The document discusses the challenges and current solutions of cyber physical systems. It begins by defining cyber physical systems as systems that tightly integrate computation, networking, and physical processes. It then outlines three main challenge areas for cyber physical systems: 1) monitoring and actuation infrastructure challenges related to dependability, accuracy, efficiency, robustness, availability, and cost, 2) communication network challenges related to wiring, power/energy, mobility, data rate, security, and signal fading, and 3) computation and control operation challenges related to complexity, scalability, real-time operation, and fault tolerance. Current solutions discussed include developing common languages for dependability analysis, improving sensor accuracy, implementing energy efficient sensing, and using error control for improved data
Cyber physical systems: A smart city perspective IJECEIAES
Cyber-physical system (CPS) is a terminology used to describe multiple systems of existing infrastructure and manufacturing system that combines computing technologies (cyber space) into the physical space to integrate human interaction. This paper does a literature review of the work related to CPS in terms of its importance in today’s world. Further, this paper also looks at the importance of CPS and its relationship with internet of things (IoT). CPS is a very broad area and is used in variety of fields and some of these major fields are evaluated. Additionally, the implementation of CPS and IoT is major enabler for smart cities and various examples of such implementation in the context of Dubai and UAE are researched. Finally, security issues related to CPS in general are also reviewed.
Towards Cyber-Physical System technologies over Apache VCLImre Kocsis
Presentation held at the 2nd International IBM Cloud Academy Conference (ICACON 2014, Atlanta, Georgia) on extending Apache VCL for teaching Cyber-Physical Systems.
Most Cited Survey Article in Computer Science And EngineeringIJCSES Journal
Advances in wireless sensor network (WSN) technology has provided the availability of small and low-cost sensor nodes with capability of sensing various types of physical and environmental conditions, data processing, and wireless communication. Variety of sensing capabilities results in profusion of application areas. However, the characteristics of wireless sensor networks require more effective methods for data forwarding and processing. In WSN, the sensor nodes have a limited transmission range, and their processing and storage capabilities as well as their energy resources are also limited. Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication under these conditions. In this paper, we give a survey of routing protocols for Wireless Sensor Network and compare their strengths and limitations.
Bio-Electronics, Bio-Sensors, Smart Phones, and Health CareJeffrey Funk
Improvements in ICs, MEMS, bio-electronic ICs, and other electronics are enabling a wide range of new solutions for health care. So-called lab-on-a-chip can sense and process many types of biological data and thus help monitor health. Smart phones are becoming an important part of this process as attachments for phones proliferate. Big data services will be necessary to benefit from these new devices.
Cyber physical systems: A smart city perspective IJECEIAES
Cyber-physical system (CPS) is a terminology used to describe multiple systems of existing infrastructure and manufacturing system that combines computing technologies (cyber space) into the physical space to integrate human interaction. This paper does a literature review of the work related to CPS in terms of its importance in today’s world. Further, this paper also looks at the importance of CPS and its relationship with internet of things (IoT). CPS is a very broad area and is used in variety of fields and some of these major fields are evaluated. Additionally, the implementation of CPS and IoT is major enabler for smart cities and various examples of such implementation in the context of Dubai and UAE are researched. Finally, security issues related to CPS in general are also reviewed.
Towards Cyber-Physical System technologies over Apache VCLImre Kocsis
Presentation held at the 2nd International IBM Cloud Academy Conference (ICACON 2014, Atlanta, Georgia) on extending Apache VCL for teaching Cyber-Physical Systems.
Most Cited Survey Article in Computer Science And EngineeringIJCSES Journal
Advances in wireless sensor network (WSN) technology has provided the availability of small and low-cost sensor nodes with capability of sensing various types of physical and environmental conditions, data processing, and wireless communication. Variety of sensing capabilities results in profusion of application areas. However, the characteristics of wireless sensor networks require more effective methods for data forwarding and processing. In WSN, the sensor nodes have a limited transmission range, and their processing and storage capabilities as well as their energy resources are also limited. Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication under these conditions. In this paper, we give a survey of routing protocols for Wireless Sensor Network and compare their strengths and limitations.
Bio-Electronics, Bio-Sensors, Smart Phones, and Health CareJeffrey Funk
Improvements in ICs, MEMS, bio-electronic ICs, and other electronics are enabling a wide range of new solutions for health care. So-called lab-on-a-chip can sense and process many types of biological data and thus help monitor health. Smart phones are becoming an important part of this process as attachments for phones proliferate. Big data services will be necessary to benefit from these new devices.
2 pf implementation of wireless body area network ed iqbal qcIAESIJEECS
Patients in hospitals have issue with health instrumentality that's connected with wires to their body. Wired health instrumentality restricts the quality of the patient. Moreover, health caretaker’s area unit compelled to work the instrumentality and take the measurements. Hence, wireless observance of patient is incredibly effective resolution thereto drawback. The most target of this study was to analysis the present trend and prospect of wireless observance of patients within the hospitals. This study conjointly aims to create the epitome system to implement wireless observance. Additionally to that, this thesis conjointly studies most fitted technique for building the foremost effective wireless observance system. The sensing element nodes and receiver of the epitome were designed. Golem phone was used as entranceway to receive the information from sensing element node and forward the information into receiver. Bluetooth Low energy was wont to communicate between sensing element nodes and golem phone. LAN is employed to speak between golem phone and also the receiver that is connected to laptop. The sensing element readings were initially ascertained in Arduino Serial Monitor so sent to sink node. The sensing element readings of a body were displayed in golem phone and yet as within the web site. Real time information of sensing element was created and with success updated within the web site. The study of results and project showed that wireless observance would be terribly effective by exploitation Interference free, short vary and extremely secure suggests that of communication. Bluetooth low energy that is appropriate choice for the system. Style of sensing element nodes ought to be terribly tiny as a result of it's to be worn round the body. Therefore smaller parts ought to be used.
5G + AI Applications in Healthcare and Medical Sciences (A Lecture by Hamidreza Bolhasani in 10th Translational Ophthalmology Seminar with Focus on Artificial Intelligence, Robotics and Image Processing.)
An interdisciplinary collaboration between UCO, SOAS University of London and Tehran University of Medical Sciences (TUMS).
8.27.2014, Robot World: How Cyber Physical Systems are Changing Human-Machine...Jim "Brodie" Brazell
Robot World: How Cyber Physical Systems are Changing Human-Machine Operations, International Society for Performance Improvement, Founding Chapter, San Antonio, TX, August 27, 2014
Fog Based Emergency System For Smart Enhanced Living EnvironmentKEERTHANA M
An ambient assisted-living emergency system exploits cloud and fog computing, an outdoor positioning mechanism, and emergency and communication protocols to locate activity-challenged individuals.
ABSTRACT : Pervasive computing refers to the embodiment of computing devices into physical objects connected into networks and these devices communicate with each other without any interactions required by the user. It plays a major role in our daily lives and has a vast range of applications in many fields. This paper presents a brief introduction to pervasive computing.
Key Words : pervasive computing, ubiquitous computing, Internet of things
Security Issues in Biomedical Wireless Sensor Networks Applications: A SurveyIJARTES
Abstract The use of wireless sensor networks in healthcare
applications is growing in a fast pace. Numerous applications
such as heart rate monitor, blood pressure monitor and
endoscopic capsule are already in use. To address the growing
use of sensor technology in this area, a new field known as
wireless body area networks has emerged. As most devices
and their applications are wireless in nature, security and
privacy concerns are among major areas of concern. Body
area networks can collect information about an individual’s
health, fitness and energy expenditure. Comprising body
sensors that communicate wirelessly with the patients
control device for monitoring and external communication.
This paper provides the challenges of using the wireless
sensor network in biomedical field and how to solve most of
these issues. To analyze the different security strategies in
Wireless Sensor Networks and propose this system to give
highest quality medical care with full security in their
reliability
DESIGN OF INTELLIGENT DEVICE TO SAVE STANDBY POWER IN NETWORK ENABLED DEVICESIAEME Publication
Network connectivity is rapidly expanding to a range of new device groups that offer both wired and wireless network functionality. In 2012, 74% of Internet Protocol (IP) traffic and 94% of consumer Internet traffic originated from personal computers (PCs). By 2017, analysts predict that 49% of IP traffic and 39% of consumer Internet traffic will originate from non‑PC networked enabled devices. For network enabled devices, the most appropriate method of energy consumption reduction would be the total disconnection reduced time of operation since they are used infrequently. Automatic Power cut-off and Reset Device is the device which will avoid the standby power consumption.
TECHNOLOGICAL FACTORS PROMOTING THE EXPANSION OF INTERNET OF THINGSIAEME Publication
The deployment of mobile broadband infrastructure is expected to handle more data more efficiently, transforming every country into an innovative economy. The big trends in mobile broadband applications will be video streaming, social commerce, mobile games, mobile advertising, big data, cloud services and machine-to-machine communication or the Internet of Things (IoT). High-speed wireless broadband technology will also greatly enhance customers' digital lifestyle as technological innovations constantly change the way people live, work and play.
Mid IR Sensors - Leveraging New Technology Anticipated to reach $30 billion b...LeeSam111
Recent research and the current scenario as well as future market potential of "Mid IR Sensors: Market Shares, Strategies, And Forecasts, Worldwide, 2016 To 2022" globally.
Top cited Network Security Articles- Part 1IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Wearable Computing and Human Computer InterfacesJeffrey Funk
These slides discuss how improvements in ICs, MEMS, cameras, and other electronic components are making wearable computing and new forms of human-computer interfaces economically feasible. Improvements in digital signal processing ICs and MEMS-based microphones are rapidly improving the technical and economical feasibility of voice-recognition based interfaces. Improvements in 2D and 3D image sensors (e.g., camera ICs) are rapidly improving the technical and economical feasibility of gesture-based interfaces, augmented reality, and virtual reality. Improvements in ICs, MEMS, displays and other components are rapidly making many forms of wearable computing economically feasible; these include many forms of head, arm, torso, and leg-mounted displays. Improvements in the materials for both non-invasive and invasive brain scans are rapidly improving the technical and economical feasibility of neural interfaces.
A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...IJNSA Journal
The number of disaster occurrences around the world based on the climate changes due to the global
warming has been indicating an increase. To prevent and cope with such disaster, a number of researches
have been actively conducted to combine the user location service as well as the sensor network
technology into the expanded IoT to detect the disaster at early stages. However, due to the appearance of
the new technologies, the scope of the security threat to the pre-existing system has been expanding. In this
thesis, the D-SASS using the beacon to provide the notification service to the disaster-involved area and
the safe service to the users is proposed. The LEA Algorithm is applied to the proposed system to design
the beacon protocol collected from the smartphone to safely receive the notification information. In
addition, for data protection of a notification system, LEA and SEED algorithms were applied, and a
comparative analysis was conducted.
2 pf implementation of wireless body area network ed iqbal qcIAESIJEECS
Patients in hospitals have issue with health instrumentality that's connected with wires to their body. Wired health instrumentality restricts the quality of the patient. Moreover, health caretaker’s area unit compelled to work the instrumentality and take the measurements. Hence, wireless observance of patient is incredibly effective resolution thereto drawback. The most target of this study was to analysis the present trend and prospect of wireless observance of patients within the hospitals. This study conjointly aims to create the epitome system to implement wireless observance. Additionally to that, this thesis conjointly studies most fitted technique for building the foremost effective wireless observance system. The sensing element nodes and receiver of the epitome were designed. Golem phone was used as entranceway to receive the information from sensing element node and forward the information into receiver. Bluetooth Low energy was wont to communicate between sensing element nodes and golem phone. LAN is employed to speak between golem phone and also the receiver that is connected to laptop. The sensing element readings were initially ascertained in Arduino Serial Monitor so sent to sink node. The sensing element readings of a body were displayed in golem phone and yet as within the web site. Real time information of sensing element was created and with success updated within the web site. The study of results and project showed that wireless observance would be terribly effective by exploitation Interference free, short vary and extremely secure suggests that of communication. Bluetooth low energy that is appropriate choice for the system. Style of sensing element nodes ought to be terribly tiny as a result of it's to be worn round the body. Therefore smaller parts ought to be used.
5G + AI Applications in Healthcare and Medical Sciences (A Lecture by Hamidreza Bolhasani in 10th Translational Ophthalmology Seminar with Focus on Artificial Intelligence, Robotics and Image Processing.)
