This paper addresses the problem of network modelling and its application in consensus control of networked Multi Agent systems (NMASs). These NMASs experience network imperfections such as variable time delays and pa...
详细信息
ISBN:
(纸本)9798350373981;9798350373974
This paper addresses the problem of network modelling and its application in consensus control of networked Multi Agent systems (NMASs). These NMASs experience network imperfections such as variable time delays and packet dropouts, where some researchers sought a model that predicts the same behaviour of these imperfections. Earlier studies had two models predicting the behaviour of each network imperfection independently in a scheme called the Two Independent Model Scheme (TIMS). A new approach of modelling the behaviour of the network, based on the Semi-Continuous Hidden Markov Model (SCHMM), is introduced in this paper. This was achieved through introducing a Dirac-delta function alongside the Gaussian distributions in the SCHMM. The new model predicts time delays and packet dropouts, in a homogeneous manner, in a Single Model Scheme (SMS). A Smith Predictor (SP) scheme was implemented for the consensus control of NMASs to mitigate the effects of network limitations. The numerical analysis shows that the new model is more accurate in representing the network limitations, and shows that its performance is better at mitigating the effects of network imperfections in the consensus control problem.
This paper investigates the evolution of Secondary Voltage Regulation (SVR) in response to the increasing penetration of enewable energy sources (RES) within power systems. Traditional SVR, historically reliant on fos...
详细信息
ISBN:
(纸本)9798350386509;9798350386493
This paper investigates the evolution of Secondary Voltage Regulation (SVR) in response to the increasing penetration of enewable energy sources (RES) within power systems. Traditional SVR, historically reliant on fossil fuel-based plants, faces challenges stemming from their under-utilization and intermittent operation. As conventional power plants decline, emerging resources such as synchronous compensators and STATCOMS offer voltage control capabilities without compromising RES integration, prompting the need for a redesigned control system to effectively harness their capabilities and optimize voltage regulation performance in an increasingly dynamic network environment. In this evolving scenario, a review of SVR literature reveals a shift towards data-driven methodologies, leveraging real-world data for improved control strategies. To address these challenges, a new Secondary Voltage Regulator is proposed based on a data-driven Model Predictive control (MPC) approach, designed for offset-free tracking. The suggested approach, known for its proficiency in tracking, has been adjusted to provide an implementation suitable for the Italian transmission system. Field tests conducted on Sicilian transmission network validate the effectiveness of the MPC-based controller under real-world conditions, filling an important gap in understanding its performance and applicability in transmission systems.
The purpose of this paper is to develop a security tracking controller for discrete-time delayed stochastic networkcontrolsystems (SNCSs) that are vulnerable to stochastic cyber attacks. The presented strategy, call...
详细信息
ISBN:
(纸本)9798350387780;9798350387797
The purpose of this paper is to develop a security tracking controller for discrete-time delayed stochastic networkcontrolsystems (SNCSs) that are vulnerable to stochastic cyber attacks. The presented strategy, called the Dynamic Event-Triggered Communication Approach (DETCA), adapts the volume of data transmitted across the network based on fluctuations in tracking error system, while concurrently maintaining the desired level of the tracking performance. These stochastic cyber attacks encompass deception attacks and denial-of-service (DoS), which may occur during signal transmission over the network. Based on Lyapunov stability theory, a sufficient condition is provided for guaranteeing the asymptotic stability of the tracking error system. The linear matrix inequalities (LMIs) are employed to solve the event-triggering parameters and the tracking controller gain. The efficacy of the proposed theoretical results is lastly demonstrated by a simulation example provided.
Even though a variety of methods have been proposed in the literature, efficient and effective latent-space control (i.e., control in a learned low-dimensional space) of physical systems remains an open challenge. We ...
Renewable energy generation has attracted the interest of researchers, but it is volatile, and management systems are vulnerable to malicious attacks. Therefore, security issues are of paramount importance for energy ...
ISBN:
(纸本)9781611977653
Renewable energy generation has attracted the interest of researchers, but it is volatile, and management systems are vulnerable to malicious attacks. Therefore, security issues are of paramount importance for energy management systems. In this paper, we propose a secure Q-learning-based energy network management system (SQEMS), which consists of an anomaly detection module, a fuzzy control module to mitigate attacks, and a decision-making module to manage the energy grid. Experimental results show that the proposed anomaly detection module has excellent performance on malicious suppliers attacks (MS), and the fuzzy control module can further mitigate the negative effects of false predictions. The robustness analysis shows the effectiveness, robustness, and transferability in anomaly detection and energy management.
With the development of modern industrialization, the network security issues of industrial controlsystems have become increasingly severe, necessitating enhanced research on the vulnerability mechanisms of industria...
详细信息
ISBN:
(纸本)9798400709784
With the development of modern industrialization, the network security issues of industrial controlsystems have become increasingly severe, necessitating enhanced research on the vulnerability mechanisms of industrial controlnetwork security. In response to the physical layer vulnerability issues in industrial controlnetworks, a vulnerability analysis and performance quantification method based on deterministic and stochastic Petri net (DSPN) model is proposed. This method establishes a DSPN model using the Ethernet transmission mechanism as an example. Firstly, it qualitatively analyzes the possible abnormal states of the physical layer after being attacked. Then, it quantitatively analyzes the throughput and delay of the physical layer under abnormal states using DSPN tools and queuing theory. A simulation analysis was conducted on the throughput and transmission delay after the attack, and the result indicates that the Ethernet link negotiation mechanism is vulnerable. Timely wireless pulse injection can cause the port status to be abnormal. Although it does not lead to communication interruption, it will seriously affect communication performance.
This research explores the application of policy gradient methods in multi-agent reinforcement learning, augmented with offline reinforcement Learning techniques. The goal is to leverage these methods to improve commu...
详细信息
ISBN:
(纸本)9798350374247;9798350374230
This research explores the application of policy gradient methods in multi-agent reinforcement learning, augmented with offline reinforcement Learning techniques. The goal is to leverage these methods to improve communication of military command and control information systems (C2IS) in real-time emulated radio networks by the use of agents deployed on each network node in a decentralized manner. These agents have the task of improving the performance of the network by learning to adapt the local C2IS and communication services on their designated nodes to the prevailing dynamic network conditions. The proposed method is assessed in an emulated environment, where agents are trained to augment the networkperformance by controlling the transmission rate of a set of Blue-Force Tracking Services within an emulated ad-hoc radio network in real-time.
As a widely adopted control strategy in industry, PID control is widely recognized for its simplicity, efficiency and reliability. However, in the face of complex and variable nonlinear industrial controlsystems, tra...
详细信息
The use of the deep Convolutional Neural network (CNN) in breast cancer classification of mammogram images has been widely investigated to aid radiologists in better clinical diagnoses. Multiple levels of convolution ...
详细信息
ISBN:
(纸本)9798350372113;9798350372106
The use of the deep Convolutional Neural network (CNN) in breast cancer classification of mammogram images has been widely investigated to aid radiologists in better clinical diagnoses. Multiple levels of convolution and non-linearity repetitions in CNN's architecture are required to extract significant data to be represented. However, the vanishing gradient effect occurs when deeper network training as a product of the partial derivative of loss function on each weightage update can cause no meaningful network learning, even with additional epochs. Overcoming this using the activation function of rectified linear unit (ReLU) by allowing neurons to be activated to allow non-linearity when the output is more than zero could lessen the problem. However, restrictive allowance of non-linearity for <0 for final feature extraction when producing output probability on highly complex data such as mammogram images leads to dropped networkperformance. To overcome this, this study proposed an adaptive ReLU based on genetic algorithm (GA) profiling to determine the best threshold value for allowing neuron activation based on mutation and adaptation to improve the restrictive capability of the original ReLU. We modified the adaptive ReLU on the final learning layer of two CNN architectures and observed the performance on a public mammogram dataset of INbreast. Our experiments show improved accuracy from 95.0% to 98.5% and improved classification performance compared to other well-known activation functions. Applying evolutionary-based GAs to activation functions can represent an exciting frontier in meta-learning for neural networks.
In the realm of smart manufacturing, Industrial controlsystems (ICSs) play a critical role in supervising essential operations across various manufacturing facilities. As ICSs become increasingly integral to critical...
详细信息
ISBN:
(纸本)9798350363029;9798350363012
In the realm of smart manufacturing, Industrial controlsystems (ICSs) play a critical role in supervising essential operations across various manufacturing facilities. As ICSs become increasingly integral to critical infrastructure, their susceptibility to cyber threats escalates. Despite the positive impact of abundant digital data communication on ICS performance, rising concerns about data security underscore the pivotal role of intrusion detection systems (IDS) in averting the consequences of network security attacks. However, challenges persist, particularly in the detection of zero-day attacks. Furthermore, while many IDSs exhibit high performance for known attack patterns, they often function as black boxes, presenting interpretability challenges for network operators to take appropriate actions. This paper introduces a novel zero-day intrusion detection system, thoughtfully crafted to address the interdependence within ICS network traffic. Our approach designs a multi-head-attention mechanism, not only for precise classification of network traffic but also to mitigate zero-day attacks. Subsequently, we incorporate a novel autoencoder architecture, purposefully designed to capture distinctive patterns present in both known attacks and normal traffic, leveraging the output from the attention layer. Furthermore, our approach integrates Explainable Artificial Intelligence mechanisms, employing the multi-head attentions model to offer a more detailed description of the underlying process involved in traffic categorization. The model's efficacy is demonstrated through experiments conducted using water system ICS testbeds, underscoring its performance and reliability in detecting diverse cyber-attacks and inferring zero-day attacks with an accuracy surpassing 89%, while also providing interpretable results.
暂无评论