Pub Date : 2019-03-23DOI: 10.23939/acps2019.01.037
A. Melnyk, A. Botchkaryov
The problem of designing a master of computer engineering program with a specialization in cyber-physical systems has been considered. The concept of cyber-physical systems has been analyzed from the perspective of generalization and formalization for educational purposes. The need for designing a master program in cyber-physical systems has been justified. Program competencies and learning outcomes have been defined. The structure of the master of computer engineering program with a specialization in cyber-physical systems and the corresponding structural-logical scheme of master's training have been regarded.
{"title":"Master of Computer Engineering Program with a Specialization in Cyber-Physical Systems","authors":"A. Melnyk, A. Botchkaryov","doi":"10.23939/acps2019.01.037","DOIUrl":"https://doi.org/10.23939/acps2019.01.037","url":null,"abstract":"The problem of designing a master of computer engineering program with a specialization in cyber-physical systems has been considered. The concept of cyber-physical systems has been analyzed from the perspective of generalization and formalization for educational purposes. The need for designing a master program in cyber-physical systems has been justified. Program competencies and learning outcomes have been defined. The structure of the master of computer engineering program with a specialization in cyber-physical systems and the corresponding structural-logical scheme of master's training have been regarded.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131164516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-23DOI: 10.23939/acps2019.01.032
A. Kosolap
Cyber-Physical Systems (CPS) are integrations of computation and physical processes. We consider effective computations for designing difficult systems. In this paper, we propose new method of exact quadratic regularization for deterministic global optimization (EQR). This method can be used for the solution of a wide class of multiextreme problems, in particular, general quadratic problems. These problems will be transformed to maximization of norm a vector on convex set. The convex set is approximated by a polyhedron or intersection of balls. We offer the modified dual problem for maximization of norm a vector on intersection of balls. It allows to receive the solution of a primal problem. We use only local search (primal-dual interior point method) and a dichotomy method for search of a global extremum in the general quadratic problems.
{"title":"Finding the Global Minimum of the General Quadratic Problems During Deterministic Global Optimization in Cyber-Physical Systems","authors":"A. Kosolap","doi":"10.23939/acps2019.01.032","DOIUrl":"https://doi.org/10.23939/acps2019.01.032","url":null,"abstract":"Cyber-Physical Systems (CPS) are integrations of computation and physical processes. We consider effective computations for designing difficult systems. In this paper, we propose new method of exact quadratic regularization for deterministic global optimization (EQR). This method can be used for the solution of a wide class of multiextreme problems, in particular, general quadratic problems. These problems will be transformed to maximization of norm a vector on convex set. The convex set is approximated by a polyhedron or intersection of balls. We offer the modified dual problem for maximization of norm a vector on intersection of balls. It allows to receive the solution of a primal problem. We use only local search (primal-dual interior point method) and a dichotomy method for search of a global extremum in the general quadratic problems.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124922164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-23DOI: 10.23939/acps2019.01.042
V. Melnyk
: The paper aims at providing the technical investigation on implementation options for the key retrieval security procedures and consequent security subsystem architecture in the IEEE 802.15.4 compatible devices. Since the security procedures typically consume most processing capacity of IEEE 802.15.4 device, an efficient implementation of the security subsystem is essential. A brief functional overview of the key retrieval procedures has been provided. General investigations on key retrieval procedures implementation have been performed. Three general approaches for implementation of key retrieval procedures in the security subsystem have been considered: a) software implementation; b) hardware implementation; and c) hardware-software implementation. The aim is to determine optimum implementation approach corresponding to low-cost and low-power consumption requirements. An expediency of hardware and software implementation of the key retrieval procedures has been estimated.
{"title":"Implementation Options of Key Retrieval Procedures for the IEEE 802.15.4 Wireless Personal Area Networks Security Subsystem","authors":"V. Melnyk","doi":"10.23939/acps2019.01.042","DOIUrl":"https://doi.org/10.23939/acps2019.01.042","url":null,"abstract":": The paper aims at providing the technical investigation on implementation options for the key retrieval security procedures and consequent security subsystem architecture in the IEEE 802.15.4 compatible devices. Since the security procedures typically consume most processing capacity of IEEE 802.15.4 device, an efficient implementation of the security subsystem is essential. A brief functional overview of the key retrieval procedures has been provided. General investigations on key retrieval procedures implementation have been performed. Three general approaches for implementation of key retrieval procedures in the security subsystem have been considered: a) software implementation; b) hardware implementation; and c) hardware-software implementation. The aim is to determine optimum implementation approach corresponding to low-cost and low-power consumption requirements. An expediency of hardware and software implementation of the key retrieval procedures has been estimated.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130310731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-23DOI: 10.23939/acps2019.01.014
Michał Horodelski, P. Filipkowski
: The paper presents the use of states of explosion-proof method for analyzing the behavior of systems that provide smart contract technology. The selected example system is ShadowEth, whose main task is to ensure sufficient confidentiality of information stored in the Ethereum blockchain currency. The Petri network model for the ShadowEth system has been presented. The system properties according to the specifications have been defined. Properties described in a certain extension of the TCTL logic and verification have been carried out.
{"title":"A Representative Fragment Method of Analyzing Complex Systems of Smart Contracts","authors":"Michał Horodelski, P. Filipkowski","doi":"10.23939/acps2019.01.014","DOIUrl":"https://doi.org/10.23939/acps2019.01.014","url":null,"abstract":": The paper presents the use of states of explosion-proof method for analyzing the behavior of systems that provide smart contract technology. The selected example system is ShadowEth, whose main task is to ensure sufficient confidentiality of information stored in the Ethereum blockchain currency. The Petri network model for the ShadowEth system has been presented. The system properties according to the specifications have been defined. Properties described in a certain extension of the TCTL logic and verification have been carried out.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130311445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-26DOI: 10.23939/acps2019.02.137
I. Zhukov, N. Pechurin, L. Kondratova, S. Pechurin
The article deals with the problem of assessing the primary data load on the IOT, generated by the year. GDP in the money presentation has been used to estimate the amount of information that enters the network directly from things. Having advanced the postulate that the amount of data emanating from a thing is proportional to the product of its mass (thing) by its specific orderliness, it is concluded that it is possible to use a volume of the generated order principle. Dual model allowing to estimate objective thing’s prices, has been proposed.
{"title":"GDP in Value as a Measure for Evaluating Annual Data Flow Increase on IoT","authors":"I. Zhukov, N. Pechurin, L. Kondratova, S. Pechurin","doi":"10.23939/acps2019.02.137","DOIUrl":"https://doi.org/10.23939/acps2019.02.137","url":null,"abstract":"The article deals with the problem of assessing \u0000the primary data load on the IOT, generated by the year. \u0000GDP in the money presentation has been used to estimate \u0000the amount of information that enters the network directly \u0000from things. Having advanced the postulate that the \u0000amount of data emanating from a thing is proportional to \u0000the product of its mass (thing) by its specific orderliness, it \u0000is concluded that it is possible to use a volume of the \u0000generated order principle. Dual model allowing to estimate \u0000objective thing’s prices, has been proposed.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126432677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-10DOI: 10.23939/acps2018.02.067
V. Hlukhov, B. Havano
{"title":"FPGA-based Digital Quantum Coprocessor","authors":"V. Hlukhov, B. Havano","doi":"10.23939/acps2018.02.067","DOIUrl":"https://doi.org/10.23939/acps2018.02.067","url":null,"abstract":"","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124297397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-10DOI: 10.23939/acps2018.02.060
A. Botchkaryov
. The problem of context-aware task sequence planning by an autonomous intelligent system (intelligent agent) for a case of independent or loosely coupled tasks is considered. The principle of matching the task to the context was analyzed, the structure of the task sequence planning module and the algorithm of its work were proposed. The paper also proposes an algorithm for calculating the dynamic priority of a task, an algorithm for determining whether a task meets context, and an algorithm for adapting a set of rules for matching tasks to a context based on reinforcement learning in a stationary random environment with context dependence (contextual multi-armed bandit problem). The outline of the reinforcement learning procedure, implemented in the prototype of the task sequence planning module, has been proposed.
{"title":"Context-Aware Task Sequence Planning for Autonomous Intelligent Systems","authors":"A. Botchkaryov","doi":"10.23939/acps2018.02.060","DOIUrl":"https://doi.org/10.23939/acps2018.02.060","url":null,"abstract":". The problem of context-aware task sequence planning by an autonomous intelligent system (intelligent agent) for a case of independent or loosely coupled tasks is considered. The principle of matching the task to the context was analyzed, the structure of the task sequence planning module and the algorithm of its work were proposed. The paper also proposes an algorithm for calculating the dynamic priority of a task, an algorithm for determining whether a task meets context, and an algorithm for adapting a set of rules for matching tasks to a context based on reinforcement learning in a stationary random environment with context dependence (contextual multi-armed bandit problem). The outline of the reinforcement learning procedure, implemented in the prototype of the task sequence planning module, has been proposed.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126451508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-10DOI: 10.23939/acps2018.02.055
Ruslan Bachynskyy, Mykhailo Stefanivskyi
The system for various types of sensors monitoring and analysis has been described in the article. The system architecture and some aspects of implementation have been described.
本文介绍了该系统对各类传感器的监测和分析。描述了系统架构和实现的一些方面。
{"title":"Sensors Monitoring and Analysis System for Cyberphysical System “Smart Home”","authors":"Ruslan Bachynskyy, Mykhailo Stefanivskyi","doi":"10.23939/acps2018.02.055","DOIUrl":"https://doi.org/10.23939/acps2018.02.055","url":null,"abstract":"The system for various types of sensors monitoring and analysis has been described in the article. The system architecture and some aspects of implementation have been described.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128463738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-10DOI: 10.23939/acps2018.02.092
V. Melnyk
The paper aims at providing the technical investigation on implementation options for the security subsystem architecture in the IEEE 802.15.4 compatible devices. Since the security procedures typically consume most processing capacity of IEEE 802.15.4 device, efficient implementation of the security subsystem is essential. A brief functional overview of the security procedures has been provided. General investigations on security procedures implementation have been performed. Three general approaches for security subsystem implementation have been considered: a) software implementation; b) hardware implementation; and c) hardware-software implementation. The aim is to determine optimum implementation approach corresponding to low-cost and low-power consumption requirements. A hardwaresoftware approach has been selected for the security subsystem implementation, and an expediency of the security procedures of hardware and software implementation has been estimated.
{"title":"Security Architecture Technical investigation for IEEE 802.15.4 Low-Rate Wirelesspersonal Area Networks","authors":"V. Melnyk","doi":"10.23939/acps2018.02.092","DOIUrl":"https://doi.org/10.23939/acps2018.02.092","url":null,"abstract":"The paper aims at providing the technical investigation on implementation options for the security subsystem architecture in the IEEE 802.15.4 compatible devices. Since the security procedures typically consume most processing capacity of IEEE 802.15.4 device, efficient implementation of the security subsystem is essential. A brief functional overview of the security procedures has been provided. General investigations on security procedures implementation have been performed. Three general approaches for security subsystem implementation have been considered: a) software implementation; b) hardware implementation; and c) hardware-software implementation. The aim is to determine optimum implementation approach corresponding to low-cost and low-power consumption requirements. A hardwaresoftware approach has been selected for the security subsystem implementation, and an expediency of the security procedures of hardware and software implementation has been estimated.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131955223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-10DOI: 10.23939/acps2018.02.084
Оlha Kolodchak
This work deals with the development of a structural model of decision-making tools for cyberphysical systems and with the development of a control system of decision-making tools for cyberphysics systems. The main difficulties in developing decision-making tools have been considered and analyzed. A structural model of decision making tools for cyberphysical systems and its characteristics has been considered. The estimation of hardware costs for the implementation of decision-making tools of cyberphysical systems has been made. The essence, purpose and properties of the control system have been disclosed. The cybernetic model of control system for decision making of cyberphysical systems has been presented. The basic parameters of the developed model have been given. Also, an experimental mobile cyberphysics system for recognizing objects (road signs) from a video stream for car drivers has been presented.
{"title":"Problems of Designing a Control Systemfor Decision Making Systems of Cyberphysical Systems","authors":"Оlha Kolodchak","doi":"10.23939/acps2018.02.084","DOIUrl":"https://doi.org/10.23939/acps2018.02.084","url":null,"abstract":"This work deals with the development of a structural model of decision-making tools for cyberphysical systems and with the development of a control system of decision-making tools for cyberphysics systems. The main difficulties in developing decision-making tools have been considered and analyzed. A structural model of decision making tools for cyberphysical systems and its characteristics has been considered. The estimation of hardware costs for the implementation of decision-making tools of cyberphysical systems has been made. The essence, purpose and properties of the control system have been disclosed. The cybernetic model of control system for decision making of cyberphysical systems has been presented. The basic parameters of the developed model have been given. Also, an experimental mobile cyberphysics system for recognizing objects (road signs) from a video stream for car drivers has been presented.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121152114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}