Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (13)
- Air Force Institute of Technology (7)
- California Polytechnic State University, San Luis Obispo (3)
- Tashkent State Technical University (3)
- Michigan Technological University (2)
-
- The University of Akron (2)
- University of Nebraska - Lincoln (2)
- American University in Cairo (1)
- Clemson University (1)
- Cleveland State University (1)
- East Tennessee State University (1)
- Florida International University (1)
- Georgia Southern University (1)
- Kennesaw State University (1)
- Purdue University (1)
- Technological University Dublin (1)
- University of Connecticut (1)
- University of Kentucky (1)
- University of Massachusetts Amherst (1)
- Virginia Commonwealth University (1)
- Keyword
-
- Cyber-Physical Systems (9)
- Network Control Systems (8)
- Control Systems (4)
- Security (4)
- Wireless Control Systems (4)
-
- Wireless Network Control (4)
- Automation (3)
- Arduino (2)
- Autonomous (2)
- CAN (2)
- COLLECTOR (2)
- Control (2)
- Controls (2)
- ELECTRICAL WITH SOLAR ENERGY (2)
- SMART GRID (2)
- #KRKTR (1)
- #antcenter (1)
- AGV (1)
- ASL (1)
- Access Point (AP) Costs (1)
- Accessibility (1)
- Action learning (1)
- Action research (1)
- Adaptive compression (1)
- Adaptive control (1)
- Adaptive control systems (1)
- Adaptive optics (1)
- Agency (1)
- Agricultural Technology (1)
- Allies (1)
- Publication Year
- Publication
-
- Theses and Dissertations (9)
- George J. Pappas (6)
- Radhey Shyam Meena (4)
- Chemical Technology, Control and Management (3)
- Dissertations, Master's Theses and Master's Reports (2)
-
- Rahul Mangharam (2)
- Williams Honors College, Honors Research Projects (2)
- All Theses (1)
- BioResource and Agricultural Engineering (1)
- Computer Engineering (1)
- Conference papers (1)
- Department of Agricultural and Biological Systems Engineering: Dissertations, Theses, and Student Research (1)
- Discovery Undergraduate Interdisciplinary Research Internship (1)
- Doctoral Dissertations (1)
- Electrical and Computer Engineering Faculty Publications (1)
- Electronic Theses and Dissertations (1)
- FIU Electronic Theses and Dissertations (1)
- Honors Scholar Theses (1)
- Library Philosophy and Practice (e-journal) (1)
- Mechanical Engineering (1)
- Ole J Mengshoel (1)
- The Kennesaw Journal of Undergraduate Research (1)
- Theses and Dissertations--Computer Science (1)
- Undergraduate Honors Theses (1)
- Publication Type
- File Type
Articles 31 - 45 of 45
Full-Text Articles in Controls and Control Theory
The Wireless Control Network: Synthesis And Robustness, Miroslav Pajic, Shreyas Sundaram, Jerome Le Ny, George J. Pappas, Rahul Mangharam
The Wireless Control Network: Synthesis And Robustness, Miroslav Pajic, Shreyas Sundaram, Jerome Le Ny, George J. Pappas, Rahul Mangharam
Rahul Mangharam
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. Traditional networked control schemes are designed with one of the nodes in the network acting as a dedicated controller, while the other nodes simply route information to and from the controller and the plant. We introduce the concept of a Wireless Control Network (WCN) where the entire network itself acts as the controller. Specifically, at each time-step, each node updates its internal state to be a linear combination of the states of the nodes in its neighborhood. We show that this causes the entire …
The Wireless Control Network: Monitoring For Malicious Behavior, Shreyas Sundaram, Miroslav Pajic, Christoforos Hadjicostis, Rahul Mangharam, George Pappas
The Wireless Control Network: Monitoring For Malicious Behavior, Shreyas Sundaram, Miroslav Pajic, Christoforos Hadjicostis, Rahul Mangharam, George Pappas
Rahul Mangharam
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly transmits a linear combination of the values in its neighborhood. For certain topologies, we showed that these linear combinations can be designed so that the closed loop system is stable (i.e., the wireless network itself acts as a controller for the plant). In this paper, we design a Intrusion Detection System (IDS) for this control scheme, which observes the transmissions of certain nodes in the network and uses that information to (a) …
Switch Yard Operation In Thermal Power Plant(Katpp Jhalawar Rajasthan), Radhey Shyam Meena Er.
Switch Yard Operation In Thermal Power Plant(Katpp Jhalawar Rajasthan), Radhey Shyam Meena Er.
Radhey Shyam Meena
Switchyard Provides the facilities for switching ,protection & Control of electric power. To handle high Voltage power with proper Safety measures. To isolate the noises coming from the grid with true 50Hz power SWITCH YARD IS IMPORTANT PART IN THERMAL PLANT. IN KALISINDH THERMAL 400KV AND 220KV SWITCH YARD LOCATED.
Frg Turbojet, Tyler Vitti
Frg Turbojet, Tyler Vitti
Computer Engineering
Members of the Cal Poly SLO campus club FRG work together with students of several different disciplines to build a functional turbojet engine. Engineering approaches include design, fabrication, testing, and computer sensing, control, and integration. The goal of the project is to produce a running turbojet engine monitored and controlled by embedded hardware and specialized PC software. This project is to be used by later groups for further research and development.
The Wireless Control Network: Monitoring For Malicious Behavior, Shreyas Sundaram, Miroslav Pajic, Christoforos N. Hadjicostis, Rahul Mangharam, George J. Pappas
The Wireless Control Network: Monitoring For Malicious Behavior, Shreyas Sundaram, Miroslav Pajic, Christoforos N. Hadjicostis, Rahul Mangharam, George J. Pappas
George J. Pappas
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly transmits a linear combination of the values in its neighborhood. For certain topologies, we showed that these linear combinations can be designed so that the closed loop system is stable (i.e., the wireless network itself acts as a controller for the plant). In this paper, we design a Intrusion Detection System (IDS) for this control scheme, which observes the transmissions of certain nodes in the network and uses that information to (a) …
The Wireless Control Network: Synthesis And Robustness, Miroslav Pajic, Shreyas Sundaram, Jerome Le Ny, George J. Pappas, Rahul Mangharam
The Wireless Control Network: Synthesis And Robustness, Miroslav Pajic, Shreyas Sundaram, Jerome Le Ny, George J. Pappas, Rahul Mangharam
George J. Pappas
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. Traditional networked control schemes are designed with one of the nodes in the network acting as a dedicated controller, while the other nodes simply route information to and from the controller and the plant. We introduce the concept of a Wireless Control Network (WCN) where the entire network itself acts as the controller. Specifically, at each time-step, each node updates its internal state to be a linear combination of the states of the nodes in its neighborhood. We show that this causes the entire …
The Wireless Control Network: Monitoring For Malicious Behavior, Shreyas Sundaram, Miroslav Pajic, Christoforos N. Hadjicostis, Rahul Mangharam, George J. Pappas
The Wireless Control Network: Monitoring For Malicious Behavior, Shreyas Sundaram, Miroslav Pajic, Christoforos N. Hadjicostis, Rahul Mangharam, George J. Pappas
George J. Pappas
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly transmits a linear combination of the values in its neighborhood. For certain topologies, we showed that these linear combinations can be designed so that the closed loop system is stable (i.e., the wireless network itself acts as a controller for the plant). In this paper, we design a Intrusion Detection System (IDS) for this control scheme, which observes the transmissions of certain nodes in the network and uses that information to (a) …
The Wireless Control Network: Synthesis And Robustness, Miroslav Pajic, Shreyas Sundaram, Jerome Le Ny, George J. Pappas, Rahul Mangharam
The Wireless Control Network: Synthesis And Robustness, Miroslav Pajic, Shreyas Sundaram, Jerome Le Ny, George J. Pappas, Rahul Mangharam
George J. Pappas
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. Traditional networked control schemes are designed with one of the nodes in the network acting as a dedicated controller, while the other nodes simply route information to and from the controller and the plant. We introduce the concept of a Wireless Control Network (WCN) where the entire network itself acts as the controller. Specifically, at each time-step, each node updates its internal state to be a linear combination of the states of the nodes in its neighborhood. We show that this causes the entire …
The Wireless Control Network: Monitoring For Malicious Behavior, Shreyas Sundaram, Miroslav Pajic, Christoforos N. Hadjicostis, Rahul Mangharam, George J. Pappas
The Wireless Control Network: Monitoring For Malicious Behavior, Shreyas Sundaram, Miroslav Pajic, Christoforos N. Hadjicostis, Rahul Mangharam, George J. Pappas
George J. Pappas
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly transmits a linear combination of the values in its neighborhood. For certain topologies, we showed that these linear combinations can be designed so that the closed loop system is stable (i.e., the wireless network itself acts as a controller for the plant). In this paper, we design a Intrusion Detection System (IDS) for this control scheme, which observes the transmissions of certain nodes in the network and uses that information to (a) …
The Wireless Control Network: Synthesis And Robustness, Miroslav Pajic, Shreyas Sundaram, Jerome Le Ny, George J. Pappas, Rahul Mangharam
The Wireless Control Network: Synthesis And Robustness, Miroslav Pajic, Shreyas Sundaram, Jerome Le Ny, George J. Pappas, Rahul Mangharam
George J. Pappas
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. Traditional networked control schemes are designed with one of the nodes in the network acting as a dedicated controller, while the other nodes simply route information to and from the controller and the plant. We introduce the concept of a Wireless Control Network (WCN) where the entire network itself acts as the controller. Specifically, at each time-step, each node updates its internal state to be a linear combination of the states of the nodes in its neighborhood. We show that this causes the entire …
Creating A Network Model For The Integration Of Dynamic And Static Supervisory Control And Data Acquisition (Scada) Test Environment, Marlon Coerbell
Creating A Network Model For The Integration Of Dynamic And Static Supervisory Control And Data Acquisition (Scada) Test Environment, Marlon Coerbell
Theses and Dissertations
Since 9/11 protecting our critical infrastructure has become a national priority. Presidential Decision Directive 63 mandates and lays a foundation for ensuring all aspects of our nation's critical infrastructure remain secure. Key in this debate is the fact that much of our electrical power grid fails to meet the spirit of this requirement. My research leverages the power afforded by Electric Power and Communication Synchronizing Simulator (EPOCHS) developed with the assistance of Dr. Hopkinson, et al. The power environment is modeled in an electrical simulation environment called PowerWorld©. The network is modeled in OPNET® and populated with self-similar network and …
Decisive Routing And Admission Control According To Quality Of Service Constraints, Cindy C. Reese
Decisive Routing And Admission Control According To Quality Of Service Constraints, Cindy C. Reese
Theses and Dissertations
This research effort examines, models, and proposes options to enhance command and control for decision makers when applied to the communications network. My goal is to research the viability of combining three students’ past research efforts and expanding and enhancing those efforts. The area of this research is predicting a snapshot of the communications network, context-aware routing between network nodes, and Quality of Service-based routing optimization in order to create an intelligent routing protocol platform. It will consolidate efforts from an Intelligent Agent Based Framework to Maximize Information Utility by Captain John Pecarina, Dialable Cryptography for Wireless Networks by Major …
Stochastic Estimation And Control Of Queues Within A Computer Network, Mingook Kim
Stochastic Estimation And Control Of Queues Within A Computer Network, Mingook Kim
Theses and Dissertations
Captain Nathan C. Stuckey implemented the idea of the stochastic estimation and control for network in OPNET simulator. He used extended Kalman filter to estimate packet size and packet arrival rate of network queue to regulate queue size. To validate stochastic theory, network estimator and controller is designed by OPNET model. These models validated the transient queue behavior in OPNET and work of Kalman filter by predicting the queue size and arrival rate. However, it was not enough to verify a theory by experiment. So, it needed to validate the stochastic control theory with other tools to get high validity. …
Adaptive Control Of Woofer-Tweeter Adaptive Optics, Jimmie J. Perez
Adaptive Control Of Woofer-Tweeter Adaptive Optics, Jimmie J. Perez
Theses and Dissertations
Adaptive optics applies advanced sensing and control to improve the ability of optical systems to collect images through a turbulent atmosphere. The results of this research effort demonstrate that the combination of two recent approaches improves the performance of adaptive optics in directed energy and laser communication scenarios. The first approach is adaptive control, which offers improved performance over fixed-gain controllers in the presence of rapidly changing turbulence. The second approach incorporated into the study is a dual-mirror system. The two mirrors are a high-bandwidth, low-actuator-stroke (tweeter) mirror and a low-bandwidth, large actuator-stroke (woofer) mirror. The woofer-tweeter combination allows for …
Power-Stepped Protocol: Enhancing Spatial Utilization In A Clustered Mobile Ad Hoc Network, Chansu Yu, Kang G. Shin, Ben Lee
Power-Stepped Protocol: Enhancing Spatial Utilization In A Clustered Mobile Ad Hoc Network, Chansu Yu, Kang G. Shin, Ben Lee
Electrical and Computer Engineering Faculty Publications
While most previous studies on mobile ad hoc networks (MANETs) rely on the assumption that nodes are randomly distributed in the network coverage area, this assumption is unlikely to hold, as nodes tend to be cluttered around hot spots like the site of an accident or disaster. We refer to this as a clustered layout. Intuitively, a MANET with the clustered layout may suffer from serious performance degradation due to the excessive collisions in congested hot spots and space underutilization of sparse areas. In this paper, we propose a power-controlled network protocol, called the power-stepped protocol (PSP), that maximizes the …