10 resultados para cyber-terrorism
em Instituto Politécnico do Porto, Portugal
Resumo:
This paper deals with the application of an intelligent tutoring approach to delivery training in diagnosis procedures of a Power System. In particular, the mechanisms implemented by the training tool to support the trainees are detailed. This tool is part of an architecture conceived to integrate Power Systems tools in a Power System Control Centre, based on an Ambient Intelligent paradigm. The present work is integrated in the CITOPSY project which main goal is to achieve a better integration between operators and control room applications, considering the needs of people, customizing requirements and forecasting behaviors.
Resumo:
Cyber-Physical Systems and Ambient Intelligence are two of the most important and emerging paradigms of our days. The introduction of renewable sources gave origin to a completely different dimension of the distribution generation problem. On the other hand, Electricity Markets introduced a different dimension in the complexity, the economic dimension. Our goal is to study how to proceed with the Intelligent Training of Operators in Power Systems Control Centres, considering the new reality of Renewable Sources, Distributed Generation, and Electricity Markets, under the emerging paradigms of Cyber-Physical Systems and Ambient Intelligence. We propose Intelligent Tutoring Systems as the approach to deal with the intelligent training of operators in these new circumstances.
Resumo:
In the energy management of a small power system, the scheduling of the generation units is a crucial problem for which adequate methodologies can maximize the performance of the energy supply. This paper proposes an innovative methodology for distributed energy resources management. The optimal operation of distributed generation, demand response and storage resources is formulated as a mixed-integer linear programming model (MILP) and solved by a deterministic optimization technique CPLEX-based implemented in General Algebraic Modeling Systems (GAMS). The paper deals with a vision for the grids of the future, focusing on conceptual and operational aspects of electrical grids characterized by an intensive penetration of DG, in the scope of competitive environments and using artificial intelligence methodologies to attain the envisaged goals. These concepts are implemented in a computational framework which includes both grid and market simulation.
Resumo:
Localization is a fundamental task in Cyber-Physical Systems (CPS), where data is tightly coupled with the environment and the location where it is generated. The research literature on localization has reached a critical mass, and several surveys have also emerged. This review paper contributes on the state-of-the-art with the proposal of a new and holistic taxonomy of the fundamental concepts of localization in CPS, based on a comprehensive analysis of previous research works and surveys. The main objective is to pave the way towards a deep understanding of the main localization techniques, and unify their descriptions. Furthermore, this review paper provides a complete overview on the most relevant localization and geolocation techniques. Also, we present the most important metrics for measuring the accuracy of localization approaches, which is meant to be the gap between the real location and its estimate. Finally, we present open issues and research challenges pertaining to localization. We believe that this review paper will represent an important and complete reference of localization techniques in CPS for researchers and practitioners and will provide them with an added value as compared to previous surveys.
Resumo:
We present a distributed algorithm for cyber-physical systems to obtain a snapshot of sensor data. The snapshot is an approximate representation of sensor data; it is an interpolation as a function of space coordinates. The new algorithm exploits a prioritized medium access control (MAC) protocol to efficiently transmit information of the sensor data. It scales to a very large number of sensors and it is able to operate in the presence of sensor faults.
Resumo:
Ian McEwan‘s novel Saturday deals with the complex issues of conflict and transformation in the age of terrorism. The plot presents one internal dilemma and several interpersonal altercations that occur within a mere twenty-four hours: a) Perowne (the protagonist) vs. himself, in face of his ambivalent thoughts regarding British military participation in the war in the Middle East; b) The protagonist vs. Baxter, a ruffian from East End, in the context of a car accident; c) Perowne vs. a fellow anaesthetist, Jay Strauss, during a squash game; d) Perowne‘s daughter, Daisy vs. her grandfather, John Grammaticus, both poets and rivals; e) Perowne‘s family vs. Baxter, who intrudes the protagonist‘s house. In this paper, I exemplify, analyse and discuss how: a) Understanding the causes of what we call evil constitutes an important step towards mutual understanding; b) Both science and arts (which Perowne considers, at first, irrelevant) are important elements in the process of transformation; c) Both personal and interpersonal conflicts are intrinsic to human nature — but they also propitiate healthy changes in behaviour and opinion, through reflection. In order to do so, I resort to Saturday, and to the work of several specialists in the field of conflict management.
Resumo:
Catastrophic events, such as wars and terrorist attacks, tornadoes and hurricanes, earthquakes, tsunamis, floods and landslides, are always accompanied by a large number of casualties. The size distribution of these casualties has separately been shown to follow approximate power law (PL) distributions. In this paper, we analyze the statistical distributions of the number of victims of catastrophic phenomena, in particular, terrorism, and find double PL behavior. This means that the data sets are better approximated by two PLs instead of a single one. We plot the PL parameters, corresponding to several events, and observe an interesting pattern in the charts, where the lines that connect each pair of points defining the double PLs are almost parallel to each other. A complementary data analysis is performed by means of the computation of the entropy. The results reveal relationships hidden in the data that may trigger a future comprehensive explanation of this type of phenomena.
Resumo:
Wireless sensor networks (WSNs) have attracted growing interest in the last decade as an infrastructure to support a diversity of ubiquitous computing and cyber-physical systems. However, most research work has focused on protocols or on specific applications. As a result, there remains a clear lack of effective, feasible and usable system architectures that address both functional and non-functional requirements in an integrated fashion. In this paper, we outline the EMMON system architecture for large-scale, dense, real-time embedded monitoring. EMMON provides a hierarchical communication architecture together with integrated middleware and command and control software. It has been designed to use standard commercially-available technologies, while maintaining as much flexibility as possible to meet specific applications requirements. The EMMON architecture has been validated through extensive simulation and experimental evaluation, including a 300+ node test-bed, which is, to the best of our knowledge, the largest single-site WSN test-bed in Europe to date.
Resumo:
IEEE International Conference on Cyber Physical Systems, Networks and Applications (CPSNA'15), Hong Kong, China.
Resumo:
Catastrophic events, such as wars and terrorist attacks, big tornadoes and hurricanes, huge earthquakes, tsunamis, floods, and landslides, are always accompanied by a large number of casualties. The size distribution of these casualties have separately been shown to follow approximate power law (PL) distributions. In this paper, we analyze the number of victims of catastrophic phenomena, in particular, terrorism, and find double PL behavior. This means that the data set is better approximated by two PLs instead of one. We have plotted the two PL parameters corresponding to all terrorist events occurred in every year, from 1980 to 2010. We observe an interesting pattern in the chart, where the lines, that connect each pair of points defining the double PLs, are roughly aligned to each other.