scispace - formally typeset
Search or ask a question

Showing papers in "IEEE/CAA Journal of Automatica Sinica in 2023"


Journal ArticleDOI
TL;DR: Wang et al. as mentioned in this paper showed that mordern archaeological discoveries in 1973 and 1993 at Changsha, Hunan, and Jingmen, Hubei, China have respectively indicated a new, yet more natural and simple interpretation: "道,可道 and常道" or "The Dao, The Speakable Dao and The Eternal Dao".
Abstract: The well-known ancient Chinese philosopher Lao Tzu (老子) or Laozi (6th∼4th century BC during the Spring and Autumn period) started his classic Tao Teh Ching 《道德经》 or Dao De Jing (see Fig. 1) with six Chinese characters: “道(Dao)可(Ke)道(Dao)非(Fei)常(Chang)道(Dao)”, which has been traditionally interpreted as “道可道,非常道” or “The Dao that can be spoken is not the eternal Dao”. However, mordern archaeological discoveries in 1973 and 1993 at Changsha, Hunan, and Jingmen, Hubei, China, have respectively indicated a new, yet more natural and simple interpretation: “道,可道,非常道”, or “The Dao, The Speakable Dao, The Eternal Dao”.

44 citations


Journal ArticleDOI
TL;DR: In this paper , a deep learning-based remaining useful life (RUL) prediction method is proposed to address the sensor malfunction problem, where a global feature extraction scheme is adopted to fully exploit information of different sensors, and adversarial learning is further introduced to extract generalized sensor-invariant features.
Abstract: In recent years, intelligent data-driven prognostic methods have been successfully developed, and good machinery health assessment performance has been achieved through explorations of data from multiple sensors. However, existing data-fusion prognostic approaches generally rely on the data availability of all sensors, and are vulnerable to potential sensor malfunctions, which are likely to occur in real industries especially for machines in harsh operating environments. In this paper, a deep learning-based remaining useful life (RUL) prediction method is proposed to address the sensor malfunction problem. A global feature extraction scheme is adopted to fully exploit information of different sensors. Adversarial learning is further introduced to extract generalized sensor-invariant features. Through explorations of both global and shared features, promising and robust RUL prediction performance can be achieved by the proposed method in the testing scenarios with sensor malfunctions. The experimental results suggest the proposed approach is well suited for real industrial applications.

34 citations


Journal ArticleDOI
TL;DR: A review and analysis of three-way behavioral decision making with hesitant fuzzy information systems (HFIS) from the perspective of the past, present, and future can be found in this article .
Abstract: Three-way decision (T-WD) theory is about thinking, problem solving, and computing in threes. Behavioral decision making (BDM) focuses on effective, cognitive, and social processes employed by humans for choosing the optimal object, of which prospect theory and regret theory are two widely used tools. The hesitant fuzzy set (HFS) captures a series of uncertainties when it is difficult to specify precise fuzzy membership grades. Guided by the principles of three-way decisions as thinking in threes and integrating these three topics together, this paper reviews and examines advances in three-way behavioral decision making (TW-BDM) with hesitant fuzzy information systems (HFIS) from the perspective of the past, present, and future. First, we provide a brief historical account of the three topics and present basic formulations. Second, we summarize the latest development trends and examine a number of basic issues, such as one-sidedness of reference points and subjective randomness for result values, and then report the results of a comparative analysis of existing methods. Finally, we point out key challenges and future research directions.

30 citations


Journal ArticleDOI
TL;DR: In this article , a deep learning-based remaining useful life (RUL) prediction method is proposed to address the sensor malfunction problem, where a global feature extraction scheme is adopted to fully exploit information of different sensors, and adversarial learning is further introduced to extract generalized sensor-invariant features.
Abstract: In recent years, intelligent data-driven prognostic methods have been successfully developed, and good machinery health assessment performance has been achieved through explorations of data from multiple sensors. However, existing data-fusion prognostic approaches generally rely on the data availability of all sensors, and are vulnerable to potential sensor malfunctions, which are likely to occur in real industries especially for machines in harsh operating environments. In this paper, a deep learning-based remaining useful life (RUL) prediction method is proposed to address the sensor malfunction problem. A global feature extraction scheme is adopted to fully exploit information of different sensors. Adversarial learning is further introduced to extract generalized sensor-invariant features. Through explorations of both global and shared features, promising and robust RUL prediction performance can be achieved by the proposed method in the testing scenarios with sensor malfunctions. The experimental results suggest the proposed approach is well suited for real industrial applications.

