skip to main content

This content will become publicly available on January 1, 2023

Title: On-line Process Physics Tests via Lyapunov-based Economic Model Predictive Control and Simulation-Based Testing of Image-Based Process Control
; ; ; ; ;
Award ID(s):
1932026 1839675
Publication Date:
Journal Name:
American Control Conference
Page Range or eLocation-ID:
2479 to 2484
Sponsoring Org:
National Science Foundation
More Like this
  1. The controllers for a cyber-physical system may be impacted by sensor measurement cyberattacks, actuator signal cyberattacks, or both types of attacks. Prior work in our group has developed a theory for handling cyberattacks on process sensors. However, sensor and actuator cyberattacks have a different character from one another. Specifically, sensor measurement attacks prevent proper inputs from being applied to the process by manipulating the measurements that the controller receives, so that the control law plays a role in the impact of a given sensor measurement cyberattack on a process. In contrast, actuator signal attacks prevent proper inputs from being applied to a process by bypassing the control law to cause the actuators to apply undesirable control actions. Despite these differences, this manuscript shows that we can extend and combine strategies for handling sensor cyberattacks from our prior work to handle attacks on actuators and to handle cases where sensor and actuator attacks occur at the same time. These strategies for cyberattack-handling and detection are based on the Lyapunov-based economic model predictive control (LEMPC) and nonlinear systems theory. We first review our prior work on sensor measurement cyberattacks, providing several new insights regarding the methods. We then discuss how those methodsmore »can be extended to handle attacks on actuator signals and then how the strategies for handling sensor and actuator attacks individually can be combined to produce a strategy that is able to guarantee safety when attacks are not detected, even if both types of attacks are occurring at once. We also demonstrate that the other combinations of the sensor and actuator attack-handling strategies cannot achieve this same effect. Subsequently, we provide a mathematical characterization of the “discoverability” of cyberattacks that enables us to consider the various strategies for cyberattack detection presented in a more general context. We conclude by presenting a reactor example that showcases the aspects of designing LEMPC.« less
  2. In order to monitor the quality of parts in printing, the methodology to monitor the geometric quality of the printed parts in fused deposition modeling process is researched. A non-contact measurement method based on machine vision technology is adopted to obtain the precise complete geometric information. An image acquisition system is established to capture the image of each layer of the part in building and image processing technology is used to obtain the geometric profile information.With the above information, statistical process control method is applied to monitor the geometric quality of the parts during the printing process. Firstly, a border signature method is applied to transform complex geometry into a simple distance-angle function to get the profile deviation data. Secondly, monitoring of the profile deviation data based on profile monitoring method is studied and applied to achieve the goal of layer-to-layer monitoring. In the research, quantile-quantile plot method is used to transform the profile deviation point cloud data monitoring problem into a linear profile relationship monitoring problem andEWMAcontrol charts are established to monitor the parameters of the linear relationship to detect shifts occurred in the Fused Deposition Modeling process. Finally, laboratory experiments are conducted to demonstrate the effectiveness of themore »proposed approach.« less