Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Tactile Cyber-Physical Systems.

Artykuły w czasopismach na temat „Tactile Cyber-Physical Systems”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 19 najlepszych artykułów w czasopismach naukowych na temat „Tactile Cyber-Physical Systems”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Di Marco, Piergiuseppe, and Pangun Park. "Architectures and Protocols for Wireless Sensor and Actuator Networks." Journal of Sensor and Actuator Networks 10, no. 3 (2021): 52. http://dx.doi.org/10.3390/jsan10030052.

Pełny tekst źródła
Streszczenie:
Recent advances in wireless networking, sensing, computing, and control are revolutionizing how physical systems interact with information and physical processes such as Cyber-Physical Systems (CPS), Internet of Things (IoT), and Tactile Internet [...]
Style APA, Harvard, Vancouver, ISO itp.
2

Polachan, Kurian, Joydeep Pal, Chandramani Singh, T. V. Prabhakar, and Fernando A. Kuipers. "TCPSbed: A Modular Testbed for Tactile Internet-Based Cyber-Physical Systems." IEEE/ACM Transactions on Networking 30, no. 2 (2022): 796–811. http://dx.doi.org/10.1109/tnet.2021.3124767.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Puliafito, Antonio, Giuseppe Tricomi, Anastasios Zafeiropoulos, and Symeon Papavassiliou. "Smart Cities of the Future as Cyber Physical Systems: Challenges and Enabling Technologies." Sensors 21, no. 10 (2021): 3349. http://dx.doi.org/10.3390/s21103349.

Pełny tekst źródła
Streszczenie:
A smart city represents an improvement of today’s cities, both functionally and structurally, that strategically utilizes several smart factors, capitalizing on Information and Communications Technology (ICT) to increase the city’s sustainable growth and strengthen the city’s functions, while ensuring the citizens’ enhanced quality of life and health. Cities can be viewed as a microcosm of interconnected “objects” with which citizens interact daily, which represents an extremely interesting example of a cyber physical system (CPS), where the continuous monitoring of a city’s status occurs thro
Style APA, Harvard, Vancouver, ISO itp.
4

Constantin, Anghel, and Gheorghe Ion Gheorghe. "New Concepts of Modeling and Complex Simulation of Electronic Circuits for Interfacing Tactile Sensors in Cyber-mechatronic Systems." Scientific Bulletin of Valahia University - Materials and Mechanics 14, no. 11 (2016): 39–44. http://dx.doi.org/10.1515/bsmm-2016-0007.

Pełny tekst źródła
Streszczenie:
Abstract The paper presents an original concept for interfacing tactile force sensors in modern cyber-mechatronic systems. The authors show the results and conclusions of a PSPICE simulation of an original patented circuit. In the simulations, in models used were introduced some circuit components corresponding to the physical implementation for a practical mechatronic system which has already been used for the analysis of human walking. After these simulations were revealed important aspects of dynamic behavior and was proposed an optimal variant of the interface circuit as a non-typically in
Style APA, Harvard, Vancouver, ISO itp.
5

Mourtzis, Dimitris, John Angelopoulos, and Nikos Panopoulos. "Smart Manufacturing and Tactile Internet Based on 5G in Industry 4.0: Challenges, Applications and New Trends." Electronics 10, no. 24 (2021): 3175. http://dx.doi.org/10.3390/electronics10243175.

Pełny tekst źródła
Streszczenie:
For many applications deployed in manufacturing networks, communication latency has been a significant barrier. Despite the constant development of improved communication protocols and standards during Industry 4.0, the latency problem persists, lowering quality of services (QoS) and quality of experience (QoE). Tactile internet (TI), with its high availability, security, and ultra-low latency, will add a new dimension to human-machine interaction (HMI) by enabling haptic and tactile sensations. The tactile internet (TI) is a cutting-edge technology that uses 5G and beyond (B5G) communications
Style APA, Harvard, Vancouver, ISO itp.
6

Villalón-Huerta, Antonio, Ismael Ripoll-Ripoll, and Hector Marco-Gisbert. "CNA Tactics and Techniques: A Structure Proposal." Journal of Sensor and Actuator Networks 10, no. 1 (2021): 14. http://dx.doi.org/10.3390/jsan10010014.

Pełny tekst źródła
Streszczenie:
Destructive and control operations are today a major threat for cyber physical systems. These operations, known as Computer Network Attack (CNA), and usually linked to state-sponsored actors, are much less analyzed than Computer Network Exploitation activities (CNE), those related to intelligence gathering. While in CNE operations the main tactics and techniques are defined and well structured, in CNA there is a lack of such consensuated approaches. This situation hinders the modeling of threat actors, which prevents an accurate definition of control to identify and to neutralize malicious act
Style APA, Harvard, Vancouver, ISO itp.
7

Amro, Ahmed, and Vasileios Gkioulos. "Evaluation of a Cyber Risk Assessment Approach for Cyber–Physical Systems: Maritime- and Energy-Use Cases." Journal of Marine Science and Engineering 11, no. 4 (2023): 744. http://dx.doi.org/10.3390/jmse11040744.

Pełny tekst źródła
Streszczenie:
In various domains such as energy, manufacturing, and maritime, cyber–physical systems (CPSs) have seen increased interest. Both academia and industry have focused on the cybersecurity aspects of such systems. The assessment of cyber risks in a CPS is a popular research area with many existing approaches that aim to suggest relevant methods and practices. However, few works have addressed the extensive and objective evaluation of the proposed approaches. In this paper, a standard-aligned evaluation methodology is presented and empirically conducted to evaluate a newly proposed cyber risk asses
Style APA, Harvard, Vancouver, ISO itp.
8

Cervini, James, Aviel Rubin, and Lanier Watkins. "Don’t Drink the Cyber: Extrapolating the Possibilities of Oldsmar’s Water Treatment Cyberattack." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 19–25. http://dx.doi.org/10.34190/iccws.17.1.29.

Pełny tekst źródła
Streszczenie:
Water treatment represents an essential critical infrastructure sector which has a direct impact on the health and well-being of its customers. Water treatment is often performed by municipalities with very limited budgets for cybersecurity resources. These underfunded, high-impact, targets represent an emerging cyber warfare attack-surface paradigm which poses a direct threat to the quality of life for millions of people. On February 5th, 2021, a water treatment plant in Oldsmar, Florida was the victim of an attempted cyberattack. This attack commanded the system to add a dangerous amount ofs
Style APA, Harvard, Vancouver, ISO itp.
9

Ur Rahman, Hafiz, Guojun Wang, Md Zakirul Alam Bhuiyan, and Jianer Chen. "In-network generalized trustworthy data collection for event detection in cyber-physical systems." PeerJ Computer Science 7 (May 4, 2021): e504. http://dx.doi.org/10.7717/peerj-cs.504.

Pełny tekst źródła
Streszczenie:
Sensors in Cyber-Physical Systems (CPS) are typically used to collect various aspects of the region of interest and transmit the data towards upstream nodes for further processing. However, data collection in CPS is often unreliable due to severe resource constraints (e.g., bandwidth and energy), environmental impacts (e.g., equipment faults and noises), and security concerns. Besides, detecting an event through the aggregation in CPS can be intricate and untrustworthy if the sensor's data is not validated during data acquisition, before transmission, and before aggregation. This paper introdu
Style APA, Harvard, Vancouver, ISO itp.
10

Malik, M. Imran, Ahmed Ibrahim, Peter Hannay, and Leslie F. Sikos. "Developing Resilient Cyber-Physical Systems: A Review of State-of-the-Art Malware Detection Approaches, Gaps, and Future Directions." Computers 12, no. 4 (2023): 79. http://dx.doi.org/10.3390/computers12040079.

Pełny tekst źródła
Streszczenie:
Cyber-physical systems (CPSes) are rapidly evolving in critical infrastructure (CI) domains such as smart grid, healthcare, the military, and telecommunication. These systems are continually threatened by malicious software (malware) attacks by adversaries due to their improvised tactics and attack methods. A minor configuration change in a CPS through malware has devastating effects, which the world has seen in Stuxnet, BlackEnergy, Industroyer, and Triton. This paper is a comprehensive review of malware analysis practices currently being used and their limitations and efficacy in securing CP
Style APA, Harvard, Vancouver, ISO itp.
11

Motghare, Sarita M., and Pramod S. Nair. "Empirical Analysis of Privacy Preservation Models for Cyber Physical Deployments from a Pragmatic Perspective." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 3s (2023): 19–29. http://dx.doi.org/10.17762/ijritcc.v11i3s.6151.

Pełny tekst źródła
Streszczenie:
The difficulty of privacy protection in cyber-physical installations encompasses several sectors and calls for methods like encryption, hashing, secure routing, obfuscation, and data exchange, among others. To create a privacy preservation model for cyber physical deployments, it is advised that data privacy, location privacy, temporal privacy, node privacy, route privacy, and other types of privacy be taken into account. Consideration must also be given to other types of privacy, such as temporal privacy. The computationally challenging process of incorporating these models into any wireless
Style APA, Harvard, Vancouver, ISO itp.
12

Grigaliūnas, Šarūnas, Rasa Brūzgienė, and Algimantas Venčkauskas. "The Method for Identifying the Scope of Cyberattack Stages in Relation to Their Impact on Cyber-Sustainability Control over a System." Electronics 12, no. 3 (2023): 591. http://dx.doi.org/10.3390/electronics12030591.

Pełny tekst źródła
Streszczenie:
Industry X.0 is the new age of digitization, when information and communication systems are strongly linked to other systems and processes and are accessed remotely from anywhere at any time. The existing information systems’ security methods are ineffective because they should focus on and assess a broader range of factors in physical and digital spaces, especially because tactics of cybercrimes are always evolving and attackers are getting more inventive in searching for holes that might be exploited. To fight it, it is a need to be one step ahead of the attacker, including understanding the
Style APA, Harvard, Vancouver, ISO itp.
13

Kravets, Ja, O. A. R. Almusawi, Ju N. Doroshenko, S. N. Mamedov, and Yu V. Redkin. "Security management of the functioning of a multi-node mobile cyber-physical system with a distributed registry based on an automatic model." Journal of Physics: Conference Series 2094, no. 4 (2021): 042040. http://dx.doi.org/10.1088/1742-6596/2094/4/042040.

Pełny tekst źródła
Streszczenie:
Abstract The problems and features of security management of the functioning of a multi-node mobile cyber-physical system with a distributed registry based on an automatic model are considered. The algorithm of the functioning of the system node allows for the possibility of increasing or decreasing its resources using various approaches. Models of stochastic automata with a variable structure are used to model such systems. The process of functioning of a node of a system with a distributed registry based on a chain of blocks in the form of a finite automaton with a variable structure and lin
Style APA, Harvard, Vancouver, ISO itp.
14

Khalid, Mohd Nor Akmal, Amjed Ahmed Al-Kadhimi, and Manmeet Mahinderjit Singh. "Recent Developments in Game-Theory Approaches for the Detection and Defense against Advanced Persistent Threats (APTs): A Systematic Review." Mathematics 11, no. 6 (2023): 1353. http://dx.doi.org/10.3390/math11061353.

Pełny tekst źródła
Streszczenie:
Cybersecurity has become a prominent issue in regard to ensuring information privacy and integrity in the internet age particularly with the rise of interconnected devices. However, advanced persistent threats (APTs) pose a significant danger to the current contemporary way of life, and effective APT detection and defense are vital. Game theory is one of the most sought-after approaches adopted against APTs, providing a framework for understanding and analyzing the strategic interactions between attackers and defenders. However, what are the most recent developments in game theory frameworks a
Style APA, Harvard, Vancouver, ISO itp.
15

Polachan, Kurian, Joydeep Pal, Chandramani Singh, and Prabhakar T. V. "Assessing Quality of Control in Tactile Cyber-Physical Systems." IEEE Transactions on Network and Service Management, 2022, 1. http://dx.doi.org/10.1109/tnsm.2022.3164100.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

Polachan, Kurian, Chandramani Singh, and T. V. Prabhakar. "Decentralized Dynamic Scheduling of TCPS flows and a Simulator for Time-Sensitive Networking." ACM Transactions on Internet Technology, February 3, 2022. http://dx.doi.org/10.1145/3498729.

Pełny tekst źródła
Streszczenie:
Cybersickness and control-loop instabilities are two main concerns in Tactile Cyber-Physical Systems (TCPS). TCPS applications demand stringent bounds on end-to-end latencies to avoid their occurrences. Traditional best-effort networks cannot guarantee packet latencies in the presence of external traffic. On the other hand, emerging deterministic networks such as IEEE 802.1 Time-Sensitive Networking (TSN) can isolate time-critical flows from external traffic using IEEE 802.1Qbv Time-Aware Shaper (TAS) to guarantee bounded end-to-end packet latencies. In this work, we develop eDDSCH-TSN, a dece
Style APA, Harvard, Vancouver, ISO itp.
17

Agarwal, Sucheta, Kuldeep Kumar Saxena, Vivek Agrawal, et al. "Prioritizing the barriers of green smart manufacturing using AHP in implementing Industry 4.0: a case from Indian automotive industry." TQM Journal, October 3, 2022. http://dx.doi.org/10.1108/tqm-07-2022-0229.

Pełny tekst źródła
Streszczenie:
PurposeManufacturing companies are increasingly using green smart production (GSM) as a tactic to boost productivity since it has a number of advantages over conventional manufacturing methods. It costs a lot of money and takes a lot of work to create an SMS since it combines a lot of different technologies, including automation, data exchanges, cyber-physical systems (CPS), artificial intelligence, the Internet of things (IoT) and semi-autonomous industrial systems. Green smart manufacturing (GSM) activities provide the foundation for creating ecologically friendly and green products. However
Style APA, Harvard, Vancouver, ISO itp.
18

Bayes, Chantelle. "The Cyborg Flâneur: Reimagining Urban Nature through the Act of Walking." M/C Journal 21, no. 4 (2018). http://dx.doi.org/10.5204/mcj.1444.

Pełny tekst źródła
Streszczenie:
The concept of the “writer flâneur”, as developed by Walter Benjamin, sought to make sense of the seemingly chaotic nineteenth century city. While the flâneur provided a way for new urban structures to be ordered, it was also a transgressive act that involved engaging with urban spaces in new ways. In the contemporary city, where spaces are now heavily controlled and ordered, some members of the city’s socio-ecological community suffer as a result of idealistic notions of who and what belongs in the city, and how we must behave as urban citizens. Many of these ideals emerge from nineteenth cen
Style APA, Harvard, Vancouver, ISO itp.
19

Jethani, Suneel. "Lists, Spatial Practice and Assistive Technologies for the Blind." M/C Journal 15, no. 5 (2012). http://dx.doi.org/10.5204/mcj.558.

Pełny tekst źródła
Streszczenie:
IntroductionSupermarkets are functionally challenging environments for people with vision impairments. A supermarket is likely to house an average of 45,000 products in a median floor-space of 4,529 square meters and many visually impaired people are unable to shop without assistance, which greatly impedes personal independence (Nicholson et al.). The task of selecting goods in a supermarket is an “activity that is expressive of agency, identity and creativity” (Sutherland) from which many vision-impaired persons are excluded. In response to this, a number of proof of concept (demonstrating fe
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!