scholarly journals Medical Cyber-Physical Systems: A Solution to Smart Health and the State of the Art

Author(s):  
Fulong Chen ◽  
Yuqing Tang ◽  
Canlin Wang ◽  
Jing Huang ◽  
Cheng Huang ◽  
...  
10.29007/68dk ◽  
2019 ◽  
Author(s):  
Gidon Ernst ◽  
Paolo Arcaini ◽  
Alexandre Donzé ◽  
Georgios Fainekos ◽  
Logan Mathesen ◽  
...  

This report presents the results from the 2019 friendly competition in the ARCH workshop for the falsification of temporal logic specifications over Cyber-Physical Systems. We describe the organization of the competition and how it differs from previous years. We give background on the participating teams and tools and discuss the selected benchmarks and results. The benchmarks are available on the ARCH website1, as well as in the competition’s gitlab repository2. The main outcome of the 2019 competition is a common benchmark repository, and an initial base-line for falsification, with results from multiple tools, which will facilitate comparisons and tracking of the state-of-the-art in falsification in the future.


2017 ◽  
Vol 11 (4) ◽  
pp. 2614-2627 ◽  
Author(s):  
Xi Zheng ◽  
Christine Julien ◽  
Miryung Kim ◽  
Sarfraz Khurshid

2017 ◽  
Vol 2017 ◽  
pp. 1-10 ◽  
Author(s):  
Long Zhang ◽  
Wenyan Hu ◽  
Wanxia Qu ◽  
Yang Guo ◽  
Sikun Li

Mobile cyber-physical systems (CPSs) are very hard to verify, because of asynchronous communication and the arbitrary number of components. Verification via model checking typically becomes impracticable due to the state space explosion caused by the system parameters and concurrency. In this paper, we propose a formal approach to verify the safety properties of parameterized protocols in mobile CPS. By using counter abstraction, the protocol is modeled as a Petri net. Then, a novel algorithm, which uses IC3 (the state-of-the-art model checking algorithm) as the back-end engine, is presented to verify the Petri net model. The experimental results show that our new approach can greatly scale the verification capabilities compared favorably against several recently published approaches. In addition to solving the instances fast, our method is significant for its lower memory consumption.


2019 ◽  
Vol 2019 ◽  
pp. 1-10
Author(s):  
Yongzhen Guo ◽  
Baijing Han ◽  
Weiping Wang ◽  
Manman Yuan

This paper is concerned with the security state estimation and event-triggered control of cyber-physical systems (CPSs) under malicious attack. Aiming at this problem, a finite-time observer is designed to estimate the state of the system successfully. Then, according to the state information, the event-triggered controller is designed through the event-triggered communication. It is proved that the system is uniformly and finally bounded. Finally, the effectiveness of the proposed method is verified by a simulation example.


2019 ◽  
Vol 149 ◽  
pp. 174-216 ◽  
Author(s):  
Yuriy Zacchia Lun ◽  
Alessandro D’Innocenzo ◽  
Francesco Smarra ◽  
Ivano Malavolta ◽  
Maria Domenica Di Benedetto

2021 ◽  
Vol 10 (3) ◽  
pp. 43
Author(s):  
Shuva Paul ◽  
Muhtasim Riffat ◽  
Abrar Yasir ◽  
Mir Nusrat Mahim ◽  
Bushra Yasmin Sharnali ◽  
...  

At present, the whole world is transitioning to the fourth industrial revolution, or Industry 4.0, representing the transition to digital, fully automated environments, and cyber-physical systems. Industry 4.0 comprises many different technologies and innovations, which are being implemented in many different sectors. In this review, we focus on the healthcare or medical domain, where healthcare is being revolutionized. The whole ecosystem is moving towards Healthcare 4.0, through the application of Industry 4.0 methodologies. Many technical and innovative approaches have had an impact on moving the sector towards the 4.0 paradigm. We focus on such technologies, including Internet of Things, Big Data Analytics, blockchain, Cloud Computing, and Artificial Intelligence, implemented in Healthcare 4.0. In this review, we analyze and identify how their applications function, the currently available state-of-the-art technologies, solutions to current challenges, and innovative start-ups that have impacted healthcare, with regards to the Industry 4.0 paradigm.


Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1814
Author(s):  
Marta Chmiel ◽  
Mateusz Korona ◽  
Fryderyk Kozioł ◽  
Krzysztof Szczypiorski ◽  
Mariusz Rawski

The Internet of Things (IoT) is an emerging concept comprising a wide ecosystem of interconnected devices and services. These technologies collect, exchange and process data in order to dynamically adapt to a specific context. IoT is tightly bound to cyber-physical systems and, in this respect, has relevant security implications. A need for IoT security guidelines was identified by the industry in the early 2010s. While numerous institutions across the globe have proposed recommendations with a goal to help developers, distributors and users to ensure a secure IoT infrastructure, a strict set of regulations for IoT security is yet to be established. In this paper, we aim to provide an overview of security guidelines for IoT proposed by various organizations, and evaluate some of the existing technologies applied to ensure IoT security against these guidelines. We gathered recommendations proposed by selected government organizations, international associations and advisory groups, and compiled them into a set of the most common and important considerations, divided into eight categories. Then we chose a number of representative examples from IoT security technologies and evaluated them against these criteria. While none of the examined solutions fulfill all recommendations on their own, the existing technologies introduced by those solutions could be combined to create a design framework which satisfies all the requirements of a secure IoT device. Further research on this matter could be beneficial. To the best of our knowledge, this is the first comprehensive survey to evaluate different security technologies for IoT device security against the compilation of criteria based on existing guidelines.


Sign in / Sign up

Export Citation Format

Share Document