SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Sandberg Karl) "

Sökning: WFRF:(Sandberg Karl)

  • Resultat 1-10 av 281
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Ahlen, Anders, et al. (författare)
  • Toward Wireless Control in Industrial Process Automation : A Case Study at a Paper Mill
  • 2019
  • Ingår i: IEEE Control Systems. - : Institute of Electrical and Electronics Engineers (IEEE). - 1066-033X .- 1941-000X. ; 39:5, s. 36-57
  • Tidskriftsartikel (refereegranskat)abstract
    • Wireless sensors and networks are used only occasionally in current control loops in the process industry. With rapid developments in embedded and highperformance computing, wireless communication, and cloud technology, drastic changes in the architecture and operation of industrial automation systems seem more likely than ever. These changes are driven by ever-growing demands on production quality and flexibility. However, as discussed in "Summary," there are several research obstacles to overcome. The radio communication environment in the process industry is often troublesome, as the environment is frequently cluttered with large metal objects, moving machines and vehicles, and processes emitting radio disturbances [1], [2]. The successful deployment of a wireless control system in such an environment requires careful design of communication links and network protocols as well as robust and reconfigurable control algorithms.
  •  
2.
  • Ahlén, Anders, et al. (författare)
  • Towards Wireless Control in Industrial Process Automation : A Case Study at a Paper Mill
  • 2019
  • Ingår i: IEEE CONTROL SYSTEMS MAGAZINE. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 1066-033X .- 1941-000X. ; 39:5, s. 36-57
  • Tidskriftsartikel (refereegranskat)abstract
    • Wireless sensors and networks are used only occasionally in current control loops in the process industry. With rapid developments in embedded and highperformance computing, wireless communication, and cloud technology, drastic changes in the architecture and operation of industrial automation systems seem more likely than ever. These changes are driven by ever-growing demands on production quality and flexibility. However, as discussed in "Summary," there are several research obstacles to overcome. The radio communication environment in the process industry is often troublesome, as the environment is frequently cluttered with large metal objects, moving machines and vehicles, and processes emitting radio disturbances [1], [2]. The successful deployment of a wireless control system in such an environment requires careful design of communication links and network protocols as well as robust and reconfigurable control algorithms.
  •  
3.
  • Ahmadi, Seyed Alireza, et al. (författare)
  • Towards more efficient building energy management systems
  • 2012
  • Ingår i: Proceedings - 2012 7th International Conference on Knowledge, Information and Creativity Support Systems, KICSS 2012. - : IEEE. - 9780769548616 ; , s. 118-125
  • Konferensbidrag (refereegranskat)abstract
    • As a first step towards developing efficient building energy management techniques, in this paper, we first study the energy consumption patterns of heating, ventilation and cooling (HVAC) systems across the KTH Royal Institute of Technology campus and we identify some possible areas where energy consumption can be made less wasteful. Later, we describe a test-bed where wireless sensor networks are used to collect data and eventually control the HVAC system in a distributed way. We present some of the data, temperature, humidity, and CO2 measurements, that are collected by the aforementioned network and compare them with the measurements collected by the legacy sensors already in place. In the end we present a preliminary result on modelling the dynamics of the temperature, humidity, and CO2 using the data gather by the sensor network. We check the validity of the model via comparing the out put of the system with measured data. As a future work we identify the possibility of using the models obtained here for model based control, and fault detection and isolation techniques.
  •  
4.
  • Alanwar, Amr, et al. (författare)
  • Data-Driven Set-Based Estimation using Matrix Zonotopes with Set Containment Guarantees
  • 2022
  • Ingår i: 2022 EUROPEAN CONTROL CONFERENCE (ECC). - : IEEE. ; , s. 875-881
  • Konferensbidrag (refereegranskat)abstract
    • We propose a method to perform set-based state estimation of an unknown dynamical linear system using a data-driven set propagation function. Our method comes with set-containment guarantees, making it applicable to safety-critical systems. The method consists of two phases: (1) an offline learning phase where we collect noisy input-output data to determine a function to propagate the state-set ahead in time; and (2) an online estimation phase consisting of a time update and a measurement update. It is assumed that known finite sets bound measurement noise and disturbances, but we assume no knowledge of their statistical properties. These sets are described using zonotopes, allowing efficient propagation and intersection operations. We propose a new approach to compute a set of models consistent with the data and noise-bound, given input-output data in the offline phase. The set of models is utilized in replacing the unknown dynamics in the data-driven set propagation function in the online phase. Then, we propose two approaches to perform the measurement update. Simulations show that the proposed estimator yields state sets comparable in volume to the 3 sigma confidence bounds obtained by a Kalman filter approach, but with the addition of state set-containment guarantees. We observe that using constrained zonotopes yields smaller sets but with higher computational costs than unconstrained ones.
