Sökning: "Cyber-physical system development"
Visar resultat 1 - 5 av 42 avhandlingar innehållade orden Cyber-physical system development.
1. Privacy-by-Design for Cyber-Physical Systems
Sammanfattning : It is envisioned that future cyber-physical systems will provide a more convenient living and working environment. However, such systems need inevitably to collect and process privacy-sensitive information. That means the benefits come with potential privacy leakage risks. LÄS MER
2. Towards Digitization and Machine learning Automation for Cyber-Physical System of Systems
Sammanfattning : Cyber-physical systems (CPS) connect the physical and digital domains and are often realized as spatially distributed. CPS is built on the Internet of Things (IoT) and Internet of Services, which use cloud architecture to link a swarm of devices over a decentralized network. Modern CPSs are undergoing a foundational shift as Industry 4. LÄS MER
3. On Falsification of Large-Scale Cyber-Physical Systems
Sammanfattning : In the development of modern Cyber-Physical Systems, Model-Based Testing of the closed-loop system is an approach for finding potential faults and increasing quality of developed products. Testing is done on many different abstraction levels, and for large-scale industrial systems, there are several challenges. LÄS MER
4. A Framework for Cyber-physical System Tool-chain Development : A Service-oriented and Model-based Systems Engineering Approach
Sammanfattning : The development of complex Cyber-physical Systems (CPS) requires tight interactions of projects, system components, stakeholders, data and models. These models and data support component design, which are implemented by various engineering tools used by stakeholders. Effective tool integration thus relies on development of tool-chains. LÄS MER
5. Digital Power of Attorney for Authorization in Industrial Cyber-Physical Systems
Sammanfattning : Since ancient times, there has been a practice to authorize individuals that we trust. Today, we grant credentials and privileges digitally, making authorization a crucial part of security control and extending its use cases beyond people and web applications. LÄS MER