To see the other types of publications on this topic, follow the link: Specification of cyberphysical systems.

Journal articles on the topic 'Specification of cyberphysical systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Specification of cyberphysical systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Meshcheryakov, Roman, Andrey Iskhakov, and Oleg Evsutin. "Analysis of Modern Methods to Ensure Data Integrity in Cyber-Physical System Management Protocols." Informatics and Automation 19, no. 5 (October 13, 2020): 1089–122. http://dx.doi.org/10.15622/ia.2020.19.5.7.

Full text
Abstract:
At present, the problem of creating methodological security of cyberphysical systems, in particular, the design and implementation of information security subsystems is acute. At the same time, the landscape of threats and vulnerabilities typical for a wide range of hardware and software technologies used in cyberphysical systems is extremely wide and complex. In this context, the security of application layer protocols is of paramount importance, as these protocols are the basis for interaction between applications and services running on different devices, as well as in cloud infrastructures. With the constant interaction of the systems under study with the real physical infrastructure, the challenge is to determine effective measures to ensure the integrity of the transferred control commands, as disruption of the performed critical processes can affect human life and health. The paper provides an analytical review of the main methods of data integrity assurance in management protocol of cyberphysical systems, as well as an overview of application layer protocols vulnerabilities widely used in cyberphysical systems of different types. Classical methods of data integrity assurance, new methods, in particular, blockchain, as well as the main directions of increasing the efficiency of data integrity protocols in cyberphysical systems are considered. Analysis of application layer vulnerabilities is carried out on the example of the most popular MQTT, CoAP, AMQP, DDS, XMPP specifications and their implementations. It is established that despite the presence of basic security mechanisms in all these protocols, researchers continue to regularly identify vulnerabilities in popular implementations, that often endangers critical infrastructure services. In the course of preparing the review of the existing methods of data integrity assurance for the examined class of systems, the key problems of these methods integration and ways of their solution were defined.
APA, Harvard, Vancouver, ISO, and other styles
2

Jaïdi, Faouzi, Faten Labbene Ayachi, and Adel Bouhoula. "A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures." Security and Communication Networks 2018 (2018): 1–22. http://dx.doi.org/10.1155/2018/7142170.

Full text
Abstract:
Substantial advances in Information and Communication Technologies (ICT) bring out novel concepts, solutions, trends, and challenges to integrate intelligent and autonomous systems in critical infrastructures. A new generation of ICT environments (such as smart cities, Internet of Things,edge-fog-social-cloudcomputing, and big data analytics) is emerging; it has different applications to critical domains (such as transportation, communication, finance, commerce, and healthcare) and different interconnections via multiple layers of public and private networks, forming a grid of critical cyberphysical infrastructures. Protecting sensitive and private data and services in critical infrastructures is, at the same time, a main objective and a great challenge for deploying secure systems. It essentially requires setting up trusted security policies. Unfortunately, security solutions should remain compliant and regularly updated to follow and track the evolution of security threats. To address this issue, we propose an advanced methodology for deploying and monitoring the compliance of trusted access control policies. Our proposal extends the traditional life cycle of access control policies with pertinent activities. It integrates formal and semiformal techniques allowing the specification, the verification, the implementation, the reverse-engineering, the validation, the risk assessment, and the optimization of access control policies. To automate and facilitate the practice of our methodology, we introduce our systemSVIRVROthat allows managing the extended life cycle of access control policies. We refer to an illustrative example to highlight the relevance of our contributions.
APA, Harvard, Vancouver, ISO, and other styles
3

Kulynych, Pavlo. "Digitalization of land relations and law in Ukraine: methodological and theoretical aspects." Yearly journal of scientific articles “Pravova derzhava”, no. 32 (2021): 257–67. http://dx.doi.org/10.33663/0869-2491-2021-32-257-267.

Full text
Abstract:
The article examines the methodological and theoretical issues of the formation of legal support for the digitalization of land relations in Ukraine. The author points out that the digitalization of land relations causes "profound" changes in their legal regulation and determines the clarification of the basic principles of land law of Ukraine. Thus, with the adoption of the Law "On National Infrastructure of Geospatial Data" laid the beginning of the formation in the land legislation of Ukraine the principle of availability of public data on land, which symbolizes the beginning of the era of digitalization of land relations. The essence of this principle is that all information provided by law and created in the process of maintaining the relevant state registers of land and related natural and other resources (geospatial data) as a multifaceted object of land and other legal relations are available to subjects of such legal relations in real time in the official form and to the extent that such access is provided by the computer equipment and software used by such subjects. As stated in the Concept of Development of the Digital Economy and Society of Ukraine for 2018–2020, digitization is the saturation of the physical world with electronic-digital devices, tools, systems and electronic communication between them, which actually allows integrated interaction of virtual and physical, ie creates cyberphysical space. In our opinion, this definition of digitization cannot be considered as correct. Firstly, saturation of the physical world with electronic-digital devices, means, systems and the establishment of electronic-communication exchange between them is neither the essence nor the purpose of digitalization, but is only a way to implement it. After all, the saturation of the physical world with electronic-digital devices can lead to any social result – both positive and negative. Secondly, the provision of integrated interaction of virtual and physical - the creation of cyberphysical space does not indicate how such cyberphysical space differs from ordinary physical space, in which social relations arise and are regulated by law. Therefore, the concept of digitalization needs to be clarified taking into account the specifics of the legal regulation of land relations. It is proved that the legal norms regulating the digitalization of public relations are an integral part of the administrative, civil, land and other branches of law. The conclusion is substantiated that the legal infrastructure of digitalization of land relations includes legal support for: 1) collection and formation of a system of information about the land using its remote sensing; 2) formation of promptly updated land databases; 3) the formation of a system of registers, portals and other service mechanisms that guarantee and provide access to such databases and the use of information about land in land legal relations. The author proves that legal support for digitalization of land relations is their legal regulation, the basic basis of which is information about the land (data-based legal regulation), which with the help of appropriate software includes the dynamics of qualitative and quantitative state of land in the mechanism of legal regulation of land relations, transforming this dynamic in such dynamics of land legal relations at which negative and positive changes in a condition of the earths automatically cause emergence, change, specification of the rights and duties of their subjects and form preconditions for application of the legal influence provided by the legislation on those subjects whose activity or inaction caused negative consequences in the condition of the lands. Finaly analysis of the modern system of land information required to ensure the digitization of land relations, gives grounds to identify such key components of its legal infrastructure as: 1) collection and formation of a system of such information through remote sensing of land (remote sensing); 2) formation of operatively updated land databases; 3) formation of a system of registers, portals and other service mechanisms, which guarantee and provide access to such databases and the use of information about land in land relations. Each of the selected elements of the system of information use in the process of digitization of land relations has a special legal mechanism.
APA, Harvard, Vancouver, ISO, and other styles
4

Watanabe, Yuhei, Hideki Yamamoto, and Hirotaka Yoshida. "Lightweight Crypto Stack for TPMS Using Lesamnta-LW." Security and Communication Networks 2020 (September 24, 2020): 1–12. http://dx.doi.org/10.1155/2020/5738215.

Full text
Abstract:
Modern vehicles which have internal sensor networks are one of the examples of a cyberphysical system (CPS). The tire pressure monitoring system (TPMS) is used to monitor the pressure of the tires and to inform the driver of them. This system is mandatory for vehicles in the US and EU. To ensure the security of TPMS, it is important to reduce the cost of the cryptographic mechanisms implemented in resource-constrained devices. To address this problem, previous works have proposed countermeasures employing lightweight block ciphers such as PRESENT, SPECK, or KATAN. However, it is not clear to us that any of these works have addressed the issues of software optimization that considers TPMS packet protection as well as session key updates for architectures consisting of the vehicle TPMS ECU and four low-cost TPMS sensors equipped with the tires. In this paper, we propose the application of ISO/IEC 29192-5 lightweight hash function Lesamnta-LW to address these issues. When we apply cryptographic mechanisms to a practical system, we consider the lightweight crypto stack which contains cryptographic mechanisms, specifications for the implementation, and performance evaluation. Our approach is to apply the known method of converting Lesamnta-LW to multiple independent pseudorandom functions (PRFs) in TPMS. In our case, we generate five PRFs this way and then use one PRF for MAC generation and four for key derivation. We use the internal AES-based block cipher of Lesamnta-LW for encryption. Although we follow the NIST SP 800-108 framework of converting PRFs to key derivation functions, we confirm the significant advantage of Lesamnta-LW-based PRFs over HMAC-SHA-256 by evaluating the performance on AVR 8-bit microcontrollers, on which we consider simulating TPMS sensors. We expect that our method to achieve multiple purposes with a single cryptographic primitive will help us to reduce the total implementation cost required for TPMS security.
APA, Harvard, Vancouver, ISO, and other styles
5

Sirjani, Marjan, Edward A. Lee, and Ehsan Khamespanah. "Verification of Cyberphysical Systems." Mathematics 8, no. 7 (July 2, 2020): 1068. http://dx.doi.org/10.3390/math8071068.

Full text
Abstract:
The value of verification of cyberphysical systems depends on the relationship between the state of the software and the state of the physical system. This relationship can be complex because of the real-time nature and different timelines of the physical plant, the sensors and actuators, and the software that is almost always concurrent and distributed. In this paper, we study different ways to construct a transition system model for the distributed and concurrent software components of a CPS. The purpose of the transition system model is to enable model checking, an established and widely used verification technique. We describe a logical-time-based transition system model, which is commonly used for verifying programs written in synchronous languages, and derive the conditions under which such a model faithfully reflects physical states. When these conditions are not met (a common situation), a finer-grained event-based transition system model may be required. We propose an approach for formal verification of cyberphysical systems using Lingua Franca, a language designed for programming cyberphysical systems, and Rebeca, an actor-based language designed for model checking distributed event-driven systems. We focus on the cyber part and model a faithful interface to the physical part. Our method relies on the assumption that the alignment of different timelines during the execution of the system is the responsibility of the underlying platforms. We make those assumptions explicit and clear.
APA, Harvard, Vancouver, ISO, and other styles
6

Braeken, An, Madhusanka Liyanage, Salil S. Kanhere, and Sudhir Dixit. "Blockchain and Cyberphysical Systems." Computer 53, no. 9 (September 2020): 31–35. http://dx.doi.org/10.1109/mc.2020.3005112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Horowitz, Barry M. "Cyberattack-Resilient Cyberphysical Systems." IEEE Security & Privacy 18, no. 1 (January 2020): 55–60. http://dx.doi.org/10.1109/msec.2019.2947123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sergeyeva, O. Yu. "Cyberphysical systems as technologysubsidiarian administration." Nanotechnologies in Construction: A Scientific Internet-Journal 10, no. 3 (June 30, 2018): 94–106. http://dx.doi.org/10.15828/2075-8545-2018-10-3-94-106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Platzer, André. "Verification of Cyberphysical Transportation Systems." IEEE Intelligent Systems 24, no. 4 (July 2009): 10–13. http://dx.doi.org/10.1109/mis.2009.81.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hurlburt, George, and Jeffrey Voas. "Beyond the Cloud: Cyberphysical Systems." IT Professional 15, no. 2 (March 2013): 2–4. http://dx.doi.org/10.1109/mitp.2013.24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Michael, James Bret, Doron Drusinsky, and Duminda Wijesekera. "Formal Verification of Cyberphysical Systems." Computer 54, no. 9 (September 2021): 15–24. http://dx.doi.org/10.1109/mc.2021.3055883.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Michael, James Bret, Doron Drusinsky, and Duminda Wijesekera. "Formal Methods in Cyberphysical Systems." Computer 54, no. 9 (September 2021): 25–29. http://dx.doi.org/10.1109/mc.2021.3089267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

LYSENKO, S., and V. KONDRATIUK. "METHOD FOR RESILIENCE FORECASTING OF THE CALAUD-ORIENTED CYBERPHYSICAL SYSTEMS." Computer Systems and Information Technologies 2, no. 2 (November 3, 2020): 24–27. http://dx.doi.org/10.31891/csit-2020-2-3.

Full text
Abstract:
Cyberphysical system is the integration of physical space (equipment, devices and people) with computing, communication and control systems (cyberspace). The National Institute of Standards and Terminology (NIST) has defined CFS as cyberphysical systems (CFS), which are designed systems built on the continuous integration of computational algorithms and physical components. Improving the CFS provides greater opportunities for performance, adaptability, scalability, stability, security and usability, far exceeding today's simple embedded systems. CFS technology will transform the interaction of people with the engineering system [1, 2]. Today, cyberphysical systems exist in various fields, such as automotive, aerospace, civil, railway, medical. Large productions seek to increase the availability of the asset, while reducing maintenance costs through cyberphysical systems. With the development of the industry and the use of systems in production, the proposed maintenance is used constantly to avoid failures. CFS maintenance is performed when certain indicators signal that the condition of the system has deteriorated. One way to solve this problem is to provide systems with resistance properties. Such systems are able to recover quickly and continue to function in changing conditions [3-9]. Therefore, the urgent task is to develop approaches that will predict the resilience of cyberphysical systems based on cloud computing. It is necessary to build methods and tools that will monitor the condition of the CFS and predict the timely replacement of their components that may fail. The application of the process of predicting the resilience of cyberphysical systems using cloud-oriented increases the effective reliability and availability of cyberphysical systems in its life cycle by identifying future failures and reducing unscheduled maintenance. The forecasting process involves the assessment of the useful life, and the implementation of a post-forecast decision on maintenance measures in accordance with the rules. The method of predicting the resilience of cloud-oriented cyberphysical systems allows to determine the state of the cyberphysical systems using cloud computing. The mechanism used to reduce the cost of maintenance and detailed planning of maintenance operations, the apparatus of genetic algorithms.
APA, Harvard, Vancouver, ISO, and other styles
14

Didenko, Nikolay, and Djamilia Skripnuk. "Socio-cyberphysical systems and intellectual space in the development of the Arctic zone of the Russian Federation." SHS Web of Conferences 44 (2018): 00028. http://dx.doi.org/10.1051/shsconf/20184400028.

Full text
Abstract:
The article states the new technical basis of production, which is socio-cyberphysical systems and intellectual space, and also analyzes the current state of studies on the problem regarding the development of socio-cyberphysical systems and intellectual space. The concepts definition is described – socio-cyberphysical systems and intellectual space. The paper proposes to take the target subspaces of the Arctic territory of the Russian Federation as a territory for application of socio-cyberphysical systems and intellectual space. There are seven types of target subspaces for the Arctic development as the targets for the ideology of socio-cyberphysical systems and intellectual space: base cities, mobile filed camps, territories for mineral resources extraction, recreational areas, fishing grounds, northern sea route, safe existence protection infrastructure. The article outlines the concept of building socio-cyberphysical systems and intellectual space. The global conceptual goal of the Russian Arctic development is stated as a transition to the functioning of the Arctic zone in the mode of sustainable development on the basis of socio-cyberphysical systems and intellectual space. The targeted integrated programs have been conceptually selected as a tool for arrangement and management of the socio-cyberphysical systems and intellectual space development in the target sub-spaces of the Arctic zone of the Russian Federation.
APA, Harvard, Vancouver, ISO, and other styles
15

Chen, Jiming, Vijay Gupta, Daniel E. Quevedo, and Pietro Tesi. "Privacy and security of cyberphysical systems." International Journal of Robust and Nonlinear Control 30, no. 11 (June 8, 2020): 4165–67. http://dx.doi.org/10.1002/rnc.5051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Gao, Sicun. "Nonlinearity, Automation, and Reliable Cyberphysical Systems." Computer 54, no. 7 (July 2021): 94–96. http://dx.doi.org/10.1109/mc.2021.3074776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Lueder, Arndt. "Flexibility in Production Systems by Exploiting Cyberphysical Systems." Computer 53, no. 1 (January 2020): 81–85. http://dx.doi.org/10.1109/mc.2019.2949107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Koutsoukos, Xenofon. "Systems Science of Secure and Resilient Cyberphysical Systems." Computer 53, no. 3 (March 2020): 57–61. http://dx.doi.org/10.1109/mc.2020.2966109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Aulin, Viktor, Andrey Grinkiv, and Artem Holovatyi. "Cyberphysical Approach to the Creation, Operation and Improvement of Transport and Production Systems." Central Ukrainian Scientific Bulletin. Technical Sciences, no. 3(34) (October 2020): 331–43. http://dx.doi.org/10.32515/2664-262x.2020.3(34).331-343.

Full text
Abstract:
The content of the cyberphysical approach to the creation, functioning and improvement of transport and production systems is analyzed. It was found out how, on the basis of the approach, cyberphysical transport and production systems are created as the integration of special technologies of the Internet of Things; embedded systems; ubiquitous and cloud computing. It was revealed that cyberphysical transport and production systems have a trinitarian concept and are defined by three entities: communication, computation and control, which unites information. It is determined that the main functions of cyberphysical transport and production systems are: information processing, intelligent communications, performance and process control. A component model of such a system has been built, which includes two groups of components - evolutionary and technological. The evolutionary group of components includes subsystems: digital; integrated; robotic, intelligent distributed. These components are a kind of basis for the presence of prerequisites for the creation of transport and production systems. It is noted that the technology group of components is the basis for concrete implementations of the Internet of Things, embedded systems and ubiquitous and cloud computing. A cyberphysical system of technical service is proposed as a specific implementation of cyberphysical transport and production systems. It was determined that the modes of the proposed functional cyber system are: high adaptability; an appropriate level of efficiency; intelligence of management; high level of reliability; the use of a new on-net online simulation type; using a new type of self-verifying models; internal online optimization, etc. It is shown that the presence of intelligent models in the cyberphysical model of technical service makes the system resistant to cyberattacks and increases the degree of safety when ensuring traffic in transport and the development of an occupational safety system during maintenance and repair operations.
APA, Harvard, Vancouver, ISO, and other styles
20

Ингеманссон, Александр, and Aleksandr Ingemansson. "Development of structure and functioning mechanisms of information-executive cyberphysical systems in machining production." Science intensive technologies in mechanical engineering 2, no. 11 (October 25, 2017): 40–45. http://dx.doi.org/10.12737/article_59f074a7a5e088.16975906.

Full text
Abstract:
It is defined that mechanical engineering efficiency increase at the expense of the introduction of science intensive information-executive cyberphysical systems should be realized in mechanical engineering first. The problems of the structure and mechanism of cyberphysical systems and directions for the efficiency increase of machining engineering procedures are considered.
APA, Harvard, Vancouver, ISO, and other styles
21

Fouda, Reham M. "Security vulnerabilities of cyberphysical unmanned aircraft systems." IEEE Aerospace and Electronic Systems Magazine 33, no. 9 (September 2018): 4–17. http://dx.doi.org/10.1109/maes.2018.170021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Marculescu, Radu, and Paul Bogdan. "Cyberphysical Systems: Workload Modeling and Design Optimization." IEEE Design & Test of Computers 28, no. 4 (July 2011): 78–87. http://dx.doi.org/10.1109/mdt.2010.142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Kramer, David. "White House offers encouragement for cyberphysical systems." Physics Today 67, no. 9 (September 2014): 20–22. http://dx.doi.org/10.1063/pt.3.2509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Yershova, О. L., V. І. Оdnovolyk, and L. І. Bazhan. "Cyberphysical Systems: The Fundament of Smart Economy." Scientific Bulletin of the National Academy of Statistics, Accounting and Audit, no. 1-2 (January 15, 2019): 69–79. http://dx.doi.org/10.31767/nasoa.1-2.2019.08.

Full text
Abstract:
The article deals with the key technological trends underlying cyberphysical systems. The questions of constructing the smart industry as a cyber-physics system are described in their context the, barriers and risks are described in the transition to smart technologies in the economy and ways of overcoming them. The combination of the Internet and material things forms new opportunities for managing the physical world, including devices, factories and infrastructure that determine the modern economic landscape. The next 10 years of Internet of Things can radically change the manufacturing industry, energy, agriculture, transport and other sectors of the real economy, accounting for almost two thirds of world GDP. Due to the processes of digitization, such transformations will have far-reaching consequences in terms of redistribution of resources and markets of the present world. Technically, the smart industry integrates advances in the field of physical devices with advances in the field of information and communication technologies, which results in the formation of cyber-physics systems. For Ukraine, the special significance of smart industry is also determined by the fact that its traditional industry is currently in crisis, and the new “smart” industry has not received enough attention from the state. In the developed plan, the government’s priority actions in the Ukrainian economy for the period up to 2020 are smart industry (Industry 4.0, Internet industry, advanced digital production, etc.), unlike US, China, EU countries and other industrial leaders in general not considered, especially as a national strategic investment. The possibilities of using cyber-physics systems in various branches of economy and socially important systems are described. Examples of smart manufacturing are presented in modern conditions of Ukraine.
APA, Harvard, Vancouver, ISO, and other styles
25

Lee, Gregory S., and Bhavani Thuraisingham. "Cyberphysical systems security applied to telesurgical robotics." Computer Standards & Interfaces 34, no. 1 (January 2012): 225–29. http://dx.doi.org/10.1016/j.csi.2011.09.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Wang, Jinbao, Ling Tian, Yan Huang, Donghua Yang, and Hong Gao. "Achieving the Optimal k-Anonymity for Content Privacy in Interactive Cyberphysical Systems." Security and Communication Networks 2018 (September 26, 2018): 1–15. http://dx.doi.org/10.1155/2018/7963163.

Full text
Abstract:
Modern applications and services leveraged by interactive cyberphysical systems (CPS) are providing significant convenience to our daily life in various aspects at present. Clients submit their requests including query contents to CPS servers to enjoy diverse services such as health care, automatic driving, and location-based services. However, privacy concerns arise at the same time. Content privacy is recognized and a lot of efforts have been made in the literature of privacy preserving in interactive cyberphysical systems such as location-based services. Nevertheless, neither the cloaking based solutions nor existing client based solutions have achieved effective content privacy by optimizing proper content privacy metrics. In this paper we formulate the problem of achieving the optimal content privacy in interactive cyberphysical systems using k-anonymity solutions based on two content privacy metrics, which are defined using the concepts of entropy and differential privacy. Then we propose an algorithm, Multilayer Alignment (MLA), to establish k-anonymity mechanisms for preserving content privacy in interactive cyberphysical systems. Our proposed MLA is theoretically proved to achieve the optimal content privacy in terms of both the entropy based and the differential privacy mannered content privacy metrics. Evaluation based on real-life datasets is conducted, and the evaluation results validate the effectiveness of our proposed algorithm.
APA, Harvard, Vancouver, ISO, and other styles
27

Lucia, Sergio, Markus Kögel, Pablo Zometa, Daniel E. Quevedo, and Rolf Findeisen. "Predictive control, embedded cyberphysical systems and systems of systems – A perspective." Annual Reviews in Control 41 (2016): 193–207. http://dx.doi.org/10.1016/j.arcontrol.2016.04.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Tanik, Urcun John. "Cyberphysical Design Automation Framework for Knowledge-based Engineering." Journal of Innovation Management 1, no. 1 (September 3, 2013): 158–78. http://dx.doi.org/10.24840/2183-0606_001.001_0011.

Full text
Abstract:
Cyberphysical system design automation utilizing knowledge based engineering techniques with globally networked knowledge bases can tremendously improve the design process for emerging systems. Our goal is to develop a comprehensive architectural framework to improve the design process for cyberphysical systems (CPS) and implement a case study with Axiomatic Design Solutions Inc. to develop next generation toolsets utilizing knowledge-based engineering (KBE) systems adapted to multiple domains in the field of CPS design automation. The Cyberphysical System Design Automation Framework (CPSDAF) will be based on advances in CPS design theory based on current research and knowledge collected from global sources automatically via Semantic Web Services. A case study utilizing STEM students is discussed.
APA, Harvard, Vancouver, ISO, and other styles
29

Zalewski, Janusz, and Fernando Gonzalez. "Evolution in the Education of Software Engineers: Online Course on Cyberphysical Systems with Remote Access to Robotic Devices." International Journal of Online Engineering (iJOE) 13, no. 08 (August 4, 2017): 133. http://dx.doi.org/10.3991/ijoe.v13i08.7377.

Full text
Abstract:
The objective of this work is to address, from the educational perspective, the trends in the software engineerring discipline, which rely on a significant increase in the use of remotely accessible and remotely controlled embedded devices. The paper presents an approach and experiences with introducing robotic devices accessible online to a course on Cyberphysical Systems in an undergraduate Software Engineering program. A closer look at both technologies, online labs and cyberphysical systems education, reveals that they are not in sync. Remote labs have embraced a wide variety of science and engineering disciplines, but they are not popular in software engineering. On the other hand, software engineering education, being crucial to the development of cyberphysical systems has not focused on such systems by any measure. This project and paper aim at addressing this gap.
APA, Harvard, Vancouver, ISO, and other styles
30

Zegzhda, D. P., Yu S. Vasil’ev, and M. A. Poltavtseva. "Approaches to Modeling the Security of Cyberphysical Systems." Automatic Control and Computer Sciences 52, no. 8 (December 2018): 1000–1009. http://dx.doi.org/10.3103/s014641161808031x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Bubela, Tetiana, and Tetiana Fedyshyn. "ANALYSIS OF CYBERPHYSICAL SYSTEMS POTENTIAL FOR AGRICULTURAL APPLICATION." Measuring Equipment and Metrology 80, no. 4 (2019): 23–30. http://dx.doi.org/10.23939/istcmtm2019.04.023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Khan, Muhammad Taimoor, and Howard Shrobe. "Security of Cyberphysical Systems: Chaining Induction and Deduction." Computer 52, no. 7 (July 2019): 72–75. http://dx.doi.org/10.1109/mc.2019.2913138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Ribeiro, Luis, and Martin Hochwallner. "On the Design Complexity of Cyberphysical Production Systems." Complexity 2018 (June 10, 2018): 1–13. http://dx.doi.org/10.1155/2018/4632195.

Full text
Abstract:
Establishing mass-customization practices, in a sustainable way, at a time of increased market uncertainty, is a pressing challenge for modern producing companies and one that traditional automation solutions cannot cope with. Industry 4.0 seeks to mitigate current practice’s limitations. It promotes a vision of a fully interconnected ecosystem of systems, machines, products, and many different stakeholders. In this environment, dynamically interconnected autonomous systems support humans in multifaceted decision-making. Industrial Internet of Things and cyberphysical systems (CPSs) are just two of the emerging concepts that embody the design and behavioral principles of these highly complex technical systems. The research within multiagent systems in manufacturing, by embodying most of the defining principles of industrial CPSs (ICPSs), is often regarded as a precursor for many of today’s emerging ICPS architectures. However, the domain has been fuzzy in specifying clear-cut design objectives and rules. Designs have been proposed with different positioning, creating confusion in concepts and supporting technologies. This paper contributes by providing clear definitions and interpretations of the main functional traits spread across the literature. A characterization of the defining functional requirements of ICPSs follows, in the form of a scale, rating systems according to the degree of implementation of the different functions.
APA, Harvard, Vancouver, ISO, and other styles
34

Nguyen, Ngoc-Tu, Ming C. Leu, and Xiaoqing Frank Liu. "RTEthernet: Real-time communication for manufacturing cyberphysical systems." Transactions on Emerging Telecommunications Technologies 29, no. 7 (May 30, 2018): e3433. http://dx.doi.org/10.1002/ett.3433.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Yang, Laurence T., Wei Wang, Gregorio Martinez Perez, and Willy Susilo. "Security, Privacy, and Trust for Cyberphysical-Social Systems." Security and Communication Networks 2019 (February 3, 2019): 1–2. http://dx.doi.org/10.1155/2019/2964673.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Chen, Guangyao, and Zhihao Jiang. "Environment Modeling During Model Checking of Cyberphysical Systems." Computer 54, no. 9 (September 2021): 49–58. http://dx.doi.org/10.1109/mc.2021.3087631.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Fleming, Cody H., Carl Elks, Georgios Bakirtzis, Stephen Adams, Bryan Carter, Peter Beling, and Barry Horowitz. "Cyberphysical Security Through Resiliency: A Systems-Centric Approach." Computer 54, no. 6 (June 2021): 36–45. http://dx.doi.org/10.1109/mc.2020.3039491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Mikryukov, A., V. M. Trembach, and A. V. Danilov. "Modules of Organizational and Technical Systems for Solving Problems of Adaptation in a Rapidly Changing Environment." Open Education 24, no. 5 (October 28, 2020): 82–90. http://dx.doi.org/10.21686/1818-4243-2020-5-82-90.

Full text
Abstract:
Purpose of research. The aim of the research is to form modules of organizational and technical systems (OTS) using a cognitive approach to solve problems of adaptation of cyberphysical systems. Currently, there is a rapid development of elements of the Internet of things. New tasks related to self-organization and adaptation in a rapidly changing external environment are brought to the fore. These tasks occur when new elements appear in the telecommunications computer network, they fail, change the mode, new tasks occur, etc. To work out these tasks, the possibilities of approaches to support and decision-making such as situational, cognitive, and semiotic are considered. The authors consider the cognitive approach in more detail. Within the framework of the cognitive paradigm, the article describes the use of the cognitive approach for solving problems of adaptation of cyberphysical systems. To solve this problem on the basis of an agent-based approach, the structure of a cyberphysical system with the possibility of adaptation is presented and the functions of its agents are described. The main stages of solving problems of adaptation of cyberphysical systems are presented. An adaptation algorithm using the planning mechanism is presented. The demo example shows a knowledge base for solving the problem of adapting cyberphysical systems using a cognitive planning mechanism.Materials and methods of research. New approaches and methods are required to address adaptation issues in planning. The cognitive approach is one of the developing directions in solving many problems of the Internet of things. One of these tasks is the ability to adapt OTS modules in a rapidly changing external environment based on the planning mechanism. To solve the planning problem, we use the algorithm described by Aristotle more than 2,350 years ago and implemented in the GPS program. This algorithm can be considered the first description of the cognitive mechanism that a person uses. The knowledge base uses an integrated approach to knowledge representation. When developing OTS modules, an agent-based approach was used to solve the problem of adaptation.Results. The existing and developing approaches and methods for decision support and decision-making are considered for decisionmaking in newly emerging situations in OTS modules. The main provisions of such significant approaches as situational, cognitive and semiotic are presented. A cognitive approach to the adaptation of intelligent systems is proposed. The solution of the problem of adaptation of cyberphysical systems is considered within the framework of the cognitive paradigm. The structure of a cyberphysical system capable of solving adaptation problems is shown. The functions of OTS modules based on agent-oriented technology are described. A description of the adaptation algorithm using the cognitive planning mechanism is given. The main stages of solving problems of adaptation of cyberphysical systems are presented. A demo example of solving the problem of adaptation by a cyberphysical system-a cooking robot – is shown.Conclusion. Using the modular architecture of an intelligent system allows you to solve many problems. One of these tasks is to configure elements of the Internet of things when they deviate from their main function. The planning mechanisms proposed for parametric adaptation can be repeatedly applied in OTS modules as separate agents. This approach is relevant for elements of the Internet of things. In the case of expanding the functionality of the OTS modules of Internet of things, it is advisable to apply machine learning with fixing the results in the knowledge base of planning agents.
APA, Harvard, Vancouver, ISO, and other styles
39

Rauch, Erwin, Sven Seidenstricker, Patrick Dallasega, and Robert Hämmerl. "Collaborative Cloud Manufacturing: Design of Business Model Innovations Enabled by Cyberphysical Systems in Distributed Manufacturing Systems." Journal of Engineering 2016 (2016): 1–12. http://dx.doi.org/10.1155/2016/1308639.

Full text
Abstract:
Collaborative cloud manufacturing, as a concept of distributed manufacturing, allows different opportunities for changing the logic of generating and capturing value. Cyberphysical systems and the technologies behind them are the enablers for new business models which have the potential to be disruptive. This paper introduces the topics of distributed manufacturing as well as cyberphysical systems. Furthermore, the main business model clusters of distributed manufacturing systems are described, including collaborative cloud manufacturing. The paper aims to provide support for developing business model innovations based on collaborative cloud manufacturing. Therefore, three business model architecture types of a differentiated business logic are discussed, taking into consideration the parameters which have an influence and the design of the business model and its architecture. As a result, new business models can be developed systematically and new ideas can be generated to boost the concept of collaborative cloud manufacturing within all sustainable business models.
APA, Harvard, Vancouver, ISO, and other styles
40

Kabaldin, Yu G., and D. A. Shatagin. "Artificial Intelligence and Cyberphysical Machining Systems in Digital Production." Russian Engineering Research 40, no. 4 (April 2020): 292–96. http://dx.doi.org/10.3103/s1068798x20040115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Zelensky, A. A. "HIGH-SPEED INDUSTRIAL REAL-TIME NETWORK OF CYBERPHYSICAL SYSTEMS." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 185 (November 2019): 46–52. http://dx.doi.org/10.14489/vkit.2019.11.pp.046-052.

Full text
Abstract:
The construction of a high-speed industrial real-time network based on FPGA (Field-Programmable Gate Array) for the control of machines and industrial robots is considered. A brief comparative analysis of the performance of the implemented Ethernet-based Protocol with industrial protocols of other leading manufacturers is made. The aim of the research and development of its own industrial automation Protocol was to reduce the dependence on third-party real-time protocols based on Ethernet for controlling robots, machines and technological equipment. In the course of the study, the requirements for the network of the motion control system of industrial equipment were analyzed. In order to synchronize different network nodes and provide short exchange cycle time, an industrial managed switch was developed, as well as a specialized hardware controller for processing Ethernet packets for end devices, presented as a IP-core. A key feature of the developed industrial network is that the data transmission in it is completely determined, and the exchange cycle time for each of the network devices can be configured individually. High efficiency and performance of implemented network devices became possible due to the use of hardware solutions based on FPGAs. All solutions described in the article as part of a modular digital system have been successfully tested in the control of machines and industrial robot. The results of field tests show that the use of FPGAs and soft processors with specialized peripheral IP-blocks can significantly reduce the tact of managing industrial equipment through the use of hardware computing structures, which indicates the promise of the proposed approach for solving industrial automation tasks.
APA, Harvard, Vancouver, ISO, and other styles
42

Khaitan, Siddhartha Kumar, and James D. McCalley. "Design Techniques and Applications of Cyberphysical Systems: A Survey." IEEE Systems Journal 9, no. 2 (June 2015): 350–65. http://dx.doi.org/10.1109/jsyst.2014.2322503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Javed, Yahya, Muhamad Felemban, Tawfeeq Shawly, Jason Kobes, and Arif Ghafoor. "A Partition-Driven Integrated Security Architecture for Cyberphysical Systems." Computer 53, no. 3 (March 2020): 47–56. http://dx.doi.org/10.1109/mc.2019.2914906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Wolf, Marilyn. "Distributed Data Analysis and Reliable Operation of Cyberphysical Systems." Computer 53, no. 3 (March 2020): 14–15. http://dx.doi.org/10.1109/mc.2020.2966108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Cheng, Bo, Jingyi Zhang, Gerhard P. Hancke, Stamatis Karnouskos, and Armando Walter Colombo. "Industrial Cyberphysical Systems: Realizing Cloud-Based Big Data Infrastructures." IEEE Industrial Electronics Magazine 12, no. 1 (March 2018): 25–35. http://dx.doi.org/10.1109/mie.2017.2788850.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Afanasov, Mikhail, Aleksandr Iavorskii, and Luca Mottola. "Programming support for time-sensitive adaptation in cyberphysical systems." ACM SIGBED Review 14, no. 4 (January 4, 2018): 27–32. http://dx.doi.org/10.1145/3177803.3177808.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Colombo, Alessandro, and Domitilla Del Vecchio. "Enforcing safety of cyberphysical systems using flatness and abstraction." ACM SIGBED Review 8, no. 2 (June 2011): 11–14. http://dx.doi.org/10.1145/2000367.2000369.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Weiss, Alexander, Smitha Gautham, Athira Varma Jayakumar, Carl R. Elks, D. Richard Kuhn, Raghu N. Kacker, and Thomas B. Preusser. "Understanding and Fixing Complex Faults in Embedded Cyberphysical Systems." Computer 54, no. 1 (January 2021): 49–60. http://dx.doi.org/10.1109/mc.2020.3029975.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Fuketa, Hiroshi, and Kunio Uchiyama. "Edge Artificial Intelligence Chips for the Cyberphysical Systems Era." Computer 54, no. 1 (January 2021): 84–88. http://dx.doi.org/10.1109/mc.2020.3034951.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Deng, Ziquan, and Zhaodan Kong. "Interpretable Fault Diagnosis for Cyberphysical Systems: A Learning Perspective." Computer 54, no. 9 (September 2021): 30–38. http://dx.doi.org/10.1109/mc.2021.3078694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography