首页 > 最新文献

Advances in Cyber-Physical Systems最新文献

英文 中文
Master of Computer Engineering Program with a Specialization in Cyber-Physical Systems 计算机工程硕士课程,网络物理系统专业
Pub Date : 2019-03-23 DOI: 10.23939/acps2019.01.037
A. Melnyk, A. Botchkaryov
The problem of designing a master of computer engineering program with a specialization in cyber-physical systems has been considered. The concept of cyber-physical systems has been analyzed from the perspective of generalization and formalization for educational purposes. The need for designing a master program in cyber-physical systems has been justified. Program competencies and learning outcomes have been defined. The structure of the master of computer engineering program with a specialization in cyber-physical systems and the corresponding structural-logical scheme of master's training have been regarded.
设计计算机工程硕士课程与网络物理系统的专业化问题已被考虑。从泛化和形式化的角度分析了信息物理系统的概念。在网络物理系统中设计一个主程序的必要性已经被证明是合理的。项目能力和学习成果已被定义。论述了信息物理系统专业计算机工程硕士课程的结构和相应的硕士培养结构逻辑方案。
{"title":"Master of Computer Engineering Program with a Specialization in Cyber-Physical Systems","authors":"A. Melnyk, A. Botchkaryov","doi":"10.23939/acps2019.01.037","DOIUrl":"https://doi.org/10.23939/acps2019.01.037","url":null,"abstract":"The problem of designing a master of computer engineering program with a specialization in cyber-physical systems has been considered. The concept of cyber-physical systems has been analyzed from the perspective of generalization and formalization for educational purposes. The need for designing a master program in cyber-physical systems has been justified. Program competencies and learning outcomes have been defined. The structure of the master of computer engineering program with a specialization in cyber-physical systems and the corresponding structural-logical scheme of master's training have been regarded.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131164516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finding the Global Minimum of the General Quadratic Problems During Deterministic Global Optimization in Cyber-Physical Systems 信息物理系统确定性全局优化中一般二次问题的全局最小值求解
Pub Date : 2019-03-23 DOI: 10.23939/acps2019.01.032
A. Kosolap
Cyber-Physical Systems (CPS) are integrations of computation and physical processes. We consider effective computations for designing difficult systems. In this paper, we propose new method of exact quadratic regularization for deterministic global optimization (EQR). This method can be used for the solution of a wide class of multiextreme problems, in particular, general quadratic problems. These problems will be transformed to maximization of norm a vector on convex set. The convex set is approximated by a polyhedron or intersection of balls. We offer the modified dual problem for maximization of norm a vector on intersection of balls. It allows to receive the solution of a primal problem. We use only local search (primal-dual interior point method) and a dichotomy method for search of a global extremum in the general quadratic problems.
信息物理系统(CPS)是计算和物理过程的集成。我们考虑有效的计算来设计困难的系统。本文提出了一种求解确定性全局优化问题的精确二次正则化方法。该方法可用于求解一类广泛的多极值问题,特别是一般的二次问题。这些问题将转化为凸集上范数向量的最大化问题。凸集由多面体或球的交点近似。给出了球交点上范数向量最大化的修正对偶问题。它允许接收原始问题的解。对于一般的二次问题,我们只使用局部搜索(原对偶内点法)和二分法来搜索全局极值。
{"title":"Finding the Global Minimum of the General Quadratic Problems During Deterministic Global Optimization in Cyber-Physical Systems","authors":"A. Kosolap","doi":"10.23939/acps2019.01.032","DOIUrl":"https://doi.org/10.23939/acps2019.01.032","url":null,"abstract":"Cyber-Physical Systems (CPS) are integrations of computation and physical processes. We consider effective computations for designing difficult systems. In this paper, we propose new method of exact quadratic regularization for deterministic global optimization (EQR). This method can be used for the solution of a wide class of multiextreme problems, in particular, general quadratic problems. These problems will be transformed to maximization of norm a vector on convex set. The convex set is approximated by a polyhedron or intersection of balls. We offer the modified dual problem for maximization of norm a vector on intersection of balls. It allows to receive the solution of a primal problem. We use only local search (primal-dual interior point method) and a dichotomy method for search of a global extremum in the general quadratic problems.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124922164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation Options of Key Retrieval Procedures for the IEEE 802.15.4 Wireless Personal Area Networks Security Subsystem IEEE 802.15.4无线个人区域网络安全子系统密钥检索程序的实现方案
Pub Date : 2019-03-23 DOI: 10.23939/acps2019.01.042
V. Melnyk
: The paper aims at providing the technical investigation on implementation options for the key retrieval security procedures and consequent security subsystem architecture in the IEEE 802.15.4 compatible devices. Since the security procedures typically consume most processing capacity of IEEE 802.15.4 device, an efficient implementation of the security subsystem is essential. A brief functional overview of the key retrieval procedures has been provided. General investigations on key retrieval procedures implementation have been performed. Three general approaches for implementation of key retrieval procedures in the security subsystem have been considered: a) software implementation; b) hardware implementation; and c) hardware-software implementation. The aim is to determine optimum implementation approach corresponding to low-cost and low-power consumption requirements. An expediency of hardware and software implementation of the key retrieval procedures has been estimated.
本文旨在对ieee802.15.4兼容设备中密钥检索安全程序及其安全子系统体系结构的实现方案进行技术研究。由于安全过程通常消耗IEEE 802.15.4设备的大部分处理能力,因此安全子系统的有效实现至关重要。提供了键检索过程的简要功能概述。对关键检索程序的执行情况进行了一般性调查。在安全子系统中考虑了三种实现密钥检索过程的一般方法:a)软件实现;B)硬件实现;c)硬件软件实现。其目的是确定符合低成本和低功耗要求的最佳实现方法。估计了实现密钥检索程序的硬件和软件的方便性。
{"title":"Implementation Options of Key Retrieval Procedures for the IEEE 802.15.4 Wireless Personal Area Networks Security Subsystem","authors":"V. Melnyk","doi":"10.23939/acps2019.01.042","DOIUrl":"https://doi.org/10.23939/acps2019.01.042","url":null,"abstract":": The paper aims at providing the technical investigation on implementation options for the key retrieval security procedures and consequent security subsystem architecture in the IEEE 802.15.4 compatible devices. Since the security procedures typically consume most processing capacity of IEEE 802.15.4 device, an efficient implementation of the security subsystem is essential. A brief functional overview of the key retrieval procedures has been provided. General investigations on key retrieval procedures implementation have been performed. Three general approaches for implementation of key retrieval procedures in the security subsystem have been considered: a) software implementation; b) hardware implementation; and c) hardware-software implementation. The aim is to determine optimum implementation approach corresponding to low-cost and low-power consumption requirements. An expediency of hardware and software implementation of the key retrieval procedures has been estimated.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130310731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Representative Fragment Method of Analyzing Complex Systems of Smart Contracts 智能合约复杂系统的代表性片段分析方法
Pub Date : 2019-03-23 DOI: 10.23939/acps2019.01.014
Michał Horodelski, P. Filipkowski
: The paper presents the use of states of explosion-proof method for analyzing the behavior of systems that provide smart contract technology. The selected example system is ShadowEth, whose main task is to ensure sufficient confidentiality of information stored in the Ethereum blockchain currency. The Petri network model for the ShadowEth system has been presented. The system properties according to the specifications have been defined. Properties described in a certain extension of the TCTL logic and verification have been carried out.
本文介绍了使用防爆状态方法来分析提供智能合约技术的系统的行为。所选择的示例系统是shadowweth,其主要任务是确保存储在以太坊区块链货币中的信息具有足够的机密性。提出了shadowweth系统的Petri网络模型。已根据规格定义系统属性。对属性描述进行了一定的扩展,对TCTL进行了逻辑和验证。
{"title":"A Representative Fragment Method of Analyzing Complex Systems of Smart Contracts","authors":"Michał Horodelski, P. Filipkowski","doi":"10.23939/acps2019.01.014","DOIUrl":"https://doi.org/10.23939/acps2019.01.014","url":null,"abstract":": The paper presents the use of states of explosion-proof method for analyzing the behavior of systems that provide smart contract technology. The selected example system is ShadowEth, whose main task is to ensure sufficient confidentiality of information stored in the Ethereum blockchain currency. The Petri network model for the ShadowEth system has been presented. The system properties according to the specifications have been defined. Properties described in a certain extension of the TCTL logic and verification have been carried out.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130311445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GDP in Value as a Measure for Evaluating Annual Data Flow Increase on IoT 价值GDP作为评估物联网年度数据流量增长的指标
Pub Date : 2019-02-26 DOI: 10.23939/acps2019.02.137
I. Zhukov, N. Pechurin, L. Kondratova, S. Pechurin
The article deals with the problem of assessing the primary data load on the IOT, generated by the year. GDP in the money presentation has been used to estimate the amount of information that enters the network directly from things. Having advanced the postulate that the amount of data emanating from a thing is proportional to the product of its mass (thing) by its specific orderliness, it is concluded that it is possible to use a volume of the generated order principle. Dual model allowing to estimate objective thing’s prices, has been proposed.
本文讨论了评估物联网上按年产生的主要数据负载的问题。货币表示法中的GDP被用来估计从事物直接进入网络的信息量。提出了一个假设,即从一个事物中产生的数据量与它的质量(事物)与它的特定有序性的乘积成正比,由此得出结论,可以使用生成有序原理的体积。提出了一种可以估计客观事物价格的二元模型。
{"title":"GDP in Value as a Measure for Evaluating Annual Data Flow Increase on IoT","authors":"I. Zhukov, N. Pechurin, L. Kondratova, S. Pechurin","doi":"10.23939/acps2019.02.137","DOIUrl":"https://doi.org/10.23939/acps2019.02.137","url":null,"abstract":"The article deals with the problem of assessing \u0000the primary data load on the IOT, generated by the year. \u0000GDP in the money presentation has been used to estimate \u0000the amount of information that enters the network directly \u0000from things. Having advanced the postulate that the \u0000amount of data emanating from a thing is proportional to \u0000the product of its mass (thing) by its specific orderliness, it \u0000is concluded that it is possible to use a volume of the \u0000generated order principle. Dual model allowing to estimate \u0000objective thing’s prices, has been proposed.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126432677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FPGA-based Digital Quantum Coprocessor 基于fpga的数字量子协处理器
Pub Date : 2018-11-10 DOI: 10.23939/acps2018.02.067
V. Hlukhov, B. Havano
{"title":"FPGA-based Digital Quantum Coprocessor","authors":"V. Hlukhov, B. Havano","doi":"10.23939/acps2018.02.067","DOIUrl":"https://doi.org/10.23939/acps2018.02.067","url":null,"abstract":"","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124297397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Context-Aware Task Sequence Planning for Autonomous Intelligent Systems 自主智能系统的上下文感知任务序列规划
Pub Date : 2018-11-10 DOI: 10.23939/acps2018.02.060
A. Botchkaryov
. The problem of context-aware task sequence planning by an autonomous intelligent system (intelligent agent) for a case of independent or loosely coupled tasks is considered. The principle of matching the task to the context was analyzed, the structure of the task sequence planning module and the algorithm of its work were proposed. The paper also proposes an algorithm for calculating the dynamic priority of a task, an algorithm for determining whether a task meets context, and an algorithm for adapting a set of rules for matching tasks to a context based on reinforcement learning in a stationary random environment with context dependence (contextual multi-armed bandit problem). The outline of the reinforcement learning procedure, implemented in the prototype of the task sequence planning module, has been proposed.
. 研究了独立任务或松散耦合任务的自主智能系统(智能体)上下文感知任务序列规划问题。分析了任务与上下文匹配的原理,提出了任务序列规划模块的结构及其工作算法。本文还提出了一种计算任务动态优先级的算法,一种确定任务是否满足上下文的算法,以及一种在具有上下文依赖的平稳随机环境中基于强化学习的一组任务匹配规则的算法(上下文多臂强盗问题)。提出了在任务序列规划模块原型中实现的强化学习过程的概要。
{"title":"Context-Aware Task Sequence Planning for Autonomous Intelligent Systems","authors":"A. Botchkaryov","doi":"10.23939/acps2018.02.060","DOIUrl":"https://doi.org/10.23939/acps2018.02.060","url":null,"abstract":". The problem of context-aware task sequence planning by an autonomous intelligent system (intelligent agent) for a case of independent or loosely coupled tasks is considered. The principle of matching the task to the context was analyzed, the structure of the task sequence planning module and the algorithm of its work were proposed. The paper also proposes an algorithm for calculating the dynamic priority of a task, an algorithm for determining whether a task meets context, and an algorithm for adapting a set of rules for matching tasks to a context based on reinforcement learning in a stationary random environment with context dependence (contextual multi-armed bandit problem). The outline of the reinforcement learning procedure, implemented in the prototype of the task sequence planning module, has been proposed.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126451508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sensors Monitoring and Analysis System for Cyberphysical System “Smart Home” 面向网络物理系统“智能家居”的传感器监测分析系统
Pub Date : 2018-11-10 DOI: 10.23939/acps2018.02.055
Ruslan Bachynskyy, Mykhailo Stefanivskyi
The system for various types of sensors monitoring and analysis has been described in the article. The system architecture and some aspects of implementation have been described.
本文介绍了该系统对各类传感器的监测和分析。描述了系统架构和实现的一些方面。
{"title":"Sensors Monitoring and Analysis System for Cyberphysical System “Smart Home”","authors":"Ruslan Bachynskyy, Mykhailo Stefanivskyi","doi":"10.23939/acps2018.02.055","DOIUrl":"https://doi.org/10.23939/acps2018.02.055","url":null,"abstract":"The system for various types of sensors monitoring and analysis has been described in the article. The system architecture and some aspects of implementation have been described.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128463738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Architecture Technical investigation for IEEE 802.15.4 Low-Rate Wirelesspersonal Area Networks IEEE 802.15.4低速率无线局域网安全体系结构技术研究
Pub Date : 2018-11-10 DOI: 10.23939/acps2018.02.092
V. Melnyk
The paper aims at providing the technical investigation on implementation options for the security subsystem architecture in the IEEE 802.15.4 compatible devices. Since the security procedures typically consume most processing capacity of IEEE 802.15.4 device, efficient implementation of the security subsystem is essential. A brief functional overview of the security procedures has been provided. General investigations on security procedures implementation have been performed. Three general approaches for security subsystem implementation have been considered: a) software implementation; b) hardware implementation; and c) hardware-software implementation. The aim is to determine optimum implementation approach corresponding to low-cost and low-power consumption requirements. A hardwaresoftware approach has been selected for the security subsystem implementation, and an expediency of the security procedures of hardware and software implementation has been estimated.
本文旨在对IEEE 802.15.4兼容设备中安全子系统体系结构的实现方案进行技术研究。由于安全过程通常消耗IEEE 802.15.4设备的大部分处理能力,因此安全子系统的有效实现至关重要。简要介绍了安全过程的功能。就保安程序的执行情况进行了一般调查。考虑了安全子系统实现的三种一般方法:a)软件实现;B)硬件实现;c)硬件软件实现。其目的是确定符合低成本和低功耗要求的最佳实现方法。选择了一种硬件软件的方法实现安全子系统,并对硬件和软件实现安全程序的方便性进行了估计。
{"title":"Security Architecture Technical investigation for IEEE 802.15.4 Low-Rate Wirelesspersonal Area Networks","authors":"V. Melnyk","doi":"10.23939/acps2018.02.092","DOIUrl":"https://doi.org/10.23939/acps2018.02.092","url":null,"abstract":"The paper aims at providing the technical investigation on implementation options for the security subsystem architecture in the IEEE 802.15.4 compatible devices. Since the security procedures typically consume most processing capacity of IEEE 802.15.4 device, efficient implementation of the security subsystem is essential. A brief functional overview of the security procedures has been provided. General investigations on security procedures implementation have been performed. Three general approaches for security subsystem implementation have been considered: a) software implementation; b) hardware implementation; and c) hardware-software implementation. The aim is to determine optimum implementation approach corresponding to low-cost and low-power consumption requirements. A hardwaresoftware approach has been selected for the security subsystem implementation, and an expediency of the security procedures of hardware and software implementation has been estimated.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131955223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Problems of Designing a Control Systemfor Decision Making Systems of Cyberphysical Systems 网络物理系统决策系统控制系统的设计问题
Pub Date : 2018-11-10 DOI: 10.23939/acps2018.02.084
Оlha Kolodchak
This work deals with the development of a structural model of decision-making tools for cyberphysical systems and with the development of a control system of decision-making tools for cyberphysics systems. The main difficulties in developing decision-making tools have been considered and analyzed. A structural model of decision making tools for cyberphysical systems and its characteristics has been considered. The estimation of hardware costs for the implementation of decision-making tools of cyberphysical systems has been made. The essence, purpose and properties of the control system have been disclosed. The cybernetic model of control system for decision making of cyberphysical systems has been presented. The basic parameters of the developed model have been given. Also, an experimental mobile cyberphysics system for recognizing objects (road signs) from a video stream for car drivers has been presented.
这项工作涉及网络物理系统决策工具结构模型的开发,以及网络物理系统决策工具控制系统的开发。对开发决策工具的主要困难进行了考虑和分析。研究了网络物理系统决策工具的结构模型及其特征。对网络物理系统决策工具实施的硬件成本进行了估算。揭示了该控制系统的本质、目的和性能。提出了用于信息物理系统决策的控制系统的控制论模型。给出了模型的基本参数。此外,还提出了一种实验性移动网络物理系统,用于从汽车驾驶员的视频流中识别物体(道路标志)。
{"title":"Problems of Designing a Control Systemfor Decision Making Systems of Cyberphysical Systems","authors":"Оlha Kolodchak","doi":"10.23939/acps2018.02.084","DOIUrl":"https://doi.org/10.23939/acps2018.02.084","url":null,"abstract":"This work deals with the development of a structural model of decision-making tools for cyberphysical systems and with the development of a control system of decision-making tools for cyberphysics systems. The main difficulties in developing decision-making tools have been considered and analyzed. A structural model of decision making tools for cyberphysical systems and its characteristics has been considered. The estimation of hardware costs for the implementation of decision-making tools of cyberphysical systems has been made. The essence, purpose and properties of the control system have been disclosed. The cybernetic model of control system for decision making of cyberphysical systems has been presented. The basic parameters of the developed model have been given. Also, an experimental mobile cyberphysics system for recognizing objects (road signs) from a video stream for car drivers has been presented.","PeriodicalId":188480,"journal":{"name":"Advances in Cyber-Physical Systems","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121152114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Advances in Cyber-Physical Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1