αp | 0.06 | 0.07 | 0.08 | 0.09 | 0.1 |
θmax | 0.5843 | 0.5459 | 0.5080 | 0.4708 | 0.4341 |
Real-time and accurate network-wide traffic volume estimation/detection is an essential part of urban transport system planning and management. As it is impractical to install detectors on every road segment of the city network, methods on the network-wide flow estimation based on limited detector data are of considerable significance. However, when the plan of detector deployment is uncertain, existing methods are unsuitable to be directly used. In this study, a transfer component analysis (TCA)-based network-wide volume estimation model, considering the different traffic volume distributions of road segments and transforming traffic features into common data space, is proposed. Moreover, this study applied taxi GPS (global positioning system) data and cellular signaling data with the same spatio-temporal coverage to improve feature extraction. In numerical experiments, the robustness and stability of the proposed network-wide estimation method outperformed other baselines in the two subnetworks selected from the urban centers and suburbs.
Citation: Jiping Xing, Yunchi Wu, Di Huang, Xin Liu. Transfer learning for robust urban network-wide traffic volume estimation with uncertain detector deployment scheme[J]. Electronic Research Archive, 2023, 31(1): 207-228. doi: 10.3934/era.2023011
[1] | Guodong Zhao, Haitao Li, Ting Hou . Survey of semi-tensor product method in robustness analysis on finite systems. Mathematical Biosciences and Engineering, 2023, 20(6): 11464-11481. doi: 10.3934/mbe.2023508 |
[2] | Mingxia Gu, Zhiyong Yu, Haijun Jiang, Da Huang . Distributed consensus of discrete time-varying linear multi-agent systems with event-triggered intermittent control. Mathematical Biosciences and Engineering, 2024, 21(1): 415-443. doi: 10.3934/mbe.2024019 |
[3] | Siyu Li, Shu Li, Lei Liu . Fuzzy adaptive event-triggered distributed control for a class of nonlinear multi-agent systems. Mathematical Biosciences and Engineering, 2024, 21(1): 474-493. doi: 10.3934/mbe.2024021 |
[4] | Raquel Caballero-Águila, María J. García-Ligero, Aurora Hermoso-Carazo, Josefa Linares-Pérez . Unreliable networks with random parameter matrices and time-correlated noises: distributed estimation under deception attacks. Mathematical Biosciences and Engineering, 2023, 20(8): 14550-14577. doi: 10.3934/mbe.2023651 |
[5] | Wenjing Wang, Jingjing Dong, Dong Xu, Zhilian Yan, Jianping Zhou . Synchronization control of time-delay neural networks via event-triggered non-fragile cost-guaranteed control. Mathematical Biosciences and Engineering, 2023, 20(1): 52-75. doi: 10.3934/mbe.2023004 |
[6] | Yilin Tu, Jin-E Zhang . Event-triggered impulsive control for input-to-state stability of nonlinear time-delay system with delayed impulse. Mathematical Biosciences and Engineering, 2025, 22(4): 876-896. doi: 10.3934/mbe.2025031 |
[7] | Qiushi Wang, Hongwei Ren, Zhiping Peng, Junlin Huang . Dynamic event-triggered consensus control for nonlinear multi-agent systems under DoS attacks. Mathematical Biosciences and Engineering, 2024, 21(2): 3304-3318. doi: 10.3934/mbe.2024146 |
[8] | Xinggui Zhao, Bo Meng, Zhen Wang . Event-triggered integral sliding mode control for uncertain networked linear control systems with quantization. Mathematical Biosciences and Engineering, 2023, 20(9): 16705-16724. doi: 10.3934/mbe.2023744 |
[9] | Xiaoxiao Dong, Huan Qiao, Quanmin Zhu, Yufeng Yao . Event-triggered tracking control for switched nonlinear systems. Mathematical Biosciences and Engineering, 2023, 20(8): 14046-14060. doi: 10.3934/mbe.2023627 |
[10] | Tingting Cai, Yuqian Wang, Liang Wang, Zongying Tang, Jun Zhou . Analysis and event-triggered control for a stochastic epidemic model with logistic growth. Mathematical Biosciences and Engineering, 2023, 20(2): 2243-2260. doi: 10.3934/mbe.2023105 |
Real-time and accurate network-wide traffic volume estimation/detection is an essential part of urban transport system planning and management. As it is impractical to install detectors on every road segment of the city network, methods on the network-wide flow estimation based on limited detector data are of considerable significance. However, when the plan of detector deployment is uncertain, existing methods are unsuitable to be directly used. In this study, a transfer component analysis (TCA)-based network-wide volume estimation model, considering the different traffic volume distributions of road segments and transforming traffic features into common data space, is proposed. Moreover, this study applied taxi GPS (global positioning system) data and cellular signaling data with the same spatio-temporal coverage to improve feature extraction. In numerical experiments, the robustness and stability of the proposed network-wide estimation method outperformed other baselines in the two subnetworks selected from the urban centers and suburbs.
Networked control systems (NCSs) have been widely studied and applied in many fields in the past few decades, including DC motor [1], intelligent transportation [2], teleoperation [3], etc. Compared with traditional feedback control systems, the components in NCSs transmit data packets through communication networks, which reduce wiring requirements, save installation costs, and improve the maintainability [4]. However, public and open communication networks are vulnerable to malicious attacks by hackers. Cyber attacks can not only disrupt data transmission but also indirectly cause controlled plants to malfunction and stop operating by injecting fake data [5]. For example, in 2011, the "Stuxnet" virus invaded Iran's Bolshevik nuclear power plant, causing massive damage to its nuclear program [6]; in 2015, the "BlackEnergy" trojan virus successfully attacked Ukraine's power companies and cut off the local power supply [7]. Therefore, the security of NCS under cyber attacks has received increasing attention, and many illuminating results have been reported (see surveys [8,9]).
Current cyber-attacks may be roughly divided into two categories: denial of service (DoS) attacks and deception attacks. DoS attacks can cause network congestion or paralysis by sending a large amount of useless request information, thereby blocking the transmission of signals [10,11]. Compared to the simple and direct blocking of signal transmission in DoS attacks, deception attacks are more subtle and difficult to detect. More specifically, deception attacks compromise data integrity by hijacking sensors to tamper with measurement data and control signals. In some cases, they may be more damaging than DoS attacks [12]. Therefore, many researchers have conducted analysis and synthesis of NCSs under deception attacks. For instance, Du et al. [13] presented stability conditions for wireless NCSs subjected to deception attacks on the data link layer, and determined the maximum permissible deception attack time. Hu et al. [14] examined discrete-time stochastic NCSs with deception attacks and packet loss, and gave security analysis and controller design. In [15], Gao et al. investigated nonlinear NCSs faced with several types of deception attacks, and proposed asynchronous observer design strategies. Notably, the existing literature characterized the random occurrence of deception attacks by introducing a stochastic variable that obeys the Bernoulli distribution with a fixed probability, which is over-limited in reality.
In previous literature on NCSs, control tasks are often executed in a fixed/variable period, giving rise to the so-called sampled-data control (time-triggered control) [16,17,18,19]. Although this control scheme is simple and easy to implement, it has two shortcomings. On the one hand, to stabilize the system in some extreme scenarios, it is necessary to set a small sampling interval, which results in a large number of redundant data packets and may cause network congestion. On the other hand, due to the lack of a judgment condition for the system state, even if the stabilization of the system is achieved, the sampling task will not stop, which is undoubtedly a waste of network resources. In contrast to the time-triggered scheme (TTS), the event-triggered scheme (ETS) can significantly conquer these shortcomings and save communication resources [20,21,22]. In the ETS, the execution frequency of the control task is limited by introducing an event generator. That is, only when the change in system state exceeds a given threshold, an event will be generated and the controller will execute [23,24,25]. Based on the above facts, a multitude of studies have been conducted on event-triggered control for NCSs suffering from deception attacks (see [26,27,28,29,30]). However, most ETS designs under deception attacks adopted the periodic event-triggered scheme (PETS). The PETS can avoid the Zeno phenomenon by periodically checking the event trigger conditions but inevitably lose some system state information. To resolve this contradiction, Selivanov et al. proposed a switched event-triggered scheme (SETS) [31]. By switching between TTS and continuous event triggering [32], the SETS not only avoids the Zeno phenomenon, but also fully utilizes the system information, thereby further reducing the number of event triggers [33,34,35,36].
