Letteratura scientifica selezionata sul tema "Cyber-physic systems"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Cyber-physic systems".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Articoli di riviste sul tema "Cyber-physic systems":

1

Moro, Thiago Carreta, Fabio Roberto Chavarette, Roberto Outa, Igor Feliciano Merizio e Estevão Fuzaro Almeida. "Detection, Location and Quantification of Structural Faults in a Two-Story Building Using the Artificial Immunological System". Journal of Advances in Applied & Computational Mathematics 9 (24 maggio 2022): 49–61. http://dx.doi.org/10.15377/2409-5761.2022.09.4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Large buildings and skyscrapers are vulnerable to environmental, temporal, and anthropological stresses, generating wear and tear that can lead to this social and economic impediment's collapse. The technological improvements of the fourth industrial revolution have resulted in changes in the connection between physical space and man, known as the cyber physic model, which necessitates monitoring systems to protect the structural branch and so correct this structural vulnerability. Thus, the structural health monitoring system is the exact measure of the evolution required by the cyber physic model in construction and the protection of the monumental buildings, ensuring not only their economic development but also the safety of society. Therefore, this research work presents the innovative proposal of the cyber-physical structural health monitoring system aimed at buildings and skyscrapers, based on and differentiated by intelligent computing techniques, using the negative selection algorithm to perform the analysis and monitoring of structural integrity, overcoming the existing traditional work. The cyber-physical structural health monitoring system will be applied to experimental data obtained from the shear building model that represents these imposing skyscrapers. An artificial immune system will be developed and used in the decision-making process based on the acquisition and processing of the obtained signals to perform the identification, localization, and quantification of possible structural damage. Observing the results, this work proved to be efficient, robust, and economically feasible, having high performance and overcoming the shortcomings of traditional techniques. It represents the perfect measure of cyber physics in the monitoring of large buildings and skyscrapers.
2

Kachanova, T. L., e B. F. Fomin. "Ontologies and Physical Analogues of Two-Particle Intrasystem Interactions Based on Doublets Models". LETI Transactions on Electrical Engineering & Computer Science 16, n. 2 (2023): 54–75. http://dx.doi.org/10.32603/2071-8985-2023-16-2-54-75.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Open systems (natural, social, anthropogenic, cyber-physic, and technical ones) are initially given in actual states by their empirical descriptions, obtained from huge amount of retrospective multimodal heterogeneous empirical data. At the level of fact, the empirical descriptions contain hundreds and thousands of indicators and represent such systems at their natural scales and real complexity. Furthermore, knowledge about systems’ ontology is represented at the level of sense, knowledge whose fullness and completeness are investigated and proven. At the level of ontological knowledge, the system’s reconstructions are obtained «in parts» (in eigen qualities). And, to build reconstruction of system’s states as a whole, such system reconstructions «in parts» need to be complemented by models of two-particle, three-particle, and multi-particle interactions between eigen system qualities. Ontologies of all kinds of doublets (models of two-particle interactions named SIM, SWI, MIX, SEP, ABS, DIV) are obtained and investigated in this paper. Each such kind of model possesses discovered types and forms. And, for them, such states are revealed whose attributes of orientation, tension, and “charge” level are agreed upon values. These doublets states attributed in such a way possess analogues represented by states of physical science objects exhibiting effects of deformation field as well as electric and magnetic fields that cause «multispecies» variability of open systems.
3

Kachanova, T. L., e B. F. Fomin. "Ontologies of Actual States and Ontologies of Intrasystem Two-Particle Interactions in Open Systems". LETI Transactions on Electrical Engineering & Computer Science 15, n. 10 (2022): 67–78. http://dx.doi.org/10.32603/2071-8985-2022-15-10-67-78.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Open systems (natural, social, anthropogenic, cyber-physic, and technical ones) are initially given in actual states by their empirical descriptions, obtained from huge amount of retrospective multimodal heterogeneous empirical data. At the level of fact, the empirical descriptions contain hundreds and thousands of indicators and represent such systems at their natural scales and real complexity. Furthermore, at the level of sense, open systems are represented in eigen qualities, in ideals of states of these eigen qualities, and in reconstructions of actual states – all of them are reliable and scientifically understood, are «internalized» by fact and rationally explain it, and collectively constitute knowledge about systems’ ontology, knowledge whose fullness and completeness are investigated and proven. At the level of ontological knowledge, the system’s reconstructions are obtained «in parts» (in eigen qualities). And, to build reconstruction of system’s states as a whole, such system reconstructions «in parts» need to be complemented by models of two-particle, three-particle, and multi-particle interactions between eigen system qualities. Ontologies of all kinds of doublets (models of two-particle interactions named SIM, SWI, MIX, SEP, ABS, DIV) are obtained and investigated in this paper. Each such kind of model possesses discovered types and forms. And, for them, such states are revealed whose attributes of orientation, deformation, and charge level are agreed upon values. These doublets states of the level of ontological knowledge have at the level of fact their analogues represented by states of physical science objects exhibiting effects of deformation field as well as electric and magnetic fields that cause «multispecies» variability of open systems.
4

Wang, Wei, Junyang Chen, Yushu Zhang, Zhiguo Gong, Neeraj Kumar e Wei Wei. "A Multi-graph Convolutional Network Framework for Tourist Flow Prediction". ACM Transactions on Internet Technology 21, n. 4 (22 luglio 2021): 1–13. http://dx.doi.org/10.1145/3424220.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
With the advancement of Cyber Physic Systems and Social Internet of Things, the tourism industry is facing challenges and opportunities. We can now able to collect, store, and analyze large amounts of travel data. With the help of data science and artificial intelligence, smart tourism enables tourists with great autonomy and convenience for an intelligent trip. It is of great significance to make full use of these massive data to provide better services for smart tourism. However, due to the skewed and imbalanced visiting for point of interest located at different places, it is of great significance to predict the tourist flow of each place, which can help the service providers for designing a better schedule visiting strategy in advance. Against this background, this article proposes a multi-graph convolutional network framework, named AMOUNT, for tourist flow prediction. To capture the diverse relationships among POIs, AMOUNT first constructs three subgraphs, including the geographical graph, interaction graph, and the co-relation graph. Then, a multi-graph convolution network is utilized to predict the future tourist flow. Experimental results on two real-world datasets indicate that the proposed AMOUNT model outperforms all other baseline tourist flow prediction approaches.
5

Jin, Tae-Hwan, Ki-Yeol Shin, Mo Chung e Geon-Pyo Lim. "Development and Performance Verification of Frequency Control Algorithm and Hardware Controller Using Real-Time Cyber Physical System Simulator". Energies 15, n. 15 (6 agosto 2022): 5722. http://dx.doi.org/10.3390/en15155722.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Frequency stability is a critical factor in maintaining the quality of the power grid system. A battery energy storage system (BESS) with quick response and flexibility has recently been used as a primary frequency control (PFC) resource, and many studies on its control algorithms have been conducted. The cyber physic system (CPS) simulator, which can perform virtual physical modelling and verification of many hardware systems connected to the network, is an optimal solution for the performance verification of control algorithms and hardware systems. This study introduces a large-scale real-time dynamic simulator that includes the national power system. This simulator comprises a power grid model, an energy management system (EMS) model, a BESS system model, and a communication model. It performs the control algorithm performance evaluation and the hardware controller’s response performance evaluation. The performance of the control algorithm was evaluated by tracking the power system’s characteristic trajectory in the transient state based on the physical response delay time between the output instruction of the frequency regulation controller (FRC), a hardware controller, and the output response of the BESS. Based on this, we examined the response performance evaluation results by linking them to the optimally designed actual FRC. As a result, we present an analysis of the BESS’s characteristic trajectories in the transient state, such as frequency, power system inertia, and power grid constant, and provide FRC response performance evaluation results at a level of 163 ms, by connecting the BESS installed at the actual site with the CPS simulator.
6

Kovarikova, Zuzana, Frantisek Duchon, Marek Trebula, Frantisek Nagy, Martin Dekan, Dusan Labat e Andrej Babinec. "Prototyping an intelligent robotic welding workplace by a cyber-physic tool". International Journal of Advanced Manufacturing Technology, 9 febbraio 2023. http://dx.doi.org/10.1007/s00170-023-10986-1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Tesi sul tema "Cyber-physic systems":

1

Trabelsi, Oualid. "Méthodes pour la modélisation des injections de fautes électromagnétiques". Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAT021.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Les attaques par injection de faute représentent une menace considérable pour les systèmes cyber-physiques. Dès lors, la protection contre ces attaques est une nécessité pour assurer un haut niveau de sécurité dans les applications sensibles comme l'internet des objets, les téléphones mobiles ou encore les voitures connectées. Élaborer des protections demande au préalable de bien comprendre les mécanismes d'attaque afin de proposer des contre-mesures efficaces. En matière de méthodes d'injection de faute, celle par interférence électromagnétique s'est vu être une source de perturbation efficace, en étant moins intrusive et avec une configuration à faible coût. Outre l'ajustement des paramètres d'injection, l’efficacité de cette méthode réside dans le choix de la sonde qui génère le rayonnement électromagnétique. L'état de l'art propose déjà des travaux par rapport à la conception et la caractérisation de ce type d'injecteur. Cependant, les résultats correspondant rapportent une différence entre ceux issus de la simulation et ceux à partir des tests expérimentaux.La première partie de la thèse aborde la question de l'efficacité des sondes magnétiques, en mettant l'accent sur l'implication de leurs propriétés. Afin de comparer les sondes, nous proposons d'observer l'impact des impulsions électromagnétiques au niveau logique, sur des cibles particulières de type FPGA.La caractérisation est aussi établie suivant la variation des paramètres d'injection comme l'amplitude et la polarité de l'impulsion, le nombre d'impulsions ou encore l'instant de l'injection. Ces résultats ont permis de converger sur les paramètres optimaux qui maximisent l'effet des sondes magnétiques. La caractérisation est par la suite étendue au niveau architecture sur des cibles de type microcontrôleur. L'objet de la seconde contribution consiste à présenter une démarche d'analyse, basée sur trois méthodes génériques, qui servent à déterminer les vulnérabilités des microcontrôleurs sur les instructions ou les données. Ces méthodes portent sur l'identification des éléments vulnérables au niveau architecture, l'analyse des modèles de faute au niveau bit, et enfin la définition de l'état des fautes, à savoir transitoire ou semi-persistent.Le travail de dresser les modèles de faute, ainsi que le nombre d'instructions ou données impactées, est un jalon important pour la conception de contre-mesures plus robustes. Concernant ce dernier point, des contre-mesures au niveau instruction ont été proposées contre les modèles de faute logiciels. Actuellement, le mécanisme le plus répandu se résume à appliquer une redondance dans l'exécution du programme à protéger. Toutefois, ce type de contre-mesure est formulé sur l'hypothèse qu'une injection de faute équivaut un seul saut d'instruction. Vis-à-vis de nos observations, ces contre-mesures basées sur de la duplication au niveau instructions présentent des vulnérabilités, que nous identifions, puis corrigeons
Fault injection attacks represent a considerable threat to cyber-physical systems.Therefore, protection against these attacks is required to ensure a high level of security in sensitive applications such as the Internet of Things, smart devices or connected cars.Developing protection requires a good understanding of the attack mechanisms in order to propose effective countermeasures.In terms of fault injection methods, electromagnetic interference has proven to be an effective source of disruption, being less intrusive and with a low cost setup.Besides the adjustment of the injection parameters, the effectiveness of this attack mean lies in the choice of the probe that generates the electromagnetic radiation.The state of the art already proposes many works related to the design and characterization of this type of injector.However, the corresponding results point out to some difference between those from simulation and those from experimental tests.The first part of the thesis addresses the question of the efficiency of magnetic probes, with a focus on their properties.In order to compare the probes, we propose to observe the impact of electromagnetic pulses at the logic level, on particular targets such as FPGA.The characterization is also established according to the variation of the injection parameters such as the amplitude and the polarity of the pulse, the number of pulses or the injection time.These results allowed to converge on the optimal parameters that maximize the effect of the magnetic probes.The characterization is then extended to the architecture level on microcontroller targets.The purpose of the second contribution is to present an analysis approach, based on three generic methods, which are used to determine the vulnerabilities of microcontrollers with respect to instructions or data.These methods concern the identification of vulnerable elements at the architecture level, the analysis of fault models at the bit level, and finally the definition of the temporal fault status, i.e. transient or semi-persistent.Establishing the fault patterns, as well as the number of the impacted instructions or data, is an important milestone for the design of more robust countermeasures.Regarding the latter, instruction-level countermeasures have been proposed against software fault models.Currently, the most common mechanism is to apply a redundant execution of the program to be protected.However, this type of countermeasure is based on the assumption that a fault injection imply a single instruction jump.With respect to our observations, these countermeasures based on instruction-level duplication present vulnerabilities, which we identify and then correct
2

Costeira, Ivo Micael Frazão. "Applying machine learning techniques on the detection of cyber-physic attacks". Master's thesis, 2018. http://hdl.handle.net/10316/86748.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Dissertação de Mestrado Integrado em Engenharia Electrotécnica e de Computadores apresentada à Faculdade de Ciências e Tecnologia
A sociedade atual tem tido uma confiança crescente em Sistemas de Controlo Industrial (e de Automação), especialmente no controlo de Infraestruturas Críticas, tais como a geração, transmissão e distribuição de energia elétrica, ou tratamento de águas, onde o trabalho ininterrupto da infraestrutura é essencial para a segurança e manutenção de uma sociedade moderna. A disrupção das operações normais de tais infraestruturas, devido a uma falha ou ataque, tem o potencial de ter sérias consequências, pelo que estes sistemas têm um significado estratégico que não pode ser ignorado. Estas infraestruturas foram pensadas assumindo que existia uma separação do mundo exterior, contudo, o crescente uso de equipamentos comerciais, e de tecnologias e protocolos abertos tem-nas exposto a ameaças que antigamente não eram uma preocupação.Vários estudos têm proposto várias estratégias para proteger estas infraestruturas, focando-se principalmente em algoritmos novos ou adaptação de algoritmos já conhecidos ao domínio destas infraestruturas. Contudo, as restrições das mesmas têm impedido a existência de conjuntos de dados comuns, dos quais seria possível realizar uma comparação do seu desempenho. Este trabalho procura apresentar alguma introspeção sobre como os algoritmos mais usados na literatura se comportam quando algumas das características dos conjuntos de dados variam, nomeadamente o tamanho da captura de tráfego e o tamanho relativo dos ataques nesses dados. São também estudados os efeitos da afinação de hiperparâmetros desses algoritmos. Finalmente, é também apresentada uma estrutura genérica para a deteção de ataques Man-in-the-Middle, baseada nos tempos de resposta dos pacotes TCP dentro da rede.
Today’s society has had an increasing reliance on Industrial (Automation and) Control Systems, especially in the control of Critical Infrastructures, such as generation, transmission and distribution of electrical energy, or water treatment, and where the uninterrupted work of the infrastructure is essential for the safety and livelihood of a modern society. A disruption of the normal operation of such infrastructures, due to a fault or an attack, has the potential to create serious consequences, whereby these systems have strategic significance, which cannot be ignored. These infrastructures were designed with the assumption that an airgap from the outside world was in place, however, their increasing reliance on Commercial, Off-The-Shelf equipment, open technologies and open protocols has exposed them to threats that previously were not a concern.Several studies have proposed many strategies to secure these infrastructures, which mainly rely on novel algorithms or domain-adaptations of known algorithms. However, the constraints of these infrastructures prevent the existence of common datasets from which a comparison of their performances can be made. This work aims at presenting some insight on how many of the most used algorithms in the literature behave when some of the characteristics of datasets are varied, namely the size of the traffic captures and the relative size of the attacks within those captures. An insight on the effects of hyperparameter tuning of the algorithms is also studied. Finally, a generalized framework for the detection of Man-in-the-Middle attacks is presented based on the Time-To-Response of the TCP packets within the network.

Capitoli di libri sul tema "Cyber-physic systems":

1

Domingues, Diana Maria G., e Mateus Rodrigues Miranda. "Affective Presence in Enactive Immersive Space". In Advances in Multimedia and Interactive Technologies, 23–51. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-5696-1.ch002.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The reengineering of life through the sense of presence in virtual and augmented reality raised in art and technoscience is the focus of the aesthetical, scientific, and technological potential for the changes to the ecological, social, environmental, and biological condition. Virtual reality immersion uses proprioceptive trackers for navigation and stereoscopy in kinesthesia generating compelling experience inside data landscapes. Nowadays, disruptive technologies melting biological, synthetic worlds (data-cyber) and physic spaces (biocybrid systems) allow synaesthetic embodied experience to the Spinozian body. In enactive affective systems, the sentient and pervasive technologies by the invasion of mobile technologies, physiological sensors, computer vision, locative, and geodesic dialogues of organisms/data and environment are in reciprocal and mutual exchanges. The ontology of life conciliates paradoxes and conflicts of emergent realities and self-organizing dialogues between artificial and natural modifying the concept of reality, which is always a philosophical concept.

Vai alla bibliografia