor, Liu, Zhigang, editor, Diao, Lijun, editor, and An, Min, editor
- Published
- 2020
- Full Text
- View/download PDF
4. Medium Access Control Protocols for Mission Critical Wireless Sensor Networks
- Author
-
Sakya, Gayatri, Singh, Pradeep Kumar, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Singh, Pradeep Kumar, editor, Bhargava, Bharat K., editor, Paprzycki, Marcin, editor, Kaushal, Narottam Chand, editor, and Hong, Wei-Chiang, editor
- Published
- 2020
- Full Text
- View/download PDF
5. Modification of feige-fiat-shamir based on public key cryptography
- Author
-
Juraev, Sh. B., Rashidov, J.M., and Mavlonova, M.A.
- Published
- 2020
- Full Text
- View/download PDF
6. An Effective and Efficient Dynamic eMBMS Multicast Grouping Scheduling Algorithm in MBSFNs for Public Safety Scenarios
- Author
-
Siyuan Feng, Chunmei Liu, Chen Shen, Hyeong-Ah Choi, and Richard A. Rouil
- Subjects
eMBMS ,LTE ,MBSFN ,mission critical ,multicast ,public safety ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The LTE (Long-Term Evolution) eMBMS (evolved Multimedia Broadcast Multicast Service) technology employed in MBSFNs (Multicast Broadcast Single Frequency Networks) has been shown to be capable of considerably increasing the capacity of serving public safety users under group communication scenarios. However, due to its own limitations, a more fine-tuned scheduling approach is needed in order to fully utilize the strengths of eMBMS multicast. In this work, we first identify and analyze several overlooked challenges for scheduling multicast traffic in MBSFNs. Then we develop an effective and efficient dynamic scheduling algorithm for eMBMS multicast in time and frequency varying channel. The proposed algorithm leverages the advantages of both multicast and unicast schemes via user grouping; and through extensive simulations, is shown to be capable of significantly enhancing the mission critical performances under both best effort and guaranteed bit rate delivery models. We also show the resiliency of our proposed algorithm by applying it onto various network and user deployment scenarios. Our consistent results further prove that LTE eMBMS in MBSFN is a key solution in overcoming limitations in near future public safety networks.
- Published
- 2020
- Full Text
- View/download PDF
7. Radio Frequency over Fibre Optics Repeater for Mission-Critical Communications: Design, Execution and Test
- Author
-
Răzvan-George Bărtuşică, Mădălin Mihai, Simona Halunga, and Octavian Fratu
- Subjects
mission critical ,communications ,TETRA ,public safety ,sensors ,fiber optics ,Chemical technology ,TP1-1185 - Abstract
This paper presents a technical solution that addresses mission-critical communications by extending the radio frequency coverage area using a flexible and scalable architecture. One of the main objectives is to improve both the reaction time and the coordination between mission-critical practitioners, also called public protection and disaster relief users, that operate in emergency scenarios. Mission-critical services such as voice and data should benefit from reliable communication systems that offer high availability, prioritization and flexible architecture. In this paper, we considered Terrestrial Trunked Radio (TETRA), the mobile radio standard used for mission-critical communications, as it has been designed in this respect and is widely used by first responder organizations. Even if RF coverage is designed before network deployment and continuously updated during the lifetime of the technology, some white areas may exist and should be covered by supplementary base stations or repeaters. The model presented in this paper is an optical repeater for TETRA standard that can offer up to 52.6 dB downlink, 65.6 dB uplink gain and up to 3.71 km coverage distance in a radiating cable installation scenario. The design in not limited, as it can be extended to several different mobile radio standards using the same principle. Flexibility and scalability attributes are taken into consideration, as they can build a cost-effective deployment considering both capital and operational expenditures.
- Published
- 2022
- Full Text
- View/download PDF
8. Artificial Intelligence to improve the availability of Mission Critical communication
- Author
-
Mulder, Stan (author) and Mulder, Stan (author)
- Abstract
In modern society, critical operations, such as emergency response and public safety, rely on communication systems, in this context also referred to as mission critical systems. These systems must meet strict availability requirements, since any failure can lead to severe consequences, including loss of life. Traditionally, dedicated private communication systems, like local Push-to-Talk systems, were used for such critical operations, but there is a growing shift towards utilizing public 4G and 5G mobile networks to achieve better coverage, higher data speeds and more innovative features at a lower cost. With the increasing complexity and vast amount of data from the network, automation and artificial intelligence (AI) are now becoming essential tools in these communication systems to efficiently manage data, configure networks in real-time, and effectively handle alarms. The use of AI can improve the end-to-end availability of mission critical systems, ensuring communication during critical situations. The main goal of this research is to investigate whether and how the use of AI can improve the end-to-end availability of mission critical systems, with a specific focus on the Mission Critical Push-to-Talk (MCPTT) system of KPN, which is using the public 4G and 5G network. Currently, the KPN MCPTT system is being used with a relatively limited number of users. However, the vision for MCPTT extends beyond its current implementation, aiming to scale up this service. With an increasing number of users, using automation and AI is essential for optimizing and managing the complexities of this mission critical communication system. The implementation of AI in the MCPTT system follows a systematic approach, starting with the independent analysis and monitoring of system specific elements. By focusing on these elements and using data such as Call Detail Records (CDR) and log data, insights into the system's behavior can be obtained. Through col, Electrical Engineering | Wireless Communication and Sensing
- Published
- 2023
9. Secure and load balanced routing model for wireless sensor networks
- Author
-
Gousia Thahniyath and M. Jayaprasad
- Subjects
General Computer Science ,business.industry ,Computer science ,Mission critical ,Packet processing ,Big data ,020206 networking & telecommunications ,Cryptography ,02 engineering and technology ,Data access ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Latency (engineering) ,business ,Wireless sensor network ,Computer network ,Efficient energy use - Abstract
Wireless sensor networks (WSNs) play a very important role in providing real-time data access for Big Data and Internet of Things applications. However, the open deployment, energy constraint, and lack of centralized administration make WSNs very vulnerable to various kinds of malicious attacks. In WSNs identifying malicious sensor devices and eliminating their sensed information plays a very important role for mission critical applications. Standard cryptography and authentication schemes cannot be directly used in WSNs because of the resource constraint nature of sensor devices. Thus, energy efficient and low latency methodology is required for minimizing the impact of malicious sensor devices. This paper presents a secure and load balanced routing (SLBR) scheme for heterogeneous clustered based WSNs. SLBR presents a better trust-based security metric that overcomes the problem when sensors keep oscillating from good to bad state and vice versa, and also SLBR balances load among CH. Thus, aids in achieving better security, packet transmission, and energy efficiency performance. Experiments are conducted to evaluate the performance of proposed SLBR model over existing trust-based routing model namely Exponential Cat Swarm Optimization (ECSO). The result attained shows SLBR model attains better performance than ECSO in terms of energy efficiency (i.e., network lifetime considering first sensor device death and total sensor device death), communication overhead, throughput, packet processing latency, malicious sensor device misclassification rate and identification.
- Published
- 2022
10. QoE Based Revenue Maximizing Dynamic Resource Allocation and Pricing for Fog-Enabled Mission-Critical IoT Applications
- Author
-
Muhammad Junaid Farooq and Quanyan Zhu
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Computer Networks and Communications ,Computer science ,business.industry ,Distributed computing ,Mission critical ,020206 networking & telecommunications ,Cloud computing ,Systems and Control (eess.SY) ,02 engineering and technology ,Service provider ,computer.software_genre ,Electrical Engineering and Systems Science - Systems and Control ,Computer Science - Networking and Internet Architecture ,Virtual machine ,Server ,FOS: Electrical engineering, electronic engineering, information engineering ,0202 electrical engineering, electronic engineering, information engineering ,Revenue ,Quality of experience ,Electrical and Electronic Engineering ,business ,computer ,Software - Abstract
Fog computing is becoming a vital component for Internet of things (IoT) applications, acting as its computational engine. Mission-critical IoT applications are highly sensitive to latency, which depends on the physical location of the cloud server. Fog nodes of varying response rates are available to the cloud service provider (CSP) and it is faced with a challenge of forwarding the sequentially received IoT data to one of the fog nodes for processing. Since the arrival times and nature of requests is random, it is important to optimally classify the requests in real-time and allocate available virtual machine instances (VMIs) at the fog nodes to provide a high QoE to the users and consequently generate higher revenues for the CSP. In this paper, we use a pricing policy based on the QoE of the applications as a result of the allocation and obtain an optimal dynamic allocation rule based on the statistical information of the computational requests. The developed solution is statistically optimal, dynamic, and implementable in real-time as opposed to other static matching schemes in the literature. The performance of the proposed framework has been evaluated using simulations and the results show significant improvement as compared with benchmark schemes., IEEE Transactions on Mobile Computing 2020
- Published
- 2021
11. Protecting Civilians: Mission Critical or Mission Impossible?
- Author
-
Timothy Donais
- Subjects
Political science ,Political Science and International Relations ,Mission critical ,Mythology ,Religious studies - Published
- 2021
12. Non‐Terrestrial Networks in 6G
- Author
-
Thomas Heyn, Leszek Raschkowski, Sahana Raghunandan, and Alexander Hofmann
- Subjects
Standardization ,Computer science ,business.industry ,Information and Communications Technology ,Service delivery framework ,Mobile broadband ,Mission critical ,Communications satellite ,Wireless ,business ,Telecommunications ,5G - Abstract
In recent years, a high connectivity demand started being experienced in wireless communication. Practically, everyone and everything needs to be connected because of the huge variety of applications existing today. This is a challenging situation for terrestrial telecommunications infrastructure that they cannot address on their own. Therefore, the 3rd Generation Partnership Project (3GPP) started in 2017 to study the integration of satellites as a part of the 5G ecosystem involving both cellular and satellite stakeholders. The substantial value added by satellites as part of the access technology mix for 5G is now becoming clear, especially for mission critical and other applications where ubiquitous coverage is crucial. For example, NTN can broaden service delivery to unserved or underserved areas, by complementing and extending terrestrial networks (Liolis, K., Geurtz, A., Sperber, R. et al. (2018). Use cases and scenarios of 5G integrated satellite‐terrestrial networks for enhanced mobile broadband: the SaT5G approach. International Journal of Satellite Communications and Networking 37: 91–112; Hofmann, M. (2020). Satellite communication in the age of 5G. Journal of ICT Standardization 8(3). https://journals.riverpublishers.com/index.php/JICTS/article/view/4327/3093 ).In this chapter, we will elaborate on the current standardization of NTN in 5G and further detail the architecture and research challenges toward 6G‐NTN.
- Published
- 2021
13. Framework for Identification of Critical Factors for Open Source Software Adoption Decision in Mission-Critical IT Infrastructure Services
- Author
-
S. Najeed Ahmed Khan, T. Asad Arfeen, and F. Umm-e-Laila
- Subjects
business.industry ,Computer science ,Mission critical ,Information technology ,Open source software ,Computer Science Applications ,Theoretical Computer Science ,Engineering management ,Identification (information) ,Software ,Information technology management ,Electrical and Electronic Engineering ,business ,Enterprise resource planning ,Quality assurance - Abstract
Mission-critical IT systems are utilizing closed source software (CSS) mainly due to reasons related to “quality assurance” and “continued support” despite much better benefits of using Open Source...
- Published
- 2021
14. FANET: Smart city mobility off to a flying start with self‐organized drone‐based networks
- Author
-
Amjad Ali, Saad Alanazi, Umar Draz, Muhammad Hameed Siddiqi, Muddesar Iqbal, Yousef Alhwaiti, and Madallah Alruwaili
- Subjects
Physical infrastructure ,Cover (telecommunications) ,Computer science ,Smart surveillance ,Network packet ,Smart city ,Mission critical ,Real-time computing ,Electrical and Electronic Engineering ,Drone ,Computer Science Applications - Abstract
Due to recent advancements in smart city traffic and transport monitoring industry 4.0 applications. Flying Ad-Hoc Networks (FANETs) ability to cover geographically large areas, makes it a suitable technology to address the challenges faced during remote areas traffic monitoring. The implementation of drone based FANETs have several advantages in remote traffic monitoring, including free air-to-air drone assisted communication zone and smart surveillance and security. The drone-based FANETs can be deployed within minutes without requiring physical infrastructure, making it suitable for mission critical applications in several areas of interests. Here a drone-based FANETs application for smart city remote traffic monitoring is presented while addressing several challenges including coverage of larger geographical area and data communication links between FANETs nodes. A FANET-inspired enhanced ACO algorithm that easily coped with drone assisted technology of FANETs is proposed to cover the large areas. Simulation results are presented to compare the proposed technique against different network lifetime and number of received packets. The presented results show that the proposed technique perform better compared to other state-of-the-art techniques.
- Published
- 2021
15. Sensor Cloud Frameworks: State-of-the-Art, Taxonomy, and Research Issues
- Author
-
Rana M. Abdul Haseeb-Ur-Rehman, Muhammad Khurram Khan, Siti Hafizah Ab Hamid, Azana Hafizah Mohd Aman, Misbah Liaqat, Rana Liaqat Ali, and Junaid Shuja
- Subjects
Computer science ,business.industry ,Data management ,Mission critical ,Cloud computing ,Network dynamics ,Data science ,Client–server model ,Sensor node ,Electrical and Electronic Engineering ,business ,Instrumentation ,Host (network) ,Wireless sensor network - Abstract
In recent times, Wireless Sensor Network (WSN) technology has received significant attention owing to its numerous applications in various mission critical services, such as healthcare, military monitoring, public safety systems, and forest monitoring. However, sensor node’s low computational power and inadequate advancements in battery design hinder resource-rigorous applications from fully exploiting WSN capabilities. The trend of shifting computations and storage to remote clouds offers the opportunity to integrate WSNs into the cloud to mitigate their limitations. The Sensor Cloud augments WSN capabilities of remote sensing and monitoring while exploiting resource-rich cloud infrastructure. To date, numerous solutions have been proposed to handle the integration concerns of WSNs with the cloud. However, a comprehensive study that covers various Sensor Cloud aspects in terms of architecture, network dynamics, heterogeneity, communication patterns, data management, and security, is still lacking. To fill this gap, state-of-the-art sensor cloud integration frameworks are analyzed in this article. Moreover, a detailed thematic taxonomy is presented to classify existing sensor cloud frameworks while focusing in service oriented and client server architectures. Related features and critical aspects of existing frameworks are inspected through a qualitative analysis based on the parameters selected from the literature and extracted from the taxonomy. Several research opportunities in this research domain are suggested to assist researchers in identifying and designing optimal resource sensor cloud integration frameworks to host emerging applications.
- Published
- 2021
16. Cooperative Infrastructure Platform for Delivering Mission-critical Services
- Author
-
Seisho Yasukawa, Ryota Ishibashi, Hitoshi Masutani, Kenta Kawakami, Hiroshi Yamamoto, and Takeshi Kuwahara
- Subjects
Engineering management ,Mission critical ,Business - Published
- 2021
17. Energy-Efficient Offloading for Mission-Critical IoT Services Using EVT-Embedded Intelligent Learning
- Author
-
Yu Zhou, Tao Hong, Xiaoyu Que, Xuesong Qiu, Lei Feng, Peng Yu, and Tang Liu
- Subjects
Mobile edge computing ,Computer Networks and Communications ,Renewable Energy, Sustainability and the Environment ,Computer science ,Quality of service ,Server ,Distributed computing ,Mission critical ,Resource allocation ,Lyapunov optimization ,Energy consumption ,Efficient energy use - Abstract
Mobile edge computing (MEC) is a promising technique to alleviate the energy limitation of Internet of Things (IoT) devices, as it can offload local computing tasks to the edge server through a cellular network. By leveraging extreme value theory (EVT), this work proposes a priority-differentiated offloading strategy that takes into account the stringent quality of service (QoS) requirements of mission-critical services and green resource allocation. Particularly, Lyapunov optimization is first introduced to derive an upper-bound queue minimization problem with the consideration of energy consumption and task priority. The peaks-over-thresholds (POT) model is then applied to evaluate the stationery status and cooperate with Wolf-PHC learning to optimize resource allocation. Finally, simulation results verify that the proposed offloading policy performs well in terms of its energy-saving capability while satisfying different demands of mission-critical IoT services.
- Published
- 2021
18. Applications of information channels to physics-informed neural networks for WiFi signal propagation simulation at the edge of the industrial internet of things
- Author
-
B. Ashrafi Nia, R.P. Donovan, F. Flaviis de, H. Ye, E. Olivares, A. Herrero, and Y. Ren
- Subjects
0209 industrial biotechnology ,Edge device ,business.industry ,Cognitive Neuroscience ,Distributed computing ,Mission critical ,Cloud computing ,02 engineering and technology ,Computational resource ,Computer Science Applications ,Geolocation ,020901 industrial engineering & automation ,Artificial Intelligence ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,020201 artificial intelligence & image processing ,Enhanced Data Rates for GSM Evolution ,business - Abstract
The ubiquitous presence of data driven technologies that move information from the edge of the Industrial Internet of Things (IIoT) to the cloud for advanced computation and back to the edge for action are pushing wireless connections to the limit. Under these conditions optimizing WIFI Received Signal Strength Intensity (RSSI) can improve data management, computational workflows, and geolocation accuracy while reducing energy consumption in order to minimize charging and computational resource requirements at the edge. Ensuring connectivity for these mission critical processes will require detailed knowledge (either measured or simulated) of the state of the electromagnetic fields in advanced manufacturing scenarios. Simulation has the advantage of developing more scalable solutions to this characterization problem but comes at a very high computational cost that may not be possible on edge devices with limited computational resources. In order to reduce the time and resource cost of achieving real time simulations with low computing specification edge devices, we propose creating a novel method that exploits the notion of information channels to create efficient Convolutional Neural Networks (CNNs) capable of determining the RSSI given a completely new geometry (never used in training) where objects or obstacles (walls, machines, tables, etc.) and their respective location, size and reflectivity indices, along with the antenna location are completely random.
- Published
- 2021
19. Service-Based Resilience via Shared Protection in Mission-Critical Embedded Networks
- Author
-
Mathias Fischer, Jacek Rak, and Doganalp Ergenc
- Subjects
Service (systems architecture) ,Computer Networks and Communications ,Computer science ,Heuristic (computer science) ,Distributed computing ,Mission critical ,Virtualization ,computer.software_genre ,Backup ,Resource management ,Electrical and Electronic Engineering ,Routing (electronic design automation) ,Resilience (network) ,computer - Abstract
Mission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel approach for optimal joint service allocation and routing, leveraging virtualized embedded devices and shared backup capacity for the fault-tolerant design of mission-critical networks. This approach operates in phases utilizing multiple optimization models. Furthermore, we propose a new heuristic that ensures resource efficiency and fault-tolerance against single node and link failures as pre-requisite for resilience. Our experiments for different application scenarios indicate that our heuristic achieves results close to the optimum and provides 50% of capacity gain compared to a dedicated capacity protection scheme. Moreover, our heuristic ensures fault-tolerance against at least 90% of all potential single node failures.
- Published
- 2021
20. Survivability and Disaster Recovery Modeling of Cellular Networks Using Matrix Exponential Distributions
- Author
-
Appie van de Liefvoort, Rahul Arun Paropkari, Cory Beard, and Hasita Kaja
- Subjects
Markov chain ,Computer Networks and Communications ,Computer science ,Reliability (computer networking) ,Mission critical ,Survivability ,Disaster recovery ,Markov process ,Maintenance engineering ,Reliability engineering ,symbols.namesake ,Cellular network ,symbols ,Electrical and Electronic Engineering - Abstract
Cellular network design must incorporate disaster response and repair scenarios. Requirements for high reliability and low latency often fail to incorporate network survivability for mission critical services. This paper defines a practical modeling approach using a Markov chain Matrix Exponential (ME) model. Transient and the steady state representations of system repair models, namely, fast and slow (i.e., crew-based) repairs for networks consisting of a multiple repair crews have been analyzed. Failures are exponentially modeled as per common practice, but ME distributions describe the more complex recovery processes. The model used in this paper is evaluated for varying number of repair crews, base stations, repair models and squared coefficient of variation values. This model is scalable for larger networks, calculates the restoration and network availability times, consists of asymptotic approximations to estimate network availability and determines the optimal number repair crews required. This ME model shows how survivable networks can be designed based on controlling numbers of crews, times taken for individual repair stages in the repair process, and the balance between fast and slow repairs.
- Published
- 2021
21. Trust Of, In, and among Adaptive Systems
- Author
-
Lange, Douglas S., Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Calinescu, Radu, editor, and Jackson, Ethan, editor
- Published
- 2011
- Full Text
- View/download PDF
22. Entropy service for secure real-time missioncritical communications
- Author
-
Engin Zeydan, Yekta Turk, Yaman Yagiz Tasbag, and Tasbag, Yaman Yagiz
- Subjects
Real time ,Service ,Entropy ,General Engineering ,Security ,Mission critical - Abstract
Real Time Mission Critical Communication (RTMCC) in emergency situations can include real-time video and audio calls between peers and first responders all occurring simultaneously. RTMCC also requires secure end-to-end (E2E) group communication (GC) sessions against potential security threats during such incidents. In this paper, we explore all aspects of the possible methods that are suitable for a software implementation of for session key change during GC in E2E encryption of RTMCC. Later, we introduce our Entropy Service concept, which can be very effective in secure E2E RTMCC sessions. The proposed method ensures E2E security in real-time communication systems while allowing very fast session key change for clients involved in an RTMCC session with a computational complexity of 𝒪(1). Our experimental results show that the proposed Entropy Service can reduce total time by 99.6% and 99.2%, the idle time by 99.4% and 98.99%, and the number of messages by 51.4% and 35.33% compared to the key refreshing and hash methods, respectively, when the number of users in the system increases to 45. These results show that both communication and computation complexity are significantly reduced with the proposed RTMCC session key change.
- Published
- 2022
23. A secure wireless mission critical networking system for unmanned aerial vehicle communications.
- Author
-
Sarker, Jahangir H. and Nahhas, Ahmed M.
- Subjects
DRONE aircraft ,DATA packeting ,WIRELESS communications ,FLYING machines ,TELECOMMUNICATION systems - Abstract
A privacy-preserving secure communication in ad hoc (without infrastructure) mission critical wireless networking system suitable for unmanned aerial vehicle communication systems is introduced and analyzed. It is expected that in a critical condition, few ad hoc (without infrastructure) mission critical wireless networking systems will work together. To make the simple and low cost privacy-preserving secure communication among the same network, each transmitting mobile node generates packets in such a way that its wanted receiving mobile nodes can read the message packets easily. On the other hand, the unwanted receiving mobile nodes from other networks cannot read those message packets. In addition, the unwanted receiving mobile nodes receive ‘jamming packets’ if they try to read them. This mechanism prevents the malicious receivers (readers from other networks) from reading the packets and obtaining information from this network. Results show that the throughput is very high and does not detect any jamming packets, if the receiving nodes of a network try to read packets transmitted by the nodes from the same networks. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
24. Review of battery powered embedded systems design for mission-critical low-power applications.
- Author
-
Malewski, Matthew, Cowell, David M. J., and Freear, Steven
- Subjects
- *
EMBEDDED computer system design & construction , *COMPUTER software , *COMPUTATIONAL complexity , *RELIABILITY in engineering , *PROBLEM solving - Abstract
The applications and uses of embedded systems is increasingly pervasive. Mission and safety critical systems relying on embedded systems pose specific challenges. Embedded systems is a multi-disciplinary domain, involving both hardware and software. Systems need to be designed in a holistic manner so that they are able to provide the desired reliability and minimise unnecessary complexity. The large problem landscape means that there is no one solution that fits all applications of embedded systems. With the primary focus of these mission and safety critical systems being functionality and reliability, there can be conflicts with business needs, and this can introduce pressures to reduce cost at the expense of reliability and functionality. This paper examines the challenges faced by battery powered systems, and then explores at more general problems, and several real-world embedded systems. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
25. Analysing Mission-critical Cyber-physical Systems with AND/OR Graphs and MaxSAT
- Author
-
Martín Barrère, Chris Hankin, and Horizon2020
- Subjects
MaxSAT ,Control and Optimization ,Dependency (UML) ,Computer Networks and Communications ,Computer science ,Distributed computing ,Reliability (computer networking) ,Mission critical ,0211 other engineering and technologies ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,System hardening ,Artificial Intelligence ,Component (UML) ,Avionics ,Mission-critical systems ,AND/OR graphs ,021110 strategic, defence & security studies ,Security metric ,Cyber-physical system ,Most Likely Mission-critical Component Set ,Complex network ,Forensic investigations ,Reliability ,Aircraft systems ,Human-Computer Interaction ,Cyber-physical security ,010201 computation theory & mathematics ,Hardware and Architecture ,Maximum satisfiability problem ,Safety - Abstract
Cyber-Physical Systems (CPS) often involve complex networks of interconnected software and hardware components that are logically combined to achieve a common goal or mission; for example, keeping a plane in the air or providing energy to a city. Failures in these components may jeopardise the mission of the system. Therefore, identifying the minimal set of critical CPS components that is most likely to fail, and prevent the global system from accomplishing its mission, becomes essential to ensure reliability. In this article, we present a novel approach to identifying the Most Likely Mission-critical Component Set (MLMCS) using AND/OR dependency graphs enriched with independent failure probabilities. We address the MLMCS problem as a Maximum Satisfiability (MaxSAT) problem. We translate probabilities into a negative logarithmic space to linearise the problem within MaxSAT. The experimental results conducted with our open source tool LDA4CPS indicate that the approach is both effective and efficient. We also present a case study on complex aircraft systems that shows the feasibility of our approach and its applicability to mission-critical cyber-physical systems. Finally, we present two MLMCS-based security applications focused on system hardening and forensic investigations.
- Published
- 2021
26. Machine-Learning-Aided Mission-Critical Internet of Underwater Things
- Author
-
Xin Zhang, S. H. Song, Xudong Zhang, Jingjing Wang, Yong Ren, Xiangwang Hou, and Zhengru Fang
- Subjects
Information transmission ,Network architecture ,Computer Networks and Communications ,Computer science ,business.industry ,Mission critical ,Data science ,Hardware and Architecture ,Underwater navigation ,Key (cryptography) ,The Internet ,Underwater ,Earthquake forecasting ,business ,Software ,Information Systems - Abstract
With people paying more attention to marine resources, the Internet of Things (IoT) has been extended to underwater, promoting the development of the Internet of Underwater Things (IoUT). Various compelling IoUT applications bring a new age to maritime activities. However, some mis-sion-critical maritime activities, including ocean earthquake forecasting, underwater navigation, and so on, pose a substantial challenge on existing IoUT architectures and relevant techniques. Therefore, in this article, to empower these implacable maritime activities, we conceive the concept of mission-critical IoUT and highlight its key features and challenges. Furthermore, to satisfy the stringent requirements of mission-critical IoUT, we propose a future maritime network architecture and machine-learning-aided key techniques in terms of information sensing, transmission, and processing. Moreover, we present our recent research on reliable and low-latency underwater information transmission. Finally, we provide the open issues and potential research trends for future mission-critical IoUT.