Inspired by the above facts, the subject of this study is SETS-based stabilization for NCSs under random deception attacks. By means of the Lyapunov function method, a sufficient condition is developed to assure that the close-loop system is mean square exponentially (MSE) stable. Then, a co-design of the trigger and feedback-gain matrices for the SETS-based controller is presented in terms of linear matrix inequalities (LMIs), which can be checked easily. The major contributions can be outlined as follows: 1) A new SETS (NSETS), which additionally introduces a term concerning the last event triggering time, is designed. In contrast to the SETS in [31], the NSETS can further reduce the number of trigger times while maintaining performance. 2) Compared with the existing literature (see, e.g., [28,29,30]), the occurrence of deception attacks under our consideration is assumed to be a time-dependent stochastic variable that obeys the Bernoulli distribution with probability uncertainty, which is more realistic. 3) Stability analysis criterion and computationally tractable controller design strategy are presented by utilizing a piecewise-defined Lyapunov function together with a few matrix inequalities.
Notation. In this paper, we use Rm×n and Rm to denote m×n-dimensional real matrices and m-dimensional Euclidean space, respectively. For each Z∈Rm×n, we use Z<0 (Z≤0) to indicate that the matrix Z is real symmetric negative definite (semi-negative definite), S{Z} to denote the sum of Z+ZT, and λM(Z) and λm(Z) to represent the maximum eigenvalue and the minimum eigenvalue of the symmetric matrix Z, respectively. We use ||⋅||, Pr, and E to represent the Euclidean norm, probability operator, and expectation operator, respectively. In addition, we use diag{⋅} to denote a diagonal matrix and ∗ to denote a symmetric term in a symmetric matrix.
In this section, we first give the system description, deception-attack model, and NSETS design, and then formulate the switched closed-loop system.
Consider a linear time-invariant system (LTIS) described as
˙x(t)=Ax(t)+Bu(t). | (2.1) |
In system (2.1), A and B are known system matrices of suitable dimensions, x(t)∈Rnx, u(t)∈Rnu, denote the state, control input, respectively.
In the event-triggered NCS, an event generator is used to determine whether the lately sampled data should be forwarded to the controller. When cyber-attacks do not happen, any state signals that satisfy the triggering condition can be received successfully by the controller, and the corresponding control signals can be received successfully by the actuator. However, when the communication network is subject to deception attacks, the control signal will be substituted with fake data, the performance of the controller will inevitably decline, and even lead to system instability in some extreme cases.
In view of the openness of network protocols, it is quite possible that attackers can inject the information transmitted in NCSs with fake data. In this paper, we suppose that the deception signal d(x(t)) satisfying Assumption 1 will totally substitute the original transmission data.
Assumption 1. [26] The signal of deception attack d(x(t)) satisfies
||d(x(t))||≤||Dx(t)||, | (2.2) |
where D is a real constant matrix.
To demonstrate the randomness of deception attacks, a Bernoulli variable β(t)∈{0,1} with uncertain probability is introduced:
Pr(β(t)=1)=α+Δα(t), Pr(β(t)=0)=1−α−Δα(t). | (2.3) |
Clearly, E{β(t)}=α+Δα(t). Then, the signal transmitted under deception attacks can be presented as
˜x(t)=(1−β(t))d(x(t))+β(t)x(t). |
Remark 2.1. Motivated by [26,27,28,29,30], the deception attacks are assumed to be randomly occurring. However, different from these references, this paper supposes that the probability of deception attack occurrence allows for some uncertainty; that is, there is a small positive constant ˉα such that ||Δα(t)||≤ˉα.
Taking into consideration the constrained network resources, a NSETS is devised as follows:
tσ+1=min{t≥tσ+h∣[x(t)−x(tσ)]TM[x(t)−x(tσ)]>ε1xT(t)Mx(t)+ε2xT(tσ)Mx(tσ)}, | (2.4) |
where tσ is the last triggering moment with σ∈N, M>0 is a trigger matrix to be determined, h>0 and εi (i∈{1,2}) are predefined parameters that stand for the waiting interval and triggering thresholds, respectively.
Remark 2.2. Inspired by [31,33,34,35,36], the SETS is used in this paper. However, unlike the existing SETSs, the proposed NSETS introduces an additional term ε2xT(tσ)Mx(tσ) into the trigger condition to more efficiently utilize the state information at the current moment and previous triggering moment. The introduced ε2xT(tσ)Mx(tσ) increases the difficulty of the event triggering and, therefore, prolongs the interval between triggered events.
In accordance with the proposed NSETS, the control input of system (2.1) under deception attacks with uncertain probability can be designed as
u(t)=K(1−β(t))d(x(t))+Kβ(t)x(tσ), | (2.5) |
where K is the feedback gain that remains to be determined.
Then, we introduce T1σ=[tσ,tσ+h) and T2σ=[tσ+h,tσ+1), under event-triggered controller (2.5), system (2.1) can be characterized as
{˙x(t)=[A+BKβ(t)]x(t)+BK(1−β(t))d(x(t))−BKβ(t)∫ttσ˙x(s)ds,t∈T1σ,˙x(t)=[A+BKβ(t)]x(t)+BK(1−β(t))d(x(t))+BKβ(t)e(t),t∈T2σ, | (2.6) |
where σ∈N and e(t)=x(tσ)−x(t) satisfying
eT(t)Me(t)≤ε1xT(t)Mx(t)+ε2xT(tσ)Mx(tσ). | (2.7) |
Remark 2.3. Unlike general ETSs, the controlled system with the SETS needs to switch between periodic sampling and continuous event triggering to ensure the performance of the system. Inspired by [31], we denote the sampling error and triggering error by ∫ttσ˙x(s)ds and e(t), respectively, and rewrite the controlled system as switched system (2.6) with two different modes.
Next, we introduce a definition of mean square exponential stability and several lemmas.
Definition 2.1 ([37]). System (2.6) is said to be MSE stable if there exist two scalars c1>0 and c2>0 such that
E{||x(t)||}≤c1e−c2tE{||x0||},∀t≥0, |
Lemma 2.2 ([38]). For any positive definite matrix S∈ Rn×n, scalars a, b (a>b), and a vector function η:[a,b]→Rn, we have
[∫abη(δ)dδ]TS[∫abη(δ)dδ]≤(a−b)∫abηT(δ)Sη(δ)dδ. |
Lemma 2.3 ([39]). For given a, b∈ Rn, and positive definite matrix Q∈Rn×n, we have
2aTb≤aTQa+bTQ−1b. |
Lemma 2.4 ([40]). For a prescribed constant ϑ>0 and real matrices Π, Xi, Yi, and Zi(i=1,…,n), if
[ΠXY∗Z]<0 |
holds, where XY=[X1+ϑY1,X2+ϑY2,…,Xn+ϑYn] and Z=diag{S{−ϑZ1},S{−ϑZ2},…,S{−ϑZn}}, then we have
Π+n∑i=1S{XiZ−1iYTi}<0. | (2.8) |
Now, the issue of event-triggered control in response to deception attacks can be expressed more specifically as follows: given a LTIS in (2.1), determine the NSETS-based controller in (2.5) such that, for all admissible deception attacks d(x(t)), the switched closed-loop system in (2.6) is MSE stable.
In this section, we first establish the exponential stability criterion for system (2.1), then develop a joint design method for the trigger matrix and feedback gain.
To be consistent with the switched closed-loop system (2.6), we construct the following Lyapunov function:
V(t)={V1(t)=Vp(t)+Vq(t)+Vu(t),t∈T1σ,V2(t)=Vp(t),t∈T2σ | (3.1) |
where
Vp(t)=xT(t)Px(t),Vq(t)=(tσ+h−t)∫ttσe−2θ(t−s)˙xT(s)Q˙x(s)ds,Vu(t)=(tσ+h−t)[x(t)x(tσ)]T[S{U1}2−U1+U2∗S{U12−U2}][x(t)x(tσ)], |
and P, Q are symmetric positive matrices, U1, U2 are general matrices, and θ is a positive constant.
Based on Lyapunov function (3.1), an exponential stability criterion of system (2.6) can be established, which is provided as follows:
Theorem 3.1. For given positive scalars ε1, ε2, h, θ, α, ˉα and matrices K, D, under the NSETS (2.4) and random deception attacks, system (2.6) is MSE stable, if there exist symmetric matrices P>0, Q>0, M>0, Λi>0 (i∈{1,2,3,4}), and general matrices U1, U2, W1, W2, W3, N1,1, N2,1, N1,2, N2,2, such that
Σ=[P+hS{U12}−hU1+hU2∗−hS{U2−U12}]>0, | (3.2) |
Σ1=[Ω11Ω12∗Ω3]<0, | (3.3) |
Σ2=[Ω21Ω22∗Ω3]<0, | (3.4) |
Σ3=[Ω31Ω32∗Ω33]<0 | (3.5) |
hold true, where
Ω11=[Ω11,1Ω11,2Ω11,3Ω1,4∗Ω12,2Ω12,3Ω2,4∗∗Ω13,30∗∗∗−I]+ˉα2RT1(Λ1+Λ2)R1,R1=[I00−I],Ω21=[Ω21,1Ω21,2Ω21,3Ω1,4Ω1,5∗−S{N2,1}WT2Ω2,4Ω2,5∗∗Ω23,30hWT3∗∗∗−I0∗∗∗∗Ω5,5]+ˉα2RT2(Λ1+Λ2)R2,R2=[I00−I−hI],R3=[I0−II],Ω31=[Ω31,1Ω31,2Ω31,3Ω31,4∗−S{N2,2}Ω32,3Ω32,4∗∗Ω33,30∗∗∗−I]+ˉα2RT3(Λ3+Λ4)R3,Ω12=[ΩT1,60000ΩT2,700]T,Ω32=[Ω3T1,50000Ω3T2,600]T,Ω22=[Ω120], Ω3=[−Λ100−Λ2],Ω33=[−Λ300−Λ4],Ω11,1=S{NT1,1(A+BKα)−W1+(2θh−1)U12}+2θP+DTD,Ω21,1=Ω11,1−θhS{U1},Ω11,2=P−W2−NT1,1+h2S{U1}+(A+BKα)TN2,1,Ω21,2=Ω11,2−h2S{U1},Ω11,3=WT1−W3+(1−2θh)(U1−U2), Ω21,3=Ω11,3+2θh(U1−U2),Ω1,4=(1−α)NT1,1BK, Ω1,5=h(WT1−αNT1,1BK), Ω1,6=NT1,1BK,Ω12,2=hQ−S{N2,1}, Ω12,3=WT2−h(U1−U2),Ω2,4=(1−α)NT2,1BK, Ω2,5=h(WT2−αNT2,1BK),Ω2,7=NT2,1BK, Ω5,5=−he−2θhQ,Ω13,3=S{W3+(2θh−1)(U12−U2)},Ω23,3=Ω13,3−S{2θh(U12−U2)},Ω31,1=2θP+S{NT1,2(A+BKα)}+(ε1+ε2)M+DTD,Ω31,2=P−NT1,2+(A+BKα)TN2,2, Ω31,3=NT1,2BKα+ε2M,Ω31,4=NT1,2BK(1−α), Ω31,5=NT1,2BK, Ω32,3=αNT2,2BK,Ω32,4=(1−α)NT2,2BK, Ω32,6=NT2,2BK, Ω33,3=(ε2−1)M. |
Proof. Since
Vp(t)+Vu(t)=xT(t)Px(t)+(tσ+h−t)[x(t)x(tσ)]T[S{U1}2−U1+U2∗S{U12−U2}][x(t)x(tσ)]=tσ+h−th[x(t)x(tσ)]TΣ[x(t)x(tσ)]+t−tσh[x(t)x(tσ)]T[P0∗0][x(t)x(tσ)], | (3.6) |
which, in conjunction with P>0 and Σ>0, ensures the positive definiteness of Vp(t) + Vu(t). From (3.1) and (3.6), we have
min{λm(P),λm(Σ)}||x(t)||2≤V(t). | (3.7) |
For any t∈T1σ, σ∈N, differentiating V1(t) along the trajectories of the system (2.6) and taking mathematical expectations on it yields:
E{˙V1(t)}=E{˙Vp(t)}+E{˙Vq(t)}+E{˙Vu(t)}, |
where
E{˙Vp(t)}=E{−2θVp(t)}+2θxT(t)Px(t)+2xT(t)P˙x(t),E{˙Vq(t)}=E{−2θVq(t)}−∫ttσe−2θ(t−s)˙xT(s)Q˙x(s)ds+(tσ+h−t)˙xT(t)Q˙x(t),E{˙Vu(t)}=E{−2θVu(t)}+(tσ+h−t)[˙xT(t)S{U1}x(t)+2˙xT(t)(−U1+U2)x(tσ)]+[2θ(tσ+h−t)−1]×[xT(t)S{U1}2x(t)+2xT(t)(−U1+U2)x(tσ)+xT(tσ)S{U12−U2}x(tσ)]. |
Thus
E{˙V1(t)}≤E{−2θV1(t)}+2θxT(t)Px(t)+2xT(t)P˙x(t)+(tσ+h−t)˙xT(t)Q˙x(t)−e−2θh∫ttσ˙xT(s)Q˙x(s)ds+(tσ+h−t)[˙xT(t)S{U1}x(t)+2˙xT(t)(−U1+U2)x(tσ)]+[2θ(tσ+h−t)−1]×[xT(t)S{U1}2x(t)+2xT(t)(−U1+U2)x(tσ)+xT(tσ)S{U12−U2}x(tσ)]. | (3.8) |
Denote
ϕ(t)=1t−tσ∫ttσ˙x(s)ds, |
where the case that ϕ(t)|t=tσ can be understood as limt→tσϕ(t)=˙x(tσ) [41]. Then, utilizing Lemma 2.2 gives
−∫ttσ˙x(s)Q˙x(s)ds≤−(t−tσ)ϕT(t)Qϕ(t). | (3.9) |
Furthermore, using the Newton-Leibniz formula and the expectation of (2.6), we can write
0=2[xT(t)WT1+˙xT(t)WT2+xT(tσ)WT3]×[−x(t)+x(tσ)+(t−tσ)ϕ(t)], | (3.10) |
0=2[xT(t)NT1,1+˙xT(t)NT2,1][−˙x(t)+Ax(t)+BK(α+Δα(t))x(t)+BK(1−α−Δα(t))d(x(t))−(t−tσ)BK(α+Δα(t))ϕ(t)]. | (3.11) |
Setting ς1(t)=col{x(t),˙x(t),x(tσ),d(x(t))}, ς2(t)= col{x(t),˙x(t),x(tσ),d(x(t)),ϕ(t)}, by employing Lemma 2.3, for positive definite matrices Λ1 and Λ2, we can write the following inequalities:
2xT(t)NT1,1BKΔα(t)[x(t)−d(x(t))−(t−tσ)ϕ(t)]=2xT(t)NT1,1BKΔα(t)[tσ+h−thR1ς1(t)+t−tσhR2ς2(t)]≤tσ+h−thˉα2ςT1(t)RT1Λ1R1ς1(t)+t−tσhˉα2ςT2(t)RT2Λ1R2ς2(t)+xT(t)NT1,1BKΛ−11KTBTN1,1x(t). | (3.12) |
Similarly,
2˙xT(t)NT2,1BKΔα(t)[x(t)−d(x(t))−(t−tσ)ϕ(t)]≤tσ+h−thˉα2ςT1(t)RT1Λ2R1ς1(t)+t−tσhˉα2ςT2(t)RT2Λ2R2ς2(t)+˙xT(t)NT2,1BKΛ−12KTBTN2,1˙x(t). | (3.13) |
Moreover, by using Assumption 1, we can derive
xT(t)DTDx(t)−dT(x(t))d(x(t))≥0. | (3.14) |
By using inequalities (3.8)–(3.14), we have
E{˙V1(t)}+2θE{V1(t)}≤tσ+h−thςT1(t)Ω11ς1(t)+t−tσhςT2(t)Ω21ς2(t)+xT(t)NT1,1BKΛ−11KTBTN1,1x(t)+˙xT(t)NT2,1BKΛ−12KTBTN2,1˙x(t), |
which, in conjunction with the Schur complement, Σ1<0, and Σ2<0, guarantees that
E{˙V1(t)}+2θE{V1(t)}≤0. | (3.15) |
Denote ξ3(t)=col{x(t),˙x(t),e(t),d(x(t))}. Then, in a similar way to the above proof, it is not hard to obtain
E{˙V2(t)}≤−2θE{V2(t)}+2θxT(t)Px(t)+xT(t)DTDx(t)+2xT(t)P˙x(t)+2[xT(t)NT1,2+˙xT(t)NT2,2]×[−˙x(t)+Ax(t)+BK(α+Δα(t))x(t)+BK(1−α−Δα(t))d(x(t))+BK(α+Δα(t))e(t)]+ε1xT(t)Mx(t)+ε2[e(t)+x(t)]TM[e(t)+x(t)]−eT(t)Me(t)−dT(x(t))d(x(t)). | (3.16) |
By using Lemma 2.3, for given positive definite matrices Λ3 and Λ4, we can obtain
2xT(t)NT1,2BKΔα(t)ς3(t)≤xT(t)NT1,2BKΛ−13KTBTN1,2x(t)+ˉα2ςT3(t)RT3Λ3R3ς3(t), | (3.17) |
2˙xT(t)NT2,2BKΔα(t)(t)ς3(t)≤˙xT(t)NT2,2BKΛ−14KTBTN2,2˙x(t)+ˉα2ςT3(t)RT3Λ4R3ς3(t). | (3.18) |
Combining (3.16)–(3.18), we get
E{˙V2(t)}+2θE{V2(t)}≤ςT3(t)Σ3ς3(t)+xT(t)NT1,2BKΛ−13KTBTN1,2x(t)+˙xT(t)NT2,2BKΛ−14KTBTN2,2˙x(t) |
for any t∈T2σ, which together with the Schur complement and Ω31<0, implies that
E{˙V2(t)}+2θE{V2(t)}≤0. | (3.19) |
According to the expression of V(t), it is easy to obtain that
Vq(tσ)=Vu(tσ)=0,limt→(tσ+h)−Vq(t)=limt→(tσ+h)−Vu(t)=0, |
which confirms the continuity of V(t) at instants tσ and tσ+h.
Then combining (3.15) and (3.19), for t∈T1σ we can derive
E{V(t)}≤E{V(tσ)}e−2θ(t−tσ)≤E{V(tσ−1)}e−2θ(t−tσ−1)⋯≤E{V(0)}e−2θt. |
Similarly, for t∈T2σ, the same results can be obtained. In the light of (3.1), we get
E{V(0)}≤λM(P)E{‖x(0)‖2}. |
It can be concluded that for any t∈T1σ∪T2σ,
E{V(t)}≤e−2θtE{V(0)}, |
which, together with (3.7), gives
E{‖x(t)‖}≤√min{λm(P),λm(Σ)}λM(P)e−θtE{‖x0‖}. |
This completes the proof.
When there is no deception attacks, d(x(t))=0, and system (2.6) becomes
{˙x(t)=(A+BK)x(t)−BK∫ttσ˙x(s)ds,t∈T1σ,˙x(t)=(A+BK)x(t)+BKe(t),t∈T2σ, | (3.20) |
and we can write the following sufficient condition:
Corollary 1. For given feedback gain matrix K and positive scalars ε1, ε2, h, θ, under the NSETS (2.4), system (3.20) is exponentially stable, if there exist symmetric matrices P>0, Q>0, M>0, and general matrices U1, U2, W1, W2, W3, N1,1, N2,1, N1,2, N2,2, such that (3.2) and the following LMIs
[Ω11,1Ω11,2Ω11,3∗Ω12,2Ω12,3∗∗Ω13,3]<0, | (3.21) |
[Ω21,1Ω21,2Ω21,3Ω1,5∗−S{N2,1}WT2Ω2,5∗∗Ω23,3hWT3∗∗∗Ω5,5]<0, | (3.22) |
[Ω31,1Ω31,2Ω31,3∗−S{N2,2}Ω32,3∗∗Ω33,3]<0 | (3.23) |
hold true, where matrix blocks such as Ω11,1, Ω11,2, and Ω11,3 are the same as those in Theorem 3.1 except that α=1 and ˉα=0.
In this section, we will explore the feasibility of the event-triggered controller design. On the basis of Theorem 3.1, the trigger matrix M and feedback-gain matrix K can be derived from the following result:
Theorem 3.2. For given positive scalars ε1, ε2, h, θ, α, ˉα, ϑ and matrix D, under the NSETS (2.4) and random deception attacks, switched system (2.6) with control gain K=X−1Y is MSE stable, if there exist symmetric matrices P>0, Q>0, U>0, M>0, ˉΛi>0 (i∈{1,2,3,4}), and general matrices X, Y, ˜W1, ˜W2, ˜W3, ˜N1,1, ˜N2,1, ˜N1,2, ˜N2,2, such that (3.2) and the following LMIs
[˜Ω11˜Ω12∗˜Ω3]<0, | (3.24) |
[˜Ω21˜Ω22∗˜Ω3]<0, | (3.25) |
[˜Ω31˜Ω32∗˜Ω3]<0 | (3.26) |
hold true, where
˜Ω11=[˜Ω11˜Ω12∗˜Ω13],˜Ω21=[˜Ω21˜Ω22∗˜Ω13],˜Ω31=[˜Ω31˜Ω32∗˜Ω33],˜Ω11=[˜Ω11,1˜Ω11,2˜Ω11,3˜Ω1,4∗˜Ω12,2˜Ω12,3˜Ω2,4∗∗˜Ω13,30∗∗∗−I]+ˉα2˜RT1(˜Λ1+˜Λ2)˜R1,˜R1=[I00−I],˜Ω21=[˜Ω21,1˜Ω21,2˜Ω21,3˜Ω1,4˜Ω1,5∗˜Ω22,2˜WT2˜Ω2,4˜Ω2,5∗∗˜Ω23,30h˜WT3∗∗∗−I0∗∗∗∗−he−2θhQ]+ˉα2˜RT2(˜Λ1+˜Λ2)˜R2,˜R2=[I00−I−hI], ˜R3=[I0−II],˜Ω31=[˜Ω31,1˜Ω31,2˜Ω31,3˜Ω31,4∗−S{˜N2,2}αGTY˜Ω32,4∗∗(ε2−1)M0∗∗∗−I]+ˉα2˜RT3(˜Λ3+˜Λ4)˜R3,˜Ω12=[YTG0000YTG00]T,˜Ω22=[˜Ω120],˜Ω32=[YTG0000YTG00]T,˜Ω13=[−˜Λ100−˜Λ2],˜Ω33=[−˜Λ300−˜Λ4],˜Ω3=−ϑ[X00X]−ϑ[XT00XT],˜Ω12=[˜ΩT1,800(1−α)ϑYϑY0αϑY˜ΩT2,90(1−α)ϑY0ϑY]T,˜Ω22=[˜ΩT1,800(1−α)ϑY−αϑhYϑY0αϑY˜ΩT2,90(1−α)ϑY−αϑhY0ϑY]T,˜Ω32=[˜Ω3T1,80αϑY(1−α)ϑYϑY0αϑY˜Ω3T2,9αϑY(1−α)ϑY0ϑY]T,˜Ω11,1=2θP+DTD+S{˜NT1,1A−˜W1+(2θh−1)U12+αGTY},˜Ω21,1=˜Ω11,1−θhS{U1},˜Ω11,2=P−˜W2−˜NT1,1+h2S{U1}+AT˜N2,1,˜Ω21,2=˜Ω11,2−h2S{U1},˜Ω11,3=˜WT1−˜W3+(1−2θh)(U1−U2), ˜Ω21,3=˜Ω11,3+2θh(U1−U2),˜Ω1,4=(1−α)GTY, ˜Ω1,5=h(˜WT1−αGTY),˜Ω1,8=˜NT1,1B−GTX+αϑYT, ˜Ω12,2=hQ−S{˜N2,1},˜Ω22,2=−S{˜N2,1}, ˜Ω12,3=˜WT2−h(U1−U2),˜Ω2,4=(1−α)GTY,˜Ω2,5=h(˜WT2−αGTY), ˜Ω2,9=˜NT2,1B−GTX,˜Ω13,3=S{˜W3+(2θh−1)(U12−U2)},˜Ω23,3=˜Ω13,3−S{2θh(U12−U2)},˜Ω31,1=2θP+S{˜NT1,2A+αGTY} +(ε1+ε2)M+DTD,˜Ω31,2=P−˜NT1,2+AT˜N2,2+αYTG,˜Ω31,3=ε2M+αGTY,˜Ω31,4=(1−α)GTY, ˜Ω31,8=˜NT1,2B−GTX+αϑYT,˜Ω32,4=(1−α)GTY, ˜Ω32,9=˜NT2,2B−GTX, |
and G is an all-ones matrix with the same dimension as B.
Proof. By Lemma 2.4, it follows from (3.24) that
˜Ω11+S{[˜NT1,1B−GTL00˜NT2,1B−GTL00000000][X00X]−1[αY00(1−α)YY0αY00(1−α)Y0Y]}<0, |
which can be equivalently rewritten as
[Ω11Ω12∗Ω3]<0. |
In other words, we can derive (3.3) from (3.24). Similarly, (3.4)–(3.5) can be obtained from (3.25)–(3.26). The proof is complete.
Corollary 2. For given positive scalars ε1, ε2, h, θ, ϑ, under the NSETS (2.4), switched system (3.20) with control gain K=X−1Y is exponentially stable, if there exist symmetric matrices P>0, Q>0, U>0, M>0, and general matrices X, Y, ˜W1, ˜W2, ˜W3, ˜N1,1, ˜N2,1, ˜N1,2, ˜N2,2, such that (3.2) and the following LMIs
[˜Ω11,1˜Ω11,2˜Ω11,3˜Ω1,8∗˜Ω12,2˜Ω12,3˜Ω2,9∗∗˜Ω13,30∗∗∗−ϑS{X}]<0, | (3.27) |
[˜Ω21,1˜Ω21,2˜Ω21,3˜Ω1,5˜Ω1,8∗˜Ω22,2˜WT2˜Ω2,5˜Ω2,9∗∗˜Ω23,3h˜WT30∗∗∗−he−2θhQ−hϑYT∗∗∗∗−ϑS{X}]<0, | (3.28) |
[˜Ω31,1˜Ω31,2˜Ω31,3˜Ω31,8∗−S{˜N2,2}GTY˜Ω32,9∗∗(ε2−1)M0∗∗∗−ϑS{X}]<0 | (3.29) |
hold true, where matrix blocks such as ˜Ω11,1, ˜Ω11,2, and ˜Ω11,3 are the same as those in Theorem 3.2 except that α=1 and ˉα=0.
In this section, we use a simplified inverted pendulum model [42] to illustrate the validity of the proposed NSETS-based controller design scheme under random deception attacks. This model can be described as follows:
˙x(t)=[−1.840.337.18−1.14]x(t)+[2.43−0.42]u(t). |
First, we will co-design the triggering matrix W and control gain K to guarantee the MSE stability of the above system.
Choosing triggering thresholds ε1=ε2=0.1, waiting interval h=0.05, deception attack signal d(x(t))=tanh(0.15x(t)), uncertain probability term Δα(t)=αpsin(t), and ϑ=0.01. Then, based on Theorem 3.2, when α=0.8, for different probability uncertainty coefficient αp, the maximum exponential decay rate θmax can be obtained, which is listed in Table 1. It is straightforward to see that, as the probability uncertainty coefficient grows, the maximum exponential decay rate continues to deteriorate. In addition, Table 2 gives the values of θmax under the different probability α of deception attacks occurrence (when αp=0.1). It can be found that as the value of α decreases (which means the frequency of deception attacks increases), the performance of the controller declines.
αp | 0.06 | 0.07 | 0.08 | 0.09 | 0.1 |
θmax | 0.5843 | 0.5459 | 0.5080 | 0.4708 | 0.4341 |
α | 0.88 | 0.86 | 0.84 | 0.82 | 0.8 |
θmax | 0.4655 | 0.4613 | 0.4549 | 0.4459 | 0.4341 |
Next, to further reflect on the impact of deception attacks, we consider two cases: with and without deception attacks. In Case 1, the estimated probability of deception attacks and uncertainty coefficient are fixed as α=0.5, αp=0.08, and other parameters are unchanged. By solving the LMIs in Theorem 3.2, the matrices M and K can be computed as
M=[0.7893−0.0158−0.01580.4791],K=[−0.0695−0.3175]. |
In Case 2, α=1 and αp=0 (that is, the probability of occurring deception attacks is 0). By solving the LMIs in Corollary 2, the matrices M and K are calculated as
M=[1.23330.41990.41991.3964],K=[−0.1841−0.2688]. |
In the simulations, the initial condition is taken as x0=[1,−1]T, and the running time is set as 10s. Figures 1–3 depict the state trajectories, control inputs, and release moment intervals between any two successively release moments of Cases 1 and 2, respectively. It can be seen that the state variables can converge to zero faster in the absence of deception attacks, which is consistent with the information in Table 2.
Finally, we will show the effect of triggering thresholds ε1 and ε2 in NSETS on the number of transmitted signals. Let tn and tr denote the number of trigger times and the ratio of transmitted signals, respectively, and other parameters are the same as those in Case 1. Then, as shown in Table 3, when ε1 and ε2 are both set to 0, the NSETS degenerates into the TTS in [16], and tn is as high as 200; when ε1=0.1 and ε2=0, the ETS changes into the SETS in [31], and tn is reduced to 71; when ε1 is fixed, tn will continue to decrease as ε2 increases. It can be observed that compared with SETS, the tr of the NSETS decreases by more than 8.5%, and compared with TTS, the rate can be reduced by more than 73%. These results demonstrate that the addition of trigger condition xT(tσ)Mx(tσ) significantly conserves network resources while ensuring stability.
Scheme | TTS in [16] | SETS in [31] | NSETS in this paper | |||
(ε1,ε2) | (0,0) | (0.1,0) | (0.1,0.05) | (0.1,0.1) | (0.1,0.15) | (0.1,0.2) |
tn | 200 | 71 | 54 | 43 | 36 | 32 |
tr | 100% | 35.5% | 27% | 21.5% | 18% | 16% |
In this paper, the event-triggered exponential stabilization of NCSs under deception attacks has been investigated. Unlike existing ETSs, an NSETS, which additionally introduces a prescribed trigger term regarding the last triggering moment (i.e., ε2xT(tσ)Mx(tσ)), has been designed in (2.4). It has been demonstrated that the additional trigger term plays a positive role in reducing the number of trigger times. Moreover, by using a Bernoulli variable with uncertain probability to characterize the randomness of deception attacks, a new mathematical model of random deception attacks has been constructed in (2.3). A piecewise-defined Lyapunov function, which can make use of the system information at the instants tσ and tσ+h, has been established, which allows us to establish a sufficient exponential stability conation. Based on this, a co-design of the trigger and feedback-gain matrices under NSETS has been derived in terms of LMIs. Finally, a simulation example has been given to confirm the effectiveness of the developed design method. Future attention will be focused on the event-triggered security control problem of time-delay Markov jump systems [43,44,45,46].
This work was supported by the Key Research and Development Project of Anhui Province (Grant No. 202004a07020028).
The authors declare there is no conflict of interest.
[1] |
Z. He, W. Zhang, N. Jia, Estimating carbon dioxide emissions of freeway traffic: a spatiotemporal cell-based model, IEEE Trans. Intell. Transp. Syst., 21 (2020), 1976–1986. https://doi.org/10.1109/tits.2019.2909316 doi: 10.1109/tits.2019.2909316
![]() |
[2] |
Q. Cheng, Z. Liu, Y. Lin, X. Zhou, An s-shaped three-parameter (S3) traffic stream model with consistent car following relationship, Transp. Res. Part B Methodol., 153 (2021), 246–271. https://doi.org/10.1016/j.trb.2021.09.004 doi: 10.1016/j.trb.2021.09.004
![]() |
[3] |
Q. Cheng, Z. Liu, J. Guo, X. Wu, R. Pendyala, B. Belezamo, et al., Estimating key traffic state parameters through parsimonious spatial queue models, Transp. Res. Part C Emerging Technol., 137 (2022), 103596. https://doi.org/10.1016/j.trc.2022.103596 doi: 10.1016/j.trc.2022.103596
![]() |
[4] | Z. Shan, D. Zhao, Y. Xia, Urban road traffic speed estimation for missing probe vehicle data based on multiple linear regression model, in 16th International IEEE Conference on Intelligent Transportation Systems, 1 (2013), 118–123. https://doi.org/10.1109/ITSC.2013.6728220 |
[5] |
Z. Liu, Z. Li, M. Li, W. Xing, D. Lu, Mining road network correlation for traffic estimation via compressive sensing, IEEE Trans. Intell. Transp. Syst., 17 (2016), 1880–1893. https://doi.org/10.1109/tits.2016.2514519 doi: 10.1109/tits.2016.2514519
![]() |
[6] |
Z. He, G. Qi, L. Lu, Y. Chen, Network-wide identification of turn-level intersection congestion using only low-frequency probe vehicle data, Transp. Res. Part C Emerging Technol., 108 (2019), 320–339. https://doi.org/10.1016/j.trc.2019.10.001 doi: 10.1016/j.trc.2019.10.001
![]() |
[7] | J. Aslam, S. Lim, X. Pan, D. Rus, City-scale traffic estimation from a roving sensor network, in Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, 2012 (2012), 141–154. https://doi.org/10.1145/2426656.2426671 |
[8] |
Y. Song, X. Wang, G. Wright, D. Thatcher, P. Wu, P. Felix, Traffic volume prediction with segment-based regression kriging and its implementation in assessing the impact of heavy vehicles, IEEE Trans. Intell. Transp. Syst., 20 (2019), 232–243. https://doi.org/10.1109/tits.2018.2805817 doi: 10.1109/tits.2018.2805817
![]() |
[9] |
Z. Liu, Z. Wang, Q. Cheng, R. Yin, M. Wang, Estimation of urban network capacity with second-best constraints for multimodal transport systems, Transp. Res. Part B Methodol., 152 (2021), 276–294. https://doi.org/10.1016/j.trb.2021.08.011 doi: 10.1016/j.trb.2021.08.011
![]() |
[10] |
Z. Cheng, J. Lu, H. Zhou, Y. Zhang, L. Zhang, Short-Term traffic flow prediction: an integrated method of econometrics and hybrid deep learning, IEEE Trans. Intell. Transp. Syst., 23 (2022), 5231–5244. https://doi.org/10.1109/TITS.2021.3052796 doi: 10.1109/TITS.2021.3052796
![]() |
[11] |
L. Li, J. Zhang, Y. Wang, B. Ran, Missing value imputation for traffic-related time series data based on a multi-view learning method, IEEE Trans. Intell. Transp. Syst., 20 (2019), 2933–2943. https://doi.org/10.1109/tits.2018.2869768 doi: 10.1109/tits.2018.2869768
![]() |
[12] | C. Meng, X. Yi, L. Su, J. Gao, Y. Zheng, City-wide traffic volume inference with loop detector data and taxi trajectories, in Proceedings of the 25th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2 (2017), 1–10. https://doi.org/10.1145/3139958.3139984 |
[13] |
Z. Yi, X. C. Liu, N. Markovic, J. Phillips, Inferencing hourly traffic volume using data-driven machine learning and graph theory, Comput. Environ. Urban Syst., 85 (2021), 101548. https://doi.org/10.1016/j.compenvurbsys.2020.101548 doi: 10.1016/j.compenvurbsys.2020.101548
![]() |
[14] | Z. Pan, Y. Liang, W. Wang, Y. Yu, Y. Zheng, J. Zhang, Urban traffic prediction from spatio-temporal data using deep meta learning, in Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019 (2019), 1720–1730. https://doi.org/10.1145/3292500.3330884 |
[15] |
J. Li, N. Xie, K. Zhang, F. Guo, S. Hu, X. Chen, Network-scale traffic prediction via knowledge transfer and regional MFD analysis, Transp. Res. Part C Emerging Technol., 141 (2022), 12–34. https://doi.org/10.1016/j.trc.2022.103719 doi: 10.1016/j.trc.2022.103719
![]() |
[16] |
S. Luan, R. Ke, Z. Huang, X. Ma, Traffic congestion propagation inference using dynamic Bayesian graph convolution network, Transp. Res. Part C Emerging Technol., 135 (2022), 103526. https://doi.org/10.1016/j.trc.2021.103526 doi: 10.1016/j.trc.2021.103526
![]() |
[17] |
Z. Liu, Y. Liu, Q. Meng, Q. Cheng, A tailored machine learning approach for urban transport network flow estimation, Transp. Res. Part C Emerging Technol., 108 (2019), 130–150. https://doi.org/10.1016/j.trc.2019.09.006 doi: 10.1016/j.trc.2019.09.006
![]() |
[18] |
Q. Cheng, Z. Liu, W. Y. Szeto, A cell-based dynamic congestion pricing scheme considering travel distance and time delay, Transportmetrica B Transport Dyn., 7 (2019), 1286–1304 https://doi.org/10.1080/21680566.2019.1602487 doi: 10.1080/21680566.2019.1602487
![]() |
[19] |
Q. Cheng, S. Wang, Z. Liu, Y. Yuan, Surrogate-based simulation optimization approach for day-to-day dynamics model calibration with real data, Transp. Res. Part C Emerging Technol., 105 (2019), 422–438. https://doi.org/10.1016/j.trc.2019.06.009 doi: 10.1016/j.trc.2019.06.009
![]() |
[20] |
D. Huang, J. Xing, Z. Liu, Q. An, A multi-stage stochastic optimization approach to the stop-skipping and bus lane reservation schemes, Transportmetrica A Transport Sci., 17 (2021), 1272–1304. https://doi.org/10.1080/23249935.2020.1858206 doi: 10.1080/23249935.2020.1858206
![]() |
[21] |
D. Huang, Y. Wang, S. Jia, Z. Liu, S. Wang, A Lagrangian relaxation approach for the electric bus charging scheduling optimisation problem, Transportmetrica A Transport Sci., 202232 (2022). https://doi.org/10.1080/23249935.2021.2023690 doi: 10.1080/23249935.2021.2023690
![]() |
[22] |
Z. Liu, X. Chen, Q. Meng, I. Kim, Remote park-and-ride network equilibrium model and its applications, Transp. Res. Part B Methodol., 117 (2018), 37–62. https://doi.org/https://doi.org/10.1016/j.trb.2018.08.004 doi: 10.1016/j.trb.2018.08.004
![]() |
[23] |
J. Xing, W. Wu, Q. Cheng, R. Liu, Traffic state estimation of urban road networks by multi-source data fusion: review and new insights, Physica A Stat. Mech. Appl., 595 (2022), 127079. https://doi.org/https://doi.org/10.1016/j.physa.2022.127079 doi: 10.1016/j.physa.2022.127079
![]() |
[24] |
Z. Zhang, X. Lin, M. Li, Y. Wang, A customized deep learning approach to integrate network-scale online traffic data imputation and prediction, Transp. Res. Part C Emerging Technol., 132 (2021), 103372. https://doi.org/10.1016/j.trc.2021.103372 doi: 10.1016/j.trc.2021.103372
![]() |
[25] |
L. Li, R. Jiang, Z. He, X. Chen, X. Zhou, Trajectory data-based traffic flow studies: a revisit, Transp. Res. Part C Emerging Technol., 114 (2020), 225–240. https://doi.org/10.1016/j.trc.2020.02.016 doi: 10.1016/j.trc.2020.02.016
![]() |
[26] |
Z. Liu, P. Zhou, Z. Li, M. Li, Think like a graph: real-time traffic estimation at city-scale, IEEE Trans. Mobile Comput., 18 (2019), 2446–2459. https://doi.org/10.1109/tmc.2018.2873642 doi: 10.1109/tmc.2018.2873642
![]() |
[27] |
Q. Cao, G. Ren, D. Li, J. Ma, H. Li, Semi-supervised route choice modeling with sparse automatic vehicle identification data, Transp. Res. Part C Emerging Technol., 121 (2020). https://doi.org/10.1016/j.trc.2020.102857 doi: 10.1016/j.trc.2020.102857
![]() |
[28] |
Y. Yu, X. Tang, H. Yao, X. Yi, Z. Li, Citywide traffic volume inference with surveillance camera records, IEEE Trans. Big Data, 7 (2021), 900–912. https://doi.org/10.1109/tbdata.2019.2935057 doi: 10.1109/tbdata.2019.2935057
![]() |
[29] |
X. Zhan, Z. Yu, X. Yi, S. V. Ukkusuri, Citywide traffic volume estimation using trajectory data, IEEE Trans. Knowl. Data Eng., 29 (2017), 272–285. https://doi.org/10.1109/TKDE.2016.2621104 doi: 10.1109/TKDE.2016.2621104
![]() |
[30] |
P. Wang, Z. Huang, J. Lai, Z. Zheng, Y. Liu, T. Lin, Traffic speed estimation based on multi-source GPS data and mixture model, IEEE Trans. Intell. Transp. Syst., 23 (2021), 10708–10720. https://doi.org/10.1109/tits.2021.3095408 doi: 10.1109/tits.2021.3095408
![]() |
[31] |
M. Seppecher, L. Leclercq, A. Furno, D. Lejri, T. V. da Rocha, Estimation of urban zonal speed dynamics from user-activity-dependent positioning data and regional paths, Transp. Res. Part C Emerging Technol., 129 (2021), 103183. https://doi.org/10.1016/j.trc.2021.103183 doi: 10.1016/j.trc.2021.103183
![]() |
[32] |
E. Saffari, M. Yildirimoglu, M. Hickman, Data fusion for estimating Macroscopic Fundamental Diagram in large-scale urban networks, Transp. Res. Part C Emerging Technol., 137 (2022), 103555. https://doi.org/10.1016/j.trc.2022.103555 doi: 10.1016/j.trc.2022.103555
![]() |
[33] |
M. Rodriguez-Vega, C. Canudas-de-Wit, H. Fourati, Dynamic density and flow reconstruction in large-scale urban networks using heterogeneous data sources, Transp. Res. Part C Emerging Technol., 137 (2022), 103569. https://doi.org/10.1016/j.trc.2022.103569 doi: 10.1016/j.trc.2022.103569
![]() |
[34] |
M. Yun, W. Qin, Minimum sampling size of floating cars for urban link travel time distribution estimation, Transp. Res. Rec. J. Transp. Res. Board, 2673 (2019), 24–43. https://doi.org/10.1177/0361198119834297 doi: 10.1177/0361198119834297
![]() |
[35] |
Z. Huang, X. Ling, P. Wang, F. Zhang, Y. Mao, T. Lin, et al., Modeling real-time human mobility based on mobile phone and transportation data fusion, Transp. Res. Part C Emerging Technol., 96 (2018), 251–269. https://doi.org/10.1016/j.trc.2018.09.016 doi: 10.1016/j.trc.2018.09.016
![]() |
[36] |
C. Wu, I. Kim, H. Chung, The effects of built environment spatial variation on bike-sharing usage: a case study of Suzhou, China, Cities, 110 (2021), 103063. https://doi.org/10.1016/j.cities.2020.103063 doi: 10.1016/j.cities.2020.103063
![]() |
[37] |
C. Wu, H. Chung, Z. Liu, I. Kim, Examining the effects of the built environment on topological properties of the bike-sharing network in Suzhou, China, Int. J. Sustainable Transp., 15 (2021), 338–350. https://doi.org/10.1080/15568318.2020.1780652 doi: 10.1080/15568318.2020.1780652
![]() |
[38] |
S. J. Pan, I. W. Tsang, J. T. Kwok, Q. Yang, Domain adaptation via transfer component analysis, IEEE Trans. Neural Networks, 22 (2011), 199–210. https://doi.org/10.1109/TNN.2010.2091281 doi: 10.1109/TNN.2010.2091281
![]() |
[39] | S. J. Pan, J. T. Kwok, Q. Yang, Transfer learning via dimensionality reduction, in Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, 2 (2008), 677–682. https://dl.acm.org/doi/abs/10.5555/1620163.1620177 |
[40] |
J. Wang, Y. Chen, W. Feng, H. Yu, Q. Yang, Transfer learning with dynamic distribution adaptation, ACM Trans. Intell. Syst. Technol., 11 (2020), 1–25. https://doi.org/10.1145/3360309 doi: 10.1145/3360309
![]() |
[41] |
Z. Cheng, L. Zhang, Y. Zhang, S. Wang, W. Huang, A systematic approach for evaluating spatiotemporal characteristics of traffic violations and crashes at road intersections: an empirical study, Transportmetrica A Transp. Sci., 2022 (2022), 1–23. https://doi.org/10.1080/23249935.2022.2060368 doi: 10.1080/23249935.2022.2060368
![]() |
[42] |
Y. Gu, A. Chen, S. Kitthamkesorn, Accessibility-based vulnerability analysis of multi-modal transportation networks with weibit choice models, Multimodal Transp., 1 (2022), 100029. https://doi.org/10.1016/j.multra.2022.100029 doi: 10.1016/j.multra.2022.100029
![]() |
[43] |
Y. Zheng, W. Li, F. Qiu, A slack arrival strategy to promote flex-route transit services, Transp. Res. Part C Emerging Technol., 92 (2018), 442–455. https://doi.org/10.1016/j.trc.2018.05.015 doi: 10.1016/j.trc.2018.05.015
![]() |
[44] |
S. Wang, D. Yu, M. P. Kwan, L. Zheng, H. Miao, Y. Li, The impacts of road network density on motor vehicle travel: an empirical study of Chinese cities based on network theory, Transp. Res. Part A Policy Pract., 132 (2020), 144–156. https://doi.org/10.1016/j.tra.2019.11.012 doi: 10.1016/j.tra.2019.11.012
![]() |
[45] |
Z. Zhang, M. Li, X. Lin, Y. Wang, Network-wide traffic flow estimation with insufficient volume detection and crowdsourcing data, Transp. Res. Part C Emerging Technol., 121 (2020), 102870. https://doi.org/10.1016/j.trc.2020.102870 doi: 10.1016/j.trc.2020.102870
![]() |
[46] |
D. Huang, S. Wang, A two-stage stochastic programming model of coordinated electric bus charging scheduling for a hybrid charging scheme, Multimodal Transp., 1 (2022), 100006. https://doi.org/10.1016/j.multra.2022.100006 doi: 10.1016/j.multra.2022.100006
![]() |
[47] |
D. Xiao, I. Kim, N. Zheng, Recent advances in understanding the impact of built environment on traffic performance, Multimodal Transp., 1 (2022), 100034. https://doi.org/10.1016/j.multra.2022.100034 doi: 10.1016/j.multra.2022.100034
![]() |
[48] |
J. Xing, Z. Liu, C. Wu, S. Chen, Traffic volume estimation in multimodal urban networks using cellphone location data, IEEE Intell. Transp. Syst. Mag., 11 (2019), 93–104. https://doi.org/10.1109/mits.2019.2919593 doi: 10.1109/mits.2019.2919593
![]() |
[49] |
A. H. F. Chow, Z. C. Su, E. M. Liang, R. X. Zhong, Adaptive signal control for bus service reliability with connected vehicle technology via reinforcement learning, Transp. Res. Part C Emerging Technol., 129 (2021), 103264. https://doi.org/10.1016/j.trc.2021.103264 doi: 10.1016/j.trc.2021.103264
![]() |
[50] |
S. Wang, D. Yu, X. Ma, X. Xing, Analyzing urban traffic demand distribution and the correlation between traffic flow and the built environment based on detector data and POIs, Eur. Transport Res. Rev., 10 (2018). https://doi.org/10.1186/s12544-018-0325-5 doi: 10.1186/s12544-018-0325-5
![]() |
[51] |
R. Zhong, J. Luo, H. Cai, A. Sumalee, F. Yuan, A. Chow, Forecasting journey time distribution with consideration to abnormal traffic conditions, Transp. Res. Part C Emerging Technol., 85 (2017), 292–311. https://doi.org/https://doi.org/10.1016/j.trc.2017.08.021 doi: 10.1016/j.trc.2017.08.021
![]() |
[52] |
W. Qin, X. Ji, F. Liang, Estimation of urban arterial travel time distribution considering link correlations, Transportmetrica A Transport Sci., 16 (2020), 1429–1458. https://doi.org/10.1080/23249935.2020.1751341 doi: 10.1080/23249935.2020.1751341
![]() |
[53] |
S. Kullback, R. A. Leibler, On information and sufficiency, Ann. Math. Statist., 22 (1951), 79–86. https://doi.org/10.1214/aoms/1177729694 doi: 10.1214/aoms/1177729694
![]() |
[54] |
Y. Jiang, O. A. Nielsen, Urban multimodal traffic assignment, Multimodal Transp., 1 (2022), 100027. https://doi.org/10.1016/j.multra.2022.100027 doi: 10.1016/j.multra.2022.100027
![]() |
[55] |
R. Yan, S. Wang, Integrating prediction with optimization: models and applications in transportation management, Multimodal Transp., 1 (2022), 100018. https://doi.org/10.1016/j.multra.2022.100018 doi: 10.1016/j.multra.2022.100018
![]() |
[56] |
Y. Zheng, W. Li, F. Qiu, H. Wei, The benefits of introducing meeting points into flex-route transit services, Transp Res. Part C Emerging Technol., 106 (2019), 98–112. https://doi.org/10.1016/j.trc.2019.07.012 doi: 10.1016/j.trc.2019.07.012
![]() |
1. | Xinling Li, Xueli Qin, Zhiwei Wan, Weipeng Tai, Chaos synchronization of stochastic time-delay Lur'e systems: An asynchronous and adaptive event-triggered control approach, 2023, 31, 2688-1594, 5589, 10.3934/era.2023284 | |
2. | Xiaoyu Wang, Yingqi Zhang, Jingjing Yan, Yan Shi, Event-triggered finite-time state estimation for discrete singular Markovian systems with quantization, 2023, 360, 00160032, 14430, 10.1016/j.jfranklin.2023.11.013 | |
3. | Yuxiang Ji, Yu Zhang, Xiaofeng Ma, Xinling Li, Taiping Jiang, Resilient Energy-to-peak Event-triggered Control of NCSs, 2023, 2638, 1742-6588, 012006, 10.1088/1742-6596/2638/1/012006 | |
4. | Xinling Li, Xiaofeng Ma, Weipeng Tai, Jianping Zhou, Designing an event-triggered H∞ filter with possibly inconsistent modes for Markov jump systems, 2023, 139, 10512004, 104092, 10.1016/j.dsp.2023.104092 | |
5. | Suhuan Zhang, Fanglai Zhu, Xufeng Ling, Event-triggered UIO-based security control for discrete-time systems under deception attacks, 2025, 00200255, 121902, 10.1016/j.ins.2025.121902 |
αp | 0.06 | 0.07 | 0.08 | 0.09 | 0.1 |
θmax | 0.5843 | 0.5459 | 0.5080 | 0.4708 | 0.4341 |
α | 0.88 | 0.86 | 0.84 | 0.82 | 0.8 |
θmax | 0.4655 | 0.4613 | 0.4549 | 0.4459 | 0.4341 |
αp | 0.06 | 0.07 | 0.08 | 0.09 | 0.1 |
θmax | 0.5843 | 0.5459 | 0.5080 | 0.4708 | 0.4341 |
α | 0.88 | 0.86 | 0.84 | 0.82 | 0.8 |
θmax | 0.4655 | 0.4613 | 0.4549 | 0.4459 | 0.4341 |
Scheme | TTS in [16] | SETS in [31] | NSETS in this paper | |||
(ε1,ε2) | (0,0) | (0.1,0) | (0.1,0.05) | (0.1,0.1) | (0.1,0.15) | (0.1,0.2) |
tn | 200 | 71 | 54 | 43 | 36 | 32 |
tr | 100% | 35.5% | 27% | 21.5% | 18% | 16% |