Ieee-Caa Journal of Automatica Sinica最新文献

筛选
英文 中文
Adaptive Control of a Flexible Manipulator with Unknown Hysteresis and Intermittent Actuator Faults 具有未知迟滞和执行器间歇故障的柔性机械臂自适应控制
IF 15.3 1区 计算机科学
Ieee-Caa Journal of Automatica Sinica Pub Date : 2025-01-21 DOI: 10.1109/JAS.2024.124653
Shouyan Chen;Weitian He;Zhijia Zhao;Yun Feng;Zhijie Liu;Keum-Shik Hong
{"title":"Adaptive Control of a Flexible Manipulator with Unknown Hysteresis and Intermittent Actuator Faults","authors":"Shouyan Chen;Weitian He;Zhijia Zhao;Yun Feng;Zhijie Liu;Keum-Shik Hong","doi":"10.1109/JAS.2024.124653","DOIUrl":"https://doi.org/10.1109/JAS.2024.124653","url":null,"abstract":"In this study, we consider a single-link flexible manipulator in the presence of an unknown Bouc-Wen type of hysteresis and intermittent actuator faults. First, an inverse hysteresis dynamics model is introduced, and then the control input is divided into an expected input and an error compensator. Second, a novel adaptive neural network-based control scheme is proposed to cancel the unknown input hysteresis. Subsequently, by modifying the adaptive laws and local control laws, a fault-tolerant control strategy is applied to address uncertain intermittent actuator faults in a flexible manipulator system. Through the direct Lyapunov theory, the proposed scheme allows the state errors to asymptotically converge to a specified interval. Finally, the effectiveness of the proposed scheme is verified through numerical simulations and experiments.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 1","pages":"148-158"},"PeriodicalIF":15.3,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Repetitive-Control System Using a Complex-Coefficient Filter 一种改进的复系数滤波器重复控制系统
IF 15.3 1区 计算机科学
Ieee-Caa Journal of Automatica Sinica Pub Date : 2025-01-21 DOI: 10.1109/JAS.2024.124554
Qicheng Mei;Jinhua She;Fei Long;Yanjun Shen
{"title":"An Improved Repetitive-Control System Using a Complex-Coefficient Filter","authors":"Qicheng Mei;Jinhua She;Fei Long;Yanjun Shen","doi":"10.1109/JAS.2024.124554","DOIUrl":"https://doi.org/10.1109/JAS.2024.124554","url":null,"abstract":"Dear Editor, This letter presents an improved repetitive controller (IRC) that uses a complex-coefficient filter to enhance the tracking performance of a system for periodic signals. Compared with the low-pass filter used in the conventional repetitive controller (CRC), the complex-coefficient filter causes less change in the phase and amplitude of a signal at the frequencies of the periodic signal, especially at the fundamental frequency, when the two filters have the same cutoff-frequency. Thus, the IRC-based control system has better tracking performance than the CRC-based control system. Simulation results of a rotational control system demonstrate the superiority of the IRC.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 1","pages":"282-284"},"PeriodicalIF":15.3,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10848419","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compensation for Heterogeneous Unknowns and Performance-Prescribed Consensus 异构未知补偿与性能约定共识
IF 15.3 1区 计算机科学
Ieee-Caa Journal of Automatica Sinica Pub Date : 2025-01-21 DOI: 10.1109/JAS.2024.124794
Linzhen Yu;Yungang Liu
{"title":"Compensation for Heterogeneous Unknowns and Performance-Prescribed Consensus","authors":"Linzhen Yu;Yungang Liu","doi":"10.1109/JAS.2024.124794","DOIUrl":"https://doi.org/10.1109/JAS.2024.124794","url":null,"abstract":"In this paper, the multiagent systems (MASs) typically with heterogeneous unknown nonlinearities and nonidentical unknown control coefficients are studied. Although the model information of MASs is coarse, the leader-following consensus is still pursued, with a prescribed performance and zero consensus errors. Leveraging a powerful funnel control strategy, a fully distributed and completely relative-state-dependent protocol is designed. Distinctively, the time-varying function characterizing the performance boundary is introduced, not only to construct the funnel gains but also as an indispensable part of the protocol, enhancing the control ability and enabling the consensus errors to converge to zero (rather than a residual set). Remark that when control directions are unknown, coexisting with inherent system nonlinearities, it is essential to incorporate an additional compensation mechanism while imposing a hierarchical structure of communication topology for the control design and analysis. Simulation examples are given to illustrate the effectiveness of the theoretical results.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 1","pages":"173-182"},"PeriodicalIF":15.3,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interference Suppression and Jitter Elimination Ability-Based Adaption Tracking Guidance for Robotic Fishes 基于干扰抑制和抖动消除能力的机器鱼自适应跟踪制导
IF 15.3 1区 计算机科学
Ieee-Caa Journal of Automatica Sinica Pub Date : 2025-01-21 DOI: 10.1109/JAS.2024.124632
Dongfang Li;Jie Huang;Rob Law;Xin Xu;Limin Zhu;Edmond Q. Wu
{"title":"Interference Suppression and Jitter Elimination Ability-Based Adaption Tracking Guidance for Robotic Fishes","authors":"Dongfang Li;Jie Huang;Rob Law;Xin Xu;Limin Zhu;Edmond Q. Wu","doi":"10.1109/JAS.2024.124632","DOIUrl":"https://doi.org/10.1109/JAS.2024.124632","url":null,"abstract":"This work presents an adaptive tracking guidance method for robotic fishes. The scheme enables robots to suppress external interference and eliminate motion jitter. An adaptive integral surge line-of-sight guidance rule is designed to eliminate dynamics interference and sideslip issues. Limited-time yaw and surge speed observers are reported to fit disturbance variables in the model. The approximation values can compensate for the system's control input and improve the robots' tracking accuracy. Moreover, this work develops a terminal sliding mode controller and third-order differential processor to determine the rotational torque and reduce the robots' run jitter. Then, Lyapunov's theory proves the uniform ultimate boundedness of the proposed method. Simulation and physical experiments confirm that the technology improves the tracking error convergence speed and stability of robotic fishes.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 1","pages":"126-137"},"PeriodicalIF":15.3,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Synchronization Control of Grid-Forming Converters: A Reinforcement Learning Approach 网格成形转换器的深度同步控制:一种强化学习方法
IF 15.3 1区 计算机科学
Ieee-Caa Journal of Automatica Sinica Pub Date : 2025-01-21 DOI: 10.1109/JAS.2024.124824
Zhuorui Wu;Meng Zhang;Bo Fan;Yang Shi;Xiaohong Guan
{"title":"Deep Synchronization Control of Grid-Forming Converters: A Reinforcement Learning Approach","authors":"Zhuorui Wu;Meng Zhang;Bo Fan;Yang Shi;Xiaohong Guan","doi":"10.1109/JAS.2024.124824","DOIUrl":"https://doi.org/10.1109/JAS.2024.124824","url":null,"abstract":"Dear Editor, This letter proposes a deep synchronization control (DSC) method to synchronize grid-forming converters with power grids. The method involves constructing a novel controller for grid-forming converters based on the stable deep dynamics model. To enhance the performance of the controller, the dynamics model is optimized within the deep reinforcement learning (DRL) framework. Simulation results verify that the proposed method can reduce frequency deviation and improve active power responses.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 1","pages":"273-275"},"PeriodicalIF":15.3,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10848394","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
K-Corruption Intermittent Attacks for Violating the Codiagnosability 违反协同可诊断性的k -腐败间歇攻击
IF 15.3 1区 计算机科学
Ieee-Caa Journal of Automatica Sinica Pub Date : 2025-01-21 DOI: 10.1109/JAS.2024.124680
Ruotian Liu;Yihui Hu;Agostino Marcello Mangini;Maria Pia Fanti
{"title":"K-Corruption Intermittent Attacks for Violating the Codiagnosability","authors":"Ruotian Liu;Yihui Hu;Agostino Marcello Mangini;Maria Pia Fanti","doi":"10.1109/JAS.2024.124680","DOIUrl":"https://doi.org/10.1109/JAS.2024.124680","url":null,"abstract":"In this work, we address the codiagnosability analysis problem of a networked discrete event system under malicious attacks. The considered system is modeled by a labeled Petri net and is monitored by a series of sites, in which each site possesses its own set of sensors, without requiring communication among sites or to any coordinators. A net is said to be codiagnosable with respect to a fault if at least one site could deduce the occurrence of this fault within finite steps. In this context, we focus on a type of malicious attack that is called stealthy intermittent replacement attack. The stealthiness demands that the corrupted observations should be consistent with the system's normal behavior, while the intermittent replacement setting entails that the replaced transition labels must be recovered within a bounded of consecutive corrupted observations (called as K-corruption intermittent attack). Particularly, there exists a coordination between attackers that are separately effected on different sites, which holds the same corrupted observation for each common transition under attacks. From an attacker viewpoint, this work aims to design K- corruption intermittent attacks for violating the codiagnosability of systems. For this purpose, we propose an attack automaton to analyze K-corruption intermittent attack for each site, and build a new structure called complete attack graph that is used to analyze all the potential attacked paths. Finally, an algorithm is inferred to obtain the K-corruption intermittent attacks, and examples are given to show the proposed attack strategy.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 1","pages":"159-172"},"PeriodicalIF":15.3,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Perfect Stealthy Attacks on Cyber-Physical Systems Subject to Measurement Quantizations: A Watermark-Based Strategy 测量量化的网络物理系统完美隐身攻击检测:一种基于水印的策略
IF 15.3 1区 计算机科学
Ieee-Caa Journal of Automatica Sinica Pub Date : 2025-01-21 DOI: 10.1109/JAS.2024.124815
Yu-Ang Wang;Zidong Wang;Lei Zou;Bo Shen;Hongli Dong
{"title":"Detection of Perfect Stealthy Attacks on Cyber-Physical Systems Subject to Measurement Quantizations: A Watermark-Based Strategy","authors":"Yu-Ang Wang;Zidong Wang;Lei Zou;Bo Shen;Hongli Dong","doi":"10.1109/JAS.2024.124815","DOIUrl":"https://doi.org/10.1109/JAS.2024.124815","url":null,"abstract":"In this paper, the attack detection problem is inves-tigated for a class of closed-loop systems subjected to unknown-but-bounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission. A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-to-estimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks (applied to data prior to quantization) and the recovery of data (implemented before the data reaches the estimator). The watermark-based scheme is designed to be both time-varying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks, thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 1","pages":"114-125"},"PeriodicalIF":15.3,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Resilience Against Cyber-Physical Uncertainties in Distributed Nash Equilibrium Seeking Strategies for Heterogeneous Games 异构博弈分布式纳什均衡寻求策略中抗网络物理不确定性的弹性研究
IF 15.3 1区 计算机科学
Ieee-Caa Journal of Automatica Sinica Pub Date : 2025-01-21 DOI: 10.1109/JAS.2024.124803
Maojiao Ye
{"title":"On Resilience Against Cyber-Physical Uncertainties in Distributed Nash Equilibrium Seeking Strategies for Heterogeneous Games","authors":"Maojiao Ye","doi":"10.1109/JAS.2024.124803","DOIUrl":"https://doi.org/10.1109/JAS.2024.124803","url":null,"abstract":"This paper designs distributed Nash equilibrium seeking strategies for heterogeneous dynamic cyber-physical systems. In particular, we are concerned with parametric uncertainties in the control channel of the players. Moreover, the weights on communication links can be compromised by time-varying uncertainties, which can result from possibly malicious attacks, faults and disturbances. To deal with the unavailability of measurement of optimization errors, an output observer is constructed, based on which adaptive laws are designed to compen-sate for physical uncertainties. With adaptive laws, a new distributed Nash equilibrium seeking strategy is designed by further integrating consensus protocols and gradient search algorithms. Moreover, to further accommodate compromised communication weights resulting from cyber-uncertainties, the coupling strengths of the consensus module are designed to be adaptive. As a byproduct, the coupling strengths are independent of any global information. With theoretical investigations, it is proven that the proposed strategies are resilient to these uncertainties and play-ers' actions are convergent to the Nash equilibrium. Simulation examples are given to numerically validate the effectiveness of the proposed strategies.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 1","pages":"138-147"},"PeriodicalIF":15.3,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Probabilistic Scheduling and Resource Allocation for Wireless Networked Control Systems 无线网络控制系统的联合概率调度与资源分配
IF 15.3 1区 计算机科学
Ieee-Caa Journal of Automatica Sinica Pub Date : 2025-01-21 DOI: 10.1109/JAS.2024.124707
Meng Zheng;Lei Zhang;Wei Liang
{"title":"Joint Probabilistic Scheduling and Resource Allocation for Wireless Networked Control Systems","authors":"Meng Zheng;Lei Zhang;Wei Liang","doi":"10.1109/JAS.2024.124707","DOIUrl":"https://doi.org/10.1109/JAS.2024.124707","url":null,"abstract":"Dear Editor, This letter presents a joint probabilistic scheduling and resource allocation method (PSRA) for 5G-based wireless networked control systems (WNCSs). As a control-aware optimization method, PSRA minimizes the linear quadratic Gaussian (LQG) control cost of WNCSs by optimizing the activation probability of subsystems, the number of uplink repetitions, and the durations of uplink and down-link phases. Simulation results show that PSRA achieves smaller LQG control costs than existing works.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 1","pages":"258-260"},"PeriodicalIF":15.3,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10848390","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142993533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impulsive Consensus of MASs With Input Saturation and DoS Attacks
IF 15.3 1区 计算机科学
Ieee-Caa Journal of Automatica Sinica Pub Date : 2025-01-20 DOI: 10.1109/JAS.2024.124944
Xuyang Wang;Dengxiu Yu;Xiaodi Li
{"title":"Impulsive Consensus of MASs With Input Saturation and DoS Attacks","authors":"Xuyang Wang;Dengxiu Yu;Xiaodi Li","doi":"10.1109/JAS.2024.124944","DOIUrl":"https://doi.org/10.1109/JAS.2024.124944","url":null,"abstract":"This paper investigates the secure impulsive consensus of Lipschitz-type nonlinear multi-agent systems (MASs) with input saturation. According to the coupling of input saturation and denial of service (DoS) attacks, impulsive control for MASs becomes extremely challenging. Considering general DoS attacks, this paper provides the sufficient conditions for the almost sure consensus of the MASs with input saturation, where the error system can achieve almost sure local exponential stability. Through linear matrix inequalities (LMIs), the relation between the trajectory boundary and DoS attacks is characterized, and the trajectory boundary is estimated. Furthermore, an optimization method of the domain of attraction is proposed to maximize the size. And a non-conservative and practical boundary is proposed to characterize the effect of DoS attacks on MASs. Finally, considering a multi-agent system with typical Chua's circuit dynamic model, an example is provided to illustrate the theorems' correctness.","PeriodicalId":54230,"journal":{"name":"Ieee-Caa Journal of Automatica Sinica","volume":"12 2","pages":"414-424"},"PeriodicalIF":15.3,"publicationDate":"2025-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143106508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信