An interdisciplinary collaboration between UCO, SOAS University of London and Tehran University of Medical Sciences (TUMS).
8.27.2014, Robot World: How Cyber Physical Systems are Changing Human-Machine...Jim "Brodie" Brazell
Robot World: How Cyber Physical Systems are Changing Human-Machine Operations, International Society for Performance Improvement, Founding Chapter, San Antonio, TX, August 27, 2014
Fog Based Emergency System For Smart Enhanced Living EnvironmentKEERTHANA M
An ambient assisted-living emergency system exploits cloud and fog computing, an outdoor positioning mechanism, and emergency and communication protocols to locate activity-challenged individuals.
ABSTRACT : Pervasive computing refers to the embodiment of computing devices into physical objects connected into networks and these devices communicate with each other without any interactions required by the user. It plays a major role in our daily lives and has a vast range of applications in many fields. This paper presents a brief introduction to pervasive computing.
Key Words : pervasive computing, ubiquitous computing, Internet of things
Security Issues in Biomedical Wireless Sensor Networks Applications: A SurveyIJARTES
Abstract The use of wireless sensor networks in healthcare
applications is growing in a fast pace. Numerous applications
such as heart rate monitor, blood pressure monitor and
endoscopic capsule are already in use. To address the growing
use of sensor technology in this area, a new field known as
wireless body area networks has emerged. As most devices
and their applications are wireless in nature, security and
privacy concerns are among major areas of concern. Body
area networks can collect information about an individual’s
health, fitness and energy expenditure. Comprising body
sensors that communicate wirelessly with the patients
control device for monitoring and external communication.
This paper provides the challenges of using the wireless
sensor network in biomedical field and how to solve most of
these issues. To analyze the different security strategies in
Wireless Sensor Networks and propose this system to give
highest quality medical care with full security in their
reliability
DESIGN OF INTELLIGENT DEVICE TO SAVE STANDBY POWER IN NETWORK ENABLED DEVICESIAEME Publication
Network connectivity is rapidly expanding to a range of new device groups that offer both wired and wireless network functionality. In 2012, 74% of Internet Protocol (IP) traffic and 94% of consumer Internet traffic originated from personal computers (PCs). By 2017, analysts predict that 49% of IP traffic and 39% of consumer Internet traffic will originate from non‑PC networked enabled devices. For network enabled devices, the most appropriate method of energy consumption reduction would be the total disconnection reduced time of operation since they are used infrequently. Automatic Power cut-off and Reset Device is the device which will avoid the standby power consumption.
TECHNOLOGICAL FACTORS PROMOTING THE EXPANSION OF INTERNET OF THINGSIAEME Publication
The deployment of mobile broadband infrastructure is expected to handle more data more efficiently, transforming every country into an innovative economy. The big trends in mobile broadband applications will be video streaming, social commerce, mobile games, mobile advertising, big data, cloud services and machine-to-machine communication or the Internet of Things (IoT). High-speed wireless broadband technology will also greatly enhance customers' digital lifestyle as technological innovations constantly change the way people live, work and play.
Mid IR Sensors - Leveraging New Technology Anticipated to reach $30 billion b...LeeSam111
Recent research and the current scenario as well as future market potential of "Mid IR Sensors: Market Shares, Strategies, And Forecasts, Worldwide, 2016 To 2022" globally.
Top cited Network Security Articles- Part 1IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Wearable Computing and Human Computer InterfacesJeffrey Funk
These slides discuss how improvements in ICs, MEMS, cameras, and other electronic components are making wearable computing and new forms of human-computer interfaces economically feasible. Improvements in digital signal processing ICs and MEMS-based microphones are rapidly improving the technical and economical feasibility of voice-recognition based interfaces. Improvements in 2D and 3D image sensors (e.g., camera ICs) are rapidly improving the technical and economical feasibility of gesture-based interfaces, augmented reality, and virtual reality. Improvements in ICs, MEMS, displays and other components are rapidly making many forms of wearable computing economically feasible; these include many forms of head, arm, torso, and leg-mounted displays. Improvements in the materials for both non-invasive and invasive brain scans are rapidly improving the technical and economical feasibility of neural interfaces.
A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...IJNSA Journal
The number of disaster occurrences around the world based on the climate changes due to the global
warming has been indicating an increase. To prevent and cope with such disaster, a number of researches
have been actively conducted to combine the user location service as well as the sensor network
technology into the expanded IoT to detect the disaster at early stages. However, due to the appearance of
the new technologies, the scope of the security threat to the pre-existing system has been expanding. In this
thesis, the D-SASS using the beacon to provide the notification service to the disaster-involved area and
the safe service to the users is proposed. The LEA Algorithm is applied to the proposed system to design
the beacon protocol collected from the smartphone to safely receive the notification information. In
addition, for data protection of a notification system, LEA and SEED algorithms were applied, and a
comparative analysis was conducted.
How Cyber-Physical Systems Are Reshaping the Robotics LandscapeCognizant
The rapid growth of analytics, AI and related intelligent software is merely the first phase of the robotics revolution. Computer algorithms that learn and improve the output of systems over time are now managing and controlling physical systems in ways that enable machines to function autonomously.
Wearable sensor network for lower limb angle estimation in robotics applicationsTELKOMNIKA JOURNAL
In human-robot interaction, sensors are relevant in guaranteeing stability and high performance in real-time applications. Nonetheless, accuracy and portable sensors for robots usually have high costs and little flexibility to process signals with free software. Therefore, we propose a wearable sensor network to measure lower limb angular position in human-robot interaction systems. The methodology employed to achieve the aim consisted in implementing a wireless network using low-cost devices, verifying design requirements, and making a validation via a proof of concept. The requirements to design the network include low loss of information, real-time communication, and sensor fusion to estimate the angular position using a gyroscope and accelerometer. Hence, the sensor network developed has a client-server architecture based on ESP8266 microcontrollers. In addition, this network uses the standard 802.11 b/g/n to transmit angular velocity and acceleration measures. Furthermore, we implement the user datagram protocol (UDP) protocol to operate in real-time with a sample time of 10 ms. Finally, we implement a proof of concept to show the system’s effectiveness. Thus, we use the Kalman filter to estimate the angular position of the foot, shin, thigh, and hip. Results indicate that the implemented sensor network is suitable for real-time robotic applications.
Abstract: Wearable sensors that measure limb movements posture, and physiological conditions can yield high resolution quantitative data .It can be used to better understand the disease and develop more effective treatments. In existing, classification algorithm is used to extract the feature from sensor, so these feature selection may lead to rapid battery depletion due to the absence of computing complexity. The notion of power aware feature selection is proposed which aims at minimizing energy consumption also it considers the energy cost of individual features that are calculated in real time. A graph model is introduced to represent correlation and computing complexity of the features. The problem is formulated using integer programming and a greedy approximation is presented to select the features in a power efficient manner. Experimental results on thirty channels of activity data collected from real subjects demonstrate that an approach can significantly reduce energy consumption of the computing module, resulting in more than 30 percent energy savings while achieving 96.7 percent classification accuracy.
Looking into the Crystal Ball: From Transistors to the Smart EarthThe Innovation Group
This paper is based on a keynote talk presented by Prof. Sangiovanni-Vincentelli at the 50th DAC. It discusses the evolution of cyber-physical and bio-cyber systems leading us to a smarter planet, and it predicts how EDA and embedded systems have to expand into this new field.
A Survey on Mobile Sensing Technology and its PlatformEswar Publications
Now a days, mobile networks is increasingly becoming important part of everyday life due which there is a rapid evolution mobile phone. Mobile phone comes into a powerful sensing platform. There are many scientists which are engaged in the emerging field of mobile sensing from a variety of existing communities, such as, mobile systems, machine learning and human computer interaction. The research and development in this field is rapid resulting in indispensable carry-on of daily life. But with the increase in development, data integrity and security has also become an important factor to take into consideration. Importantly, today’s smart phones are programmable and come with a growing set of cheap powerful embedded sensors, which are enabling the emergence of personal, group, and community scale sensing applications. The mobile sensing platform provides many facilities like, it helps to communicate to Wireless sensor networks through a mobile sensor router Which attached to a users mobile phone. It helps in analysis of the sensed data which is derived from networks by cooperating with sensor middle- ware on a remote server to capture ones contexts. It also helps in providing context aware services for mobile users of cellular telephones. In this paper, we will discuss about
different mobile sensing platforms that provides context-aware services for mobile users by accessing the surrounding wireless sensor networks. Along with this, we will briefly discuss some of the emerging sensing paradigms.
Comparative Performance Analysis of Wireless Communication Protocols for Inte...chokrio
The systems based on intelligent sensors are currently expanding, due to theirs functions and theirs performances of intelligence: transmitting and receiving data in real-time, computation and processing algorithms, metrology remote, diagnostics, automation and storage measurements…The radio frequency wireless communication with its multitude offers a better solution for data traffic in this kind of systems. The mains objectives of this paper is to present a solution of the problem related to the selection criteria of a better wireless communication technology face up to the constraints imposed by the intended application and the evaluation of its key features. The comparison between the different wireless technologies (Wi-Fi, Wi-Max, UWB, Bluetooth, ZigBee, ZigBeeIP, GSM/GPRS) focuses on their performance which depends on the areas of utilization. Furthermore, it shows the limits of their characteristics. Study findings can be used by the developers/ engineers to deduce the optimal mode to integrate and to operate a system that guarantees quality of communication, minimizing energy consumption, reducing the implementation cost and avoiding time constraints.
Efficiency Evaluation Metrics for Wireless Intelligent Sensors Applicationschokrio
The metrology field has been progressed with the
appearance of the wireless intelligent sensor systems providing more capabilities such as signal processing, remote multisensing fusion etc. This kind of devices is rapidly making their way into medical and industrial monitoring, collision avoidance, traffic control, automotive and others applications. However, numerous design challenges for wireless intelligent sensors systems are imposed to overcome the physical limitations in data traffic, such as system noise, real time communication,
signal attenuation, response dynamics, power consumption, and effective conversion rates etc, especially for applications requiring specific performances. This paper analyzes the performance metrics of the mentioned sensing devices systems which stands for superior measurement, more accuracy and reliability. Study findings prescribe researchers, developers/ engineers and users to realizing an optimal sensing motes design strategy that offers operational advantages which can offer cost-effective solutions for an application.
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...chokrio
The systems based on intelligent sensors are currently expanding, due to theirs functions and theirs performances of intelligence: transmitting and receiving data in real-time, computation and processing algorithms, metrology remote, diagnostics, automation and storage measurements…The radio frequency wireless communication with its multitude offers a better solution for data traffic in this kind of systems. The mains objectives of this paper is to present a solution of the problem related to the selection criteria of a better wireless communication technology face up to the constraints imposed by the intended application and the evaluation of its key features. The comparison between the different wire-less technologies (Wi-Fi, Wi-Max, UWB, Bluetooth, ZigBee, ZigBeeIP, GSM/GPRS) focuses on their performance which depends on the areas of utilization. Furthermore, it shows the limits of their characteristics. Study findings can be used by the developers/ engineers to deduce the optimal mode to integrate and to operate a system that guarantees quality of communication, minimizing energy consumption, reducing the implementation cost and avoiding time con-straints.
Low-cost real-time internet of things-based monitoring system for power grid ...IJECEIAES
One of the most common causes of blackouts is unexpected failures at power system transformer levels. The purpose of this project is to create a low-cost Internet of things (IoT)-based monitoring system for power grid transformers in order to investigate their working status in real-time. Our monitoring system’s key functions are the gathering and display of many metrics measured at the transformer level (temperature, humidity, oil level, voltage, vibration, and pressure). The data will be collected using various sensors connected to a microcontroller with an embedded Wi-Fi module (DOIT Esp32 DevKit v1), and then supplied to a cloud environment interface with a full display of all the ongoing changes. This technology will provide the power grid maintenance center with a clear image of the transformers’ health, allowing them to intervene at the right time to prevent system breakdown. The method described above would considerably improve the efficiency of a power transformer in a smart grid system by detecting abnormalities before they become critical.
Ubiquitous computing will surround users
with a comfortable and convenient information environment and a smart
space that merges physical and computational infrastructures into an integrated
habitat. This habitat will feature a proliferation of hundreds or thousands of
computing devices and sensors that will provide new functionality, offer specialized
services, and boost productivity
and interaction among the devices and
the
users.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 2, Ver. I (Mar-Apr. 2016), PP 104-110
www.iosrjournals.org
DOI: 10.9790/0661-1821104110 www.iosrjournals.org 104 | Page
Challenges and Current Solutions of Cyber Physical Systems
Lokesh. M. R1
, Y.S. Kumaraswamy 2
Tejaswini K.N3
1
(Senior Assistant Professor, Information Science and Engineering New Horizon College of Engineering
Bangalore and Research Scholar, Department of Computer Science and Engineering Sathyabama University,
Chennai, India)
2
(Department of Computer Science and Engineering, Nagarjuna College of Engineering and Technology,
Devanahalli, Bangalore, India)
3
(PG Scholar (Software Engineering), Information Science and Engineering New Horizon College of
Engineering Bangalore. India)
Abstract: The interaction among people has been increased rapidly due to advances in internet and increased
use of smart phones that are now available at all price ranges. The next step is to improve communication
among machines by connecting the machines and giving intelligence to them to communicate among machines
by connecting the machines and giving intelligence to them to communicate with other machines and also to
interact with people. Cyber Physical Systems (CPS) are a natural consequence of an increasingly connected
physical world. CPS have wide range of applications at the same time there are several challenges to implement
these systems. In order to identify the challenges and current solutions and propose research possibilities in
different areas of CPS we survey the literature of this area. Our approach is to identify the challenges in
different areas of CPS including monitoring and actuator infrastructure, communication network, computation
and control operation. We identify different elements in each area and explain the nominal and abnormal
behaviour of all the elements. Finally we will explain the current solutions to deal with the abnormal behaviour
of the elements.
Keywords: Cyber-Physical system, Architecture, monitoring and actuator, Communication Network,
Computation and Control Operations
I. Introduction
The advent of internet erased the boundaries of the world. Communication among the people has been
increased rapidly and data rates going faster and faster day by day. Internet has transformed the people’s
lifestyles, businesses, studies, entertainment. Going further is the communication between people and machines
which is a current ongoing research area. But, still there is a small gap between the cyber world where the
information is processed, altered and exchanged and the physical world where we live.
Cyber Physical Systems (CPS) is a dominant research topic with wide range of applications in many
areas. The word (CPS) refers to a new cohort of systems with integrated computational and physical capabilities
that can collaborate with humans through many new techniques. CPS are the outcome of amalgamation of cyber
world and the physical world. Conventional cyber systems were commonly contemplated as passive, “dumb”
part in the physical world, but with CPS, now we have to consider what is being displace or varied in the
physical world. The power to collaborate with, and expand the capacity of, the physical world through
computation, communication, and control is a crucial facilitator for upcoming technological advances.
A considerable distinction between CPS and regular control system or an embedded system is the
ability to use communications, which adds scalability and reconfigurability as well as potential instability and
complexity. Moreover, CPS has apparently more intelligence in sensors and actuators as well as considerably
stringent performance limitations. Progression in the cyber world such as communications, sensing,
networking, storage, computing and control, along with the advances in physical world such as hardware,
materials, and renewable “green” fuels, are all rapidly merging to realize the class of highly interactive
computational systems that are reckoning on actuators and sensors to monitor and trigger the changes.
CPS have multitudinous applications in many fields like consumer, health care, military, transportation,
energy, manufacturing, robotics and infrastructure. CPS applications are coming up across multiple sectors, such
as adaptive cruise control and antitheft devices in cars and ATM’s, flight control and electrochromic cabin
windows in airplanes, location services in cell phones, entertainment, gaming, flight control and electrochromic
cabin windows in airplanes, pacemakers in humans, haptic systems and robotic vacuum devices at homes.
The applications of CPS make human life more comfortable. Advances in CPS can make applications
faster, perform distributed integration of large scale systems (e.g., automated road and airspace traffic control),
temporally more and spatially precise (e.g., telerobotic surgery), demonstrate high efficiency (e.g., zero-net
2. Challenges and Current Solutions of Cyber Physical Systems
DOI: 10.9790/0661-1821104110 www.iosrjournals.org 105 | Page
energy buildings) , robust to hostile or not reachable environments (e.g., autonomous search and rescue, disaster
recovery), and enhance quality of life (e.g., ubiquitous healthcare), augment human capabilities (e.g., body
sensor nets, brain–computer interfaces). Cyber–physical coupling itself has enormous impact. CPS promises to
hence streamline paradigm shifts in our society.
To deploy the CPS applications we need some elements which will fall under three categories sensors
and actuators, communication network and computing nodes. The sensors and actuators collect the data from
physical world. The collected data will be transmitted over the network to the computing nodes where the data
will be processed and result will be generated and displayed in a format that is required by the end users. Each
area has several challenges that need to be addressed when actual deployment is done in the real world.
In this paper we discuss about different concerns about CPS. First explains how CPS is show as layered
Architecture. Second we explain the challenges in different areas of CPS with examples then we explain about
different existing solutions to overcome such challenges. We end the paper by outlining some research
directions that helps to vanquish the challenges and deploy the CPS in real world.
II. Layered Cyber-Physical system Architecture
This architecture describes the formation of cyber-physical system .The architecture is represented in
modular fashion, consisting of physical world integrated with cyber world with Monitoring and Actuation
Infrastructure, Network Communication Infrastructure, and Distributed Centralized or Decentralized Control
and Computation Infrastructure.
A. Physical Process system
The Physical entity refers to the mechanical, chemical, electronic elements of a system which are
interconnected to perform a particular operation. Examples of this system are energy systems, power systems,
nuclear power plants etc. Here resilience of such systems is achieved through improving features such as
robustness and reliability.
Part of each layer of cyber feedback control loop
Figure 1: Cyber-Physical System in generic Layered Architecture
B. Cyber feedback loop control system
The cyber world has various elements to monitor and control the physical process of the system.
Depending on the functionality of the element, we propose, layered approach to distinguish the elements as
follows with wide applications from health care to smart grid; each application uses it’s know sensing types and
its network.
Monitoring and Actuation Infrastructure layer: This layer observes the physical entity status and acts as an
interface between the physical and cyber world. This is done by various types of sensors, actuators device and it
3. Challenges and Current Solutions of Cyber Physical Systems
DOI: 10.9790/0661-1821104110 www.iosrjournals.org 106 | Page
is networked to each other. As we know that cyber physical system having ECG, EMG, EEG, SpO2,
accelerometer, & tilt sensors, ECG & PPG ,Video camera, audio, RFID, & smart, door lock Light, smoke, &
temperature sensors, heat flux, gas(O2, CO,&CO2), GPS, accelerometer, magnetometer, Camera WiFi, and
compass are some of the different types of sensors used in various application like medical application,
electronics application, transport application, smart grids application , and game applications.
Network Communication Infrastructure layer: This layer forwards the status information to Distributed
Control and Computation Unit infrastructure. Based on the type of the application, Network communication
infrastructure uses various technologies like switch, router and gateway with corresponding protocols. Body
Sensor Network, GPRS, GSM, Wireless sensor Network, 3G, Bluetooth, WiFi Cellular and Internet are the
different types of communication network are used between “Monitoring and Actuation” and “Control and
Computation Unit” for different application.
Distributed control and computation Unit infrastructure layer: This layer is also called as Supervisory layer
that offers human-machine interactions and capability of centralized decision-making. Doctors and nurses, data
acquisition and storage component, agent-based command-control component, query manager agent and a set of
Command, Control, Communication and Intelligence (C3I) user-interface agents to interact with users, an
intelligent traffic signal control protocol to speed up car-crossing at intersections and smart user’s phone are
used as a control and computation unit in various applications.
Human in Loop: This layer embedded with Distributed computation and control layer were higher level policy
and decision taken to appropriate query. In some situation other than intelligence decision support system or
knowledge database human intervention is also required for support.
III. Challenges in Cyber-Physical System
Challenges with Monitoring And Actuator Infrastructure:
The sensors and actuators exists in the physical space. They collect the information from the
surrounding and give it to the cyberspace for processing using the networking elements. The practical
deployment of the sensors and actuator poses several challenges that needs to be addressed properly to achieve
the desired functionality. Some of the challenges are
Dependability which is the characteristic of a system to carry out desired functionalities during its
operation without evidential degradation in its outcome and performance. Dependability indicates the degree of
reliability put in the entire system. A system which is highly dependable should operate correctly without
intrusion, perform the needed functionalities as desired and it should not break down during its processing. It is
a very difficult task to assure dependability before actual system operation. For example, timing uncertainties
regarding sensor readings and immediate actuation may deteriorate dependability and lead to unexpected results.
There is a visible interdependency between Cyber and physical components of the system and during system
operation those underlying components might be dynamically interconnected, which, makes dependability
analysis very problematic. The solution to this is to introduce a common language that clearly explains
dependability related information across constituent systems/underlying components in the design stage.
Accuracy means the degree of match between a system’s measured/observed values to its
actual/calculated one. A system which is highly accurate should give actual outcome as close as possible.
Maximum accuracy comes into play especially for the applications of CPS where even small imprecision lead to
system break downs. For example, an object tracking system which is motion based if uses imperfect sensor
conditions then based on incorrect object position estimation it may take untimely control action, which causes
the system failure.
Efficiency means the amount of usage of resources (such as energy, cost, time etc.) that are required by
the system to perform required functionalities. A system which is highly efficient should operate correctly and
use optimum amount of system resources. Usually the sensors and actuators use more power to perform their
operations. In CPS applications Efficiency is mainly needed for energy management. So, CPS applications can
be developed in such a way that it consumes minimal energy by keeping the sensors in a sleep mode based on
the criticality of the application.
Robustness is the ability to with stand different environmental conditions. Usually the sensors will be
place in the physical world which leads to challenge of facing different environmental conditions. So the sensors
and actuators should be manufactured in a way that they can work under any kind of environmental conditions
without any inaccuracy in the expected out comes and also with minimal energy consumption. Since, these
sensors and actuators are placed in the outside world it is profitable if they can use renewable energy resources
4. Challenges and Current Solutions of Cyber Physical Systems
DOI: 10.9790/0661-1821104110 www.iosrjournals.org 107 | Page
like solar energy. So, the applications of CPS must be developed in such a way thinking about all the possible
environmental conditions.
Availability gives the ratio of total time that a system or a component is functional during a specified
period and the length of the period. The availability of the sensors and actuators is very important. In case of any
failure these should be a mechanism to notify the occurrence of failure and also to with stand at least till the
notification is sent to the concerned. In any situation the system should be designed in such a way that in case of
critical applications the Availability should be made as hundred percent by keeping redundant systems.
Cost of the sensors and actuators is an important concern to develop an application of CPS. Even
though the networking hardware is available at affordable prices the cost of sensors and actuators is still high.
Advances in research of developing affordable hardware with accurate sensibility should be done to make CPS
applications more available to all classes of people.
Challenges with Communication Network:
The Deployment of CPS applications involve communication network that acts as intermediate connection
between the physical world and the cyber world. The cyber and physical worlds can be integrated using wireless
or wired networks each of which has its own challenges. Some of the challenges related to the communication
network are
Wiring: It is difficult to implement CPS applications using wired network. Most of the applications
uses wireless networks. If wiring is used the cost of wiring is an important factor which effects the deployment
of application. Maintenance of wiring is also a tedious task. But using wired network loss of data will be less
and reliability and security will be high.
Power and Energy: The network elements used for CPS applications consume power and energy to
transmit the data to cyber space. A mobile device is small in size, generally handy and dedicated to provide
desired set of functionalities; the ability to deliver the power by its power source may not be as much as the one
installed in a fixed device. When a device is allowed to move freely, it would generally be hard to receive a
continuous supply of power. A mobile device should be able to operate in an efficient and effective manner to
conserve energy. To make it more specific, it should be able to transmit and receive in an intelligent manner so
as to minimize the number of transmissions and receptions for certain communication operations.
Mobility: CPS applications such as smart cities may require the networking elements to be mobile.
Unlike wired networks, all devices are free to move in a wireless network. To support mobility, as a user moves
around an ongoing connection should be kept alive. In any network, when a mobile host moves from the
coverage of a base station or access point to that of another one a handoff occurs. Therefore we need a protocol
to ensure seamless transition during a handoff. This involves many issues like deciding how data is routed
during the handoff process and when a handoff should occur. Sometimes, packets are lost during a handoff. In
an ad hoc network, when a mobile host moves the topology changes. So to cater for the topological changes of
an ongoing data communication, the transmission route may need to be recomputed. As an ad hoc network may
consist of many mobile hosts, the design of an effective and efficient routing protocol is challenging.
Data Rate: A CPS application requires increasing the current data rates to support future high speed
applications. If application requires large amount of data transfer like live video streaming then high data rates is
required. Data rate is a function of various factors such as the data compression algorithm, power control, and
the data transfer protocol, interference mitigation through error-resilient coding,. Therefore, the design should be
well thought out by the manufacturer that considers these factors in order to achieve higher data rates. When
multimedia applications such as video conferencing or traffic surveillance are to be supported by a wireless
network data, compression plays a vital role. Currently, compression standards such as MPEG-4 produce
compression ratios of the order of 75 to 100. Improving the existing data compression algorithms to produce
high quality audio and video even at these compression rates is a challenge. Unfortunately, highly compressed
multimedia data is more sensitive to interference and network errors and it is necessary to use the algorithms to
protect sensitive data from being spoiled. We should explore efficient error control algorithms with low
overhead. Other solution to improve the data rates would be to employ intelligent data transfer protocols that
adapt to the traffic characteristics and time-varying network.
Security: CPS applications require more security which is a big concern in wireless networking.
Mobility of devices increases the security concerns in a wireless network. To provide security to its users
current wireless networks employ authentication and data encryption techniques on the air interface. An
application like smart work places in large enterprises deploys IP network level security solution to ensure that
the corporate network and proprietary data are safe. To make access to fixed access networks reliable Virtual
private network (VPN) is an option. It is imperative that wireless security features must be updated constantly,
since hackers are getting smarter.
Signal Fading: When compared with wired media, wireless transmission of may lead to distortion of
signal or weakened signal since they are transmitted over an unprotected, open, and ever changing medium
5. Challenges and Current Solutions of Cyber Physical Systems
DOI: 10.9790/0661-1821104110 www.iosrjournals.org 108 | Page
with unclear boundary. Up on that, before it arrives at the receiver the same signal may disperse and travel on
different paths due to diffraction, reflection, and scattering due to the obstacles. So, to reach the destination the
dispersed signals on different paths may take different times. Thus, the resultant signal after summing up all
dispersed signals may have been significantly attenuated and distorted when compared with the actual
transmitted signal. The receiver may not recognize the signal and hence the transmitted data cannot be received.
Thus the unreliability of the wireless networks causes a substantial number of packet losses.
Challenges with Computation and Control Operations:
Different applications of CPS require different type of computations and control operations. If
application is just to trigger an action if some event occurs then the computing system does not require high
storage but response time should be low. If application is in such a way that it store data and perform some
analytics and deliver such information to the users then the system requires huge storage and processing
capabilities. Usually the computations and control operations are done by the servers. So based on application
there are different challenges in this area also, some of them are
Processing Speed: CPS applications not only have to find and analyze the relevant data they need,
they must find it quickly. Visualization helps applications perform analyses and make decisions much faster, but
the challenge is at high speed the application has to go through the large volumes of data and access the level of
detail needed. As the degree of granularity increases the challenge grows. One possible solution is hardware.
Some vendors are using powerful parallel processing and increased memory to crunch large volumes of data
extremely quickly. Another method is putting data in-memory but using a grid computing approach, which
involves many machines to solve a problem. Both approaches allow the applications to explore huge data.
Understanding Data: If the application of CPS requires data analysis then it takes a lot of
understanding to get data in the right shape so that we can use visualization. For example, if an application
involves identifying a user by the data taken from social media content, we need to understand who the user is in
a general sense such as a customer using a chosen set of products and understand what it is you’re trying to
visualize out of the data. Visualization tools are likely to be of less value to the user, without some sort of
context. The solution to this challenge is to have the proper domain expertise in place. The people analyzing the
data have a deep understanding of what audience will be consuming the data, where the data comes from how
that audience will interpret the information.
Accuracy and Timeliness: These two are very important factors in CPS applications. Even if an
application can find and analyze data quickly and keep it in the proper context for the audience that will be
consuming the information, the value of data for decision-making purposes will be reduced if the data is not
accurate or timely. This challenge is there in any data analysis, but when considering the volumes of information
involved in CPS applications with big data, it becomes further more pronounced. To solve this problem,
applications need to have an information management process or data governance in place to ensure the data is
clean. It’s good to have a pro-active method to address data quality issues so that we can avoid problems which
may arise later.
Storage: Some applications of CPS that involves data analytics may need to store large volumes of
data. Conventional WAN-based transport methods cannot move terabytes of data at the speed required for
applications. It uses a portion of available bandwidth and do transfer at speeds that are unsuitable for such huge
volumes, introducing unacceptable delays in storing retrieving and processing data.
Control: CPS applications involve lot many devices that capture the data from the physical world and
also the devices that transfer the data from physical to cyber world. So this poses a challenge for the node that
control all these devices. Identifying the exact device and controlling it is a difficult task. There should be a way
of creating the device Id that is generic so that application should be available to all kind of devices that can be
benefitted.
Challenges with Overall Deployment of CPS:
Maintainability is the ability of a system to be repaired in case any failure occurs. A system which is
highly maintainable should be repaired in a simple and quick manner with minimum expenses of supporting
resources, and it should not cause additional problems during the maintenance process. If there is a close
interaction among the system components like sensors, actuators, networking components, and physical
components constituting CPS infrastructure, we can propose autonomous predictive /corrective diagnostic
mechanisms. Using such mechanisms continuous monitoring and testing of the infrastructure can be performed.
The result of monitoring and testing facilities help finding which units need to be repaired. Some elements,
which causes frequent failures, can be designed again or disposed and replaced with better quality elements.
Availability is the characteristic of a system to be available for accessing even when errors occur. A
system is said to be highly available if it isolates malfunctioning portion from itself and resume the operation
even in the absence of it. Harmful cyber-attacks questions the availability of the system services significantly.
6. Challenges and Current Solutions of Cyber Physical Systems
DOI: 10.9790/0661-1821104110 www.iosrjournals.org 109 | Page
For example, in Medical applications of Cyber-Physical Systems, necessary actions will be taken in a timely
manner to save a patient’s life based on medical data. Cyber-attacks or failure of systems/components may lead
to the loss of medical data causing risk to the patient’s life.
Safety is the quality of a system not to cause any danger, harm or risk anywhere around it while it is in
operation. A system which provides high safety should be in accordance with all kinds of safety regulations to a
maximum extent and should implement guaranteed safety mechanisms if anything goes wrong. For Example,
Safety of manufacturing industries can be guaranteed using embedded control systems with an automated
process control and sensors and actuators that collect the data across the manufacturing industry. Sensors
connected to a smart network could detect operational failures and help in prevention of dangerous incidents due
to those failures.
Resilience is the property of a system to continue in its operation and provision of services in an
acceptable quality even though the system is exposed to any kind of errors. A system with high resiliency should
be able to detect any kind of failures as early as possible and should be able to self-heal and also should be able
to recover faster to continue to meet the demands for services. If an application is critical then high resilience
comes into play (e.g. automated brake control in vehicular Cyber-physical systems). While designing a highly
resilient CPS we need to have a complete understanding of important failures and errors, the resilience
properties of the required application, and evolution of system due to the dynamically varying nature of the
operational environment.
Adaptability is the ability of a system to survive by adjusting its own configuration in accordance with
different circumstances in the environment. A system with high adaptability should be quickly adjust to
changing needs. Adaptability is one of the important features in the next generation air transportation systems.
The capability of the next generation should enhance performance of air space using its computerized air
transportation network which allows air vehicles immediately to accommodate themselves to changing
environment such as weather conditions, routing of air vehicle, air traffic congestion, and other issues related to
security.
Sustainability is the ability of a system to last long without compromising requirements of the system,
while continuing to use the system’s resources efficiently. A system that is highly sustainable must be durable,
adaptable and resilient. The crucial part of energy provision and management policies is to achieve
sustainability from energy perspective. For example, the Smart Grid allows energy distribution, management,
and customization from the customer’s perspective by utilizing green sources of energy extracted from the
physical environment. However obstructions like irregular energy supply and unknown load characterization
damages the efforts to maintain long-term operation of the Smart Grid. To maintain sustainability, the
applications of CPS like Smart Grid requires use of real-time performance measurements, dynamic optimization
techniques for usage of energy, environment-aware duty cycling of computing units, planning and operation
under uncertainties, and devising self-contained energy distribution facilities
IV. Existing Solutions to Deploy a Cyber-Physical System
To actually deploy any application of CPS there are several challenges that needs to be addressed to
ensure continuous operation. To achieve this development of applications should be done in a planned way from
design to deployment. There are several challenges at each stage and there are numerous methodologies and
tools that are proposed to overcome those challenges.
But still it is an evolving area because the requirements of CPS are not completely understood and are
changing day by day and the complicated dynamic behaviour of CPS is difficult to capture in a simple
understandable manner. Examples of such methodologies include capability of expressing timing constraints
and spatial conditions and check if such constraints are satisfied, decomposing the life cycle into several stages
based on the Model based development according to different views of systems.
To avoid security challenges there are different solutions like context-aware security framework for
CPS that uses dynamic adaptability to the physical environment by the assistance of context coupling, use of
distributed real-time software, use of competitive and co-operative resource management, using virtual test
beds, use of highly confidential software to avoid security issues, integrating simulation and emulation
platforms for security purposes, experimenting with different architectures to find the best suited architecture
based on requirement of application, use of sandboxing controllers for cyber-physical systems.
To add resiliency to CPS there are several techniques proposes that uses artificial intelligence and
danger theory based immune algorithms. These techniques uses the concepts of agents, self-awareness and self-
healing approaches to achieve resiliency and make the system fault tolerant.
These are some of the examples of existing methodologies, still research is going on and lots of
applications of CPS are under development.
V. Conclusion
7. Challenges and Current Solutions of Cyber Physical Systems
DOI: 10.9790/0661-1821104110 www.iosrjournals.org 110 | Page
The Cyber-Physical Systems (CPS) is an ongoing research area with huge popularity with wide variety
of applications. It is mainly the result of integration of cyber and physical worlds. There are several challenges
that come up while deploying such applications. In order to classify those challenges into three areas which are
sensors and actuators that constitute the physical world, computation and processing elements that constitute the
cyber world and networking elements that integrate the cyber and physical worlds we survey the literature of
this area. We have also discussed some of the existing solutions and we conclude that existing solutions helps to
face the current challenges to some extent as the applications of the CPS are growing day by day still there are
lot more challenges yet to come we need to fore predict the upcoming challenges and should develop new
technologies to safe guard the applications from those challenges.
References
[1]. Wang, Eric Ke, et al. "Security issues and challenges for cyber physical system." Proceedings of the 2010 IEEE/ACM Int'l
Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing. IEEE
Computer Society, 2010.
[2]. Shi, Jianhua, et al. "A survey of cyber-physical systems." Wireless Communications and Signal Processing (WCSP), 2011
International Conference on. IEEE, 2011.
[3]. Gunes, Volkan, et al. "A Survey on Concepts, Applications, and Challenges in Cyber-Physical Systems." TIIS 8.12 (2014): 4242-
4268.
[4]. Neuman, Clifford. "Challenges in security for cyber-physical systems." DHS: S&T workshop on future directions in cyber-physical
systems security. Vol. 7. 2009.
[5]. Sun, Meng. "Challenges on Coordination for Cyber-Physical Systems."Applied Mechanics and Materials. Vol. 347. 2013.
[6]. Ali, Salman, et al. "Network Challenges for Cyber Physical Systems with Tiny Wireless Devices: A Case Study on Reliable
Pipeline Condition Monitoring." Sensors 15.4 (2015): 7172-7205
[7]. Lokesh. M. R, Y.S. Kumaraswamy Nov 2014―On Autonomic Self Healing Architecture for Resiliency in Cyber Physical System‖
International Journal of Multimedia and Ubiquitous Engineering ISSN No. 1975-0080 Volume 9, No. 11, Nov 2014