Dear Editor,This letter is concerned with prescribed-time Nash equilibrium(PTNE)seeking problem in a pursuit-evasion game(PEG)involving agents with second-order *** order to achieve the prior-given and user-defined co...
详细信息
Dear Editor,This letter is concerned with prescribed-time Nash equilibrium(PTNE)seeking problem in a pursuit-evasion game(PEG)involving agents with second-order *** order to achieve the prior-given and user-defined convergence time for the PEG,a PTNE seeking algorithm has been developed to facilitate collaboration among multiple pursuers for capturing the evader without the need for any global ***,it is theoretically proved that the prescribedtime convergence of the designed algorithm for achieving Nash equilibrium of ***,the effectiveness of the PTNE method was validated by numerical simulation results.A PEG consists of two groups of agents:evaders and *** pursuers aim to capture the evaders through cooperative efforts,while the evaders strive to evade *** is a classic noncooperative *** has attracted plenty of attention due to its wide application scenarios,such as smart grids[1],formation control[2],[3],and spacecraft rendezvous[4].It is noteworthy that most previous research on seeking the Nash equilibrium of the game,where no agent has an incentive to change its actions,has focused on asymptotic and exponential convergence[5]-[7].
To solve the problems of vote forgery and malicious election of candidate nodes in the Raft consensus algorithm, we combine zero trust with the Raft consensus algorithm and propose a secure and efficient consensus alg...
详细信息
This study addresses the fixed-time-synchronized control problem of perturbed multi-input multioutput(MIMO) systems. In the task of fixed-time-synchronized control, different dimensions of the output signal in MIMO sy...
详细信息
This study addresses the fixed-time-synchronized control problem of perturbed multi-input multioutput(MIMO) systems. In the task of fixed-time-synchronized control, different dimensions of the output signal in MIMO systems are required to reach the desired value simultaneously within a fixed time *** MIMO system is categorized into two cases: the input-dimension-dominant and the state-dimensiondominant cases. The classification is defined according to the dimension of system signals and, more importantly, the capability of converging at the same time. For each kind of MIMO system, sufficient Lyapunov conditions for fixed-time-synchronized convergence are explored, and the corresponding robust sliding mode controllers are designed. Moreover, perturbations are compensated using the super-twisting technique. The brake control of the vertical takeoff and landing aircraft is considered to verify the proposed method for the input-dimension-dominant case, which shows the essential advantages of decreasing the energy consumption and the output trajectory length. Furthermore, comparative numerical simulations are performed to show the semi-time-synchronized property for the state-dimension-dominant case.
Dear Editor,This letter focuses on leveraging the object information in images to improve the performance of the U-Net based change *** detection is fundamental to many computer vision *** existing solutions based on ...
详细信息
Dear Editor,This letter focuses on leveraging the object information in images to improve the performance of the U-Net based change *** detection is fundamental to many computer vision *** existing solutions based on deep neural networks are able to achieve impressive results.
The increased demand for personalized customization calls for new production modes to enhance collaborations among a wide range of manufacturing practitioners who unnecessarily trust each other. In this article, a blo...
详细信息
The increased demand for personalized customization calls for new production modes to enhance collaborations among a wide range of manufacturing practitioners who unnecessarily trust each other. In this article, a blockchain-enabled manufacturing collaboration framework is proposed, with a focus on the production capacity matching problem for blockchainbased peer-to-peer(P2P) collaboration. First, a digital model of production capacity description is built for trustworthy and transparent sharing over the blockchain. Second, an optimization problem is formulated for P2P production capacity matching with objectives to maximize both social welfare and individual benefits of all participants. Third, a feasible solution based on an iterative double auction mechanism is designed to determine the optimal price and quantity for production capacity matching with a lack of personal information. It facilitates automation of the matching process while protecting users' privacy via blockchainbased smart contracts. Finally, simulation results from the Hyperledger Fabric-based prototype show that the proposed approach increases social welfare by 1.4% compared to the Bayesian game-based approach, makes all participants profitable,and achieves 90% fairness of enterprises.
Traditional path-switching methods are primarily designed for static or conventional network environments, rendering them inadequate for the dynamic nature of heterogeneous industrial networks. This paper aims to tack...
详细信息
Potential malicious cyber-attacks to power systems which are connected to a wide range of stakeholders from the top to tail will impose significant societal risks and *** timely detection and defense are of crucial im...
详细信息
Potential malicious cyber-attacks to power systems which are connected to a wide range of stakeholders from the top to tail will impose significant societal risks and *** timely detection and defense are of crucial importance for safe and reliable operation of cyber-physical power systems(CPPSs).This paper presents a comprehensive review of some of the latest attack detection and defense ***,the vulnerabilities brought by some new information and communication technologies(ICTs)are analyzed,and their impacts on the security of CPPSs are *** malicious cyber-attacks on cyber and physical layers are then analyzed within CPPSs framework,and their features and negative impacts are ***,two current mainstream attack detection methods including state estimation based and machine learning based methods are analyzed,and their benefits and drawbacks are ***,two current mainstream attack defense methods including active defense and passive defense methods are comprehensively ***,the trends and challenges in attack detection and defense strategies in CPPSs are provided.
In Internet of Things(loT),data sharing among different devices can improve manufacture efficiency and reduce workload,and yet make the network systems be more vulnerable to various intrusion *** has been realistic de...
详细信息
In Internet of Things(loT),data sharing among different devices can improve manufacture efficiency and reduce workload,and yet make the network systems be more vulnerable to various intrusion *** has been realistic demand to develop an efficient intrusion detection algorithm for connected *** of existing intrusion detection methods are trained in a centralized manner and are incapable to identify new unlabeled attack *** this paper,a distributed federated intrusion detection method is proposed,utilizing the information contained in the labeled data as the prior knowledge to discover new unlabeled attack ***,the blockchain technique is introduced in the federated learning process for the consensus of the entire *** results are provided to show that our approach can identify the malicious entities,while outperforming the existing methods in discovering new intrusion attack types.
Dear Editor,This letter is concerned with visual perception closely related to heterogeneous *** the huge challenge brought by different image modalities,we propose a visual perception framework based on heterogeneous...
详细信息
Dear Editor,This letter is concerned with visual perception closely related to heterogeneous *** the huge challenge brought by different image modalities,we propose a visual perception framework based on heterogeneous image knowledge,i.e.,the domain knowledge associated with specific vision tasks,to better address the corresponding visual perception problems.
The design of manufacturing systems requires exploring diverse component configurations for one that best satisfies the requirements of the target system. At the same time, manufacturing systems evolve continuously, i...
详细信息
暂无评论