25 research outputs found

    A comparative analysis of fault detection schemes for stochastic continuous-time dynamical systems

    Get PDF
    This paper addresses a comparative analysis of the existing schemes for fault detection in continuous-time stochastic dynamical systems. Such schemes prove to be efficient when dealing with specific types of fault functions; on the other hand, they show very different performance sensitivity when dealing with new fault profiles and system noise. The study suggests the use of a combined scheme, supervised by a high level decision rule set

    A general formulation for fault detection in stochastic continuous-time dynamical systems

    Get PDF
    In this work, a general formulation for fault detection in stochastic continuoustime dynamical systems is presented. This formulation is based on the definition of a pre-Hilbert space so that orthogonal projection techniques, based on the statistics of the involved stochastic processes can be applied. The general setting gathers different existing schemes within a unifying framework

    A C++ Class for Analyzing Vector Boolean Functions from a Cryptographic Perspective

    Get PDF
    In this paper, a C++ class for analising Vector Boolean Functions from a cryptographic perspective is presented. This implementation uses the NTL library from Victor Shoup, replacing some of the general purpose modules of this library by some more specialized and better suited to cryptography, and adding new modules that complement the existing ones. With this class, we can obtain the classical representation of Vector Boolean Function such as its Truth Table and Algebraic Normal Form (ANF). It is possible to calculate mathematical structures such as the Walsh Spectrum, Linear Profile, Differential Profile and Autocorrelation Spectrum. Cryptographic criteria such as nonlinearity, linearity distance, order of correlation immunity, bal-ancedness, algebraic degree and propagation criterion can be obtained with this class. It permits to find out some interesting cryptologic parameters such as linear structures, linear potential, differential potential and the maximum possible nonlinearity or linearity distance of a Vector Boolean Function with the same dimensions. Finally, operations such as to identify if two Vector Boolean Functions are equal, their sum, direct sum, composition, bricklayering, adding coordinate functions and obtaining the polynomial representation over GF(2n) of a Vector Boolean Function given the irreducible polynomial and its Truth Table are presented

    Controlling systems with a single actuator

    Get PDF
    In this paper the problem of designing a single actuator control for a class of systems is addressed. The existence of such control is studied and several ways for designing such control are provided. The results depend either on the rational canonical form or on the Jordan structure associated with the matrix which characterizes the system dynamics. The constructed control laws can be employed in the design of minimum cost controllers for a large variety of systems

    Fault isolation schemes for a class of continuous-time stochastic dynamical systems

    Get PDF
    In this paper a new method for fault isolation in a class of continuous-time stochastic dynamical systems is proposed. The method is framed in the context of model-based analytical redundancy, consisting in the generation of a residual signal by means of a diagnostic observer, for its posterior analysis. Once a fault has been detected, and assuming some basic a priori knowledge about the set of possible failures in the plant, the isolation task is then formulated as a type of on-line statistical classification problem. The proposed isolation scheme employs in parallel different hypotheses tests on a statistic of the residual signal, one test for each possible fault. This isolation method is characterized by deriving for the unidimensional case, a sufficient isolability condition as well as an upperbound of the probability of missed isolation. Simulation examples illustrate the applicability of the proposed scheme

    Characterizing chaos in a type of fractional duffing's equation

    Full text link
    We characterize the chaos in a fractional Duffing’s equation computing the Lyapunov exponents and the dimension of the strange attractor in the effective phase space of the system. We develop a specific analytical method to estimate all Lyapunov exponents and check the results with the fiduciary orbit technique and a time series estimation method

    Evolution models for dynamic networks

    Get PDF
    This paper proposes a mathematical framework for modelling the evolution of dynamic networks. Such framework allows the time analysis of the relationship between the dynamic laws and the network characterizing features (degree distribution, clustering coefficient, controllability indexes, etc.) providing new insight on the network properties. The framework also allows to relate and generalize existing inference procedures for modelling real world time evolving complex systems

    Algorithm 959: VBF: A Library of C plus plus Classes for Vector Boolean Functions in Cryptography

    Full text link
    VBF is a collection of C++ classes designed for analyzing vector Boolean functions (functions that map a Boolean vector to another Boolean vector) from a cryptographic perspective. This implementation uses the NTL library from Victor Shoup, adding new modules that call NTL functions and complement the existing ones, making it better suited to cryptography. The class representing a vector Boolean function can be initialized by several alternative types of data structures such as Truth Table, Trace Representation, and Algebraic Normal Form (ANF), among others. The most relevant cryptographic criteria for both block and stream ciphers as well as for hash functions can be evaluated with VBF: it obtains the nonlinearity, linearity distance, algebraic degree, linear structures, and frequency distribution of the absolute values of the Walsh Spectrum or the Autocorrelation Spectrum, among others. In addition, operations such as equality testing, composition, inversion, sum, direct sum, bricklayering (parallel application of vector Boolean functions as employed in Rijndael cipher), and adding coordinate functions of two vector Boolean functions are presented. Finally, three real applications of the library are described: the first one analyzes the KASUMI block cipher, the second one analyzes the Mini-AES cipher, and the third one finds Boolean functions with very high nonlinearity, a key property for robustness against linear attacks

    Detection and Isolation of Simultaneous Additive and Parametric Faults in Nonlinear Stochastic Dynamical Systems

    Get PDF
    This paper presents a new fault detection and isolation scheme for dealing with simultaneous additive and parametric faults. The new design integrates a system for additive fault detection based on Castillo and Zufiria, 2009 and a new parametric fault detection and isolation scheme inspired in Munz and Zufiria, 2008 . It is shown that the so far existing schemes do not behave correctly when both additive and parametric faults occur simultaneously; to solve the problem a new integrated scheme is proposed. Computer simulation results are presented to confirm the theoretical studies

    Mathematical foundations for efficient structural controllability and observability analysis of complex systems

    Get PDF
    The relationship between structural controllability and observability of complex systems is studied. Algebraic and graph theoretic tools are combined to prove the extent of some controller/observer duality results. Two types of control design problems are addressed and some fundamental theoretical results are provided. In addition new algorithms are presented to compute optimal solutions for monitoring large scale real networks
    corecore