Today, many industrial products are defined by software, and therefore customizable by installing new applications on demand - their functionalities are implemented by software and can be modified and extended by soft...
详细信息
ISBN:
(纸本)9783319686905;9783319686899
Today, many industrial products are defined by software, and therefore customizable by installing new applications on demand - their functionalities are implemented by software and can be modified and extended by software updates. This trend towards customizable products is extending into all domains of IT, including Cyber-Physical systems (CPS) such as cars, robotics, and medical devices. However, these systems are often highly safety-critical. The current state-of-practice allows hardly any modifications once safety-critical systems are put in operation. This is due to the lack of techniques to preserve crucial safety conditions for the modified system, which severely restricts the benefits of software. This work aims at new paradigms and technologies for the design and safe software updates of CPS at operation-time - subject to stringent timing constraints, dynamic workloads, and limited resources on complex computing platforms. Essentially there are three key challenges: Composability, Resource-Efficiency and Predictability to enable modular, incremental and safe software updates over system life-time in use. We present research directions to address these challenges: (1) Open architectures and implementation schemes for building composable systems, (2) Fundamental issues in real-time scheduling aiming at a theory of multi-resource (inc. multiprocessor) scheduling, and (3) New-generation techniques and tools for fully separated verification of timing and functional properties of real-time systems with significantly improved efficiency and scalability. The tools shall support not only verification, but also code generation tailored for both co-simulation (interfaced) with existing design tools such as Open Modelica (for modeling and simulation of physical components), and deployment on given computing platforms.
From security perspective, cyber physical system (CPS) security issue is investigated in this note. Based on a double-loop security control structure, the typical cyber attack called information disclosure, denial-of-...
详细信息
ISBN:
(纸本)9789811063701;9789811063695
From security perspective, cyber physical system (CPS) security issue is investigated in this note. Based on a double-loop security control structure, the typical cyber attack called information disclosure, denial-of-service (DoS), deception attack and stealth attack are analyzed from uncertainty perspective. The performance of these attacks are formulated, meaningful models are proposed meanwhile. According to aforementioned attacks, security control scenarios are obtained via the character of each kind cyber attack. And some novel results are obtained via a well designed double closed loop structure. At last, from traditional standpoint, uncertainties of a separately excited DC motor is taken as an example to demonstrate the problem.
This paper investigates the observer-based H-infinity output feedback control for a class of switched systems with time delay. Different from some existing methods, the switching rule in the considered systems is gove...
详细信息
ISBN:
(纸本)9789811063732;9789811063725
This paper investigates the observer-based H-infinity output feedback control for a class of switched systems with time delay. Different from some existing methods, the switching rule in the considered systems is governed by the sojourn probability information (the probability of the switched system staying in one subsystem). In order to rebuild the switched systems and utilize those probability information, a set of random variables are introduced to represent the switching law of the switched systems. The expectation of the random variable is the sojourn probability of the subsystems. In such a way, new type of switched systems with random variables are built. The purpose of the addressed problem is to design the observer-based output feedback controller and to obtain sufficient conditions for the mean square stability of the system. By using a multiple Lyapunov functional method, one theorem is derived, and the controller and observer gains can be computed by solving a set of linear matrix inequalities. A simulation example is proposed to illustrate the effectiveness of the developed design method.
The proceedings contain 22 papers. The special focus in this conference is on Proxy Applications and Energy-Aware Computing. The topics include: Fully resolved simulations of dune formation in riverbeds;tile low rank ...
ISBN:
(纸本)9783319586663
The proceedings contain 22 papers. The special focus in this conference is on Proxy Applications and Energy-Aware Computing. The topics include: Fully resolved simulations of dune formation in riverbeds;tile low rank cholesky factorization for climate/weather modeling applications on manycore architectures;extreme scale fused seismic simulations with the discontinuous galerkin method;communication reducing algorithms for distributed hierarchical N-body problems with boundary distributions;on the-fly efficient mining of evolving graphs on GPU;accelerating seismic simulations using the Intel Xeon phi knights landing processor;a framework for out of memory SVD algorithms;a mini-application framework to improve neural simulators;gearshifft - the FFT benchmark suite for heterogeneous platforms;an overview of MPI characteristics of exascale proxy applications;fast matrix-free discontinuous galerkin kernels on modern computerarchitectures;a new parallel research kernel to expand research on dynamic load-balancing capabilities;extreme event analysis in next generation simulationarchitectures;an analysis of core - and chip-level architectural features in four generations of Intel server processors;alleviating I/O interference through workload aware striping and load-balancing on parallel file systems;designing dynamic and adaptive MPI point-to-point communication protocols for efficient overlap of computation and communication;diagnosing performance variations in HPC applications using machine learning;a vehicle for HPC community collaboration on co-designed energy management solutions and metrics for energy-aware software optimisation.
Modern control systems are now combining advanced network technology for control optimization and efficiency, but, on the other side, induce network attack as a new threat to control security. A typical network attack...
