Cyberphysical system of watering with remote control

2021 ◽  
Vol 3 (1) ◽  
pp. 38-46
Author(s):  
A Hrytsyk ◽  
◽  
Y Klushyn

In today's reality, the pace of people's lives is much higher than it was 30 years ago and it is still growing. At the same time, the amount of information also growing. This information should to be processed constantly, daily, as soon it is received. Production volumes are also not standing still. Such a lively pace of life requires process consistency and continuity. And these processes must be provided by man. This article describes the system of watering which should automate the process of growing plants. Also the analysis of a new branch, cyber-physical systems is carried out. The analysis of modern systems of autonomous irrigation, principles of their construction and organization of their work are committed. A method of implementing a system that provides the possibility of constant monitoring of the growing environment and provides an opportunity to influence it is suggested. The choice of components for system construction is made. The algorithm of the program operation is described. An analysis of the relationship between system components and the user's relationship with the system is performed.

2019 ◽  
Vol 3 (3) ◽  
pp. 49 ◽  
Author(s):  
Alberto Corredera ◽  
Marta Romero ◽  
Jose M. Moya

This article faces the challenge of discovering the trends in decision-making based on capturing emotional data and the influence of the possible external stimuli. We conducted an experiment with a significant sample of the workforce and used machine-learning techniques to model the decision-making process. We studied the trends introduced by the emotional status and the external stimulus that makes these personnel act or report to the supervisor. The main result of this study is the production of a model capable of predicting the bias to act in a specific context. We studied the relationship between emotions and the probability of acting or correcting the system. The main area of interest of these issues is the ability to influence in advance the personnel to make their work more efficient and productive. This would be a whole new line of research for the future.


Author(s):  
Duncan Unwin ◽  
Louis Sanzogni

Cybersecurity threats to railways are increasing, both due to improvements in the techniques of hackers and the increasing merger of cyber and physical spheres. Accepted approaches to safety can be extended to consider the risks from cyber, however the nature of railways as complex cyber-physical systems of systems may require a broader approach beyond functional safety. This paper explores some of the cybersecurity hazards using a war gaming approach. The authors find that, while standard engineering approaches are effective in building new rail control system components, a broader and more creative consideration of attacks has benefits. In particular they identify the ability to cause mass disruption by targeting the fail-safes designed to ensure safety or auxiliary systems that are not directly classified within the scope of the ICS.


2021 ◽  
pp. 191-200
Author(s):  
Denis Uzhva ◽  
Oleg Granichin

To our minds, the real world appears as a composition of different interacting entitites, which demonstrate complex behavior. In the current paper, we primarly aim to study such networked systems by developing corresponding approaches to modeling them, given a class of tasks. We derive it from the primary concept of information and a system, with corresponding dynamics emerging from interactions between system components. As we progress through the study, we discover three possible levels of certain synchronous pattern composition in complex systems: microscopic (the level of elementary components), mesoscopic (the level of clusters), and macroscopic (the level of the whole system). Above all, we focus on the clusterization phenomenon, which allows to reduce system complexity by regarding only a small number of stable manifolds, corresponding to cluster synchronization of system component states—as opposed to regarding the system as a whole or each elementary component separately. Eventually, we demonstrate how an optimization problem for cluster control synthesis can be formulated for a simple discrete linear system with clusterization.


Author(s):  
Okolie S.O. ◽  
Kuyoro S.O. ◽  
Ohwo O. B

Cyber-Physical Systems (CPS) will revolutionize how humans relate with the physical world around us. Many grand challenges await the economically vital domains of transportation, health-care, manufacturing, agriculture, energy, defence, aerospace and buildings. Exploration of these potentialities around space and time would create applications which would affect societal and economic benefit. This paper looks into the concept of emerging Cyber-Physical system, applications and security issues in sustaining development in various economic sectors; outlining a set of strategic Research and Development opportunities that should be accosted, so as to allow upgraded CPS to attain their potential and provide a wide range of societal advantages in the future.


Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


Sign in / Sign up

Export Citation Format

Share Document