4,095 research outputs found

    On privacy preserving data release of linear dynamic networks

    Full text link
    Distributed data sharing in dynamic networks is ubiquitous. It raises the concern that the private information of dynamic networks could be leaked when data receivers are malicious or communication channels are insecure. In this paper, we propose to intentionally perturb the inputs and outputs of a linear dynamic system to protect the privacy of target initial states and inputs from released outputs. We formulate the problem of perturbation design as an optimization problem which minimizes the cost caused by the added perturbations while maintaining system controllability and ensuring the privacy. We analyze the computational complexity of the formulated optimization problem. To minimize the 0\ell_0 and 2\ell_2 norms of the added perturbations, we derive their convex relaxations which can be efficiently solved. The efficacy of the proposed techniques is verified by a case study on a heating, ventilation, and air conditioning system.Comment: 18 pages, 5 figures, journa

    The proposed Caroline ESA M3 mission to a Main Belt Comet

    Get PDF
    We describe Caroline, a mission proposal submitted to the European Space Agency in 2010 in response to the Cosmic Visions M3 call for medium-sized missions. Caroline would have travelled to a Main Belt Comet (MBC), characterizing the object during a flyby, and capturing dust from its tenuous coma for return to Earth. MBCs are suspected to be transition objects straddling the traditional boundary between volatile–poor rocky asteroids and volatile–rich comets. The weak cometary activity exhibited by these objects indicates the presence of water ice, and may represent the primary type of object that delivered water to the early Earth. The Caroline mission would have employed aerogel as a medium for the capture of dust grains, as successfully used by the NASA Stardust mission to Comet 81P/Wild 2. We describe the proposed mission design, primary elements of the spacecraft, and provide an overview of the science instruments and their measurement goals. Caroline was ultimately not selected by the European Space Agency during the M3 call; we briefly reflect on the pros and cons of the mission as proposed, and how current and future mission MBC mission proposals such as Castalia could best be approached

    O stars and Wolf-Rayet stars

    Get PDF
    Basic information is given about O and Wolf-Rayet stars indicating how these stars are defined and what their chief observable properties are. Part 2 of the volume discussed four related themes pertaining to the hottest and most luminous stars. Presented are: an observational overview of the spectroscopic classification and extrinsic properties of O and Wolf-Rayet stars; the intrinsic parameters of luminosity, effective temperature, mass, and composition of the stars, and a discussion of their viability; stellar wind properties; and the related issues concerning the efforts of stellar radiation and wind on the immediate interstellar environment are presented

    A new multicompartmental reaction-diffusion modeling method links transient membrane attachment of E. coli MinE to E-ring formation

    Get PDF
    Many important cellular processes are regulated by reaction-diffusion (RD) of molecules that takes place both in the cytoplasm and on the membrane. To model and analyze such multicompartmental processes, we developed a lattice-based Monte Carlo method, Spatiocyte that supports RD in volume and surface compartments at single molecule resolution. Stochasticity in RD and the excluded volume effect brought by intracellular molecular crowding, both of which can significantly affect RD and thus, cellular processes, are also supported. We verified the method by comparing simulation results of diffusion, irreversible and reversible reactions with the predicted analytical and best available numerical solutions. Moreover, to directly compare the localization patterns of molecules in fluorescence microscopy images with simulation, we devised a visualization method that mimics the microphotography process by showing the trajectory of simulated molecules averaged according to the camera exposure time. In the rod-shaped bacterium _Escherichia coli_, the division site is suppressed at the cell poles by periodic pole-to-pole oscillations of the Min proteins (MinC, MinD and MinE) arising from carefully orchestrated RD in both cytoplasm and membrane compartments. Using Spatiocyte we could model and reproduce the _in vivo_ MinDE localization dynamics by accounting for the established properties of MinE. Our results suggest that the MinE ring, which is essential in preventing polar septation, is largely composed of MinE that is transiently attached to the membrane independently after recruited by MinD. Overall, Spatiocyte allows simulation and visualization of complex spatial and reaction-diffusion mediated cellular processes in volumes and surfaces. As we showed, it can potentially provide mechanistic insights otherwise difficult to obtain experimentally

    Supervisory Control and Analysis of Partially-observed Discrete Event Systems

    Get PDF
    Nowadays, a variety of real-world systems fall into discrete event systems (DES). In practical scenarios, due to facts like limited sensor technique, sensor failure, unstable network and even the intrusion of malicious agents, it might occur that some events are unobservable, multiple events are indistinguishable in observations, and observations of some events are nondeterministic. By considering various practical scenarios, increasing attention in the DES community has been paid to partially-observed DES, which in this thesis refer broadly to those DES with partial and/or unreliable observations. In this thesis, we focus on two topics of partially-observed DES, namely, supervisory control and analysis. The first topic includes two research directions in terms of system models. One is the supervisory control of DES with both unobservable and uncontrollable events, focusing on the forbidden state problem; the other is the supervisory control of DES vulnerable to sensor-reading disguising attacks (SD-attacks), which is also interpreted as DES with nondeterministic observations, addressing both the forbidden state problem and the liveness-enforcing problem. Petri nets (PN) are used as a reference formalism in this topic. First, we study the forbidden state problem in the framework of PN with both unobservable and uncontrollable transitions, assuming that unobservable transitions are uncontrollable. For ordinary PN subject to an admissible Generalized Mutual Exclusion Constraint (GMEC), an optimal on-line control policy with polynomial complexity is proposed provided that a particular subnet, called observation subnet, satisfies certain conditions in structure. It is then discussed how to obtain an optimal on-line control policy for PN subject to an arbitrary GMEC. Next, we still consider the forbidden state problem but in PN vulnerable to SD-attacks. Assuming the control specification in terms of a GMEC, we propose three methods to derive on-line control policies. The first two lead to an optimal policy but are computationally inefficient for large-size systems, while the third method computes a policy with timely response even for large-size systems but at the expense of optimality. Finally, we investigate the liveness-enforcing problem still assuming that the system is vulnerable to SD-attacks. In this problem, the plant is modelled as a bounded PN, which allows us to off-line compute a supervisor starting from constructing the reachability graph of the PN. Then, based on repeatedly computing a more restrictive liveness-enforcing supervisor under no attack and constructing a basic supervisor, an off-line method that synthesizes a liveness-enforcing supervisor tolerant to an SD-attack is proposed. In the second topic, we care about the verification of properties related to system security. Two properties are considered, i.e., fault-predictability and event-based opacity. The former is a property in the literature, characterizing the situation that the occurrence of any fault in a system is predictable, while the latter is a newly proposed property in the thesis, which describes the fact that secret events of a system cannot be revealed to an external observer within their critical horizons. In the case of fault-predictability, DES are modeled by labeled PN. A necessary and sufficient condition for fault-predictability is derived by characterizing the structure of the Predictor Graph. Furthermore, two rules are proposed to reduce the size of a PN, which allow us to analyze the fault-predictability of the original net by verifying that of the reduced net. When studying event-based opacity, we use deterministic finite-state automata as the reference formalism. Considering different scenarios, we propose four notions, namely, K-observation event-opacity, infinite-observation event-opacity, event-opacity and combinational event-opacity. Moreover, verifiers are proposed to analyze these properties
    corecore