On the secondary control architectures of AC microgrids: An overview
Communication infrastructure (CI) in microgrids (MGs) allows for the application of different
control architectures for the secondary control (SC) layer. The use of new SC architectures …
control architectures for the secondary control (SC) layer. The use of new SC architectures …
Event/self-triggered control for leader-following consensus over unreliable network with DoS attacks
This paper investigates the leader-following consensus issue with event/self-triggered
schemes under an unreliable network environment. First, we characterize network …
schemes under an unreliable network environment. First, we characterize network …
Stabilization of networked control systems under DoS attacks and output quantization
This article addresses quantized output feedback stabilization under denial-of-service (DoS)
attacks. First, assuming that the duration and frequency of DoS attacks are averagely …
attacks. First, assuming that the duration and frequency of DoS attacks are averagely …
Position paper on the challenges posed by modern applications to cyber-physical systems theory
Cyber-physical systems theory offers a powerful framework for modeling, analyzing, and
designing real engineering systems integrating communication, control, and computation …
designing real engineering systems integrating communication, control, and computation …
An automata theoretic approach to observer design for switched linear systems
We present an approach for designing asymptotic observers for discrete-time switched
linear systems. We first give an automata theoretic characterization of switching signals …
linear systems. We first give an automata theoretic characterization of switching signals …
Effect of virtual human gaze behaviour during an orthogonal collision avoidance walking task
This paper presents a study performed in virtual reality on the effect of gaze interception
during collision avoidance between two walkers. In such a situation, mutual gaze can be …
during collision avoidance between two walkers. In such a situation, mutual gaze can be …
Efficient stability analysis approaches for nonlinear weakly-hard real-time control systems
This article considers the stability analysis of nonlinear control systems with failures in the
feedback loop that satisfy weakly-hard real-time (WHRT) constraints. Such WHRT …
feedback loop that satisfy weakly-hard real-time (WHRT) constraints. Such WHRT …
Edge computing resource allocation for dynamic networks: The DRUID-NET vision and perspective
The potential offered by the abundance of sensors, actuators, and communications in the
Internet of Things (IoT) era is hindered by the limited computational capacity of local nodes …
Internet of Things (IoT) era is hindered by the limited computational capacity of local nodes …
Linear weakly hard real-time control systems: Time-and event-triggered stabilization
This article considers the stabilization of linear control systems under weakly hard real-time
(WHRT) constraints. In the context of networked control systems, such WHRT constraints …
(WHRT) constraints. In the context of networked control systems, such WHRT constraints …
Observability Analysis of Networked Control Systems Under DoS Attacks
C Liu, D Du, C Zhang, C Peng… - IECON 2023-49th Annual …, 2023 - ieeexplore.ieee.org
When networked control systems (NCSs) suffer from denial-of-service (DoS) attacks, system
observability can be destroyed. To analyse this problem, this paper mainly investigates the …
observability can be destroyed. To analyse this problem, this paper mainly investigates the …