Next Article in Journal
Robust Tilt-Integral-Derivative Controllers for Fractional-Order Interval Systems
Next Article in Special Issue
Algebraic-Connectivity-Based Multi-USV Distributed Formation Method via Adding a Reverse Edge
Previous Article in Journal
Estimating Failure Probability with Neural Operator Hybrid Approach
Previous Article in Special Issue
Distributed Finite-Time Cooperative Economic Dispatch Strategy for Smart Grid under DOS Attack
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An RNN-Based Performance Identification Model for Multi-Agent Containment Control Systems

1
School of Navigation, Dalian Maritime University, Dalian 116026, China
2
College of Marine Electrical Engineering, Dalian Maritime University, Dalian 116026, China
3
Research Institute of Intelligent Networks, Zhejiang Lab, Hangzhou 311121, China
4
Department of Informatics, University of Oslo, 0313 Oslo, Norway
*
Authors to whom correspondence should be addressed.
Mathematics 2023, 11(12), 2760; https://doi.org/10.3390/math11122760
Submission received: 24 May 2023 / Revised: 14 June 2023 / Accepted: 15 June 2023 / Published: 18 June 2023
(This article belongs to the Special Issue Mathematical Modeling for Parallel and Distributed Processing)

Abstract

:
In the containment control problem of multi-agent systems (MASs), the convergence of followers is always a potential threat to the security of system operations. From the perspective of system topology, the inherently non-linear properties of the algebraic connectivity of the follower2follower (F2F) network, combined with the influence of the leader2follower (L2F) topology on the system, make it difficult to design the convergence positions of the followers through mere mathematical analysis. Therefore, in the background of temporary networking tasks for large-scale systems, to achieve the goal of forecasting the performance of the whole system when networking is only completed with local information, this paper investigates the application and effectiveness of recurrent neural networks (RNNs) in the containment control system performance identification, thus improving the efficiency of system networking while ensuring system security. Two types of identification models based on two types of neural networks (NNs), MLP and standard RNN are developed, according to the range of information required for performance identification. Evaluation of the models is carried out by means of the coefficient of determination ( R 2 ) as well as the root-mean-square error (RMSE). The results show that each model may produce a better forecasting accuracy than the other models in specific cases, with models based on the standard RNN possessing smaller errors. With the proposed method, model identification can be achieved, but in-depth development of the model in further studies is still necessary to the extent the accuracy of the model.
MSC:
93A16; 93B24; 68T07; 68R10

1. Introduction

The issue of containment control of multi-agent systems (MASs) has been a hot topic of research in the field of control since it was first proposed by Ren Wei for its advantages in ensuring the safe operation of cooperative systems [1,2]. Sensor-equipped agents are able to detect information about obstacles during movement, and the leader agents in the system are able to form a dynamic safety zone accordingly. With the control protocol, all follower agents interact and converge to the safety zone and follow the leaders in their movements [3,4]. Theoretically, in many scenarios where containment control systems cooperate in collision avoidance, only the collision avoidance constraints of the leader agents have to be taken into account for achieving collision avoidance of the whole system. However, in the practical collision avoidance problem, due to the action of various collision avoidance algorithms, such as the artificial potential field (APF) method [5,6,7], the movement directions of agents when avoiding obstacles is random, and inevitably, variations in the relative position of the leader agents will lead to variations in the positions of the follower agents as well, thus causing the possibility of collisions between the followers, greatly threatening the safe operation of the system. Therefore, when analysing the performance of the system, in addition to the convergence speed of the system, discussed in a general control problem in [8], in the containment control problem, the possibility of collisions within the system are also considered. In order to lower the risk of collisions between follower agents in the system, the follower convergence positions should be dispersed as much as possible, so that a safe distance can be maintained between the follower agents during collision avoidance, even if the leader agents’ positions are constantly changing.
In the case of the study on containment control issues, it can be noted that the factors affecting the convergence position of the followers can be divided into two parts from a system topology perspective: the F2F network topology, and the L2F network topology. Algebraic connectivity, as an important indicator to measure the capacity of a system, represents the convergence speed of the system. Many existing papers have investigated the relationship between algebraic connectivity and system topology [9,10]. In the containment control problem, owning to the non-linear properties of the algebraic connectivity of the F2F network topology itself [11,12], and the influence of the L2F topology on the system, the dispersion of the follower convergence position in the system also shows non-linear features, thus becoming difficult to obtain a relatively accurate performance identification model of the containment control system by mere mathematical modelling.
Neural networks (NNs) are superior in processing such non-linear, sophisticated modelling issues. Based on network topology theory, they have the ability to process information in parallel distributions, as well as intelligent and adaptive learning features, and has been widely used in the analysis of non-linear problems [13,14]. It is clear from the previous analysis that the convergence position of a follower is determined by the F2F and L2F network topologies, and that these two quantities show some correlation in the sequence, so recurrent neural networks (RNNs) are suitable for modelling the sequence for this problem [15]. For processing sequence data, the characteristics of RNNs are the ability to transfer data information horizontally between neurons and to achieve partial preservation of the dependencies between sequences, and thus are widely used in various sequence-related problems [16,17,18]. Thus, based on RNN, the identification results of the performance of the containment control system can be determined as the algebraic connectivity of the F2F network and dispersion of follower convergence positions in the system. In the problem of distributed control of a multi-agent system, the system usually needs to be temporarily networked based on the cooperative task requirements. When the system is large in scale, the process of establishing a containment control system that can meet the performance level requirements while ensuring that the agents in system are sufficiently distributed is very complicated. The addition of RNNs will greatly improve the networking efficiency of the system by enabling prediction of the situation by the end of the whole system networking only using the local information of the agents as the input based on the trained system performance identification model.
Alongside methods on the control side, improving the efficiency of system networking can also be considered an important aspect of communication. The polymorphic network [19], proposed by Wu Jiangxing et al., is a full-dimensional defined smart network [20], whose fundamental idea is to develop an opening network structure that separates the technical institution from the physical platform, such that diverse network technologies can co-exist in it, while dynamically loading and operating in a supported environment, to achieve intelligent deployment of network technologies and make them adaptable to a variety of specialized application needs [21,22]. The clustering system with polymorphic network architecture guarantees the self-improvement and development of the various system and network tasks, while enabling the intelligent, efficient, secure and integrated deployment and management of the diverse network [23]. Thus, the polymorphic network provides an efficient and secure base network for the networking environment of MASs with novel baseline services such as multimodal addressing, routing control, transmission modes, computational processing, and so on. As the problem of efficient integration of the polymorphic network and MAS communication involved requires more theoretical support for information and communication [24], while this paper focuses on the analysis of system performance from the perspective of identification models, only discussing a feasible idea here, and does not elaborate on the details of the polymorphic network.
In summary, the purpose of this paper is to apply RNN to the distributed identification of the performance of MASs to explore the networking process only using local information to achieve the performance prediction of the whole system when the networking is completed. In this paper, an RNN-based performance identification model for multi-agent containment control systems is developed by simulating and sampling data from the multi-agent containment control system topology and using the sampled data as learning samples for the RNN. The training converged model is implemented to identify the performance of the containment control system during the networking process. The RNN-based performance identification model is compared with a traditional MLP-based performance identification model and the identification accuracy of the different models is discussed.

2. Preliminaries

2.1. Graph Theory

In this section, the required concepts and graphical representations in this paper are introduced. Consider a network G = ( V , E ) consisting of n wireless sensing-enabled agents, in which V = ( v 1 , v 2 , . . . , v n ) denotes the vertices set and E = ( v i , v j ) v i , v j V denotes the edge set that represents links between each two vertices. Vertices which are adjacent to vertex i are referred to as neighbours of i and is indicated as N i = v j V : e i j E . Graphs can be divided into two types according to the assigned direction of their edges, namely directed and undirected graphs. For an undirected graph, ( v i , v j ) E means that v i and v j are connected and they can transmit information to each other. For a directed graph ( v i , v j ) E indicates that information can only be transmitted from v j to v i . The links between each two vertices in the graph are defined by the adjacency matrix A R n × n , where a i j = 1 means there is an edge directed from v j to v i , otherwise a i j = 0 . The degree matrix D = d i a g ( d 1 , d 2 , . . . , d n ) is a diagonal matrix, where d i = j = 1 n a i j represents the degree of vertex i. The definition of a Laplacian matrix is given by the following equation
L = D A
where
l i j = j = 1 n a i j , i = j a i j , i j
For a Laplacian matrix, the following equation is given: L 1 = 0 . Thus, the Laplacian matrix has an eigenvalue equal to 0. For an undirected graph, the eigenvalues of its Laplacian matrix are arranged in ascending sequence as
λ 1 λ 2 λ n
The second smallest eigenvalue of the Laplacian matrix, λ 2 , is known as the algebraic connectivity. It is an important measurement of the performance of the system. When and only when λ 2 > 0 , the graph is connected [9]. The comprehensive overview of spectral properties of the graph can be found in [25].

2.2. Containment Control Based on MAS

Before discussing the containment control problem, we give definitions of the leader, follower and convex hull, as noted in [1].
Definition 1.
For the n-agent system, an agent is called a leader if the agent has no neighbour. An agent is called a follower if the agent has a neighbour.
Definition 2.
Let C be a set in a real vector space V R p . The set C is called convex if, for any x and y in C, the point ( 1 z ) x + z y is in C for any z [ 0 , 1 ] . The convex hull for a set of points X in V is the minimal convex set containing all points in X. We use C o ( X ) to denote the convex hull of X. In particular, when V R , C o ( X ) = X X [ min i x i , max i x i ] .
Definition 3.
Let X be a set in a real vector space V R p . The convex hull C o ( X ) of X is denoted as
C o ( X ) = i = 1 k α i x i x i X , α i R , α i 0 , i = 1 k α i = 1 , k = 1 , 2 ,
Consider a system consisting of n agents, in which there are m leaders as well as n m followers. The corresponding leader and followers’ sets are defined by R and F , respectively. The Laplacian matrix L corresponding to the communication topology G of the system can be expressed as follows
L = 0 m × m 0 m × ( n m ) L 1 L 2
where L 1 R ( n m ) × m , L 2 R ( n m ) × ( n m ) .
In order to study the containment control problems of systems, we need the following two lemmas.
Lemma 1.
All the eigenvalues of L 2 defined in (3) have positive real parts if the digraph G has a spanning forest whose roots are the exact leaders of MASs [26].
Lemma 2.
Assume that the communication digraph G has a directed spanning forest. The sum of each row of L 2 1 L 1 is 1 and the element of L 2 1 L 1 is positive if and only if the ith leader has a directed path to the jth follower [23].
Lemma 2 indicates that if there exists a path from a certain leader to a certain follower, then the follower eventually converges to the interior of the convex hull formed by all leaders.

