Circular Image

R. Ferrari

84 records found

On the Output Redundancy of LTI Systems

A Geometric Approach With Application to Privacy

This paper examines the properties of output-redundant systems, that is, systems possessing a larger number of outputs than inputs, through the lense of the geometric approach of Wonham et al. We begin by formulating a simple output allocation synthesis problem, which involves “c ...
Active techniques have been introduced to give better detectability performance for cyber-attack diagnosis in cyber–physical systems (CPS). In this paper, switching multiplicative watermarking is considered, whereby we propose an optimal design strategy to define switching filter ...
We describe a new variant of zero dynamics attack (ZDA), what we call a switched ZDA, targeting linear time-invariant (LTI) sampled-data systems with non-uniform sampling. Specifically, we consider continuous-time systems and construct attacks that exploit the unstable sampling z ...
High penetration of wind energy is pushing wind farms (WFs) to offer grid support capabilities, such as active power tracking. One of the main challenges in active power tracking for WFs is the interaction of wind turbines (WTs) through their wakes. This reduces the available win ...

Towards Control of Large-Scale Wind Farms

A Multi-rate Distributed Control Approach

With the increasing share of renewable energy, concerns regarding ensuring power system stability are ever more relevant and have been accompanied by discussions to address this yet unsolved issue. Nonetheless, enhancing sparsity and increasing generation capacity by overplanting ...
Developing accurate models for batteries, capturing ageing effects and nonlinear behaviors, is critical for the development of efficient and effective performance. Due to the inherent difficulties in developing physics-based models, data-driven techniques have been gaining popula ...
The wireless communication used by vehicles in collaborative vehicle platoons is vulnerable to cyber-attacks, which threaten their safe operation. To address this issue we propose a topology-switching coalitional model predictive control (MPC) method based on a reduced order unkn ...
Over-actuated systems, namely systems with more inputs than outputs, can increase control performance, yet are susceptible to model-based undetectable attacks if the actuator channel is compromised. In this paper, we show how implementing a sparse actuator schedule can introduce ...
We propose a novel watermarking scheme by modifying a self-triggered control (STC) policy, aimed at detecting replay attacks for linear time-invariant (LTI) systems. We show that by employing non-deterministic early triggering of the STC mechanism, replay attacks can be detected ...
Wind energy has emerged as a prominent alternative energy source, harvesting energy through turbines to contribute sustainably to the electricity grid. Effective control of these turbines is crucial for regulating power generation, with wind farm control strategies geared toward ...
Identification of lithium-ion (Li-ion) battery models is essential for enhancing the operation of electrical vehicles. This paper develops a novel approach for estimating the equivalent circuit model (ECM) of Li-ion batteries and reconstructing the open-circuit voltage (OCV) and ...
This paper develops a novel approach for online Lithium-ion (Li-ion) battery model identification and state of charge (SOC) estimation. To account for the SOC-dependent battery dynamics and the static nonlinearity between the open-circuit voltage (OCV) and SOC, we formulate a gre ...
As wind turbine power capacities continue to rise, taller and more flexible tower designs are needed for support. These designs often have the tower's natural frequency in the turbine's operating regime, increasing the risk of resonance excitation and fatigue damage. Advanced loa ...
This article addresses the computation of stationary and transient solutions of the Fokker-Planck equation for nonlinear stochastic processes. We extend a Galerkin-method, which was previously used to compute stationary solutions for nonlinear mechanical systems, by a generalized ...
Multiplicative watermarking (MWM) is an active diagnosis technique for the detection of highly sophisticated attacks, but is vulnerable to malicious agents that use eaves-dropped data to identify and then remove or replicate the watermark. In this work, we propose a scheme to pro ...
For reliable and safe battery operations, accurate and robust State of Charge (SOC) and model parameters estimation is vital. However, the nonlinear dependency of the model parameters on battery states makes the problem challenging. We propose a Moving-Horizon Estimation (MHE)-ba ...
This work presents a coalitional model predictive controller for collaborative vehicle platoons. The overall system is modeled as a string of locally controlled vehicles that can share data through a wireless communication network. The vehicles can dynamically form disjoint group ...
The Flight Control System (FCS) is one of the most important systems in all modern aircraft. For such systems it is required to have robust Fault Detection Isolation and Reconfiguration (FDIR) functionalities with high detection performance. In this work we specifically consider ...