  •  
5.
  • Alanwar, Amr, et al. (författare)
  • Privacy-preserving set-based estimation using partially homomorphic encryption
  • 2023
  • Ingår i: European Journal of Control. - : Elsevier BV. - 0947-3580 .- 1435-5671. ; 71, s. 100786-
  • Tidskriftsartikel (refereegranskat)abstract
    • The set-based estimation has gained a lot of attention due to its ability to guarantee state enclosures for safety-critical systems. However, collecting measurements from distributed sensors often requires out-sourcing the set-based operations to an aggregator node, raising many privacy concerns. To address this problem, we present set-based estimation protocols using partially homomorphic encryption that pre-serve the privacy of the measurements and sets bounding the estimates. We consider a linear discrete-time dynamical system with bounded modeling and measurement uncertainties. Sets are represented by zonotopes and constrained zonotopes as they can compactly represent high-dimensional sets and are closed under linear maps and Minkowski addition. By selectively encrypting parameters of the set repre-sentations, we establish the notion of encrypted sets and intersect sets in the encrypted domain, which enables guaranteed state estimation while ensuring privacy. In particular, we show that our protocols achieve computational privacy using the cryptographic notion of computational indistinguishability. We demonstrate the efficiency of our approach by localizing a real mobile quadcopter using ultra-wideband wireless devices.
  •  
6.
  • Alisic, Rijad (författare)
  • Defense of Cyber-Physical Systems Against Learning-based Attackers
  • 2023
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Cyberattacks against critical infrastructures pose a serious threat to society, as they can have devastating consequences on the economy, security, or public health. These infrastructures rely on a large network of cyber components, such as sensors, controllers, computers, and communication devices, to monitor and control their physical processes. An adversary can exploit the vulnerabilities in these cyber components to gain access to the system and manipulate its behavior or functionality.This thesis proposes methods that can be employed as a first line of defense against such attacks for Cyber-Physical Systems. In the first part of the thesis, we consider how uninformed attackers can learn to attack a Cyber-Physical System by eavesdropping through the cyber component. By learning to manipulate the plant, the attacker could figure out how to destroy the physical system before it is too late or completely take it over without raising any alarms. Stopping the attacker at the learning stage would force the attacker to act obliviously, increasing the chances of detecting them.We analyze how homomorphic encryption, a technique that allows computation on encrypted data, hinders an attacker's learning process and reduces its capabilities to attack the system. Specifically, we show that an attacker must solve challenging lattice problems to find attacks that are difficult to detect. Additionally, we show how the detection probability is affected by the attacker's solution to the problems and what parameters of the encryption scheme can be tweaked to increase the detection probability. We also develop a novel method that enables anomaly detection over homomorphically encrypted data without revealing the actual signals to the detector, thereby discouraging attackers from launching attacks on the detector. The detection can be performed using a hypothesis test. However, special care must be taken to ensure that fresh samples are used to detect changes from nominal behavior. We also explore how the adversary can try to evade detection using the same test and how the system can be designed to make detection easier for the defender and more challenging for the attacker.In the second part of the thesis, we study how information leakage about changes in the system depends on the system's dynamics. We use a mathematical tool called the Hammersley-Chapman-Robbins lower bound to measure how much information is leaked and how to minimize it. Specifically, we study how structured input sequences, which we call events, can be obtained through the output of a dynamical system and how this information can be hidden by adding noise or changing the inputs. The system’s speed and sensor locations affect how much information is leaked. We also consider balancing the system’s performance and privacy when using optimal control. Finally, we show how to estimate when the adversary’s knowledge of the event becomes accurate enough to launch an attack and how to change the system before that happens. These results are then used to aid the operator in detecting privacy vulnerabilities when designing a Cyber-Physical System, which increases the overall security when removed.
  •  
7.
  • Alisic, Rijad, 1994- (författare)
  • Privacy of Sudden Events in Cyber-Physical Systems
  • 2021
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Cyberattacks against critical infrastructures has been a growing problem for the past couple of years. These infrastructures are a particularly desirable target for adversaries, due to their vital importance in society. For instance, a stop in the operation of a critical infrastructure could result in a crippling effect on a nation's economy, security or public health. The reason behind this increase is that critical infrastructures have become more complex, often being integrated with a large network of various cyber components. It is through these cyber components that an adversary is able to access the system and conduct their attacks.In this thesis, we consider methods which can be used as a first line of defence against such attacks for Cyber-Physical Systems (CPS). Specifically, we start by studying how information leaks about a system's dynamics helps an adversary to generate attacks that are difficult to detect. In many cases, such attacks can be detrimental to a CPS since they can drive the system to a breaking point without being detected by the operator that is tasked to secure the system. We show that an adversary can use small amounts of data procured from information leaks to generate these undetectable attacks. In particular, we provide the minimal amount of information that is needed in order to keep the attack hidden even if the operator tries to probe the system for attacks. We design defence mechanisms against such information leaks using the Hammersley-Chapman-Robbins lower bound. With it, we study how information leakage could be mitigated through corruption of the data by injection of measurement noise. Specifically, we investigate how information about structured input sequences, which we call events, can be obtained through the output of a dynamical system and how this leakage depends on the system dynamics. For example, it is shown that a system with fast dynamical modes tends to disclose more information about an event compared to a system with slower modes. However, a slower system leaks information over a longer time horizon, which means that an adversary who starts to collect information long after the event has occured might still be able to estimate it. Additionally, we show how sensor placements can affect the information leak. These results are then used to aid the operator to detect privacy vulnerabilities in the design of a CPS.Based on the Hammersley-Chapman-Robbins lower bound, we provide additional defensive mechanisms that can be deployed by an operator online to minimize information leakage. For instance, we propose a method to modify the structured inputs in order to maximize the usage of the existing noise in the system. This mechanism allows us to explicitly deal with the privacy-utility trade-off, which is of interest when optimal control problems are considered. Finally, we show how the adversary's certainty of the event increases as a function of the number of samples they collect. For instance, we provide sufficient conditions for when their estimation variance starts to converge to its final value. This information can be used by an operator to estimate when possible attacks from an adversary could occur, and change the CPS before that, rendering the adversary's collected information useless.
  •  
8.
  • Altaf, Faisal, et al. (författare)
  • Wireless event-triggered controller for a 3D tower crane lab process
  • 2011
  • Ingår i: 2011 19th Mediterranean Conference on Control and Automation, MED 2011. - 9781457701252 - 9781457701245 ; , s. 994-1001
  • Konferensbidrag (refereegranskat)abstract
    • This paper studies the design and real-time implementation of an event-triggered controller for a nonlinear 3D tower crane where the communication between the controller and the actuators is performed over a low-power wireless network. A flexible Event-Generation Circuit (EGC) is proposed in order to implement event-driven controllers for Networked Control Systems. Furthermore, a detailed experimental analysis on the performance of the event-triggered controller and the influence of packet losses on the transmitted actuation messages are presented. The results show that the event-triggered controllers in networked control systems are able to maintain the same level of performance as compared to periodic controllers, while increasing the sensors/actuators lifetime by reducing network bandwidth utilization.
  •  
9.
  • Andersson, G., et al. (författare)
  • Cyber-security of SCADA systems
  • 2012
  • Ingår i: 2012 IEEE PES Innovative Smart Grid Technologies, ISGT 2012. - : IEEE. - 9781457721588 ; , s. 6175543-
  • Konferensbidrag (refereegranskat)abstract
    • After a general introduction of the VIKING EU FP7 project two specific cyber-attack mechanisms, which have been analyzed in the VIKING project, will be discussed in more detail. Firstly an attack and its consequences on the Automatic Generation Control (AGC) in a power system are investigated, and secondly the cyber security of State Estimators in SCADA systems is scrutinized.
  •  
10.
