Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks

個数:

Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks

  • オンデマンド(OD/POD)版です。キャンセルは承れません。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 219 p.
  • 言語 ENG
  • 商品コード 9789811344398
  • DDC分類 004.6

Full Description

This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e.g., deception attacks and denial-of-service attacks) are considered. For the former, it proposes several networked predictive control (NPC) methods based on input-output models and state-space models respectively. For the latter, it designs secure NPC schemes from the perspectives of information security and real-time control. Furthermore, it uses practical experiments to demonstrate the effectiveness and applicability of all the methods, bridging the gap between control theory and practical applications. The book is of interest to academic researchers, R&D engineers, and graduate students in control engineering, networked control systems and cyber-physical systems. 

Contents

Introduction.- 
Part I: Networked Predictive Control of Systems with Communication Constraints.- Preliminaries for NCSs.- Networked Predictive Control Based on Linear Input-Output Models.- Incremental Networked Predictive Control Based on Linear Input-Output Models.- Networked Predictive Control Based on Nonlinear Input-Output Models.- Networked Predictive Control Based on State-Space Models.- Networked Predictive Output Tracking Control Based on State-Space Models.- 
Part II: Networked Predictive Control of Systems with Cyber Attacks and Communication Constraints.- Preliminaries for Cyber Attacks.- Data Secure Transmission Scheme for Deception Attacks.- Secure Networked Predictive Control under Deception Attacks and Communication Constraints.- False Data Injection Attacks against Output Tracking Control Systems.- False Data Injection Attacks against Networked Predictive Output Tracking Control Systems.- Secure Networked Predictive Control under DoS Attacks and Communication Constraints.

最近チェックした商品