Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

PD controller design method based on malicious software space-time propagation model

A malicious software and propagation model technology, applied to controllers with specific characteristics, electric controllers, etc., can solve problems such as difficult design and single adjustable control parameters, and achieve excellent control effects, strong applicability, and reduced harm Effect

Pending Publication Date: 2022-07-29
NANJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing related research is limited to the time-delay feedback controller, which is difficult to design and has a single adjustable control parameter.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • PD controller design method based on malicious software space-time propagation model
  • PD controller design method based on malicious software space-time propagation model
  • PD controller design method based on malicious software space-time propagation model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] Embodiments of the present invention will be disclosed in the drawings below, and for the sake of clarity, many practical details will be described together in the following description. It should be understood, however, that these practical details should not be used to limit the invention. That is, in some embodiments of the invention, these practical details are unnecessary.

[0066] The present invention is a PD controller design method based on a malware spatiotemporal propagation model, and the method comprises the following steps:

[0067] Step 1: Introduce time delay and reaction-diffusion terms on the basis of the malware propagation model, establish a partial differential malware propagation model with nonlinear saturation occurrence rate, and obtain information such as the basic reproduction number and equilibrium point.

[0068] The described malware-based spatiotemporal propagation model is expressed as:

[0069]

[0070] where t>0, x∈Ω.

[0071] The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a PD controller design method based on a malicious software space-time propagation model, which comprises the following steps of: 1, introducing time lag and reaction diffusion terms on the basis of a malicious software propagation model, and establishing a partial differential malicious software space-time propagation model with a nonlinear saturation incidence rate; 2, a PD controller is applied to the malicious software space-time propagation model in the uncontrolled state at the balance point, and a malicious software space-time propagation controlled model is obtained; 3, linearizing the obtained controlled model at a balance point to obtain a related characteristic equation; and 4, selecting time lag as a bifurcation parameter, and performing stability analysis and Hopf bifurcation analysis on the malicious software space-time propagation controlled model. And finally, proper controller parameters are selected, and the influence of the controller on the system is verified through simulation. According to the method, the position of the bifurcation point can be effectively controlled, the influence on the control item is obvious, the control effect is obvious, and the harm of malicious software propagation is effectively reduced.

Description

technical field [0001] The invention relates to the technical field of controllers, in particular to a design method of a PD controller based on a malware spatiotemporal propagation model. Background technique [0002] With the popularity of computer technology, malware is undoubtedly its most deadly unstable factor. The spread of malware among computer nodes has many similarities with the spread of infectious diseases in the population, so many scholars use the same method to mathematically model the two and conduct related dynamic analysis, while most of the information about malware The propagation models of all stay in the time domain. In fact, the spread of malware not only evolves over time, but is also affected by its spatial distribution. The introduction of the reaction-diffusion term can well describe the spread of malware in the spatial domain, making the established spatiotemporal propagation model more realistic. [0003] Adding control strategies based on th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G05B11/42
CPCG05B11/42
Inventor 肖敏陈实钱蓉陈功
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products