Open Access. Powered by Scholars. Published by Universities.®
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Engineering
Quantum Computing And Resilient Design Perspectives For Cybersecurity Of Feedback Systems, Keshav Kasturi Rangan, Jihan Abou Halloun, Henrique Oyama, Samantha Cherney, Ilham Azali Assoumani, Nazir Jairazbhoy, Helen Durand, Simon Ka Ng
Quantum Computing And Resilient Design Perspectives For Cybersecurity Of Feedback Systems, Keshav Kasturi Rangan, Jihan Abou Halloun, Henrique Oyama, Samantha Cherney, Ilham Azali Assoumani, Nazir Jairazbhoy, Helen Durand, Simon Ka Ng
Chemical Engineering and Materials Science Faculty Research Publications
Cybersecurity of control systems is an important issue in next-generation manufac- turing that can impact both operational objectives (safety and performance) as well as process designs (via hazard analysis). Cyberattacks differ from faults in that they can be coordinated efforts to exploit system vulnerabilities to create otherwise unlikely hazard scenarios. Because coordination and targeted process manipulation can be characteristics of attacks, some of the tactics previously analyzed in our group from a control system cybersecurity perspective have incorporated randomness to attempt to thwart attacks. The underlying assumption for the generation of this randomness has been that it can be achieved …
Quantum Computing And Resilient Design Perspectives For Cybersecurity Of Feedback Systems, Keshav Kasturi Rangan, Jihan Abou Halloun, Henrique Oyama, Samantha Cherney, Ilham Azali Assoumani, Nazir Jairazbhoy, Helen Durand, Simon Ka Ng
Quantum Computing And Resilient Design Perspectives For Cybersecurity Of Feedback Systems, Keshav Kasturi Rangan, Jihan Abou Halloun, Henrique Oyama, Samantha Cherney, Ilham Azali Assoumani, Nazir Jairazbhoy, Helen Durand, Simon Ka Ng
Chemical Engineering and Materials Science Faculty Research Publications
Cybersecurity of control systems is an important issue in next-generation manufac- turing that can impact both operational objectives (safety and performance) as well as process designs (via hazard analysis). Cyberattacks differ from faults in that they can be coordinated efforts to exploit system vulnerabilities to create otherwise unlikely hazard scenarios. Because coordination and targeted process manipulation can be characteristics of attacks, some of the tactics previously analyzed in our group from a control system cybersecurity perspective have incorporated randomness to attempt to thwart attacks. The underlying assumption for the generation of this randomness has been that it can be achieved …
Parameter Identification And Fault Detection For Reliable Control Of Permanent Magnet Motors, Dusan Vukosav Progovac
Parameter Identification And Fault Detection For Reliable Control Of Permanent Magnet Motors, Dusan Vukosav Progovac
Wayne State University Dissertations
The objective of this dissertation is to develop new fault detection, identification, estimation and control algorithms that will be used to detect winding stator fault, identify the motor parameters and optimally control machine during faulty condition. Quality or proposed algorithms for Fault detection, parameter identification and control under faulty condition will validated through analytical study (Cramer-Rao bound) and simulation. Simulation will be performed for three most applied control schemes: Proportional-Integral-Derivative (PID), Direct Torque Control (DTC) and Field Oriented Control (FOC) for Permanent Magnet Machines. New detection schemes forfault detection, isolation and machine parameter identification are presented and analyzed. Different control …
Monitoring, Diagnosis, And Control For Advanced Anesthesia Management, Zhibin Tan
Monitoring, Diagnosis, And Control For Advanced Anesthesia Management, Zhibin Tan
Wayne State University Dissertations
Modern anesthesia management is a comprehensive and the most critical issue in medical care. During the past dacades, a large amount of research works have been focused on the problems of monitoring anesthesia depth, modeling the dynamics of anesthesia patient for the purpose of control, prediction, and diagnosis.
Monitoring the anesthesia depth is not only for keeping the patient in adquate anesthesia level but also for preventing the patient from overdosing. Several EEG based indexes have been developed such as the BIS, and Entropy etc. for measuring depth. However, reports mentioned that those indexes in some cases fail in detecting …