- Published
- 2021
27. Next Generation of SDN in Cloud-Fog for 5G and Beyond-Enabled Applications: Opportunities and Challenges
- Author
-
Gyu Myoung Lee, Syed Mohsan Raza, Shohreh Ahvar, Ehsan Ahvar, and Jose Manuel Sanchez Vilchez
- Subjects
QA75 ,business.industry ,Computer science ,020208 electrical & electronic engineering ,Mission critical ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,QA76 ,Data sharing ,Enabling ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,The Internet ,business ,Telecommunications ,Edge computing ,5G - Abstract
In recent years, the number of objects connected to the internet have significantly increased. Increasing the number of connected devices to the internet is transforming today’s Internet of Things (IoT) into massive IoT of the future. It is predicted that, in a few years, a high communication and computation capacity will be required to meet the demands of massive IoT devices and applications requiring data sharing and processing. 5G and beyond mobile networks are expected to fulfill a part of these requirements by providing a data rate of up to terabits per second. It will be a key enabler to support massive IoT and emerging mission critical applications with strict delay constraints. On the other hand, the next generation of software-defined networking (SDN) with emerging cloudrelated technologies (e.g., fog and edge computing) can play an important role in supporting and implementing the above-mentioned applications. This paper sets out the potential opportunities and important challenges that must be addressed in considering options for using SDN in hybrid cloud-fog systems to support 5G and beyond-enabled applications.
- Published
- 2021
28. Mobility assisted localization for mission critical Wireless Sensor Network applications using hybrid area exploration approach
- Author
-
Nikhil Tripathi, Lucy J. Gudino, V. Sreejith, C. K. Ramesha, and Shamanth Nagaraju
- Subjects
Scheme (programming language) ,Mobility model ,General Computer Science ,Computer science ,Node (networking) ,Real-time computing ,Mission critical ,Process (computing) ,Max-gain ,020206 networking & telecommunications ,QA75.5-76.95 ,02 engineering and technology ,Area exploration algorithm ,Wireless sensor networks ,Frontier ,Software deployment ,Localization ,Electronic computers. Computer science ,Sensor node ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,computer ,Wireless sensor network ,computer.programming_language ,Sensor field - Abstract
Sensor node location information is critical in many Wireless Sensor Network (WSN) applications with random sensor node deployment. In such applications, node localization using a faster area exploration mechanism is needed to initiate precise sensing and communication. In this paper, faster area exploration approach for mobility-assisted localization scheme is proposed for mission-critical WSN applications. Each Mobile Anchor (MA) node embedded with a localization module moves in the sensor field in a coordinated manner while localizing the deployed static nodes. The proposed area exploration scheme is implemented using a hybrid of max-gain approach and cost-utility based frontier (HMF) approach. The paper addresses the issue of sparse anchor node condition during the localization process. The simulation results obtained using Cooja simulator shows that the proposed mobility-assisted localization scheme results in accurate localization with minimum delay. The proof-of-concept of the proposed scheme is demonstrated using Berkeley static nodes and custom designed MA nodes.
- Published
- 2021
29. A critical analysis of RPL objective functions in internet of things paradigm
- Author
-
Neeti Gupta, Vidushi Sharma, and Anuradha Pughat
- Subjects
Computer Networks and Communications ,Network packet ,Computer science ,Distributed computing ,Quality of service ,Mission critical ,Path (graph theory) ,Metric (mathematics) ,Routing (electronic design automation) ,Wireless sensor network ,Software ,Data transmission - Abstract
IoT supports a spectrum of applications, each of which has certain specific requirements. For instance, mission critical applications cannot tolerate delay in data transmission however simple monitoring applications are delay tolerant. The lifetime and performance of IoT sensor networks depend on the metric/constraint (ETX, Energy etc.) selected for routing path, data size and quality of service required. The selection of metric /constraint dependent Objective function (OF) in RPL provides a range of solutions for IoT applications. However, state-of-art solutions mainly focus on single metric/constraint resulting in poor performance of protocol. To understand the protocol behavior for different metrics (single and combined) a complete evaluation of RPL over important performance parameters is needed. Researchers have proposed several routing algorithms which are application specific and do not define a generic parent selection process. We require a structured algorithm for Minimum Rank Hysteresis Objective Function (MRHOF) applicable to majority of IoT applications. In this paper we have proposed a generalized algorithm for MRHOF along with routing path cost evaluation which defines the complete parent selection process. Further, comparative analysis of different RPL OFs has been done to identify suitable OF for enhanced RPL performance. Performance evaluation parameters have been extended to PDR, power consumption, hop count, average ETX, Rt metric and inter packet time, for different network size and link quality. Results are obtained using Cooja simulator of Contiki. RPL with combined metric provide 24% higher PDR, 28% lower power consumption and 39% lower inter-packet time as compared to RPL with single metric.
- Published
- 2021
30. Networked Microgrids for Reliable Load Sharing in Remote locations of Armed Force
- Author
-
Cps Pasricha
- Subjects
Computer science ,business.industry ,General Mathematics ,Reliability (computer networking) ,Mission critical ,Adversary ,Education ,Reliability engineering ,Power (physics) ,Computational Mathematics ,Electric power system ,Computational Theory and Mathematics ,Grid connection ,Electric power ,Electricity ,business - Abstract
Forward operating bases of the Armed Forces are located in remote areas where grid connection is normally not available and if available are vulnerable to outages due to vagaries of weather or action by adversary. Microgrids are generally more efficient and may provide electric power storage for emergency supply of electricity to mission critical equipment like surveillance systems, sensors, communication, command and control systems of such forward bases. Several small independent microgrids can also be interconnected together to satisfy the energy requirements of the remote military areas. Networking of several self-supervised microgrids is being developed with the aim to enhance efficiency, reliability and resiliency as well as the steadiness of power systems. In this work, an interconnection of microgrids at three remote bases of the armed forces is presented and simulated. The proposed power co-ordination strategy is designed in such a way that during peace time operation it tries to minimize the overall requirement of fossil fuel for generators supplying the critical loads and in case of outages, it can tackle the emergency situation by automatically routing the power to critical loads from other operational bases. The entire system has been simulated and verified using MATLAB 2018.
- Published
- 2021
31. ASSERT : A Blockchain-Based Architectural Approach for Engineering Secure Self-Adaptive IoT Systems
- Author
-
Alkhabbas, Fahed, Alsadi, Mohammed, Alawadi, Sadi, Awaysheh, Feras M., Kebande, Victor R., Moghaddam, Mahyar T., Alkhabbas, Fahed, Alsadi, Mohammed, Alawadi, Sadi, Awaysheh, Feras M., Kebande, Victor R., and Moghaddam, Mahyar T.
- Abstract
Internet of Things (IoT) systems are complex systems that can manage mission-critical, costly operations or the collection, storage, and processing of sensitive data. Therefore, security represents a primary concern that should be considered when engineering IoT systems. Additionally, several challenges need to be addressed, including the following ones. IoT systems’ environments are dynamic and uncertain. For instance, IoT devices can be mobile or might run out of batteries, so they can become suddenly unavailable. To cope with such environments, IoT systems can be engineered as goal-driven and self-adaptive systems. A goal-driven IoT system is composed of a dynamic set of IoT devices and services that temporarily connect and cooperate to achieve a specific goal. Several approaches have been proposed to engineer goal-driven and self-adaptive IoT systems. However, none of the existing approaches enable goal-driven IoT systems to automatically detect security threats and autonomously adapt to mitigate them. Toward bridging these gaps, this paper proposes a distributed architectural Approach for engineering goal-driven IoT Systems that can autonomously SElf-adapt to secuRity Threats in their environments (ASSERT). ASSERT exploits techniques and adopts notions, such as agents, federated learning, feedback loops, and blockchain, for maintaining the systems’ security and enhancing the trustworthiness of the adaptations they perform. The results of the experiments that we conducted to validate the approach’s feasibility show that it performs and scales well when detecting security threats, performing autonomous security adaptations to mitigate the threats and enabling systems’ constituents to learn about security threats in their environments collaboratively. © 2022 by the authors., open access
- Published
- 2022
- Full Text
- View/download PDF
32. Performance Analysis and Improvement of 5G based Mission Critical Motion Control Applications
- Author
-
Bhimavarapu, Koushik and Bhimavarapu, Koushik
- Abstract
The industrial needs in the production of goods and control of processes within the factory keep leapfrogging daily by the necessities to fulfil the needs of the ever-growing population. In recent times, the industries are looking towards Industry 4.0 to improve their overall productivity and scalability. One of the significant aspects that are required to meet the requirements of Industry 4.0 is communication networks among industrial applications. Nowadays, industries from the cross markets are looking to replace their existing wired networks with wireless networks, which indeed brings many use-cases and a lot of new business models into existence. To make all these options possible, wireless networks need to meet the stringent requirements of these industrial applications in the form of reliability, latency, and service availability. This thesis focuses on a systematic methodology to integrate wireless networks like 5G, Wi-Fi 6, etc., into real-life automation devices. It also describes a methodology to evaluate their communication and control performance by varying control parameters like topology, cycle time, and type of networks. It also devises some techniques and methods that can improve the overall performance, i.e., both control and communication performance of the control applications. The method used to implement this work is a case study. This work integrates and tests the industrial applications in a real-life scenario. It is the best effort to bring a unique perspective of communication engineers and control engineers together regarding the performance of the industrial applications. This work tries to verify the suitability of the wireless in mission-critical control application scenarios with respect to their communication and control performance. Software for data analysis and visualization and its methodology for analyzing the traffic flow of the control applications via different wireless networks is demonstrated by varying different control para
- Published
- 2022
33. ASSERT: A Blockchain-Based Architectural Approach for Engineering Secure Self-Adaptive IoT Systems
- Author
-
Fahed Alkhabbas, Mohammed Alsadi, Sadi Alawadi, Feras M. Awaysheh, Victor R. Kebande, and Mahyar T. Moghaddam
- Subjects
blockchain ,Digital storage ,Internet of Things ,Sensitive datas ,security ,Biochemistry ,Adaptive systems ,Self-adaptive and goal-driven system ,Analytical Chemistry ,Information management ,Computer Systems ,Driven system ,multi-agent systems ,Electrical and Electronic Engineering ,Instrumentation ,Multi agent systems ,software architecture ,Computer Sciences ,Security threats ,self-adaptive and goal-driven systems ,Goal-driven ,Architectural approach ,Block-chain ,Network security ,Mission critical ,Atomic and Molecular Physics, and Optics ,System environment ,Datorsystem ,Datavetenskap (datalogi) ,Sensitive data - Abstract
Internet of Things (IoT) systems are complex systems that can manage mission-critical, costly operations or the collection, storage, and processing of sensitive data. Therefore, security represents a primary concern that should be considered when engineering IoT systems. Additionally, several challenges need to be addressed, including the following ones. IoT systems’ environments are dynamic and uncertain. For instance, IoT devices can be mobile or might run out of batteries, so they can become suddenly unavailable. To cope with such environments, IoT systems can be engineered as goal-driven and self-adaptive systems. A goal-driven IoT system is composed of a dynamic set of IoT devices and services that temporarily connect and cooperate to achieve a specific goal. Several approaches have been proposed to engineer goal-driven and self-adaptive IoT systems. However, none of the existing approaches enable goal-driven IoT systems to automatically detect security threats and autonomously adapt to mitigate them. Toward bridging these gaps, this paper proposes a distributed architectural Approach for engineering goal-driven IoT Systems that can autonomously SElf-adapt to secuRity Threats in their environments (ASSERT). ASSERT exploits techniques and adopts notions, such as agents, federated learning, feedback loops, and blockchain, for maintaining the systems’ security and enhancing the trustworthiness of the adaptations they perform. The results of the experiments that we conducted to validate the approach’s feasibility show that it performs and scales well when detecting security threats, performing autonomous security adaptations to mitigate the threats and enabling systems’ constituents to learn about security threats in their environments collaboratively. © 2022 by the authors. open access
- Published
- 2022
34. Artificial Resilience in neuromorphic systems
- Author
-
Alessio Carpegna, Stefano Di Carlo, and Alessandro Savino
- Subjects
Spiking Neural Networks ,Hardware Accelerators ,Resilience ,Artificial Intelligence ,Mission Critical - Published
- 2022
35. Smart predictive maintenance for high-performance computing systems: a literature review
- Author
-
Erick Giovani Sperandio Nascimento, Caio Jordão de Lima Carvalho, André Luis da Cunha Dantas Lima, and Vitor Moraes Aranha
- Subjects
020203 distributed computing ,Standardization ,Computer science ,business.industry ,Deep learning ,Mission critical ,02 engineering and technology ,Supercomputer ,Field (computer science) ,Predictive maintenance ,Theoretical Computer Science ,Intervention (law) ,Risk analysis (engineering) ,Work (electrical) ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Artificial intelligence ,business ,Software ,Information Systems - Abstract
Predictive maintenance is an invaluable tool to preserve the health of mission critical assets while minimizing the operational costs of scheduled intervention. Artificial intelligence techniques have been shown to be effective at treating large volumes of data, such as the ones collected by the sensors typically present in equipment. In this work, we aim to identify and summarize existing publications in the field of predictive maintenance that explore machine learning and deep learning algorithms to improve the performance of failure classification and detection. We show a significant upward trend in the use of deep learning methods of sensor data collected by mission critical assets for early failure detection to assist predictive maintenance schedules. We also identify aspects that require further investigation in future works, regarding exploration of life support systems for supercomputing assets and standardization of performance metrics.
- Published
- 2021
36. CORROSION AND CONTAMINATION CONTROL FOR MISSION CRITICAL FACILITIES
- Author
-
Christopher O. Muller
- Subjects
Contamination control ,Waste management ,Mission critical ,Environmental science ,Corrosion - Published
- 2021
37. Effective Performance Metrics for Multimedia Mission-critical Communication Systems
- Author
-
Ashraf A. Ali and Andrew Ware
- Subjects
Session Initiation Protocol ,General Computer Science ,Multimedia ,Process (engineering) ,Computer science ,computer.internet_protocol ,Mission critical ,IP Multimedia Subsystem ,020206 networking & telecommunications ,02 engineering and technology ,021001 nanoscience & nanotechnology ,Communications system ,computer.software_genre ,0202 electrical engineering, electronic engineering, information engineering ,Performance indicator ,Electrical and Electronic Engineering ,0210 nano-technology ,Set (psychology) ,computer - Abstract
Mission-critical Communication Systems that are adaptable for use with the latest generation of multimedia services are crucial for system users. To determine the set of requirements that need to be hardcoded into such systems, a clear distinction between mission-critical and non-mission-critical systems is required. Moreover, the users of services provided by such systems are very different to those of current mobile commercial communication systems. These differences give rise to a set of challenges that need addressing to facilitate migration from existing systems to those now being proposed. One such challenge relates to the performance of the IP Multimedia Subsystem (IMS) registration process. This is a crucial consideration for mission-critical systems, particularly in large-scale systems where thousands or even millions of users may seek to access the system in disaster scenarios. This paper presents an evaluation of IMS and Session Initiation Protocol (SIP) performance metrics and Key Performance Indicators (KPIs). Moreover, it articulates a proposed study that will seek to address some of the challenges identified.
- Published
- 2021
38. A risk-sensitive task offloading strategy for edge computing in industrial Internet of Things
- Author
-
Xiaoyu Hao, Yulin Hu, Tao Yang, Ruohai Zhao, Bo Hu, and Yuhe Qiu
- Subjects
FOS: Computer and information sciences ,Optimization problem ,Computer Networks and Communications ,Computer science ,Distributed computing ,Computer Science - Information Theory ,Mission critical ,Risk management theory ,lcsh:TK7800-8360 ,02 engineering and technology ,Communications system ,lcsh:Telecommunication ,0203 mechanical engineering ,Server ,lcsh:TK5101-6720 ,0202 electrical engineering, electronic engineering, information engineering ,Ultra-reliable and low-latency communications ,Risk management ,Edge computing ,Queueing theory ,business.industry ,Information Theory (cs.IT) ,lcsh:Electronics ,020206 networking & telecommunications ,020302 automobile design & engineering ,Computer Science Applications ,Industrial Internet of Things ,Expected shortfall ,Conditional Value at Risk ,Signal Processing ,ddc:004 ,business - Abstract
Edge computing has become one of the key enablers for ultra-reliable and low-latency communications in the industrial Internet of Things in the fifth generation communication systems, and is also a promising technology in the future sixth generation communication systems. In this work, we consider the application of edge computing to smart factories for mission-critical task offloading through wireless links. In such scenarios, although high end-to-end delays from the generation to completion of tasks happen with low probability, they may incur severe casualties and property loss, and should be seriously treated. Inspired by the risk management theory widely used in finance, we adopt the Conditional Value at Risk to capture the tail of the delay distribution. An upper bound of the Conditional Value at Risk is derived through analysis of the queues both at the devices and the edge computing servers. We aim to find out the optimal offloading policy taking into consideration both the average and the worst case delay performance of the system. Given that the formulated optimization problem is a non-convex mixed integer non-linear programming problem, a decomposition into sub-problems is performed and a two-stage heuristic algorithm is proposed. Simulation results validate our analysis and indicate that the proposed algorithm can reduce the risk in both the queuing and end-to-end delay., 17 pages, has been submitted to EURASIP JWCN, major revision
- Published
- 2021
39. DataFAN: A Practical Approach to Data Flow Analysis for Ada 95
- Author
-
Czarnecki, Krzysztof, Himsolt, Michael, Richter, Ernst, Vieweg, Falk, Rosskopf, Alfred, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Blieberger, Johann, editor, and Strohmeier, Alfred, editor
- Published
- 2002
- Full Text
- View/download PDF
40. Analytical Program Power Characterization for Battery Depletion-time Estimation
- Author
-
Mehdi Kargahi, Mahmood Hasanloo, and Mahdi Mohammadpour Fard
- Subjects
Rescue robot ,Battery (electricity) ,Computer science ,020208 electrical & electronic engineering ,Mission critical ,020206 networking & telecommunications ,02 engineering and technology ,Directed acyclic graph ,Upper and lower bounds ,Reliability engineering ,Power (physics) ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Wireless sensor network ,Software ,TRACE (psycholinguistics) - Abstract
Appropriate battery selection is a major design decision regarding the fast growth of battery-operated devices like space rovers, wireless sensor network nodes, rescue robots, and so on. Many such systems are mission critical, where estimation of the battery depletion time has an important role in the design efficiency with regard to the mission time. Accurate characterization of the system power usage pattern is essential for such an estimation. The following complexities exist: (1) The system behavior changes during interaction with the physical world, (2) the power consumption varies as the runtime progresses, (3) the total delivered battery charge has non-linear dependency on the power variability, and (4) design-time exhaustive study about runtime execution paths is almost impossible. This article presents an analytical method to first characterize the power variability of a given embedded program modeled by a directed acyclic graph, concerning the first and the second complexities. To include the third complexity, however, the concept of Worst-case Power Consumption Trace (WPCT) is proposed toward the worst-case scenario in terms of charge depletion for a given battery. A polynomial algorithm is also presented to construct WPCT and use it to estimate a tight lower bound for the system energy depletion time, i.e., its failure time, avoiding an exhaustive study. Comparisons between the analytical and simulation results reveal less than 3.4% of error in the bound estimations for the considered setups.
- Published
- 2021
41. HCI-E2: HCI Engineering Education
- Author
-
Baumann, Konrad, Campos, José Creissac, Dix, Alan, Nigay, Laurence, Palanque, Philippe, Vanderdonckt, Jean, van der Veer, Gerrit, Weyers, Benjamin, Ardito, Carmelo, Lanzilotti, Rosa, Malizia, Alessio, Petrie, Helen, Piccinno, Antonio, Desolda, Giuseppe, Inkpen, Kori, Software and Sustainability (S2), Network Institute, Information Management & Software Engineering, Ardito, Carmelo, Lanzilotti, Rosa, Malizia, Alessio, Petrie, Helen, Piccinno, Antonio, Desolda, Giuseppe, and Inkpen, Kori
- Subjects
Process (engineering) ,4. Education ,Best practice ,05 social sciences ,Mission critical ,020207 software engineering ,02 engineering and technology ,Structuring ,Human-computer interaction ,User interface design ,Education ,Engineering ,Engineering education ,0202 electrical engineering, electronic engineering, information engineering ,ComputingMilieux_COMPUTERSANDEDUCATION ,0501 psychology and cognitive sciences ,Engineering ethics ,Working group ,Curriculum ,SDG 4 - Quality Education ,050107 human factors - Abstract
This workshop aims at identifying, examining, structuring and sharing educational resources and approaches to support the process of teaching/learning Human-Computer Interaction (HCI) Engineering. The broadening of the range of available interaction technologies and their applications, many times in safety and mission critical areas, to novel and less understood application domains, brings the question of how to address this ever-changing nature in university curricula usually static. Beyond, as these technologies are taught in diverse curricula (ranging from Human Factors and psychology to hardcore computer science), we are interested in what the best approaches and best practices are to integrate HCI Engineering topics in the curricula of programs in software engineering, computer science, human-computer interaction, psychology, design, etc. The workshop is proposed on behalf of the IFIP Working Groups 2.7/13.4 on User Interface Engineering and 13.1 on Education in HCI and HCI Curricula.
- Published
- 2021
42. Resilience-Oriented Behind-the-Meter Energy Storage System Evaluation for Mission-Critical Facilities
- Author
-
Esmat Zaidan, Farhad Angizeh, Mohsen A. Jafari, and Ali Ghofrani
- Subjects
Demand-side management ,021103 operations research ,General Computer Science ,system simulation ,energy storage ,020209 energy ,Mission critical ,Photovoltaic system ,load modeling ,0211 other engineering and technologies ,General Engineering ,Probabilistic logic ,02 engineering and technology ,Grid ,Energy storage ,Reliability engineering ,TK1-9971 ,Procurement ,Power rating ,Backup ,0202 electrical engineering, electronic engineering, information engineering ,solar power generation ,General Materials Science ,Electrical engineering. Electronics. Nuclear engineering ,resilience - Abstract
Immunization of mission-critical facilities such as hospitals and first responders against power outages is crucial for the operators due to their significant value of the lost load, affecting citizens’ lives. This paper proposes a novel evaluating framework which enables facility operators to efficiently size and optimally dispatch their behind-the-meter energy storage systems (BTM-ESS) for resiliency purposes during grid emergencies. The proposed framework, formulated as a mixed integer linear programming model, aids facility operators to quantify the impacts of various BTM-ESSs on resilience enhancement where the Avoided Loss of Load (ALOL) is incorporated as the resilience indicator. BTM-ESS is assumed to be operated in both standalone and coupled with solar photovoltaic (PV) as an onside backup generation which is a viable energy solution for more prolonged power outages. The proposed model is developed on a probabilistic energy procurement model, aiming to minimize the facility’s total operation cost. The uncertainty of power outages is characterized by a set of a large number of scenarios generated by the brute-force enumeration method. Additionally, to analyze the impacts of facilities’ behaviors on the BTM-ESS evaluation procedure, a set of 24 facilities from different end use sectors with various functionalities are simulated by employing our in-house-developed building simulator, which is a physics-based simulation tool. Finally, the practicality of the proposed evaluating framework is investigated through two case studies where both short and long-duration grid outages are examined based on the historical outage data adopted from New Jersey, USA. The simulation results reveal that a BTM-ESS with 4 hours discharge duration that is sized at rated power equal to 50% or more of the facility’s peak load generates sufficient resilience benefits for most of the 24 representative facilities in case of short-duration power outages.
- Published
- 2021
43. In-flight testing of the injection of the LISA Pathfinder test mass into a geodesic
- Author
-
D. Vignotto, Oliver Jennrich, Jacob Slutsky, Valerio Ferroni, A. Zambotti, D. Hoyland, Pierre Binétruy, Michele Armano, I. Harrison, A. Cesarini, G. Russano, M. Freschi, Gerhard Heinzel, N. Meshksar, Christian J. Killow, Luigi Ferraioli, Antonella Cavalleri, R. Giusteri, Peter Zweifel, Tamara Sumner, J. Grzymisch, Daniele Bortoluzzi, L. Mendes, Catia Grimani, H. Ward, S. Vitale, L. Liu, E. Castelli, J. Martino, Miquel Nofrarías, B. Kaune, Daniele Vetrugno, M. de Deus Silva, A. Wittchen, Mauro Hueller, L. Wissel, L. Martin-Polo, J. A. Lobo, S. Paczkowski, Nikolaos Karnesis, Michael Perreur-Lloyd, D. I. Robertson, G. Dixon, M.-S. Hartig, N. Korsakova, Domenico Giardini, Heather Audley, C. Zanoni, Davor Mance, Martin Hewitson, José F. F. Mendes, D. Texier, Ph. Jetzer, F. Rivas, J. P. López-Zaragoza, Ferran Gibert, P. Pivato, J. Baird, Karsten Danzmann, Antoine Petiteau, Paul McNamara, Eric Plagnol, V. Martín, Carlos F. Sopuerta, Gudrun Wanner, Juan Ramos-Castro, W. J. Weber, H. Inchauspe, Ingo Diepholz, E. D. Fitzsimons, Peter Wass, Rita Dolesi, A. M. Cruise, J. Reiche, Lluis Gesa, R. Maarschalkerweerd, F. Martin-Porqueras, Daniel Hollington, M. Born, James Ira Thorpe, Université Paris Diderot, Sorbonne Université, German Centre for Air and Space Travel, Federal Ministry for Economics Affairs and Energy (Germany), Istituto Nazionale di Fisica Nucleare, Ministerio de Economía y Competitividad (España), Consejo Superior de Investigaciones Científicas (España), UK Space Agency, University of Glasgow, Swiss National Science Foundation, University of Birmingham, National Aeronautics and Space Administration (US), AstroParticule et Cosmologie (APC (UMR_7164)), Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Institut National de Physique Nucléaire et de Physique des Particules du CNRS (IN2P3)-Observatoire de Paris, Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Centre National de la Recherche Scientifique (CNRS)-Université de Paris (UP), Observatoire de la Côte d'Azur (OCA), Institut national des sciences de l'Univers (INSU - CNRS)-Centre National de la Recherche Scientifique (CNRS), and Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Centre National de la Recherche Scientifique (CNRS)-Université Paris Cité (UPCité)
- Subjects
velocity ,Atmospheric Science ,experimental methods ,detector: satellite ,010504 meteorology & atmospheric sciences ,Computer science ,Mission critical ,Aerospace Engineering ,Residual ,01 natural sciences ,7. Clean energy ,LISA Pathfinder ,Acceleration ,Impulse measurement ,Space mechanism in-flight testing ,0103 physical sciences ,[PHYS.PHYS.PHYS-INS-DET]Physics [physics]/Physics [physics]/Instrumentation and Detectors [physics.ins-det] ,force: electrostatic ,noise: acceleration ,Aerospace engineering ,capture ,010303 astronomy & astrophysics ,0105 earth and related environmental sciences ,Injection into geodesic motion ,LISA ,mass: injection ,Payload ,business.industry ,Gravitational wave ,gravitational radiation ,Astronomy and Astrophysics ,gravitational radiation detector ,Telecommand ,experimental equipment ,Geophysics ,Pathfinder ,gravitation ,Space and Planetary Science ,trajectory ,[PHYS.GRQC]Physics [physics]/General Relativity and Quantum Cosmology [gr-qc] ,Trajectory ,General Earth and Planetary Sciences ,business ,geodesic ,experimental results ,LISA pathfinder - Abstract
LISA Pathfinder is a technology demonstrator space mission, aimed at testing key technologies for detecting gravitational waves in space. The mission is the precursor of LISA, the first space gravitational waves observatory, whose launch is scheduled for 2034. The LISA Pathfinder scientific payload includes two gravitational reference sensors (GRSs), each one containing a test mass (TM), which is the sensing body of the experiment. A mission critical task is to set each TM into a pure geodesic motion, i.e. guaranteeing an extremely low acceleration noise in the sub-Hertz frequency bandwidth. The grabbing positioning and release mechanism (GPRM), responsible for the injection of the TM into a geodesic trajectory, was widely tested on ground, with the limitations imposed by the 1-g environment. The experiments showed that the mechanism, working in its nominal conditions, is capable of releasing the TM into free-fall fulfilling the very strict constraint imposed on the TM residual velocity, in order to allow its capture on behalf of the electrostatic actuation. However, the first in-flight releases produced unexpected residual velocity components, for both the TMs. Moreover, all the residual velocity components were greater than maximum value set by the requirements. The main suspect is that unexpected contacts took place between the TM and the surroundings bodies. As a consequence, ad hoc manual release procedures had to be adopted for the few following injections performed during the nominal mission. These procedures still resulted in non compliant TM states which were captured only after impacts. However, such procedures seem not practicable for LISA, both for the limited repeatability of the system and for the unmanageable time lag of the telemetry/telecommand signals (about 4400 s). For this reason, at the end of the mission, the GPRM was deeply tested in-flight, performing a large number of releases, according to different strategies. The tests were carried out in order to understand the unexpected dynamics and limit its effects on the final injection. Some risk mitigation maneuvers have been tested aimed at minimizing the vibration of the system at the release and improving the alignment between the mechanism and the TM. However, no overall optimal release strategy to be implemented in LISA could be found, because the two GPRMs behaved differently., This work has been made possible by the LISA Pathfinder mission, which is part of the space-science programme of the European Space Agency.The French contribution has been supported by the CNES (Accord Specific de projet CNES 1316634/CNRS 103747), the CNRS, the Observatoire de Paris and the University Paris-Diderot.E. Plagnol and H. Inchauspé would also like to acknowledge the financial support of the UnivEarthS Labex program at Sorbonne Paris Cité (ANR-10-LABX-0023 and ANR-11-IDEX-0005-02).The Albert-Einstein-Institut acknowledges the support of the German Space Agency, DLR. The work is supported by the Federal Ministry for Economic Affairs and Energy based on a resolution of the German Bundestag (FKZ 50OQ0501 and FKZ 50OQ1601).The Italian contribution has been supported by Agenzia Spaziale Italiana and Istituto Nazionale di Fisica Nucleare.The Spanish contribution has been supported by contracts AYA2010-15709 (MICINN), ESP2013-47637-P, and ESP2015-67234-P (MINECO).M. Nofrarias acknowledges support from Fundacion General CSIC (Programa ComFuturo).F. Rivas acknowledges an FPI contract (MINECO). The Swiss contribution acknowledges the support of the Swiss Space Office (SSO) via the PRODEX Programme of ESA. L. Ferraioli is supported by the Swiss National Science Foundation.The UK groups wish to acknowledge support from the United Kingdom Space Agency (UKSA), the University of Glasgow, the University of Birmingham,Imperial College, and the Scottish Universities Physics Alliance (SUPA). J. I. Thorpe and J. Slutsky acknowledge the support of the US National Aeronautics and Space Administration (NASA).
- Published
- 2021
44. ASML: Algorithm-Agnostic Architecture for Scalable Machine Learning
- Author
-
Dimitris K. Iakovidis and Dimitrios E. Diamantis
- Subjects
Artificial intelligence ,General Computer Science ,parallel processing ,Computer science ,Mission critical ,Context (language use) ,02 engineering and technology ,Machine learning ,computer.software_genre ,Task (project management) ,distributed computing ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Throughput (business) ,business.industry ,General Engineering ,machine vision ,medical services ,Modular design ,Scalability ,Systems architecture ,Task analysis ,020201 artificial intelligence & image processing ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,computer ,Algorithm ,lcsh:TK1-9971 - Abstract
Machine Learning (ML) applications are growing in an unprecedented scale. The development of easy-to-use machine-learning application frameworks has enabled the development of advanced artificial intelligence (AI) applications with only a few lines of self-explanatory code. As a result, ML-based AI is becoming approachable by mainstream developers and small businesses. However, the deployment of ML algorithms for remote high throughput ML task execution, involving complex data-processing pipelines can still be challenging, especially with respect to production ML use cases. To cope with this issue, in this paper we propose a novel system architecture that enables Algorithm-agnostic, Scalable ML (ASML) task execution for high throughput applications. It aims to provide an answer to the research question of how to design and implement an abstraction framework, suitable for the deployment of end-to-end ML pipelines in a generic and standard way. The proposed ASML architecture manages horizontal scaling, task scheduling, reporting, monitoring and execution of multi-client ML tasks using modular, extensible components that abstract the execution details of the underlying algorithms. Experiments in the context of obstacle detection and recognition, as well as in the context of abnormality detection in medical image streams, demonstrate its capacity for parallel, mission critical, task execution.
- Published
- 2021
45. Optimizing the Decontamination and Reprocessing of Endoscopic Equipment
- Author
-
James Collins
- Subjects
education.field_of_study ,Endoscope ,Liquid Chemical Sterilization ,Computer science ,Process (engineering) ,Mission critical ,Population ,Gastroenterology ,Reuse ,Instructions for use ,Radiology, Nuclear Medicine and imaging ,Operations management ,education ,Gastrointestinal endoscopy - Abstract
Flexible Gastrointestinal Endoscopy is a commonly performed procedure about the globe as either a diagnostic or therapeutic tool in the treatment of GI Disease. In the United States, it has been estimated that over 20 million endoscopic procedures are performed annually. The reprocessing of an endoscope is an extremely detailed and multi-stepped process which is required after each procedure to render a contaminated instrument safe for reuse. Endoscopes are rather intricate instruments constructed with multiple long narrow internal channels with right angles. In addition to their complex construction, endoscopes must transverse an environment which bear high and diverse level of microbial population and organic matter. Due to this architectural structure, successful endoscope reprocessing is built upon a foundation of 9 primary steps which must be meticulously performed in concert with the Manufacturer's Instructions for Use as well as guidelines from professional organization to mitigate the potential of the transmission of Endoscope Associated Infections. The 9 pillars of effective endoscope reprocessing are: point of use precleaning, leakage testing, manual cleaning, rinse after cleaning, inspection, high level disinfection, liquid chemical sterilization or sterilization, rinse after high level disinfection or Liquid Cemical Sterilization, drying and storage. completing these steps each and every time an endoscope is processed is mission critical in the prevention of lapses and breaches in the reprocessing of endoscopes. Table 1 a well-trained and highly engaged reprocessing staff is also necessary to carry out these duties in accordance with strict institutional oversight of reprocessing protocols. While it is possible to gain insight into the general reprocessing practices throughout the nation through the use of surveys and interviews of endoscopists and nurses, due to the anonymity of these tools, it is often difficult to isolate specific facilities to gain a deeper appreciation of their practice unless the activities of these facilities has been published. Several topics and concepts related to opportunities to enhance reprocessing will be explored in this writing to evaluate and augment endoscope reprocessing with in the facility.
- Published
- 2021
46. A Scalable System Architecture for High-Performance Fault Tolerant Machine Drives
- Author
-
Filippo Savi, Davide Barater, Giampaolo Buticchi, Chris Gerada, and Pat Wheeler
- Subjects
TK7800-8360 ,Industrial engineering. Management engineering ,Computer science ,Mission critical ,multiphase machines ,current control ,Fault tolerance ,T55.4-60.8 ,Fault (power engineering) ,Reliability engineering ,Scalability ,Systems architecture ,resonant control ,DC-AC power converters ,fault tolerance ,Electronics ,Isolation (database systems) ,Architecture - Abstract
When targeting mission critical applications, the design of the electronic actuation systems needs to consider many requirements and constraints not typical in standard industrial applications. One of these is tolerance to faults, as the unplanned shutdown of a critical subsystem, if not handled correctly, could lead to financial harm, environmental disaster, or even loss of life. One way this can be avoided is through the design of an electric drive systems based on multi-phase machines that can keep operating, albeit with degraded performance, in a partial configuration under fault conditions. Distributed architectures are uniquely suited to meet these challenges, by providing a large degree of isolation between the various components. This paper presents a system architecture suitable for scalable and high-performance fault tolerant machine drive systems. the effectiveness of this system is demonstrated through theoretical analysis and experimental verification on a six-phase machine.
- Published
- 2021
47. Spectrum-Sharing UAV-Assisted Mission-Critical Communication: Learning-Aided Real-Time Optimisation
- Author
-
Trung Q. Duong, Minh-Hien T. Nguyen, Tan Do-Duy, Emiliano Garcia-Palacios, Long D. Nguyen, and Son T. Mai
- Subjects
General Computer Science ,Computer science ,Distributed computing ,Mission critical ,050801 communication & media studies ,Throughput ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,02 engineering and technology ,Base station ,0508 media and communications ,unmanned aerial vehicle (UAV) ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Resource management ,Artificial neural network ,05 social sciences ,General Engineering ,Disaster recovery ,020206 networking & telecommunications ,Cognitive radio ,machine learning ,Resource allocation ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Real-time optimisation ,lcsh:TK1-9971 ,spectrum sharing ,mission-critical communications - Abstract
We propose an unmanned aerial vehicle (UAV) communications scheme with spectrum-sharing mechanism to provide mission-critical services such as disaster recovery and public safety. Specifically, the UAVs can serve as flying base stations to provide extended network coverage for the affected area under spectrum-sharing cognitive radio networks (CRNs). To cope with the effects of network destruction in a disaster, we propose a real-time optimisation framework for resource allocation (e.g., power and number of UAVs) for CRNs assisted by UAV relays. The proposed optimisation scheme aims at optimising the network throughput of primary and secondary networks under the stringent constraint of maximum tolerable interference impinged on the primary users. We also propose a deep neural network (DNN) model to significantly reduce the execution time under real-time solution of mixed-integer UAV deployment problems. For both primary and secondary networks, our real-time optimisation algorithms impose low computational complexity, hence, have a low execution time in solving throughput optimisation problems, which demonstrates the benefit of our approached proposed for spectrum-sharing UAV-assisted mission-critical services.
- Published
- 2021
48. Fuzzy Logic Applied to System Monitors
- Author
-
Lipika Deka, Miguel A. Molina-Cabello, David Elizondo, Noel Khan, [Khan, Noel] De Montfort Univ, Sch Comp Sci & Informat, Leicester LE1 9B1L, Leics, England, [Elizondo, David A.] De Montfort Univ, Sch Comp Sci & Informat, Leicester LE1 9B1L, Leics, England, [Deka, Lipika] De Montfort Univ, Sch Comp Sci & Informat, Leicester LE1 9B1L, Leics, England, [Molina-Cabello, Miguel A.] Univ Malaga, Dept Comp Languages & Comp Sci, Malaga 29071, Spain, [Molina-Cabello, Miguel A.] Inst Invest Biomed Malaga IBIMA, Malaga 29010, Spain, Ministry of Science, Innovation and Universities of Spain through the Project Automated Detection With Low-Cost Hardware of Unusual Activities in Video Sequences, Autonomous Government of Andalusia (Spain) through the Project Detection of Anomalous Behavior Agents by Deep Learning in Low-Cost Video Surveillance Intelligent Systems, European Regional Development Fund (ERDF), Universidad de Malaga, and Instituto de Investigacion Biomedica de Malaga (IBIMA)
- Subjects
Market research ,Fuzzy sets ,Monitoring ,General Computer Science ,Computer science ,Mission critical ,Fuzzy set ,02 engineering and technology ,Software reliability ,01 natural sciences ,Fuzzy logic ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,0101 mathematics ,Productivity ,business.industry ,010102 general mathematics ,Uncertainty ,General Engineering ,Fault tolerance ,Linguistics ,Usability ,Fuzzy systems ,Fuzzy control system ,software reliability ,Autonomous systems ,TK1-9971 ,Reliability engineering ,Variety (cybernetics) ,monitoring ,fuzzy systems ,020201 artificial intelligence & image processing ,fault tolerance ,Electrical engineering. Electronics. Nuclear engineering ,State (computer science) ,business - Abstract
The Publisher's final version can be found by following the DOI link. Open access article. System monitors are applications used to monitor other systems (often mission critical) and take corrective actions upon a system failure. Rather than reactively take action after a failure, the potential of fuzzy logic to anticipate and proactively take corrective actions is explored here. Failures adversely affect a system’s non-functional qualities (e.g., availability, reliability, and usability) and may result in a variety of losses such as data, productivity, or safety losses. The detection and prevention of failures necessarily improves a critical system’s non-functional qualities and avoids losses. The paper is self-contained and reviews set and logic theory, fuzzy inference systems (FIS), explores parameterization, and tests the neighborhood of rule thresholds to evaluate the potential for anticipating failures. Results demonstrate detectable gradients in FIS state spaces and means fuzzy logic based system monitors can anticipate rule violations or system failures.
- Published
- 2021
49. Internet of Things 2.0: Concepts, Applications, and Future Directions
- Author
-
Justin Lipman, Mehran Abolhasan, Imran Makhdoom, Muhammad Raza, Negin Shariati, Abbas Jamalipour, Ian Zhou, and Rasool Keshavarz
- Subjects
energy harvesting ,IoT ,IoT2.0 ,General Computer Science ,Computer science ,Interoperability ,Mission critical ,mission critical communication ,02 engineering and technology ,World Wide Web ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,scalability ,Edge computing ,User Friendly ,08 Information and Computing Sciences, 09 Engineering, 10 Technology ,business.industry ,General Engineering ,020206 networking & telecommunications ,Networking hardware ,TK1-9971 ,machine learning ,Scalability ,Electrical engineering. Electronics. Nuclear engineering ,Internet of Things ,business ,5G - Abstract
Applications and technologies of the Internet of Things are in high demand with the increase of network devices. With the development of technologies such as 5G, machine learning, edge computing, and Industry 4.0, the Internet of Things has evolved. This survey article discusses the evolution of the Internet of Things and presents the vision for Internet of Things 2.0. The Internet of Things 2.0 development is discussed across seven major fields. These fields are machine learning intelligence, mission critical communication, scalability, energy harvesting-based energy sustainability, interoperability, user friendly IoT, and security. Other than these major fields, the architectural development of the Internet of Things and major types of applications are also reviewed. Finally, this article ends with the vision and current limitations of the Internet of Things in future network environments.
- Published
- 2021
50. Reliability and Availability of Multi-Channel IEC-61850 Substation Communication Networks for Mission-Critical Applications
- Author
-
Vonani Clive Mathebula and Akshay Kumar Saha
- Subjects
021103 operations research ,Markov chain ,Computer science ,020209 energy ,Structure function ,Mission critical ,0211 other engineering and technologies ,02 engineering and technology ,Telecommunications network ,Reliability engineering ,IEC 61850 ,0202 electrical engineering, electronic engineering, information engineering ,Systems thinking ,Multi channel ,Reliability (statistics) - Abstract
The introduction of IEC-61850 digital-based Substation Automation System (SAS) eases implementation of elaborate schemes; however, its reliability and availability continue to be investigated for executing mission-critical applications. Independent repairable multi-channel systems with voting capability such as ‘one-out-of-two’ tripping schemes are often used for critical safety-related functions because the individual scheme channels hardly ever fail simultaneously. The system configuration enables the scheme to self-reconfigure when a link failure occurs in one of the channels, as well as being repairable with no interruption to the overall mission. This paper reviews the reliability and availability of evaluation methods to highlight their advantages and disadvantages. Structure-function modelling, as well as Markov process incorporating Systems Thinking and Mathematical Expectation are used to model the reliability of IEC-61850 based SCN to demonstrate the shortcomings of combinatorial methods in the evaluation of mission-critical systems where diagnostic capabilities of the systems and imperfect repairs should be considered. It is evident from the results of the study that system diagnostic capability and repair efficiency cannot be ignored for mission-critical applications for the reason that the simplifying assumptions of combinatorial analysis methods greatly over-state the reliability and availability performance of the system as observed from the results.
- Published
- 2020
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.