Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,706)

Search Parameters:
Keywords = cyber physical systems

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
20 pages, 812 KiB  
Article
End-to-End Framework for Identifying Vulnerabilities of Operational Technology Protocols and Their Implementations in Industrial IoT
by Matthew Boeding, Michael Hempel and Hamid Sharif
Future Internet 2025, 17(1), 34; https://doi.org/10.3390/fi17010034 - 14 Jan 2025
Abstract
The convergence of IT and OT networks has gained significant attention in recent years, facilitated by the increase in distributed computing capabilities, the widespread deployment of Internet of Things devices, and the adoption of Industrial Internet of Things. This convergence has led to [...] Read more.
The convergence of IT and OT networks has gained significant attention in recent years, facilitated by the increase in distributed computing capabilities, the widespread deployment of Internet of Things devices, and the adoption of Industrial Internet of Things. This convergence has led to a drastic increase in external access capabilities to previously air-gapped industrial systems for process control and monitoring. To meet the need for remote access to system information, protocols designed for the OT space were extended to allow IT networked communications. However, OT protocols often lack the rigor of cybersecurity capabilities that have become a critical characteristic of IT protocols. Furthermore, OT protocol implementations on individual devices can vary in performance, requiring the comprehensive evaluation of a device’s reliability and capabilities before installation into a critical infrastructure production network. In this paper, the authors define a framework for identifying vulnerabilities within these protocols and their on-device implementations, utilizing formal modeling, hardware in the loop-driven network emulation, and fully virtual network scenario simulation. Initially, protocol specifications are modeled to identify any vulnerable states within the protocol, leveraging the Construction and Analysis of Distributed Processes (CADP) software (version 2022-d “Kista”, which was created by Inria, the French Institute for Research in Computer Science and Automation, in France). Device characteristics are then extracted through automated real-time network emulation tests built on the OMNET++ framework, and all measured device characteristics are then used as a virtual device representation for network simulation tests within the OMNET++ software (version 6.0.1., a public-soucre, open-architecture software, initially developed by OpenSim Limited in Budapest, Hungary), to verify the presence of any potential vulnerabilities identified in the formal modeling stage. With this framework, the authors have thus defined an end-to-end process to identify and verify the presence and impact of potential vulnerabilities within a protocol, as shown by the presented results. Furthermore, this framework can test protocol compliance, performance, and security in a controlled environment before deploying devices in live production networks and addressing cybersecurity concerns. Full article
Show Figures

Figure 1

16 pages, 581 KiB  
Article
Securing Cyber Physical Systems: Lightweight Industrial Internet of Things Authentication (LI2A) for Critical Infrastructure and Manufacturing
by Alaa T. AL Ghazo, Mohammed Abu Mallouh, Sa’ed Alajlouni and Islam T. Almalkawi
Appl. Syst. Innov. 2025, 8(1), 11; https://doi.org/10.3390/asi8010011 - 14 Jan 2025
Viewed by 205
Abstract
The increasing incorporation of Industrial Internet of Things (IIoT) devices into critical industrial operations and critical infrastructures necessitates robust security measures to safeguard confidential information and ensure dependable connectivity. Particularly in Cyber Physical Systems (CPSs), IIoT system security becomes critical as systems become [...] Read more.
The increasing incorporation of Industrial Internet of Things (IIoT) devices into critical industrial operations and critical infrastructures necessitates robust security measures to safeguard confidential information and ensure dependable connectivity. Particularly in Cyber Physical Systems (CPSs), IIoT system security becomes critical as systems become more interconnected and digital. This paper introduces a novel Lightweight Industrial IoT Authentication (LI2A) method as a solution to address security concerns in the industrial sector and smart city infrastructure. Mutual authentication, authenticated message integrity, key agreement, soundness, forward secrecy, resistance to a variety of assaults, and minimal resource consumption are all features offered by LI2A. Critical to CPS operations, the approach prevents impersonation, man-in-the-middle, replay, eavesdropping, and modification assaults, according to a security study. The method proposed herein ensures the integrity of CPS networks by verifying communication reliability, identifying unauthorized message modifications, establishing a shared session key between users and IIoT devices, and periodically updating keys to ensure sustained security. A comprehensive assessment of performance takes into account each aspect of storage, communication, and computation. The communication and computing capabilities of LI2A, which are critical for the operation of CPS infrastructure, are demonstrated through comparisons with state-of-the-art systems from the literature. LI2A can be implemented in resource-constrained IIoT devices found in CPS and industrial environments, according to the results. By integrating IIoT devices into critical processes in CPS, it is possible to enhance security while also promoting urban digitalization and sustainability. Full article
(This article belongs to the Special Issue Industrial Cybersecurity)
Show Figures

Figure 1

20 pages, 18281 KiB  
Article
IMU Sensor-Based Worker Behavior Recognition and Construction of a Cyber–Physical System Environment
by Sehwan Park, Minkyo Youm and Junkyeong Kim
Sensors 2025, 25(2), 442; https://doi.org/10.3390/s25020442 - 13 Jan 2025
Viewed by 231
Abstract
According to South Korea’s Ministry of Employment and Labor, approximately 25,000 construction workers suffered from various injuries between 2015 and 2019. Additionally, about 500 fatalities occur annually, and multiple studies are being conducted to prevent these accidents and quickly identify their occurrence to [...] Read more.
According to South Korea’s Ministry of Employment and Labor, approximately 25,000 construction workers suffered from various injuries between 2015 and 2019. Additionally, about 500 fatalities occur annually, and multiple studies are being conducted to prevent these accidents and quickly identify their occurrence to secure the golden time for the injured. Recently, AI-based video analysis systems for detecting safety accidents have been introduced. However, these systems are limited to areas where CCTV is installed, and in locations like construction sites, numerous blind spots exist due to the limitations of CCTV coverage. To address this issue, there is active research on the use of MEMS (micro-electromechanical systems) sensors to detect abnormal conditions in workers. In particular, methods such as using accelerometers and gyroscopes within MEMS sensors to acquire data based on workers’ angles, utilizing three-axis accelerometers and barometric pressure sensors to improve the accuracy of fall detection systems, and measuring the wearer’s gait using the x-, y-, and z-axis data from accelerometers and gyroscopes are being studied. However, most methods involve use of MEMS sensors embedded in smartphones, typically attaching the sensors to one or two specific body parts. Therefore, in this study, we developed a novel miniaturized IMU (inertial measurement unit) sensor that can be simultaneously attached to multiple body parts of construction workers (head, body, hands, and legs). The sensor integrates accelerometers, gyroscopes, and barometric pressure sensors to measure various worker movements in real time (e.g., walking, jumping, standing, and working at heights). Additionally, incorporating PPG (photoplethysmography), body temperature, and acoustic sensors, enables the comprehensive observation of both physiological signals and environmental changes. The collected sensor data are preprocessed using Kalman and extended Kalman filters, among others, and an algorithm was proposed to evaluate workers’ safety status and update health-related data in real time. Experimental results demonstrated that the proposed IMU sensor can classify work activities with over 90% accuracy even at a low sampling rate of 15 Hz. Furthermore, by integrating internal filtering, communication modules, and server connectivity within an application, we established a cyber–physical system (CPS), enabling real-time monitoring and immediate alert transmission to safety managers. Through this approach, we verified improved performance in terms of miniaturization, measurement accuracy, and server integration compared to existing commercial sensors. Full article
(This article belongs to the Special Issue Sensor-Based Human Activity Recognition)
Show Figures

Figure 1

18 pages, 4006 KiB  
Article
Software-Defined Value Stream Process Systems
by Max Goebels, Alexander Schulte, Patrick Georgi, Fabian Heimberger, Jannik Schwalm, Oliver Liewerenz, Adrian Schäfer, Jürgen Fleischer, Alexander Verl, Hans-Christian Möhring, Volker Schulze, Sven Matthiesen and Nejila Parspour
Machines 2025, 13(1), 42; https://doi.org/10.3390/machines13010042 - 10 Jan 2025
Viewed by 344
Abstract
The increasing volatility of the markets and the growing demand for customized products are challenges for future production to ensure maximum flexibility and adaptability. This paper introduces software-defined value stream process systems (SVPSs), a novel approach that extends the concept of software-defined manufacturing [...] Read more.
The increasing volatility of the markets and the growing demand for customized products are challenges for future production to ensure maximum flexibility and adaptability. This paper introduces software-defined value stream process systems (SVPSs), a novel approach that extends the concept of software-defined manufacturing into autonomous, reconfigurable production systems. SVPSs establish a cyber–physical chain that links product features to requirements, enabling their fulfillment through modular machine and process hardware. A modular construction kit of individually combinable hardware and associated software modules is presented. These modules are coordinated via a digital process chain that enables holistic simulations, optimizations, and planning based on a Digital Twin. This system is based on software-defined manufacturing but extends it into autonomous reconfigurable machines. By enabling virtual planning and commissioning of entire production lines, the SVPS concept provides an efficient and adaptable solution to meet the demands of volatile markets. Full article
(This article belongs to the Section Industrial Systems)
Show Figures

Figure 1

38 pages, 13027 KiB  
Article
Towards a Digital Transformation Hyper-Framework: The Essential Design Principles and Components of the Initial Prototype
by Ana Perisic and Branko Perisic
Appl. Sci. 2025, 15(2), 611; https://doi.org/10.3390/app15020611 - 10 Jan 2025
Viewed by 323
Abstract
To cope with the complexity, the digital transformation of cyber-physical and socio-technology systems demands the utilization of heterogeneous tailorable development environments with dynamic configuring ability and transparent integration of independently developed dedicated frameworks. The essential design principles and component-based architecting of the initial [...] Read more.
To cope with the complexity, the digital transformation of cyber-physical and socio-technology systems demands the utilization of heterogeneous tailorable development environments with dynamic configuring ability and transparent integration of independently developed dedicated frameworks. The essential design principles and component-based architecting of the initial prototype of the digital transformation hyper-framework represent this research target. These principles are derived from the broad scope analysis of digital transformation projects, methods, and tools and are glued to the proposed virtual twin hyper-document. The critical analysis of the digital transformation domain influenced the formulation of five research hypotheses that frame digital transformation of digital transformation, as the second goal of this research article. Armed with a meta-modeling layer, the incremental development of hybrid architecture instances focuses on meta-models and their transformations into functional, interpretable environments. The applicability aspects of the formulated hypothesis are verified throughout the architecture, meta-configuration, and handling of information resources as the essential segments of the initial version of the proposed evolution prototype. The detailed illustration of the horizontal and vertical interoperability of the proposed framework is illustrated by the Life Cycle Modeling component framework that creatively integrates the System, Software, and Operation Engineering aspects of the proposed hyper-framework. The proposed prototype capabilities are discussed in the context of the contemporary digital transformation ecosystem. Specification and development of the additional component frameworks, in compliance with specified generative mechanisms, directing further refinements of the proposed hyper-framework. Full article
Show Figures

Figure 1

18 pages, 6987 KiB  
Article
Modeling of Measuring Transducers for Relay Protection Systems of Electrical Installations
by Iliya Iliev, Andrey Kryukov, Konstantin Suslov, Nikolay Kodolov, Aleksandr Kryukov, Ivan Beloev and Yulia Valeeva
Sensors 2025, 25(2), 344; https://doi.org/10.3390/s25020344 - 9 Jan 2025
Viewed by 246
Abstract
The process of establishing relay protection and automation (RPA) settings for electric power systems (EPSs) entails complex calculations of operating modes. Traditionally, these calculations are based on symmetrical components, which require the building of equivalent circuits of various sequences. This approach can lead [...] Read more.
The process of establishing relay protection and automation (RPA) settings for electric power systems (EPSs) entails complex calculations of operating modes. Traditionally, these calculations are based on symmetrical components, which require the building of equivalent circuits of various sequences. This approach can lead to errors both when identifying the operating modes and when modeling the RPA devices. Proper modeling of measuring transformers (MTs), symmetrical component filters (SCFs), and circuits connected to them effectively solves this problem, enabling the configuration of relay protection and automation systems. The methods of modeling the EPS in phase coordinates are proposed to simultaneously determine the operating modes of high-voltage networks and secondary circuits connected to the current and voltage transformers. The MT and SCF models are developed to concurrently identify the operating modes of secondary wiring circuits and calculate the power flow in the controlled EPS segments. This method is effective in addressing practical problems related to the configuration of the relay protection and automation systems. It can also be used when establishing cyber–physical power systems. For a comprehensive check of the adequacy of the MT models, 140 modes of the electric power system were determined which corresponded to time-varying traction loads. Based on the results of calculating the complexes of currents and voltages at the MT terminals, parametric identification of the power transmission line was performed. Based on this, the model of this transmission line was adjusted; repeated modeling was carried out, and errors were calculated. The modeling results showed a high accuracy when calculating the modules and phases of voltages using the identified model. The average error value for current modules was 0.6%, and for angles, it was 0.26°. Full article
(This article belongs to the Special Issue Mechanical Energy Harvesting and Self-Powered Sensors)
Show Figures

Figure 1

23 pages, 5366 KiB  
Article
Evaluation of the Cyber-Physical System State Under Destructive Impact Conditions Based on a Comprehensive Analysis of Parameters
by Anton Mogilny, Elena Basan and Alexey Nekrasov
Robotics 2025, 14(1), 6; https://doi.org/10.3390/robotics14010006 - 8 Jan 2025
Viewed by 438
Abstract
This manuscript proposes a method for analyzing the stability of the behavior of a cyber-physical system (CPS) under conditions of potential destructive impact, considering the tasks it performs, which does not require labeled sets of abnormal data. The considered CPS has an autonomous [...] Read more.
This manuscript proposes a method for analyzing the stability of the behavior of a cyber-physical system (CPS) under conditions of potential destructive impact, considering the tasks it performs, which does not require labeled sets of abnormal data. The considered CPS has an autonomous decision-making system. The method was formalized in terms of the Markov decision-making process. Proposed metrics for assessing CPS behavior based on changes in its parameters were defined. They allowed classifying the operating mode into three classes: normal, abnormal, and uncertain. Evaluation results prove the efficiency of the proposed method. Despite the proposed method being tested on an unmanned vehicle (UV), it can also be applied to other CPSs, primarily to autonomous mobile robots (AMRs). Full article
(This article belongs to the Special Issue UAV Systems and Swarm Robotics)
Show Figures

Figure 1

41 pages, 9332 KiB  
Article
An Innovative Real-Time Recursive Framework for Techno-Economical Self-Healing in Large Power Microgrids Against Cyber–Physical Attacks Using Large Change Sensitivity Analysis
by Mehdi Zareian Jahromi, Elnaz Yaghoubi, Elaheh Yaghoubi, Mohammad Reza Maghami and Harold R. Chamorro
Energies 2025, 18(1), 190; https://doi.org/10.3390/en18010190 - 4 Jan 2025
Viewed by 799
Abstract
In the past, providing an online and real-time response to cyber–physical attacks in large-scale power microgrids was considered a fundamental challenge by operators and managers of power distribution networks. To address this issue, an innovative framework is proposed in this paper, enabling real-time [...] Read more.
In the past, providing an online and real-time response to cyber–physical attacks in large-scale power microgrids was considered a fundamental challenge by operators and managers of power distribution networks. To address this issue, an innovative framework is proposed in this paper, enabling real-time responsiveness to cyberattacks while focusing on the techno-economic energy management of large-scale power microgrids. This framework leverages the large change sensitivity (LCS) method to receive immediate updates to the system’s optimal state under disturbances, eliminating the need for the full recalculation of power flow equations. This significantly reduces computational complexity and enhances real-time adaptability compared to traditional approaches. Additionally, this framework optimizes operational points, including resource generation and network reconfiguration, by simultaneously considering technical, economic, and reliability parameters—a comprehensive integration often overlooked in recent studies. Performance evaluation on large-scale systems, such as IEEE 33-bus, 69-bus, and 118-bus networks, demonstrates that the proposed method achieves optimization in less than 2 s, ensuring superior computational efficiency, scalability, and resilience. The results highlight significant improvements over state-of-the-art methods, establishing the proposed framework as a robust solution for real-time, cost-effective, and resilient energy management in large-scale power microgrids under cyber–physical disturbances. Full article
Show Figures

Figure 1

23 pages, 1216 KiB  
Article
Metaverse for Manufacturing: Leveraging Extended Reality Technology for Human-Centric Production Systems
by Vivian Egbengwu, Wolfgang Garn and Chris J. Turner
Sustainability 2025, 17(1), 280; https://doi.org/10.3390/su17010280 - 2 Jan 2025
Viewed by 792
Abstract
As we progress towards Industry 5.0, technological advancements are converging; this movement is realised by the increasing collaboration between humans and intelligent digital platforms and further enabled by the interactive visualisation modes provided by Metaverse technology. This research examines the practical applications and [...] Read more.
As we progress towards Industry 5.0, technological advancements are converging; this movement is realised by the increasing collaboration between humans and intelligent digital platforms and further enabled by the interactive visualisation modes provided by Metaverse technology. This research examines the practical applications and limitations of Metaverse technology providing insights into the transformative possibilities it offers for the manufacturing sector. Specifically, the research was guided by the core objective to trace the evolution of Metaverse technology within manufacturing. This study provides a comprehensive and state-of-the-art analysis of the adoption and impact of Metaverse technologies in the manufacturing sector. While previous research has explored aspects of Industry 4.0 and digital transformation, this study specifically focuses on human-centric manufacturing (human-in-the-loop) applications of Metaverse technology, including augmented reality, virtual reality, digital twins, and cyber-physical robotic systems. Findings from the systematic literature review indicate that Metaverse technologies, primarily augmented reality and virtual reality, have evolved into powerful tools in manufacturing. They are widely adopted across sectors in the industry, transforming processes such as product design, quality control, and maintenance. Augmented reality and virtual reality offer intuitive ways to visualise data and interact with digital twins, bridging the gap between physical and virtual realms in manufacturing. A roadmap and scenarios for the introduction of Metaverse technology in manufacturing are provided with suggested adoption timespans. Furthermore, the systematic literature review identified barriers hindering the wider adoption of Metaverse technology in manufacturing. Full article
Show Figures

Figure 1

20 pages, 15263 KiB  
Article
An Efficient Cluster-Based Mutual Authentication and Key Update Protocol for Secure Internet of Vehicles in 5G Sensor Networks
by Xinzhong Su and Youyun Xu
Sensors 2025, 25(1), 212; https://doi.org/10.3390/s25010212 - 2 Jan 2025
Viewed by 322
Abstract
The Internet of Vehicles (IoV), a key component of smart transportation systems, leverages 5G communication for low-latency data transmission, facilitating real-time interactions between vehicles, roadside units (RSUs), and sensor networks. However, the open nature of 5G communication channels exposes IoV systems to significant [...] Read more.
The Internet of Vehicles (IoV), a key component of smart transportation systems, leverages 5G communication for low-latency data transmission, facilitating real-time interactions between vehicles, roadside units (RSUs), and sensor networks. However, the open nature of 5G communication channels exposes IoV systems to significant security threats, such as eavesdropping, replay attacks, and message tampering. To address these challenges, this paper proposes the Efficient Cluster-based Mutual Authentication and Key Update Protocol (ECAUP) designed to secure IoV systems within 5G-enabled sensor networks. The ECAUP meets the unique mobility and security demands of IoV by enabling fine-grained access control and dynamic key updates for RSUs through a factorial tree structure, ensuring both forward and backward secrecy. Additionally, physical unclonable functions (PUFs) are utilized to provide end-to-end authentication and physical layer security, further enhancing the system’s resilience against sophisticated cyber-attacks. The security of the ECAUP is formally verified using BAN Logic and ProVerif, and a comparative analysis demonstrates its superiority in terms of overhead efficiency (more than 50%) and security features over existing protocols. This work contributes to the development of secure, resilient, and efficient intelligent transportation systems, ensuring robust communication and protection in sensor-based IoV environments. Full article
(This article belongs to the Special Issue Advances in Security for Emerging Intelligent Systems)
Show Figures

Figure 1

42 pages, 6551 KiB  
Article
Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions
by Tamara Zhukabayeva, Lazzat Zholshiyeva, Nurdaulet Karabayev, Shafiullah Khan and Noha Alnazzawi
Sensors 2025, 25(1), 213; https://doi.org/10.3390/s25010213 - 2 Jan 2025
Viewed by 692
Abstract
This paper provides the complete details of current challenges and solutions in the cybersecurity of cyber-physical systems (CPS) within the context of the IIoT and its integration with edge computing (IIoT–edge computing). We systematically collected and analyzed the relevant literature from the past [...] Read more.
This paper provides the complete details of current challenges and solutions in the cybersecurity of cyber-physical systems (CPS) within the context of the IIoT and its integration with edge computing (IIoT–edge computing). We systematically collected and analyzed the relevant literature from the past five years, applying a rigorous methodology to identify key sources. Our study highlights the prevalent IIoT layer attacks, common intrusion methods, and critical threats facing IIoT–edge computing environments. Additionally, we examine various types of cyberattacks targeting CPS, outlining their significant impact on industrial operations. A detailed taxonomy of primary security mechanisms for CPS within IIoT–edge computing is developed, followed by a comparative analysis of our approach against existing research. The findings underscore the widespread vulnerabilities across the IIoT architecture, particularly in relation to DoS, ransomware, malware, and MITM attacks. The review emphasizes the integration of advanced security technologies, including machine learning (ML), federated learning (FL), blockchain, blockchain–ML, deep learning (DL), encryption, cryptography, IT/OT convergence, and digital twins, as essential for enhancing the security and real-time data protection of CPS in IIoT–edge computing. Finally, the paper outlines potential future research directions aimed at advancing cybersecurity in this rapidly evolving domain. Full article
Show Figures

Figure 1

34 pages, 2190 KiB  
Review
Security of Smart Grid: Cybersecurity Issues, Potential Cyberattacks, Major Incidents, and Future Directions
by Mohammad Ahmed Alomari, Mohammed Nasser Al-Andoli, Mukhtar Ghaleb, Reema Thabit, Gamal Alkawsi, Jamil Abedalrahim Jamil Alsayaydeh and AbdulGuddoos S. A. Gaid
Energies 2025, 18(1), 141; https://doi.org/10.3390/en18010141 - 1 Jan 2025
Viewed by 948
Abstract
Despite the fact that countless IoT applications are arising frequently in various fields, such as green cities, net-zero decarbonization, healthcare systems, and smart vehicles, the smart grid is considered the most critical cyber–physical IoT application. With emerging technologies supporting the much-anticipated smart energy [...] Read more.
Despite the fact that countless IoT applications are arising frequently in various fields, such as green cities, net-zero decarbonization, healthcare systems, and smart vehicles, the smart grid is considered the most critical cyber–physical IoT application. With emerging technologies supporting the much-anticipated smart energy systems, particularly the smart grid, these smart systems will continue to profoundly transform our way of life and the environment. Energy systems have improved over the past ten years in terms of intelligence, efficiency, decentralization, and ICT usage. On the other hand, cyber threats and attacks against these systems have greatly expanded as a result of the enormous spread of sensors and smart IoT devices inside the energy sector as well as traditional power grids. In order to detect and mitigate these vulnerabilities while increasing the security of energy systems and power grids, a thorough investigation and in-depth research are highly required. This study offers a comprehensive overview of state-of-the-art smart grid cybersecurity research. In this work, we primarily concentrate on examining the numerous threats and cyberattacks that have recently invaded the developing smart energy systems in general and smart grids in particular. This study begins by introducing smart grid architecture, it key components, and its security issues. Then, we present the spectrum of cyberattacks against energy systems while highlighting the most significant research studies that have been documented in the literature. The categorization of smart grid cyberattacks, while taking into account key information security characteristics, can help make it possible to provide organized and effective solutions for the present and potential attacks in smart grid applications. This cyberattack classification is covered thoroughly in this paper. This study also discusses the historical incidents against energy systems, which depicts how harsh and disastrous these attacks can go if not detected and mitigated. Finally, we provide a summary of the latest emerging future research trend and open research issues. Full article
(This article belongs to the Section A: Sustainable Energy)
Show Figures

Figure 1

16 pages, 1922 KiB  
Article
Automation Processes for Efficient Verification of Complex Systems: An Empirical Case Study
by Rune Andre Haugen, Nils-Olav Skeie and Gerrit Muller
Systems 2025, 13(1), 17; https://doi.org/10.3390/systems13010017 - 31 Dec 2024
Viewed by 500
Abstract
This paper investigated the effect of automation processes in an industrial company engineering complex cyber-physical systems. The authors used an industry-as-laboratory approach as the research method, exploring an ongoing development project. The automation efforts focused on four areas: (1) test setup, (2) test [...] Read more.
This paper investigated the effect of automation processes in an industrial company engineering complex cyber-physical systems. The authors used an industry-as-laboratory approach as the research method, exploring an ongoing development project. The automation efforts focused on four areas: (1) test setup, (2) test execution, (3) test result analysis, and (4) documentation. All four areas showed promising results on increased effectiveness and/or efficiency. In particular, the automation of test result analysis will help the industrial company, KONGSBERG, reduce their main bottleneck in the test process, as well as reduce the risk of costly project delays. An automated system integration test process, facilitating iterative regression testing, will leverage the efficiency of the verification test process. Full article
(This article belongs to the Section Systems Engineering)
Show Figures

Figure 1

31 pages, 13275 KiB  
Article
Assessing the Impacts of Failures on Monitoring Systems in Real-Time Data-Driven State Estimation Models Using GCN-LSTM for Water Distribution Networks
by Carlos A. Bonilla, Bruno Brentan, Idel Montalvo, David Ayala-Cabrera and Joaquín Izquierdo
Water 2025, 17(1), 46; https://doi.org/10.3390/w17010046 - 27 Dec 2024
Viewed by 454
Abstract
Water distribution networks (WDNs) are critical infrastructures that directly impact urban development and citizens’ quality of life. Due to digitalization technologies, modern networks have evolved towards cyber-physical systems, allowing real-time management and monitoring of network components. However, the increasing volume of data from [...] Read more.
Water distribution networks (WDNs) are critical infrastructures that directly impact urban development and citizens’ quality of life. Due to digitalization technologies, modern networks have evolved towards cyber-physical systems, allowing real-time management and monitoring of network components. However, the increasing volume of data from monitoring poses significant challenges to accurately estimate the hydraulic status of the system, mainly when anomalous events or unreliable readings occur. This paper presents a novel methodology for state estimation (SE) in WDNs by integrating convolutional graph networks (GCNs) with long short-term memory (LSTM) networks. The methodology is validated on two WDNs of different scales and complexities, evaluating the SE of the sensors. The capability of the GCN-LSTM model was assessed during the last two months of the time series by simulating failures to analyze its impact on sensor readings and estimation accuracy. The smaller network showed higher sensitivity of the sensors to detect failures, while the larger one evidenced more challenges in SE due to the sensor dispersion. Overall, the model achieved low prediction errors and high coefficient of determination values between the actual and simulated values, showing good performance. Likewise, the simulated failures showed that replacing the missing data with the hourly mean of the last week significantly improved the accuracy of the predictions, guaranteeing a robust SE in the event of sensor failures. This methodology provides a reliable tool for addressing various network configurations’ operational challenges. Full article
Show Figures

Figure 1

41 pages, 43778 KiB  
Review
UAV (Unmanned Aerial Vehicle): Diverse Applications of UAV Datasets in Segmentation, Classification, Detection, and Tracking
by Md. Mahfuzur Rahman, Sunzida Siddique, Marufa Kamal, Rakib Hossain Rifat and Kishor Datta Gupta
Algorithms 2024, 17(12), 594; https://doi.org/10.3390/a17120594 - 23 Dec 2024
Viewed by 498
Abstract
Unmanned Aerial Vehicles (UAVs) have transformed the process of data collection and analysis in a variety of research disciplines, delivering unparalleled adaptability and efficacy. This paper presents a thorough examination of UAV datasets, emphasizing their wide range of applications and progress. UAV datasets [...] Read more.
Unmanned Aerial Vehicles (UAVs) have transformed the process of data collection and analysis in a variety of research disciplines, delivering unparalleled adaptability and efficacy. This paper presents a thorough examination of UAV datasets, emphasizing their wide range of applications and progress. UAV datasets consist of various types of data, such as satellite imagery, images captured by drones, and videos. These datasets can be categorized as either unimodal or multimodal, offering a wide range of detailed and comprehensive information. These datasets play a crucial role in disaster damage assessment, aerial surveillance, object recognition, and tracking. They facilitate the development of sophisticated models for tasks like semantic segmentation, pose estimation, vehicle re-identification, and gesture recognition. By leveraging UAV datasets, researchers can significantly enhance the capabilities of computer vision models, thereby advancing technology and improving our understanding of complex, dynamic environments from an aerial perspective. This review aims to encapsulate the multifaceted utility of UAV datasets, emphasizing their pivotal role in driving innovation and practical applications in multiple domains. Full article
(This article belongs to the Special Issue Machine Learning for Pattern Recognition (2nd Edition))
Show Figures

Figure 1

Back to TopTop