国产日韩欧美一区二区三区三州_亚洲少妇熟女av_久久久久亚洲av国产精品_波多野结衣网站一区二区_亚洲欧美色片在线91_国产亚洲精品精品国产优播av_日本一区二区三区波多野结衣 _久久国产av不卡

?

Survey of advances and challenges in intelligent autonomy for distributed cyber-physical systems

2018-07-04 01:28:06

Faculty of Engineering,School of Computing,University of Leeds,Leeds,UK

1 Introduction

The trends of grid[1],cloud[2],and high-performance computing(HPC)[3]are a culmination of what could be termed the third industrial revolution of digitisation and automation of individual systems and processes[4,5].The current wave of Internet of things(IoT)[6],edge[7],fog[8]computing,as well as big data[9]with deep learning[10]and Internet of simulation(IoS)[11]are the trends of the fourth industrial revolution(Industry 4.0)[12,13].With applications within Industry 4.0,the Internet of everything and anything[14],and beyond where every part of society and industry is digitally integrated,there are significant challenges that must be addressed.This paper therefore presents a detailed review of existing state-of-the-art and core challenges that must be addressed to achieve the desired level of intelligence,automation,and integration in emerging systems.

Across each of the domains,there have been significant technological advances in enabling cyber-physical system of systems(SoS)to be integrated together in a holistic fashion.However,there remain substantial challenges that must be addressed.The first of these is the explosion of big data streams[15,16]resulting from large-scale data collection in the integration of systems from smart cities,autonomous vehicles,IoT,smart manufacturing,health-care,as well as the aerospace,defence,through to finance industries.

Secondly,the increasing intelligence and interconnectivity of these systems into a shared environment requires a shared model of reality[17].This model of reality provides a set of shared perspectives on reality that can be integrated with simulation and decision support systems via simulation in the IoS[11].These perspectives can provide to the cyber-physical systems that exist within each of the domains intelligence as a service.Necessarily unifying the standards to integrate both the existing and future technologies[18]will require significant research and development.

Additionally,the service economy[19]will continue to act as the cornerstone for these developments.Specifically from a service-oriented architecture(SOA)perspective[20,21],the services and micro-services may be hardware systems or devices,human individuals,Cloud hosted software[software as a service(SaaS)],or even simulations(SIMaaS).The aggregation or composition of these services into work flows and subsequently,the work flows into services will provide a scalable approach to design and augmenting existing systems[22,23].

Further,the trends of cloud,edge,and fog computing must be pushed to their limits and combined into hybrid models with extensive virtualisation to abstract away from individual cloud or HPC providers.Developing the physical and virtual computational and communication infrastructure will underpin each of these areas.This includes technologies such as 5G and long-term evolution(LTE)[24],which along with software-defined networks will have to be advanced to improve reliability,bandwidth,and security.

The remainder of this paper is structured as follows:in Section 2,the motivation for cyber-physical SoSs integration and automation is presented across a range of application domains.In Section 3,the underlying computing infrastructure is explored from cloud computing through to the edge and fog paradigms[25].Section 4 discusses some of the core challenges that have yet to be addressed as a result of the expansion of autonomous IoT systems.In Section 4.2,the need for a shared model of reality is discussed to augment systems with additional contextual awareness.Also,finally,some of the security challenges are outlined in Section 4.3 before conclusion are presented in Section 5.

2 Emerging applications

The emergence of the Internet of anything and everything[14]from IoT[26]is driving smarter and more context-aware systems and applications.These concepts augment the technologies related to cloud and edge computing[27]and allow computational power to be balanced against location which has an impact on both network latencies and security.The ubiquitous management of the computational systems and communication networks is anticipated to be augmenting and penetrating most cyber-physical systems that we interact with on a daily basis within the coming decade.

One example domain is that of cooperative robotics where advances in autonomous systems[28]are enhanced with additional computational capability from the cloud.The resulting emerging field of cloud robotics combines the two research fields to provide intelligence services to robots from the cloud[29–31],assist in robot interaction[32,33],and allows robots to provide services back to the system[34,35].

There is now a growing trend to adopt these,and related,research concepts into society and across industry as automated intelligent systems.This paper explores in detail the state-of-the-art and challenges particularly related to manufacturing and infrastructure for smart cities.The rest of this section explores more widely the applications and domains where there is a current focus on autonomy and connectivity which includes defence and security,aerospace,and finance.The adoption of IoT and IoS within each of the domains is also explored before the rest of this paper explores the detail around infrastructure and intelligence and ongoing research.

2.1 Smart cities

Smart cities are one of the latest trends in urban planning but as yet do not have a unified definition in the literature[36].The lack of a standard definition results from the variety of cities that are being coined as smart as well as how and why they are being transformed[37].The range of definitions include a focus on computing,connectivity,data,efficiency,infrastructure,and services[38–40].Alternatively,they focus on the social,cultural,and governance aspects[41,42].Across these broad definitions,there are numerous ‘smart’cities internationally.

However,as the global population continues to grow,and continues to migrate closer to cities with in excess 50%of the global population currently residing in cities,it is essential to understand how a city becomes ‘smart’and what the end or intermediary results look like[43].As discussed in both[43,44],one of the fundamental aspects of a smart city is understanding its multidimensionality.As shown in Fig.1,there are the technological factors,the business or institutional aspects,the city and human factors,and then the virtual dimension of data[44].This can be alternatively defined as existing systems/agents(which includes humans)that must be refactored;the computational infrastructure including cloud,IoT,and IoS technologies;and the data dimension.

We consider a smart city to be cyber-physical SoS heavily reliant on intelligent autonomy,distributed computing,IoT,and IoS such that it brings together technology,governance,and society to manage and monitor power and communication infrastructure,the environment,traffic,and other aspects of the city for the benefit and well-being of its inhabitants through ubiquitous sensing and embedded intelligence,and facilitates economic growth through innovation,connectivity,and data aggregation[17,45].For example,applying robotics within a smart city may include applications for repair and maintenance[46,47]or driverless transportation[48]which is discussed in more detail in the next section.

2.2 Autonomous vehicles

Transportation infrastructure provides many opportunities for intelligence and autonomy.Driverless cars and trucks being one of the most publicly visible systems being developed;though as yet,there is still high level of concern surrounding their adoption[49].To map their development,different levels of automation are de fined by how involved a human driver is in controlling the vehicle[50].Some of the foundational technologies providing lower levels of autonomy already are included in advanced driver-assistance systems,while the higher levels of automation are still being developed[51].

For fully autonomous driving,several real-time systems must interact to perform perception,planning,and control[52].There are a number of potential strategies,early approaches mapped actions directly from sensory input,but modern approaches use a mediated approach where the immediate environment is reconstructed and recognised before actions are determined[53].Hybrid approaches with minimal reconstruction have also been developed[54].

Fig.1 Layers of abstraction in SOAs(business and technical),and physical cities[44]

The success of the autonomous driver relies heavily on correct perception and localisation;therefore,there have been numerous data sets provided,the most commonly used being the KITTI benchmark[55]which focuses on motion estimation.Others have noticed a need for localisation across a range scenarios and conditions[56].

Autonomous drivers are often assumed to operate in isolation,but there is growing interest in the possibility for interconnected vehicles,an Internet of vehicles or a vehicular cloud[57].The interconnection of these systems has the potential to allow for holistic traffic management and the use as a service of the data generated by the vehicle.

This trend is not only limited to land vehicles;however,ships[58]and aerial vehicles[59]are also being automated for similar transportation tasks.

2.3 Power and energy efficiency

The growing need for renewable energy generation is driving a move from the existing power grid infrastructure to more distributed generation units known as microgrids[60,61].Adding intelligence to this increasingly distributed power grid to match generation with demand has been called the smart grid[62].The vision of smart grids is one where intelligent,demand-side systems manage smart,renewable energy generation combined with energy storage to provide smart production,management,and distribution[63].These applications rely on large-scale data collection and processing[64],meaning that the communication and computing infrastructure is a vital component in the smart grid[65]with communication security being of particular importance[66].Given that the intelligence of many of these power systems depends on large-scale computer systems,the efficiency of data centres is a crucial component in increasing overall energy efficiency.At present,3%of global power is used in data centres[67],up from 1.3%in 2010 and 0.8%in 2005[68].Data centre power consumption is not only the result of computational power consumption,the efficiency metric of data centres power usage effectiveness(PUE)is a ratio of power consumed by IT and non-IT equipment[69].Cooling equipment power consumption can be as much as 50%of total power consumption[66].As demand increases,improving the efficiency of data centres requires intelligent scheduling[70],modelling of workload patterns[71],and improvements in cooling [72].There are also further efficiency gains achievable by utilising the waste heat generated by the data centre[73].There has been increased effort to model the power consumption of data centres[74]for prediction of PUE and optimise the data centre[75].

2.4 Smart manufacturing and Industry 4.0

The technology of the digital revolution,sometimes regarded as the third industrial revolution[4,5],is now reaching a level of maturity and pervasiveness the fourth industrial revolution dubbed Industry 4.0 is emerging[76].The technologies of personal computing have grown to incorporate devices from laptops through to smart phones,smart watches,and numerous sensors being used throughout products and in daily life.At an industrial level,there is almost ubiquitous use of HPC and cloud computing platforms that provide massive degrees of computational power which can be combined with the emerge of connected technologies such as 4G,5G,and LTE[24].

These advances facilitate the integration of intelligent automation into the manufacturing value chain as Industry 4.0[76,77].The adoption of IoT devices within the manufacturing process and within customer products,known as the industrial IoT[78],provides a data-driven system.These smart factories are able to utilise the data and readings from the IoT devices to flexibly adapt to changing demands in the marketplace.Within factories themselves, the real-time data streams generated by the interconnection of large numbers of autonomous systems allow the factory to gain a level of self-awareness,calculating machine health,behaviour,and self-optimising operations[13].

Within this the fourth industrial revolution,the trend will move from merely connecting real-time big data streams from IoT devices within factories and products to an closed-loop ecosystem bringing together IoT with the devices from the factories and the products;data streams from those devices and systems;IoS with modelling and simulation to analyse and use those data streams to improve products and improve manufacturing processes[44].

2.5 Health and well-being

The application of autonomous systems to the domain of healthcare is growing.The adoption of evidence-based medicine[79]and the widespread record keeping of the medical community provides opportunities to apply big data analytics to the field[80].There is also large amounts of additional health data being generated by the marketplace of wearable health devices within IoT[81].Security of this online,personalised health data has become an increasing concern[82]and the move towards blockchain record systems[83]aims to facilitate the secure sharing of patient records.Additionally,there has been a move to utilise robotic systems in patient care to reduce the demand on healthcare services[84].

One such example is the work by Howard[85]which involves physically embedding a microprocessor on human brain tissue to monitor,decode,and then manipulate brain signals.This work has application in researching diseases such as Alzheimer’s and Parkinson’s.By connecting the devices,as IoT systems,to the network signals could potentially be monitored in real time and the huge amounts of collected data can be analysed.This could result in identifying disease progression without the need for observing the likes of motor and speech symptoms[86].

3 Computational infrastructure

Underpinning the applications discussed in the previous section is the distributed computational infrastructure which includes cloud[87,88],edge,and fog computing.The later refers mostly to the low power,geographically distributed devices forming the IoT[6,26].This section explores each of these before hybrid infrastructure approaches are explored in the following section.

3.1 Cloud computing

Cloud computing is focused on the provision of an on-demand network accessible and easily configurable computing resources[88].It is typically de fined in terms of the service layers[89],shown in Fig.2.The uppermost layers within a cloud computing architecture are the service layers comprising SaaS[23],platform as a service(PaaS),and infrastructure as a service(IaaS).The software layer may comprise both applications,functions,and data as services(FaaS,DaaS).The resource abstraction layer provides the containers and virtual machines typically used to host the service layers within the cloud.Below the various levels of abstraction lies the underlying operating systems[90].

Beyond the service layers,there are various deployment models[91].The most common are public and private clouds,the latter being dedicated to a single user or organisation.A growing trend is that of hybrid clouds which use mixtures of the private and public models,often to facilitate scale-up.A further trend is that of joint or virtual clouds which creates another level of abstraction presenting a unified perspective on cloud services from a range of providers[92].

3.2 Edge computing

Fig.2 Cloud layers of abstraction for IoT and IoS[17]

The cloud computing era provided a mechanism for computation and data processing to be performed off-site at a low cost.However,the centralised nature of the cloud introduces significant limitations due to communication bandwidths and latencies that have been shown to be inappropriate for latency-sensitive applications such as health monitoring or autonomous vehicles[93].Therefore,with the availability of smaller and cheaper but yet powerful compute devices,the edge computing paradigm brings the processing back closer to the devices themselves[7].

Edge computing is sometimes regarded as synonymous with mobile cloud and cloudlets.The former focuses entirely on the use of mobile devices which are typically low powered and location-aware[94].Mobile devices are therefore limited in the level of data processing and computation that they can provide leading to the conceptualisation of cloudlets[95].Cloudlets are small clusters of compute resources,typically of a high density,that are accessible to nearby devices[96].

3.3 Fog computing

We have discussed how the cloud computing paradigm does not suit certain domains and applications;however,the edge paradigm also has limitations due to the level of processing required by some of those same applications.These require the ability to connect with and share with other system’s data in the way that a cloud would facilitate while requiring the mobility of edge computing[97].

Therefore,we now have the emerging hybrid paradigm of fog computing[8,98].In order for this paradigm to successfully achieve integration of these systems,the reliability of every aspect must be managed and guaranteed with a level of quality of service[99].The fog paradigm provides a virtual layer between data centres and IoT devices that extends the virtual cloud paradigm discussed previously.In doing so,it must also encapsulate specialist compute facilities such as HPC as shown in Fig.2.Appropriate deployment of fog computing as hybrid unifying model across distributed computing paradigms may provide a suitable approach to mitigate the issues of scalability,fault-tolerance,elasticity[7],as well as facilitating management services to detect failures[98].

3.4 Services

Services and SOAs are now a common paradigm for designing distributed systems and addressing the growing complexity of systems.Services can be used to easily augment existing systems without affecting system performance by providing new or updated services and promoting reuse of existing services.In adding intelligence to systems,especially those interfacing with infrastructure,it is important that the new functionality or the upgrade not interfere with operation of the original underlying systems.

A marketplace of services can facilitate discovery and integration of services which can be integrated together into work flows to perform specific functions[21].Fig.1 shows an example of services in a potential smart city adapted from[44].The figure demonstrates the multi-dimensional nature of cyber-physical systems:

·City infrastructure layers including utilities,transport,through to human residents.

·Business service layers reflecting operation and management aspects.

·Technical computing architectural layers,shown here in terms of layers of an SOA.

·Layers of data and models of reality that provide the intelligence and information to allow such an integrated cyber-physical system to operate.

Further,these systems can be derived into three overlapping groups:

(i)Existing systems which may be partially integrated together.

(ii)Computational systems including those needed for further integration,automation,and data processing.

(iii)Data which brings them all together along with context.

In example shown the services,systems,devices,and individuals integrate across the city and different infrastructure levels by providing services that are readily combined with those from pother providers.

Integrating pre-existing systems remains challenging due to lack of compatible standards,and becomes ever harder with the need to augment those existing systems with intelligence,autonomy,and data collection.In Fig.1,the existing city and compute infrastructure is integrated,this includes both business and the conceptual layers[21]–and additionally the Cloud computing:SaaS,PaaS,and IaaS providing a fifth utility.One remaining challenge with SOA is the automatic re-factoring of services to ensure continuous operation and future compatibility[100,101].

4 Remaining challenges

So far,this paper has explored the wide range of emerging applications related to autonomous cyber-physical systems and taken a detailed look at the technologies that currently underpin these advances.There are however several challenges that have yet to be resolved,many of which will continue to grow,that this section explores.

4.1 Challenge:data explosion

Throughout the discussion,so far the term data explosion has been used in conjunction with the IoT and big data trends.Big data analytics provide techniques for the analysis and visualisation of extremely large data sets[102].Specifically,these data sets are too big to store on a single machine and so must be distributed.Already,the growth of data is exponential[103]and increasing data collection and further cloud services will only accelerate this further[104].Very quickly,this could lead to a situation where we are no longer able to process the explosion in data collection.

This challenge of data explosion refers to the fact that what we currently define as big data is a snapshot of the scale of data that will be communicated and processed in the near future.Firstly,the type of data is diverse ranging from scientific data collected by NASA through to social media interactions or the Internet itself.Companies such as Google,Facebook,Microsoft,Alibaba,Baidu,and Amazon are already processing terabytes of data on a daily basis and storing several exabytes.This progression and the generation of several exabytes of new data every day means that it is anticipated that will be in excess of 40 zettabytes by 2020 which is beyond the scale that any existing research on big data has ever attempted to process or analyse[9,105–107].

This data explosion is being driven partly by the growth in IoT,reaching between 20 and 30 billion devices by 2020[108–110],and the large-scale collection of data primarily for product improvement and customer analysis.It is envisioned that this absolute collection of data will enable machine learning techniques to provide models and simulations as part of IoS that can support the desired level of autonomy[15].IoT promises ubiquitous sensing and a network of data-driven devices,a network of things[111],that is unprecedented today,which will then be augmented with intelligence and analysis from IoS[11].

This rapid increase in the number of devices and quantity of data results in a series of challenges that must be imminently addressed.Firstly,the quantity of data is too large to be continuously stored and must therefore be filtered.This filtering will have to occur at stages across a physical network which would be overwhelmed by the quantity of communication.Instead,there will have to be further advances in stream processing to collect relevant information from sources and discard the rest[16,112].

Secondly,the variety of data sources and heterogeneity of data types and formatting results in a huge multidimensional space from which it is infeasible to manually identify meaningful features for conventional machine learning approaches.Therefore,it is necessary to develop techniques for the automatic identification of features and intelligent and meaningful dimensional reduction in order to retain the most relevant information.

Thirdly and most controversially is the challenge of understanding and managing data privacy.With this level of data collection,which is necessary to achieve the desired level of automation,there are associated privacy costs.For example,in the context of autonomous vehicles,there remains a question of what data needs to be collected in order to facilitate full autonomy.With autonomous vehicles,there also remains a question of liability which requires additional data to be recorded to provide context for adverse events.It is therefore posited that a solution must be found that balances the freedom and privacy of individuals with the data required by regulatory frameworks,the data required by manufacturers,and data required by other interacting autonomous systems[113,114].

4.2 Challenge:shared model of reality

Simulation and virtual engineering are already heavily utilised in most engineering disciplines for the development of cyber-physical systems.The increasing complexity and greater application of cyber-physical systems has seen a growing need for integration between simulations from different domains in order to fully understand system level interactions and behaviours.This in turn has led to the development of tools and standards to enable simulation integration and co-simulation:DIS[115],HLA[116,117],FMI[118],and FDMU[119].The growing trend towards online,easily integrated simulations has been called the IoS[11].

Similar to the way IoT connects devices,IoS allows the connection of simulations.This result in the benefit of being able to construct large co-simulations from component simulations of parts and mitigates the difficulty of developing large-scale monolithic simulations [18,120].Additionally,this allows individual system to be developed in a more agile way,responding faster to changes in requirements new environments[22].The ability to readily compose detailed simulations is of particular importance for intelligent systems,especially if they augment existing systems as the additions can be extensively tested as virtual prototypes before deployment.Simulations can also be utilised to provide training environments for artificial intelligence(AI)[54,121]and can also provide decision support and predictive power(see Fig.2).With large-scale distributed simulations,this parallel simulation of reality can be shared across many agents leading to a consensus of the environment and potentially a knowledge beyond that perceivable by a single agent’s sensors.

There are trade-offs when developing simulations between level of detail,speed of execution,and accuracy.For example,a heat exchanger can be modelled as a series of one-dimensional(1D)equations or a 3D computational fluid dynamics simulation.To ensure a timely response in real-time systems,the detail and scope of a simulation may be reduced,whereas increased detail may be more important in systems using simulation for longer term planning.In both cases,using simulation to assist and enable intelligence may require large amounts of computing power.In mobile or battery-powered systems,where power usage and weight are a key design criteria,it may be necessary to offload computation and utilise cloud or HPC computing for simulation.

There are a number of challenges to the implementation of IoS and its wide use in intelligent autonomous systems.The problem of automated simulation integration is a particular challenge[22,122].Integrating an arbitrary collection of simulations remains infeasible for a number of reasons including:differing levels of fidelity,incompatible data types or representations,incompatible timesteps,or solvers.Often,widespread integration of simulations is impossible as many simulations do not scale to the required level[123].Another issues are that simulations are often created from specific viewpoints and the requirements for the desired simulation may not match with any existing simulation.Even though there is increased interest in large-scale simulation and there are numerous benefits in its application to autonomous systems,there are still many open challenges and none of the existing standards satisfy all requirements for a true IoS[124,125].

4.3 Challenge:safety and security

Earlier in this section,the issue of data privacy was discussed and challenges to maintaining safety and security are directly relevant.From the perspective of security,there remains an issue of providing practical solutions to system security without massively degrading performance and a comprehensive review of security within IoT is provided by Jing et al.[126].

One particular challenge with IoT and the continued increase in the use of data centres will be to find methods to inhibit denial-of-service attack(DDOS)attacks from IoT devices.An example of this is the Mirai attack that gained control of devices and loaded malware into memory[127].Alternatively,there was the demonstration of remote code execution on IP CCTV and DVR devices from which a DDOS attack could be launched[128].Given the billions of IoT devices that are already connected,most of which are relatively unsecured,there is a clear need for a concerted effort to update existing systems to be more secure and develop new more resilient security techniques.

One concept that is gaining traction with cloud computing,and may be applicable to IoT,is that of performing computation on encrypted data,using homomorphic encryption,this can provide a significant performance improvement by removing the need to encrypt and decrypt data in the cloud[129].Fully homomorphic approaches remain slow and therefore ‘somewhat’homomorphic encryption techniques have been developed to improve performance,but at the cost of limiting the data values and types that can be processed[130].Currently,these techniques only operate on numerical data and as such are limited to application of searching,sorting,and other arithmetic operations where the encryption process is order-preserving[131].Therefore,for such techniques to become universally applicable,they must be improved to operate on more complex data types.Further,since the principle requires systems to operate on encrypted data,the intelligent systems,such as simulations(SIMaaS),must also be adapted to be able to do so.This in itself is a major challenge since there is normally internal state and internal parametrisation which may or may not be encrypted.It is also anticipated that future techniques involving IoT devices will utilise a mixture of native hardware and software encryption but in order to do so,there must be a clear set of security standards shared across systems and devices.

A further concept that is attracting attention is that of quantum-key distribution techniques[132]since they provide a mechanism to immediately identify if an unauthorised individual is listening on the communication.These techniques are currently limited firstly by the distance over which they can be used,currently limited to~21 km[133].By improving the detectors,the range can be increased to nearly 100 km and can be extended further by using repeaters.As the range and accuracy of detectors increases,these approaches are likely to form a part in defining security standards and protocols.In the same way,the recent adoption of blockchain technology[134]is likely to form a major influencer of future standards in the domains of finance and healthcare in particular[83].However,it is questionable whether these approaches will be practicable for general data security.Therefore,as data processing becomes increasingly distributed,and operates in virtual clouds,there remains a challenge to certify the security and certain conditions that will be maintained.

Moving on from data and communication security,there remains the issue of guaranteeing the safety of these systems,in adherence with standards appropriate for each domain.Current safety critical systems are not typically connected via networks to other systems.However,as their complexity increases and their need for increased compute power grows,they will inevitably begin to rely on platforms such as cloud computing which are not typically used or designed for safety critical systems.Additionally,these systems are no longer statically defined but evolve using machine learning.There must therefore be mechanisms to consistently,automatically,and repeatedly evaluate the safety of any given system[135].As a result,there have been recent calls for the development of black boxes to monitor adaptive systems that have AI[136,137].Alternatively,techniques such as provenance can be adopted which use historical data analysis to evaluate the performance of systems and alert regulators or engineers when the performance or behaviour deviates from expectations[138].

5 Conclusion

The technologies enabling greater connectivity between devices and more distributed computing such as cloud computing,big data,and IoT are allowing for greater levels of intelligence and autonomy in cyber-physical systems.These include advances in Industry 4.0,smart cities,autonomous vehicles,and healthcare.These new paradigms and applications have the potential to radically change the way society interacts with cyber-physical systems.

However,this increased level of connectivity presents a number of challenges that must be addressed if the vision of large-scale autonomy and intelligence is to be achieved.An increase in connectivity and growing recognition of data as the world’s most valuable resource will lead to a demand that may outstrip the ability to process,store,or even transmit data in the quantities being proposed.Automated integration and processing of data for data reduction will be a vital technology to allow for the large-scale data gathering being proposed.

Autonomous systems that control cyber-physical systems will process collected data either locally in edge and fog computing systems or in the cloud.Simulation is already being used to train and test intelligent systems in isolation.In the future,edge and cloud computing could operate in parallel to provide real-time simulations to distribute cyber-physical systems.By being able to readily integrate multiple simulations together,a high-fidelity training environment can be provided along with accurate prediction and ultimately,a shared model of reality in the IoS.

Additionally,there are still significant challenges in managing the security of collected data and distributed systems.Techniques such as homomorphic encryption and quantum-key distribution could help with security challenges but ultimately,this is a persistent challenge that must be continually addressed as exploits are found.Owing to this,systems need to be designed with agility in mind in order to be able to quickly react to changes in the security landscape.There should also be mechanisms for initial verification of safety protocol compliance along with mechanisms for continual evaluation of compliance to counteract any service performance degradation over time.

6 Acknowledgments

This work forms part of the University of Leeds centre for city simulation:VirtuoCity and has been supported by various grants including UK-EPSRC grant EP/K014226/1 and the China National Key Research and Development Program(no.2016YFB1000101 and 20016YFB1000103)

7 References

[1] Foster,I.,Kesselman,C.:‘The grid 2:blueprint for a new computing infrastructure’(Morgan Kaufmann,Burlington,MA,USA,2003)

[2] Armbrust,M.,Fox,A.,Griffith,R.,et al.: ‘A view of cloud computing’,Commun.ACM,2010,53,(4),pp.50–58

[3] AbdelBaky,M.,Parashar,M.,Kim,H.,et al.:‘Enabling high-performance computing as a service’,Computer,2012,45,(10),pp.72–80

[4] Blinder,A.S.: ‘Offshoring:the next industrial revolution?’,Foreign Affairs,2006,85,(2),pp.113–128

[5] Royal Society of Chemistry:‘A third industrial revolution’,Integr.Biol.,2009,1,(2),pp.148–149

[6] Gubbi,J.,Buyya,R.,Marusic,S.,et al.:‘Internet of things(IoT):a vision,architectural elements,and future directions’,Future Gener.Comput.Syst.,2013,29,(7),pp.1645–1660

[7] Lopez,P.G.,Montresor,A.,Epema,D.,et al.:‘Edge-centric computing:vision and challenges’,ACM SIGCOMM Comput.Commun.Rev.,2015,45,(5),pp.37–42

[8] Bonomi,F.,Milito,R.,Zhu,J.,et al.:‘Fog computing and its rolein the internet of things’.Proc.of the First Edition of the MCC Workshop on Mobile Cloud Computing,2012,pp.13–16

[9] Manyika,J.,Chui,M.,Brown,B.,et al.:‘Big data:the next frontier for innovation,competition,and productivity’,2011

[10] LeCun,Y.,Bengio,Y.,Hinton,G.:‘Deep learning’,Nature,2015,521,(7553),pp.436–444

[11] Mckee,D.W.,Clement,S.J.,Ouyang,X.,et al.:‘The internet of simulation,a specialisation of the internet of things with simulation and work flow as a service(SIM/WFAAS)’.11th IEEE Int.Symp.on Service-Oriented System Engineering(SOSE 2017),2017

[12] Hermann,M.,Pentek,T.,Otto,B.:‘Design principles for industrie 4.0 scenarios’.2016 49th Hawaii Int.Conf.on System Sciences(HICSS),2016

[13] Lee,J.,Bagheri,B.,Kao,H.-A.:‘A cyber-physical systems architecture for industry 4.0-based manufacturing systems’,Manuf.Lett.,2015,3,pp.18–23,ISSN 2213-8463

[14] Bojanova,I.,Hurlburt,G.,Voas,J.: ‘Imagineering an internet of anything’,Computer,2014,47,(6),pp.72–77

[15]Wu,X.,Zhu,X.,Wu,G.-Q.,et al.:‘Data mining with big data’,IEEE Trans.Knowl.Data Eng.,2014,26,(1),pp.97–107

[16] Zikopoulos,P.,Eaton,C.,Deroos,D.,et al.:‘Understanding big data:analytics for enterprise class hadoop and streaming data’(McGraw-Hill Osborne Media,New York,USA,2011)

[17] McKee,D.W.,Clement,S.J.,Almutairi,J.,et al.:‘Massive-scale automation in cyber-physical systems:vision&challenges’.2017 IEEE 13th Int.Symp.on Autonomous Decentralized System(ISADS),2017,pp.5–11

[18] McKee,D.W.,Webster,D.,Townend,P.,et al.:‘Towards a virtual integration design and analysis environment for automotive engineering’.2014 IEEE 17th Int.Symp.on Object/Component/Service-Oriented Real-Time Distributed Computing,2014

[19] Metcalfe,J.S.,Miles,I.:‘Innovation systems in the service economy:measurement and case study analysis’,vol.18(Springer Science&Business Media,Berlin,Germany,2012)

[20] Chen,Y.:‘Service-oriented computing and system integration:software,IoT,big data,and AIas services’(Kendall Hunt Publishing,2018)

[21] Papazoglou,M.P.:‘Service-oriented computing:concepts,characteristics and directions’.Proc.of the Fourth Int.Conf.on Web Information Systems Engineering,2003.WISE 2003,2003,pp.3–12

[22] Clement,S.J.,McKee,D.W.,Romano,R.,et al.:‘The internet of simulation:enabling agile model based systems engineering for cyber-physical systems’.System of Systems Engineering Conference(SoSE),2017 12th.IEEE,April 2017

[23]Tsai,W.-T.,Qi,G.,Zhu,Z.:‘Scalable SaaS indexing algorithms with automated redundancy and recovery management’,Int.J.Softw.Inform.,2013,7,(1),pp.63–84

[24] Chen,S.,Zhao,J.:‘The requirements,challenges,and technologies for 5G of terrestrial mobile telecommunication’,IEEE Commun.Mag.,2014,52,(5),pp.36–43

[25] Tsai,W.-T.,Qi,G.,Chen,Y.:‘A cost-effective intelligent con figuration model in cloud computing’.2012 32nd Int.Conf.on Distributed Computing Systems Workshops(ICDCSW),2012,pp.400–408

[26] Buyya,R.,Dastjerdi,A.V.: ‘Internet of things:principles and paradigms’(Elsevier Science&Technology,New York,USA,2016)

[27] Shi,W.,Cao,J.,Zhang,Q.,et al.: ‘Edge computing:vision and challenges’,IEEE Internet Things J.,2016,3,(5),pp.637–646,ISSN 2327-4662

[28] Doriya,R.,Mishra,S.,Gupta,S.:‘A brief survey and analysis of multi-robot communication and coordination’.Proc.Communication Automation Int.Conf.Computing,May 2015,pp.1014–1021

[29] Arumugam,R.,Enti,V.R.,Bingbing,L.,et al.:‘DAvinci:a cloud computing framework for service robots’.2010 IEEE Int.Conf.on Robotics and Automation,May 2010,pp.3084–3089

[30]Riazuelo,L.,Civera,J.,Montiel,J.M.M.:‘C2TAM:a cloud framework for cooperative tracking and mapping’,Robot.Auton.Syst.,2014,62,(4),pp.401–413

[31] Waibel,M.,Beetz,M.,Civera,J.,etal.:‘Roboearth’,IEEERobot.Autom.Mag.,2011,18,(2),pp.69–82

[32] Chibani,A.,Amirat,Y.,Mohammed,S.,et al.:‘Ubiquitous robotics:recent challenges and future trends’,Robot.Auton.Syst.,2013,61,(11),pp.1162–1172

[33] Kehoe,B.,Patil,S.,Abbeel,P.,et al.:‘A survey of research on cloud robotics and automation’,IEEE Trans.Autom.Sci.Eng.,2015,12,(2),pp.398–409,ISSN 1545-5955

[34] Chen,Y.,Du,Z.,García-Acosta,M.:‘Robot as a service in cloud computing’.2010 Fifth IEEE Int.Symp.on Service Oriented System Engineering(SOSE),2010,pp.151–158

[35] Vick,A.,Vonásek,V.,Peˇnicˇka,R.,et al.:‘Robot control as aservice – towards cloud-based motion planning and control for industrial robots’.2015 10th Int.Workshop on Robot Motion and Control(RoMoCo),July 2015,pp.33–39

[36] Neirotti,P.,Marco,A.D.,Caglianoand,A.C.,etal.:‘Current trendsin smart city initiatives:some stylised facts’,Cities,2014,38,pp.25–36

[37] Hollands,R.G.:‘Will the real smart city please stand up?Intelligent,progressive or entrepreneurial?’,City,2008,12,(3),pp.303–320

[38] Hall,R.E.,Bowerman,B.,Braverman,J.,et al.:‘The vision of a smart city’.Technical Report,Brookhaven National Lab.,Upton,NY,USA,2000

[39] Harrison,C.,Eckman,B.,Hamilton,R.,et al.:‘Foundations for smarter cities’,IBM J.Res.Dev.,2010,54,(4),pp.1–16

[40] Washburn,D.,Sindhu,U.,Balaouras,S.,et al.:‘Helping CIOs understand“Smart city”initiatives’,Growth,2009,17,(2),pp.1–17

[41] Giffinger,R.,Fertner,C.,Kramar,H.,et al.:‘Smart cities.Ranking of European medium-sized cities’.Final Report,Centre of Regional Science,Vienna UT,2007

[42] Partridge,H.L.:‘Developing a human perspective to the digital divide in the“smart city”’,2004

[43] Nam,T.,Pardo,T.A.:‘Conceptualizing smart city with dimensions of technology,people,and institutions’.Proc.of the 12th Annual Int.Digital Government Research Conf.:Digital Government Innovation in Challenging Times,2011,pp.282–291

[44] Clement,S.J.,McKee,D.W.,Xu,J.:‘Service-oriented reference architecture for smart cities’.2017 IEEE Symp.on Service-Oriented System Engineering(SOSE),2017,pp.81–85

[45] IEEE smart cities,2017

[46] Gatsoulis,I.,Mehmood,M.O.,Dimitrova,V.G.,et al.:‘Learning the repair urgency for a decision support system for tunnel maintenance’,in Kaminka,G.A.,Fox,M.,Bouquet,P.,et al.(Eds.):‘ECAI 2016:22nd European Conference on artificial intelligence’,Frontiers in artificial intelligence and applications,vol.285(IOS Press,Amsterdam,The Netherlands,2016),pp.1769–1774

[47] Peel,H.,Morgan,G.,Peel,C.,et al.:‘Inspection robot with low cost perception sensing’.33rd Int.Symp.on Automation and Roboticsin Construction(ISARC 2016),August 2016

[48] Xiong,Z.,Sheng,H.,Rong,W.,et al.:‘Intelligent transportation systems for smart cities:a progress review’,Sci.China Inf.Sci.,2012,55,(12),pp.2908–2914

[49] Schoettle,B.,Sivak,M.:‘A survey of public opinion about autonomous and self-driving vehicles in the US,the UK,and Australia’,University of Michigan,2014

[50] ‘Taxonomy and definitions for terms related to driving automation systems for on-road motor vehicles’.SAE J 3016,2016

[51] Luettel,T.,Himmelsbach,M.,Wuensche,H.-J.:‘Autonomous ground vehicles:concepts and a path to the future’,Proc.IEEE,2012,100,(Special Centennial Issue),pp.1831–1839

[52] Urmson,C.,Anhalt,J.,Bagnell,D.,et al.:‘Autonomous driving in urban environments:boss and the urban challenge’,J.Field Robot.,2008,25,(8),pp.425–466,ISSN 1556-4967

[53] Ullman,S.: ‘Against direct perception’,Behav.Brain Sci.,1980,3,(3),pp.373–381

[54] Chen,C.,Seff,A.,Kornhauser,A.,et al.:‘Deepdriving:learning a ffordance for direct perception in autonomous driving’.Proc.of the 2015 IEEE Int.Conf.on Computer Vision(ICCV),ICCV ‘15,Washington,DC,USA,2015,pp.2722–2730

[55] Geiger,A.,Lenz,P.,Urtasun,R.:‘Are we ready for autonomous driving?The KITTI vision benchmark suite’.2012 IEEE Conf.on Computer Vision and Pattern Recognition,June 2012,pp.3354–3361

[56] Maddern,W.,Pascoe,G.,Linegar,C.,et al.:‘1 year,1000 km:the Oxford robotcar dataset’,Int.J.Robot.Res.,2017,36,(1),pp.3–15

[57] Gerla,M.,Lee,E.-K.,Pau,G.,et al.:‘Internet of vehicles:from intelligent grid to autonomous cars and vehicular clouds’.2014 IEEE World Forum on Internet of Things(WF-IoT),2014

[58]Manley,J.E.:‘Unmanned surface vehicles,15 years of development’.OCEANS 2008,2008

[59] Clarke,R.: ‘Understanding the drone epidemic’,Comput.Law Secur.Rev.,2014,30,(3),pp.230–246

[60] Katiraei,F.,Iravani,M.R.:‘Power management strategies for a microgrid with multiple distributed generation units’,IEEE Trans.Power Syst.,2006,21,(4),pp.1821–1831

[61] Lasseter,R.H.,Paigi,P.: ‘Microgrid:a conceptual solution’.2004 IEEE 35th Annual Power Electronics Specialists Conf.,2004.PESC 04.,2004,vol.6,pp.4285–4290

[62] Gungor,V.C.,Sahin,D.,Kocak,T.,et al.:‘A survey on smart grid potential applications and communication requirements’,IEEE Trans.Ind.Inf.,2013,9,(1),pp.28–42

[63] Fang,X.,Misra,S.,Xue,G.,et al.:‘Smart grid – the new and improved power grid:a survey’,IEEE Commun.Surv.Tutorials,2012,14,(4),pp.944–980,ISSN 1553-877X

[64] Zhou,K.,Fu,C.,Yang,S.:‘Big datadriven smartenergy management:frombig data to big insights’,Renew.Sust.Energy Rev.,2016,56,pp.215–225,ISSN 1364-0321

[65] Yan,Y.,Qian,Y.,Sharif,H.,et al.:‘A survey on smart grid communication infrastructures:motivations,requirements and challenges’,IEEE Commun.Surv.Tutorials,2013,15,(1),pp.5–20,ISSN 1553-877X

[66] Lu,T.,Lü,X.,Remes,M.,et al.:‘Investigation of air management and energy performance in a data center in Finland:case study’,Energy Build.,2011,43,(12),pp.3360–3372,ISSN 0378-7788

[67]Bawden,T.:‘Global warming:data centres to consume three times as much energy in next decade,experts warn’.The Independent,2016

[68] Koomey,J.:‘Growth in data center electricity use 2005 to 2010’,A Report by Analytical Press,completed at the request of The New York Times,2011,vol.9

[69] Brady,G.A.,Kapur,N.,Summers,J.L.,et al.:‘A case study and critical assessment in calculating power usage effectiveness for a data centre’,Energy Convers.Manage.,2013,76,pp.155–161,ISSN 0196-8904

[70] Moreno,I.S.,Yang,R.,Xu,J.,et al.:‘Improved energy-efficiency in cloud datacenters with interference-aware virtual machine placement’.2013 IEEE Eleventh Int.Symp.on Autonomous Decentralized Systems(ISADS),2013

[71] Moreno,I.S.,Garraghan,P.,Townend,P.,et al.:‘Analysis,modeling and simulation of workload patterns in a large-scale utility cloud’,IEEE Trans.Cloud Comput.,2014,2,(2),pp.208–221

[72] Garraghan,P.,Al-Anii,Y.,Summers,J.,et al.:‘A unified model for holistic power usage in cloud datacenter servers’.Proc.of the 9th Int.Conf.on Utility and Cloud Computing,UCC ‘16,New York,NY,USA,2016,pp.11–19

[73] Townend,P.,Xu,J.,Summers,J.,et al.:‘Holistic data centres:next generation data and thermal energy infrastructures’.2016 IEEE 35th Int.Performance Computing and Communications Conf.(IPCCC),December 2016

[74] Dayarathna,M.,Wen,Y.,Fan,R.:‘Datacenter energy consumption modeling:a survey’,IEEE Commun.Surv.Tutorials,2016,18,(1),pp.732–794,ISSN 1553-877X

[75] Gao,J.: ‘Machine learning applications for data center optimization’,2014,https://research.google.com/pubs/archive/42542.pdf

[76] Kagermann,H.,Wahlster,W.,Helbig,J.:‘Recommendations for implementing the strategic initiative industrie 4.0:final report of the industrie 4.0 working group’.Technical Report,Frankfurt,2013

[77] Lasi,H.,Fettke,P.,Kemper,H.-G.,et al.:‘Industry 4.0’,Bus.Inf.Syst.Eng.,2014,6,(4),pp.239–242

[78] Xu,L.D.,He,W.,Li,S.:‘Internet of things in industries:asurvey’,IEEE Trans.Ind.Inf.,2014,10,(4),pp.2233–2243

[79] Rosenberg,W.,Donald,A.:‘Evidence based medicine:an approach to clinical problem-solving’,BMJ,1995,310,pp.1122–1126,ISSN 0959-8138

[80] Raghupathi,W.,Raghupathi,V.:‘Big dataanalytics in healthcare:promise and potential’,Health Inf.Sci.Syst.,2014,2,(1),p.3

[81] Piwek,L.,Ellis,D.A.,Andrews,S.,et al.:‘The rise of consumer health wearables:promises and barriers’,PLOSMed.,2016,13,(2),p.e1001953

[82] Wei,J.:‘How wearables intersect with the cloud and the internet of things:considerations for the developers of wearables’,IEEE Consum.Electron.Mag.,2014,3,(3),pp.53–56

[83] Azaria,A.,Ekblaw,A.,Vieira,T.,et al.:‘Medrec:using blockchain for medical data access and permission management’.2016 2nd Int.Conf.on Open and Big Data(OBD),August 2016

[84] Robinson,H.,MacDonald,B.,Broadbent,E.:‘The role of healthcare robots for older people at home:a review’,Int.J.Soc.Robot.,2014,6,(4),pp.575–591

[85] Howard, N.: ‘Medical co-processor for signaling pattern decoding and manipulation of cellular structures’.US Patent App.12/880,042,10 September 2010

[86]Howard,N.,Bergmann,J.H.M.,Howard,R.:‘Examining everyday speech and motor symptoms of parkinson’s disease for diagnosis and progression tracking’.2013 12th Mexican Int.Conf.on Artificial Intelligence(MICAI),2013,pp.262–269

[87] Bittencourt,L.F.,Rana,O.,Petri,I.: ‘Cloud computing at the edges’.Cloud Computing and Services Science,2016,ISBN 978-3-319-29581-7

[88] Mell,P.,Grance,T.:‘The NIST definition of cloud computing’,2011

[89] NIST:‘NIST cloud computing reference architecture’.Technical Report,2011

[90] Dillon,T.,Wu,C.,Chang,E.:‘Cloud computing:issues and challenges’.2010 24th IEEE Int.Conf.on Advanced Information Networking and Applications,April 2010,pp.27–33

[91] Gong,C.,Liu,J.,Zhang,Q.,et al.:‘The characteristics of cloud computing’.2010 39th Int.Conf.on Parallel Processing Workshops,September 2010,pp.275–279

[92] Huerta-Canepa,G.,Lee,D.:‘A virtual cloud computing provider for mobile devices’.Proc.of the 1st ACM Workshop on Mobile Cloud Computing&Services:Social Networks and Beyond,2010,p.6

[93] He,X.,Ren,Z.,Shi,C.,et al.:‘A novel load balancing strategy of software-defined cloud/fog networking in the internet of vehicles’,China Commun.,2016,13,(2),pp.140–149

[94]Fernando,N.,Loke,S.W.,Rahayu,W.: ‘Mobile cloud computing:a survey’,Future Gener.Comput.Syst.,2013,29,(1),pp.84–106

[95] Verbelen,T.,Simoens,P.,Turck,F.D.,et al.:‘Cloudlets:bringing the cloud to the mobile user’.Proc.of the Third ACM workshop on MOBILE CLOUD COMPUTING and Services,2012,pp.29–36

[96] Satyanarayanan,M.,Bahl,P.,Caceres,R.,et al.:‘The case for VM-based cloudlets in mobile computing’,IEEE Pervasive Comput.,2009,8,(4),pp.14–23

[97] Varghese,B.,Wang,N.,Barbhuiya,S.,et al.:‘Challenges and opportunities in edge computing’.IEEE Int.Conf.on Smart Cloud(Smart Cloud),2016,pp.20–26

[98]Mahmud,R.,Buyya,R.:‘Fog computing:a taxonomy,survey and future directions’,In ‘Internet of Everything’ (Springer,Singapore,2018),pp.103–130

[99]McKee,D.W.,Clement,S.J.,Xu,J.,et al.:‘n-Dimensional QoS framework for realtime service-oriented architectures’.2nd IEEE Int.Symp.on Real-time Data Processing for Cloud Computing,2017

[100] Andrikopoulos,V.,Benbernou,S.,Papazoglou,M.P.:‘On the evolution of services’,IEEE Trans.Softw.Eng.,2012,38,(3),pp.609–628,ISSN 0098-5589

[101] Webster,D.,Townend,P.,Xu,J.:‘Restructuring web service interfaces to support evolution’.2014 IEEE 8th Int.Symp.on Service Oriented System Engineering(SOSE),2014,pp.158–159

[102] Sagiroglu,S.,Sinanc,D.:‘Big data:a review’.2013 Int.Conf.on Collaboration Technologies and Systems(CTS),May 2013

[103] Hashem,I.A.T.,Yaqoob,I.,Anuar,N.B.,et al.:‘The rise of‘big data’on cloud computing:review and open research issues’,Inf.Syst.,2015,47,pp.98–115

[104] Yang,R.,Xu,J.:‘Computing at massive scale:scalability and dependability challenges’.2016 IEEE Symp.on Service-Oriented System Engineering(SOSE),2016

[105] John Walker,S.:‘Big data:a revolution that will transform how we live,work,and think’(Taylor and Francis,2014)

[106] Lohr,S.:‘The age of big data’,New York Times,2012,11,(2012)

[107] Manovich,L.:‘Trending:the promises and the challenges of big social data’,Debates Digit.Humanit.,2011,2,pp.460–475

[108] AB Ericsson:‘Ericsson mobility report:on the pulse of the networked society’.Tech.Rep.EAB-14,61078,Ericsson,Sweden,2015

[109] Gartner:‘Gartner says 8.4 billion connected “things”will be in use in 2017,up 31 percent from 2016’,2017 press release:https://www.gartner.com/newsroom/id/3598917

[110] Nordrum,A.:‘Popular internet of things forecast of 50 billion devices by 2020 is outdated’,IEEE Spectr.,2016,18

[111] Voas,J.:‘Networks of things’,NIST Spec.Publ.,2016,800,p.183

[112] Garraghan,P.,Perks,S.,Ouyang,X.,et al.:‘Tolerating transient late-timing faults in cloud-based real-time stream processing’.Int.Symp.on Real-Time Distributed Computing(ISORC 2016),July 2016,pp.108–115

[113] Boeglin,J.:‘The costs of self-driving cars:reconciling freedom and privacy with tort liability in autonomous vehicle regulation’,Yale J.Law Technol.,2015,17,p.171

[114] Inland Transport Committee Economic Commission for Europe:‘Reports of the world forum for harmonization of vehicle regulations’,2017

[115] Standard for distributed interactive simulation–application protocols,1993

[116] Dahmann,J.S.,Kuhl,F.,Weatherly,R.:‘Standards for simulation:as simpleas possible but not simpler the high level architecture for simulation’,Simulation,1998,71,(6),pp.378–387

[117] Kuhl,F.,Weatherly,R.,Dahmann,J.:‘Creating computer simulation systems:an introduction to the high level architecturee’(Prentice Hall PTR,Upper Saddle River,New Jersey,USA,1999)

[118] Blochwitz,T.,Otter,M.,Akesson,J.,et al.:‘Functional mockup interface 2.0:the standard for tool independent exchange of simulation models’.Proc.of the 9th Int.MODELICA Conf.,Munich,Germany,3–5 September 2012,no.76,pp.173–184

[119] Enge-Rosenblatt,O.,Clau?,C.,Schneider,A.,et al.: ‘Functional digital mock-up and the functional mock-up interface-two complementary approaches for a comprehensive investigation of heterogeneous systems’.Proc.of the 8th Int.Modelica Conf.,Dresden,Germany,20–22 March 2011,no.063,pp.748–755

[120] McKee,D.W.,Webster,D.,Xu,J.,et al.:‘DIVIDER:modelling and evaluating real-time service-oriented cyberphysical co-simulations’.2015 IEEE 18th Int.Symp.on Real-Time Distributed Computing,2015,pp.272–275

[121] Chiappa,S.,Racanière,S.,Wierstra,D.,et al.: ‘Recurrent environment simulators’,CoRR,abs/1704.02254,2017

[122] Dickerson,C.E.,Ji,S.,Clement,S.J.,et al.:‘A demonstration of a service oriented virtual environment for complex system analysis’,Int.J.Complex Syst.,2015,3,(1),pp.49–65

[123] Garraghan,P.,McKee,D.,Ouyang,X.,et al.:‘SEED:a scalable approach for cyber-physical system simulation’,IEEE Trans.Serv.Comput.,2016,9,(2),pp.199–212

[124] Bertsch,C.,Ahle,E.,Schulmeister,U.:‘The functional mockup interface – seen from an industrial perspective’.Proc.of the 10th Int.Modelica Conf.,Lund,Sweden,10–12 March 2014

[125] Xiong,W.,Tsai,W.-T.: ‘HLA-based SaaS-oriented simulation frameworks’.2014 IEEE 8th Int.Symp.on Service Oriented System Engineering,2014,pp.376–383

[126] Jing,Q.,Vasilakos,A.V.,Wan,J.,et al.:‘Security of the internet of things:perspectives and challenges’,Wirel.Netw.,2014,20,(8),pp.2481–2501

[127] Roses,S.: ‘Mirai DDoS botnet:source code&binary analysis’[Online].Available:http://www.simonroses.com/2016/10/mirai-ddos-botnet-source-codebinary-analysis/

[128] Kerner,R.:‘Remote code execution in CCTV-DVR affecting over 70 different vendors’,[Online].Available:http://www.kerneronsec.com/2016/02/remotecode-execution-in-cctv-dvrs-of.html

[129] Dijk,M.V.,Gentry,C.,Halevi,S.,et al.:‘Fully homomorphic encryption over the integers’.Annual Int.Conf.on the Theory and Applications of Cryptographic Techniques,2010,pp.24–43

[130] Damg?rd,I.,Pastro,V.,Smart,N.,et al.: ‘Multiparty computation from somewhat homomorphic encryption’.Advances in Cryptology–CRYPTO 2012,2012,pp.643–662

[131] Agrawal,R.,Kiernan,J.,Srikant,R.,et al.:‘Order preserving encryption for numeric data’.Proc.of the 2004 ACM SIGMOD Int.Conf.on Management of Data,2004,pp.563–574

[132] Khan,M.M.,Murphy,M.,Beige,A.:‘High errorrate quantum key distribution for long-distance communication’,New J.Phys.,2009,11,(6),p.063043

[133] Brassard,G.,Lütkenhaus,N.,Mor,T.,et al.:‘Limitations on practical quantum cryptography’,Phys.Rev.Lett.,2000,85,(6),p.1330

[134] Swan,M.:‘Blockchain:blueprint for a new economy’(O’Reilly Media,Inc.,Farnham,UK,2015)

[135] Lisagor,O.,McDermid,J.A.,Pumfrey,D.J.:‘Towards apracticable process for automated safety analysis’.24th Int.System Safety Conf.,2006,vol.596,p.607

[136] The Guardian: ‘Give robots an “ethical black box”to track and explain decisions’,2017

[137] Noorman,M.,Johnson,D.G.:‘Negotiating autonomy and responsibility in military robots’,Ethics Inf.Technol.,2014,16,(1),pp.51–62

[138] Townend,P.,Webster,D.,Venters,C.C.,et al.:‘Personalised provenance reasoning models and risk assessment in business systems:a case study’.2013 IEEE Seventh Int.Symp.on Service-Oriented System Engineering,2013

怀仁县| 周宁县| 武清区| 湘潭县| 黄山市| 临汾市| 南涧| 和田县| 北碚区| 赣州市| 西乡县| 湖南省| 河北区| 建宁县| 甘孜县| 双江| 庐江县| 浦北县| 同德县| 镇赉县| 镇江市| 宜阳县| 天峨县| 河池市| 清流县| 锡林郭勒盟| 珠海市| 钟祥市| 高邮市| 金秀| 英山县| 砀山县| 阿克| 荆州市| 二连浩特市| 藁城市| 仙居县| 渝北区| 芒康县| 琼结县| 玉溪市|