首页 > 最新文献

IEEE Systems Journal最新文献

英文 中文
Improved GBNN Guided Multirobot Coverage Search Based on Neuronal Connectivity 基于神经元连通性的改进GBNN引导多机器人覆盖搜索
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-28 DOI: 10.1109/JSYST.2025.3567283
Fangfang Zhang;Yongqi Wang;Jianbin Xin;Haijing Wang;Jinzhu Peng;Yaonan Wang
The multirobot coverage search problem in unknown environments has attracted significant attention. However, the existing methods are inefficient in the search process. The aim of the present study is to improve the search efficiency through an enhanced bioinspired neural network method. In this work, a connected Glasius bioinspired neural network (CGBNN) model is introduced to address the lack of consideration for neuronal connectivity and transmission properties in existing studies. The dynamic search environment is represented by the changes in neurons' activity values, which guide the robots in performing the search task. Each robot automatically plans its search path according to the principle of the decreasing gradient of CGBNN activity values until the task is completed. Experimental results demonstrate that the robots can avoid different types of obstacles to complete the coverage search, confirming the effectiveness of the proposed method. Meanwhile, it indicates that the proposed method outperforms others, the coverage rate is improved by 6.90%, 6.22%, and 4.02% compared to the GBNN, A-RPSO, and DMPC algorithms, respectively. In adition, the decision time is less affected by the complexity of the environment, which fulfills the practical demands of real-time decision-making in a large-scale complex environment.
未知环境下的多机器人覆盖搜索问题引起了人们的广泛关注。然而,现有的方法在搜索过程中效率低下。本研究的目的是通过一种增强的生物神经网络方法来提高搜索效率。在这项工作中,引入了一个连接的Glasius生物启发神经网络(CGBNN)模型,以解决现有研究中缺乏考虑神经元连接和传递特性的问题。动态搜索环境由神经元活动值的变化来表示,神经元活动值的变化指导机器人执行搜索任务。每个机器人根据CGBNN活动值梯度递减的原则自动规划自己的搜索路径,直到任务完成。实验结果表明,机器人可以避开不同类型的障碍物完成覆盖搜索,验证了所提方法的有效性。与GBNN、A-RPSO和DMPC算法相比,该方法的覆盖率分别提高了6.90%、6.22%和4.02%。此外,决策时间受环境复杂性影响较小,满足了大规模复杂环境下实时决策的实际需求。
{"title":"Improved GBNN Guided Multirobot Coverage Search Based on Neuronal Connectivity","authors":"Fangfang Zhang;Yongqi Wang;Jianbin Xin;Haijing Wang;Jinzhu Peng;Yaonan Wang","doi":"10.1109/JSYST.2025.3567283","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3567283","url":null,"abstract":"The multirobot coverage search problem in unknown environments has attracted significant attention. However, the existing methods are inefficient in the search process. The aim of the present study is to improve the search efficiency through an enhanced bioinspired neural network method. In this work, a connected Glasius bioinspired neural network (CGBNN) model is introduced to address the lack of consideration for neuronal connectivity and transmission properties in existing studies. The dynamic search environment is represented by the changes in neurons' activity values, which guide the robots in performing the search task. Each robot automatically plans its search path according to the principle of the decreasing gradient of CGBNN activity values until the task is completed. Experimental results demonstrate that the robots can avoid different types of obstacles to complete the coverage search, confirming the effectiveness of the proposed method. Meanwhile, it indicates that the proposed method outperforms others, the coverage rate is improved by 6.90%, 6.22%, and 4.02% compared to the GBNN, A-RPSO, and DMPC algorithms, respectively. In adition, the decision time is less affected by the complexity of the environment, which fulfills the practical demands of real-time decision-making in a large-scale complex environment.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"701-711"},"PeriodicalIF":4.0,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144339028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TL-ConvLSTM: A Transfer-Learning-Based Convolutional LSTM to Identify and Forecast Traffic in the NextG Environments TL-ConvLSTM:一种基于迁移学习的卷积LSTM,用于识别和预测未来环境中的流量
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-28 DOI: 10.1109/JSYST.2025.3569445
Bikash Chandra Singh;Peter Foytik;Rafael Diaz;Sachin Shetty
Forecasting and categorizing cellular traffic flows and their types are essential functions in intelligent network systems to ensure efficient network optimization. The ever-evolving nature of 5G networks results in fluctuations in traffic patterns over time, leading to a phenomenon known as model drift. Consequently, accurately predicting and identifying cellular traffic patterns becomes a complex task. To tackle this challenge, this article introduces an innovative approach called TL-ConvLSTM, which combines transfer learning with convolutional long short-term memory (ConvLSTM) to effectively combat model drift and provide precise forecasting and recognition of cellular traffic within the network. To accomplish this, we initiate the training of TL-ConvLSTM by estimating its parameters from the source domain. We then employ the Kolmogorov–Smirnov method to adapt the model within the target domain, fine tuning its weights. To improve the precision of this model adaptation, we systematically explore optimal learning windows. This exploration includes adjusting window size for time-series data and feature dimensions to capture dynamic traffic patterns in a 5G environment. Furthermore, we make use of the Amarisoft 5G testbed in our lab to create a 12-day time-series dataset. This dataset includes various features related to traffic flows and their patterns. We showcase the effectiveness of our approach through a set of experiments.
