Possibili temi per attività di tesi Prof. Gianmaria DE TOMMASI Email: [email protected]Napoli, 19 Dicembre 2018 UNI NA DIE I I I D IPARTIMENTO DI I NGEGNERIA E LETTRICA E DELLE T ECNOLOGIE DELL’I NFORMAZIONE VERSITA DEGLI STUDI DI POLI FEDERICO II ,
28
Embed
Possibili temi per attività di tesiwpage.unina.it/detommas/Temi_tesi.pdf · Possibili temi di tesi Estensione dei risultati di analisi alle reti etichettate Determinazione di un
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
In system security it is important to prevent information leaksObjective: to prevent to an intruder to access to secretinformationDES have been used to model different information flowproperties
opacity (the secret is a state or a sequence)non-interference
Y.-C. Wu and S. Lafortune,Comparative analysis of related notions of opacity in centralized andcoordinated architectures,Discrete Event Dyn. Syst., vol. 23, no. 3, pp. 307–339, 2013
N. Busi and R. Gorrieri,A survey on non-interference with Petri nets,Lectures on Concurrency and Petri Nets, pp. 328–344, 2004
Two classes of users: high-level andlow-level usersA leak of information occurs when alow-level user (the intruder) obtainsinformation meant to be visible only tohigh-level usersBoth high-level and low-level usersknow the system structure, but theyinteract with the system in twodifferent ways (views)If the high-level view of the systeminterferes with the low-level one,information leaks may occur
Condizioni necessarie e sufficienti per verificare due diverseproprietà di non interferenzaL’approccio si basa sulla rappresentazione algebrica delle reti diPetriLe condizioni proposte si basano sulla soluzione di problemi ILPAlgoritmo per determinare l’insieme più piccolo di transizionidi alto livello da disabilitare offline per assicurare lanon-interferenza
Possibili temi di tesi
Estensione dei risultati di analisi alle reti etichettateDeterminazione di un algoritmo dinamico che assicurinon-interferenza a ciclo chiuso
Opacity in DES is related to the possibility of hiding a secret toexternal observers (the intruders)The secret can be either
a system state (initial, current, final)a sequence of events→ Language-based opacity (LBO)
Y.-C. Wu and S. Lafortune,Comparative analysis of related notions of opacity in centralized andcoordinated architectures,Discrete Event Dyn. Syst., vol. 23, no. 3, pp. 307–339, 2013
the secret sequence is abcc is the only observable event (whoseoccurrence can be directly measured)observing the single occurrence of c,an intruder will never no if either abcor bac occurredthe system is said to be opaque
Condizione necessaria e sufficiente per verificare lalanguage based opacity (LBO) in reti etichettateCondizione sufficiente (ma meno onerosacomputazionalmente) LBO
Possibili temi di tesi
Generalizzazione dell’approccio anche alla state opacityDeterminazione di un algoritmo dinamico che assicuriopacità a ciclo chiuso
The plasma (axisymmetric) magnetic control in tokamaksincludes the following three control problemsthe vertical stabilization problemthe shape and position control problemthe plasma current control problem
Consider the simplified electromechanical model with threeconductive rings, two rings are kept fixed and in symmetricposition with respect to the r axis, while the third can freelymove vertically.
If the currents in the two fixed ringsare equal, the vertical positionz = 0 is an equilibrium point for thesystem.
Figure: Shape comparisonat 22.5 s. Black shape (#81710without CLA), red shape(#81715 with CLA).
Figure: Currents in the divertor circuits.#81710 (reference pulse without CLA) andpulse #81715 (with CLA). The shared areascorrespond to regions beyond the currentlimits enforced by the CLA parameters.
Figure: EAST pulse #70799. During this pulse the ITER-like VS was enabled from t = 2.1 s for 1.2 s, and onlyIp and rc were controlled, while zc was left uncontrolled. This first test confirmed that the ITER-like VS verticallystabilized the plasma by controlling zc and IIC , without the need to feed back the vertical position zc .
Sviluppo di sistemi di controllo magnetico (design, analisi, ecc.)Sviluppo di sistemi di supervisione del PCSTecniche di fault detection e sviluppo di sistemi fault tollerantper diagnostiche magnetiche. . .
Tesi presso aziende di automazione (province di Avellino,Salerno e Caserta)Tesi presso ST microelectronicsSviluppo di sistemi di controllo in ambito aeronautico (a partireda giugno/luglio 2019)
Stay tuned!
Tenete d’occhio le news sulla pagina www.automazione.it, lapagina FB e il profilo Twitter