It’s possible for malicious operators to seize hold of electrical control systems, for instance, the engine control unit of driverless vehicles, from various vectors, e.g. autonomic control system, remote vehicle acc...It’s possible for malicious operators to seize hold of electrical control systems, for instance, the engine control unit of driverless vehicles, from various vectors, e.g. autonomic control system, remote vehicle access, or human drivers. To mitigate potential risks, this paper provides the inauguration study by proposing a theoretical framework in the physical, human and cyber triad. Its goal is to, at each time point, detect adversary control behaviors and protect control systems against malicious operations via integrating a variety of methods. This paper only proposes a theoretical framework which tries to indicate possible threats. With the support of the framework, the security system can lightly reduce the risk. The development and implementation of the system are out of scope.展开更多
Security is a key problem for the development of Cloud Computing. A common service security architecture is a basic abstract to support security research work. The authorization ability in the service security faces m...Security is a key problem for the development of Cloud Computing. A common service security architecture is a basic abstract to support security research work. The authorization ability in the service security faces more complex and variable users and environment. Based on the multidimensional views, the service security architecture is described on three dimensions of service security requirement integrating security attributes and service layers. An attribute-based dynamic access control model is presented to detail the relationships among subjects, objects, roles, attributes, context and extra factors further. The model uses dynamic control policies to support the multiple roles and flexible authority. At last, access control and policies execution mechanism were studied as the implementation suggestion.展开更多
Activated carbons have been widely employed as electrode materials of aqueous supercapacitors but the use of hazardous and corrosive activating agents challenges conventional activation procedures.Here,using a unique ...Activated carbons have been widely employed as electrode materials of aqueous supercapacitors but the use of hazardous and corrosive activating agents challenges conventional activation procedures.Here,using a unique molten salt assisted self-activation technique,we have devised an eco-friendly and simple method to synthesize oxygen-rich hierarchical porous carbon with controllable architecture.Mixture of sodium carboxymethylcellulose and NaCl was pyrolyzed in one step,creating in-situ produced Na_(2)CO_(3)-NaCl molten salt that carried out the activation work.Na2 CO3 acts as the activating agent in the reaction media of NaCl during the self-activation process.The obtained carbon exhibited a remarkable specific capacitance of 278 F g^(−1) at 0.5 A g^(−1) and retained 76%capacitance at 50 A g^(−1) in a three-electrode cell.The fabricated aqueous coin cell achieved 81%capacitance retention at 50 A g^(−1) and the highest specific energy density of 12.8 Wh kg^(−1) at 214.6 W kg^(−1),which are superior compared to the commercial activated carbon(64%at 50 A g^(−1) and 8.4 Wh kg^(−1) at 194.8 W kg^(−1)).Moreover,capacitance fading was not observed after 10000 cycles at 5 A g^(−1).Considering the species diversity and low cost of self-salt polymers on the market,this strategy will expect to become a scalable approach for synthesizing high-performance capacitive carbons.展开更多
The control architectures of "SY-2" Remote Operated Vehicle (ROV) are introduced. Both hardware architecture and software architecture are discussed. PC/104 embedded computer is used to control equipment for colle...The control architectures of "SY-2" Remote Operated Vehicle (ROV) are introduced. Both hardware architecture and software architecture are discussed. PC/104 embedded computer is used to control equipment for collecting sensor data and sending control commands. PC/104 embedded computer is integrated with A/D, D/A, 8 serial ports card and power supply unit. The surface computer is a X86PC. They transfer data through a fiber line. For software, real-time OS VxWorks is embedded in PC/104. A/D, D/A and serial ports operation are based on VxWorks OS, which increase the real-time quality of control system. Surface computer is the center of motion control and data processing. It is communicated with underwater PC/104 by socket. The whole system has been tested both on land and in tank.展开更多
This paper describes a hierarchical architecture and a high-performance and interoperability protocol for centralized monitoring and controlling systems (CMCS) . The protocol we proposed can interoperate different mon...This paper describes a hierarchical architecture and a high-performance and interoperability protocol for centralized monitoring and controlling systems (CMCS) . The protocol we proposed can interoperate different monitoring and controlling systems constructed by different companies, each with different functions and communication protocols. The protocol reduces the amount of traffic and has real-time and high-perfor-mance advantages. The protocol was implemented in CMCS for telecommunication power supply and air-condi-tioner used by the Telecommunication Bureau of Zhejiang Province. This paper deals with the hierarchical architecture and function of CMCS and packet format, command ID, and SDL description of its protocol. We also discuss the properties of the interoperability and performance of the protocol in this paper.展开更多
This paper researches on a kind of control architecture for autonomous undelwater vehicle (AUV). After describing the hybrid property of the AUV control system, we present the hierarchical AUV control architecture. ...This paper researches on a kind of control architecture for autonomous undelwater vehicle (AUV). After describing the hybrid property of the AUV control system, we present the hierarchical AUV control architecture. The architecture is organized in three layers: mission layer, task layer and execution layer. State supervisor and task coordinator are two key modules handling discrete events, so we describe these two modules in detail. Finally, we carried out a series of tests to verify this architecture The test results show that the AUV can perform autonomous missions effectively and safely. We can conclude the control architecture is valid and practical.展开更多
This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational Technology (OT) environments. The ISERA f...This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational Technology (OT) environments. The ISERA framework integrates security by design principles, micro-segmentation, and Island Mode Operation (IMO) to enhance cyber resilience and ensure continuous, secure operations. The methodology deploys a Forward-Thinking Architecture Strategy (FTAS) algorithm, which utilises an industrial Intrusion Detection System (IDS) implemented with Python’s Network Intrusion Detection System (NIDS) library. The FTAS algorithm successfully identified and responded to cyber-attacks, ensuring minimal system disruption. ISERA has been validated through comprehensive testing scenarios simulating Denial of Service (DoS) attacks and malware intrusions, at both the IT and OT layers where it successfully mitigates the impact of malicious activity. Results demonstrate ISERA’s efficacy in real-time threat detection, containment, and incident response, thus ensuring the integrity and reliability of critical infrastructure systems. ISERA’s decentralised approach contributes to global net zero goals by optimising resource use and minimising environmental impact. By adopting a decentralised control architecture and leveraging virtualisation, ISERA significantly enhances the cyber resilience and sustainability of critical infrastructure systems. This approach not only strengthens defences against evolving cyber threats but also optimises resource allocation, reducing the system’s carbon footprint. As a result, ISERA ensures the uninterrupted operation of essential services while contributing to broader net zero goals.展开更多
Rice is one of the most consumed staple food plants around the world, and its plant architecture is very important to improve the grain yield (Zhang et al., 2008). Plant height, leaf angle, tiller number and angle, ...Rice is one of the most consumed staple food plants around the world, and its plant architecture is very important to improve the grain yield (Zhang et al., 2008). Plant height, leaf angle, tiller number and angle, and uniformity of panicle layer all can have strong effects on grain yield (Wang and Li, 2008). During the long history of domestication, rice has been selected to develop uniform tiller height architecture that ensures panicle layer uniformity and ease of harvesting (Ma et al., 2009), and is largely determined by the synchronic culm elongation.展开更多
Inflorescences are flower-bearing shoots that originate from pools of stem cells in shoot apical meristems (SAM).Inflorescence architecture is determined by a process of meristem maturation,during which stem cell fate...Inflorescences are flower-bearing shoots that originate from pools of stem cells in shoot apical meristems (SAM).Inflorescence architecture is determined by a process of meristem maturation,during which stem cell fate switches from a vegetative to a reproductive growth program.A major factor in plant reproductive success in nature and yield in agriculture is the number of branches and flowers on inflorescences (Kobayashi and Weigel,2007;展开更多
A novel non-contact spacecraft architecture with the extended stochastic state observer for disturbance rejection control of the gravity satellite is proposed.First,the precise linear driving non-contact voice-coil ac...A novel non-contact spacecraft architecture with the extended stochastic state observer for disturbance rejection control of the gravity satellite is proposed.First,the precise linear driving non-contact voice-coil actuators are used to separate the whole spacecraft into the non-contact payload module and the service module,and to build an ideal loop with precise dynamics for disturbance rejection control of the payload module.Second,an extended stochastic state observer is enveloped to construct the overall nonlinear external terms and the internal coupled terms of the payload module,enabling the controller design of the payload module turned into the linear form with simple bandwidth-parameterization tuning in the frequency domain.As a result,the disturbance rejection control of the payload module can be explicitly achieved in a timely manner without complicated tuning in actual implementation.Finally,an extensive numerical simulation is conducted to validate the feasibility and effectiveness of the proposed approach.展开更多
Current SDN controllers suffer from a series of potential attacks. For example, malicious flow rules may lead to system disorder by introducing unexpected flow entries. In this paper, we propose Mcad-SA, an aware deci...Current SDN controllers suffer from a series of potential attacks. For example, malicious flow rules may lead to system disorder by introducing unexpected flow entries. In this paper, we propose Mcad-SA, an aware decision-making security architecture with multiple controllers, which could coordinate heterogeneous controllers internally as a "big" controller. This architecture includes an additional plane, the scheduling plane, which consists of transponder, sensor, decider and scheduler. Meanwhile it achieves the functions of communicating, supervising and scheduling between data and control plane. In this framework, we adopt the vote results from the majority of controllers to determine valid flow rules distributed to switches. Besides, an aware dynamic scheduling(ADS) mechanism is devised in scheduler to intensify security of Mcad-SA further. Combined with perception, ADS takes advantage of heterogeneity and redundancy of controllers to enable the control plane operate in a dynamic, reliable and unsteady state, which results in significant difficulty of probing systems and executing attacks. Simulation results demonstrate the proposed methods indicate better security resilience over traditional architectures as they have lower failure probability when facing attacks.展开更多
This paper presents a further improved Production Activity Control Architecture to deal with the complexity of information by creating Sub-Producers and Sub-Movers which will not only give a better control at workstat...This paper presents a further improved Production Activity Control Architecture to deal with the complexity of information by creating Sub-Producers and Sub-Movers which will not only give a better control at workstation level but also reduce load on the Dispatcher. It also makes an analysis of the basic and improved PAC (Production Activity Control) Architecture in the Control System for Integrated Manufacturing. The PAC Architecture and the improvement will further enhance the flexibility and adaptability of the architecture in the ever changing environment of the Shop Floor Control (SFC) Systems.展开更多
As industrialization and informatization in China deeply integrate and the Internet of Things rapidly develops,industrial control systems are facing increasingly severe information security challenges.The industrial c...As industrialization and informatization in China deeply integrate and the Internet of Things rapidly develops,industrial control systems are facing increasingly severe information security challenges.The industrial control system of the gas extraction plant is characterized by numerous points and centralized operations,with a strong reliance on the system and stringent real-time requirements.展开更多
The Internet is playing an important role in information retrieval, and additionally industrial process manipulation. This paper describes an approach to writing requirements specifications for Internet-based control ...The Internet is playing an important role in information retrieval, and additionally industrial process manipulation. This paper describes an approach to writing requirements specifications for Internet-based control systems, from which architectures can be derived. The requirements specifications developed are described in terms of a functional model, which is then extended to form an information architecture. Distinct from the functional model, the information architecture provides an indication as to the architectural structure of subsequently developed Internet-based control systems. Three general control structures are generated from the analysis of an information architecture. An integrated-distributed architecture is derived as an ideal implementation, in which a control system is linked to the Internet at all levels of a control system hierarchy.展开更多
A new ATM switch architecture based on the Knockout switch is proposed.Prioritycontrol function is assigned to the hardware of switch to meet the requirements of cell lossprobabilities and delay characteristics of dif...A new ATM switch architecture based on the Knockout switch is proposed.Prioritycontrol function is assigned to the hardware of switch to meet the requirements of cell lossprobabilities and delay characteristics of different services.This architecture can use systemresource more effectively,meet the QOS(quality of service)requirements of different cus-tomers,and also can reduce the complexity of switch.展开更多
This paper presents a Shared Control Architecture(SCA)between a human pilot and a smart inceptor for nonlinear Pilot Induced Oscillations(PIOs),e.g.,category II or III PIOs.One innovation of this paper is that an inte...This paper presents a Shared Control Architecture(SCA)between a human pilot and a smart inceptor for nonlinear Pilot Induced Oscillations(PIOs),e.g.,category II or III PIOs.One innovation of this paper is that an intelligent shared control architecture is developed based on the intelligent active inceptor technique,i.e.,Smart Adaptive Flight Effective Cue(SAFE-Cue).A deep reinforcement learning approach namely Deep Deterministic Policy Gradient(DDPG)method is chosen to design a gain adaptation mechanism for the SAFE-Cue module.By doing this,the gains of the SAFE-Cue will be intelligently tuned once nonlinear PIOs triggered;meanwhile,the human pilot will receive a force cue from the SAFE-Cue,and will consequently adapting his/her control policy.The second innovation of this paper is that the reward function of the DDPG based gain adaptation approach is constructed according to flying qualities.Under the premise of considering failure situation,task completion qualities and pilot workload are also taken into account.Finally,the proposed approach is validated using numerical simulation experiments with two types of scenarios:lower actuator rate limits and airframe damages.The Inceptor Peak Power-Phase(IPPP)metric is adopted to analyze the human-vehicle system simulation results.Results and analysis show that the DDPG based sharing control approach can well address nonlinear PIO problems consisting of Categories Ⅱ and Ⅲ PIO events.展开更多
This paper introduces the architecture and implementation of an industrial robot control system based on Windows NT. This robot control system, which is based on a single-processor structure, can run on general indust...This paper introduces the architecture and implementation of an industrial robot control system based on Windows NT. This robot control system, which is based on a single-processor structure, can run on general industrial computers. Owing to using Windows NT's real-time extension RTX, the control system can achieve good realtime performance and friendly user interface in one general-purpose operating system. A three layer hierarchical architecture of control software is proposed to make the system more scalable and flexible. Furthermore a communication and configuration system is implemented to enable modules to communicate with each other, which make the control system scalable and flexible.展开更多
Linux-based Platform for Open Architecture Controller ( POAC ), a new open architecture controller and its modular developing method are discussed. POAC divides the application software of controller into the developi...Linux-based Platform for Open Architecture Controller ( POAC ), a new open architecture controller and its modular developing method are discussed. POAC divides the application software of controller into the developing system and the application system. In the developing system, PAOC abstracts a series of function modules with unified data interface and function interface. In the application system, POAC defines the model of the architecture module, realizing the interoperability and interchangeability between the architecture modules. The modular developing method entities the users to make up an application system with some architecture modules, which consist of a set of function modules. The modular developing method decreases the developing time from the standard of controller architecture to the product.展开更多
With the explosive increasing number of connecting devices such as smart phones, vehicles,drones, and satellites in the wireless networks, how to manage and control such a huge number of networking nodes has become a ...With the explosive increasing number of connecting devices such as smart phones, vehicles,drones, and satellites in the wireless networks, how to manage and control such a huge number of networking nodes has become a great challenge. In this paper, we combine the advantages of centralized networks and distributed networks approaches for vehicular networks with the aid of Unmanned Aerial Vehicle(UAV), and propose a Center-controlled Multihop Wireless(CMW) networking scheme consisting of data transmission plane performed by vehicles and the network control plane implemented by the UAV.Besides, we jointly explore the advantages of Medium Access Control(MAC) protocols in the link layer and routing schemes in the network layer to facilitate the multi-hop data transmission for the ground vehicles.Particularly, the network control plane in the UAV can manage the whole network effectively via fully exploiting the acquired network topology information and traffic requests from each vehicle, and implements various kinds of control based on different traffic demands, which can enhance the networking flexibility and scalability significantly in vehicular networks.Simulation results validate the advantages of the proposed scheme compared with existing methods.展开更多
Oceanographic survey, or other similar applications should be the applications of multiple AUVs. In this paper, the skill & simulation based hybrid control architecture (S2BHCA) as the controller's design refe...Oceanographic survey, or other similar applications should be the applications of multiple AUVs. In this paper, the skill & simulation based hybrid control architecture (S2BHCA) as the controller's design reference was proposed. It is a multi-robot cooperation oriented intelligent control architecture based on hybrid ideas. The S2 BHCA attempts to incorporate the virtues of the reactive controller and of the deliberative controller by introducing the concept of the "skill". The additional online task simulation ability for cooperation is supported, too. As an application, a multiple AUV control system was developed with three "skills" for the MCM mission including two different cooperative tasks. The simulation and the sea trials show that simple task expression, fast reaction and better cooperation support can be achieved by realizing the AUV controller based on the S2 BHCA.展开更多
文摘It’s possible for malicious operators to seize hold of electrical control systems, for instance, the engine control unit of driverless vehicles, from various vectors, e.g. autonomic control system, remote vehicle access, or human drivers. To mitigate potential risks, this paper provides the inauguration study by proposing a theoretical framework in the physical, human and cyber triad. Its goal is to, at each time point, detect adversary control behaviors and protect control systems against malicious operations via integrating a variety of methods. This paper only proposes a theoretical framework which tries to indicate possible threats. With the support of the framework, the security system can lightly reduce the risk. The development and implementation of the system are out of scope.
基金supported by National Information Security Program under Grant No.2009A112
文摘Security is a key problem for the development of Cloud Computing. A common service security architecture is a basic abstract to support security research work. The authorization ability in the service security faces more complex and variable users and environment. Based on the multidimensional views, the service security architecture is described on three dimensions of service security requirement integrating security attributes and service layers. An attribute-based dynamic access control model is presented to detail the relationships among subjects, objects, roles, attributes, context and extra factors further. The model uses dynamic control policies to support the multiple roles and flexible authority. At last, access control and policies execution mechanism were studied as the implementation suggestion.
基金financial support from the Australian Research Council Discovery Programs(Nos.DP190103661 and DP220103229)the Australian Government Research Training Program Scholarship.
文摘Activated carbons have been widely employed as electrode materials of aqueous supercapacitors but the use of hazardous and corrosive activating agents challenges conventional activation procedures.Here,using a unique molten salt assisted self-activation technique,we have devised an eco-friendly and simple method to synthesize oxygen-rich hierarchical porous carbon with controllable architecture.Mixture of sodium carboxymethylcellulose and NaCl was pyrolyzed in one step,creating in-situ produced Na_(2)CO_(3)-NaCl molten salt that carried out the activation work.Na2 CO3 acts as the activating agent in the reaction media of NaCl during the self-activation process.The obtained carbon exhibited a remarkable specific capacitance of 278 F g^(−1) at 0.5 A g^(−1) and retained 76%capacitance at 50 A g^(−1) in a three-electrode cell.The fabricated aqueous coin cell achieved 81%capacitance retention at 50 A g^(−1) and the highest specific energy density of 12.8 Wh kg^(−1) at 214.6 W kg^(−1),which are superior compared to the commercial activated carbon(64%at 50 A g^(−1) and 8.4 Wh kg^(−1) at 194.8 W kg^(−1)).Moreover,capacitance fading was not observed after 10000 cycles at 5 A g^(−1).Considering the species diversity and low cost of self-salt polymers on the market,this strategy will expect to become a scalable approach for synthesizing high-performance capacitive carbons.
基金supported by the National Natural Science Foundation of China(Grant No.50909025/E091002)the Fundamental Research Foundation of Harbin Engineering University(Grant No.HEUFT08001)+1 种基金the China Postdoctoral Science Foundation(Grant No.20080440838)the Heilongjiang Province Postdoctoral Foun-dation
文摘The control architectures of "SY-2" Remote Operated Vehicle (ROV) are introduced. Both hardware architecture and software architecture are discussed. PC/104 embedded computer is used to control equipment for collecting sensor data and sending control commands. PC/104 embedded computer is integrated with A/D, D/A, 8 serial ports card and power supply unit. The surface computer is a X86PC. They transfer data through a fiber line. For software, real-time OS VxWorks is embedded in PC/104. A/D, D/A and serial ports operation are based on VxWorks OS, which increase the real-time quality of control system. Surface computer is the center of motion control and data processing. It is communicated with underwater PC/104 by socket. The whole system has been tested both on land and in tank.
文摘This paper describes a hierarchical architecture and a high-performance and interoperability protocol for centralized monitoring and controlling systems (CMCS) . The protocol we proposed can interoperate different monitoring and controlling systems constructed by different companies, each with different functions and communication protocols. The protocol reduces the amount of traffic and has real-time and high-perfor-mance advantages. The protocol was implemented in CMCS for telecommunication power supply and air-condi-tioner used by the Telecommunication Bureau of Zhejiang Province. This paper deals with the hierarchical architecture and function of CMCS and packet format, command ID, and SDL description of its protocol. We also discuss the properties of the interoperability and performance of the protocol in this paper.
文摘This paper researches on a kind of control architecture for autonomous undelwater vehicle (AUV). After describing the hybrid property of the AUV control system, we present the hierarchical AUV control architecture. The architecture is organized in three layers: mission layer, task layer and execution layer. State supervisor and task coordinator are two key modules handling discrete events, so we describe these two modules in detail. Finally, we carried out a series of tests to verify this architecture The test results show that the AUV can perform autonomous missions effectively and safely. We can conclude the control architecture is valid and practical.
基金funded by the Office of Gas and Electricity Markets(Ofgem)and supported by De Montfort University(DMU)and Nottingham Trent University(NTU),UK.
文摘This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational Technology (OT) environments. The ISERA framework integrates security by design principles, micro-segmentation, and Island Mode Operation (IMO) to enhance cyber resilience and ensure continuous, secure operations. The methodology deploys a Forward-Thinking Architecture Strategy (FTAS) algorithm, which utilises an industrial Intrusion Detection System (IDS) implemented with Python’s Network Intrusion Detection System (NIDS) library. The FTAS algorithm successfully identified and responded to cyber-attacks, ensuring minimal system disruption. ISERA has been validated through comprehensive testing scenarios simulating Denial of Service (DoS) attacks and malware intrusions, at both the IT and OT layers where it successfully mitigates the impact of malicious activity. Results demonstrate ISERA’s efficacy in real-time threat detection, containment, and incident response, thus ensuring the integrity and reliability of critical infrastructure systems. ISERA’s decentralised approach contributes to global net zero goals by optimising resource use and minimising environmental impact. By adopting a decentralised control architecture and leveraging virtualisation, ISERA significantly enhances the cyber resilience and sustainability of critical infrastructure systems. This approach not only strengthens defences against evolving cyber threats but also optimises resource allocation, reducing the system’s carbon footprint. As a result, ISERA ensures the uninterrupted operation of essential services while contributing to broader net zero goals.
基金supported by funds from the National Transgenic Major Program Grants(No.2009ZX08009-022B)
文摘Rice is one of the most consumed staple food plants around the world, and its plant architecture is very important to improve the grain yield (Zhang et al., 2008). Plant height, leaf angle, tiller number and angle, and uniformity of panicle layer all can have strong effects on grain yield (Wang and Li, 2008). During the long history of domestication, rice has been selected to develop uniform tiller height architecture that ensures panicle layer uniformity and ease of harvesting (Ma et al., 2009), and is largely determined by the synchronic culm elongation.
基金supported by startup funding to C.X.from State Key Laboratory of Plant Genomics and Institute of Genetics and Developmental Biology,Chinese Academy of Sciences,and a National Science Foundation grant(IOS-1556171)to Z.B.L
文摘Inflorescences are flower-bearing shoots that originate from pools of stem cells in shoot apical meristems (SAM).Inflorescence architecture is determined by a process of meristem maturation,during which stem cell fate switches from a vegetative to a reproductive growth program.A major factor in plant reproductive success in nature and yield in agriculture is the number of branches and flowers on inflorescences (Kobayashi and Weigel,2007;
基金supported by the National Natural Science Foundation of China(5170532751805329)+1 种基金Fundamental Research Funds for the Central Universities of China(NS2020065)the Natural Science Foundation of Shanghai(19ZR1453300).
文摘A novel non-contact spacecraft architecture with the extended stochastic state observer for disturbance rejection control of the gravity satellite is proposed.First,the precise linear driving non-contact voice-coil actuators are used to separate the whole spacecraft into the non-contact payload module and the service module,and to build an ideal loop with precise dynamics for disturbance rejection control of the payload module.Second,an extended stochastic state observer is enveloped to construct the overall nonlinear external terms and the internal coupled terms of the payload module,enabling the controller design of the payload module turned into the linear form with simple bandwidth-parameterization tuning in the frequency domain.As a result,the disturbance rejection control of the payload module can be explicitly achieved in a timely manner without complicated tuning in actual implementation.Finally,an extensive numerical simulation is conducted to validate the feasibility and effectiveness of the proposed approach.
基金supported by the Foundation for Innovative Research Groups of the National Natural Science Foundation of China (No.61521003)the National Key R&D Program of China (No.2016YFB0800100,No.2016YFB0800101)the National Natural Science Foundation of China (No.61602509)
文摘Current SDN controllers suffer from a series of potential attacks. For example, malicious flow rules may lead to system disorder by introducing unexpected flow entries. In this paper, we propose Mcad-SA, an aware decision-making security architecture with multiple controllers, which could coordinate heterogeneous controllers internally as a "big" controller. This architecture includes an additional plane, the scheduling plane, which consists of transponder, sensor, decider and scheduler. Meanwhile it achieves the functions of communicating, supervising and scheduling between data and control plane. In this framework, we adopt the vote results from the majority of controllers to determine valid flow rules distributed to switches. Besides, an aware dynamic scheduling(ADS) mechanism is devised in scheduler to intensify security of Mcad-SA further. Combined with perception, ADS takes advantage of heterogeneity and redundancy of controllers to enable the control plane operate in a dynamic, reliable and unsteady state, which results in significant difficulty of probing systems and executing attacks. Simulation results demonstrate the proposed methods indicate better security resilience over traditional architectures as they have lower failure probability when facing attacks.
文摘This paper presents a further improved Production Activity Control Architecture to deal with the complexity of information by creating Sub-Producers and Sub-Movers which will not only give a better control at workstation level but also reduce load on the Dispatcher. It also makes an analysis of the basic and improved PAC (Production Activity Control) Architecture in the Control System for Integrated Manufacturing. The PAC Architecture and the improvement will further enhance the flexibility and adaptability of the architecture in the ever changing environment of the Shop Floor Control (SFC) Systems.
文摘As industrialization and informatization in China deeply integrate and the Internet of Things rapidly develops,industrial control systems are facing increasingly severe information security challenges.The industrial control system of the gas extraction plant is characterized by numerous points and centralized operations,with a strong reliance on the system and stringent real-time requirements.
基金This work was supported in part by the EPSRC under Grant GR/R13371/01.
文摘The Internet is playing an important role in information retrieval, and additionally industrial process manipulation. This paper describes an approach to writing requirements specifications for Internet-based control systems, from which architectures can be derived. The requirements specifications developed are described in terms of a functional model, which is then extended to form an information architecture. Distinct from the functional model, the information architecture provides an indication as to the architectural structure of subsequently developed Internet-based control systems. Three general control structures are generated from the analysis of an information architecture. An integrated-distributed architecture is derived as an ideal implementation, in which a control system is linked to the Internet at all levels of a control system hierarchy.
基金Supported by a major project of the 8th Five-year Plan of China.
文摘A new ATM switch architecture based on the Knockout switch is proposed.Prioritycontrol function is assigned to the hardware of switch to meet the requirements of cell lossprobabilities and delay characteristics of different services.This architecture can use systemresource more effectively,meet the QOS(quality of service)requirements of different cus-tomers,and also can reduce the complexity of switch.
基金co-supported by the Fundamental Research Funds for the Central Universities of China(No.YWF-23-SDHK-L-005)the 1912 Project,China and the Aeronautical Science Foundation of China(No.20220048051001).
文摘This paper presents a Shared Control Architecture(SCA)between a human pilot and a smart inceptor for nonlinear Pilot Induced Oscillations(PIOs),e.g.,category II or III PIOs.One innovation of this paper is that an intelligent shared control architecture is developed based on the intelligent active inceptor technique,i.e.,Smart Adaptive Flight Effective Cue(SAFE-Cue).A deep reinforcement learning approach namely Deep Deterministic Policy Gradient(DDPG)method is chosen to design a gain adaptation mechanism for the SAFE-Cue module.By doing this,the gains of the SAFE-Cue will be intelligently tuned once nonlinear PIOs triggered;meanwhile,the human pilot will receive a force cue from the SAFE-Cue,and will consequently adapting his/her control policy.The second innovation of this paper is that the reward function of the DDPG based gain adaptation approach is constructed according to flying qualities.Under the premise of considering failure situation,task completion qualities and pilot workload are also taken into account.Finally,the proposed approach is validated using numerical simulation experiments with two types of scenarios:lower actuator rate limits and airframe damages.The Inceptor Peak Power-Phase(IPPP)metric is adopted to analyze the human-vehicle system simulation results.Results and analysis show that the DDPG based sharing control approach can well address nonlinear PIO problems consisting of Categories Ⅱ and Ⅲ PIO events.
基金Supported by National Natural Science foundation of China (No. 69975014)
文摘This paper introduces the architecture and implementation of an industrial robot control system based on Windows NT. This robot control system, which is based on a single-processor structure, can run on general industrial computers. Owing to using Windows NT's real-time extension RTX, the control system can achieve good realtime performance and friendly user interface in one general-purpose operating system. A three layer hierarchical architecture of control software is proposed to make the system more scalable and flexible. Furthermore a communication and configuration system is implemented to enable modules to communicate with each other, which make the control system scalable and flexible.
基金Shanghai Science and Technology Development Foundation (995107017)
文摘Linux-based Platform for Open Architecture Controller ( POAC ), a new open architecture controller and its modular developing method are discussed. POAC divides the application software of controller into the developing system and the application system. In the developing system, PAOC abstracts a series of function modules with unified data interface and function interface. In the application system, POAC defines the model of the architecture module, realizing the interoperability and interchangeability between the architecture modules. The modular developing method entities the users to make up an application system with some architecture modules, which consist of a set of function modules. The modular developing method decreases the developing time from the standard of controller architecture to the product.
基金supported in part by the National Natural Science Foundation of China under Grant 62071283,Grant 61771296,Grant 61872228 and Grant 62271513in part by the Natural Science Basic Research Plan in Shaanxi Province of China under Grant 2018JQ6048 and Grant 2018JZ6006+3 种基金in part by Shaanxi Key Industrial Innovation Chain Project in Industrial Domain under Grant 2020ZDLGY15-09in part by Guang Dong Basic and Applied Basic Research Foundation under Grant 2021A1515012631in part by China Postdoctoral Science Foundation under Grant 2016M600761in part by the Fundamental Research Funds for the Central Universities under Grant GK202003075 and Grant GK202103016。
文摘With the explosive increasing number of connecting devices such as smart phones, vehicles,drones, and satellites in the wireless networks, how to manage and control such a huge number of networking nodes has become a great challenge. In this paper, we combine the advantages of centralized networks and distributed networks approaches for vehicular networks with the aid of Unmanned Aerial Vehicle(UAV), and propose a Center-controlled Multihop Wireless(CMW) networking scheme consisting of data transmission plane performed by vehicles and the network control plane implemented by the UAV.Besides, we jointly explore the advantages of Medium Access Control(MAC) protocols in the link layer and routing schemes in the network layer to facilitate the multi-hop data transmission for the ground vehicles.Particularly, the network control plane in the UAV can manage the whole network effectively via fully exploiting the acquired network topology information and traffic requests from each vehicle, and implements various kinds of control based on different traffic demands, which can enhance the networking flexibility and scalability significantly in vehicular networks.Simulation results validate the advantages of the proposed scheme compared with existing methods.
文摘Oceanographic survey, or other similar applications should be the applications of multiple AUVs. In this paper, the skill & simulation based hybrid control architecture (S2BHCA) as the controller's design reference was proposed. It is a multi-robot cooperation oriented intelligent control architecture based on hybrid ideas. The S2 BHCA attempts to incorporate the virtues of the reactive controller and of the deliberative controller by introducing the concept of the "skill". The additional online task simulation ability for cooperation is supported, too. As an application, a multiple AUV control system was developed with three "skills" for the MCM mission including two different cooperative tasks. The simulation and the sea trials show that simple task expression, fast reaction and better cooperation support can be achieved by realizing the AUV controller based on the S2 BHCA.