首页 > 最新文献

2009 2nd International Symposium on Resilient Control Systems最新文献

英文 中文
Bayesian inference for fault-tolerant control 容错控制的贝叶斯推理
Pub Date : 2009-09-18 DOI: 10.1109/ISRCS.2009.5251340
K. Villez, V. Venkatasubramanian, S. Narasimhan
In this contribution, we present initial developments in view of model-based fault-tolerant control (FTC). In this context, we use an original method based on the Kalman-filter by which fault detection, diagnosis and accommodation is possible provided that an accurate model is available. Since this is not generally true, we attempt to alleviate this necessity by means of accounting for uncertainty, in both model as well as in the measurements used for fault diagnosis. Our preliminary results are focused on the diagnosis step in the FTC scheme.
在这篇文章中,我们介绍了基于模型的容错控制(FTC)的初步发展。在这种情况下,我们使用了一种基于卡尔曼滤波的原始方法,通过这种方法,只要有准确的模型,就可以进行故障检测、诊断和调整。由于这通常是不正确的,我们试图通过在模型和用于故障诊断的测量中考虑不确定性来减轻这种必要性。我们的初步结果集中在FTC方案的诊断步骤上。
{"title":"Bayesian inference for fault-tolerant control","authors":"K. Villez, V. Venkatasubramanian, S. Narasimhan","doi":"10.1109/ISRCS.2009.5251340","DOIUrl":"https://doi.org/10.1109/ISRCS.2009.5251340","url":null,"abstract":"In this contribution, we present initial developments in view of model-based fault-tolerant control (FTC). In this context, we use an original method based on the Kalman-filter by which fault detection, diagnosis and accommodation is possible provided that an accurate model is available. Since this is not generally true, we attempt to alleviate this necessity by means of accounting for uncertainty, in both model as well as in the measurements used for fault diagnosis. Our preliminary results are focused on the diagnosis step in the FTC scheme.","PeriodicalId":158186,"journal":{"name":"2009 2nd International Symposium on Resilient Control Systems","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116024031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Human reliability for design applications at a Swedish nuclear power plant 瑞典核电站设计应用中的人的可靠性
Pub Date : 2009-09-18 DOI: 10.1109/ISRCS.2009.5251374
Johanna Oxstarnd, R. Boring
This paper presents work in progress on a project to develop a process for integrating human reliability analysis (HRA) into the design process used in nuclear power plant modernization and upgrade projects. Human factors, probabilistic risk, and human-system interface design experts were interviewed, resulting in six principles for the use of HRA in design. These principles are: (i) early implementation, (ii) tailored methods, (iii) scalable methods, (iv) better use of qualitative information, (v) HRA design criteria, and (vi) better HRA sensitivity to human-machine interface issues. Future efforts will center on adapting HRA techniques to meet these principles and implementing HRA as part of a plant upgrade process.
本文介绍了将人的可靠性分析(HRA)集成到核电站现代化和升级项目的设计过程中的一个项目正在进行的工作。访谈了人为因素、概率风险和人机界面设计专家,得出了在设计中使用HRA的六个原则。这些原则是:(i)早期实施,(ii)量身定制的方法,(iii)可扩展的方法,(iv)更好地使用定性信息,(v) HRA设计标准,以及(vi)更好的HRA对人机界面问题的敏感性。未来的努力将集中于调整HRA技术以满足这些原则,并将HRA作为工厂升级过程的一部分加以实施。
{"title":"Human reliability for design applications at a Swedish nuclear power plant","authors":"Johanna Oxstarnd, R. Boring","doi":"10.1109/ISRCS.2009.5251374","DOIUrl":"https://doi.org/10.1109/ISRCS.2009.5251374","url":null,"abstract":"This paper presents work in progress on a project to develop a process for integrating human reliability analysis (HRA) into the design process used in nuclear power plant modernization and upgrade projects. Human factors, probabilistic risk, and human-system interface design experts were interviewed, resulting in six principles for the use of HRA in design. These principles are: (i) early implementation, (ii) tailored methods, (iii) scalable methods, (iv) better use of qualitative information, (v) HRA design criteria, and (vi) better HRA sensitivity to human-machine interface issues. Future efforts will center on adapting HRA techniques to meet these principles and implementing HRA as part of a plant upgrade process.","PeriodicalId":158186,"journal":{"name":"2009 2nd International Symposium on Resilient Control Systems","volume":"083 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129018192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Time synchronization in hierarchical TESLA wireless sensor networks 分层TESLA无线传感器网络的时间同步
Pub Date : 2009-09-18 DOI: 10.1109/ISRCS.2009.5251365
Jason L. Wright, M. Manic
Time synchronization and event time correlation are important in wireless sensor networks. In particular, time is used to create a sequence events or time line to answer questions of cause and effect. Time is also used as a basis for determining the freshness of received packets and the validity of cryptographic certificates. This paper presents secure method of time synchro-nization and event time correlation for TESLA-based hierarchical wireless sensor networks. The method demonstrates that events in a TESLA network can be accurately timestamped by adding only a few pieces of data to the existing protocol.
时间同步和事件时间相关是无线传感器网络的重要组成部分。特别地,时间被用来创建一个序列事件或时间线来回答因果问题。时间还用作确定接收到的数据包的新鲜度和加密证书的有效性的基础。针对基于特斯拉的分层无线传感器网络,提出了一种安全的时间同步和事件时间关联方法。该方法表明,只需在现有协议中添加少量数据,就可以准确地对特斯拉网络中的事件进行时间戳。
{"title":"Time synchronization in hierarchical TESLA wireless sensor networks","authors":"Jason L. Wright, M. Manic","doi":"10.1109/ISRCS.2009.5251365","DOIUrl":"https://doi.org/10.1109/ISRCS.2009.5251365","url":null,"abstract":"Time synchronization and event time correlation are important in wireless sensor networks. In particular, time is used to create a sequence events or time line to answer questions of cause and effect. Time is also used as a basis for determining the freshness of received packets and the validity of cryptographic certificates. This paper presents secure method of time synchro-nization and event time correlation for TESLA-based hierarchical wireless sensor networks. The method demonstrates that events in a TESLA network can be accurately timestamped by adding only a few pieces of data to the existing protocol.","PeriodicalId":158186,"journal":{"name":"2009 2nd International Symposium on Resilient Control Systems","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134581213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Extreme point result for robust stability of interval polynomials to the special left sector 区间多项式对特殊左扇区鲁棒稳定性的极值点结果
Pub Date : 2009-09-18 DOI: 10.1109/ISRCS.2009.5252518
H. Kang, H. Kang
In this paper, we consider robust stability of interval polynomials of which stability region is the special left sector. The argument of the boundary of the special left sector is expressible as an irrational number multiplied by the circle ratio. We show that a family of interval polynomials is robustly stable if and only if a small set of vertex polynomials are robustly stable. This new result comes from the construction algorithm of the value set and the zero exclusion principle.
本文研究稳定区域为特殊左扇区的区间多项式的鲁棒稳定性问题。特殊左扇区边界的参数可表示为无理数乘以圆比。我们证明了区间多项式族是鲁棒稳定的当且仅当一个小的顶点多项式集是鲁棒稳定的。这一新结果来源于值集的构造算法和零不相容原理。
{"title":"Extreme point result for robust stability of interval polynomials to the special left sector","authors":"H. Kang, H. Kang","doi":"10.1109/ISRCS.2009.5252518","DOIUrl":"https://doi.org/10.1109/ISRCS.2009.5252518","url":null,"abstract":"In this paper, we consider robust stability of interval polynomials of which stability region is the special left sector. The argument of the boundary of the special left sector is expressible as an irrational number multiplied by the circle ratio. We show that a family of interval polynomials is robustly stable if and only if a small set of vertex polynomials are robustly stable. This new result comes from the construction algorithm of the value set and the zero exclusion principle.","PeriodicalId":158186,"journal":{"name":"2009 2nd International Symposium on Resilient Control Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122743002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The VIKING project: An initiative on resilient control of power networks VIKING项目:一项关于电网弹性控制的倡议
Pub Date : 2009-09-18 DOI: 10.1109/ISRCS.2009.5251361
A. Giani, S. Sastry, K. Johansson, H. Sandberg
This paper presents the work on resilient and secure power transmission and distribution developed within the VIKING (Vital Infrastructure, networKs, INformation and control system ManaGement) project. VIKING receives funding from the European Community's Seventh Framework Program. We will present the consortium, the motivation behind this research, the main objective of the project together with the current status.
本文介绍了在维京(重要基础设施、网络、信息和控制系统管理)项目中开发的弹性和安全输电和配电工作。VIKING从欧洲共同体第七框架计划获得资金。我们将介绍该联盟,这项研究背后的动机,项目的主要目标以及目前的状况。
{"title":"The VIKING project: An initiative on resilient control of power networks","authors":"A. Giani, S. Sastry, K. Johansson, H. Sandberg","doi":"10.1109/ISRCS.2009.5251361","DOIUrl":"https://doi.org/10.1109/ISRCS.2009.5251361","url":null,"abstract":"This paper presents the work on resilient and secure power transmission and distribution developed within the VIKING (Vital Infrastructure, networKs, INformation and control system ManaGement) project. VIKING receives funding from the European Community's Seventh Framework Program. We will present the consortium, the motivation behind this research, the main objective of the project together with the current status.","PeriodicalId":158186,"journal":{"name":"2009 2nd International Symposium on Resilient Control Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124908480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
A host-based security assessment architecture for Industrial Control systems 基于主机的工业控制系统安全评估体系结构
Pub Date : 2009-09-18 DOI: 10.1109/ISRCS.2009.5251378
Abhishek Rakshit, Xinming Ou
Computerized control systems perform vital functions across many critical infrastructures throughout the nation. These systems can be vulnerable to a variety of attacks leading to devastating consequences like loss of production, interruption in distribution of public utilities and most importantly endangering public safety. This calls for an approach to halt attacks in their tracks before being able to do any harm to these systems. Vulnerability assessment performed on these systems can identify and assess potential vulnerabilities in a control system network, before they are exploited by malicious intruders. An effective vulnerability assessment architecture should assimilate security knowledge from multiple sources to uncover all the vulnerabilities present on a host. Legitimate concerns arise since host-based security scanners typically need to run at administrative privileges, and takes input from external knowledge sources for the analysis making it imperative that the scanner be trustworthy. Intentionally or otherwise, ill-formed input may compromise the scanner and the whole system if the scanner is susceptible to, or carries one or more vulnerability itself. We have implemented the scanning architecture in the context of an enterprise-level security analyzer.The analyzer finds security vulnerabilities present on a host according to the third-party security knowledge specified in Open Vulnerability Assessment Language(OVAL). This paper presents an architecture where a host-based security scanner's code base can be minimized to an extent where its correctness can be verified by adequate vetting. Moreover, the architecture also allows for leveraging third-party security knowledge efficiently and supports various higher-level security analysis.
计算机控制系统在全国许多关键基础设施中发挥着至关重要的作用。这些系统可能容易受到各种攻击,导致生产损失、公用事业分配中断等破坏性后果,最重要的是危及公共安全。这需要一种方法,在能够对这些系统造成任何伤害之前阻止攻击。在这些系统上执行的漏洞评估可以识别和评估控制系统网络中的潜在漏洞,防止它们被恶意入侵者利用。有效的漏洞评估体系结构应该吸收来自多个来源的安全知识,以发现主机上存在的所有漏洞。由于基于主机的安全扫描器通常需要以管理权限运行,并且需要从外部知识来源获取输入以进行分析,因此产生了合理的担忧,这使得扫描器必须值得信赖。如果扫描程序本身容易受到或携带一个或多个漏洞,那么无论有意还是无意,格式错误的输入都可能危及扫描程序和整个系统。我们已经在企业级安全分析器的上下文中实现了扫描架构。分析器根据开放漏洞评估语言(OVAL)中指定的第三方安全知识,发现主机上存在的安全漏洞。本文提出了一种架构,其中基于主机的安全扫描程序的代码库可以最小化到可以通过适当的审查来验证其正确性的程度。此外,该体系结构还允许有效地利用第三方安全知识,并支持各种高级安全分析。
{"title":"A host-based security assessment architecture for Industrial Control systems","authors":"Abhishek Rakshit, Xinming Ou","doi":"10.1109/ISRCS.2009.5251378","DOIUrl":"https://doi.org/10.1109/ISRCS.2009.5251378","url":null,"abstract":"Computerized control systems perform vital functions across many critical infrastructures throughout the nation. These systems can be vulnerable to a variety of attacks leading to devastating consequences like loss of production, interruption in distribution of public utilities and most importantly endangering public safety. This calls for an approach to halt attacks in their tracks before being able to do any harm to these systems. Vulnerability assessment performed on these systems can identify and assess potential vulnerabilities in a control system network, before they are exploited by malicious intruders. An effective vulnerability assessment architecture should assimilate security knowledge from multiple sources to uncover all the vulnerabilities present on a host. Legitimate concerns arise since host-based security scanners typically need to run at administrative privileges, and takes input from external knowledge sources for the analysis making it imperative that the scanner be trustworthy. Intentionally or otherwise, ill-formed input may compromise the scanner and the whole system if the scanner is susceptible to, or carries one or more vulnerability itself. We have implemented the scanning architecture in the context of an enterprise-level security analyzer.The analyzer finds security vulnerabilities present on a host according to the third-party security knowledge specified in Open Vulnerability Assessment Language(OVAL). This paper presents an architecture where a host-based security scanner's code base can be minimized to an extent where its correctness can be verified by adequate vetting. Moreover, the architecture also allows for leveraging third-party security knowledge efficiently and supports various higher-level security analysis.","PeriodicalId":158186,"journal":{"name":"2009 2nd International Symposium on Resilient Control Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117327815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A lightweight software control system for cyber awareness and security 一个轻量级的软件控制系统,用于网络意识和安全
Pub Date : 2009-09-18 DOI: 10.1109/ISRCS.2009.5251353
M. Co, Clark L. Coleman, J. Davidson, S. Ghosh, Jason Hiser, J. Knight, A. Nguyen-Tuong
Designing and building software that is free of defects that can be exploited by malicious adversaries is a difficult task. Despite extensive efforts via the application of formal methods, use of automated software engineering tools, and performing extensive pre-deployment testing, exploitable errors still appear in software. The problem of cyber resilience is further compounded by the growing sophistication of adversaries who can marshal substantial resources to compromise systems. This paper describes a novel, promising approach to improving the resilience of software. The approach is to impose a process-level software control system that continuously monitors an application for signs of attack or failure and responds accordingly. The system uses software dynamic translation to seamlessly insert arbitrary sensors and actuators into an executing binary. The control system employs the sensors to detect attacks and the actuators to effect an appropriate response. Using this approach, several novel monitoring and response systems have been developed. The paper describes our light-weight process-level software control system, our experience using it to increase the resilience of systems, and discusses future research directions for extending and enhancing this powerful approach to achieving cyber awareness and resilience.
设计和构建不存在可被恶意攻击者利用的缺陷的软件是一项艰巨的任务。尽管通过正式方法的应用、自动化软件工程工具的使用以及执行广泛的部署前测试进行了广泛的努力,可利用的错误仍然出现在软件中。网络复原能力的问题因对手日益老练而进一步复杂化,他们可以调集大量资源来破坏系统。本文描述了一种新颖的、有前途的方法来提高软件的弹性。这种方法是强加一个过程级的软件控制系统,该系统可以持续地监视应用程序,寻找攻击或失败的迹象,并做出相应的响应。该系统使用软件动态转换将任意传感器和执行器无缝插入到执行二进制文件中。控制系统使用传感器来检测攻击,并使用执行器来实现适当的响应。利用这种方法,已经开发了几种新的监测和反应系统。本文描述了我们的轻量级过程级软件控制系统,我们使用它来增加系统弹性的经验,并讨论了未来的研究方向,以扩展和增强这种强大的方法来实现网络意识和弹性。
{"title":"A lightweight software control system for cyber awareness and security","authors":"M. Co, Clark L. Coleman, J. Davidson, S. Ghosh, Jason Hiser, J. Knight, A. Nguyen-Tuong","doi":"10.1109/ISRCS.2009.5251353","DOIUrl":"https://doi.org/10.1109/ISRCS.2009.5251353","url":null,"abstract":"Designing and building software that is free of defects that can be exploited by malicious adversaries is a difficult task. Despite extensive efforts via the application of formal methods, use of automated software engineering tools, and performing extensive pre-deployment testing, exploitable errors still appear in software. The problem of cyber resilience is further compounded by the growing sophistication of adversaries who can marshal substantial resources to compromise systems. This paper describes a novel, promising approach to improving the resilience of software. The approach is to impose a process-level software control system that continuously monitors an application for signs of attack or failure and responds accordingly. The system uses software dynamic translation to seamlessly insert arbitrary sensors and actuators into an executing binary. The control system employs the sensors to detect attacks and the actuators to effect an appropriate response. Using this approach, several novel monitoring and response systems have been developed. The paper describes our light-weight process-level software control system, our experience using it to increase the resilience of systems, and discusses future research directions for extending and enhancing this powerful approach to achieving cyber awareness and resilience.","PeriodicalId":158186,"journal":{"name":"2009 2nd International Symposium on Resilient Control Systems","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130140858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A passivity-based framework for resilient cyber physical systems 弹性网络物理系统的基于被动的框架
Pub Date : 2009-09-18 DOI: 10.1109/ISRCS.2009.5251370
N. Kottenstette, G. Karsai, J. Sztipanovits
Resilient control systems play a special role in the area of cyber-physical systems, where the design must address the question how complex dynamic plants are to be controlled safely and reliably when a control system is under a cyber attack. In this paper we describe a control theoretical framework based on the concept of passivity for designing a control network which can tolerate, for instance, denial-of-service attacks on networks used in the closed loop. In particular, we demonstrate how the resilient power junction structure could be applied, and provide simulated results.
弹性控制系统在网络物理系统领域中扮演着特殊的角色,在这个领域中,设计必须解决当控制系统受到网络攻击时,如何安全可靠地控制复杂的动态工厂的问题。在本文中,我们描述了一个基于被动概念的控制理论框架,用于设计一个控制网络,该网络可以容忍,例如,在闭环中使用的网络上的拒绝服务攻击。特别地,我们演示了弹性电源结结构如何应用,并提供了模拟结果。
{"title":"A passivity-based framework for resilient cyber physical systems","authors":"N. Kottenstette, G. Karsai, J. Sztipanovits","doi":"10.1109/ISRCS.2009.5251370","DOIUrl":"https://doi.org/10.1109/ISRCS.2009.5251370","url":null,"abstract":"Resilient control systems play a special role in the area of cyber-physical systems, where the design must address the question how complex dynamic plants are to be controlled safely and reliably when a control system is under a cyber attack. In this paper we describe a control theoretical framework based on the concept of passivity for designing a control network which can tolerate, for instance, denial-of-service attacks on networks used in the closed loop. In particular, we demonstrate how the resilient power junction structure could be applied, and provide simulated results.","PeriodicalId":158186,"journal":{"name":"2009 2nd International Symposium on Resilient Control Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126070837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Intelligent neural network implementation for SOCI development of Li/CFx batteries 锂/CFx电池SOCI开发的智能神经网络实现
Pub Date : 2009-09-18 DOI: 10.1109/ISRCS.2009.5251344
O. Linda, E. William, Matthew Huff, M. Manic, Vishu Gupta, J. Nance, H. Hess, F. Rufus, Ash Thakker, Justin Govar
The State Of Charge Indicator (SOCI) for the Lithium Poly Carbon Monoflouride (Li/CFx) battery has a wide range of applications. However, the dynamic environmental conditions, such as the ambient temperature, can alter the characteristic response of the battery and introduce non-linear behavior. This paper discusses the in-lab development of an Artificial Neural Network (ANN) based SOCI for the Li/CFx battery. The ANN is trained on the recorded data - voltage, current and ambient temperature, to produce a non-linear model and to accurately predict the State Of Charge (SOC) of the battery. The SOC prediction is based on the recent behavior of the battery. Preliminary experimental results using recorded datasets from the Battery Design Studio are presented for the Lithium Ion battery. The working model for the Li/CFx is currently under development. The reported results demonstrated good performance of the developed SOCI, with less than 2% average relative error on data at previously observed ambient temperatures.
单氟化锂(Li/CFx)电池的充电状态指示器(SOCI)具有广泛的应用。然而,动态环境条件(如环境温度)会改变电池的特性响应并引入非线性行为。本文讨论了基于人工神经网络(ANN)的锂/CFx电池SOCI的实验室开发。人工神经网络根据记录的电压、电流和环境温度进行训练,生成非线性模型,并准确预测电池的充电状态(SOC)。SOC预测是基于电池最近的行为。利用电池设计工作室记录的数据集,介绍了锂离子电池的初步实验结果。Li/CFx的工作模型目前正在开发中。报告的结果表明,开发的SOCI性能良好,在先前观察到的环境温度下,数据的平均相对误差小于2%。
{"title":"Intelligent neural network implementation for SOCI development of Li/CFx batteries","authors":"O. Linda, E. William, Matthew Huff, M. Manic, Vishu Gupta, J. Nance, H. Hess, F. Rufus, Ash Thakker, Justin Govar","doi":"10.1109/ISRCS.2009.5251344","DOIUrl":"https://doi.org/10.1109/ISRCS.2009.5251344","url":null,"abstract":"The State Of Charge Indicator (SOCI) for the Lithium Poly Carbon Monoflouride (Li/CFx) battery has a wide range of applications. However, the dynamic environmental conditions, such as the ambient temperature, can alter the characteristic response of the battery and introduce non-linear behavior. This paper discusses the in-lab development of an Artificial Neural Network (ANN) based SOCI for the Li/CFx battery. The ANN is trained on the recorded data - voltage, current and ambient temperature, to produce a non-linear model and to accurately predict the State Of Charge (SOC) of the battery. The SOC prediction is based on the recent behavior of the battery. Preliminary experimental results using recorded datasets from the Battery Design Studio are presented for the Lithium Ion battery. The working model for the Li/CFx is currently under development. The reported results demonstrated good performance of the developed SOCI, with less than 2% average relative error on data at previously observed ambient temperatures.","PeriodicalId":158186,"journal":{"name":"2009 2nd International Symposium on Resilient Control Systems","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124932072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Computationally efficient Neural Network Intrusion Security Awareness 计算效率高的神经网络入侵安全感知
Pub Date : 2009-09-18 DOI: 10.1109/ISRCS.2009.5251357
T. Vollmer, M. Manic
An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Ethernet network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.
一种算法的增强版本,提供基于异常的入侵检测警报的网络安全状态意识。一个独特的方面是训练具有入侵检测规则特征的错误反向传播神经网络,以提供识别基础。随后将以太网络数据包细节提供给所训练的网络以产生分类。这利用规则知识集为基于异常的系统生成分类。在ICMP协议上执行的几个测试用例显示了60%的真阳性识别率。这个速率与之前的工作相当,但是使用的内存减少了70%,运行时间从37秒减少到不到1秒。
{"title":"Computationally efficient Neural Network Intrusion Security Awareness","authors":"T. Vollmer, M. Manic","doi":"10.1109/ISRCS.2009.5251357","DOIUrl":"https://doi.org/10.1109/ISRCS.2009.5251357","url":null,"abstract":"An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Ethernet network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.","PeriodicalId":158186,"journal":{"name":"2009 2nd International Symposium on Resilient Control Systems","volume":"22 S1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132870045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2009 2nd International Symposium on Resilient Control Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1