Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks

Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks
Authors: Zhong-Hua Pang – Guo-Ping Liu – Donghua Zhou – Dehui Sun
ISBN-10: 9811305196
ISBN-13: 9789811305191
Edition 版本:‏ 1st ed. 2019
Released: 2018-06-13
Pages: 219 pages
This book presents the latest results on predictive control of networked systems,where communication constraints (e.g.,network-induced delays and packet dropouts) and cyber attacks (e.g.,deception attacks and denial-of-service attacks) are considered. For the former,it proposes several networked predictive control (NPC) methods based on input-output models and state-space models respectively. For the latter,it designs secure NPC schemes from the perspectives of information security and real-time control. Furthermore,it uses practical experiments to demonstrate the effectiveness and applicability of all the methods,bridging the gap between control theory and practical applications. The book is of interest to academic researchers,R&D engineers,and graduate students in control engineering,networked control systems and cyber-physical systems.
contents:
….Pages i-xx
….Pages 1-1
Introduction (Zhong-Hua Pang,Guo-Ping Liu,Donghua Zhou,Dehui Sun)….Pages 3-19
Preliminaries for Networked Predictive Control (Zhong-Hua Pang,Guo-Ping Liu,Donghua Zhou,Dehui Sun)….Pages 21-29
….Pages 31-31
Networked Predictive Control Based on Linear Input-Output Model (Zhong-Hua Pang,Guo-Ping Liu,Donghua Zhou,Dehui Sun)….Pages 33-56
Incremental Networked Predictive Control Based on Linear Input–Output Model (Zhong-Hua Pang,Guo-Ping Liu,Donghua Zhou,Dehui Sun)….Pages 57-77
Networked Predictive Control Based on Nonlinear Input–Output Model (Zhong-Hua Pang,Guo-Ping Liu,Donghua Zhou,Dehui Sun)….Pages 79-93
Networked Predictive Control Based on State-Space Model (Zhong-Hua Pang,Guo-Ping Liu,Donghua Zhou,Dehui Sun)….Pages 95-104
Networked Predictive Output Tracking Control Based on State-Space Model (Zhong-Hua Pang,Guo-Ping Liu,Donghua Zhou,Dehui Sun)….Pages 105-123
….Pages 125-125
A Data Secure Transmission Scheme for Deception Attacks (Zhong-Hua Pang,Guo-Ping Liu,Donghua Zhou,Dehui Sun)….Pages 127-146
Secure Networked Control Under Deception Attacks (Zhong-Hua Pang,Guo-Ping Liu,Donghua Zhou,Dehui Sun)….Pages 147-163
Secure Networked Predictive Control Under Deception Attacks (Zhong-Hua Pang,Guo-Ping Liu,Donghua Zhou,Dehui Sun)….Pages 165-179
False Data Injection Attacks Against Networked Predictive Output Tracking Control Systems (Zhong-Hua Pang,Guo-Ping Liu,Donghua Zhou,Dehui Sun)….Pages 181-203
Secure Networked Predictive Control Under DoS Attacks (Zhong-Hua Pang,Guo-Ping Liu,Donghua Zhou,Dehui Sun)….Pages 205-219

下载地址 Download解决验证以访问链接!
打赏
未经允许不得转载:finelybook » Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks

评论 抢沙发

© 2024   finelybook  

Powered by WordPress · 站点地图 · 豫ICP备15035512号-1

本网站所有内容仅供私人使用。我们的服务器上没有托管任何文件,它们只是像谷歌一样被索引。本网站仅对其他网站的内容进行索引。托管服务器或管理员不能对任何链接站点或链接站点中包含的任何链接的内容或对这些站点的更改/更新负责。本网站所有资料仅供个人用途
 All parts of the finelybook.com website are for private use only. No files are hosted on our server, they are only indexed much like how google works. This site merely indexes of other sites' contents. The hosting server or the administrator cannot be held responsible for the contents of any linked sites or any link contained in a linked site, or changes / updates to such sites. All materials on this website is for Educational Purposes ONLY.

觉得文章有用就打赏一下

您的打赏,我们将继续给力更多优质内容

支付宝扫一扫

微信扫一扫