Skip to content

Commit 35bab86

Browse files
twin mpc thesis
1 parent 434353e commit 35bab86

File tree

1 file changed

+22
-17
lines changed

1 file changed

+22
-17
lines changed

thesis.md

Lines changed: 22 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -6,32 +6,37 @@ permalink: /thesis
66

77
<style>
88
#master_thesis ul > li {
9-
margin-bottom: 1.2em;
9+
margin-bottom: 1.5em;
1010
}
1111
</style>
1212

13-
1413
<section id="master_thesis">
1514
<h2>2025</h2>
1615
<ul>
16+
17+
<li>
18+
<strong>Twin-embedded MPC for longitudinal/lateral vehicle control</strong><br><br>
19+
Development of a high-fidelity, physics-based vehicle dynamics simulator in Modelica/Dymola, integrated with a digital twin for predictive control tasks.<br><br>
20+
<strong>Key question: Can we reliably initialize a simulator using observed vehicle states?</strong><br><br>
21+
<strong>Tools & Skills:</strong> Modelica/Dymola, Python, Matlab, Simulink<br><br>
22+
<ul>
23+
<li><em>Development of physics-based and data-driven digital twins</em></li>
24+
<li><em>Integration with Model Predictive Control frameworks</em></li>
25+
<li><em>Testing in simulation with potential deployment on HIL platforms</em></li>
26+
</ul>
27+
</li>
28+
1729
<li>
1830
<strong>Man-in-the-Middle (MiTM) Attack Detection [Cybersecurity/ML]</strong><br><br>
19-
Development of MITM attacks detection algorithms for Resilient Predictive Control<br><br>
20-
<strong>Kali Linux - Python - PyTorch/Tensorflow - Wireshark - Matlab - Simulink</strong><br><br>
31+
Development of detection algorithms against MiTM attacks on control systems, focusing on resilient predictive controllers.<br><br>
32+
<strong>Tools & Skills:</strong> Kali Linux, Python, PyTorch/TensorFlow, Wireshark, Matlab, Simulink<br><br>
2133
<ul>
22-
<li>
23-
<em>Experimental deployment on actual networks</em><br>
24-
</li>
25-
<li>
26-
<em>Communication protocol in depth-study</em><br>
27-
</li>
28-
<li>
29-
<em>Machine learning algorithms development</em><br>
30-
</li>
31-
<li>
32-
<em>Resilient predictive controller development</em><br>
33-
</li>
34-
</ul>
34+
<li><em>Experimental deployment on actual networks</em></li>
35+
<li><em>In-depth study of industrial communication protocols</em></li>
36+
<li><em>Development of ML-based intrusion detection algorithms</em></li>
37+
<li><em>Design and testing of resilient predictive controllers under attack</em></li>
38+
</ul>
3539
</li>
40+
3641
</ul>
3742
</section>

0 commit comments

Comments
 (0)