Academic literature on the topic 'Cyberphysical systems and internet of things'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyberphysical systems and internet of things.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cyberphysical systems and internet of things"

1

DeFranco, Joanna F. "Should Cyberphysical Systems and the Internet of Things Get Married?" Computer 55, no. 3 (March 2022): 14–23. http://dx.doi.org/10.1109/mc.2021.3133965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mikryukov, A., V. M. Trembach, and A. V. Danilov. "Modules of Organizational and Technical Systems for Solving Problems of Adaptation in a Rapidly Changing Environment." Open Education 24, no. 5 (October 28, 2020): 82–90. http://dx.doi.org/10.21686/1818-4243-2020-5-82-90.

Full text
Abstract:
Purpose of research. The aim of the research is to form modules of organizational and technical systems (OTS) using a cognitive approach to solve problems of adaptation of cyberphysical systems. Currently, there is a rapid development of elements of the Internet of things. New tasks related to self-organization and adaptation in a rapidly changing external environment are brought to the fore. These tasks occur when new elements appear in the telecommunications computer network, they fail, change the mode, new tasks occur, etc. To work out these tasks, the possibilities of approaches to support and decision-making such as situational, cognitive, and semiotic are considered. The authors consider the cognitive approach in more detail. Within the framework of the cognitive paradigm, the article describes the use of the cognitive approach for solving problems of adaptation of cyberphysical systems. To solve this problem on the basis of an agent-based approach, the structure of a cyberphysical system with the possibility of adaptation is presented and the functions of its agents are described. The main stages of solving problems of adaptation of cyberphysical systems are presented. An adaptation algorithm using the planning mechanism is presented. The demo example shows a knowledge base for solving the problem of adapting cyberphysical systems using a cognitive planning mechanism.Materials and methods of research. New approaches and methods are required to address adaptation issues in planning. The cognitive approach is one of the developing directions in solving many problems of the Internet of things. One of these tasks is the ability to adapt OTS modules in a rapidly changing external environment based on the planning mechanism. To solve the planning problem, we use the algorithm described by Aristotle more than 2,350 years ago and implemented in the GPS program. This algorithm can be considered the first description of the cognitive mechanism that a person uses. The knowledge base uses an integrated approach to knowledge representation. When developing OTS modules, an agent-based approach was used to solve the problem of adaptation.Results. The existing and developing approaches and methods for decision support and decision-making are considered for decisionmaking in newly emerging situations in OTS modules. The main provisions of such significant approaches as situational, cognitive and semiotic are presented. A cognitive approach to the adaptation of intelligent systems is proposed. The solution of the problem of adaptation of cyberphysical systems is considered within the framework of the cognitive paradigm. The structure of a cyberphysical system capable of solving adaptation problems is shown. The functions of OTS modules based on agent-oriented technology are described. A description of the adaptation algorithm using the cognitive planning mechanism is given. The main stages of solving problems of adaptation of cyberphysical systems are presented. A demo example of solving the problem of adaptation by a cyberphysical system-a cooking robot – is shown.Conclusion. Using the modular architecture of an intelligent system allows you to solve many problems. One of these tasks is to configure elements of the Internet of things when they deviate from their main function. The planning mechanisms proposed for parametric adaptation can be repeatedly applied in OTS modules as separate agents. This approach is relevant for elements of the Internet of things. In the case of expanding the functionality of the OTS modules of Internet of things, it is advisable to apply machine learning with fixing the results in the knowledge base of planning agents.
APA, Harvard, Vancouver, ISO, and other styles
3

Aulin, Viktor, Andrey Grinkiv, and Artem Holovatyi. "Cyberphysical Approach to the Creation, Operation and Improvement of Transport and Production Systems." Central Ukrainian Scientific Bulletin. Technical Sciences, no. 3(34) (October 2020): 331–43. http://dx.doi.org/10.32515/2664-262x.2020.3(34).331-343.

Full text
Abstract:
The content of the cyberphysical approach to the creation, functioning and improvement of transport and production systems is analyzed. It was found out how, on the basis of the approach, cyberphysical transport and production systems are created as the integration of special technologies of the Internet of Things; embedded systems; ubiquitous and cloud computing. It was revealed that cyberphysical transport and production systems have a trinitarian concept and are defined by three entities: communication, computation and control, which unites information. It is determined that the main functions of cyberphysical transport and production systems are: information processing, intelligent communications, performance and process control. A component model of such a system has been built, which includes two groups of components - evolutionary and technological. The evolutionary group of components includes subsystems: digital; integrated; robotic, intelligent distributed. These components are a kind of basis for the presence of prerequisites for the creation of transport and production systems. It is noted that the technology group of components is the basis for concrete implementations of the Internet of Things, embedded systems and ubiquitous and cloud computing. A cyberphysical system of technical service is proposed as a specific implementation of cyberphysical transport and production systems. It was determined that the modes of the proposed functional cyber system are: high adaptability; an appropriate level of efficiency; intelligence of management; high level of reliability; the use of a new on-net online simulation type; using a new type of self-verifying models; internal online optimization, etc. It is shown that the presence of intelligent models in the cyberphysical model of technical service makes the system resistant to cyberattacks and increases the degree of safety when ensuring traffic in transport and the development of an occupational safety system during maintenance and repair operations.
APA, Harvard, Vancouver, ISO, and other styles
4

Yershova, О. L., V. І. Оdnovolyk, and L. І. Bazhan. "Cyberphysical Systems: The Fundament of Smart Economy." Scientific Bulletin of the National Academy of Statistics, Accounting and Audit, no. 1-2 (January 15, 2019): 69–79. http://dx.doi.org/10.31767/nasoa.1-2.2019.08.

