Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (57)
  • Open Access

    ARTICLE

    Stability Analysis of Cyber-Physical Micro Grid Load Frequency Control System with Time-Varying Delay and Non-Linear Load Perturbations

    D. Vijeswaran1,*, V. Manikandan2

    CMES-Computer Modeling in Engineering & Sciences, Vol.121, No.3, pp. 801-813, 2019, DOI:10.32604/cmes.2019.07793

    Abstract In a cyber-physical micro-grid system, wherein the control functions are executed through open communication channel, stability is an important issue owing to the factors related to the time-delay encountered in the data transfer. Transfer of feedback variable as discrete data packets in communication network invariably introduces inevitable time-delays in closed loop control systems. This delay, depending upon the network traffic condition, inherits a time-varying characteristic; nevertheless, it adversely impacts the system performance and stability. The load perturbations in a micro-grid system are considerably influenced by the presence of fluctuating power generators like wind and solar power. Since these non-conventional energy… More >

  • Open Access

    ARTICLE

    Stability Analysis of Network Controlled Temperature Control System with Additive Delays

    V. Venkatachalam1, *, D. Prabhakaran1

    CMES-Computer Modeling in Engineering & Sciences, Vol.114, No.3, pp. 321-334, 2018, DOI:10.3970/cmes.2018.114.321

    Abstract This paper presents, using Lyapunov-Krasovskii functional technique combined with reciprocal convex lemma is considered for a networked control temperature control system with additive time-varying-delays. In the stability analysis, a new LK functional is assumed, and take the time-derivative of the (LK) functional, using reciprocal convex combination technique was employed to obtain less conservative stability criteria. Finally, the proposed stability analysis culminates into a stability criterion in the LMI (linear matrix inequalities) framework. The results obtained are in accordance with the theoretically obtained in the temperature control system and they are closer to the standard benchmark temperature-control system. More >

  • Open Access

    ABSTRACT

    Application of Kalman Filter and H Methodologies to Estimate Attitude of a Satellite Control System Simulator

    L.C.G. DeSouza1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.5, No.3, pp. 163-172, 2008, DOI:10.3970/icces.2008.005.163

    Abstract Satellite Attitude Control System usually does not have all the states available for feedback; therefore, full state estimation by any sort of filtering methodology becomes essential. A good estimation algorithm must filter out the undesirable noise from the measurement signal. Kalman Filter (KF) technique is a traditional procedure to estimate the states of a linear system that are not always measured directly by the sensors, minimizing the variance of the estimated error. However, the KF is not fully robustness proven in face of unpredictable noise sources and it is not always able to minimize the error under severe conditions. In… More >

  • Open Access

    ABSTRACT

    Network-Marketing: Intelligent Data Control System using Data Mining Technique

    H.S. Fadewar1, S.B. Jagtap1, G.N.Shinde2

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.9, No.1, pp. 57-66, 2009, DOI:10.3970/icces.2009.009.057

    Abstract Data Mining (DM) techniques are well-known for providing flexible and efficient analytical tools for data processing. In this paper, we propose intelligent data control system design and specifications as an example of DM application in marketing data processing. E-Marketing businesses are using Data Mining to identify patterns in customers' buying behavior; identify profitable customer segments; increase marketing return rates; prevent loss of valuable customers; estimate credit risk; identify fraudulent activity and much more. More >

  • Open Access

    ARTICLE

    MSICST: Multiple-Scenario Industrial Control System Testbed for Security Research

    Wei Xu1,2, Yaodong Tao2,3, Chunfang Yang4,*, Huiqin Chen5

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 691-705, 2019, DOI:10.32604/cmc.2019.05678

    Abstract A security testbed is an important aspect of Industrial Control System (ICS) security research. However, existing testbeds still have many problems in that they cannot fully simulate enterprise networks and ICS attacks. This paper presents a Multiple-Scenario Industrial Control System Testbed (MSICST), a hardware-in-the-loop ICS testbed for security research. The testbed contains four typical process scenarios: thermal power plant, rail transit, smart grid, and intelligent manufacturing. We use a combination of actual physical equipment and software simulations to build the process scenario sand table and use real hardware and software to build the control systems, demilitarized zone, and enterprise zone… More >

  • Open Access

    ARTICLE

    Key Process Protection of High Dimensional Process Data in Complex Production

    He Shi1,2,3,4, Wenli Shang1,2,3,4,*, Chunyu Chen1,2,3,4, Jianming Zhao1,2,3,4, Long Yin1, 2, 3, 4

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 645-658, 2019, DOI:10.32604/cmc.2019.05648

    Abstract In order to solve the problem of locating and protecting key processes and detecting outliers efficiently in complex industrial processes. An anomaly detection system which is based on the two-layer model fusion frame is designed in this paper. The key process is located by using the random forest model firstly, then the process data feature selection, dimension reduction and noise reduction are processed. Finally, the validity of the model is verified by simulation experiments. It is shown that this method can effectively reduce the prediction accuracy variance and improve the generalization ability of the traditional anomaly detection model from the… More >

  • Open Access

    ARTICLE

    Event-Based Anomaly Detection for Non-Public Industrial Communication Protocols in SDN-Based Control Systems

    Ming Wan1, Jiangyuan Yao2,*, Yuan Jing1, Xi Jin3,4

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 447-463, 2018, DOI: 10.3970/cmc.2018.02195

    Abstract As the main communication mediums in industrial control networks, industrial communication protocols are always vulnerable to extreme exploitations, and it is very difficult to take protective measures due to their serious privacy. Based on the SDN (Software Defined Network) technology, this paper proposes a novel event-based anomaly detection approach to identify misbehaviors using non-public industrial communication protocols, and this approach can be installed in SDN switches as a security software appliance in SDN-based control systems. Furthermore, aiming at the unknown protocol specification and message format, this approach first restructures the industrial communication sessions and merges the payloads from industrial communication… More >

Displaying 51-60 on page 6 of 57. Per Page