Studying the control properties of complex networks provides insight into how designers and engineers can influence these systems to achieve a desired behavior. Topology of a network has been shown to strongly correlate with certain control properties; here we uncover the fundamental structures that explain the basis of this correlation. We develop the control profile, a statistic that quantifies the different proportions of control-inducing structures present in a network. We find that standard random network models do not reproduce the kinds of control profiles that are observed in real-world networks. The profiles of real networks form three well-defined clusters that provide insight into the high-level organization and function of complex systems.
Monitoring the “physics” of cyber-physical systems to detect attacks is a growing area of research. In its basic form a security monitor creates time-series models of sensor readings for an industrial control system and identifies anomalies in these measurements in order to identify potentially false control commands or false sensor readings. In this paper, we review previous work on physics-based anomaly detection based on a unified taxonomy that allows us to identify limitations and unexplored challenges, and propose new solutions.
In this article we formulate frictionless atom cooling in harmonic traps as a time-optimal control problem, permitting imaginary values of the trap frequency for transient time intervals during which the trap becomes an expulsive parabolic potential. We show that the minimum time solution has a "bang-bang" form, where the frequency jumps suddenly at certain instants and then remains constant, and calculate estimates of the minimum cooling time for various numbers of such jumps. A numerical optimization method based on pseudospectral approximations is used to obtain suboptimal realistic solutions without discontinuities, which may be implemented experimentally.
While attacks on information systems have for most practical purposes binary outcomes (information was manipulated/eavesdropped, or not), attacks manipulating the sensor or control signals of Industrial Control Systems (ICS) can be tuned by the attacker to cause a continuous spectrum in damages. Attackers that want to remain undetected can attempt to hide their manipulation of the system by following closely the expected behavior of the system, while injecting just enough false information at each time step to achieve their goals. In this work, we study if physics-based attack detection can limit the impact of such stealthy attacks. We start with a comprehensive review of related work on attack detection schemes in the security and control systems community. We then show that many of these works use detection schemes that are not limiting the impact of stealthy attacks. We propose a new metric to measure the impact of stealthy attacks and how they relate to our selection on an upper bound on false alarms. We finally show that the impact of such attacks can be mitigated in several cases by the proper combination and configuration of detection schemes. We demonstrate the e↵ectiveness of our algorithms through simulations and experiments using real ICS testbeds and real ICS systems.
Many key aspects of control of quantum systems involve manipulating a large quantum ensemble exhibiting variation in the value of parameters characterizing the system dynamics. Developing electromagnetic pulses to produce a desired evolution in the presence of such variation is a fundamental and challenging problem in this research area. We present such robust pulse designs as an optimal control problem of a continuum of bilinear systems with a common control function. We map this control problem of infinite dimension to a problem of polynomial approximation employing tools from geometric control theory. We then adopt this new notion and develop a unified computational method for optimal pulse design using ideas from pseudospectral approximations, by which a continuous-time optimal control problem of pulse design can be discretized to a constrained optimization problem with spectral accuracy. Furthermore, this is a highly flexible and efficient numerical method that requires low order of discretization and yields inherently smooth solutions. We demonstrate this method by designing effective broadband π∕2 and π pulses with reduced rf energy and pulse duration, which show significant sensitivity enhancement at the edge of the spectrum over conventional pulses in 1D and 2D NMR spectroscopy experiments.pseudospectral methods | ensemble control | Lie algebra | broadband excitation C ompelling applications for quantum control have received particular attention and have motivated seminal studies in wide-ranging areas from coherent spectroscopy and MRI to quantum optics. Designing and implementing time-varying excitations (rf pulses) to manipulate complex dynamics of a large quantum ensemble on the order of Avogadro's number is a long-standing problem and an indispensable step that enables every application of quantum control (1). For example, magnetic resonance applications often suffer from imperfections such as inhomogeneity in the static magnetic field (B 0 inhomogeneity) and in the applied rf field (rf inhomogeneity). In addition, there is dispersion in the Larmor frequency of spins due to chemical shifts. A good pulse design strategy must be robust to these effects, and such variations need to be considered in the modeling and pulse design stages in order to match theoretical predictions to experimental outcomes. As difficult experiments with more demanding performance specifications have emerged, the complexity of finding optimal pulse sequences has drastically increased. For example, as high-field NMR spectrometers are increasingly more accessible and required, broadband excitation pulses are needed to cover a wide 13 C chemical-shift range (e.g., up to 40 kHz). In addition, to design excitation and inversion pulses that are practical for a typical NMR spectrometer, methods must accommodate realistic maximum rf power and pulse duration while accomplishing the desired spin evolution. In the majority of cases, the length of an rf pulse is constrained by the fixed delays that dictate a certain coherence transfer. S...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.