Full text
Abstract:
The article deals with the key technological trends underlying cyberphysical systems. The questions of constructing the smart industry as a cyber-physics system are described in their context the, barriers and risks are described in the transition to smart technologies in the economy and ways of overcoming them. The combination of the Internet and material things forms new opportunities for managing the physical world, including devices, factories and infrastructure that determine the modern economic landscape. The next 10 years of Internet of Things can radically change the manufacturing industry, energy, agriculture, transport and other sectors of the real economy, accounting for almost two thirds of world GDP. Due to the processes of digitization, such transformations will have far-reaching consequences in terms of redistribution of resources and markets of the present world. Technically, the smart industry integrates advances in the field of physical devices with advances in the field of information and communication technologies, which results in the formation of cyber-physics systems. For Ukraine, the special significance of smart industry is also determined by the fact that its traditional industry is currently in crisis, and the new “smart” industry has not received enough attention from the state. In the developed plan, the government’s priority actions in the Ukrainian economy for the period up to 2020 are smart industry (Industry 4.0, Internet industry, advanced digital production, etc.), unlike US, China, EU countries and other industrial leaders in general not considered, especially as a national strategic investment. The possibilities of using cyber-physics systems in various branches of economy and socially important systems are described. Examples of smart manufacturing are presented in modern conditions of Ukraine.
APA, Harvard, Vancouver, ISO, and other styles
5

O, Belej, Kolesnyk K, Nestor N, and Fedirko Yu. "Construction of subsystem determination of attacks in cyberphysical systems by neural network methods." Artificial Intelligence 26, jai2021.26(2) (December 1, 2021): 15–25. http://dx.doi.org/10.15407/jai2021.02.015.

Full text
Abstract:
In this research work analyzes and compares existing methods for describing data from cyberphysical systems, methods for detecting network attacks targeting cyberphysical systems, analyzes fundamental approaches and solutions in the field of cyberphysical systems security, and makes recommendations for supplementing existing approaches using new algorithms. The considered application of the neuroevolutionary algorithm of NeuroEvolution of Augmenting Topology using a hypercube for the analysis of multivariate time series describing the state of cyberphysical systems in order to identify abnormal conditions. After the modification, the algorithm allows almost completely configuring the target neural network without user intervention according to the specified parameters, including additionally creating intermediate network layers that were previously unavailable in the primary version of the algorithm. The method is verified on the TON_IOT DATASETS dataset. The system topology is the structure of the Internet of Things. The data are relevant, verified and correct, which allows them to be used for analysis and assessment of the accuracy of the approach under consideration. The obtained overall accuracy, proximity of solutions, values of False Positive Rate and False Negative Rate indicate the lack of retraining of the model and the high reliability of this method for detecting attacks in cyberphysical systems
APA, Harvard, Vancouver, ISO, and other styles
6

Teslya, Nikolay, and Igor Ryabchikov. "Ontology-driven approach for describing industrial socio-cyberphysical systems’ components." MATEC Web of Conferences 161 (2018): 03027. http://dx.doi.org/10.1051/matecconf/201816103027.

Full text
Abstract:
Nowadays, the concept of the industrial Internet of things is considered by researchers as the basis of Industry 4.0. Its use is aimed at creating a single information space that allows to unite all the components of production, starting from the processed raw materials to the interaction with suppliers and users of completed goods. Such a union will allow to change the established business processes of production to increase the customization of end products for the consumer and to reduce the costs for its producers. Each of the components is described using a digital twin, showing their main characteristics, important for production. The heterogeneity of these characteristics for each of the production levels makes it very difficult to exchange information between them. To solve the problem of interaction between individual components this paper proposes to use the ontological approach to model the components of industrial socio-cyberphysical systems. The paper considers four scenarios of interaction in the industrial Internet of things, based on which the upper-level ontology is formed, which describes the main components of industrial socio-cyberphysical systems and the connections between them.
APA, Harvard, Vancouver, ISO, and other styles
7

Ali, Ragimova Nazila, and Abdullayev Vugar Hacimahmud. "Application of blockchain technology in “smart-digital hospital” cyber physical systems." MATEC Web of Conferences 348 (2021): 01017. http://dx.doi.org/10.1051/matecconf/202134801017.

Full text
Abstract:
Health informatization as an urgent problem has not yet been resolved. Quality medical care, intellectual level, communication infrastructure, management process, control of equipment, sensors are presented as a “smart-digital hospital” cyberphysical system with modern information technologies. The most important condition for “smart-digital” hospitals is that health workers inform patients about patients using the Internet of Things and mobile applications, and ensure their comfort.
APA, Harvard, Vancouver, ISO, and other styles
8

Vodyaho, Alexander, Nataly Zhukova, Yulia Schichkina, Saddam Abbas, and Vladimir Chernokulsky. "Towards Building Cyberphysical Systems with Agile Architecture." Journal of Computer Networks and Communications 2022 (February 21, 2022): 1–12. http://dx.doi.org/10.1155/2022/4952059.

Full text
Abstract:
The current stage of technology development is characterized by an increase in the complexity of the created anthropogenic systems, a constant expansion of the scope of information technologies, an increase in the intelligence level of the created systems, and the appearance of new paradigms for building information-oriented systems such as cyber-physical systems, the Internet of things, and cloud and fog systems. Modern information-oriented systems very often have dynamic structure, implement complex adaptive behavior, and can be considered as systems with agile architecture. The article discusses one of the possible approaches for building cyberphysical systems with agile architecture on fog platforms. The idea of the proposed approach is to accumulate knowledge about the current state of the observed cyberphysical systems in the form of knowledge graphs. As a model, it is proposed to use multilevel relatively finite state operating automaton at the upper level and knowledge graphs at the lower level. A distinctive feature of the developed approach is that models that describe the current state of the observed system can be built automatically.
APA, Harvard, Vancouver, ISO, and other styles
9

Ribeiro, Luis, and Martin Hochwallner. "On the Design Complexity of Cyberphysical Production Systems." Complexity 2018 (June 10, 2018): 1–13. http://dx.doi.org/10.1155/2018/4632195.

Full text
Abstract:
Establishing mass-customization practices, in a sustainable way, at a time of increased market uncertainty, is a pressing challenge for modern producing companies and one that traditional automation solutions cannot cope with. Industry 4.0 seeks to mitigate current practice’s limitations. It promotes a vision of a fully interconnected ecosystem of systems, machines, products, and many different stakeholders. In this environment, dynamically interconnected autonomous systems support humans in multifaceted decision-making. Industrial Internet of Things and cyberphysical systems (CPSs) are just two of the emerging concepts that embody the design and behavioral principles of these highly complex technical systems. The research within multiagent systems in manufacturing, by embodying most of the defining principles of industrial CPSs (ICPSs), is often regarded as a precursor for many of today’s emerging ICPS architectures. However, the domain has been fuzzy in specifying clear-cut design objectives and rules. Designs have been proposed with different positioning, creating confusion in concepts and supporting technologies. This paper contributes by providing clear definitions and interpretations of the main functional traits spread across the literature. A characterization of the defining functional requirements of ICPSs follows, in the form of a scale, rating systems according to the degree of implementation of the different functions.
APA, Harvard, Vancouver, ISO, and other styles
10

Pohasii, Serhii, Stanislav Milevskyi, Bogdan Tomashevsky, and Natalya Voropay. "DEVELOPMENT OF THE DOUBLE-CONTOUR PROTECTION CONCEPT IN SOCIO-CYBERPHYSICAL SYSTEMS." Advanced Information Systems 6, no. 2 (July 14, 2022): 57–66. http://dx.doi.org/10.20998/2522-9052.2022.2.10.

Full text
Abstract:
The rapid development of mobile Internet technologies LTE (Long-Term Evolution) not only predetermined the further development of cyber-physical systems, which are based on the synthesis of technologies of classical computer systems and LTE technologies, as well as integration with Internet-of-Things technologies. As a result, the emergence of sociocyberphysical systems predetermines further development based on this integration. The creation of mesh- and sensor networks also allows the development of smart technologies and systems based on their conglomeration. The development and creation of a quantum computer, on the one hand, will make it possible to make a technical breakthrough in computing resources, use artificial intelligence, and on the other hand, it can lead to “chaos” in ensuring the security of modern technologies and systems. So, based on the algorithms of Shor and Grover quantum cryptography, symmetric cryptosystems based on traditional cryptography algorithms, as well as asymmetric cryptosystems, including systems based on elliptic curve cryptography, can be broken. The paper proposes to use a new approach to building security systems based on the concept of internal and external security contours. At the same time, security contours of continuous business processes are considered. This approach provides an objective assessment of the current state of security of the socio-cyber system as a whole.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Cyberphysical systems and internet of things"

1

Lillethun, David. "ssIoTa: A system software framework for the internet of things." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53531.

Full text
Abstract:
Sensors are widely deployed in our environment, and their number is increasing rapidly. In the near future, billions of devices will all be connected to each other, creating an Internet of Things. Furthermore, computational intelligence is needed to make applications involving these devices truly exciting. In IoT, however, the vast amounts of data will not be statically prepared for batch processing, but rather continually produced and streamed live to data consumers and intelligent algorithms. We refer to applications that perform live analysis on live data streams, bringing intelligence to IoT, as the Analysis of Things. However, the Analysis of Things also comes with a new set of challenges. The data sources are not collected in a single, centralized location, but rather distributed widely across the environment. AoT applications need to be able to access (consume, produce, and share with each other) this data in a way that is natural considering its live streaming nature. The data transport mechanism must also allow easy access to sensors, actuators, and analysis results. Furthermore, analysis applications require computational resources on which to run. We claim that system support for AoT can reduce the complexity of developing and executing such applications. To address this, we make the following contributions: - A framework for systems support of Live Streaming Analysis in the Internet of Things, which we refer to as the Analysis of Things (AoT), including a set of requirements for system design - A system implementation that validates the framework by supporting Analysis of Things applications at a local scale, and a design for a federated system that supports AoT on a wide geographical scale - An empirical system evaluation that validates the system design and implementation, including simulation experiments across a wide-area distributed system We present five broad requirements for the Analysis of Things and discuss one set of specific system support features that can satisfy these requirements. We have implemented a system, called \textsubscript{SS}IoTa, that implements these features and supports AoT applications running on local resources. The programming model for the system allows applications to be specified simply as operator graphs, by connecting operator inputs to operator outputs and sensor streams. Operators are code components that run arbitrary continuous analysis algorithms on streaming data. By conforming to a provided interface, operators may be developed that can be composed into operator graphs and executed by the system. The system consists of an Execution Environment, in which a Resource Manager manages the available computational resources and the applications running on them, a Stream Registry, in which available data streams can be registered so that they may be discovered and used by applications, and an Operator Store, which serves as a repository for operator code so that components can be shared and reused. Experimental results for the system implementation validate its performance. Many applications are also widely distributed across a geographic area. To support such applications, \textsubscript{SS}IoTa must be able to run them on infrastructure resources that are also distributed widely. We have designed a system that does so by federating each of the three system components: Operator Store, Stream Registry, and Resource Manager. The Operator Store is distributed using a distributed hast table (DHT), however since temporal locality can be expected and data churn is low, caching may be employed to further improve performance. Since sensors exist at particular locations in physical space, queries on the Stream Registry will be based on location. We also introduce the concept of geographical locality. Therefore, range queries in two dimensions must be supported by the federated Stream Registry, while taking advantage of geographical locality for improved average-case performance. To accomplish these goals, we present a design sketch for SkipCAN, a modification of the SkipNet and Content Addressable Network DHTs. Finally, the fundamental issue in the federated Resource Manager is how to distributed the operators of multiple applications across the geographically distributed sites where computational resources can execute them. To address this, we introduce DistAl, a fully distributed algorithm that assigns operators to sites. DistAl also respects the system resource constraints and application preferences for performance and quality of results (QoR), using application-specific utility functions to allow applications to express their preferences. DistAl is validated by simulation results.
APA, Harvard, Vancouver, ISO, and other styles
2

Magnússon, Sindri. "Bandwidth Limited Distributed Optimization with Applications to Networked Cyberphysical Systems." Doctoral thesis, KTH, Nätverk och systemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-205682.

Full text
Abstract:
The emerging technology of Cyberphysical systems consists of networked computing, sensing, and actuator devices used to monitor, connect, and control physical phenomena. In order to economically and sustainably operate Cyberphysical systems, their devices need to cooperate over a communication network to solve optimization problems. For example, in smart power grids, smart meters cooperatively optimize the grid performance, and in wireless sensor networks a number of sensors cooperate to find optimal estimators of real-world parameters. A challenging aspect in the design of distributed solution algorithms to these optimization problems is that while the technology advances and the networks grow larger, the communication bandwidth available to coordinate the solution remains limited. Motivated by this challenge, this thesis investigates the convergence of distributed solution methods for resource allocation optimization problems, where gradient information is communicated at every iteration, using limited communication. This problem is approached from three different perspectives, each presented in a separate paper.  The investigation of the three papers demonstrate promises and limits of solving distributed resource allocation problems using limited communication bandwidth. Future work will consider how even more general problems can be solved using limited communication bandwidth and also study different communication constraints.

QC 20170424

APA, Harvard, Vancouver, ISO, and other styles
3

Söderberg, Karl Jakob Emanuel. "INTERNET OF THINGS : Smart välfärdsteknologi." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15793.

Full text
Abstract:
Internet of Things är en utveckling som inte endast sträcker sig till de industriella områdena idag. Det når nu mera även ut till välfärdsteknologin. Både användare och företag påverkas idag av detta faktum. Företag har ett behov, och en plikt att värna om sina kunder, och kunder har ett behov av att göra sin röst hörd. Detta arbete har som syfte att utforska acceptansen hos de äldre till denna smarta välfärdsteknologi, samt vad som krävs för att öka acceptansen. Arbetet tillnärmar sig frågan genom litteratur som bas för enkäter och intervjuer, utförda i Sverige och Norge.Det visar sig att acceptansen beror på många olika faktorer, som alla uppfattas olika från person till person. Men att det i många fall kan koka ned till behovet. De flesta människorna vill helst bo hemma så länge som möjligt, i alla fall i Sverige och Norge. Men innan det har gått så långt så kan det vara oklart hur öppna folk är till teknologi som har möjlighet till att uppfattas som integritetskränkande. Nyckeln ligger i att göra teknologin så anpassningsbar som möjligt, vad gäller både funktion och utseende, samt andra faktorer som säkerhet, förståelse, användbarhet och kostnad.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Zhi. "Networked RFID Systems for the Internet of Things." Doctoral thesis, KTH, Elektroniksystem, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-120056.

Full text
Abstract:
The Internet of Things (IoT) utilizes trillions of uniquely identifiable smart objects to connect anything at anytime and anywhere. Radio frequency identification (RFID) techniques are a powerful promising enabler for realizing the IoT. Around how to build hierarchical networked RFID systems for the IoT, this dissertation formulates and addresses problems in three key areas, i.e., communication protocols, simulation approaches, and RFID applications. Communication protocols are essential for designing high-performance networked RFID systems. First, we propose to use time hopping pulse-position modulation (TH-PPM) impulse radio ultra wideband (IR-UWB) for the tag-to-reader link. We analyze different parts of the system delay and propose relevant strategies to shorten the delay. Second, we give the concept of code division multiple access (CDMA) UWB RFID systems. We analyze the asynchronous matched filter receiver and decorrelating receiver for multi-tag detection, and propose a new communication process that fully exploits the multiple-access capability of the two detection schemes. Simulations are widely used to evaluate the performance of wireless networks. We propose a new approach for simulating networked RFID systems with multiple wireless standards within one case in OMNeT++. It is realized by partitioning and modeling the protocol stacks of different standards and designing a multi-radio module. Moreover, we propose a CO-Simulation framework with MATLAB and OMNeT++ (COSMO). COSMO has the ability of self-validation. It combines the strengths of MATLAB and OMNeT++ by compiling prebuilt models in MATLAB to header files and shared libraries and integrating them into OMNeT++. RFID technology gains popularity because it can be used to track and monitor objects in real time. We implement two typical networked RFID applications, i.e., wide area RFID sensor network and item-level indoor RFID localization. We design a two-layered wide area RFID sensor network for fresh food tracking. It adopts GSM/GPRS for the communication between the server and master nodes, and semi IR-UWB for the communication between master nodes and slave nodes. We develop the control platform and implement the all-in-one sensor nodes. For indoor RFID localization, we give insights about the influence of tag interaction on tag antenna radiation pattern and localization accuracy. Two examples, i.e., the k-NN algorithm and the Simplex algorithm, are taken to show how to utilize tag interaction analysis to improve the design of localization algorithms.

QC 20130409

APA, Harvard, Vancouver, ISO, and other styles
5

Salehi-Abari, Omid. "Software-hardware systems for the Internet-of-Things." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/115767.