对蜂窝通信流及其类型进行预测和分类是智能网络系统中保证网络高效优化的重要功能。5G网络不断发展的特性导致流量模式随着时间的推移而波动,从而导致一种被称为模型漂移的现象。因此,准确预测和识别蜂窝通信模式成为一项复杂的任务。为了应对这一挑战,本文介绍了一种名为TL-ConvLSTM的创新方法,该方法将迁移学习与卷积长短期记忆(ConvLSTM)相结合,以有效地对抗模型漂移,并提供对网络内蜂窝流量的精确预测和识别。为了实现这一点,我们通过从源域估计其参数来启动TL-ConvLSTM的训练。然后,我们使用Kolmogorov-Smirnov方法在目标域内调整模型,微调其权重。为了提高模型自适应的精度,我们系统地探索了最优学习窗口。这一探索包括调整时间序列数据和特征维度的窗口大小,以捕捉5G环境中的动态流量模式。此外,我们利用我们实验室的Amarisoft 5G测试平台创建了一个为期12天的时间序列数据集。该数据集包括与交通流及其模式相关的各种特征。我们通过一系列实验展示了我们方法的有效性。
{"title":"TL-ConvLSTM: A Transfer-Learning-Based Convolutional LSTM to Identify and Forecast Traffic in the NextG Environments","authors":"Bikash Chandra Singh;Peter Foytik;Rafael Diaz;Sachin Shetty","doi":"10.1109/JSYST.2025.3569445","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3569445","url":null,"abstract":"Forecasting and categorizing cellular traffic flows and their types are essential functions in intelligent network systems to ensure efficient network optimization. The ever-evolving nature of 5G networks results in fluctuations in traffic patterns over time, leading to a phenomenon known as model drift. Consequently, accurately predicting and identifying cellular traffic patterns becomes a complex task. To tackle this challenge, this article introduces an innovative approach called <italic>TL-ConvLSTM</i>, which combines transfer learning with convolutional long short-term memory (ConvLSTM) to effectively combat model drift and provide precise forecasting and recognition of cellular traffic within the network. To accomplish this, we initiate the training of <italic>TL-ConvLSTM</i> by estimating its parameters from the source domain. We then employ the Kolmogorov–Smirnov method to adapt the model within the target domain, fine tuning its weights. To improve the precision of this model adaptation, we systematically explore optimal learning windows. This exploration includes adjusting window size for time-series data and feature dimensions to capture dynamic traffic patterns in a 5G environment. Furthermore, we make use of the Amarisoft 5G testbed in our lab to create a 12-day time-series dataset. This dataset includes various features related to traffic flows and their patterns. We showcase the effectiveness of our approach through a set of experiments.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"358-369"},"PeriodicalIF":4.0,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DAMAGE: Directed Heterogeneous Network Attack Sequence Inference Through Graph Attention Matrix Generation Embedding and Reinforcement Learning 损害:通过图注意矩阵生成嵌入和强化学习的定向异构网络攻击序列推断
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-28 DOI: 10.1109/JSYST.2025.3547491
Hongfu Liu;Chengyi Zeng;Zhen Li;Lina Lu;Jing Chen;Zongtan Zhou
Distributed heterogeneous multiagent systems (DHMASs) link geographically dispersed agents through networks, harnessing information technology to foster collaboration. Considering the mainstream status of wireless communication in modern multiagent systems and the differences in the performance of interagent communication devices, we believe that it is appropriate to use directed heterogeneous networks (DHNs) to model distributed heterogeneous multiagent systems. This model not only reflects the directionality of interagent communication but also reflects the complexity of communication due to performance differences, thus providing a more accurate framework for understanding and optimizing system behavior. The study of disintegration in DHNs is vital for enhancing the decision-making agility of DHMAS. We introduce Directed heterogeneous network Attack sequence inference through graph attention MAtrix Generation Embedding and reinforcement learning (DAMAGE), an algorithm that integrates graph neural networks and reinforcement learning within an inductive reasoning framework. DAMAGE is designed to optimize the generation of disintegration strategies, improving the efficiency of network breakdown processes. Our approach includes a directed network embedding technique with a graph attention matrix generation module, which enhances the utilization of imperfect network structure information. Through ablation studies, we demonstrate that DAMAGE not only increases the effectiveness of network disintegration under perfect topological conditions but also maintains robustness in scenario with imperfect topological information.
分布式异构多代理系统(DHMASs)通过网络连接地理上分散的代理,利用信息技术促进协作。考虑到无线通信在现代多智能体系统中的主流地位和智能体间通信设备的性能差异,我们认为使用定向异构网络(dhn)来建模分布式异构多智能体系统是合适的。该模型不仅反映了智能体间通信的方向性,也反映了由于性能差异而导致的通信复杂性,从而为理解和优化系统行为提供了更准确的框架。研究DHNs的解体对提高DHMAS的决策敏捷性具有重要意义。我们通过图注意矩阵生成嵌入和强化学习(DAMAGE)引入有向异构网络攻击序列推理,这是一种在归纳推理框架内集成图神经网络和强化学习的算法。该算法旨在优化分解策略的生成,提高网络分解过程的效率。该方法采用了一种有向网络嵌入技术和一个图注意矩阵生成模块,增强了对不完全网络结构信息的利用。通过烧蚀研究,我们证明了损伤算法不仅在完美拓扑条件下提高了网络分解的有效性,而且在不完美拓扑条件下保持了网络分解的鲁棒性。
{"title":"DAMAGE: Directed Heterogeneous Network Attack Sequence Inference Through Graph Attention Matrix Generation Embedding and Reinforcement Learning","authors":"Hongfu Liu;Chengyi Zeng;Zhen Li;Lina Lu;Jing Chen;Zongtan Zhou","doi":"10.1109/JSYST.2025.3547491","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3547491","url":null,"abstract":"Distributed heterogeneous multiagent systems (DHMASs) link geographically dispersed agents through networks, harnessing information technology to foster collaboration. Considering the mainstream status of wireless communication in modern multiagent systems and the differences in the performance of interagent communication devices, we believe that it is appropriate to use directed heterogeneous networks (DHNs) to model distributed heterogeneous multiagent systems. This model not only reflects the directionality of interagent communication but also reflects the complexity of communication due to performance differences, thus providing a more accurate framework for understanding and optimizing system behavior. The study of disintegration in DHNs is vital for enhancing the decision-making agility of DHMAS. We introduce <underline>D</u>irected heterogeneous network <underline>A</u>ttack sequence inference through graph attention <underline>MA</u>trix <underline>G</u>eneration <underline>E</u>mbedding and reinforcement learning (DAMAGE), an algorithm that integrates graph neural networks and reinforcement learning within an inductive reasoning framework. DAMAGE is designed to optimize the generation of disintegration strategies, improving the efficiency of network breakdown processes. Our approach includes a directed network embedding technique with a graph attention matrix generation module, which enhances the utilization of imperfect network structure information. Through ablation studies, we demonstrate that DAMAGE not only increases the effectiveness of network disintegration under perfect topological conditions but also maintains robustness in scenario with imperfect topological information.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"392-403"},"PeriodicalIF":4.0,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Permutation-Based Firmware Remote Attestation for Internet-of-Things Edge-Based Network 基于置换的物联网边缘网络固件远程认证
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-27 DOI: 10.1109/JSYST.2025.3550055
Zainab AlJabri;Jemal H. Abawajy
Firmware security in edge-enabled IoT devices is crucial, but existing methods struggle to balance strong protection with realistic hardware trust assumptions, device privacy, nontraceability, and resilience against attacks. This article addresses these challenges by introducing a novel permutation-based firmware attestation mechanism. Our method leverages edge servers as verifiers, low-cost memory, randomized permutations, and avalanche criteria for optimized security and efficiency. Rigorous formal and informal security analysis, coupled with performance evaluation, demonstrates superior performance against various attacks, achieving over 90% detection probability and effectively mitigating both remote and mobile software attacks. These results demonstrate the significant potential of our approach for enhancing firmware security in edge-enabled IoT devices.
支持边缘的物联网设备的固件安全性至关重要,但现有方法难以平衡强大的保护与现实的硬件信任假设、设备隐私、不可追溯性和抵御攻击的弹性。本文通过引入一种新的基于排列的固件认证机制来解决这些挑战。我们的方法利用边缘服务器作为验证器、低成本内存、随机排列和雪崩标准来优化安全性和效率。严格的正式和非正式安全分析,加上性能评估,对各种攻击表现出卓越的性能,实现超过90%的检测概率,有效减轻远程和移动软件攻击。这些结果证明了我们的方法在增强边缘物联网设备的固件安全性方面的巨大潜力。
{"title":"Permutation-Based Firmware Remote Attestation for Internet-of-Things Edge-Based Network","authors":"Zainab AlJabri;Jemal H. Abawajy","doi":"10.1109/JSYST.2025.3550055","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3550055","url":null,"abstract":"Firmware security in edge-enabled IoT devices is crucial, but existing methods struggle to balance strong protection with realistic hardware trust assumptions, device privacy, nontraceability, and resilience against attacks. This article addresses these challenges by introducing a novel permutation-based firmware attestation mechanism. Our method leverages edge servers as verifiers, low-cost memory, randomized permutations, and avalanche criteria for optimized security and efficiency. Rigorous formal and informal security analysis, coupled with performance evaluation, demonstrates superior performance against various attacks, achieving over 90% detection probability and effectively mitigating both remote and mobile software attacks. These results demonstrate the significant potential of our approach for enhancing firmware security in edge-enabled IoT devices.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"346-357"},"PeriodicalIF":4.0,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum Reinforcement Learning for QoS-Aware Real-Time Job Scheduling in Cloud Systems 云系统中qos感知实时作业调度的量子强化学习
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-27 DOI: 10.1109/JSYST.2025.3568752
Shuhong Dai;Nishant Saurabh;Qingle Wang;Jiawei Nian;Shuwen Kan;Ying Mao;Long Cheng
Effective cloud job scheduling is essential for enhancing the performance and operational efficiency of cloud-based services, directly impacting their quality of service (QoS). Among existing methodologies, deep reinforcement learning (DRL) has proven effective in addressing complex, multidimensional optimization challenges in real-time scheduling. With advancements in quantum computing, quantum neural networks (QNNs) are showing unique advantages in information representation and processing. This study is the first to explore quantum reinforcement learning (QRL) for real-time job scheduling in cloud systems. Specifically, we propose a QRL framework that utilizes variational and encoding layers to convert state information into quantum data, repeatedly embedded into a QNN to compute optimal value returns. This approach aims to enhance QoS by improving job execution success rates and reducing average response times with unpredictable job arrivals. We present the detailed design of our approach, and our simulation results demonstrate that the QRL method significantly exceeds established baselines, including those based on DRL, across a range of workload intensities and computational resource configurations. This is particularly evident under high-load conditions, where our approach can achieve 55.2% higher success rates, underscoring its significant potential in cloud job scheduling optimization.
有效的云作业调度对于提高基于云的服务的性能和运营效率至关重要,这将直接影响其服务质量(QoS)。在现有的方法中,深度强化学习(DRL)已被证明在解决实时调度中复杂的多维优化挑战方面是有效的。随着量子计算技术的发展,量子神经网络在信息表示和处理方面显示出独特的优势。这项研究首次探索了量子强化学习(QRL)在云系统中的实时作业调度。具体来说,我们提出了一个QRL框架,该框架利用变分层和编码层将状态信息转换为量子数据,反复嵌入到QNN中以计算最优值回报。这种方法旨在通过提高作业执行成功率和减少不可预测的作业到达的平均响应时间来增强QoS。我们介绍了我们的方法的详细设计,我们的模拟结果表明,QRL方法在一系列工作负载强度和计算资源配置中显著超过了既定的基线,包括那些基于DRL的基线。这在高负载条件下尤为明显,我们的方法可以实现55.2%的高成功率,强调了其在云作业调度优化中的巨大潜力。
{"title":"Quantum Reinforcement Learning for QoS-Aware Real-Time Job Scheduling in Cloud Systems","authors":"Shuhong Dai;Nishant Saurabh;Qingle Wang;Jiawei Nian;Shuwen Kan;Ying Mao;Long Cheng","doi":"10.1109/JSYST.2025.3568752","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3568752","url":null,"abstract":"Effective cloud job scheduling is essential for enhancing the performance and operational efficiency of cloud-based services, directly impacting their quality of service (QoS). Among existing methodologies, deep reinforcement learning (DRL) has proven effective in addressing complex, multidimensional optimization challenges in real-time scheduling. With advancements in quantum computing, quantum neural networks (QNNs) are showing unique advantages in information representation and processing. This study is the first to explore quantum reinforcement learning (QRL) for real-time job scheduling in cloud systems. Specifically, we propose a QRL framework that utilizes variational and encoding layers to convert state information into quantum data, repeatedly embedded into a QNN to compute optimal value returns. This approach aims to enhance QoS by improving job execution success rates and reducing average response times with unpredictable job arrivals. We present the detailed design of our approach, and our simulation results demonstrate that the QRL method significantly exceeds established baselines, including those based on DRL, across a range of workload intensities and computational resource configurations. This is particularly evident under high-load conditions, where our approach can achieve 55.2% higher success rates, underscoring its significant potential in cloud job scheduling optimization.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"471-482"},"PeriodicalIF":4.0,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Path Planning for Cooperative Aerial Load Transportation in Complex Environments 复杂环境下协同空运路径规划
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-21 DOI: 10.1109/JSYST.2025.3547065
Peyman Abeshtan;Fariborz Saghafi
In this article, a planning algorithm is presented, which is capable to design an overall path in the first stage and determine the formation shape of a cooperative load transportation system forced to move in a spatial hypothetical tunnel (an authorized tunnel), in the second stage. The planning algorithm works in multipassages environment containing obstacles with different shapes and dimensions. The shape of the formation is determined optimally to handle nonconvex constraints like obstacle avoidance, intercollision avoidance between agents and allowable range of cable forces for minimal swing motion. The optimization algorithm also considers the response of the system dynamics and ability of controllers in tracking the optimal path and formation shape. Three types of optimization-based path planning methods are presented called simultaneously all waypoints, waypoint by waypoint (WBW), and waypoints in risk. It is shown that the WBW method presents the best performance in terms of adjustment of the formation shape for passing through narrow passages in complex environment without external or internal collision.
本文提出了一种规划算法,该算法能够在第一阶段设计总体路径,在第二阶段确定在空间假设隧道(授权隧道)中被迫移动的协同负载运输系统的队形。该规划算法适用于包含不同形状和尺寸障碍物的多通道环境。确定了最优的队形,以处理非凸约束,如避障,agent之间的相互碰撞避免和最小摆动运动的索力允许范围。优化算法还考虑了系统动力学响应和控制器跟踪最优路径和队形的能力。提出了三种基于优化的路径规划方法:同时全路点、路点逐路点(WBW)和风险路点。结果表明,在复杂环境下,无外部或内部碰撞的狭窄通道中,WBW方法在调整地层形状方面表现出最佳性能。
{"title":"Path Planning for Cooperative Aerial Load Transportation in Complex Environments","authors":"Peyman Abeshtan;Fariborz Saghafi","doi":"10.1109/JSYST.2025.3547065","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3547065","url":null,"abstract":"In this article, a planning algorithm is presented, which is capable to design an overall path in the first stage and determine the formation shape of a cooperative load transportation system forced to move in a spatial hypothetical tunnel (an authorized tunnel), in the second stage. The planning algorithm works in multipassages environment containing obstacles with different shapes and dimensions. The shape of the formation is determined optimally to handle nonconvex constraints like obstacle avoidance, intercollision avoidance between agents and allowable range of cable forces for minimal swing motion. The optimization algorithm also considers the response of the system dynamics and ability of controllers in tracking the optimal path and formation shape. Three types of optimization-based path planning methods are presented called simultaneously all waypoints, waypoint by waypoint (WBW), and waypoints in risk. It is shown that the WBW method presents the best performance in terms of adjustment of the formation shape for passing through narrow passages in complex environment without external or internal collision.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"565-576"},"PeriodicalIF":4.0,"publicationDate":"2025-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Consensus Tracking Control for Nonlinear Multiagent Systems With Unknown Dynamics: A State Observer-Based Framework 未知动态非线性多智能体系统的自适应一致性跟踪控制:一个基于状态观测器的框架
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-21 DOI: 10.1109/JSYST.2025.3562957
Xiao Chen;Jinsha Li;Jiaxi Chen;Junmin Li;Weisheng Chen
In this study, we introduce an observer-based adaptive output-feedback tracking consensus approach designed for a class of uncertain nonlinear leader–follower multiagent systems. Each follower agent exhibits second-order unknown nonlinear dynamics, incorporates unmeasured states, and possesses an unknown control direction. To tackle these challenges, fuzzy logic system is integrated with an observer, and a Nussbaum-type item is integrated into the protocol for each agent to adaptively and cooperatively determine the control direction. Subsequently, we have developed adaptive fuzzy distributed control protocols for each follower agent. The proposed consensus protocols have been demonstrated to ensure semiglobally uniformly ultimate boundedness for all system signals. Furthermore, we extend the control gain from constant to a state-dependent gain, delving into the globally uniformly ultimate boundedness of multiagent systems. To mitigate the intricacies arising from virtual control differentiation, command filtering is integrated with backstepping techniques, thereby streamlining the control process and enhancing overall system performance. The efficacy of the proposed method has been validated through simulation examples.
本文针对一类不确定非线性leader-follower多智能体系统,提出了一种基于观测器的自适应输出反馈跟踪共识方法。每个跟随智能体表现为二阶未知非线性动力学,包含不可测状态,并具有未知控制方向。为了解决这些问题,将模糊逻辑系统集成到一个观察者中,并在协议中集成一个nussbaum类型的项目,使每个智能体自适应地、协同地确定控制方向。在此基础上,针对每个跟随体开发了自适应模糊分布式控制协议。所提出的共识协议已被证明能保证所有系统信号的半全局一致最终有界性。进一步,我们将控制增益从常数扩展到状态相关增益,深入研究了多智能体系统的全局一致最终有界性。为了减轻虚拟控制差异带来的复杂性,命令过滤与后退技术相结合,从而简化控制过程并提高整体系统性能。通过仿真算例验证了该方法的有效性。
{"title":"Adaptive Consensus Tracking Control for Nonlinear Multiagent Systems With Unknown Dynamics: A State Observer-Based Framework","authors":"Xiao Chen;Jinsha Li;Jiaxi Chen;Junmin Li;Weisheng Chen","doi":"10.1109/JSYST.2025.3562957","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3562957","url":null,"abstract":"In this study, we introduce an observer-based adaptive output-feedback tracking consensus approach designed for a class of uncertain nonlinear leader–follower multiagent systems. Each follower agent exhibits second-order unknown nonlinear dynamics, incorporates unmeasured states, and possesses an unknown control direction. To tackle these challenges, fuzzy logic system is integrated with an observer, and a Nussbaum-type item is integrated into the protocol for each agent to adaptively and cooperatively determine the control direction. Subsequently, we have developed adaptive fuzzy distributed control protocols for each follower agent. The proposed consensus protocols have been demonstrated to ensure semiglobally uniformly ultimate boundedness for all system signals. Furthermore, we extend the control gain from constant to a state-dependent gain, delving into the globally uniformly ultimate boundedness of multiagent systems. To mitigate the intricacies arising from virtual control differentiation, command filtering is integrated with backstepping techniques, thereby streamlining the control process and enhancing overall system performance. The efficacy of the proposed method has been validated through simulation examples.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"447-458"},"PeriodicalIF":4.0,"publicationDate":"2025-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safety Analysis and Prediction of UAVs Aerial Refueling Docking Based on Deep Learning Data-Driven Method 基于深度学习数据驱动的无人机空中加油对接安全分析与预测
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-18 DOI: 10.1109/JSYST.2025.3546476
Bin Hang;Shuai Liang;Pengjun Guo;Bin Xu
Autonomous aerial refueling (AAR) is essential for both military and civilian applications, but the docking phase poses significant safety risks due to complex environmental conditions that cannot be fully captured by precise mathematical models. This article proposes a data-driven docking predictive model that integrates variational mode decomposition (VMD), sparrow search algorithm (SSA), and long short-term memory (LSTM) neural networks. First, a comprehensive simulation platform for the entire AAR docking system is established to generate reliable data. Then, to address the complex nature of AAR docking signals, VMD decomposes the data into modes with distinct natural frequencies, enhancing input accuracy. SSA optimizes the LSTM parameters, improving prediction accuracy and avoiding local minima. Based on these predictions, a docking safety evaluation network is developed to assess docking safety and prevent failures or collisions. Finally, the performance comparison with other models demonstrates the effectiveness of the proposed approach in diverse scenarios.
自主空中加油(AAR)在军事和民用应用中都是必不可少的,但由于复杂的环境条件,对接阶段存在重大的安全风险,而精确的数学模型无法完全捕捉这些环境条件。本文提出了一种结合变分模态分解(VMD)、麻雀搜索算法(SSA)和长短期记忆(LSTM)神经网络的数据驱动的对接预测模型。首先,建立整个AAR对接系统的综合仿真平台,生成可靠的数据。然后,为了解决AAR对接信号的复杂性,VMD将数据分解为具有不同固有频率的模式,从而提高输入精度。SSA对LSTM参数进行了优化,提高了预测精度,避免了局部极小值。基于这些预测,建立了一个对接安全评估网络,以评估对接安全并防止故障或碰撞。最后,通过与其他模型的性能比较,验证了该方法在不同场景下的有效性。
{"title":"Safety Analysis and Prediction of UAVs Aerial Refueling Docking Based on Deep Learning Data-Driven Method","authors":"Bin Hang;Shuai Liang;Pengjun Guo;Bin Xu","doi":"10.1109/JSYST.2025.3546476","DOIUrl":"https://doi.org/10.1109/JSYST.2025.3546476","url":null,"abstract":"Autonomous aerial refueling (AAR) is essential for both military and civilian applications, but the docking phase poses significant safety risks due to complex environmental conditions that cannot be fully captured by precise mathematical models. This article proposes a data-driven docking predictive model that integrates variational mode decomposition (VMD), sparrow search algorithm (SSA), and long short-term memory (LSTM) neural networks. First, a comprehensive simulation platform for the entire AAR docking system is established to generate reliable data. Then, to address the complex nature of AAR docking signals, VMD decomposes the data into modes with distinct natural frequencies, enhancing input accuracy. SSA optimizes the LSTM parameters, improving prediction accuracy and avoiding local minima. Based on these predictions, a docking safety evaluation network is developed to assess docking safety and prevent failures or collisions. Finally, the performance comparison with other models demonstrates the effectiveness of the proposed approach in diverse scenarios.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 2","pages":"529-540"},"PeriodicalIF":4.0,"publicationDate":"2025-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Systems Journal Information for Authors IEEE 系统期刊作者信息
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-17 DOI: 10.1109/JSYST.2024.3525313
{"title":"IEEE Systems Journal Information for Authors","authors":"","doi":"10.1109/JSYST.2024.3525313","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3525313","url":null,"abstract":"","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"C4-C4"},"PeriodicalIF":4.0,"publicationDate":"2025-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10929691","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Systems Council Information 电气和电子工程师学会系统理事会信息
IF 4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-17 DOI: 10.1109/JSYST.2024.3525315
{"title":"IEEE Systems Council Information","authors":"","doi":"10.1109/JSYST.2024.3525315","DOIUrl":"https://doi.org/10.1109/JSYST.2024.3525315","url":null,"abstract":"","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"19 1","pages":"C3-C3"},"PeriodicalIF":4.0,"publicationDate":"2025-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10929694","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143645179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Systems Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1