This document discusses the implementation challenges of autonomous things and proposes a high-level architecture for a cloud robotics infrastructure to address these challenges. It explores existing platforms for autonomous things and identifies three main areas of complexity: development, execution, and operation. A proposed architecture is presented using the TOGAF framework, with core services for integrated development/testing/simulation and operation/monitoring/maintenance, and application services and technologies to realize these, including cloud, edge and robotics computing with virtualization and ROS. The architecture aims to ease autonomous things implementation through a super-converged system.
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Distributed reflection denial of service attack: A critical review IJECEIAES
As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of-service (DoS) attack is accountable for the majority of these cyberattacks. Although various solutions have been proposed by researchers to mitigate this issue, cybercriminals always adapt their attack approach to circumvent countermeasures. One of the modified DoS attacks is known as distributed reflection denial-of-service attack (DRDoS). This type of attack is considered to be a more severe variant of the DoS attack and can be conducted in transmission control protocol (TCP) and user datagram protocol (UDP). However, this attack is not effective in the TCP protocol due to the three-way handshake approach that prevents this type of attack from passing through the network layer to the upper layers in the network stack. On the other hand, UDP is a connectionless protocol, so most of these DRDoS attacks pass through UDP. This study aims to examine and identify the differences between TCP-based and UDP-based DRDoS attacks.
Implementing data-driven decision support system based on independent educati...IJECEIAES
Decision makers in the educational field always seek new technologies and tools, which provide solid, fast answers that can support decision-making process. They need a platform that utilize the students’ academic data and turn them into knowledge to make the right strategic decisions. In this paper, a roadmap for implementing a data driven decision support system (DSS) is presented based on an educational data mart. The independent data mart is implemented on the students’ degrees in 8 subjects in a private school (AlIskandaria Primary School in Basrah province, Iraq). The DSS implementation roadmap is started from pre-processing paper-based data source and ended with providing three categories of online analytical processing (OLAP) queries (multidimensional OLAP, desktop OLAP and web OLAP). Key performance indicator (KPI) is implemented as an essential part of educational DSS to measure school performance. The static evaluation method shows that the proposed DSS follows the privacy, security and performance aspects with no errors after inspecting the DSS knowledge base. The evaluation shows that the data driven DSS based on independent data mart with KPI, OLAP is one of the best platforms to support short-tolong term academic decisions.
Survey on cloud computing security techniqueseSAT Journals
Abstract Cloud computing is one of the emerging technology in computer science field. It provides various services and resources, still enterprises are disinclined to invest their business in cloud computing. It is because of security issues it has. There are different service models in cloud computing and threats to security also have different. The characteristics that are must be ensured while thinking about data security in cloud computing are integrity, availability and confidentiality. In this paper we are surveying some of the Intrusion Detection and Prevention Systems (IDPS) and comparing them regarding their ability to provide data security. Keywords— Cloud Security, cloud computing, data security, IDPS
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDSijgca
Grid computing or computational grid is always a vast research field in academic, as well as in industry also. Computational grid provides resource sharing through multi-institutional virtual organizations for dynamic problem solving. Various heterogeneous resources of different administrative domain are virtually distributed through different network in computational grids. Thus any type of failure can occur at any point of time and job running in grid environment might fail. Hence fault tolerance is an important and challenging issue in grid computing as the dependability of individual grid resources may not be guaranteed. In order to make computational grids more effective and reliable fault tolerant system is necessary. The objective of this paper is to review different existing fault tolerance techniques applicable in grid computing. This paper presents state of the art of various fault tolerance technique and comparative study of the existing algorithms.
Abstract From a long time different surveys are carried to get some kind of stats related to particular survey. But these surveys involve lot of manual methods and huge amount of human intervention which sometimes causes delays in the surveys. To make use of our App in Government sector and to reduce the work done manually for different market surveys done by the different Organizations. The main motive of choosing this topic was to make our product work in Android Mobiles. This is a Survey Mobile App basically will be used in public and private sectors of any Organizations. This App is used to reduce the workload of any employee who does his work manually. This app will allow us to make surveys of different type from just one single mobile app .This App will help him to do his work in more convenient manner. Keywords: Marketing, Survey, Android, ASP.NET, Phone Gap, JQuery.
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Distributed reflection denial of service attack: A critical review IJECEIAES
As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of-service (DoS) attack is accountable for the majority of these cyberattacks. Although various solutions have been proposed by researchers to mitigate this issue, cybercriminals always adapt their attack approach to circumvent countermeasures. One of the modified DoS attacks is known as distributed reflection denial-of-service attack (DRDoS). This type of attack is considered to be a more severe variant of the DoS attack and can be conducted in transmission control protocol (TCP) and user datagram protocol (UDP). However, this attack is not effective in the TCP protocol due to the three-way handshake approach that prevents this type of attack from passing through the network layer to the upper layers in the network stack. On the other hand, UDP is a connectionless protocol, so most of these DRDoS attacks pass through UDP. This study aims to examine and identify the differences between TCP-based and UDP-based DRDoS attacks.
Implementing data-driven decision support system based on independent educati...IJECEIAES
Decision makers in the educational field always seek new technologies and tools, which provide solid, fast answers that can support decision-making process. They need a platform that utilize the students’ academic data and turn them into knowledge to make the right strategic decisions. In this paper, a roadmap for implementing a data driven decision support system (DSS) is presented based on an educational data mart. The independent data mart is implemented on the students’ degrees in 8 subjects in a private school (AlIskandaria Primary School in Basrah province, Iraq). The DSS implementation roadmap is started from pre-processing paper-based data source and ended with providing three categories of online analytical processing (OLAP) queries (multidimensional OLAP, desktop OLAP and web OLAP). Key performance indicator (KPI) is implemented as an essential part of educational DSS to measure school performance. The static evaluation method shows that the proposed DSS follows the privacy, security and performance aspects with no errors after inspecting the DSS knowledge base. The evaluation shows that the data driven DSS based on independent data mart with KPI, OLAP is one of the best platforms to support short-tolong term academic decisions.
Survey on cloud computing security techniqueseSAT Journals
Abstract Cloud computing is one of the emerging technology in computer science field. It provides various services and resources, still enterprises are disinclined to invest their business in cloud computing. It is because of security issues it has. There are different service models in cloud computing and threats to security also have different. The characteristics that are must be ensured while thinking about data security in cloud computing are integrity, availability and confidentiality. In this paper we are surveying some of the Intrusion Detection and Prevention Systems (IDPS) and comparing them regarding their ability to provide data security. Keywords— Cloud Security, cloud computing, data security, IDPS
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDSijgca
Grid computing or computational grid is always a vast research field in academic, as well as in industry also. Computational grid provides resource sharing through multi-institutional virtual organizations for dynamic problem solving. Various heterogeneous resources of different administrative domain are virtually distributed through different network in computational grids. Thus any type of failure can occur at any point of time and job running in grid environment might fail. Hence fault tolerance is an important and challenging issue in grid computing as the dependability of individual grid resources may not be guaranteed. In order to make computational grids more effective and reliable fault tolerant system is necessary. The objective of this paper is to review different existing fault tolerance techniques applicable in grid computing. This paper presents state of the art of various fault tolerance technique and comparative study of the existing algorithms.
Abstract From a long time different surveys are carried to get some kind of stats related to particular survey. But these surveys involve lot of manual methods and huge amount of human intervention which sometimes causes delays in the surveys. To make use of our App in Government sector and to reduce the work done manually for different market surveys done by the different Organizations. The main motive of choosing this topic was to make our product work in Android Mobiles. This is a Survey Mobile App basically will be used in public and private sectors of any Organizations. This App is used to reduce the workload of any employee who does his work manually. This app will allow us to make surveys of different type from just one single mobile app .This App will help him to do his work in more convenient manner. Keywords: Marketing, Survey, Android, ASP.NET, Phone Gap, JQuery.
Secured Communication Model for Mobile Cloud Computingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingIOSRjournaljce
: Virtualization and cloud computing is creating a fundamental change in computer architecture,
software and tools development, in the way we store, distribute and consume information. In the recent era of
autonomic computing it comes the importance and need of basic concepts of having and sharing various
hardware and software and other resources & applications that can manage themself with high level of human
guidance. Virtualization or Autonomic computing is not a new to the world, but it developed rapidly with Cloud
computing. In this paper there give an overview of various types of computing. There will be discussion on
Cluster, Grid computing, Utility & Cloud Computing. Analysis architecture, differences between them,
characteristics , its working, advantages and disadvantages
The Indo-American Journal of Agricultural and Veterinary Sciences is an online international journal published quarterly. It is a peer-reviewed journal that focuses on disseminating high-quality original research work, reviews, and short communications of the publishable paper.
Virtualized Web Desktop Towards A Faster Web Cloud Operating Systemijbuiiir1
All Operating Systems provide interface to users and inherent applications running on a system. Today with the advancement in the field of cloud computing, its services are in high demand. The Cloud is becoming an active paradigm of computation through services. However, such services do not prove to be very efficient in slow networks. Thus, the paper intends to achieve faster response of services provided by the Cloud infrastructure through the use of a new mechanism of servicing client requests. The focus of the paper is to realize most operating system functions at the client side over the Cloud infrastructure using the virtualization technique. It also proposes to overcome the issues present in the current infrastructure service and resulting in a faster service
An Efficient MDC based Set Partitioned Embedded Block Image CodingDr. Amarjeet Singh
In this paper, fast, efficient, simple and widely used
Set Partitioned Embedded bloCK based coding is done on
Multiple Descriptions of transformed image. The maximum
potential of this type of coding can be exploited with discrete
wavelet transform (DWT) of images. Two correlated
descriptions are generated from a wavelet transformed image
to ensure meaningful transmission of the image over noise
prone wireless channels. These correlated descriptions are
encoded by set partitioning technique through SPECK coders
and transmitted over wireless channels. Quality of
reconstructed image at the decoder side depends upon the
number of descriptions received. More the number of
descriptions received at output side, more enhance the quality
of reconstructed image. However, if any of the multiple
description is lost, the receive can estimate it exploiting the
correlation between the descriptions. The simulations
performed on an image on MATLAB gives decent
performance and results even after half of the descriptions is
lost in transmission.
Swiftly increasing demand of computational
calculations in the process of business, transferring of files
under certain protocols and data centers force to develop an
emerging technology cater to the services for computational
need, highly manageable and secure storage. To fulfill these
technological desires cloud computing is the best answer by
introducing various sorts of service platforms in high
computational environment. Cloud computing is the most
recent paradigm promising to turn around the vision of
“computing utilities” into reality. The term “cloud
computing” is relatively new, there is no universal agreement
on this definition. In this paper, we go through with different
area of expertise of research and novelty in cloud computing
domain and its usefulness in the genre of management. Even
though the cloud computing provides many distinguished
features, it still has certain sorts of short comings amidst with
comparatively high cost for both private and public clouds. It
is the way of congregating amasses of information and
resources stored in personal computers and other gadgets
and further putting them on the public cloud for serving
users. Resource management in a cloud environment is a
hard problem, due to the scale of modern data centers, their
interdependencies along with the range of objectives of the
different actors in a cloud ecosystem. Cloud computing is
turning to be one of the most explosively expanding
technologies in the computing industry in this era. It
authorizes the users to transfer their data and computation to
remote location with minimal impact on system performance.
With the evolution of virtualization technology, cloud
computing has been emerged to be distributed systematically
or strategically on full basis. The idea of cloud computing has
not only restored the field of distributed systems but also
fundamentally changed how business utilizes computing
today. Resource management in cloud computing is in fact a
typical problem which is due to the scale of modern data
centers, the variety of resource types and their inter
dependencies, unpredictability of load along with the range of
objectives of the different actors in a cloud ecosystem.
Ant colony Optimization: A Solution of Load balancing in Cloud dannyijwest
As the cloud computing is a new style of computing over internet. It has many advantages along with some
crucial issues to be resolved in order to improve reliability of cloud environment. These issues are related
with the load management, fault tolerance and different security issues in cloud environment. In this paper
the main concern is load balancing in cloud computing. The load can be CPU load, memory capacity,
delay or network load. Load balancing is the process of distributing the load among various nodes of a
distributed system to improve both resource utilization and job response time while also avoiding a
situation where some of the nodes are heavily loaded while other nodes are idle or doing very little work.
Load balancing ensures that all the processor in the system or every node in the network does
approximately the equal amount of work at any instant of time. Many methods to resolve this problem has
been came into existence like Particle Swarm Optimization, hash method, genetic algorithms and several
scheduling based algorithms are there. In this paper we are proposing a method based on Ant Colony
optimization to resolve the problem of load balancing in cloud environment.
Model-Driven Architecture for Cloud Applications Development, A surveyEditor IJCATR
Model Driven Architecture and Cloud computing are among the most important paradigms in software service engineering
now a days. As cloud computing continues to gain more activities, more issues and challenges for many systems with its dynamic usage
are introduced. Model Driven Architecture (MDA) approach for development and maintenance becomes an evident choice for ensuring
software solutions that are robust, flexible and agile for developing applications.
This paper aims to survey and analyze the research issues and challenges that have been emerging in cloud computing applications with
a focus on using Model Driven architecture (MDA) development. We discuss the open research issues and highlight future research
problems.
Similar to Super convergence of autonomous things (20)
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Super convergence of autonomous things
1. Super-Convergence of Autonomous Things
Mohammad Fairus Khalid
MIMOS Berhad
Kuala Lumpur, Malaysia
fairus.khalid@mimos.my
Hong Hoe Ong
MIMOS Berhad
Kuala Lumpur, Malaysia
hh.ong@mimos.my
Buhary Ikhwan Ismail
MIMOS Berhad
Kuala Lumpur, Malaysia
ikhwan.ismail@mimos.my
Rajendar Kandan
MIMOS Berhad
Kuala Lumpur, Malaysia
rajendar.kandan@mimos.my
Abstract— Nowadays the industry has progressed from basic
mechanical assist systems to fully autonomous things such as
advanced robotics, driverless vehicles and monitoring drones.
The use of autonomous things is the new revolution. In addition
to IT support devices such as smartphones and computers we
have systems that physically interact with the world and assist
us with daily tasks and work. Although there are numerous
discussed benefits the realization of this autonomous things is
still lacking. This paper will explore the various implementation
to ease the technology adoption and proposed high level
architecture for the solution.
Keywords— Cloud Computing, Edge Computing, Robotic
Cloud
I. INTRODUCTION
The fourth industrial revolution start to change the way we
live and work. It targeted to elevate global income levels and
increase the quality of life for population across the globe. The
technological innovation will lead to optimize used of
resources and improve productivity. Transportation and
communication costs will drop, logistics and global supply
chains will become more effective, and the cost of trade will
diminish, all of which will open new markets and drive
economic growth. In the fourth Industrial revolution human
and autonomous things work together to create better future
[1][2][3][4].
Although the benefits is well presented the
implementation of autonomous things are still below
expectation. A study done by Boston Consulting Group found
that many companies have high ambitions for deploying
autonomous things as part of transition to advanced
automation. According to the study across industries, more
than 80% of participants say that their company has already
gained experience in deploying advanced robots.
Nevertheless, only 11% of participants say that their company
has successfully implemented such systems in multiple areas
of their production facilities. The report mentioned robotics
systems’ low levels of maturity and performance as the main
reasons for the low success rate [5].
Studies discovered similarities between the personal-
computer and the personal-robot industries in their early years.
The technologies are fragmented with different hardware and
software platforms. Their operational purpose are inflexible
and limited. With the influx of the newer hardware and
software trends which are modular and open, this helps to
paved the way for the innovation [4].
In this paper we explore existing platforms that help to
ease the autonomous things implementation and we share a
proposed high level architecture for the solution. This paper
organizes as follows: Chapter 2 explains some core
technology definitions to help us in understanding the topic.
Chapter 3 discusses about autonomous things implementation
complexity. Chapter 4 shares the existing platforms that target
to help the implementation. Chapter 5 discloses a proposed
high level architecture to the solution. The last chapter we
summarize our discussion and other areas potentially to be
explored.
II. DEFINITIONS
A. Autonomous Things
Industrial robots, surveillance drones and driverless car are
some of example of the autonomous things. Their
mechanization goes beyond the automation provided by fixed
rule-based programing models and they exploit artificial
intelligent to deliver advanced behaviors that interact
intuitively with the environments and human [6].
The autonomous capability is demonstrated best in open
and dynamic environment. In this setting for example the
robotic system is assisting people in their daily lives at work,
in their house and for leisure. This technology also is helping
aging, ailing and disability people.
B. Cloud Robotics
Kehoe in his paper titled “A Survey of Research on Cloud
Robotics and Automation” defined cloud robotics as follows:
“Any robot or automation system that relies on either data or
code from a network to support its operation, i.e., where not
all sensing, computation, and memory is integrated into a
single standalone system.” [7].
By definition the cloud robotics does not limit the
infrastructure to be located at a centralized location i.e. the
physical cloud servers. The infrastructure can be in distributed
and hierarchical forms. The autonomous things can offload
the processing power to a local computing devices located
nearby the robots. This computing approached are called edge
computing. The processing can also be extended to larger
computing resources such as the cloud computing itself. The
processing locality depend on the resource workload
requirements [8].
2. C. Super-Convergence
Super-Convergence term is formulated from converged IT
infrastructure definition. In data center management the term
“converged” refers to an approach to packages servers, storage
and networking as a single entity and manage them through
virtualization technologies. The objective of converged
infrastructure is to reduce data center management complexity
[9]. Super-Convergence apply to the robotics cloud which the
scope is more than data center management. It combines the
data center resources, edge computing and robotics. In
addition the integration goes beyond managing the hardware
components, it includes managing the software and
configuration part of the autonomous things.
III. IMPLEMENTATION COMPLEXITY
For autonomous things to function it needs the ecosystem.
Fig. 1 depicts the overall ecosystem. At the lowest layer we
have the autonomous things with different types of
capabilities with various parts of components such as
embedded controller, sensors, actuators and joints [10]. The
middle layer we have edge computing facility that located on
premise nearby the robotics. This help to reduce volumes of
data to transferred to the cloud and enable real-time feedback
[11]. The top layer we have cloud computing which located in
a central location with vast computing and storage capacity.
The intelligent behavior of the autonomous things are
developed and trained in the cloud which capable to handle a
lot of training data and with multiple versions of machine
learning model generation [12]. Once the model has been
baselined it will be pushed to the edge computing or to the
autonomous things for inference processes.
The ecosystem shows how complex to implement
autonomous things, competent personals with vast range of
knowledge from electronic, mechanics, IT system, big data
and artificial intelligent are required. We have identified three
areas of complexity which are discussed below:
A. Development Complexity
Europe’s Robotics 2020 Multi-Annual Roadmap
identified distinctive system abilities that characterizing the
autonomous things [3]. This set of system abilities capture the
important system level performance characteristics of robots.
Major part of the development activities are to develop and
configure the autonomous thing abilities base on the
challenges that they are going to solve.
For each of this autonomous abilities, the developers
require to go through series of repetitive development
processes such as tweaking, testing and simulation to create
suitable machine learning model and application [13]. After
the implementation has been validated and verified in the
simulated environment, the application will be deployed in the
actual setting. At this point another series of testing are
conducted before the works can be baselined and passed to
operate in the production environment.
B. Execution Complexity
The autonomous things execution or functioning also has
its own complexity. The implementation follows the generic
robot control architecture Sense-Plan-Act [14]. All the
processing is not just happen locally inside the robot itself.
Some functions execute at the edge computing devices and
others are inside the cloud computing. The robot senses the
environment though its sensors. The robot collect the sense
data. The data will be gather within itself, or into the edge
computing devices or even into the cloud computing servers.
All depend on the complexity of the analysis and criticality of
the process. For a vital behavior such as failure dependability
this process can happen internally. For not so complex
functioning but require interoperation between heterogeneous
system such as robot to robot interaction ability, the process
can happen inside an intermediary devices nearby the robots.
For more complex but less critical such as cognitive learning
ability this can happen inside the cloud computing.
C. Operation Complexity
The autonomous things operations occur in multiple
control planes. The first one is the physical control plane. At
this layer we have the physical elements such as the robotics
physical components, edge computing devices, cloud server,
storage and networking. The second layer we have the
application control plane. At this layer we have the software
elements such as the various operating systems, libraries,
drivers, database servers, big data software stack, artificial
intelligent software stack and the autonomous things business
logic and workflow itself. The third layer we have the
configuration control plane. At this layer we have the system
configuration information that dictate on how each component
will behave. Some example of configuration elements are, the
machine learning models, data models, database schema and
the system parameter definitions.
All these complexities i.e. various autonomous capabilities
development, multiple layers of control, and different
spectrum of processing from autonomous things, edge
computing and right into cloud computing, create a burden to
anyone that want to implement autonomous things. The
implementer required to have breadth and depth of
knowledge in all components of the ecosystem.
IV. EXISTING PLATFORMS
Before we jump into proposed architecture let us take a
look at existing platforms that having similar goals in
Fig. 1. Cloud Robotics Ecosystem
3. addressing the problem. For the ease of explanation the
information is presents in a table form as table 1 below. For
comparison we choose 3 platforms i.e. Amazon Web Service
(AWS) RoboMaker [15] which is launch in late 2018, Google
Cloud Robotic [16] which will be launch in 2019 and Rapyuta
Cloud Robotics Platform [17][18] which is based on
RoboEarth project [19].
We evaluate identified platforms based on criteria of the
three areas of complexity discussed earlier. For the operation
complexity to ease the work we look into feature that help the
server orchestration, robotic orchestration, application
orchestration and configuration composition. For the
development complexity we look into tools or services that
will help to accelerate the development process. The tools or
services start with development service tools, data curation
platform, machine learning model creation, simulation and
testing. For the execution complexity we look into
middleware or application programming interface,
communication channel and runtime services that help to
integrate the execution decision seamlessly.
TABLE I. ROBOTICS PLATFORM COMPARISON
Criteria
AWS
RoboMaker
Google Cloud
Robotic
Rapyuta
Robotics
Platform
Server
Orchestration
Virtualization Virtualization
Depend on
Service
Provider
Robotic
Orchestration
Robotic
Operating
System +
Extensions
Robotic
Operating
System
Robotic
Operating
System
Application
Orchestration
Fleet
Management
Kubernates Container
Configuration
Composition
Fleet
Management
Helm Package
Manager
Container
Development
Services
Cloud9
App
Management
Catalog
Data Curation
Data Lake
Foundation
[20]
Dataprep [22],
Datalab [23]
Not Available
ML Model
creation
SageMaker
[21]
Cloud ML
Engine [24]
Not Available
Simulation &
Testing
Gazebo Not Available Not Available
Execution
Middleware
ROS, IoT
Greengrass
ROS,
Kubernetes
ROS
Communication
Greengrass
Connectors
Robot Fleet
Connectivity
WebSocket-
based
Runtime
Services
Cloudwatch,
Lex, Polly,
Kinesis,
Rekognition
Core platform
as optional
extensions
RoboEarth
knowledge
Repository
All platforms employ server virtualization to abstract out
the management of the servers and they are using container
based tools to ease the application and configuration
deployment. For the robotic management they are using
Robotic Operating System (ROS) as the main robotic
middleware [25]. Futher look into execution middleware we
discovered AWS IoT Greengrass is using Lambda functions
i.e. serverless technology for their seamless execution [26].
Amazon approached for the platform is to have close knitted
end to end solution. Google Cloud Robotic platform provide
open platform whereby they allow the platform to be extended
to external services from third party service providers [16].
Rapyuta Robotics Platform focus on composing exiting ROS
packages and outsourcing the execution into the cloud [18].
V. PROPOSED ARCHITECTURE
The proposed architecture shows how the system features
and technology stack are derived from the overall business
requirement on the ease of autonomous things
implementation. The proposed architecture presented is based
on the Open Group Architecture Framework (TOGAF). It is
an enterprise architecture framework standard created by The
Open Group organization [27].
The diagram Fig. 2 below shows the Organizational
Conceptual Landscape Map View of the Cloud Robotic
Infrastructure. It starts with high level business architecture
view from the service medium, methods how the users
accessing the system, the users of the system and the core
services the system provides. At the second layer there are
application and data components. They centered on the
application services that are realizing the business requirement
specified in the core services. At the last layer there are
technology components that capture the core technologies that
are enabling the application services.
At this juncture we are going to discuss three aspects of
the architecture i.e. the core services, the application services
and the technology. From the earlier discussion we can
summarized the cloud robotics infrastructure will have four
core services. The first is integrated development, testing and
simulation environment. This core service acts as
implementation dashboard that have all the essential tools
such as development editor, testing instruments and
simulation set-up. The second is the integrated operation,
monitoring and maintenance service that help in post
development activities. Amongst its’ functions are robotics
application deployment and robotics operation life cycle
management. The other two core services are Internal and
third party services. Their functions are to provide additional
services to expedite the development and operation of the
Fig. 2. Organizational Conceptual Landscape Map View of the
Cloud Robotic Infrastructure
4. robotics application. Example of them are AWS Cloudwatch
[28] and Google Stackdriver [29] that are used to monitor and
manage the cloud robotic infrastructure.
The second aspect of architecture is the application
services. This components realized the core services
requirement. Robotic Integrated Development Environment
(IDE) implements the development requirements. Robotic
Operation and Maintenance implements the integrated
operation requirements. Service catalogue and service broker
implement the internal and third party services. The catalogue
provides the list of available services and the broker help to
negotiate and link the services with the robotics applications.
The third aspect of the architecture is the technology. At
this layer we have identified three main technology areas and
they are Cloud Computing, Edge Computing and Robotics. To
manage these three elements seamlessly we need to build an
abstraction layer. This abstraction layer have to support the
distributed nature of these combined technology areas. The
virtualization technology helps in abstracting out the physical
computing component and containerization helps to abstract
out the application runtime and configuration. Robotic
Operating System facilitates the robotic functions. The
Software Defined Network (SDN) and Network Function
Virtualization (NFV) technology help in seamless
communication of the distributed network. The decentralized
file system assists in the unified data access.
VI. CONCLUSION
Autonomous things are here not to replace the human
being. They are helping us to achieve sustainable future
whereby resources to be used in efficient manner. At current
state the proliferation of autonomous things has been
hampered by the complexity of application development and
operation. A super-convergence system help to address this
issue. This paper take a look at existing implementation and
abstracting out the core functions and technologies. In
addition to what has been discussed there are other areas that
are worth to look into such as ethics, security and governance
which also can be hindrance to the autonomous things
implementation.
REFERENCES
[1] K. Schwab, “The Fourth Industrial Revolution: What It Means and
How to Respond,” [Online]. Available:
https://www.foreignaffairs.com/articles/2015-12-12/fourth-industrial-
revolution
[2] Y. Liao, E. R. Loures, F. Deschamps, G. Brezinski, and A. Venâncio,
“The impact of the fourth industrial revolution: a cross-country/region
comparison,” Production, vol. 28, no. 0, 2018.
[3] “Robotics 2020 Multi-Annual Roadmap For Robotics in Europe,”
Horizon 2020 Call ICT-2017 (ICT-25, ICT-27 & ICT-28), Release B
Dec. 2016.
[4] J. M. Hollerbach, M. T. Mason, and H. I. Christensen, “A roadmap for
us robotics–from internet to robotics,” Workshop on emerging
technologies and trends., 2009.
[5] D. Küpper, M. Lorenz, C. Knizek , K. Kuhlmann, A. Maue, R. Lässig,
and T. Buchne, “Advanced Robotics in the Factory of the Future,”
[Online]. Available: https://www.bcg.com/en-
sea/publications/2019/advanced-robotics-factory-future.aspx
[6] Gartner, “Gartner Identifies the Top 10 Strategic Technology Trends
for 2019,” [Online]. Available:
https://www.gartner.com/en/newsroom/press-releases/2018-10-15-
gartner-identifies-the-top-10-strategic-technology-trends-for-2019
[7] B. Kehoe, S. Patil, P. Abbeel, and K. Goldberg, “A Survey of Research
on Cloud Robotics and Automation.” IEEE Transactions on
Automation Science and Engineering 12 (2): 398–409, 2015.
[8] O. Saha and P. Dasgupta, “A comprehensive survey of recent trends in
cloud robotics architectures and applications,” Robotics, vol. 7, no. 3,
2018
[9] Wikipedia, “Converged Infrastructure,” [Online]. Available:
https://en.wikipedia.org/wiki/Converged_infrastructure
[10] P. Simoens, M. Dragone and A. Saffiotti, “The Internet of Robotic
Things: A review of concept, added value and applications,” Int. J.
Adv. Robot. Syst., 2018.
[11] W. Shi, J. Cao, Q. Zhang, et al., “Edge computing: vision and
challenges,” IEEE Internet of Things Journal, 3(5): pp. 637–646, 2016.
[12] B. Xu, D. Mylaraswamy, and P. Dietrich, “A Cloud Computing
Framework with Machine Learning Algorithms for Industrial
Applications,” WorldCom ICAI, 2013.
[13] M. Mayo, “Frameworks for Approaching the Machine Learning
Process,” KDnuggets, [Online]. Available:
https://www.kdnuggets.com/2018/05/general-approaches-machine-
learning-process.html
[14] A. Rodney and A. Brooks, “Robust Layered Control System for a
Mobile Robot,” IEEE Journal on Robotics and Automation, vol RA2,
no. 1, March 1986.
[15] Amazon Web Service, “AWS RoboMaker,” [Online]. Available:
https://aws.amazon.com/robomaker/
[16] Google Inc., “Cloud Robotics Core: Kubernetes, Federation, App
Management,” [Online]. Available:
https://googlecloudrobotics.github.io/core/
[17] Rapyuta Robotics, “Rapyuta.io Cloud Robotics Platform,” [Online].
Available: https://www.rapyuta-robotics.com/rapyuta_io
[18] G. Mohanarajah, D. Hunziker, M. Waibel, and R. D'Andrea, “Rapyuta:
A cloud robotics platform,” IEEE Trans. Autom. Sci. Eng. (T-ASE),
vol. 12, no. 2, pp. 481–493, Apr. 2015.
[19] RoboEarth, “RoboEarth,” [Online]. Available:
http://roboearth.ethz.ch/
[20] Amazon Web Service, “Data Lake Foundation on AWS,” [Online].
Available: https://aws.amazon.com/quickstart/architecture/data-lake-
foundation-with-aws-services/
[21] Amazon Web Service, “Amazon SageMaker,” [Online]. Available:
https://aws.amazon.com/sagemaker/
[22] Google Inc., “Cloud Dataprep by Trifacta,” [Online]. Available:
https://cloud.google.com/dataprep
[23] Google Inc., “Cloud Datalab,” [Online]. Available:
https://cloud.google.com/datalab
[24] Google Inc., “Cloud Machine Learning Engine,” [Online]. Available:
https://cloud.google.com/ml-engine/
[25] “ROS (Robot Operating System),” [Online]. Available:
https://www.ros.org/
[26] Amazon Web Service, “AWS IoT Greengrass,” [Online]. Available:
https://aws.amazon.com/greengrass/
[27] The Open Group, “The TOGAF Standard,” [Online]. Available:
https://www.opengroup.org/togaf
[28] Amazon Web Service, “Amazon CloudWatch,” [Online]. Available:
https://aws.amazon.com/cloudwatch/
[29] Google Inc., “Google Stackdriver,” [Online]. Available:
https://cloud.google.com/stackdriver/