You are on page 1of 8

SHANGHAI JIAO TONG UNIVERSITY

本科生毕业设计(论文)中期检查报告

论文题目:控制信息泄露情况下的无人系统安全控制器设计
研究

学生姓名: 王艺霏
学生学号: 520021910622
专 业: 信息工程(中法合作办学)
指导教师: 殷翔
学院(系): 巴黎卓越工程师学院
教务处制表

填表说明

1. 请每位学生根据学校及院(系)检查的要求认真进行自查,及时

发现课题研究过程中存在的问题,分析原因,并提出解决思路和

措施,明确下一阶段任务。

2. 每位学生应根据项目实施情况认真、实事求是填写。填写字体请

用宋体小四号,并用 A4 纸打印,于左侧装订成册。

3. 毕业设计(论文)中期检查报告总字数应满足本院(系)要求。

4. 该表填写完毕后,须请指导教师审核,并签署意见。

5. 《上海交通大学本科生毕业设计(论文)中期检查报告》将作为

答辩资格审查的主要材料之一。

6. 本表格不够可自行扩页。
毕业设计(论文)中期检查报告

课题进展情况:

1. Sufficient preliminary research and relevant literature reading have


been completed, including formal methods, predictive online monitoring,
accessibility analysis, etc. The proposal report has been completed,
including research purpose, significance and methods, and research
summary.
2. Preliminarily constructed a self-triggered online monitoring
algorithm for dynamic systems oriented to signal timing logic tasks, and
implemented a self-triggering monitoring mechanism based on the standard
algorithm for signal timing logic online monitoring.
毕业设计(论文)中期检查报告

课题研究已取得的阶段性成果:

1.We define and give the necessary preliminaries of labeled transition


system model, deterministic controller in the context of LTS , and
decision-based transmission opacity in the context of deterministic
controller. Briefly, we define a deterministic control policy as a
function that maps a string of state to a transition action. The intruder
is defined with the capabilities of knowing the system and the
functionality of the control policy, and its observation history can be
defined as an extended function of the control policy. A system is
decision-based transmission opaque with respect to a secret state if the
intruder cannot infer for sure that the system is currently in a secret
state based its observation history on the control orders.

2.We formulate the definition of non-deterministic controller in the


context of LTS . Then the respective definitions of intruders and opacity
are reformulated in the context of non-deterministic controller. The
intruder is assumed to know the functionality of the supervisor. That
is, the intruder knows the set of all control decisions the supervisor
may pick according to the control policy,however, it does not know which
specific control decision the supervisor picks online. We then gave the
expression of the intruder's state estimation by recursion.
毕业设计(论文)中期检查报告

存在的问题及解决思路:

Existing problem: The symbols and mathematical expressions of the


unmanned system safety controller in the case of control information
leakage are not standardized enough, which leads to the lack of strict
mathematical proof of correctness and convergence of the proposed
self-triggered online monitoring algorithm.

Solution idea: Improve the symbolic definition and iteration method of


belief state space, and find a mathematical method to prove the necessity
and sufficiency.
毕业设计(论文)中期检查报告

下一阶段的工作计划和研究内容:

Configure the virtual environment required to run the code, build a


suitable framework for writing algorithms, conduct preliminary testing
through simulation experiments, and collect experimental data.
毕业设计(论文)中期检查报告

指导教师意见:

研究进展顺利,已经完成了阶段性的目标和要求,接下来拟进行论文整理和撰
写,中期考核同意通过。

指导教师签名:殷翔

2024 年 04 月 15 日

学院(系)意见:

同意通过。

审 查 结 果: ☑ 同 意 □ 不 同 意

学院(系)负责人签名:陆佳亮

2024 年 04 月 15 日

You might also like