A meticulously crafted false data injection attack (FDIA) can effectively circumvent bad data detection mechanisms within the state estimation scheme, presenting falsified states to operators. These falsified states c...
详细信息
ISBN:
(数字)9798350355185
ISBN:
(纸本)9798350355192
A meticulously crafted false data injection attack (FDIA) can effectively circumvent bad data detection mechanisms within the state estimation scheme, presenting falsified states to operators. These falsified states can lead to wrong operation decisions, potentially leading to line overloads and triggering cascading failures. Although substantial measurements are needed for executing such impactful FDIAs, the modeling of the cyber layer in vulnerability analysis of power grids is often neglected in the literature. Building on this foundation, this paper introduces a two-step vulnerability assessment approach that integrates the cyber layer into account. Initially, the minimum sets of phasor measurement units necessary to stealthily overload a transmission line is determined via a bi-level optimization problem for each line. Subsequently, Bayesian attack graphs are developed for each set to map all potential access routes for these minimal measurement sets, thereby facilitating the calculation of their accessing probability, which reflect the current vulnerability of the power system to FDIAs. The proposed methodology is tested and validated on the IEEE 39-Bus test system.
In recent years, stochastic detectors have gained prominence in networked systems for anomaly detection. These detectors have demonstrated advantages over their traditional counterparts, particularly in safe-guarding ...
详细信息
ISBN:
(数字)9798350354409
ISBN:
(纸本)9798350354416
In recent years, stochastic detectors have gained prominence in networked systems for anomaly detection. These detectors have demonstrated advantages over their traditional counterparts, particularly in safe-guarding against data integrity attacks targeting state estimation. Despite these advancements, the impact of the detector on alarm performance-such as alarm-triggering rates at normal conditions-remains under-explored, especially in scenarios where delay timers are applied to the raw alarm sequence. This study delves into the monitoring of a correlated Gaussian process variable using stochastic detectors. An explicit formula for the alarm performance is given, highlighting how it is influenced by the duration of delay timers. The efficacy of the proposed approach is validated through numerical examples and a simplified process model.
This paper presents a transformer-based improved multi-path noise-canceling (IMNC) low noise amplifier (LNA) for K-band satellite communications. The design enhances the dual-path noise cancellation and significantly ...
详细信息
ISBN:
(数字)9798331509606
ISBN:
(纸本)9798331509613
This paper presents a transformer-based improved multi-path noise-canceling (IMNC) low noise amplifier (LNA) for K-band satellite communications. The design enhances the dual-path noise cancellation and significantly reduces the noise figure. The proposed LNA employs a three-coil transformer with dual-eight-shaped inductor to boost gain, and introduces a noise cancellation path for the common-gate transistor to optimizes noise performance. During the circuit design phase, a multicomponent integrated modeling (MIM) technique is applied, which accurately characterizes the EM field of the LNA and ensures high consistency between simulation and measurement results. The LNA, fabricated in a 40 nm CMOS process, consumes 28.8 mW of power and achieves a peak gain of 12.6 dB. Its 3-dB bandwidth ranges from 19.9 to 25 GHz with a minimum noise figure of 2 dB. The core area of the LNA is $0.16 ~\text{mm}^{2}$ .
Safety critical systems are typically subjected to hazard analysis before commissioning to identify and analyse potentially hazardous system states that may arise during operation. Currently, hazard analysis is mainly...
Safety critical systems are typically subjected to hazard analysis before commissioning to identify and analyse potentially hazardous system states that may arise during operation. Currently, hazard analysis is mainly based on human reasoning, past experiences, and simple tools such as checklists and spreadsheets. Increasing system complexity makes such approaches decreasingly suitable. Furthermore, testing-based hazard analysis is often not suitable due to high costs or dangers of physical faults. A remedy for this are model-based hazard analysis methods, which either rely on formal models or on simulation models, each with their own benefits and drawbacks. This paper proposes a two-layer approach that combines the benefits of exhaustive analysis using formal methods with detailed analysis using simulation. Unsafe behaviours that lead to unsafe states are first synthesised from a formal model of the system using Supervisory Control Theory. The result is then input to the simulation where detailed analyses using domain-specific risk metrics are performed. Though the presented approach is generally applicable, this paper demonstrates the benefits of the approach on an industrial human-robot collaboration system.
The focus of this paper is to address a novel control technique for stability and transparency analysis of bilateral telerobotic systems in the presence of data loss and time delay in the communication channel. Differ...
详细信息
The focus of this paper is to address a novel control technique for stability and transparency analysis of bilateral telerobotic systems in the presence of data loss and time delay in the communication channel. Different control strategies have been reported to compensate the effects of time delay in the communication channel;however, most of them result in poor performance under data loss. First, a model for data loss is proposed using a finite series representation of a set of periodic continuous *** improve the performance and data reconstruction, a holder circuits is also introduced. The passivity of the overall system is provided via the wave variable technique based on the proposed model for the data loss. The stability analysis of the system is then derived using the Lyapunov theorem under the time delay and the data loss. Finally, experimental results are given to illustrate the capability of the proposed control technique.
In low latency applications and in general, for overspread channels, channel delay spread is a large percentage of the transmission frame duration. In this paper, we consider OTFS in an overspread channel exhibiting a...
详细信息
Field effect transistors (FETs) in plasmonic regimes of operation could detect terahertz (THz) radiation and operate as THz interferometers, spectrometers, frequency-to-digital converters and THz modulators and source...
详细信息
Objective: Early identification of ADHD is necessary to provide the opportunity for timely treatment. However, screening the symptoms of ADHD on a large scale is not easy. This study aimed to validate a video game (Fi...
详细信息
The paper presents a solution to detect active ankle joint movement while a patient undergoes therapy with a robotic lower limb rehabilitation device that neither restricts nor actively supports ankle dorsi- or planta...
The paper presents a solution to detect active ankle joint movement while a patient undergoes therapy with a robotic lower limb rehabilitation device that neither restricts nor actively supports ankle dorsi- or plantarflexion. The presented method requires the addition of only two accelerometer sensors to the system as well as a musculoskeletal model of the lower limb. Using forward kinematics and inverse dynamics, it enables knee and ankle joint kinematic tracking in the sagittal plane and muscle force estimation. This is an extension of a previous work in which only hip joint tracking was possible and, thus, muscle force estimation was limited. The correlation results of the current validation study with 12 healthy subjects show high correlation $(R=0.88\pm 0.09)$ between the kinematics estimated with the proposed method and those calculated from a gold standard motion capture setup for all three joints (hip, knee, and ankle). The correlation results of the estimated m. tibialis anterior muscle force against electromyography measurements $(R\ =\ 0.62\pm 0.27)$ are promising and a first application to a patient data set shows potential for future clinical application.
暂无评论