2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)最新文献

筛选
英文 中文
Privacy preserving origin-destination flow measurement in vehicular cyber-physical systems 车辆网络物理系统中保护隐私的始发-目的地流量测量
Yian Zhou, Shigang Chen, Zhen Mo, Yafeng Yin
{"title":"Privacy preserving origin-destination flow measurement in vehicular cyber-physical systems","authors":"Yian Zhou, Shigang Chen, Zhen Mo, Yafeng Yin","doi":"10.1109/CPSNA.2013.6614243","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614243","url":null,"abstract":"Traffic volume measurement is one of the most basic functions of road planning and management. In this paper, we investigate an important problem of privacy preserving “point-to-point” traffic volume measurement. We formalize “point-to-point” traffic as an origin-destination (O-D) flow, which represents the set of vehicles traveling from one geographical location (origin) to another location (destination). We take advantage of vehicular cyber-physical systems (VCPS) to exploit the potential for a fundamental shift in the way how O-D data are collected. The challenge is to allow the collection of statistical O-D flow information, yet protect identities of individual vehicles. To address that, we design two novel schemes which utilize both the latest technological advance in VCPS and the nice properties of a family of commutative one-way hash functions. Furthermore, we adopt statistical methodology and use sampling to achieve far better efficiency with graceful degradation in measurement accuracy. We perform simulations to demonstrate the feasibility and scalability of our schemes.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127369617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
ART-Linux for high-frequency system control ART-Linux用于高频系统控制
S. Kagami, Y. Ishiwata, K. Nishiwaki
{"title":"ART-Linux for high-frequency system control","authors":"S. Kagami, Y. Ishiwata, K. Nishiwaki","doi":"10.1109/CPSNA.2013.6614247","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614247","url":null,"abstract":"This paper presents the design and implementation of ART-Linux - a low-latency real-time extension of the Linux kernel for high-frequency system control. It is particularly tailored for the Intel x86 architecture, providing real-time (periodic) task execution system calls in user-space. ART-Linux provides simple yet strong system calls to allow periodic real-time programs to run in user-space with existing Linux device drivers, while providing users with standard developing, executing, debugging, and investigating environments. There is no need to add special device drivers. In order to achieve real-time functions in the Linux kernel, ART-Linux introduces the following techniques: 1) a mutualexclusive execution mechanism realized by virtual processor numbers, 2) a transfer queue to avoid mutex-locked mutual-exclusive execution, and 3) a multi-level priority inversion function. A finegrained implementation tuning of these techniques achieves very small jitters for specified periods (less than 20[μs] in practice). Experimental results using a well-known humanoid robot called HRP-2 no.12 demonstrate that jitters of cycle times are retained in an acceptable range for humanoid control.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128826982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Responsive alert delivery over IP network 通过IP网络响应警报交付
Y. Ou, C. Huang, C. Hu, J. W. Liu, E. Chu, C. Shih
{"title":"Responsive alert delivery over IP network","authors":"Y. Ou, C. Huang, C. Hu, J. W. Liu, E. Chu, C. Shih","doi":"10.1109/CPSNA.2013.6614241","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614241","url":null,"abstract":"Intelligent Guards against Disasters (iGaDs) are devices and applications deployed pervasively in future smart homes and environments. By receiving and processing standard-based machine-readable disaster alert messages from authorized senders and taking appropriate actions in response, they aim to help us better cope with natural disasters. The focus of this paper is on responsive delivery of alert messages over an IP network to a huge number of embedded iGaDs. The Asynchronous Message Delivery Service (AMeDS) is designed for this purpose. After presenting an overview of iGaDs and AMeDs, the paper describes an end-to-end scheduling mechanism used by AMeDS and discusses performance limitations in pushing time-critical alerts to iGaDs over the Internet.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"62 3-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120903948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Study of temperature control using cyber-physical system approach in home environment 基于信息物理系统方法的家庭环境温度控制研究
W. Shein, Zhuo Cheng, Yasuo Tan, A. Lim
{"title":"Study of temperature control using cyber-physical system approach in home environment","authors":"W. Shein, Zhuo Cheng, Yasuo Tan, A. Lim","doi":"10.1109/CPSNA.2013.6614250","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614250","url":null,"abstract":"Technology advances allow us to design smart home system for the purpose of achieving high demand on occupants' comfort. In this research, we focus on building a thermal comfort controller for the existing hybrid temperature control (HTC) system, which is based on the cyber-physical system (CPS) approach. By using air-conditioner, window and curtain, our proposed controller can acquire the desired temperature while achieving high energy efficiency. We evaluate and verify our proposed controller in the cyber-physical home system environment by using MATLAB/Simulink tool and the raw data gathered from actual measurements.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131590667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
GPU implementations of object detection using HOG features and deformable models 使用HOG特征和可变形模型的目标检测的GPU实现
Manato Hirabayashi, S. Kato, M. Edahiro, K. Takeda, Taiki Kawano, S. Mita
{"title":"GPU implementations of object detection using HOG features and deformable models","authors":"Manato Hirabayashi, S. Kato, M. Edahiro, K. Takeda, Taiki Kawano, S. Mita","doi":"10.1109/CPSNA.2013.6614255","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614255","url":null,"abstract":"Vision-based object detection using camera sensors is an essential piece of perception for autonomous vehicles. Various combinations of features and models can be applied to increase the quality and the speed of object detection. A well-known approach uses histograms of oriented gradients (HOG) with deformable models to detect a car in an image [15]. A major challenge of this approach can be found in computational cost introducing a real-time constraint relevant to the real world. In this paper, we present an implementation technique using graphics processing units (GPUs) to accelerate computations of scoring similarity of the input image and the pre-defined models. Our implementation considers the entire program structure as well as the specific algorithm for practical use. We apply the presented technique to the real-world vehicle detection program and demonstrate that our implementation using commodity GPUs can achieve speedups of 3x to 5x in frame-rate over sequential and multithreaded implementations using traditional CPUs.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127085835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Stochastic online sensor scheduler for remote state estimation 用于远程状态估计的随机在线传感器调度
Junfeng Wu, Yilin Mo, Ling Shi
{"title":"Stochastic online sensor scheduler for remote state estimation","authors":"Junfeng Wu, Yilin Mo, Ling Shi","doi":"10.1109/CPSNA.2013.6614251","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614251","url":null,"abstract":"In this paper, a remote state estimation problem where a sensor measures the state of a linear discrete-time process in an infinite time horizon is considered. We aim to minimize the average estimation error subject to a limited sensor-estimator communication rate. We propose a stochastic online sensor schedule: whether or not the sensor sends data is based on its measurements and a stochastic holding time between the present and the most recent sensor-estimator communication instance. This decision process is formulated as a generalized geometric programming (GGP) optimization problem. It can be solved with a tractable computational complexity and provides a better performance compared with the optimal offline schedule. Numerical example is provided to illustrate main results.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132899737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Defending malicious attacks in Cyber Physical Systems 防御网络物理系统中的恶意攻击
Chia-Mei Chen, H. Hsiao, Peng-Yu Yang, Ya-Hui Ou
{"title":"Defending malicious attacks in Cyber Physical Systems","authors":"Chia-Mei Chen, H. Hsiao, Peng-Yu Yang, Ya-Hui Ou","doi":"10.1109/CPSNA.2013.6614240","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614240","url":null,"abstract":"An increasing number of security incidents on industrial control systems drew a lot of concerns lately. Many attacks involved multiple attack vectors similar to internet attacks. However, CPS are more vulnerable to attacks. To evade detection, a hacker may apply multiple attack stages to gain the access to a control system. For example, he first employs a group of zombies (compromised machines) to identify the vulnerabilities of the target system and the findings would send back to the hacker through a communication channel. Once the correct access information is found by the zombies, the hacker could gain unauthorized access without violating any detection rules. The control system may be compromised by such multi-stage attacks and an appropriate defense mechanism is desired. In order to detect the sequence of such attack, this study correlates network information and system logs to find the stages of the attack. Finite state model, hidden Markov chain, is adopted to identify the multi-stage attacks and to prevent real damage. The results show that the proposed system can identify the multi-stage attacks in the early stage efficiently to prevent further damage in the networks.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115283977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Lifelog-based active movement assistant system 基于生活日志的主动运动辅助系统
Yusuke Satonaka, Takumi Kitazawa, Kazuki Suzuki, Yuki Fukuzaki, Takuya Azumi, N. Nishio
{"title":"Lifelog-based active movement assistant system","authors":"Yusuke Satonaka, Takumi Kitazawa, Kazuki Suzuki, Yuki Fukuzaki, Takuya Azumi, N. Nishio","doi":"10.1109/CPSNA.2013.6614239","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614239","url":null,"abstract":"In our daily life, we commute between home and office. Even if we leave at around the same time and on the the same route, the arrival time might not be the same due to the difference in walking speed, traffic conditions and trains to ride. Therefore, it is useful to develop a movement assisting system which can give the user timely pace-making advice. In order to give such advice automatically, the system has to know an accurate progress of the movement, the method of transportation and its mobility characteristics; walking speed, routes and traffic congestion characteristics. Hence, we propose a movement assisting system that proactively checks user's movement progress and gives timely advice upon automatically created personalized plan. Utilizing user's daily life log data of movements, it extracts key features as the places the often visited at and methods of transportation between them, and estimates arrival time to the destination according to their movement characteristics. In the case of movement by bus, our system could reduce 25% of arrival time estimation error compared with the conventional methods.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117073467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy-efficient sensor and task scheduling for extending battery life in a sensor node 节能传感器与任务调度,延长传感器节点电池寿命
Qian Zhao, Y. Nakamoto
{"title":"Energy-efficient sensor and task scheduling for extending battery life in a sensor node","authors":"Qian Zhao, Y. Nakamoto","doi":"10.1109/CPSNA.2013.6614253","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614253","url":null,"abstract":"Wireless sensor nodes are becoming more and more common in various settings and require a long battery life for better maintainability. Since most sensor nodes are powered by batteries, energy efficiency of the sensor node became a critical problem. In an experiment, we observed that battery voltage drops quickly due to a high peak power consumption. When battery voltage dropped to the operation voltage, the sensor stops working even though some useful charge remains in the battery. We propose three off-line algorithms that extend battery life by scheduling sensors' execution time that is able to reduce peak power consumption as much as possible under a deadline constraint. Moreover, we present a DVFS-enabled periodical task execution algorithm and an execution time scaling periodical task execution algorithm to improve the total energy efficiency of the sensor node. We also simulated these sensor scheduling algorithms and the task scheduling algorithms to evaluate their effectiveness. The simulation results showed that one of the three sensor scheduling algorithms dramatically can extend battery life approximately three time as long as in simultaneous sensor activation, and the two task scheduling algorithms are more energy efficient compared with continuous task execution.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"141 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133356510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enclosing the behavior of a hybrid system up to and beyond a Zeno point 封闭混合系统在芝诺点及芝诺点之后的行为
M. Konečný, Walid Taha, J. Duracz, Adam Duracz, A. Ames
{"title":"Enclosing the behavior of a hybrid system up to and beyond a Zeno point","authors":"M. Konečný, Walid Taha, J. Duracz, Adam Duracz, A. Ames","doi":"10.1109/CPSNA.2013.6614258","DOIUrl":"https://doi.org/10.1109/CPSNA.2013.6614258","url":null,"abstract":"Even simple hybrid systems like the classic bouncing ball can exhibit Zeno behaviors. The existence of this type of behavior has so far forced simulators to either ignore some events or risk looping indefinitely. This in turn forces modelers to either insert ad hoc restrictions to circumvent Zeno behavior or to abandon hybrid modeling. To address this problem, we take a fresh look at event detection and localization. A key insight that emerges from this investigation is that an enclosure for a given time interval can be valid independently of the occurrence of a given event. Such an event can then even occur an unbounded number of times, thus making it possible to handle certain types of Zeno behavior.","PeriodicalId":212743,"journal":{"name":"2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128694938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信