The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Copyright and Reprint Permission: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923...
Industrial and governmental organizations have accrued vast amounts of data contained in many databases. Many of these databases are developed by different organizations for different purposes, may contain millions of unique entities and may lack a dependable global unique identifier to link an individual’s records across multiple databases. Record Linkage (RL) is a process that connects records that...
Most mission critical applications are distributed onto multiple computers. They need to survive extreme conditions. Today, regardless methodologies, all existing mission critical distributed applications suffer the "performance or reliability" scaling dilemma. Each such application will crash on any transient or permanent software or hardware failure. These failures cause losses in data,...
This paper presents an on-going research work to improve control system resilience by running control and cybersecurity side-by-side in a highly-coupled fashion. The proposed method is able to detect cyberattacks which cannot be detected by conventional intrusion detection technologies, and furthermore it enables control to react to detected cyberattacks instantly, thus reducing the adverse impacts...
In this paper we describe a distributed, information theoretic motion planning strategy for multi-agent target detection. Agents assimilate measurements into a likelihood-ratio tracker, which provides a probability distribution for potential target locations. Information from other agents is fused with the local agents’ probability density using an Information Weighted Consensus Filter when in communication...
The legacy power system is gradually evolving into the smart grid. A variety of distributed control algorithms are being applied for smart grid energy management applications because of their flexibility, robustness, and local communication and computation features. These algorithms, however, increase the vulnerability of smart grid to adversaries. Thus, there is an urgent need to protect the distributed...
This paper presents a novel method for closed loop control of magnetization process using feedback linearization. A macroscopic model for the temporal evolution of magnetization is developed to account for the physical phenomena of domain rotation and hysteresis. A tracking control system using feedback linearization method is derived to assure zero steady state error between the flux density with...
In this survey, 34 subject matter experts from the U.S. nuclear industry were interviewed to determine specific needs for human reliability analysis (HRA). Conclusions from the interviews are detailed in this article. A summary of the findings includes: (1) The need for improved guidance on the use of HRA methods generally and for specific applications. (2) The need for additional training in HRA...
Different types of alarms and events can affect an operator’s trust in an alarm system. This paper presents an experiment in which we examined the effect of two types of alarm systems (two-state and three-state alarms) on trust, alarm compliance, and diagnosis for two types of faults differing in complexity. Undergraduate university students using a simplified process control microworld simulation...
A tool intended to aid qualified professionals in the assessment of the legibility of text presented on a digital display is described. The assessment of legibility is primarily for the purposes of designing and analyzing human machine interfaces in accordance with NUREG-0700 and MIL-STD 1472G. The tool addresses shortcomings of existing guidelines by providing more accurate metrics of text legibility...
Low-inertia DC microgrids rely on storage devices to buffer energy and handle abrupt load changes. An alternative approach involves the concept of power buffers. Proper adjustment of the input impedances of power buffers helps shape the trajectory of the transients imposed on DC microgrid. A communication network facilitates data exchange among active loads (loads augmented with power buffers). Such...
This paper proposes distributed noise resilient techniques for the secondary voltage and frequency control of AC microgrids. The effect of noise in reference signal on the synchronization process is studied. The same communication topology for the secondary control is adopted to implement noiseresilient algorithms. The efficacy of the consensus filters and distributed least mean-square algorithm for...
Cyber-Physical Systems (CPS) are systems with seamless integration of physical, computational and networking components. These systems can potentially have an impact on the physical components, hence it is critical to safeguard them against a wide range of attacks. In this paper, it is argued that an effective approach to achieve this goal is to systematically identify the potential threats at the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.