3. Methodology

Inspired by the biological nervous system, neural networks (NNs) have various of computational models abstracted by simulating the mechanisms by which the human brain’s nervous system processes complicated information from the outside world. They have the capability to process parallel distributed information, based on network topology theory, as well as features of intelligence and adaptive learning. The characteristics of NNs are the neurons in the chosen structure and the connections between them, the choice of the activation function and how the weights are calculated according to the selected method. Neural networks combine the operating mechanisms of biological NNs with mathematical statistical models which are trained to enable them to have some decision-making or predictive capability. In this section, two types of NNs, the MLP and the standard RNN, are introduced.

3.1. MLP

The multi-layer perceptron (MLP), as a feed-forward NN, evolved from the perceptron. Its basic model structure consists of an input layer, a hidden layer and an output layer, where each node is a neuron possessing a non-linear activation function except for the input layer, as well as the number of hidden layers depending on the specific problem requirements. Typically, with all layers of the MLP fully connected to the next layer, the input layer can be considered a fully connected to the hidden layer, and the hidden layer to the output layer can be considered a classifier. The general structure of the MLP is shown in Figure 1. The input layer is composed of input neurons, in which every neuron is connected with at least one other neuron of the hidden layer.
The structure of the MLP shows that each neuron in the same hidden layer is not connected to each other and information cannot be transferred between these neurons; thus, the MLP is a memoryless network, which is unsatisfactory when it comes to describing data with dependencies between sequences.

3.2. Standard RNN

In the existing studies, many types of NNs, such as MLP and convolutional neural network(CNN), are based on the premise that the various elements in the NN are independent from each other, including the inputs and outputs. However, in reality, many elements are connected, and such models do not provide an appropriate description of the true relationship between these elements. In RNNs, the neurons of the hidden layer are interconnected, through which time series inputs can be passed sequentially through the neurons in the hidden layer; therefore, the correlation of long-term events can be considered.
The structure of RNNs and standard RNN cells are shown in Figure 2 and Figure 3, where X t denotes the input vector at time step t, h t denotes the hidden state output at time step t, and W X and W h are the input and interconnected weight matrices for the output of the hidden layer, respectively.
Different from MLP cells, at time step t, the state output of a hidden layer cell h t is determined by h t 1 at the prior time step t 1 , and then passed forward. This key design enables RNNs memorability.

4. Analysis of Multi-Agent Containment Control Systems Based on NN

In this section, the process of obtaining experimental data is described based on the multi-agent system containment control problem. As discussed previously, in terms of ensuring the system’s operational security and improving the efficiency of temporary networking, this paper explores the relationship between multi-agent containment control system topology and the dispersion of follower convergence locations in the system, as well as the forecasting of the whole system performance through the local information of nodes from the perspective of the distributed identification of the system. From Definition 3, it follows that in the containment control problems, C o ( X F ) C o ( X R ) holds when t , where C o ( X F ) and C o ( X R ) denote the convex hull spanned by followers and leaders, respectively. To analyse the problem of multi-agent containment control on the basis of follower agent convergence in the two-dimensional plane, we define a function related to the convergence position to describe the dispersion of the follower convergence positions.
Definition 4.
Let X F P be a set in a real vector space V R p , and X ¯ F P be the gravity of the convex hull constructed by the follower converging positions. The dispersion of the follower convergence positions is denoted as
σ ( X F P ) = 1 k i = 1 k ( X F P i X ¯ F P ) 2 , k = 1 , 2 , . . . , n m
where
X ¯ F P = 1 k i = 1 k X F P i , k = 1 , 2 , . . . , n m

4.1. Data

From the perspective of system topology, the degree metric of a node is very important as it represents the communication connectivity of the agents. As noted in [27], nodes with more communication links hold a more important position in the system. Therefore, in the context of this paper, the following variables are chosen as indicators for the MAS performance identification model: the degree matrix of each node in the system (D), the sum of degrees of the neighbour sets of each node ( D N l ), the sum of degrees of the neighbour set nodes of each node’s neighbours ( D N l N ), the connection relationship matrix of the leader to follower agents ( A L 2 F ), the algebraic connectivity of the F2F network ( λ 2 F ), and the dispersion of follower convergence positions ( σ ( X F P ) ). The system topology studied in this paper is a hybrid form, comprising directed L2F topology and undirected F2F topology.

4.1.1. Network Topology of F2F

In this section, the direct simulation of Monte Carlo method (DSMC) is used to simulate the F2F topology in the containment control problem. The principle of simulating the adjacency matrix is based on algebraic graph theory, whereby communication links between real agents are replaced with finite numbers of randomly generated zeros and ones. The number 1 means that the two agents are connected while 0 means that they are not connected. In order to make the simulation stochastic, the following assumption is required.
Assumption A1.
In a containment system, the probability that agents i and j are connected is p ( 0 < p < 1 ).
In the experiment 10,000 simulations of A F are performed with DSMC. A flow chart of the algorithm is shown in Figure 4. The aim of setting the connectivity probability p is to make the simulation sufficiently random, and simultaneously obtain as many types of topology as possible. The NN trained with these data will be more accurate in forecasting the system performance.

4.1.2. Network Topology of L2F

The F2F network is obtained in Section 4.1.1. The follower agents that leaders directly communicate with are selected based on the system topology to obtain the containment system topology. In this paper, the algorithm for the selection of the follower agents is as follows:
Consider a containment control system with m leaders and n m followers, where the agent l has a set of active neighbours N l .
Step 1: The degree of each node is calculated and the r nodes with the smallest degree is selected as the set of alternative follower nodes ( r m ).
A situation may arise where there are several nodes with the same degree in the alternative node set, such that the number of nodes in the node set is greater than m. Further selection based on the alternative node set is then required to determine the follower agents with which the leaders directly communicates with. This is why Step 2 and 3 are necessary.
Step 2: Nodes with the smallest degree are selected as a priority. For follower nodes with the same degree, the sum of the degrees of each follower node in its neighbour set ( D N l ) are calculated, and the nodes with the largest sum of degrees of the neighbour set nodes are selected as the followers that the leader directly communicates with.
Step 3: According to the selection results of Steps 1 and 2, the sum of degrees of the neighbour set nodes calculate for each node’s neighbours ( D N l N ), and the node with the largest sum is selected as the followers that the leader directly communicates with.
Step 4: The leader and follower agents selected by the algorithm above are connected, generating the L2F network topology A L 2 F which in turn gives the complete topology of the multi-agent containment control system.

4.1.3. Calculation of the Relevant Indicators of System Performance

In this study the relevant computational indicators of system performance are the algebraic connectivity of the F2F network topology λ 2 F (calculated by algebraic graph theory) and the dispersion of follower convergence positions in the system σ ( X F P ) (calculated using Definition 2).

4.1.4. Dataset for NN Training

In addition to investigating the relationship between the multi-agent containment control system topology and the dispersion of follower convergence positions in the system, in order to highlight the efficiency advantages of distributed identification in the process of system networking, all global information about the system, i.e., the whole system topology of the underlying F2F network, was hidden when constructing the dataset for the NN, and only local information about each agents is reserved, i.e., the sensing of the follower agents to the neighbour set of followers and the sensing of the leader agents to their directly communicating followers. Thus, in the dataset the local information of the agents in each system can be represented by a matrix of the following form
Θ I n p u t = θ 1 θ 2 θ i θ n m d 1 d 2 d i d n m d N 1 d N 2 d N i d N n m d N 1 N d N 2 N d N i N d N n m N
where Θ I n p u t represents the input to the NN where the first row composed of ones and zeros describes the connection relationship between the leader and follower agents in the system, θ i = 1 , i [ 1 , n m ] indicates that the leader is connected to the ith follower while 0 denotes no connection. The remaining three rows are vectors transformed from the node degree relativity matrix, d i denotes the degree of the ith follower, d N i denotes the sum of degrees of the neighbour set of the ith follower, and d N i N denotes the sum of degrees of the neighbour set nodes of the ith follower’s neighbours.
The output of the NN Θ O u t p u t , i.e., the two performance indicators of the multi-agent containment control system in this study, can be expressed in the form of a vector as follows
Θ I n p u t = λ 2 F σ ( X F P )

4.2. Data Pre-Processing

The pre-processing of original data is divided into two parts:
(1)
Removal of unconnected system topology data.
Since simulating the A F 2 F matrix by DSMC is completely random, a small probability of connectivity between agents is likely to lead to disconnection of the F2F network. In the context of this paper’s problem, there is no research significance in this part of the data. Since the F2F network is undirected, it can be directly determined whether the system is connected by calculating the algebraic connectivity of the system topology through algebraic graph theory.
(2)
Data normalization.
In NN training, data normalization is essential [28]. Different evaluation indicators as inputs often have different magnitudes and dimensions, which may affect the results of the NN training; hence, the purpose of normalization is to eliminate the effect of magnitude gaps between the input data. The normalized indicators are all of the same order of magnitude, speeding up the convergence of the model and minimizing errors in the training process [29]. The min–max normalization method is used to normalize all data within the range of 0 to 1. The formula for normalization is given by
x ˜ = x M i n x M a x x M i n x
where x represents the original data, x ˜ represents the normalized data, and M i n x and M a x x are the minimum and maximum values of the entire original data set, including data from the training and test sets, respectively.

4.3. Development and Implementation of the System Models Using NN

Keeping the simulation method of the containment control system topology as described in Section 4.1 unchanged, two types of distributed identification models of system performance are proposed and investigated. The inputs to the models are the local information from agents and the outputs are the performance indicators of the systems. In each system, only the number of input features is different, all other features remain the same. According to the information range for identifying the system performance, two types of identification models were proposed, one only based on the node itself and the neighbour set nodes, and the other based on the node itself, the neighbour set nodes and the neighbour set nodes of its neighbours. Details of the variables in the two models are given in Table 1.
The forecasting model for system performance identification was created using a portion of the pre-processed data from Section 4.2 as the training dataset. The size of the dataset for the models is shown in Table 2, where n c denotes the number of connected system topologies and n m denotes the number of follower agents in the containment control system.
In this study, a two-layer feed-forward network with sigmoid activation functions for the hidden layer neurons and linear activation functions for the output layer neurons is chosen. When training the NN, the network weights are updated by the Levenberg–Marquart (LM) backpropagation algorithm, possessing the fastest training speed for medium-sized NN training. The coefficient of determination ( R 2 ) and RMSE are employed to assess the forecasting performance with the following equations
R 2 = 1 i = 1 m s ( y ^ i y i ) 2 i = 1 m s ( y ¯ i y i ) 2
R M S E = 1 m s ( i = 1 m s ( y i y ^ i ) 2
where y ^ i denotes the ith forecasting value, y i denotes the corresponding true value, y ¯ i denotes the mean of the true values, and m s denotes the total number of samples.
The parameters selected for NN training based on the models employed are given in Table 3. Training of the NN was implemented in the MATLAB programming environment.

