Pub Date : 2023-10-31DOI: 10.1080/23307706.2023.2261939
Xingyuan Yang, Xi Tong, Yangwang Fang
{"title":"Robust control allocation method for uncertain systems based on the algorithms of maximum–minimum and improved fish swarm","authors":"Xingyuan Yang, Xi Tong, Yangwang Fang","doi":"10.1080/23307706.2023.2261939","DOIUrl":"https://doi.org/10.1080/23307706.2023.2261939","url":null,"abstract":"","PeriodicalId":37267,"journal":{"name":"Journal of Control and Decision","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135871263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-30DOI: 10.1080/23307706.2023.2271899
Dimplekumar Chalishajar, Ravikumar Kasinathan, Ramkumar Kasinathan, Dhanalakshmi Kasinathan, John A. David
{"title":"Trajectory controllability of neutral stochastic integrodifferential equations with mixed fractional Brownian motion","authors":"Dimplekumar Chalishajar, Ravikumar Kasinathan, Ramkumar Kasinathan, Dhanalakshmi Kasinathan, John A. David","doi":"10.1080/23307706.2023.2271899","DOIUrl":"https://doi.org/10.1080/23307706.2023.2271899","url":null,"abstract":"","PeriodicalId":37267,"journal":{"name":"Journal of Control and Decision","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136070356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-29DOI: 10.1080/23307706.2023.2266697
Ling Chen, Mingchu Li
AbstractWe introduce a general multi-defender Stackelberg security game where multiple independent defenders jointly protect a same set of targets from being attacked by a common attacker. In the game, Strong Stackelberg Equilibrium is fundamentally problematic, because the notion of ‘breaking ties in defender's favour’ is no longer well defined, as we must specify which defender will receive the favour. To address this issue, we define a new equilibrium concept under a newly defined tie-breaking rule. We characterise Logit Stackelberg Multi-Defender Equilibrium, corresponding to a logit tie-breaking rule, as well as an equivalent Nash Equilibrium among defenders, and exhibit algorithms for computing the equilibrium solutions. We find that Logit Stackelberg Multi-Defender Equilibrium and its' equivalent Nash Equilibrium may not exist, which motivates us to find an approximate equilibrium. We design a revised exclusion algorithm to find the approximate ε-Nash Equilibrium in which no defender gains more than ε by deviating.KEYWORDS: Multi-defender security gametie-breaking rulelogit Stackelberg multi-defender equilibriumNash equilibriumexclusion method AcknowledgmentsThe authors thank the editor and the anonymous referees for their valuable comments and suggestions, which greatly helped improve the content and presentation of this article.Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThe paper is supported by the National Natural Science Foundation of China [grant numbers 61572095, 61877007] and Department of Science and Technology of Shanxi Province [grant numbers 20210302124303, 202203021222251].Notes on contributorsLing ChenLing Chen received the B.S. degree in statistics from Shandong University, Weihai and the Ph.D. degree in mathematics from Dalian University of Technology. Starting from 2021, she is working as a lecturer at Taiyuan Normal University. Her current research includes security game, optimisation and decision-making.Mingchu LiMingchu Li received the B.S. degree in mathematics from Jiangxi Normal University, in 1983, the M.S. degree in applied science from the University of Science and Technology Beijing, in 1989, and the Ph.D. degree in mathematics from the University of Toronto, in 1997. He was an Associate Professor at the University of Science and Technology Beijing, from 1989 to 1994. He was engaged in the research and development of information security at Long View Solution Inc. and Compute Ware Inc., from 1997 to 2002. Since 2002, he has been a Full Professor with the School of Software, Tianjin University. He has been at the School of Software Technology, Dalian University of Technology, as a Full Professor, a Ph.D. Supervisor, and the Vice Dean. His main research interests include theoretical computer science and cryptography. His other research interests include graph theory, network security, and game theory.
摘要本文介绍了一种通用的多防御者Stackelberg安全博弈,其中多个独立的防御者联合保护同一组目标免受共同攻击者的攻击。在游戏中,强Stackelberg均衡从根本上是有问题的,因为“打破有利于防守方的关系”的概念不再被很好地定义,因为我们必须明确哪个防守方会得到帮助。为了解决这个问题,我们在一个新定义的平局规则下定义了一个新的均衡概念。我们描述了Logit Stackelberg多防御者均衡,对应于Logit平局打破规则,以及防御者之间的等效纳什均衡,并展示了计算平衡解的算法。我们发现Logit Stackelberg多防御均衡及其等价纳什均衡可能不存在,这促使我们寻找一个近似均衡。我们设计了一种改进的排除算法,以求出防守方不因偏离而获得大于ε的近似ε-纳什均衡。关键词:多防御者安全博弈破局规则逻辑学Stackelberg多防御者均衡纳什均衡排除法感谢编者和匿名审稿人提出的宝贵意见和建议,极大地完善了本文的内容和表达方式。披露声明作者未报告潜在的利益冲突。基金资助:国家自然科学基金项目[资助号:61572095,61877007]和山西省科学技术厅[资助号:20210302124303,202203021222251]。陈玲,山东威海大学统计学学士学位,大连理工大学数学博士学位。从2021年开始,她将在太原师范大学担任讲师。她目前的研究方向包括安全博弈、优化和决策。李明初,1983年获江西师范大学数学学士学位,1989年获北京科技大学应用科学硕士学位,1997年获加拿大多伦多大学数学博士学位。1989年至1994年,他在北京科技大学担任副教授。1997年至2002年,他在Long View Solution Inc.和Compute Ware Inc.从事信息安全的研究和开发。2002年起任天津大学软件学院正教授。他曾任大连理工大学软件技术学院教授、博士生导师、副院长。主要研究方向为理论计算机科学和密码学。他的其他研究兴趣包括图论、网络安全和博弈论。
{"title":"Equilibrium analysis for multi-defender Stackelberg security games under a logit tie-breaking rule","authors":"Ling Chen, Mingchu Li","doi":"10.1080/23307706.2023.2266697","DOIUrl":"https://doi.org/10.1080/23307706.2023.2266697","url":null,"abstract":"AbstractWe introduce a general multi-defender Stackelberg security game where multiple independent defenders jointly protect a same set of targets from being attacked by a common attacker. In the game, Strong Stackelberg Equilibrium is fundamentally problematic, because the notion of ‘breaking ties in defender's favour’ is no longer well defined, as we must specify which defender will receive the favour. To address this issue, we define a new equilibrium concept under a newly defined tie-breaking rule. We characterise Logit Stackelberg Multi-Defender Equilibrium, corresponding to a logit tie-breaking rule, as well as an equivalent Nash Equilibrium among defenders, and exhibit algorithms for computing the equilibrium solutions. We find that Logit Stackelberg Multi-Defender Equilibrium and its' equivalent Nash Equilibrium may not exist, which motivates us to find an approximate equilibrium. We design a revised exclusion algorithm to find the approximate ε-Nash Equilibrium in which no defender gains more than ε by deviating.KEYWORDS: Multi-defender security gametie-breaking rulelogit Stackelberg multi-defender equilibriumNash equilibriumexclusion method AcknowledgmentsThe authors thank the editor and the anonymous referees for their valuable comments and suggestions, which greatly helped improve the content and presentation of this article.Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThe paper is supported by the National Natural Science Foundation of China [grant numbers 61572095, 61877007] and Department of Science and Technology of Shanxi Province [grant numbers 20210302124303, 202203021222251].Notes on contributorsLing ChenLing Chen received the B.S. degree in statistics from Shandong University, Weihai and the Ph.D. degree in mathematics from Dalian University of Technology. Starting from 2021, she is working as a lecturer at Taiyuan Normal University. Her current research includes security game, optimisation and decision-making.Mingchu LiMingchu Li received the B.S. degree in mathematics from Jiangxi Normal University, in 1983, the M.S. degree in applied science from the University of Science and Technology Beijing, in 1989, and the Ph.D. degree in mathematics from the University of Toronto, in 1997. He was an Associate Professor at the University of Science and Technology Beijing, from 1989 to 1994. He was engaged in the research and development of information security at Long View Solution Inc. and Compute Ware Inc., from 1997 to 2002. Since 2002, he has been a Full Professor with the School of Software, Tianjin University. He has been at the School of Software Technology, Dalian University of Technology, as a Full Professor, a Ph.D. Supervisor, and the Vice Dean. His main research interests include theoretical computer science and cryptography. His other research interests include graph theory, network security, and game theory.","PeriodicalId":37267,"journal":{"name":"Journal of Control and Decision","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136134694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-23DOI: 10.1080/23307706.2023.2260817
Yahui Li, Xiaoyin Li, Xinquan Zhang
AbstractThis paper addresses the robust fault-tolerant control problem for a class of uncertain nonlinear switched systems with actuator saturation. Our aim is to design a switching law and a robust fault-tolerant control law for guaranteeing that the closed-loop system is asymptotically stabilizable, while at the same time the attraction domain estimation is as large as possible. By using the multiple Lyapunov functions method, sufficient conditions for robust fault-tolerant stabilisation are proposed for the closed-loop system. Then, when some scalar parameters are given in advance, the problem of fault-tolerant controller design and attraction domain estimation is transformed into a convex optimisation problem with linear matrix inequality (LMI) constraints. Finally the validity of the proposed design method is verified by a numerical example.Keywords: Switched systemsfault-tolerant controlattraction domainmultiple Lyapunov functionsactuator saturation Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThis work was supported by the Scientific Research Fund of Education Department of Liaoning Province of China [grant number LJKMZ20220731]. This work was supported by the Natural Science Foundation of Liaoning Province of China [grant number 2020-MS-283].Notes on contributorsYahui LiYahui Li received the B.S. degree from Hebei Normal University Of science & technology, Now she is working towards the Master degree at school of Information and Control Engineering, Liaoning Petrochemical University, Fushun, China. Her research interest focuses on switched systems and fault-tolerant control.Xiaoyin LiXiaoyin Li received the B.Sc. degree in Computer Information Management from Shenyang Normal University in Shenyang, China, in 2007. She completed her M.Sc. degree in Mathematics and Applied Mathematics from Liaoning Technical University in Fuxin, China, in 2011. Her research interests include switched systems, saturated systems and system performance optimisation.Xinquan ZhangXinquan Zhang received the B.Sc. degree in Automation and M.Sc. degree in Control Theory & Engineering from Liaoning Technical University in Fuxin, China, in 2003 and 2007, respectively. He completed his Ph.D. in Control Theory and Control Engineering in 2012 at the College of Information Science & Engineering, of the Northeastern University of Shenyang, China. Since 2017, as an associate professor, he has been with School of Information and Control Engineering, Liaoning Petrochemical University, China. His research interests include switched systems, robust control and systems control under constraints.
{"title":"Robust fault-tolerant control of a class of uncertain nonlinear switched systems with actuator saturation","authors":"Yahui Li, Xiaoyin Li, Xinquan Zhang","doi":"10.1080/23307706.2023.2260817","DOIUrl":"https://doi.org/10.1080/23307706.2023.2260817","url":null,"abstract":"AbstractThis paper addresses the robust fault-tolerant control problem for a class of uncertain nonlinear switched systems with actuator saturation. Our aim is to design a switching law and a robust fault-tolerant control law for guaranteeing that the closed-loop system is asymptotically stabilizable, while at the same time the attraction domain estimation is as large as possible. By using the multiple Lyapunov functions method, sufficient conditions for robust fault-tolerant stabilisation are proposed for the closed-loop system. Then, when some scalar parameters are given in advance, the problem of fault-tolerant controller design and attraction domain estimation is transformed into a convex optimisation problem with linear matrix inequality (LMI) constraints. Finally the validity of the proposed design method is verified by a numerical example.Keywords: Switched systemsfault-tolerant controlattraction domainmultiple Lyapunov functionsactuator saturation Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThis work was supported by the Scientific Research Fund of Education Department of Liaoning Province of China [grant number LJKMZ20220731]. This work was supported by the Natural Science Foundation of Liaoning Province of China [grant number 2020-MS-283].Notes on contributorsYahui LiYahui Li received the B.S. degree from Hebei Normal University Of science & technology, Now she is working towards the Master degree at school of Information and Control Engineering, Liaoning Petrochemical University, Fushun, China. Her research interest focuses on switched systems and fault-tolerant control.Xiaoyin LiXiaoyin Li received the B.Sc. degree in Computer Information Management from Shenyang Normal University in Shenyang, China, in 2007. She completed her M.Sc. degree in Mathematics and Applied Mathematics from Liaoning Technical University in Fuxin, China, in 2011. Her research interests include switched systems, saturated systems and system performance optimisation.Xinquan ZhangXinquan Zhang received the B.Sc. degree in Automation and M.Sc. degree in Control Theory & Engineering from Liaoning Technical University in Fuxin, China, in 2003 and 2007, respectively. He completed his Ph.D. in Control Theory and Control Engineering in 2012 at the College of Information Science & Engineering, of the Northeastern University of Shenyang, China. Since 2017, as an associate professor, he has been with School of Information and Control Engineering, Liaoning Petrochemical University, China. His research interests include switched systems, robust control and systems control under constraints.","PeriodicalId":37267,"journal":{"name":"Journal of Control and Decision","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135412463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-16DOI: 10.1080/23307706.2023.2257695
N. Srikanth Reddy
AbstractThis task introduces a novel demand forecasting method using concatenated Convolutional Neural Network (CNN) with an Adaptive Network-based Fuzzy Inference System (ANFIS). The data regarding the historical demand and sales data in integration with ‘advertising effectiveness, expenditure, promotions, and marketing events data' are collected initially. Then, the first-order statistical metrics and second-order statistical metrics are determined as the significant features of the data. Finally, the forecasting is performed by the concatenation of modified CNN with ANFIS termed Concatenated Learning Model (CLM), in which the CNN learns the optimal features that are forecasted by the ANFIS layer instead of the fully connected layer. Deer Hunting with Modified Wind Angle Search (DH-MWS) is used to enhance the CNN and ANFIS architecture, ensuring better performance during forecasting. Simulation findings demonstrate that when the proposed solution is applied to public data, the store achieves improved accuracies concerning intelligent demand forecasting in the marketing sector.KEYWORDS: Demand forecastingmarketing sectorconcatenated learning modeldeer hunting with modified wind angle search Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsN. Srikanth ReddyN. Srikanth Reddy. A Commerce graduate with Post-Graduation in Management and Doctorate in Management. More than 15 years of experience in education and research. Areas of interest include Marketing, Systems and Analytics.
{"title":"Intelligent demand forecasting in marketing sector using concatenated CNN with ANFIS enhanced by heuristic algorithm","authors":"N. Srikanth Reddy","doi":"10.1080/23307706.2023.2257695","DOIUrl":"https://doi.org/10.1080/23307706.2023.2257695","url":null,"abstract":"AbstractThis task introduces a novel demand forecasting method using concatenated Convolutional Neural Network (CNN) with an Adaptive Network-based Fuzzy Inference System (ANFIS). The data regarding the historical demand and sales data in integration with ‘advertising effectiveness, expenditure, promotions, and marketing events data' are collected initially. Then, the first-order statistical metrics and second-order statistical metrics are determined as the significant features of the data. Finally, the forecasting is performed by the concatenation of modified CNN with ANFIS termed Concatenated Learning Model (CLM), in which the CNN learns the optimal features that are forecasted by the ANFIS layer instead of the fully connected layer. Deer Hunting with Modified Wind Angle Search (DH-MWS) is used to enhance the CNN and ANFIS architecture, ensuring better performance during forecasting. Simulation findings demonstrate that when the proposed solution is applied to public data, the store achieves improved accuracies concerning intelligent demand forecasting in the marketing sector.KEYWORDS: Demand forecastingmarketing sectorconcatenated learning modeldeer hunting with modified wind angle search Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsN. Srikanth ReddyN. Srikanth Reddy. A Commerce graduate with Post-Graduation in Management and Doctorate in Management. More than 15 years of experience in education and research. Areas of interest include Marketing, Systems and Analytics.","PeriodicalId":37267,"journal":{"name":"Journal of Control and Decision","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136112233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-13DOI: 10.1080/23307706.2023.2260812
Min Zhang, Xiangbin Liu, Xiaoyu Zhang, Hongye Su
AbstractThis paper provides a novel fault-tolerant control scheme for a class of nonaffine systems with nonlinearly parameterised (NLP) faults. The nonaffine system is firstly transformed into an augmented one via dynamic feedback control. A fault-tolerant controller with Immersion and Invariance (I&I) adaptation law is designed for the transformed system through dynamic surface control. The controller avoids complexity due to the explosion of terms in backstepping design. The I&I adaptation law is developed to recover the unknown parameters of NLP faults in the system. The proposed scheme can shape the transient performance of the parameter estimation error and tracking error. In the tracking problem, all the signals and tracking error converge exponentially to a small neighbourhood of the origin. In the regulation problem, the system output converges exponentially to zero. A numerical simulation is carried out to verify the effectiveness of the proposed scheme.Keywords: Immersion and invariance manifolddynamic feedback controldynamic surface controlnonaffine systemsnonlinearly parameterisation Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThis work was supported by the Fundamental Research Funds for the Central Universities [grant number 2022YJS021] and [grant number 2022JBZY001]; the National Natural Science Foundation of China [grant number 62371032].Notes on contributorsMin ZhangMin Zhang received her B.S. degree from Zhengzhou University, China, in 2019. She is currently working toward the Ph.D. degree in control science and engineering with Beijing Jiaotong University, Beijing, China. Her main research interests include adaptive control, nonlinear control and fault-tolerant control.Xiangbin LiuXiangbin Liu received his B.S. degree from Xi'an Institute of Technology, China, in 1995, M.S. degree from University of Science and Technology Beijing, China, in 2002, and Ph.D. degree from Zhejiang University, China, in 2009, respectively. He is currently an Associate Professor with Beijing Jiaotong University (BJU). His research interests include adaptive control, robust control and nonlinear control.Xiaoyu ZhangXiaoyu Zhang (Senior Member, IEEE) was born in 1978. He received the B.S. degree from Yanshan University, in 2000, and the M.S. and Ph.D. degrees from Zhejiang University, in 2003 and 2006, respectively. From 2006 to 2007, he was with the School of Information Science and Engineering, Nanchang University. From 2007 to 2021, he has been taught with the North China Institute of Science and Technology (NCIST). From 2018 to 2019, he was a Visiting Scholar with Columbia University, New York. He is currently a Professor with Beijing University of Civil Engineering and Architecture (BUCEA). His research interests include nonlinear control, intelligent control, switching systems, driving systems, power electronics, and complex systems.Hongye SuHongye Su (Senior Member, IEEE) was bo
{"title":"I&I adaptive fault-tolerant control of a class of nonaffine systems with nonlinearly parameterised faults","authors":"Min Zhang, Xiangbin Liu, Xiaoyu Zhang, Hongye Su","doi":"10.1080/23307706.2023.2260812","DOIUrl":"https://doi.org/10.1080/23307706.2023.2260812","url":null,"abstract":"AbstractThis paper provides a novel fault-tolerant control scheme for a class of nonaffine systems with nonlinearly parameterised (NLP) faults. The nonaffine system is firstly transformed into an augmented one via dynamic feedback control. A fault-tolerant controller with Immersion and Invariance (I&I) adaptation law is designed for the transformed system through dynamic surface control. The controller avoids complexity due to the explosion of terms in backstepping design. The I&I adaptation law is developed to recover the unknown parameters of NLP faults in the system. The proposed scheme can shape the transient performance of the parameter estimation error and tracking error. In the tracking problem, all the signals and tracking error converge exponentially to a small neighbourhood of the origin. In the regulation problem, the system output converges exponentially to zero. A numerical simulation is carried out to verify the effectiveness of the proposed scheme.Keywords: Immersion and invariance manifolddynamic feedback controldynamic surface controlnonaffine systemsnonlinearly parameterisation Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThis work was supported by the Fundamental Research Funds for the Central Universities [grant number 2022YJS021] and [grant number 2022JBZY001]; the National Natural Science Foundation of China [grant number 62371032].Notes on contributorsMin ZhangMin Zhang received her B.S. degree from Zhengzhou University, China, in 2019. She is currently working toward the Ph.D. degree in control science and engineering with Beijing Jiaotong University, Beijing, China. Her main research interests include adaptive control, nonlinear control and fault-tolerant control.Xiangbin LiuXiangbin Liu received his B.S. degree from Xi'an Institute of Technology, China, in 1995, M.S. degree from University of Science and Technology Beijing, China, in 2002, and Ph.D. degree from Zhejiang University, China, in 2009, respectively. He is currently an Associate Professor with Beijing Jiaotong University (BJU). His research interests include adaptive control, robust control and nonlinear control.Xiaoyu ZhangXiaoyu Zhang (Senior Member, IEEE) was born in 1978. He received the B.S. degree from Yanshan University, in 2000, and the M.S. and Ph.D. degrees from Zhejiang University, in 2003 and 2006, respectively. From 2006 to 2007, he was with the School of Information Science and Engineering, Nanchang University. From 2007 to 2021, he has been taught with the North China Institute of Science and Technology (NCIST). From 2018 to 2019, he was a Visiting Scholar with Columbia University, New York. He is currently a Professor with Beijing University of Civil Engineering and Architecture (BUCEA). His research interests include nonlinear control, intelligent control, switching systems, driving systems, power electronics, and complex systems.Hongye SuHongye Su (Senior Member, IEEE) was bo","PeriodicalId":37267,"journal":{"name":"Journal of Control and Decision","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135918044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AbstractDigital Twin (DT) is used for lifetime monitoring of the drive train and can be a costly option. This proposal adopts the predictive modelling of wind turbines by digital twins by deep learning strategies. Initially, the data is acquired from publicly available wind turbine datasets. Next, the deep features and statistical features are extracted, and the autoencoder is adapted to get the deep features. Then, the Enhanced Marine Predators Algorithm (EMPA) is to select the optimal weighted fused features, where the EMPA would tune the weights used for fusion and the features selection. Finally, the predictive modelling is done via a newly recommended Adaptive Deep Temporal Convolution Network with an Attention Mechanism (ADTCN-AM). It is tuned for precise outcomes with the help of EMPA for forecasting the wind speed and predicting the generated power. The comparative performance analysis of the recently used wind prediction system model shows better efficient results.KEYWORDS: Twin predictive model in wind turbinesfeature extractionenhanced marine predators algorithmadaptive deep temporal convolution network with attention mechanismoptimal weighted fused features Disclosure statementNo potential conflict of interest was reported by the author(s).Practical implicationThe real-time-based twin prediction model in wind turbines gives the computer-oriented solutions for next-generation. It is utilised to generate a digital copy of wind farms interconnected with the physical wind turbines for analysis and prediction process. It helps analyse and understand wind farms easily. It helps to deal with the issue of real-time control of the characteristics of UAV swarm. It includes context-awareness capabilities, which are utilised to identify cybersecurity problems in real time for smart grid deployments.Additional informationNotes on contributorsMahendra Bhatu GawaliMahendra Bhatu Gawali received his BE degree in 2008, M.E. degree in 2013 and Ph.D. degree in 2019 from University of Mumbai, MS, India. Currently he working as Professor in IT department of Sanjivani College of Engineering, Kopargaon, Savitribai Phule Pune University, Pune, MS, India. His area of interests is Digital Twin, Cognitive Intelligence, Artificial Intelligence, Cloud Computing, Optimisation.Swapnali Sunil GawaliSwapnali Sunil Gawali is working as assistant professor in the computer engineering department of Sanjivani College of Engineering, Kopargaon. She has completed her BE and ME from Savitribai Phule Pune University, Pune. Her area of interest is data mining, artificial intelligence.Megharani PatilMegharani Patil is an associate professor in the computer engineering department of Thakur College of Engineering and Technology, Mumbai, and head of the department of artificial intelligence and machine learning. She has received her PhD from the University of Mumbai. Her area of research interest is user experience design and intelligent systems. She has published her research pa
{"title":"Fault prediction model in wind turbines using deep learning structure with enhanced optimisation algorithm","authors":"Mahendra Bhatu Gawali, Swapnali Sunil Gawali, Megharani Patil","doi":"10.1080/23307706.2023.2247420","DOIUrl":"https://doi.org/10.1080/23307706.2023.2247420","url":null,"abstract":"AbstractDigital Twin (DT) is used for lifetime monitoring of the drive train and can be a costly option. This proposal adopts the predictive modelling of wind turbines by digital twins by deep learning strategies. Initially, the data is acquired from publicly available wind turbine datasets. Next, the deep features and statistical features are extracted, and the autoencoder is adapted to get the deep features. Then, the Enhanced Marine Predators Algorithm (EMPA) is to select the optimal weighted fused features, where the EMPA would tune the weights used for fusion and the features selection. Finally, the predictive modelling is done via a newly recommended Adaptive Deep Temporal Convolution Network with an Attention Mechanism (ADTCN-AM). It is tuned for precise outcomes with the help of EMPA for forecasting the wind speed and predicting the generated power. The comparative performance analysis of the recently used wind prediction system model shows better efficient results.KEYWORDS: Twin predictive model in wind turbinesfeature extractionenhanced marine predators algorithmadaptive deep temporal convolution network with attention mechanismoptimal weighted fused features Disclosure statementNo potential conflict of interest was reported by the author(s).Practical implicationThe real-time-based twin prediction model in wind turbines gives the computer-oriented solutions for next-generation. It is utilised to generate a digital copy of wind farms interconnected with the physical wind turbines for analysis and prediction process. It helps analyse and understand wind farms easily. It helps to deal with the issue of real-time control of the characteristics of UAV swarm. It includes context-awareness capabilities, which are utilised to identify cybersecurity problems in real time for smart grid deployments.Additional informationNotes on contributorsMahendra Bhatu GawaliMahendra Bhatu Gawali received his BE degree in 2008, M.E. degree in 2013 and Ph.D. degree in 2019 from University of Mumbai, MS, India. Currently he working as Professor in IT department of Sanjivani College of Engineering, Kopargaon, Savitribai Phule Pune University, Pune, MS, India. His area of interests is Digital Twin, Cognitive Intelligence, Artificial Intelligence, Cloud Computing, Optimisation.Swapnali Sunil GawaliSwapnali Sunil Gawali is working as assistant professor in the computer engineering department of Sanjivani College of Engineering, Kopargaon. She has completed her BE and ME from Savitribai Phule Pune University, Pune. Her area of interest is data mining, artificial intelligence.Megharani PatilMegharani Patil is an associate professor in the computer engineering department of Thakur College of Engineering and Technology, Mumbai, and head of the department of artificial intelligence and machine learning. She has received her PhD from the University of Mumbai. Her area of research interest is user experience design and intelligent systems. She has published her research pa","PeriodicalId":37267,"journal":{"name":"Journal of Control and Decision","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135385861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-26DOI: 10.1080/23307706.2023.2261938
Syed Ahmed Pasha, Rijha Safdar, Syed Taha Ali
AbstractThe integration of cyber (network) with physical world is a big step in cyber-physical systems. This has revolutionised many industries. But this transformation has made cyber-physical systems vulnerable to attacks. One particular type of attack is the adversarial false data injection which injects false data in either the sensor measurements or the corresponding communication channel. A better understanding of how false data injection (FDI) attacks are constructed is crucial for developing strategies to protect against such attacks. In this paper, we consider two models for networked control systems and present an algorithm for constructing FDI attacks in each case and compare with an existing approach. The conditions for the attack to remain stealthy for systems equipped with a χ2 failure detector and the design of attack vectors that satisfy these conditions are discussed in detail. The algorithms are demonstrated by developing FDI attacks for two real-world examples.Keywords: False data injectionnetworked control systemcyber-physical systemcyber-attackmalicious data Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsSyed Ahmed PashaSyed Ahmed Pasha was born in Rawalpindi, Pakistan. He has a Bachelors degree in Electrical Engineering (2001). His Ph.D. (UNSW, 2009) is in Electrical Engineering. He has held two postdoc positions (UNSW, 2009–2011 & USyd, 2012–2013). He is currently Associate Professor at Air University, Pakistan and Visiting Fellow at UNSW since 2012. His research interests are in control and signal processing.Rijha SafdarRijha Safdar did her B.E. from Air University, Pakistan in 2015. She received an MS in Electrical Engineering in 2019 from National University of Sciences and Technology, Pakistan, where she is pursuing a Ph.D. in Electrical Engineering. She is currently Assistant Manager at Centre of Excellence in Science & Applied Technologies, Pakistan. Her research interests include control and cyber security.Syed Taha AliSyed Taha Ali did his BSc. from GIK Institute of Engineering Science and Technology in Pakistan in 2002, followed by an MS and PhD in Electrical Engineering from the University of New South Wales, Australia in 2006 and 2012. He did his postdoctoral research at the University of New South Wales, Australia, in 2013, and at Newcastle University, UK from 2014 to 2016. He is currently Associate Professor at National University of Sciences and Technology, Pakistan. His research interests include network security, cryptocurrencies, election protocols, and security applications of computer vision.
摘要网络与物理世界的融合是网络-物理系统的一大进步。这给许多行业带来了革命性的变化。但这种转变使网络物理系统容易受到攻击。一种特殊类型的攻击是对抗性虚假数据注入,它在传感器测量或相应的通信通道中注入虚假数据。更好地理解虚假数据注入(FDI)攻击是如何构建的,对于制定防范此类攻击的策略至关重要。在本文中,我们考虑了网络控制系统的两种模型,并提出了在每种情况下构建FDI攻击的算法,并与现有方法进行了比较。详细讨论了配备χ2故障检测器的系统保持攻击隐身的条件以及满足这些条件的攻击向量的设计。通过开发两个实际示例的FDI攻击来演示算法。关键词:虚假数据注入网络控制系统网络物理系统网络攻击恶意数据披露声明作者未报告潜在的利益冲突。赛义德·艾哈迈德·帕夏(syed Ahmed Pasha)出生于巴基斯坦拉瓦尔品第。他拥有电气工程学士学位(2001年)。他的博士学位(新南威尔士大学,2009)是电气工程。先后在新南威尔士大学(2009-2011)和悉尼大学(2012-2013)担任博士后。他现任巴基斯坦航空大学副教授,2012年起担任新南威尔士大学访问学者。主要研究方向为控制与信号处理。Rijha Safdar于2015年在巴基斯坦航空大学获得学士学位。她于2019年获得巴基斯坦国立科技大学电气工程硕士学位,目前正在攻读电气工程博士学位。她目前是巴基斯坦科学与应用技术卓越中心的助理经理。她的研究兴趣包括控制和网络安全。赛义德·塔哈·阿里获得了学士学位。2002年从巴基斯坦GIK工程科学与技术研究所毕业,2006年和2012年分别从澳大利亚新南威尔士大学获得电气工程硕士和博士学位。2013年在澳大利亚新南威尔士大学进行博士后研究,2014年至2016年在英国纽卡斯尔大学进行博士后研究。现任巴基斯坦国立科技大学副教授。他的研究兴趣包括网络安全、加密货币、选举协议和计算机视觉的安全应用。
{"title":"False data injection attacks on networked control systems","authors":"Syed Ahmed Pasha, Rijha Safdar, Syed Taha Ali","doi":"10.1080/23307706.2023.2261938","DOIUrl":"https://doi.org/10.1080/23307706.2023.2261938","url":null,"abstract":"AbstractThe integration of cyber (network) with physical world is a big step in cyber-physical systems. This has revolutionised many industries. But this transformation has made cyber-physical systems vulnerable to attacks. One particular type of attack is the adversarial false data injection which injects false data in either the sensor measurements or the corresponding communication channel. A better understanding of how false data injection (FDI) attacks are constructed is crucial for developing strategies to protect against such attacks. In this paper, we consider two models for networked control systems and present an algorithm for constructing FDI attacks in each case and compare with an existing approach. The conditions for the attack to remain stealthy for systems equipped with a χ2 failure detector and the design of attack vectors that satisfy these conditions are discussed in detail. The algorithms are demonstrated by developing FDI attacks for two real-world examples.Keywords: False data injectionnetworked control systemcyber-physical systemcyber-attackmalicious data Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsSyed Ahmed PashaSyed Ahmed Pasha was born in Rawalpindi, Pakistan. He has a Bachelors degree in Electrical Engineering (2001). His Ph.D. (UNSW, 2009) is in Electrical Engineering. He has held two postdoc positions (UNSW, 2009–2011 & USyd, 2012–2013). He is currently Associate Professor at Air University, Pakistan and Visiting Fellow at UNSW since 2012. His research interests are in control and signal processing.Rijha SafdarRijha Safdar did her B.E. from Air University, Pakistan in 2015. She received an MS in Electrical Engineering in 2019 from National University of Sciences and Technology, Pakistan, where she is pursuing a Ph.D. in Electrical Engineering. She is currently Assistant Manager at Centre of Excellence in Science & Applied Technologies, Pakistan. Her research interests include control and cyber security.Syed Taha AliSyed Taha Ali did his BSc. from GIK Institute of Engineering Science and Technology in Pakistan in 2002, followed by an MS and PhD in Electrical Engineering from the University of New South Wales, Australia in 2006 and 2012. He did his postdoctoral research at the University of New South Wales, Australia, in 2013, and at Newcastle University, UK from 2014 to 2016. He is currently Associate Professor at National University of Sciences and Technology, Pakistan. His research interests include network security, cryptocurrencies, election protocols, and security applications of computer vision.","PeriodicalId":37267,"journal":{"name":"Journal of Control and Decision","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134961119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-24DOI: 10.1080/23307706.2023.2255594
Brahim El Asri, Hafid Lalioui
We consider a two-player zero-sum deterministic differential game where each player uses both continuous and impulse controls in infinite-time horizon. We assume that the impulses supposed to be of general term and the costs depend on the state of the system. We use the dynamic programming principle and viscosity solutions approach to show existence and uniqueness of a solution for the Hamilton-Jacobi-Bellman-Isaacs (HJBI) partial differential equations (PDEs) of the game. We prove under Isaacs condition that the upper and lower value functions coincide.
摘要研究了一类新的二人零和确定性微分对策,其中每个参与者在无限视界上同时使用连续和脉冲控制。我们假设脉冲的形式和代价分别取决于非线性函数和系统的状态。我们使用Bellman的动态规划原理(DPP)和粘性解方法来证明,对于这类对策,相关的Hamilton-Jacobi-Bellman-Isaacs (HJBI)偏微分方程(PDEs)解的存在性和唯一性。然后,在Isaacs条件下,我们推导出上下值函数重合,并给出了该对策的计算过程和数值检验。关键词:确定性微分对策,无限水平连续控制,脉冲控制,动态规划原理,密度解,艾萨克条件,分类:49K3549L2549N7090C3993C20致谢感谢审稿人的认真阅读,以及他们的有益意见和建议,使本文有了很大的改进。披露声明作者未报告潜在的利益冲突。本文第二作者的研究得到了摩洛哥国家科学技术研究中心CNRST的资助[资助号17 UIZ 19]。作者简介brahim El Asri,摩洛哥Agadir Ibn Zohr大学国家应用科学学院应用数学正教授。他的研究工作包括确定性和随机情况下的最优控制和微分对策,切换问题和倒向随机微分方程。Hafid Lalioui,分别于2016年和2018年在摩洛哥阿加迪尔的Ibn Zohr大学获得数学和应用学士学位和金融工程硕士学位。他是伊本·佐尔大学国家应用科学学院应用数学博士研究员。他的研究课题涉及确定性微分博弈,包括无限和有限时间范围内的冲动控制。他还对随机控制和强化学习在数学金融中具有挑战性的主题中的应用感兴趣。
{"title":"Deterministic differential games in infinite horizon involving continuous and impulse controls","authors":"Brahim El Asri, Hafid Lalioui","doi":"10.1080/23307706.2023.2255594","DOIUrl":"https://doi.org/10.1080/23307706.2023.2255594","url":null,"abstract":"We consider a two-player zero-sum deterministic differential game where each player uses both continuous and impulse controls in infinite-time horizon. We assume that the impulses supposed to be of general term and the costs depend on the state of the system. We use the dynamic programming principle and viscosity solutions approach to show existence and uniqueness of a solution for the Hamilton-Jacobi-Bellman-Isaacs (HJBI) partial differential equations (PDEs) of the game. We prove under Isaacs condition that the upper and lower value functions coincide.","PeriodicalId":37267,"journal":{"name":"Journal of Control and Decision","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135924790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-12DOI: 10.1080/23307706.2023.2250367
Yunhan Qi, Lei Su, Rongsheng Xia, Tian Fang, Hao Shen
In this paper, semi-Markov process and adaptive fault-tolerant law are used to study the synchronization of complex networks in the presence of topology mutations and actuator failures. Firstly, the semi-Markov jump process, which is more practical than the traditional Markov jump process, is used to simulate the topology change of complex networks. Secondly, by designing adaptive fault-tolerant controller, the influence of actuator fault and interference on the system is eliminated. Then, considering the random packet loss caused by network channel congestion and limited bandwidth resources, a control strategy is developed to achieve convergence of the synchronisation error system. Finally, a numerical example and a practical example of Chua's circuit are given to verify the validity of the proposed theory.
{"title":"Adaptive fault-tolerant control on complex networks with semi-Markov jump topology under random packet loss","authors":"Yunhan Qi, Lei Su, Rongsheng Xia, Tian Fang, Hao Shen","doi":"10.1080/23307706.2023.2250367","DOIUrl":"https://doi.org/10.1080/23307706.2023.2250367","url":null,"abstract":"In this paper, semi-Markov process and adaptive fault-tolerant law are used to study the synchronization of complex networks in the presence of topology mutations and actuator failures. Firstly, the semi-Markov jump process, which is more practical than the traditional Markov jump process, is used to simulate the topology change of complex networks. Secondly, by designing adaptive fault-tolerant controller, the influence of actuator fault and interference on the system is eliminated. Then, considering the random packet loss caused by network channel congestion and limited bandwidth resources, a control strategy is developed to achieve convergence of the synchronisation error system. Finally, a numerical example and a practical example of Chua's circuit are given to verify the validity of the proposed theory.","PeriodicalId":37267,"journal":{"name":"Journal of Control and Decision","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135826207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}