期刊文献+
共找到321篇文章
< 1 2 17 >
每页显示 20 50 100
Optimization of robustness of network controllability against malicious attacks 被引量:3
1
作者 肖延东 老松杨 +1 位作者 侯绿林 白亮 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第11期678-685,共8页
As the controllability of complex networks has attracted much attention recently, how to design and optimize the robustness of network controllability has become a common and urgent problem in the engineering field. I... As the controllability of complex networks has attracted much attention recently, how to design and optimize the robustness of network controllability has become a common and urgent problem in the engineering field. In this work, we propose a method that modifies any given network with strict structural perturbation to effectively enhance its robustness against malicious attacks, called dynamic optimization of controllability. Unlike other structural perturbations, the strict perturbation only swaps the links and keeps the in- and out-degree unchanged. A series of extensive experiments show that the robustness of controllability and connectivity can be improved dramatically. Furthermore, the effectiveness of our method is explained from the views of underlying structure. The analysis results indicate that the optimization algorithm makes networks more homogenous and assortative. 展开更多
关键词 ROBUSTNESS network controllability structure controllability
下载PDF
Quantization and Event-Triggered Policy Design for Encrypted Networked Control
2
作者 Yongxia Shi Ehsan Nekouei 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期946-955,共10页
This paper proposes a novel event-driven encrypted control framework for linear networked control systems(NCSs),which relies on two modified uniform quantization policies,the Paillier cryptosystem,and an event-trigger... This paper proposes a novel event-driven encrypted control framework for linear networked control systems(NCSs),which relies on two modified uniform quantization policies,the Paillier cryptosystem,and an event-triggered strategy.Due to the fact that only integers can work in the Pailler cryptosystem,both the real-valued control gain and system state need to be first quantized before encryption.This is dramatically different from the existing quantized control methods,where only the quantization of a single value,e.g.,the control input or the system state,is considered.To handle this issue,static and dynamic quantization policies are presented,which achieve the desired integer conversions and guarantee asymptotic convergence of the quantized system state to the equilibrium.Then,the quantized system state is encrypted and sent to the controller when the triggering condition,specified by a state-based event-triggered strategy,is satisfied.By doing so,not only the security and confidentiality of data transmitted over the communication network are protected,but also the ciphertext expansion phenomenon can be relieved.Additionally,by tactfully designing the quantization sensitivities and triggering error,the proposed event-driven encrypted control framework ensures the asymptotic stability of the overall closedloop system.Finally,a simulation example of the secure motion control for an inverted pendulum cart system is presented to evaluate the effectiveness of the theoretical results. 展开更多
关键词 Cyber-security encrypted control event-triggered control(ETC) networked control systems(NCSs) semi-homomorphic encryption
下载PDF
The Effect of Key Nodes on theMalware Dynamics in the Industrial Control Network
3
作者 Qiang Fu JunWang +1 位作者 Changfu Si Jiawei Liu 《Computers, Materials & Continua》 SCIE EI 2024年第4期329-349,共21页
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is be... As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network. 展开更多
关键词 Key nodes dynamic model industrial control network SIMULATION
下载PDF
Self-Triggered Set Stabilization of Boolean Control Networks and Its Applications
4
作者 Rong Zhao Jun-e Feng Dawei Zhang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第7期1631-1642,共12页
Set stabilization is one of the essential problems in engineering systems, and self-triggered control(STC) can save the storage space for interactive information, and can be successfully applied in networked control s... Set stabilization is one of the essential problems in engineering systems, and self-triggered control(STC) can save the storage space for interactive information, and can be successfully applied in networked control systems with limited communication resources. In this study, the set stabilization problem and STC design of Boolean control networks are investigated via the semi-tensor product technique. On the one hand, the largest control invariant subset is calculated in terms of the strongly connected components of the state transition graph, by which a graph-theoretical condition for set stabilization is derived. On the other hand, a characteristic function is exploited to determine the triggering mechanism and feasible controls. Based on this, the minimum-time and minimum-triggering open-loop, state-feedback and output-feedback STCs for set stabilization are designed,respectively. As classic applications of self-triggered set stabilization, self-triggered synchronization, self-triggered output tracking and self-triggered output regulation are discussed as well. Additionally, several practical examples are given to illustrate the effectiveness of theoretical results. 展开更多
关键词 Boolean control networks(BCNs) output regulation self-triggered control semi-tensor product of matrices set stabilization SYNCHRONIZATION
下载PDF
Cluster DetectionMethod of Endogenous Security Abnormal Attack Behavior in Air Traffic Control Network
5
作者 Ruchun Jia Jianwei Zhang +2 位作者 Yi Lin Yunxiang Han Feike Yang 《Computers, Materials & Continua》 SCIE EI 2024年第5期2523-2546,共24页
In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set f... In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set for ATC cybersecurity attacks is constructed by setting the feature states,adding recursive features,and determining the feature criticality.The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data.An autoencoder is introduced into the AI(artificial intelligence)algorithm to encode and decode the characteristics of ATC network security attack behavior to reduce the dimensionality of the ATC network security attack behavior data.Based on the above processing,an unsupervised learning algorithm for clustering detection of ATC network security attacks is designed.First,determine the distance between the clustering clusters of ATC network security attack behavior characteristics,calculate the clustering threshold,and construct the initial clustering center.Then,the new average value of all feature objects in each cluster is recalculated as the new cluster center.Second,it traverses all objects in a cluster of ATC network security attack behavior feature data.Finally,the cluster detection of ATC network security attack behavior is completed by the computation of objective functions.The experiment took three groups of experimental attack behavior data sets as the test object,and took the detection rate,false detection rate and recall rate as the test indicators,and selected three similar methods for comparative test.The experimental results show that the detection rate of this method is about 98%,the false positive rate is below 1%,and the recall rate is above 97%.Research shows that this method can improve the detection performance of security attacks in air traffic control network. 展开更多
关键词 Air traffic control network security attack behavior cluster detection behavioral characteristics information gain cluster threshold automatic encoder
下载PDF
Controllability and observability of networked control systems with time-varying delays 被引量:2
6
作者 Li Jinna Zhang Qingling Li Yuan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第4期800-806,共7页
The controllability and observability of networked control systems are studied. Aiming at the networked control system with time-varying delay, the sufficient and necessary conditions for complete controllability and ... The controllability and observability of networked control systems are studied. Aiming at the networked control system with time-varying delay, the sufficient and necessary conditions for complete controllability and complete observability of the system are presented, respectively. Because of Markov characteristic of the network-induced delay, in terms of stochastic theory, a sufficient and necessary condition for completely mean value controllability of networked control systems is obtained. Further, the conditions that the controllability and observability of networked control systems are equivalent to the initial time-invariant system are given. Controllability and observability realization indexes are also discussed, respectively. The numerical example demonstrates the effectiveness of the proposed theory. 展开更多
关键词 networked control system controllability OBSERVABILITY controllability realization index observability realization index.
下载PDF
The Research on Social Networks Public Opinion Propagation Influence Models and Its Controllability 被引量:9
7
作者 Lejun Zhang Tong Wang +3 位作者 Zilong Jin Nan Su Chunhui Zhao Yongjun He 《China Communications》 SCIE CSCD 2018年第7期98-110,共13页
Public opinion propagation control is one of the hot topics in contemporary social network research. With the rapid dissemination of information over the Internet, the traditional isolation and vaccination strategies ... Public opinion propagation control is one of the hot topics in contemporary social network research. With the rapid dissemination of information over the Internet, the traditional isolation and vaccination strategies can no longer achieve satisfactory results. A positive guidance technology for public opinion diffusion is urgently needed. First, based on the analysis of influence network controllability and public opinion diffusion, a positive guidance technology is proposed and a new model that supports external control is established. Second, in combination with the influence network, a public opinion propagation influence network model is designed and a public opinion control point selection algorithm(POCDNSA) is proposed. Finally, An experiment verified that this algorithm can lead to users receiving the correct guidance quickly and accurately, reducing the impact of false public opinion information; the effect of CELF is no better than that of the POCDNSA algorithm. The main reason is that the former is completely based on the diffusion cascade information contained in the training data, but does not consider the specific situation of the network structure and the diffusion of public opinion information in the closed set. thus, the effectiveness and feasibility of the algorithm is proven. The findings of this article therefore provide useful insights for the implementation of public opinion control. 展开更多
关键词 social network public opinion propagation control influence network
下载PDF
A novel intrusion detection model for the CAN bus packet of in-vehicle network based on attention mechanism and autoencoder 被引量:1
8
作者 Pengcheng Wei Bo Wang +2 位作者 Xiaojun Dai Li Li Fangcheng He 《Digital Communications and Networks》 SCIE CSCD 2023年第1期14-21,共8页
The attacks on in-vehicle Controller Area Network(CAN)bus messages severely disrupt normal communication between vehicles.Therefore,researches on intrusion detection models for CAN have positive business value for veh... The attacks on in-vehicle Controller Area Network(CAN)bus messages severely disrupt normal communication between vehicles.Therefore,researches on intrusion detection models for CAN have positive business value for vehicle security,and the intrusion detection technology for CAN bus messages can effectively protect the invehicle network from unlawful attacks.Previous machine learning-based models are unable to effectively identify intrusive abnormal messages due to their inherent shortcomings.Hence,to address the shortcomings of the previous machine learning-based intrusion detection technique,we propose a novel method using Attention Mechanism and AutoEncoder for Intrusion Detection(AMAEID).The AMAEID model first converts the raw hexadecimal message data into binary format to obtain better input.Then the AMAEID model encodes and decodes the binary message data using a multi-layer denoising autoencoder model to obtain a hidden feature representation that can represent the potential features behind the message data at a deeper level.Finally,the AMAEID model uses the attention mechanism and the fully connected layer network to infer whether the message is an abnormal message or not.The experimental results with three evaluation metrics on a real in-vehicle CAN bus message dataset outperform some traditional machine learning algorithms,demonstrating the effectiveness of the AMAEID model. 展开更多
关键词 Controller area network bus packet In-vehicle network Attention mechanism Autoencoder
下载PDF
Consensus of networked control multi-agent systems using a double-layer encryption scheme 被引量:1
9
作者 Yamin Yan Zhiyong Chen Vijay Varadharajan 《Journal of Automation and Intelligence》 2023年第4期218-226,共9页
This paper addresses the decentralized consensus problem for a system of multiple dynamic agents with remote controllers via networking,known as a networked control multi-agent system(NCMAS).It presents a challenging ... This paper addresses the decentralized consensus problem for a system of multiple dynamic agents with remote controllers via networking,known as a networked control multi-agent system(NCMAS).It presents a challenging scenario where partial dynamic entities or remote control units are vulnerable to disclosure attacks,making them potentially malicious.To tackle this issue,we propose a secure decentralized control design approach employing a double-layer cryptographic strategy.This approach not only ensures that the input and output information of the benign entities remains protected from the malicious entities but also practically achieves consensus performance.The paper provides an explicit design,supported by theoretical proof and numerical verification,covering stability,steady-state error,and the prevention of computation overflow or underflow. 展开更多
关键词 Multi-agent systems networked control Cyberphysical security Encryption CONSENSUS
下载PDF
Factors That Affect the Centrality Controllability of Scale-Free Networks
10
作者 胡栋 孙先 +2 位作者 李平 陈雁 张捷 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第12期174-177,共4页
The influence of a node in a network can be characterized by its macroscopic properties such as eigenvector centrality. An issue of significant theoretical and practical interest is to modify the influence or roles of... The influence of a node in a network can be characterized by its macroscopic properties such as eigenvector centrality. An issue of significant theoretical and practical interest is to modify the influence or roles of the nodes in a network, and recent advances indicate that this can be achieved by just controlling a subset of nodes: the socalled controllers. However, the relationship between the structural properties of a network and its controllability, e.g., the control of node importance, is still not well understood. Here we systematically" explore this relationship by constructing scale-free networks with a fixed degree sequence and tunable network characteristics. We calculate the relative size (nc*) of the minimai controlling set required to controi the importance of each individual node in a network. It is found that while clustering has no significant impact on nc*, changes in degree-degree correlations, heterogeneity and the average degree of networks demonstrate a discernible impact on its controllability. 展开更多
关键词 NET Factors That Affect the Centrality controllability of Scale-Free networks
下载PDF
Research on the Controllability of Software Networks Based on the Source-Driven Model
11
作者 He Tian Xianwei Meng +2 位作者 Nan Hu Yanchao Wang Tianyi Yang 《Journal of Computer and Communications》 2022年第8期26-40,共15页
The complexity of software system has been increasing with software evolution, which affects the stability of software structure. Most of the existing measurement methods focus on the analysis of the macro-characteris... The complexity of software system has been increasing with software evolution, which affects the stability of software structure. Most of the existing measurement methods focus on the analysis of the macro-characteristics of the network topology, but lacked a certain depth and expansion to explore the nature of the complexity of the software structure, for this purpose, the complex network control theory was applied to the study of software network controllability. Firstly, the Source-Driver (SD) model was established based on the system control theory, the driver node sets were obtained by the minimum input theorem in the control process of software network topology;Then the relationship between the degree and center degree, the relationship between the in-degree and the out-degree of the software network topology were further analyzed owing to the non-uniqueness of the driver node sets;Finally, the values of the four indicators in the software system were compared. Experimental results show that the driver node sets in the software networks are mainly composed of nodes with low degree values, but it does not mean that the nodes whose in-degree values and out-degree values are also low;The action on control nodes and driver nodes are not random, the controllability of the driver nodes is closely related to the in-degree, when selecting the driver node sets, the network topology characteristics should be considered comprehensively, and the nodes with high degree and center degree are the first choice. The results have important guiding significance for the control, maintenance and redesign of software architecture. 展开更多
关键词 Complex networks Software networks Driver Node Sets network Control
下载PDF
A UAV-Assisted V2X Network Architecture with Separated Data Transmission and Network Control
12
作者 Xiao Ma Liang Wang +2 位作者 Weijia Han Xijun Wang Tingting Shang 《China Communications》 SCIE CSCD 2023年第6期260-276,共17页
With the explosive increasing number of connecting devices such as smart phones, vehicles,drones, and satellites in the wireless networks, how to manage and control such a huge number of networking nodes has become a ... With the explosive increasing number of connecting devices such as smart phones, vehicles,drones, and satellites in the wireless networks, how to manage and control such a huge number of networking nodes has become a great challenge. In this paper, we combine the advantages of centralized networks and distributed networks approaches for vehicular networks with the aid of Unmanned Aerial Vehicle(UAV), and propose a Center-controlled Multihop Wireless(CMW) networking scheme consisting of data transmission plane performed by vehicles and the network control plane implemented by the UAV.Besides, we jointly explore the advantages of Medium Access Control(MAC) protocols in the link layer and routing schemes in the network layer to facilitate the multi-hop data transmission for the ground vehicles.Particularly, the network control plane in the UAV can manage the whole network effectively via fully exploiting the acquired network topology information and traffic requests from each vehicle, and implements various kinds of control based on different traffic demands, which can enhance the networking flexibility and scalability significantly in vehicular networks.Simulation results validate the advantages of the proposed scheme compared with existing methods. 展开更多
关键词 V2X networks centralized network control network architecture UAV routing algorithm
下载PDF
Fast Verification of Network Configuration Updates
13
作者 Jiangyuan Yao Zheng Jiang +5 位作者 Kaiwen Zou Shuhua Weng Yaxin Li Deshun Li Yahui Li Xingcan Cao 《Computers, Materials & Continua》 SCIE EI 2023年第1期293-311,共19页
With the expansion of network services,large-scale networks have progressively become common.The network status changes rapidly in response to customer needs and configuration changes,so network configuration changes ... With the expansion of network services,large-scale networks have progressively become common.The network status changes rapidly in response to customer needs and configuration changes,so network configuration changes are also very frequent.However,no matter what changes,the network must ensure the correct conditions,such as isolating tenants from each other or guaranteeing essential services.Once changes occur,it is necessary to verify the after-changed network.Whereas,for the verification of large-scale network configuration changes,many current verifiers show poor efficiency.In order to solve the problem ofmultiple global verifications caused by frequent updates of local configurations in large networks,we present a fast configuration updates verification tool,FastCUV,for distributed control planes.FastCUV aims to enhance the efficiency of distributed control plane verification for medium and large networks while ensuring correctness.This paper presents a method to determine the network range affected by the configuration change.We present a flow model and graph structure to facilitate the design of verification algorithms and speed up verification.Our scheme verifies the network area affected by obtaining the change of the Forwarding Information Base(FIB)before and after.FastCUV supports rich network attributes,meanwhile,has high efficiency and correctness performance.After experimental verification and result analysis,our method outperforms the state-of-the-art method to a certain extent. 展开更多
关键词 network verification configuration updates network control plane forwarding information base
下载PDF
Security,Controllability,Manageability and Survivability in Trustworthy Network
14
作者 Wang Sheng, Yu Hongfang, Xu Du (School of Communication and Information Engineering ,University of Electronic Science and Technology of China, Chengdu, Sichuan 610054, China) 《ZTE Communications》 2008年第1期33-38,共6页
The Internet plays increasingly important roles in everyone's life; however, the existence of a mismatch between the basic architectural idea beneath the Internet and the emerging requirements for it is becoming m... The Internet plays increasingly important roles in everyone's life; however, the existence of a mismatch between the basic architectural idea beneath the Internet and the emerging requirements for it is becoming more and more obvious. Although the Internet community came up with a consensus that the future network should be trustworthy, the concept of 'trustworthy networks' and the ways leading us to a trustworthy network are not yet clear. This research insists that the security, controllability, manageability, and survivability should be basic properties of a trustworthy network. The key ideas and techniques involved in these properties are studied, and recent developments and progresses are surveyed. At the same time, the technical trends and challenges are briefly discussed. The network trustworthiness could and should be eventually achieved. 展开更多
关键词 Security controllability Manageability and Survivability in Trustworthy network NET
下载PDF
The Deformation Analysis of the 3D Alignment Control Network Based on the Multiple Congruence Models
15
作者 Xudong ZHANG Wenjun CHEN +5 位作者 Xiaodong ZHANG Yajun ZHENG Bin ZHANG Shaoming WANG Jiandong YUAN Guozhen SUN 《Journal of Geodesy and Geoinformation Science》 CSCD 2023年第2期21-31,共11页
In the construction and maintenance of particle accelerators,all the accelerator elements should be installed in the same coordinate system,only in this way could the devices in the actual world be consistent with the... In the construction and maintenance of particle accelerators,all the accelerator elements should be installed in the same coordinate system,only in this way could the devices in the actual world be consistent with the design drawings.However,with the occurrence of the movements of the reinforced concrete cover plates at short notice or building deformations in the long term,the control points upon the engineering structure will be displaced,and the fitness between the subnetwork and the global control network may be irresponsible.Therefore,it is necessary to evaluate the deformations of the 3D alignment control network.Different from the extant investigations,in this paper,to characterize the deformations of the control network,all of the congruent models between the points measured in different epochs have been identified,and the congruence model with the most control points is considered as the primary or fundamental model,the remaining models are recognized as the additional ones.Furthermore,the discrepancies between the primary S-transformation parameters and the additional S-transformation parameters can reflect the relative movements of the additional congruence models.Both the iterative GCT method and the iterative combinatorial theory are proposed to detect multiple congruence models in the control network.Considering the actual work of the alignment,it is essential to identify the competitive models in the monitoring network,which can provide us a hint that,even the fitness between the subnetwork and the global control network is good,there are still deformations which may be ignored.The numerical experiments show that the suggested approaches can describe the deformation of the 3D alignment control network roundly. 展开更多
关键词 similarity transformation 3D alignment control network deformation analysis hypothesis testing iterative global congruence test iterative combinatorial theory
下载PDF
A Tutorial on Quantized Feedback Control
16
作者 Minyue Fu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期5-17,共13页
In this tutorial paper, we explore the field of quantized feedback control, which has gained significant attention due to the growing prevalence of networked control systems. These systems require the transmission of ... In this tutorial paper, we explore the field of quantized feedback control, which has gained significant attention due to the growing prevalence of networked control systems. These systems require the transmission of feedback information, such as measurements and control signals, over digital networks, presenting novel challenges in estimation and control design. Our examination encompasses various topics, including the minimal information needed for effective feedback control, the design of quantizers, strategies for quantized control design and estimation,achieving consensus control with quantized data, and the pursuit of high-precision tracking using quantized measurements. 展开更多
关键词 Consensus control high-precision control networked control quantized estimation quantized feedback control robust control
下载PDF
Time-stamped predictive functional control for networked control systems with random delays
17
作者 张奇智 张卫东 《Journal of Southeast University(English Edition)》 EI CAS 2005年第2期149-152,共4页
The random delays in a networked control system (NCS) degrade control performance and can even destabilize the control system.To deal with this problem,the time-stamped predictive functional control (PFC) algorithm is... The random delays in a networked control system (NCS) degrade control performance and can even destabilize the control system.To deal with this problem,the time-stamped predictive functional control (PFC) algorithm is proposed,which generalizes the standard PFC algorithm to networked control systems with random delays.The algorithm uses the time-stamp method to estimate the control delay,predicts the future outputs based on a discrete time delay state space model,and drives the control law that applies to an NCS from the idea of a PFC algorithm.A networked control system was constructed based on TrueTime simulator,with which the time-stamped PFC algorithm was compared with the standard PFC algorithm.The response curves show that the proposed algorithm has better control performance. 展开更多
关键词 networked control systems random delays predictive functional control industrial Ethernet
下载PDF
Mathematical Modeling and Control Algorithm Development for Bidirectional Power Flow in CCS-CNT System
18
作者 Sinqobile Wiseman Nene 《Journal of Power and Energy Engineering》 2024年第9期131-143,共12页
As the demand for more efficient and adaptable power distribution systems intensifies, especially in rural areas, innovative solutions like the Capacitor-Coupled Substation with a Controllable Network Transformer (CCS... As the demand for more efficient and adaptable power distribution systems intensifies, especially in rural areas, innovative solutions like the Capacitor-Coupled Substation with a Controllable Network Transformer (CCS-CNT) are becoming increasingly critical. Traditional power distribution networks, often limited by unidirectional flow capabilities and inflexibility, struggle to meet the complex demands of modern energy systems. The CCS-CNT system offers a transformative approach by enabling bidirectional power flow between high-voltage transmission lines and local distribution networks, a feature that is essential for integrating renewable energy sources and ensuring reliable electrification in underserved regions. This paper presents a detailed mathematical representation of power flow within the CCS-CNT system, emphasizing the control of both active and reactive power through the adjustment of voltage levels and phase angles. A control algorithm is developed to dynamically manage power flow, ensuring optimal performance by minimizing losses and maintaining voltage stability across the network. The proposed CCS-CNT system demonstrates significant potential in enhancing the efficiency and reliability of power distribution, making it particularly suited for rural electrification and other applications where traditional methods fall short. The findings underscore the system's capability to adapt to varying operational conditions, offering a robust solution for modern power distribution challenges. 展开更多
关键词 Capacitor Couple Substation Ferroresonance Power Flow Control Controllable network Controller Capacitor-Coupled Substation Incorporating Controllable network Transformer (CCS-CNT) System System Modeling
下载PDF
Research on robust fault-tolerant control for networked control system with packet dropout 被引量:50
19
作者 Huo Zhihong Fang Huajing 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第1期76-82,共7页
A kind of networked control system with network-induced delay and packet dropout, modeled on asynchronous dynamical systems was tested, and the integrity design of the networked control system with sensors failures an... A kind of networked control system with network-induced delay and packet dropout, modeled on asynchronous dynamical systems was tested, and the integrity design of the networked control system with sensors failures and actuators failures was analyzed using hybrid systems technique based on the robust fault-tolerant control theory. The parametric expression of controller is given based on the feasible solution of linear matrix inequality. The simulation results are provided on the basis of detailed theoretical analysis, which further demonstrate the validity of the proposed schema. 展开更多
关键词 networked control system (NCS) Fault-tolerant control (FTC) Asynchronous dynamical systems (ADS) Integrity design Packet dropout Time delay
下载PDF
Fundamental Issues in Networked Control Systems 被引量:8
20
作者 Magdi S.Mahmoud a Mutaz M.Hamdan 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2018年第5期902-922,共21页
Abstract--This paper provides a survey on modeling and theories of networked control systems (NCS). In the first part, modeling of the different types of imperfections that affect NCS is discussed. These imperfectio... Abstract--This paper provides a survey on modeling and theories of networked control systems (NCS). In the first part, modeling of the different types of imperfections that affect NCS is discussed. These imperfections are quantization errors, packet dropouts, variable sampling/transmission intervals, vari- able transmission delays, and communication constraints. Then follows in the second part a presentation of several theories that have been applied for controlling networked systems. These theories include: input delay system approach, Markovian system approach, switched system approach, stochastic system approach, impulsive system approach, and predictive control approach. In the last part, some advanced issues in NCS including decentral- ized and distributed NCS, cloud control system, and co-design of NCS are reviewed. Index Terms--Decentralized networked control systems (NCS), distributed networked control systems, network constraints, net- worked control system, quantization, time delays. 展开更多
关键词 Decentralized networked control systems(NCS) distributed networked control systems network constraints networked control system QUANTIZATION time delays
下载PDF
上一页 1 2 17 下一页 到第
使用帮助 返回顶部