4.4. Results and Discussions

In this subsection, the performance of the multi-agent containment control system is investigated using two NN models, MLP and standard RNN, and the two types of distributed identification models for the system performance proposed in Section 4.3 are compared. In order to assess the forecasting performance of the distributed system identification models based on NNs, two system identification models are trained with MLP and standard RNN, and the system performance indicators ( λ 2 F and σ ( X F P ) ) are forecasted through test sets with the parameters given in Table 3. To enhance the forecasting accuracy of the model, data for the learning and testing sets are determined separately by random sampling before the training starts. Measurements of the forecasting performance for the identification models based on the two NNs for the system are given in Table 4.
In the context of multi-agent containment control system performance identification, compared to the MLP-based model, the proposed standard RNN-based Model 2 performed well in terms of prediction accuracy at the cost of a larger CPU training time. The standard RNN-based Model 2 had a greater prediction accuracy than the two MLP-based models, increasing the R 2 of the two indicators to 0.9639 and 0.9453 and decreasing the R M S E to 0.0389 and 0.0400, respectively, as shown in Table 4. Furthermore, compared to the two MLP-based models, the CPU training time of the proposed standard RNN-based Model 2 increased by 4 and 2 times, respectively.

4.4.1. System Performance Forecasting with Model 1

Depending on the range of required information for distributed system identification, two system identification models are proposed in Section 4.3, i.e., one only based on the node itself and the neighbour set nodes, and the other based on the node itself, the neighbour set nodes and the neighbour set nodes of its neighbours. System identification also includes the process of selecting leaders which directly communicate with followers based on the followers’ local information, as described in Section 4.1.
In this study, the containment control system is composed of 12 agents with 3 leaders, and the F2F network consisting of 9 follower agents. The position vectors of the three static leaders with fixed positions are [ 0 , 0 ] , [ 100 , 100 ] and [ 200 , 0 ] . Take node 7 for example, in Model 1, the range of identification information of node 7 is shown in Figure 5, including its own information about itself (agent 7) and information about the neighbour set (agent 5, 6 and 8). The input matrix Θ I n p u t corresponding to this system is as follows
Θ I n p u t = 1 0 0 0 1 0 0 0 1 2 2 2 4 2 2 3 2 1 6 6 6 8 7 5 6 4 2
where the first row denotes the communication links from leaders to followers, i.e., leader 1 (agent 10) connects to follower 1 (agent 1), leader 2 (agent 11) connects to follower 5 (agent 5) and leader 3 (agent 11) connects to follower 9 (agent 9).
A total of 5340 sets of randomly generated sample data from the containment control system topology after pre-processing are employed in this paper. The scatter plots of the experimental samples of the testing dataset and the predicted values of λ 2 F and σ ( X F P ) are shown in Figure 6, where the upper two figures are the MLP forecasting results and the lower two figures are the standard RNN forecasting results. The results of the system performance identification denoted by the predicted values are evaluated by R 2 and RMSE, as seen in Table 4. It is clear that the model outperforms in terms of in-sample predictions of system performance, λ 2 F and σ ( X F P ) , and for Model 1, the standard RNN performs better than the MLP in system performance identification.

4.4.2. System Performance Forecasting with Model 2

Similarly, the containment control system is composed of 12 agents with 3 leaders, and the F2F network consisting of 9 follower agents. Take node 7 for example, in Model 2, the range of identification information of node 7 is shown in Figure 7, including information about its own (agent 7), information about the neighbour set (agent 5, 6 and 8), and information about the neighbour set nodes of its neighbours (agent 4, 3 and 9).
Θ I n p u t = 1 0 0 0 1 0 0 0 1 2 2 2 4 2 2 3 2 1 6 6 6 8 7 5 6 4 2 10 10 9 9 10 8 7 4 3
where the first row denotes the communication links from leaders to followers, i.e., leader 1 (agent 10) connects to follower 1 (agent 1), leader 2 (agent 11) connects to follower 5 (agent 5) and leader 3 (agent 11) connects to follower 9 (agent 9).
A total of 5340 sets of randomly generated sample data of the containment control system topology after pre-processing are employed in this paper. The scatter plots of the experimental samples of the testing dataset and the predicted values of λ 2 F and σ ( X F P ) are shown in Figure 8, where the upper two figures are the MLP forecasting results and the lower two figures are the standard RNN forecasting results. The results of system performance identification denoted by the predicted values are evaluated by R 2 and RMSE, as seen in Table 4. It is clear that the model outperformed in terms of in-sample prediction of system performance, λ 2 F and σ ( X F P ) . For Model 2, the standard RNN performs better than the MLP, and the forecasting performances of both types of NNs based on Model 2 are better than Model 1.
Forecasting error curves of the follower convergence positions σ ( X F P ) by four types of models for system performance identification are shown in Figure 9, with 267 samples included in the forecasting. It shows that each model gives a better forecasting accuracy than the other models in specific cases, resulting from the strong non-linearity of the system topology and the algebraic connectivity. From the experiments the results show that the standard RNN-Model 2 has the smaller errors in most cases, but it can only ensure the accuracy of the forecasting in a limited range as there are still some points where the errors increase suddenly. Figure 8 shows that the prediction of the model is accurate only in a relatively limited range, 0 < λ 2 F 2 and 0 < σ ( X F P ) 30 , beyond which the error tends to increase. Therefore, further development of the model is necessary to improve its forecasting accuracy, and optimize and supplement the sample datasets.

