Design time considerations for cyber physical systems

Awais Usman*, Hamid Mukhtar

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Cyber physical systems are complex systems which monitor, sense or interact with the environment, gather information with the help of different types of sensors or mobile devices, propagate the sensed data to a processing unit via WAN, LAN, MANET, VANET or overlay network, the processing unit process, analyze and store the received data, and based on the nature of the data or input send instructions to actuators to alter or try to alter the environment, or raise alarm, or send notifications to concerned devices or peoples already registered with the CPS for a particular type of event. Designing such a complex system is not an easy task and there are a number of important factors that should be taken care while designing these systems. A good number of studies have already focused on these requirements but for a particular type of cyber physical systems. In this work some of the general requirements are highlighted. These requirements are more of a MUST TO HAVE requirements rather than GOOD TO HAVE.

Original languageEnglish
Title of host publicationProceedings - 10th International Conference on Frontiers of Information Technology, FIT 2012
Pages275-281
Number of pages7
DOIs
Publication statusPublished - 2012
Event10th International Conference on Frontiers of Information Technology, FIT 2012 - Islamabad, Pakistan
Duration: 17 Dec 201219 Dec 2012

Publication series

NameProceedings - 10th International Conference on Frontiers of Information Technology, FIT 2012

Conference

Conference10th International Conference on Frontiers of Information Technology, FIT 2012
Country/TerritoryPakistan
CityIslamabad
Period17/12/1219/12/12

Keywords

  • Cyber physical system (CPS)
  • Mobile cyber physical system MCPS)

ASJC Scopus subject areas

  • Information Systems

Fingerprint

Dive into the research topics of 'Design time considerations for cyber physical systems'. Together they form a unique fingerprint.

Cite this