Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intellig...Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intelligent processing on edge servers(ES).However,securely distributing encrypted data stored in the cloud to terminals that meet decryption requirements has become a prominent research topic.Additionally,managing attributes,including addition,deletion,and modification,is a crucial issue in the access control scheme for RES.To address these security concerns,a trust-based ciphertext-policy attribute-based encryption(CP-ABE)device access control scheme is proposed for RES(TB-CP-ABE).This scheme effectivelymanages the distribution and control of encrypted data on the cloud through robust attribute key management.By introducing trust management mechanisms and outsourced decryption technology,the ES system can effectively assess and manage the trust worthiness of terminal devices,ensuring that only trusted devices can participate in data exchange and access sensitive information.Besides,the ES system dynamically evaluates trust scores to set decryption trust thresholds,thereby regulating device data access permissions and enhancing the system’s security.To validate the security of the proposed TB-CP-ABE against chosen plaintext attacks,a comprehensive formal security analysis is conducted using the widely accepted random oraclemodel under the decisional q-Bilinear Diffie-Hellman Exponent(q-BDHE)assumption.Finally,comparative analysis with other schemes demonstrates that the TB-CP-ABE scheme cuts energy/communication costs by 43%,and scaleswell with rising terminals,maintaining average latency below 50ms,ensuring real-time service feasibility.The proposed scheme not only provides newinsights for the secure management of RES but also lays a foundation for future secure energy solutions.展开更多
In most existing CP-ABE schemes, there is only one authority in the system and all the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption an...In most existing CP-ABE schemes, there is only one authority in the system and all the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption and decryption operations that depend at least linearly on the number of attributes involved in the access policy. We propose an efficient multi-authority CP-ABE scheme in which the authorities need not interact to generate public information during the system initialization phase. Our scheme has constant ciphertext length and a constant number of pairing computations. Our scheme can be proven CPA-secure in random oracle model under the decision q-BDHE assumption. When user's attributes revocation occurs, the scheme transfers most re-encryption work to the cloud service provider, reducing the data owner's computational cost on the premise of security. Finally the analysis and simulation result show that the schemes proposed in this thesis ensure the privacy and secure access of sensitive data stored in the cloud server, and be able to cope with the dynamic changes of users' access privileges in large-scale systems. Besides, the multi-authority ABE eliminates the key escrow problem, achieves the length of ciphertext optimization and enhances the effi ciency of the encryption and decryption operations.展开更多
Dear Editor,In this letter,a constrained networked predictive control strategy is proposed for the optimal control problem of complex nonlinear highorder fully actuated(HOFA)systems with noises.The method can effectiv...Dear Editor,In this letter,a constrained networked predictive control strategy is proposed for the optimal control problem of complex nonlinear highorder fully actuated(HOFA)systems with noises.The method can effectively deal with nonlinearities,constraints,and noises in the system,optimize the performance metric,and present an upper bound on the stable output of the system.展开更多
A composite anti-disturbance predictive control strategy employing a Multi-dimensional Taylor Network(MTN)is presented for unmanned systems subject to time-delay and multi-source disturbances.First,the multi-source di...A composite anti-disturbance predictive control strategy employing a Multi-dimensional Taylor Network(MTN)is presented for unmanned systems subject to time-delay and multi-source disturbances.First,the multi-source disturbances are addressed according to their specific characteristics as follows:(A)an MTN data-driven model,which is used for uncertainty description,is designed accompanied with the mechanism model to represent the unmanned systems;(B)an adaptive MTN filter is used to remove the influence of the internal disturbance;(C)an MTN disturbance observer is constructed to estimate and compensate for the influence of the external disturbance;(D)the Extended Kalman Filter(EKF)algorithm is utilized as the learning mechanism for MTNs.Second,to address the time-delay effect,a recursiveτstep-ahead MTN predictive model is designed utilizing recursive technology,aiming to mitigate the impact of time-delay,and the EKF algorithm is employed as its learning mechanism.Then,the MTN predictive control law is designed based on the quadratic performance index.By implementing the proposed composite controller to unmanned systems,simultaneous feedforward compensation and feedback suppression to the multi-source disturbances are conducted.Finally,the convergence of the MTN and the stability of the closed-loop system are established utilizing the Lyapunov theorem.Two exemplary applications of unmanned systems involving unmanned vehicle and rigid spacecraft are presented to validate the effectiveness of the proposed approach.展开更多
With the rapid development of cloud computing and control theory, a new paradigm of networked control systems called cloud control systems is proposed to meet the requirements of large-scale and complex applications. ...With the rapid development of cloud computing and control theory, a new paradigm of networked control systems called cloud control systems is proposed to meet the requirements of large-scale and complex applications. Currently, cloud control systems are mainly built by using a centralized architecture. The centralized system is overly dependent on the central control plane and has huge challenges in large-scale heterogeneous node systems. In this paper, we propose a decentralized approach to establish cloud control systems by proposing a distributed point-to-point task routing method. A considerable number of tasks in the system will not rely on the central plane and will be directly routed to the target devices through the pointto-point routing method, which improves the horizontal scalability of the cloud control system. The point-to-point routing method directly gives a unique address to every task, making inter-task communication more efficient in a complex heterogeneous and busy cloud control systems. Finally, we experimentally demonstrate that the distributed point-to-point task routing approach is compatible against the state-of-the-art central systems in large-scale task situations.展开更多
The exponential growth of Internet ofThings(IoT)devices has created unprecedented challenges in data processing and resource management for time-critical applications.Traditional cloud computing paradigms cannot meet ...The exponential growth of Internet ofThings(IoT)devices has created unprecedented challenges in data processing and resource management for time-critical applications.Traditional cloud computing paradigms cannot meet the stringent latency requirements of modern IoT systems,while pure edge computing faces resource constraints that limit processing capabilities.This paper addresses these challenges by proposing a novel Deep Reinforcement Learning(DRL)-enhanced priority-based scheduling framework for hybrid edge-cloud computing environments.Our approach integrates adaptive priority assignment with a two-level concurrency control protocol that ensures both optimal performance and data consistency.The framework introduces three key innovations:(1)a DRL-based dynamic priority assignmentmechanism that learns fromsystem behavior,(2)a hybrid concurrency control protocol combining local edge validation with global cloud coordination,and(3)an integrated mathematical model that formalizes sensor-driven transactions across edge-cloud architectures.Extensive simulations across diverse workload scenarios demonstrate significant quantitative improvements:40%latency reduction,25%throughput increase,85%resource utilization(compared to 60%for heuristicmethods),40%reduction in energy consumption(300 vs.500 J per task),and 50%improvement in scalability factor(1.8 vs.1.2 for EDF)compared to state-of-the-art heuristic and meta-heuristic approaches.These results establish the framework as a robust solution for large-scale IoT and autonomous applications requiring real-time processing with consistency guarantees.展开更多
Predictive cruise control(PCC)is an intelligence-assisted control technology that can significantly improve the overall performance of a vehicle by using road and traffic information in advance.With the continuous dev...Predictive cruise control(PCC)is an intelligence-assisted control technology that can significantly improve the overall performance of a vehicle by using road and traffic information in advance.With the continuous development of cloud control platforms(CCPs)and telematics boxes(T-boxes),cloud-based predictive cruise control(CPCC)systems are considered an effective solution to the problems of map update difficulties and insufficient computing power on the vehicle side.In this study,a vehicle-cloud hierarchical control architecture for PCC is designed based on a CCP and T-box.This architecture utilizes waypoint structures for hierarchical and dynamic cooperative inter-triggering,enabling rolling optimization of the system and commending parsing at the vehicle end.This approach significantly improves the anti-interference capability and resolution efficiency of the system.On the CCP side,a predictive fuel-saving speed-planning(PFSP)algorithm that considers the throttle input,speed variations,and time efficiency based on the waypoint structure is proposed.It features a forward optimization search without requiring weight adjustments,demonstrating robust applicability to various road conditions and vehicles equiped with constant cruise(CC)system.On the vehicle-side T-box,based on the reference control sequence with the global navigation satellite system position,the recommended speed is analyzed and controlled using the acute angle principle.Through analyzing the differences of the PFSP algorithm compared to dynamic programming(DP)and Model predictive control(MPC)algorithms under uphill and downhill conditions,the results show that the PFSP achieves good energy-saving performance compared to CC without exhibiting significant speed fluctuations,demonstrating strong adaptability to the CC system.Finally,by building an experimental platform and running field tests over a total of 2000 km,we verified the effectiveness and stability of the CPCC system and proved the fuel-saving performance of the proposed PFSP algorithm.The results showed that the CPCC system equipped with the PFSP algorithm achieved an average fuel-saving rate of 2.05%-4.39%compared to CC.展开更多
This paper investigates the prescribed-time tracking control problem for a class of multi-input multi-output(MIMO)nonlinear strict-feedback systems subject to non-vanishing uncertainties. The inherent unmatched and no...This paper investigates the prescribed-time tracking control problem for a class of multi-input multi-output(MIMO)nonlinear strict-feedback systems subject to non-vanishing uncertainties. The inherent unmatched and non-vanishing uncertainties make the prescribed-time control problem become much more nontrivial. The solution to address the challenges mentioned above involves incorporating a prescribed-time filter, as opposed to a finite-time filter, and formulating a prescribed-time Lyapunov stability lemma(Lemma 5). The prescribed-time Lyapunov stability lemma is based on time axis shifting time-varying yet bounded gain, which establishes a novel link between the fixed-time and prescribed-time control method. This allows the restriction condition that the time-varying gain function must satisfy as imposed in most exist prescribed-time control works to be removed. Under the proposed control method, the desire trajectory is ensured to closely track the output of the system in prescribed time. The effectiveness of the theoretical results are verified through numerical simulation.展开更多
This paper investigates the problem of fuzzy adaptive finite-time inverse optimal control for active suspension systems(ASSs).The fuzzy logic systems(FLSs)are utilized to learn the unknown non-linear dynamics and an a...This paper investigates the problem of fuzzy adaptive finite-time inverse optimal control for active suspension systems(ASSs).The fuzzy logic systems(FLSs)are utilized to learn the unknown non-linear dynamics and an auxiliary system is established.Based on the finite-time stability theory and inverse optimal theory,a fuzzy adaptive inverse finite-time inverse optimal control method is proposed.It is proven that the formulated control approach guarantees the stability of the controlled systems,while ensuring that errors converge to a small neighborhood of zero within finite time.Moreover,the optimized control performance can be achieved.Eventually,the simulation results demonstrate the effectiveness of the proposed fuzzy adaptive finite-time inverse optimal control scheme.展开更多
Formation control in multi-agent systems has become a critical area of interest due to its wide-ranging applications in robotics,autonomous transportation,and surveillance.While various studies have explored distribut...Formation control in multi-agent systems has become a critical area of interest due to its wide-ranging applications in robotics,autonomous transportation,and surveillance.While various studies have explored distributed cooperative control,this review focuses on the theoretical foundations and recent developments in formation control strategies.The paper categorizes and analyzes key formation types,including formation maintenance,group or cluster formation,bipartite formations,event-triggered formations,finite-time convergence,and constrained formations.A significant portion of the review addresses formation control under constrained dynamics,presenting both modelbased and model-free approaches that consider practical limitations such as actuator bounds,communication delays,and nonholonomic constraints.Additionally,the paper discusses emerging trends,including the integration of eventdriven mechanisms and AI-enhanced coordination strategies.Comparative evaluations highlight the trade-offs among various methodologies regarding scalability,robustness,and real-world feasibility.Practical implementations are reviewed across diverse platforms,and the review identifies the current achievements and unresolved challenges in the field.The paper concludes by outlining promising research directions,such as adaptive control for dynamic environments,energy-efficient coordination,and using learning-based control under uncertainty.This review synthesizes the current state of the art and provides a road map for future investigation,making it a valuable reference for researchers and practitioners aiming to advance formation control in multi-agent systems.展开更多
Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of Things.But existing schem...Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of Things.But existing schemes often suffer from privacy breaches due to explicit attachment of access policies or partial hiding of critical attribute content.Additionally,resource-constrained IoT devices,especially those adopting wireless communication,frequently encounter affordability issues regarding decryption costs.In this paper,we propose an efficient and fine-grained access control scheme with fully hidden policies(named FHAC).FHAC conceals all attributes in the policy and utilizes bloom filters to efficiently locate them.A test phase before decryption is applied to assist authorized users in finding matches between their attributes and the access policy.Dictionary attacks are thwarted by providing unauthorized users with invalid values.The heavy computational overhead of both the test phase and most of the decryption phase is outsourced to two cloud servers.Additionally,users can verify the correctness of multiple outsourced decryption results simultaneously.Security analysis and performance comparisons demonstrate FHAC's effectiveness in protecting policy privacy and achieving efficient decryption.展开更多
This paper investigates the observer-based prescribed-time time-varying output formation-containment(PT-TV-OFC)control problem for heterogeneous multi-agent systems in which the different agents have different state d...This paper investigates the observer-based prescribed-time time-varying output formation-containment(PT-TV-OFC)control problem for heterogeneous multi-agent systems in which the different agents have different state dimensions.The system comprises one tracking leader,multiple formation leaders,and followers,where two types of leaders are used to generate a reference trajectory for movement and achieve specific formation,respectively.Firstly,a prescribed-time dynamics observer is constructed for the formation leaders to estimate the tracking leader's dynamic model and state.On this basis,a prescribed-time control protocol is designed for the formation leaders to achieve time-varying output formation.Then,a prescribed-time convex hull observer is designed for the followers to estimate information regarding the convex hull formed by the formation leaders.Using the estimated convex hull information,a prescribed-time containment control protocol is designed to ensure the followers converge into the convex hull.Furthermore,using Lyapunov stability theory,the stability of systems is proved in detail,which implies that the heterogeneous multi-agent systems can achieve PT-TV-OFC control.Finally,numerical simulations validate the feasibility of the theoretical results.展开更多
Dear Editor,This letter considers the formation control of multiple mobile robot systems(MMRS)that only relies on the local observation information.A new distributed finite-time observer is proposed for MMRS under dir...Dear Editor,This letter considers the formation control of multiple mobile robot systems(MMRS)that only relies on the local observation information.A new distributed finite-time observer is proposed for MMRS under directed graph to estimate the relative information between each follower robot and the leader robot.Then the formation control problem is transformed into the tracking problem and a finite-time tracking controller is proposed based on the robot model feature.展开更多
The integration of artificial intelligence into the development and production of mechatronic products offers a substantial opportunity to enhance efficiency, adaptability, and system performance. This paper examines ...The integration of artificial intelligence into the development and production of mechatronic products offers a substantial opportunity to enhance efficiency, adaptability, and system performance. This paper examines the utilization of reinforcement learning as a control strategy, with a particular focus on its deployment in pivotal stages of the product development lifecycle, specifically between system architecture and system integration and verification. A controller based on reinforcement learning was developed and evaluated in comparison to traditional proportional-integral controllers in dynamic and fault-prone environments. The results illustrate the superior adaptability, stability, and optimization potential of the reinforcement learning approach, particularly in addressing dynamic disturbances and ensuring robust performance. The study illustrates how reinforcement learning can facilitate the transition from conceptual design to implementation by automating optimization processes, enabling interface automation, and enhancing system-level testing. Based on the aforementioned findings, this paper presents future directions for research, which include the integration of domain-specific knowledge into the reinforcement learning process and the validation of this process in real-world environments. The results underscore the potential of artificial intelligence-driven methodologies to revolutionize the design and deployment of intelligent mechatronic systems.展开更多
This paper investigates the issue of fault-tolerant control for swarm systems subject to switched graphs,actuator faults and obstacles.A geometric-based partial differential equation(PDE)framework is proposed to unify...This paper investigates the issue of fault-tolerant control for swarm systems subject to switched graphs,actuator faults and obstacles.A geometric-based partial differential equation(PDE)framework is proposed to unify collision-free trajectory generation and fault-tolerant control.To deal with the fault-induced force imbalances,the Riemannian metric is proposed to coordinate nominal controllers and the global one.Then,Riemannianbased trajectory length optimization is solved by gradient's dynamic model-heat flow PDE,under which a feasible trajectory satisfying motion constraints is achieved to guide the faulty system.Such virtual control force emerges autonomously through this metric adjustments.Further,the tracking error is rigorously proven to be exponential boundedness.Simulation results confirm the validity of these theoretical findings.展开更多
Dear Editor,This letter deals with the stabilization problem of nonlinear stochastic systems via self-triggered impulsive control(STIC), where the timing of impulsive control actions is not dependent on continuous sta...Dear Editor,This letter deals with the stabilization problem of nonlinear stochastic systems via self-triggered impulsive control(STIC), where the timing of impulsive control actions is not dependent on continuous state monitoring. In contrast to the existing self-triggered control method, novel self-triggered mechanism(STM) is proposed by incorporating a waiting time for stabilizing impulses. This allows for direct prediction of the next impulsive instant.展开更多
In this paper,the distributed optimal formation control problem of heterogeneous Euler–Lagrange multi-agent systems with generic formation constraints and inequality constraints is investigated.Based on the primal–d...In this paper,the distributed optimal formation control problem of heterogeneous Euler–Lagrange multi-agent systems with generic formation constraints and inequality constraints is investigated.Based on the primal–dual dynamics and the adaptive control technique,a distributed optimal formation controller consists of a velocity reference signal generator and a velocity tracking controller is proposed.By using the optimality condition,the relationship between the equilibrium point of the closed-loop system and the optimal solution of the optimization problem is established.Then,by utilizing Lyapunov stability analysis,it is rigorously proved that the optimal formation is reached with the proposed controller.Lastly,simulation examples are provided to substantiate the theoretical results.展开更多
Cyber-physical systems(CPSs)are regarded as the backbone of the fourth industrial revolution,in which communication,physical processes,and computer technology are integrated.In modern industrial systems,CPSs are widel...Cyber-physical systems(CPSs)are regarded as the backbone of the fourth industrial revolution,in which communication,physical processes,and computer technology are integrated.In modern industrial systems,CPSs are widely utilized across various domains,such as smart grids,smart healthcare systems,smart vehicles,and smart manufacturing,among others.Due to their unique spatial distribution,CPSs are highly vulnerable to cyber-attacks,which may result in severe performance degradation and even system instability.Consequently,the security concerns of CPSs have attracted significant attention in recent years.In this paper,a comprehensive survey on the security issues of CPSs under cyber-attacks is provided.Firstly,mathematical descriptions of various types of cyberattacks are introduced in detail.Secondly,two types of secure estimation and control processing schemes,including robust methods and active methods,are reviewed.Thirdly,research findings related to secure control and estimation problems for different types of CPSs are summarized.Finally,the survey is concluded by outlining the challenges and suggesting potential research directions for the future.展开更多
This paper investigates the problem of optimal secure control for networked control systems under hybrid attacks.A control strategy based on the Stackelberg game framework is proposed,which differs from conventional m...This paper investigates the problem of optimal secure control for networked control systems under hybrid attacks.A control strategy based on the Stackelberg game framework is proposed,which differs from conventional methods by considering both denial-of-service(DoS)and false data injection(FDI)attacks simultaneously.Additionally,the stability conditions for the system under these hybrid attacks are established.It is technically challenging to design the control strategy by predicting attacker actions based on Stcakelberg game to ensure the system stability under hybrid attacks.Another technical difficulty lies in establishing the conditions for mean-square asymptotic stability due to the complexity of the attack scenarios Finally,simulations on an unstable batch reactor system under hybrid attacks demonstrate the effectiveness of the proposed strategy.展开更多
基金supported by the Science and Technology Project of the State Grid Corporation of China,Grant number 5700-202223189A-1-1-ZN.
文摘Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intelligent processing on edge servers(ES).However,securely distributing encrypted data stored in the cloud to terminals that meet decryption requirements has become a prominent research topic.Additionally,managing attributes,including addition,deletion,and modification,is a crucial issue in the access control scheme for RES.To address these security concerns,a trust-based ciphertext-policy attribute-based encryption(CP-ABE)device access control scheme is proposed for RES(TB-CP-ABE).This scheme effectivelymanages the distribution and control of encrypted data on the cloud through robust attribute key management.By introducing trust management mechanisms and outsourced decryption technology,the ES system can effectively assess and manage the trust worthiness of terminal devices,ensuring that only trusted devices can participate in data exchange and access sensitive information.Besides,the ES system dynamically evaluates trust scores to set decryption trust thresholds,thereby regulating device data access permissions and enhancing the system’s security.To validate the security of the proposed TB-CP-ABE against chosen plaintext attacks,a comprehensive formal security analysis is conducted using the widely accepted random oraclemodel under the decisional q-Bilinear Diffie-Hellman Exponent(q-BDHE)assumption.Finally,comparative analysis with other schemes demonstrates that the TB-CP-ABE scheme cuts energy/communication costs by 43%,and scaleswell with rising terminals,maintaining average latency below 50ms,ensuring real-time service feasibility.The proposed scheme not only provides newinsights for the secure management of RES but also lays a foundation for future secure energy solutions.
基金supported by National Basic Research Program of China(973Program)(2012CB720000)National Natural Science Foundation of China(61225015,61273128)+2 种基金Foundation for Innovative Research Groups of the National Natural Science Foundation of China(61321002)the Ph.D.Programs Foundation of Ministry of Education of China(20111101110012)CAST Foundation(CAST201210)
基金supported by National Natural Science Foundation of China under Grant No.60873231Natural Science Foundation of Jiangsu Province under Grant No.BK2009426+1 种基金Major State Basic Research Development Program of China under Grant No.2011CB302903Key University Science Research Project of Jiangsu Province under Grant No.11KJA520002
文摘In most existing CP-ABE schemes, there is only one authority in the system and all the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption and decryption operations that depend at least linearly on the number of attributes involved in the access policy. We propose an efficient multi-authority CP-ABE scheme in which the authorities need not interact to generate public information during the system initialization phase. Our scheme has constant ciphertext length and a constant number of pairing computations. Our scheme can be proven CPA-secure in random oracle model under the decision q-BDHE assumption. When user's attributes revocation occurs, the scheme transfers most re-encryption work to the cloud service provider, reducing the data owner's computational cost on the premise of security. Finally the analysis and simulation result show that the schemes proposed in this thesis ensure the privacy and secure access of sensitive data stored in the cloud server, and be able to cope with the dynamic changes of users' access privileges in large-scale systems. Besides, the multi-authority ABE eliminates the key escrow problem, achieves the length of ciphertext optimization and enhances the effi ciency of the encryption and decryption operations.
基金supported in part by the National Natural Science Foundation of China(62173255,62188101)Shenzhen Key Laboratory of Control Theory and Intelligent Systems(ZDSYS20220330161800001)
文摘Dear Editor,In this letter,a constrained networked predictive control strategy is proposed for the optimal control problem of complex nonlinear highorder fully actuated(HOFA)systems with noises.The method can effectively deal with nonlinearities,constraints,and noises in the system,optimize the performance metric,and present an upper bound on the stable output of the system.
基金co-supported by the National Key R&D Program of China(No.2023YFB4704400)the Zhejiang Provincial Natural Science Foundation of China(No.LQ24F030012)the National Natural Science Foundation of China General Project(No.62373033)。
文摘A composite anti-disturbance predictive control strategy employing a Multi-dimensional Taylor Network(MTN)is presented for unmanned systems subject to time-delay and multi-source disturbances.First,the multi-source disturbances are addressed according to their specific characteristics as follows:(A)an MTN data-driven model,which is used for uncertainty description,is designed accompanied with the mechanism model to represent the unmanned systems;(B)an adaptive MTN filter is used to remove the influence of the internal disturbance;(C)an MTN disturbance observer is constructed to estimate and compensate for the influence of the external disturbance;(D)the Extended Kalman Filter(EKF)algorithm is utilized as the learning mechanism for MTNs.Second,to address the time-delay effect,a recursiveτstep-ahead MTN predictive model is designed utilizing recursive technology,aiming to mitigate the impact of time-delay,and the EKF algorithm is employed as its learning mechanism.Then,the MTN predictive control law is designed based on the quadratic performance index.By implementing the proposed composite controller to unmanned systems,simultaneous feedforward compensation and feedback suppression to the multi-source disturbances are conducted.Finally,the convergence of the MTN and the stability of the closed-loop system are established utilizing the Lyapunov theorem.Two exemplary applications of unmanned systems involving unmanned vehicle and rigid spacecraft are presented to validate the effectiveness of the proposed approach.
基金supported by the National Key Research and Development Program of China (2018AAA0103203)the National Natural Science Foundation of China (62073036,61836001,62102022,62122014)the Beijing Natural Science Foundation of China (42020741)。
文摘With the rapid development of cloud computing and control theory, a new paradigm of networked control systems called cloud control systems is proposed to meet the requirements of large-scale and complex applications. Currently, cloud control systems are mainly built by using a centralized architecture. The centralized system is overly dependent on the central control plane and has huge challenges in large-scale heterogeneous node systems. In this paper, we propose a decentralized approach to establish cloud control systems by proposing a distributed point-to-point task routing method. A considerable number of tasks in the system will not rely on the central plane and will be directly routed to the target devices through the pointto-point routing method, which improves the horizontal scalability of the cloud control system. The point-to-point routing method directly gives a unique address to every task, making inter-task communication more efficient in a complex heterogeneous and busy cloud control systems. Finally, we experimentally demonstrate that the distributed point-to-point task routing approach is compatible against the state-of-the-art central systems in large-scale task situations.
基金supported by Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2025R909),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘The exponential growth of Internet ofThings(IoT)devices has created unprecedented challenges in data processing and resource management for time-critical applications.Traditional cloud computing paradigms cannot meet the stringent latency requirements of modern IoT systems,while pure edge computing faces resource constraints that limit processing capabilities.This paper addresses these challenges by proposing a novel Deep Reinforcement Learning(DRL)-enhanced priority-based scheduling framework for hybrid edge-cloud computing environments.Our approach integrates adaptive priority assignment with a two-level concurrency control protocol that ensures both optimal performance and data consistency.The framework introduces three key innovations:(1)a DRL-based dynamic priority assignmentmechanism that learns fromsystem behavior,(2)a hybrid concurrency control protocol combining local edge validation with global cloud coordination,and(3)an integrated mathematical model that formalizes sensor-driven transactions across edge-cloud architectures.Extensive simulations across diverse workload scenarios demonstrate significant quantitative improvements:40%latency reduction,25%throughput increase,85%resource utilization(compared to 60%for heuristicmethods),40%reduction in energy consumption(300 vs.500 J per task),and 50%improvement in scalability factor(1.8 vs.1.2 for EDF)compared to state-of-the-art heuristic and meta-heuristic approaches.These results establish the framework as a robust solution for large-scale IoT and autonomous applications requiring real-time processing with consistency guarantees.
基金Supported by National Key Research and Development Program of China(Grant No.2021YFB2501000).
文摘Predictive cruise control(PCC)is an intelligence-assisted control technology that can significantly improve the overall performance of a vehicle by using road and traffic information in advance.With the continuous development of cloud control platforms(CCPs)and telematics boxes(T-boxes),cloud-based predictive cruise control(CPCC)systems are considered an effective solution to the problems of map update difficulties and insufficient computing power on the vehicle side.In this study,a vehicle-cloud hierarchical control architecture for PCC is designed based on a CCP and T-box.This architecture utilizes waypoint structures for hierarchical and dynamic cooperative inter-triggering,enabling rolling optimization of the system and commending parsing at the vehicle end.This approach significantly improves the anti-interference capability and resolution efficiency of the system.On the CCP side,a predictive fuel-saving speed-planning(PFSP)algorithm that considers the throttle input,speed variations,and time efficiency based on the waypoint structure is proposed.It features a forward optimization search without requiring weight adjustments,demonstrating robust applicability to various road conditions and vehicles equiped with constant cruise(CC)system.On the vehicle-side T-box,based on the reference control sequence with the global navigation satellite system position,the recommended speed is analyzed and controlled using the acute angle principle.Through analyzing the differences of the PFSP algorithm compared to dynamic programming(DP)and Model predictive control(MPC)algorithms under uphill and downhill conditions,the results show that the PFSP achieves good energy-saving performance compared to CC without exhibiting significant speed fluctuations,demonstrating strong adaptability to the CC system.Finally,by building an experimental platform and running field tests over a total of 2000 km,we verified the effectiveness and stability of the CPCC system and proved the fuel-saving performance of the proposed PFSP algorithm.The results showed that the CPCC system equipped with the PFSP algorithm achieved an average fuel-saving rate of 2.05%-4.39%compared to CC.
基金supported in part by the National Key Research and Development Program of China(2023YFA1011803)the National Natural Science Foundation of China(62273064,61991400/61991403,61933012,62250710167,62203078)+2 种基金Natural Science Foundation of Chongqing(CSTB2023NSCQ-MSX0588)the Central University Project(2023CDJKYJH047)the Innovation Support Program for International Students Returning to China(cx2022016)
文摘This paper investigates the prescribed-time tracking control problem for a class of multi-input multi-output(MIMO)nonlinear strict-feedback systems subject to non-vanishing uncertainties. The inherent unmatched and non-vanishing uncertainties make the prescribed-time control problem become much more nontrivial. The solution to address the challenges mentioned above involves incorporating a prescribed-time filter, as opposed to a finite-time filter, and formulating a prescribed-time Lyapunov stability lemma(Lemma 5). The prescribed-time Lyapunov stability lemma is based on time axis shifting time-varying yet bounded gain, which establishes a novel link between the fixed-time and prescribed-time control method. This allows the restriction condition that the time-varying gain function must satisfy as imposed in most exist prescribed-time control works to be removed. Under the proposed control method, the desire trajectory is ensured to closely track the output of the system in prescribed time. The effectiveness of the theoretical results are verified through numerical simulation.
基金supported by the National Natural Science Foundation of China under 62173172。
文摘This paper investigates the problem of fuzzy adaptive finite-time inverse optimal control for active suspension systems(ASSs).The fuzzy logic systems(FLSs)are utilized to learn the unknown non-linear dynamics and an auxiliary system is established.Based on the finite-time stability theory and inverse optimal theory,a fuzzy adaptive inverse finite-time inverse optimal control method is proposed.It is proven that the formulated control approach guarantees the stability of the controlled systems,while ensuring that errors converge to a small neighborhood of zero within finite time.Moreover,the optimized control performance can be achieved.Eventually,the simulation results demonstrate the effectiveness of the proposed fuzzy adaptive finite-time inverse optimal control scheme.
基金supported in part by the National Natural Science Foundation of China under Grant 6237319in part by the Postgraduate Research and Practice Innovation Program of Jiangsu Province under Grant KYCX230479.
文摘Formation control in multi-agent systems has become a critical area of interest due to its wide-ranging applications in robotics,autonomous transportation,and surveillance.While various studies have explored distributed cooperative control,this review focuses on the theoretical foundations and recent developments in formation control strategies.The paper categorizes and analyzes key formation types,including formation maintenance,group or cluster formation,bipartite formations,event-triggered formations,finite-time convergence,and constrained formations.A significant portion of the review addresses formation control under constrained dynamics,presenting both modelbased and model-free approaches that consider practical limitations such as actuator bounds,communication delays,and nonholonomic constraints.Additionally,the paper discusses emerging trends,including the integration of eventdriven mechanisms and AI-enhanced coordination strategies.Comparative evaluations highlight the trade-offs among various methodologies regarding scalability,robustness,and real-world feasibility.Practical implementations are reviewed across diverse platforms,and the review identifies the current achievements and unresolved challenges in the field.The paper concludes by outlining promising research directions,such as adaptive control for dynamic environments,energy-efficient coordination,and using learning-based control under uncertainty.This review synthesizes the current state of the art and provides a road map for future investigation,making it a valuable reference for researchers and practitioners aiming to advance formation control in multi-agent systems.
基金supported in part by the National Key R&D Program of China(Grant No.2019YFB2101700)the National Natural Science Foundation of China(Grant No.62272102,No.62172320,No.U21A20466)+4 种基金the Open Research Fund of Key Laboratory of Cryptography of Zhejiang Province(Grant No.ZCL21015)the Qinghai Key R&D and Transformation Projects(Grant No.2021-GX-112)the Natural Science Foundation of Nanjing University of Posts and Telecommunications(Grant No.NY222141)the Natural Science Foundation of Jiangsu Higher Education Institutions of China under Grant(No.22KJB520029)Henan Key Laboratory of Network Cryptography Technology(No.LNCT2022-A10)。
文摘Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of Things.But existing schemes often suffer from privacy breaches due to explicit attachment of access policies or partial hiding of critical attribute content.Additionally,resource-constrained IoT devices,especially those adopting wireless communication,frequently encounter affordability issues regarding decryption costs.In this paper,we propose an efficient and fine-grained access control scheme with fully hidden policies(named FHAC).FHAC conceals all attributes in the policy and utilizes bloom filters to efficiently locate them.A test phase before decryption is applied to assist authorized users in finding matches between their attributes and the access policy.Dictionary attacks are thwarted by providing unauthorized users with invalid values.The heavy computational overhead of both the test phase and most of the decryption phase is outsourced to two cloud servers.Additionally,users can verify the correctness of multiple outsourced decryption results simultaneously.Security analysis and performance comparisons demonstrate FHAC's effectiveness in protecting policy privacy and achieving efficient decryption.
基金supported in part by the National Natural Science Foundation of China(Grant Nos.62473135 and 62173121)。
文摘This paper investigates the observer-based prescribed-time time-varying output formation-containment(PT-TV-OFC)control problem for heterogeneous multi-agent systems in which the different agents have different state dimensions.The system comprises one tracking leader,multiple formation leaders,and followers,where two types of leaders are used to generate a reference trajectory for movement and achieve specific formation,respectively.Firstly,a prescribed-time dynamics observer is constructed for the formation leaders to estimate the tracking leader's dynamic model and state.On this basis,a prescribed-time control protocol is designed for the formation leaders to achieve time-varying output formation.Then,a prescribed-time convex hull observer is designed for the followers to estimate information regarding the convex hull formed by the formation leaders.Using the estimated convex hull information,a prescribed-time containment control protocol is designed to ensure the followers converge into the convex hull.Furthermore,using Lyapunov stability theory,the stability of systems is proved in detail,which implies that the heterogeneous multi-agent systems can achieve PT-TV-OFC control.Finally,numerical simulations validate the feasibility of the theoretical results.
基金supported by the National Natural Science Foundation of China(62073113,62003122,62303148)the Fundamental Research Funds for the Central Universities(MCCSE2023A01,JZ2023HGTA0201,JZ2023HGQA0109)the Anhui Provincial Natural Science Foundation(2308085QF204)
文摘Dear Editor,This letter considers the formation control of multiple mobile robot systems(MMRS)that only relies on the local observation information.A new distributed finite-time observer is proposed for MMRS under directed graph to estimate the relative information between each follower robot and the leader robot.Then the formation control problem is transformed into the tracking problem and a finite-time tracking controller is proposed based on the robot model feature.
文摘The integration of artificial intelligence into the development and production of mechatronic products offers a substantial opportunity to enhance efficiency, adaptability, and system performance. This paper examines the utilization of reinforcement learning as a control strategy, with a particular focus on its deployment in pivotal stages of the product development lifecycle, specifically between system architecture and system integration and verification. A controller based on reinforcement learning was developed and evaluated in comparison to traditional proportional-integral controllers in dynamic and fault-prone environments. The results illustrate the superior adaptability, stability, and optimization potential of the reinforcement learning approach, particularly in addressing dynamic disturbances and ensuring robust performance. The study illustrates how reinforcement learning can facilitate the transition from conceptual design to implementation by automating optimization processes, enabling interface automation, and enhancing system-level testing. Based on the aforementioned findings, this paper presents future directions for research, which include the integration of domain-specific knowledge into the reinforcement learning process and the validation of this process in real-world environments. The results underscore the potential of artificial intelligence-driven methodologies to revolutionize the design and deployment of intelligent mechatronic systems.
基金supported in part by the National Natural Science Foundation of China under Grant 62303144,62020106003,U22A2044in part by the Zhejiang Provincial Natural Science Foundation of China under Grant LQ23F030013.
文摘This paper investigates the issue of fault-tolerant control for swarm systems subject to switched graphs,actuator faults and obstacles.A geometric-based partial differential equation(PDE)framework is proposed to unify collision-free trajectory generation and fault-tolerant control.To deal with the fault-induced force imbalances,the Riemannian metric is proposed to coordinate nominal controllers and the global one.Then,Riemannianbased trajectory length optimization is solved by gradient's dynamic model-heat flow PDE,under which a feasible trajectory satisfying motion constraints is achieved to guide the faulty system.Such virtual control force emerges autonomously through this metric adjustments.Further,the tracking error is rigorously proven to be exponential boundedness.Simulation results confirm the validity of these theoretical findings.
基金supported by the National Natural Science Foundation of China(62403393,12202058,62103118)the China Postdoctoral Science Foundation(2021T140160,2023 T160051)the Natural Science Foundation of Chongqing(CSTB 2023NSCQ-MSX0152)
文摘Dear Editor,This letter deals with the stabilization problem of nonlinear stochastic systems via self-triggered impulsive control(STIC), where the timing of impulsive control actions is not dependent on continuous state monitoring. In contrast to the existing self-triggered control method, novel self-triggered mechanism(STM) is proposed by incorporating a waiting time for stabilizing impulses. This allows for direct prediction of the next impulsive instant.
基金supported in part by the National Key Research and Development Program of China under Grant 2022YFB3303900in part by the National Natural Science Foundation of China under Grants 62103277 and 62025305。
文摘In this paper,the distributed optimal formation control problem of heterogeneous Euler–Lagrange multi-agent systems with generic formation constraints and inequality constraints is investigated.Based on the primal–dual dynamics and the adaptive control technique,a distributed optimal formation controller consists of a velocity reference signal generator and a velocity tracking controller is proposed.By using the optimality condition,the relationship between the equilibrium point of the closed-loop system and the optimal solution of the optimization problem is established.Then,by utilizing Lyapunov stability analysis,it is rigorously proved that the optimal formation is reached with the proposed controller.Lastly,simulation examples are provided to substantiate the theoretical results.
文摘Cyber-physical systems(CPSs)are regarded as the backbone of the fourth industrial revolution,in which communication,physical processes,and computer technology are integrated.In modern industrial systems,CPSs are widely utilized across various domains,such as smart grids,smart healthcare systems,smart vehicles,and smart manufacturing,among others.Due to their unique spatial distribution,CPSs are highly vulnerable to cyber-attacks,which may result in severe performance degradation and even system instability.Consequently,the security concerns of CPSs have attracted significant attention in recent years.In this paper,a comprehensive survey on the security issues of CPSs under cyber-attacks is provided.Firstly,mathematical descriptions of various types of cyberattacks are introduced in detail.Secondly,two types of secure estimation and control processing schemes,including robust methods and active methods,are reviewed.Thirdly,research findings related to secure control and estimation problems for different types of CPSs are summarized.Finally,the survey is concluded by outlining the challenges and suggesting potential research directions for the future.
基金supported in part by Shanghai Rising-Star Program,China under grant 22QA1409400in part by National Natural Science Foundation of China under grant 62473287 and 62088101in part by Shanghai Municipal Science and Technology Major Project under grant 2021SHZDZX0100.
文摘This paper investigates the problem of optimal secure control for networked control systems under hybrid attacks.A control strategy based on the Stackelberg game framework is proposed,which differs from conventional methods by considering both denial-of-service(DoS)and false data injection(FDI)attacks simultaneously.Additionally,the stability conditions for the system under these hybrid attacks are established.It is technically challenging to design the control strategy by predicting attacker actions based on Stcakelberg game to ensure the system stability under hybrid attacks.Another technical difficulty lies in establishing the conditions for mean-square asymptotic stability due to the complexity of the attack scenarios Finally,simulations on an unstable batch reactor system under hybrid attacks demonstrate the effectiveness of the proposed strategy.