29 citations


Journal ArticleDOI
TL;DR: In this article , a resilient and safe distributed longitudinal platooning control law is constructed with an aim to preserve simultaneous individual vehicle stability, attack resilience, platoon safety and scalability, under which the platoon resilience against DoS attacks can be maximized but the anticipated stability and safety requirements remain preserved.
Abstract: Connected automated vehicles (CAVs) serve as a promising enabler for future intelligent transportation systems because of their capabilities in improving traffic efficiency and driving safety, and reducing fuel consumption and vehicle emissions. A fundamental issue in CAVs is platooning control that empowers a convoy of CAVs to be cooperatively maneuvered with desired longitudinal spacings and identical velocities on roads. This paper addresses the issue of resilient and safe platooning control of CAVs subject to intermittent denial-of-service (DoS) attacks that disrupt vehicle-to-vehicle communications. First, a heterogeneous and uncertain vehicle longitudinal dynamic model is presented to accommodate a variety of uncertainties, including diverse vehicle masses and engine inertial delays, unknown and nonlinear resistance forces, and a dynamic platoon leader. Then, a resilient and safe distributed longitudinal platooning control law is constructed with an aim to preserve simultaneous individual vehicle stability, attack resilience, platoon safety and scalability. Furthermore, a numerically efficient offline design algorithm for determining the desired platoon control law is developed, under which the platoon resilience against DoS attacks can be maximized but the anticipated stability, safety and scalability requirements remain preserved. Finally, extensive numerical experiments are provided to substantiate the efficacy of the proposed platooning method.

22 citations


Peer ReviewDOI
TL;DR: A review and analysis of three-way behavioral decision making with hesitant fuzzy information systems (HFIS) from the perspective of the past, present, and future can be found in this paper .
Abstract: Three-way decision (T-WD) theory is about thinking, problem solving, and computing in threes. Behavioral decision making (BDM) focuses on effective, cognitive, and social processes employed by humans for choosing the optimal object, of which prospect theory and regret theory are two widely used tools. The hesitant fuzzy set (HFS) captures a series of uncertainties when it is difficult to specify precise fuzzy membership grades. Guided by the principles of three-way decisions as thinking in threes and integrating these three topics together, this paper reviews and examines advances in three-way behavioral decision making (TW-BDM) with hesitant fuzzy information systems (HFIS) from the perspective of the past, present, and future. First, we provide a brief historical account of the three topics and present basic formulations. Second, we summarize the latest development trends and examine a number of basic issues, such as one-sidedness of reference points and subjective randomness for result values, and then report the results of a comparative analysis of existing methods. Finally, we point out key challenges and future research directions.

21 citations


Journal ArticleDOI
TL;DR: In this paper , reduced-order disturbance observer-based algorithms are proposed to achieve Nash equilibrium seeking for games with first-order and second-order players, respectively, where the observed disturbance values are included in control signals to eliminate the influence of disturbances, based on which a gradientlike optimization method is implemented for each player.
Abstract: This paper is concerned with anti-disturbance Nash equilibrium seeking for games with partial information. First, reduced-order disturbance observer-based algorithms are proposed to achieve Nash equilibrium seeking for games with first-order and second-order players, respectively. In the developed algorithms, the observed disturbance values are included in control signals to eliminate the influence of disturbances, based on which a gradient-like optimization method is implemented for each player. Second, a signum function based distributed algorithm is proposed to attenuate disturbances for games with second-order integrator-type players. To be more specific, a signum function is involved in the proposed seeking strategy to dominate disturbances, based on which the feedback of the velocity-like states and the gradients of the functions associated with players achieves stabilization of system dynamics and optimization of players' objective functions. Through Lyapunov stability analysis, it is proven that the players' actions can approach a small region around the Nash equilibrium by utilizing disturbance observer-based strategies with appropriate control gains. Moreover, exponential (asymptotic) convergence can be achieved when the signum function based control strategy (with an adaptive control gain) is employed. The performance of the proposed algorithms is tested by utilizing an integrated simulation platform of virtual robot experimentation platform (V-REP) and MATLAB.

19 citations


Journal ArticleDOI
TL;DR: In this paper , the authors present a survey of the security analysis of IoT devices, focusing on the challenges and potential solutions for these challenges. And they discuss the flaws of these solutions and future directions for this research field.
Abstract: Internet of things (IoT) devices make up 30% of all network-connected endpoints, introducing vulnerabilities and novel attacks that make many companies as primary targets for cybercriminals. To address this increasing threat surface, every organization deploying IoT devices needs to consider security risks to ensure those devices are secure and trusted. Among all the solutions for security risks, firmware security analysis is essential to fix software bugs, patch vulnerabilities, or add new security features to protect users of those vulnerable devices. However, firmware security analysis has never been an easy job due to the diversity of the execution environment and the close source of firmware. These two distinct features complicate the operations to unpack firmware samples for detailed analysis. They also make it difficult to create visual environments to emulate the running of device firmware. Although researchers have developed many novel methods to overcome various challenges in the past decade, critical barriers impede firmware security analysis in practice. Therefore, this survey is motivated to systematically review and analyze the research challenges and their solutions, considering both breadth and depth. Specifically, based on the analysis perspectives, various methods that perform security analysis on IoT devices are introduced and classified into four categories. The challenges in each category are discussed in detail, and potential solutions are proposed subsequently. We then discuss the flaws of these solutions and provide future directions for this research field. This survey can be utilized by a broad range of readers, including software developers, cyber security researchers, and software security engineers, to better understand firmware security analysis.

18 citations


Journal ArticleDOI
TL;DR: The current ChatGPT phenomenon has signaled a new era of Artificial Intelligence moving from Algorithmic Intelligence to Linguistic Intelligence as mentioned in this paper , which is referred to as Artificial Intelligence Transition.
Abstract: HE current ChatGPT phenomenon has signaled a new era of Artificial Intelligence moving from Algorithmic Intelligence to Linguistic Intelligence

17 citations


Journal ArticleDOI
TL;DR: In this paper , a distributed extended state observer taking into consideration switching topologies is designed to integrally estimate unknown target dynamics and neighboring ASVs' dynamics, which takes full advantage of known information and avoids the approximation of some virtual control vectors.
Abstract: This paper is concerned with the cooperative target tracking of multiple autonomous surface vehicles (ASVs) under switching interaction topologies. For the target to be tracked, only its position can be measured/received by some of the ASVs, and its velocity is unavailable to all the ASVs. A distributed extended state observer taking into consideration switching topologies is designed to integrally estimate unknown target dynamics and neighboring ASVs' dynamics. Accordingly, a novel kinematic controller is designed, which takes full advantage of known information and avoids the approximation of some virtual control vectors. Moreover, a disturbance observer is presented to estimate unknown time-varying environmental disturbance. Furthermore, a distributed dynamic controller is designed to regulate the involved ASVs to cooperatively track the target. It enables each ASV to adjust its forces and moments according to the received information from its neighbors. The effectiveness of the derived results is demonstrated through cooperative target tracking performance analysis for a tracking system composed of five interacting ASVs.

16 citations


Journal ArticleDOI
TL;DR: In this paper , a resilient and safe distributed longitudinal platooning control law is constructed with an aim to preserve simultaneous individual vehicle stability, attack resilience, platoon safety and scalability, under which the platoon resilience against DoS attacks can be maximized but the anticipated stability and safety requirements remain preserved.
Abstract: Connected automated vehicles (CAVs) serve as a promising enabler for future intelligent transportation systems because of their capabilities in improving traffic efficiency and driving safety, and reducing fuel consumption and vehicle emissions. A fundamental issue in CAVs is platooning control that empowers a convoy of CAVs to be cooperatively maneuvered with desired longitudinal spacings and identical velocities on roads. This paper addresses the issue of resilient and safe platooning control of CAVs subject to intermittent denial-of-service (DoS) attacks that disrupt vehicle-to-vehicle communications. First, a heterogeneous and uncertain vehicle longitudinal dynamic model is presented to accommodate a variety of uncertainties, including diverse vehicle masses and engine inertial delays, unknown and nonlinear resistance forces, and a dynamic platoon leader. Then, a resilient and safe distributed longitudinal platooning control law is constructed with an aim to preserve simultaneous individual vehicle stability, attack resilience, platoon safety and scalability. Furthermore, a numerically efficient offline design algorithm for determining the desired platoon control law is developed, under which the platoon resilience against DoS attacks can be maximized but the anticipated stability, safety and scalability requirements remain preserved. Finally, extensive numerical experiments are provided to substantiate the efficacy of the proposed platooning method.

Journal ArticleDOI
TL;DR: Wen et al. as discussed by the authors presented a survey of negative transfer in transfer learning, i.e., leveraging source domain data/knowledge undesirably reduces learning performance in the target domain, and has been a long-standing and challenging problem in TL.
Abstract: Transfer learning (TL) utilizes data or knowledge from one or more source domains to facilitate learning in a target domain. It is particularly useful when the target domain has very few or no labeled data, due to annotation expense, privacy concerns, etc. Unfortunately, the effectiveness of TL is not always guaranteed. Negative transfer (NT), i.e., leveraging source domain data/knowledge undesirably reduces learning performance in the target domain, and has been a long-standing and challenging problem in TL. Various approaches have been proposed in the literature to address this issue. However, there does not exist a systematic survey. This paper fills this gap, by first introducing the definition of NT and its causes, and reviewing over fifty representative approaches for overcoming NT, which fall into three categories: domain similarity estimation, safe transfer, and NT mitigation. Many areas, including computer vision, bioinformatics, natural language processing, recommender systems, and robotics, that use NT mitigation strategies to facilitate positive transfers, are also reviewed. Finally, we give guidelines on NT task construction and baseline algorithms, benchmark existing TL and NT mitigation approaches on three NT-specific datasets, and point out challenges and future research directions. To ensure reproducibility, our code is publicized at https://github.com/chamwen/NT-Benchmark.

Journal ArticleDOI
TL;DR: In this article , a distributed extended state observer taking into consideration switching topologies is designed to integrally estimate unknown target dynamics and neighboring ASVs' dynamics, which takes full advantage of known information and avoids the approximation of some virtual control vectors.
Abstract: This paper is concerned with the cooperative target tracking of multiple autonomous surface vehicles (ASVs) under switching interaction topologies. For the target to be tracked, only its position can be measured/received by some of the ASVs, and its velocity is unavailable to all the ASVs. A distributed extended state observer taking into consideration switching topologies is designed to integrally estimate unknown target dynamics and neighboring ASVs' dynamics. Accordingly, a novel kinematic controller is designed, which takes full advantage of known information and avoids the approximation of some virtual control vectors. Moreover, a disturbance observer is presented to estimate unknown time-varying environmental disturbance. Furthermore, a distributed dynamic controller is designed to regulate the involved ASVs to cooperatively track the target. It enables each ASV to adjust its forces and moments according to the received information from its neighbors. The effectiveness of the derived results is demonstrated through cooperative target tracking performance analysis for a tracking system composed of five interacting ASVs.

Journal ArticleDOI
TL;DR: In this article , the authors present a survey of the security analysis of IoT devices, focusing on the challenges and potential solutions for these challenges. And they discuss the flaws of these solutions and future directions for this research field.
Abstract: Internet of things (IoT) devices make up 30% of all network-connected endpoints, introducing vulnerabilities and novel attacks that make many companies as primary targets for cybercriminals. To address this increasing threat surface, every organization deploying IoT devices needs to consider security risks to ensure those devices are secure and trusted. Among all the solutions for security risks, firmware security analysis is essential to fix software bugs, patch vulnerabilities, or add new security features to protect users of those vulnerable devices. However, firmware security analysis has never been an easy job due to the diversity of the execution environment and the close source of firmware. These two distinct features complicate the operations to unpack firmware samples for detailed analysis. They also make it difficult to create visual environments to emulate the running of device firmware. Although researchers have developed many novel methods to overcome various challenges in the past decade, critical barriers impede firmware security analysis in practice. Therefore, this survey is motivated to systematically review and analyze the research challenges and their solutions, considering both breadth and depth. Specifically, based on the analysis perspectives, various methods that perform security analysis on IoT devices are introduced and classified into four categories. The challenges in each category are discussed in detail, and potential solutions are proposed subsequently. We then discuss the flaws of these solutions and provide future directions for this research field. This survey can be utilized by a broad range of readers, including software developers, cyber security researchers, and software security engineers, to better understand firmware security analysis.

Journal ArticleDOI
TL;DR: ChatGPT, one of the leading Large Language Models (LLMs), has acquired linguistic capabilities such as text comprehension and logical reasoning, enabling it to engage in natural conversations with humans as mentioned in this paper .
Abstract: ChatGPT, one of the leading Large Language Models (LLMs), has acquired linguistic capabilities such as text comprehension and logical reasoning, enabling it to engage in natural conversations with humans. As illustrated in “What Does ChatGPT Say: The DAO from Algorithmic Intelligence to Linguistic Intelligence” [1], there are three levels of intelligence: 1) Algorithmic Intelligence (AI), 2) Linguistic Intelligence (LI), 3) Imaginative Intelligence (II). ChatGPT is a powerful demonstration of Linguistic Intelligence, another milestone after AlphaGo for Algorithmic Intelligence [1]–[3]. We believe the next break-through in intelligence should be Imaginative Intelligence for artistic creation.

Journal ArticleDOI
TL;DR: In this paper , a distributed event-triggered transmission strategy based on periodic sampling is proposed, under which a model-based stability criterion for the closed-loop network system is derived, by leveraging a discrete-time looped-functional approach.
Abstract: The present paper deals with data-driven event-triggered control of a class of unknown discrete-time interconnected systems (a.k.a. network systems). To this end, we start by putting forth a novel distributed event-triggering transmission strategy based on periodic sampling, under which a model-based stability criterion for the closed-loop network system is derived, by leveraging a discrete-time looped-functional approach. Marrying the model-based criterion with a data-driven system representation recently developed in the literature, a purely data-driven stability criterion expressed in the form of linear matrix inequalities (LMIs) is established. Meanwhile, the data-driven stability criterion suggests a means for co-designing the event-triggering coefficient matrix and the feedback control gain matrix using only some offline collected state-input data. Finally, numerical results corroborate the efficacy of the proposed distributed data-driven ETS in cutting off data transmissions and the co-design procedure.

Journal ArticleDOI
TL;DR: In this article , the authors provide an overview of state-of-the-art researches in this interdisciplinary field, covering a wide range of applications, including dynamical system identification, reduced order surro-gate modeling, error covariance specification and model error correction.
Abstract: Data assimilation (DA) and uncertainty quantification (UQ) are extensively used in analysing and reducing error propagation in high-dimensional spatial-temporal dynamics. Typical applications span from computational fluid dynamics (CFD) to geoscience and climate systems. Recently, much effort has been given in combining DA, UQ and machine learning (ML) techniques. These research efforts seek to address some critical challenges in high-dimensional dynamical systems, including but not limited to dynamical system identification, reduced order surro-gate modelling, error covariance specification and model error correction. A large number of developed techniques and methodologies exhibit a broad applicability across numerous domains, resulting in the necessity for a comprehensive guide. This paper provides the first overview of state-of-the-art researches in this interdisciplinary field, covering a wide range of applications. This review is aimed at ML scientists who attempt to apply DA and UQ techniques to improve the accuracy and the interpretability of their models, but also at DA and UQ experts who intend to integrate cutting-edge ML approaches to their systems. Therefore, this article has a special focus on how ML methods can overcome the existing limits of DA and UQ, and vice versa. Some exciting perspectives of this rapidly developing research field are also discussed.

Journal ArticleDOI
TL;DR: In this article , a resilient distributed event-triggering mechanism is proposed to compensate for the sabotage of DoS attacks and reduce the amount of transmitted data by constructing stochastic models satisfying Bernoulli distribution to describe the false information injected by the attackers.
Abstract: Dear Editor, This letter contributes to designing a resilient event-triggered controller for connected automated vehicles under cyber attacks, including denial-of-service (DoS) and deception attacks. To characterize the effect of DoS attacks, the effective intervals of the attack are redivided based on the sampling period. Then, a resilient distributed event-triggering mechanism is proposed to compensate for the sabotage of DoS attacks and reduce the amount of transmitted data. Since the communication channel transmits the data only at the trigger instant, deception attacks may occur at this instant and be transmitted to each vehicle in superposition with the normal signal. Therefore, we construct stochastic models satisfying Bernoulli distribution to describe the false information injected by the attackers. Based on the above framework, an attack-resilient control strategy is proposed to resist the impact of cyber attacks. Then, sufficient conditions are established to achieve stability of vehicular platoons, and a co-design strategy regarding the control gain and triggering parameter matrices is given. Finally, the simulation results are provided to substantiate the effectiveness of the proposed method.

Journal ArticleDOI
TL;DR: In this paper , the authors provide an overview on the history, status quo and potential future development of ChatGPT, helping to provide an entry point to think about chatGPT.
Abstract: ChatGPT, an artificial intelligence generated content (AIGC) model developed by OpenAI, has attracted world-wide attention for its capability of dealing with challenging language understanding and generation tasks in the form of conversations. This paper briefly provides an overview on the history, status quo and potential future development of ChatGPT, helping to provide an entry point to think about ChatGPT. Specifically, from the limited open-accessed resources, we conclude the core techniques of ChatGPT, mainly including large-scale language models, in-context learning, reinforcement learning from human feedback and the key technical steps for developing Chat-GPT. We further analyze the pros and cons of ChatGPT and we rethink the duality of ChatGPT in various fields. Although it has been widely acknowledged that ChatGPT brings plenty of opportunities for various fields, mankind should still treat and use ChatGPT properly to avoid the potential threat, e.g., academic integrity and safety challenge. Finally, we discuss several open problems as the potential development of ChatGPT.

Journal ArticleDOI
TL;DR: In this paper , the average control rate and a new Lyapunov function are proposed to overcome the difficulty of dealing with fixed-time stability/synchronization of complex networks for AIC.
Abstract: Dear Editor, This letter deals with fixed-time synchronization (Fd-TS) of complex networks (CNs) under aperiodically intermittent control (AIC) for the first time. The average control rate and a new Lyapunov function are proposed to overcome the difficulty of dealing with fixed-time stability/synchronization of CNs for AIC. Based on the Lyapunov and graph-theoretical methods, a Fd-TS criterion of CNs is given. Moreover, the method of this letter is also applicable to the study of finite-time synchronization of CNs for AIC. Finally, the theoretical results are applied to study the Fd-TS of oscillator systems, and simulation results are given to verify the effectiveness of the results.

Journal ArticleDOI
TL;DR: In this article , the authors present a survey of the literature in virtual-to-real (V2R) learning, from the point of view of parallel intelligence, which covers the methods for constructing virtual worlds, generating labeled data, domain transferring, model training and testing.
Abstract: The virtual-to-real paradigm, i.e., training models on virtual data and then applying them to solve real-world problems, has attracted more and more attention from various domains by successfully alleviating the data shortage problem in machine learning. To summarize the advances in recent years, this survey comprehensively reviews the literature, from the viewport of parallel intelligence. First, an extended parallel learning framework is proposed to cover main domains including computer vision, natural language processing, robotics, and autonomous driving. Second, a multi-dimensional taxonomy is designed to organize the literature in a hierarchical structure. Third, the related virtual-to-real works are analyzed and compared according to the three principles of parallel learning known as description, prediction, and prescription, which cover the methods for constructing virtual worlds, generating labeled data, domain transferring, model training and testing, as well as optimizing the strategies to guide the task-oriented data generator for better learning performance. Key issues remained in virtual-to-real are discussed. Furthermore, the future research directions from the viewpoint of parallel learning are suggested.

Journal ArticleDOI
TL;DR: Zhang et al. as mentioned in this paper proposed an efficient EA for solving super-large-scale multi-objective optimization problems with sparse optimal solutions, which estimates the sparse distribution of optimal solutions by optimizing a binary vector for each solution, and provides a fast clustering method to highly reduce the dimensionality of the search space.
Abstract: During the last three decades, evolutionary algorithms (EAs) have shown superiority in solving complex optimization problems, especially those with multiple objectives and non-differentiable landscapes. However, due to the stochastic search strategies, the performance of most EAs deteriorates drastically when handling a large number of decision variables. To tackle the curse of dimensionality, this work proposes an efficient EA for solving super-large-scale multi-objective optimization problems with sparse optimal solutions. The proposed algorithm estimates the sparse distribution of optimal solutions by optimizing a binary vector for each solution, and provides a fast clustering method to highly reduce the dimensionality of the search space. More importantly, all the operations related to the decision variables only contain several matrix calculations, which can be directly accelerated by GPUs. While existing EAs are capable of handling fewer than 10 000 real variables, the proposed algorithm is verified to be effective in handling 1 000 000 real variables. Furthermore, since the proposed algorithm handles the large number of variables via accelerated matrix calculations, its runtime can be reduced to less than 10% of the runtime of existing EAs.

Journal ArticleDOI
TL;DR: In this article , the generalized extended-state observer (GESO) and the equivalent input disturbance (EID) from assumptions, system configurations, stability conditions, system design, disturbance-rejection performance, and extensibility are compared.
Abstract: Active disturbance-rejection methods are effective in estimating and rejecting disturbances in both transient and steady-state responses. This paper presents a deep observation on and a comparison between two of those methods: the generalized extended-state observer (GESO) and the equivalent input disturbance (EID) from assumptions, system configurations, stability conditions, system design, disturbance-rejection performance, and extensibility. A time-domain index is introduced to assess the disturbance-rejection performance. A detailed observation of disturbance-suppression mechanisms reveals the superiority of the EID approach over the GESO method. A comparison between these two methods shows that assumptions on disturbances are more practical and the adjustment of disturbance-rejection performance is easier for the EID approach than for the GESO method.

Journal ArticleDOI
TL;DR: In this article , a robust stability analysis of the classic Smith predictor-based control system for uncertain fractional-order plants with interval time delays and interval coefficients is the emphasis of this work.
Abstract: The robust stability study of the classic Smith predictor-based control system for uncertain fractional-order plants with interval time delays and interval coefficients is the emphasis of this work. Interval uncertainties are a type of parametric uncertainties that cannot be avoided when modeling real-world plants. Also, in the considered Smith predictor control structure it is supposed that the controller is a fractional-order proportional integral derivative (FOPID) controller. To the best of the authors' knowledge, no method has been developed until now to analyze the robust stability of a Smith predictor based fractional-order control system in the presence of the simultaneous uncertainties in gain, time-constants, and time delay. The three primary contributions of this study are as follows: i) a set of necessary and sufficient conditions is constructed using a graphical method to examine the robust stability of a Smith predictor-based fractional-order control system—the proposed method explicitly determines whether or not the FOPID controller can robustly stabilize the Smith predictor-based fractional-order control system; ii) an auxiliary function as a robust stability testing function is presented to reduce the computational complexity of the robust stability analysis; and iii) two auxiliary functions are proposed to achieve the control requirements on the disturbance rejection and the noise reduction. Finally, four numerical examples and an experimental verification are presented in this study to demonstrate the efficacy and significance of the suggested technique.

Journal ArticleDOI
TL;DR: In this article , a joint slot scheduling and power allocation in clustered underwater acoustic sensor networks (UASNs), based on the known clustering and routing information, to maximize the network's energy efficiency (EE) was proposed.
Abstract: Dear Editor, This letter deals with the joint slot scheduling and power allocation in clustered underwater acoustic sensor networks (UASNs), based on the known clustering and routing information, to maximize the network's energy efficiency (EE). Based on the block coordinated decent (BCD) method, the formulated mixed-integer non-convex problem is alternatively optimized by leveraging the Kuhn-Munkres algorithm, the Dinkelbach's method and the successive convex approximation (SCA) technique. Numerical results show that the proposed scheme has a better performance in maximizing EE compared to the separate optimization methods.

Journal ArticleDOI
TL;DR: In this paper , the authors present a survey of the literature in virtual-to-real learning, from the viewport of parallel intelligence, focusing on the main domains of computer vision, natural language processing, robotics and autonomous driving.
Abstract: The virtual-to-real paradigm, i.e., training models on virtual data and then applying them to solve real-world problems, has attracted more and more attention from various domains by successfully alleviating the data shortage problem in machine learning. To summarize the advances in recent years, this survey comprehensively reviews the literature, from the viewport of parallel intelligence. First, an extended parallel learning framework is proposed to cover main domains including computer vision, natural language processing, robotics, and autonomous driving. Second, a multi-dimensional taxonomy is designed to organize the literature in a hierarchical structure. Third, the related virtual-to-real works are analyzed and compared according to the three principles of parallel learning known as description, prediction, and prescription, which cover the methods for constructing virtual worlds, generating labeled data, domain transferring, model training and testing, as well as optimizing the strategies to guide the task-oriented data generator for better learning performance. Key issues remained in virtual-to-real are discussed. Furthermore, the future research directions from the viewpoint of parallel learning are suggested.

Journal ArticleDOI
TL;DR: In this article , the generalized extended-state observer (GESO) and the equivalent input disturbance (EID) from assumptions, system configurations, stability conditions, system design, disturbance-rejection performance, and extensibility are compared.
Abstract: Active disturbance-rejection methods are effective in estimating and rejecting disturbances in both transient and steady-state responses. This paper presents a deep observation on and a comparison between two of those methods: the generalized extended-state observer (GESO) and the equivalent input disturbance (EID) from assumptions, system configurations, stability conditions, system design, disturbance-rejection performance, and extensibility. A time-domain index is introduced to assess the disturbance-rejection performance. A detailed observation of disturbance-suppression mechanisms reveals the superiority of the EID approach over the GESO method. A comparison between these two methods shows that assumptions on disturbances are more practical and the adjustment of disturbance-rejection performance is easier for the EID approach than for the GESO method.

Journal ArticleDOI
TL;DR: In this paper , a dynamic event-triggered communication scheduling and cooperative adaptive cruise control for a convoy of automated vehicles with diverse spacing policies is proposed to achieve automated vehicle platooning under various gap references with desired platoon stability and spacing performance requirements.
Abstract: Platooning represents one of the key features that connected automated vehicles may possess as it allows multiple automated vehicles to be maneuvered cooperatively with small headways on roads. However, a critical challenge in accomplishing automated vehicle platoons is to deal with the effects of intermittent and sporadic vehicle-to-vehicle data transmissions caused by limited wireless communication resources. This paper addresses the co-design problem of dynamic event-triggered communication scheduling and cooperative adaptive cruise control for a convoy of automated vehicles with diverse spacing policies. The central aim is to achieve automated vehicle platooning under various gap references with desired platoon stability and spacing performance requirements, while simultaneously improving communication efficiency. Toward this aim, a dynamic event-triggered scheduling mechanism is developed such that the inter-vehicle data transmissions are scheduled dynamically and efficiently over time. Then, a tractable co-design criterion on the existence of both the admissible event-driven cooperative adaptive cruise control law and the desired scheduling mechanism is derived. Finally, comparative simulation results are presented to substantiate the effectiveness and merits of the obtained results.

Journal ArticleDOI
TL;DR: In this article , an adaptive sliding mode control (SMC) strategy is introduced to handle actuator uncertainties, model uncertainties and external disturbances simultaneously, and an explicit misalignment angles range that could be treated herein is offered.
Abstract: The attitude tracking operations of an on-orbit spacecraft with degraded performance exhibited by potential actuator uncertainties (including failures and misalignments) can be extraordinarily challenging. Thus, the control law development for the attitude tracking task of spacecraft subject to actuator (namely reaction wheel) uncertainties is addressed in this paper. More specially, the attitude dynamics model of the spacecraft is firstly established under actuator failures and misalignment (without a small angle approximation operation). Then, a new non-singular sliding manifold with fixed time convergence and anti-unwinding properties is proposed, and an adaptive sliding mode control (SMC) strategy is introduced to handle actuator uncertainties, model uncertainties and external disturbances simultaneously. Among this, an explicit misalignment angles range that could be treated herein is offered. Lyapunov-based stability analyses are employed to verify that the reaching phase of the sliding manifold is completed in finite time, and the attitude tracking errors are ensured to converge to a small region of the closest equilibrium point in fixed time once the sliding manifold enters the reaching phase. Finally, the beneficial features of the designed controller are manifested via detailed numerical simulation tests.

Journal ArticleDOI
TL;DR: Li et al. as discussed by the authors proposed a hybrid deep learning model for early prediction of battery RUL, which combines handcrafted features with domain knowledge and latent features learned by deep networks to boost the performance of RUL early prediction.
Abstract: Accurate estimation of the remaining useful life (RUL) of lithium-ion batteries is critical for their large-scale deployment as energy storage devices in electric vehicles and stationary storage. A fundamental understanding of the factors affecting RUL is crucial for accelerating battery technology development. However, it is very challenging to predict RUL accurately because of complex degradation mechanisms occurring within the batteries, as well as dynamic operating conditions in practical applications. Moreover, due to insignificant capacity degradation in early stages, early prediction of battery life with early cycle data can be more difficult. In this paper, we propose a hybrid deep learning model for early prediction of battery RUL. The proposed method can effectively combine handcrafted features with domain knowledge and latent features learned by deep networks to boost the performance of RUL early prediction. We also design a non-linear correlation-based method to select effective domain knowledge-based features. Moreover, a novel snapshot ensemble learning strategy is proposed to further enhance model generalization ability without increasing any additional training cost. Our experimental results show that the proposed method not only outperforms other approaches in the primary test set having a similar distribution as the training set, but also generalizes well to the secondary test set having a clearly different distribution with the training set. The PyTorch implementation of our proposed approach is available at https://github.com/batteryrullbattery_rul_early_prediction.