1,158 research outputs found
Engineering Emergence: A Survey on Control in the World of Complex Networks
Complex networks make an enticing research topic that has been increasingly attracting researchers from control systems and various other domains over the last two decades. The aim of this paper was to survey the interest in control related to complex networks research over time since 2000 and to identify recent trends that may generate new research directions. The survey was performed for Web of Science, Scopus, and IEEEXplore publications related to complex networks. Based on our findings, we raised several questions and highlighted ongoing interests in the control of complex networks.publishedVersio
Control Strategies of DC Microgrids Cluster:A Comprehensive Review
Multiple microgrids (MGs) close to each other can be interconnected to construct a cluster to enhance reliability and flexibility. This paper presents a comprehensive and comparative review of recent studies on DC MG clusters’ control strategies. Different schemes regarding the two significant control aspects of networked DC MGs, namely DC-link voltage control and power flow control between MGs, are investigated. A discussion about the architecture configuration of DC MG clusters is also provided. All advantages and limitations of various control strategies of recent studies are discussed in this paper. Furthermore, this paper discusses three types of consensus protocol with different time boundaries, including linear, finite, and fixed. Based on the main findings from the reviewed studies, future research recommendations are proposed
Pinning Cluster Synchronization in Linear Hybrid Coupled Delayed Dynamical Networks
The problem on cluster synchronization will be investigated for a class of delayed dynamical networks based on pinning control strategy. Through utilizing the combined convex technique and Kronecker product, two sufficient conditions can be derived to ensure the desired synchronization when the designed feedback controller is employed to each cluster. Moreover, the inner coupling matrices are unnecessarily restricted to be diagonal and the controller design can be converted into solving a series of linear matrix inequalities (LMIs), which greatly improve the present methods. Finally, two numerical examples are provided to demonstrate the effectiveness and reduced conservatism
An Overview of Recent Progress in the Study of Distributed Multi-agent Coordination
This article reviews some main results and progress in distributed
multi-agent coordination, focusing on papers published in major control systems
and robotics journals since 2006. Distributed coordination of multiple
vehicles, including unmanned aerial vehicles, unmanned ground vehicles and
unmanned underwater vehicles, has been a very active research subject studied
extensively by the systems and control community. The recent results in this
area are categorized into several directions, such as consensus, formation
control, optimization, task assignment, and estimation. After the review, a
short discussion section is included to summarize the existing research and to
propose several promising research directions along with some open problems
that are deemed important for further investigations
Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning
The secret keys of critical network authorities - such as time, name,
certificate, and software update services - represent high-value targets for
hackers, criminals, and spy agencies wishing to use these keys secretly to
compromise other hosts. To protect authorities and their clients proactively
from undetected exploits and misuse, we introduce CoSi, a scalable witness
cosigning protocol ensuring that every authoritative statement is validated and
publicly logged by a diverse group of witnesses before any client will accept
it. A statement S collectively signed by W witnesses assures clients that S has
been seen, and not immediately found erroneous, by those W observers. Even if S
is compromised in a fashion not readily detectable by the witnesses, CoSi still
guarantees S's exposure to public scrutiny, forcing secrecy-minded attackers to
risk that the compromise will soon be detected by one of the W witnesses.
Because clients can verify collective signatures efficiently without
communication, CoSi protects clients' privacy, and offers the first
transparency mechanism effective against persistent man-in-the-middle attackers
who control a victim's Internet access, the authority's secret key, and several
witnesses' secret keys. CoSi builds on existing cryptographic multisignature
methods, scaling them to support thousands of witnesses via signature
aggregation over efficient communication trees. A working prototype
demonstrates CoSi in the context of timestamping and logging authorities,
enabling groups of over 8,000 distributed witnesses to cosign authoritative
statements in under two seconds.Comment: 20 pages, 7 figure
- …