4.4.3. Limitations

The potential limitations of the study can be considered from the aspect of practical applications. Figure 6 and Figure 8 show that when σ ( X F P ) increases to a certain level, such as beyond 0 < σ ( X F P ) 30 , the forecasting accuracy error tends to increase. This is the limitation when applying our research to practical containment problems, because in practice a greater σ ( X F P ) is preferred as the followers are more dispersed in the convex hull spanned by followers, and the risk of collisions between followers is lower. In this paper, the prediction accuracy is not yet guaranteed over these large ranges. Such a limitation would not affect the generalizability or validity of the results in this paper, but in further research, based on the forecasting accuracy of σ ( X F P ) for greater ranges, there is still a requirement to make some improvements to the performance identification model.

4.4.4. Suggestions and Recommendations

The further developments and optimizations suggested to improve the accuracy of the model identification include:
(1)
Optimization of the extraction methods for containment control system features. As shown here, the L2F networks are constructed according to certain F2F network to obtain the complete containment control system topologies; therefore, all works extracting system feature information are based on these. The aim of this construction is to describe the containment control system from the perspective of graph theory. There might be better ways to construct the L2F network topology and extraction methods for containment control system features.
(2)
Modelling systems based on better-performing NNs or hybrid NNs. Two identification models based on two types of relatively simple NNs are verified in this paper. The prediction results are still partly inaccurate due to the disadvantages of MLP and RNNs; therefore, some better-performing NNs and hybrid NNs such as LSTM, GRU, and their hybrid forms, may improve the accuracy of model identification.
The second point is feasible but the first point might not be that easy. This is because when extracting the features of a containment control system, how the connections from leaders to followers affect the final converging positions of the followers is hard to identify due to the coupling of L 1 and L 2 when calculating the follower converging positions. Therefore, this would be a great challenge to implement.
The generalization of the findings to different containment control system types and scales is good and the proposed RNN-based model could be applied effectively to other MASs with similar characteristics. In this paper, a method to simulate a certain scale of containment control system and a method to extract the system information to form a new matrix based on an F2F network topology are provided. These methods could be applied to any system scale in which the communication links could be represented with a topology construction. Containment control problems are relatively unique issues because of the effect of leaders on followers. When applied to other MASs with similar characteristics, the proposed RNN-based model would be more simple without the need to consider the leader to follower communication links. In summary, the proposed standard RNN-Model2 is able to forecast the performance of distributed system identification based on the local information of the agents, greatly facilitating the system’s networking efficiency when applied to large-scale unmanned system networking.

5. Conclusions

NNs are powerful tools for coping with non-linear, complex modelling problems and have unique advantages in model identification, forecasting and control of complex systems. In this research, two types of system performance identification models based on two types of NNs, MLP and standard RNN, were developed for a multi-agent containment control system, according to the range of information required for identification, and the identification results of these models were then compared. The results show that the RNN-based model is overall more accurate than the MLP-based model for the performance identification of the multi-agent containment control system. Although this study was conducted for a containment control system with 12 agents, the proposed standard RNN-based Model 2 could be applied to various types and scales of containment control systems based on the local information of the agents to precisely forecast the results of distributed system identification. However, to further improve the accuracy of the model identification more in-depth development of the model is required, as well as optimization and supplementation of the dataset samples. By applying this RNN-based system performance identification model to the networking process of large-scale systems, the goal of improving the efficiency of system networking could be achieved by only using local information to forecast the performance of the whole system when the networking is completed. This study may also provide solutions to other model identification problems concerning MASs cooperative networking.

Author Contributions

Conceptualization, W.L. and F.T.; writing—original draft preparation, W.L. and F.T. in close cooperation with X.F.; writing—review and editing, W.L., F.T., X.F. and Y.L.; supervision: S.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Key Research and Development Project of China (Grant No. 2022YFB2901400), the National Natural Science Foundation of China (Grants No. U22A2005, 52201407, 51939001, 61976033, 62173172), the High Level Talents Innovation Support Plan of Dalian (Young Science and Technology Star Project) (Grant No. 2021RQ058), the Zhejiang Lab Open Research Project (Grant No. K2022QA0AB03), the Fundamental Research Funds for the Central Universities (Grant No. 3132023103), the Natural Foundation Guidance Plan Project of Liaoning (Grant 2019-ZD-0151), the Liaoning Revitalization Talents Program (Grant XLYC1908018) and the Key Research Project of Zhejiang Lab (Grant No. 2021LE0AC02).

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cao, Y.C.; Ren, W. Containment control with multiple stationary or dynamic leaders under a directed interaction graph. In Proceedings of the 48th IEEE Conference on Decision and Control (CDC) Held Jointly with 28th Chinese Control Conference, Shanghai, China, 15–18 December 2009. [Google Scholar]
  2. Meng, Z.Y.; Ren, W.; You, Z. Distributed finite-time attitude containment control for multiple rigid bodies. Automatica 2010, 46, 2092–2099. [Google Scholar] [CrossRef]
  3. Wen, G.; Zhao, Y.; Duan, Z.; Yu, W.; Chen, G. Containment of higher-order multi-leader multi-agent systems: A dynamic output approach. IEEE Trans. Autom. Control. 2015, 61, 1135–1140. [Google Scholar] [CrossRef]
  4. Wang, F.Y.; Ni, Y.H.; Liu, Z.X.; Chen, Z.Q. Containment control for general second-order multiagent systems with switched dynamics. IEEE Trans. Cybernetics. 2018, 50, 550–560. [Google Scholar] [CrossRef]
  5. Orozco-Rosas, U.; Montiel, O.; Sepúlveda, R. Mobile robot path planning using membrane evolutionary artificial potential field. Appl. Soft Comput. 2019, 77, 236–251. [Google Scholar] [CrossRef]
  6. Jayaweera, H.M.; Hanoun, S. A dynamic artificial potential field (d-apf) uav path planning technique for following ground moving targets. IEEE Access 2020, 8, 192760–192776. [Google Scholar] [CrossRef]
  7. Wen, G.X.; Chen, C.P.; Liu, Y.J. Formation control with obstacle avoidance for a class of stochastic multiagent systems. IEEE Trans. Ind. Electron. 2017, 65, 5847–5855. [Google Scholar] [CrossRef]
  8. Olfati-Saber, R.; Fax, J.A.; Murray, R.M. Consensus and cooperation in networked multi-agent systems. Proc. IEEE 2007, 95, 215–560. [Google Scholar] [CrossRef] [Green Version]
  9. Fiedler, M. Algebraic connectivity of graphs. Czechoslov. Math. J. 1973, 23, 298–305. [Google Scholar] [CrossRef]
  10. Kim, Y.; Mesbahi, M. On maximizing the second smallest eigenvalue of a state-dependent graph Laplacian. In Proceedings of the 2005 American Control Conference, Portland, OR, USA, 8–10 June 2005. [Google Scholar]
  11. Merris, R. Laplace matrices of graphs: A survery. Linear Algebra Appl. 1994, 197–198, 143–176. [Google Scholar] [CrossRef] [Green Version]
  12. Kirkland, S. A bound on the algebraic connectivity of a graph in terms of the number of cut points. Linear Multilinear Algebra. 2004, 47, 93–103. [Google Scholar] [CrossRef]
  13. Yang, L.; Sun, Q.; Zhang, N.; Li, Y. Indirect multi-energy transactions of energy internet with deep reinforcement learning approach. IEEE Trans. Power Syst. 2022, 37, 4067–4077. [Google Scholar] [CrossRef]
  14. Li, Y.; Huang, B.; Zhang, H. Synchronization analysis for coupled static neural networks with stochastic disturbance and interval time-varying delay. Neural Comput. Appl. 2018, 30, 1123–1132. [Google Scholar] [CrossRef]
  15. Rodriguez, P.; Wiles, J.; Elman, J.L. A recurrent neural network that learns to count. Connect. Sci. 1999, 11, 5–40. [Google Scholar] [CrossRef] [Green Version]
  16. Shao, H.; Nonami, K.; Wojtara, T.; Yuasa, R.; Amano, S.; Waterman, D. Neuro-fuzzy position control of demining tele-operation system based on RNN modeling. Robot. Comput.-Integr. Manuf. 2006, 22, 25–32. [Google Scholar] [CrossRef]
  17. Canizo, M.; Triguero, I.; Conde, A.; Onieva, E. Multi-head CNN–RNN for multi-time series anomaly detection: An industrial case study. Neurocomputing 2019, 363, 246–260. [Google Scholar] [CrossRef]
  18. Kwon, S.; Yoo, H.; Shon, T. IEEE 1815.1-based power system security with bidirectional RNN-based network anomalous attack detection for cyber-physical system. IEEE Access 2020, 8, 77572–77586. [Google Scholar] [CrossRef]
  19. Li, J.F.; Hu, Y.X.; Yi, P.; Wu, J.X. Development Roadmap of Polymorphic Intelligence Network Technology Toward 2035. Strateg. Study Chin. Acad. Eng. 2020, 22, 141–147. (In Chinese) [Google Scholar] [CrossRef]
  20. Hu, Y.X.; Yi, P.; Sun, P.H.; Wu, J.X. Research on the full-dimensional defined polymorphic smart network. J. Commun. 2019, 40, 1–12. (In Chinese) [Google Scholar]
  21. Wu, J.X.; Hu, Y.X. The development paradigm of separation between network technical system and supporting environment. Inf. Commun. Technol. Policy 2017, 47, 1–11. (In Chinese) [Google Scholar]
  22. Li, T.; Chen, L.; Jensen, C.S.; Pedersen, T.B. TRACE: Real-time Compression of Streaming Trajectories in Road Networks. In Proceedings of the VLDB Endowment, Copenhagen, Denmark, 16–20 August 2021. [Google Scholar]
  23. Li, T.; Chen, L.; Jensen, C.S.; Pedersen, T.B.; Gao, Y.; Hu, J. Evolutionary Clustering of Moving Objects. In Proceedings of the IEEE 38th International Conference on Data Engineering, Kuala Lumpur, Malaysia, 9–12 May 2022. [Google Scholar]
