IET Cyber-Physical Systems: Theory and Applications最新文献

筛选
英文 中文
Social Co-OS: Cyber-human social Co-operating system Social Co-OS:网络-人类社会合作系统
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2022-09-17 DOI: 10.1049/cps2.12037
Takeshi Kato, Yasuyuki Kudo, Junichi Miyakoshi, Misa Owa, Yasuhiro Asa, Takashi Numata, Ryuji Mine, Hiroyuki Mizuno
{"title":"Social Co-OS: Cyber-human social Co-operating system","authors":"Takeshi Kato,&nbsp;Yasuyuki Kudo,&nbsp;Junichi Miyakoshi,&nbsp;Misa Owa,&nbsp;Yasuhiro Asa,&nbsp;Takashi Numata,&nbsp;Ryuji Mine,&nbsp;Hiroyuki Mizuno","doi":"10.1049/cps2.12037","DOIUrl":"https://doi.org/10.1049/cps2.12037","url":null,"abstract":"<p>The novel concept of a Cyber-Human Social System (CHSS) and a diverse and pluralistic ‘mixed-life society’ is proposed, wherein cyber and human societies commit to each other. This concept enhances the Cyber-Physical System (CPS), which is associated with the current Society 5.0, a social vision realised through the fusion of cyber (virtual) and physical (real) spaces following information society (Society 4.0 and Industry 4.0). Moreover, the CHSS enhances the Human-CPS, the Human-in-the-Loop CPS (HiLCPS), and the Cyber-Human System by intervening in individual behaviour pro-socially and supporting consensus building. As a form of architecture that embodies the CHSS concept, the Cyber-Human Social Co-Operating System (Social Co-OS) that combines cyber and human societies is shown. In this architecture, the cyber and human systems cooperate through the fast loop (operation and administration) and slow loop (consensus and politics). Furthermore, the technical content and current implementation of the basic functions of the Social Co-OS are described. These functions consist of individual behavioural diagnostics, interventions in the fast loop, group decision diagnostics and consensus building in the slow loop. Subsequently, this system will contribute to mutual aid communities and platform cooperatives.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 1","pages":"1-14"},"PeriodicalIF":1.5,"publicationDate":"2022-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12037","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50136491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
NEFTSec: Networked federation testbed for cyber-physical security of smart grid: Architecture, applications, and evaluation 智能电网网络物理安全的网络联合测试平台:架构、应用和评估
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2022-08-26 DOI: 10.1049/cps2.12033
Vivek Kumar Singh, Manimaran Govindarasu, Donald Porschet, Edward Shaffer, Morris Berman
{"title":"NEFTSec: Networked federation testbed for cyber-physical security of smart grid: Architecture, applications, and evaluation","authors":"Vivek Kumar Singh,&nbsp;Manimaran Govindarasu,&nbsp;Donald Porschet,&nbsp;Edward Shaffer,&nbsp;Morris Berman","doi":"10.1049/cps2.12033","DOIUrl":"https://doi.org/10.1049/cps2.12033","url":null,"abstract":"<p>As today's power grid is evolving into a densely interconnected cyber-physical system (CPS), a high fidelity and multifaceted testbed environment is needed to perform cybersecurity experiments in a realistic grid environment. Traditional standalone CPS testbeds lack the ability to emulate complex cyber-physical interdependencies between multiple smart grid domains in a real-time environment. Therefore, there are ongoing research and development (R&amp;D) efforts to develop an interconnected CPS testbed by sharing geographically dispersed testbed resources to perform distributed simulation while analysing simulation fidelity. This paper presents a networked federation testbed for cybersecurity evaluation of today's and emerging smart grid environments. Specifically, it presents two novel testbed architectures, including cyber federation and cyber-physical federation, identifies R&amp;D applications, and also describes testbed building blocks with experimental case studies. It also presents a novel co-simulation interface algorithm to facilitate distributed simulation within cyber-physical federation. The resources available at the PowerCyber CPS security testbed at Iowa State University (ISU) and the US Army Research Laboratory are utilised to develop this platform for performing multiple experimental case studies pertaining to wide-area protection and control applications in power system. Finally, experimental results are presented to analyse the simulation fidelity and real-time performance of the testbed federation.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"7 4","pages":"197-211"},"PeriodicalIF":1.5,"publicationDate":"2022-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12033","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91940201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real-time out-of-distribution detection in cyber-physical systems with learning-enabled components 具有学习功能组件的网络物理系统中的实时分布外检测
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2022-08-15 DOI: 10.1049/cps2.12034
Feiyang Cai, Xenofon Koutsoukos
{"title":"Real-time out-of-distribution detection in cyber-physical systems with learning-enabled components","authors":"Feiyang Cai,&nbsp;Xenofon Koutsoukos","doi":"10.1049/cps2.12034","DOIUrl":"https://doi.org/10.1049/cps2.12034","url":null,"abstract":"<p>Learning-enabled components (LECs) such as deep neural networks are used increasingly in cyber-physical systems (CPS) since they can handle the uncertainty and variability of the environment and increase the level of autonomy. LECs, however, may compromise system safety since their predictions may have large errors, for example, when the data available at runtime are different than the data used for training. This study considers the problem of efficient and robust out-of-distribution detection for learning-enabled CPS. Out-of-distribution detection using a single input example is typically not robust and may result in a large number of false alarms. The proposed approach utilises neural network architectures that are used to compute efficiently the nonconformity of new inputs relative to the training data. Specifically, variational autoencoder and deep support vector data description networks are used to learn models for the real-time detection of out-of-distribution high-dimensional inputs. Robustness can be improved by incorporating saliency maps that identify parts of the input contributing most to the LEC predictions. We demonstrate the approach using simulation case studies of an advanced emergency braking system and a self-driving end-to-end controller, as well as a real-world data set for autonomous driving. The experimental results show a small detection delay with a very small number of false alarms while the execution time is comparable to the execution time of the original LECs.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"7 4","pages":"212-234"},"PeriodicalIF":1.5,"publicationDate":"2022-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12034","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91836938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The real-time state identification of the electricity-heat system based on Borderline-SMOTE and XGBoost 基于 Borderline-SMOTE 和 XGBoost 的电热系统实时状态识别
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2022-08-11 DOI: 10.1049/cps2.12032
Xin Pei, Fei Mei, Jiaqi Gu
{"title":"The real-time state identification of the electricity-heat system based on Borderline-SMOTE and XGBoost","authors":"Xin Pei,&nbsp;Fei Mei,&nbsp;Jiaqi Gu","doi":"10.1049/cps2.12032","DOIUrl":"10.1049/cps2.12032","url":null,"abstract":"<p>It is meaningful to study the real-time state monitoring and identification of integrated energy system and grasp its state in time for stable operation. A state identification method based on multi-class data equalisation and extreme gradient boost (XGBoost) is proposed for integrated energy systems. First, Latin hypercube sampling is used to simulate the load at different moments. Different system states are set up and combined with the simulative load at different moments to determine the system operation state at different moments. Then, the energy flow model is used to calculate the system power flow under different states, and the feature indexes are obtained to form the original data set. Aiming at the unbalanced data, the oversampling technology is used to preprocess data to achieve the balance of data sets. The pre-processed data is utilised to train the XGBoost, and the optimal hyperparameters of the model are obtained based on the K-fold cross-validation and grid search. Finally, the pre-processed data set is used to verify the proposed method. The calculation results show the accuracy of the identification model reaches 87.79%. Compared with traditional methods, the model can accurately identify the operating state of the electricity–heat energy system at any time section.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 4","pages":"236-246"},"PeriodicalIF":1.5,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12032","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73856072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Corrigendum: Cyber-physical component ranking for risk sensitivity analysis using betweenness centrality 勘误:使用中间性中心性进行风险敏感性分析的网络物理组件排序
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2022-06-15 DOI: 10.1049/cps2.12025
Amarachi Umunnakwe
{"title":"Corrigendum: Cyber-physical component ranking for risk sensitivity analysis using betweenness centrality","authors":"Amarachi Umunnakwe","doi":"10.1049/cps2.12025","DOIUrl":"https://doi.org/10.1049/cps2.12025","url":null,"abstract":"","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"7 2","pages":"112"},"PeriodicalIF":1.5,"publicationDate":"2022-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12025","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91839066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-driven lumped dynamic modelling of wind farm frequency regulation characteristics 数据驱动的风电场频率调节特性集总动态建模
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2022-05-09 DOI: 10.1049/cps2.12031
Shaolin Li, Jianmou Lu, Shiyao Qin, Yang Hu, Fang Fang
{"title":"Data-driven lumped dynamic modelling of wind farm frequency regulation characteristics","authors":"Shaolin Li,&nbsp;Jianmou Lu,&nbsp;Shiyao Qin,&nbsp;Yang Hu,&nbsp;Fang Fang","doi":"10.1049/cps2.12031","DOIUrl":"10.1049/cps2.12031","url":null,"abstract":"<p>High proportion of wind power in the power grid leads to the problem of power system frequency instability, which requires the wind farm itself to have the ability of frequency adjustment; therefore, it is particularly important to conduct modelling of wind farm frequency regulation (WFFR) response characteristics. During the modelling process, it is generally necessary to establish a model for each working condition separately, which will bring huge workload. In addition, the accuracy of the model decreases when the frequency response is non-linear. Therefore, this paper investigates the modelling of WFFR response characteristics in different working conditions. A data preprocessing method based on WFFR strategy and modelling methods is introduced. Then, data-based transfer function models of WFFR response characteristics for different working conditions are constructed. After that, the gaps between different models are measured using a gap metric technique to analyse dynamic similarity between models. Finally, in order to make up for the defect of transfer function models, a non-linear autoregressive with exogenous input neural networks (NARXNN) model of WFFR response characteristics is constructed utilising lumped data of all working conditions; then, the trained model is tested by the data of each working condition to verify the accuracy and universality.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"7 3","pages":"147-156"},"PeriodicalIF":1.5,"publicationDate":"2022-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12031","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132379114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dependability-aware routing and scheduling for Time-Sensitive Networking 时间敏感网络的可靠性感知路由和调度
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2022-03-15 DOI: 10.1049/cps2.12030
Niklas Reusch, Silviu S. Craciunas, Paul Pop
{"title":"Dependability-aware routing and scheduling for Time-Sensitive Networking","authors":"Niklas Reusch,&nbsp;Silviu S. Craciunas,&nbsp;Paul Pop","doi":"10.1049/cps2.12030","DOIUrl":"10.1049/cps2.12030","url":null,"abstract":"<p>Time-Sensitive Networking (TSN) extends IEEE 802.1 Ethernet for safety-critical and real-time applications in several areas, for example, automotive, aerospace or industrial automation. However, many of these systems also have stringent security requirements, and security attacks may impair safety. Given a TSN-based distributed architecture, a set of applications with tasks and messages as well as a set of security and redundancy requirements, the authors are interested to synthesise a system configuration such that the real-time, safety and security requirements are upheld. The Timed Efficient Stream Loss-Tolerant Authentication (TESLA) low-resource multicast authentication protocol is used to guarantee the security requirements and redundant disjunct message routes to tolerate link failures. The authors consider that tasks are dispatched using a static cyclic schedule table and that the messages use the time-sensitive traffic class in TSN, which relies on schedule tables (called Gate Control Lists, GCLs) in the network switches. A configuration consists of the schedule tables for tasks as well as the disjoint routes and GCLs for messages. A Constraint Programing-based formulation, which can be used to find an optimal solution with respect to the cost function, is proposed. Additionally, a Simulated Annealing-based metaheuristic, which can find good solution for large test cases, is proposed. The authors evaluate both approaches on several test cases.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"7 3","pages":"124-146"},"PeriodicalIF":1.5,"publicationDate":"2022-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12030","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121921895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Guest editorial: Machine learning for secure cyber-physical industrial control systems 嘉宾评论:用于安全网络物理工业控制系统的机器学习
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2022-02-23 DOI: 10.1049/cps2.12029
Shichao Liu, Ligang Wu, Jose Ignacio Leon, Bo Chen
{"title":"Guest editorial: Machine learning for secure cyber-physical industrial control systems","authors":"Shichao Liu,&nbsp;Ligang Wu,&nbsp;Jose Ignacio Leon,&nbsp;Bo Chen","doi":"10.1049/cps2.12029","DOIUrl":"10.1049/cps2.12029","url":null,"abstract":"&lt;p&gt;Information and communication technologies have increasingly been used to support the exchange of measurements and control signals in industrial control systems, making them important applications of cyber-physical industrial control systems (CPICSs) such as electrical power systems and intelligent transportation systems. While the communication infrastructure significantly facilitates the transmission of vast amounts of data over wide geographical areas, it makes CPICSs vulnerable to cyber-attacks; protecting CPICSs of critical infrastructures from cyber-attacks is crucial and challenging. In order to secure CPICSs, a variety of open challenges need to be tackled, including cyber-physical system modelling approaches, advanced intrusion detection systems, and resilient estimation and control methods. Machine learning (ML) and its emerging algorithms offer the potential of dealing with large-scale data analysis, data processing and decision-making in the security of CPICSs.&lt;/p&gt;&lt;p&gt;This special issue publishes state-of-the-art ML-based solutions for the open challenges in securing CPICSs of critical infrastructures.&lt;/p&gt;&lt;p&gt;When modelling cyber-attacks in CPICSs, most of existing works consider using external disturbances, which follow certain assumptions. While it is not sufficient to model cyber-attacks simply as disturbances, the paper ‘Game theoretic vulnerability management for secondary frequency control of islanded microgrids against false data injection (FDI) attacks’ by S. Liu et al. considers the dynamic interaction between the smart attacker (the spoofer) and the defender the microgrid control centre (MGCC). The authors propose a stochastic game between the MGCC and the attacker for enhancing the vulnerability of the MGCC to FDI attack (wireless spoof attack).&lt;/p&gt;&lt;p&gt;As communication networks are implemented for information exchange between the master and slave sides of bilateral teleoperation systems, they are also exposed to cyber-attack threats. The paper ‘Mode-dependent switching control of bilateral teleoperation against random denial-of-service attacks’ by L. Hu et al. analyses the performance of bilateral teleoperation systems in the presence of random denial-of-service (DoS) attacks and constant transmission delays and proposes a mode-dependent switching controller to mitigate the influence of DoS attacks.&lt;/p&gt;&lt;p&gt;While machine-learning algorithms are helpful in identifying cyber-attacks such as network intrusion, common network intrusion datasets are negatively affected by class imbalance; the normal traffic behaviour constitutes most of the dataset, whereas intrusion traffic behaviour forms a significantly smaller portion. The paper ‘Network intrusion detection using ML approaches: Addressing data imbalance’ by R. Ahsan et al. conducts a comparative evaluation on the impact of data imbalance of various ML algorithms and presents a hybrid voting classifier to improve the results.&lt;/p&gt;&lt;p&gt;To improve the anomaly detection performance w","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"7 1","pages":"1-3"},"PeriodicalIF":1.5,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12029","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125416194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimentation framework for wireless communication systems under jamming scenarios 干扰情况下无线通信系统的实验框架
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2022-01-28 DOI: 10.1049/cps2.12027
Marko Jacovic, Michael J. Liston, Vasil Pano, Geoffrey Mainland, Kapil R. Dandekar
{"title":"Experimentation framework for wireless communication systems under jamming scenarios","authors":"Marko Jacovic,&nbsp;Michael J. Liston,&nbsp;Vasil Pano,&nbsp;Geoffrey Mainland,&nbsp;Kapil R. Dandekar","doi":"10.1049/cps2.12027","DOIUrl":"https://doi.org/10.1049/cps2.12027","url":null,"abstract":"<p>Cyber-physical systems (CPS) integrate control, sensing, and processing into interconnected physical components to support applications within transportation, energy, healthcare, environment, and various other areas. Secure and reliable wireless communication between devices is necessary to enable the widespread adoption of these emerging technologies. Cyber-physical systems devices must be protected against active threats, such as Radio Frequency (RF) Jammers, which intentionally disrupt communication links. Jamming detection and mitigation techniques must be evaluated extensively to validate algorithms prior to full implementation. Challenges related to obtaining zoning permits, Federal Aviation Administration (FAA) pilot certification for Unmanned Aerial Vehicles (UAVs), and Federal Communications Commission (FCC) licencing lead to evaluation limited to simulation-based or simplistic, non-representative hardware experimentation. A site-specific ray-tracing emulation framework is presented to provide a realistic evaluation of communication devices under RF jamming attacks in complex scenarios involving mobility, vehicular, and UAV systems. System architecture and capabilities are provided for the devices under test, real-world jamming adversaries, channel modelling, and channel emulation. Case studies are provided to demonstrate the use of the framework for different applications and jamming threats. The experimental results illustrate the benefit of the ray-tracing emulation system for conducting complex wireless communication studies under the presence of RF jamming.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"7 2","pages":"93-111"},"PeriodicalIF":1.5,"publicationDate":"2022-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12027","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91883051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal control input for discrete-time networked control systems with data dropout 具有数据丢失的离散网络控制系统的最优控制输入
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2022-01-15 DOI: 10.1049/cps2.12028
Tadanao Zanma, Naohiro Yamamoto, Kenta Koiwa, Kang-Zhi Liu
{"title":"Optimal control input for discrete-time networked control systems with data dropout","authors":"Tadanao Zanma,&nbsp;Naohiro Yamamoto,&nbsp;Kenta Koiwa,&nbsp;Kang-Zhi Liu","doi":"10.1049/cps2.12028","DOIUrl":"10.1049/cps2.12028","url":null,"abstract":"<p>These days, networked control systems (NCSs) in which data is transmitted via communication have been actively studied for many potential applications. In an NCS, data dropout degrades control performance depending on network conditions. For an NCS with data dropout, the authors propose a model-predictive-control-based input optimisation, representing data dropout as both a Bernoulli model and a finite-order Markov chain. Using the proposed NCS data dropout model, the authors derive an optimal input that provides the estimated error between the expected state of the plant and a given reference. The proposed control problem is formulated as its equivalent quadratic programming, as executed at each online sampling. The authors also demonstrate simulations and experiments to show the effectiveness of the proposed method.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"7 3","pages":"113-123"},"PeriodicalIF":1.5,"publicationDate":"2022-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12028","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130664018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信