For three-level three-phase inverters, a novel finite-state machine-based model predictive control (FSM-MPC) is proposed. The state transition diagram of FSM is regarded as the operation guideline to ...avoid excessive voltage jumps (Δ V ). No more than five voltage vectors (VVs) are selected as FSM-MPC's candidates VVs, based on the VV reference and the previous optimal VV. And the cost function is simplified in terms of time duration. Thus, evaluating a candidate VV requires a very low computation cost. Without losing control performance, the proposed FSM-MPC's execution time is decreased to 50% of the MPC algorithm, which enumerates all basic VVs to get global optimal VV and performance. Compared with the existing simplified algorithms, the proposed FSM-MPC makes current harmonics lower, and its average switching frequency is 33% less, which means much less switching loss. Furthermore, the proposed algorithm is robust when the electric-circuit parameters are mismatched in the control system. Experimental results are provided to validate the advantages of the proposed algorithm.
•Hybridize tent map with deterministic finite state machine to enhance dynamical properties.•New map has high complexity without requiring external entropy source.•New image cipher that achieves ...confusion and diffusion simultaneously in one round.•Cipher has flexible key size depending on user requirement.•Cipher achieves the image authentication.
Image encryption protects visual information by transforming images into an incomprehensible form. Chaotic systems are used to design image ciphers due to properties such as ergodicity and initial condition sensitivity. A chaos-based cipher derives its security strength from its underlying digital chaotic map, thus a more complex map leads to higher security. This paper introduces an enhancement to a tent map’s chaotic properties by hybridizing it with a deterministic finite state machine. We denote the resulting digital one-dimensional chaotic system as TM-DFSM. Chaotic analyses indicate that the new chaotic system has higher nonlinearity, sensitivity to initial condition, and larger chaotic parameter range than other recently proposed one-dimensional chaotic systems. We then propose a new image encryption scheme based on TM-DFSM, capable of performing both confusion and diffusion operations in one pass while also having a flexible key space. The encryption operations are designed to achieve maximal confusion and diffusion properties. Changing a single bit of the plainimage or secret key will result in an entirely different cipherimage. The proposed cipher has been analyzed using histogram analysis, contrast analysis, local Shannon entropy, resistance against differential cryptanalysis, and key security. Performance comparison with other recent schemes also depicts the proposed cipher’s superiority.
Autonomous driving strategies for intersection scenarios are challenging due to the varying traffic conditions of oncoming vehicles. Based on the connected vehicle technology, this article proposes ...an autonomous T-intersection driving strategy considering the oncoming vehicles for motion-planning and path following. A finite-state machine (FSM) is developed in the motion planner to decide the driving strategies considering the oncoming vehicles. Information pieces from the connected vehicle, specifically vehicle position and speed, are selected and effectively utilized to construct the temporal windows that manage the driving states transition of the FSM. Speed profiles in different driving states are modified for collision avoidance. Then, a path-following controller based on the back-stepping method is designed to track the planned path and speed simultaneously. The proposed strategy is validated by both simulation and experimental investigations. The results show the controlled vehicle can safely and quickly pass through the intersection using the proposed driving strategy that avoids possible collisions with the oncoming vehicles.
In this brief, state estimation problem of networked finite state machine (FSM) under partial observation is investigated. Based on the semi-tensor product (STP) of matrices, several algebraic ...expressions are defined to describe the communication losses (CL) and communication delays (CD). With the unobservable reach and <inline-formula> <tex-math notation="LaTeX">\epsilon </tex-math></inline-formula>-reach of state, one necessary and sufficient condition for detectability is obtained under CL. By constructing a state estimation set under CD, one criterion for detectability is established. Based on the composition of two mappings, one criterion for detectability under both CL and CD is obtained. Finally, a simple example is taken to illustrate the validity of the obtained theoretical results.
The security of a system-on-chip (SoC) can be compromised by exploiting the vulnerabilities of the finite state machines (FSMs) in the SoC controller modules through fault injection attacks. These ...vulnerabilities may be unintentionally introduced by traditional FSM design practices or by CAD tools during synthesis. In this paper, we first analyze how the vulnerabilities in an FSM can be exploited by fault injection attacks. Then, we propose a security-aware FSM design flow for ASIC designs to mitigate them and prevent fault attacks on FSM. Our proposed FSM design flow starts with a security-aware encoding scheme which makes the FSM resilient against fault attacks. However, the vulnerabilities introduced by the CAD tools cannot be addressed by encoding schemes alone. To analyze for such vulnerabilities, we develop a novel technique named analyzing vulnerabilities in FSM. If any vulnerability exists, we propose a secure FSM architecture to address the issue. In this paper, we mainly focus on setup-time violation-based fault attacks which pose a serious threat on FSMs; though our proposed flow works for advanced laser-based fault attacks as well. We compare our proposed secure FSM design flow with traditional FSM design practices in terms of cost, performance, and security. We show that our FSM design flow ensures security while having a negligible impact on cost and performance.
In this letter, we propose a class of color-shift keying (CSK) codes using finite-state machines for visible light communication (VLC) to achieve higher transmission reliability than their ...counterparts under the constraint of color perception. The proposed CSK coding scheme was developed to achieve high coding gain by designing a finite-state machine. In our CSK code design, we first established a code design objective function to improve the minimum Euclidean distance, which is based on conceiving a finite-state machine under the target color constraint. Thereafter, we designed the CSK coding scheme, which primarily considers the set-partitioning criterion of the CSK symbol set and the construction of the finite-state machine. Subsequently, we investigated the error performance of the proposed CSK codes in VLC systems. The simulation results confirm that the proposed CSK codes deliver significantly better performance than their counterparts.
In this study, we develop multi-intensity planes color-shift keying (MIP-CSK) constellations to determine the effect of the MIP-based CSK design scheme on the reliability of visible light ...communication systems under the constraint of target color constraint. Based on a two-dimensional triangle partition constellation plane, we introduce algorithms to design the non-integral powers of two MIP-CSK constellations in three-dimensional symbol space by using set partition and intensity plane levels, which improves the minimum Euclidean distance. We then develop a coding scheme by designing an finite-state machine from the non-integral powers of two constellations to further improve the reliability under the white color constraint. Subsequently, by considering the spatial symmetric nature of the triangle partition constellation distribution, we study the design strategy of powers of two constellation symbols and further propose the powers of two MIP-CSK design scheme in a three-dimensional symbol space. Moreover, we investigate the reliability benefit obtained by set partition and optimal intensity levels for powers of two MIP-CSK constellations by improving the normalized minimum squared distance. The simulation results indicate that the error performance of the proposed new family of MIP-based design schemes outperforms its counterparts while complying with the white color constraint at the high signal-to-noise ratios.
The model called Finite State Machine with Input Multiplexing (FSMIM) was proposed as a mechanism for implementing Finite State Machines (FSMs) using ROM memory. This paper presents a novel approach ...for achieving more efficient FSMIM implementations in Field Programmable Gate Array (FPGA) devices. The aim of the proposed approach is to obtain further reductions in the use of Embedded Memory Blocks (EMBs). Unlike previous works, the proposed approach reduces the depth of the ROM by grouping states before simplifying the input selectors of the FSMIM. For this purpose, a new strategy for grouping states is proposed, and its optimality is proven. In addition, a new variant of the Minimum Maximal k-Partial Matching (MMKPM) problem and its corresponding Integer Linear Programming (ILP) formulation are proposed for simplifying input selectors. The proposed approach requires a significantly smaller number of EMBs than the approaches proposed previously.
State-of-the-art approaches to forest fire spread are based on either 2D numerical simulations of trees on GIS or rough 3D visualization. In this paper, we approximate the tree form by dynamically ...changing sets of tree-shape modules according to the morphological structure and wind fields. Guided by finite state machine, we define the states of equilibrium, heating, pyrolysis, cooling and destruction of tree-shape modules. Interactions between tree-shape modules drive the state transfer to achieve forest fire spread. Additionally, Loose Quadtrees are adopted to the spatial distribution of trees, which allows us to maintain the visual fidelity of the representation while rendering the forest fire spreads in real-time. Our method allows us to construct the Jiufeng forest example about 10km x 10km extent at interactive rates. The capabilities of tree-shape modules and forest fire spread visualization are demonstrated by numerous examples.
Display omitted
•Use FSM to define the state and transition rules of the tree-shape module, and adopt the state to drive the temperature, moisture, and mass of the tree to simulate the pyrolysis.•Use Loose Quadtree to generate tree-shape modules in real time, and tree-shape modules can be deformed by the joint action of wind field and terrain slope to control the spread of forest fire.•Calculate the barycentric coordinates of a triangle in a tree surface mesh as the position of preset flame and store in the Priority Queue to orderly generate flames on trees.
•The management strategy for a battery/supercapacitor/fuel cell system is proposed.•An optimal oxygen excess ratio control is proposed to maximize the net power.•The finite state machine method is ...proposed for power distribution.•The power capability and state-of-charge of energy devices are fully considered.•The fuel economy and dynamic property are analyzed.
In recent years, fuel cell vehicles have attracted attention for their zero emission and environmental friendship. The sole fuel cell system cannot satisfy the dramatical change of motor power demands. In addition, the power fluctuations will damage the fuel cell stacks and shorten the cycle life of fuel cells. Therefore fuel cell systems are always combined with other energy storage devices like batteries and supercapacitors to increase the power density of the power system and fulfill the load power demands. The management strategy of the hybrid propulsion system is a significant technique for the vehicular power system. In this work, a finite state machine based management strategy is first proposed for both the battery/fuel cell and battery/supercapacitor/fuel cell system. The power capabilities of the battery and supercapacitor have been considered as important parameters in the management strategy. Moreover, an optimal oxygen excess ratio control is presented to maximize the fuel cell output net power. To evaluate the performance of the fuel economy and dynamic property, both the simulations and experimental verifications with the real physical system are given, and the real driving cycle of urban dynamometer driving schedule is utilized. The experimental and simulated results indicate that the proposed method is able to guarantee the required power during most of the driving cycles.