On the secondary control architectures of AC microgrids: An overview

Y Khayat, Q Shafiee, R Heydari… - … on Power Electronics, 2019 - ieeexplore.ieee.org
Communication infrastructure (CI) in microgrids (MGs) allows for the application of different
control architectures for the secondary control (SC) layer. The use of new SC architectures …

Event/self-triggered control for leader-following consensus over unreliable network with DoS attacks

W Xu, DWC Ho, J Zhong, B Chen - IEEE transactions on neural …, 2019 - ieeexplore.ieee.org
This paper investigates the leader-following consensus issue with event/self-triggered
schemes under an unreliable network environment. First, we characterize network …

Stabilization of networked control systems under DoS attacks and output quantization

M Wakaiki, A Cetinkaya, H Ishii - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This article addresses quantized output feedback stabilization under denial-of-service (DoS)
attacks. First, assuming that the duration and frequency of DoS attacks are averagely …

Position paper on the challenges posed by modern applications to cyber-physical systems theory

F Allgöwer, JB de Sousa, J Kapinski… - Nonlinear Analysis …, 2019 - Elsevier
Cyber-physical systems theory offers a powerful framework for modeling, analyzing, and
designing real engineering systems integrating communication, control, and computation …

An automata theoretic approach to observer design for switched linear systems

G Aazan, A Girard, L Greco, P Mason - Automatica, 2024 - Elsevier
We present an approach for designing asymptotic observers for discrete-time switched
linear systems. We first give an automata theoretic characterization of switching signals …

Effect of virtual human gaze behaviour during an orthogonal collision avoidance walking task

SD Lynch, J Pettré, J Bruneau, R Kulpa… - … IEEE Conference on …, 2018 - ieeexplore.ieee.org
This paper presents a study performed in virtual reality on the effect of gaze interception
during collision avoidance between two walkers. In such a situation, mutual gaze can be …

Efficient stability analysis approaches for nonlinear weakly-hard real-time control systems

M Hertneck, S Linsenmayer, F Allgöwer - Automatica, 2021 - Elsevier
This article considers the stability analysis of nonlinear control systems with failures in the
feedback loop that satisfy weakly-hard real-time (WHRT) constraints. Such WHRT …

Edge computing resource allocation for dynamic networks: The DRUID-NET vision and perspective

D Dechouniotis, N Athanasopoulos, A Leivadeas… - Sensors, 2020 - mdpi.com
The potential offered by the abundance of sensors, actuators, and communications in the
Internet of Things (IoT) era is hindered by the limited computational capacity of local nodes …

Linear weakly hard real-time control systems: Time-and event-triggered stabilization

S Linsenmayer, M Hertneck… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This article considers the stabilization of linear control systems under weakly hard real-time
(WHRT) constraints. In the context of networked control systems, such WHRT constraints …

Observability Analysis of Networked Control Systems Under DoS Attacks

C Liu, D Du, C Zhang, C Peng… - IECON 2023-49th Annual …, 2023 - ieeexplore.ieee.org
When networked control systems (NCSs) suffer from denial-of-service (DoS) attacks, system
observability can be destroyed. To analyse this problem, this paper mainly investigates the …