Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (71)
  • Open Access

    ARTICLE

    A Progressive Output Strategy for Real-time Feedback Control Systems

    Qiming Zou1, Ling Wang1, *, Jie Liu1, Yingtao Jiang2

    Intelligent Automation & Soft Computing, Vol.26, No.3, pp. 631-639, 2020, DOI:10.32604/iasc.2020.012549

    Abstract The real-time requirements imposed on a feedback control system are often hard to be met, as the controller spends a disproportionately large amount of time waiting for a control cycle to reach its final state. When such a final state is established, multiple tasks have to be prioritized and launched altogether simultaneously, and the system is given an extremely short time window to generate its output. This huge gap between the wait and action times, perceived as a load unbalancing problem, hinders a control decision to be made in real time. To address this challenging… More >

  • Open Access

    ARTICLE

    Identifying and Verifying Vulnerabilities through PLC Network Protocol and Memory Structure Analysis

    Joo-Chan Lee1, Hyun-Pyo Choi1, Jang-Hoon Kim1, Jun-Won Kim1, Da-Un Jung1, Ji-Ho Shin1, Jung-Taek Seo1, *

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 53-67, 2020, DOI:10.32604/cmc.2020.011251 - 23 July 2020

    Abstract Cyberattacks on the Industrial Control System (ICS) have recently been increasing, made more intelligent by advancing technologies. As such, cybersecurity for such systems is attracting attention. As a core element of control devices, the Programmable Logic Controller (PLC) in an ICS carries out on-site control over the ICS. A cyberattack on the PLC will cause damages on the overall ICS, with Stuxnet and Duqu as the most representative cases. Thus, cybersecurity for PLCs is considered essential, and many researchers carry out a variety of analyses on the vulnerabilities of PLCs as part of preemptive efforts More >

  • Open Access

    REVIEW

    Review of PLC Security Issues in Industrial Control System

    Xiaojun Pan, Zhuoran Wang, Yanbin Sun*

    Journal of Cyber Security, Vol.2, No.2, pp. 69-83, 2020, DOI:10.32604/jcs.2020.010045 - 14 July 2020

    Abstract Programmable Logic Controllers (PLC), core of industrial control systems, is widely used in industrial control systems. The security of PLC is the key to the security of industrial control systems. Nowadays, a large number of industrial control systems are connected to the Internet which exposes the PLC equipment to the Internet, and thus raising security concerns. First of all, we introduce the basic principle of PLC in this paper. Then we analyze the PLC code security, firmware security, network security, virus vulnerability and Modbus communication protocol by reviewing the previous related work. Finally, we make More >

  • Open Access

    ARTICLE

    Reentry Attitude Tracking Control for Hypersonic Vehicle with Reaction Control Systems via Improved Model Predictive Control Approach

    Kai Liu1, 2, Zheng Hou2, *, Zhiyong She2, Jian Guo2

    CMES-Computer Modeling in Engineering & Sciences, Vol.122, No.1, pp. 131-148, 2020, DOI:10.32604/cmes.2020.08124 - 01 January 2020

    Abstract This paper studies the reentry attitude tracking control problem for hypersonic vehicles (HSV) equipped with reaction control systems (RCS) and aerodynamic surfaces. The attitude dynamical model of the hypersonic vehicles is established, and the simplified longitudinal and lateral dynamic models are obtained, respectively. Then, the compound control allocation strategy is provided and the model predictive controller is designed for the pitch channel. Furthermore, considering the complicated jet interaction effect of HSV during RCS is working, an improved model predictive control approach is presented by introducing the online parameter estimation of the jet interaction coefficient for More >

  • Open Access

    ARTICLE

    Stability Analysis of Cyber-Physical Micro Grid Load Frequency Control System with Time-Varying Delay and Non-Linear Load Perturbations

    D. Vijeswaran1,*, V. Manikandan2

    CMES-Computer Modeling in Engineering & Sciences, Vol.121, No.3, pp. 801-813, 2019, DOI:10.32604/cmes.2019.07793

    Abstract In a cyber-physical micro-grid system, wherein the control functions are executed through open communication channel, stability is an important issue owing to the factors related to the time-delay encountered in the data transfer. Transfer of feedback variable as discrete data packets in communication network invariably introduces inevitable time-delays in closed loop control systems. This delay, depending upon the network traffic condition, inherits a time-varying characteristic; nevertheless, it adversely impacts the system performance and stability. The load perturbations in a micro-grid system are considerably influenced by the presence of fluctuating power generators like wind and solar… More >

  • Open Access

    ARTICLE

    MSICST: Multiple-Scenario Industrial Control System Testbed for Security Research

    Wei Xu1,2, Yaodong Tao2,3, Chunfang Yang4,*, Huiqin Chen5

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 691-705, 2019, DOI:10.32604/cmc.2019.05678

    Abstract A security testbed is an important aspect of Industrial Control System (ICS) security research. However, existing testbeds still have many problems in that they cannot fully simulate enterprise networks and ICS attacks. This paper presents a Multiple-Scenario Industrial Control System Testbed (MSICST), a hardware-in-the-loop ICS testbed for security research. The testbed contains four typical process scenarios: thermal power plant, rail transit, smart grid, and intelligent manufacturing. We use a combination of actual physical equipment and software simulations to build the process scenario sand table and use real hardware and software to build the control systems, More >

  • Open Access

    ARTICLE

    Key Process Protection of High Dimensional Process Data in Complex Production

    He Shi1,2,3,4, Wenli Shang1,2,3,4,*, Chunyu Chen1,2,3,4, Jianming Zhao1,2,3,4, Long Yin1, 2, 3, 4

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 645-658, 2019, DOI:10.32604/cmc.2019.05648

    Abstract In order to solve the problem of locating and protecting key processes and detecting outliers efficiently in complex industrial processes. An anomaly detection system which is based on the two-layer model fusion frame is designed in this paper. The key process is located by using the random forest model firstly, then the process data feature selection, dimension reduction and noise reduction are processed. Finally, the validity of the model is verified by simulation experiments. It is shown that this method can effectively reduce the prediction accuracy variance and improve the generalization ability of the traditional More >

  • Open Access

    ARTICLE

    Stability Analysis of Network Controlled Temperature Control System with Additive Delays

    V. Venkatachalam1, *, D. Prabhakaran1

    CMES-Computer Modeling in Engineering & Sciences, Vol.114, No.3, pp. 321-334, 2018, DOI:10.3970/cmes.2018.114.321

    Abstract This paper presents, using Lyapunov-Krasovskii functional technique combined with reciprocal convex lemma is considered for a networked control temperature control system with additive time-varying-delays. In the stability analysis, a new LK functional is assumed, and take the time-derivative of the (LK) functional, using reciprocal convex combination technique was employed to obtain less conservative stability criteria. Finally, the proposed stability analysis culminates into a stability criterion in the LMI (linear matrix inequalities) framework. The results obtained are in accordance with the theoretically obtained in the temperature control system and they are closer to the standard benchmark More >

  • Open Access

    ARTICLE

    Event-Based Anomaly Detection for Non-Public Industrial Communication Protocols in SDN-Based Control Systems

    Ming Wan1, Jiangyuan Yao2,*, Yuan Jing1, Xi Jin3,4

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 447-463, 2018, DOI:10.3970/cmc.2018.02195

    Abstract As the main communication mediums in industrial control networks, industrial communication protocols are always vulnerable to extreme exploitations, and it is very difficult to take protective measures due to their serious privacy. Based on the SDN (Software Defined Network) technology, this paper proposes a novel event-based anomaly detection approach to identify misbehaviors using non-public industrial communication protocols, and this approach can be installed in SDN switches as a security software appliance in SDN-based control systems. Furthermore, aiming at the unknown protocol specification and message format, this approach first restructures the industrial communication sessions and merges More >

  • Open Access

    ABSTRACT

    Network-Marketing: Intelligent Data Control System using Data Mining Technique

    H.S. Fadewar1, S.B. Jagtap1, G.N.Shinde2

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.9, No.1, pp. 57-66, 2009, DOI:10.3970/icces.2009.009.057

    Abstract Data Mining (DM) techniques are well-known for providing flexible and efficient analytical tools for data processing. In this paper, we propose intelligent data control system design and specifications as an example of DM application in marketing data processing. E-Marketing businesses are using Data Mining to identify patterns in customers' buying behavior; identify profitable customer segments; increase marketing return rates; prevent loss of valuable customers; estimate credit risk; identify fraudulent activity and much more. More >

Displaying 61-70 on page 7 of 71. Per Page