This book provides an overview of recent innovations and achievements in the broad areas of cyber-physical systems (CPS), including architecture, networking, systems, applications, security, and privacy. The book discusses various new CPS technologies from diverse aspects to enable higher level of innovation towards intelligent life. The book provides insight to the future integration, coordination and interaction between the physical world, the information world, and human beings. The book features contributions from renowned researchers and engineers, who discuss key issues from various perspectives, presenting opinions and recent CPS-related achievements.Investigates how to advance the development of cyber-physical systems
Provides a joint consideration of other newly emerged technologies and concepts in relation to CPS like cloud computing, big data, fog computing, and crowd sourcing
Includes topics related to CPS such as architecture, system, networking, application, algorithm, security and privacy
Abstract—In the future communication applications, users
may obtain their messages that have different importance levels
distributively from several available sources, such as distributed
storage or even devices belonging to other users. This
scenario is the best modeled by the multilevel diversity coding
systems (MDCS). To achieve perfect (information-theoretic)
secrecy against wiretap channels, this paper investigates the
fundamental limits on the secure rate region of the asymmetric
MDCS (AMDCS), which include the symmetric case as a special
case. Threshold perfect secrecy is added to the AMDCS model.
The eavesdropper may have access to any one but not more than
one subset of the channels but know nothing about the sources,
as long as the size of the subset is not above the security level.
The question of whether superposition (source separation) coding
is optimal for such an AMDCS with threshold perfect secrecy
is answered. A class of secure AMDCS (S-AMDCS) with an
arbitrary number of encoders is solved, and it is shown that linear
codes are optimal for this class of instances. However, in contrast
with the secure symmetric MDCS, superposition is shown to
be not optimal for S-AMDCS in general. In addition, necessary
conditions on the existence of a secrecy key are determined as a
design guideline.
Two important microwave remote sensors are the radar and the radiometer.
There have been a number of books written on various aspects of radar, but
there have been only a few written on microwave radiometers, especially on sub-
jects of how to design and build radiometer systems. This book, which is the
second edition of a book originally published in 1989, attempts to fill this void.
Recently millimeter-wave bands have been postu-
lated as a means to accommodate the foreseen extreme bandwidth
demands in vehicular communications, which result from the
dissemination of sensory data to nearby vehicles for enhanced
environmental awareness and improved safety level. However, the
literature is particularly scarce in regards to principled resource
allocation schemes that deal with the challenging radio conditions
posed by the high mobility of vehicular scenarios
Two important microwave remote sensors are the radar and the radiometer.
There have been a number of books written on various aspects of radar, but
there have been only a few written on microwave radiometers, especially on sub-
jects of how to design and build radiometer systems. This book, which is the
second edition of a book originally published in 1989, attempts to fill this void.
Recently millimeter-wave bands have been postu-
lated as a means to accommodate the foreseen extreme bandwidth
demands in vehicular communications, which result from the
dissemination of sensory data to nearby vehicles for enhanced
environmental awareness and improved safety level.
The contemporary view of the Smart City is very much static and infrastructure-
centric, focusing on installation and subsequent management of Edge devices and
analytics of data provided by these devices. While this still allows a more efficient
management of the city’s infrastructure, optimizations and savings in different do-
mains, the existing architectures are currently designed as single-purpose, vertically
siloed solutions. This hinders active involvement of a variety of stakeholders (e.g.,
citizens and businesses) who naturally form part of the city’s ecosystem and have an
inherent interest in jointly coordinating and influencing city-level activities.