With the development of Ethernet systems and the growing capacity of modem silicon technology, embedded communication networks are playing an increasingly important role in embedded and safety critical systems. Hardwa...With the development of Ethernet systems and the growing capacity of modem silicon technology, embedded communication networks are playing an increasingly important role in embedded and safety critical systems. Hardware/software co-design is a methodology for solving design problems in processor based embedded systems. In this work, we implemented a new 1-cycle pipeline microprocessor and a fast Ethemet transceiver and established a low cost, high performance embedded network controller, and designed a TCP/IP stack to access the Intemet. We discussed the hardware/software architecture in the forepart, and then the whole system-on-a-chip on Altera Stratix EP1S25F780C6 device. Using the FPGA environment and SmartBit tester, we tested the system's throughput. Our simulation results showed that the maximum throughput of Ethemet packets is up to 7 Mbps, that of UDP packets is up to 5.8 Mbps, and that of TCP packets is up to 3.4 Mbps, which showed that this embedded system can easily transmit basic voice and video signals through Ethemet, and that using only one chip can realize that many electronic devices access to the Intemet directly and get high performance.展开更多
Web service applications are increasing tremendously in support of high-level businesses.There must be a need of better server load balancing mechanism for improving the performance of web services in business.Though ...Web service applications are increasing tremendously in support of high-level businesses.There must be a need of better server load balancing mechanism for improving the performance of web services in business.Though many load balancing methods exist,there is still a need for sophisticated load bal-ancing mechanism for not letting the clients to get frustrated.In this work,the ser-ver with minimum response time and the server having less traffic volume were selected for the aimed server to process the forthcoming requests.The Servers are probed with adaptive control of time with two thresholds L and U to indicate the status of server load in terms of response time difference as low,medium and high load by the load balancing application.Fetching the real time responses of entire servers in the server farm is a key component of this intelligent Load balancing system.Many Load Balancing schemes are based on the graded thresholds,because the exact information about the networkflux is difficult to obtain.Using two thresholds L and U,it is possible to indicate the load on particular server as low,medium or high depending on the Maximum response time difference of the servers present in the server farm which is below L,between L and U or above U respectively.However,the existing works of load balancing in the server farm incorporatefixed time to measure real time response time,which in general are not optimal for all traffic conditions.Therefore,an algorithm based on Propor-tional Integration and Derivative neural network controller was designed with two thresholds for tuning the timing to probe the server for near optimal perfor-mance.The emulation results has shown a significant gain in the performance by tuning the threshold time.In addition to that,tuning algorithm is implemented in conjunction with Load Balancing scheme which does not tune thefixed time slots.展开更多
This paper proposes a novel event-driven encrypted control framework for linear networked control systems(NCSs),which relies on two modified uniform quantization policies,the Paillier cryptosystem,and an event-trigger...This paper proposes a novel event-driven encrypted control framework for linear networked control systems(NCSs),which relies on two modified uniform quantization policies,the Paillier cryptosystem,and an event-triggered strategy.Due to the fact that only integers can work in the Pailler cryptosystem,both the real-valued control gain and system state need to be first quantized before encryption.This is dramatically different from the existing quantized control methods,where only the quantization of a single value,e.g.,the control input or the system state,is considered.To handle this issue,static and dynamic quantization policies are presented,which achieve the desired integer conversions and guarantee asymptotic convergence of the quantized system state to the equilibrium.Then,the quantized system state is encrypted and sent to the controller when the triggering condition,specified by a state-based event-triggered strategy,is satisfied.By doing so,not only the security and confidentiality of data transmitted over the communication network are protected,but also the ciphertext expansion phenomenon can be relieved.Additionally,by tactfully designing the quantization sensitivities and triggering error,the proposed event-driven encrypted control framework ensures the asymptotic stability of the overall closedloop system.Finally,a simulation example of the secure motion control for an inverted pendulum cart system is presented to evaluate the effectiveness of the theoretical results.展开更多
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is be...As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network.展开更多
Set stabilization is one of the essential problems in engineering systems, and self-triggered control(STC) can save the storage space for interactive information, and can be successfully applied in networked control s...Set stabilization is one of the essential problems in engineering systems, and self-triggered control(STC) can save the storage space for interactive information, and can be successfully applied in networked control systems with limited communication resources. In this study, the set stabilization problem and STC design of Boolean control networks are investigated via the semi-tensor product technique. On the one hand, the largest control invariant subset is calculated in terms of the strongly connected components of the state transition graph, by which a graph-theoretical condition for set stabilization is derived. On the other hand, a characteristic function is exploited to determine the triggering mechanism and feasible controls. Based on this, the minimum-time and minimum-triggering open-loop, state-feedback and output-feedback STCs for set stabilization are designed,respectively. As classic applications of self-triggered set stabilization, self-triggered synchronization, self-triggered output tracking and self-triggered output regulation are discussed as well. Additionally, several practical examples are given to illustrate the effectiveness of theoretical results.展开更多
In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set f...In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set for ATC cybersecurity attacks is constructed by setting the feature states,adding recursive features,and determining the feature criticality.The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data.An autoencoder is introduced into the AI(artificial intelligence)algorithm to encode and decode the characteristics of ATC network security attack behavior to reduce the dimensionality of the ATC network security attack behavior data.Based on the above processing,an unsupervised learning algorithm for clustering detection of ATC network security attacks is designed.First,determine the distance between the clustering clusters of ATC network security attack behavior characteristics,calculate the clustering threshold,and construct the initial clustering center.Then,the new average value of all feature objects in each cluster is recalculated as the new cluster center.Second,it traverses all objects in a cluster of ATC network security attack behavior feature data.Finally,the cluster detection of ATC network security attack behavior is completed by the computation of objective functions.The experiment took three groups of experimental attack behavior data sets as the test object,and took the detection rate,false detection rate and recall rate as the test indicators,and selected three similar methods for comparative test.The experimental results show that the detection rate of this method is about 98%,the false positive rate is below 1%,and the recall rate is above 97%.Research shows that this method can improve the detection performance of security attacks in air traffic control network.展开更多
Studied are the controller design and basic principles of intelligent lighting network. TI’s MSP430F123 is used as a main controller. By using the ZigBee modules(Xbee/Xbee-PRO) and the GSM module(SIM300C) for wireles...Studied are the controller design and basic principles of intelligent lighting network. TI’s MSP430F123 is used as a main controller. By using the ZigBee modules(Xbee/Xbee-PRO) and the GSM module(SIM300C) for wireless communications, the lighting control is enabled to access wireless network. This system uses a mobile phone to achieve light on-off directly, which can accomplish wireless control of intelligent lighting in families.展开更多
Most of the controllers of IM (induction motor) for industrial applications have been designed based on PI controller without consideration of CL (core loss) and SLL (stray load loss). To get the precise perform...Most of the controllers of IM (induction motor) for industrial applications have been designed based on PI controller without consideration of CL (core loss) and SLL (stray load loss). To get the precise performances of torque as well as rotor speed and flux, the above mentioned losses should be considered. Conventional PI controller has overshoot effect at the transient period of the speed response curve. On the other hand, fuzzy logic and ANN (artificial neural network) based controllers can minimize the overshoot effect at the transient period because they have the abilities to deal with the nonlinear systems. In this paper, a comparative analysis is done between PI, fuzzy logic and ANN based speed controllers to find the suitable control strategy for IM with consideration of CL and SLL. The simulation analysis is done by using Matlab/Simulink software. The simulation results show that the fuzzy logic based speed controller gives better responses than ANN and conventional PI based speed controllers in terms of rotor speed, electromagnetic torque and rotor flux of IM.展开更多
This paper deals with the problem of switching between an open-loop estimator and a close-loop estimator for compensating transmission error and packet dropout of networked control systems. Switching impulse is consid...This paper deals with the problem of switching between an open-loop estimator and a close-loop estimator for compensating transmission error and packet dropout of networked control systems. Switching impulse is considered in order to reduce the error between theory and application, a sufficient condition for exponential stabilization of networked control systems under a given switching rule is presented by multiple Lyapunov-like functions. These results are presented for both continuous-time and discrete-time domains. Controllers are designed by means of linear matrix inequalities. Sim- ulation results show the feasibility and efficiency of the proposed method.展开更多
This paper focuses on the problem of stability analysis and controller design for a class of delay systems based on networked control systems. By introducing some free matrix variables, some criteria for stability ana...This paper focuses on the problem of stability analysis and controller design for a class of delay systems based on networked control systems. By introducing some free matrix variables, some criteria for stability analysis and observer-based control law design can be obtained by the solving of linear matrix inequalities. A numerical example is also offered to prove the effectiveness of the proposed method.展开更多
In this paper, the stabilization problem for a class of networked control systems (NCSs) with data packet dropouts and transmission time delays is considered, where the delays are time-varying and uncertain, the dat...In this paper, the stabilization problem for a class of networked control systems (NCSs) with data packet dropouts and transmission time delays is considered, where the delays are time-varying and uncertain, the data packet dropout is modeled as a two-state Markov chain. To compensate the lost packet, a data packet dropout compensator is established. Thus a more realistic model for such NCSs is presented. Sufficient conditions for the stabilization of the new resulting system are derived in the form of linear matrix inequalities (LMIs). Numerical example illustrates the solvability and effectiveness of the results.展开更多
The globally exponential stability of nonlinear impul- sive networked control systems (NINCS) with time delay and packet dropouts is investigated. By applying Lyapunov function theory, sufficient conditions on the g...The globally exponential stability of nonlinear impul- sive networked control systems (NINCS) with time delay and packet dropouts is investigated. By applying Lyapunov function theory, sufficient conditions on the global exponential stability are derived by introducing a comparison system and estimating the corresponding Cauchy matrix. An impulsive controller is explicitly designed to achieve exponential stability and ensure state con- verge with a given decay rate for the system. The Lorenz oscillator system is presented as a numerical example to illustrate the theo- retical results and effectiveness of the proposed controller design procedure.展开更多
A discrete predictor-based control method is developed for a class of linear time-invariant networked control systems with a sensor-to-controller time-varying delay and a controller-to-actuator uncertain constant dela...A discrete predictor-based control method is developed for a class of linear time-invariant networked control systems with a sensor-to-controller time-varying delay and a controller-to-actuator uncertain constant delay,which can be potentially applied to vision-based control systems.The control scheme is composed of a state prediction and a discrete predictor-based controller.The state prediction is used to compensate for the effect of the sensor-to-controller delay,and the system can be stabilized by the discrete predictor-based controller.Moreover,it is shown that the control scheme is also robust with respect to slight message rejections.Finally,the main theoretical results are illustrated by simulation results and experimental results based on a networked visual servo inverted pendulum system.展开更多
This paper addresses the random time-delays and packet losses issues of networked control systems (NCS) within the framework of jump linear systems with mode-dependent time-delays. A new delay-dependent condition on...This paper addresses the random time-delays and packet losses issues of networked control systems (NCS) within the framework of jump linear systems with mode-dependent time-delays. A new delay-dependent condition on the stochastic stability is proposed by a new stochastic Lyapunov-Krasovskii functional. The condition is formulated as a set of coupled linear matrix inequalities (LMIs). As an example to verify the proposed method, an inverted-pendulum system with network is considered. The simulation results demonstrate the effectiveness of the method.展开更多
Controller vulnerabilities allow malicious actors to disrupt or hijack the Software-Defined Networking. Traditionally, it is static mappings between the control plane and data plane. Adversaries have plenty of time to...Controller vulnerabilities allow malicious actors to disrupt or hijack the Software-Defined Networking. Traditionally, it is static mappings between the control plane and data plane. Adversaries have plenty of time to exploit the controller's vulnerabilities and launch attacks wisely. We tend to believe that dynamically altering such static mappings is a promising approach to alleviate this issue, since a moving target is difficult to be compromised even by skilled adversaries. It is critical to determine the right time to conduct scheduling and to balance the overhead afforded and the security levels guaranteed. Little previous work has been done to investigate the economical time in dynamic-scheduling controllers. In this paper, we take the first step to both theoretically and experimentally study the scheduling-timing problem in dynamic control plane. We model this problem as a renewal reward process and propose an optimal algorithm in deciding the right time to schedule with the objective of minimizing the long-term loss rate. In our experiments, simulations based on real network attack datasets are conducted and we demonstrate that our proposed algorithm outperforms given scheduling schemes.展开更多
By combining the Back-Propagation (BP) neural network with conventional proportional Integral Derivative (PID) controller, a new temperature control strategy of the export steam in supercritical electric power pla...By combining the Back-Propagation (BP) neural network with conventional proportional Integral Derivative (PID) controller, a new temperature control strategy of the export steam in supercritical electric power plant is put forward. This scheme can effectively overcome the large time delay, inertia of the export steam and the influencee of object in varying operational parameters. Thus excellent control quality is obtaitud. The present paper describes the development and application of neural network based controller to control the temperature of the boiler's export steam. Through simulation in various situations, it validates that the control quality of this control system is apparently superior to the conventional PID control system.展开更多
This paper discusses the model-based predictive controller design of networked nonlinear systems with communica- tion delay and data loss. Based on the analysis of the closed-loop networked predictive control systems,...This paper discusses the model-based predictive controller design of networked nonlinear systems with communica- tion delay and data loss. Based on the analysis of the closed-loop networked predictive control systems, the model-based networked predictive control strategy can compensate for communication delay and data loss in an active way. The designed model-based predictive controller can also guarantee the stability of the closed-loop networked system. The simulation re- suits demonstrate the feasibility and efficacy of the proposed model-based predictive controller design scheme.展开更多
The Unified Power Quality Conditioner (UPQC) plays an important role in the constrained delivery of electrical power from the source to an isolated pool of load or from a source to the grid. The proposed system can co...The Unified Power Quality Conditioner (UPQC) plays an important role in the constrained delivery of electrical power from the source to an isolated pool of load or from a source to the grid. The proposed system can compensate voltage sag/swell, reactive power compensation and harmonics in the linear and nonlinear loads. In this work, the off line drained data from conventional fuzzy logic controller. A novel control system with a Combined Neural Network (CNN) is used instead of the traditionally four fuzzy logic controllers. The performance of combined neural network controller compared with Proportional Integral (PI) controller and Fuzzy Logic Controller (FLC). The system performance is also verified experimentally.展开更多
This paper addresses the decentralized consensus problem for a system of multiple dynamic agents with remote controllers via networking,known as a networked control multi-agent system(NCMAS).It presents a challenging ...This paper addresses the decentralized consensus problem for a system of multiple dynamic agents with remote controllers via networking,known as a networked control multi-agent system(NCMAS).It presents a challenging scenario where partial dynamic entities or remote control units are vulnerable to disclosure attacks,making them potentially malicious.To tackle this issue,we propose a secure decentralized control design approach employing a double-layer cryptographic strategy.This approach not only ensures that the input and output information of the benign entities remains protected from the malicious entities but also practically achieves consensus performance.The paper provides an explicit design,supported by theoretical proof and numerical verification,covering stability,steady-state error,and the prevention of computation overflow or underflow.展开更多
With the current development trend of Ethernet gradually towards the control network of plant-floor layer and devices layer, much management information on Intelligent Circuit Breaker Controller (ICBC) is becoming dis...With the current development trend of Ethernet gradually towards the control network of plant-floor layer and devices layer, much management information on Intelligent Circuit Breaker Controller (ICBC) is becoming distributed and networked. This paper describes a mixing structure of complex industrial field control network based on Ethernet frame, then mainly discusses three network management methods of ICBC, such as the interconnection method based on PCI, embedded gateway and em- bedded Web server. At the same time, it also gives the basic hardware framework of implementing interconnection, the type of main components, and the real-time operation system supporting the embedded TCP/IP protocols and Web server.展开更多
文摘With the development of Ethernet systems and the growing capacity of modem silicon technology, embedded communication networks are playing an increasingly important role in embedded and safety critical systems. Hardware/software co-design is a methodology for solving design problems in processor based embedded systems. In this work, we implemented a new 1-cycle pipeline microprocessor and a fast Ethemet transceiver and established a low cost, high performance embedded network controller, and designed a TCP/IP stack to access the Intemet. We discussed the hardware/software architecture in the forepart, and then the whole system-on-a-chip on Altera Stratix EP1S25F780C6 device. Using the FPGA environment and SmartBit tester, we tested the system's throughput. Our simulation results showed that the maximum throughput of Ethemet packets is up to 7 Mbps, that of UDP packets is up to 5.8 Mbps, and that of TCP packets is up to 3.4 Mbps, which showed that this embedded system can easily transmit basic voice and video signals through Ethemet, and that using only one chip can realize that many electronic devices access to the Intemet directly and get high performance.
文摘Web service applications are increasing tremendously in support of high-level businesses.There must be a need of better server load balancing mechanism for improving the performance of web services in business.Though many load balancing methods exist,there is still a need for sophisticated load bal-ancing mechanism for not letting the clients to get frustrated.In this work,the ser-ver with minimum response time and the server having less traffic volume were selected for the aimed server to process the forthcoming requests.The Servers are probed with adaptive control of time with two thresholds L and U to indicate the status of server load in terms of response time difference as low,medium and high load by the load balancing application.Fetching the real time responses of entire servers in the server farm is a key component of this intelligent Load balancing system.Many Load Balancing schemes are based on the graded thresholds,because the exact information about the networkflux is difficult to obtain.Using two thresholds L and U,it is possible to indicate the load on particular server as low,medium or high depending on the Maximum response time difference of the servers present in the server farm which is below L,between L and U or above U respectively.However,the existing works of load balancing in the server farm incorporatefixed time to measure real time response time,which in general are not optimal for all traffic conditions.Therefore,an algorithm based on Propor-tional Integration and Derivative neural network controller was designed with two thresholds for tuning the timing to probe the server for near optimal perfor-mance.The emulation results has shown a significant gain in the performance by tuning the threshold time.In addition to that,tuning algorithm is implemented in conjunction with Load Balancing scheme which does not tune thefixed time slots.
基金the Research Grants Council of Hong Kong(CityU 21208921)the Chow Sang Sang Group Research Fund Sponsored by Chow Sang Sang Holdings International Ltd.
文摘This paper proposes a novel event-driven encrypted control framework for linear networked control systems(NCSs),which relies on two modified uniform quantization policies,the Paillier cryptosystem,and an event-triggered strategy.Due to the fact that only integers can work in the Pailler cryptosystem,both the real-valued control gain and system state need to be first quantized before encryption.This is dramatically different from the existing quantized control methods,where only the quantization of a single value,e.g.,the control input or the system state,is considered.To handle this issue,static and dynamic quantization policies are presented,which achieve the desired integer conversions and guarantee asymptotic convergence of the quantized system state to the equilibrium.Then,the quantized system state is encrypted and sent to the controller when the triggering condition,specified by a state-based event-triggered strategy,is satisfied.By doing so,not only the security and confidentiality of data transmitted over the communication network are protected,but also the ciphertext expansion phenomenon can be relieved.Additionally,by tactfully designing the quantization sensitivities and triggering error,the proposed event-driven encrypted control framework ensures the asymptotic stability of the overall closedloop system.Finally,a simulation example of the secure motion control for an inverted pendulum cart system is presented to evaluate the effectiveness of the theoretical results.
基金Scientific Research Project of Liaoning Province Education Department,Code:LJKQZ20222457&LJKMZ20220781Liaoning Province Nature Fund Project,Code:No.2022-MS-291.
文摘As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network.
基金supported by the National Natural Science Foundation of China (62273201,62173209,72134004,62303170)the Research Fund for the Taishan Scholar Project of Shandong Province of China (TSTP20221103)。
文摘Set stabilization is one of the essential problems in engineering systems, and self-triggered control(STC) can save the storage space for interactive information, and can be successfully applied in networked control systems with limited communication resources. In this study, the set stabilization problem and STC design of Boolean control networks are investigated via the semi-tensor product technique. On the one hand, the largest control invariant subset is calculated in terms of the strongly connected components of the state transition graph, by which a graph-theoretical condition for set stabilization is derived. On the other hand, a characteristic function is exploited to determine the triggering mechanism and feasible controls. Based on this, the minimum-time and minimum-triggering open-loop, state-feedback and output-feedback STCs for set stabilization are designed,respectively. As classic applications of self-triggered set stabilization, self-triggered synchronization, self-triggered output tracking and self-triggered output regulation are discussed as well. Additionally, several practical examples are given to illustrate the effectiveness of theoretical results.
基金National Natural Science Foundation of China(U2133208,U20A20161)National Natural Science Foundation of China(No.62273244)Sichuan Science and Technology Program(No.2022YFG0180).
文摘In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set for ATC cybersecurity attacks is constructed by setting the feature states,adding recursive features,and determining the feature criticality.The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data.An autoencoder is introduced into the AI(artificial intelligence)algorithm to encode and decode the characteristics of ATC network security attack behavior to reduce the dimensionality of the ATC network security attack behavior data.Based on the above processing,an unsupervised learning algorithm for clustering detection of ATC network security attacks is designed.First,determine the distance between the clustering clusters of ATC network security attack behavior characteristics,calculate the clustering threshold,and construct the initial clustering center.Then,the new average value of all feature objects in each cluster is recalculated as the new cluster center.Second,it traverses all objects in a cluster of ATC network security attack behavior feature data.Finally,the cluster detection of ATC network security attack behavior is completed by the computation of objective functions.The experiment took three groups of experimental attack behavior data sets as the test object,and took the detection rate,false detection rate and recall rate as the test indicators,and selected three similar methods for comparative test.The experimental results show that the detection rate of this method is about 98%,the false positive rate is below 1%,and the recall rate is above 97%.Research shows that this method can improve the detection performance of security attacks in air traffic control network.
基金Special Fund Project for Technology Innovation of Tianjin City(06FZZDGX01800)
文摘Studied are the controller design and basic principles of intelligent lighting network. TI’s MSP430F123 is used as a main controller. By using the ZigBee modules(Xbee/Xbee-PRO) and the GSM module(SIM300C) for wireless communications, the lighting control is enabled to access wireless network. This system uses a mobile phone to achieve light on-off directly, which can accomplish wireless control of intelligent lighting in families.
文摘Most of the controllers of IM (induction motor) for industrial applications have been designed based on PI controller without consideration of CL (core loss) and SLL (stray load loss). To get the precise performances of torque as well as rotor speed and flux, the above mentioned losses should be considered. Conventional PI controller has overshoot effect at the transient period of the speed response curve. On the other hand, fuzzy logic and ANN (artificial neural network) based controllers can minimize the overshoot effect at the transient period because they have the abilities to deal with the nonlinear systems. In this paper, a comparative analysis is done between PI, fuzzy logic and ANN based speed controllers to find the suitable control strategy for IM with consideration of CL and SLL. The simulation analysis is done by using Matlab/Simulink software. The simulation results show that the fuzzy logic based speed controller gives better responses than ANN and conventional PI based speed controllers in terms of rotor speed, electromagnetic torque and rotor flux of IM.
基金This work was supported by the National Natural Science Foundation of China (No.60574013, 60274009), and the Natural Science Fundation ofLiaoning Province (No.20032020).
文摘This paper deals with the problem of switching between an open-loop estimator and a close-loop estimator for compensating transmission error and packet dropout of networked control systems. Switching impulse is considered in order to reduce the error between theory and application, a sufficient condition for exponential stabilization of networked control systems under a given switching rule is presented by multiple Lyapunov-like functions. These results are presented for both continuous-time and discrete-time domains. Controllers are designed by means of linear matrix inequalities. Sim- ulation results show the feasibility and efficiency of the proposed method.
基金supported by the National Science Foundation of China (No.60474003)Hunan Provincial Natural Science Foundation of China (07JJ6126)the Postdoctoral Science Foundation of Central South University
文摘This paper focuses on the problem of stability analysis and controller design for a class of delay systems based on networked control systems. By introducing some free matrix variables, some criteria for stability analysis and observer-based control law design can be obtained by the solving of linear matrix inequalities. A numerical example is also offered to prove the effectiveness of the proposed method.
基金The work was supported in part by the National Natural Science Foundation of China (No. 60174010, 60404022)the Key Scientific ResearchProject of the Education Ministry (No. 204014)
文摘In this paper, the stabilization problem for a class of networked control systems (NCSs) with data packet dropouts and transmission time delays is considered, where the delays are time-varying and uncertain, the data packet dropout is modeled as a two-state Markov chain. To compensate the lost packet, a data packet dropout compensator is established. Thus a more realistic model for such NCSs is presented. Sufficient conditions for the stabilization of the new resulting system are derived in the form of linear matrix inequalities (LMIs). Numerical example illustrates the solvability and effectiveness of the results.
基金supported by the National Natural Science Foundation of China (6090402060574006)the Research Fund for the Doctoral Program of Higher Eolucation of China (20070286039)
文摘The globally exponential stability of nonlinear impul- sive networked control systems (NINCS) with time delay and packet dropouts is investigated. By applying Lyapunov function theory, sufficient conditions on the global exponential stability are derived by introducing a comparison system and estimating the corresponding Cauchy matrix. An impulsive controller is explicitly designed to achieve exponential stability and ensure state con- verge with a given decay rate for the system. The Lorenz oscillator system is presented as a numerical example to illustrate the theo- retical results and effectiveness of the proposed controller design procedure.
基金supported by the China Scholarship Council(CSC)the National Natural Science Foundation of China(92067106)。
文摘A discrete predictor-based control method is developed for a class of linear time-invariant networked control systems with a sensor-to-controller time-varying delay and a controller-to-actuator uncertain constant delay,which can be potentially applied to vision-based control systems.The control scheme is composed of a state prediction and a discrete predictor-based controller.The state prediction is used to compensate for the effect of the sensor-to-controller delay,and the system can be stabilized by the discrete predictor-based controller.Moreover,it is shown that the control scheme is also robust with respect to slight message rejections.Finally,the main theoretical results are illustrated by simulation results and experimental results based on a networked visual servo inverted pendulum system.
基金This work was supported by973programof China (No .2002CB312200)National Natural Science Foundation of China (No .60434030) .
文摘This paper addresses the random time-delays and packet losses issues of networked control systems (NCS) within the framework of jump linear systems with mode-dependent time-delays. A new delay-dependent condition on the stochastic stability is proposed by a new stochastic Lyapunov-Krasovskii functional. The condition is formulated as a set of coupled linear matrix inequalities (LMIs). As an example to verify the proposed method, an inverted-pendulum system with network is considered. The simulation results demonstrate the effectiveness of the method.
基金supported by the Foundation for Innovative Research Groups of the National Natural Science Foundation of China (No. 61521003)The National Key R&D Program of China (No.2016YFB0800101)+1 种基金the National Science Foundation for Distinguished Young Scholars of China (No.61602509)Henan Province Key Technologies R&D Program of China(No.172102210615)
文摘Controller vulnerabilities allow malicious actors to disrupt or hijack the Software-Defined Networking. Traditionally, it is static mappings between the control plane and data plane. Adversaries have plenty of time to exploit the controller's vulnerabilities and launch attacks wisely. We tend to believe that dynamically altering such static mappings is a promising approach to alleviate this issue, since a moving target is difficult to be compromised even by skilled adversaries. It is critical to determine the right time to conduct scheduling and to balance the overhead afforded and the security levels guaranteed. Little previous work has been done to investigate the economical time in dynamic-scheduling controllers. In this paper, we take the first step to both theoretically and experimentally study the scheduling-timing problem in dynamic control plane. We model this problem as a renewal reward process and propose an optimal algorithm in deciding the right time to schedule with the objective of minimizing the long-term loss rate. In our experiments, simulations based on real network attack datasets are conducted and we demonstrate that our proposed algorithm outperforms given scheduling schemes.
基金supported by the project of "SDUST Qunxing Program"(No.qx0902075)
文摘By combining the Back-Propagation (BP) neural network with conventional proportional Integral Derivative (PID) controller, a new temperature control strategy of the export steam in supercritical electric power plant is put forward. This scheme can effectively overcome the large time delay, inertia of the export steam and the influencee of object in varying operational parameters. Thus excellent control quality is obtaitud. The present paper describes the development and application of neural network based controller to control the temperature of the boiler's export steam. Through simulation in various situations, it validates that the control quality of this control system is apparently superior to the conventional PID control system.
基金Project supported by the Key Program for the National Natural Science Foundation of China(Grant No.61333003)the General Program for the National Natural Science Foundation of China(Grant No.61273104)
文摘This paper discusses the model-based predictive controller design of networked nonlinear systems with communica- tion delay and data loss. Based on the analysis of the closed-loop networked predictive control systems, the model-based networked predictive control strategy can compensate for communication delay and data loss in an active way. The designed model-based predictive controller can also guarantee the stability of the closed-loop networked system. The simulation re- suits demonstrate the feasibility and efficacy of the proposed model-based predictive controller design scheme.
文摘The Unified Power Quality Conditioner (UPQC) plays an important role in the constrained delivery of electrical power from the source to an isolated pool of load or from a source to the grid. The proposed system can compensate voltage sag/swell, reactive power compensation and harmonics in the linear and nonlinear loads. In this work, the off line drained data from conventional fuzzy logic controller. A novel control system with a Combined Neural Network (CNN) is used instead of the traditionally four fuzzy logic controllers. The performance of combined neural network controller compared with Proportional Integral (PI) controller and Fuzzy Logic Controller (FLC). The system performance is also verified experimentally.
文摘This paper addresses the decentralized consensus problem for a system of multiple dynamic agents with remote controllers via networking,known as a networked control multi-agent system(NCMAS).It presents a challenging scenario where partial dynamic entities or remote control units are vulnerable to disclosure attacks,making them potentially malicious.To tackle this issue,we propose a secure decentralized control design approach employing a double-layer cryptographic strategy.This approach not only ensures that the input and output information of the benign entities remains protected from the malicious entities but also practically achieves consensus performance.The paper provides an explicit design,supported by theoretical proof and numerical verification,covering stability,steady-state error,and the prevention of computation overflow or underflow.
基金Project (No. F2005000077) supported by the Natural ScienceFoundation of Hebei Province, China
文摘With the current development trend of Ethernet gradually towards the control network of plant-floor layer and devices layer, much management information on Intelligent Circuit Breaker Controller (ICBC) is becoming distributed and networked. This paper describes a mixing structure of complex industrial field control network based on Ethernet frame, then mainly discusses three network management methods of ICBC, such as the interconnection method based on PCI, embedded gateway and em- bedded Web server. At the same time, it also gives the basic hardware framework of implementing interconnection, the type of main components, and the real-time operation system supporting the embedded TCP/IP protocols and Web server.