I am currently studying the relationship between the cyber-physical systems and its predecessor, embedded systems. I am look for survey papers, literature reviews and classical references.
I am giving special concentration to the security aspects.
Hi, there is an e-book by E. A. Lee and S. A. Seshia named "Introduction to Embedded Systems - A Cyber-Physical Systems Approach"
Hope it helps
http://leeseshia.org/releases/LeeSeshia_DigitalV1_08.pdf
Thank You Dr. Pala. I had gone through this earlier. But this isn't exactly what I am looking for. I need more resources and literature.
i think this book is the right one:
Embedded System Design: Embedded Systems Foundations of Cyber-Physical
Systems
there is a publication or slides about it here on Researchgate: http://www.researchgate.net/publication/234125635
http://www.springer.com/us/book/9789400702561
Book Embedded System Design: Embedded Systems Foundations of Cybe...
The modern trend for value creation in the industry to involve the customers in the process. What are the strategies that are available that are used for customer value co-creation in...
03 April 2016 2,170 1 View
The topics of CPS and i4.0 are very interesting. The innovative implementation of CPS and IoT of i4.0 towards forming a hybrid of products and services (or PSS) leads the most advanced...
02 March 2016 3,239 6 View
31 December 2015 9,033 1 View
CPS have become of the the major research fields in the recent times. Its sensing, computing and actuating nature makes an excellent system for medical applications. What are the various...
08 September 2015 1,145 3 View
The consideration of an article and its first decision may take a very long time. Is it possible to submit the same article to more than one journal for consideration? And publish in the journal...
08 September 2015 8,600 29 View
I am conducting a survey to find a relationship between religious belief and happiness. This will be done by taking people's responses to a questionnaire and performing a statistical analysis with...
06 July 2015 3,568 1 View
I think they must be from ARM and Intel. Maybe Cortex A15 of ARM and 4th Generation core processors of Intel.
09 October 2013 1,172 5 View
Booth's Algorithm for Multiplication and Restoring Method for Division are some examples. What are other methods implemented?
09 October 2013 5,336 6 View
Self transcribing is slow but helps the the researcher to identify the ideas from the start. Using a paid service is faster but may not be ethical since the data may be sensitive to share....
01 January 1970 4,216 7 View
effect of double bond on the flexibility of polymers
07 April 2021 0 0 View
I am writing to request some information for making polymer color flakes. I would appreciate the help.
17 March 2021 0 0 View
I'm targeting to deploy a mesh network and manually configure MANET routing protocols. I'm preparing scenarios, architectures, and hard devices needed to do that. Are there some step-by-step...
03 March 2021 1,931 5 View
I have dataset which shows the length of power lines. I need to classify the lines based on the line length. Is there a rule to classify the High voltage (HV) and low voltage (LV) lines based on...
03 March 2021 4,116 4 View
I have conducted and published a systematic review and meta-analysis research with the topic related to public health and health pomotion (protocol was registed in PROSPERO). Now we want to...
03 March 2021 8,920 3 View
1. What is the impact of having different scales in a survey? and how can we solve this problem before and after data collection (Literature-based reflection)? Thank you for your time and for...
03 March 2021 2,870 3 View
The range of forms and sizes of cavities in rock is very big. Is there a classification scheme for rock cavities regarding their size and shape?
02 March 2021 4,511 3 View
02 March 2021 3,060 3 View
It is oftentimes said to be a distinctive metallographic trait that differentiates a fully austenitic and a fully felly ferritic steel without etching that might distinguish between two. Why...
02 March 2021 728 2 View
Is there a powerful system for the security of the systems distributed on IoT systems?
02 March 2021 3,858 10 View