  24. Li, H.; Wu, J.X.; Xing, K.X.; Yi, P.; Chen, S. Prototype and testing report of a multi-identifier system for reconfigurable network architecture under co-governing. Sci. Sin. Inform. 2019, 49, 1186–1204. (In Chinese) [Google Scholar] [CrossRef]
  25. Godsil, C.; Royle, G.F. Algebraic Graph Theory; Springer Science & Business Media: New York, NY, USA, 2001. [Google Scholar]
  26. Cao, Y.C.; Stuart, D.; Ren, W. Distributed containment control for multiple autonomous vehicles with double-integrator dynamics: Algorithms and experiments. IEEE Trans. Control Syst. Technol. 2010, 19, 929–938. [Google Scholar] [CrossRef]
  27. Shan, Q.H.; Teng, F.; Li, T.S. Containment control of multi-agent systems with nonvanishing disturbance via topology reconfiguration. Sci. China Inf. Sci. 2021, 64, 1–3. [Google Scholar] [CrossRef]
  28. Anysz, H.; Zbiciak, A.; Ibadov, N. The influence of input data standardization method on prediction accuracy of artificial neural networks. Procedia Eng. 2016, 153, 66–70. [Google Scholar] [CrossRef] [Green Version]
  29. Rojas, R. Neural Networks: A Systematic Introduction; Springer Science & Business Media: New York, NY, USA, 2013. [Google Scholar]
Figure 1. Structure of the MLP.
Figure 1. Structure of the MLP.
Mathematics 11 02760 g001
Figure 2. Structure of RNNs.
Figure 2. Structure of RNNs.
Mathematics 11 02760 g002
Figure 3. Standard RNN cell.
Figure 3. Standard RNN cell.
Mathematics 11 02760 g003
Figure 4. Algorithm simulating the F2F topology with DSMC.
Figure 4. Algorithm simulating the F2F topology with DSMC.
Mathematics 11 02760 g004
Figure 5. Information range required for identification of node 7 in Model 1.
Figure 5. Information range required for identification of node 7 in Model 1.
Mathematics 11 02760 g005
Figure 6. Scatter plots of λ 2 F and σ ( X F P ) and their predicted values with Model 1.
Figure 6. Scatter plots of λ 2 F and σ ( X F P ) and their predicted values with Model 1.
Mathematics 11 02760 g006
Figure 7. Information range required for identification of node 7 in Model 2.
Figure 7. Information range required for identification of node 7 in Model 2.
Mathematics 11 02760 g007
Figure 8. Scatter plots of λ 2 F and σ ( X F P ) and their predicted values with Model 2.
Figure 8. Scatter plots of λ 2 F and σ ( X F P ) and their predicted values with Model 2.
Mathematics 11 02760 g008
Figure 9. Forecasting error of σ ( X F P ) by four types of models for system performance identification.
Figure 9. Forecasting error of σ ( X F P ) by four types of models for system performance identification.
Mathematics 11 02760 g009
Table 1. Details of variables selected for the models.
Table 1. Details of variables selected for the models.
ModelInput VariablesOutput Variables
Model 1D, D N l , A L 2 F λ 2 F , σ ( X F P )
Model 2D, D N l , D N l N , A L 2 F
Table 2. Size of the dataset for the models.
Table 2. Size of the dataset for the models.
ModelInput Feature SetOutput
Model 1 ( ( n m ) 3 ) n c ( 1 2 ) n c
Model 2 ( ( n m ) 4 ) n c
Table 3. Selection of the NN parameters.
Table 3. Selection of the NN parameters.
ParameterValue
Number of Hidden Layer1
Activation Function in Hidden LayerLog sigmoid
Activation Function in Output LayerPure linear
Learning AlgorithmLevenberg–Marquadt
Expected Coefficient of Determination≥0.9000
Size of Learning Dataset 80 % of valid data
Size of Validation Dataset 15 % of valid data
Size of Testing Dataset 5 % of valid data
Table 4. Measurements of the forecasting performance.
Table 4. Measurements of the forecasting performance.
Type of ModelModel 1Model 2
Input variables of the modelD, D N l , A L 2 F D, D N l , D N l N , A L 2 F
Type of NNMLPStandard RNNMLPStandard RNN
CPU training time(s)18663591
R 2 of λ 2 F 0.92720.96320.94670.9639
R 2 of σ ( X F P ) 0.90870.93450.90600.9453
R M S E of λ 2 F 0.05970.04240.05010.0389
R M S E of σ ( X F P ) 0.05240.04230.05210.0400
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liu, W.; Teng, F.; Fang, X.; Liang, Y.; Zhang, S. An RNN-Based Performance Identification Model for Multi-Agent Containment Control Systems. Mathematics 2023, 11, 2760. https://doi.org/10.3390/math11122760

AMA Style

Liu W, Teng F, Fang X, Liang Y, Zhang S. An RNN-Based Performance Identification Model for Multi-Agent Containment Control Systems. Mathematics. 2023; 11(12):2760. https://doi.org/10.3390/math11122760

Chicago/Turabian Style

Liu, Wei, Fei Teng, Xiaotian Fang, Yuan Liang, and Shiliang Zhang. 2023. "An RNN-Based Performance Identification Model for Multi-Agent Containment Control Systems" Mathematics 11, no. 12: 2760. https://doi.org/10.3390/math11122760

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop