38 resultados para Distributed parameter control systems
Resumo:
Physical Access Control Systems are commonly used to secure doors in buildings such as airports, hospitals, government buildings and offices. These systems are designed primarily to provide an authentication mechanism, but they also log each door access as a transaction in a database. Unsupervised learning techniques can be used to detect inconsistencies or anomalies in the mobility data, such as a cloned or forged Access Badge, or unusual behaviour by staff members. In this paper, we present an overview of our method of inferring directed graphs to represent a physical building network and the flows of mobility within it. We demonstrate how the graphs can be used for Visual Data Exploration, and outline how to apply algorithms based on Information Theory to the graph data in order to detect inconsistent or abnormal behaviour.
Resumo:
Melt viscosity is one of the main factors affecting product quality in extrusion processes particularly with regard to recycled polymers. However, due to wide variability in the physical properties of recycled feedstock, it is difficult to maintain the melt viscosity during extrusion of polymer blends and obtain good quality product without generating scrap. This research investigates the application of ultrasound and temperature control in an automatic extruder controller, which has ability to maintain constant melt viscosity from variable recycled polymer feedstock during extrusion processing. An ultrasonic modulation system has been developed and fitted to the extruder prior to the die to convey ultrasonic energy from a high power ultrasonic generator to the polymer melt. Two separate control loops have been developed to run simultaneously in one controller: the first loop controls the ultrasonic energy or temperature to maintain constant die pressure, the second loop is used to control extruder screw speed to maintain constant throughput at the extruder die. Time response and energy consumption of the control methods in real-time experiments are also investigated and reported this paper.
Resumo:
Cyber-attacks against Smart Grids have been found in the real world. Malware such as Havex and BlackEnergy have been found targeting industrial control systems (ICS) and researchers have shown that cyber-attacks can exploit vulnerabilities in widely used Smart Grid communication standards. This paper addresses a deep investigation of attacks against the manufacturing message specification of IEC 61850, which is expected to become one of the most widely used communication services in Smart Grids. We investigate how an attacker can build a custom tool to execute man-in-the-middle attacks, manipulate data, and affect the physical system. Attack capabilities are demonstrated based on NESCOR scenarios to make it possible to thoroughly test these scenarios in a real system. The goal is to help understand the potential for such attacks, and to aid the development and testing of cyber security solutions. An attack use-case is presented that focuses on the standard for power utility automation, IEC 61850 in the context of inverter-based distributed energy resource devices; especially photovoltaic (PV) generators.
Resumo:
In Italy, standards for the management of free-roaming dogs (FRDs) are defined by regional norms, generating a high variability of approaches around the country. Despite efforts carried out by the competent authorities, FRDs are still a reality impacting upon animal health and welfare and public costs. A similar scenario can be found in many other Mediterranean and Balkan counties. Here we present 14 years of data (2000–2013) retrieved from the admission dog registry of a public shelter (PS) responsible for the collection of stray dogs from one Italian province. The aim of this retrospective study was to describe the local FRD population, identifying its source and to evaluate the effectiveness of the actions implemented by the local authorities. In the investigated period, 7,475 dogs were admitted to the PS. Despite the intense sterilisation plan (mean 381.7 sterilisations per year), the overall number of dogs entering PS did not decrease consistently across the years. Results highlighted a lack of responsibility of owners by failing to sterilise and identify their dogs and allowing intact animals to roam free, therefore producing uncontrolled and unwanted litters. The current dog population management strategy, based on both sheltering and capture-neuter-release programmes, is insufficient to tackle the straying phenomenon. Educational and sterilisation programmes should be an integral part of a successfully implemented FRD control plan. Our results provide further insight on free-roaming dog population dynamics and control systems, and may have important implications for many other local contexts across Europe trying to overcome the straying phenomenon.
Resumo:
In this brief, a hybrid filter algorithm is developed to deal with the state estimation (SE) problem for power systems by taking into account the impact from the phasor measurement units (PMUs). Our aim is to include PMU measurements when designing the dynamic state estimators for power systems with traditional measurements. Also, as data dropouts inevitably occur in the transmission channels of traditional measurements from the meters to the control center, the missing measurement phenomenon is also tackled in the state estimator design. In the framework of extended Kalman filter (EKF) algorithm, the PMU measurements are treated as inequality constraints on the states with the aid of the statistical criterion, and then the addressed SE problem becomes a constrained optimization one based on the probability-maximization method. The resulting constrained optimization problem is then solved using the particle swarm optimization algorithm together with the penalty function approach. The proposed algorithm is applied to estimate the states of the power systems with both traditional and PMU measurements in the presence of probabilistic data missing phenomenon. Extensive simulations are carried out on the IEEE 14-bus test system and it is shown that the proposed algorithm gives much improved estimation performances over the traditional EKF method.
Resumo:
The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable attack specific modules for DDoS, spamming, info-stealing, remote access, boot-sector formatting etc. BlackEnergy has been involved in several high profile cyber physical attacks including the recent Ukraine power grid attack in December 2015. This paper investigates the evolution of BlackEnergy and its cyber attack capabilities. It presents a basic cyber attack model used by BlackEnergy for targeting industrial control systems. In particular, the paper analyzes cyber threats of BlackEnergy for synchrophasor based systems which are used for real-time control and monitoring functionalities in smart grid. Several BlackEnergy based attack scenarios have been investigated by exploiting the vulnerabilities in two widely used synchrophasor communication standards: (i) IEEE C37.118 and (ii) IEC 61850-90-5. Specifically, the paper addresses reconnaissance, DDoS, man-in-the-middle and replay/reflection attacks on IEEE C37.118 and IEC 61850-90-5. Further, the paper also investigates protection strategies for detection and prevention of BlackEnergy based cyber physical attacks.