Multi-layered Model-based Design Approach towards System Safety and Security Co-engineering

Author(s):  
Megha Quamara ◽  
Gabriel Pedroza ◽  
Brahim Hamid
2004 ◽  
Vol 37 (22) ◽  
pp. 29-34 ◽  
Author(s):  
Giovanni Gaviani ◽  
Giacomo Gentile ◽  
Giovanni Stara ◽  
Luigi Romagnoli ◽  
Thomas Thomsen ◽  
...  
Keyword(s):  

Author(s):  
T. N. Kigezi ◽  
J. F. Dunne

A general design approach is presented for model-based control of piston position in a free-piston engine (FPE). The proposed approach controls either “bottom-dead-center” (BDC) or “top-dead-center” (TDC) position. The key advantage of the approach is that it facilitates controller parameter selection, by the way of deriving parameter combinations that yield both stable BDC and stable TDC. Driving the piston motion toward a target compression ratio is, therefore, achieved with sound engineering insight, consequently allowing repeatable engine cycles for steady power output. The adopted control design approach is based on linear control-oriented models derived from exploitation of energy conservation principles in a two-stroke engine cycle. Two controllers are developed: A proportional integral (PI) controller with an associated stability condition expressed in terms of controller parameters, and a linear quadratic regulator (LQR) to demonstrate a framework for advanced control design where needed. A detailed analysis is undertaken on two FPE case studies differing only by rebound device type, reporting simulation results for both PI and LQR control. The applicability of the proposed methodology to other common FPE configurations is examined to demonstrate its generality.


Computers ◽  
2020 ◽  
Vol 9 (1) ◽  
pp. 18 ◽  
Author(s):  
Konstantinos Rantos ◽  
Arnolnt Spyros ◽  
Alexandros Papanikolaou ◽  
Antonios Kritsas ◽  
Christos Ilioudis ◽  
...  

Threat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimised and up-to-date security situation. Combined with advanced security analysis, threat intelligence helps reduce the time between the detection of an attack and its containment. This is achieved by continuously providing information, accompanied by data, on existing and emerging cyber threats and vulnerabilities affecting corporate networks. This paper addresses challenges that organisations are bound to face when they decide to invest in effective and interoperable cybersecurity information sharing and categorises them in a layered model. Based on this, it provides an evaluation of existing sources that share cybersecurity information. The aim of this research is to help organisations improve their cyber threat information exchange capabilities, to enhance their security posture and be more prepared against emerging threats.


Sign in / Sign up

Export Citation Format

Share Document