cyber physical system
Recently Published Documents


TOTAL DOCUMENTS

1562
(FIVE YEARS 1166)

H-INDEX

36
(FIVE YEARS 26)

2022 ◽  
Vol 27 (3) ◽  
pp. 1-19
Author(s):  
Si Chen ◽  
Guoqi Xie ◽  
Renfa Li ◽  
Keqin Li

Reasonable partitioning is a critical issue for cyber-physical system (CPS) design. Traditional CPS partitioning methods run in a determined context and depend on the parameter pre-estimations, but they ignore the uncertainty of parameters and hardly consider reliability. The state-of-the-art work proposed an uncertainty theory based CPS partitioning method, which includes parameter uncertainty and reliability analysis, but it only considers linear uncertainty distributions for variables and ignores the uncertainty of reliability. In this paper, we propose an uncertainty theory based CPS partitioning method with uncertain reliability analysis. We convert the uncertain objective and constraint into determined forms; such conversion methods can be applied to all forms of uncertain variables, not just for linear. By applying uncertain reliability analysis in the uncertainty model, we for the first time include the uncertainty of reliability into the CPS partitioning, where the reliability enhancement algorithm is proposed. We study the performance of the reliability obtained through uncertain reliability analysis, and experimental results show that the system reliability with uncertainty does not change significantly with the growth of task module numbers.


2022 ◽  
Vol 22 (2) ◽  
pp. 1-15
Author(s):  
Tu N. Nguyen ◽  
Sherali Zeadally

Conventional data collection methods that use Wireless Sensor Networks (WSNs) suffer from disadvantages such as deployment location limitation, geographical distance, as well as high construction and deployment costs of WSNs. Recently, various efforts have been promoting mobile crowd-sensing (such as a community with people using mobile devices) as a way to collect data based on existing resources. A Mobile Crowd-Sensing System can be considered as a Cyber-Physical System (CPS), because it allows people with mobile devices to collect and supply data to CPSs’ centers. In practical mobile crowd-sensing applications, due to limited budgets for the different expenditure categories in the system, it is necessary to minimize the collection of redundant information to save more resources for the investor. We study the problem of selecting participants in Mobile Crowd-Sensing Systems without redundant information such that the number of users is minimized and the number of records (events) reported by users is maximized, also known as the Participant-Report-Incident Redundant Avoidance (PRIRA) problem. We propose a new approximation algorithm, called the Maximum-Participant-Report Algorithm (MPRA) to solve the PRIRA problem. Through rigorous theoretical analysis and experimentation, we demonstrate that our proposed method performs well within reasonable bounds of computational complexity.


Author(s):  
Gabriel Frumuşanu ◽  
Alexandru Epureanu

Nowadays, the global energy network can generate and transmit, between any two points belonging to it, high quantity of energy. During recent years, a global information network, able to process, store, and transmit huge amounts of information, has been developed as well. These networks entirely cover the industrial space, already giving the opportunity to make permanently available, in any of its points, at any time, as much as needed, both energy and information. On the other hand, the mass customization trend has led to the pronounced increase of “manufacturing to order” (MTO) production, taking place in a higher and higher number of small & medium enterprises. At this level, a given manufacturing system cannot be quickly and appropriately configured to a given product, due to production high variability in range. As consequence, the manufacturing system is, quite always, more or less unadjusted to the manufactured product, its performance being significantly affected. Starting from here, the challenge is to make a conceptual rebuilding of the manufacturing system, aiming to increase its degree of appropriateness to products, by taking advantage from the opportunities brought by the existence of global energy & information networks. This paper approach is to see the next generation manufacturing system as holonic modular cyber-physical system. System architecture permanently accords to the manufactured product requirements. The function, procedure, topology and holarchy model of the system are presented. The main features of the system are also revealed.


Author(s):  
Ms. Keerti Dixit

Abstract: Cyber-physical systems are the systems that combine the physical world with the world of information processing. CPS involves interaction between heterogeneous components that include electronic chips, software systems, sensors and actuators. It makes the CPS vulnerable to attacks. How to deal with the attacks in CPSs has become a research hotspot. In this paper we have study the Architecture of CPS and various security threats at each layer of the archicture of CPS. We have also developed attack taxonomy for CPS. Keywords: Cyber Physical System, Threat, Attack


Mathematics ◽  
2022 ◽  
Vol 10 (2) ◽  
pp. 271
Author(s):  
Vassilis G. Kaburlasos

By “model”, we mean a mathematical description of a world aspect [...]


Author(s):  
Zhiwen Wang ◽  
Bin Zhang ◽  
Xiangnan Xu ◽  
Usman ◽  
Long Li

This paper investigates the security control problem of the cyber-physical system under false data injection attacks. A model predictive switching control strategy based on attack perception is proposed to compensate for the untrusted sequence of data caused by false data injection attacks. First, the binary attack detector is applied whether the system has suffered the attack. If the attack occurs, multistep correction is carried out for the future data according to the previous time data, and the waiting period [Formula: see text] is set. The input and output sequence of the controller is reconstructed, and the system is modeled as a constant time-delay switched system. Subsequently, the Lyapunov methods and average-dwell time are combined to provide sufficient conditions for the asymptotical stability of closed-loop switched system. Finally, the simulation of the networked first-order inverted pendulum model reveals that the control technique can efficiently suppress the influence of the attacks.


2022 ◽  
pp. 141-155
Author(s):  
Zia ur Rehman ◽  
Saud Altaf ◽  
Saleem Iqbal ◽  
Khalid Hussain ◽  
Kashif Sattar

2022 ◽  
Vol 70 (1) ◽  
pp. 653-668
Author(s):  
Sadia Ali ◽  
Yaser Hafeez ◽  
Muhammad Bilal ◽  
Saqib Saeed ◽  
Kyung Sup Kwak

Sign in / Sign up

Export Citation Format

Share Document