Cyber-Physical Systems And Human-Machine Interactions In Industry 4.0

Dialogue, Presentation, and Control Levels in Cyber-Human Interaction

Cyber-physical systems are the networks of autonomous entities that are merged in physical as well as digital worlds. Dynamically interacting with environment is helpful. In addition, integration of the framework in the industries offers excellent perspectives towards sustainability and agility of the systems. In this perspective, it is essential to develop track that can be helpful to place a crossover between several topics that addressed in the research.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The cyber-human interaction in the sector is a portion of each socio-economic, technical system. The cyber machines and the humans collaborate and work altogether. The cyber machines-human collaboration is carried out by appropriate communication procedures (Hur et al. 2017). The communication is conducted in the form of dialogues. The dialogue consists of numerous interfaces like input and output and other similar tools. The human with the help of this dialogue connect and collaborates with the machine. It is required to design and deploy the exchanges in appropriate manner, and this way DIN offers a rule framework. As per Hadorn, Courant and Hirsbrunner (2016), the dialogues must follow the rules and the principles and must meet the expectations of the users. The discussions must have some qualities like fault-tolerant, adaptable and conducive to learning.

Butz and Krüger explain several dialogue design principles in the study other than DIN. The authors also add that the problems that one can face if touch displays are utilised. Firstly, the touch-sensitive areas can get activated wrongly by any other fingers or the heel of the hands. The first case must be considered. Secondly, the designers must take into consideration the anatomic shape of the fingers so that it can support clear user input. In the third case, if all the users use the touch interface simultaneously, the user interface must be capable of distinguishing all the users uniquely.

Work suitable: A dialogue is applicable for work as it supports the users to complete the task with ease.

Controllable: A dialogue can be controlled if users can control the procedure speed, the order of tools and displayed information.  

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Meeting users’ expectations: A dialogue can meet all the demands of the users if the dialogue is consistent.

Self-descriptive: A dialogue can be stated as self-descriptive if the principles of dialogue can be understood with simplicity.

Fault-tolerant: A dialogue is fault-tolerant if the project team can get the desired outcome despite several failures and restrictions.

The human-cyber machine interface offers information links between humans and cyber machines. The four major classes of human users are managers, operators, maintenance personnel and engineers. According to Hadorn, Courant and Hirsbrunner (2016), the cyber-machine comprises of the technical process, control systems for automation. The human-cyber machine interface is divided into several components for control as well as presentation, dialogue, information preprocessing and tutoring. It also consists of advanced functionalities. It contains several methods for improved data processing.

Human Augmentation in Industry 4.0

The presentation and dialogue are traditional levels human-cyber machine interface. Both the control level and the performance are thinking about the problems, how the data can be presented to the humans, how control inputs can be transferred to the cyber machines. The dialogue level deals with the issues related to information flow. As per Nan et al. (2017), the information preprocessing is implied, and it eases the data processing activities of the humans. The control level, as well as the presentation, offers human interfaces. Visual, auditory, gestural and mimic are used as a form of a presentation.

Combinations involve the multimodal displays and multimedia. The primary mode of presentation is the visualization, graphical user interface. Earlier the visual displays are applied using electromechanical instruments (Nahrstedt et al. 2016). The presentation and the dialogue levels depend on the knowledge-based models and systems. The performance of the technical systems model facilitates the human-interface relationship.

Explanation functionality is one of the functionality. It is one sort of knowledge-based online help system. the explanation functionality informs the humans on demands about various components of the technical system (Alur et al. 2016). A tutoring functionality supplies more knowledge in a simplified way to the novices.

The cyber machine-human interaction can lead to several changes related to production procedures and production organisation. Humans are always required in the factories of the future. The job chances are decreasing day by day, however, the new job opportunities are creating around the machines. According to Joshi (2017), the new tasks are based on the computational devices. CPPS integrates the employees with the computational devices. Thus, the work of the humans can become flexible. According to Michelucci et al. (2015), the humans can mitigate all the losses of the companies with the help of intelligent automation and creativity and skills. Fourthly, repetitive and simple tasks can be automated. The intelligent computerized systems will be helpful to simplify the tasks. Fifthly, the humans will not have to take much effort and can evaluate the problems effectively and profitably.

Several control systems can be exerted. The controls are exerted by bio-signals or by control devices. Controls are exerted by bio-signals for the handicapped people. The control devices utilize motion like gestures, displacements and forces. Gestural control and speech input can become new method of control in mere future. Speech recognition enables auto interpretation of human voice. According to Antsaklis (2014), the technology is capable to control human and cyber machines. The control device is one form of primary form of control for the human-cyber machine interaction. The mouse, pedals, knobs, switches, trackball and joysticks are the control devices that can facilitate human-cyber machine interaction. The project team must design the force-displacement characteristics of all these control devices in appropriate manner. Some virtual control devices can be operated on the display screens for example menu options and buttons as well as sliders.

Control Systems and Methodologies for Human-Cyber Machine Interaction

Human augmentation is an attempt to overcome the present limitations of human body by natural or artificial means. It is considered as utilization of technological way in order to select or alter characteristics of human as well as capabilities. In industry 4.0, the use of human augmentation aspect has important role for integrating with manufacturing. On the other hand, wearable technology like bracelets and anklets are worn in industry 4.0 that helps to increase communication between operators and robots in production. In addition, big data and analytics, autonomous robots, simulation, horizontal and vertical system integration as well as the industrial internet of things are important to be discussed.

Human-machine interactions are required synergistic multidisciplinary analysis efforts in order to support a paradigm shift for collaborative use cases. An important aspect of collaboration is required for human-machine mutual comprehension. It is required to evolve from an approach that minimizes human factors as uncontrollable environmental components. On strategic decision-making, conflict resolution is required for anticipating multiple trade-off situations. Hence, it is vital  to research on human-machine symbiotic collaborations that will be covered in the study.

This section of research includes methodology of the research. Research methodology explains the appropriate structure of the research. Research methodology includes different types of related concepts as well as ideas appropriate for development of the project. It is important to describe the process of data collection, and sampling technique explained in the research.

In the current research, positivism philosophy will be applied to make a better evaluation of the hidden facts as well as information associated with cyber-human integration in the industry (Taylor et al. 2015). In addition, as nature of the study is limited in time, interpretivism philosophy and realism philosophy will be discarded in the current research. Positivism philosophy assists the researcher in applying the specific logic that can assist to analyze the hidden facts as well as information in a scientific way. Positivism philosophy rejects detailed observation and knowledge collection of the research. Interpretivism philosophy is a mode included in epistemology that supports complicated structure involved in a social world of business as well as management activities. On the other hand, selection of positivism philosophy would be helpful to manipulate and assess data requiring minimization of the data errors.

The deductive approach will be selected in the research to study the related theories and concepts for the research. Models and theories related to cyber-human integration will be applied with the help of deductive research approach in a precise and clear way. The inductive approach can serve the purpose of developing a new theory (Lewis 2015). On the other hand, a deductive approach is used for explaining practical application of the theories as well as concepts selected for the research. The deductive approach aims at developing a new theory with detailed specifications as well as concepts involved with data analysis.

Collaborative Human-Machine Interactions and Strategic Decision-Making

In the research, descriptive research design will be applied for detail process involved in the application of the concept like cyber-human integration in industry. As On the other hand, explanatory research design will be avoided as the study does not support the concepts of making longitudinal study. Selection of descriptive research design would be helpful to depict the participants in accurate way. However, in descriptive study, correlating variables or determining cause and effect cannot be achieved.

Primary data collection method will be followed in the research. Primary data are collected from survey and interview method (Brinkmann 2014). On the other hand, secondary data are collected from books, journals and articles. The researcher will collect data by organizing survey and interview, whereas secondary data will be collected from secondary sources and analyzed in the literate review chapter of the research.

Quantitative data analysis method will be followed in the research. Quantitative data is helpful to record raw data from primary sources It adds a better explanation of the research topic. Theoretical concepts of the research in the practical field lead to understanding the topic in a better way. In addition, the quantitative date is applied with statistical data that can be helpful to record large size date. The researcher will apply mixed approach to both quantitative and qualitative data analysis technique will be applied in the research.

In the research work, employees of different IT-based organizations will be selected for quantitative analysis technique. On the other hand, managers of the organizations will be selected for interview method. An online survey will be organized to collect data from the employees. Simple random probability sampling technique will be used for sampling technique of the research. 105 numbers of employees will be selected for survey method, whereas three managers will be selected for interview method.

During the process of research, research needs to follow a code of conduct that will be helpful to identify wrong and right things need to be adopted in the research. The researcher needs to follow ethical consideration. Data gauged for the research will be under Data Protection Act 1998. In addition, any commercial application of information will be avoided in the research. The research will not insert any type of external influence over the participants of the survey.

References

Alur, R., Berger, E., Drobnis, A.W., Fix, L., Fu, K., Hager, G.D., Lopresti, D., Nahrstedt, K., Mynatt, E., Patel, S. and Rexford, J., 2016. Systems computing challenges in the Internet of Things. arXiv preprint arXiv:1604.02980.

Antsaklis, P., 2014. Goals and challenges in cyber-physical systems research editorial of the editor in chief. IEEE Transactions on Automatic Control, 59(12), pp.3117-3119.

Brinkmann, S., 2014. Interview. In Encyclopedia of critical psychology (pp. 1008-1010). Springer New York.

Gutzwiller, R.S., Fugate, S., Sawyer, B.D. and Hancock, P.A., 2015, September. The human factors of cyber network defense. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting (Vol. 59, No. 1, pp. 322-326). Sage CA: Los Angeles, CA: SAGE Publications.

Hadorn, B., Courant, M. and Hirsbrunner, B., 2016. Towards human-centered cyber-physical systems. Université de Fribourg.

Hahanov, V., Litvinova, E., Chumachenko, S. and Hahanova, A., 2018. Cyber physical computing. In Cyber Physical Computing for IoT-driven Services (pp. 1-20). Springer, Cham.

Harel, Y., Gal, I.B. and Elovici, Y., 2017. Cyber Security and the Role of Intelligent Systems in Addressing its Challenges. ACM Transactions on Intelligent Systems and Technology (TIST), 8(4), p.49.

Hur, C.H., Kim, S.P., Kim, Y.S. and Eom, J.H., 2017, August. Changes of Cyber-Attacks Techniques and Patterns after the Fourth Industrial Revolution. In 2017 IEEE 5th International Conference on Future Internet of Things and Cloud: Workshops (W-FiCloud) (pp. 69-74). IEEE.

Joshi, J., 2017. A Message from the New Editor-in-Chief. IEEE Transactions on Services Computing, 10(1), pp.3-4.

Krugh, M. and Mears, L., 2018. A complementary Cyber-Human Systems framework for Industry 4.0 Cyber-Physical Systems. Manufacturing Letters.

Lewis, S., 2015. Qualitative inquiry and research design: Choosing among five approaches. Health promotion practice, 16(4), pp.473-475.

Michelucci, P., Shanley, L., Dickinson, J. and Hirsh, H., 2015. A US research roadmap for human computation. arXiv preprint arXiv:1505.07096.

Nahrstedt, K., Lopresti, D., Zorn, B., Drobnis, A.W., Mynatt, B., Patel, S. and Wright, H.V., 2016. Smart communities internet of things. arXiv preprint arXiv:1604.02028.

Nan, Y., Liu, Y., Shen, J. and Chai, Y., 2017, July. A MCIN-based Model of Crowd-designing Clothing Industry. In Procee

Nan, Y., Liu, Y., Shen, J. and Chai, Y., 2017. A study on MCIN model in intelligent clothing industry. International Journal of Crowd Science, 1(2), pp.133-145.

Staheli, D.P., Mancuso, V.F., Leahy, M.J. and Kalke, M.M., 2016. Cloudbreak: Answering the Challenges of Cyber Command and Control. MIT Lincoln Laboratory Lexington United States.

Taylor, S.J., Bogdan, R. and DeVault, M., 2015. Introduction to qualitative research methods: A guidebook and resource. John Wiley & Sons.

Vaioleti, T.M., 2016. Talanoa research methodology: A developing position on Pacific research. Waikato Journal of Education, 12(1).