57 research outputs found
Synthesis, Interdiction, and Protection of Layered Networks
This research developed the foundation, theory, and framework for a set of analysis techniques to assist decision makers in analyzing questions regarding the synthesis, interdiction, and protection of infrastructure networks. This includes extension of traditional network interdiction to directly model nodal interdiction; new techniques to identify potential targets in social networks based on extensions of shortest path network interdiction; extension of traditional network interdiction to include layered network formulations; and develops models/techniques to design robust layered networks while considering trade-offs with cost. These approaches identify the maximum protection/disruption possible across layered networks with limited resources, find the most robust layered network design possible given the budget limitations while ensuring that the demands are met, include traditional social network analysis, and incorporate new techniques to model the interdiction of nodes and edges throughout the formulations. In addition, the importance and effects of multiple optimal solutions for these (and similar) models is investigated. All the models developed are demonstrated on notional examples and were tested on a range of sample problem sets
Multi-Level Multi-Objective Programming and Optimization for Integrated Air Defense System Disruption
The U.S. military\u27s ability to project military force is being challenged. This research develops and demonstrates the application of three respective sensor location, relocation, and network intrusion models to provide the mathematical basis for the strategic engagement of emerging technologically advanced, highly-mobile, Integrated Air Defense Systems. First, we propose a bilevel mathematical programming model for locating a heterogeneous set of sensors to maximize the minimum exposure of an intruder\u27s penetration path through a defended region. Next, we formulate a multi-objective, bilevel optimization model to relocate surviving sensors to maximize an intruder\u27s minimal expected exposure to traverse a defended border region, minimize the maximum sensor relocation time, and minimize the total number of sensors requiring relocation. Lastly, we present a trilevel, attacker-defender-attacker formulation for the heterogeneous sensor network intrusion problem to optimally incapacitate a subset of the defender\u27s sensors and degrade a subset of the defender\u27s network to ultimately determine the attacker\u27s optimal penetration path through a defended network
2018 Faculty Excellence Showcase, AFIT Graduate School of Engineering & Management
Excerpt:
As an academic institution, we strive to meet and exceed the expectations for graduate programs and laud our values and contributions to the academic community. At the same time, we must recognize, appreciate, and promote the unique non-academic values and accomplishments that our faculty team brings to the national defense, which is a priority of the Federal Government. In this respect, through our diverse and multi-faceted contributions, our faculty, as a whole, excel, not only along the metrics of civilian academic expectations, but also along the metrics of military requirements, and national priorities
Air Force Institute of Technology Research Report 1999
This report summarizes the research activities of the Air Force Institute of Technology’s Graduate School of Engineering and Management. It describes research interests and faculty expertise; lists student theses/dissertations; identifies research sponsors and contributions; and outlines the procedures for contacting the school. Included in the report are: faculty publications, conference presentations, consultations, and funded research projects. Research was conducted in the areas of Aeronautical and Astronautical Engineering, Electrical Engineering and Electro-Optics, Computer Engineering and Computer Science, Systems and Engineering Management, Operational Sciences, and Engineering Physics
1-Bit processing based model predictive control for fractionated satellite missions
In this thesis, a 1-bit processing based Model Predictive Control (OBMPC) structure is proposed for a fractionated satellite attitude control mission. Despite the appealing advantages of the MPC algorithm towards constrained MIMO control applications, implementing the MPC algorithm onboard a small satellite is certainly challenging due to the limited onboard resources. The proposed design is based on the 1-bit processing concept, which takes advantage of the affine relation between the 1-bit state feedback and multi-bit parameters to implement a multiplier free MPC controller. As multipliers are the major power consumer in online optimization, the OBMPC structure is proven to be more efficient in comparison to the conventional MPC implementation in term of power and circuit complexity. The system is in digital control nature, affected by quantization noise introduced by Δ∑ modulators. The stability issues and practical design criteria are also discussed in this work. Some other aspects are considered in this work to complete the control system. Firstly, the implementation of the OBMPC system relies on the 1-bit state feedbacks. Hence, 1-bit sensing components are needed to implement the OBMPC system. While the ∆∑ modulator based Microelectromechanical systems (MEMS) gyroscope is considered in this work, it is possible to implement this concept into other sensing components. Secondly, as the proposed attitude mission is based on the wireless inter-satellite link (ISL), a state estimator is required. However, conventional state estimators will once again introduce multi-bit signals, and compromise the simple, direct implementation of the OBMPC controller. Therefore, the 1-bit state estimator is also designed in this work to satisfy the requirements of the proposed fractionated attitude control mission. The simulation for the OBMPC is based on a 2U CubeSat model in a fractionated satellite structure, in which the payload and actuators are separated from the controller and controlled via the ISL. Matlab simulations and FPGA implementation based performance analysis shows that the OBMPC is feasible for fractionated satellite missions and is advantageous over the conventional MPC controllers
1-Bit processing based model predictive control for fractionated satellite missions
In this thesis, a 1-bit processing based Model Predictive Control (OBMPC) structure is proposed for a fractionated satellite attitude control mission. Despite the appealing advantages of the MPC algorithm towards constrained MIMO control applications, implementing the MPC algorithm onboard a small satellite is certainly challenging due to the limited onboard resources. The proposed design is based on the 1-bit processing concept, which takes advantage of the affine relation between the 1-bit state feedback and multi-bit parameters to implement a multiplier free MPC controller. As multipliers are the major power consumer in online optimization, the OBMPC structure is proven to be more efficient in comparison to the conventional MPC implementation in term of power and circuit complexity. The system is in digital control nature, affected by quantization noise introduced by Δ∑ modulators. The stability issues and practical design criteria are also discussed in this work. Some other aspects are considered in this work to complete the control system. Firstly, the implementation of the OBMPC system relies on the 1-bit state feedbacks. Hence, 1-bit sensing components are needed to implement the OBMPC system. While the ∆∑ modulator based Microelectromechanical systems (MEMS) gyroscope is considered in this work, it is possible to implement this concept into other sensing components. Secondly, as the proposed attitude mission is based on the wireless inter-satellite link (ISL), a state estimator is required. However, conventional state estimators will once again introduce multi-bit signals, and compromise the simple, direct implementation of the OBMPC controller. Therefore, the 1-bit state estimator is also designed in this work to satisfy the requirements of the proposed fractionated attitude control mission. The simulation for the OBMPC is based on a 2U CubeSat model in a fractionated satellite structure, in which the payload and actuators are separated from the controller and controlled via the ISL. Matlab simulations and FPGA implementation based performance analysis shows that the OBMPC is feasible for fractionated satellite missions and is advantageous over the conventional MPC controllers
Recommended from our members
Mixed-integer programming in power systems : the interdiction and unit commitment problems
Mixed integer programming (MIP) maximizes (or minimizes) a linear objective subject to a set of constraints. In particular, one of the constraints for a MIP is that at least one of the variables can only take integer values. This technique has been widely studied in operations research and a MIP can be solved efficiently by commercial solvers. In this dissertation, two power system problems namely, an interdiction problem and a unit commitment problem, are formulated and solved with MIP techniques. The studies presented in this dissertation focus on extracting the special features embedded in the problems and formulating the problems such that they can be solved using the available MIP techniques.
The objective of an interdiction problem in a power system is to find a set of the most critical or vulnerable components to secure and reliable operation. Before formulating the problem, we need to study the outages and their impacts in power systems in depth. Once a critical component of a power system fails, the outages including generator and load trips can sequentially spread and frequently lead to large blackouts. The efforts to develop a model to analyze cascading outages is first summarized. Reports about cyber attacks on the Ukraine power grid revealed that one or more malwares were deliberately developed to attack industrial facilities, with power systems as one of the major targets. Another potential cyber threat to secure operation of power transmission grids involves Internet of Things (IoT) demand attacks. Increasingly, Internet connections are available to devices with high energy consumption such as air conditioners and water heaters. However, these new connections expose the control of new electric loads to potential manipulation by attackers. To help assess the effects of cyber attacks, we develop numerical experiments and define different types of cyber attacks to simulate Ukraine-style cyber attacks and IoT demand attacks to study the system responses in a North American regional interconnection system. Based on the studies in cascading outage analysis and cyber attack simulations, an interaction problem between a defender (e.g. system operator) and an attacker (e.g. terrorist) in a power system is formulated as a MIP and a "short-term" impact of an attack is considered using a cascading outage anylsis (COA) tool. A demonstrative case study with an existing method is presented and numeric studies with "short-term" impacts with COA model are ongoing.
The unit commitment (UC) problem in a power system is another MIP problem. UC determines the start-up and shut down schedules of generating units to meet forecast demand in a short term future (few hours to few days). It is critical to precisely represent the generating units in a UC problem to maximize the social welfare, which is the objective of the problem. The formulation of two types of unit namely, combined-cycle gas units and pumped-storage hydro units in a UC problem are presented in this dissertation.
In recent years, combined-cycle units (CCUs) have been operated as providers of flexibility needed due to the increasing shares of renewables. Consequently, optimization models have been proposed to determine the configuration of CCUs. However, most of the existing models assume that any transition between configurations finishes in a single interval. This assumption is often violated in reality, as a transition might last up to a few hours during which the CCU has limited dispatchability. In this work, a mixed-integer programming formulation that represents the transition ramping of CCUs is summarized and the formulations of ramping constraints are discussed. Numerical studies are performed on an illustrative test system and a Mid-continent Independent System Operator (MISO) system.
As one of the mature technologies for energy storage, pumped-storage hydro is able to provide services in a time range from minutes to days. Particularly, pumped storage hydro units are useful for enhancing the integration of renewable generations that are naturally intermittent. Optimization models have been proposed to determine strategies to dispatch a energy storage unit in the system. However, most of existing work assumes the output from a energy storage unit is continuous. This assumption is not true for a pumped storage hydro unit. Inspired by the work of modeling a combined cycle unit in the unit commitment problem, this work proposes a configuration based pumped storage hydro model that removes the invalid continuous outputs assumption in order to enhance the use of pumped storage hydro resources in the system. By introducing three "configurations," namely, pumping, generating and "alloff" or off-line, for a pumped storage hydro unit, the proposed model can more accurately reflect the practical operations of pumped storage hydro units in the day-ahead market. A comprehensive review of the existing pumped storage hydro models and industry practices is presented. The definition of configurations of a pumped storage hydro unit and the transitions between the configurations during operation are revealed and discussed in detail to describe the proposed model. A case study is presented to illustrate the proposed model.Electrical and Computer Engineerin
State of the art of cyber-physical systems security: An automatic control perspective
Cyber-physical systems are integrations of computation, networking, and physical processes. Due to the tight cyber-physical coupling and to the potentially disrupting consequences of failures, security here is one of the primary concerns. Our systematic mapping study sheds light on how security is actually addressed when dealing with cyber-physical systems from an automatic control perspective. The provided map of 138 selected studies is defined empirically and is based on, for instance, application fields, various system components, related algorithms and models, attacks characteristics and defense strategies. It presents a powerful comparison framework for existing and future research on this hot topic, important for both industry and academia
Multi-Agent Systems
A multi-agent system (MAS) is a system composed of multiple interacting intelligent agents. Multi-agent systems can be used to solve problems which are difficult or impossible for an individual agent or monolithic system to solve. Agent systems are open and extensible systems that allow for the deployment of autonomous and proactive software components. Multi-agent systems have been brought up and used in several application domains
- …