Devices in IEC 61850 substations use the generic object-oriented substation events (GOOSE) protocol to exchange protection-related events. Because of its lack of authentication and encryption, GOOSE is vulnerable to m...
详细信息
ISBN:
(数字)9781728161273
ISBN:
(纸本)9781728163598
Devices in IEC 61850 substations use the generic object-oriented substation events (GOOSE) protocol to exchange protection-related events. Because of its lack of authentication and encryption, GOOSE is vulnerable to man-in-the-middle attacks. An adversary with access to the substation network can inject carefully crafted messages to impact the grid's availability. One of the most common such attacks, GOOSE-based poisoning, modifies the StNum and SqNum fields in the protocol data unit to take over GOOSE publications. We present ED4GAP, a network- level system for efficient detection of the poisoning attacks. We define a finite state machine model for network communication concerning the attacks. Guided by the model, ED4GAP analyzes network traffic out-of-band and detects attacks in real-time. We implement a prototype of the system and evaluate its detection accuracy. We provide a systematic approach to assessing bottlenecks, improving performance, and demonstrating that ED4GAP has low overhead and meets GOOSE's timing constraints.
Quantifying the stability of an equilibrium is central in the theory of dynamical systems as well as in engineering and control. A comprehensive picture must include the response to both small and large perturbations,...
详细信息
Quantifying the stability of an equilibrium is central in the theory of dynamical systems as well as in engineering and control. A comprehensive picture must include the response to both small and large perturbations, leading to the concepts of local (linear) and global stability. Here, we show how systems displaying Hopf bifurcations show contrarian results for these two aspects of stability: Global stability is large close to the point where the system loses its stability altogether. We demonstrate this effect for an elementary model system, an anharmonic oscillator, and a realistic model of power system dynamics with delayed control. Detailed investigations of the bifurcation explain the seeming paradox in terms of the location of the attractors relative to the equilibrium.
This paper deals with the design and implementation of adaptive nonlinear predictive control (NMPC). The resulting control system is deployed on a softPLC embedded target in real-time via the REXYGEN control system. T...
This paper deals with the design and implementation of adaptive nonlinear predictive control (NMPC). The resulting control system is deployed on a softPLC embedded target in real-time via the REXYGEN control system. The paper describes functional prototype using softPLC hosting the NMPC algorithm applied for a nonlinear system consisting of three coupled tanks. The NMPC algorithm is solved via the receding horizon control method (RHC), formulated as a nonlinear programming problem (NLP) and numerically computed using the SOLNP solver. The adaptivity is provided by online identification via moving horizon estimation (MHE), keeping the model updated to avoid a model-plant mismatch. The methodology described in this paper can be easily transferred to a wider group of industrial nonlinear processes. Such created control unit can run in a standalone mode or can be connected to some exiting control system providing a necessary computational power and thus upgrading the quality of control significantly.
In a criminal investigation, situations are quite often where no evidence but a witness is available. In these cases, facial composite is a tool applied in search for a perpetrator of a crime. Facial composites are im...
详细信息
In a criminal investigation, situations are quite often where no evidence but a witness is available. In these cases, facial composite is a tool applied in search for a perpetrator of a crime. Facial composites are images of faces drafted by a forensic technician requiring a precise description provided by a witness. Despites deploying the computational technique into the process, the naming rates remain very low (not reaching 5%). In this paper, we present a system developed according to the latest research on facial perception. Incorporating the interactive evolutionary algorithm, whole face images are automatically generated based on the witness’s selection. The system is presented in the latest tested version, providing information on the selected EA as well as several image manipulation algorithms inclusive of method for age progression and hair manipulation. Besides describing applied methods and in-office testing, testing in simulated field conditions is part of the paper.
We examine the role of character patterns in three tasks: morphological analysis, lemmatization and copy. We use a modified version of the standard sequence-to-sequence model, where the encoder is a pattern matching n...
详细信息
Simultaneous localization and mapping (SLAM) is a very current problem in robotics, and the development of new SLAM algorithms is carried out by leading research institutions. The text presents the implementation of s...
详细信息
ISBN:
(数字)9781665404792
ISBN:
(纸本)9781665404808
Simultaneous localization and mapping (SLAM) is a very current problem in robotics, and the development of new SLAM algorithms is carried out by leading research institutions. The text presents the implementation of selected SLAM algorithms on a custom made hardware platform built on the chassis of the 1:10 remote control Ackerman vehicle model. A transformation of a hobby vehicle platform to an autonomous robot requires hardware and software intervention the paper further describes a sensor setup, hardware configuration, and briefly apprises of the software architecture. Finally, the characteristics and performance of GMapping with wheel odometry and visual odometry, Hector SLAM, and CRSM SLAM algorithms are evaluated in a series of practical experiments.
This article presents a prototype reference design for a low-cost miniature magnetic levitation experiment. The proposed device is built as an Arduino expansion module, thus may be installed on a broad range of microc...
ISBN:
(数字)9781728109305
ISBN:
(纸本)9781728109312
This article presents a prototype reference design for a low-cost miniature magnetic levitation experiment. The proposed device is built as an Arduino expansion module, thus may be installed on a broad range of microcontroller prototyping boards. The open-source hardware design uses off-the-shelf and widely available components and 3D printing technology, thus its overall material cost is minimal. This way, the magnetic levitation experiment is transformed into a pocket laboratory that can be borrowed by students for take-home experiments. In addition to the device itself, we present an open-source application programming interface and the outline of classroom examples in modeling, system identification and closed-loop control.
Capturing the uncertainty in probabilistic wind power forecasts is challenging, especially when uncertain input variables, such as the weather, play a role. Since ensemble weather predictions aim to capture the uncert...
详细信息
In the current state of IoT systems development, the fog techniques become the key solution of latency and energy consumption reducing when collecting and processing end user data. Instead of processing and storing da...
详细信息
This paper presents a continuous-time model predictive control scheme based on B-spline functions used for signals and model approximation. The proposed controller offers two interesting advantages. First, it formulat...
详细信息
This paper presents a continuous-time model predictive control scheme based on B-spline functions used for signals and model approximation. The proposed controller offers two interesting advantages. First, it formulates the control signal as a continuous polynomial spline function, the nature of which is determined by its control polygon that is subject of optimization. Second, all continuous constraints assumed over prediction horizon are consistently transformed into constraints imposed on a finite number of elements of this control polygon. Using parametric quadratic programming we further show how to obtain an explicit representation of the proposed controller, which is known for its efficient online implementation. The featured simulation study demonstrates that by a suitable choice of number and position of knots of the spline function over the prediction horizon it is possible to substantially reduce the number of critical regions of the explicit controller while preserving control performance, and to mitigate the direct correlation between number of regions and chosen length of prediction horizon.
暂无评论