In this article, the formation tracking problem is discussed within a multi-agent framework. Drawing from the hierarchical model featuring a single leader and multiple followers, we use the Stackelberg game to model t...
详细信息
ISBN:
(数字)9798350379228
ISBN:
(纸本)9798350390780
In this article, the formation tracking problem is discussed within a multi-agent framework. Drawing from the hierarchical model featuring a single leader and multiple followers, we use the Stackelberg game to model the system and prove the Stackelberg-Nash equilibrium exists. The solution of the preceding game is resolved by using the deep reinforcement learning algorithm and a generative communication strategy learning algorithm is proposed. The efficacy of the aforementioned methodology is validated through experimental simulations, substantiating its effectiveness.
Dear editor,Recently,researchers have obtained many new results about the multi-agent systems(MASs)[1]-[3].In[1],the fixed-time cooperative control(FTCC)algorithm of linear MASs with matched disturbances was *** nonho...
详细信息
Dear editor,Recently,researchers have obtained many new results about the multi-agent systems(MASs)[1]-[3].In[1],the fixed-time cooperative control(FTCC)algorithm of linear MASs with matched disturbances was *** nonholonomic chained-form dynamics case was considered in[2].In[3],the output tracking problem with data packet dropout was solved for high-order ***,delay frequently occurs because of the non-ideal data transmission[4],and the corresponding FTCC algorithm of MASs with delay was given in[5].
This paper,from the view of a defender,addresses the security problem of cyber-physical systems(CPSs)subject to stealthy false data injection(FDI)attacks that cannot be detected by a residual-based anomaly detector wi...
详细信息
This paper,from the view of a defender,addresses the security problem of cyber-physical systems(CPSs)subject to stealthy false data injection(FDI)attacks that cannot be detected by a residual-based anomaly detector without other defensive *** detect such a class of FDI attacks,a stochastic coding scheme,which codes the sensor measurement with a Gaussian stochastic signal at the sensor side,is proposed to assist an anomaly detector to expose the FDI *** order to ensure the system performance in the normal operational context,a decoder is adopted to decode the coded sensor measurement when received at the controller *** this detection scheme,the residual under the attack can be significantly different from that in the normal situation,and thus trigger an *** design condition of the coding signal covariance is derived to meet the constraints of false alarm rate and attack detection *** minimize the trace of the coding signal covariance,the design problem of the coding signal is converted into a constraint non-convex optimization problem,and an estimation-optimization iteration algorithm is presented to obtain a numerical solution of the coding signal covariance.A numerical example is given to verify the effectiveness of the proposed scheme.
With the advancement of industrial automation and artificial intelligence technology, unmanned port autonomy has gained increasing attention. Port automatic driving technology is a critical component of unmanned auton...
详细信息
This paper studies the secure and accurate clock synchronization problem for sensor networks with time-varying delays and malicious attacks.A novel clock synchronization scheme based on the attack detection mechanism,...
详细信息
This paper studies the secure and accurate clock synchronization problem for sensor networks with time-varying delays and malicious attacks.A novel clock synchronization scheme based on the attack detection mechanism,attack compensation,and maximum consensus protocol is *** proposed scheme starts with the detection of the malicious attacks and the clock data under attacks is *** the basis,software clock parameters are updated so that all the nodes in the network can have the same software skew and offset,so the clock synchronization can be ***,it is theoretically proved that the proposed scheme can achieve the attack detection correctly,and further can guarantee a secure and accurate clock *** addition,extensive simulations are also conducted to validate the effectiveness of the proposed scheme.
Researchers have always been popular with analyzing and controlling nonlinear systems, yet most methods are based on local linearized models. As an alternative, Koopman theory was introduced to solve global linearizat...
详细信息
In this paper,a data-based scheme is proposed to solve the optimal tracking problem of autonomous nonlinear switching *** system state is forced to track the reference signal by minimizing the performance ***,the prob...
详细信息
In this paper,a data-based scheme is proposed to solve the optimal tracking problem of autonomous nonlinear switching *** system state is forced to track the reference signal by minimizing the performance ***,the problem is transformed to solve the corresponding Bellman optimality equation in terms of the Q-function(also named as action value function).Then,an iterative algorithm based on adaptive dynamic programming(ADP)is developed to find the optimal solution which is totally based on sampled *** linear-in-parameter(LIP)neural network is taken as the value function *** the presence of approximation error at each iteration step,the generated approximated value function sequence is proved to be boundedness around the exact optimal solution under some verifiable ***,the effect that the learning process will be terminated after a finite number of iterations is investigated in this paper.A sufficient condition for asymptotically stability of the tracking error is ***,the effectiveness of the algorithm is demonstrated with three simulation examples.
This paper considers a distributed nonsmooth resource allocation problem of minimizing a global convex function formed by a sum of local nonsmooth convex functions with coupled constraints.A distributed communication-...
详细信息
This paper considers a distributed nonsmooth resource allocation problem of minimizing a global convex function formed by a sum of local nonsmooth convex functions with coupled constraints.A distributed communication-efficient mirror-descent algorithm,which can reduce communication rounds between agents over the network,is designed for the distributed resource allocation *** employing communication-sliding methods,agents can find aε-solution in O(1/ε)communication rounds while maintaining O(1/ε^(2))subgradient evaluations for nonsmooth convex functions.A numerical example is also given to illustrate the effectiveness of the proposed algorithm.
This paper studies a classical pursuit-evasion problem. The pursuer attempts to capture the faster evader in a bounded area. The velocity of evader is 1.2 times as fast as the pursuers'. All of them have adaptive ...
详细信息
In recent years, the rapid evolution of unmanned aerial vehicles (UAVs) has brought about transformative changes across various industries. However, addressing fundamental challenges in UAV technology, particularly ta...
详细信息
暂无评论