-
作者:Astolfi, Daniele; Alessandri, Angelo; Zaccarian, Luca
作者单位:Universite Claude Bernard Lyon 1; Centre National de la Recherche Scientifique (CNRS); CNRS - Institute for Engineering & Systems Sciences (INSIS); University of Genoa; Universite de Toulouse; Centre National de la Recherche Scientifique (CNRS); University of Trento
摘要:We propose a redesign paradigm for stable estimators by introducing a saturation or a dead-zone nonlinearity with adaptive thresholds on the output injection term. Such nonlinearities allow improving the sensitivity to measurement noise in different scenarios (impulsive disturbances or persistent noise such as sensor bias), while preserving the asymptotic convergence properties of the original observer. These redesigns apply to a broad class of state estimators, including linear observers, obs...
-
作者:Pagliara, Renato; Leonard, Naomi Ehrich
作者单位:Princeton University
摘要:Contagious processes, such as spread of infectious diseases, social behaviors, or computer viruses, affect biological, social, and technological systems. Epidemic models for large populations and finite populations on networks have been used to understand and control both transient and steady-state behaviors. Typically it is assumed that after recovery from an infection, every agent will either return to its original susceptible state or acquire full immunity to reinfection. We study the netwo...
-
作者:Marelli, Damian; Sui, Tianju; Fu, Minyue; Lu, Renquan
作者单位:Guangdong University of Technology; Dalian University of Technology; Dalian University of Technology; University of Newcastle; Guangdong University of Technology
摘要:We study the problem of detecting an attack on a stochastic cyber-physical system. We aim to treat the problem in its most general form. We start by introducing the notion of asymptotically detectable attacks, as those attacks introducing changes to the system's output statistics which persist asymptotically. We then provide a necessary and sufficient condition for asymptotic detectability. This condition preserves generality as it holds under no restrictive assumption on the system and attack...
-
作者:Guo, Yuqian; Shen, Yawen; Gui, Weihua
作者单位:Central South University
摘要:This article presents an investigation of the asymptotical set stability (ASS) of logic dynamical systems (LDSs) with impulsive disturbances at random instants. Unlike ordinary probabilistic Boolean networks, such an impulsive LDS is not Markovian in general. In this article, an impulsive LDS is described by using a hybrid index model and the sequence of intervals between adjacent impulsive instants is assumed to be independent and identically distributed. Under this assumption, the subsequenc...
-
作者:Scandella, Matteo; Mazzoleni, Mirko; Formentin, Simone; Previdi, Fabio
作者单位:University of Bergamo; Polytechnic University of Milan
摘要:In the last decade, kernel-based learning approaches typically employed for classification and regression have shown outstanding performance also in dynamic system identification. The typical way to compute the solution of this learning problem subsumes the inversion of the kernel matrix. However, due to limited machine precision, this might not be possible in many practical applications. In this article, we analyze the aforementioned problem and show that the typical estimate is just one of t...
-
作者:Li, Jian; Liu, Yungang
作者单位:Yantai University; Shandong University
摘要:This article is devoted to the stabilization via adaptive feedback for a class of uncertain coupled reaction-diffusion dynamics in the actuation path of an ordinary differential equation (ODE) system. The system under investigation, a class of coupled parabolic partial differential equation (PDE)-ODE systems, is more representative since the dynamics in actuation path (i.e., the PDE subsystem) are coupled rather than uncoupled parabolic equations and hence includes those in the related literat...
-
作者:Agarwal, Etika; Sivaranjani, S.; Gupta, Vijay; Antsaklis, Panos J.
作者单位:University of Notre Dame
摘要:We consider the problem of designing distributed controllers to guarantee dissipativity of a networked system comprised of dynamically coupled subsystems. We require that the control synthesis is carried out locally at the subsystem-level, without explicit knowledge of the dynamics of other subsystems in the network. We solve this problem in two steps. First, we provide distributed subsystem-level dissipativity analysis conditions whose feasibility is sufficient to guarantee dissipativity of t...
-
作者:de Oliveira, Matheus Senna; Pereira, Renan Lima
作者单位:Comando-Geral de Tecnologia Aeroespacial (CTA); Instituto Tecnologico de Aeronautica (ITA)
摘要:In this article, we introduce novel filter design conditions for discrete-time linear parameter-varying (LPV) systems. The two main features of the proposed conditions are: the ability of handling LPV systems subject to variation in all matrices of the system and the generalization for systems with bounded rates of parameter variation. Filter stability and H-infinity filtering problems are addressed through poly-quadratic Lyapunov functions in terms of linear matrix inequalities. Numerical exa...
-
作者:Liang, Li; Deng, Fang; Lu, Maobin; Chen, Jie
作者单位:Beijing Institute of Technology; Inner Mongolia University of Science & Technology
摘要:A target-attacker-defender (TAD) game is a fascinating differential game in both nature and the artificial world. This article considers a TAD game with a nonsuicidal faster attacker that aims to capture the target while avoiding being captured by the defender. The attacker is both a pursuer (pursues the target) and an evader (evades the defender). Naturally, one wonders when and how the attacker can chase the target and when and how the attacker can evade the defender. In this article, we fir...
-
作者:Sultangazin, Alimzhan; Tabuada, Paulo
作者单位:University of California System; University of California Los Angeles
摘要:Cloud computing platforms are being increasingly used for closing feedback control loops, especially when computationally expensive algorithms, such as model-predictive control, are used to optimize performance. Outsourcing of control algorithms entails an exchange of data between the control system and the cloud and, naturally, raises concerns about the privacy of the control system's data (e.g., state trajectory and control objective). Moreover, any attempt at enforcing privacy needs to add ...