Translate to multiple languages

Subscribe to my Email updates

https://feedburner.google.com/fb/a/mailverify?uri=helgeScherlundelearning
Enjoy what you've read, make sure you subscribe to my Email Updates

Tuesday, January 19, 2016

New Issue Published: International Journal of Online Engineering Volume 12, Issue 1 (2016)

International Journal of Online Engineering (iJOE) has just published its latest issue at http://www.i-joe.org.
Have a look at the Table of Contents.



Review the Table of Contents here and then visit the website to review articles and items of interest. 
 

iJOE is an Open Access Journal. Readers don't have to pay any fee. Only registration is necessary.  
Register

Table of Contents 
Papers   

Towards a Generic Architecture for Building Modular CPS as Applied to Mobile Robotics
By Pablo González-Nalda, Ismael Etxeberria-Agiriano and Isidro Calvo 


Abstract
This paper presents a generic architecture for the design of Cyber-Physical Systems (CPS) based on inexpensive and easily available hardware and open source software components. . This architecture provides a framework aimed at building CPS in a robust, flexible and modular way. The presented architecture intends to ease the construction of this kind of systems together with its evolution and management.
The potential of the proposed architecture is illustrated by means of a case study consisting of a mobile robotics application built with low cost hardware modules modules.
There is a large community of users for these components and plenty of related technical information is available. As a consequence, these inexpensive components were found
suitable for being used at different application domains, including research and education.
 


Key Vulnerabilities of Industrial Automation and Control Systems and Actions to Prevent Cyber-Attacks
By Isidro Calvo, Ismael Etxeberria-Agiriano, Miguel A Iñigo and Pablo González-Nalda 

Abstract
Until recently, Industrial Automation and Control Systems (IACS) were largely isolated from corporate systems by means of proprietary protocols, which facilitated their protection against cyber-attacks under the principle of security through obscurity. However, the widespread adoption of the new communication technologies, such as the Internet protocols and wireless communications has changed this scenario.

During recent years there have been many evidences of cyber-attacks to IACS that exploit their vulnerabilities. Unfortunately, these attacks have increased significantly during the last five years, and we should be aware that only the tip of the iceberg comes to the public knowledge.

The purpose of this article is twofold: (1) to raise awareness about the security vulnerabilities that most companies are facing at their IACS and (2) to set a starting point by proposing a roadmap that seeks to guide designers and programmers in the new and complex world of industrial cyber-security.
By Doru E Ursutiu, Yurii Kuchirka, Cornel Samoila and L Vytvytska 

Abstract
In this paper is described the online course and hands-on laboratory for automated control systems study and research. The lab, based on a DC motor is an open source, suitable for modern mobile devices, includes video broadcast of its activity control in real time and does not require additional client software.
 
Fractal-Based Outlier Detection Algorithm over RFID Data Streams 
Li Lian Sheng 

Abstract
Nowadays, Radio frequency identification (RFID) has been extensively deployed to retailing, supply chain management, object recognition, object monitoring and tracking and many other fields. Detecting outliers in RFID data streams can help us find abnormal activities and thus avoid disasters. In order to detect outliers in RFID data streams efficiently and effectively, we proposed a fractal based outlier detection algorithm. Firstly, we built a monotone searching space based on the self-similarity of fractal. Then, we proposed two piecewise fractal models for RFID data streams, and presented an outlier detection algorithm based on the piecewise fractal model. Finally, we validated the efficiency and effectiveness of the proposed algorithm by massive experiments. 


Enjoy your reading!