-
作者:Liu, Kun-Zhi; Teel, Andrew R.; Sun, Xi-Ming
作者单位:Dalian University of Technology; University of California System; University of California Santa Barbara
摘要:In this article, the stability problem for event-triggered nonlinear control systems is addressed in the presence of stochastic denial of service attacks on the communication network. Dynamic event-triggered control and periodic event-triggered control are considered under the stochastic attacks. The stochastic attacks are modeled by a stochastic hybrid timer and a logic variable which is used to identify whether the network is attacked or not. Then, the entire closed-loop system can be modele...
-
作者:Liu, Nian; Guo, Lei
作者单位:Chinese Academy of Sciences; Academy of Mathematics & System Sciences, CAS
摘要:Game theory is playing more and more important roles in understanding complex systems and in investigating intelligent machines with various uncertainties. As a starting point, we consider the classical two-player zero-sum linear-quadratic stochastic differential games, but in contrast to most of the existing studies, the coefficient matrices of the systems are assumed to be unknown to both players, and consequently it is necessary to study adaptive strategies of the players, which may be term...
-
作者:Tong, Xin; Cheng, Shing Shin
作者单位:Chinese University of Hong Kong; Chinese University of Hong Kong; Chinese University of Hong Kong
摘要:Existing approaches to robust global asymptotic stabilization of a pair of antipodal points on unit n-sphere S-n typically involve the noncentrally synergistic hybrid controllers for attitude tracking on unit quaternion space. However, when switching faults occur due to parameter errors, the noncentrally synergistic property can lead to the unwinding problem or, in some cases, destabilize the desired set. In this work, a hybrid controller is first proposed based on a novel centrally synergisti...
-
作者:Wu, Tong; Zhu, Yimin; Zhang, Lixian; Shi, Peng
作者单位:Harbin Institute of Technology; University of Adelaide; Obuda University
摘要:This study is concerned with the bumpless transfer control (BTC) for discrete-time Markov jump linear systems (MJLSs) subject to constraints on states and inputs. A new approach called bumpless transfer model predictive control (BT-MPC) is proposed, which simultaneously optimizes the stabilization performance and bumpless transfer performance in a receding horizon manner. By a scenario-based control law, the fixed-duration transition progress is generalized to the mutable-duration one, so that...
-
作者:Li, Jueyou; Li, Chaojie; Fan, Jing; Huang, Tingwen
作者单位:Chongqing Normal University; North China Electric Power University; Central South University
摘要:This article examines an online distributed optimization problem over an unbalanced digraph, in which a group of nodes in the network tries to collectively search for a minimizer of a time-varying global cost function while data are distributed among computing nodes. As the problem size becomes large, it will inevitably suffer from the communication bottleneck since each node that exchanges messages potentially transmits large amounts of information to its neighbors. To handle the issue, we de...
-
作者:Mapurunga, Eduardo; Gevers, Michel; Bazanella, Alexandre S.
作者单位:Universidade Federal do Rio Grande do Sul; Universite Catholique Louvain
摘要:The article (Bazanella et al., 2019) presented the first results on generic identifiability of dynamic networks with partial excitation and partial measurements. All previous papers assumed that either all nodes are excited or all nodes are measured. One key contribution of that paper was to establish a set of necessary conditions on the excitation and measurement pattern (EMP) that guarantee generic identifiability: all sources must be excited and all sinks measured, and all other nodes must ...
-
作者:Duan, Jingliang; Cao, Wenhan; Zheng, Yang; Zhao, Lin
作者单位:University of Science & Technology Beijing; National University of Singapore; Tsinghua University; University of California System; University of California San Diego; National University of Singapore
摘要:The convergence of policy gradient algorithms hinges on the optimization landscape of the underlying optimal control problem. Theoretical insights into these algorithms can often be acquired from analyzing those of linear quadratic control. However, most of the existing literature only considers the optimization landscape for static full-state or output feedback policies (controllers). In this article, we investigate the more challenging case of dynamic output-feedback policies for linear quad...
-
作者:Mcallister, Robert D.; Rawlings, James B.
作者单位:University of California System; University of California Santa Barbara
摘要:We define a notion of distributional robustness, via the Wasserstein metric, for closed-loop systems subject to errors in the disturbance distribution used to construct the controller. We then establish sufficient conditions for stochastic model predictive control (SMPC) to satisfy this definition of distributional robustness and establish a similar notion of distributional robustness for economic applications of SMPC. These results address incorrectly or unmodeled disturbances, demonstrate th...
-
作者:Yu, Xingkai; Meng, Ziyang
作者单位:Tsinghua University
摘要:In this article, the joint estimation of state and noise covariance for linear systems with unknown covariance of multiplicative noise is considered. The measurement likelihood is modeled as a mixture of two Gaussian distributions and a Student's t distribution, respectively. The unknown covariance of multiplicative noise is modeled as an inverse Gamma/Wishart distribution and the initial condition is formulated as the nominal covariance. By using robust design and choosing hierarchical priors...
-
作者:Zhao, Xudong; Liu, Le; Basin, Michael V.; Fei, Zhongyang
作者单位:Dalian University of Technology; Universidad Autonoma de Nuevo Leon
摘要:Security issues in cyber-physical systems have attracted increasing attention in recent years. In this article, a security problem in a remote estimation application is considered, where an attacker tries to degrade estimation performance via malicious attacks. In our scenario, a smart sensor transmits its innovation to a remote estimator with a residue-based false data detector. Instead of assuming that the attacker launches a consecutive man-in-the-middle attack, we consider the case with in...