Full text
Abstract:
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages [187]-201).
Although interest in connected devices has surged in recent years, barriers still remain in realizing the dream of the Internet of Things (IoT). The main challenge in delivering IoT systems stems from a huge diversity in their demands and constraints. Some applications work with small sensors and operate using minimal energy and bandwidth. Others use high-data-rate multimedia and virtual reality systems, which require multiple-gigabits-per-second throughput and substantial computing power. While both extremes stress the computation, communications, and energy resources available to the underlying devices, each intrinsically requires different solutions to satisfy its needs. This thesis addresses both bandwidth and energy constraints by developing custom software-hardware systems. To tackle the bandwidth constraint, this thesis introduces three systems. First, it presents AirShare, a synchronized abstraction to the physical layer, which enables the direct implementation of diverse kinds of distributed protocols for loT sensors. This capability results in a much higher throughput in today's IoT networks. Then, it presents Agile-Link and MoVR, new millimeter wave devices and protocols which address two main problems that prevent the adoption of millimeter wave frequencies in today's networks: signal blockage and beam alignment. Lastly, this thesis shows how these systems enable new IoT applications, such as untethered high-quality virtual reality. To tackle the energy constraint, this thesis introduces a VLSI chip, which is capable of performing a million-point Fourier transform in real-time, while consuming 40 times less power than prior fast Fourier transforms. Then, it presents Caraoke, a small, low-cost and low-power sensor, which harvests its energy from solar and enables new smart city applications, such as traffic management and smart parking.
by Omid Salehi-Abari.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
6

Kroon, Cathering, and Louise Myllylä. "Internet of Things - En studie med användarperspektiv." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-48838.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sufiye, Shooresh. "Industrial Internet of Things Edge Computing : Edge Forensics." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-41390.

Full text
Abstract:
Internet of Things (IoT) is an upcoming prominent technology which is quickly growing. Not all IoTdemands of computing resources can be satisfied by cloud, and obstacles are firmer when it comes to mobility and agility. Thus, edge computing as a suitable middleware can fill the gap between cloud and IoT devices. Refer to the latest researches, edge security is still evolving, and forensics is almost untouched. In this work, we attempt to study available technologies and materials then design and implement an edge computing application which addresses the challenge of log collection from different edge devices. The interaction between edge and cloud is in a fashion that cloud entity can perform log collection from heterogeneous edge devices belong to different owners. On the other hand, due to local computing on the logs, the edge devicecan trust cloud party. Results show that thanks to the crucial topological position of the edge devices, the concept of edge computing can easily solve similar cloud challenges.
APA, Harvard, Vancouver, ISO, and other styles
8

Touati, Lyes. "Internet of things security : towards a robust interaction of systems of systems." Thesis, Compiègne, 2016. http://www.theses.fr/2016COMP2311/document.

Full text
Abstract:
Cette thèse traite des problèmes et des défis de sécurité dans l’Internet des Objets (IdO). L’évolution de l’Internet classique vers l’Internet des Objets crée de nombreux challenges dans la manière de sécuriser les communications et soulève des problèmes liés au contraintes de l’internet des objets à savoir : objets à faibles ressources d’énergie et de calculs, hétérogénéité nuisant à l’interopérabilité des objets, taille du réseau de plus en plus grande, ... etc. En effet, Internet s’est développé d’un réseau d’ordinateurs personnels et de serveurs vers un immense réseau connectant des milliards d’objets intelligents communicants. Ces objets seront intégrés dans des systèmes complexes et utiliseront des capteurs et actionneurs pour observer et interagir avec leur environnement physique. Les exigences des interactions entre objets communicants en termes de sécurité dépendent du contexte qui évolue dans l’espace et le temps. Par conséquent, la définition de la politique de sécurité doit être adaptative et sensible au contexte. Un des problèmes auxquels nous nous sommes intéressés est le contrôle d’accès efficace à base de cryptographie d’attributs : « Attributes Based Encryption (ABE) ». Les schémas ABE (CP-ABE et KP-ABE) présentent plusieurs atouts pour l’implémentation d’un contrôle d’accès cryptographique. Par contre, ces schémas posent des défis opérationnels à cause de leurs complexités et leur surcoût élevé en termes de temps d’exécution et consommation énergétique. Pour pallier cet inconvénient, nous avons exploité l’hétérogénéité d’environnement Internet des Objets pour proposer des versions collaboratives et distribuées de ces schémas de contrôle d’accès cryptographique. Nos solutions réduisent considérablement le coût en termes d’énergie nécessaire à l’exécution. Le deuxième inconvénient des schémas ABE est l’inexistence de mécanismes efficaces de gestion de clés. Nous avons proposé des solutions pour le problème de révocation d’attributs dans le schéma CP-ABE, Ces solutions, en plus de leur efficacité, répondent à des exigences de sécurité différentes selon le cas d’applications. Nous avons proposé également, une solution à base de CP-ABE pour le problème du « grouping proof ». Le « grouping proof » consiste à fournir une preuve sur la coexistence, dans le temps et l’espace, d’un ensemble d’objets. Parmi les applications de notre solution, on peut citer le payement NFC et la sécurisation de l’accès aux locaux sensibles
In this thesis, we deal with security challenges in the Internet of Things. The evolution of the Internet toward an Internet of Things created new challenges relating to the way to secure communications given the new constraints of IoT, namely: resource constrained objects, heterogeneity of network components, the huge size of the network, etc. Indeed, the Internet evolved from a network of computers and servers toward a huge network connecting billions of smart communicating objects. These objects will be integrated into complex systems and use sensors and actuators to observe and interact with their physical environment. The security requirements of the interactions between smart objects depend on the context which evolves in time and space. Consequently, the definition of the security policies should be adaptive and context-aware. In this thesis, we were interested in the problem of access control in IoT relying on Attribute based Encryption (ABE). Indeed, ABE schemes present many advantages in implementing a cryptographic fine-grained access control. However, these schemes raise many implementation challenges because of their complexity and high computation and energy overheads. To overcome this challenge, we leveraged the heterogeneity of IoT to develop collaborative and distributed versions of ABE schemes. Our solutions reduce remarkably the overhead in terms of energy consumption and computation. The second limitation of ABE schemes is the absence of efficient attribute/key revocation techniques. We have proposed batch based mechanisms for attribute/key revocation in CP-ABE. We demonstrated the efficiency of the proposed solutions through simulations. Finally, we have proposed a CP-ABE based solution for the problem of grouping proof. This problem consists of providing the proof that a set of objects are present simultaneously (same time and same location). The propose solution has many applications such as enforcing the security of NFC based payments and the access to sensitive locations
APA, Harvard, Vancouver, ISO, and other styles
9

Shaikh, Yasir Saleem. "Privacy preserving internet of things recommender systems for smart cities." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS001.

Full text
Abstract:
Au cours de la dernière décennie, la technologie Internet des objets (IoT) a révolutionné presque tous les domaines de la vie quotidienne et a dynamisé les villes intelligentes. Les villes intelligentes utilisent la technologie IoT pour collecter divers types de données de capteurs, puis les utilisent pour offrir diverses applications. Comme les applications des villes intelligentes sont utilisées par les citoyens, donc leur fournir des services de recommandation personnalisés en fonction de leurs préférences, de leurs localisations et de leurs profils ainsi que l'exploitation des données IoT (par exemple, la congestion du trafic et l'occupation du parking) est d'une grande importance qui pourrait être fournie par un recommandateur IoT. Cependant, comme le recommandateur IoT utilise les données privées des citoyens (profils, préférences et habitudes, par exemple), il viole la vie privée des utilisateurs car il pourrait suivre les routines et les habitudes des utilisateurs en analysant la base de données historique ou en analysant les services de recommandation réguliers qu'il offre. Par conséquent, il est important de préserver la confidentialité des utilisateurs du programme de recommandation IoT. Dans cette thèse, nous proposons un nouveau système de recommandation IoT préservant la confidentialité pour les villes intelligentes, qui fournit des recommandations en exploitant les données IoT des capteurs et en tenant compte de diverses métriques. Notre approche est organisée en trois parties. Tout d'abord, nous développons un système de recommandation IoT conforme au règlement européen sur la protection des données (GDPR) pour les systèmes de stationnement intelligent. Ces systèmes fournissent des recommandations sur les emplacements et les itinéraires de stationnement en exploitant les données des capteurs de stationnement et de circulation. Par conséquence, nous proposons d’abord une approche pour la cartographie des capteurs de trafic avec les coordonnées d’itinéraires afin d’analyser les conditions de trafic (par exemple le niveau de congestion) sur les routes. Ensuite, nous avons mis en place un dispositif de recommandation IoT. Le recommandateur IoT a été intégré au scénario d'utilisation du stationnement intelligent d'un projet H2020 EU-KR WISE-IoT et a été évalué par les citoyens de Santander, en Espagne, à l'aide d'un prototype. De plus, nous développons un recommendateur IoT pour le ski intelligent qui fournit des itinéraires de ski comprenant des types de pistes spécifiques, ainsi que la piste la plus proche. Pour les itinéraires de ski, il n’existe aucun moteur de calcul stable. Par conséquent, un nouveau moteur de routage pour les itinéraires de ski a été développé. Ce travail a également été intégré dans le cas d'utilisation du ski intelligent du projet WISE-IoT. Deuxièmement, bien que le recommandateur IoT développé pour le stationnement intelligent soit conforme au GDPR, il ne protège toutefois pas totalement la vie privée des utilisateurs. En effet, le partage sans discernement des données des utilisateurs avec un système tiers de recommandation de stationnement IoT non approuvé ou semi-fiable provoque une violation de la vie privée. En effet, le comportement et les schémas de mobilité des utilisateurs pouvant être déduits en analysant l'historique de leurs déplacements. Par conséquent, nous préservons la confidentialité des utilisateurs contre le système de recommandation de stationnement tout en analysant leur historique de stationnement en utilisant des techniques de k-anonymat et de confidentialité différentielle. Enfin, étant donné que les applications de villes intelligentes sont développées de manière verticale et ne se parlent pas. Par conséquent, nous avons proposé deux cadres pour les services de recommandation parmi les applications de villes intelligentes utilisant l'IdO social
During the past decade, the Internet of Things (IoT) technology has revolutionized almost all the fields of daily life and has boosted smart cities. Smart cities use IoT technology to collect various types of sensors’ data and then use such data to offer a variety of applications. Since the smart cities’ applications are used by the citizens, therefore providing the customized recommendation services to the citizens based on their preferences, locations and profiles, as well as by exploiting the IoT data (e.g., traffic congestion and parking occupancy) is of great importance which could be provided by an IoT recommender. However, since the IoT recommender utilizes the private data of citizens (e.g., profiles, preferences and habits), it breaches the privacy of the users because the IoT recommender could track the routines and habits of the users by analyzing the historical database or by analyzing the regular recommendation services it offers. Therefore, it is important to preserve the privacy of the users from the IoT recommender. In this thesis, we propose a novel privacy preserving IoT recommender system for smart cities that provides recommendations by exploiting the IoT data of sensors and by considering various metrics. Our approach is organized in three parts. Firstly, we develop an EU General Data Protection Regulation (GDPR)-compliant IoT recommender system for smart parking system that provides recommendations of parking spots and routes by exploiting the data of parking and traffic sensors. For this, we first propose an approach for the mapping of traffic sensors with route coordinates in order to analyze the traffic conditions (e.g., the level of congestion) on the roadways and then developed an IoT recommender. The IoT recommender has been integrated into the smart parking use case of an H2020 EU-KR WISE-IoT project and has been evaluated by the citizens of Santander, Spain through a prototype. Additionally, we develop an IoT recommender for smart skiing that provides skiing routes comprised of specific types of slopes, as well as the nearest slope. For skiing routes, there does not exist any stable routing engine. Therefore, a novel routing engine for skiing routes was developed. This work has also been integrated into the smart skiing use case of WISE-IoT project. Secondly, although the developed IoT recommender for smart parking is GDPR-compliant, however, it does not fully protect the privacy of users. Because, an indiscriminately sharing of users’ data with untrusted third-party IoT parking recommender system causes a breach of privacy, as user’s behavior and mobility patterns can be inferred by analyzing the past travelling history of users. Therefore, we preserve privacy of users against parking recommender system while analyzing their past parking history using k-anonymity and differential privacy techniques. Lastly, since the smart cities applications are developed in a vertical manner and do not talk/communicate with each other, i.e., each application is developed for a certain scenario which generally does not share data with other smart cities applications. Therefore, we proposed two frameworks for the recommendation services across smart cities applications using social IoT. Firstly, on how social IoT can be used for the recommendation services across smart cities applications, and secondly, we propose another type of communication of social IoT at a global level, i.e., social cross-domain application-to-application communications, that enables smart cities applications to communicate with each other and establish social relationships between them
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Ning. "EFFICIENT ROUTING AND OFFLOADING DESIGN IN INTERNET-OF-THINGS SYSTEMS." Diss., Temple University Libraries, 2018. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/517698.

Full text
Abstract:
Computer and Information Science
Ph.D.
One of the fundamental challenges in Internet-of-Things systems is that network environment is always changing. Conventional networking approaches do not consider the dynamic evaluation of the networks or consider the network dynamic as a mirror thing, which may not be able to work or has a low efficiency in the Internet-of-Things systems. This dissertation is uniquely built by considering the dynamic network environment and even taking advantage of the network dynamic to improve the network performances, with a focus on the routing and offloading issues. The first part is related to the routing design in the opportunistic mobile networks. The opportunistic mobile network is expected to be an intrinsic part of the Internet of Things. Devices communicate with each other autonomously without any centralized control and collaborate to gather, share, and forward information in a multi-hop manner. The main challenge in opportunistic mobile networks is due to intermittent connection and thus data is delivered through store-carry-forwarding paradigm. In this dissertation, We found an observation regarding the contact duration and proposed efficient data partitioning routing algorithms in the opportunistic mobile networks. The second part is related to the offloading issues in the Internet-of-things systems. With the surging demand on high-quality mobile services at any time, from anywhere, how to accommodate the explosive growth of traffics with/without existing network infrastructures is a fundamental issue. Specifically, We consider three different offloading problems, i.e., cellular data offloading, cloud task offloading, and mobile worker task offloading problems in vehicular networks, cloud, and crowdsourcing platforms. The common issue behind them is how to efficiently utilize the network resources in different scenarios by design efficient scheduling mechanisms. For the cellular data offloading, We explored the trade-off of cellular offloading in the vehicular network. For the cloud task offloading, We conducted the research to adjust the offloading strategies wisely so that the total offloading cost is minimized. For the worker task offloading in the smart cities, We optimized the cost-efficiency of the crowdsourcing platforms.
Temple University--Theses
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cyberphysical systems and internet of things"

1

Serpanos, Dimitrios, and Marilyn Wolf. Internet-of-Things (IoT) Systems. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69715-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hakima, Chaouchi, ed. Internet of things: Connecting objects. Hoboken, NJ: John Wiley & Sons, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pal, Souvik, Debashis De, and Rajkumar Buyya, eds. Artificial Intelligence-based Internet of Things Systems. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-87059-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Krishna, P. Venkata, Sasikumar Gurumoorthy, and Mohammad S. Obaidat. Internet of Things and Personalized Healthcare Systems. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-0866-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kaushik, Keshav, Susheela Dahiya, Akashdeep Bhardwaj, and Yassine Maleh. Internet of Things and Cyber Physical Systems. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003283003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chaouchi, Hakima. Internet of things: Connecting objects. Hoboken, NJ: John Wiley & Sons, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Goes, João. Circuits and Systems for the Internet of Things. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003337553.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Staniec, Kamil. Radio Interfaces in the Internet of Things Systems. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-44846-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Srivastava, Durgesh, Neha Sharma, Deepak Sinwar, Jabar H. Yousif, and Hari Prabhat Gupta. Intelligent Internet of Things for Smart Healthcare Systems. Boca Raton: CRC Press, 2023. http://dx.doi.org/10.1201/9781003326182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wolf, Marilyn, and Dimitrios Serpanos. Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-25808-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cyberphysical systems and internet of things"

1

Zalewski, Janusz, and Fernando Gonzalez. "Online Course on Cyberphysical Systems with Remote Access to Robotic Devices." In Online Engineering & Internet of Things, 408–15. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64352-6_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fortino, Giancarlo, Anna Rovella, Wilma Russo, and Claudio Savaglio. "Towards Cyberphysical Digital Libraries: Integrating IoT Smart Objects into Digital Libraries." In Internet of Things, 135–56. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-26869-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fortino, Giancarlo, Anna Rovella, Wilma Russo, and Claudio Savaglio. "Including Cyberphysical Smart Objects into Digital Libraries." In Internet and Distributed Computing Systems, 147–58. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11692-1_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kopetz, Hermann, and Wilfried Steiner. "Internet of Things." In Real-Time Systems, 325–41. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-11992-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kopetz, Hermann. "Internet of Things." In Real-Time Systems Series, 307–23. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-8237-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Thangam, Dhanabalan, Anil B. Malali, Gopalakrishnan Subramanian, Sumathy Mohan, and Jin Yong Park. "Internet of Things." In Healthcare Systems and Health Informatics, 3–15. New York: CRC Press, 2021. http://dx.doi.org/10.1201/9781003146087-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bagga, Robina Gujral, Alok Mishra, and Kumar Anubhav Tiwari. "Internet of Things." In Smart Computing and Self-Adaptive Systems, 47–66. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003156123-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Curado, Marilia, Henrique Madeira, Paulo Rupino da Cunha, Bruno Cabral, David Perez Abreu, João Barata, Licínio Roque, and Roger Immich. "Internet of Things." In Cyber Resilience of Systems and Networks, 381–401. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77492-3_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yadav, Navneet, and Rama Kanta Choudhury. "Connected Vehicles: Intelligent Transport Systems." In Internet of Things, 81–99. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-52624-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Papp, Zoltan, Raul del Toro Matamoros, Coen van Leeuwen, Julio de Oliveira Filho, Andrei Pruteanu, and Přemysl Šůcha. "Designing Reconfigurable Systems: Methodology and Guidelines." In Internet of Things, 29–68. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0715-6_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cyberphysical systems and internet of things"

1

Lopez-Araujo, Daniela J., Jose Luis Avila-Alonso, and Nohemi Alvarez-Jarquin. "Monitoring and Control of Cyberphysical Systems: An Internet of Things Application." In 2019 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC). IEEE, 2019. http://dx.doi.org/10.1109/ropec48299.2019.9057108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Binder, Christoph, Dieter Draxler, Christian Neureiter, and Goran Lastro. "Using a model-based engineering approach for developing Industrial Internet of Things applications." In 2020 IEEE Conference on Industrial Cyberphysical Systems (ICPS). IEEE, 2020. http://dx.doi.org/10.1109/icps48405.2020.9274701.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cho, Haejin, Sangwon Lim, Viacheslav Belenko, Maxim Kalinin, Dmitry Zegzhda, and Ellada Nuralieva. "Application and improvement of sequence alignment algorithms for intrusion detection in the Internet of Things." In 2020 IEEE Conference on Industrial Cyberphysical Systems (ICPS). IEEE, 2020. http://dx.doi.org/10.1109/icps48405.2020.9274752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Katiyar, Karan, Harsh Gupta, and Abhishek Gupta. "Integrating contactless Near Field Communication and context-aware systems: Improved Internet-of-Things and cyberphysical systems." In 2014 5th International Conference- Confluence The Next Generation Information Technology Summit. IEEE, 2014. http://dx.doi.org/10.1109/confluence.2014.6949042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fortino, Giancarlo, Wilma Russo, Claudio Savaglio, Mirko Viroli, and MengChu Zhou. "Opportunistic cyberphysical services: A novel paradigm for the future Internet of Things." In 2018 IEEE 4th World Forum on Internet of Things (WF-IoT). IEEE, 2018. http://dx.doi.org/10.1109/wf-iot.2018.8355174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Toro Santamaria, Ricardo, and Placid M. Ferreira. "Operating System for Cyber-Physical Manufacturing (OSCM): A Flexible Event-Driven Shopfloor Information Platform for Advanced Manufacturing." In ASME 2022 17th International Manufacturing Science and Engineering Conference. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/msec2022-85576.

Full text
Abstract:
Abstract Factory technologies have evolved to incorporate a great deal of manufacturing flexibility. Programmable automation in the form of CNC and PLCs along with hardware innovations (quick-change tooling, for example) and various operator assist technologies enable a high level of shop-floor flexibility. Possibly, the most inflexible part of a factory is the manufacturing information system. Customized for manufacturers by system integrators, these systems are often large monolithic systems assembled around an ERP/MRP framework or a precariously integrated set of decision-support software tools with a patchwork of communications enabling information flow between them. On the other hand, cloud-based information service platforms such as those encountered in social networks and service brokers have seen rapid and multiple cycles of evolution resulting in a meteoric rise in their ability to handle increasingly large data scales and rates, while still maintaining their elasticity and flexibility. This rapid evolution of cloud-based information services has ignited a new era in the manufacturing industry as evidenced by emerging manufacturing cyberphysical system technologies such as the Industrial Internet of Things (IIoT), and Cloud Manufacturing (CM). These technologies are part of the broader context of what is thought to be the unfolding fourth industrial revolution (Industry 4.0 or Digital Manufacturing). This revolution places at its core, connectivity, information, and machine-based intelligence to create a new paradigm for manufacturing that is highly flexible, scalable, responsive, and intelligent. This paper describes how we leveraged the newest advances in CPS, IIoT, CM, and distributed systems to create a flexible manufacturing information system infrastructure that separates information collection and distribution for decision-making functions. The first part of the paper introduces the architecture for a novel full-stack manufacturing infrastructure that is envisioned to facilitate and track the interaction between a manufacturing job, physical resources, and the software services (or apps) around them. We call this platform the Operating System for Cyber-physical Manufacturing (OSCM). In the second part of the paper, we introduce an event-based architecture for OSCM so that resource or transaction related events/data can be flexibly distributed to different decision-making/manufacturing software tools through an event/message exchange/bus. Further, such an architecture allows modularization and incremental development of different manufacturing software tools and services as new needs are identified.
APA, Harvard, Vancouver, ISO, and other styles
7

Sciullo, Luca, Federico Montori, Angelo Trotta, Marco Di Felice, and Tullio Salmon Cinotti. "Discovering Web Things as Services within the Arrowhead Framework." In 2020 IEEE Conference on Industrial Cyberphysical Systems (ICPS). IEEE, 2020. http://dx.doi.org/10.1109/icps48405.2020.9274694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"Internet of things." In 2016 International Conference on Smart Systems and Technologies (SST). IEEE, 2016. http://dx.doi.org/10.1109/sst.2016.7765666.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Santo, Walter E., Ricardo J. P. de B. Salgueiro, Reneilson Santos, Danilo Souza, Admilson Ribeiro, and Edward Moreno. "Internet of Things." In EATIS '18: Euro American Conference on Telematics and Information Systems. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3293614.3293644.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hind, Meziane, Ouerdi Noura, Kasmi Mohammed Amine, and Mazouz Sanae. "Internet of Things." In NISS2020: The 3rd International Conference on Networking, Information Systems & Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3386723.3387876.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cyberphysical systems and internet of things"

1

Greer, Christopher, Martin Burns, David Wollman, and Edward Griffor. Cyber-physical systems and internet of things. Gaithersburg, MD: National Institute of Standards and Technology, March 2019. http://dx.doi.org/10.6028/nist.sp.1900-202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography