Login  |  Join Us  |  Subscribe to Newsletter
Login to View News Feed and Manage Profile
☰
Login
Join Us
Login to View News Feed and Manage Profile
Agency
Agency
  • Home
  • Information
    • Discussion
    • Articles
    • Whitepapers
    • Use Cases
    • News
    • Contributors
    • Subscribe to Newsletter
  • Courses
    • Data Science & Analytics
    • Statistics and Related Courses
    • Online Data Science Courses
  • Prodigy
    • Prodigy Login
    • Prodigy Find Out More
    • Prodigy Free Services
    • Prodigy Feedback
    • Prodigy T&Cs
  • Awards
    • Contributors Competition
    • Data Science Writer Of The Year
    • Data Science Awards 2021
  • Membership
    • Individual
    • Organisational
    • University
    • Associate
    • Affiliate
    • Benefits
    • Membership Fees
    • Join Us
  • Consultancy
    • Professional Services
    • Project Methodology
    • Unlock Your Data
    • Advanced Analytics
  • Resources
    • Big Data Resources
    • Technology Resources
    • Speakers
    • Data Science Jobs Board
    • Member CVs
  • About
    • Contact
    • Data Science Foundation
    • Steering Group
    • Professional Standards
    • Government And Industry
    • Sponsors
    • Supporter
    • Application Form
    • Education
    • Legal Notice
    • Privacy
    • Sitemap
  • Home
  • Information
    • Discussion
    • Articles
    • Whitepapers
    • Use Cases
    • News
    • Contributors
  • Courses
    • Data Science & Analytics
    • Statistics and Related Courses
    • Online Data Science Courses
  • Prodigy
    • Prodigy Login
    • Prodigy Find Out More
    • Prodigy Free Services
    • Prodigy Feedback
    • Prodigy T&Cs
  • Awards
    • Contributors Competition
    • Data Science Writer
    • Data Science Awards 2021
  • Membership
    • Individual
    • Organisational
    • University
    • Associate
    • Affiliate
    • Benefits
    • Membership Fees
    • Join Us
  • Consultancy
    • Professional Services
    • Project Methodology
    • Unlock Your Data
    • Advanced Analytics
  • Resources
    • Big Data Resources
    • Technology Resources
    • Speakers
    • Data Science Jobs Board
    • Member CVs
  • About
    • Contact
    • Data Science Foundation
    • Steering Group
    • Professional Standards
    • Government And Industry
    • Sponsors
    • Supporter
    • Application Form
    • Education
    • Legal Notice
    • Privacy
    • Sitemap
  • Subscribe to Newsletter

Cyber Physical Systems

19 April 2020
Balakrishnan Subramanian
Views (4434)
Comments (7)
Author Profile
Other Articles
Follow (81)

Share with your network:

1. OVERVIEW

The term “Cyber Physical system” was initially coined by Ellen Gill in 2006. CPS is a category of embedded system.  It is often called a Next Generation Computing System which uses smart computation techniques associated with physical world and computational units. The CPS can interact with the real-world systems by means of Computation, Communication and controls. The interaction of computational and physical units leads to advanced implementations of Internet of Things (IoT). IoT and CPS are designed to support real time applications which can manage many environmental datasets. In other words, CPS is a combination of digital controls and the physical environment.

2. INTRODUCTION

The Cyber Physical System consists of cyber components and physical components, so we call it as cyber physical system. CPS is based on an information processing computer system, which is embedded into a product, like a car, plane or other device. These computer systems are used to perform specific tasks.

For Example, in a car an embedded system would be the ABS (Anti-lock / Anti-Skid Braking System) to control break force. This computer system interacts with the physical environment by means of Sensors and Actuators. These embedded systems are no longer standalone, they share their data via communication networks such as the internet with cloud computing where data from many embedded systems can be collected and processed. Thereby creating a system of systems. Connected embedded systems can be controlled and decentralized by a computational unit. The collected data can be processed automatically or by Human Machine Interface (HMI).

IoT is a technology, in which devices are connected through the internet and enables the remote collection of real time information which can them be processed or shared with other devices.

CPS’s are powered by two types of computing system:

(i) Notebooks, Desktop servers and PCs. Computers at every desk to do business activities
(ii) Embedded Computing - Transformation of Industry and Invisible part of Environment.

The main characteristics of CPS are:

(i) Intelligence - Adaptive and Robustness
(ii) Network – Communication, Cooperation and Cloud solutions
(iii) Functionality
(iv) User friendly. The main features are as follows: CPS is said to be closely integrated with computation and physical processes, the software is embedded with physical systems and CPS networks use wireless sensor networks.

3. APPLICATIONS

The application of CPS have the potential to introduce significant changes in information intensive technology sectors such as manufacturing, water distribution systems, transportation, healthcare and smart buildings.

Manufacturing:

In manufacturing environment CPS’s are used for self-monitoring the production operations and control. CPS improves manufacturing processes by sharing information between machines, supply chain, suppliers, business systems and customers. Smart manufacturing provides high visibility controls on the supply chain which results in improving the traceability and security of goods. The impact of IoT and CPS in manufacturing industry is significantly growing. Sensors are used to predict equipment wear and diagnose faults. The analytics reduces the maintenance cost and increases operation performance.

Manufacturing industries works under a five-level architecture.

Connection- Data is generated by machines, tools and the product
Conversion- Using algorithms it converts the data to information.
Cyber- Processes the information and creates additional value. Cyber level acts a hub (cloud) and performs complex operations. Cyber level runs on sophisticated manufacturing methods, runs deep learning algorithms to identify large data patterns. This level focuses on standalone systems which uses the data from the system to attain additional knowledge.
Cognition- Converts machine signals to information to compare the information with other outcomes. In this level the machine monitors and diagnoses its own failures and become aware of potential problems.
Configuration- a machine can track and detect failures early and sends information to the operation level. Machines can amend their operation depending on workloads or malfunctions.

These measures produce a system in which machines can defend themselves from difficulties by finding alternate solutions and preventing operation failures.

The 5c structure uses different levels of operations:

Component level: Contains virtual twins that exists in cyber space. The twin models the critical components of a machine. It captures the changes in the operations on the cloud. The system would gain self awareness by this mechanism.
Machine Level: Incorporates the information gathered in the component level which is combined with machine operations to create new modules for each machine. Similar Virtual twins are compared with other machines to quantify performance.
Fleet Level: Optimize production processes through the performance of machines and component status from component and machine levels. These level result in self configuring and self maintenance and has the benefit of maximizing the life span of all components, leading to increased production quality.
Enterprise Level: This level incorporates the outcome of previous levels to produce a high-performance production rate.

Water Distribution Systems:

Water Distribution systems are becoming increasingly automated. These systems consist of reservoirs, tanks, pumps, wells and pipes that deliver water to our taps. As well as devices to monitor activity such as sensors to detect the level of overflow of water from a tank or the pressure from the pipe. And programmable Logic Controls which can automatically open valves and supervisory controls and data acquisition systems that monitor controls all the devices in the network. While all these innovations allow the system to run more efficiently and reliably. They also expose the system to potential attacks on the software that controls it. If the hacker can remotely access the components of the CPS, they could do all sorts of damage ranging from stealing data, cutting of water supplies, damaging the equipment or even releasing chemicals used in processing into the system. Hackers can spy on the system with eavesdropping attacks or by initiating deception attacks.

It is difficult to detect the attacks on the system by human oversight and by machine detection algorithms. In order to overcome these attacks two types of tools are used. The first one is an ‘Attack Model’ the other is a ‘Toolbox’. The Attack model describes the different way the hackers might compromise the system and the Toolbox runs on a MATLAB which is widely used engineering computing software. The Toolbox gathers the attack models and automatically runs on Epanet. An Epanet is an industry standardized software modeling tool which describes how water flows through the system. The Epanet utilizes the CPA toolbox to track the actual physical status of the system and the reported cyber status of the system which detects external changes introduced by the hackers.

Smart Greenhouse:

CPS play a vital role in the field of agriculture; it improves productivity and prevents starvation. The system focuses on an adaptive method with several parameters such as temperature, humidity, irrigation and amount of light. This responds to the parametric changes according to specific computer programs which are designed to ensure a better growth. Further it reports feedback continuously to the users to keep them informed about the condition of the greenhouse. Feedback can be managed easily by remote locations using network service. The design consist of sensors which act as a station sensor which includes temperature, humidity, soil moisture and light sensors and it adds other sensors like temperature and humidity control system in which the fan, sprinklers and other devices can be used for increasing and decreasing the temperature.

Benefits:

  • It saves the farmers money, time and effort
  • Provides better environment and increases in productivity
  • The amount of water needed is controlled and supplied automatically

Health Care:

Most of medical systems use cyber physical systems, they use real time monitoring and remote sensing of physical conditions of the patients. This leads to improved treatments for disabled and elderly patients and limits patient hospitalization. In future these systems will be combined into a network closed loop system incorporating a human loop to improve the safety and workflows.

Transportation:

Vehicles can communicate with each other by sharing real time information such as traffic, locations and issues to prevent from accident and improve safety. Vehicles function will be executed in a distributrd manner by enhancing performance and emission reduction. For example, the branking system not only stops the car also it avoids a potential collision.

Buildings:

CPS enabled buildings are called “smart buildings”. The function significantly improves energy efficiency and decreases energy consumption and greenhouse gas emissions. A network is used to sense the temperature, humidity and operate actuators (HVAC, fans, water heater) is embedded into the building to detect changes in the environment.

Claytronics:

Claytronics – a technology to create virtual reality with which human interaction is possible. IT combines nano scale robots and computer theory to make nanometer-scale systems called claytronic atoms / catoms. These catoms can interact with others to make 3D structures. The goal of claytroics is to create dynamic motion in three dimensional objects. Two types of algorithms are being used in Claytronics, shape sculpting and localization. The collective actuation and hierarchal planning require shape sculpting algorithms by which it converts the catoms into the desired structure and dimension. The localization algorithm enables the positioning of catoms in the ensemble.

4. CONCLUSION

Cyber physical systems are intelligent system that combine hardware and software and are connected through a network as the physical world merges with the virtual world into cyberspace. The innovation of CPS’s relies on the input of many disciplines and requires a skilled workforce to support and maintain its development. It has the potential to change and improve lives and to address many critical challenges.

Like (26)
Download

Email a PDF Whitepaper

If you found this Article interesting, why not review the other Articles in our archive.

Login to Comment and Like

Comments:

Pechi Muthu

19 Apr 2020 12:03:35 PM

Nice article sir ,gives many information about cyber physical system ,lt is very simple and delivered basic idea of cyber physical system

Bibin George

19 Apr 2020 12:37:29 PM

Good work....gives an idea about the Next Generation Computing System and the implementation of the Internet of Things (IoT).

Subrata Chowdhury

19 Apr 2020 01:00:41 PM

The work is very informative and useful for the Beginners to learn and develop .Aslo for the Researcher to implement the IoT with this work.Very good work.

Thamaraikannan NATARAJAN

19 Apr 2020 02:09:01 PM

Useful one especially this article deals Healthcare that is the hour of the need also. . .

RETHISH Nair

19 Apr 2020 02:39:51 PM

Informative and reference in the field of latest cyber systems.... Security and privacy of our data is prime important..

Balasubramanian Thangaiah

20 Apr 2020 01:15:18 AM

Very wonderful article. It is very useful in this modern IOT era. Very well explained, even beginners can understand. Appreciating You!!! Keep it up!!!

Raja Srinivasan

20 Apr 2020 11:50:36 AM

Hi Prof. Bala, it's really appreciated and the content provided in the link shares good inceptions on NEXTGEN CompSystems. and more of IOT Implementations. Thanks & expecting more such from you Professor ... ! ! !

Go to discussion page

Categories

  • Data Science
  • Data Security
  • Analytics
  • Machine Learning
  • Artificial Intelligence
  • Robotics
  • Visualisation
  • Internet of Things
  • People & Leadership
  • Other Topics
  • Top Active Contributors
  • Balakrishnan Subramanian
  • Abhishek Mishra
  • Mayank Tripathi
  • Santosh Kumar
  • Michael Baron
  • Recent Posts
  • Hadoop and MapReduce
    21 December 2020
  • The Concept of Data Quality and Its Importance
    17 December 2020
  • Leadership and what it means in challenging times
    16 December 2020
  • How Data Visualization Will Evolve In Future
    14 December 2020
  • Most Liked
  • Cyber Physical Systems
    Likes: 26
    Views: 4433
  • Green Computing: The Future of Computing
    Likes: 23
    Views: 824
  • Why AI is a great match for your data strategy
    Likes: 18
    Views: 1043
  • Advances in Data Science 2018: Final Speakers & Discussion Themes
    Likes: 16
    Views: 1237
  • Detecting Fraud Using Machine Learning
    Likes: 15
    Views: 644
To attach files from your computer

    Comment

    You cannot reply to your own comment or question. You can respond to another member's comment in this thread.

    Get in touch

     

    Subscribe to latest Data science Foundation news

    I have read and agree to the Data science Foundation Privacy Policy

    • Home
    • Information
    • Resources
    • Membership
    • Services
    • Legal
    • Privacy
    • Site Map
    • Contact

    © 2021 Data science Foundation. All rights reserved. Data S.F. Limited 09624670

    Site By-Peppersack

    We use cookies

    Cookie Information

    We are using cookies to provide statistics that help us to improve your experience of our site. You can choose to use the site without cookies. However, by continuing to use the site without changing your settings, you are agreeing to our use of cookies.

    Contact Form

    This member is participating in the Prodigy programme. This message will be directed to Prodigy Admin the Prodigy Programme manager. Find out more about Prodigy

    Complete your membership listing and tell others about your interests, experience and qualifications with a Personal Profile page.

    Add a Personal Profile

    Your Personal Profile page is missing information about your experience and qualifications that other members would find interesting. Click here to update.

    Login / Join Us

    Login to your membership account to view your personalised news feed, update your profile, manage your preferences. publish articles and to create a following.

    If you are not a member but work with or have an interest in Data Science, Machine Learning and Artificial Intelligence, join us today.

    Login | Join Us

    Support the work of the Data Science Foundation

    Help to fund our work and enable us to provide free communications and knowledge sharing services to members across the globe.

    Click here to set-up a donation of £30 per year

    Follow

    Login

    Login to follow this member

    Login