Reinforcement Learning-Based Decentralized Safety Control for Constrained Interconnected Nonlinear Safety-Critical Systems

This paper addresses the problem of decentralized safety control (DSC) of constrained interconnected nonlinear safety-critical systems under reinforcement learning strategies, where asymmetric input constraints and security constraints are considered. To begin with, improved performance functions associated with the actuator estimates for each auxiliary subsystem are constructed. Then, the decentralized control problem with security constraints and asymmetric input constraints is transformed into an equivalent decentralized control problem with asymmetric input constraints using the barrier function. This approach ensures that safety-critical systems operate and learn optimal DSC policies within their safe global domains. Then, the optimal control strategy is shown to ensure that the entire system is uniformly ultimately bounded (UUB). In addition, all signals in the closed-loop auxiliary subsystem, based on Lyapunov theory, are uniformly ultimately bounded, and the effectiveness of the designed method is verified by practical simulation.


Introduction
Over the past few decades, safety has received increasing attention in autonomous driving [1], intelligent robots [2], robotic arms [3], adaptive cruise control [4], etc. The design of these systems and controllers require that the system state trajectories evolve within a set called the safe set, reflecting the inherent properties of the system [5]. In practice, many engineering systems must operate within a specific safety range, beyond which the controlled system may be at risk [6]. Safety-critical systems primarily refer to systems having control behaviors that prioritize safety. The designed control schemes aim to reduce the potential for severe consequences, such as personal injury and environmental pollution, which may arise due to system shutdown or operational errors [7]. To ensure the safety and reliability of the system, scholars developed many safety control schemes. The classical approach focused on extending and applying Naguma's theorem to safe sets defined by continuously differentiable functions [8]. In particular, barrier functions have become an effective tool for verifying security and have been widely used in [9][10][11]. They were used to convert a system with security constraints into an equivalency system that satisfies security requirements and then a security controller was designed to protect the system. In [9,10], penalty functions and BF-based state transitions were employed to merge states into a reinforcement learning framework to solve optimal control problems with full-state constraints. In [11], a safe non-strategic reinforcement learning method to solve secure nonlinear systems with dynamic uncertainty was proposed. In [12,13], a new secure reinforcement learning method was proposed to solve secure nonlinear systems with symmetric input constraints. However, the results in [9][10][11][12][13], mentioned above, were mainly based on studying the optimal safety control in a single continuoustime/discrete-time nonlinear system. The security control of interconnected systems has not been fully resolved.
On the other hand, interconnected systems consist of multiple subsystems with interconnected characteristics, and designing controllers for them through a concept similar to that of a single-system approach is difficult [14]. To solve this problem [15][16][17], the decentralized control approach, based on local subsystem information, was proposed. This approach involved using multiple controllers to control the interconnected systems. In [18,19], the decentralized control approach differed by initially decomposing the entire system control problem into a series of subproblems that could be solved independently. The solutions to the subproblems (i.e., independent controllers) were then joined to form a decentralized controller to stabilize the entire system. In addition, implementing the decentralized control algorithm used only the local subsystem's knowledge, not the complete system's information. Recently, scholars have proposed many schemes or techniques for designing decentralized controllers, including quantization techniques [20], fuzzy techniques [21], and optimal control methods [22]. This paper develops decentralized control strategies from the optimal control perspective. Problems of optimal control are usually solved via the solution of the Hamilton-Jacobi-Bellman (HJB) partial differentiation equation [23,24]. However, the HJB equation is generally not solvable analytically due to its inherent nonlinearity [25,26]. Therefore, adaptive dynamic programming (ADP) and reinforcement learning (RL) algorithms were proposed to obtain numerical solutions to the HJB equation and were widely applied to nonlinear interconnected systems [27][28][29][30]. In [31,32], the two previously mentioned algorithms could be deemed closely related, as they exhibited similar characteristics in addressing optimal control problems. For example, in [27,28], the distributed optimal controller was designed using robust ADP for nonlinear interconnected systems with unknown dynamics and parameters. In [29], the optimal decentralized control problem for interconnected nonlinear systems subject to stochastic dynamics was solved by enhancing the performance function of the auxiliary subsystem and transforming the original control problem into a set of optimal control strategies sampled in periodic patterns. Furthermore, in [30], the identifier-critic network framework was used to solve the problem of decentralized event-triggered control based on sliding-mode surfaces, avoiding the need for knowledge of the system's internal dynamics. It is worth noting that the control results provided in [27][28][29][30] did not consider input constraints.
Control constraints are commonly encountered in industrial processes, where they are widespread and have a detrimental impact on the performance of systems [33,34]. Therefore, the study of constrained nonlinear systems is of practical importance. In [35,36], the RL-based decentralized algorithm was developed for tracking control of constrained interconnected nonlinear systems. In [37], the problem of decentralized optimal control of a constrained interconnected nonlinear system was solved by introducing a nonquadratic performance function to overcome the symmetric input constraint. The results in [35][36][37], mentioned above, mainly addressed the symmetric input constraint. However, the problem of asymmetric input constraints was identified in several project cases [38,39]. In [40], the optimal decentralized control problem with asymmetric input constraints was solved by designing a new non-quadratic performance function. In [41], a new performance function was proposed for interconnected nonlinear systems to successfully overcome the asymmetric input constraint and to solve the decentralized fault-tolerant control problem. However, none of the above studies considered the safety of the system. The optimal decentralized safety control (DSC) for constrained interconnected nonlinear safety-critical systems has not been thoroughly investigated thus far, which inspired our current study.
Motivated by previous discussions, this paper proposes an RL-based decentralized DSC strategy for constrained interconnected nonlinear safety-critical systems. The primary achievements are concluded below: The reinforcement learning algorithm is used to solve the optimal DSC problem for restricted interconnected nonlinear safety-critical systems, and the asymmetric input constraint is successfully solved. The method optimizes the control strategy by minimizing the performance function, ensuring the safety of the system's state, while considering the asymmetric input constraints.

2.
Nonlinear interconnected safety-critical systems with asymmetric input constraints and safety constraints are converted to equivalent systems that satisfy user-defined safety constraints using barrier functions. Unlike the nonlinear safety-critical systems [3,9,10,13], this paper solves the security constraint problem of the interconnection term through the potential barrier function, which ensures the interconnected nonlinear safety-critical system satisfies the security constraint. 3.
The asymmetric input constraints are solved by utilizing a single CNN architecture for online approximation of the performance function. Theoretical demonstrations show that the optimal DSC method can achieve uniformly ultimately bounded (UUB) system states and neural network weight estimation errors. In addition, a simulation example verified the feasibility and effectiveness of the developed DSC method.
The remainder of this article is structured as follows. In Section 2, the issue formulation and conversion are presented. In Section 3, the decentralized optimal safety DSC design scheme is presented. The design scheme for the critical neural network is presented in Section 4. In Section 5, the analyses of system stability are presented. In Section 6, the simulation sample demonstrates the effectiveness of the presented approach. Lastly, conclusions are given in Section 7.

Problem Descriptions
Consider a constrained interconnected nonlinear safety-critical system composed of n subsystems and the formula below: where x i (t) ∈ R n i is the ith subsystem's state vector and x i (0) represents the initial state, x = x T 1 , x T 2 , . . . , x T n ∈ R ∑ n i=1 n i represents the overall state vector of the constrained interconnected nonlinear safety-critical system, u i = [u i,1 , u i,2 , . . . u i,j ] T ∈ k i represents the control input, and the set of asymmetric constraints is represented as . . , m i with h i min and h i max being the asymmetric saturating minimum and maximum bounds, f i (·) ∈ R n i and g i (·) ∈ R n i ×m i represent the drift system dynamics and input dynamics of the ith subsystem, respectively, and are Lipschitz continuous, and h i ∈ R n i represents the unknown interconnected term.
To simplify the design of the controller, let us introduce some assumptions. For i = 1, 2, . . . , n, we suppose the equilibrium of the ith subsystem's state is x i = 0. Assumption 1. For i = 1, 2, . . . , n, the h i (x) satisfies the below unmatched condition: where b i,j > 0 is a constant, and β i,j (x j ) are normal definite functions. Furthermore, β i,j (0) = 0 and P i (0) = 0. Then, assuming β j x j = max 1≤i≤n β i,j x j , the unequal Equation (2) is denoted as: where C i,j ≥ b i,j β i,j x j /β j x j is a positive constant, and j = 1, 2, . . . , n.

Remark 1.
It is noted that constraints (2) and (3) specified by Assumption 1 are strict restrictions on specific interrelated nonlinear systems. Nevertheless, when we consider the function P i (x) that satisfies no constraints (2) and (3), we discover that the calculational costs to address the stability of the closed-loop system are high. In fact, in real-world applications, constraints like inequalities (2) and (3) impose on the mismatched interconnection terms of the system (1) [40,42].

