AutomaticaPub Date : 2025-02-01DOI: 10.1016/j.automatica.2024.112017
Youdao Ma , Zhenhua Wang , Nacim Meslem , Tarek Raïssi
{"title":"Functional interval estimation for continuous-time linear systems with time-invariant uncertainties","authors":"Youdao Ma , Zhenhua Wang , Nacim Meslem , Tarek Raïssi","doi":"10.1016/j.automatica.2024.112017","DOIUrl":"10.1016/j.automatica.2024.112017","url":null,"abstract":"<div><div>This paper investigates functional interval estimation for continuous-time linear systems subject to both time-varying and time-invariant uncertainties. Two novel methods are proposed based on peak-to-peak functional observer design and interval analysis. First, we present a splitting-based method that splits the estimation error dynamics into two subsystems to handle the time-invariant disturbances and provide accurate estimation results. Then, to further enhance the estimation accuracy, we present an augmentation-based method that considers the time invariance in both functional observer design and reliable interval estimation. The relationship between a state-of-art method and the proposed methods are analysed theoretically. Finally, simulation results are provided to demonstrate the performances of the proposed methods.</div></div>","PeriodicalId":55413,"journal":{"name":"Automatica","volume":"172 ","pages":"Article 112017"},"PeriodicalIF":4.8,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143095095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AutomaticaPub Date : 2025-02-01DOI: 10.1016/j.automatica.2024.112010
Ali Kashani, Claus Danielson
{"title":"Data-driven invariant set for nonlinear systems with application to command governors","authors":"Ali Kashani, Claus Danielson","doi":"10.1016/j.automatica.2024.112010","DOIUrl":"10.1016/j.automatica.2024.112010","url":null,"abstract":"<div><div>This paper presents a novel approach to synthesize positive invariant sets for unmodeled nonlinear systems using direct data-driven techniques. The data-driven invariant sets are used to design a data-driven command governor that selects a command for the closed-loop system to enforce constraints. Using basis functions, we solve a semi-definite program to learn a sum-of-squares Lyapunov-like function whose unity level-set is a constraint admissible positive invariant set, which determines the constraint admissible states and input commands. Leveraging Lipschitz properties of the system, we prove that tightening the model-based design ensures robustness of the invariant set to the inherent plant uncertainty in a data-driven framework. To mitigate the curse-of-dimensionality, we repose the semi-definite program into a linear program. We validate our approach through two examples: First, we present an illustrative example where we can analytically compute the maximum positive invariant set and compare with the presented data-driven invariant set. Second, we present a practical autonomous driving scenario to demonstrate the utility of the presented method for nonlinear systems.</div></div>","PeriodicalId":55413,"journal":{"name":"Automatica","volume":"172 ","pages":"Article 112010"},"PeriodicalIF":4.8,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143095092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AutomaticaPub Date : 2025-02-01DOI: 10.1016/j.automatica.2024.111988
Jin Zhu , Zhi Xie , Geir E. Dullerud
{"title":"Event-triggered stabilization of uncertain switched linear systems under finite feedback bit rate","authors":"Jin Zhu , Zhi Xie , Geir E. Dullerud","doi":"10.1016/j.automatica.2024.111988","DOIUrl":"10.1016/j.automatica.2024.111988","url":null,"abstract":"<div><div>This paper investigates event-triggered stabilization of uncertain switched linear systems under finite feedback bit rate where the boundary of model uncertainty is unknown. Based on the appropriate boundary estimation, a novel communication and control strategy is given to obtain qualified feedback gains and visible system states in which the event-triggering mechanism is adopted. By utilizing the additional timing information carried by the triggering moments, the proposed event-triggering controller can achieve a lower occupation of average bit rate to ensure exponential convergence of the system state. Simulation results show the effectiveness of our method.</div></div>","PeriodicalId":55413,"journal":{"name":"Automatica","volume":"172 ","pages":"Article 111988"},"PeriodicalIF":4.8,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143095094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AutomaticaPub Date : 2025-01-31DOI: 10.1016/j.automatica.2025.112162
Jinyuan Wei, Jing Zhou, Tongwen Chen
{"title":"Integrity attacks on state estimation with varying data access: From visibility to full restriction","authors":"Jinyuan Wei, Jing Zhou, Tongwen Chen","doi":"10.1016/j.automatica.2025.112162","DOIUrl":"10.1016/j.automatica.2025.112162","url":null,"abstract":"<div><div>This paper explores optimal integrity attacks with varying data access to innovations transmitted from smart sensors to remote state estimators. The data access refers to attackers’ capability or authorization to eavesdrop on and tamper with raw data packets. Unlike prior studies where the innovations were entirely intercepted and modified by attackers, different restrictions on data access are considered in this work. Within this context, entries of each innovation are separated into two parts: safe data and suspicious data. The first level of data access enables the interception of complete data, while modifications are limited to the suspicious data only. The second level restricts eavesdropping or tampering with the safe data, permitting only the interception and modification of suspicious data. To maintain stealthiness, the integrity attacks must adhere to stringent constraints, ensuring the statistical characteristics of the entire innovations remain unaltered. In this varying setting, optimal attack policies that make full utilization of available information are proposed and the corresponding coefficients are derived explicitly. Moreover, the optimality of proposed strategies is demonstrated rigorously, showing that no existing attack outperforms the proposed ones. Finally, the effectiveness of theoretical results is demonstrated through numerical examples and comparative studies.</div></div>","PeriodicalId":55413,"journal":{"name":"Automatica","volume":"174 ","pages":"Article 112162"},"PeriodicalIF":4.8,"publicationDate":"2025-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143130490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AutomaticaPub Date : 2025-01-31DOI: 10.1016/j.automatica.2025.112175
Bin Zhou, Kai Zhang
{"title":"Stabilization of linear systems with multiple unknown time-varying input delays by linear time-varying feedback","authors":"Bin Zhou, Kai Zhang","doi":"10.1016/j.automatica.2025.112175","DOIUrl":"10.1016/j.automatica.2025.112175","url":null,"abstract":"<div><div>This paper addresses the stabilization of linear systems with multiple time-varying input delays. In scenarios where neither the exact delays information nor their bound is known, we propose a class of linear time-varying state feedback controllers by using the solution to a parametric Lyapunov equation (PLE). By leveraging the properties of the solution to the PLE and constructing a time-varying Lyapunov–Krasovskii-like functional, we prove that (the zero solution of) the closed-loop system is asymptotically stable. Furthermore, this result is extended to the observer-based output feedback case. The notable characteristic of these controllers is their utilization of linear time-varying gains. Furthermore, they are designed entirely independent of any knowledge of the time delays, resulting in controllers that are exceedingly easy to implement. Finally, a numerical example demonstrates the effectiveness of the proposed approaches.</div></div>","PeriodicalId":55413,"journal":{"name":"Automatica","volume":"174 ","pages":"Article 112175"},"PeriodicalIF":4.8,"publicationDate":"2025-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143130487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AutomaticaPub Date : 2025-01-31DOI: 10.1016/j.automatica.2025.112174
Gang Tao
{"title":"Adaptive output tracking control with reference model system uncertainties","authors":"Gang Tao","doi":"10.1016/j.automatica.2025.112174","DOIUrl":"10.1016/j.automatica.2025.112174","url":null,"abstract":"<div><div>This paper develops new adaptive output tracking control schemes with the reference output signal generated from an unknown reference system whose output derivatives are also unknown. To deal with such reference system uncertainties, an expanded adaptive controller structure is developed to include a parametrized estimator of an equivalent reference input signal. Without using the knowledge of the reference system transfer function and equivalent input, both are the critical components of a traditional model reference adaptive control (MRAC) scheme, the new MRAC schemes, developed for various cases of plant and reference model uncertainties, ensure completely parametrized error equations and globally stable parameter adaptation, leading to the desired closed-loop system stability and asymptotic output tracking properties.</div></div>","PeriodicalId":55413,"journal":{"name":"Automatica","volume":"174 ","pages":"Article 112174"},"PeriodicalIF":4.8,"publicationDate":"2025-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143130491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AutomaticaPub Date : 2025-01-31DOI: 10.1016/j.automatica.2025.112171
Tomáš Masopust, Petr Osička
{"title":"On algorithms verifying initial-and-final-state opacity: Complexity, special cases, and comparison","authors":"Tomáš Masopust, Petr Osička","doi":"10.1016/j.automatica.2025.112171","DOIUrl":"10.1016/j.automatica.2025.112171","url":null,"abstract":"<div><div>Opacity is a general framework modeling security properties of systems interacting with a passive attacker. Initial-and-final-state opacity (IFO) generalizes the classical notions of opacity, such as current-state opacity and initial-state opacity. In IFO, the secret is whether the system evolved from a given initial state to a given final state or not. There are two algorithms for IFO verification. One arises from a trellis-based state estimator, which builds a semigroup of binary relations generated by the events of the automaton, and the other is based on the reduction to language inclusion. The time complexity of both algorithms is bounded by a super-exponential function, and it is a challenging open problem to find a faster algorithm or to show that no faster algorithm exists. We discuss the lower-bound time complexity for both general and special cases, and use extensive benchmarks to compare the existing algorithms.</div></div>","PeriodicalId":55413,"journal":{"name":"Automatica","volume":"174 ","pages":"Article 112171"},"PeriodicalIF":4.8,"publicationDate":"2025-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143130708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AutomaticaPub Date : 2025-01-31DOI: 10.1016/j.automatica.2025.112172
Joel Reis , Carlos Silvestre
{"title":"Kinematics-informed neural network control on SO(3)","authors":"Joel Reis , Carlos Silvestre","doi":"10.1016/j.automatica.2025.112172","DOIUrl":"10.1016/j.automatica.2025.112172","url":null,"abstract":"<div><div>This paper presents an adaptive geometric control method for dynamic-model-free attitude tracking on the manifold of 3D rotations (SO(3)). Utilizing well-established definitions of attitude errors on SO(3), we develop a general control-affine linear error system. The input to this system is implicitly approximated by a kinematics-informed neural network (NN), which serves as the controller. The weights of this NN, designed to be inherently bounded, are adjusted online using a modified gradient-descent strategy that relies solely on system kinematics. We demonstrate the effectiveness and online learning capability of our proposed method through comprehensive simulation results, using a satellite attitude control system as an example. A comparative analysis is also provided to validate our approach.</div></div>","PeriodicalId":55413,"journal":{"name":"Automatica","volume":"174 ","pages":"Article 112172"},"PeriodicalIF":4.8,"publicationDate":"2025-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143130486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AutomaticaPub Date : 2025-01-31DOI: 10.1016/j.automatica.2025.112159
Lei Zou , Zidong Wang , Bo Shen , Hongli Dong
{"title":"Recursive state estimation in relay channels with enhanced security against eavesdropping: An innovative encryption–decryption framework","authors":"Lei Zou , Zidong Wang , Bo Shen , Hongli Dong","doi":"10.1016/j.automatica.2025.112159","DOIUrl":"10.1016/j.automatica.2025.112159","url":null,"abstract":"<div><div>In this paper, the problem of secure recursive state estimation is addressed for a networked linear system over a relay channel. We consider the scenario where the transmitted signals and the internal state of the relay node might be intercepted by potential eavesdroppers. To prevent the system states from being inferred by potential eavesdroppers via overheard measurement signals, an encryption–decryption mechanism is adopted to protect the transmitted measurement signals over the communication links. Furthermore, for the purpose of preserving data privacy during the relaying process, a decryption-free relaying protocol is constructed, where a matrix-inequality-based method is proposed for the design of the desired parameters for the relaying protocol. Following this, a recursive state estimator is developed to generate state estimates through a set of recursions. Sufficient conditions are then derived to ensure the ultimate boundedness of the resultant estimation error variance matrix. Finally, the effectiveness of the proposed secure recursive state estimation scheme is demonstrated through a simulation example.</div></div>","PeriodicalId":55413,"journal":{"name":"Automatica","volume":"174 ","pages":"Article 112159"},"PeriodicalIF":4.8,"publicationDate":"2025-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143130489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
AutomaticaPub Date : 2025-01-31DOI: 10.1016/j.automatica.2025.112144
Weihai Zhang , Jing Guo , Xiushan Jiang
{"title":"Model-free H∞ control of Itô stochastic system via off-policy reinforcement learning","authors":"Weihai Zhang , Jing Guo , Xiushan Jiang","doi":"10.1016/j.automatica.2025.112144","DOIUrl":"10.1016/j.automatica.2025.112144","url":null,"abstract":"<div><div>The stochastic <span><math><msub><mrow><mi>H</mi></mrow><mrow><mi>∞</mi></mrow></msub></math></span> control is studied for a linear stochastic Itô system with an unknown system model. It is known that the linear stochastic <span><math><msub><mrow><mi>H</mi></mrow><mrow><mi>∞</mi></mrow></msub></math></span> control issue can be transformed into the problem of solving a so-called generalized algebraic Riccati equation (GARE), which is a nonlinear equation that is typically difficult to solve analytically. Worse, model-based techniques cannot be utilized to approximately solve a GARE when an accurate system model is unavailable or prohibitively expensive to construct in reality. To address these issues, an off-policy reinforcement learning (RL) approach is presented to learn the solution of a GARE from real system data rather than a system model; its convergence is demonstrated, and the robustness of RL to errors in the learning process is investigated. In the off-policy RL approach, the system data may be created with behavior policies rather than the target policies, which is highly significant and promising for use in actual systems. Finally, the proposed off-policy RL approach is validated on a two-mass spring system.</div></div>","PeriodicalId":55413,"journal":{"name":"Automatica","volume":"174 ","pages":"Article 112144"},"PeriodicalIF":4.8,"publicationDate":"2025-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143130712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}