Collective intelligence operations of human and virtual agents in CPS (Cyber Physical System)
Authors
Date
2020Access restrictions
The author has not given permission to make the work publicly available electronically. Therefore the material can be read only at the archival workstation at Jyväskylä University Library (https://kirjasto.jyu.fi/en/workspaces/facilities).
Copyright
This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
This thesis deals with contemporary emergent approaches to CPS (Cyber Physical System) cognitive automation and embedded-intelligence processes, either with or without a HitL (Human-in-the-Loop) setting. The introduction section describes the concepts of normal processes vs. process exceptions, with their related research questions (read section 1.1 at page 2). Chapter two deals with the most relevant issues that affect CPS control systems, with general descriptions of their technical aspects. Chapter three is centered around cognitive technologies implemented in CPPs (Cyber-Physical Processes) automation and control, with some specific application examples. Chapter four deals with what kind of AI (Artificial
Intelligence) aspects need to be tackled so to progressively improve intelligent automation and control systems to a human-like cognition level. The final chapter relates to synthesizing a list of best practices for the discussed AI-driven technologies, in order to design, implement, test, manage and monitor a reliable CPS system, according to its main application domain.
...
Keywords
complex systems CPP (cyber-physical process) CPS (cyber-physical systems) DT (digital twin) HCPS (human-in-the-loop cyber-physical systems) MAS (multiagent system) predictive analysis semantic technology exception management IID (independent and identical distributed) data OOD (out-of-distribution) data joukkoäly automaatio tekoäly koneoppiminen tietojärjestelmät collective intelligence automation artificial intelligence machine learning data systems
Metadata
Show full item recordCollections
- Pro gradu -tutkielmat [29104]
Related items
Showing items with similar title or keywords.
-
Towards a Great Design of Conceptual Modelling
Kiyoki, Yasushi; Thalheim, Bernhard; Duží, Marie; Jaakkola, Hannu; Chawakitchareon, Petchporn; Heimbürger, Anneli (IOS Press, 2020)Humankind faces a most crucial mission; we must endeavour, on a global scale, to restore and improve our natural and social environments. This is a big challenge for global information systems development and for their ... -
Bridging human and machine learning for the needs of collective intelligence development
Gavriushenko, Mariia; Kaikova, Olena; Terziyan, Vagan (Elsevier, 2020)There are no doubts that artificial and human intelligence enhance and complement each other. They are stronger together as a team of Collective (Collaborative) Intelligence. Both require training for personal development ... -
Towards Liquid AI in IoT with WebAssembly : A Prototype Implementation
Kotilainen, Pyry; Heikkilä, Ville; Systä, Kari; Mikkonen, Tommi (Springer, 2023)An Internet of Things (IoT) system typically comprises numerous subsystems and devices, such as sensors, actuators, gateways for internet connectivity, cloud services, end-user applications, and analytics. Currently, these ... -
Practices and Infrastructures for Machine Learning Systems : An Interview Study in Finnish Organizations
Muiruri, Dennis; Lwakatare, Lucy Ellen; Nurminen, Jukka K.; Mikkonen, Tommi (Institute of Electrical and Electronics Engineers (IEEE), 2022)Using interviews, we investigated the practices and toolchains for machine learning (ML)-enabled systems from 16 organizations across various domains in Finland. We observed some well-established artificial intelligence ... -
Adversarial Attack’s Impact on Machine Learning Model in Cyber-Physical Systems
Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Peregrine Technical Solutions, 2020)Deficiency of correctly implemented and robust defence leaves Internet of Things devices vulnerable to cyber threats, such as adversarial attacks. A perpetrator can utilize adversarial examples when attacking Machine ...