期刊文献+
共找到1,260,423篇文章
< 1 2 250 >
每页显示 20 50 100
Finite-time Prescribed Performance Time-Varying Formation Control for Second-Order Multi-Agent Systems With Non-Strict Feedback Based on a Neural Network Observer 被引量:1
1
作者 Chi Ma Dianbiao Dong 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期1039-1050,共12页
This paper studies the problem of time-varying formation control with finite-time prescribed performance for nonstrict feedback second-order multi-agent systems with unmeasured states and unknown nonlinearities.To eli... This paper studies the problem of time-varying formation control with finite-time prescribed performance for nonstrict feedback second-order multi-agent systems with unmeasured states and unknown nonlinearities.To eliminate nonlinearities,neural networks are applied to approximate the inherent dynamics of the system.In addition,due to the limitations of the actual working conditions,each follower agent can only obtain the locally measurable partial state information of the leader agent.To address this problem,a neural network state observer based on the leader state information is designed.Then,a finite-time prescribed performance adaptive output feedback control strategy is proposed by restricting the sliding mode surface to a prescribed region,which ensures that the closed-loop system has practical finite-time stability and that formation errors of the multi-agent systems converge to the prescribed performance bound in finite time.Finally,a numerical simulation is provided to demonstrate the practicality and effectiveness of the developed algorithm. 展开更多
关键词 Finite-time control multi-agent systems neural network prescribed performance control time-varying formation control
下载PDF
The optimal atropine concentration for myopia control in Chinese children: a systematic review and network Metaanalysis 被引量:1
2
作者 Xiao-Yan Wang Hong-Wei Deng +7 位作者 Jian Yang Xue-Mei Zhu Feng-Ling Xiang Jing Tu Ming-Xue Huang Yun Wang Jin-Hua Gan Wei-Hua Yang 《International Journal of Ophthalmology(English edition)》 SCIE CAS 2024年第6期1128-1137,共10页
AIM:To figure out whether various atropine dosages may slow the progression of myopia in Chinese kids and teenagers and to determine the optimal atropine concentration for effectively slowing the progression of myopia... AIM:To figure out whether various atropine dosages may slow the progression of myopia in Chinese kids and teenagers and to determine the optimal atropine concentration for effectively slowing the progression of myopia.METHODS:A systematic search was conducted across the Cochrane Library,PubMed,Web of Science,EMBASE,CNKI,CBM,VIP,and Wanfang database,encompassing literature on slowing progression of myopia with varying atropine concentrations from database inception to January 17,2024.Data extraction and quality assessment were performed,and a network Meta-analysis was executed using Stata version 14.0 Software.Results were visually represented through graphs.RESULTS:Fourteen papers comprising 2475 cases were included;five different concentrations of atropine solution were used.The network Meta-analysis,along with the surface under the cumulative ranking curve(SUCRA),showed that 1%atropine(100%)>0.05%atropine(74.9%)>0.025%atropine(51.6%)>0.02%atropine(47.9%)>0.01%atropine(25.6%)>control in refraction change and 1%atropine(98.7%)>0.05%atropine(70.4%)>0.02%atropine(61.4%)>0.025%atropine(42%)>0.01%atropine(27.4%)>control in axial length(AL)change.CONCLUSION:In Chinese children and teenagers,the five various concentrations of atropine can reduce the progression of myopia.Although the network Meta-analysis showed that 1%atropine is the best one for controlling refraction and AL change,there is a high incidence of adverse effects with the use of 1%atropine.Therefore,we suggest that 0.05%atropine is optimal for Chinese children to slow myopia progression. 展开更多
关键词 ATROPINE China children and adolescents MYOPIA network Meta-analysis
下载PDF
Ultimately Bounded Output Feedback Control for Networked Nonlinear Systems With Unreliable Communication Channel: A Buffer-Aided Strategy
3
作者 Yuhan Zhang Zidong Wang +2 位作者 Lei Zou Yun Chen Guoping Lu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第7期1566-1578,共13页
This paper concerns ultimately bounded output-feedback control problems for networked systems with unknown nonlinear dynamics. Sensor-to-observer signal transmission is facilitated over networks that has communication... This paper concerns ultimately bounded output-feedback control problems for networked systems with unknown nonlinear dynamics. Sensor-to-observer signal transmission is facilitated over networks that has communication constraints.These transmissions are carried out over an unreliable communication channel. In order to enhance the utilization rate of measurement data, a buffer-aided strategy is novelly employed to store historical measurements when communication networks are inaccessible. Using the neural network technique, a novel observer-based controller is introduced to address effects of signal transmission behaviors and unknown nonlinear dynamics.Through the application of stochastic analysis and Lyapunov stability, a joint framework is constructed for analyzing resultant system performance under the introduced controller. Subsequently, existence conditions for the desired output-feedback controller are delineated. The required parameters for the observerbased controller are then determined by resolving some specific matrix inequalities. Finally, a simulation example is showcased to confirm method efficacy. 展开更多
关键词 Buffer-aided strategy neural networks nonlinear control output-feedback control unreliable communication channel
下载PDF
Time-varying parameters estimation with adaptive neural network EKF for missile-dual control system
4
作者 YUAN Yuqi ZHOU Di +1 位作者 LI Junlong LOU Chaofei 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期451-462,共12页
In this paper, a filtering method is presented to estimate time-varying parameters of a missile dual control system with tail fins and reaction jets as control variables. In this method, the long-short-term memory(LST... In this paper, a filtering method is presented to estimate time-varying parameters of a missile dual control system with tail fins and reaction jets as control variables. In this method, the long-short-term memory(LSTM) neural network is nested into the extended Kalman filter(EKF) to modify the Kalman gain such that the filtering performance is improved in the presence of large model uncertainties. To avoid the unstable network output caused by the abrupt changes of system states,an adaptive correction factor is introduced to correct the network output online. In the process of training the network, a multi-gradient descent learning mode is proposed to better fit the internal state of the system, and a rolling training is used to implement an online prediction logic. Based on the Lyapunov second method, we discuss the stability of the system, the result shows that when the training error of neural network is sufficiently small, the system is asymptotically stable. With its application to the estimation of time-varying parameters of a missile dual control system, the LSTM-EKF shows better filtering performance than the EKF and adaptive EKF(AEKF) when there exist large uncertainties in the system model. 展开更多
关键词 long-short-term memory(LSTM)neural network extended Kalman filter(EKF) rolling training time-varying parameters estimation missile dual control system
下载PDF
Observer-based dynamic event-triggered control for distributed parameter systems over mobile sensor-plus-actuator networks
5
作者 穆文英 庄波 邱芳 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期237-243,共7页
We develop a policy of observer-based dynamic event-triggered state feedback control for distributed parameter systems over a mobile sensor-plus-actuator network.It is assumed that the mobile sensing devices that prov... We develop a policy of observer-based dynamic event-triggered state feedback control for distributed parameter systems over a mobile sensor-plus-actuator network.It is assumed that the mobile sensing devices that provide spatially averaged state measurements can be used to improve state estimation in the network.For the purpose of decreasing the update frequency of controller and unnecessary sampled data transmission, an efficient dynamic event-triggered control policy is constructed.In an event-triggered system, when an error signal exceeds a specified time-varying threshold, it indicates the occurrence of a typical event.The global asymptotic stability of the event-triggered closed-loop system and the boundedness of the minimum inter-event time can be guaranteed.Based on the linear quadratic optimal regulator, the actuator selects the optimal displacement only when an event occurs.A simulation example is finally used to verify that the effectiveness of such a control strategy can enhance the system performance. 展开更多
关键词 distributed parameter systems event-triggered control mobile sensors mobile actuators
下载PDF
Novel Adaptive Memory Event-Triggered-Based Fuzzy Robust Control for Nonlinear Networked Systems via the Differential Evolution Algorithm
6
作者 Wei Qian Yanmin Wu Bo Shen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第8期1836-1848,共13页
This article mainly investigates the fuzzy optimization robust control issue for nonlinear networked systems characterized by the interval type-2(IT2)fuzzy technique under a differential evolution algorithm.To provide... This article mainly investigates the fuzzy optimization robust control issue for nonlinear networked systems characterized by the interval type-2(IT2)fuzzy technique under a differential evolution algorithm.To provide a more reasonable utilization of the constrained communication channel,a novel adaptive memory event-triggered(AMET)mechanism is developed,where two event-triggered thresholds can be dynamically adjusted in the light of the current system information and the transmitted historical data.Sufficient conditions with less conservative design of the fuzzy imperfect premise matching(IPM)controller are presented by introducing the Wirtinger-based integral inequality,the information of membership functions(MFs)and slack matrices.Subsequently,under the IPM policy,a new MFs intelligent optimization technique that takes advantage of the differential evolution algorithm is first provided for IT2 TakagiSugeno(T-S)fuzzy systems to update the fuzzy controller MFs in real-time and achieve a better system control effect.Finally,simulation results demonstrate that the proposed control scheme can obtain better system performance in the case of using fewer communication resources. 展开更多
关键词 Adaptive memory event-triggered(AMET) differential evolution algorithm fuzzy optimization robust control interval type-2(IT2)fuzzy technique.
下载PDF
Quantization and Event-Triggered Policy Design for Encrypted Networked Control
7
作者 Yongxia Shi Ehsan Nekouei 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期946-955,共10页
This paper proposes a novel event-driven encrypted control framework for linear networked control systems(NCSs),which relies on two modified uniform quantization policies,the Paillier cryptosystem,and an event-trigger... This paper proposes a novel event-driven encrypted control framework for linear networked control systems(NCSs),which relies on two modified uniform quantization policies,the Paillier cryptosystem,and an event-triggered strategy.Due to the fact that only integers can work in the Pailler cryptosystem,both the real-valued control gain and system state need to be first quantized before encryption.This is dramatically different from the existing quantized control methods,where only the quantization of a single value,e.g.,the control input or the system state,is considered.To handle this issue,static and dynamic quantization policies are presented,which achieve the desired integer conversions and guarantee asymptotic convergence of the quantized system state to the equilibrium.Then,the quantized system state is encrypted and sent to the controller when the triggering condition,specified by a state-based event-triggered strategy,is satisfied.By doing so,not only the security and confidentiality of data transmitted over the communication network are protected,but also the ciphertext expansion phenomenon can be relieved.Additionally,by tactfully designing the quantization sensitivities and triggering error,the proposed event-driven encrypted control framework ensures the asymptotic stability of the overall closedloop system.Finally,a simulation example of the secure motion control for an inverted pendulum cart system is presented to evaluate the effectiveness of the theoretical results. 展开更多
关键词 Cyber-security encrypted control event-triggered control(ETC) networked control systems(NCSs) semi-homomorphic encryption
下载PDF
Self-Triggered Set Stabilization of Boolean Control Networks and Its Applications
8
作者 Rong Zhao Jun-e Feng Dawei Zhang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第7期1631-1642,共12页
Set stabilization is one of the essential problems in engineering systems, and self-triggered control(STC) can save the storage space for interactive information, and can be successfully applied in networked control s... Set stabilization is one of the essential problems in engineering systems, and self-triggered control(STC) can save the storage space for interactive information, and can be successfully applied in networked control systems with limited communication resources. In this study, the set stabilization problem and STC design of Boolean control networks are investigated via the semi-tensor product technique. On the one hand, the largest control invariant subset is calculated in terms of the strongly connected components of the state transition graph, by which a graph-theoretical condition for set stabilization is derived. On the other hand, a characteristic function is exploited to determine the triggering mechanism and feasible controls. Based on this, the minimum-time and minimum-triggering open-loop, state-feedback and output-feedback STCs for set stabilization are designed,respectively. As classic applications of self-triggered set stabilization, self-triggered synchronization, self-triggered output tracking and self-triggered output regulation are discussed as well. Additionally, several practical examples are given to illustrate the effectiveness of theoretical results. 展开更多
关键词 Boolean control networks(BCNs) output regulation self-triggered control semi-tensor product of matrices set stabilization SYNCHRONIZATION
下载PDF
The Effect of Key Nodes on theMalware Dynamics in the Industrial Control Network
9
作者 Qiang Fu JunWang +1 位作者 Changfu Si Jiawei Liu 《Computers, Materials & Continua》 SCIE EI 2024年第4期329-349,共21页
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is be... As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network. 展开更多
关键词 Key nodes dynamic model industrial control network SIMULATION
下载PDF
Cluster DetectionMethod of Endogenous Security Abnormal Attack Behavior in Air Traffic Control Network
10
作者 Ruchun Jia Jianwei Zhang +2 位作者 Yi Lin Yunxiang Han Feike Yang 《Computers, Materials & Continua》 SCIE EI 2024年第5期2523-2546,共24页
In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set f... In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set for ATC cybersecurity attacks is constructed by setting the feature states,adding recursive features,and determining the feature criticality.The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data.An autoencoder is introduced into the AI(artificial intelligence)algorithm to encode and decode the characteristics of ATC network security attack behavior to reduce the dimensionality of the ATC network security attack behavior data.Based on the above processing,an unsupervised learning algorithm for clustering detection of ATC network security attacks is designed.First,determine the distance between the clustering clusters of ATC network security attack behavior characteristics,calculate the clustering threshold,and construct the initial clustering center.Then,the new average value of all feature objects in each cluster is recalculated as the new cluster center.Second,it traverses all objects in a cluster of ATC network security attack behavior feature data.Finally,the cluster detection of ATC network security attack behavior is completed by the computation of objective functions.The experiment took three groups of experimental attack behavior data sets as the test object,and took the detection rate,false detection rate and recall rate as the test indicators,and selected three similar methods for comparative test.The experimental results show that the detection rate of this method is about 98%,the false positive rate is below 1%,and the recall rate is above 97%.Research shows that this method can improve the detection performance of security attacks in air traffic control network. 展开更多
关键词 Air traffic control network security attack behavior cluster detection behavioral characteristics information gain cluster threshold automatic encoder
下载PDF
Vibration Control of A Flexible Marine Riser System Subject to Input Dead Zone and Extraneous Disturbances 被引量:1
11
作者 ZHOU Li WANG Guo-rong WAN Min 《China Ocean Engineering》 SCIE EI CSCD 2024年第2期271-284,共14页
An observer-based adaptive backstepping boundary control is proposed for vibration control of flexible offshore riser systems with unknown nonlinear input dead zone and uncertain environmental disturbances.The control... An observer-based adaptive backstepping boundary control is proposed for vibration control of flexible offshore riser systems with unknown nonlinear input dead zone and uncertain environmental disturbances.The control algorithm can update the control law online through real-time data to make the controller adapt to the environment and improve the control precision.Specifically,based on the adaptive backstepping framework,virtual control laws and Lyapunov functions are designed for each subsystem.Three direction interference observers are designed to track the timevarying boundary disturbance.On this basis,the inverse of the dead zone and linear state transformation are used to compensate for the original system and eliminate the adverse effects of the dead zone.In addition,the stability of the closed-loop system is proven by Lyapunov stability theory.All the system states are bounded,and the vibration offset of the riser converges to a small area of the initial position.Finally,four examples of flexible marine risers are simulated in MATLAB to verify the effectiveness of the proposed controller. 展开更多
关键词 adaptive backstepping control disturbance observer flexible marine riser input dead zone vibration control
下载PDF
IDS-INT:Intrusion detection system using transformer-based transfer learning for imbalanced network traffic 被引量:3
12
作者 Farhan Ullah Shamsher Ullah +1 位作者 Gautam Srivastava Jerry Chun-Wei Lin 《Digital Communications and Networks》 SCIE CSCD 2024年第1期190-204,共15页
A network intrusion detection system is critical for cyber security against llegitimate attacks.In terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a... A network intrusion detection system is critical for cyber security against llegitimate attacks.In terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a subcategory of attack,host information,malicious scripts,etc.In terms of network perspectives,network traffic may contain an imbalanced number of harmful attacks when compared to normal traffic.It is challenging to identify a specific attack due to complex features and data imbalance issues.To address these issues,this paper proposes an Intrusion Detection System using transformer-based transfer learning for Imbalanced Network Traffic(IDS-INT).IDS-INT uses transformer-based transfer learning to learn feature interactions in both network feature representation and imbalanced data.First,detailed information about each type of attack is gathered from network interaction descriptions,which include network nodes,attack type,reference,host information,etc.Second,the transformer-based transfer learning approach is developed to learn detailed feature representation using their semantic anchors.Third,the Synthetic Minority Oversampling Technique(SMOTE)is implemented to balance abnormal traffic and detect minority attacks.Fourth,the Convolution Neural Network(CNN)model is designed to extract deep features from the balanced network traffic.Finally,the hybrid approach of the CNN-Long Short-Term Memory(CNN-LSTM)model is developed to detect different types of attacks from the deep features.Detailed experiments are conducted to test the proposed approach using three standard datasets,i.e.,UNsWNB15,CIC-IDS2017,and NSL-KDD.An explainable AI approach is implemented to interpret the proposed method and develop a trustable model. 展开更多
关键词 network intrusion detection Transfer learning Features extraction Imbalance data Explainable AI CYBERSECURITY
下载PDF
An Integrated Control Framework for Torque Vectoring and Active Suspension System 被引量:1
13
作者 Jiwei Feng Jinhao Liang +6 位作者 Yanbo Lu Weichao Zhuang Dawei Pi Guodong Yin Liwei Xu Pai Peng Chaobin Zhou 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2024年第1期62-73,共12页
Four-wheel independently driven electric vehicles(FWID-EV)endow a flexible and scalable control framework to improve vehicle performance.This paper integrates the torque vectoring and active suspension system(ASS)to e... Four-wheel independently driven electric vehicles(FWID-EV)endow a flexible and scalable control framework to improve vehicle performance.This paper integrates the torque vectoring and active suspension system(ASS)to enhance the vehicle’s longitudinal and vertical motion control performance.While the nonlinear characteristic of the tire model leads to a relatively heavier computational burden.To facilitate the controller design and ease the load,a half-vehicle dynamics system is built and simplified to the linear-time-varying(LTV)model.Then a model predictive controller is developed by formulating the objective function by comprehensively considering the safety,energy-saving and comfort requirements.The in-wheel motor efficiency and the power loss of tire slip are treated as optimization indices in this work to reduce energy consumption.Finally,the effectiveness of the proposed controller is verified through the rapid-control-prototype(RCP)test.The results demonstrate the enhancement of the energy-saving as well as comfort on the basis of vehicle stability. 展开更多
关键词 Four-wheel independently driven electric vehicles Tire nonlinearity Linear-time-varying(LTV)model Model predictive control Rapid control prototype
下载PDF
A Fractional-Order Ultra-Local Model-Based Adaptive Neural Network Sliding Mode Control of n-DOF Upper-Limb Exoskeleton With Input Deadzone
14
作者 Dingxin He HaoPing Wang +1 位作者 Yang Tian Yida Guo 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第3期760-781,共22页
This paper proposes an adaptive neural network sliding mode control based on fractional-order ultra-local model for n-DOF upper-limb exoskeleton in presence of uncertainties,external disturbances and input deadzone.Co... This paper proposes an adaptive neural network sliding mode control based on fractional-order ultra-local model for n-DOF upper-limb exoskeleton in presence of uncertainties,external disturbances and input deadzone.Considering the model complexity and input deadzone,a fractional-order ultra-local model is proposed to formulate the original dynamic system for simple controller design.Firstly,the control gain of ultra-local model is considered as a constant.The fractional-order sliding mode technique is designed to stabilize the closed-loop system,while fractional-order time-delay estimation is combined with neural network to estimate the lumped disturbance.Correspondingly,a fractional-order ultra-local model-based neural network sliding mode controller(FO-NNSMC) is proposed.Secondly,to avoid disadvantageous effect of improper gain selection on the control performance,the control gain of ultra-local model is considered as an unknown parameter.Then,the Nussbaum technique is introduced into the FO-NNSMC to deal with the stability problem with unknown gain.Correspondingly,a fractional-order ultra-local model-based adaptive neural network sliding mode controller(FO-ANNSMC) is proposed.Moreover,the stability analysis of the closed-loop system with the proposed method is presented by using the Lyapunov theory.Finally,with the co-simulations on virtual prototype of 7-DOF iReHave upper-limb exoskeleton and experiments on 2-DOF upper-limb exoskeleton,the obtained compared results illustrate the effectiveness and superiority of the proposed method. 展开更多
关键词 Adaptive control input deadzone model-free control n-DOF upper-limb exoskeleton neural network
下载PDF
Deep Learning Social Network Access Control Model Based on User Preferences
15
作者 Fangfang Shan Fuyang Li +3 位作者 Zhenyu Wang Peiyu Ji Mengyi Wang Huifang Sun 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1029-1044,共16页
A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social netw... A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social networkandused to construct homogeneous and heterogeneous graphs.Secondly,a graph neural networkmodel is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network.Then,high-order neighbor nodes,hidden neighbor nodes,displayed neighbor nodes,and social data nodes are used to update user nodes to expand the depth and breadth of user preferences.Finally,a multi-layer attention network is used to classify user nodes in the homogeneous graph into two classes:allow access and deny access.The fine-grained access control problem in social networks is transformed into a node classification problem in a graph neural network.The model is validated using a dataset and compared with other methods without losing generality.The model improved accuracy by 2.18%compared to the baseline method GraphSAGE,and improved F1 score by 1.45%compared to the baseline method,verifying the effectiveness of the model. 展开更多
关键词 Graph neural networks user preferences access control social network
下载PDF
Consensus of networked control multi-agent systems using a double-layer encryption scheme 被引量:1
16
作者 Yamin Yan Zhiyong Chen Vijay Varadharajan 《Journal of Automation and Intelligence》 2023年第4期218-226,共9页
This paper addresses the decentralized consensus problem for a system of multiple dynamic agents with remote controllers via networking,known as a networked control multi-agent system(NCMAS).It presents a challenging ... This paper addresses the decentralized consensus problem for a system of multiple dynamic agents with remote controllers via networking,known as a networked control multi-agent system(NCMAS).It presents a challenging scenario where partial dynamic entities or remote control units are vulnerable to disclosure attacks,making them potentially malicious.To tackle this issue,we propose a secure decentralized control design approach employing a double-layer cryptographic strategy.This approach not only ensures that the input and output information of the benign entities remains protected from the malicious entities but also practically achieves consensus performance.The paper provides an explicit design,supported by theoretical proof and numerical verification,covering stability,steady-state error,and the prevention of computation overflow or underflow. 展开更多
关键词 Multi-agent systems networked control Cyberphysical security Encryption CONSENSUS
下载PDF
Data-Driven Control of Distributed Event-Triggered Network Systems 被引量:7
17
作者 Xin Wang Jian Sun +2 位作者 Gang Wang Frank Allgower Jie Chen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第2期351-364,共14页
The present paper deals with data-driven event-triggered control of a class of unknown discrete-time interconnected systems(a.k.a.network systems).To this end,we start by putting forth a novel distributed event-trigge... The present paper deals with data-driven event-triggered control of a class of unknown discrete-time interconnected systems(a.k.a.network systems).To this end,we start by putting forth a novel distributed event-triggering transmission strategy based on periodic sampling,under which a model-based stability criterion for the closed-loop network system is derived,by leveraging a discrete-time looped-functional approach.Marrying the model-based criterion with a data-driven system representation recently developed in the literature,a purely data-driven stability criterion expressed in the form of linear matrix inequalities(LMIs)is established.Meanwhile,the data-driven stability criterion suggests a means for co-designing the event-triggering coefficient matrix and the feedback control gain matrix using only some offline collected state-input data.Finally,numerical results corroborate the efficacy of the proposed distributed data-driven event-triggered network system(ETS)in cutting off data transmissions and the co-design procedure. 展开更多
关键词 Data-driven control distributed event-triggered network system(ETS) linear matrix inequalitie(LMI) looped-functional STABILITY
下载PDF
Tracking Control of Multi-Agent Systems Using a Networked Predictive PID Tracking Scheme 被引量:2
18
作者 Guo-Ping Liu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第1期216-225,共10页
With the rapid development of network technology and control technology,a networked multi-agent control system is a key direction of modern industrial control systems,such as industrial Internet systems.This paper stu... With the rapid development of network technology and control technology,a networked multi-agent control system is a key direction of modern industrial control systems,such as industrial Internet systems.This paper studies the tracking control problem of networked multi-agent systems with communication constraints,where each agent has no information on the dynamics of other agents except their outputs.A networked predictive proportional integral derivative(PPID)tracking scheme is proposed to achieve the desired tracking performance,compensate actively for communication delays,and simplify implementation in a distributed manner.This scheme combines the past,present and predictive information of neighbour agents to form a tracking error signal for each agent,and applies the proportional,integral,and derivative of the agent tracking error signal to control each individual agent.The criteria of the stability and output tracking consensus of multi-agent systems with the networked PPID tracking scheme are derived through detailed analysis on the closed-loop systems.The effectiveness of the networked PPID tracking scheme is illustrated via an example. 展开更多
关键词 Coordinative tracking control networked multiagent systems PID control predictive control
下载PDF
Target Controllability of Multi-Layer Networks With High-Dimensional Nodes
19
作者 Lifu Wang Zhaofei Li +1 位作者 Ge Guo Zhi Kong 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第9期1999-2010,共12页
This paper studies the target controllability of multilayer complex networked systems,in which the nodes are highdimensional linear time invariant(LTI)dynamical systems,and the network topology is directed and weighte... This paper studies the target controllability of multilayer complex networked systems,in which the nodes are highdimensional linear time invariant(LTI)dynamical systems,and the network topology is directed and weighted.The influence of inter-layer couplings on the target controllability of multi-layer networks is discussed.It is found that even if there exists a layer which is not target controllable,the entire multi-layer network can still be target controllable due to the inter-layer couplings.For the multi-layer networks with general structure,a necessary and sufficient condition for target controllability is given by establishing the relationship between uncontrollable subspace and output matrix.By the derived condition,it can be found that the system may be target controllable even if it is not state controllable.On this basis,two corollaries are derived,which clarify the relationship between target controllability,state controllability and output controllability.For the multi-layer networks where the inter-layer couplings are directed chains and directed stars,sufficient conditions for target controllability of networked systems are given,respectively.These conditions are easier to verify than the classic criterion. 展开更多
关键词 High-dimensional nodes inter-layer couplings multi-layer networks target controllability
下载PDF
Review on uncertainty analysis and information fusion diagnosis of aircraft control system
20
作者 ZHOU Keyi LU Ningyun +1 位作者 JIANG Bin MENG Xianfeng 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第5期1245-1263,共19页
In the aircraft control system,sensor networks are used to sample the attitude and environmental data.As a result of the external and internal factors(e.g.,environmental and task complexity,inaccurate sensing and comp... In the aircraft control system,sensor networks are used to sample the attitude and environmental data.As a result of the external and internal factors(e.g.,environmental and task complexity,inaccurate sensing and complex structure),the aircraft control system contains several uncertainties,such as imprecision,incompleteness,redundancy and randomness.The information fusion technology is usually used to solve the uncertainty issue,thus improving the sampled data reliability,which can further effectively increase the performance of the fault diagnosis decision-making in the aircraft control system.In this work,we first analyze the uncertainties in the aircraft control system,and also compare different uncertainty quantitative methods.Since the information fusion can eliminate the effects of the uncertainties,it is widely used in the fault diagnosis.Thus,this paper summarizes the recent work in this aera.Furthermore,we analyze the application of information fusion methods in the fault diagnosis of the aircraft control system.Finally,this work identifies existing problems in the use of information fusion for diagnosis and outlines future trends. 展开更多
关键词 aircraft control system sensor networks information fusion fault diagnosis UNCERTAINTY
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部