首页 > 最新文献

Journal of Control and Decision最新文献

英文 中文
Robust control allocation method for uncertain systems based on the algorithms of maximum–minimum and improved fish swarm 基于最大最小和改进鱼群算法的不确定系统鲁棒控制分配方法
4区 工程技术 Q2 Mathematics Pub Date : 2023-10-31 DOI: 10.1080/23307706.2023.2261939
Xingyuan Yang, Xi Tong, Yangwang Fang
{"title":"Robust control allocation method for uncertain systems based on the algorithms of maximum–minimum and improved fish swarm","authors":"Xingyuan Yang, Xi Tong, Yangwang Fang","doi":"10.1080/23307706.2023.2261939","DOIUrl":"https://doi.org/10.1080/23307706.2023.2261939","url":null,"abstract":"","PeriodicalId":37267,"journal":{"name":"Journal of Control and Decision","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135871263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trajectory controllability of neutral stochastic integrodifferential equations with mixed fractional Brownian motion 混合分数布朗运动中性随机积分微分方程的轨迹可控性
4区 工程技术 Q2 Mathematics Pub Date : 2023-10-30 DOI: 10.1080/23307706.2023.2271899
Dimplekumar Chalishajar, Ravikumar Kasinathan, Ramkumar Kasinathan, Dhanalakshmi Kasinathan, John A. David
{"title":"Trajectory controllability of neutral stochastic integrodifferential equations with mixed fractional Brownian motion","authors":"Dimplekumar Chalishajar, Ravikumar Kasinathan, Ramkumar Kasinathan, Dhanalakshmi Kasinathan, John A. David","doi":"10.1080/23307706.2023.2271899","DOIUrl":"https://doi.org/10.1080/23307706.2023.2271899","url":null,"abstract":"","PeriodicalId":37267,"journal":{"name":"Journal of Control and Decision","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136070356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Equilibrium analysis for multi-defender Stackelberg security games under a logit tie-breaking rule logit平局规则下多防御者Stackelberg安全博弈的均衡分析
4区 工程技术 Q2 Mathematics Pub Date : 2023-10-29 DOI: 10.1080/23307706.2023.2266697
Ling Chen, Mingchu Li
AbstractWe introduce a general multi-defender Stackelberg security game where multiple independent defenders jointly protect a same set of targets from being attacked by a common attacker. In the game, Strong Stackelberg Equilibrium is fundamentally problematic, because the notion of ‘breaking ties in defender's favour’ is no longer well defined, as we must specify which defender will receive the favour. To address this issue, we define a new equilibrium concept under a newly defined tie-breaking rule. We characterise Logit Stackelberg Multi-Defender Equilibrium, corresponding to a logit tie-breaking rule, as well as an equivalent Nash Equilibrium among defenders, and exhibit algorithms for computing the equilibrium solutions. We find that Logit Stackelberg Multi-Defender Equilibrium and its' equivalent Nash Equilibrium may not exist, which motivates us to find an approximate equilibrium. We design a revised exclusion algorithm to find the approximate ε-Nash Equilibrium in which no defender gains more than ε by deviating.KEYWORDS: Multi-defender security gametie-breaking rulelogit Stackelberg multi-defender equilibriumNash equilibriumexclusion method AcknowledgmentsThe authors thank the editor and the anonymous referees for their valuable comments and suggestions, which greatly helped improve the content and presentation of this article.Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThe paper is supported by the National Natural Science Foundation of China [grant numbers 61572095, 61877007] and Department of Science and Technology of Shanxi Province [grant numbers 20210302124303, 202203021222251].Notes on contributorsLing ChenLing Chen received the B.S. degree in statistics from Shandong University, Weihai and the Ph.D. degree in mathematics from Dalian University of Technology. Starting from 2021, she is working as a lecturer at Taiyuan Normal University. Her current research includes security game, optimisation and decision-making.Mingchu LiMingchu Li received the B.S. degree in mathematics from Jiangxi Normal University, in 1983, the M.S. degree in applied science from the University of Science and Technology Beijing, in 1989, and the Ph.D. degree in mathematics from the University of Toronto, in 1997. He was an Associate Professor at the University of Science and Technology Beijing, from 1989 to 1994. He was engaged in the research and development of information security at Long View Solution Inc. and Compute Ware Inc., from 1997 to 2002. Since 2002, he has been a Full Professor with the School of Software, Tianjin University. He has been at the School of Software Technology, Dalian University of Technology, as a Full Professor, a Ph.D. Supervisor, and the Vice Dean. His main research interests include theoretical computer science and cryptography. His other research interests include graph theory, network security, and game theory.
摘要本文介绍了一种通用的多防御者Stackelberg安全博弈,其中多个独立的防御者联合保护同一组目标免受共同攻击者的攻击。在游戏中,强Stackelberg均衡从根本上是有问题的,因为“打破有利于防守方的关系”的概念不再被很好地定义,因为我们必须明确哪个防守方会得到帮助。为了解决这个问题,我们在一个新定义的平局规则下定义了一个新的均衡概念。我们描述了Logit Stackelberg多防御者均衡,对应于Logit平局打破规则,以及防御者之间的等效纳什均衡,并展示了计算平衡解的算法。我们发现Logit Stackelberg多防御均衡及其等价纳什均衡可能不存在,这促使我们寻找一个近似均衡。我们设计了一种改进的排除算法,以求出防守方不因偏离而获得大于ε的近似ε-纳什均衡。关键词:多防御者安全博弈破局规则逻辑学Stackelberg多防御者均衡纳什均衡排除法感谢编者和匿名审稿人提出的宝贵意见和建议,极大地完善了本文的内容和表达方式。披露声明作者未报告潜在的利益冲突。基金资助:国家自然科学基金项目[资助号:61572095,61877007]和山西省科学技术厅[资助号:20210302124303,202203021222251]。陈玲,山东威海大学统计学学士学位,大连理工大学数学博士学位。从2021年开始,她将在太原师范大学担任讲师。她目前的研究方向包括安全博弈、优化和决策。李明初,1983年获江西师范大学数学学士学位,1989年获北京科技大学应用科学硕士学位,1997年获加拿大多伦多大学数学博士学位。1989年至1994年,他在北京科技大学担任副教授。1997年至2002年,他在Long View Solution Inc.和Compute Ware Inc.从事信息安全的研究和开发。2002年起任天津大学软件学院正教授。他曾任大连理工大学软件技术学院教授、博士生导师、副院长。主要研究方向为理论计算机科学和密码学。他的其他研究兴趣包括图论、网络安全和博弈论。
{"title":"Equilibrium analysis for multi-defender Stackelberg security games under a logit tie-breaking rule","authors":"Ling Chen, Mingchu Li","doi":"10.1080/23307706.2023.2266697","DOIUrl":"https://doi.org/10.1080/23307706.2023.2266697","url":null,"abstract":"AbstractWe introduce a general multi-defender Stackelberg security game where multiple independent defenders jointly protect a same set of targets from being attacked by a common attacker. In the game, Strong Stackelberg Equilibrium is fundamentally problematic, because the notion of ‘breaking ties in defender's favour’ is no longer well defined, as we must specify which defender will receive the favour. To address this issue, we define a new equilibrium concept under a newly defined tie-breaking rule. We characterise Logit Stackelberg Multi-Defender Equilibrium, corresponding to a logit tie-breaking rule, as well as an equivalent Nash Equilibrium among defenders, and exhibit algorithms for computing the equilibrium solutions. We find that Logit Stackelberg Multi-Defender Equilibrium and its' equivalent Nash Equilibrium may not exist, which motivates us to find an approximate equilibrium. We design a revised exclusion algorithm to find the approximate ε-Nash Equilibrium in which no defender gains more than ε by deviating.KEYWORDS: Multi-defender security gametie-breaking rulelogit Stackelberg multi-defender equilibriumNash equilibriumexclusion method AcknowledgmentsThe authors thank the editor and the anonymous referees for their valuable comments and suggestions, which greatly helped improve the content and presentation of this article.Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThe paper is supported by the National Natural Science Foundation of China [grant numbers 61572095, 61877007] and Department of Science and Technology of Shanxi Province [grant numbers 20210302124303, 202203021222251].Notes on contributorsLing ChenLing Chen received the B.S. degree in statistics from Shandong University, Weihai and the Ph.D. degree in mathematics from Dalian University of Technology. Starting from 2021, she is working as a lecturer at Taiyuan Normal University. Her current research includes security game, optimisation and decision-making.Mingchu LiMingchu Li received the B.S. degree in mathematics from Jiangxi Normal University, in 1983, the M.S. degree in applied science from the University of Science and Technology Beijing, in 1989, and the Ph.D. degree in mathematics from the University of Toronto, in 1997. He was an Associate Professor at the University of Science and Technology Beijing, from 1989 to 1994. He was engaged in the research and development of information security at Long View Solution Inc. and Compute Ware Inc., from 1997 to 2002. Since 2002, he has been a Full Professor with the School of Software, Tianjin University. He has been at the School of Software Technology, Dalian University of Technology, as a Full Professor, a Ph.D. Supervisor, and the Vice Dean. His main research interests include theoretical computer science and cryptography. His other research interests include graph theory, network security, and game theory.","PeriodicalId":37267,"journal":{"name":"Journal of Control and Decision","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136134694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust fault-tolerant control of a class of uncertain nonlinear switched systems with actuator saturation 一类不确定非线性开关系统的鲁棒容错控制
4区 工程技术 Q2 Mathematics Pub Date : 2023-10-23 DOI: 10.1080/23307706.2023.2260817
Yahui Li, Xiaoyin Li, Xinquan Zhang
AbstractThis paper addresses the robust fault-tolerant control problem for a class of uncertain nonlinear switched systems with actuator saturation. Our aim is to design a switching law and a robust fault-tolerant control law for guaranteeing that the closed-loop system is asymptotically stabilizable, while at the same time the attraction domain estimation is as large as possible. By using the multiple Lyapunov functions method, sufficient conditions for robust fault-tolerant stabilisation are proposed for the closed-loop system. Then, when some scalar parameters are given in advance, the problem of fault-tolerant controller design and attraction domain estimation is transformed into a convex optimisation problem with linear matrix inequality (LMI) constraints. Finally the validity of the proposed design method is verified by a numerical example.Keywords: Switched systemsfault-tolerant controlattraction domainmultiple Lyapunov functionsactuator saturation Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThis work was supported by the Scientific Research Fund of Education Department of Liaoning Province of China [grant number LJKMZ20220731]. This work was supported by the Natural Science Foundation of Liaoning Province of China [grant number 2020-MS-283].Notes on contributorsYahui LiYahui Li received the B.S. degree from Hebei Normal University Of science & technology, Now she is working towards the Master degree at school of Information and Control Engineering, Liaoning Petrochemical University, Fushun, China. Her research interest focuses on switched systems and fault-tolerant control.Xiaoyin LiXiaoyin Li received the B.Sc. degree in Computer Information Management from Shenyang Normal University in Shenyang, China, in 2007. She completed her M.Sc. degree in Mathematics and Applied Mathematics from Liaoning Technical University in Fuxin, China, in 2011. Her research interests include switched systems, saturated systems and system performance optimisation.Xinquan ZhangXinquan Zhang received the B.Sc. degree in Automation and M.Sc. degree in Control Theory & Engineering from Liaoning Technical University in Fuxin, China, in 2003 and 2007, respectively. He completed his Ph.D. in Control Theory and Control Engineering in 2012 at the College of Information Science & Engineering, of the Northeastern University of Shenyang, China. Since 2017, as an associate professor, he has been with School of Information and Control Engineering, Liaoning Petrochemical University, China. His research interests include switched systems, robust control and systems control under constraints.
摘要研究一类不确定非线性开关系统的鲁棒容错控制问题。我们的目标是设计一个开关律和一个鲁棒容错控制律,以保证闭环系统渐近稳定,同时吸引域估计尽可能大。利用多重李雅普诺夫函数方法,给出了闭环系统鲁棒容错稳定的充分条件。然后,在预先给定标量参数的情况下,将容错控制器设计和吸引域估计问题转化为具有线性矩阵不等式约束的凸优化问题。最后通过数值算例验证了所提设计方法的有效性。关键词:切换系统容错控制牵引域多重Lyapunov函数致动器饱和披露声明作者未报告潜在的利益冲突。本工作得到辽宁省教育厅科研基金资助[批准号:LJKMZ20220731]。本研究得到辽宁省自然科学基金资助[批准号2020-MS-283]。作者简介李亚慧李亚慧毕业于河北科技师范大学,获理学学士学位,现就读于辽宁石油化工大学信息与控制工程学院,攻读硕士学位。主要研究方向为交换系统和容错控制。李晓银,2007年毕业于中国沈阳师范大学计算机信息管理专业,获学士学位。她于2011年获得辽宁工程技术大学数学与应用数学硕士学位。她的研究兴趣包括切换系统,饱和系统和系统性能优化。张鑫泉,2003年和2007年分别获得辽宁工程技术大学自动化专业学士学位和控制理论与工程专业硕士学位。2012年毕业于中国东北大学沈阳信息科学与工程学院,获控制理论与控制工程博士学位。2017年起,任辽宁石油化工大学信息与控制工程学院副教授。主要研究方向为切换系统、鲁棒控制和约束下的系统控制。
{"title":"Robust fault-tolerant control of a class of uncertain nonlinear switched systems with actuator saturation","authors":"Yahui Li, Xiaoyin Li, Xinquan Zhang","doi":"10.1080/23307706.2023.2260817","DOIUrl":"https://doi.org/10.1080/23307706.2023.2260817","url":null,"abstract":"AbstractThis paper addresses the robust fault-tolerant control problem for a class of uncertain nonlinear switched systems with actuator saturation. Our aim is to design a switching law and a robust fault-tolerant control law for guaranteeing that the closed-loop system is asymptotically stabilizable, while at the same time the attraction domain estimation is as large as possible. By using the multiple Lyapunov functions method, sufficient conditions for robust fault-tolerant stabilisation are proposed for the closed-loop system. Then, when some scalar parameters are given in advance, the problem of fault-tolerant controller design and attraction domain estimation is transformed into a convex optimisation problem with linear matrix inequality (LMI) constraints. Finally the validity of the proposed design method is verified by a numerical example.Keywords: Switched systemsfault-tolerant controlattraction domainmultiple Lyapunov functionsactuator saturation Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThis work was supported by the Scientific Research Fund of Education Department of Liaoning Province of China [grant number LJKMZ20220731]. This work was supported by the Natural Science Foundation of Liaoning Province of China [grant number 2020-MS-283].Notes on contributorsYahui LiYahui Li received the B.S. degree from Hebei Normal University Of science & technology, Now she is working towards the Master degree at school of Information and Control Engineering, Liaoning Petrochemical University, Fushun, China. Her research interest focuses on switched systems and fault-tolerant control.Xiaoyin LiXiaoyin Li received the B.Sc. degree in Computer Information Management from Shenyang Normal University in Shenyang, China, in 2007. She completed her M.Sc. degree in Mathematics and Applied Mathematics from Liaoning Technical University in Fuxin, China, in 2011. Her research interests include switched systems, saturated systems and system performance optimisation.Xinquan ZhangXinquan Zhang received the B.Sc. degree in Automation and M.Sc. degree in Control Theory & Engineering from Liaoning Technical University in Fuxin, China, in 2003 and 2007, respectively. He completed his Ph.D. in Control Theory and Control Engineering in 2012 at the College of Information Science & Engineering, of the Northeastern University of Shenyang, China. Since 2017, as an associate professor, he has been with School of Information and Control Engineering, Liaoning Petrochemical University, China. His research interests include switched systems, robust control and systems control under constraints.","PeriodicalId":37267,"journal":{"name":"Journal of Control and Decision","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135412463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent demand forecasting in marketing sector using concatenated CNN with ANFIS enhanced by heuristic algorithm 基于启发式算法增强的连接CNN与ANFIS的市场智能需求预测
4区 工程技术 Q2 Mathematics Pub Date : 2023-10-16 DOI: 10.1080/23307706.2023.2257695
N. Srikanth Reddy
AbstractThis task introduces a novel demand forecasting method using concatenated Convolutional Neural Network (CNN) with an Adaptive Network-based Fuzzy Inference System (ANFIS). The data regarding the historical demand and sales data in integration with ‘advertising effectiveness, expenditure, promotions, and marketing events data' are collected initially. Then, the first-order statistical metrics and second-order statistical metrics are determined as the significant features of the data. Finally, the forecasting is performed by the concatenation of modified CNN with ANFIS termed Concatenated Learning Model (CLM), in which the CNN learns the optimal features that are forecasted by the ANFIS layer instead of the fully connected layer. Deer Hunting with Modified Wind Angle Search (DH-MWS) is used to enhance the CNN and ANFIS architecture, ensuring better performance during forecasting. Simulation findings demonstrate that when the proposed solution is applied to public data, the store achieves improved accuracies concerning intelligent demand forecasting in the marketing sector.KEYWORDS: Demand forecastingmarketing sectorconcatenated learning modeldeer hunting with modified wind angle search Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsN. Srikanth ReddyN. Srikanth Reddy. A Commerce graduate with Post-Graduation in Management and Doctorate in Management. More than 15 years of experience in education and research. Areas of interest include Marketing, Systems and Analytics.
摘要本文提出了一种基于卷积神经网络(CNN)和自适应网络模糊推理系统(ANFIS)的新型需求预测方法。最初收集有关历史需求和销售数据的数据,并结合“广告效果、支出、促销和营销事件数据”。然后,确定一阶统计度量和二阶统计度量作为数据的显著特征。最后,通过将修改后的CNN与ANFIS进行串联进行预测,称为串联学习模型(concatated Learning Model, CLM),其中CNN学习由ANFIS层而不是完全连接层预测的最优特征。利用修正风角搜索猎鹿(DH-MWS)来增强CNN和ANFIS架构,确保在预测过程中有更好的表现。仿真结果表明,当所提出的解决方案应用于公共数据时,商店在营销部门的智能需求预测方面达到了更高的准确性。关键词:需求预测营销部门关联学习模型修正风角搜索猎鹿披露声明作者未报告潜在利益冲突。其他信息:贡献者说明Srikanth ReddyN。Srikanth Reddy。商科毕业生,毕业后获得管理学博士学位。超过15年的教育和研究经验。感兴趣的领域包括市场营销,系统和分析。
{"title":"Intelligent demand forecasting in marketing sector using concatenated CNN with ANFIS enhanced by heuristic algorithm","authors":"N. Srikanth Reddy","doi":"10.1080/23307706.2023.2257695","DOIUrl":"https://doi.org/10.1080/23307706.2023.2257695","url":null,"abstract":"AbstractThis task introduces a novel demand forecasting method using concatenated Convolutional Neural Network (CNN) with an Adaptive Network-based Fuzzy Inference System (ANFIS). The data regarding the historical demand and sales data in integration with ‘advertising effectiveness, expenditure, promotions, and marketing events data' are collected initially. Then, the first-order statistical metrics and second-order statistical metrics are determined as the significant features of the data. Finally, the forecasting is performed by the concatenation of modified CNN with ANFIS termed Concatenated Learning Model (CLM), in which the CNN learns the optimal features that are forecasted by the ANFIS layer instead of the fully connected layer. Deer Hunting with Modified Wind Angle Search (DH-MWS) is used to enhance the CNN and ANFIS architecture, ensuring better performance during forecasting. Simulation findings demonstrate that when the proposed solution is applied to public data, the store achieves improved accuracies concerning intelligent demand forecasting in the marketing sector.KEYWORDS: Demand forecastingmarketing sectorconcatenated learning modeldeer hunting with modified wind angle search Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsN. Srikanth ReddyN. Srikanth Reddy. A Commerce graduate with Post-Graduation in Management and Doctorate in Management. More than 15 years of experience in education and research. Areas of interest include Marketing, Systems and Analytics.","PeriodicalId":37267,"journal":{"name":"Journal of Control and Decision","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136112233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
I&I adaptive fault-tolerant control of a class of nonaffine systems with nonlinearly parameterised faults 一类具有非线性参数化故障的非仿射系统的自适应容错控制
4区 工程技术 Q2 Mathematics Pub Date : 2023-10-13 DOI: 10.1080/23307706.2023.2260812
Min Zhang, Xiangbin Liu, Xiaoyu Zhang, Hongye Su
AbstractThis paper provides a novel fault-tolerant control scheme for a class of nonaffine systems with nonlinearly parameterised (NLP) faults. The nonaffine system is firstly transformed into an augmented one via dynamic feedback control. A fault-tolerant controller with Immersion and Invariance (I&I) adaptation law is designed for the transformed system through dynamic surface control. The controller avoids complexity due to the explosion of terms in backstepping design. The I&I adaptation law is developed to recover the unknown parameters of NLP faults in the system. The proposed scheme can shape the transient performance of the parameter estimation error and tracking error. In the tracking problem, all the signals and tracking error converge exponentially to a small neighbourhood of the origin. In the regulation problem, the system output converges exponentially to zero. A numerical simulation is carried out to verify the effectiveness of the proposed scheme.Keywords: Immersion and invariance manifolddynamic feedback controldynamic surface controlnonaffine systemsnonlinearly parameterisation Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThis work was supported by the Fundamental Research Funds for the Central Universities [grant number 2022YJS021] and [grant number 2022JBZY001]; the National Natural Science Foundation of China [grant number 62371032].Notes on contributorsMin ZhangMin Zhang received her B.S. degree from Zhengzhou University, China, in 2019. She is currently working toward the Ph.D. degree in control science and engineering with Beijing Jiaotong University, Beijing, China. Her main research interests include adaptive control, nonlinear control and fault-tolerant control.Xiangbin LiuXiangbin Liu received his B.S. degree from Xi'an Institute of Technology, China, in 1995, M.S. degree from University of Science and Technology Beijing, China, in 2002, and Ph.D. degree from Zhejiang University, China, in 2009, respectively. He is currently an Associate Professor with Beijing Jiaotong University (BJU). His research interests include adaptive control, robust control and nonlinear control.Xiaoyu ZhangXiaoyu Zhang (Senior Member, IEEE) was born in 1978. He received the B.S. degree from Yanshan University, in 2000, and the M.S. and Ph.D. degrees from Zhejiang University, in 2003 and 2006, respectively. From 2006 to 2007, he was with the School of Information Science and Engineering, Nanchang University. From 2007 to 2021, he has been taught with the North China Institute of Science and Technology (NCIST). From 2018 to 2019, he was a Visiting Scholar with Columbia University, New York. He is currently a Professor with Beijing University of Civil Engineering and Architecture (BUCEA). His research interests include nonlinear control, intelligent control, switching systems, driving systems, power electronics, and complex systems.Hongye SuHongye Su (Senior Member, IEEE) was bo
摘要针对一类具有非线性参数化(NLP)故障的非仿射系统,提出了一种新的容错控制方案。首先通过动态反馈控制将非仿射系统转化为增广系统。通过动态面控制对变换后的系统设计了一种具有浸没和不变性自适应律的容错控制器。该控制器避免了回溯设计中由于术语爆炸而导致的复杂性。为了恢复系统中NLP故障的未知参数,提出了I&I自适应律。该方法可以有效地减小参数估计误差和跟踪误差的瞬态性能。在跟踪问题中,所有信号和跟踪误差指数收敛到原点的一个小邻域。在调节问题中,系统输出指数收敛于零。通过数值仿真验证了该方案的有效性。关键词:浸没与不变性流形动态反馈控制动态表面控制非仿射系统非线性参数化披露声明作者未报告潜在的利益冲突。本工作由中央高校基本科研业务费专项基金[批准号2022YJS021]和[批准号2022JBZY001]资助;国家自然科学基金[批准号:62371032]。张敏,2019年毕业于中国郑州大学,获理学学士学位。她目前在北京交通大学攻读控制科学与工程博士学位。主要研究方向为自适应控制、非线性控制和容错控制。刘向斌,1995年毕业于中国西安理工学院,2002年毕业于中国北京科技大学,获理学硕士学位,2009年毕业于中国浙江大学,获博士学位。现任北京交通大学副教授。主要研究方向为自适应控制、鲁棒控制和非线性控制。张晓宇,1978年出生,IEEE高级会员。2000年获得燕山大学学士学位,2003年和2006年分别获得浙江大学硕士和博士学位。2006年至2007年在南昌大学信息科学与工程学院工作。2007年至2021年在华北理工学院任教。2018年至2019年,担任纽约哥伦比亚大学访问学者。现任北京建筑大学教授。主要研究方向为非线性控制、智能控制、开关系统、驱动系统、电力电子、复杂系统等。苏宏业,1969年生,IEEE高级会员。他于1990年获得南京化工大学工业自动化学士学位,并于1993年和1995年分别获得浙江大学工业自动化硕士学位和博士学位。1995年至1997年,他担任浙江大学化学工程系讲师。从1998年到2000年,他是浙江大学高级过程控制研究所的副教授,在那里他目前是网络系统与控制研究所的教授。他目前的研究方向包括鲁棒控制、时滞系统和先进过程控制理论与应用。
{"title":"I&I adaptive fault-tolerant control of a class of nonaffine systems with nonlinearly parameterised faults","authors":"Min Zhang, Xiangbin Liu, Xiaoyu Zhang, Hongye Su","doi":"10.1080/23307706.2023.2260812","DOIUrl":"https://doi.org/10.1080/23307706.2023.2260812","url":null,"abstract":"AbstractThis paper provides a novel fault-tolerant control scheme for a class of nonaffine systems with nonlinearly parameterised (NLP) faults. The nonaffine system is firstly transformed into an augmented one via dynamic feedback control. A fault-tolerant controller with Immersion and Invariance (I&I) adaptation law is designed for the transformed system through dynamic surface control. The controller avoids complexity due to the explosion of terms in backstepping design. The I&I adaptation law is developed to recover the unknown parameters of NLP faults in the system. The proposed scheme can shape the transient performance of the parameter estimation error and tracking error. In the tracking problem, all the signals and tracking error converge exponentially to a small neighbourhood of the origin. In the regulation problem, the system output converges exponentially to zero. A numerical simulation is carried out to verify the effectiveness of the proposed scheme.Keywords: Immersion and invariance manifolddynamic feedback controldynamic surface controlnonaffine systemsnonlinearly parameterisation Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThis work was supported by the Fundamental Research Funds for the Central Universities [grant number 2022YJS021] and [grant number 2022JBZY001]; the National Natural Science Foundation of China [grant number 62371032].Notes on contributorsMin ZhangMin Zhang received her B.S. degree from Zhengzhou University, China, in 2019. She is currently working toward the Ph.D. degree in control science and engineering with Beijing Jiaotong University, Beijing, China. Her main research interests include adaptive control, nonlinear control and fault-tolerant control.Xiangbin LiuXiangbin Liu received his B.S. degree from Xi'an Institute of Technology, China, in 1995, M.S. degree from University of Science and Technology Beijing, China, in 2002, and Ph.D. degree from Zhejiang University, China, in 2009, respectively. He is currently an Associate Professor with Beijing Jiaotong University (BJU). His research interests include adaptive control, robust control and nonlinear control.Xiaoyu ZhangXiaoyu Zhang (Senior Member, IEEE) was born in 1978. He received the B.S. degree from Yanshan University, in 2000, and the M.S. and Ph.D. degrees from Zhejiang University, in 2003 and 2006, respectively. From 2006 to 2007, he was with the School of Information Science and Engineering, Nanchang University. From 2007 to 2021, he has been taught with the North China Institute of Science and Technology (NCIST). From 2018 to 2019, he was a Visiting Scholar with Columbia University, New York. He is currently a Professor with Beijing University of Civil Engineering and Architecture (BUCEA). His research interests include nonlinear control, intelligent control, switching systems, driving systems, power electronics, and complex systems.Hongye SuHongye Su (Senior Member, IEEE) was bo","PeriodicalId":37267,"journal":{"name":"Journal of Control and Decision","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135918044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault prediction model in wind turbines using deep learning structure with enhanced optimisation algorithm 基于深度学习结构和增强优化算法的风力发电机故障预测模型
4区 工程技术 Q2 Mathematics Pub Date : 2023-09-28 DOI: 10.1080/23307706.2023.2247420
Mahendra Bhatu Gawali, Swapnali Sunil Gawali, Megharani Patil
AbstractDigital Twin (DT) is used for lifetime monitoring of the drive train and can be a costly option. This proposal adopts the predictive modelling of wind turbines by digital twins by deep learning strategies. Initially, the data is acquired from publicly available wind turbine datasets. Next, the deep features and statistical features are extracted, and the autoencoder is adapted to get the deep features. Then, the Enhanced Marine Predators Algorithm (EMPA) is to select the optimal weighted fused features, where the EMPA would tune the weights used for fusion and the features selection. Finally, the predictive modelling is done via a newly recommended Adaptive Deep Temporal Convolution Network with an Attention Mechanism (ADTCN-AM). It is tuned for precise outcomes with the help of EMPA for forecasting the wind speed and predicting the generated power. The comparative performance analysis of the recently used wind prediction system model shows better efficient results.KEYWORDS: Twin predictive model in wind turbinesfeature extractionenhanced marine predators algorithmadaptive deep temporal convolution network with attention mechanismoptimal weighted fused features Disclosure statementNo potential conflict of interest was reported by the author(s).Practical implicationThe real-time-based twin prediction model in wind turbines gives the computer-oriented solutions for next-generation. It is utilised to generate a digital copy of wind farms interconnected with the physical wind turbines for analysis and prediction process. It helps analyse and understand wind farms easily. It helps to deal with the issue of real-time control of the characteristics of UAV swarm. It includes context-awareness capabilities, which are utilised to identify cybersecurity problems in real time for smart grid deployments.Additional informationNotes on contributorsMahendra Bhatu GawaliMahendra Bhatu Gawali received his BE degree in 2008, M.E. degree in 2013 and Ph.D. degree in 2019 from University of Mumbai, MS, India. Currently he working as Professor in IT department of Sanjivani College of Engineering, Kopargaon, Savitribai Phule Pune University, Pune, MS, India. His area of interests is Digital Twin, Cognitive Intelligence, Artificial Intelligence, Cloud Computing, Optimisation.Swapnali Sunil GawaliSwapnali Sunil Gawali is working as assistant professor in the computer engineering department of Sanjivani College of Engineering, Kopargaon. She has completed her BE and ME from Savitribai Phule Pune University, Pune. Her area of interest is data mining, artificial intelligence.Megharani PatilMegharani Patil is an associate professor in the computer engineering department of Thakur College of Engineering and Technology, Mumbai, and head of the department of artificial intelligence and machine learning. She has received her PhD from the University of Mumbai. Her area of research interest is user experience design and intelligent systems. She has published her research pa
摘要数字孪生(DT)用于传动系统的寿命监测,可能是一个昂贵的选择。该方案采用深度学习策略,采用数字孪生模型对风力涡轮机进行预测建模。最初,这些数据是从公开可用的风力涡轮机数据集中获得的。其次,提取深度特征和统计特征,并采用自编码器提取深度特征。然后,采用增强型海洋捕食者算法(Enhanced Marine predator Algorithm, EMPA)选择最优加权融合特征,调整融合所使用的权重和特征选择。最后,通过新推荐的具有注意机制的自适应深度时间卷积网络(ADTCN-AM)进行预测建模。在EMPA的帮助下,它被调整为精确的结果,用于预测风速和预测发电量。对近年来常用的风力预报系统模型进行了性能对比分析,结果表明预报效果较好。关键词:风力涡轮机孪生预测模型;特征提取增强海洋捕食者算法;带注意机制的自适应深度时间卷积网络;最优加权融合特征;实际意义基于实时的双子星预测模型为下一代风力涡轮机提供了面向计算机的解决方案。它被用来生成与物理风力涡轮机相连的风力发电场的数字副本,用于分析和预测过程。它有助于分析和理解风力发电场。它有助于解决无人机群特性的实时控制问题。它包括上下文感知功能,用于实时识别智能电网部署的网络安全问题。mahendra Bhatu Gawali于2008年获得印度孟买大学学士学位,2013年获得硕士学位,2019年获得博士学位。目前,他在印度浦那Savitribai Phule Pune University, Kopargaon的Sanjivani工程学院担任IT系教授。他的兴趣领域是数字孪生,认知智能,人工智能,云计算,优化。Swapnali Sunil Gawali是Kopargaon Sanjivani工程学院计算机工程系的助理教授。她已经完成了浦那Savitribai Phule Pune大学的学士和硕士学位。她感兴趣的领域是数据挖掘和人工智能。Megharani Patil是孟买塔库尔工程技术学院计算机工程系的副教授,也是人工智能和机器学习系主任。她在孟买大学获得博士学位。她的研究兴趣是用户体验设计和智能系统。她在许多国内和国际期刊和会议上发表了研究论文。以她的名义注册了一项专利,并出版了两本书。
{"title":"Fault prediction model in wind turbines using deep learning structure with enhanced optimisation algorithm","authors":"Mahendra Bhatu Gawali, Swapnali Sunil Gawali, Megharani Patil","doi":"10.1080/23307706.2023.2247420","DOIUrl":"https://doi.org/10.1080/23307706.2023.2247420","url":null,"abstract":"AbstractDigital Twin (DT) is used for lifetime monitoring of the drive train and can be a costly option. This proposal adopts the predictive modelling of wind turbines by digital twins by deep learning strategies. Initially, the data is acquired from publicly available wind turbine datasets. Next, the deep features and statistical features are extracted, and the autoencoder is adapted to get the deep features. Then, the Enhanced Marine Predators Algorithm (EMPA) is to select the optimal weighted fused features, where the EMPA would tune the weights used for fusion and the features selection. Finally, the predictive modelling is done via a newly recommended Adaptive Deep Temporal Convolution Network with an Attention Mechanism (ADTCN-AM). It is tuned for precise outcomes with the help of EMPA for forecasting the wind speed and predicting the generated power. The comparative performance analysis of the recently used wind prediction system model shows better efficient results.KEYWORDS: Twin predictive model in wind turbinesfeature extractionenhanced marine predators algorithmadaptive deep temporal convolution network with attention mechanismoptimal weighted fused features Disclosure statementNo potential conflict of interest was reported by the author(s).Practical implicationThe real-time-based twin prediction model in wind turbines gives the computer-oriented solutions for next-generation. It is utilised to generate a digital copy of wind farms interconnected with the physical wind turbines for analysis and prediction process. It helps analyse and understand wind farms easily. It helps to deal with the issue of real-time control of the characteristics of UAV swarm. It includes context-awareness capabilities, which are utilised to identify cybersecurity problems in real time for smart grid deployments.Additional informationNotes on contributorsMahendra Bhatu GawaliMahendra Bhatu Gawali received his BE degree in 2008, M.E. degree in 2013 and Ph.D. degree in 2019 from University of Mumbai, MS, India. Currently he working as Professor in IT department of Sanjivani College of Engineering, Kopargaon, Savitribai Phule Pune University, Pune, MS, India. His area of interests is Digital Twin, Cognitive Intelligence, Artificial Intelligence, Cloud Computing, Optimisation.Swapnali Sunil GawaliSwapnali Sunil Gawali is working as assistant professor in the computer engineering department of Sanjivani College of Engineering, Kopargaon. She has completed her BE and ME from Savitribai Phule Pune University, Pune. Her area of interest is data mining, artificial intelligence.Megharani PatilMegharani Patil is an associate professor in the computer engineering department of Thakur College of Engineering and Technology, Mumbai, and head of the department of artificial intelligence and machine learning. She has received her PhD from the University of Mumbai. Her area of research interest is user experience design and intelligent systems. She has published her research pa","PeriodicalId":37267,"journal":{"name":"Journal of Control and Decision","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135385861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
False data injection attacks on networked control systems 对网络控制系统的虚假数据注入攻击
4区 工程技术 Q2 Mathematics Pub Date : 2023-09-26 DOI: 10.1080/23307706.2023.2261938
Syed Ahmed Pasha, Rijha Safdar, Syed Taha Ali
AbstractThe integration of cyber (network) with physical world is a big step in cyber-physical systems. This has revolutionised many industries. But this transformation has made cyber-physical systems vulnerable to attacks. One particular type of attack is the adversarial false data injection which injects false data in either the sensor measurements or the corresponding communication channel. A better understanding of how false data injection (FDI) attacks are constructed is crucial for developing strategies to protect against such attacks. In this paper, we consider two models for networked control systems and present an algorithm for constructing FDI attacks in each case and compare with an existing approach. The conditions for the attack to remain stealthy for systems equipped with a χ2 failure detector and the design of attack vectors that satisfy these conditions are discussed in detail. The algorithms are demonstrated by developing FDI attacks for two real-world examples.Keywords: False data injectionnetworked control systemcyber-physical systemcyber-attackmalicious data Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsSyed Ahmed PashaSyed Ahmed Pasha was born in Rawalpindi, Pakistan. He has a Bachelors degree in Electrical Engineering (2001). His Ph.D. (UNSW, 2009) is in Electrical Engineering. He has held two postdoc positions (UNSW, 2009–2011 & USyd, 2012–2013). He is currently Associate Professor at Air University, Pakistan and Visiting Fellow at UNSW since 2012. His research interests are in control and signal processing.Rijha SafdarRijha Safdar did her B.E. from Air University, Pakistan in 2015. She received an MS in Electrical Engineering in 2019 from National University of Sciences and Technology, Pakistan, where she is pursuing a Ph.D. in Electrical Engineering. She is currently Assistant Manager at Centre of Excellence in Science & Applied Technologies, Pakistan. Her research interests include control and cyber security.Syed Taha AliSyed Taha Ali did his BSc. from GIK Institute of Engineering Science and Technology in Pakistan in 2002, followed by an MS and PhD in Electrical Engineering from the University of New South Wales, Australia in 2006 and 2012. He did his postdoctoral research at the University of New South Wales, Australia, in 2013, and at Newcastle University, UK from 2014 to 2016. He is currently Associate Professor at National University of Sciences and Technology, Pakistan. His research interests include network security, cryptocurrencies, election protocols, and security applications of computer vision.
摘要网络与物理世界的融合是网络-物理系统的一大进步。这给许多行业带来了革命性的变化。但这种转变使网络物理系统容易受到攻击。一种特殊类型的攻击是对抗性虚假数据注入,它在传感器测量或相应的通信通道中注入虚假数据。更好地理解虚假数据注入(FDI)攻击是如何构建的,对于制定防范此类攻击的策略至关重要。在本文中,我们考虑了网络控制系统的两种模型,并提出了在每种情况下构建FDI攻击的算法,并与现有方法进行了比较。详细讨论了配备χ2故障检测器的系统保持攻击隐身的条件以及满足这些条件的攻击向量的设计。通过开发两个实际示例的FDI攻击来演示算法。关键词:虚假数据注入网络控制系统网络物理系统网络攻击恶意数据披露声明作者未报告潜在的利益冲突。赛义德·艾哈迈德·帕夏(syed Ahmed Pasha)出生于巴基斯坦拉瓦尔品第。他拥有电气工程学士学位(2001年)。他的博士学位(新南威尔士大学,2009)是电气工程。先后在新南威尔士大学(2009-2011)和悉尼大学(2012-2013)担任博士后。他现任巴基斯坦航空大学副教授,2012年起担任新南威尔士大学访问学者。主要研究方向为控制与信号处理。Rijha Safdar于2015年在巴基斯坦航空大学获得学士学位。她于2019年获得巴基斯坦国立科技大学电气工程硕士学位,目前正在攻读电气工程博士学位。她目前是巴基斯坦科学与应用技术卓越中心的助理经理。她的研究兴趣包括控制和网络安全。赛义德·塔哈·阿里获得了学士学位。2002年从巴基斯坦GIK工程科学与技术研究所毕业,2006年和2012年分别从澳大利亚新南威尔士大学获得电气工程硕士和博士学位。2013年在澳大利亚新南威尔士大学进行博士后研究,2014年至2016年在英国纽卡斯尔大学进行博士后研究。现任巴基斯坦国立科技大学副教授。他的研究兴趣包括网络安全、加密货币、选举协议和计算机视觉的安全应用。
{"title":"False data injection attacks on networked control systems","authors":"Syed Ahmed Pasha, Rijha Safdar, Syed Taha Ali","doi":"10.1080/23307706.2023.2261938","DOIUrl":"https://doi.org/10.1080/23307706.2023.2261938","url":null,"abstract":"AbstractThe integration of cyber (network) with physical world is a big step in cyber-physical systems. This has revolutionised many industries. But this transformation has made cyber-physical systems vulnerable to attacks. One particular type of attack is the adversarial false data injection which injects false data in either the sensor measurements or the corresponding communication channel. A better understanding of how false data injection (FDI) attacks are constructed is crucial for developing strategies to protect against such attacks. In this paper, we consider two models for networked control systems and present an algorithm for constructing FDI attacks in each case and compare with an existing approach. The conditions for the attack to remain stealthy for systems equipped with a χ2 failure detector and the design of attack vectors that satisfy these conditions are discussed in detail. The algorithms are demonstrated by developing FDI attacks for two real-world examples.Keywords: False data injectionnetworked control systemcyber-physical systemcyber-attackmalicious data Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsSyed Ahmed PashaSyed Ahmed Pasha was born in Rawalpindi, Pakistan. He has a Bachelors degree in Electrical Engineering (2001). His Ph.D. (UNSW, 2009) is in Electrical Engineering. He has held two postdoc positions (UNSW, 2009–2011 & USyd, 2012–2013). He is currently Associate Professor at Air University, Pakistan and Visiting Fellow at UNSW since 2012. His research interests are in control and signal processing.Rijha SafdarRijha Safdar did her B.E. from Air University, Pakistan in 2015. She received an MS in Electrical Engineering in 2019 from National University of Sciences and Technology, Pakistan, where she is pursuing a Ph.D. in Electrical Engineering. She is currently Assistant Manager at Centre of Excellence in Science & Applied Technologies, Pakistan. Her research interests include control and cyber security.Syed Taha AliSyed Taha Ali did his BSc. from GIK Institute of Engineering Science and Technology in Pakistan in 2002, followed by an MS and PhD in Electrical Engineering from the University of New South Wales, Australia in 2006 and 2012. He did his postdoctoral research at the University of New South Wales, Australia, in 2013, and at Newcastle University, UK from 2014 to 2016. He is currently Associate Professor at National University of Sciences and Technology, Pakistan. His research interests include network security, cryptocurrencies, election protocols, and security applications of computer vision.","PeriodicalId":37267,"journal":{"name":"Journal of Control and Decision","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134961119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deterministic differential games in infinite horizon involving continuous and impulse controls 无限视界中包含连续和脉冲控制的确定性微分对策
4区 工程技术 Q2 Mathematics Pub Date : 2023-09-24 DOI: 10.1080/23307706.2023.2255594
Brahim El Asri, Hafid Lalioui
We consider a two-player zero-sum deterministic differential game where each player uses both continuous and impulse controls in infinite-time horizon. We assume that the impulses supposed to be of general term and the costs depend on the state of the system. We use the dynamic programming principle and viscosity solutions approach to show existence and uniqueness of a solution for the Hamilton-Jacobi-Bellman-Isaacs (HJBI) partial differential equations (PDEs) of the game. We prove under Isaacs condition that the upper and lower value functions coincide.
摘要研究了一类新的二人零和确定性微分对策,其中每个参与者在无限视界上同时使用连续和脉冲控制。我们假设脉冲的形式和代价分别取决于非线性函数和系统的状态。我们使用Bellman的动态规划原理(DPP)和粘性解方法来证明,对于这类对策,相关的Hamilton-Jacobi-Bellman-Isaacs (HJBI)偏微分方程(PDEs)解的存在性和唯一性。然后,在Isaacs条件下,我们推导出上下值函数重合,并给出了该对策的计算过程和数值检验。关键词:确定性微分对策,无限水平连续控制,脉冲控制,动态规划原理,密度解,艾萨克条件,分类:49K3549L2549N7090C3993C20致谢感谢审稿人的认真阅读,以及他们的有益意见和建议,使本文有了很大的改进。披露声明作者未报告潜在的利益冲突。本文第二作者的研究得到了摩洛哥国家科学技术研究中心CNRST的资助[资助号17 UIZ 19]。作者简介brahim El Asri,摩洛哥Agadir Ibn Zohr大学国家应用科学学院应用数学正教授。他的研究工作包括确定性和随机情况下的最优控制和微分对策,切换问题和倒向随机微分方程。Hafid Lalioui,分别于2016年和2018年在摩洛哥阿加迪尔的Ibn Zohr大学获得数学和应用学士学位和金融工程硕士学位。他是伊本·佐尔大学国家应用科学学院应用数学博士研究员。他的研究课题涉及确定性微分博弈,包括无限和有限时间范围内的冲动控制。他还对随机控制和强化学习在数学金融中具有挑战性的主题中的应用感兴趣。
{"title":"Deterministic differential games in infinite horizon involving continuous and impulse controls","authors":"Brahim El Asri, Hafid Lalioui","doi":"10.1080/23307706.2023.2255594","DOIUrl":"https://doi.org/10.1080/23307706.2023.2255594","url":null,"abstract":"We consider a two-player zero-sum deterministic differential game where each player uses both continuous and impulse controls in infinite-time horizon. We assume that the impulses supposed to be of general term and the costs depend on the state of the system. We use the dynamic programming principle and viscosity solutions approach to show existence and uniqueness of a solution for the Hamilton-Jacobi-Bellman-Isaacs (HJBI) partial differential equations (PDEs) of the game. We prove under Isaacs condition that the upper and lower value functions coincide.","PeriodicalId":37267,"journal":{"name":"Journal of Control and Decision","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135924790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive fault-tolerant control on complex networks with semi-Markov jump topology under random packet loss 随机丢包情况下半马尔可夫跳变拓扑复杂网络的自适应容错控制
4区 工程技术 Q2 Mathematics Pub Date : 2023-09-12 DOI: 10.1080/23307706.2023.2250367
Yunhan Qi, Lei Su, Rongsheng Xia, Tian Fang, Hao Shen
In this paper, semi-Markov process and adaptive fault-tolerant law are used to study the synchronization of complex networks in the presence of topology mutations and actuator failures. Firstly, the semi-Markov jump process, which is more practical than the traditional Markov jump process, is used to simulate the topology change of complex networks. Secondly, by designing adaptive fault-tolerant controller, the influence of actuator fault and interference on the system is eliminated. Then, considering the random packet loss caused by network channel congestion and limited bandwidth resources, a control strategy is developed to achieve convergence of the synchronisation error system. Finally, a numerical example and a practical example of Chua's circuit are given to verify the validity of the proposed theory.
本文利用半马尔可夫过程和自适应容错律研究了拓扑突变和执行器失效情况下复杂网络的同步问题。首先,采用比传统马尔可夫跳变过程更实用的半马尔可夫跳变过程来模拟复杂网络的拓扑变化;其次,通过设计自适应容错控制器,消除了执行器故障和干扰对系统的影响;然后,考虑到网络信道拥塞和有限的带宽资源导致的随机丢包,提出了一种控制策略来实现同步误差系统的收敛性。最后,给出了蔡氏电路的数值算例和实际算例,验证了所提理论的有效性。
{"title":"Adaptive fault-tolerant control on complex networks with semi-Markov jump topology under random packet loss","authors":"Yunhan Qi, Lei Su, Rongsheng Xia, Tian Fang, Hao Shen","doi":"10.1080/23307706.2023.2250367","DOIUrl":"https://doi.org/10.1080/23307706.2023.2250367","url":null,"abstract":"In this paper, semi-Markov process and adaptive fault-tolerant law are used to study the synchronization of complex networks in the presence of topology mutations and actuator failures. Firstly, the semi-Markov jump process, which is more practical than the traditional Markov jump process, is used to simulate the topology change of complex networks. Secondly, by designing adaptive fault-tolerant controller, the influence of actuator fault and interference on the system is eliminated. Then, considering the random packet loss caused by network channel congestion and limited bandwidth resources, a control strategy is developed to achieve convergence of the synchronisation error system. Finally, a numerical example and a practical example of Chua's circuit are given to verify the validity of the proposed theory.","PeriodicalId":37267,"journal":{"name":"Journal of Control and Decision","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135826207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Control and Decision
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1