Severity: Warning
Message: file_get_contents(https://...@gmail.com&api_key=61f08fa0b96a73de8c900d749fcb997acc09&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests
Filename: helpers/my_audit_helper.php
Line Number: 197
Backtrace:
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 197
Function: file_get_contents
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 271
Function: simplexml_load_file_from_url
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3165
Function: getPubMedXML
File: /var/www/html/application/controllers/Detail.php
Line: 597
Function: pubMedSearch_Global
File: /var/www/html/application/controllers/Detail.php
Line: 511
Function: pubMedGetRelatedKeyword
File: /var/www/html/index.php
Line: 317
Function: require_once
98%
921
2 minutes
20
This article proposes a resilient distributed model predictive control (DMPC) algorithm for a class of constrained dynamically coupled multiple cyber-physical systems (CPSs) subject to bounded additive disturbances. The algorithm is designed to address severe attacks on the forward controller-actuator (C-A) channel, the feedback sensor-controller (S-C) channel, and the channels between subsystems, without any prior information about the intruder available to the defender. To mitigate the negative effects of intruders, we consider a one-step time delay strategy in the local model predictive controller design. This strategy allows the generated controller data to be checked for acceptability before use. To ensure constraint satisfaction for an infinite-horizon MPC problem while accounting for the unknown duration of attacks, we develop a set of minimally conservative constraints in the open-loop control mode using a constraint tightening technique. Moreover, we obtain an equivalent finite number of constraints for the infinite-horizon problem to ensure recursive feasibility. To prevent tampered data from affecting control performance, a detector module is designed to decide whether data is used by its receiver. It is shown that the closed-loop system is uniformly ultimate boundedness (UUB) under any admissible attack scenario and disturbance realization. Finally, the effectiveness of the proposed algorithm is validated by a case study.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1109/TCYB.2025.3569377 | DOI Listing |