164 research outputs found

    Optimal Flood Control

    Get PDF
    A mathematical model for optimal control of the water levels in a chain of reservoirs is studied. Some remarks regarding sensitivity with respect to the time horizon, terminal cost and forecast of inflow are made

    Local Cyber-physical Attack with Leveraging Detection in Smart Grid

    Full text link
    A well-designed attack in the power system can cause an initial failure and then results in large-scale cascade failure. Several works have discussed power system attack through false data injection, line-maintaining attack, and line-removing attack. However, the existing methods need to continuously attack the system for a long time, and, unfortunately, the performance cannot be guaranteed if the system states vary. To overcome this issue, we consider a new type of attack strategy called combinational attack which masks a line-outage at one position but misleads the control center on line outage at another position. Therefore, the topology information in the control center is interfered by our attack. We also offer a procedure of selecting the vulnerable lines of its kind. The proposed method can effectively and continuously deceive the control center in identifying the actual position of line-outage. The system under attack will be exposed to increasing risks as the attack continuously. Simulation results validate the efficiency of the proposed attack strategy.Comment: Accepted by IEEE SmartGridComm 201

    Maze solvers demystified and some other thoughts

    Full text link
    There is a growing interest towards implementation of maze solving in spatially-extended physical, chemical and living systems. Several reports of prototypes attracted great publicity, e.g. maze solving with slime mould and epithelial cells, maze navigating droplets. We show that most prototypes utilise one of two phenomena: a shortest path in a maze is a path of the least resistance for fluid and current flow, and a shortest path is a path of the steepest gradient of chemoattractants. We discuss that substrates with so-called maze-solving capabilities simply trace flow currents or chemical diffusion gradients. We illustrate our thoughts with a model of flow and experiments with slime mould. The chapter ends with a discussion of experiments on maze solving with plant roots and leeches which show limitations of the chemical diffusion maze-solving approach.Comment: This is a preliminary version of the chapter to be published in Adamatzky A. (Ed.) Shortest path solvers. From software to wetware. Springer, 201

    Preventing Advanced Persistent Threats in Complex Control Networks

    Get PDF
    An Advanced Persistent Threat (APT) is an emerging attack against Industrial Control and Automation Systems, that is executed over a long period of time and is difficult to detect. In this context, graph theory can be applied to model the interaction among nodes and the complex attacks affecting them, as well as to design recovery techniques that ensure the survivability of the network. Accordingly, we leverage a decision model to study how a set of hierarchically selected nodes can collaborate to detect an APT within the network, concerning the presence of changes in its topology. Moreover, we implement a response service based on redundant links that dynamically uses a secret sharing scheme and applies a flexible routing protocol depending on the severity of the attack. The ultimate goal is twofold: ensuring the reachability between nodes despite the changes and preventing the path followed by messages from being discovered.Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tech

    Introduction to a system for implementing neural net connections on SIMD architectures

    Get PDF
    Neural networks have attracted much interest recently, and using parallel architectures to simulate neural networks is a natural and necessary application. The SIMD model of parallel computation is chosen, because systems of this type can be built with large numbers of processing elements. However, such systems are not naturally suited to generalized communication. A method is proposed that allows an implementation of neural network connections on massively parallel SIMD architectures. The key to this system is an algorithm permitting the formation of arbitrary connections between the neurons. A feature is the ability to add new connections quickly. It also has error recovery ability and is robust over a variety of network topologies. Simulations of the general connection system, and its implementation on the Connection Machine, indicate that the time and space requirements are proportional to the product of the average number of connections per neuron and the diameter of the interconnection network

    CALD: Computer-Aided Logic Design System

    Get PDF
    This paper presents a new design tool (CALD) for logical circuit design. This system is shown to be powerful because of its relationship with an HDL language and thanks to a user friendly drawing interface which allows both automatic and manual connection drawing processes. The system is limited to circuit drawing generation while actual physical simulation is not considered. This paper carries out a comparative analysis of the CALD along with classic similar tools from the market, such as B2Logic, EWB, Circuit Maker. The discussion is illustrated through Windows environment applications. The CALD is mainly an education-oriented tool; so synthesis oriented design systems such as Viewlogic, Orcad, Altera or Xilinx Foundation are not dealt with.Área: Redes - Sistemas Operativos - Sistemas de Tiempo Real - Arquitectura de ProcesadoresRed de Universidades con Carreras en Informática (RedUNCI

    Transforming disfigured and disoriented areas into routable switchboxes

    Get PDF
    Journal ArticleRouting an entire circuit requires partitioning the circuit (routing area) into smaller, localized routing areas. Using non-rectangular, rotated switchbox shapes (and therefore non-manhattan routing layout) has the potential to simplify the partitioning of the circuit into routable areas and to use "dead space" on a chip for routing. The method described in this paper for generating non-rectangular, rotated switchboxes borrows ideas from computer graphics
    corecore