Open Access. Powered by Scholars. Published by Universities.®

Controls and Control Theory Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Controls and Control Theory

Green Scheduling For Radiant Systems In Buildings, Truong Nghiem, Madhur Behl, George Pappas, Rahul Mangharam Oct 2012

Green Scheduling For Radiant Systems In Buildings, Truong Nghiem, Madhur Behl, George Pappas, Rahul Mangharam

Rahul Mangharam

In this report we look at the problem of peak power reduction for buildings with electric radiant floor heating systems. Uncoordinated operation of a multi-zone radiant floor heating system can result in temporally correlated electricity demand surges or peaks in the building’s electricity consumption. As peak power prices are 200-400 times that of the nominal rate, this uncoordinated activity can result in high electricity costs and expensive system operation. We have previously presented green scheduling as an approach for reducing the aggregate peak power consumption in buildings while ensuring that indoor thermal comfort is always maintained. This report extends the …


The Wireless Control Network: Monitoring For Malicious Behavior, Shreyas Sundaram, Miroslav Pajic, Christoforos Hadjicostis, Rahul Mangharam, George Pappas Oct 2012

The Wireless Control Network: Monitoring For Malicious Behavior, Shreyas Sundaram, Miroslav Pajic, Christoforos Hadjicostis, Rahul Mangharam, George Pappas

Rahul Mangharam

We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly transmits a linear combination of the values in its neighborhood. For certain topologies, we showed that these linear combinations can be designed so that the closed loop system is stable (i.e., the wireless network itself acts as a controller for the plant). In this paper, we design a Intrusion Detection System (IDS) for this control scheme, which observes the transmissions of certain nodes in the network and uses that information to (a) …