Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (101)

Search Parameters:
Keywords = reachability problem

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
16 pages, 570 KB  
Article
A Novel Approach to the Collatz Conjecture with Petri Nets
by David Mailland and Iwona Grobelna
Information 2025, 16(9), 745; https://doi.org/10.3390/info16090745 - 28 Aug 2025
Abstract
The Collatz conjecture is a famous unsolved problem in mathematics, known for its deceptively simple rules that generate complex, unpredictable behaviour. It can be efficiently modelled using a Petri net that represents its inverse graph, where each place corresponds to an integer and [...] Read more.
The Collatz conjecture is a famous unsolved problem in mathematics, known for its deceptively simple rules that generate complex, unpredictable behaviour. It can be efficiently modelled using a Petri net that represents its inverse graph, where each place corresponds to an integer and each transition encodes an inverse rule. The net, constructed up to a bound n, reveals the tree-like structure of predecessors and highlights properties such as recurrence, reachability, and liveness. Token flows simulate possible trajectories towards 1. This formal approach enables the investigation of the problem through discrete event systems theory and opens perspectives for parametric or inductive extensions beyond the bounded domain. The model proposed provides a structured framework for visualising and analysing the inverse dynamics of the conjecture. Some key numerical results highlight the challenges of working within a finite domain: for nmax=1000, the constructed Petri net comprises 1000 places and 667 transitions, including 417 source nodes (no predecessors), 333 sink nodes (no successors), and 218 isolated orphans, i.e., nodes only reachable via Div2 transitions with no incoming 3n+1 edge. Full article
(This article belongs to the Special Issue Intelligent Information Technology, 2nd Edition)
Show Figures

Graphical abstract

21 pages, 2309 KB  
Review
A Comprehensive Review of Satellite Orbital Placement and Coverage Optimization for Low Earth Orbit Satellite Networks: Challenges and Solutions
by Adel A. Ahmed
Network 2025, 5(3), 32; https://doi.org/10.3390/network5030032 - 20 Aug 2025
Viewed by 516
Abstract
Nowadays, internet connectivity suffers from instability and slowness due to optical fiber cable attacks across the seas and oceans. The optimal solution to this problem is using the Low Earth Orbit (LEO) satellite network, which can resolve the problem of internet connectivity and [...] Read more.
Nowadays, internet connectivity suffers from instability and slowness due to optical fiber cable attacks across the seas and oceans. The optimal solution to this problem is using the Low Earth Orbit (LEO) satellite network, which can resolve the problem of internet connectivity and reachability, and it has the power to bring real-time, reliable, low-latency, high-bandwidth, cost-effective internet access to many urban and rural areas in any region of the Earth. However, satellite orbital placement (SOP) and navigation should be carefully designed to reduce signal impairments. The challenges of orbital satellite placement for LEO include constellation development, satellite parameter optimization, bandwidth optimization, consideration of signal impairment, and coverage optimization. This paper presents a comprehensive review of SOP and coverage optimization, examines prevalent issues affecting LEO internet connectivity, evaluates existing solutions, and proposes novel solutions to address these challenges. Furthermore, it recommends a machine learning solution for coverage optimization and SOP that can be used to efficiently enhance internet reliability and reachability for LEO satellite networks. This survey will open the gate for developing an optimal solution for global internet connectivity and reachability. Full article
Show Figures

Figure 1

11 pages, 324 KB  
Article
Controller Design for Continuous-Time Linear Control Systems with Time-Varying Delay
by Hongli Yang, Lijuan Yang and Ivan Ganchev Ivanov
Mathematics 2025, 13(15), 2519; https://doi.org/10.3390/math13152519 - 5 Aug 2025
Viewed by 310
Abstract
This paper addresses the controller design problem for linear systems with time-varying delays. By constructing a novel Lyapunov–Krasovskii functional incorporating delay-partitioning techniques, we establish delay-dependent stability criteria for the solvability of the robust stabilization problem. The derived conditions are formulated as linear matrix [...] Read more.
This paper addresses the controller design problem for linear systems with time-varying delays. By constructing a novel Lyapunov–Krasovskii functional incorporating delay-partitioning techniques, we establish delay-dependent stability criteria for the solvability of the robust stabilization problem. The derived conditions are formulated as linear matrix inequalities (LMIs) that become affine upon fixing a single scalar parameter, thereby facilitating efficient numerical computation. Furthermore, these criteria guarantee that the reachable set of the closed-loop system remains bounded within a prescribed ellipsoid under zero initial conditions. The effectiveness and superiority of the proposed approach are demonstrated through two comparative numerical examples, including a benchmark problem with varying delay. Full article
(This article belongs to the Special Issue Control Theory and Applications, 2nd Edition)
Show Figures

Figure 1

23 pages, 6081 KB  
Article
A New Methodological Approach to the Reachability Analysis of Aerodynamic Interceptors
by Tuğba Bayoğlu Akalın, Gökcan Akalın and Ali Türker Kutay
Aerospace 2025, 12(8), 657; https://doi.org/10.3390/aerospace12080657 - 24 Jul 2025
Viewed by 352
Abstract
Advanced air defense methods are essential to address the growing complexity of aerial threats. The increasing number of targets necessitates better defensive coordination, and a promising strategy involves the use of interceptors together to protect a specific area. This task fundamentally depends on [...] Read more.
Advanced air defense methods are essential to address the growing complexity of aerial threats. The increasing number of targets necessitates better defensive coordination, and a promising strategy involves the use of interceptors together to protect a specific area. This task fundamentally depends on accurately predicting their kinematic envelopes, or reachable sets. This paper presents a novel approach to determine the boundaries of reachable sets for aerodynamic interceptors, accounting for energy loss from drag, energy gain from thrust, variable acceleration limits, and autopilot dynamics. The devised numerical method approximates reachable sets for nonlinear problems using a constrained model predictive programming concept. Results demonstrate that explicitly accounting for input constraints, such as acceleration limits, significantly impacts the shape and area of the reachable boundaries. Furthermore, a sensitivity analysis was conducted to demonstrate the impact of parameter variations on the reachable set. Revealing the reachable set’s sensitivity to variations in thrust and drag coefficients, this analysis serves as a framework for considering parameter uncertainty and enables the evaluation of these effects prior to embedding the reachability boundaries into an offline database for guidance applications. The resulting boundaries, representing minimum and maximum ranges for various initial parameters, can be stored offline, allowing interceptors to estimate their own or allied platforms’ kinematic capabilities for cooperative strategies. Full article
(This article belongs to the Section Aeronautics)
Show Figures

Figure 1

16 pages, 3929 KB  
Article
Research on Laser Radar Inspection Station Planning of Vehicle Body-In-White (BIW) with Complex Constraints
by Lijuan Li, Siyi Wang, Jichao Ma and Xiaobing Gao
Appl. Sci. 2025, 15(11), 6181; https://doi.org/10.3390/app15116181 - 30 May 2025
Viewed by 493
Abstract
This study develops an applied optimization method to address practical challenges in Laser Radar station planning for automotive Body-In-White (BIW) manufacturing inspection. Focusing on the spatially constrained industrial environments and complex measurement specifications, the work reformulates Laser Radar inspection planning as a multi-constrained [...] Read more.
This study develops an applied optimization method to address practical challenges in Laser Radar station planning for automotive Body-In-White (BIW) manufacturing inspection. Focusing on the spatially constrained industrial environments and complex measurement specifications, the work reformulates Laser Radar inspection planning as a multi-constrained optimization problem challenge. Firstly, a parametric geometric modeling approach is developed to define measurement spaces for individual features, accompanied by an innovative maximal complete subgraph mining algorithm to intelligently identify shared feasible measurement regions among multiple features. Secondly, kinematic equations are formulated using Denavit–Hartenberg (D-H) parameters, while a hierarchical bounding volume collision detection mechanism is integrated to establish a comprehensive constraint. Therefore, unified optimization method synergizing measurement coverage, robotic manipulator reachability, and operational safety requirements are proposed. Through experimental validations utilizing BIW (BIW) component inspection, the research has demonstrated its industrial applicability and has achieved a 92% measurement coverage with robot trajectories free of collisions. Compared with traditional manual planning methods, the proposed approach reduces the number of required inspection stations by 35% and improves the computational efficiency to meet industrial real-time deployment requirements. Experimental validation demonstrates the method’s effectiveness in measurement accuracy, operational safety, and equipment utilization for advanced manufacturing quality control systems. Full article
Show Figures

Figure 1

22 pages, 1304 KB  
Article
Detachment Waves in Frictional Contact II: Analysis and Simulations of a Three-Mass System
by Jeongho Ahn and Meir Shillor
Axioms 2025, 14(4), 299; https://doi.org/10.3390/axioms14040299 - 15 Apr 2025
Viewed by 351
Abstract
This work continues the study of a mathematical model for the motion of a mass–spring–damper system with friction. There, a two-mass model was constructed, its solvability established, the steady states investigated, and numerical simulations presented. The main interest here is in the modeling, [...] Read more.
This work continues the study of a mathematical model for the motion of a mass–spring–damper system with friction. There, a two-mass model was constructed, its solvability established, the steady states investigated, and numerical simulations presented. The main interest here is in the modeling, analysis of the steady states, and simulation of a three-mass system—in particular, in the propagation of detachment or slip waves, which happen when the system transits from a stick state to a slip motion. The introduction of friction changes the problem into systems of three differential set-valued inclusions, which are mathematically and computationally very challenging. The analysis of the steady states shows the regions of stick, where there is enough frictional resistance that prevents motion. The proposed numerical methods are implemented, and the simulations show some representative types of system behavior, especially the cases of detachment waves. Some of the numerical simulations specifically support the theoretical analysis of slip initiation, reachability, and energy balance. Full article
Show Figures

Figure 1

18 pages, 9301 KB  
Article
Design of a Dual-Function Autonomous Disinfection Robot with Safety Filter-Based Motion Control
by Yuning Cao , Zehao Wu , I-Ming Chen  and Qingsong Xu 
Robotics 2025, 14(3), 26; https://doi.org/10.3390/robotics14030026 - 27 Feb 2025
Viewed by 1533
Abstract
In the post-COVID era, international business and tourism are quickly recovering from the global lockdown, with people and products traveling faster at higher frequency. This boosts the economy while facilitating the spread of pathogens, causing waves of COVID aftershock with new variants like [...] Read more.
In the post-COVID era, international business and tourism are quickly recovering from the global lockdown, with people and products traveling faster at higher frequency. This boosts the economy while facilitating the spread of pathogens, causing waves of COVID aftershock with new variants like Omicron XBB. Hence, continuous disinfection of our living environments becomes our first priority. Autonomous disinfection robots provide an efficient solution to this issue. Compared to human cleaners, disinfection robots are able to operate tirelessly in harsh environments without increasing the risk of cross-infection. In this paper, we propose the design of a new generation of the Smart Cleaner disinfection robot, which is equipped with both an Ultraviolet-C (UVC) light tower and a hydrogen peroxide (HP) aerosol dispenser. The safety of an autonomous disinfection robot has been a persistent problem, especially when they work in complex environments. To tackle this problem, Hamilton–Jacobi (HJ) reachability is adopted to construct a safety filter for motion control, which guarantees that the disinfection path taken by the robot is collision-free without severely compromising the optimality of control actions. The effectiveness of the developed robot has been demonstrated by conducting extensive experimental studies. Full article
(This article belongs to the Section Sensors and Control in Robotics)
Show Figures

Figure 1

22 pages, 10072 KB  
Article
A Manipulability-Driven Method for Efficient Telescopic Motion Computation of Controllable Space Manipulator
by Shize Qin, Wang Lu, Tao Yang, Shoujun Zhao, Xiaoqi Li, Zelin Yang and Guangwei Yu
Aerospace 2025, 12(2), 129; https://doi.org/10.3390/aerospace12020129 - 8 Feb 2025
Viewed by 1023
Abstract
The addition of telescopic joints will enhance the manipulator’s motion dexterity but increase the motion complexity, thereby potentially reducing the efficiency of motion planning. To address the issue, a manipulability priority principle is used to reduce the computational dimension, aiming to enhance computational [...] Read more.
The addition of telescopic joints will enhance the manipulator’s motion dexterity but increase the motion complexity, thereby potentially reducing the efficiency of motion planning. To address the issue, a manipulability priority principle is used to reduce the computational dimension, aiming to enhance computational efficiency. Firstly, an improved Monte Carlo algorithm combined with Weighted Ensemble Learning is proposed to rapidly obtain a well-distributed and information-complete reachable workspace under small-sample conditions. Then, all dexterous points are computed by the manipulability formula and the least squares algorithm is applied to obtain the boundary of the reachable workspace. Based on the boundary, a spatial quadratic surface-based segmentation algorithm is proposed to obtain the dexterous workspace corresponding to all dexterous points. Subsequently, the Telescopic Motion Computation (TMC) method is designed to transform the kinematics problem of a 9-DOF manipulator into a 7-DOF problem by precomputing the telescopic joint lengths, effectively reducing the computational time for inverse kinematics. Finally, simulations are performed to verify the effectiveness, dexterity, and efficiency of the TMC method. The results indicate that applying the TMC method to PInv, DLS, and PSO algorithms enhances the efficiency by 3.43, 3.53, and 3.64 times while maintaining the motion dexterity. Full article
Show Figures

Figure 1

19 pages, 485 KB  
Article
A Robust Cooperative Control Protocol Based on Global Sliding Mode Manifold for Heterogeneous Nonlinear Multi-Agent Systems Under the Switching Topology
by Xiaoyu Zhang, Yining Li, Shuiping Xiong, Xiangbin Liu and Rong Guo
Actuators 2025, 14(2), 57; https://doi.org/10.3390/act14020057 - 25 Jan 2025
Viewed by 1050
Abstract
This study addresses the completely distributed consensus control problem for the heterogeneous nonlinear multi-agent system (MAS) with disturbances under switching topology. First, a global sliding mode manifold (GSMM) is designed for the overall MAS dynamic, which maintains stability without oscillations during topology switching [...] Read more.
This study addresses the completely distributed consensus control problem for the heterogeneous nonlinear multi-agent system (MAS) with disturbances under switching topology. First, a global sliding mode manifold (GSMM) is designed for the overall MAS dynamic, which maintains stability without oscillations during topology switching after achieving the sliding mode. Subsequently, a consensus sliding mode control protocol (SMCP) is proposed, adopting the common sliding mode control (SMC) format and ensuring the finite-time reachability of the GSMM under topology switching. Finally, the proposed GSMM and SMCP are applied to the formation control of multiple-wheeled mobile robots (WMRs), and simulation results confirm their feasibility and effectiveness. The proposed SMCP design demonstrates key advantages, including a simple control structure, complete robustness to matched disturbance, and reduced-order dynamics under the sliding mode. Full article
(This article belongs to the Section Control Systems)
Show Figures

Figure 1

21 pages, 630 KB  
Article
Polynomial Exact Schedulability and Infeasibility Test for Fixed-Priority Scheduling on Multiprocessor Platforms
by Natalia Garanina, Igor Anureev and Dmitry Kondratyev
Appl. Syst. Innov. 2025, 8(1), 15; https://doi.org/10.3390/asi8010015 - 20 Jan 2025
Viewed by 1030
Abstract
In this paper, we develop an exact schedulability test and sufficient infeasibility test for fixed-priority scheduling on multiprocessor platforms. We base our tests on presenting real-time systems as a Kripke model for dynamic real-time systems with sporadic non-preemptible tasks running on a multiprocessor [...] Read more.
In this paper, we develop an exact schedulability test and sufficient infeasibility test for fixed-priority scheduling on multiprocessor platforms. We base our tests on presenting real-time systems as a Kripke model for dynamic real-time systems with sporadic non-preemptible tasks running on a multiprocessor platform and an online scheduler using global fixed priorities. This model includes states and transitions between these states, allows us to formally justify a polynomial-time algorithm for an exact schedulability test using the idea of backward reachability. Using this algorithm, we perform the exact schedulability test for the above real-time systems, in which there is one more task than the processors. The main advantage of this algorithm is its polynomial complexity, while, in general, the problem of the exact schedulability testing of real-time systems on multiprocessor platforms is NP-hard. The infeasibility test uses the same algorithm for an arbitrary task-to-processor ratio, providing a sufficient infeasibility condition: if the real-time system under test is not schedulable in some cases, the algorithm detects this. We conduct an experimental study of our algorithms on the datasets generated with different utilization values and compare them to several state-of-the-art schedulability tests. The experiments show that the performance of our algorithm exceeds the performance of its analogues while its accuracy is similar. Full article
(This article belongs to the Section Control and Systems Engineering)
Show Figures

Figure 1

17 pages, 1876 KB  
Article
Optimal Control of a Harmonic Oscillator with Parametric Excitation
by Dmitrii Kamzolkin, Victor Ilyutko and Vladimir Ternovski
Mathematics 2024, 12(24), 3981; https://doi.org/10.3390/math12243981 - 18 Dec 2024
Viewed by 1206
Abstract
This paper addresses the time-optimal control problem for a harmonic oscillator characterized by a time-dependent frequency. The primary objective is to determine the minimal time required to transition the system from an initial state, defined by a given position and velocity, to a [...] Read more.
This paper addresses the time-optimal control problem for a harmonic oscillator characterized by a time-dependent frequency. The primary objective is to determine the minimal time required to transition the system from an initial state, defined by a given position and velocity, to a specified final state, while ensuring that the frequency remains within prescribed bounds. The key challenge lies in identifying the optimal switching times between two available frequencies to meet all boundary conditions efficiently. By examining various boundary scenarios, constructing the reachable set of all admissible trajectories, and employing both analytical techniques and control theory, we develop a robust solution strategy. This work holds particular relevance for practical applications demanding rapid state transitions, such as mechanical vibration control and signal processing, where achieving time-optimal performance is critical. Furthermore, the methods presented are adaptable to a wide range of systems facing similar constraints, providing a versatile and effective framework for time-optimal control. Full article
(This article belongs to the Section E: Applied Mathematics)
Show Figures

Figure 1

18 pages, 419 KB  
Article
Sliding Mode Control of Uncertain Switched Systems via Length-Limited Coding Dynamic Quantization
by Qinqi Xu and Haijuan Zhao
Mathematics 2024, 12(23), 3749; https://doi.org/10.3390/math12233749 - 28 Nov 2024
Cited by 1 | Viewed by 915
Abstract
This paper designs an online adjustment strategy for dynamic quantizer parameters and investigates the sliding mode control (SMC) problem for uncertain switched systems under a limited network communication bandwidth. Due to the limitation of the coding length in practical transmission, coding errors can [...] Read more.
This paper designs an online adjustment strategy for dynamic quantizer parameters and investigates the sliding mode control (SMC) problem for uncertain switched systems under a limited network communication bandwidth. Due to the limitation of the coding length in practical transmission, coding errors can significantly impact the system’s ideal performance. To address these issues, a dynamic quantizer is introduced to efficiently encode the system state while minimizing quantization error under the constraint of the finite code length. Additionally, a coding and decoding scheme based on dynamic quantization and a suitable sliding mode controller are designed to obtain a closed-loop switched system. Using Lyapunov functions and the average dwell time method, sufficient conditions are derived to guarantee the reachability of the sliding surface and the exponential ultimate bound (EUB) in the mean square for the closed-loop switched system, even in the presence of coding errors and data loss. The theoretical results are validated through numerical simulations, which demonstrate the effectiveness of the proposed approach. Full article
(This article belongs to the Special Issue Stochastic System Analysis and Control)
Show Figures

Figure 1

24 pages, 838 KB  
Article
On Deadlock Analysis and Characterization of Labeled Petri Nets with Undistinguishable and Unobservable Transitions
by Amal Zaghdoud and Zhiwu Li
Mathematics 2024, 12(22), 3523; https://doi.org/10.3390/math12223523 - 12 Nov 2024
Viewed by 1191
Abstract
This work addresses the analysis and characterization of deadlocks in discrete-event systems modeled by labeled Petri nets (LPNs) with undistinguishable and unobservable transitions. To provide a solution for the notorious problem, it is essential to present an effective characterization in such a way [...] Read more.
This work addresses the analysis and characterization of deadlocks in discrete-event systems modeled by labeled Petri nets (LPNs) with undistinguishable and unobservable transitions. To provide a solution for the notorious problem, it is essential to present an effective characterization in such a way that deadlock control and synthesis are technically and methodologically possible. To this end, we introduce the notion of dangerous implicit vectors (DIVs), which implicitly threaten the system deadlock-freedom. The set of dead markings is divided into two subsets: dead basis markings (DBMs) and dangerous implicit markings (DIMs). An algorithm is designed to compute the sets of DIVs and DIMs at a given basis state of a system. Moreover, by virtue of linear algebraic equations, we formulate sufficient conditions for identifying the existence of blocking markings in an LPN. Finally, an algorithm is developed to construct an observed graph that is a compendious presentation of the reachability graph of a net system, with respect to the existence of dead reaches. At the end of this paper, experiment results that illustrate the correctness and effectiveness of the reported solution are presented. Full article
(This article belongs to the Special Issue Discrete Event Dynamic Systems and Applications)
Show Figures

Figure 1

24 pages, 493 KB  
Article
Timed Interpreted Systems as a New Agent-Based Formalism for Verification of Timed Security Protocols
by Agnieszka M. Zbrzezny, Olga Siedlecka-Lamch, Sabina Szymoniak, Andrzej Zbrzezny and Mirosław Kurkowski
Appl. Sci. 2024, 14(22), 10333; https://doi.org/10.3390/app142210333 - 10 Nov 2024
Viewed by 1231
Abstract
This article introduces a new method for modelling and verifying the execution of timed security protocols (TSPs) and their time-dependent security properties. The method, which is novel and reliable, uses an extension of interpreted systems, accessible semantics in multi-agent systems, and timed interpreted [...] Read more.
This article introduces a new method for modelling and verifying the execution of timed security protocols (TSPs) and their time-dependent security properties. The method, which is novel and reliable, uses an extension of interpreted systems, accessible semantics in multi-agent systems, and timed interpreted systems (TISs) with dense time semantics to model TSP executions. We enhance the models of TSPs by incorporating delays and varying lifetimes to capture real-life aspects of protocol executions. To illustrate the method, we model a timed version of the Needham–Schroeder Public Key Authentication Protocol. We have also developed a new bounded model checking reachability algorithm for the proposed structures, based on Satisfiability Modulo Theories (SMTs), and implemented it within the tool. The method comprises a new procedure for modelling TSP executions, translating TSPs into TISs, and translating TISs’ reachability problem into the SMT problem. The paper also includes thorough experimental results for nine protocols modelled by TISs and discusses the findings in detail. Full article
(This article belongs to the Topic Artificial Intelligence Models, Tools and Applications)
Show Figures

Figure 1

35 pages, 3169 KB  
Article
Fuzzy Linear Temporal Logic with Quality Constraints
by Xianfeng Yu, Yongming Li and Shengling Geng
Mathematics 2024, 12(19), 3148; https://doi.org/10.3390/math12193148 - 8 Oct 2024
Cited by 1 | Viewed by 1222
Abstract
As an extension of quantitative temporal logic, uncertain temporal logic essentially describes the temporal behavior of uncertain and incomplete systems, thus better solving search and decision-making problems in such systems. Fuzzy linear temporal logic (FLTL) is a focal point in uncertain temporal logic [...] Read more.
As an extension of quantitative temporal logic, uncertain temporal logic essentially describes the temporal behavior of uncertain and incomplete systems, thus better solving search and decision-making problems in such systems. Fuzzy linear temporal logic (FLTL) is a focal point in uncertain temporal logic research. However, there are evident shortcomings in the current research outcomes. First, in previous FLTL studies, the practice of obtaining path reachability and formula satisfaction values independently and subsequently selecting the smaller of the two as the satisfaction value metric led to information loss. Furthermore, this simplistic information fusion approach fails to reflect the varying importance of these two types of information to the requirements. Second, computing path reachability and temporal logic formula satisfaction values separately may result in a mismatch between the two pieces of information with respect to the same path segment. Thus, the primary challenge lies in accurately integrating the satisfaction values of temporal logic formulas with the path reachability of the segments that yields these satisfaction values, utilizing various reasonable information synthesis methods, to ensure synchronization between path reachability and formula satisfaction values without incurring information loss. Additionally, it is crucial to reflect the different preference requirements for these two types of information. Moreover, the temporal logic formula characterizes system properties, with its sub-formulas delineating distinct sub-properties. Consequently, considering the varying importance preferences of sub-formulas is also significant. To address these deficiencies, we introduced quality constraint operators into FLTL, resulting in quality-constrained fuzzy linear temporal logic (QFLTL). This incorporation enables the synchronization and comprehensive fusion of path-reachability information and formula satisfaction values within the final semantic metric, thereby resolving the issues related to information synchronization and loss. Furthermore, it can accommodate the differing preference requirements between the two types of information and sub-properties during the information synthesis process. We defined the syntax and semantics of QFLTL and examined its expressive power and properties. Notably, we investigated the decidability of logical decision problems in QFLTL, encompassing validity, satisfiability, and model-checking issues. We proposed corresponding solution algorithms and analyzed their complexities. Full article
Show Figures

Figure 1

Back to TopTop