Assumption 2.
For i = 1, 2, . . . , n, the known function g i (x i ) is bounded as g i (x i ) ≤ g i,m , where g i,m is a known constant. Furthermore, rank(g i (x i )) = m i and g Based on the ith subsystem (1) described, the ith auxiliary subsystem is designed as: where v i ∈ R q i is used to compensate for mismatched interconnections and stands for auxiliary control, g + i (x i ) ∈ R m i ×n i is Moore-Penrose pseudo-reverse. According to Assumption 2, it can be found that the matrix g Then, we rewrite the auxiliary subsystem (4) as:

Security Conversion Issues
For the ith subsystem in the system (1), its state T satisfies the following security constraints: For nonlinear interconnect safety-critical systems with asymmetric input constraints and security constraints, we need to define the performance function as: where α i is the discount factor,

Remark 2.
Due to accounting for safety constraints and asymmetric input constraints in (7), the optimal control law does not converge to zero while the system state achieves the stable phase [43]. The discount factor α i = 0, J i (x i ) may be unbounded, so it is necessary to consider the discount factor.

Problem 1.
(Decentralized control problems with security constraints and asymmetric input constraints) Consider the safety-critical system (1) and find the policy u i (.) and auxiliary control strategy v i (.) : R n i → R m i in the ith subsystem. The performance function is given by (7) with the ith subsystem state x i = [x i,1 , . . . , x i,k ] T and the control input u i satisfying the following conditions: Ensure that the security-critical system state is consistently within the security constraints. Further, the definitions of some barrier functions are given.
Definition 1 (Barrier function [9,10]). The function B(·) : R → R defined on interval (a, A) is referred to as the barrier function if where a and A are two constants satisfying a < A. Moreover, the potential function is invertible on the interval (a, A), i.e., Furthermore, the derivative of (11) is Based on Definition 1, we consider the state transition based on the potential barrier function as follows: where k = 1, 2, . . . , n i . So, the x i,k 's derivative concerning t is dt , and after using Definition 1, we obtain: and Y i,n i (s i,n i ) is the interconnection term of the n i th term in the ith subsystem. Then, the interconnected nonlinear safety-critical system (1) can be rewritten as: Based on Assumption 1, we define the unknown interconnection term after the system transformation as: where ϑ i,j (s j ) is a positive definite function. Then, assuming ϑ j s j = max 1≤i≤n ϑ i,j s j and ϑ j ( According to (3) and (18), the inequality (17) is expressed as: where S i,j ≥ b i,j ϑ i,j s j /ϑ j s j is a positive constant, and i, j = 1, 2, . . . , n.
Moreover, the modified system (15) is within the manageable range, and s i = 0 is the balance point for (15).

1.
The state s i of the system is restricted to be bounded, so the system state x i satisfies constraints (8) and (9), i.e., 2.
When the system's state approaches the boundary of the safety area, the barrier function changes as follows: The barrier function fails to function when the system state reaches equilibrium, i.e.,

Decentralized Optimal DSC Design
This section consists of two main subsections to establish the decentralized optimal DSC method. First, the security constraint problem is dealt with through the systematic transformation of the barrier function and the HJB equation for the ith auxiliary subsystem without security constraints is developed by introducing the improved performance function. Finally, the decentralized safety controller is constructed by solving the HJB equation for the auxiliary subsystem.

Barrier Function Conversion
According to the ith subsystem (15) described, the ith auxiliary subsystem is designed as:ṡ where G + i (s i ) ∈ R m i ×n i is Moore-Penrose pseudo-reverse. According to Assumptions 2 and 3, the matrix if found to be G Then, the auxiliary subsystem (20) is rewritten as: Regarding the converted system (15), analogous to (7), the performance function below is introduced: where is the positive definition matrix. Furthermore, s i0 = s i (0) denotes the initial state, and W i (u i ) is a nonquadratic utility function that solves the asymmetric input constraint. Then, W i (u i ) is defined in the following form: where λ i = (h i max − h i min )/2 and c i = (h i max + h i min )/2, and Ψ i (.) represent the monotonic odd function, where Ψ i (0) = 0. In this paper, without sacrificing generality,

Remark 4.
Unlike the traditional form of symmetric input constraints [35], this article considered asymmetric constraints on the controlling inputs [44]. The revised hyperbolic tangent function presented in (22) effectively transforms the asymmetric constrained control problem into an unconstrained control problem by devising different maximum and minimum bounds.

Problem 2.
(Optimal decentralized control problems with asymmetric input constraints) Finding the control policy u i and auxiliary control strategy v i in the ith subsystem, the performance function becomes (22).
Based on the subsystem (21), as well as the performance function (22), the corresponding Hamiltonian is given by: where Ψ(Ω i ) is a collection of all acceptable control policies and auxiliary control strategies for Ω i . Based on Bellman's optimality principle [31], . Then, the optimal control policy and the auxiliary control policy can be derived as follows: where (26), the HJB equation is rewritten as: with V * i (0) = 0. Through the BF-based system transformation, the decentralized control problem 1 with asymmetric input constraints and security constraints is transformed into an unconstrained optimization problem, i.e., the decentralized control problem 2. Next, the following lemma is discussed to ensure the equivalence between the decentralized control problems 1 and 2.

Lemma 2.
Assume that Assumptions 1 to 3 are met and that control policy u i (·) and auxiliary control strategy v i (·) solve the decentralized control problem 2 of (21). It follows, then, that the below holds: 1.
If the initial state x 0 of the interconnected nonlinear safety-critical system (1) is in the range (a i,k , A i,k ), ∀k = 1, 2, . . . , n i , then the closed-loop system satisfies (6).

2.
If the functions H i (x) and Q i (x) satisfies the condition H i ( (22) is equivalent to the one in (7).
Proof. Both the performance function and Assumption 3 satisfy the observability of zero states, guaranteeing the presence of the safety-optimal performance function V * i (s i ). From (24), we obtain ∇V * i (t) ≤ 0, which allows us to obtain V * i (s i (t)) ≤ V * i (s i (0)) for all t ≥ 0. Consequently, as stated in Remark 3, if the initial state x i (0) of the system (21) satisfies the security constraint (6), and V * i (s i (0)) is bounded, then the V * i (s i (t)) is also bounded. Finally, we obtain x i,k (t) ∈ (a i,k , A i,k ), k = 1, 2, . . . , n i .
Therefore, the given u * i and v * i satisfy the constraints of the decentralized control problem 1. Now, consider the state transition based on the barrier function described in (13) and (14).
Since x i satisfies the constraints given in (8), each element of the state s i = [B i,1 (x i,1 ), . . . , B i,k (x i,k )] T is finite. By comparing the performance functions (7) and (22), This completes the proof.

Designing the Optimal DSC Strategy by Solving n HJB Equations
Throughout this section, we show that the optimal DSC strategies for interconnected nonlinear systems can be constructed by solving the n HJB equations. Theorem 1. Consider n subsystems under Assumptions 1 to 3 with DSC policies u * i (s i ) and auxiliary control strategies v * i (s i ), having the corresponding conditions as below: Next, consider n positive constants h * i , i = 1, 2, . . . , n, so that for anything h i ≥ h * i , the optimal DSC policies u * 1 (s 1 ), u * 2 (s 2 ), . . . , u * n (s n ) guarantee that the interconnected nonlinear system (15) with security constraints is UUB.
Proof. The Lyapunov candidacy function L i,1 (s) below was selected: where the V * i (s i ) is defined in the same way as (22), and we denote the time derivative along the trajectoryṡ By using (27) and (28), we obtain: Inserting (29), (34) and (35) into (33), we havė . (36) According to the optimal DSC policy (27), the term W i (u * i ) becomes By appealing to the proof in [44], Equation (37) can be further reduced to replacing (38) into (36), one haṡ It is known from [45] that there is a positive constant δ i,M such that 0 ≤ ∇V * i (s i ) ≤ δ i,M . Therefore, using Lemma 1, Assumption 1, (17), (19), and (27), we obtain Utilizing the integral median theorem [46] and the inequality (40), the β 2 (38) can be deduced as: where i ∈ (0, tanh −1 ( [27], we conclude that α i V * i (s i ) ≤ i,m , where i,m is a positive constant. Then, plugging (40) and (41) into (39), and taking into consideration the conclusion mentioned above, we can rephrase inequality (39) as follows: by denoting Λ = diag{h 1 , h 2 , . . . , h n } and Z = [ϑ 1 (s 1 ), . . . , ϑ n (s n ), ξ 1 v * 1 (s 1 ) , . . . , ξ n v * n (s n ) ]. Let the condition (31) be satisfied, so we havė From the matrix X expression, positive definiteness is maintained by choosing a sufficiently large Λ. In other words, there is h * i > 0, such that h i > h * i , ensuring Z T XZ > 0. Thus, the inequality (43) is further deduced as: The inequality (44) means thatL i,1 (s) < 0 whenever s i (t) lies outside the following set N s i : Based on Lyapunov's extension theorem [47], it is shown that the optimal performance functions V * i (s i ) guarantee that the interconnected nonlinear system (15) with asymmetric input constraints is UUB. Since the performance function (7) and (22) yield the same results, it can be shown that the optimal performance function J * i (x i ) guarantees that the interconnected nonlinear safety-critical system (1) with security constraints and asymmetric input constraints is UUB.

Critic Network for Approximation
The critic neural network is introduced in this section, with the aim of approximating the optimal performance function. Then, the evaluation network of the auxiliary subsystem (21) is used to construct the estimated optimal control strategy. According to [48], where  (27), (28) and (47), the optimal safety control policy u * i (s i ) and the auxiliary control strategy v * i (s i ) are rephrased as: where with I m i = [1, 1, . . . , 1] T ∈ R m i . The seclected value of ζ is between 1 The ideal weight vector W c i is not available and the optimal control strategy u * i (s i ) is not directly applicable. Therefore, the estimated weight vectorŴ c i is constructed to replace W c i as: The estimation errorW c i = W c i −Ŵ c i is defined. Similarly, according to (50), the (49) and (48) are further developed as: Combining (50), (51) and (52), the Hamiltonian is re-expressed as: According to (53), the error of the Hamiltonian is given by: , the error e i should be guaranteed to be sufficiently small. To solve this issue, a critic weight adjustment lawŴ c i is proposed to minimize the objective function φ i = 1 2 e T i e i . Next, the critic updating law is developed as: where the constant α c i is the positive learning rate.

Remark 5.
To minimize the Hamiltonian error e i , it is necessary to maintain the derivative of φ i aṡ φ i < 0. Therefore, the critic weight adjustment law is derived by employing the normalization term (1 + T i i ) −2 and applying the gradient descent method with respect toŴ c i [49].
By considering the definition ofW c i , we obtaiṅW . The proposed decentralized DSC strategy for the ith subsystem with a single critic-NN is illustrated in Figure 1.

Stability Analysis
This section focuses on the stability of the n-auxiliary subsystem for the given control scheme. We need to make some Assumptions to satisfy the theorem.

Assumption 5.
Consider the time period [t, t + t k ] and t k > 0. Then, the term i T i fulfills the following condition: where i and s i are positive constants.

Theorem 2.
For the nonlinear interconnected safety-critical system (15), we design the estimated optimal safety policies and auxiliary control strategies as (51) and (52), respectively. Assume that Assumptions 1-5 hold. IfŴ c i is updated by (55), then s i andŴ c i are UUB if α c i in (55) satisfies Proof. The candidate Lyapunov function is considered to be: Then, defining L i, Combining (29), (34) and (35). The (60) is further deduced as: According to Lemma 1, and taking into account (40), (48), (51), we observe that the β 3 term in (61) is satisfied by where [44], according to Assumption 5, β 5 is derived as: Similarly, the last term of (61) is deduced from (35), (49) and (52) as: By using (38), (62)-(64) and the fact that α i V * i (s i ) ≤ i,M the following is derived: The error weight update lawW c i . L i,1 (t) is considered with the time derivativė Combining Lemma 1 and Assumption 4, the following conclusion is drawn: Combining inequalities (66) and (67), we derive the following inequalities: Substituting (65) and (68) into (59), the following inequality is obtained: where Therefore, Equations (58) and (69) meanL i (t) < 0, provided that the parameters s i andW c i are not in the set of Introducing Lyapunov's extension theorem, ref. [47], ensures the stability of the closedloop system. This proof ensures that the weight estimation errorW c i is UUB. At this point, this completes the proof process.

Remark 6.
In contrast to techniques that aim to achieve input saturation [10,13], this article proposes an RL technique to solve the optimal DSC problem with safety constraints and asymmetric input constraints. This approach ensures not only the safety of the system but also minimizes the input constraints. Therefore, the developed reinforcement learning technique, based on security constraints and asymmetric input constraints, is better suited for some project applications, particularly for systems where the system state must be globally within the security settings.

Simulation Example
In this section, we provide a simulation example to verify the effectiveness of the proposed approach. The simulation involved a dual-linked robotic arm system [42]. The state space model of the system is defined bẏ x 2,1 = x 2,2 , where x i,1 and x i,2 (i = 1, 2) indicate the angular location of the robot arm, u i stands for control input, and the h i = η i P i represents the interconnection terms. The other parameters of the robotic arm system (72) are depicted in Table 1. The initial system state was selected as x 0 = [2, 2, 2, 2] T . We first defined the state variable x i = [x i,1 , x i,2 ] T and constructed the internal dynamics and input gain matrix as follows: where P 1 (x 1 ), P 2 (x 2 ) denote the uncertain interconnection terms of subsystems 1 and 2, i.e., P 1 (x 1 ) = 0.1x 1,1 sin(x 2,2 ), P 2 (x 2 ) = (x 1,2 − 3 sin(0.1x 2,1 )).
Therefore, to deal with the security constraint, the following system of transformations without security constraint was obtained, using the BF-based system transformation (13): where For the transformed dual-linked robotic arm system (74), the initial state was chosen by s i,0 = [s i,0 (1), s i,0 (2)] T = [B(x i,0 (1); a i,1 , A i,1 ), B(x i,0 (2); a i,2 , A i,2 )] T . The discount factors were chosen as α 1 = 1 and α 2 = 0.1. The matrices were designed as Q 1 = 0.5I 2 and Q 2 = I 2 , R 1 = 1 and R 2 = 1. The upper and lower limits were allocated as below: h 1 max = 0.75, h 1 min = −0.25 and h 2 max = 1.5, h 2 min = −0.5. Let ϑ 1 = s 1 and ϑ 2 = s 2 . Additional design factors were setup as below: ξ 1 = 8, ξ 2 = 4, a c 1 = 2, a c 2 = 2. Choose the activation functions σ c i (s i ) = [s 2 1,1 , s 1,1 s 1,2 , s 2 1,2 ] T and σ c i (s i ) = [s 2 2,1 , s 2,1 s 2,2 , s 2 2,2 ] T . The simulation outcomes are presented in Figures 2-13. The states of the system are depicted in Figures 2 and 8, and it can be observed that the closed-loop system stabilized after 20 s and 35 s, respectively. However, the system failed to meet the specified security constraints. Figures 3 and 9, shown in comparison with Figures 2 and 8, not only assured that the system states converged to zero, but also satisfied the given safety constraints. The evolving states s 1 (t) and s 2 (t) are presented in Figures 4 and 10, based on the safe control method with asymmetric input constraints. The optimal DSC policies are shown in Figures 5 and 11. We found that the optimal DSC policies were restricted to the asymmetric set [−0.25, 0.75] and [−0.5, 1.5]. Figures 6 and 12 represent the optimal auxiliary control strategies for subsystems 1 and 2, respectively. Figures 7 and 13 show the critic updated laws. It can be observed that the weights converged after 15 s. According to Theorem 3, we concluded that the proposed optimal safety control policy and the auxiliary control policy could stabilize the closed-loop nonlinear system and satisfy the safety constraints on the system state. Moreover, the optimal control policy eventually converged to a predefined set of constraints. Finally, the results of the simulation showed that the presented optimal DSC solution for constrained interconnected nonlinear safety-critical systems, affected by system state constraints, is effective.

Conclusions
This article presents an RL-based DSC scheme for interconnected nonlinear safetycritical systems with security constraints and asymmetric input constraints. The proposed method transformed an interconnected nonlinear safety-critical system with security and asymmetric input constraints into an interconnected nonlinear safety-critical system with only asymmetric input constraints by using the barrier function. The non-quadratic utility function was added to the performance function to address the asymmetric input constraint. The critic network was also used to approach the optimal performance function and to establish the best security policy. Our control scheme stabilizes the closed-loop system and minimizes the improved performance function. In addition, the simulation results demonstrated the efficacy of the proposed distributed security solution. Future work will explore the optimal safety control of stochastic interconnected nonlinear systems with event triggering.
Author Contributions: C.Q. and Y.W. provided methodology, validation, and writing-original draft preparation; T.Z. provided conceptualization, writing-review; J.Z. provided supervision; C.Q. provided funding support. All authors read and agreed to the published version of the manuscript.
Funding: This work was supported by the science and technology research project of the Henan province 222102240014.