1,158 research outputs found

    Engineering Emergence: A Survey on Control in the World of Complex Networks

    Get PDF
    Complex networks make an enticing research topic that has been increasingly attracting researchers from control systems and various other domains over the last two decades. The aim of this paper was to survey the interest in control related to complex networks research over time since 2000 and to identify recent trends that may generate new research directions. The survey was performed for Web of Science, Scopus, and IEEEXplore publications related to complex networks. Based on our findings, we raised several questions and highlighted ongoing interests in the control of complex networks.publishedVersio

    Control Strategies of DC Microgrids Cluster:A Comprehensive Review

    Get PDF
    Multiple microgrids (MGs) close to each other can be interconnected to construct a cluster to enhance reliability and flexibility. This paper presents a comprehensive and comparative review of recent studies on DC MG clusters’ control strategies. Different schemes regarding the two significant control aspects of networked DC MGs, namely DC-link voltage control and power flow control between MGs, are investigated. A discussion about the architecture configuration of DC MG clusters is also provided. All advantages and limitations of various control strategies of recent studies are discussed in this paper. Furthermore, this paper discusses three types of consensus protocol with different time boundaries, including linear, finite, and fixed. Based on the main findings from the reviewed studies, future research recommendations are proposed

    Pinning Cluster Synchronization in Linear Hybrid Coupled Delayed Dynamical Networks

    Get PDF
    The problem on cluster synchronization will be investigated for a class of delayed dynamical networks based on pinning control strategy. Through utilizing the combined convex technique and Kronecker product, two sufficient conditions can be derived to ensure the desired synchronization when the designed feedback controller is employed to each cluster. Moreover, the inner coupling matrices are unnecessarily restricted to be diagonal and the controller design can be converted into solving a series of linear matrix inequalities (LMIs), which greatly improve the present methods. Finally, two numerical examples are provided to demonstrate the effectiveness and reduced conservatism

    An Overview of Recent Progress in the Study of Distributed Multi-agent Coordination

    Get PDF
    This article reviews some main results and progress in distributed multi-agent coordination, focusing on papers published in major control systems and robotics journals since 2006. Distributed coordination of multiple vehicles, including unmanned aerial vehicles, unmanned ground vehicles and unmanned underwater vehicles, has been a very active research subject studied extensively by the systems and control community. The recent results in this area are categorized into several directions, such as consensus, formation control, optimization, task assignment, and estimation. After the review, a short discussion section is included to summarize the existing research and to propose several promising research directions along with some open problems that are deemed important for further investigations

    Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning

    Get PDF
    The secret keys of critical network authorities - such as time, name, certificate, and software update services - represent high-value targets for hackers, criminals, and spy agencies wishing to use these keys secretly to compromise other hosts. To protect authorities and their clients proactively from undetected exploits and misuse, we introduce CoSi, a scalable witness cosigning protocol ensuring that every authoritative statement is validated and publicly logged by a diverse group of witnesses before any client will accept it. A statement S collectively signed by W witnesses assures clients that S has been seen, and not immediately found erroneous, by those W observers. Even if S is compromised in a fashion not readily detectable by the witnesses, CoSi still guarantees S's exposure to public scrutiny, forcing secrecy-minded attackers to risk that the compromise will soon be detected by one of the W witnesses. Because clients can verify collective signatures efficiently without communication, CoSi protects clients' privacy, and offers the first transparency mechanism effective against persistent man-in-the-middle attackers who control a victim's Internet access, the authority's secret key, and several witnesses' secret keys. CoSi builds on existing cryptographic multisignature methods, scaling them to support thousands of witnesses via signature aggregation over efficient communication trees. A working prototype demonstrates CoSi in the context of timestamping and logging authorities, enabling groups of over 8,000 distributed witnesses to cosign authoritative statements in under two seconds.Comment: 20 pages, 7 figure
    • …
    corecore