  • Andersson, Roland, et al. (författare)
  • Implantation Metastases from Gastrointestinal Cancer after Percutaneous Puncture or Biliary Drainage
  • 1996
  • Ingår i: European Journal of Surgery. - 1102-4151. ; 162:7, s. 551-554
  • Tidskriftsartikel (refereegranskat)abstract
    • Objective: Evaluation of incidence and outcome of implantation metastases after percutaneous fine-needle biopsy or biliary drainage. Design: Retrospective study. Setting: University hospital, Sweden. Subjects: Eight patients with implantation metastases from gastrointestinal cancers after percutaneous fine-needle biopsy (n = 7) or biliary drainage (n = 1). Main outcome measures: Incidence of implantation metastases, treatment and influence on outcome and survival. Results: In two out of three patients who had had otherwise radical operations, the implantation metastases meant that the operations were palliative rather than curative. Patients who had had palliative resections of the implantation metastases developed major local complications. One patient is alive with no signs of disease after 106 months, while one is alive with disease 30 months after the diagnosis of the implantation metastases. The remaining patients have died after 6 to 23 months. Conclusion: The incidence of implantation metastases after fine-needle procedures is probably underestimated. There is a slight but definite risk that the procedure may render an otherwise curative resection palliative. Implantation metastases cause local complaints of varying severity and seems to have a tendency to recur locally. We recommend that fine-needle biopsy should be restricted to patients who will truly benefit from a more accurate preoperative diagnosis.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 281
Typ av publikation
konferensbidrag (147)
tidskriftsartikel (83)
bokkapitel (16)
rapport (8)
doktorsavhandling (8)
bok (7)
visa fler...
licentiatavhandling (6)
annan publikation (4)
forskningsöversikt (2)
visa färre...
Typ av innehåll
refereegranskat (223)
övrigt vetenskapligt/konstnärligt (50)
populärvet., debatt m.m. (8)
Författare/redaktör
Sandberg, Henrik (145)
Sandberg, Karl W. (86)
Johansson, Karl Henr ... (62)
Johansson, Karl H., ... (47)
Johansson, Karl H. (26)
Teixeira, André (23)
visa fler...
Wahlberg, Olof (15)
Shames, Iman (11)
Araujo, José (9)
Dimarogonas, Dimos V ... (8)
Sandberg, Göran (8)
Pare, Philip E. (8)
Lindemann, Jonas (8)
Olsson, Karl-Gunnar (8)
Ramesh, Chithrupa (8)
Pirani, Mohammad (7)
Sundberg, Håkan (7)
Pan, Yan (7)
Andreasson, Martin (6)
Sou, Kin Cheong, 197 ... (6)
Imura, Jun-ichi (6)
Vinberg, Stig, 1954- (6)
Wei, Jieqiang (6)
Milosevic, Jezdimir (6)
Tanaka, Takashi (5)
Besselink, Bart (5)
He, Xingkang (5)
Skoglund, Mikael (5)
Vinberg, Stig (5)
Gracy, Sebin (5)
Ishizaki, Takayuki (5)
Johansson, Karl Henr ... (4)
Johansson, Bengt (4)
Dán, György (4)
Anderson, Karen (4)
Andreasson, Martin, ... (4)
Engström, Karl Gunna ... (4)
Henriksson, Erik (4)
Paridari, Kaveh (4)
Karlsson, Gunnar (4)
Skoglund, Mikael, 19 ... (4)
Nekouei, Ehsan (4)
Sandberg, Camilla (4)
Sirkemaa, Seppo (4)
Gelin, Gunnar (4)
Imura, J. -I (4)
Sasahara, Hampei (4)
Sadamoto, Tomonori (4)
Millet, Patrick (4)
Sandberg, Robert, 19 ... (4)
visa färre...
Lärosäte
Kungliga Tekniska Högskolan (155)
Mittuniversitetet (56)
Högskolan Dalarna (56)
Luleå tekniska universitet (29)
Lunds universitet (17)
Uppsala universitet (14)
visa fler...
Göteborgs universitet (12)
Chalmers tekniska högskola (12)
Umeå universitet (7)
Karolinska Institutet (7)
Stockholms universitet (6)
RISE (3)
Linköpings universitet (2)
Södertörns högskola (2)
Högskolan i Halmstad (1)
Mälardalens universitet (1)
Karlstads universitet (1)
Sveriges Lantbruksuniversitet (1)
visa färre...
Språk
Engelska (260)
Svenska (20)
Latin (1)
Forskningsämne (UKÄ/SCB)
Teknik (173)
Naturvetenskap (71)
Medicin och hälsovetenskap (22)
Samhällsvetenskap (20)
Humaniora (6)
Lantbruksvetenskap (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy