Network-Based Adaptive Multievent-Triggered Fuzzy Dynamic Positioning Controller Design for Unmanned Surface Vehicles Against Denial-Of-Service Attacks
Network-Based Adaptive Multievent-Triggered Fuzzy Dynamic Positioning Controller Design for Unmanned Surface Vehicles Against Denial-Of-Service Attacks
2, JUNE 2023
Abstract—This article focuses on the issue of adaptive low-cost, and highly maneuverable, promoting their applica-
multievent-triggered fuzzy dynamic positioning control of tions in many diverse fields, e.g., cargo transportation, energy
unmanned surface vehicles against denial-of-service at- exploration, military monitoring, and hydrological draw [1].
tacks within a finite-time interval. To improve the data
transmission efficiency, an innovative adaptive multievent- To meet the demands of reliability and high precision in ac-
triggered mechanism is designed to dynamically adjust the tual engineering, plentiful issues regarding the motion control
event-triggered thresholds. Especially, the asynchrony be- of USVs have been discussed, covering coordinated tracking,
tween the membership functions of the controller and that point stabilization, and path following [2], whereas dynamic
of the system is embedded into the adaptive multievent- positioning, focusing on managing the horizontal position and
triggered mechanism, which can help to reduce the con-
servatism of controller design attributed to mismatched heading of maritime vehicles, has received a lot of attention.
membership functions. By employing the linear matrix By introducing a quantized feedback sliding mode control
inequality technology, sufficient conditions are derived scheme, a new fault-tolerant controller for dynamic position-
to ensure that the switched closed-loop fuzzy dynamic ing of USVs was developed in [3]. In [4], a resource-aware
positioning system is finite-time bounded with an H∞ state and uncertainty estimation approach was presented for the
noise attenuation performance. To clarify the validity of
the presented positioning controller under the adaptive dynamic positioning system (DPS) suffering from external en-
multievent-triggered mechanism and denial-of-service at- vironmental disturbances, including currents, waves, and wind.
tacks, we provide and analyze the simulation results. Ma et al. [5] utilized a switched DPS to describe a mass-switched
Index Terms—Adaptive multievent-triggered mechanism, USV and developed a mode-dependent dynamic positioning
denial-of-service (DoS) attacks, dynamic positioning con- control strategy with an event-triggered (ET) communication
troller, finite-time bounded (FTB), unmanned surface vehi- scheme.
cles (USVs). In the actual process, with the increasing demand for USVs,
the dynamic characteristics of USVs has become increasingly
complicated in the presence of nonlinearity, which results in a
I. INTRODUCTION
challenge for system performance analysis. As a popular non-
S CLASSICAL unmanned autonomous robot dynamics,
A unmanned surface vehicles (USVs) have attracted a wide
range of interest. The distinguishing features of USVs are small,
linear processing method, the discussion of the Tagaki–Sugeno
(T-S) fuzzy model never ceases. The employment of linear
systems to represent the local behavior under each fuzzy rule
is a key feature of T-S fuzzy control [6]. After that, a variety
Manuscript received 11 April 2022; revised 6 July 2022; accepted 14 of linear control results is suitable for each linear model. A
August 2022. Date of publication 2 September 2022; date of current T-S fuzzy Markovian switching system was constructed in [7]
version 5 June 2023. This work was supported in part by the Key R&D to investigate the nonstationary control issue by using variable
Program of Guangdong under Grant 2020B1111010002, in part by the
Hainan Province Science and Technology Special Fund under Grant quantization density. With the T-S fuzzy technology, three dif-
ZDYF2021GXJS041, in part by the National Natural Science Foundation ferent performance analyses were fulfilled in [8] for incommen-
of China under Grant U2141234, and in part by the Shanghai Sailing surate fractional-order dynamics subject to nonlinearities and
Program under Grant 22YF1420400. Recommended by Associate Edi-
tor Ming Cao. (Corresponding author: Weidong Zhang.) time-varying delays. In [9], a robust sliding mode controller for
Peng Cheng, Chengming Zhang, Wei Xie, and Weidong Zhang T-S fuzzy systems was figured out by utilizing the quantized
are with the Department of Automation, Shanghai Jiao Tong Uni- state feedback. However, if network channels are considered
versity, Shanghai 200240, China (e-mail: [email protected];
[email protected]; [email protected]; [email protected]). between the concerned system and the controller, the member-
Shuping He is with the School of Electrical Engineering and ship functions of the concerned system and the controller are
Automation, Anhui University, Hefei 230601, China (e-mail: shup- asynchronous. Such a factor is not taken into account in [7],
[email protected]).
Digital Object Identifier 10.1109/TCNS.2022.3203892 [8], [9]. Thus, how to address the asynchrony between the
2325-5870 © 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on December 17,2024 at 03:02:49 UTC from IEEE Xplore. Restrictions apply.
CHENG et al.: NETWORK-BASED ADAPTIVE MULTIEVENT-TRIGGERED FUZZY DYNAMIC POSITIONING CONTROLLER DESIGN 613
in this article is not furnished with side thrusters. We can provide ω(t) = [ω1 ω2 ω3 ]T = [τω1 τω2 τω3 ]T
the motion equations of the USV as ⎡ ⎤
−m d11 m22
m11 x3 0 0 0 0
η̇ = R(ψ)v (1) ⎢
11
⎥
⎢ −m 11
m22 x3 −m d22
0 0 0 0⎥
M v̇ + C(v)v + Dv = τ + τ ω ⎢ 22 ⎥
(2) ⎢ m11 −m22 ⎥
⎢ 0 0⎥
A = ⎢ m33 x2 0 − m33 0
d 33
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on December 17,2024 at 03:02:49 UTC from IEEE Xplore. Restrictions apply.
CHENG et al.: NETWORK-BASED ADAPTIVE MULTIEVENT-TRIGGERED FUZZY DYNAMIC POSITIONING CONTROLLER DESIGN 615
Remark 2: For adaptive laws (10) and (11), the thresholds u(k) = α(k) hq (σ (kt )) Kq x (kt ) (14)
q=1
βx (k) and βh (k) can regulate themselves. If ex (k) approaches
0, Δβx (k) = 0. Therefore, βx (k) tends to be a fixed scalar.
0, k ∈ [kt , kt+1 ) ∩ [Dnon , Dnoff );
Besides, the same law also applies to βh (k). where α(k) =
1, others.
Let (a, k) be the times of DoS OFF/ON transitions and
B. Fuzzy Control Law Design
(a, k) be the total duration in the interval [a, k). To de-
Based on the AMET mechanism, we devise the following scribe the DoS attack, referring to [23], we introduce the
controller. following.
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on December 17,2024 at 03:02:49 UTC from IEEE Xplore. Restrictions apply.
616 IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, VOL. 10, NO. 2, JUNE 2023
Assumption 1 (DoS frequency): There exist scalars ρ ≥ 0 to such peculiarity, the switched closed-loop fuzzy DPS (17) is
and φ > 0 satisfying formulated, which is managed by the switching signal α(k).
k−a Remark 6: Note that the stability analyses in [5], [12], and
(a, k) ≤ ρ + . (15) [25] focused on the asymptotical stability over an infinite-time
φ
interval. However, for many actual engineering, a system with
Assumption 2 (DoS duration): There exist scalars λ ≥ 0 and asymptotic stability over an infinite-time interval cannot imply
Q > 1 satisfying that as it has superior transient peculiarities, such as an informa-
k−a tion transmission system, a flight system, and chemical reaction
(a, k) ≤ λ + . (16) system [26], [27], [28], [29]. For the issue of the network-based
Q
positioning control of a USV, the transient behavior of the USV
Taking the fuzzy controller (14) into the T-S fuzzy DPS (8), is more worthy of attention. When the position changes by the
we can derive the switched closed-loop fuzzy DPS as external disturbances, the USV needs to return to its original
x(k + 1) = Ah,h̄ x(k) + Bh,h̄ e(k) + Dh,h̄ ω(k) position quickly. Thus, it is urgent to judge whether the dynamics
(17) can maintain within the given boundedness over a finite-time
z(k) = Ch,h̄ x(k)
interval or not.
where
s
s
Ah,h̄ = hq (σ(kt )) hp (σ(k))[Ap + α(k)Bp Kq ] IV. MAIN RESULTS
q=1 p=1
In this section, we are in the position to establish some suffi-
s
s cient conditions to guarantee that the switched closed-loop fuzzy
Bh,h̄ = hq (σ(kt )) hp (σ(k))α(k)Bp Kq Ch,h̄ DPS (17) is stochastically stable with an H∞ noise attenuation
q=1 p=1 performance.
s Theorem 1: For given scalars ρ ≥ 0, λ ≥ 0, φ > 0, Q > 1,
= hq (σ(kt )) c1 > 0, ε1 > 0, ε2 > 0, N > 0, κ > 0, d > 0, and 2 > 0, the
q=1 switched closed-loop fuzzy DPS (17) is FTB with an H∞ noise
s
s
s attenuation level γ̃, if there exist ϑ > 0, γ > 0, ≥ 1, 0 < π1 <
hp (σ(k))Cp Dh,h̄ = hq (σ(kt )) hp (σ(k))Dp . 1, π2 ≥ 0, π̄3 > 0, βx0 > 0, βh0 > 0, and R > 0 and symmetric
p=1 q=1 p=1 matrices P1 > 0 and P2 > 0 for ∀p, q ∈ S1 , such that
Let hp and h̄q be the simplified expression of hp (σ(k)) and
Γpp < 0 (20)
hq (σ(kt )), respectively. Before proceeding further, we provide
some definitions for the following proof. Γpq + Γqp < 0, p < q (21)
Definition 1 ([23]): Given a time interval [0, N ], scalars c1 >
Ωp < 0 (22)
0 and c2 > 0, with c2 > c1 , and a weight matrix R > 0, the
switched closed-loop fuzzy DPS (17) with ω(k) < 2 is said to P1 ≤ P2 (23)
be FTB with (c1 , c2 , N, R, 2 ), if
P2 ≤ P1 (24)
xT (0)Rx(0) ≤ c1 ⇒ xT (k)Rx(k) < c2 . (18)
εs R < Ps < R, s = 1, 2 (25)
Definition 2 ([23]): The switched closed-loop fuzzy system
ln
(17) is said to be FTB with an H∞ noise attenuation level γ if 1) ln π̄3 + <0 (26)
the switched closed-loop fuzzy system (17) is FTB with ω(k) < φ
2
, and 2) under the zero-initial condition, the controlled output ln π̄2 − ln π̄3
0< ≤Q−1 (27)
z(k) holds − ln π̄1 + ln π̄3
∞ ∞
⎡ √ ⎤
−εs c2 π 2 π
3
c1 π 2 (1 − π3 )N −1 2
T 2 T
z (k)z(k) ≤ γ ω (k)ω(k). (19) ⎣ ∗ −π̄1λ
0 ⎦<0 (28)
k=0 k=0
∗ ∗ −π̄1λ (1 − π3 )
Remark 4: For portraying DoS attacks, Assumptions 1 and
2 are proposed to provide energy constraints related to the fre- where
quency and duration of DoS attacks. Limited energy generated
by DoS attacks not only makes controller design and synthesis ⎡ ⎤
meaningful, but also has a practical motivation. On the other Γ1 ϑ̄ΓT T
2 ϑ̄Γ3
hand, due to the mitigation ability to spread techniques and Γpq = ⎣ ∗ −P1−1 0 ⎦
high-pass filtering, DoS attacks usually occur intermittently ∗ ∗ −I
or randomly [24]. In this article, DoS attacks are performed 1 − κβh0
intermittently by the adversary. Γ1 = diag{−ϑ̄π̄1 P1 + Ψ, −βxo Ψ, −ϑ̄γ 2 I + R}
d
Remark 5: In the cases of α(k) = 1 and α(k) = 0, two
subsystems are implemented from the T-S fuzzy DPS (8). Due Γ2 = [Ap + Bp Kq Bp Kq Dp ], Γ3 = [Cp 0 0]
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on December 17,2024 at 03:02:49 UTC from IEEE Xplore. Restrictions apply.
CHENG et al.: NETWORK-BASED ADAPTIVE MULTIEVENT-TRIGGERED FUZZY DYNAMIC POSITIONING CONTROLLER DESIGN 617
⎡ ⎤ T
Ω1 ΩT2 ΩT3
s
s
s
s
Ωp = ⎣ ∗ −P2−1 0 ⎦ + ϑ̄ hp hq Γ3p ϑ̄ hp hq Γ3p ξ(k)
∗ ∗ −I p=1 q=1 p=1 q=1
Ω1 = diag{−π̄2 P2 + Ψ, −βxo Ψ, −γ 2 I}
s
s
+ hp hq xT (k)[ϑ̄(π1 − 1)P1 + Ψ]x(k)
1
2 = π̄2λ ρ , π
Ω2 = [Ap 0 Dp ], Ω3 = Γ3 , π 3 = π̄3 φ p=1 q=1
c1 = c1 + 1, π̄1 = 1 − π1 , π̄2 = 1 + π2
ϑ̄ = 1 + ϑ, 1−κβh0
− βx0 eT (k)Ψe(k)− ϑ̄γ 2 I− R ω T (k)ω(k) .
d
Proof: In the case that no DoS attacks, we give the Lyapunov (33)
function as
With the help of conditions (20) and (21), it renders
Vα1 (k) = VP1 (k) + Vβx (k) + Vβh (k) (29)
s
s
T 1 2 hp hq Γpq
where VP1 (k) = x (k)P1 x(k), Vβx (k) = 2 βx (k),
Vβh (k) =
1 s 2 p=1 q=1
2 β
q=1 h (k).
Following the trajectory of the switched closed-loop fuzzy
s
s−1
s
DPS (17), one has = h2p Γpp + hp hq (Γpq + Γqp ) < 0. (34)
p=1 p=1 q>p
ΔVP1 (k) = VP1 (k + 1) − VP1 (k)
⎡ T s s ⎤ In line with inequalities (33) and (34) and Schur complement
s
s lemma, it yields
= ξ T (k) ⎣ hp h̄q Γ2 P1 hp h̄q Γ2 ⎦ ξ(k)
p=1 q=1 p=1 q=1 ΔVα1 (k) ≤ −π1 Vα1 (k) − z T (k)z(k) + γ 2 ω T (k)ω(k). (35)
− xT (k)P1 x(k) (30) Note that inequality (35) is achieved based on the assumption
that no DoS attack appears. The following case will discuss the
where ξ(k) = [xT (k) eT (k) ω T (k)]T . switched closed-loop fuzzy DPS (17) subject to DoS attacks.
Moreover, combining the AMET mechanism (9) and the Similarly, we choose
adaptive law (10) renders
Vα0 (k) VP2 (k) + Vβx (k) (36)
ΔVβx (k) = Vβx (k + 1) − Vβx (k)
where VP2 (k) = xT (k)P2 x(k).
1 2 1 Following the switched closed-loop fuzzy DPS (17), one has
= β (k + 1) − βx2 (k)
2 x 2
ΔVP2 (k)
1 ⎡
= βx (k)Δβx (k) + (Δβx (k))2 T s s ⎤
2
s
s
= ξ T (k) ⎣ hp h̄q Ω2 P2 hp h̄q Ω2 ⎦ ξ(k)
1
= − β x 0 eT x (k)Ψex (k) p=1 q=1 p=1 q=1
βx (k)
− xT (k)P2 x(k)
≤ xT (k)Ψx(k) − βx 0 eT
x (k)Ψex (k). (31)
⎡ T s ⎤
We set κhq <| eh |< ϑhq , κ > 0, ϑ > 0 to represent the
s
asynchronization between the membership functions of the con- = ξ T (k) ⎣ hp Ω2 P2 hp Ω2 ⎦ ξ(k)
p=1 p=1
troller and that of the system, where κ is a sufficiently small
constant. Consider ω T (k)Rω(k) > d, one has − xT (k)P2 x(k). (37)
ΔVβh (k) = Vβh (k + 1) − Vβh (k) In the light of inequality (37), it yields
s
ΔVα0 (k) − π2 Vα0 (k) + z T (k)z(k) − γ 2 ω T (k)ω(k)
≤ (1 − κβh0 )hq (σ(k)) ⎡ T s
q=1 s
s
s = ξ (k) ⎣
T
hp Ω2i P2 hp Ω2i
1 − κβh0
≤ hp hq ω T (k)Rω(k). (32) p=1 p=1
d
p=1 q=1 T ⎤
s
s
Besides, from the switched closed-loop fuzzy DPS (17), we + hp Ω3i hp Ω3i ⎦ ξ(k)
can further obtain p=1 p=1
T 2 T
ΔVα1 (k) + π1 Vα1 (k) + z (k)z(k) − γ ω (k)ω(k)
s
⎡ T s s + hp xT (k) (− (1 + π2 ) P2 + Ψ) x(k)
s s p=1
≤ ξ T (k) ⎣ ϑ̄ hp hq Γ2pq P1 ϑ̄ hp hq Γ2pq
p=1 q=1 p=1 q=1 −βx0 eT (k)Ψe(k) − γ 2 ω T (k)ω(k) . (38)
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on December 17,2024 at 03:02:49 UTC from IEEE Xplore. Restrictions apply.
618 IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, VOL. 10, NO. 2, JUNE 2023
From condition (22), it can be verified that −z T (k − Dnon − 1) z (k − Dnon − 1)
s k−D on −1 2 T
hp Ωp < 0. (39) + π̄2 n γ ω (k − Dnon ) ω (k − Dnon )
k−D on −2
p=1
−z T (k − Dnon ) z (k − Dnon ) + π̄2 n
It yields from inequalities (38) and (39) that
× γ 2 ω T (k − Dnon + 1) ω (k − Dnon + 1)
ΔVα0 (k) ≤ π2 Vα0 (k) − z T (k)z(k) + γ 2 ω T (k)ω(k). (40)
−z T (k − Dnon + 1) z (k − Dnon + 1)
Let V (k) = Vα1 (k) when there is no DoS attacks; otherwise,
V (k) = Vα0 (k). Then, we set out to analyze the relationships + · · · + γ 2 ω T (k − 1)ω(k − 1)
between V (k) and V (0) for any k ≥ 0. First, inequalities (35) − z T (k − 1)z(k − 1)
and (40) are reconstructed as
..
Vα1 (k + 1) ≤ π̄1 Vα1 (k) − z T (k)z(k) + γ 2 ω T (k)ω(k) (41) .
Vα0 (k + 1) ≤ π̄2 Vα0 (k) − z T (k)z(k) + γ 2 ω T (k)ω(k) (42) k−(0,k) (0,k) (0,k)
k−1
≤ π̄1 π̄2 V (0) + π̄1k−1−a
where π̄1 = 1 − π1 and π̄2 = 1 + π2 . a=0
Conditions (23) and (24) can derive −(a,k−1) (a,k−1)
× π̄1 π̄2 (a,k−1)
Vα1 (k) ≤ Vα0 (k) (43)
× γ 2 ω T (a)ω(a) − z T (a)z(a) . (45)
Vα0 (k) ≤ Vα1 (k). (44)
/ [Dnon , Dnoff ), the identical result as
On the other hand, for k ∈
In the presence of DoS attacks, inequalities (41)–(44) can inequality (45) can be derived, with the specifics omitted here.
deduce that Then, from inequality (45), we get
V (k) ≤ π̄2 Vα0 (k − 1) + γ 2 ω T (k − 1)ω(k − 1)
k−1
k−(0,k) (0,k) (0,k)
T V (k) ≤ π̄1 π̄2 V (0) + π̄1k−1−a
− z (k − 1)z(k − 1)
a=0
≤ π̄22 Vα0 (k − 2) + π̄2 γ 2 ω T (k − 2)ω(k − 2) −(a,k−1) (a,k−1) (a,k−1)
× π̄1 π̄2
T 2
− π̄2 z (k − 2)z(k − 2) + γ ω (k − 1) T
× γ 2 ω T (a)ω(a) − z T (a)z(a) . (46)
T
× ω(k − 1) − z (k − 1)z(k − 1)
Besides, recalling Assumption 2, the following relationship
.. is tenable:
.
on on
−1 (k − (0, k)) ln π̄1 + (0, k) ln π̄2
Vα0 (Dnon ) + π̄2 γ 2 ω T (k − Dnon )
k−Dn k−Dn
≤ π̄2
1 1
×ω (k − Dnon ) − z T (k − Dnon ) z (k − Dnon ) ≤ λ (ln π̄2 − ln π̄1 ) + k 1 − ln π̄1 + ln π̄2 . (47)
Q Q
k−D on −2 2 T
+ π̄2 n γ ω (k − Dnon + 1)
Condition (27) implies that
× ω (k − Dnon + 1) − z T (k − Dnon + 1)
1 1
1− ln π̄1 + ln π̄2 ≤ ln π̄3 . (48)
×z (k − Dnon + 1)] + · · · + γ 2 ω T (k − 1) Q Q
× ω(k − 1) − z T (k − 1)z(k − 1) Keeping inequalities (47) and (48) in mind, one has
k−D on k−D on −1 2 T
≤ π̄2 n Vα1 (Dnon ) + π̄2 n γ ω (k − Dnon ) (k − (0, k)) ln π̄1 + (0, k) ln π̄2
×ω (k − Dnon ) − z T (k − Dnon ) z (k − Dnon ) ≤ k ln π̄3 + λ (ln π̄2 − ln π̄1 ) . (49)
k−D on −2 2 T
+ π̄2 n γ ω (k − Dnon + 1) Combining Assumption 2 and (27), it can be concluded that
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on December 17,2024 at 03:02:49 UTC from IEEE Xplore. Restrictions apply.
CHENG et al.: NETWORK-BASED ADAPTIVE MULTIEVENT-TRIGGERED FUZZY DYNAMIC POSITIONING CONTROLLER DESIGN 619
For k̄ ∈ [0, N − 1], inequality (50) and Assumption 1 can Due to π̄1 < 1, π̄2 ≥ 1, ≥ 1, (a, k̂) ≥ 0, and (a, k̂) ≥
figure out 0, one has
k̂
k̂
e(k̂−a−(a,k̂)) ln π̄1 +(a,k̂) ln π̄2 +(a,k̂) ln ω T (a)ω(a) e(k̂−a−(a,k̂)) ln π̄1 +(a,k̂) ln π̄2 +(a,k̂) ln z T (a)z(a)
a=0
a=0
k̂
k̂
≤ e e
ln
[λ(ln π̄2 −ln π̄1 )+ρln ] (ln π̄3 + φ )(k̂−a)
ω T (a)ω(a) ≥ e(k̂−a) ln π̄1 z T (a)z(a)
a=0
a=0
π̄ λ ρ (1 − π̄3 φ )N −1
1
k̂
(k̂−a) T
≤ 2λ 1
2
. (51) = π̄1 z (a)z(a). (56)
π̄1 1 − π̄3 φ a=0
Next, the H∞ noise attenuation performance under the zero z T (k)z(k) ≤ γ̃ 2 ω T (k)ω(k) (59)
boundary condition will be discussed. It can be deduced from k=0 k=0
1
inequality (46) that π̄2λ ρ 1−(π̄3 φ )N
where γ̃ 2 = γ 2 π̄1λ 1 .
1−π̄3 φ
k−1
k−1−a−(a,k−1) (a,k−1) (a,k−1) The relationships (53) and (59) with Definition 2 can ensure
V (k) ≤ π̄1 π̄2 that the switched closed-loop fuzzy DPS (17) is FTB with an
a=0
H∞ noise attenuation level γ̃. With this, the proof is finished.
× γ 2 ω T (a)ω(a) − z T (a)z(a) . (54) Theorem 1 establishes some rigorous restraints to guarantee
the switched closed-loop fuzzy DPS (17) is FTB with an H∞
Based on V (k) ≥ 0, inequality (54) means noise attenuation level γ̃; however, some nonlinearities existing
in Theorem 1 will be obstacles to the control strategy. Therefore,
k̂
k̂−a−(a,k̂) (a,k̂) (a,k̂) T
the following theorem is present to linearize the restraints in
π̄1 π̄2 z (a)z(a) Theorem 1.
a=0 Theorem 2: For given scalars ρ ≥ 0, λ ≥ 0, φ > 0, Q > 1,
k̂ c1 > 0, ε1 > 0, ε2 > 0, N > 0, κ > 0, d > 0, and 2 > 0, if,
= e(k̂−a−(a,k̂)) ln π̄1 +(a,k̂) ln π̄2 +(a,k̂) ln z T (a)z(a) for ∀p, q ∈ S1 , there exist γ > 0, ≥ 1, 0 < π1 < 1, π2 ≥ 0,
a=0 π̄3 > 0, βx0 > 0, βh0 > 0, and R > 0, symmetric matrices
X1 > 0 and X2 > 0, and matrices K̂q , Ψ 1 , and Ψ
2 , such that
k̂
k̂−a−(a,k̂) (a,k̂) (a,k̂) T linear matrix inequalities (LMIs) (26)–(28) and the following
≤ γ2 π̄1 π̄2 ω (a)ω(a)
LMIs hold:
a=0
Πpp < 0 (60)
k̂
2 (k̂−a−(a,k̂)) ln π̄1 +(a,k̂) ln π̄2 +(a,k̂) ln T
=γ e ω (a)ω(a). Πpq + Πqp < 0, p < q (61)
a=0
(55) Ξp < 0 (62)
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on December 17,2024 at 03:02:49 UTC from IEEE Xplore. Restrictions apply.
620 IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, VOL. 10, NO. 2, JUNE 2023
−X2 X2 Plant rule 1: IF x2 (k) is 0.5 and x3 (k) is 0.2, THEN
<0 (63)
∗ −X1
x(k + 1) = A1 x(k) + B1 u(k) + D1 ω(k)
−X1 X1 z(k) = C1 x(k).
<0 (64)
∗ −X2
Plant rule 2: IF x2 (k) is 0.5 and x3 (k) is −0.2, THEN
R < Xs < ε−1
s R, s = 1, 2 (65)
x(k + 1) = A2 x(k) + B2 u(k) + D2 ω(k)
where z(k) = C2 x(k).
Π1 Π2
Πpq = Plant rule 3: IF x2 (k) is −0.5 and x3 (k) is 0.2, THEN
∗ Π3
⎡ ⎤
−2π̄1 X1 + Ψ 1 0 0 x(k + 1) = A3 x(k) + B3 u(k) + D3 ω(k)
Π1 = ⎣ ∗ −βx0 Ψ1 0 ⎦
z(k) = C3 x(k).
2 1−κβh0
∗ ∗ −2γ I + R
⎡ T T T T
⎤ d
Plant rule 4: IF x2 (k) is −0.5 and x3 (k) is −0.2, THEN
2X1 Ap + 2K̂q Bp 2X1 Cp
Π2 = ⎣ 2K̂qT BpT 0 ⎦ x(k + 1) = A4 x(k) + B4 u(k) + D4 ω(k)
T
2Dp 0 z(k) = C4 x(k)
−X1 0 Ξ1 Ξ2
Π3 = , Ξp = with
∗ −I ∗ Ξ3
⎡ ⎤
−π̄2 X2 + Ψ 2 0 0 ⎡ ⎤
Ξ1 = ⎣ 2 0 ⎦ 0.4440 0.0037 0 0 0 0
∗ −βx0 Ψ ⎢ −0.0389 0.3564 0
⎢ 0 0 0⎥ ⎥
∗ ∗ −γ 2 I ⎢ 0.0564 0.0002 0.6320
⎡ ⎤ ⎢ 0 0 0⎥ ⎥
X2 AT T
X2 C p A1 = ⎢ 0.0684 0.0013 0
p
−X2 0 ⎢ 0.9996 0.0300 0 ⎥⎥
Ξ2 = ⎣ 0 0 ⎦ , Ξ3 = ⎣ −0.0039 0.0624 0 −0.0300 0.9996 0 ⎦
∗ −I
DpT 0 0.0035 0 0.0802 0 0 1
then the switched closed-loop fuzzy DPS (17) is FTB with ⎡ ⎤
π̄2λ ρ 1−(π̄3
1
φ )N
0.4440 −0.0037 0 0 0 0
H∞ noise attenuation performance γ̃ = π̄1λ 1 γ. ⎢ 0.0389 0.3564 0 0 0 0⎥
1−π̄3 φ ⎢ ⎥
⎢ −0.0564 0.0002 0.6320 0 0 0⎥
Besides, the controller gain and the weight matrix of AMET A2 = ⎢ ⎥
⎢ 0.0684 −0.0013 0 0.9996 −0.0300 0 ⎥
mechanism are figured out by ⎢ ⎥
⎣ 0.0039 0.0624 0 0.0300 0.9996 0 ⎦
1 X −1 = X −1 Ψ
Kq = K̂q X1−1 , Ψ = X1−1 Ψ 2 X −1 . (66) −0.0035 0 0.0802 0 0 1
1 2 2
⎡ ⎤
Proof: By definining X1 = P1−1 and X2 = P2−1 and premul- 0.4440 0.0037 0 0 0 0
tiplying and postmultiplying both sides of inequalities (20) and ⎢ −0.0389 0.3564 0 0 0 0⎥
⎢ ⎥
(21) with diag{X1 , X1 , I, I, I}, and both sides of inequality ⎢ −0.0564 −0.0002 0.6320 0 0 0⎥
A3 = ⎢ ⎥
(22) with diag{X2 , X2 , I, I, I} and their transposes, respec- ⎢ 0.0684 0.0013 0 0.9996 0.0300 0 ⎥
⎢ ⎥
tively, conditions (60)–(62) can then be guaranteed. ⎣ −0.0039 0.0624 0 −0.0300 0.9996 0 ⎦
On the other hand, inequalities (21)–(24) are tenable by −0.0035 0 0.0802 0 0 1
inequalities (63)–(65). This ends the proof. ⎡ ⎤
0.4440 −0.0037 0 0 0 0
⎢ 0.0389 0.3564 0 0 0 0⎥
V. SIMULATION RESULTS ⎢ ⎥
⎢ 0.0564 −0.0002 0.6320 0 0 0⎥
A4 = ⎢ ⎥
In this part, the availability of the proposed dynamic po- ⎢ 0.0684 −0.0013 0 0.9996 −0.0300 0 ⎥
⎢ ⎥
sitioning controller for the switched closed-loop fuzzy DPS ⎣ 0.0039 0.0624 0 0.0300 0.9996 0 ⎦
(17) will be represented. The specific parameters of the 0.0035 0 0.0802 0 0 1
USV are m11 = 5.2 kg, m22 = 1.6 kg, m33 = 1.7 kg · m2 , ⎡ ⎤ ⎡ ⎤
d11 = 42.8 kg/s, d22 = 16.5 kg/s, and d33 = 7.8 kg · m2 /s. 0.0132 0 0.1923 0 0
From the actual operation situations of the USV, we assume sway ⎢ −0.0005 0 ⎥ ⎢ 0 0.6250 0 ⎥
⎢ ⎥ ⎢ ⎥
speed x2 (k) ∈ [−0.5, 0.5] and the yaw rate x3 (k) ∈ [−0.2, 0.2]. ⎢ 0.0007 0.0472 ⎥ ⎢ 0 0.5882 ⎥
Bp = ⎢ ⎥ Dp = ⎢ 0 ⎥,
By utilizing the fuzzy technology proposed in [30] to determine ⎢ 0.0007 0 ⎥ ⎢ 0 0 0 ⎥
⎢ ⎥ ⎢ ⎥
maximum and minimum values of x2 (k) and x3 (k), we obtain ⎣ −0.0000 0 ⎦ ⎣ 0 0 0 ⎦
the fuzzy sets as 0.0000 0.0025 0 0 0
M1 (x2 (k)) = 0.5 + x2 (k), M2 (x2 (k)) = 0.5 − x2 (k) p = 1, 2, 3, 4.
Besides, we give ρ = 5, λ = 5, φ = 6, and Q = 3 to build
N1 (x3 (k)) = 0.5 + 2.5x3 (k), N2 (x3 (k)) = 0.5 − 2.5x3 (k).
DoS attacks. Conditions (27) and (28) can be ensured by setting
Set sampling period Th = 0.05 s, then the pth rule of the plant = 1, π1 = 0.01, π2 = 0.08, and π̄3 = 0.02. Other parameters
is described as as follows. are provided as ϑ = 1, κ = 0.02, d = 0.2, = 2.9, c1 = 402,
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on December 17,2024 at 03:02:49 UTC from IEEE Xplore. Restrictions apply.
CHENG et al.: NETWORK-BASED ADAPTIVE MULTIEVENT-TRIGGERED FUZZY DYNAMIC POSITIONING CONTROLLER DESIGN 621
⎡ ⎤T
−54.6846 2.3772
⎢ 461.7760 −90.1992 ⎥
⎢ ⎥
⎢ −0.190.2 −13.6156 ⎥
K1 = ⎢ ⎥
⎢ −171.1667 −21.6620 ⎥
⎢ ⎥
⎣ 4767.3473 −929.3688 ⎦
−8.6895 −73.0923
⎡ ⎤T
−101.5312 11.0057
⎢ −540.3068 87.9651 ⎥ Fig. 6. State trajectories (position and velocity) in the closed-loop case
⎢ ⎥ without DoS attack.
⎢ 2.7612 −13.8672 ⎥
K2 = ⎢ ⎥
⎢ −508.5127 26.6260 ⎥
⎢ ⎥
⎣ −5566.5 910.0995 ⎦
25.6533 −76.1095
⎡ ⎤T
−57.5108 3.6244
⎢ 543.7766 −79.8642 ⎥
⎢ ⎥
⎢ 1.4527 −13.8752 ⎥
K3 = ⎢ ⎥
⎢ −150.1461 −26.8549 ⎥
⎢ ⎥
⎣ 5609.3236 −8224.9715 ⎦
8.8311 −74.9059
⎡ ⎤T
−93.6458 10.6403
⎢ −471.6240 99.2396 ⎥
⎢ ⎥
⎢ 1.0805 −13.9980 ⎥
K4 = ⎢ ⎥ .
⎢ −480.9800 37.4743 ⎥
⎢ ⎥ Fig. 7. Release instance and release intervals.
⎣ 4852.5740 1025.3948 ⎦
5.8228 −76.8687
(17) still has a satisfactory H∞ noise attenuation performance,
The initial state of the switched closed-loop fuzzy DPS (17) although DoS attacks appear. Fig. 6 reveals the state trajectories
is given as x(0) = [2m/s 0m/s 0rad/s 18m 0m 1.6rad]T . of the switched closed-loop fuzzy DPS (17) without DoS attacks.
The disturbances of surge, sway, and yaw motions ω1 (k), ω2 (k), Comparing Fig. 6 with Fig. 5, we find that the system without
and ω3 (k) are set as ω1 (k) = 1.3 sin(k), ω2 (k) = 0.22 cos(k), DoS attack has superior performance than that with DoS attacks.
and ω3 (k) = cos(1.58 k). Fig. 7 describes the ET release instants and release intervals
The simulation results are shown in Figs. 4–10. As shown in by the designed AMET mechanism. Only “1” indicates that
Fig. 4, the T-S fuzzy DPS (8) with DoS attacks is unstable. Fig. 5 there exists a triggering event. It is apparent from Fig. 7 that
depicts the state trajectories of the switched closed-loop fuzzy the communication resource is saved markedly. Besides, the
DPS (17) with DoS attacks. The switched closed-loop fuzzy DPS dynamically regulated βx (k) and βh (k) are embodied in Fig. 8.
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on December 17,2024 at 03:02:49 UTC from IEEE Xplore. Restrictions apply.
622 IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, VOL. 10, NO. 2, JUNE 2023
TABLE I
COMPARING RESULTS FOR FOUR DIFFERENT DOS ATTACKS
TABLE II
COMPARING RESULTS FOR THREE DIFFERENT MECHANISMS
A. Effects of DoS OFF/ON Transitions on the System B. Seeking a Compromise Between the System
Performance and Triggering Times Performance Level and Economy of Communication
Here, we employ SUM = 30 Resources
k=0 x(k) to reflect the H∞
noise attenuation performance level, and T count to signify From Table II, we find that the TT mechanism in [31] furnishes
the triggering times. Obviously, the smaller value SUM sug- the best H∞ noise attenuation performance at the cost of the most
gests the better H∞ noise attenuation performance within the communication space. By contrast, the ET mechanism in [32]
time interval [0,30]. Fig. 10 exhibits the state trajectories of occupies the least amount of communication resources subject
the switched closed-loop fuzzy DPS (17) with four differ- to the worse H∞ noise attenuation performance. Note that the
ent DoS OFF/ON transitions. It is worth noting that the DoS ATEM proposed in this work can seek a compromise between
OFF/ON transitions increase while retaining the original attacks the system performance level and economy of communication
for the control experiment. It can be concluded that the DoS resources, which promotes the system performance prominently
attacks destroy the stability of dynamics severely. Besides, just by leading to fewer triggering times.
from Table I, we also find that as the DoS OFF/ON transi- Remark 7: As seen in Figs. 4 and 5, the state trajectories of
tions increase, the H∞ noise attenuation performance level the T-S fuzzy DPS (8) with/without control actions are subjected
will get worse and more events will be triggered, which im- to DoS attacks plotted in Fig. 10(b). We can find (0, 30) = 5
plies that malicious attacks can damage the normal running of and (0, 30) = 8. Thus, Assumptions 1 and 2 are tenable with
dynamics. given parameters (ρ, λ, φ, Q).
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on December 17,2024 at 03:02:49 UTC from IEEE Xplore. Restrictions apply.
CHENG et al.: NETWORK-BASED ADAPTIVE MULTIEVENT-TRIGGERED FUZZY DYNAMIC POSITIONING CONTROLLER DESIGN 623
VI. CONCLUSION [15] Q. Jia and W. K. Tang, “Event-triggered protocol for the consensus
of multi-agent systems with state-dependent nonlinear coupling,” IEEE
The objective of this article is to design an AMET fuzzy Trans. Circuits Syst. I, Reg. Papers, vol. 65, no. 2, pp. 723–732, Feb. 2018.
dynamic positioning controller for USVs against DoS attacks [16] P. Cheng, S. He, V. Stojanovic, X. Luan, and F. Liu, “Fuzzy fault de-
tection for Markov jump systems with partly accessible hidden informa-
within a finite-time interval. The proposed AMET mechanism tion: An event-triggered approach,” IEEE Trans. Cybern., vol. 52, no. 8,
can improve the data transmission efficiency by dynamically ad- pp. 7352–7361, Aug. 2022.
justing the ET thresholds. Note that the AMET mechanism takes [17] M. Ghaderi, K. Gheitasi, and W. Lucia, “A blended active detection
strategy for false data injection attacks in cyber-physical systems,” IEEE
into account the asynchrony between the membership functions Trans. Control Netw. Syst., vol. 8, no. 1, pp. 168–176, Mar. 2020.
of the controller and that of the system is embedded into the [18] C. Wu, W. Yao, W. Pan, G. Sun, J. Liu, and L. Wu, “Secure control for
AMET mechanism, which can reduce the conservatism of the cyber-physical systems under malicious attacks,” IEEE Trans. Control
Netw. Syst., vol. 9, no. 2, pp. 775–788, Jun. 2022.
control scheme due to mismatched membership functions. Then, [19] Z. Feng and G. Hu, “Secure cooperative event-triggered control of linear
through the use of LMI technology, the criteria of the switched multiagent systems under DoS attacks,” IEEE Trans. Control Syst. Tech-
closed-loop fuzzy DPS are FTB with an H∞ noise attenuation nol., vol. 28, no. 3, pp. 741–752, May 2020.
[20] P.-B. Wang, X.-M. Ren, and D.-D. Zheng, “Event-triggered resilient
performance is achieved. To conclude, we analyze the dynamic control for cyber-physical systems under periodic DoS jamming attacks,”
positioning performance and verify the correctness and validity Inf. Sci., vol. 577, pp. 541–556, 2021.
of the proposed control scheme under the AMET mechanism [21] L. Gao, F. Li, and J. Fu, “Output-based decentralised event-triggered
dissipative control of NCSS under aperiodic dos attacks,” Int. J. Syst. Sci.,
and DoS attacks. In this article, DoS attacks are assumed to be vol. 52, no. 10, pp. 2003–2019, 2021.
of finite energy by Assumptions 1 and 2. However, how do obtain [22] W.-J. Chang, W. Chang, and H.-H. Liu, “Model-based fuzzy modeling
critical conditions under which DoS attacks cannot stabilize the and control for autonomous underwater vehicles in the horizontal plane,”
J. Mar. Sci. Technol., vol. 11, pp. 155–163, 2003.
system? This meaningful topic will be discussed in our further [23] C. De Persis and P. Tesi, “Input-to-state stabilizing control under denial-
research. of-service,” IEEE Trans. Autom. Control, vol. 60, no. 11, pp. 2930–2944,
Nov. 2015.
[24] P. Tague, M. Li, and R. Poovendran, “Mitigation of control channel
jamming under node capture attacks,” IEEE Trans. Mobile Comput., vol. 8,
REFERENCES no. 9, pp. 1221–1234, Sep. 2009.
[25] L.-Y. Hao, H. Zhang, H. Li, and T.-S. Li, “Sliding mode fault-tolerant
[1] Z. Peng, J. Wang, D. Wang, and Q.-L. Han, “An overview of recent
control for unmanned marine vehicles with signal quantization and time-
advances in coordinated control of multiple autonomous surface vehicles,”
delay,” Ocean Eng., vol. 215, 2020, Art. no. 107882.
IEEE Trans. Ind. Informat., vol. 17, no. 2, pp. 732–745, Feb. 2021.
[26] S. He and F. Liu, “Finite-time H∞ fuzzy control of nonlinear jump systems
[2] J. Almeida, C. Silvestre, and A. Pascoal, “Cooperative control of multiple
with time delays via dynamic observer-based state feedback,” IEEE Trans.
surface vessels in the presence of ocean currents and parametric model un-
Fuzzy Syst., vol. 20, no. 4, pp. 605–614, Aug. 2012.
certainty,” Int. J. Robust Nonlinear Control, vol. 20, no. 14, pp. 1549–1565,
[27] P. Cheng, S. He, X. Luan, and F. Liu, “Finite-region asynchronous H∞
2010.
control for 2D Markov jump systems,” Automatica, vol. 129, 2021,
[3] L.-Y. Hao, H. Zhang, T.-S. Li, B. Lin, and C. P. Chen, “Fault tolerant
Art. no. 109590.
control for dynamic positioning of unmanned marine vehicles based on
[28] P. Cheng, S. He, J. Cheng, X. Luan, and F. Liu, “Asynchronous output
TS fuzzy model with unknown membership functions,” IEEE Trans. Veh.
feedback control for a class of conic-type nonlinear hidden Markov jump
Technol., vol. 70, no. 1, pp. 146–157, Jan. 2021.
systems within a finite-time interval,” IEEE Trans. Syst., Man, Cybern.
[4] L. Liu, W. Zhang, D. Wang, and Z. Peng, “Event-triggered extended state
Syst., vol. 51, no. 12, pp. 7644–7651, Dec. 2021.
observers design for dynamic positioning vessels subject to unknown sea
[29] C. Possieri and A. R. Teel, “Stochastic robust simulation and stability
loads,” Ocean Eng., vol. 209, 2020, Art. no. 107242.
properties of chemical reaction networks,” IEEE Trans. Control Netw.
[5] L. Ma, Y.-L. Wang, and Q.-L. Han, “Event-triggered dynamic positioning
Syst., vol. 6, no. 1, pp. 2–12, Mar. 2019.
for mass-switched unmanned marine vehicles in network environments,”
[30] H. O. Wang, K. Tanaka, and M. F. Griffin, “An approach to fuzzy control of
IEEE Trans. Cybern., vol. 52, no. 5, pp. 3159–3171, May 2022.
nonlinear systems: Stability and design issues,” IEEE Trans. Fuzzy Syst.,
[6] T. Takagi and M. Sugeno, “Fuzzy identification of systems and its ap-
vol. 4, no. 1, pp. 14–23, Feb. 1996.
plications to modeling and control,” IEEE Trans. Syst., Man, Cybern.,
[31] Z.-G. Wu, Y. Shen, P. Shi, Z. Shu, and H. Su, “H∞ control for 2-D Markov
vol. SMC-15, no. 1, pp. 116–132, Jan./Feb. 1985.
jump systems in Roesser model,” IEEE Trans. Autom. Control, vol. 64,
[7] J. Cheng, Y. Shan, J. Cao, and J. H. Park, “Nonstationary control for t–S
no. 1, pp. 427–432, Jan. 2019.
fuzzy Markovian switching systems with variable quantization density,”
[32] H. Shen, L. Su, Z.-G. Wu, and J. H. Park, “Reliable dissipative control
IEEE Trans. Fuzzy Syst., vol. 29, no. 6, pp. 1375–1385, Jun. 2020.
for Markov jump systems using an event-triggered sampling information
[8] H. Liu, Y. Pan, J. Cao, Y. Zhou, and H. Wang, “Positivity and stability anal-
scheme,” Nonlinear Anal., Hybrid Syst., vol. 25, pp. 41–59, 2017.
ysis for fractional-order delayed systems: A TS fuzzy model approach,”
IEEE Trans. Fuzzy Syst., vol. 29, no. 4, pp. 927–939, Apr. 2021. Peng Cheng received the M.E. degree in con-
[9] Y. Xue, B.-C. Zheng, and X. Yu, “Robust sliding mode control for TS fuzzy trol engineering from the School of Electrical
systems via quantized state feedback,” IEEE Trans. Fuzzy Syst., vol. 26, Engineering and Automation, Anhui University,
no. 4, pp. 2261–2272, Aug. 2018. Hefei, China, in 2021. He is currently working
[10] X. Liang, J. Xu, and H. Zhang, “Optimal control and stabilization for toward the Ph.D. degree in control science and
networked control systems with asymmetric information,” IEEE Trans. engineering with the Department of Automa-
Control Netw. Syst., vol. 7, no. 3, pp. 1355–1365, Sep. 2020. tion, Shanghai Jiao Tong University, Shanghai,
[11] E. Semsar-Kazerooni and K. Khorasani, “Team consensus for a network China.
of unmanned vehicles in presence of actuator faults,” IEEE Trans. Control His current research interests include un-
Syst. Technol., vol. 18, no. 5, pp. 1155–1161, Sep. 2010. manned marine vehicles, 2-D systems, adaptive
[12] Y.-L. Wang and Q.-L. Han, “Network-based modelling and dynamic output control, stochastic control, asynchronous con-
feedback control for unmanned marine vehicles in network environments,” trol, and fault detection.
Automatica, vol. 91, pp. 43–53, 2018. Dr. Cheng is a Reviewer of many international journals, such as IEEE
[13] N. Meskin and K. Khorasani, “Actuator fault detection and isolation for TRANSACTIONS ON AUTOMATIC CONTROL, IEEE TRANSACTIONS ON CY-
a network of unmanned vehicles,” IEEE Trans. Autom. Control, vol. 54, BERNETICS, IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS:
no. 4, pp. 835–840, Apr. 2009. SYSTEMS, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS
[14] S. Liet al., “Event-trigger heterogeneous nonlinear filter for wide-area BRIEFS, International Journal of Robust and Nonlinear Control, Me-
measurement systems in power grid,” IEEE Trans. Smart Grid, vol. 10, chanical Systems and Signal Processing, IEEE SYSTEMS JOURNAL, IET
no. 3, pp. 2752–2764, May 2018. Cyber-Physical Systems: Theory Applications, and Nonlinear Dynamics.
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on December 17,2024 at 03:02:49 UTC from IEEE Xplore. Restrictions apply.
624 IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, VOL. 10, NO. 2, JUNE 2023
Chengming Zhang received the B.E. degree in Shuping He (Senior Member, IEEE) received
naval architecture and ocean engineering and the B.S. degree in automation and the Ph.D.
the M.E. degree in design and manufacture of degree in control theory and control engineering
ships and marine structures from Harbin Engi- from Jiangnan University, Wuxi, China, in 2005
neering University, Harbin, China, in 2017 and and 2011, respectively.
2020, respectively. He is currently working to- From 2010 to 2011, he was a Visiting Scholar
ward the Ph.D. degree in control science and with the Control Systems Center, School of
engineering with the Department of Automa- Electrical and Electronic Engineering, Univer-
tion, Shanghai Jiao Tong University, Shanghai, sity of Manchester, Manchester, U.K. He is cur-
China. rently a Professor with the School of Electrical
His research interests include reinforcement Engineering and Automation, Anhui University,
learning, ship motion control, and decision-making in multiagent envi- Hefei, China. He has authored or coauthored more than 90 papers in
ronments. professional journals, conference proceedings, and technical reports in
the given areas, and coauthored a book about stochastic systems. His
current research interests include stochastic systems and stochastic
control, finite-time control theory, reinforcement learning and adaptive
optimal control, system modeling methods and applications, signal pro-
Wei Xie (Member, IEEE) received the M.Sc. de- cessing, and artificial intelligence methods.
gree in electromechanical engineering and the Dr. He was the recipient of the Distinguished Youth Funds Award of
Ph.D. degree in electrical and computer engi- Anhui Province and the Baosteel Excellent Teacher Award. He is an
neering from the University of Macau, Macau, Associate Editor for IEEE ACCESS and an Youth Editor of the Journal of
China, in 2016 and 2021, respectively. Central South University.
He is currently an Assistant Professor with
the Department of Automation, Shanghai Jiao
Tong University, Shanghai, China. His research
interests include nonlinear control of marine and
aerial vehicles, and coordinated control of multi-
vehicle systems.
Authorized licensed use limited to: UNIVERSITY TEKNOLOGI MALAYSIA. Downloaded on December 17,2024 at 03:02:49 UTC from IEEE Xplore. Restrictions apply.