首页 > 最新文献

IEEE Systems Journal最新文献

英文 中文
Failure Propagation Graphs for Studying Cascading Failure Propagation in Power Networks
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-10 DOI: 10.1109/JSYST.2024.3524246
Biwei Li;Dong Liu;Junyuan Fang;Xi Zhang;Chi K. Tse
Cascading failure, characterized by the widespread propagation of failure events, is a common cause for severe blackouts in power networks. Strengthening critical branches in a power network is crucial for mitigating the risk of blackouts resulting from cascading failures. In this article, we propose a time-efficient greedy search method to identify critical branches in a power network. We address the challenge of computational constraints by using a failure propagation graph, which accurately captures the critical failure propagation patterns based on cascading failure simulation. Our approach minimizes cascading failure risk while strategically reinforcing a limited number of branches. The failure-propagation-graph greedy-search (FPG-GS) algorithm selects candidate branches based on cascading failure simulation and iteratively identifies the most crucial branches. Our experimental results on different power systems demonstrate the superior performance and efficiency of the FPG-GS algorithm compared to existing methods. In addition, our study highlights the importance of strategic branch selection, showing that reinforcing one-fifth of the branches can achieve a mitigation rate exceeding 80%.
{"title":"Failure Propagation Graphs for Studying Cascading Failure Propagation in Power Networks","authors":"Biwei Li;Dong Liu;Junyuan Fang;Xi Zhang;Chi K. Tse","doi":"10.1109/JSYST.2024.3524246","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3524246","url":null,"abstract":"Cascading failure, characterized by the widespread propagation of failure events, is a common cause for severe blackouts in power networks. Strengthening critical branches in a power network is crucial for mitigating the risk of blackouts resulting from cascading failures. In this article, we propose a time-efficient greedy search method to identify critical branches in a power network. We address the challenge of computational constraints by using a failure propagation graph, which accurately captures the critical failure propagation patterns based on cascading failure simulation. Our approach minimizes cascading failure risk while strategically reinforcing a limited number of branches. The failure-propagation-graph greedy-search (FPG-GS) algorithm selects candidate branches based on cascading failure simulation and iteratively identifies the most crucial branches. Our experimental results on different power systems demonstrate the superior performance and efficiency of the FPG-GS algorithm compared to existing methods. In addition, our study highlights the importance of strategic branch selection, showing that reinforcing one-fifth of the branches can achieve a mitigation rate exceeding 80%.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"258-269"},"PeriodicalIF":4.0,"publicationDate":"2025-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Detrimental Weak Emergent Behavior Considering Operational Factors: A Case Study in Search and Rescue
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-06 DOI: 10.1109/JSYST.2024.3521477
R. A. Haugen;S. Kokkula;A. Ghaderi;G. Muller;E. Syverud
This article applies the design of experiments approach for detecting detrimental weak emergent behavior of an autonomous surface vessel operating in a dynamic environment on a search and rescue mission. The research utilizes orthogonal arrays in combination with regression analysis to systematically test the parameter space of an engineered system function. We explored the parameter space of interest and detected where the system model does not comply with a defined measure of effectiveness. The findings from this case study suggest that these methods enable a systematic exploration of the system's parameter space, allowing for the effective detection of detrimental weak emergent behavior. This approach potentially enhances test coverage, expands system operating knowledge and facilitates mitigation efforts more efficiently.
{"title":"Detection of Detrimental Weak Emergent Behavior Considering Operational Factors: A Case Study in Search and Rescue","authors":"R. A. Haugen;S. Kokkula;A. Ghaderi;G. Muller;E. Syverud","doi":"10.1109/JSYST.2024.3521477","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3521477","url":null,"abstract":"This article applies the design of experiments approach for detecting detrimental weak emergent behavior of an autonomous surface vessel operating in a dynamic environment on a search and rescue mission. The research utilizes orthogonal arrays in combination with regression analysis to systematically test the parameter space of an engineered system function. We explored the parameter space of interest and detected where the system model does not comply with a defined measure of effectiveness. The findings from this case study suggest that these methods enable a systematic exploration of the system's parameter space, allowing for the effective detection of detrimental weak emergent behavior. This approach potentially enhances test coverage, expands system operating knowledge and facilitates mitigation efforts more efficiently.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"43-54"},"PeriodicalIF":4.0,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Game-Theoretic Joint Coalition Formation and Power Allocation Strategy for Multitarget Tracking in Distributed Radar Network
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-31 DOI: 10.1109/JSYST.2024.3522100
Chenguang Shi;Xuezhang Sun;Xiangrong Dai;Jianjiang Zhou
In this article, a game-theoretic joint coalition formation and power allocation (JCFPA) strategy is investigated for multitarget tracking (MTT) in a distributed radar network. The main objective of the presented strategy is to minimize the total transmit power consumption and enhance the target tracking accuracy concurrently, while adhering to predefined requirements on the MTT performance and system illumination resource budgets, thus improving the low probability of intercept performance. To achieve this, a utility function is developed to evaluate the coalition structure, transmit power consumption, and tracking accuracy. Then, by formulating the cooperative interactions among radars as a coalition game, we establish an optimization model to optimize the coalition structure and power allocation for the distributed radar network. The existence of the Nash equilibrium solution for the game is proven mathematically. To address the optimization model, an iterative three-step algorithm is developed based on the sequential quadratic programming. Numerical results reveal that the presented JCFPA strategy obtains superior system performance compared to other benchmarks.
{"title":"Game-Theoretic Joint Coalition Formation and Power Allocation Strategy for Multitarget Tracking in Distributed Radar Network","authors":"Chenguang Shi;Xuezhang Sun;Xiangrong Dai;Jianjiang Zhou","doi":"10.1109/JSYST.2024.3522100","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3522100","url":null,"abstract":"In this article, a game-theoretic joint coalition formation and power allocation (JCFPA) strategy is investigated for multitarget tracking (MTT) in a distributed radar network. The main objective of the presented strategy is to minimize the total transmit power consumption and enhance the target tracking accuracy concurrently, while adhering to predefined requirements on the MTT performance and system illumination resource budgets, thus improving the low probability of intercept performance. To achieve this, a utility function is developed to evaluate the coalition structure, transmit power consumption, and tracking accuracy. Then, by formulating the cooperative interactions among radars as a coalition game, we establish an optimization model to optimize the coalition structure and power allocation for the distributed radar network. The existence of the Nash equilibrium solution for the game is proven mathematically. To address the optimization model, an iterative three-step algorithm is developed based on the sequential quadratic programming. Numerical results reveal that the presented JCFPA strategy obtains superior system performance compared to other benchmarks.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"234-245"},"PeriodicalIF":4.0,"publicationDate":"2024-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
System-Level Analysis of the Directional Radar Coverage for UAV Localization in Dynamic Swarms
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-31 DOI: 10.1109/JSYST.2024.3519887
Anna Gaydamaka;Mahmoud T. Kabir;Andrey Samuylov;Dmitri Moltchanov;Bo Tan;Yevgeni Koucheryavy
Numerous mission-critical unmanned aerial vehicle (UAV) operations, such as rescue and surveillance missions, are conducted in areas lacking access to external infrastructure providing precise positioning information. To enhance situational awareness in such scenarios, millimeter wave (mmWave, $text{30}-text{300}$ GHz) and subterahertz (sub-THz, $text{100}-text{300}$ GHz) range or Doppler radars promising large resolution can be employed. However, the small antenna apertures in these bands naturally call for the use of massive antenna arrays to achieve reasonable detection distances. By employing directional antenna arrays, these radars need to exhaustively scan the surroundings to ensure situational awareness of a UAV in a swarm. The aim of this article is to characterize the system-level performance of mmWave/sub-THz range and Doppler radars as a function of system parameters by accounting for the propagation specifics of the considered bands. To this aim, we combine the tools of stochastic geometry and antenna simulations to determine the optimal half-power beamwidth that minimizes the full scanning time while maximizing the detection probability of all UAVs in a swarm. Our results demonstrate that both types of radars are characterized by qualitatively similar performance. Detection performance is highly sensitive to both UAV density and coverage radius, as the increase in these parameters leads to an abrupt drop in the detection performance. At small distances, $leq!text{50}$ m, antenna arrays with a smaller number of elements result in the best tradeoff between scanning time and detection probability. Specifically, both types of radars provide perfect knowledge of the surroundings (with detection probability higher than 0.99) within a 50-m radius with a scanning time of less than 1 ms. At greater distances, $geq! text{100}$ m, the only option to improve performance is a drastic increase in the emitted power or receiver sensitivity.
{"title":"System-Level Analysis of the Directional Radar Coverage for UAV Localization in Dynamic Swarms","authors":"Anna Gaydamaka;Mahmoud T. Kabir;Andrey Samuylov;Dmitri Moltchanov;Bo Tan;Yevgeni Koucheryavy","doi":"10.1109/JSYST.2024.3519887","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3519887","url":null,"abstract":"Numerous mission-critical unmanned aerial vehicle (UAV) operations, such as rescue and surveillance missions, are conducted in areas lacking access to external infrastructure providing precise positioning information. To enhance situational awareness in such scenarios, millimeter wave (mmWave, <inline-formula><tex-math>$text{30}-text{300}$</tex-math></inline-formula> GHz) and subterahertz (sub-THz, <inline-formula><tex-math>$text{100}-text{300}$</tex-math></inline-formula> GHz) range or Doppler radars promising large resolution can be employed. However, the small antenna apertures in these bands naturally call for the use of massive antenna arrays to achieve reasonable detection distances. By employing directional antenna arrays, these radars need to exhaustively scan the surroundings to ensure situational awareness of a UAV in a swarm. The aim of this article is to characterize the system-level performance of mmWave/sub-THz range and Doppler radars as a function of system parameters by accounting for the propagation specifics of the considered bands. To this aim, we combine the tools of stochastic geometry and antenna simulations to determine the optimal half-power beamwidth that minimizes the full scanning time while maximizing the detection probability of all UAVs in a swarm. Our results demonstrate that both types of radars are characterized by qualitatively similar performance. Detection performance is highly sensitive to both UAV density and coverage radius, as the increase in these parameters leads to an abrupt drop in the detection performance. At small distances, <inline-formula><tex-math>$leq!text{50}$</tex-math></inline-formula> m, antenna arrays with a smaller number of elements result in the best tradeoff between scanning time and detection probability. Specifically, both types of radars provide perfect knowledge of the surroundings (with detection probability higher than 0.99) within a 50-m radius with a scanning time of less than 1 ms. At greater distances, <inline-formula><tex-math>$geq! text{100}$</tex-math></inline-formula> m, the only option to improve performance is a drastic increase in the emitted power or receiver sensitivity.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"164-175"},"PeriodicalIF":4.0,"publicationDate":"2024-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10818969","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Adaptive Synchronous Lightweight AKA Protocol With Authority Management for Wireless Medical Sensor Networks
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-31 DOI: 10.1109/JSYST.2024.3519516
Lei Zhang;Ting Wu;Jianwei Liu;Zhenyu Guan;Xiaodong Yin
The advancement of wireless network technology has propelled wireless medical sensor networks (WMSNs) to transform healthcare, offering efficient communication for enhanced quality of life. These networks employ sensitive and resource-efficient sensors to monitor and transmit patients' vital health data to medical professionals through wireless channels. However, the openness of these channels risks unauthorized access and data tampering, jeopardizing patient privacy and treatment efficacy. Ensuring the integrity and confidentiality of health data is crucial. Current authentication and key agreement (AKA) protocols have limitations, including susceptibility to sensor information disclosure and security flaws due to excessive user authority and mismatched pseudorandom identities. Given the resource constraints of WMSNs, traditional cryptographic methods are not always suitable. To overcome these challenges, a lightweight AKA protocol with self-adaptive synchronization and authority management is proposed. Formal verification through the real-or-random model, BAN logic, and ProVerif tool confirms its security and availability, while informal analysis demonstrates its robust security features. Comparative analysis with recent schemes also highlights its superiority and fitness for WMSNs.
{"title":"An Adaptive Synchronous Lightweight AKA Protocol With Authority Management for Wireless Medical Sensor Networks","authors":"Lei Zhang;Ting Wu;Jianwei Liu;Zhenyu Guan;Xiaodong Yin","doi":"10.1109/JSYST.2024.3519516","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3519516","url":null,"abstract":"The advancement of wireless network technology has propelled wireless medical sensor networks (WMSNs) to transform healthcare, offering efficient communication for enhanced quality of life. These networks employ sensitive and resource-efficient sensors to monitor and transmit patients' vital health data to medical professionals through wireless channels. However, the openness of these channels risks unauthorized access and data tampering, jeopardizing patient privacy and treatment efficacy. Ensuring the integrity and confidentiality of health data is crucial. Current authentication and key agreement (AKA) protocols have limitations, including susceptibility to sensor information disclosure and security flaws due to excessive user authority and mismatched pseudorandom identities. Given the resource constraints of WMSNs, traditional cryptographic methods are not always suitable. To overcome these challenges, a lightweight AKA protocol with self-adaptive synchronization and authority management is proposed. Formal verification through the real-or-random model, BAN logic, and ProVerif tool confirms its security and availability, while informal analysis demonstrates its robust security features. Comparative analysis with recent schemes also highlights its superiority and fitness for WMSNs.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"200-211"},"PeriodicalIF":4.0,"publicationDate":"2024-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AoI-Aware Resource Allocation for Smart Multi-QoS Provisioning
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-27 DOI: 10.1109/JSYST.2024.3519536
Jingqing Wang;Wenchi Cheng;Wei Zhang
The age of information (AoI) has recently gained recognition as a critical quality-of-service (QoS) metric for quantifying the freshness of status updates, playing a crucial role in supporting massive ultrareliable and low-latency communications (mURLLCs). In mURLLC scenarios, status updates generally involve the transmission through applying finite blocklength coding (FBC) to efficiently encode small update packets while meeting stringent error-rate and latency-bounded QoS constraints. However, due to inherent system dynamics and varying environmental conditions, optimizing AoI under such multi-QoS constraints often results in nonconvex and computationally intractable problems. Motivated by the demonstrated efficacy of deep reinforcement learning (DRL) in addressing large-scale networking challenges, this work aims to apply DRL techniques to derive optimal resource allocation solutions in real time. Despite its potential, the effective integration of FBC in DRL-based AoI optimization remains underexplored, especially in addressing the challenge of simultaneously upper bounding both delay and error rate. To address these challenges, we propose a DRL-based framework for AoI-aware optimal resource allocation in mURLLC-driven multi-QoS schemes, leveraging AoI as a core metric within the finite blocklength regime. First, we design a wireless communication architecture and AoI-based modeling framework that incorporates FBC. Second, we proceed by deriving upper bounded peak AoI and delay violation probabilities using stochastic network calculus. Subsequently, we formulate an optimization problem aimed at minimizing the peak AoI violation probability through FBC. Third, we develop DRL algorithms to determine optimal resource allocation policies that meet statistical delay and error-rate requirements for mURLLC. Finally, to validate the effectiveness of the developed schemes, we have executed a series of simulations.
{"title":"AoI-Aware Resource Allocation for Smart Multi-QoS Provisioning","authors":"Jingqing Wang;Wenchi Cheng;Wei Zhang","doi":"10.1109/JSYST.2024.3519536","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3519536","url":null,"abstract":"The age of information (AoI) has recently gained recognition as a critical quality-of-service (QoS) metric for quantifying the freshness of status updates, playing a crucial role in supporting massive ultrareliable and low-latency communications (mURLLCs). In mURLLC scenarios, status updates generally involve the transmission through applying finite blocklength coding (FBC) to efficiently encode small update packets while meeting stringent error-rate and latency-bounded QoS constraints. However, due to inherent system dynamics and varying environmental conditions, optimizing AoI under such multi-QoS constraints often results in nonconvex and computationally intractable problems. Motivated by the demonstrated efficacy of deep reinforcement learning (DRL) in addressing large-scale networking challenges, this work aims to apply DRL techniques to derive optimal resource allocation solutions in real time. Despite its potential, the effective integration of FBC in DRL-based AoI optimization remains underexplored, especially in addressing the challenge of simultaneously upper bounding both delay and error rate. To address these challenges, we propose a DRL-based framework for AoI-aware optimal resource allocation in mURLLC-driven multi-QoS schemes, leveraging AoI as a core metric within the finite blocklength regime. First, we design a wireless communication architecture and AoI-based modeling framework that incorporates FBC. Second, we proceed by deriving upper bounded peak AoI and delay violation probabilities using stochastic network calculus. Subsequently, we formulate an optimization problem aimed at minimizing the peak AoI violation probability through FBC. Third, we develop DRL algorithms to determine optimal resource allocation policies that meet statistical delay and error-rate requirements for mURLLC. Finally, to validate the effectiveness of the developed schemes, we have executed a series of simulations.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"305-316"},"PeriodicalIF":4.0,"publicationDate":"2024-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge Server and Service Deployment Considering Profit With Improved PSO in IoV
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-18 DOI: 10.1109/JSYST.2024.3512871
Junhui Zhao;Yuwen Huang;Qingmiao Zhang;Dongming Wang;Wei Xu
Mobile edge computing (MEC) plays a pivotal role in the Internet of Vehicles and the Internet of Things. Edge server deployment is the initial step in establishing edge computing systems, which impact the overall system performance significantly. Besides, the performance of an edge computing system is also contingent upon the type of service deployed on servers, in the case of the same server deployment, different deployment of services will bring different profits. Most current studies concentrate solely on the former aspect, neglecting the optimization of service deployment in MEC system. In this article, we proposed a two-step method KPSOP for edge server and edge service deployment, aiming to reduce time delay, balance load, and improve the profit of MEC system, and KPSOP includes clustering algorithm and heuristic algorithm. We considered the location distribution of base stations, the task requests of vehicle users, the resource limitations of edge servers, etc. First, the edge server deployment was completed with the goal of minimizing time delay and load balancing. Second, the service deployment was completed with the goal of maximizing edge server profit. The experiments were based on real world base station information. The simulation results validate that our algorithm is more stable and converges faster. In addition, compared to other algorithms, it performs better in load balance and increasing profit.
{"title":"Edge Server and Service Deployment Considering Profit With Improved PSO in IoV","authors":"Junhui Zhao;Yuwen Huang;Qingmiao Zhang;Dongming Wang;Wei Xu","doi":"10.1109/JSYST.2024.3512871","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3512871","url":null,"abstract":"Mobile edge computing (MEC) plays a pivotal role in the Internet of Vehicles and the Internet of Things. Edge server deployment is the initial step in establishing edge computing systems, which impact the overall system performance significantly. Besides, the performance of an edge computing system is also contingent upon the type of service deployed on servers, in the case of the same server deployment, different deployment of services will bring different profits. Most current studies concentrate solely on the former aspect, neglecting the optimization of service deployment in MEC system. In this article, we proposed a two-step method KPSOP for edge server and edge service deployment, aiming to reduce time delay, balance load, and improve the profit of MEC system, and KPSOP includes clustering algorithm and heuristic algorithm. We considered the location distribution of base stations, the task requests of vehicle users, the resource limitations of edge servers, etc. First, the edge server deployment was completed with the goal of minimizing time delay and load balancing. Second, the service deployment was completed with the goal of maximizing edge server profit. The experiments were based on real world base station information. The simulation results validate that our algorithm is more stable and converges faster. In addition, compared to other algorithms, it performs better in load balance and increasing profit.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"55-64"},"PeriodicalIF":4.0,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Output Feedback Tracking Consensus of Switched Stochastic Uncertain Multiagent Systems via Event-Triggered Control
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-17 DOI: 10.1109/JSYST.2024.3511914
Jiayi Cai;Chengbo Yi;Xue Luo;Canrong Xiao
This article explores the adaptive event-triggered output consensus control problem for a class of switched stochastic multiagent systems (MASs) with unmeasured states and unknown nonlinearity. First, in order to overcome the limitations facing the average dwell-time method of consensus for switched MASs proposed in the existing works, the adaptive control protocol within the framework of mode-dependent average dwell time (MDADT) is introduced to expand the scope of applications. Furthermore, through a novel gain-scheduled state observer, the fuzzy logic systems are applied to approximate the unknown nonlinear functions. The dynamic surface design method is used to remove the need for derivative calculations of the constructed virtual controls, significantly the complexity of calculations. In addition, under the framework of backstepping design, the switching threshold event-triggered control strategy is developed to effectively decrease the communication load and balance the performance of MASs. The proposed control protocol ensures that all signals within the closed-loop systems are ultimately bounded under the MDADT switching property. Finally, the simulation results are obtained to validate the proposed control mechanism.
{"title":"Output Feedback Tracking Consensus of Switched Stochastic Uncertain Multiagent Systems via Event-Triggered Control","authors":"Jiayi Cai;Chengbo Yi;Xue Luo;Canrong Xiao","doi":"10.1109/JSYST.2024.3511914","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3511914","url":null,"abstract":"This article explores the adaptive event-triggered output consensus control problem for a class of switched stochastic multiagent systems (MASs) with unmeasured states and unknown nonlinearity. First, in order to overcome the limitations facing the average dwell-time method of consensus for switched MASs proposed in the existing works, the adaptive control protocol within the framework of mode-dependent average dwell time (MDADT) is introduced to expand the scope of applications. Furthermore, through a novel gain-scheduled state observer, the fuzzy logic systems are applied to approximate the unknown nonlinear functions. The dynamic surface design method is used to remove the need for derivative calculations of the constructed virtual controls, significantly the complexity of calculations. In addition, under the framework of backstepping design, the switching threshold event-triggered control strategy is developed to effectively decrease the communication load and balance the performance of MASs. The proposed control protocol ensures that all signals within the closed-loop systems are ultimately bounded under the MDADT switching property. Finally, the simulation results are obtained to validate the proposed control mechanism.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"130-141"},"PeriodicalIF":4.0,"publicationDate":"2024-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed $mathcal {H}_{infty }$ Resilient Bipartite Control of Multiagent Systems With Semi-Markov Switching
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-13 DOI: 10.1109/JSYST.2024.3506812
Lin Sun;Mingming Wang;Chong Wu;Yuan Ping;Juntong Qi
When information interaction occurs among agents, the communication network could be attacked or the signal interrupted, culminating in systemic instability and mission failure. Therefore, this article proposes $mathcal {H}_{infty }$ resilient bipartite control method to address the security problem of network information interaction among agents within competitive and cooperative multiagent systems. When the communication networks among agents are subject to a replay attack, the system model integrating multisensor weight fusion with an unknown input leader is established first. Then, a detection fusion algorithm is proposed to simultaneously uncover attacker behavior and identify tampered sensors. Considering the intermittent or interrupted communication resulting from the time variability of topology switching among agents, the switching topology is modeled by a semi-Markov process within a signed graph having positive and negative interaction weights. Subsequently, a distributed observer is designed to estimate the unknown input leader, utilizing the semi-Markov interactions among agents and incorporating an adaptive update mechanism to eliminate the dependency on global topology information. Ulteriorly, by solving convex optimization problems, a distributed resilient bipartite controller relying on the observer state is formulated, and achieves the expected $mathcal {H}_{infty }$ performance while remaining resilient against replay attacks. Finally, the superiority of the proposed method is validated through comparative examples.
当代理之间发生信息交互时,通信网络可能受到攻击或信号中断,最终导致系统不稳定和任务失败。因此,本文提出了$mathcal {H}_{infty }$弹性二叉控制方法来解决竞争与合作多代理系统中代理间网络信息交互的安全问题。当代理间的通信网络受到重放攻击时,首先建立了未知输入领导者的多传感器权重融合系统模型。然后,提出一种检测融合算法,以同时发现攻击者行为和识别被篡改的传感器。考虑到代理间拓扑切换的时变性所导致的间歇性或中断通信,切换拓扑由具有正负交互权重的有符号图中的半马尔可夫过程建模。随后,设计了一个分布式观测器,利用代理之间的半马尔可夫交互作用来估计未知的输入领导者,并结合自适应更新机制来消除对全局拓扑信息的依赖。最后,通过求解凸优化问题,制定了依赖于观测器状态的分布式弹性双向控制器,并在抵御重放攻击的同时实现了预期的 $mathcal {H}_{infty }$ 性能。最后,通过对比实例验证了所提方法的优越性。
{"title":"Distributed $mathcal {H}_{infty }$ Resilient Bipartite Control of Multiagent Systems With Semi-Markov Switching","authors":"Lin Sun;Mingming Wang;Chong Wu;Yuan Ping;Juntong Qi","doi":"10.1109/JSYST.2024.3506812","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3506812","url":null,"abstract":"When information interaction occurs among agents, the communication network could be attacked or the signal interrupted, culminating in systemic instability and mission failure. Therefore, this article proposes <inline-formula><tex-math>$mathcal {H}_{infty }$</tex-math></inline-formula> resilient bipartite control method to address the security problem of network information interaction among agents within competitive and cooperative multiagent systems. When the communication networks among agents are subject to a replay attack, the system model integrating multisensor weight fusion with an unknown input leader is established first. Then, a detection fusion algorithm is proposed to simultaneously uncover attacker behavior and identify tampered sensors. Considering the intermittent or interrupted communication resulting from the time variability of topology switching among agents, the switching topology is modeled by a semi-Markov process within a signed graph having positive and negative interaction weights. Subsequently, a distributed observer is designed to estimate the unknown input leader, utilizing the semi-Markov interactions among agents and incorporating an adaptive update mechanism to eliminate the dependency on global topology information. Ulteriorly, by solving convex optimization problems, a distributed resilient bipartite controller relying on the observer state is formulated, and achieves the expected <inline-formula><tex-math>$mathcal {H}_{infty }$</tex-math></inline-formula> performance while remaining resilient against replay attacks. Finally, the superiority of the proposed method is validated through comparative examples.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"152-163"},"PeriodicalIF":4.0,"publicationDate":"2024-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143637868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
2024 Index IEEE Systems Journal Vol. 18 2024索引IEEE系统学报第18卷
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-12 DOI: 10.1109/JSYST.2024.3514272
{"title":"2024 Index IEEE Systems Journal Vol. 18","authors":"","doi":"10.1109/JSYST.2024.3514272","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3514272","url":null,"abstract":"","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 4","pages":"2177-2223"},"PeriodicalIF":4.0,"publicationDate":"2024-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10795294","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142810341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Systems Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1