This paper considers the distributed cooperative control problem for a linear stochastic multi-agent system (MAS). The optimal cooperative control design for each agent is challenging due to the ...limited neighboring information, contingent upon the MAS network topology. A synthesized distributed control-estimation framework is proposed to address the computationally tractable suboptimal solution. In particular, a distributed estimator extends MAS information beyond neighboring agents, allowing interactions with non-neighboring agents. The proposed control-estimation law is theoretically verified and further validated using numerical simulations.
Recently, the technologies of on-device AI have been accelerated with the development of new hardware and software platforms. Therefore, many researchers and engineers focus on how to enable ML ...technologies on mobile devices with limited hardware resources. In this paper, we revisit on-device ML designed to support ML technologies on mobile devices and describe the three challenges when using on-device ML in detail. Then, we propose a new data management policy, called Overlay-ML, which efficiently solves two challenges that we discovered. Especially, we designed Overlay-ML to work in the application space with two key ideas. The first key idea is to extend the limited memory space using the usable space of the underlying storage device. The second key idea is to provide data transparency, which hides where the data is stored so that running ML models think the data is stored in the same place. For evaluation, we implemented an image detection application based on TensorFlow Lite which is a well-known on-device ML framework, and modified it to enable the features of Overlay-ML. All evaluation was performed on two state-of-the-art smartphones that are high-end embedded devices. Our evaluation results clearly show Overlay-ML can effectively prevent unexpected termination by Android OS and present a good loss value in real-world workload.
In cellular networks, Device to Device (D2D) communication can improve spectral efficiency by enabling proximity users to communicate directly without traversing the Base Station (BS). However, if ...not designed properly, the interference generated by D2D transmissions, may deteriorate the communication quality of the existing cellular and D2D users. In this paper, we study transmission power control-based interference management to increase access rate and sum rate while guaranteeing the Quality of Service (QoS) requirements for both D2D and cellular users. A four-step framework is proposed. First candidate D2D groups, potentially admissible for transmission, are arranged in order with respect to their distance from BS and required Signal to Interference and Noise Ratio (SINR). Next, upper and lower bounds on the transmission powers of the transmitters are calculated to determine the admissibility of the aspirant D2D group subject to the QoS requirements of the aspirant group, other scheduled D2D groups, and the cellular user. Then, relay-based communication protocol is considered for admitting the D2D groups that cannot be admitted directly. Finally, sum rate of each shared channel is improved through iterative incrementation of transmission powers of cellular and D2D transmitters constrained by the QoS requirements of all the admitted D2D groups and the cellular user and the existing sum rate. Simulation results show that the proposed framework can improve the access rate many folds across all the considered scenarios as compared to the baseline schemes. Moreover, higher access rates of the proposed scheme translate into significantly higher sum rates.
This technical note proposes an algorithm to assess the safety of the cyber-physical system (CPS) in the presence of cyber attacks, which can be designed intelligently to avoid the detection. The ...main idea is based on the reachability analysis that computes the reachable set of CPS states possibly reached by all potential cyber attacks regardless of their detection. The reachable set computation typically demands a large computation cost and has mostly relied on the (over) approximation techniques. However, our algorithm analytically derives the exact reachable set solution and further establishes a recursive computation structure that can perform in the real-time CPS operation. This can significantly enhance the quality of the online safety assessment, enabling more reliable, less conservative, and computationally efficient process.
This paper proposes a formation control algorithm to create separated multiple formations for an undirected networked multi-agent system while preserving the network connectivity and avoiding ...collision among agents. Through the modified multi-consensus technique, the proposed algorithm can simultaneously divide a group of multiple agents into any arbitrary number of desired formations in a decentralized manner. Furthermore, the agents assigned to each formation group can be easily reallocated to other formation groups without network topological constraints as long as the entire network is initially connected; an operator can freely partition agents even if there is no spanning tree within each subgroup. Besides, the system can avoid collision without loosing the connectivity even during the transient period of formation by applying the existing potential function based on the network connectivity estimation. If the estimation is correct, the potential function not only guarantees the connectivity maintenance but also allows some extra edges to be broken if the network remains connected. Numerical simulations are performed to verify the feasibility and performance of the proposed multi-subgroup formation control.
Device to Device (D2D) communication takes advantage of the proximity between the communicating devices in order to achieve efficient resource utilization, improved throughput and energy efficiency, ...simultaneous serviceability and reduced latency. One of the main characteristics of D2D communication is reuse of the frequency resource in order to improve spectral efficiency of the system. Nevertheless, frequency reuse introduces significantly high interference levels thus necessitating efficient resource allocation algorithms that can enable simultaneous communication sessions through effective channel and/or power allocation. This survey paper presents a comprehensive investigation of the state-of-the-art resource allocation algorithms in D2D communication underlaying cellular networks. The surveyed algorithms are evaluated based on heterogeneous parameters which constitute the elementary features of a resource allocation algorithm in D2D paradigm. Additionally, in order to familiarize the readers with the basic design of the surveyed resource allocation algorithms, brief description of the mode of operation of each algorithm is presented. The surveyed algorithms are divided into four categories based on their technical doctrine i.e., conventional optimization based, Non-Orthogonal-Multiple-Access (NOMA) based, game theory based and machine learning based techniques. Towards the end, several open challenges are remarked as the future research directions in resource allocation for D2D communication.
Distributed estimation has proven to be suitable for many multiagent system (MAS) applications, yet it relies heavily on information exchange via a costly and vulnerable communication network. This ...paper proposes a sensing-based distributed estimation algorithm that enables a local monitoring agent to expand its estimation capabilities beyond its sensing range without needing communication overhead. The key to expanding the limited sensing range is to incorporate the MAS's cooperative control protocol, allowing the monitoring agent to infer the state of out-of-range agents from the behavior of in-range agents that may interact with them. Then, the state estimation for out-of-range agents is performed through a Bayesian approach that considers the correlation of state estimates between in-range and out-of-range agents. This approach of only taking sensor measurements of local monitoring agents without interagent communications can successfully compensate for the existing communication-based distributed estimation methods. The performance of the proposed sensing-based distributed estimation algorithm is theoretically verified and demonstrated with numerical simulations of a multivehicle formation flight example.
This study presents a novel ship route planning algorithm that takes into account both operational economy and safety by integrating the A* algorithm with a collision avoidance algorithm that ...evaluates the collision risk index (CRI) between the own ship and the target ship. The CRI-based A* algorithm defines a penalty zone, allowing the own ship to explore safe routes based on the International Regulations for Preventing Collisions at Sea 1972 (COLREGs) and performs an adaptive and effective node search on an extended local map grid according to various encounter situations. The proposed algorithm is validated through simulations of head-on, fine-broad crossing, converging crossing, and overtaking encounters, indicating an economical and safe optimum route compared to conventional ship domain-based route planning.
This study considers robust controller design for cyber–physical systems (CPSs) subject to cyber attacks. While previous studies have investigated secure control by assuming specific attack ...strategies, in this study the authors propose a robust hybrid control scheme containing multiple sub-controllers, each matched to a different type of cyber attack. A system using this control scheme is able to adapt its behaviour to various cyber attacks (including those which have not been specifically addressed in the sub-controller designs) by switching sub-controllers to achieve the best performance. They propose a method for designing the secure switching logic to counter possible cyber attacks and to mathematically verify the system's performance and stability as well. The performance of the proposed control scheme is demonstrated by the hybrid H2–H∞ controller applied to a CPS subject to cyber attacks.
This paper proposes a synchronization technique for uncertain hyperchaotic systems in the modified function projective manner using integral fast terminal sliding mode (I-FTSM) and adaptive ...second-order sliding mode algorithm. The new I-FTSM manifolds are introduced with the aim of having the fast convergence speed. The proposed continuous controller not only results in the robustness and high-accuracy synchronization in the presence of unknown external disturbances and/or model uncertainties but also helps alleviating the chattering effect significantly. Numerical simulation results are provided to illustrate the effectiveness of the proposed control design technique and verify the theoretical analysis.