The state estimators used in real-time power system control centers now process bad data as a standard routine. With the introduction and deployment of phasor measurement units (PMUs), it is possible to model power sy...
详细信息
The state estimators used in real-time power system control centers now process bad data as a standard routine. With the introduction and deployment of phasor measurement units (PMUs), it is possible to model power systems, even with their time-varying nature, in real-time. However, PMUs remain vulnerable to providing bad data for several reasons. In this paper, a new intelligent framework, the cellular computational netwo rk (CCN), is introduced for the decentralized predictive modeling and dynamic state estimation (DSE) of a power system with PMU data. The CCN-based DSE is resilient to interactions between multiple segments of bad data from one or more PMUs.
In this article a method for the detection of broken rotor bars in asynchronous machines operating under full load is presented. Unlike most Motor Current Signature Analysis (MCSA) approaches, which operate in the fre...
详细信息
ISBN:
(纸本)9781479940318
In this article a method for the detection of broken rotor bars in asynchronous machines operating under full load is presented. Unlike most Motor Current Signature Analysis (MCSA) approaches, which operate in the frequency domain, our method operates in the time domain. The scheme is based on the use of a Principal Component Analysis (PCA) fault/anomaly detector. PCA is applied on the three stator currents to subsequently calculate the Q statistic which is employed for detecting the presence/absence of a fault. The efficiency of the proposed scheme was experimentally evaluated using different fault severity levels, ranging from 1/4 of a broken bar to three broken bars. The obtained results indicate that the method can detect the caused asymmetry with a very restricted amount of data.
Ensuring the security of controlsystems against integrity attacks is a major challenge. Due to the events of Stuxnet, replay attacks in particular have been considered by the research community. Replaying previous me...
详细信息
ISBN:
(纸本)9781467360890
Ensuring the security of controlsystems against integrity attacks is a major challenge. Due to the events of Stuxnet, replay attacks in particular have been considered by the research community. Replaying previous measurements of a system in steady state allows an adversary to generate statistically correct virtual outputs which can bypass traditional detectors. The adversary can then inject destabilizing inputs to cause damage to the plant. The method of injecting secret noisy control inputs, or physical watermarking, has recently been proposed to detect replay attacks. However, the proposed watermarking design methods assume that the adversary does not use his potential access to real time communication channels to create stealthy virtual outputs to send to the defender. In this paper, we formulate an attack model for an adversary who uses knowledge of the system as well as access to a subset of real time control inputs and sensor outputs to construct stealthy virtual outputs. A robust physical watermark and detector to counter such an adversary is proposed.
This paper addresses the problem of keeping an autonomous marine vehicle in a moving triangular formation by regulating its position with respect to two leader vehicles. The follower vehicle has no prior knowledge of ...
详细信息
Stroke is a leading cause of disability, significantly impacting the quality of life (QOL) in survivors, and rehabilitation remains the mainstay of treatment in these patients. Recent engineering and technological adv...
详细信息
This paper studies the continuous-time intruder isolation problem on a general road network graph under delayed information scenario. Several Unattended Ground Sensors (UGSs) are pre-installed along certain edges of t...
详细信息
Communication-based train control(CBTC)systems use wireless local area networks(WLANs)for trainground *** delays and packet drops may cause unnecessary tractions and brakes of trains,degradation of riding comfortabili...
详细信息
Communication-based train control(CBTC)systems use wireless local area networks(WLANs)for trainground *** delays and packet drops may cause unnecessary tractions and brakes of trains,degradation of riding comfortability,rising of energy consumption and loss of the line’s *** this paper,We model the system to control a group of trains in CBTC as a networked control system(NCS)with transmission delays and packet *** study the delays and packet drops in CBTC,analyze their effects on train’s control,and propose a method to improve the performance of *** simulation results are *** show that our proposed method has a strong tolerance for transmission delays and packet drops,and outperforms the currently adopted scheme in different channel conditions.
Knowing the arterial geometry might be helpful in the assessment of a plaque rupture event. We present a proof of concept study implementing a novel method which can predict the evolution in time of the atheromatic pl...
详细信息
ISBN:
(纸本)9781424492695
Knowing the arterial geometry might be helpful in the assessment of a plaque rupture event. We present a proof of concept study implementing a novel method which can predict the evolution in time of the atheromatic plaque in carotids using only statistical features which are extracted from the arterial geometry. Four feature selection methods were compared: Quadratic Programming Feature Selection (QPFS), Minimal Redundancy Maximal Relevance (mRMR), Mutual Information Quotient (MIQ) and Spectral Conditional Mutual Information (SPECCMI). The classifier used is the Support Vector Machines (SVM) with linear and Gaussian kernels. The maximum accuracy that was achieved in predicting the variation in the mean value of the Lumen distance from the centerline and the thickness was 71.2% and 70.7% respectively.
Recently, researchers have discovered unexpected bumps in the detection rate curve of yet another steganographic scheme (YASS). We refer to this abnormal phenomenon as non-monotonic security performance. This paper fi...
详细信息
暂无评论