详细信息
ISBN:
(纸本)9789811063732;9789811063725
Modern control systems are now combining advanced network technology for control optimization and efficiency, but, on the other side, induce network attack as a new threat to control security. A typical network attack targeting control systems is Denial of Service (DoS) jamming attack. This attack can disable control operations by simply flooding network traffic to the control-network channels, and therefore is easy to deploy and hard to defend. In this paper, we conduct a comprehensive review on this attack and report our results in three aspects: the attacking strategies of jamming attack, the defending solutions to this attack and the arms race between them. To this end, we also discuss the potential research directions on this topic.
While open communication infrastructures are embedded into multi-area power systems to support data transmittion, it make communication channels vulnerable to cyber attacks, reliability of power systems is affected. T...
详细信息
ISBN:
(纸本)9789811063640;9789811063633
While open communication infrastructures are embedded into multi-area power systems to support data transmittion, it make communication channels vulnerable to cyber attacks, reliability of power systems is affected. This paper studies the load frequency control (LFC) of multi-area power systems under DoS attacks. The state space model of power systems under DoS attacks is formulated, where event-triggered control scheme is integrated for the multi-area power systems under DoS attacks. By utilizing average dwell time design approach, exponential stability and L-2-gain of the multi-area power systems can be obtained for event-triggered LFC scheme under DoS attacks, if choosing an unavailability rate of communication channels for DoS attacks properly. Finally, the example shows that the convergences of frequency deviation of three-area power systems are compared under different DoS attack scenarios, when the proportion of the total time of DoS attacks can obtain the result properly.
The proceedings contain 34 papers. The topics discussed include: impact of zoning strategies for building performance simulation;towards energy efficient operational patterns in air handling units in highly sensed bui...
The proceedings contain 34 papers. The topics discussed include: impact of zoning strategies for building performance simulation;towards energy efficient operational patterns in air handling units in highly sensed buildings;an embedded algorithm for detecting and accommodating synchronization effects in wireless SHM systems;a computational paradigm for the optimisation of steel building structures based on cost and carbon indexes in early design stages;collaborative BIM reconstruction on mobile consumer devices;construction health and safety management { a methodological review towards a smart and holistic approach;application of graph databases and graph theory concepts for advanced analysing of BIM models based on IFC standard;using a knowledge based system for automatic site equipment planning;parametric information modelling of mechanised tunnelling projects for multi-level decision support;computer technology for serious gaming in education: a literature review;deep neural network architectures for component-based machine learning model in building energy predictions;ifc-based modeling of cyber-physical systems in civil engineering;framework for shared visualization and real-time information flow to the construction site;and a case study application of unmanned aerial systems (UAS) on highway construction projects.
This paper is concerned with the security control of networked systems under denial of attacks and false data injection attacks. Firstly, an observer is designed to estimate the system state under hybrid attacks, and ...
详细信息
ISBN:
(纸本)9789811063732;9789811063725
This paper is concerned with the security control of networked systems under denial of attacks and false data injection attacks. Firstly, an observer is designed to estimate the system state under hybrid attacks, and the system is modelled as a stochastic closed-loop system with an observer-based security controller. Then, by use of the Lyapunov theory, sufficient security stability and stabilization criteria are derived to ensure the asymptotically stable of the studied system in the mean-square sense under hybrid attacks. Finally, an example is given to illustrate the effectiveness of developed method.
Recent advancement in the integration of power systems and information communication technology has brought the key concerns towards security operation of cyber physical power system. This paper focuses on realizing t...
详细信息
ISBN:
(纸本)9789811063701;9789811063695
Recent advancement in the integration of power systems and information communication technology has brought the key concerns towards security operation of cyber physical power system. This paper focuses on realizing the unified system modeling under intrusion attacks and refining the attack effects on communication network by simulation research. We start this survey with an overview of the system operation and crucial intrusion attacks associated with operational security from fusion system perspective. A novel limited stochastic Petri net (LSPN) graph theory is introduced to establish the unified firewall protection system model of intelligent substation network. By proposing quantitative computational methodology of communication throughput variation, the potential consequence on the communication network is determined with information transmission constraints. The final test on IEEE-30 node power system illustrates the usefulness of the proposed model analysis. The research work would raise awareness of the cyber intrusion threats and provide the basis for security defense.
Coverage and control of a diffusion process using multiple robots have been studied in this paper. Two control strategies such as CVT (Centroidal Voronoi Tessellations)-Allocation-Motion Algorithm and CVT-Obstacles Av...
详细信息
ISBN:
(纸本)9789811063732;9789811063725
Coverage and control of a diffusion process using multiple robots have been studied in this paper. Two control strategies such as CVT (Centroidal Voronoi Tessellations)-Allocation-Motion Algorithm and CVT-Obstacles Avoidance-Motion Algorithm have been proposed for cooperative control of multiple robots in realizing the task of coverage and control of diffusion process that is modeled by parabolic partial differential equation. Reliability and transient performance have been improved based on the algorithms that is proposed in this paper. simulation results using Diff-MAS2D for the diffusion process illustrate the effectiveness of the theoretical results.
暂无评论