首页 > 最新文献

IEEE open journal of control systems最新文献

英文 中文
Exact Recovery for System Identification With More Corrupt Data Than Clean Data 准确恢复系统识别与更多的腐败数据比干净的数据
Pub Date : 2024-11-27 DOI: 10.1109/OJCSYS.2024.3507452
Baturalp Yalcin;Haixiang Zhang;Javad Lavaei;Murat Arcak
This paper investigates the system identification problem for linear discrete-time systems under adversaries and analyzes two lasso-type estimators. We examine non-asymptotic properties of these estimators in two separate scenarios, corresponding to deterministic and stochastic models for the attack times. We prove that when the system is stable and attacks are injected periodically, the sample complexity for exact recovery of the system dynamics is linear in terms of the dimension of the states. When adversarial attacks occur at each time instance with probability $p$, the required sample complexity for exact recovery scales polynomially in the dimension of the states and the probability $p$. This result implies almost sure convergence to the true system dynamics under the asymptotic regime. As a by-product, our estimators still learn the system correctly even when more than half of the data is compromised. We emphasize that the attack vectors are allowed to be correlated with each other in this work. This paper provides the first mathematical guarantee in the literature on learning from correlated data for dynamical systems in the case when there is less clean data than corrupt data.
研究了存在对手的线性离散系统的辨识问题,并分析了两种lasso型估计量。我们在两种不同的情况下检查这些估计量的非渐近性质,对应于攻击时间的确定性和随机模型。我们证明了当系统稳定且周期性地注入攻击时,精确恢复系统动力学的样本复杂度与状态维数成线性关系。当对抗性攻击在每个时间实例中以概率$p$发生时,精确恢复所需的样本复杂度在状态维度和概率$p$中呈多项式缩放。这一结果暗示了在渐近状态下几乎肯定地收敛于真系统动力学。作为副产品,即使超过一半的数据被泄露,我们的估计器仍然可以正确地学习系统。我们强调,在这项工作中,攻击向量是允许相互关联的。本文为动态系统在干净数据少于损坏数据的情况下从相关数据中学习提供了文献中第一个数学保证。
{"title":"Exact Recovery for System Identification With More Corrupt Data Than Clean Data","authors":"Baturalp Yalcin;Haixiang Zhang;Javad Lavaei;Murat Arcak","doi":"10.1109/OJCSYS.2024.3507452","DOIUrl":"https://doi.org/10.1109/OJCSYS.2024.3507452","url":null,"abstract":"This paper investigates the system identification problem for linear discrete-time systems under adversaries and analyzes two lasso-type estimators. We examine non-asymptotic properties of these estimators in two separate scenarios, corresponding to deterministic and stochastic models for the attack times. We prove that when the system is stable and attacks are injected periodically, the sample complexity for exact recovery of the system dynamics is linear in terms of the dimension of the states. When adversarial attacks occur at each time instance with probability \u0000<inline-formula><tex-math>$p$</tex-math></inline-formula>\u0000, the required sample complexity for exact recovery scales polynomially in the dimension of the states and the probability \u0000<inline-formula><tex-math>$p$</tex-math></inline-formula>\u0000. This result implies almost sure convergence to the true system dynamics under the asymptotic regime. As a by-product, our estimators still learn the system correctly even when more than half of the data is compromised. We emphasize that the attack vectors are allowed to be correlated with each other in this work. This paper provides the first mathematical guarantee in the literature on learning from correlated data for dynamical systems in the case when there is less clean data than corrupt data.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"4 ","pages":"1-17"},"PeriodicalIF":0.0,"publicationDate":"2024-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10769004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142938399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Control of Endemic Epidemic Diseases With Behavioral Response 通过行为响应优化地方流行病控制
Pub Date : 2024-10-30 DOI: 10.1109/OJCSYS.2024.3488567
Francesco Parino;Lorenzo Zino;Alessandro Rizzo
Behavioral factors play a crucial role in the emergence, spread, and containment of human diseases, significantly influencing the effectiveness of intervention measures. However, the integration of such factors into epidemic models is still limited, hindering the possibility of understanding how to optimally design interventions to mitigate epidemic outbreaks in real life. This paper aims to fill in this gap. In particular, we propose a parsimonious model that couples an epidemic compartmental model with a population game that captures the behavioral response, obtaining a nonlinear system of ordinary differential equations. Grounded on prevalence-elastic behavior—the empirically proven assumption that the disease prevalence affects the adherence to self-protective behavior—we consider a nontrivial negative feedback between contagions and adoption of self-protective behavior. We characterize the asymptotic behavior of the system, establishing conditions under which the disease is quickly eradicated or a global convergence to an endemic equilibrium is attained. In addition, we elucidate how the behavioral response affects the endemic equilibrium. Then, we formulate and solve an optimal control problem to plan cost-effective interventions for the model, accounting for their healthcare and social-economical implications. Numerical simulations on a case study calibrated on sexually transmitted diseases demonstrate and validate our findings.
行为因素在人类疾病的出现、传播和遏制过程中起着至关重要的作用,对干预措施的效果有重大影响。然而,将这些因素纳入流行病模型的工作仍然有限,阻碍了人们了解如何优化设计干预措施以缓解现实生活中流行病爆发的可能性。本文旨在填补这一空白。具体而言,我们提出了一个简明模型,将流行病分区模型与捕捉行为反应的人口博弈结合起来,得到一个非线性常微分方程系统。基于流行弹性行为--经验证明疾病流行会影响自我保护行为的坚持--的假设,我们考虑了传染病和自我保护行为之间的非线性负反馈。我们描述了系统的渐近行为,确定了疾病迅速根除或在全球范围内趋于流行平衡的条件。此外,我们还阐明了行为反应如何影响地方性平衡。然后,我们提出并解决了一个最优控制问题,以便为模型规划具有成本效益的干预措施,同时考虑其对医疗保健和社会经济的影响。通过对性传播疾病的案例研究进行数字模拟,证明并验证了我们的研究结果。
{"title":"Optimal Control of Endemic Epidemic Diseases With Behavioral Response","authors":"Francesco Parino;Lorenzo Zino;Alessandro Rizzo","doi":"10.1109/OJCSYS.2024.3488567","DOIUrl":"https://doi.org/10.1109/OJCSYS.2024.3488567","url":null,"abstract":"Behavioral factors play a crucial role in the emergence, spread, and containment of human diseases, significantly influencing the effectiveness of intervention measures. However, the integration of such factors into epidemic models is still limited, hindering the possibility of understanding how to optimally design interventions to mitigate epidemic outbreaks in real life. This paper aims to fill in this gap. In particular, we propose a parsimonious model that couples an epidemic compartmental model with a population game that captures the behavioral response, obtaining a nonlinear system of ordinary differential equations. Grounded on prevalence-elastic behavior—the empirically proven assumption that the disease prevalence affects the adherence to self-protective behavior—we consider a nontrivial negative feedback between contagions and adoption of self-protective behavior. We characterize the asymptotic behavior of the system, establishing conditions under which the disease is quickly eradicated or a global convergence to an endemic equilibrium is attained. In addition, we elucidate how the behavioral response affects the endemic equilibrium. Then, we formulate and solve an optimal control problem to plan cost-effective interventions for the model, accounting for their healthcare and social-economical implications. Numerical simulations on a case study calibrated on sexually transmitted diseases demonstrate and validate our findings.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"3 ","pages":"483-496"},"PeriodicalIF":0.0,"publicationDate":"2024-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10738387","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142694671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Resilience Guarantees by Finite-Time Robust Control Barrier Functions With Application to Power Inverter Networks 有限时间鲁棒控制屏障函数的弹性保证及其在逆变器网络中的应用
Pub Date : 2024-10-28 DOI: 10.1109/OJCSYS.2024.3487408
Kamil Hassan;Daniel Selvaratnam;Henrik Sandberg
In this study, a control theoretic description of resilience is provided to quantify the characteristics of a resilient system. The aim is to establish a paradigm for resilient control design based on tangible control objectives that yield desirable attributes for safety-critical systems. In that regard, durability and recoverability properties are identified as key components of the proposed resilience framework and, to offer a methodology to enforce these attributes, the notion of finite-time robust control barrier function (FR-CBF) is introduced. Furthermore, to offer a comprehensive treatment of the problem, resilient control design is investigated for both continuous and sampled-data systems. To that end, FR-CBF-based design conditions for both continuous and piece-wise constant zero-order hold (ZOH) control inputs are included. Moreover, to provide a concrete example of how the proposed framework could be adopted for safety-critical control applications, in this study we also investigate the voltage regulation problem for inverter-interfaced radial power distribution networks subject to adversarial injections. In that regard, sufficient conditions for both the continuous and sampled-data ZOH control are derived to guarantee finite-time recovery and safe operation of the distribution grid in accordance with the proposed resilience framework. Finally, the efficacy of the proposed results is advocated using a simulation study showing resilient grid performance in the presence of the ‘worst-case’ power injection attack, as reported in (Lindström et al. 2021).
在本研究中,提供了弹性的控制理论描述,以量化弹性系统的特性。目的是建立一种基于有形控制目标的弹性控制设计范例,为安全关键系统产生理想的属性。在这方面,耐久性和可恢复性特性被确定为拟议弹性框架的关键组成部分,为了提供一种强制执行这些属性的方法,引入了有限时间鲁棒控制屏障函数(FR-CBF)的概念。此外,为了提供一个全面的处理问题,弹性控制设计研究了连续和采样数据系统。为此,包括连续和分段恒定零阶保持器(ZOH)控制输入的基于fr - cbf的设计条件。此外,为了提供一个具体的例子,说明所提出的框架如何用于安全关键控制应用,在本研究中,我们还研究了受对抗性注入影响的逆变器接口径向配电网络的电压调节问题。在此基础上,根据所提出的弹性框架,推导了连续和采样数据ZOH控制的充分条件,以保证配电网的有限时间恢复和安全运行。最后,如(Lindström et al. 2021)所述,通过模拟研究显示了在“最坏情况”功率注入攻击下的弹性电网性能,倡导了所提出结果的有效性。
{"title":"On Resilience Guarantees by Finite-Time Robust Control Barrier Functions With Application to Power Inverter Networks","authors":"Kamil Hassan;Daniel Selvaratnam;Henrik Sandberg","doi":"10.1109/OJCSYS.2024.3487408","DOIUrl":"https://doi.org/10.1109/OJCSYS.2024.3487408","url":null,"abstract":"In this study, a control theoretic description of resilience is provided to quantify the characteristics of a resilient system. The aim is to establish a paradigm for resilient control design based on tangible control objectives that yield desirable attributes for safety-critical systems. In that regard, durability and recoverability properties are identified as key components of the proposed resilience framework and, to offer a methodology to enforce these attributes, the notion of finite-time robust control barrier function (FR-CBF) is introduced. Furthermore, to offer a comprehensive treatment of the problem, resilient control design is investigated for both continuous and sampled-data systems. To that end, FR-CBF-based design conditions for both continuous and piece-wise constant zero-order hold (ZOH) control inputs are included. Moreover, to provide a concrete example of how the proposed framework could be adopted for safety-critical control applications, in this study we also investigate the voltage regulation problem for inverter-interfaced radial power distribution networks subject to adversarial injections. In that regard, sufficient conditions for both the continuous and sampled-data ZOH control are derived to guarantee finite-time recovery and safe operation of the distribution grid in accordance with the proposed resilience framework. Finally, the efficacy of the proposed results is advocated using a simulation study showing resilient grid performance in the presence of the ‘worst-case’ power injection attack, as reported in (Lindström et al. 2021).","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"3 ","pages":"497-513"},"PeriodicalIF":0.0,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10737302","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142875106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilient Multi-Agent Systems Against Denial of Service Attacks via Adaptive and Activatable Network Layers 通过自适应和可激活网络层抵御拒绝服务攻击的弹性多代理系统
Pub Date : 2024-10-09 DOI: 10.1109/OJCSYS.2024.3477091
Deepalakshmi Babu Venkateswaran;Zhihua Qu
This paper tackles the challenge of maintaining resilience in multi-agent systems under Denial of Service (DoS) attacks by proposing a robust architecture that includes an instantaneous detection algorithm for connectivity losses and a dynamic system to activate backup network layers when disruptions occur. We also introduce a simplified approach that reduces the number of required layers through an adaptive repair algorithm. The simulation section, divided into two parts, demonstrates the effectiveness of the algorithm: one part showcases its scalability in a large-scale system, and the other applies it to a real-world power system using the IEEE 123-node system. Both simulations confirm that the proposed approach significantly enhances system stability and performance under attack conditions.
本文针对在拒绝服务(DoS)攻击下如何保持多代理系统的弹性这一难题,提出了一种稳健的架构,其中包括连接损失的瞬时检测算法和在中断发生时激活备份网络层的动态系统。我们还引入了一种简化方法,通过自适应修复算法减少所需层的数量。仿真部分分为两部分,展示了该算法的有效性:一部分展示了该算法在大规模系统中的可扩展性,另一部分将其应用于使用 IEEE 123 节点系统的实际电力系统。两个模拟结果都证实,所提出的方法能显著提高攻击条件下的系统稳定性和性能。
{"title":"Resilient Multi-Agent Systems Against Denial of Service Attacks via Adaptive and Activatable Network Layers","authors":"Deepalakshmi Babu Venkateswaran;Zhihua Qu","doi":"10.1109/OJCSYS.2024.3477091","DOIUrl":"https://doi.org/10.1109/OJCSYS.2024.3477091","url":null,"abstract":"This paper tackles the challenge of maintaining resilience in multi-agent systems under Denial of Service (DoS) attacks by proposing a robust architecture that includes an instantaneous detection algorithm for connectivity losses and a dynamic system to activate backup network layers when disruptions occur. We also introduce a simplified approach that reduces the number of required layers through an adaptive repair algorithm. The simulation section, divided into two parts, demonstrates the effectiveness of the algorithm: one part showcases its scalability in a large-scale system, and the other applies it to a real-world power system using the IEEE 123-node system. Both simulations confirm that the proposed approach significantly enhances system stability and performance under attack conditions.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"3 ","pages":"472-482"},"PeriodicalIF":0.0,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10710321","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142694672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resiliency Through Collaboration in Heterogeneous Multi-Robot Systems 通过异构多机器人系统中的协作提高复原力
Pub Date : 2024-09-25 DOI: 10.1109/OJCSYS.2024.3467991
Alexander A. Nguyen;Faryar Jabbari;Magnus Egerstedt
This paper examines pairwise collaborations in heterogeneous multi-robot systems. In particular, we focus on how individual robots, with different functionalities and dynamics, can enhance their resilience by forming collaborative arrangements that result in new capabilities. Control barrier functions are utilized as a mechanism to encode the safe operating regions of individual robots, with the idea being that a robot may be able to operate in new regions that it could not traverse alone by working with other robots. We explore answers to three questions: “Why should robots collaborate?”, “When should robots collaborate?”, and “How can robots collaborate?” To that end, we introduce the safely reachable set – capturing the regions that individual robots can reach safely, either with or without help, while considering their initial states and dynamics. We then describe the conditions under which a help-providing robot and a help-receiving robot can engage in collaboration. Next, we describe the pairwise collaboration framework, modeled through hybrid automata, to show how collaborations can be structured within a heterogeneous multi-robot team. Finally, we present case studies that are conducted on a team of mobile robots.
本文探讨了异构多机器人系统中的成对协作。我们特别关注具有不同功能和动态特性的单个机器人如何通过形成协作安排来增强其复原力,从而产生新的能力。我们利用控制障碍函数作为一种机制,对单个机器人的安全操作区域进行编码,其目的是让机器人能够通过与其他机器人合作,在其无法单独穿越的新区域内进行操作。我们探讨了三个问题的答案:"机器人为什么要协作?"、"机器人何时协作?"以及 "机器人如何协作?"为此,我们引入了安全可达集--在考虑初始状态和动态的情况下,捕捉单个机器人在有或没有帮助的情况下能够安全到达的区域。然后,我们描述了提供帮助的机器人和接受帮助的机器人进行协作的条件。接下来,我们描述了通过混合自动机建模的配对协作框架,以展示如何在异构多机器人团队中构建协作。最后,我们介绍了在移动机器人团队中进行的案例研究。
{"title":"Resiliency Through Collaboration in Heterogeneous Multi-Robot Systems","authors":"Alexander A. Nguyen;Faryar Jabbari;Magnus Egerstedt","doi":"10.1109/OJCSYS.2024.3467991","DOIUrl":"https://doi.org/10.1109/OJCSYS.2024.3467991","url":null,"abstract":"This paper examines pairwise collaborations in heterogeneous multi-robot systems. In particular, we focus on how individual robots, with different functionalities and dynamics, can enhance their resilience by forming collaborative arrangements that result in new capabilities. Control barrier functions are utilized as a mechanism to encode the safe operating regions of individual robots, with the idea being that a robot may be able to operate in new regions that it could not traverse alone by working with other robots. We explore answers to three questions: “Why should robots collaborate?”, “When should robots collaborate?”, and “How can robots collaborate?” To that end, we introduce the safely reachable set – capturing the regions that individual robots can reach safely, either with or without help, while considering their initial states and dynamics. We then describe the conditions under which a help-providing robot and a help-receiving robot can engage in collaboration. Next, we describe the pairwise collaboration framework, modeled through hybrid automata, to show how collaborations can be structured within a heterogeneous multi-robot team. Finally, we present case studies that are conducted on a team of mobile robots.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"3 ","pages":"461-471"},"PeriodicalIF":0.0,"publicationDate":"2024-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10693575","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142595023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilient Synchronization of Pulse-Coupled Oscillators Under Stealthy Attacks 隐形攻击下脉冲耦合振荡器的弹性同步
Pub Date : 2024-09-10 DOI: 10.1109/OJCSYS.2024.3458593
Yugo Iori;Hideaki Ishii
This paper studies a clock synchronization problem for wireless sensor networks employing pulse-based communication when some of the nodes are faulty or even adversarial. The objective is to design resilient distributed algorithms for the nonfaulty nodes to keep the influence of the malicious nodes minimal and to arrive at synchronization in a safe manner. Compared with conventional approaches, our algorithms are more capable in the sense that they are applicable to networks taking noncomplete graph structures. Our approach is to extend the class of mean subsequence reduced (MSR) algorithms from the area of multi-agent consensus. First, we provide a simple detection method to find malicious nodes that transmit pulses irregularly. Then, we demonstrate that in the presence of adversaries avoiding to be detected, the normal nodes can reach synchronization by ignoring suspicious pulses. Two extensions of this algorithm are further presented, which can operate under more adversarial attacks and also with relaxed conditions on the initial phases. We illustrate the effectiveness of our results by numerical examples.
本文研究了采用脉冲通信的无线传感器网络的时钟同步问题,当一些节点有故障甚至是恶意节点时,该问题就会出现。目的是为非故障节点设计弹性分布式算法,使恶意节点的影响降到最低,并以安全的方式实现同步。与传统方法相比,我们的算法更适用于非完整图结构的网络。我们的方法是扩展多代理共识领域的平均子序列缩减(MSR)算法。首先,我们提供了一种简单的检测方法,用于发现不规则传输脉冲的恶意节点。然后,我们证明了在对手避免被检测的情况下,正常节点可以通过忽略可疑脉冲达到同步。我们还进一步介绍了该算法的两个扩展,它们可以在更多的对抗性攻击下运行,而且初始阶段的条件也很宽松。我们通过数值示例来说明我们的结果的有效性。
{"title":"Resilient Synchronization of Pulse-Coupled Oscillators Under Stealthy Attacks","authors":"Yugo Iori;Hideaki Ishii","doi":"10.1109/OJCSYS.2024.3458593","DOIUrl":"https://doi.org/10.1109/OJCSYS.2024.3458593","url":null,"abstract":"This paper studies a clock synchronization problem for wireless sensor networks employing pulse-based communication when some of the nodes are faulty or even adversarial. The objective is to design resilient distributed algorithms for the nonfaulty nodes to keep the influence of the malicious nodes minimal and to arrive at synchronization in a safe manner. Compared with conventional approaches, our algorithms are more capable in the sense that they are applicable to networks taking noncomplete graph structures. Our approach is to extend the class of mean subsequence reduced (MSR) algorithms from the area of multi-agent consensus. First, we provide a simple detection method to find malicious nodes that transmit pulses irregularly. Then, we demonstrate that in the presence of adversaries avoiding to be detected, the normal nodes can reach synchronization by ignoring suspicious pulses. Two extensions of this algorithm are further presented, which can operate under more adversarial attacks and also with relaxed conditions on the initial phases. We illustrate the effectiveness of our results by numerical examples.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"3 ","pages":"429-444"},"PeriodicalIF":0.0,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10675443","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142430771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pareto-Optimal Event-Based Scheme for Station and Inter-Station Control of Electric and Automated Buses 基于帕累托最优事件的电动和自动公交车车站和站间控制方案
Pub Date : 2024-09-09 DOI: 10.1109/OJCSYS.2024.3456633
Cecilia Pasquale;Simona Sacone;Silvia Siri;Antonella Ferrara
This paper considers electric and automated buses required to follow a given line and respect a given timetable in an inter-city road. The main goal of this work is to design a control scheme in order to optimally decide, in real time, the speed profile of the bus along the line, as well as the dwell and charging times at stops. This must be done by accounting for the traffic conditions encountered in the road and by jointly minimizing the deviations from the timetable and the lack of energy in the bus battery compared with a desired level. For the resulting multi-objective optimal control problem a Pareto front analysis is performed in the paper, also considering a real test case. Relying on the analysis outcomes, an event-based control scheme is proposed, which allows, every time a bus reaches a stop, to find the most suitable Pareto-optimal solution depending on a set of state and scenario conditions referred to the expected departure time at stops, the predicted traffic conditions in the road and the state of charge of the bus battery. The performance of the proposed control scheme is tested on a real case study, thoroughly discussed in the paper.
本文考虑的是在城市间道路上,电动公交车和自动驾驶公交车需要按照给定的线路行驶,并遵守给定的时间表。这项工作的主要目标是设计一种控制方案,以便实时优化公交车沿线的速度曲线以及在站点的停留和充电时间。要做到这一点,就必须考虑到道路上遇到的交通状况,同时尽量减少与时间表的偏差和公交车电池中能量不足的情况。对于由此产生的多目标最优控制问题,本文进行了帕累托前沿分析,并考虑了一个实际测试案例。根据分析结果,提出了一种基于事件的控制方案,该方案允许在公交车每次到达站点时,根据一组状态和场景条件(指站点的预计出发时间、道路的预测交通状况以及公交车电池的充电状态)找到最合适的帕累托最优解。本文在一个实际案例研究中对所提出的控制方案的性能进行了测试,并进行了详尽的讨论。
{"title":"Pareto-Optimal Event-Based Scheme for Station and Inter-Station Control of Electric and Automated Buses","authors":"Cecilia Pasquale;Simona Sacone;Silvia Siri;Antonella Ferrara","doi":"10.1109/OJCSYS.2024.3456633","DOIUrl":"https://doi.org/10.1109/OJCSYS.2024.3456633","url":null,"abstract":"This paper considers electric and automated buses required to follow a given line and respect a given timetable in an inter-city road. The main goal of this work is to design a control scheme in order to optimally decide, in real time, the speed profile of the bus along the line, as well as the dwell and charging times at stops. This must be done by accounting for the traffic conditions encountered in the road and by jointly minimizing the deviations from the timetable and the lack of energy in the bus battery compared with a desired level. For the resulting multi-objective optimal control problem a Pareto front analysis is performed in the paper, also considering a real test case. Relying on the analysis outcomes, an event-based control scheme is proposed, which allows, every time a bus reaches a stop, to find the most suitable Pareto-optimal solution depending on a set of state and scenario conditions referred to the expected departure time at stops, the predicted traffic conditions in the road and the state of charge of the bus battery. The performance of the proposed control scheme is tested on a real case study, thoroughly discussed in the paper.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"3 ","pages":"445-460"},"PeriodicalIF":0.0,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10669750","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142447138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Control-Theoretical Zero-Knowledge Proof Scheme for Networked Control Systems 网络控制系统的控制理论零知识证明方案
Pub Date : 2024-09-06 DOI: 10.1109/OJCSYS.2024.3455899
Camilla Fioravanti;Christoforos N. Hadjicostis;Gabriele Oliva
Networked Control Systems (NCS) are pivotal for sectors like industrial automation, autonomous vehicles, and smart grids. However, merging communication networks with control loops brings complexities and security vulnerabilities, necessitating strong protection and authentication measures. This paper introduces an innovative Zero-Knowledge Proof (ZKP) scheme tailored for NCSs, enabling a networked controller to prove its knowledge of the dynamical model and its ability to control a discrete-time linear time-invariant (LTI) system to a sensor, without revealing the model. This verification is done through the controller's capacity to produce suitable control signals in response to the sensor's output demands. The completeness, soundness, and zero-knowledge properties of the proposed approach are demonstrated. The scheme is subsequently extended by considering the presence of delays and output noise. Additionally, a dual scenario where the sensor proves its model knowledge to the controller is explored, enhancing the method's versatility. Effectiveness is shown through numerical simulations and a case study on distributed agreement in multi-agent systems.
联网控制系统(NCS)对于工业自动化、自动驾驶汽车和智能电网等领域至关重要。然而,通信网络与控制回路的融合带来了复杂性和安全漏洞,因此需要强有力的保护和验证措施。本文介绍了一种为 NCS 量身定制的创新型零知识证明(ZKP)方案,使联网控制器能够在不泄露模型的情况下,向传感器证明其对动态模型的了解以及控制离散时间线性时不变(LTI)系统的能力。这种验证是通过控制器根据传感器的输出要求产生适当控制信号的能力来完成的。所提方法的完整性、合理性和零知识属性均已得到证明。随后,考虑到延迟和输出噪声的存在,对该方案进行了扩展。此外,还探讨了传感器向控制器证明其模型知识的双重情况,从而增强了该方法的通用性。通过数值模拟和多代理系统分布式协议案例研究,证明了该方法的有效性。
{"title":"A Control-Theoretical Zero-Knowledge Proof Scheme for Networked Control Systems","authors":"Camilla Fioravanti;Christoforos N. Hadjicostis;Gabriele Oliva","doi":"10.1109/OJCSYS.2024.3455899","DOIUrl":"https://doi.org/10.1109/OJCSYS.2024.3455899","url":null,"abstract":"Networked Control Systems (NCS) are pivotal for sectors like industrial automation, autonomous vehicles, and smart grids. However, merging communication networks with control loops brings complexities and security vulnerabilities, necessitating strong protection and authentication measures. This paper introduces an innovative Zero-Knowledge Proof (ZKP) scheme tailored for NCSs, enabling a networked controller to prove its knowledge of the dynamical model and its ability to control a discrete-time linear time-invariant (LTI) system to a sensor, without revealing the model. This verification is done through the controller's capacity to produce suitable control signals in response to the sensor's output demands. The completeness, soundness, and zero-knowledge properties of the proposed approach are demonstrated. The scheme is subsequently extended by considering the presence of delays and output noise. Additionally, a dual scenario where the sensor proves its model knowledge to the controller is explored, enhancing the method's versatility. Effectiveness is shown through numerical simulations and a case study on distributed agreement in multi-agent systems.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"3 ","pages":"416-428"},"PeriodicalIF":0.0,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10669168","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142430752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Control of Linear-Threshold Brain Networks via Reservoir Computing 通过水库计算控制线性阈值大脑网络
Pub Date : 2024-08-29 DOI: 10.1109/OJCSYS.2024.3451889
Michael McCreesh;Jorge Cortés
Learning is a key function in the brain to be able to achieve the activity patterns required to perform various activities. While specific behaviors are determined by activity in localized regions, the interconnections throughout the entire brain play a key role in enabling its ability to exhibit desired activity. To mimic this setup, this paper examines the use of reservoir computing to control a linear-threshold network brain model to a desired trajectory. We first formally design open- and closed-loop controllers that achieve reference tracking under suitable conditions on the synaptic connectivity. Given the impracticality of evaluating closed-form control signals, particularly with growing network complexity, we provide a framework where a reservoir of a larger size than the network is trained to drive the activity to the desired pattern. We illustrate the versatility of this setup in two applications: selective recruitment and inhibition of neuronal populations for goal-driven selective attention, and network intervention for the prevention of epileptic seizures.
学习是大脑实现各种活动所需的活动模式的关键功能。虽然特定行为是由局部区域的活动决定的,但整个大脑的相互连接在使大脑表现出所需活动的能力方面起着关键作用。为了模拟这种设置,本文研究了如何利用水库计算来控制线性阈值网络大脑模型,使其达到所需的轨迹。我们首先正式设计了开环和闭环控制器,可在突触连通性的适当条件下实现参考跟踪。鉴于评估闭式控制信号不切实际,特别是随着网络复杂性的增加,我们提供了一个框架,即训练一个比网络规模更大的蓄水池,以驱动活动达到所需的模式。我们在两个应用中说明了这种设置的多功能性:对神经元群进行选择性招募和抑制,以实现目标驱动的选择性注意;以及对网络进行干预,以预防癫痫发作。
{"title":"Control of Linear-Threshold Brain Networks via Reservoir Computing","authors":"Michael McCreesh;Jorge Cortés","doi":"10.1109/OJCSYS.2024.3451889","DOIUrl":"https://doi.org/10.1109/OJCSYS.2024.3451889","url":null,"abstract":"Learning is a key function in the brain to be able to achieve the activity patterns required to perform various activities. While specific behaviors are determined by activity in localized regions, the interconnections throughout the entire brain play a key role in enabling its ability to exhibit desired activity. To mimic this setup, this paper examines the use of reservoir computing to control a linear-threshold network brain model to a desired trajectory. We first formally design open- and closed-loop controllers that achieve reference tracking under suitable conditions on the synaptic connectivity. Given the impracticality of evaluating closed-form control signals, particularly with growing network complexity, we provide a framework where a reservoir of a larger size than the network is trained to drive the activity to the desired pattern. We illustrate the versatility of this setup in two applications: selective recruitment and inhibition of neuronal populations for goal-driven selective attention, and network intervention for the prevention of epileptic seizures.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"3 ","pages":"325-341"},"PeriodicalIF":0.0,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10659224","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142246461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hamilton-Jacobi Reachability in Reinforcement Learning: A Survey 强化学习中的汉密尔顿-雅各比可达性:调查
Pub Date : 2024-08-23 DOI: 10.1109/OJCSYS.2024.3449138
Milan Ganai;Sicun Gao;Sylvia L. Herbert
Recent literature has proposed approaches that learn control policies with high performance while maintaining safety guarantees. Synthesizing Hamilton-Jacobi (HJ) reachable sets has become an effective tool for verifying safety and supervising the training of reinforcement learning-based control policies for complex, high-dimensional systems. Previously, HJ reachability was restricted to verifying low-dimensional dynamical systems primarily because the computational complexity of the dynamic programming approach it relied on grows exponentially with the number of system states. In recent years, a litany of proposed methods addresses this limitation by computing the reachability value function simultaneously with learning control policies to scale HJ reachability analysis while still maintaining a reliable estimate of the true reachable set. These HJ reachability approximations are used to improve the safety, and even reward performance, of learned control policies and can solve challenging tasks such as those with dynamic obstacles and/or with lidar-based or vision-based observations. In this survey paper, we review the recent developments in the field of HJ reachability estimation in reinforcement learning that would provide a foundational basis for further research into reliability in high-dimensional systems.
最近有文献提出了既能学习高性能控制策略,又能保证安全的方法。合成汉密尔顿-雅各比(HJ)可达集已成为验证复杂高维系统安全性和监督基于强化学习的控制策略训练的有效工具。以前,HJ可达性仅限于验证低维动态系统,主要是因为它所依赖的动态编程方法的计算复杂度会随着系统状态数的增加而呈指数增长。近年来,为解决这一局限性,人们提出了一系列方法,即在计算可达性值函数的同时学习控制策略,以扩展 HJ可达性分析,同时仍能保持对真实可达集的可靠估计。这些 HJ 可及性近似值可用于提高所学控制策略的安全性甚至奖励性能,并能解决具有挑战性的任务,如具有动态障碍物和/或基于激光雷达或视觉观测的任务。在这篇调查报告中,我们回顾了强化学习中 HJ可达性估计领域的最新进展,这些进展将为进一步研究高维系统的可靠性奠定基础。
{"title":"Hamilton-Jacobi Reachability in Reinforcement Learning: A Survey","authors":"Milan Ganai;Sicun Gao;Sylvia L. Herbert","doi":"10.1109/OJCSYS.2024.3449138","DOIUrl":"https://doi.org/10.1109/OJCSYS.2024.3449138","url":null,"abstract":"Recent literature has proposed approaches that learn control policies with high performance while maintaining safety guarantees. Synthesizing Hamilton-Jacobi (HJ) reachable sets has become an effective tool for verifying safety and supervising the training of reinforcement learning-based control policies for complex, high-dimensional systems. Previously, HJ reachability was restricted to verifying low-dimensional dynamical systems primarily because the computational complexity of the dynamic programming approach it relied on grows exponentially with the number of system states. In recent years, a litany of proposed methods addresses this limitation by computing the reachability value function simultaneously with learning control policies to scale HJ reachability analysis while still maintaining a reliable estimate of the true reachable set. These HJ reachability approximations are used to improve the safety, and even reward performance, of learned control policies and can solve challenging tasks such as those with dynamic obstacles and/or with lidar-based or vision-based observations. In this survey paper, we review the recent developments in the field of HJ reachability estimation in reinforcement learning that would provide a foundational basis for further research into reliability in high-dimensional systems.","PeriodicalId":73299,"journal":{"name":"IEEE open journal of control systems","volume":"3 ","pages":"310-324"},"PeriodicalIF":0.0,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10645063","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142246525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE open journal of control systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1