Current Issue

Vol. 11,  No. 8, 2024

Display Method:
PERSPECTIVE
Automation 5.0: The Key to Systems Intelligence and Industry 5.0
Ljubo Vlacic, Hailong Huang, Mariagrazia Dotoli, Yutong Wang, Petros A. Ioannou, Lili Fan, Xingxia Wang, Raffaele Carli, Chen Lv, Lingxi Li, Xiaoxiang Na, Qing-Long Han, Fei-Yue Wang
2024, 11(8): 1723-1727. doi: 10.1109/JAS.2024.124635
Abstract(56) HTML (17) PDF(12)
Abstract:
REVIEWS
The First Five Years of a Phase Theory for Complex Systems and Networks
Dan Wang, Wei Chen, Li Qiu
2024, 11(8): 1728-1743. doi: 10.1109/JAS.2024.124542
Abstract(137) HTML (19) PDF(48)
Abstract:

In this paper, we review the development of a phase theory for systems and networks in its first five years, represented by a trilogy: Matrix phases and their properties; The MIMO LTI system phase response, its physical interpretations, the small phase theorem, and the sectored real lemma; The synchronization of a multi-agent network using phase alignment. Towards the end, we also summarize a list of ongoing research on the phase theory and speculate what will happen in the next five years.

A Survey on Type-3 Fuzzy Logic Systems and Their Control Applications
Oscar Castillo, Fevrier Valdez, Patricia Melin, Weiping Ding
2024, 11(8): 1744-1756. doi: 10.1109/JAS.2024.124530
Abstract(134) HTML (23) PDF(51)
Abstract:

In this paper, we offer a review of type-3 fuzzy logic systems and their applications in control. The main objective of this work is to observe and analyze in detail the applications in the control area using type-3 fuzzy logic systems. In this case, we review their most important applications in control and other related topics with type-3 fuzzy systems. Intelligent algorithms have been receiving increasing attention in control and for this reason a review in this area is important. This paper reviews the main applications that make use of Intelligent Computing methods. Specifically, type-3 fuzzy logic systems. The aim of this research is to be able to appreciate, in detail, the applications in control systems and to point out the scientific trends in the use of Intelligent Computing techniques. This is done with the construction and visualization of bibliometric networks, developed with VosViewer Software, which it is a free Java-based program, mainly intended to be used for analyzing and visualizing bibliometric networks. With this tool, we can create maps of publications, authors, or journals based on a co-citation network or construct maps of keywords, countries based on a co-occurrence networks, research groups, etc.

Privacy Protection for Blockchain-Based Healthcare IoT Systems: A Survey
Minfeng Qi, Ziyuan Wang, Qing-Long Han, Jun Zhang, Shiping Chen, Yang Xiang
2024, 11(8): 1757-1776. doi: 10.1109/JAS.2022.106058
Abstract(762) HTML (22) PDF(123)
Abstract:

To enable precision medicine and remote patient monitoring, internet of healthcare things (IoHT) has gained significant interest as a promising technique. With the widespread use of IoHT, nonetheless, privacy infringements such as IoHT data leakage have raised serious public concerns. On the other side, blockchain and distributed ledger technologies have demonstrated great potential for enhancing trustworthiness and privacy protection for IoHT systems. In this survey, a holistic review of existing blockchain-based IoHT systems is conducted to indicate the feasibility of combining blockchain and IoHT in privacy protection. In addition, various types of privacy challenges in IoHT are identified by examining general data protection regulation (GDPR). More importantly, an associated study of cutting-edge privacy-preserving techniques for the identified IoHT privacy challenges is presented. Finally, several challenges in four promising research areas for blockchain-based IoHT systems are pointed out, with the intent of motivating researchers working in these fields to develop possible solutions.

PAPERS
A Deep Residual PLS for Data-Driven Quality Prediction Modeling in Industrial Process
Xiaofeng Yuan, Weiwei Xu, Yalin Wang, Chunhua Yang, Weihua Gui
2024, 11(8): 1777-1785. doi: 10.1109/JAS.2024.124578
Abstract(67) HTML (16) PDF(23)
Abstract:

Partial least squares (PLS) model is the most typical data-driven method for quality-related industrial tasks like soft sensor. However, only linear relations are captured between the input and output data in the PLS. It is difficult to obtain the remaining nonlinear information in the residual subspaces, which may deteriorate the prediction performance in complex industrial processes. To fully utilize data information in PLS residual subspaces, a deep residual PLS (DRPLS) framework is proposed for quality prediction in this paper. Inspired by deep learning, DRPLS is designed by stacking a number of PLSs successively, in which the input residuals of the previous PLS are used as the layer connection. To enhance representation, nonlinear function is applied to the input residuals before using them for stacking high-level PLS. For each PLS, the output parts are just the output residuals from its previous PLS. Finally, the output prediction is obtained by adding the results of each PLS. The effectiveness of the proposed DRPLS is validated on an industrial hydrocracking process.

Enhancing Evolutionary Algorithms With Pattern Mining for Sparse Large-Scale Multi-Objective Optimization Problems
Sheng Qi, Rui Wang, Tao Zhang, Weixiong Huang, Fan Yu, Ling Wang
2024, 11(8): 1786-1801. doi: 10.1109/JAS.2024.124548
Abstract(87) HTML (12) PDF(22)
Abstract:

Sparse large-scale multi-objective optimization problems (SLMOPs) are common in science and engineering. However, the large-scale problem represents the high dimensionality of the decision space, requiring algorithms to traverse vast expanse with limited computational resources. Furthermore, in the context of sparse, most variables in Pareto optimal solutions are zero, making it difficult for algorithms to identify non-zero variables efficiently. This paper is dedicated to addressing the challenges posed by SLMOPs. To start, we introduce innovative objective functions customized to mine maximum and minimum candidate sets. This substantial enhancement dramatically improves the efficacy of frequent pattern mining. In this way, selecting candidate sets is no longer based on the quantity of non-zero variables they contain but on a higher proportion of non-zero variables within specific dimensions. Additionally, we unveil a novel approach to association rule mining, which delves into the intricate relationships between non-zero variables. This novel methodology aids in identifying sparse distributions that can potentially expedite reductions in the objective function value. We extensively tested our algorithm across eight benchmark problems and four real-world SLMOPs. The results demonstrate that our approach achieves competitive solutions across various challenges.

Optimal Positioning Strategy for Multi-Camera Zooming Drones
Manuel Vargas, Carlos Vivas, Teodoro Alamo
2024, 11(8): 1802-1818. doi: 10.1109/JAS.2024.124455
Abstract(88) HTML (24) PDF(16)
Abstract:

In the context of multiple-target tracking and surveillance applications, this paper investigates the challenge of determining the optimal positioning of a single autonomous aerial vehicle or agent equipped with multiple independently-steerable zooming cameras to effectively monitor a set of targets of interest. Each camera is dedicated to tracking a specific target or cluster of targets. The key innovation of this study, in comparison to existing approaches, lies in incorporating the zooming factor for the onboard cameras into the optimization problem. This enhancement offers greater flexibility during mission execution by allowing the autonomous agent to adjust the focal lengths of the on-board cameras, in exchange for varying real-world distances to the corresponding targets, thereby providing additional degrees of freedom to the optimization problem. The proposed optimization framework aims to strike a balance among various factors, including distance to the targets, verticality of viewpoints, and the required focal length for each camera. The primary focus of this paper is to establish the theoretical groundwork for addressing the non-convex nature of the optimization problem arising from these considerations. To this end, we develop an original convex approximation strategy. The paper also includes simulations of diverse scenarios, featuring varying numbers of onboard tracking cameras and target motion profiles, to validate the effectiveness of the proposed approach.

Constraints Separation Based Evolutionary Multitasking for Constrained Multi-Objective Optimization Problems
Kangjia Qiao, Jing Liang, Kunjie Yu, Xuanxuan Ban, Caitong Yue, Boyang Qu, Ponnuthurai Nagaratnam Suganthan
2024, 11(8): 1819-1835. doi: 10.1109/JAS.2024.124545
Abstract(49) HTML (20) PDF(16)
Abstract:

Constrained multi-objective optimization problems (CMOPs) generally contain multiple constraints, which not only form multiple discrete feasible regions but also reduce the size of optimal feasible regions, thus they propose serious challenges for solvers. Among all constraints, some constraints are highly correlated with optimal feasible regions; thus they can provide effective help to find feasible Pareto front. However, most of the existing constrained multi-objective evolutionary algorithms tackle constraints by regarding all constraints as a whole or directly ignoring all constraints, and do not consider judging the relations among constraints and do not utilize the information from promising single constraints. Therefore, this paper attempts to identify promising single constraints and utilize them to help solve CMOPs. To be specific, a CMOP is transformed into a multitasking optimization problem, where multiple auxiliary tasks are created to search for the Pareto fronts that only consider a single constraint respectively. Besides, an auxiliary task priority method is designed to identify and retain some high-related auxiliary tasks according to the information of relative positions and dominance relationships. Moreover, an improved tentative method is designed to find and transfer useful knowledge among tasks. Experimental results on three benchmark test suites and 11 real-world problems with different numbers of constraints show better or competitive performance of the proposed method when compared with eight state-of-the-art peer methods.

Novel Adaptive Memory Event-Triggered-Based Fuzzy Robust Control for Nonlinear Networked Systems via the Differential Evolution Algorithm
Wei Qian, Yanmin Wu, Bo Shen
2024, 11(8): 1836-1848. doi: 10.1109/JAS.2024.124419
Abstract(93) HTML (13) PDF(30)
Abstract:

This article mainly investigates the fuzzy optimization robust control issue for nonlinear networked systems characterized by the interval type-2 (IT2) fuzzy technique under a differential evolution algorithm. To provide a more reasonable utilization of the constrained communication channel, a novel adaptive memory event-triggered (AMET) mechanism is developed, where two event-triggered thresholds can be dynamically adjusted in the light of the current system information and the transmitted historical data. Sufficient conditions with less conservative design of the fuzzy imperfect premise matching (IPM) controller are presented by introducing the Wirtinger-based integral inequality, the information of membership functions (MFs) and slack matrices. Subsequently, under the IPM policy, a new MFs intelligent optimization technique that takes advantage of the differential evolution algorithm is first provided for IT2 Takagi-Sugeno (T-S) fuzzy systems to update the fuzzy controller MFs in real-time and achieve a better system control effect. Finally, simulation results demonstrate that the proposed control scheme can obtain better system performance in the case of using fewer communication resources.

Fixed-Time Gradient Flows for Solving Constrained Optimization: A Unified Approach
Xinli Shi, Xiangping Xu, Guanghui Wen, Jinde Cao
2024, 11(8): 1849-1864. doi: 10.1109/JAS.2023.124089
Abstract(62) HTML (18) PDF(20)
Abstract:

The accelerated method in solving optimization problems has always been an absorbing topic. Based on the fixed-time (FxT) stability of nonlinear dynamical systems, we provide a unified approach for designing FxT gradient flows (FxTGFs). First, a general class of nonlinear functions in designing FxTGFs is provided. A unified method for designing first-order FxTGFs is shown under Polyak-Łjasiewicz inequality assumption, a weaker condition than strong convexity. When there exist both bounded and vanishing disturbances in the gradient flow, a specific class of nonsmooth robust FxTGFs with disturbance rejection is presented. Under the strict convexity assumption, Newton-based FxTGFs is given and further extended to solve time-varying optimization. Besides, the proposed FxTGFs are further used for solving equation-constrained optimization. Moreover, an FxT proximal gradient flow with a wide range of parameters is provided for solving nonsmooth composite optimization. To show the effectiveness of various FxTGFs, the static regret analyses for several typical FxTGFs are also provided in detail. Finally, the proposed FxTGFs are applied to solve two network problems, i.e., the network consensus problem and solving a system linear equations, respectively, from the perspective of optimization. Particularly, by choosing component-wisely sign-preserving functions, these problems can be solved in a distributed way, which extends the existing results. The accelerated convergence and robustness of the proposed FxTGFs are validated in several numerical examples stemming from practical applications.

Distributed Fault Estimation for Nonlinear Systems With Sensor Saturation and Deception Attacks Using Stochastic Communication Protocols
Weiwei Sun, Xinci Gao, Lusong Ding, Xiangyu Chen
2024, 11(8): 1865-1876. doi: 10.1109/JAS.2023.124161
Abstract(90) HTML (20) PDF(29)
Abstract:

This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation. For the distributed estimation structure under consideration, an estimation center is not necessary, and the estimator derives its information from itself and neighboring nodes, which fuses the state vector and the measurement vector. In an effort to cut down data conflicts in communication networks, the stochastic communication protocol (SCP) is employed so that the output signals from sensors can be selected. Additionally, a recursive security estimator scheme is created since attackers randomly inject malicious signals into the selected data. On this basis, sufficient conditions for a fault estimator with less conservatism are presented which ensure an upper bound of the estimation error covariance and the mean-square exponential boundedness of the estimating error. Finally, a numerical example is used to show the reliability and effectiveness of the considered distributed estimation algorithm.

LETTERS
A Probabilistic Approach for Predicting Vessel Motion
Qi Hu, Jingyi Liu, Zongyu Zuo
2024, 11(8): 1877-1879. doi: 10.1109/JAS.2024.124536
Abstract(80) HTML (22) PDF(30)
Abstract:
Data-Driven Adaptive Predictive Control Method With Autotuned Weighting Factor for Nonlinear Systems Using Triangular Dynamic Linearization
Zhong-Hua Pang, Yumo Zhang, Xueyuan Sun, Shengnan Gao, Guo-Ping Liu
2024, 11(8): 1880-1882. doi: 10.1109/JAS.2023.124179
Abstract(57) HTML (16) PDF(25)
Abstract:
Stability Analysis of a Class of Nonlinear Fractional Differential Systems With Riemann-Liouville Derivative
Ruoxun Zhang, Shiping Yang, Shiwen Feng
2024, 11(8): 1883-1885. doi: 10.1109/JAS.2016.7510199
Abstract(29) HTML (21) PDF(4)
Abstract:
A Novel Scalable Fault-Tolerant Control Design for DC Microgrids With Nonuniform Faults
Aimin Wang, Minrui Fei, Dajun Du, Yang Song
2024, 11(8): 1886-1888. doi: 10.1109/JAS.2023.123918
Abstract(166) HTML (21) PDF(35)
Abstract:
Statistical Process Monitoring Based on Ensemble Structure Analysis
Likang Shi, Chudong Tong, Ting Lan, Xuhua Shi
2024, 11(8): 1889-1891. doi: 10.1109/JAS.2017.7510877
Abstract(46) HTML (12) PDF(9)
Abstract:
Data-Driven Active Disturbance Rejection Control of Plant-Protection Unmanned Ground Vehicle Prototype: A Fuzzy Indirect Iterative Learning Approach
Tao Chen, Ruiyuan Zhao, Jian Chen, Zichao Zhang
2024, 11(8): 1892-1894. doi: 10.1109/JAS.2023.124158
Abstract(158) HTML (19) PDF(48)
Abstract: