Learn More
—A generalized analysis of the IEEE 802.15.4 medium access control (MAC) protocol in terms of reliability, delay and energy consumption is presented. The IEEE 802.15.4 exponential backoff process is modeled through a Markov chain taking into account retry limits, acknowledgements, and unsaturated traffic. Simple and effective approximations of the(More)
—A novel multivariable laboratory process that consists of four interconnected water tanks is presented. The linearized dynamics of the system have a multivariable zero that is possible to move along the real axis by changing a valve. The zero can be placed in both the left and the right half-plane. In this way the quadruple-tank process is ideal for(More)
—Hybrid automata provide a language for modeling and analyzing digital and analogue computations in real-time systems. Hybrid automata are studied here from a dynamical systems perspective. Necessary and sufficient conditions for existence and uniqueness of solutions are derived and a class of hybrid automata whose solutions depend continuously on the(More)
We propose a framework for a geometric theory of hybrid systems. Given a deterministic, non-blocking hybrid system, we introduce the notion of its hybrifold with the associated hybrid flow on it. This enables us to study hybrid systems from a global geometric perspective as (generally non-smooth) dynamical systems. This point of view is adopted in studying(More)
The IEEE 802.15.4 standard for wireless sensor networks can support energy efficient, reliable, and timely packet transmission by tuning the medium access control parameters <i>macMinBE, macMax-CSMABackoffs</i>, and <i>macMaxFrameRetries</i>. Such a tuning is difficult, because simple and accurate models of the influence of these parameters on the(More)
—IEEE 802.15.4 multi-hop wireless networks are an important communication infrastructure for many applications, including industrial control, home automation, and smart grids. Existing analysis of the IEEE 802.15.4 medium access control (MAC) protocol are often based on assumptions of homogeneous traffic and ideal carrier sensing, which are far from the(More)
— In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation of these critical infrastructure systems is a major concern in our society. In current state estimation algorithms there are bad data detection (BDD) schemes to detect random(More)
The spectral properties of the incidence matrix of the communication graph are exploited to provide solutions to two multi-agent control problems. In particular, we consider the problem of state agreement with quantized communication and the problem of distance-based formation control. In both cases, stabilizing control laws are provided when the(More)
Distributed processing through ad hoc and sensor networks is having a major impact on scale and applications of computing. The creation of new cyber-physical services based on wireless sensor devices relies heavily on how well communication protocols can be adapted and optimized to meet quality constraints under limited energy resources. The IEEE 802.15.4(More)
To offer flexible quality of service to several classes of applications, the medium access control (MAC) protocol of IEEE 802.15.4 wireless sensor networks (WSNs) combines the advantages of a random access with contention with a time division multiple access (TDMA) without contention. Understanding reliability, delay, and throughput is essential to(More)