Search results for "Oriente"

showing 10 items of 684 documents

Do Not Cancel My Race with Cyber-Physical Systems

2014

Abstract To engineer the factory of the future the paper argues for a reference model that is not necessary restricted to the control component, but integrates the physical and human components as well. This is due to the real need to accommodate the latest achievements in factory automation where the human is not merely playing a simple and clear role inside the control-loop, but is becoming a composite factor in a highly automated system (“man in the mesh”). The concept is demonstrated by instantiating the anthropocentric cyber-physical reference architecture for smart factories (ACPA4SF) in a concrete case study that needs to accommodate the ongoing researches from the SmartFactory KL fa…

Engineeringbusiness.industryCyber-physical systemFactory (object-oriented programming)Virtual trainingAugmented realityReference architectureSoftware engineeringbusinessReference modelMobile interactionAutomationSimulationIFAC Proceedings Volumes
researchProduct

Decentralized intrusion detection for secure cooperative multi-agent systems

2007

In this paper we address the problem of detecting faulty behaviors of cooperative mobile agents. A novel decentralized and scalable architecture that can be adopted to realize a monitor of the agents’ behavior is proposed. We consider agents which may perform different independent tasks, but cooperate to guarantee the entire system’s safety. Agents plan their next actions by following a set of rules which is shared among them. Such rules are decentralized, i.e. they dictate actions that depend only on configurations of neighboring agents. Some agents may not be acting according to this cooperation protocol, due to tampering or spontaneous failure. To detect such misbehaviors we propose a so…

Engineeringbusiness.industryDistributed computingMulti-agent systemsecurityScalable architectureIntrusion detection systemIntrusionSettore ING-INF/04 - AutomaticaIntrusion detectionmulti-agent systemsIntrusion prevention systembusinessSet (psychology)Protocol (object-oriented programming)2007 46th IEEE Conference on Decision and Control
researchProduct

Consensus-based Distributed Intrusion Detection for Multi-Robot Systems

2008

This paper addresses a security problem in robotic multi-agent systems, where agents are supposed to cooperate according to a shared protocol. A distributed Intrusion Detection System (IDS) is proposed here, that detects possible non-cooperative agents. Previous work by the authors showed how single monitors embedded on-board the agents can detect non- cooperative behavior, using only locally available information. In this paper, we allow such monitors to share the collected information in order to overcome their sensing limitation. In this perspective, we show how an agreement on the type of behavior of a target-robot may be reached by the monitors, through execution of a suitable consensu…

Engineeringbusiness.industryDistributed computingReal-time computingIntrusion detection systemDecentralised systemUpper and lower boundsComputer Science::Multiagent SystemsConsensusSettore ING-INF/04 - AutomaticaConvergence (routing)Transient (computer programming)Intrusion detectionbusinessIntelligent transportation systemProtocol (object-oriented programming)set--valued consensus algorithm
researchProduct

Distributed Intrusion Detection for the Security of Industrial Cooperative Robotic Systems

2014

Abstract This paper addresses the problem of detecting possible intruders in a group of autonomous robots which coexist in a shared environment and interact with each other according to a set of common rules. We consider intruders as robots which misbehave, i.e. do not follow the rules, because of either spontaneous failures or malicious reprogramming. Our goal is to detect intruders by observing the congruence of their behavior with the social rules as applied to the current state of the overall system. Moreover, in accordance with the fully distributed nature of the problem, the detection itself must be performed by individual robots, based only on local information. We present a general …

Engineeringbusiness.industryFormalism (philosophy)Distributed computingRoboticsIntrusion detection systemVariety (cybernetics)Robotics Security Industrial environmentRobotArtificial intelligenceState (computer science)Set (psychology)businessProtocol (object-oriented programming)IFAC Proceedings Volumes
researchProduct

Distributed Multi-level Motion Planning for Autonomous Vehicles in Large Scale Industrial Environments

2013

In this paper we propose a distributed coordination algorithm for safe and efficient traffic management of heterogeneous robotic agents, moving within dynamic large scale industrial environments. The algorithm consists of a distributed resource--sharing protocol involving a re--planning strategy. Once every agent is assigned with a desired motion path, the algorithm ensures ordered traffic flows of agents, that avoid inter--robot collision and system deadlock (stalls). The algorithm allows multi--level representation of the environment, i.e. large or complex rooms may be seen as a unique resource with given capacity at convenience, which makes the approach appealing for complex industrial e…

Engineeringbusiness.industryMulti-agent systemDistributed computingReal-time computingDeadlockmulti-robotPlanningResource (project management)Shared memorySettore ING-INF/04 - AutomaticaPath (graph theory)RobotMotion planningbusinessProtocol (object-oriented programming)
researchProduct

Local Monitor Implementation for Decentralized Intrusion Detection in Secure Multi–Agent Systems

2007

This paper focuses on the detection of misbehav- ing agents within a group of mobile robots. A novel approach to automatically synthesize a decentralized Intrusion Detection System (IDS) as well as an efficient implementation of local monitors are presented. In our scenario, agents perform possi- bly different independent tasks, but cooperate to guarantee the entire system’s safety. Indeed, agents plan their next actions by following a set of logic rules which is shared among them. Such rules are decentralized, i.e. they depend only on configurations of neighboring agents. However, some agents may not be acting according to this cooperation protocol, due to spontaneous failure or tampering.…

Engineeringbusiness.industryMulti-agent systemDistributed computingReal-time computingMobile robotIntrusion detection systemsecuritySpace (commercial competition)Set (abstract data type)Settore ING-INF/04 - AutomaticaIntrusion detectionmulti-agent systemsRule of inferencebusinessProtocol (object-oriented programming)
researchProduct

Market-oriented analysis for active distribution systems

2009

Distribution networks are today the place where demand and offer are physically located and meet. Offer comes from Generation companies, through distributed generation, while demand is usually represented by simple users. Distribution company both buy and sell energy so they implement both sides. The EU promotes the free market and the renewable energy sources (RES) supported by the distributed generation technology. The technical-economical scenario in which distributed generation is thus growing is complex and comprises a large number of stakeholders. The authors, on the basis of previous studies want to analyse the problem of identifying sets of stakeholders sharing the common interest o…

Engineeringbusiness.industryProfit (economics)Renewable energyDistribution systemMarket analysisDistributed generationMarket orientedEnergy marketMarketingFree marketbusinessactive distribution systems market-oriented analysisIndustrial organizationIET Conference Publications
researchProduct

Cyber Security for Wireless Semantic (SCADA/DCS) Systems

2016

International audience; Supervisory Control and Data Acquisition and Distributed Control Systems named (SCADA/DCS) have played a key role in the design of modern power smart applications, particularly in the automatic management of real time energetic platforms. In this work, we present a semantic cyber security vulnerabilities add to classic one, with the use of semantic embedded application in smart devices in semantic wireless (SCADA/DCS) systems, focusing on the semantic attacks. In this work, we present a new security semantic wireless protocol as a secure communication support for these modern semantic wireless systems named (ZIGBEE/SOAP/SECURITY), obtained by the combination between …

Engineeringcomputer.internet_protocolSOAP0211 other engineering and technologies[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]02 engineering and technologyComputer securitycomputer.software_genre[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Supervisory controlSecure communicationSCADAWireless Application ProtocolSemantic Wireless (SCADA/DCS)Wireless Security ProtocolProtocol (object-oriented programming)Semantic Cyber Security[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]021110 strategic defence & security studiesbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS021001 nanoscience & nanotechnology(ZIGBEE/SOAP/SECURITY) ProtocolControl and Systems EngineeringKey (cryptography)0210 nano-technologyDistributed control systembusinessSmart Energetic PlatformcomputerComputer network
researchProduct

Reconfigurable control of robotized manufacturing cells

2007

This paper investigates the field of manufacturing system control. The addressed subject is indeed very fascinating, due to the importance that it has reached in the last decades both at research and industrial level. On the other hand, it seems to the author that most of the complexity intrinsic to the subject itself relies on the different meanings or levels of abstraction that both the terms ''manufacturing system'' and ''control'' may symbolize. The presented research aims to face the topic in a concrete fashion, i.e., by developing a control software system for a specific, although easy to be generalized, robotized manufacturing cell. Two different development methodologies, from the c…

Engineeringinterlocking logicPLC-based controlbusiness.industryreconfigurable controlPC-based controlGeneral MathematicsMass customizationControl (management)Ladder logicSettore ING-IND/35 - Ingegneria Economico-GestionaleIndustrial and Manufacturing EngineeringManufacturing engineeringComputer Science ApplicationsConceptual designComputer-integrated manufacturingControl and Systems EngineeringControl systembusinessSoftwareobject-oriented modelingAbstraction (linguistics)Manufacturing execution system
researchProduct

Closed-loop bandwidth impact on MVSA for rotor broken bar diagnosis in IRFOC double squirrel cage induction motor drives

2013

This paper investigates the detectability of rotor broken bars in indirect rotor flux oriented control (IRFOC) for variable speed double cage induction motor drives, using vibration signature analysis techniques. The Impact of the closed loop control system cannot be neglected when the detection of rotor asymmetries in the machine is based on the signature analysis of electrical or mechanical variables. Therefore, the investigation of rotor fault components for different bandwidths of closed-loop regulators is necessary to evaluate its relevance in the above listed variables. This paper investigates the impact of the control system on relevance of the fault components computed from axial an…

Engineeringvibration signature analysis techniqueclosed-loop bandwidth impactrotor broken bar diagnosiSettore ING-IND/32 - Convertitori Macchine E Azionamenti Elettricielectrical variablelaw.inventionlawRotorclosed loop control systemcontrol impactInduction motorINDUCTION MOTOR DRIVESbandwidth PI regulatorrotor asymmetry detectionBandwidth (signal processing)closed loop systemStatorIRFOC double-squirrel cage induction motor driveFAULT DIAGNOSISrotor broken barmachine controlPI controlindirect rotor flux oriented controlMVSArotor broken bar detectabilityvariable speed double cage induction motor drivesquirrel cageinduction motor driveVibrationWound rotor motorrobust fault signatureQuantitative Biology::Subcellular ProcessesBandwidthControl theoryquirrel cage motordouble cage rotorrotor fault componentMachine controlaxial vibration signalbusiness.industrySquirrel-cage rotorRegulatormechanical variablefault diagnosiAC MachineBarCondition monitoringVibrationclosed-loop regulatorControl systembusinessrotor bar breakageClosed loopradial vibration signalInduction motor
researchProduct