首页 > 最新文献

2012 5th International Symposium on Resilient Control Systems最新文献

英文 中文
A payload verification and management framework for small UAV-based personal remote sensing systems 小型无人机个人遥感系统有效载荷验证与管理框架
Pub Date : 2012-09-24 DOI: 10.1109/ISRCS.2012.6309316
C. Coopmans, B. Stark, C. M. Coffin
Small, unmanned aerial systems are becoming more important in many fields, including civilian, scientific applications. Affordable systems that allow remote sensing at a small scale-personal remote sensing-are possible with proper system design. To assure data mission success (i.e., reliable and safe data collection) with low-cost or consumer-level sensor hardware, a well-designed payload management system is needed, along with sensor interface development and standardized testing frameworks for verification. This payload management system ensures a level of airworthiness for Data Mission Assurance. This paper presents such a system, along with motivations and choices such as system architecture and implementation, as well as standardized testing and verification. Data results from flight of a fixed-wing example payload is also included.
小型无人机系统在许多领域变得越来越重要,包括民用和科学应用。通过适当的系统设计,允许小规模的个人遥感的经济实惠的系统是可能的。为了确保低成本或消费者级传感器硬件的数据任务成功(即可靠和安全的数据收集),需要一个设计良好的有效载荷管理系统,以及传感器接口开发和标准化测试框架进行验证。这种有效载荷管理系统确保了数据任务保证的适航水平。本文介绍了这样一个系统,以及动机和选择,如系统架构和实现,以及标准化的测试和验证。文中还包括了一个固定翼实例载荷的飞行数据结果。
{"title":"A payload verification and management framework for small UAV-based personal remote sensing systems","authors":"C. Coopmans, B. Stark, C. M. Coffin","doi":"10.1109/ISRCS.2012.6309316","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309316","url":null,"abstract":"Small, unmanned aerial systems are becoming more important in many fields, including civilian, scientific applications. Affordable systems that allow remote sensing at a small scale-personal remote sensing-are possible with proper system design. To assure data mission success (i.e., reliable and safe data collection) with low-cost or consumer-level sensor hardware, a well-designed payload management system is needed, along with sensor interface development and standardized testing frameworks for verification. This payload management system ensures a level of airworthiness for Data Mission Assurance. This paper presents such a system, along with motivations and choices such as system architecture and implementation, as well as standardized testing and verification. Data results from flight of a fixed-wing example payload is also included.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132636780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach cps网络攻击的系统分析——基于dfd方法的适用性评估
Pub Date : 2012-09-24 DOI: 10.1109/ISRCS.2012.6309293
M. Yampolskiy, P. Horváth, X. Koutsoukos, Yuan Xue, J. Sztipanovits
Cyber-Physical Systems (CPSs) consist of as well as interact with cyber and physical elements. This creates multiple vectors for CPS-internal (i.e., within CPS) as well as for CPS-external (i.e., between CPS itself and its environment) Cyber-Physical Attacks. We argue that an effective Cyber-Physical Defense can only be elaborated if possible attacks on CPS can be identified and assessed in a systematic manner. In this paper, we focus on cyber-attacks only. Our contribution in this paper is the following. We assess the applicability of Data Flow Diagrams (DFD) for the systematic analysis of cyber-attacks against CPS. In this context, we introduce several extensions to DFD. We evaluate the analysis procedure by applying it on a comparatively simple example of a quad-rotor UAV. The selected UAV is fully functioning and contains multiple structural elements representative for more complex systems. At the same time, its simplicity enables an in-depth manual analysis. Our analysis shows that cyber-attacks executed against CPS can lead to various cyber-physical interactions. This, in turn, creates novel challenges for CPS defense. Finally, we outline the preliminary results of our work towards a Taxonomy of Cyber-Physical Attacks.
网络物理系统(cps)由网络和物理元素组成,并与之相互作用。这为CPS内部(即CPS内部)以及CPS外部(即CPS本身与其环境之间)的网络物理攻击创造了多个向量。我们认为,只有在能够以系统的方式识别和评估对CPS的可能攻击时,才能详细阐述有效的网络物理防御。在本文中,我们只关注网络攻击。我们在本文中的贡献如下。我们评估了数据流程图(DFD)对CPS网络攻击的系统分析的适用性。在此上下文中,我们将介绍DFD的几个扩展。我们通过将其应用于一个相对简单的四旋翼无人机实例来评估分析过程。所选择的无人机功能齐全,包含多个结构元素,可用于更复杂的系统。同时,它的简单性支持深入的手工分析。我们的分析表明,针对CPS的网络攻击可能导致各种网络物理交互。这反过来又给CPS辩护带来了新的挑战。最后,我们概述了我们对网络物理攻击分类工作的初步结果。
{"title":"Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach","authors":"M. Yampolskiy, P. Horváth, X. Koutsoukos, Yuan Xue, J. Sztipanovits","doi":"10.1109/ISRCS.2012.6309293","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309293","url":null,"abstract":"Cyber-Physical Systems (CPSs) consist of as well as interact with cyber and physical elements. This creates multiple vectors for CPS-internal (i.e., within CPS) as well as for CPS-external (i.e., between CPS itself and its environment) Cyber-Physical Attacks. We argue that an effective Cyber-Physical Defense can only be elaborated if possible attacks on CPS can be identified and assessed in a systematic manner. In this paper, we focus on cyber-attacks only. Our contribution in this paper is the following. We assess the applicability of Data Flow Diagrams (DFD) for the systematic analysis of cyber-attacks against CPS. In this context, we introduce several extensions to DFD. We evaluate the analysis procedure by applying it on a comparatively simple example of a quad-rotor UAV. The selected UAV is fully functioning and contains multiple structural elements representative for more complex systems. At the same time, its simplicity enables an in-depth manual analysis. Our analysis shows that cyber-attacks executed against CPS can lead to various cyber-physical interactions. This, in turn, creates novel challenges for CPS defense. Finally, we outline the preliminary results of our work towards a Taxonomy of Cyber-Physical Attacks.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126226964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
A novel numerical integrator for structural health monitoring 一种新的结构健康监测数值积分器
Pub Date : 2012-09-24 DOI: 10.1109/ISRCS.2012.6309300
S. Thenozhi, Wen Yu, R. Garrido
Accelerometers are one of the most commonly used sensor in structural control and health monitoring applications. However the accelerometer output is polluted with noise and bias signals. Obtaining velocity and position from these acceleration measurements are not trivial. Direct integration will result in an output drift. In this paper baseline correction and filtering techniques are used to overcome these problems. Experimental results on a linear actuator illustrates the effectiveness of the proposed method.
加速度计是结构控制和健康监测应用中最常用的传感器之一。然而,加速度计的输出受到噪声和偏置信号的污染。从这些加速度测量中获得速度和位置是很重要的。直接积分会导致输出漂移。本文采用基线校正和滤波技术来克服这些问题。在某直线驱动器上的实验结果表明了该方法的有效性。
{"title":"A novel numerical integrator for structural health monitoring","authors":"S. Thenozhi, Wen Yu, R. Garrido","doi":"10.1109/ISRCS.2012.6309300","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309300","url":null,"abstract":"Accelerometers are one of the most commonly used sensor in structural control and health monitoring applications. However the accelerometer output is polluted with noise and bias signals. Obtaining velocity and position from these acceleration measurements are not trivial. Direct integration will result in an output drift. In this paper baseline correction and filtering techniques are used to overcome these problems. Experimental results on a linear actuator illustrates the effectiveness of the proposed method.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115263842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Adaptive control of Bayesian network computation 贝叶斯网络计算的自适应控制
Pub Date : 2012-09-24 DOI: 10.1109/ISRCS.2012.6309302
Erik Reed, Abe Ishihara, O. Mengshoel
This paper considers the problem of providing, for computational processes, soft real-time (or reactive) response without the use of a hard real-time operating system. In particular, we focus on the problem of reactively computing fault diagnosis by means of different Bayesian network inference algorithms on non-real-time operating systems where low-criticality (background) process activity and system load is unpredictable. To address this problem, we take in this paper a reconfigurable adaptive control approach. Computation time is modeled using an ARX model where the input consists of the maximum number of background processes allowed to run at any given time. To ensure that the reactive (high-criticality) diagnosis is computed within a set time frame, we introduce a minimum degree pole placement controller to impose a limit on the maximum number of low-criticality processes. Experimentally, we perform electrical power system diagnosis using a Bayesian network model of and data from a NASA electrical power network. The Bayesian network inference algorithms likelihood weighting and junction tree propagation are successfully applied and changed mid-simulation to investigate how inference computation time changes in an unpredictable operating system, as well as how the controller reacts to inference algorithm changes.
本文考虑了在不使用硬实时操作系统的情况下,为计算过程提供软实时(或反应性)响应的问题。我们特别关注在低临界性(后台)进程活动和系统负载不可预测的非实时操作系统中,利用不同的贝叶斯网络推理算法进行反应性计算故障诊断的问题。为了解决这个问题,本文采用了一种可重构的自适应控制方法。计算时间使用ARX模型建模,其中输入由允许在任何给定时间运行的最大后台进程数组成。为了确保在设定的时间框架内计算反应性(高临界)诊断,我们引入了最小度极点放置控制器来限制低临界过程的最大数量。实验上,我们使用来自NASA电力网络的贝叶斯网络模型和数据进行电力系统诊断。成功地应用了贝叶斯网络推理算法似然加权和连接树传播,并在仿真中进行了更改,以研究在不可预测的操作系统中推理计算时间的变化,以及控制器对推理算法变化的反应。
{"title":"Adaptive control of Bayesian network computation","authors":"Erik Reed, Abe Ishihara, O. Mengshoel","doi":"10.1109/ISRCS.2012.6309302","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309302","url":null,"abstract":"This paper considers the problem of providing, for computational processes, soft real-time (or reactive) response without the use of a hard real-time operating system. In particular, we focus on the problem of reactively computing fault diagnosis by means of different Bayesian network inference algorithms on non-real-time operating systems where low-criticality (background) process activity and system load is unpredictable. To address this problem, we take in this paper a reconfigurable adaptive control approach. Computation time is modeled using an ARX model where the input consists of the maximum number of background processes allowed to run at any given time. To ensure that the reactive (high-criticality) diagnosis is computed within a set time frame, we introduce a minimum degree pole placement controller to impose a limit on the maximum number of low-criticality processes. Experimentally, we perform electrical power system diagnosis using a Bayesian network model of and data from a NASA electrical power network. The Bayesian network inference algorithms likelihood weighting and junction tree propagation are successfully applied and changed mid-simulation to investigate how inference computation time changes in an unpredictable operating system, as well as how the controller reacts to inference algorithm changes.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130142538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards characterization of cyber attacks on industrial control systems: Emulating field devices using Gumstix technology 工业控制系统的网络攻击表征:使用Gumstix技术模拟现场设备
Pub Date : 2012-09-24 DOI: 10.1109/ISRCS.2012.6309294
D. Berman, J. Butts
Industrial control systems (ICS) have an inherent lack of security and situational awareness capabilities at the field device level. Yet these systems comprise a significant portion of the nation's critical infrastructure. Currently, there is little insight into the characterization of attacks on ICS. Stuxnet provided an initial look at the type of tactics that can be employed to create physical damage via cyber means. The question still remains, however, as to the extent of malware and attacks that are targeting the critical infrastructure, along with the various methods employed to target systems associated with the ICS environment. This paper presents a device using Gumstix technology that emulates an ICS field device. The emulation device is low-cost, adaptable to myriad ICS environments and provides logging capabilities at the field device level. The device was evaluated to ensure conformity to RFC standards and that the operating characteristics are consistent with actual field devices.
工业控制系统(ICS)在现场设备层面固有地缺乏安全和态势感知能力。然而,这些系统构成了国家关键基础设施的很大一部分。目前,人们对ICS攻击的特征知之甚少。Stuxnet让我们初步了解了通过网络手段制造物理破坏的战术类型。然而,问题仍然存在,针对关键基础设施的恶意软件和攻击的程度,以及针对与ICS环境相关的系统所采用的各种方法。本文介绍了一种利用Gumstix技术模拟ICS现场设备的装置。仿真设备成本低,可适应多种ICS环境,并提供现场设备级的日志记录功能。对该设备进行了评估,以确保符合RFC标准,并确保其工作特性与实际现场设备一致。
{"title":"Towards characterization of cyber attacks on industrial control systems: Emulating field devices using Gumstix technology","authors":"D. Berman, J. Butts","doi":"10.1109/ISRCS.2012.6309294","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309294","url":null,"abstract":"Industrial control systems (ICS) have an inherent lack of security and situational awareness capabilities at the field device level. Yet these systems comprise a significant portion of the nation's critical infrastructure. Currently, there is little insight into the characterization of attacks on ICS. Stuxnet provided an initial look at the type of tactics that can be employed to create physical damage via cyber means. The question still remains, however, as to the extent of malware and attacks that are targeting the critical infrastructure, along with the various methods employed to target systems associated with the ICS environment. This paper presents a device using Gumstix technology that emulates an ICS field device. The emulation device is low-cost, adaptable to myriad ICS environments and provides logging capabilities at the field device level. The device was evaluated to ensure conformity to RFC standards and that the operating characteristics are consistent with actual field devices.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133841018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Agent-based cyber control strategy design for resilient control systems: Concepts, architecture and methodologies 弹性控制系统中基于agent的网络控制策略设计:概念、体系结构和方法
Pub Date : 2012-09-24 DOI: 10.1109/ISRCS.2012.6309291
C. Rieger, Quanyan Zhu, T. Başar
The implementation of automated regulatory control has been around since the middle of the last century through analog means. It has allowed engineers to operate the plant more consistently by focusing on overall operations and settings instead of individual monitoring of local instruments (inside and outside of a control room). A similar approach is proposed for cyber security, where current border-protection designs have been inherited from information technology developments that lack consideration of the high-reliability, high consequence nature of industrial control systems. Instead of an independent development, however, an integrated approach is taken to develop a holistic understanding of performance. This performance takes shape inside a multi-agent design, which provides a notional context to model highly decentralized and complex industrial process control systems, the nervous system of critical infrastructure. The resulting strategy will provide a framework for researching solutions to security and unrecognized interdependency concerns with industrial control systems.
自上个世纪中叶以来,通过模拟手段实现自动调节控制。它使工程师能够更一致地操作核电站,将注意力集中在整体操作和设置上,而不是单独监测当地仪器(控制室内外)。在网络安全方面也提出了类似的方法,目前的边境保护设计继承自信息技术的发展,缺乏对工业控制系统的高可靠性、高后果性质的考虑。然而,不是独立开发,而是采用集成的方法来开发对性能的整体理解。这种性能在多智能体设计中形成,它提供了一个概念背景来模拟高度分散和复杂的工业过程控制系统,关键基础设施的神经系统。由此产生的战略将为研究工业控制系统的安全和未被认识到的相互依赖性问题的解决办法提供一个框架。
{"title":"Agent-based cyber control strategy design for resilient control systems: Concepts, architecture and methodologies","authors":"C. Rieger, Quanyan Zhu, T. Başar","doi":"10.1109/ISRCS.2012.6309291","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309291","url":null,"abstract":"The implementation of automated regulatory control has been around since the middle of the last century through analog means. It has allowed engineers to operate the plant more consistently by focusing on overall operations and settings instead of individual monitoring of local instruments (inside and outside of a control room). A similar approach is proposed for cyber security, where current border-protection designs have been inherited from information technology developments that lack consideration of the high-reliability, high consequence nature of industrial control systems. Instead of an independent development, however, an integrated approach is taken to develop a holistic understanding of performance. This performance takes shape inside a multi-agent design, which provides a notional context to model highly decentralized and complex industrial process control systems, the nervous system of critical infrastructure. The resulting strategy will provide a framework for researching solutions to security and unrecognized interdependency concerns with industrial control systems.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128631283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Data quality assessment: Modelling and application in resilient monitoring systems 数据质量评估:弹性监测系统的建模和应用
Pub Date : 2012-09-24 DOI: 10.1109/ISRCS.2012.6309305
H. Garcia, Wen-Chiao Lin, S. Meerkov, M. Ravichandran
This paper presents a novel data quality model as part of a monitoring system that degrades gracefully under attacks on its sensors. The attacker is assumed to manipulate the sensor data's variance or mean, with the aim of projecting a false state of the plant. Each sensor's data is assigned a level of trust, termed data quality, as part of assessing the states of the process variables. For the variance-based attacker, it is established that the concept of data quality is not, in fact, necessary to obtain the best possible assessment. For the mean-based attacker, it is recognized that statistical means are not sufficient to discern data quality. To combat this problem, the so-called method of probing signals is proposed. The efficacy of this method is illustrated by numerical experiments categorized into two parts. The first deals with individual process variable assessment, while the second deals with the adaptation of the sensor network to obtain the best possible plant assessment.
本文提出了一种新的数据质量模型,作为监测系统的一部分,该模型可以在传感器受到攻击时优雅地降级。假设攻击者操纵传感器数据的方差或平均值,目的是投射植物的虚假状态。每个传感器的数据被赋予一个信任级别,称为数据质量,作为评估过程变量状态的一部分。对于基于方差的攻击者,可以确定的是,数据质量的概念实际上并不是获得最佳评估所必需的。对于基于均值的攻击者,人们认识到统计方法不足以辨别数据质量。为了解决这个问题,提出了所谓的探测信号的方法。通过两部分的数值实验验证了该方法的有效性。前者处理单个过程变量的评估,而后者处理传感器网络的自适应以获得最佳的工厂评估。
{"title":"Data quality assessment: Modelling and application in resilient monitoring systems","authors":"H. Garcia, Wen-Chiao Lin, S. Meerkov, M. Ravichandran","doi":"10.1109/ISRCS.2012.6309305","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309305","url":null,"abstract":"This paper presents a novel data quality model as part of a monitoring system that degrades gracefully under attacks on its sensors. The attacker is assumed to manipulate the sensor data's variance or mean, with the aim of projecting a false state of the plant. Each sensor's data is assigned a level of trust, termed data quality, as part of assessing the states of the process variables. For the variance-based attacker, it is established that the concept of data quality is not, in fact, necessary to obtain the best possible assessment. For the mean-based attacker, it is recognized that statistical means are not sufficient to discern data quality. To combat this problem, the so-called method of probing signals is proposed. The efficacy of this method is illustrated by numerical experiments categorized into two parts. The first deals with individual process variable assessment, while the second deals with the adaptation of the sensor network to obtain the best possible plant assessment.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129057508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Supporting human interaction with robust robot swarms 用强大的机器人群支持人类互动
Pub Date : 2012-09-24 DOI: 10.1109/ISRCS.2012.6309318
S. Kerman, D. Brown, M. Goodrich
In this paper we propose a bio-inspired model for a decentralized swarm of robots, similar to the model proposed by Couzin [5], that allows for dynamic task assignment and is robust to limited communication from a human. We provide evidence that the model has two fundamental attractors: a torus attractor and a flock attractor. Through simulation and mathematical analysis we investigate the stability of these attractors and show that a control input can be used to force the system to change from one attractor to the other. Finally, we generalize another of Couzin's ideas [4] and present the idea of a stakeholder agent. We show how a human operator can use stakeholders to responsively influence group behavior while maintaining group structure.
在本文中,我们为分散的机器人群提出了一个仿生模型,类似于Couzin[5]提出的模型,该模型允许动态任务分配,并且对来自人类的有限通信具有鲁棒性。我们证明了该模型有两个基本吸引子:环面吸引子和群吸引子。通过仿真和数学分析,我们研究了这些吸引子的稳定性,并证明了一个控制输入可以迫使系统从一个吸引子转变为另一个吸引子。最后,我们概括了Couzin的另一个观点[4],提出了利益相关者代理的概念。我们展示了人类操作员如何在维持群体结构的同时,利用利益相关者响应性地影响群体行为。
{"title":"Supporting human interaction with robust robot swarms","authors":"S. Kerman, D. Brown, M. Goodrich","doi":"10.1109/ISRCS.2012.6309318","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309318","url":null,"abstract":"In this paper we propose a bio-inspired model for a decentralized swarm of robots, similar to the model proposed by Couzin [5], that allows for dynamic task assignment and is robust to limited communication from a human. We provide evidence that the model has two fundamental attractors: a torus attractor and a flock attractor. Through simulation and mathematical analysis we investigate the stability of these attractors and show that a control input can be used to force the system to change from one attractor to the other. Finally, we generalize another of Couzin's ideas [4] and present the idea of a stakeholder agent. We show how a human operator can use stakeholders to responsively influence group behavior while maintaining group structure.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115633538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Passivity-based trajectory tracking control with adaptive sampling over a wireless network 基于无源的无线网络自适应采样轨迹跟踪控制
Pub Date : 2012-09-24 DOI: 10.1109/ISRCS.2012.6309306
E. Eyisi, X. Koutsoukos, N. Kottenstette
Uncertainty in wireless networks, such as time-varying delays and packet loss, often leads to instability and degraded performance in Networked Control Systems (NCS). Further, limited network resources impose constraints on communication between plants and controllers. In this paper, we use passivity combined with adaptive sampling to design a control architecture for trajectory tracking. The proposed architecture can tolerate time-varying delays and packet loss while efficiently utilizing network bandwidth. We provide analytical results to show passivity of the proposed networked control architecture and trajectory tracking. We demonstrate our approach using a case study on the trajectory tracking control of a robotic manipulator over a wireless network. The simulation results show the efficient utilization of network resources as well as robustness to network uncertainties.
无线网络中的不确定性,如时变延迟和数据包丢失,经常导致网络控制系统(NCS)的不稳定和性能下降。此外,有限的网络资源限制了植物和控制器之间的通信。本文将无源性与自适应采样相结合,设计了一种轨迹跟踪控制体系。该架构可以容忍时变延迟和丢包,同时有效地利用网络带宽。我们提供了分析结果来证明所提出的网络控制体系结构和轨迹跟踪的无源性。我们用无线网络上机器人机械手轨迹跟踪控制的案例研究来证明我们的方法。仿真结果表明,该方法有效地利用了网络资源,对网络不确定性具有较强的鲁棒性。
{"title":"Passivity-based trajectory tracking control with adaptive sampling over a wireless network","authors":"E. Eyisi, X. Koutsoukos, N. Kottenstette","doi":"10.1109/ISRCS.2012.6309306","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309306","url":null,"abstract":"Uncertainty in wireless networks, such as time-varying delays and packet loss, often leads to instability and degraded performance in Networked Control Systems (NCS). Further, limited network resources impose constraints on communication between plants and controllers. In this paper, we use passivity combined with adaptive sampling to design a control architecture for trajectory tracking. The proposed architecture can tolerate time-varying delays and packet loss while efficiently utilizing network bandwidth. We provide analytical results to show passivity of the proposed networked control architecture and trajectory tracking. We demonstrate our approach using a case study on the trajectory tracking control of a robotic manipulator over a wireless network. The simulation results show the efficient utilization of network resources as well as robustness to network uncertainties.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115142973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Resiliency of linear system consensus in the presence of channel noise 信道噪声存在下线性系统一致性的弹性
Pub Date : 2012-09-24 DOI: 10.1109/ISRCS.2012.6309307
F. Ferrese, S. Biswas, Q. Dong, Li Bai
This paper presents multi-agent based control of networked linear time invariant systems in a noisy environment. The control protocol is based on output information received from other subsystems through the communication channel, which imparts noise to the sensor data. We show that the sum of the mean square state errors between various subsystems converges to a small bound for the multi-agent system. It is apparent that a higher controller gain tends to make the networked system arrive at a consensus faster, while at the same time has the detrimental effect of enlarging the radius of consensus. Resilience of consensus is demonstrated in that the controller maintains collective stability in the event of communication or subsystem failures.
研究了噪声环境下基于多智能体的网络线性时不变系统控制问题。控制协议基于通过通信通道接收到的其他子系统的输出信息,这给传感器数据带来了噪声。结果表明,对于多智能体系统,各子系统间状态误差的均方和收敛于一个小的界。显然,较高的控制器增益往往使网络系统更快地达成共识,同时具有扩大共识半径的不利影响。共识的弹性表现在控制器在通信或子系统故障的情况下保持集体稳定性。
{"title":"Resiliency of linear system consensus in the presence of channel noise","authors":"F. Ferrese, S. Biswas, Q. Dong, Li Bai","doi":"10.1109/ISRCS.2012.6309307","DOIUrl":"https://doi.org/10.1109/ISRCS.2012.6309307","url":null,"abstract":"This paper presents multi-agent based control of networked linear time invariant systems in a noisy environment. The control protocol is based on output information received from other subsystems through the communication channel, which imparts noise to the sensor data. We show that the sum of the mean square state errors between various subsystems converges to a small bound for the multi-agent system. It is apparent that a higher controller gain tends to make the networked system arrive at a consensus faster, while at the same time has the detrimental effect of enlarging the radius of consensus. Resilience of consensus is demonstrated in that the controller maintains collective stability in the event of communication or subsystem failures.","PeriodicalId":227062,"journal":{"name":"2012 5th International Symposium on Resilient Control Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123557144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2012 5th International Symposium on Resilient Control Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1