Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Steven R. Weller is active.

Publication


Featured researches published by Steven R. Weller.


IEEE Transactions on Automatic Control | 1994

Hysteresis switching adaptive control of linear multivariable systems

Steven R. Weller; Graham C. Goodwin

This paper presents a model reference adaptive control scheme for deterministic continuous-time multivariable systems represented by square, strictly proper, minimum-phase transfer function matrices. A typical requirement of existing algorithms is to assume that the zero structure at infinity and the high-frequency gain matrix are fully (or at least partially) known. It is well known that these requirements may be very restrictive, since, in general, both the zero structure at infinity and the high-frequency gain matrix depend on plant parameters. In this paper we show that these restrictive assumptions may be considerably weakened using Morse et al.s hysteresis switching control strategy (1992). The strategy entails running a finite number of parameter estimators in parallel and using a switching algorithm to select between candidate estimators based on their associated prediction errors. Hysteresis in the switching algorithm precludes switching arbitrarily rapidly between estimators, and all switching ceases within a finite time. The results represent a significant step forward in understanding the minimal amount of prior knowledge necessary to design a stabilizing controller for a linear multivariable system. >


IEEE Communications Letters | 2003

A family of irregular LDPC codes with low encoding complexity

Sarah J. Johnson; Steven R. Weller

We consider irregular quasi-cyclic low-density parity-check (LDPC) codes derived from difference families. The resulting codes can be encoded with low complexity and perform well when iteratively decoded with the sum-product algorithm.


information theory workshop | 2001

Regular low-density parity-check codes from combinatorial designs

Sarah J. Johnson; Steven R. Weller

Analytically constructed LDPC codes comprise only a very small subset of possible codes and as a result LDPC codes are still, for the most part, constructed randomly. This paper extends the class of LDPC codes that can be systematically generated by presenting a construction method for regular LDPC codes based on combinatorial designs known as Kirkman triple systems. We construct (3, /spl rho/)-regular codes whose Tanner graph is free of 4-cycles for any integer /spl rho/, and examine girth and minimum distance properties of several classes of LDPC codes obtained from combinatorial designs.


Automatica | 1998

Brief Paper: Anti-Windup Designs for Multivariable Controllers

Youbin Peng; Damir Vrani; Raymond Hanus; Steven R. Weller

This paper addresses two important aspects of anti-windup (AW) designs, namely the parametrization of linear AW compensators, and the role of artificial nonlinearity (AN) in the design of AW compensators for multivariable systems. For the first issue, a simple parametrization is given using the classical feedback structure in the framework of constrained unity feedback multivariable control system. Conditions for controller implementability and closed-loop stability are stated in terms of this parametrization. For the second issue, two existing AN designs for coordinate plant inputs whenever one plant input enters saturation are reviewed. The first design is the widely used input direction preserving technique, and the second is an optimal AN design. A comparative simulation study illustrates that the conditioning technique, enhanced by optimal AN design, gives the best tracking performance among different existing methods.


global communications conference | 2001

Construction of low-density parity-check codes from Kirkman triple systems

Sarah J. Johnson; Steven R. Weller

Gallager introduced low-density parity-check (LDPC) codes in 1962, presenting a construction method to randomly allocate bits in the parity-check matrix subject to certain structural constraints. Since then improvements have been made to Gallagers construction method and some analytic constructions for LDPC codes have been presented. However analytically constructed LDPC codes comprise only a very small subset of possible codes and as a result LDPC codes are still, for the most part, constructed randomly. This paper extends the class of LDPC codes that can be systematically generated by presenting a construction method for regular LDPC codes based on combinatorial designs known as Kirkman triple systems. That is, we construct (3, /spl rho/)-regular codes whose Tanner (1981) graph is free of 4-cycles for any integer /spl rho/.


IEEE Transactions on Smart Grid | 2015

Distributed and Decentralized Control of Residential Energy Systems Incorporating Battery Storage

Karl Worthmann; Christopher M. Kellett; Philipp Braun; Lars Grüne; Steven R. Weller

The recent rapid uptake of residential solar photovoltaic installations provides many challenges for electricity distribution networks designed for one-way power flow from the generator to residential customers via transmission and distribution networks. For grid-connected installations, large amounts of generation during low load periods or intermittent generation can lead to a difficulty in balancing supply and demand, maintaining voltage and frequency stability, and may even result in outages due to overvoltage conditions tripping protection circuits. In this paper, we present four control methodologies to mitigate these difficulties using small-scale distributed battery storage. These four approaches represent three different control architectures: 1) centralized; 2) decentralized; and 3) distributed control. These approaches are validated and compared using data on load and generation profiles from customers in an Australian electricity distribution network.


IEEE Transactions on Automatic Control | 1999

Limiting zeros of decouplable MIMO systems

Steven R. Weller

For sufficiently rapid zero-order hold (ZOH) sampling, it is known that the zeros of single-input/single-output discrete-time systems expressed in the forward shift operator converge to values determined only by the degrees of the finite and infinite zeros of the underlying continuous-time system. In this paper, it is shown how this result can be generalized to multi-input/multi-output (MIMO) systems decouplable by static-state feedback (equivalently, having a diagonal interactor matrix). In the fast sampling limit, the authors show how invariant and infinite zero structure is mapped under ZOH sampling for discrete-time systems expressed in either the delta (forward difference) or forward shift operators.


IEEE Transactions on Communications | 2003

Resolvable 2-designs for regular low-density parity-check codes

Sarah J. Johnson; Steven R. Weller

This paper extends the class of low-density parity-check (LDPC) codes that can be algebraically constructed. We present regular LDPC codes based on resolvable Steiner 2-designs which have Tanner graphs free of four-cycles. The resulting codes are (3, /spl rho/)-regular or (4, /spl rho/)-regular for any value of /spl rho/ and for a flexible choice of code lengths.


IEEE Transactions on Smart Grid | 2017

A Review of False Data Injection Attacks Against Modern Power Systems

Gaoqi Liang; Junhua Zhao; Fengji Luo; Steven R. Weller; Zhao Yang Dong

With rapid advances in sensor, computer, and communication networks, modern power systems have become complicated cyber-physical systems. Assessing and enhancing cyber-physical system security is, therefore, of utmost importance for the future electricity grid. In a successful false data injection attack (FDIA), an attacker compromises measurements from grid sensors in such a way that undetected errors are introduced into estimates of state variables such as bus voltage angles and magnitudes. In evading detection by commonly employed residue-based bad data detection tests, FDIAs are capable of severely threatening power system security. Since the first published research on FDIAs in 2009, research into FDIA-based cyber-attacks has been extensive. This paper gives a comprehensive review of state-of-the-art in FDIAs against modern power systems. This paper first summarizes the theoretical basis of FDIAs, and then discusses both the physical and the economic impacts of a successful FDIA. This paper presents the basic defense strategies against FDIAs and discusses some potential future research directions in this field.


IEEE Transactions on Power Systems | 2017

The 2015 Ukraine Blackout: Implications for False Data Injection Attacks

Gaoqi Liang; Steven R. Weller; Junhua Zhao; Fengji Luo; Zhao Yang Dong

In a false data injection attack (FDIA), an adversary stealthily compromises measurements from electricity grid sensors in a coordinated fashion, with a view to evading detection by the power system bad data detection module. A successful FDIA can cause the system operator to perform control actions that compromise either the physical or economic operation of the power system. In this letter, we consider some implications for FDIAs arising from the late 2015 Ukraine Blackout event.

Collaboration


Dive into the Steven R. Weller's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Lars Grüne

University of Bayreuth

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Karl Worthmann

Technische Universität Ilmenau

View shared research outputs
Top Co-Authors

Avatar

Zhao Yang Dong

University of New South Wales

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Timm Faulwasser

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Gaoqi Liang

University of Newcastle

View shared research outputs
Researchain Logo
Decentralizing Knowledge