Sparse stealth attack constructions that minimize the mutual information between the state variables and the observations are proposed. The attack construction is formulated as the design of a multivariate Gaussian di...
详细信息
The increasing application of voltage source converter (VSC) based high voltage direct current (VSC-HVDC) technology in power grids has raised the importance of incorporating DC grids and converters into the existing ...
详细信息
The appearance of new paradigms such as Cyber-Physical systems paradigm has led to the appearance of the next industrial revolution. A Cyber- Physical System based Enterprise involves the usage of physical objects, kn...
详细信息
The appearance of new paradigms such as Cyber-Physical systems paradigm has led to the appearance of the next industrial revolution. A Cyber- Physical System based Enterprise involves the usage of physical objects, knowledge structured based on workflows, controlsystems, human integration, systemic data representation and communication processes. The authors propose the concept of Intelligent Cyber Enterprise (ICE) in order to provide a generic architecture enabling the design of complex enterprise systems enhanced with social and technical capabilities. Components of the architecture have to be independent, facilitating the selection of context-oriented behaviors. In order to facilitate the design of ICE components, the authors have proposed a platform for modeling and evaluation.
An approach to resilient planning and control of autonomous vehicles in multi-vehicle traffic scenarios is proposed. The proposed method is based on model predictive control (MPC), where alternative predictions of the...
详细信息
In this paper we obtain a numerically tractable test (sufficient condition) for the exponential stability of the unique positive equilibrium point of an ODE system. The result (Theorem 3.1) is based on Lyapunov theory...
详细信息
This paper considers a constrained discrete-time linear system subject to actuation attacks. The attacks are modelled as false data injections to the system, such that the total input (control input plus injection) sa...
详细信息
This paper considers a constrained discrete-time linear system subject to actuation attacks. The attacks are modelled as false data injections to the system, such that the total input (control input plus injection) satisfies hard input constraints. We establish a sufficient condition under which it is not possible to maintain the states of the system within a compact state constraint set for all possible realizations of the actuation attack. The developed condition is a simple function of the spectral radius of the system, the relative sizes of the input and state constraint sets, and the proportion of the input constraint set allowed to the attacker.
Because physics-based building models are difficult to obtain as each building is individual, there is an increasing interest in generating models suitable for building MPC directly from measurement data. Machine lear...
详细信息
Manufacturing informatics aims to optimize productivity by extracting information from numerous data sources and making decisions based on that information about the process and the parts being produced. Manufacturing...
详细信息
Based on today’s modern technologies, patient care can be provided remotely, in a connected way, being, at the same time, personalized, patient-centered and proactive. Such an approach can be achieved using Remote He...
Based on today’s modern technologies, patient care can be provided remotely, in a connected way, being, at the same time, personalized, patient-centered and proactive. Such an approach can be achieved using Remote Health Monitoring systems (RHMS). In case of elderly people, dramatic permanent deteriorations of their health status can be caused by falls. The seniors’ health and life style monitoring and the detection and/or prevention of falls can be done by such RHMS, an example being the RO-SmartAgeing system developed inside “Non-invasive Monitoring System and Health Assessment of the Elderly in a Smart Environment (RO-SmartAgeing)” research project. The paper presents the problem of using microservices for optimizing the architecture and functionalities of RO-SmartAgeing system, and the way in which the problems of ensuring the security of patient data can be solved.
The replay attack detection problem is studied from a new perspective based on parity space method in this paper. The proposed detection methods have the ability to distinguish system fault and replay attack, handle b...
详细信息
暂无评论