modeling tool
Recently Published Documents


TOTAL DOCUMENTS

736
(FIVE YEARS 124)

H-INDEX

39
(FIVE YEARS 4)

2022 ◽  
Vol 215 ◽  
pp. 105201
Author(s):  
Seyed Hasan Hoseinian ◽  
Abbas Hemmat ◽  
Ali Esehaghbeygi ◽  
Gholamhossein Shahgoli ◽  
Alireza Baghbanan
Keyword(s):  

Author(s):  
Emiliano Fable ◽  
Filip Janky ◽  
W Treutterer ◽  
Michael Englberger ◽  
Raphael Schramm ◽  
...  

Abstract A newly developed tool to simulate a tokamak full--discharge is presented. The tokamak "flight--simulator" Fenix couples the tokamak control system with a fast and reduced plasma model, yet realistic enough to take into account several of the plasma non--linearities. Distinguishing feature of this modeling tool is that it only requires the Pulse Schedule (PS) as input to the simulator. The output is a virtual realization of the full discharge, which time traces can then be used to judge if the PS satisfies control/physics goals or needs to be revised. This tool is thought for routine use in the control--room before each pulse is performed, but can also be used off--line to correct PS in advance, or to develop and validate reduced models, control schemes, and in general the simulation framework.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Fuyuan Luo ◽  
Tao Feng ◽  
Lu Zheng

With the rapid development of wireless communication technology in the field of industrial control systems, Wireless HART is an international wireless standard, because of its low cost and strong scalability, as well as its wide range of applications in the industrial control field. However, it is more open communication so that the possibility of increased attacks by external. At present, there are many types of research on wireless protocol security at home and abroad, but they all focus on the realization of the security function of the protocol itself, which has certain limitations for the formal modeling of the protocol security assessment. Taking into account the aforementioned research status, this paper takes the Wireless HART protocol as the research object and adopts the model detection method combining eCK model theory and colored Petri net theory to evaluate and improve the security of the protocol. First, the colored Petri net theory and CPN Tools modeling tool were introduced to verify the consistency of the original model of the protocol. And the eCK model was used to evaluate the security of the original protocol model. It was found that the protocol has two types of man-in-the-middle attack vulnerabilities: tampering and deception. Aiming at the attack loopholes of the protocol, an improvement plan was proposed. After improving the original protocol, CPN Tools modeling tool was used for security verification. It was found that the new scheme improvement can effectively prevent the existing attacks and reasonably improve the security of the protocol.


2021 ◽  
Author(s):  
Simon Delisle ◽  
Naser Ezzati-Jivan ◽  
Michel R. Dagenais

2021 ◽  
Vol 150 (4) ◽  
pp. A165-A165
Author(s):  
Petr V. Yuldashev ◽  
Maria M. Karzova ◽  
Wayne Kreider ◽  
Pavel Rosnitskiy ◽  
Oleg A. Sapozhnikov ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document