Shouyan Chen;Weitian He;Zhijia Zhao;Yun Feng;Zhijie Liu;Keum-Shik Hong
{"title":"Adaptive Control of a Flexible Manipulator with Unknown Hysteresis and Intermittent Actuator Faults","authors":"Shouyan Chen;Weitian He;Zhijia Zhao;Yun Feng;Zhijie Liu;Keum-Shik Hong","doi":"10.1109/JAS.2024.124653","DOIUrl":"https://doi.org/10.1109/JAS.2024.124653","url":null,"abstract":"In this study, we consider a single-link flexible manipulator in the presence of an unknown Bouc-Wen type of hysteresis and intermittent actuator faults. First, an inverse hysteresis dynamics model is introduced, and then the control input is divided into an expected input and an error compensator. Second, a novel adaptive neural network-based control scheme is proposed to cancel the unknown input hysteresis. Subsequently, by modifying the adaptive laws and local control laws, a fault-tolerant control strategy is applied to address uncertain intermittent actuator faults in a flexible manipulator system. Through the direct Lyapunov theory, the proposed scheme allows the state errors to asymptotically converge to a specified interval. Finally, the effectiveness of the proposed scheme is verified through numerical simulations and experiments.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 1","pages":"148-158"},"PeriodicalIF":15.3,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Repetitive-Control System Using a Complex-Coefficient Filter","authors":"Qicheng Mei;Jinhua She;Fei Long;Yanjun Shen","doi":"10.1109/JAS.2024.124554","DOIUrl":"https://doi.org/10.1109/JAS.2024.124554","url":null,"abstract":"Dear Editor, This letter presents an improved repetitive controller (IRC) that uses a complex-coefficient filter to enhance the tracking performance of a system for periodic signals. Compared with the low-pass filter used in the conventional repetitive controller (CRC), the complex-coefficient filter causes less change in the phase and amplitude of a signal at the frequencies of the periodic signal, especially at the fundamental frequency, when the two filters have the same cutoff-frequency. Thus, the IRC-based control system has better tracking performance than the CRC-based control system. Simulation results of a rotational control system demonstrate the superiority of the IRC.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 1","pages":"282-284"},"PeriodicalIF":15.3,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10848419","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compensation for Heterogeneous Unknowns and Performance-Prescribed Consensus","authors":"Linzhen Yu;Yungang Liu","doi":"10.1109/JAS.2024.124794","DOIUrl":"https://doi.org/10.1109/JAS.2024.124794","url":null,"abstract":"In this paper, the multiagent systems (MASs) typically with heterogeneous unknown nonlinearities and nonidentical unknown control coefficients are studied. Although the model information of MASs is coarse, the leader-following consensus is still pursued, with a prescribed performance and zero consensus errors. Leveraging a powerful funnel control strategy, a fully distributed and completely relative-state-dependent protocol is designed. Distinctively, the time-varying function characterizing the performance boundary is introduced, not only to construct the funnel gains but also as an indispensable part of the protocol, enhancing the control ability and enabling the consensus errors to converge to zero (rather than a residual set). Remark that when control directions are unknown, coexisting with inherent system nonlinearities, it is essential to incorporate an additional compensation mechanism while imposing a hierarchical structure of communication topology for the control design and analysis. Simulation examples are given to illustrate the effectiveness of the theoretical results.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 1","pages":"173-182"},"PeriodicalIF":15.3,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interference Suppression and Jitter Elimination Ability-Based Adaption Tracking Guidance for Robotic Fishes","authors":"Dongfang Li;Jie Huang;Rob Law;Xin Xu;Limin Zhu;Edmond Q. Wu","doi":"10.1109/JAS.2024.124632","DOIUrl":"https://doi.org/10.1109/JAS.2024.124632","url":null,"abstract":"This work presents an adaptive tracking guidance method for robotic fishes. The scheme enables robots to suppress external interference and eliminate motion jitter. An adaptive integral surge line-of-sight guidance rule is designed to eliminate dynamics interference and sideslip issues. Limited-time yaw and surge speed observers are reported to fit disturbance variables in the model. The approximation values can compensate for the system's control input and improve the robots' tracking accuracy. Moreover, this work develops a terminal sliding mode controller and third-order differential processor to determine the rotational torque and reduce the robots' run jitter. Then, Lyapunov's theory proves the uniform ultimate boundedness of the proposed method. Simulation and physical experiments confirm that the technology improves the tracking error convergence speed and stability of robotic fishes.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 1","pages":"126-137"},"PeriodicalIF":15.3,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Synchronization Control of Grid-Forming Converters: A Reinforcement Learning Approach","authors":"Zhuorui Wu;Meng Zhang;Bo Fan;Yang Shi;Xiaohong Guan","doi":"10.1109/JAS.2024.124824","DOIUrl":"https://doi.org/10.1109/JAS.2024.124824","url":null,"abstract":"Dear Editor, This letter proposes a deep synchronization control (DSC) method to synchronize grid-forming converters with power grids. The method involves constructing a novel controller for grid-forming converters based on the stable deep dynamics model. To enhance the performance of the controller, the dynamics model is optimized within the deep reinforcement learning (DRL) framework. Simulation results verify that the proposed method can reduce frequency deviation and improve active power responses.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 1","pages":"273-275"},"PeriodicalIF":15.3,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10848394","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ruotian Liu;Yihui Hu;Agostino Marcello Mangini;Maria Pia Fanti
{"title":"K-Corruption Intermittent Attacks for Violating the Codiagnosability","authors":"Ruotian Liu;Yihui Hu;Agostino Marcello Mangini;Maria Pia Fanti","doi":"10.1109/JAS.2024.124680","DOIUrl":"https://doi.org/10.1109/JAS.2024.124680","url":null,"abstract":"In this work, we address the codiagnosability analysis problem of a networked discrete event system under malicious attacks. The considered system is modeled by a labeled Petri net and is monitored by a series of sites, in which each site possesses its own set of sensors, without requiring communication among sites or to any coordinators. A net is said to be codiagnosable with respect to a fault if at least one site could deduce the occurrence of this fault within finite steps. In this context, we focus on a type of malicious attack that is called stealthy intermittent replacement attack. The stealthiness demands that the corrupted observations should be consistent with the system's normal behavior, while the intermittent replacement setting entails that the replaced transition labels must be recovered within a bounded of consecutive corrupted observations (called as K-corruption intermittent attack). Particularly, there exists a coordination between attackers that are separately effected on different sites, which holds the same corrupted observation for each common transition under attacks. From an attacker viewpoint, this work aims to design K- corruption intermittent attacks for violating the codiagnosability of systems. For this purpose, we propose an attack automaton to analyze K-corruption intermittent attack for each site, and build a new structure called complete attack graph that is used to analyze all the potential attacked paths. Finally, an algorithm is inferred to obtain the K-corruption intermittent attacks, and examples are given to show the proposed attack strategy.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 1","pages":"159-172"},"PeriodicalIF":15.3,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Perfect Stealthy Attacks on Cyber-Physical Systems Subject to Measurement Quantizations: A Watermark-Based Strategy","authors":"Yu-Ang Wang;Zidong Wang;Lei Zou;Bo Shen;Hongli Dong","doi":"10.1109/JAS.2024.124815","DOIUrl":"https://doi.org/10.1109/JAS.2024.124815","url":null,"abstract":"In this paper, the attack detection problem is inves-tigated for a class of closed-loop systems subjected to unknown-but-bounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission. A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-to-estimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks (applied to data prior to quantization) and the recovery of data (implemented before the data reaches the estimator). The watermark-based scheme is designed to be both time-varying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks, thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 1","pages":"114-125"},"PeriodicalIF":15.3,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Resilience Against Cyber-Physical Uncertainties in Distributed Nash Equilibrium Seeking Strategies for Heterogeneous Games","authors":"Maojiao Ye","doi":"10.1109/JAS.2024.124803","DOIUrl":"https://doi.org/10.1109/JAS.2024.124803","url":null,"abstract":"This paper designs distributed Nash equilibrium seeking strategies for heterogeneous dynamic cyber-physical systems. In particular, we are concerned with parametric uncertainties in the control channel of the players. Moreover, the weights on communication links can be compromised by time-varying uncertainties, which can result from possibly malicious attacks, faults and disturbances. To deal with the unavailability of measurement of optimization errors, an output observer is constructed, based on which adaptive laws are designed to compen-sate for physical uncertainties. With adaptive laws, a new distributed Nash equilibrium seeking strategy is designed by further integrating consensus protocols and gradient search algorithms. Moreover, to further accommodate compromised communication weights resulting from cyber-uncertainties, the coupling strengths of the consensus module are designed to be adaptive. As a byproduct, the coupling strengths are independent of any global information. With theoretical investigations, it is proven that the proposed strategies are resilient to these uncertainties and play-ers' actions are convergent to the Nash equilibrium. Simulation examples are given to numerically validate the effectiveness of the proposed strategies.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 1","pages":"138-147"},"PeriodicalIF":15.3,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint Probabilistic Scheduling and Resource Allocation for Wireless Networked Control Systems","authors":"Meng Zheng;Lei Zhang;Wei Liang","doi":"10.1109/JAS.2024.124707","DOIUrl":"https://doi.org/10.1109/JAS.2024.124707","url":null,"abstract":"Dear Editor, This letter presents a joint probabilistic scheduling and resource allocation method (PSRA) for 5G-based wireless networked control systems (WNCSs). As a control-aware optimization method, PSRA minimizes the linear quadratic Gaussian (LQG) control cost of WNCSs by optimizing the activation probability of subsystems, the number of uplink repetitions, and the durations of uplink and down-link phases. Simulation results show that PSRA achieves smaller LQG control costs than existing works.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 1","pages":"258-260"},"PeriodicalIF":15.3,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10848390","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impulsive Consensus of MASs With Input Saturation and DoS Attacks","authors":"Xuyang Wang;Dengxiu Yu;Xiaodi Li","doi":"10.1109/JAS.2024.124944","DOIUrl":"https://doi.org/10.1109/JAS.2024.124944","url":null,"abstract":"This paper investigates the secure impulsive consensus of Lipschitz-type nonlinear multi-agent systems (MASs) with input saturation. According to the coupling of input saturation and denial of service (DoS) attacks, impulsive control for MASs becomes extremely challenging. Considering general DoS attacks, this paper provides the sufficient conditions for the almost sure consensus of the MASs with input saturation, where the error system can achieve almost sure local exponential stability. Through linear matrix inequalities (LMIs), the relation between the trajectory boundary and DoS attacks is characterized, and the trajectory boundary is estimated. Furthermore, an optimization method of the domain of attraction is proposed to maximize the size. And a non-conservative and practical boundary is proposed to characterize the effect of DoS attacks on MASs. Finally, considering a multi-agent system with typical Chua's circuit dynamic model, an example is provided to illustrate the theorems' correctness.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 2","pages":"414-424"},"PeriodicalIF":15.3,"publicationDate":"2025-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143106508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}