PReGio Roberto Tempo
Il Premio Ricerca Giovane IEIIT-CNR è dedicato dall'edizione 2018 al ricordo di Roberto Tempo, prematuramente scomparso nel gennaio 2017, dirigente di ricerca, scienziato di fama internazionale, figura di riferimento nello studio dei sistemi e dei controlli automatici.
'PReGio Roberto Tempo' è rivolto ai ricercatori IEIIT-CNR in formazione.
Paper Title: "Tube-based robust model predictive control for spacecraft proximity operations in the presence of persistent disturbance", Aerospace Science and Technology, Volume 77, pp. 585-594, June 2018, DOI: 10.1016/j.ast.2018.04.009
Abstract: Rendezvous and Proximity Operations (RPOs) of two autonomous spacecraft have been extensively studied in the past years, taking into account both the strict requirements in terms of spacecraft dynamics variations and the limitations due to the actuation system. In this paper, two different Model Predictive Control (MPC) schemes have been considered to control the spacecraft during the final phase of the rendezvous maneuver in order to ensure mission constraints satisfaction for any modeled disturbance affecting the system. Classical MPC suitably balances stability and computational effort required for online implementation whereas Tube-based Robust MPC represents an appealing strategy to handle disturbances while ensuring robustness. For the robust scheme, the computational effort reduction is ensured adopting a time-varying control law where the feedback gain matrix is evaluated offline, applying a Linear Matrix Inequality approach to the state feedback stabilization criterion. An extensive verification campaign for the performance evaluation and comparison in terms of constraint satisfaction, fuel consumption and computational cost, i.e. CPU time, has been carried out on both a three degrees-of-freedom (DoF) orbital simulator and an experimental testbed composed by two Floating Spacecraft Simulators reproducing a quasi-frictionless motion. Main conclusions are drawn with respect to the mission expectations.
Paper Title: "A cloud-IoT platform for passive radio sensing: challenges and application case studies", IEEE Internet of Things Journal, Volume: 5, Issue: 5, pp.3624-3636, October 2018, DOI: 10.1109/JIOT.2018.2834530
Abstract: We propose a platform for the integration of passive radio sensing into a cloud-IoT framework that performs real-time channel quality information processing and analytics. The proposed tool allows to passively detect and track objects or persons by using radio waves that encode a 2D/3D view of the environment they propagate through.
Paper Title: "Bandwidth management for soft real-time control applications in industrial wireless networks", IEEE Transactions on Industrial Informatics, vol. 13, n. 5, pp. 2484-2495, October 2017, DOI: 10.1109/TII.2017.2720638.
Abstract: The adoption of wireless communication technologies would greatly reduce the deployment and maintenance costs of industrial distributed control systems and increase their flexibility, paving the way to a broad range of application scenarios. This paper investigates solutions for supporting wireless soft real-time periodic traffic delivery, which combine traditional scheduling and access control, automatic repeat request (ARQ) and dynamic bandwidth allocation techniques, allowing to define an effective trade-off between probabilistic guarantees and QoS.
Paper Title: "Semiautomated Verification of Access Control Implementation in Industrial Networked Systems", IEEE Transactions on Industrial Informatics, vol. 11, no. 6, pp. 1388-1399, Dec. 2015, DOI: 10.1109/TII.2015.2489181
Abstract: A key element in any protection scheme for Industrial Networked Systems (INSs) is the correct definition and implementation of access control policies. These policies are usually specified at a high level of abstraction and then mapped onto the real system. However, the peculiarities and limitations of INSs elements complicate the process of implementation and verification of these policies. This paper proposes a new formal model and approach to consider both the abstract policy specification and the detailed cyber-physical system description, in order to automatically combine them and verify the correct implementation and configuration of security mechanisms.