Читать книгу Cyber-physical Systems - Pedro H. J. Nardelli - Страница 4

List of Illustrations

Оглавление

1 Chapter 1Figure 1.1 Illustration of a CPS. Sensors measure physical processes, whose ...Figure 1.2 Operation of smart meters that react to hourly electricity price....

2 Chapter 2Figure 2.1 Illustration of the Maxwell's demon thought experiment.Figure 2.2 Truth tables and logic gates of AND, OR and NOT operations.

3 Chapter 3Figure 3.1 (a) Dominoes set; (b) example of a game.Figure 3.2 Example of a frequency diagram related to the observations of the...Figure 3.3 Domino tile in horizontal position: one number at the left side, ...Figure 3.4 Example of a frequency diagram related to the observations of the...Figure 3.5 Example of a frequency diagram related to the attribute with ...Figure 3.6 Example of a probability mass function diagram related to the ran...Figure 3.7 Poisson random variable considering two different client arrival ...Figure 3.8 Maxwell–Boltzmann probability density function of the random vari...Figure 3.9 Example of a random process. The number of persons in a queue, me...Figure 3.10 Markov chain representing a random variable defined by the dif...

4 Chapter 4Figure 4.1 Relation between entropy functions and mutual information for two...Figure 4.2 Tree representing yes‐or‐no questions to resolve the uncertainty ...Figure 4.3 Diagram of a general communication system by Shannon.Figure 4.4 Car in a highway and level of processes.

5 Chapter 5Figure 5.1 Euler's approach to prove that the problem has no solution.Figure 5.2 Example of an undirected network with nodes and links.Figure 5.3 Example of different network topologies.Figure 5.4 Example of a WS network.Figure 5.5 Map of the Berlin S‐Train.Figure 5.6 Snapshot of the spatiotemporal propagation of flu using Nextstrai...Figure 5.7 World airline routes.

6 Chapter 6Figure 6.1 Examples of centralized, decentralized, and distributed networks....Figure 6.2 Rectangle with a fixed perimeter of length .Figure 6.3 Area of a rectangle considering a fixed perimeter of 20 m. The ma...Figure 6.4 Random access in wireless networks.Figure 6.5 Spatial throughput in wireless networks as a function of the prob...Figure 6.6 Game in the extensive form.Figure 6.7 Dove and hawk game in the extensive form.Figure 6.8 Example of the implementation of the alarm system using logic cir...

7 Chapter 7Figure 7.1 Electric circuit with direct current: a constant voltage source ...Figure 7.2 Dissipated power measured in watts as a function of the constant ...Figure 7.3 Data layer with four cyber elements: three representing the dissi...Figure 7.4 Numerical example of a realization of the stochastic processes ...Figure 7.5 Self‐developing electric circuit: impact of decision rules and in...

8 Chapter 8Figure 8.1 Typical block diagram of (negative) feedback control.Figure 8.2 Example of a continuous‐time signal .Figure 8.3 Schematic of a system whose input signal is and output signal...Figure 8.4 RC circuit with an input signal and an output ; both are measu...Figure 8.5 Example of the input and output signals in the RC circuit present...Figure 8.6 Example of a discrete‐time signal .Figure 8.7 Example of a two‐dimensional cellular automaton. Black cells are ...Figure 8.8 Temporal development of an elementary CA with rule 30 for and i...Figure 8.9 Development of an elementary CA with different rules (from 65 to ...Figure 8.10 Example of an electric circuit with agents.Figure 8.11 Numerical example of the CPS for m and . The input is in...Figure 8.12 Dynamics of CPS for rules 54 and 73 considering V, m, and...Figure 8.13 Dynamics of CPS for different rules and initial conditions con...Figure 8.14 Dynamics of CPS for different rules 110 and 54 considering V...Figure 8.15 Dynamics of CPS for rule 254 considering V, m, and fo...

9 Chapter 9Figure 9.1 Illustration of a small‐scale data network.Figure 9.2 Travel from Helsinki to São Paulo via Paris following a layered a...Figure 9.3 Seven layers of the OSI model.Figure 9.4 OSI reference model and the Internet protocol stack.Figure 9.5 Encapsulation of a generic data transfer over the Internet.Figure 9.6 Current five generations of cellular systems in 2021.Figure 9.7 5G applications and their requirements in terms of rate, reliabil...Figure 9.8 Cloud vs. edge computing.Figure 9.9 Predicting the electricity demand from air temperature based on l...Figure 9.10 ML methods classified as a combination of data, model, and loss ...Figure 9.11 Federated learning.Figure 9.12 Distributed ledger technology. Source: Adapted from [19].Figure 9.13 Proposed stages of the Quantum Internet development.Figure 9.14 Performance gains after Moore's law.Figure 9.15 Throughput (from 0 to 1) as a function of traffic (expected pack...

10 Chapter 10Figure 10.1 Illustration of the three layers of CPSs and their physical depl...Figure 10.2 Process flow diagram of the TEP.Figure 10.3 Proposed communication and storage architecture for fault detect...Figure 10.4 Fault detection in the TEP considering Fault 5 in Table 10.2. Th...Figure 10.5 Illustration of a power grid.Figure 10.6 Direct current circuit representing the physical layer of the sy...Figure 10.7 Self‐developing system dynamics considering an external perturba...Figure 10.8 Cyber‐physical public health surveillance system.Figure 10.9 Illustrative example of undesirable consequences of navigation a...Figure 10.10 Process monitoring loop.Figure 10.11 Energy data acquisition in an industrial process.

11 Chapter 11Figure 11.1 Illustration of three different packetized electricity demand pr...Figure 11.2 Number of publications in the Scopus database containing the ter...Figure 11.3 Boyd's OODA loop.Figure 11.4 Example of Beer's VSM.

12 Chapter 12Figure 12.1 From the first to the fourth industrial revolution.

Cyber-physical Systems

Подняться наверх