首页 > 最新文献

IEEE open journal of control systems最新文献

英文 中文
Erratum to “Learning to Boost the Performance of Stable Nonlinear Systems”
Pub Date : 2025-02-03 DOI: 10.1109/OJCSYS.2025.3529361
Luca Furieri;Clara Lucía Galimberti;Giancarlo Ferrari-Trecate
This addresses errors in [1]. Due to a production error, Figs. 4, 5, 6, 8, and 9 are not rendering correctly in the article PDF. The correct figures are as follows. Figure 4. Mountains—Closed-loop trajectories before training (left) and after training (middle and right) over 100 randomly sampled initial conditions marked with $circ$. Snapshots taken at time-instants τ. Colored (gray) lines show the trajectories in [0, τi] ([τi, ∞)). Colored balls (and their radius) represent the agents (and their size for collision avoidance). Figure 5. Mountains—Closed-loop trajectories after 25%, 50% and 75% of the total training whose closed-loop trajectory is shown in Fig. 4. Even if the performance can be further optimized, stability is always guaranteed. Figure 6. Mountains—Closed-loop trajectories after training. (Left and middle) Controller tested over a system with mass uncertainty (-10% and +10%, respectively). (Right) Trained controller with safety promotion through (45). Training initial conditions marked with $circ$. Snapshots taken at time-instants τ. Colored (gray) lines show the trajectories in [0, τi] ([τi, ∞)). Colored balls (and their radius) represent the agents (and their size for collision avoidance). Figure 8. Mountains—Closed-loop trajectories when using the online policy given by (48). Snapshots of three trajectories starting at different test initial conditions. Figure 9. Mountains—Three different closed-loop trajectories after training a REN controller without ${mathcal{L}}_{2}$ stability guarantees over 100 randomly sampled initial conditions marked with $circ$. Colored (gray) lines show the trajectories in (after) the training time interval.
{"title":"Erratum to “Learning to Boost the Performance of Stable Nonlinear Systems”","authors":"Luca Furieri;Clara Lucía Galimberti;Giancarlo Ferrari-Trecate","doi":"10.1109/OJCSYS.2025.3529361","DOIUrl":"https://doi.org/10.1109/OJCSYS.2025.3529361","url":null,"abstract":"This addresses errors in [1]. Due to a production error, Figs. 4, 5, 6, 8, and 9 are not rendering correctly in the article PDF. The correct figures are as follows. Figure 4. Mountains—Closed-loop trajectories before training (left) and after training (middle and right) over 100 randomly sampled initial conditions marked with $circ$. Snapshots taken at time-instants τ. Colored (gray) lines show the trajectories in [0, τi] ([τi, ∞)). Colored balls (and their radius) represent the agents (and their size for collision avoidance). Figure 5. Mountains—Closed-loop trajectories after 25%, 50% and 75% of the total training whose closed-loop trajectory is shown in Fig. 4. Even if the performance can be further optimized, stability is always guaranteed. Figure 6. Mountains—Closed-loop trajectories after training. (Left and middle) Controller tested over a system with mass uncertainty (-10% and +10%, respectively). (Right) Trained controller with safety promotion through (45). Training initial conditions marked with $circ$. Snapshots taken at time-instants τ. Colored (gray) lines show the trajectories in [0, τi] ([τi, ∞)). Colored balls (and their radius) represent the agents (and their size for collision avoidance). Figure 8. Mountains—Closed-loop trajectories when using the online policy given by (48). Snapshots of three trajectories starting at different test initial conditions. Figure 9. Mountains—Three different closed-loop trajectories after training a REN controller without ${mathcal{L}}_{2}$ stability guarantees over 100 randomly sampled initial conditions marked with $circ$. Colored (gray) lines show the trajectories in (after) the training time interval.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"4 ","pages":"53-53"},"PeriodicalIF":0.0,"publicationDate":"2025-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10870044","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143106755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generalizing Robust Control Barrier Functions From a Controller Design Perspective
Pub Date : 2025-01-13 DOI: 10.1109/OJCSYS.2025.3529364
Anil Alan;Tamas G. Molnar;Aaron D. Ames;Gábor Orosz
While control barrier functions provide a powerful tool to endow controllers with formal safety guarantees, robust control barrier functions (RCBF) can be used to extend these guarantees for systems with model inaccuracies. This paper presents a generalized RCBF framework that unifies and extends existing notions of RCBFs for a broad class of model uncertainties. Main results are conditions for robust safety through generalized RCBFs. We apply these generalized principles for more specific design examples: a worst-case type design, an estimation-based design, and a tunable version of the latter. These examples are demonstrated to perform increasingly closer to an oracle design with ideal model information. Theoretical contributions are demonstrated on a practical example of a pendulum with unknown periodic excitation. Using numerical simulations, a comparison among design examples are carried out based on a performance metric depicting the increased likeness to the oracle design.
{"title":"Generalizing Robust Control Barrier Functions From a Controller Design Perspective","authors":"Anil Alan;Tamas G. Molnar;Aaron D. Ames;Gábor Orosz","doi":"10.1109/OJCSYS.2025.3529364","DOIUrl":"https://doi.org/10.1109/OJCSYS.2025.3529364","url":null,"abstract":"While control barrier functions provide a powerful tool to endow controllers with formal safety guarantees, robust control barrier functions (RCBF) can be used to extend these guarantees for systems with model inaccuracies. This paper presents a generalized RCBF framework that unifies and extends existing notions of RCBFs for a broad class of model uncertainties. Main results are conditions for robust safety through generalized RCBFs. We apply these generalized principles for more specific design examples: a worst-case type design, an estimation-based design, and a tunable version of the latter. These examples are demonstrated to perform increasingly closer to an oracle design with ideal model information. Theoretical contributions are demonstrated on a practical example of a pendulum with unknown periodic excitation. Using numerical simulations, a comparison among design examples are carried out based on a performance metric depicting the increased likeness to the oracle design.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"4 ","pages":"54-69"},"PeriodicalIF":0.0,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10839547","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143361460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
2024 Index IEEE Open Journal of Control Systems Vol. 3 2024索引IEEE控制系统开放杂志卷3
Pub Date : 2025-01-10 DOI: 10.1109/OJCSYS.2025.3528596
{"title":"2024 Index IEEE Open Journal of Control Systems Vol. 3","authors":"","doi":"10.1109/OJCSYS.2025.3528596","DOIUrl":"https://doi.org/10.1109/OJCSYS.2025.3528596","url":null,"abstract":"","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"3 ","pages":"514-523"},"PeriodicalIF":0.0,"publicationDate":"2025-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10837576","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142940701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Control Systems Society Publication Information IEEE控制系统协会出版信息
Pub Date : 2025-01-07 DOI: 10.1109/OJCSYS.2024.3360366
{"title":"IEEE Control Systems Society Publication Information","authors":"","doi":"10.1109/OJCSYS.2024.3360366","DOIUrl":"https://doi.org/10.1109/OJCSYS.2024.3360366","url":null,"abstract":"","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"3 ","pages":"C3-C3"},"PeriodicalIF":0.0,"publicationDate":"2025-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10832464","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Open Journal of Control Systems Publication Information IEEE控制系统公开杂志出版信息
Pub Date : 2025-01-07 DOI: 10.1109/OJCSYS.2024.3360362
{"title":"IEEE Open Journal of Control Systems Publication Information","authors":"","doi":"10.1109/OJCSYS.2024.3360362","DOIUrl":"https://doi.org/10.1109/OJCSYS.2024.3360362","url":null,"abstract":"","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"3 ","pages":"C2-C2"},"PeriodicalIF":0.0,"publicationDate":"2025-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10832461","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Watermarking for Finite Markov Decision Processes
Pub Date : 2025-01-06 DOI: 10.1109/OJCSYS.2025.3526003
Jiacheng Tang;Jiguo Song;Abhishek Gupta
Dynamic watermarking is an active intrusion detection technique that can potentially detect replay attacks, spoofing attacks, and deception attacks in the feedback channel for control systems. In this paper, we develop a novel dynamic watermarking algorithm for finite-state finite-action Markov decision processes. We derive a lower bound on the mean time between false alarms and an upper bound on the mean delay between the time an attack occurs and when it is detected. We further compute the sensitivity of the performance of the control system as a function of the watermark. We demonstrate the effectiveness of the proposed dynamic watermarking algorithm by detecting a spoofing attack in a sensor network system.
{"title":"Dynamic Watermarking for Finite Markov Decision Processes","authors":"Jiacheng Tang;Jiguo Song;Abhishek Gupta","doi":"10.1109/OJCSYS.2025.3526003","DOIUrl":"https://doi.org/10.1109/OJCSYS.2025.3526003","url":null,"abstract":"Dynamic watermarking is an active intrusion detection technique that can potentially detect replay attacks, spoofing attacks, and deception attacks in the feedback channel for control systems. In this paper, we develop a novel dynamic watermarking algorithm for finite-state finite-action Markov decision processes. We derive a lower bound on the mean time between false alarms and an upper bound on the mean delay between the time an attack occurs and when it is detected. We further compute the sensitivity of the performance of the control system as a function of the watermark. We demonstrate the effectiveness of the proposed dynamic watermarking algorithm by detecting a spoofing attack in a sensor network system.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"4 ","pages":"41-52"},"PeriodicalIF":0.0,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10824908","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143106756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Initial Undershoot in Discrete-Time Input–Output Hammerstein Systems
Pub Date : 2025-01-06 DOI: 10.1109/OJCSYS.2025.3525983
Hyung Jun Kim;Mohammadreza Kamaldar;Dennis S. Bernstein
This paper considers initial undershoot in the step response of discrete-time, input-output Hammerstein (DIH) systems, which have linear unforced dynamics and nonlinear zero dynamics (ZD). Initial undershoot occurs when the step response of a system moves initially in a direction that is opposite to the direction of the asymptotic response. For DIH systems, the paper investigates the relationship among the existence of initial undershoot, the step height, the height-dependent delay, and the stability of the ZD. For linear, time-invariant systems, the height-dependent delay specializes to the relative degree. The main result of the paper provides conditions under which, for all sufficiently small step heights, initial undershoot in the step response of a DIH system implies instability of the ZD. Several examples of DIH systems are presented to illustrate these results.
{"title":"Initial Undershoot in Discrete-Time Input–Output Hammerstein Systems","authors":"Hyung Jun Kim;Mohammadreza Kamaldar;Dennis S. Bernstein","doi":"10.1109/OJCSYS.2025.3525983","DOIUrl":"https://doi.org/10.1109/OJCSYS.2025.3525983","url":null,"abstract":"This paper considers initial undershoot in the step response of discrete-time, input-output Hammerstein (DIH) systems, which have linear unforced dynamics and nonlinear zero dynamics (ZD). Initial undershoot occurs when the step response of a system moves initially in a direction that is opposite to the direction of the asymptotic response. For DIH systems, the paper investigates the relationship among the existence of initial undershoot, the step height, the height-dependent delay, and the stability of the ZD. For linear, time-invariant systems, the height-dependent delay specializes to the relative degree. The main result of the paper provides conditions under which, for all sufficiently small step heights, initial undershoot in the step response of a DIH system implies instability of the ZD. Several examples of DIH systems are presented to illustrate these results.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"4 ","pages":"30-40"},"PeriodicalIF":0.0,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10824927","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143106754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantization Effects on Zero-Dynamics Attacks to Closed-Loop Sampled-Data Control Systems 量化对闭环采样数据控制系统零动态攻击的影响
Pub Date : 2024-11-28 DOI: 10.1109/OJCSYS.2024.3508396
Xile Kang;Hideaki Ishii
This paper focuses on cyber-security issues of networked control systems in closed-loop forms from the perspective of quantized sampled-data systems. Quantization of control inputs adds quantization error to the plant input, resulting in certain variation in the plant output. On the other hand, sampling can introduce non-minimum phase zeros in discretized systems. We consider zero-dynamics attacks, which is a class of false data injection attacks utilizing such unstable zeros. Although non-quantized zero-dynamics attacks are undetectable from the plant output side, quantized attacks may be revealed by larger output variation. Our setting is that the attack signal is applied with the same uniform quantizer used for the control input. We evaluate the attack stealthiness in the closed-loop system setting by quantifying the output variation. Specifically, we characterize the cases for static and dynamic quantization in the attack signal, while keeping the control input statically quantized. Then we demonstrate that the attacker can reduce such output variation with a modified approach, by compensating the quantization error of the attack signal inside the attack dynamics. We provide numerical examples to illustrate the effectiveness of the proposed approaches. We show that observing the quantized control input value by a mirroring model can reveal the zero-dynamics attacks.
本文从量化采样数据系统的角度出发,研究闭环网络控制系统的网络安全问题。控制输入的量化给系统输入增加了量化误差,导致系统输出产生一定的变化。另一方面,采样会在离散系统中引入非最小相位零。我们考虑零动态攻击,这是一类利用这种不稳定零的虚假数据注入攻击。虽然非量子化的零动态攻击无法从植物输出端检测到,但量子化攻击可能通过较大的输出变化来揭示。我们的设置是将攻击信号应用于与控制输入相同的均匀量化器。我们通过量化输出变化来评估闭环系统设置下的攻击隐身性。具体来说,我们描述了攻击信号中静态和动态量化的情况,同时保持控制输入的静态量化。然后,我们证明了攻击者可以用一种改进的方法来减少这种输出变化,通过在攻击动态内部补偿攻击信号的量化误差。我们提供了数值例子来说明所提出方法的有效性。我们证明了通过镜像模型观察量化的控制输入值可以揭示零动态攻击。
{"title":"Quantization Effects on Zero-Dynamics Attacks to Closed-Loop Sampled-Data Control Systems","authors":"Xile Kang;Hideaki Ishii","doi":"10.1109/OJCSYS.2024.3508396","DOIUrl":"https://doi.org/10.1109/OJCSYS.2024.3508396","url":null,"abstract":"This paper focuses on cyber-security issues of networked control systems in closed-loop forms from the perspective of quantized sampled-data systems. Quantization of control inputs adds quantization error to the plant input, resulting in certain variation in the plant output. On the other hand, sampling can introduce non-minimum phase zeros in discretized systems. We consider zero-dynamics attacks, which is a class of false data injection attacks utilizing such unstable zeros. Although non-quantized zero-dynamics attacks are undetectable from the plant output side, quantized attacks may be revealed by larger output variation. Our setting is that the attack signal is applied with the same uniform quantizer used for the control input. We evaluate the attack stealthiness in the closed-loop system setting by quantifying the output variation. Specifically, we characterize the cases for static and dynamic quantization in the attack signal, while keeping the control input statically quantized. Then we demonstrate that the attacker can reduce such output variation with a modified approach, by compensating the quantization error of the attack signal inside the attack dynamics. We provide numerical examples to illustrate the effectiveness of the proposed approaches. We show that observing the quantized control input value by a mirroring model can reveal the zero-dynamics attacks.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"4 ","pages":"18-29"},"PeriodicalIF":0.0,"publicationDate":"2024-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10770577","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exact Recovery for System Identification With More Corrupt Data Than Clean Data 准确恢复系统识别与更多的腐败数据比干净的数据
Pub Date : 2024-11-27 DOI: 10.1109/OJCSYS.2024.3507452
Baturalp Yalcin;Haixiang Zhang;Javad Lavaei;Murat Arcak
This paper investigates the system identification problem for linear discrete-time systems under adversaries and analyzes two lasso-type estimators. We examine non-asymptotic properties of these estimators in two separate scenarios, corresponding to deterministic and stochastic models for the attack times. We prove that when the system is stable and attacks are injected periodically, the sample complexity for exact recovery of the system dynamics is linear in terms of the dimension of the states. When adversarial attacks occur at each time instance with probability $p$, the required sample complexity for exact recovery scales polynomially in the dimension of the states and the probability $p$. This result implies almost sure convergence to the true system dynamics under the asymptotic regime. As a by-product, our estimators still learn the system correctly even when more than half of the data is compromised. We emphasize that the attack vectors are allowed to be correlated with each other in this work. This paper provides the first mathematical guarantee in the literature on learning from correlated data for dynamical systems in the case when there is less clean data than corrupt data.
研究了存在对手的线性离散系统的辨识问题,并分析了两种lasso型估计量。我们在两种不同的情况下检查这些估计量的非渐近性质,对应于攻击时间的确定性和随机模型。我们证明了当系统稳定且周期性地注入攻击时,精确恢复系统动力学的样本复杂度与状态维数成线性关系。当对抗性攻击在每个时间实例中以概率$p$发生时,精确恢复所需的样本复杂度在状态维度和概率$p$中呈多项式缩放。这一结果暗示了在渐近状态下几乎肯定地收敛于真系统动力学。作为副产品,即使超过一半的数据被泄露,我们的估计器仍然可以正确地学习系统。我们强调,在这项工作中,攻击向量是允许相互关联的。本文为动态系统在干净数据少于损坏数据的情况下从相关数据中学习提供了文献中第一个数学保证。
{"title":"Exact Recovery for System Identification With More Corrupt Data Than Clean Data","authors":"Baturalp Yalcin;Haixiang Zhang;Javad Lavaei;Murat Arcak","doi":"10.1109/OJCSYS.2024.3507452","DOIUrl":"https://doi.org/10.1109/OJCSYS.2024.3507452","url":null,"abstract":"This paper investigates the system identification problem for linear discrete-time systems under adversaries and analyzes two lasso-type estimators. We examine non-asymptotic properties of these estimators in two separate scenarios, corresponding to deterministic and stochastic models for the attack times. We prove that when the system is stable and attacks are injected periodically, the sample complexity for exact recovery of the system dynamics is linear in terms of the dimension of the states. When adversarial attacks occur at each time instance with probability \u0000<inline-formula><tex-math>$p$</tex-math></inline-formula>\u0000, the required sample complexity for exact recovery scales polynomially in the dimension of the states and the probability \u0000<inline-formula><tex-math>$p$</tex-math></inline-formula>\u0000. This result implies almost sure convergence to the true system dynamics under the asymptotic regime. As a by-product, our estimators still learn the system correctly even when more than half of the data is compromised. We emphasize that the attack vectors are allowed to be correlated with each other in this work. This paper provides the first mathematical guarantee in the literature on learning from correlated data for dynamical systems in the case when there is less clean data than corrupt data.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"4 ","pages":"1-17"},"PeriodicalIF":0.0,"publicationDate":"2024-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10769004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Control of Endemic Epidemic Diseases With Behavioral Response 通过行为响应优化地方流行病控制
Pub Date : 2024-10-30 DOI: 10.1109/OJCSYS.2024.3488567
Francesco Parino;Lorenzo Zino;Alessandro Rizzo
Behavioral factors play a crucial role in the emergence, spread, and containment of human diseases, significantly influencing the effectiveness of intervention measures. However, the integration of such factors into epidemic models is still limited, hindering the possibility of understanding how to optimally design interventions to mitigate epidemic outbreaks in real life. This paper aims to fill in this gap. In particular, we propose a parsimonious model that couples an epidemic compartmental model with a population game that captures the behavioral response, obtaining a nonlinear system of ordinary differential equations. Grounded on prevalence-elastic behavior—the empirically proven assumption that the disease prevalence affects the adherence to self-protective behavior—we consider a nontrivial negative feedback between contagions and adoption of self-protective behavior. We characterize the asymptotic behavior of the system, establishing conditions under which the disease is quickly eradicated or a global convergence to an endemic equilibrium is attained. In addition, we elucidate how the behavioral response affects the endemic equilibrium. Then, we formulate and solve an optimal control problem to plan cost-effective interventions for the model, accounting for their healthcare and social-economical implications. Numerical simulations on a case study calibrated on sexually transmitted diseases demonstrate and validate our findings.
行为因素在人类疾病的出现、传播和遏制过程中起着至关重要的作用,对干预措施的效果有重大影响。然而,将这些因素纳入流行病模型的工作仍然有限,阻碍了人们了解如何优化设计干预措施以缓解现实生活中流行病爆发的可能性。本文旨在填补这一空白。具体而言,我们提出了一个简明模型,将流行病分区模型与捕捉行为反应的人口博弈结合起来,得到一个非线性常微分方程系统。基于流行弹性行为--经验证明疾病流行会影响自我保护行为的坚持--的假设,我们考虑了传染病和自我保护行为之间的非线性负反馈。我们描述了系统的渐近行为,确定了疾病迅速根除或在全球范围内趋于流行平衡的条件。此外,我们还阐明了行为反应如何影响地方性平衡。然后,我们提出并解决了一个最优控制问题,以便为模型规划具有成本效益的干预措施,同时考虑其对医疗保健和社会经济的影响。通过对性传播疾病的案例研究进行数字模拟,证明并验证了我们的研究结果。
{"title":"Optimal Control of Endemic Epidemic Diseases With Behavioral Response","authors":"Francesco Parino;Lorenzo Zino;Alessandro Rizzo","doi":"10.1109/OJCSYS.2024.3488567","DOIUrl":"https://doi.org/10.1109/OJCSYS.2024.3488567","url":null,"abstract":"Behavioral factors play a crucial role in the emergence, spread, and containment of human diseases, significantly influencing the effectiveness of intervention measures. However, the integration of such factors into epidemic models is still limited, hindering the possibility of understanding how to optimally design interventions to mitigate epidemic outbreaks in real life. This paper aims to fill in this gap. In particular, we propose a parsimonious model that couples an epidemic compartmental model with a population game that captures the behavioral response, obtaining a nonlinear system of ordinary differential equations. Grounded on prevalence-elastic behavior—the empirically proven assumption that the disease prevalence affects the adherence to self-protective behavior—we consider a nontrivial negative feedback between contagions and adoption of self-protective behavior. We characterize the asymptotic behavior of the system, establishing conditions under which the disease is quickly eradicated or a global convergence to an endemic equilibrium is attained. In addition, we elucidate how the behavioral response affects the endemic equilibrium. Then, we formulate and solve an optimal control problem to plan cost-effective interventions for the model, accounting for their healthcare and social-economical implications. Numerical simulations on a case study calibrated on sexually transmitted diseases demonstrate and validate our findings.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"3 ","pages":"483-496"},"PeriodicalIF":0.0,"publicationDate":"2024-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10738387","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142694671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE open journal of control systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1