-
Resilient Average Consensus with Adversaries via Distributed Detection and Recovery
Authors:
Liwei Yuan,
Hideaki Ishii
Abstract:
We study the problem of resilient average consensus in multi-agent systems where some of the agents are subject to failures or attacks. The objective of resilient average consensus is for non-faulty/normal agents to converge to the average of their initial values despite the erroneous effects from malicious agents. To this end, we propose a successful distributed iterative resilient average consen…
▽ More
We study the problem of resilient average consensus in multi-agent systems where some of the agents are subject to failures or attacks. The objective of resilient average consensus is for non-faulty/normal agents to converge to the average of their initial values despite the erroneous effects from malicious agents. To this end, we propose a successful distributed iterative resilient average consensus algorithm for the multi-agent networks with general directed topologies. The proposed algorithm has two parts at each iteration: detection and averaging. For the detection part, we propose two distributed algorithms and one of them can detect malicious agents with only the information from direct in-neighbors. For the averaging part, we extend the applicability of an existing averaging algorithm where normal agents can remove the effects from malicious agents so far, after they are detected. Another important feature of our method is that it can handle the case where malicious agents are neighboring and collaborating with each other to mislead the normal ones from averaging. This case cannot be solved by existing detection approaches in related literature. Moreover, our algorithm is efficient in storage usage especially for large-scale networks as each agent only requires the values of neighbors within two hops. Lastly, numerical examples are given to verify the efficacy of the proposed algorithms.
△ Less
Submitted 29 May, 2024;
originally announced May 2024.
-
Test function approach to fully nonlinear equations in thin domains
Authors:
Isabeau Birindelli,
Ariela Briani,
Hitoshi Ishii
Abstract:
In this note we extend to fully nonlinear operators the well known result on thin domains of Hale and Raugel. The result is more general even in the case of the Laplacian.
In this note we extend to fully nonlinear operators the well known result on thin domains of Hale and Raugel. The result is more general even in the case of the Laplacian.
△ Less
Submitted 30 April, 2024;
originally announced April 2024.
-
Secure Synchronization of Heterogeneous Pulse-Coupled Oscillators
Authors:
Jiaqi Yan,
Hideaki Ishii
Abstract:
In this paper, we consider the synchronization of heterogeneous pulse-coupled oscillators (PCOs), where some of the oscillators might be faulty or malicious. The oscillators interact through identical pulses at discrete instants and evolve continuously with different frequencies otherwise. Despite the presence of misbehaviors, benign oscillators aim to reach synchronization. To achieve this object…
▽ More
In this paper, we consider the synchronization of heterogeneous pulse-coupled oscillators (PCOs), where some of the oscillators might be faulty or malicious. The oscillators interact through identical pulses at discrete instants and evolve continuously with different frequencies otherwise. Despite the presence of misbehaviors, benign oscillators aim to reach synchronization. To achieve this objective, two resilient synchronization protocols are developed in this paper by adapting the real-valued mean-subsequence reduced (MSR) algorithm to pulse-based interactions. The first protocol relies on packet-based communication to transmit absolute frequencies, while the second protocol operates purely with pulses to calculate relative frequencies. In both protocols, each normal oscillator periodically counts the received pulses to detect possible malicious behaviors. By disregarding suspicious pulses from its neighbors, the oscillator updates both its phases and frequencies. The paper establishes sufficient conditions on the initial states and graph structure under which resilient synchronization is achieved in the PCO network. Specifically, the normal oscillators can either detect the presence of malicious nodes or synchronize in both phases and frequencies. Additionally, a comparison between the two algorithms reveals a trade-off between relaxed initial conditions and reduced communication burden.
△ Less
Submitted 20 March, 2024; v1 submitted 18 March, 2024;
originally announced March 2024.
-
Asynchronous Approximate Byzantine Consensus: A Multi-hop Relay Method and Tight Graph Conditions
Authors:
Liwei Yuan,
Hideaki Ishii
Abstract:
We study a multi-agent resilient consensus problem, where some agents are of the Byzantine type and try to prevent the normal ones from reaching consensus. In our setting, normal agents communicate with each other asynchronously over multi-hop relay channels with delays. To solve this asynchronous Byzantine consensus problem, we develop the multi-hop weighted mean subsequence reduced (MW-MSR) algo…
▽ More
We study a multi-agent resilient consensus problem, where some agents are of the Byzantine type and try to prevent the normal ones from reaching consensus. In our setting, normal agents communicate with each other asynchronously over multi-hop relay channels with delays. To solve this asynchronous Byzantine consensus problem, we develop the multi-hop weighted mean subsequence reduced (MW-MSR) algorithm. The main contribution is that we characterize a tight graph condition for our algorithm to achieve Byzantine consensus, which is expressed in the novel notion of strictly robust graphs. We show that the multi-hop communication is effective for enhancing the network's resilience against Byzantine agents. As a result, we also obtain novel conditions for resilient consensus under the malicious attack model, which are tighter than those known in the literature. Furthermore, the proposed algorithm can be viewed as a generalization of the conventional flooding-based algorithms, with less computational complexity. Lastly, we provide numerical examples to show the effectiveness of the proposed algorithm.
△ Less
Submitted 12 March, 2024;
originally announced March 2024.
-
Diffusive coupling facilitates and impedes noise-induced escape in interacting bistable elements
Authors:
Hidemasa Ishii,
Hiroshi Kori
Abstract:
Diverse complex systems often undergo sudden changes in their states, such as epileptic seizures, climate changes, and social uprisings. Such behavior has been modeled by noise-induced escape of bistable elements, which is the escape from an attracting state driven by a fluctuation in the system's state. We consider a system of interacting bistable elements and investigate the effect of diffusive…
▽ More
Diverse complex systems often undergo sudden changes in their states, such as epileptic seizures, climate changes, and social uprisings. Such behavior has been modeled by noise-induced escape of bistable elements, which is the escape from an attracting state driven by a fluctuation in the system's state. We consider a system of interacting bistable elements and investigate the effect of diffusive coupling among elements on the process of noise-induced escape. We focus on the influence of the coupling strength over the escape time, which is the time it takes for noise-induced escape to occur. We performed numerical simulations and observed that weak coupling reduced the mean escape time, whereas strong coupling impeded escape. We argue that, although diffusive coupling both facilitates and impedes escape, the facilitating effect is dominant when coupling is weak. For weak coupling cases, we develop an approximate theory that can predict the mean and variance of escape times. In contrast, strong coupling reduces the effective noise intensity to impede escape. Our results suggest that diffusive coupling among multistable elements contributes to regulating the rate of transitions among attracting states.
△ Less
Submitted 18 January, 2024;
originally announced January 2024.
-
On a Discrete-Time Networked SIV Epidemic Model with Polar Opinion Dynamics
Authors:
Qiulin Xu,
Hideaki Ishii
Abstract:
This paper studies novel epidemic spreading problems influenced by opinion evolution in social networks, where the opinions reflect the public health concerns. A coupled bilayer network is proposed, where the epidemics spread over several communities through a physical network layer while the opinions evolve over the same communities through a social network layer. The epidemic spreading process i…
▽ More
This paper studies novel epidemic spreading problems influenced by opinion evolution in social networks, where the opinions reflect the public health concerns. A coupled bilayer network is proposed, where the epidemics spread over several communities through a physical network layer while the opinions evolve over the same communities through a social network layer. The epidemic spreading process is described by a susceptible-infected-vigilant (SIV) model, which introduces opinion-dependent epidemic vigilance state compared with the classical epidemic models. The opinion process is modeled by a polar opinion dynamics model, which includes infection prevalence and human stubbornness into the opinion evolution. By introducing an opinion-dependent reproduction number, we analyze the stability of disease-free and endemic equilibria and derive sufficient conditions for their global asymptotic stability. We also discuss the mutual effects between epidemic eradication and opinion consensus, and the possibility of suppressing epidemic by intervening in the opinions or implementing public health strategies. Simulations are conducted to verify the theoretical results and demonstrate the feasibility of epidemic suppression.
△ Less
Submitted 9 January, 2024;
originally announced January 2024.
-
Propagating front solutions in a time-fractional Fisher-KPP equation
Authors:
Hiroshi Ishii
Abstract:
In this paper, we treat the Fisher-KPP equation with a Caputo-type time fractional derivative and discuss the propagation speed of the solution. The equation is a mathematical model that describes the processes of sub-diffusion, proliferation, and saturation. First, the behavior of the solution is analyzed by numerical simulations, and it is discussed what kind of solution is appropriate to charac…
▽ More
In this paper, we treat the Fisher-KPP equation with a Caputo-type time fractional derivative and discuss the propagation speed of the solution. The equation is a mathematical model that describes the processes of sub-diffusion, proliferation, and saturation. First, the behavior of the solution is analyzed by numerical simulations, and it is discussed what kind of solution is appropriate to characterize the propagation of the solution. Based on the insights, we introduce the notion of a traveling wave-like solution, the so-called asymptotic traveling wave solution. Finally, the existence of the asymptotic traveling wave solution is discussed using a monotone iteration method.
△ Less
Submitted 7 December, 2023; v1 submitted 27 November, 2023;
originally announced November 2023.
-
Distributed Parameter Estimation with Gaussian Observation Noises in Time-varying Digraphs
Authors:
Jiaqi Yan,
Hideaki Ishii
Abstract:
In this paper, we consider the problem of distributed parameter estimation in sensor networks. Each sensor makes successive observations of an unknown $d$-dimensional parameter, which might be subject to Gaussian random noises. The sensors aim to infer the true value of the unknown parameter by cooperating with each other. To this end, we first generalize the so-called dynamic regressor extension…
▽ More
In this paper, we consider the problem of distributed parameter estimation in sensor networks. Each sensor makes successive observations of an unknown $d$-dimensional parameter, which might be subject to Gaussian random noises. The sensors aim to infer the true value of the unknown parameter by cooperating with each other. To this end, we first generalize the so-called dynamic regressor extension and mixing (DREM) algorithm to stochastic systems, with which the problem of estimating a $d$-dimensional vector parameter is transformed to that of $d$ scalar ones: one for each of the unknown parameters. For each of the scalar problem, both combine-then-adapt (CTA) and adapt-then-combine (ATC) diffusion-based estimation algorithms are given, where each sensor performs a combination step to fuse the local estimates in its in-neighborhood, alongside an adaptation step to process its streaming observations. Under weak conditions on network topology and excitation of regressors, we show that the proposed estimators guarantee that each sensor infers the true parameter, even if any individual of them cannot by itself. Specifically, it is required that the union of topologies over an interval with fixed length is strongly connected. Moreover, the sensors must collectively satisfy a cooperative persistent excitation (PE) condition, which relaxes the traditional PE condition. Numerical examples are finally provided to illustrate the established results.
△ Less
Submitted 8 November, 2023; v1 submitted 7 November, 2023;
originally announced November 2023.
-
State Estimation of Continuum Robots: A Nonlinear Constrained Moving Horizon Approach
Authors:
Hend Abdelaziz,
Ayman Nada,
Hiroyuki Ishii,
Haitham El-Hussieny
Abstract:
Continuum robots, made from flexible materials with continuous backbones, have several advantages over traditional rigid robots. Some of them are the ability to navigate through narrow or confined spaces, adapt to irregular or changing environments, and perform tasks in proximity to humans. However, one of the challenges in using continuum robots is the difficulty in accurately estimating their st…
▽ More
Continuum robots, made from flexible materials with continuous backbones, have several advantages over traditional rigid robots. Some of them are the ability to navigate through narrow or confined spaces, adapt to irregular or changing environments, and perform tasks in proximity to humans. However, one of the challenges in using continuum robots is the difficulty in accurately estimating their state, such as their tip position and curvature. This is due to the complexity of their kinematics and the inherent uncertainty in their measurement and control. This paper proposes a moving horizon estimation (MHE) approach for estimating the robot's state, including its tip position and shape parameters. Our approach involves minimizing the error between measurement samples from an IMU attached to the robot's tip and the estimated state along the estimation horizon using an inline optimization problem. We demonstrate the effectiveness of our approach through simulation and experimental results. Our approach can potentially improve the accuracy and robustness of state estimation and control for continuum robots. It can be applied to various applications such as surgery, manufacturing, and inspection.
△ Less
Submitted 7 August, 2023;
originally announced August 2023.
-
Resilient Distributed Parameter Estimation in Sensor Networks
Authors:
Jiaqi Yan,
Kuo Li,
Hideaki Ishii
Abstract:
In this paper, we study the problem of parameter estimation in a sensor network, where the measurements and updates of some sensors might be arbitrarily manipulated by adversaries. Despite the presence of such misbehaviors, normally behaving sensors make successive observations of an unknown $d$-dimensional vector parameter and aim to infer its true value by cooperating with their neighbors over a…
▽ More
In this paper, we study the problem of parameter estimation in a sensor network, where the measurements and updates of some sensors might be arbitrarily manipulated by adversaries. Despite the presence of such misbehaviors, normally behaving sensors make successive observations of an unknown $d$-dimensional vector parameter and aim to infer its true value by cooperating with their neighbors over a directed communication graph. To this end, by leveraging the so-called dynamic regressor extension and mixing procedure, we transform the problem of estimating the vector parameter to that of estimating $d$ scalar ones. For each of the scalar problem, we propose a resilient combine-then-adapt diffusion algorithm, where each normal sensor performs a resilient combination to discard the suspicious estimates in its neighborhood and to fuse the remaining values, alongside an adaptation step to process its streaming observations. With a low computational cost, this estimator guarantees that each normal sensor exponentially infers the true parameter even if some of them are not sufficiently excited.
△ Less
Submitted 3 June, 2023;
originally announced June 2023.
-
Dynamic quantized consensus under DoS attacks: Towards a tight zooming-out factor
Authors:
Shuai Feng,
Maopeng Ran,
Hideaki Ishii,
Shengyuan Xu
Abstract:
This paper deals with dynamic quantized consensus of dynamical agents in a general form under packet losses induced by Denial-of-Service (DoS) attacks. The communication channel has limited bandwidth and hence the transmitted signals over the network are subject to quantization. To deal with agent's output, an observer is implemented at each node. The state of the observer is quantized by a finite…
▽ More
This paper deals with dynamic quantized consensus of dynamical agents in a general form under packet losses induced by Denial-of-Service (DoS) attacks. The communication channel has limited bandwidth and hence the transmitted signals over the network are subject to quantization. To deal with agent's output, an observer is implemented at each node. The state of the observer is quantized by a finite-level quantizer and then transmitted over the network. To solve the problem of quantizer overflow under malicious packet losses, a zooming-in and out dynamic quantization mechanism is designed. By the new quantized controller proposed in the paper, the zooming-out factor is lower bounded by the spectral radius of the agent's dynamic matrix. A sufficient condition of quantization range is provided under which the finite-level quantizer is free of overflow. A sufficient condition of tolerable DoS attacks for achieving consensus is also provided. At last, we study scalar dynamical agents as a special case and further tighten the zooming-out factor to a value smaller than the agent's dynamic parameter. Under such a zooming-out factor, it is possible to recover the level of tolerable DoS attacks to that of unquantized consensus, and the quantizer is free of overflow.
△ Less
Submitted 31 May, 2023;
originally announced June 2023.
-
Variation of Pressure-Induced Valence Transition with Approximation Degree in Yb-Based Quasicrystalline Approximants
Authors:
Keiichiro Imura,
Yuki Yoneyama,
Hideyuki Ando,
Noriyuki Kabeya,
Hitoshi Yamaoka,
Nozomu Hiraoka,
Hirofumi Ishii,
Tsutomu Ishimasa,
Noriaki K. Sato
Abstract:
We have synthesized new Tsai-type Yb-based intermediate-valence approximant crystals (ACs) with different degree of approximation to quasicrystal, Zn--Au--Yb 1/1 and 2/1 AC, and studied the external pressure effect on their Yb mean-valence $ν$. Whereas 1/1 AC distinctly exhibits a first-order-like jump in $ν$ at a transition pressure $P_{\rm v}$, 2/1 AC only shows an indistinct anomaly at…
▽ More
We have synthesized new Tsai-type Yb-based intermediate-valence approximant crystals (ACs) with different degree of approximation to quasicrystal, Zn--Au--Yb 1/1 and 2/1 AC, and studied the external pressure effect on their Yb mean-valence $ν$. Whereas 1/1 AC distinctly exhibits a first-order-like jump in $ν$ at a transition pressure $P_{\rm v}$, 2/1 AC only shows an indistinct anomaly at $P_{\rm v}$. We have also studied the pressure dependence of the $ν$ of Au--Al--Yb 1/1 AC, which is a prototypal AC exhibiting pressure-induced quantum criticality. It shows a continuous valence anomaly at a critical pressure $P_{\rm c}$ where the magnetic susceptibility diverges toward zero temperature, in contrast to the valence jump in the Zn--Au--Yb 1/1 AC. These results are discussed based on a theoretical model of quantum critical valence fluctuation.
△ Less
Submitted 26 May, 2023;
originally announced May 2023.
-
Quantized Zero Dynamics Attacks against Sampled-data Control Systems
Authors:
Kosuke Kimura,
Hideaki Ishii
Abstract:
For networked control systems, cyber-security issues have gained much attention in recent years. In this paper, we consider the so-called zero dynamics attacks, which form an important class of false data injection attacks, with a special focus on the effects of quantization in a sampled-data control setting. When the attack signals must be quantized, some error will be necessarily introduced, pot…
▽ More
For networked control systems, cyber-security issues have gained much attention in recent years. In this paper, we consider the so-called zero dynamics attacks, which form an important class of false data injection attacks, with a special focus on the effects of quantization in a sampled-data control setting. When the attack signals must be quantized, some error will be necessarily introduced, potentially increasing the chance of detection through the output of the system. In this paper, we show however that the attacker may reduce such errors by avoiding to directly quantize the attack signal. We look at two approaches for generating quantized attacks which can keep the error in the output smaller than a specified level by using the knowledge of the system dynamics. The methods are based on a dynamic quantization technique and a modified version of zero dynamics attacks. Numerical examples are provided to verify the effectiveness of the proposed methods.
△ Less
Submitted 21 March, 2023;
originally announced March 2023.
-
Distributed Parameter Estimation under Gaussian Observation Noises
Authors:
Jiaqi Yan,
Hideaki Ishii
Abstract:
In this paper, we consider the problem of distributed parameter estimation in sensor networks. Each sensor makes successive observations of an unknown $d$-dimensional parameter, which might be subject to Gaussian random noises. They aim to infer true value of the unknown parameter by cooperating with each other. To this end, we first generalize the so-called dynamic regressor extension and mixing…
▽ More
In this paper, we consider the problem of distributed parameter estimation in sensor networks. Each sensor makes successive observations of an unknown $d$-dimensional parameter, which might be subject to Gaussian random noises. They aim to infer true value of the unknown parameter by cooperating with each other. To this end, we first generalize the so-called dynamic regressor extension and mixing (DREM) algorithm to stochastic systems, with which the problem of estimating a $d$-dimensional vector parameter is transformed to that of $d$ scalar ones: one for each of the unknown parameters. For each of the scalar problem, an estimation scheme is given, where each sensor fuses the regressors and measurements in its in-neighborhood and updates its local estimate by using least-mean squares. Particularly, a counter is also introduced for each sensor, which prevents any (noisy) measurement from being repeatedly used such that the estimation performance will not be greatly affected by certain extreme values. A novel excitation condition termed as \textit{local persistent excitation} (Local-PE) condition is also proposed, which relaxes the traditional persistent excitation (PE) condition and only requires that the collective signals in each sensor's in-neighborhood are sufficiently excited. With the Local-PE condition and proper step sizes, we show that the proposed estimator guarantee that each sensor infers the true parameter in mean square, even if any individual of them cannot. Numerical examples are finally provided to illustrate the established results.
△ Less
Submitted 21 March, 2023;
originally announced March 2023.
-
Cluster Forming of Multiagent Systems in Rolling Horizon Games with Non-uniform Horizons
Authors:
Yurid Nugraha,
Ahmet Cetinkaya,
Tomohisa Hayakawa,
Hideaki Ishii,
Quanyan Zhu
Abstract:
Consensus and cluster forming of multiagent systems in the face of jamming attacks along with reactive recovery actions by a defender are discussed. The attacker is capable to disable some of the edges of the network with the objective to divide the agents into a smaller size of clusters while, in response, the defender recovers some of the edges by increasing the transmission power. We consider r…
▽ More
Consensus and cluster forming of multiagent systems in the face of jamming attacks along with reactive recovery actions by a defender are discussed. The attacker is capable to disable some of the edges of the network with the objective to divide the agents into a smaller size of clusters while, in response, the defender recovers some of the edges by increasing the transmission power. We consider repeated games where the resulting optimal strategies for the two players are derived in a rolling horizon fashion. The attacker and the defender possess different computational abilities to calculate their strategies. This aspect is represented by the non-uniform values of the horizon lengths and the game periods. Theoretical and simulation based results demonstrate the effects of the horizon lengths and the game periods on the agents' states.
△ Less
Submitted 26 January, 2023;
originally announced January 2023.
-
A Rolling Horizon Game Considering Network Effect in Cluster Forming for Dynamic Resilient Multiagent Systems
Authors:
Yurid Nugraha,
Ahmet Cetinkaya,
Tomohisa Hayakawa,
Hideaki Ishii,
Quanyan Zhu
Abstract:
A two-player game-theoretic problem on resilient graphs in a multiagent consensus setting is formulated. An attacker is capable to disable some of the edges of the network with the objective to divide the agents into clusters by emitting jamming signals while, in response, the defender recovers some of the edges by increasing the transmission power for the communication signals. Specifically, we c…
▽ More
A two-player game-theoretic problem on resilient graphs in a multiagent consensus setting is formulated. An attacker is capable to disable some of the edges of the network with the objective to divide the agents into clusters by emitting jamming signals while, in response, the defender recovers some of the edges by increasing the transmission power for the communication signals. Specifically, we consider repeated games between the attacker and the defender where the optimal strategies for the two players are derived in a rolling horizon fashion based on utility functions that take both the agents' states and the sizes of clusters (known as network effect) into account. The players' actions at each discrete-time step are constrained by their energy for transmissions of the signals, with a less strict constraint for the attacker. Necessary conditions and sufficient conditions of agent consensus are derived, which are influenced by the energy constraints. The number of clusters of agents at infinite time in the face of attacks and recoveries are also characterized. Simulation results are provided to demonstrate the effects of players' actions on the cluster forming and to illustrate the players' performance for different horizon parameters.
△ Less
Submitted 9 January, 2023;
originally announced January 2023.
-
Two-Player Incomplete Games of Resilient Multiagent Systems
Authors:
Yurid Nugraha,
Tomohisa Hayakawa,
Hideaki Ishii,
Ahmet Cetinkaya,
Quanyan Zhu
Abstract:
Evolution of agents' dynamics of multiagent systems under consensus protocol in the face of jamming attacks is discussed, where centralized parties are able to influence the control signals of the agents. In this paper we focus on a game-theoretical approach of multiagent systems where the players have incomplete information on their opponents' strength. We consider repeated games with both simult…
▽ More
Evolution of agents' dynamics of multiagent systems under consensus protocol in the face of jamming attacks is discussed, where centralized parties are able to influence the control signals of the agents. In this paper we focus on a game-theoretical approach of multiagent systems where the players have incomplete information on their opponents' strength. We consider repeated games with both simultaneous and sequential player actions where players update their beliefs of each other over time. The effect of the players' optimal strategies according to Bayesian Nash Equilibrium and Perfect Bayesian Equilibrium on agents' consensus is examined. It is shown that an attacker with incomplete knowledge may fail to prevent consensus despite having sufficient resources to do so.
△ Less
Submitted 11 March, 2023; v1 submitted 3 December, 2022;
originally announced December 2022.
-
Spoken Dialogue Strategy Focusing on Asymmetric Communication with Android Robots
Authors:
Daisuke Kawakubo,
Hitoshi Ishii,
Riku Okazawa,
Shunta Nishizawa,
Haruki Hatakeyama,
Hiroaki Sugiyama,
Masaki Shuzo,
Eisaku Maeda
Abstract:
Humans are easily conscious of small differences in an android robot's (AR's) behaviors and utterances, resulting in treating the AR as not-human, while ARs treat us as humans. Thus, there exists asymmetric communication between ARs and humans. In our system at Dialogue Robot Competition 2022, this asymmetry was a considerable research target in our dialogue strategy. For example, tricky phrases s…
▽ More
Humans are easily conscious of small differences in an android robot's (AR's) behaviors and utterances, resulting in treating the AR as not-human, while ARs treat us as humans. Thus, there exists asymmetric communication between ARs and humans. In our system at Dialogue Robot Competition 2022, this asymmetry was a considerable research target in our dialogue strategy. For example, tricky phrases such as questions related to personal matters and forceful requests for agreement were experimentally used in AR's utterances. We assumed that these AR phrases would have a reasonable chance of success, although humans would likely hesitate to use the phrases. Additionally, during a five-minute dialogue, our AR's character, such as its voice tones and sentence expressions, changed from mechanical to human-like type in order to pretend to tailor to customers. The characteristics of the AR developed by our team, DSML-TDU, are introduced in this paper.
△ Less
Submitted 18 October, 2022;
originally announced October 2022.
-
A State Feedback Controller for Mitigation of Continuous-Time Networked SIS Epidemics
Authors:
Yuan Wang,
Sebin Gracy,
César A. Uribe,
Hideaki Ishii,
Karl Henrik Johansson
Abstract:
The paper considers continuous-time networked susceptible-infected-susceptible (SIS) diseases spreading over a population. Each agent represents a sub-population and has its own healing rate and infection rate; the state of the agent at a time instant denotes what fraction of the said sub-population is infected with the disease at the said time instant. By taking account of the changes in behavior…
▽ More
The paper considers continuous-time networked susceptible-infected-susceptible (SIS) diseases spreading over a population. Each agent represents a sub-population and has its own healing rate and infection rate; the state of the agent at a time instant denotes what fraction of the said sub-population is infected with the disease at the said time instant. By taking account of the changes in behaviors of the agents in response to the infection rates in real-time, our goal is to devise a feedback strategy such that the infection level for each agent strictly stays below a pre-specified value. Furthermore, we are also interested in ensuring that the closed-loop system converges either to the disease-free equilibrium or, when it exists, to the endemic equilibrium. The upshot of devising such a strategy is that it allows health administration officials to ensure that there is sufficient capacity in the healthcare system to treat the most severe cases. We demonstrate the effectiveness of our controller via numerical examples.
△ Less
Submitted 9 October, 2022;
originally announced October 2022.
-
Propagation of minima for nonlocal operators
Authors:
Isabeau Birindelli,
Giulio Galise,
Hitoshi Ishii
Abstract:
In this paper we state some sharp maximum principle, i.e. we characterize the geometry of the sets of minima for supersolutions of equations involving the $k$-\emph{th fractional truncated Laplacian} or the $k$-\emph{th fractional eigenvalue} which are fully nonlinear integral operators whose nonlocality is somehow $k$-dimensional.
In this paper we state some sharp maximum principle, i.e. we characterize the geometry of the sets of minima for supersolutions of equations involving the $k$-\emph{th fractional truncated Laplacian} or the $k$-\emph{th fractional eigenvalue} which are fully nonlinear integral operators whose nonlocality is somehow $k$-dimensional.
△ Less
Submitted 17 August, 2022;
originally announced August 2022.
-
Competing spin-orbital singlet states in the 4$d^4$ honeycomb ruthenate Ag$_3$LiRu$_2$O$_6$
Authors:
T. Takayama,
M. Blankenhorn,
J. Bertinshaw,
D. Haskel,
N. A. Bogdanov,
K. Kitagawa,
A. N. Yaresko,
A. Krajewska,
S. Bette,
G. McNally,
A. S. Gibbs,
Y. Matsumoto,
D. P. Sari,
I. Watanabe,
G. Fabbris,
W. Bi,
T. I. Larkin,
K. S. Rabinovich,
A. V. Boris,
H. Ishii,
H. Yamaoka,
T. Irifune,
R. Bewley,
C. J. Ridley,
C. L. Bull
, et al. (3 additional authors not shown)
Abstract:
When spin-orbit-entangled $d$-electrons reside on a honeycomb lattice, rich quantum states are anticipated to emerge, as exemplified by the $d^5$ Kitaev materials. Distinct yet equally intriguing physics may be realized with a $d$-electron count other than $d^5$. We found that the layered ruthenate Ag$_3$LiRu$_2$O$_6$ with $d^4$ Ru$^{4+}$ ions at ambient pressure forms a honeycomb lattice of spin-…
▽ More
When spin-orbit-entangled $d$-electrons reside on a honeycomb lattice, rich quantum states are anticipated to emerge, as exemplified by the $d^5$ Kitaev materials. Distinct yet equally intriguing physics may be realized with a $d$-electron count other than $d^5$. We found that the layered ruthenate Ag$_3$LiRu$_2$O$_6$ with $d^4$ Ru$^{4+}$ ions at ambient pressure forms a honeycomb lattice of spin-orbit-entangled singlets, which is a playground for frustrated excitonic magnetism. Under pressure, the singlet state does not develop the expected excitonic magnetism but experiences two successive transitions to other nonmagnetic phases, first to an intermediate phase with moderate distortion of honeycomb lattice, and eventually to a high-pressure phase with very short Ru-Ru dimer bonds. While the strong dimerization in the high-pressure phase originates from a molecular orbital formation as in the sister compound Li$_2$RuO$_3$, the intermediate phase represents a spin-orbit-coupled $J$-dimer state which is stabilized by the admixture of upper-lying $J_{\rm eff} = 1$-derived states. We argue that the $J$-dimer state is induced by a pseudo-Jahn-Teller effect associated with the low-lying spin-orbital excited states and is unique to spin-orbit-entangled $d^4$ systems. The discovery of competing singlet phases demonstrates rich spin-orbital physics of $d^4$ honeycomb compounds and paves the way for realization of unconventional magnetism.
△ Less
Submitted 24 May, 2022;
originally announced May 2022.
-
Asymptotically stable matchings and evolutionary dynamics of preference revelation games in marriage problems
Authors:
Hidemasa Ishii,
Nariaki Nishino
Abstract:
The literature on centralized matching markets often assumes that a true preference of each player is known to herself and fixed, but empirical evidence casts doubt on its plausibility. To circumvent the problem, we consider evolutionary dynamics of preference revelation games in marriage problems. We formulate the asymptotic stability of a matching, indicating the dynamical robustness against suf…
▽ More
The literature on centralized matching markets often assumes that a true preference of each player is known to herself and fixed, but empirical evidence casts doubt on its plausibility. To circumvent the problem, we consider evolutionary dynamics of preference revelation games in marriage problems. We formulate the asymptotic stability of a matching, indicating the dynamical robustness against sufficiently small changes in players' preference reporting strategies, and show that asymptotically stable matchings are stable when they exist. The simulation results of replicator dynamics are presented to demonstrate the asymptotic stability. We contribute a practical insight for market designers that a stable matching may be realized by introducing a learning period in which participants find appropriate reporting strategies through trial and error. We also open doors to a novel area of research by demonstrating ways to employ evolutionary game theory in studies on centralized markets.
△ Less
Submitted 17 May, 2022;
originally announced May 2022.
-
Event-Based Control for Synchronization of Stochastic Linear Systems with Application to Distributed Estimation
Authors:
Jiaqi Yan,
Yilin Mo,
Hideaki Ishii
Abstract:
This paper studies the synchronization of stochastic linear systems which are subject to a general class of noises, in the sense that the noises are bounded in covariance but might be correlated with the states of agents and among each other. We propose an event-based control protocol for achieving the synchronization among agents in the mean square sense and theoretically analyze the performance…
▽ More
This paper studies the synchronization of stochastic linear systems which are subject to a general class of noises, in the sense that the noises are bounded in covariance but might be correlated with the states of agents and among each other. We propose an event-based control protocol for achieving the synchronization among agents in the mean square sense and theoretically analyze the performance of it by using a stochastic Lyapunov function, where the stability of $c$-martingales is particularly developed to handle the challenges brought by the general model of noises and the event-triggering mechanism. The proposed event-based synchronization algorithm is then applied to solve the problem of distributed estimation in sensor network. Specifically, by losslessly decomposing the optimal Kalman filter, it is shown that the problem of distributed estimation can be resolved by using the algorithms designed for achieving the synchronization of stochastic linear systems. As such, an event-based distributed estimation algorithm is developed, where each sensor performs local filtering solely using its own measurement, together with the proposed event-based synchronization algorithm to fuse the local estimates of neighboring nodes. With the reduced communication frequency, the designed estimator is proved to be stable under the minimal requirements of network connectivity and collective system observability.
△ Less
Submitted 13 May, 2022;
originally announced May 2022.
-
Unusually strong electronic correlation and field-induced ordered phase in YbCo$_2$
Authors:
J. Valenta,
N. Tsujii,
H. Yamaoka,
F. Honda,
Y. Hirose,
H. Sakurai,
N. Terada,
T. Naka,
T. Nakane,
T. Koizumi,
H. Ishii,
N. Hiraoka,
T. Mori
Abstract:
We report the first study of electrical resistivity, magnetization, and specific heat on YbCo$_2$. The measurements on a single-phased sample of YbCo$_2$ bring no evidence of magnetic ordering down to 0.3 K in a zero magnetic field. The manifestations of low Kondo temperature are observed. The specific heat value divided by temperature, C/T, keeps increasing logarithmically beyond 7 J/mol.K2 with…
▽ More
We report the first study of electrical resistivity, magnetization, and specific heat on YbCo$_2$. The measurements on a single-phased sample of YbCo$_2$ bring no evidence of magnetic ordering down to 0.3 K in a zero magnetic field. The manifestations of low Kondo temperature are observed. The specific heat value divided by temperature, C/T, keeps increasing logarithmically beyond 7 J/mol.K2 with decreasing temperature down to 0.3 K without no sign of magnetic ordering, suggesting a very large electronic specific heat. Analysis of the magnetic specific heat indicates that the large portion of the low-temperature specific heat is not explained simply by the low Kondo temperature but is due to the strong intersite magnetic correlation in both the 3d and 4f electrons. Temperature-dependent measurements under static magnetic fields up to 7 T are carried out, which show the evolution of field-induced transition above 2 T. The transition temperature increases with increasing field, pointing to a ferromagnetic character. The extrapolation of the transition temperature to zero field suggests that YbCo$_2$ is in the very proximity of the quantum critical point. These results indicate that in the unique case of YbCo$_2$, the itinerant electron magnetism of Co 3d-electrons and the Kondo effect within the vicinity of quantum criticality of Yb 4f-local moments can both play a role.
△ Less
Submitted 30 March, 2023; v1 submitted 25 April, 2022;
originally announced April 2022.
-
Event-triggered Approximate Byzantine Consensus with Multi-hop Communication
Authors:
Liwei Yuan,
Hideaki Ishii
Abstract:
In this paper, we consider a resilient consensus problem for the multi-agent network where some of the agents are subject to Byzantine attacks and may transmit erroneous state values to their neighbors. In particular, we develop an event-triggered update rule to tackle this problem as well as reduce the communication for each agent. Our approach is based on the mean subsequence reduced (MSR) algor…
▽ More
In this paper, we consider a resilient consensus problem for the multi-agent network where some of the agents are subject to Byzantine attacks and may transmit erroneous state values to their neighbors. In particular, we develop an event-triggered update rule to tackle this problem as well as reduce the communication for each agent. Our approach is based on the mean subsequence reduced (MSR) algorithm with agents being capable to communicate with multi-hop neighbors. Since delays are critical in such an environment, we provide necessary graph conditions for the proposed algorithm to perform well with delays in the communication. We highlight that through multi-hop communication, the network connectivity can be reduced especially in comparison with the common onehop communication case. Lastly, we show the effectiveness of the proposed algorithm by a numerical example.
△ Less
Submitted 19 April, 2022;
originally announced April 2022.
-
A Framework for Distributed Estimation with Reduced Communication via Event-Based Strategies
Authors:
Jiaqi Yan,
Yilin Mo,
Hideaki Ishii
Abstract:
This paper considers the problem of distributed estimation in a sensor network, where multiple sensors are deployed to infer the state of a linear time-invariant (LTI) Gaussian system. By proposing a lossless decomposition of Kalman filter, a framework of event-based distributed estimation is developed, where each sensor node runs a local filter using solely its own measurement, alongside with an…
▽ More
This paper considers the problem of distributed estimation in a sensor network, where multiple sensors are deployed to infer the state of a linear time-invariant (LTI) Gaussian system. By proposing a lossless decomposition of Kalman filter, a framework of event-based distributed estimation is developed, where each sensor node runs a local filter using solely its own measurement, alongside with an event-based synchronization algorithm to fuse the neighboring information. One novelty of the proposed framework is that it decouples the local filter from synchronization process. By doing so, we prove that a general class of triggering strategies can be applied in our framework, which yields stable distributed estimators under the minimal requirements of network connectivity and collective system observability. As compared with existing works, the proposed algorithm enjoys lower data size for each transmission. Moreover, the developed results can be generalized to achieve a distributed implementation of any Luenberger observer. By solving a semi-definite programming (SDP), we further present a low-rank estimator design to obtain the optimal gain of Luenberger observer such that the distributed estimation is realized under the constraint of message complexity. Numerical examples are finally provided to demonstrate the proposed methods.
△ Less
Submitted 17 April, 2022; v1 submitted 7 April, 2022;
originally announced April 2022.
-
Cluster Synchronization of Kuramoto Oscillators and the Method of Averaging
Authors:
Rui Kato,
Hideaki Ishii
Abstract:
Rigorous conditions for cluster synchronization of Kuramoto oscillators are presented. The method of averaging plays an important role in stability analysis, but the standard Lyapunov's second method is not applicable due to the lack of uniform continuity. This paper contributes to overcoming this difficulty with the help of nonmonotonic Lyapunov functions. Our extensions of averaging in stability…
▽ More
Rigorous conditions for cluster synchronization of Kuramoto oscillators are presented. The method of averaging plays an important role in stability analysis, but the standard Lyapunov's second method is not applicable due to the lack of uniform continuity. This paper contributes to overcoming this difficulty with the help of nonmonotonic Lyapunov functions. Our extensions of averaging in stability theory are key to derive the two interrelated cluster synchronization conditions: (i) the coupling strengths between clusters are sufficiently weak and/or (ii) the natural frequencies are largely different between clusters. Cluster phase cohesiveness in the absence of network partitions ensuring the existence of invariant manifolds is also investigated. Moreover, we apply our theoretical findings to brain networks and exhibit certain relations among network parameters and functional connectivity.
△ Less
Submitted 9 September, 2023; v1 submitted 6 April, 2022;
originally announced April 2022.
-
The vanishing discount problem for monotone systems of Hamilton-Jacobi equations: a counterexample to the full convergence
Authors:
Hitoshi Ishii
Abstract:
In recent years there has been intense interest in the vanishing discount problem for Hamilton-Jacobi equations. In the case of the scalar equation, B. Ziliotto has recently given an example of the Hamilton-Jacobi equation having non-convex Hamiltonian in the gradient variable, for which the full convergence of the solutions does not hold as the discount factor tends to zero. We give here an expli…
▽ More
In recent years there has been intense interest in the vanishing discount problem for Hamilton-Jacobi equations. In the case of the scalar equation, B. Ziliotto has recently given an example of the Hamilton-Jacobi equation having non-convex Hamiltonian in the gradient variable, for which the full convergence of the solutions does not hold as the discount factor tends to zero. We give here an explicit example of nonlinear monotone systems of Hamilton-Jacobi equations having convex Hamiltonians in the gradient variable, for which the full convergence of the solutions fails as the discount factor goes to zero.
△ Less
Submitted 5 February, 2022;
originally announced February 2022.
-
Resilient Consensus with Multi-hop Communication
Authors:
Liwei Yuan,
Hideaki Ishii
Abstract:
In this paper, we study the problem of resilient consensus for a multi-agent network where some of the nodes might be adversarial, attempting to prevent consensus by transmitting faulty values. Our approach is based on that of the so-called weighted mean subsequence reduced (W-MSR) algorithm with a special emphasis on its use in agents capable to communicate with multi-hop neighbors. The MSR algor…
▽ More
In this paper, we study the problem of resilient consensus for a multi-agent network where some of the nodes might be adversarial, attempting to prevent consensus by transmitting faulty values. Our approach is based on that of the so-called weighted mean subsequence reduced (W-MSR) algorithm with a special emphasis on its use in agents capable to communicate with multi-hop neighbors. The MSR algorithm is a powerful tool for achieving resilient consensus under minimal requirements for network structures, characterized by the class of robust graphs. Our analysis highlights that through multi-hop communication, the network connectivity can be reduced especially in comparison with the common one-hop communication case. Moreover, we analyze the multi-hop W-MSR algorithm with delays in communication since the values from different multi-hop neighbors may arrive at the agents at different time steps.
△ Less
Submitted 10 January, 2022;
originally announced January 2022.
-
Robustness of superconductivity to external pressure in high-entropy-alloy-type metal telluride AgInSnPbBiTe5
Authors:
Md. Riad Kasem,
Yuki Nakahira,
Hitoshi Yamaoka,
Ryo Matsumoto,
Aichi Yamashita,
Hirofumi Ishii,
Nozomu Hiraoka,
Yoshihiko Takano,
Yosuke Goto,
Yoshikazu Mizuguchi
Abstract:
High-entropy-alloy (HEA) superconductors are a new class of disordered superconductors. In this study, we investigate the robustness of superconducting states in HEA-type metal telluride (MTe; M = Ag, In, Sn, Pb, Bi) under high pressure. PbTe exhibits a structural transition from a NaCl-type to an orthorhombic Pnma structure at low pressures, and further transitions to a CsCl-type structure at hig…
▽ More
High-entropy-alloy (HEA) superconductors are a new class of disordered superconductors. In this study, we investigate the robustness of superconducting states in HEA-type metal telluride (MTe; M = Ag, In, Sn, Pb, Bi) under high pressure. PbTe exhibits a structural transition from a NaCl-type to an orthorhombic Pnma structure at low pressures, and further transitions to a CsCl-type structure at high pressures. When the superconductivity of the CsCl-type PbTe is observed, it is found that its superconducting transition temperature (Tc) decreases with pressure. However, in the HEA-type AgInSnPbBiTe5, Tc is almost independent of pressure, for pressures ranging from 13.0 to 35.1 GPa. This trend is quite similar to that observed in an HEA superconductor (TaNb)0.67(HfZrTi)0.33, which shows that the robustness of superconductivity to external pressure is a universal feature in HEA-type superconductors. To clarify the effects of the modification of the configurational entropy of mixing on the crystal structure, superconducting states, and electronic structure of MTe, electrical resistance measurements, synchrotron X-ray diffraction, and synchrotron X-ray absorption spectroscopy with partial fluorescence mode (PFY-XAS) for three MTe polycrystalline samples of PbTe, AgPbBiTe3, and AgInSnPbBiTe5 with different configurational entropies of mixing at the M site were performed.
△ Less
Submitted 13 December, 2021;
originally announced December 2021.
-
Domain dependent Fermi arcs observed in a striped phase dichalcogenide
Authors:
T. Mizokawa,
A. Barinov,
V. Kandyba,
A. Giampietri,
R. Matsumoto,
Y. Okamoto,
K. Takubo,
K. Miyamoto,
T. Okuda,
S. Pyon,
H. Ishii,
K. Kudo,
M. Nohara,
N. L. Saini
Abstract:
Angle-resolved photoemission spectromicroscopy on IrTe2 reveals evolution of mesoscopic striped domains across its first order phase transition at about 280 K. The striped texture of the domains is characterized by a herringbone arrangement of the electronic anisotropy axes. Under further cooling down to 47 K, the striped domains evolve into trijunction domains with the electronic anisotropy in th…
▽ More
Angle-resolved photoemission spectromicroscopy on IrTe2 reveals evolution of mesoscopic striped domains across its first order phase transition at about 280 K. The striped texture of the domains is characterized by a herringbone arrangement of the electronic anisotropy axes. Under further cooling down to 47 K, the striped domains evolve into trijunction domains with the electronic anisotropy in three directions. Each domain harbors quasi one-dimensional surface bands forming Fermi arcs with peculiar spin polarization. The Fermi arc corresponds to an edge state of the two-dimensional bulk electronic states truncated at the surface, indicating an interesting interplay between the symmetry breaking and the surface electronic states.
△ Less
Submitted 11 December, 2021;
originally announced December 2021.
-
Asymptotic profiles of zero points of solutions to the heat equation
Authors:
Hiroshi Ishii
Abstract:
In this paper, we consider the asymptotic profiles of zero points for the spatial variable of the solutions to the heat equation. By giving suitable conditions for the initial data, we prove the existence of zero points by extending the high-order asymptotic expansion theory for the heat equation. This reveals a previously unknown asymptotic profile of zero points diverging at $O(t)$. In a one-dim…
▽ More
In this paper, we consider the asymptotic profiles of zero points for the spatial variable of the solutions to the heat equation. By giving suitable conditions for the initial data, we prove the existence of zero points by extending the high-order asymptotic expansion theory for the heat equation. This reveals a previously unknown asymptotic profile of zero points diverging at $O(t)$. In a one-dimensional spatial case, we show the zero point's second and third-order asymptotic profiles in a general situation. We also analyze a zero-level set in high-dimensional spaces and obtain results that extend the results for the one-dimensional spatial case.
△ Less
Submitted 24 May, 2023; v1 submitted 28 September, 2021;
originally announced September 2021.
-
Nonlinear Neumann problems for fully nonlinear elliptic PDEs on a quadrant
Authors:
Hitoshi Ishii,
Taiga Kumagai
Abstract:
We consider the nonlinear Neumann problem for fully nonlinear elliptic PDEs on a quadrant. We establish a comparison theorem for viscosity sub and supersolutions of the nonlinear Neumann problem. The crucial argument in the proof of the comparison theorem is to build a $C^{1,1}$ test function which takes care of the nonlinear Neumann boundary condition. A similar problem has been treated on a gene…
▽ More
We consider the nonlinear Neumann problem for fully nonlinear elliptic PDEs on a quadrant. We establish a comparison theorem for viscosity sub and supersolutions of the nonlinear Neumann problem. The crucial argument in the proof of the comparison theorem is to build a $C^{1,1}$ test function which takes care of the nonlinear Neumann boundary condition. A similar problem has been treated on a general $n$-dimensional orthant by Biswas, Ishii, Subhamay, and Wang [SIAM J. Control Optim. 55 (2017), pp. 365--396], where the functions ($H_i$ in the main text) describing the boundary condition are required to be positively one-homogeneous, and the result in this paper removes the positive homogeneity in two-dimension. An existence result for solutions is also presented.
△ Less
Submitted 30 August, 2021;
originally announced August 2021.
-
Hamilton-Jacobi equations with their Hamiltonians depending Lipschitz continuously on the unknown
Authors:
Hitoshi Ishii,
Kaizhi Wang,
Lin Wang,
Jun Yan
Abstract:
We study the Hamilton-Jacobi equations $H(x,Du,u)=0$ in $M$ and $\partial u/\partial t +H(x,D_xu,u)=0$ in $M\times(0,\infty)$, where the Hamiltonian $H=H(x,p,u)$ depends Lipschitz continuously on the variable $u$. In the framework of the semicontinuous viscosity solutions due to Barron-Jensen, we establish the comparison principle, existence theorem, and representation formula as value functions f…
▽ More
We study the Hamilton-Jacobi equations $H(x,Du,u)=0$ in $M$ and $\partial u/\partial t +H(x,D_xu,u)=0$ in $M\times(0,\infty)$, where the Hamiltonian $H=H(x,p,u)$ depends Lipschitz continuously on the variable $u$. In the framework of the semicontinuous viscosity solutions due to Barron-Jensen, we establish the comparison principle, existence theorem, and representation formula as value functions for extended real-valued, lower semicontinuous solutions for the Cauchy problem. We also establish some results on the long-time behavior of solutions for the Cauchy problem and classification of solutions for the stationary problem.
△ Less
Submitted 25 August, 2021;
originally announced August 2021.
-
Automatic Differentiation With Higher Infinitesimals, or Computational Smooth Infinitesimal Analysis in Weil Algebra
Authors:
Hiromi Ishii
Abstract:
We propose an algorithm to compute the $C^\infty$-ring structure of arbitrary Weil algebra. It allows us to do some analysis with higher infinitesimals numerically and symbolically. To that end, we first give a brief description of the (Forward-mode) automatic differentiation (AD) in terms of $C^\infty$-rings. The notion of a $C^\infty$-ring was introduced by Lawvere and used as the fundamental bu…
▽ More
We propose an algorithm to compute the $C^\infty$-ring structure of arbitrary Weil algebra. It allows us to do some analysis with higher infinitesimals numerically and symbolically. To that end, we first give a brief description of the (Forward-mode) automatic differentiation (AD) in terms of $C^\infty$-rings. The notion of a $C^\infty$-ring was introduced by Lawvere and used as the fundamental building block of smooth infinitesimal analysis and synthetic differential geometry. We argue that interpreting AD in terms of $C^\infty$-rings gives us a unifying theoretical framework and modular ways to express multivariate partial derivatives. In particular, we can "package" higher-order Forward-mode AD as a Weil algebra, and take tensor products to compose them to achieve multivariate higher-order AD. The algorithms in the present paper can also be used for a pedagogical purpose in learning and studying smooth infinitesimal analysis as well.
△ Less
Submitted 4 July, 2021; v1 submitted 27 June, 2021;
originally announced June 2021.
-
Suppressing the endemic equilibrium in SIS epidemics: A state dependent approach
Authors:
Yuan Wang,
Sebin Gracy,
Hideaki Ishii,
Karl Henrik Johansson
Abstract:
This paper considers the susceptible-infected-susceptible (SIS) epidemic model with an underlying network structure among subpopulations and focuses on the effect of social distancing to regulate the epidemic level. We demonstrate that if each subpopulation is informed of its infection rate and reduces interactions accordingly, the fraction of the subpopulation infected can remain below half for a…
▽ More
This paper considers the susceptible-infected-susceptible (SIS) epidemic model with an underlying network structure among subpopulations and focuses on the effect of social distancing to regulate the epidemic level. We demonstrate that if each subpopulation is informed of its infection rate and reduces interactions accordingly, the fraction of the subpopulation infected can remain below half for all time instants. To this end, we first modify the basic SIS model by introducing a state dependent parameter representing the frequency of interactions between subpopulations. Thereafter, we show that for this modified SIS model, the spectral radius of a suitably-defined matrix being not greater than one causes all the agents, regardless of their initial sickness levels, to converge to the healthy state; assuming non-trivial disease spread, the spectral radius being greater than one leads to the existence of a unique endemic equilibrium, which is also asymptotically stable. Finally, by leveraging the aforementioned results, we show that the fraction of (sub)populations infected never exceeds half.
△ Less
Submitted 6 August, 2021; v1 submitted 31 May, 2021;
originally announced June 2021.
-
Quantized State Feedback Stabilization of Nonlinear Systems under Denial-of-Service
Authors:
Mingming Shi,
Shuai Feng,
Hideaki Ishii
Abstract:
This paper studies the resilient control of networked systems in the presence of cyber attacks. In particular, we consider the state feedback stabilization problem for nonlinear systems when the state measurement is sent to the controller via a communication channel that only has a finite transmitting rate and is moreover subject to cyber attacks in the form of Denial-of-Service (DoS). We use a dy…
▽ More
This paper studies the resilient control of networked systems in the presence of cyber attacks. In particular, we consider the state feedback stabilization problem for nonlinear systems when the state measurement is sent to the controller via a communication channel that only has a finite transmitting rate and is moreover subject to cyber attacks in the form of Denial-of-Service (DoS). We use a dynamic quantization method to update the quantization range of the encoder/decoder and characterize the number of bits for quantization needed to stabilize the system under a given level of DoS attacks in terms of duration and frequency. Our theoretical result shows that under DoS attacks, the required data bits to stabilize nonlinear systems by state feedback control are larger than those without DoS since the communication interruption induced by DoS makes the quantization uncertainty expand more between two successful transmissions. Even so, in the simulation, we show that the actual quantization bits can be much smaller than the theoretical value.
△ Less
Submitted 9 April, 2021;
originally announced April 2021.
-
Functional Pearl: Witness Me -- Constructive Arguments Must Be Guided with Concrete Witness
Authors:
Hiromi Ishii
Abstract:
Beloved Curry--Howard correspondence tells that types are intuitionistic propositions, and in constructive math, a proof of proposition can be seen as some kind of a construction, or witness, conveying the information of the proposition. We demonstrate how useful this point of view is as the guiding principle for developing dependently-typed programs.
Beloved Curry--Howard correspondence tells that types are intuitionistic propositions, and in constructive math, a proof of proposition can be seen as some kind of a construction, or witness, conveying the information of the proposition. We demonstrate how useful this point of view is as the guiding principle for developing dependently-typed programs.
△ Less
Submitted 22 March, 2021;
originally announced March 2021.
-
A Succinct Multivariate Lazy Multivariate Tower AD for Weil Algebra Computation
Authors:
Hiromi Ishii
Abstract:
We propose a functional implementation of \emph{Multivariate Tower Automatic Differentiation}. Our implementation is intended to be used in implementing $C^\infty$-structure computation of an arbitrary Weil algebra, which we discussed in the previous work.
We propose a functional implementation of \emph{Multivariate Tower Automatic Differentiation}. Our implementation is intended to be used in implementing $C^\infty$-structure computation of an arbitrary Weil algebra, which we discussed in the previous work.
△ Less
Submitted 4 July, 2021; v1 submitted 22 March, 2021;
originally announced March 2021.
-
Secure Consensus with Distributed Detection via Two-hop Communication
Authors:
Liwei Yuan,
Hideaki Ishii
Abstract:
In this paper, we consider a multi-agent resilient consensus problem, where some of the nodes may behave maliciously. The approach is to equip all nodes with a scheme to detect neighboring nodes when they behave in an abnormal fashion. To this end, the nodes exchange not only their own states but also information regarding their neighbor nodes. Such two-hop communication has long been studied in f…
▽ More
In this paper, we consider a multi-agent resilient consensus problem, where some of the nodes may behave maliciously. The approach is to equip all nodes with a scheme to detect neighboring nodes when they behave in an abnormal fashion. To this end, the nodes exchange not only their own states but also information regarding their neighbor nodes. Such two-hop communication has long been studied in fault-tolerant algorithms in computer science. We propose two distributed schemes for detection of malicious nodes and resilient consensus with different requirements on resources for communication and the structures of the networks. In particular, the detection schemes become effective under certain connectivity properties in the network so that the non-malicious nodes can share enough information about their neighbors. It is shown that the requirements are however less stringent than those for conventional algorithms. A numerical example is presented to demonstrate the performance of the proposed methods in wireless sensor networks.
△ Less
Submitted 13 January, 2021;
originally announced January 2021.
-
Resilient Consensus for Multi-Agent Systems under Adversarial Spreading Processes
Authors:
Yuan Wang,
Hideaki Ishii,
François Bonnet,
Xavier Défago
Abstract:
This paper addresses novel consensus problems for multi-agent systems operating in an unreliable environment where adversaries are spreading. The dynamics of the adversarial spreading processes follows the susceptible-infected-recovered (SIR) model, where the infection induces faulty behaviors in the agents and affects their state values. Such a problem setting serves as a model of opinion dynamic…
▽ More
This paper addresses novel consensus problems for multi-agent systems operating in an unreliable environment where adversaries are spreading. The dynamics of the adversarial spreading processes follows the susceptible-infected-recovered (SIR) model, where the infection induces faulty behaviors in the agents and affects their state values. Such a problem setting serves as a model of opinion dynamics in social networks where consensus is to be formed at the time of pandemic and infected individuals may deviate from their true opinions. To ensure resilient consensus among the noninfectious agents, the difficulty is that the number of infectious agents changes over time. We assume that a local policy maker announces the local level of infection in real-time, which can be adopted by the agent for its preventative measures. It is demonstrated that this problem can be formulated as resilient consensus in the presence of the socalled mobile malicious models, where the mean subsequence reduced (MSR) algorithms are known to be effective. We characterize sufficient conditions on the network structures for different policies regarding the announced infection levels and the strength of the epidemic. Numerical simulations are carried out for random graphs to verify the effectiveness of our approach.
△ Less
Submitted 11 January, 2022; v1 submitted 26 December, 2020;
originally announced December 2020.
-
Resilient Self/Event-Triggered Consensus Based on Ternary Control
Authors:
Hiroki Matsume,
Yuan Wang,
Hideaki Ishii
Abstract:
The paper considers the problem of multi-agent consensus in the presence of adversarial agents which may try to prevent and introduce undesired influence on the coordination among the regular agents. To our setting, we extend the so-called mean subsequence reduced algorithms with the aim to reduce the amount of communication via two measures: The agents exchange information in the form of ternary…
▽ More
The paper considers the problem of multi-agent consensus in the presence of adversarial agents which may try to prevent and introduce undesired influence on the coordination among the regular agents. To our setting, we extend the so-called mean subsequence reduced algorithms with the aim to reduce the amount of communication via two measures: The agents exchange information in the form of ternary data at each transmission and moreover keep the frequency of data exchange low by employing self- and event-triggered communication. We will observe that in hostile environments with adversaries, the self-triggered approach can bring certain advantages over the event-triggered counterpart.
△ Less
Submitted 24 December, 2020;
originally announced December 2020.
-
Linearization-Based Quantized Stabilization of Nonlinear Systems Under DoS Attacks
Authors:
Rui Kato,
Ahmet Cetinkaya,
Hideaki Ishii
Abstract:
Motivated by recent security issues in cyber-physical systems, this technical note studies the stabilization problem of networked control systems under Denial-of-Service (DoS) attacks. In particular, we consider to stabilize a nonlinear system with limited data rate via linearization. We employ a deterministic DoS attack model constrained in terms of attacks' frequency and duration, allowing us to…
▽ More
Motivated by recent security issues in cyber-physical systems, this technical note studies the stabilization problem of networked control systems under Denial-of-Service (DoS) attacks. In particular, we consider to stabilize a nonlinear system with limited data rate via linearization. We employ a deterministic DoS attack model constrained in terms of attacks' frequency and duration, allowing us to cover a large class of potential attacks. To achieve asymptotic stabilization, we propose a resilient dynamic quantizer in the sense that it does not saturate in the presence of packet losses caused by DoS attacks. A sufficient condition for stability is derived by restricting the average DoS frequency and duration. In addition, because of the locality of linearization, we explicitly investigate an estimate of the region of attraction, which can be expected to be reduced depending on the strength of DoS attacks. A simulation example is presented for demonstration of our results.
△ Less
Submitted 11 December, 2020;
originally announced December 2020.
-
Effective nonlocal kernels on Reaction-diffusion networks
Authors:
Shin-Ichiro Ei,
Hiroshi Ishii,
Shigeru Kondo,
Takashi Miura,
Yoshitaro Tanaka
Abstract:
A new method to derive an essential integral kernel from any given reaction-diffusion network is proposed. Any network describing metabolites or signals with arbitrary many factors can be reduced to a single or a simpler system of integro-differential equations called "effective equation" including the reduced integral kernel (called "effective kernel" ) in the convolution type. As one typical exa…
▽ More
A new method to derive an essential integral kernel from any given reaction-diffusion network is proposed. Any network describing metabolites or signals with arbitrary many factors can be reduced to a single or a simpler system of integro-differential equations called "effective equation" including the reduced integral kernel (called "effective kernel" ) in the convolution type. As one typical example, the Mexican hat shaped kernel is theoretically derived from two component activator-inhibitor systems. It is also shown that a three component system with quite different appearance from activator-inhibitor systems is reduced to an effective equation with the Mexican hat shaped kernel. It means that the two different systems have essentially the same effective equations and that they exhibit essentially the same spatial and temporal patterns. Thus, we can identify two different systems with the understanding in unified concept through the reduced effective kernels. Other two applications of this method are also given: Applications to pigment patterns on skins (two factors network with long range interaction) and waves of differentiation (called proneural waves) in visual systems on brains (four factors network with long range interaction). In the applications, we observe the reproduction of the same spatial and temporal patterns as those appearing in pre-existing models through the numerical simulations of the effective equations.
△ Less
Submitted 11 September, 2020;
originally announced September 2020.
-
Stabilization of Nonmagnetic Hexagonal Close-Packed Phase in Nanocrystalline Nickel Metal with a Giant Volume Expansion
Authors:
Sho Otsuru,
Kenta Akashi,
Miki Kakihara,
Takuto Tsukahara,
Hirofumi Ishii,
Yen-Fa Liao,
Ku-Ding Tsuei,
Yuji Inagaki,
Tatsuya Kawae,
Tetsuya Kida,
Satoshi Suehiro,
Masashi Nantoh,
Koji Ishibashi,
Yoichi Ishiwata
Abstract:
Nanocrystalline Ni can adopt a hexagonal close-packed (hcp) structure,which does not appear in a bulk form under any conditions.Structural studies found its $>$ 20% expansion of volume per atom compared with face-centered cubic (fcc) Ni.Hard x-ray photoemission spectroscopy of the hcp phase revealed a $>$ 0.14 valence electron transfer from 3$d$ to 4$s$ and 4$p$ orbitals and a 0.25 eV reduction in…
▽ More
Nanocrystalline Ni can adopt a hexagonal close-packed (hcp) structure,which does not appear in a bulk form under any conditions.Structural studies found its $>$ 20% expansion of volume per atom compared with face-centered cubic (fcc) Ni.Hard x-ray photoemission spectroscopy of the hcp phase revealed a $>$ 0.14 valence electron transfer from 3$d$ to 4$s$ and 4$p$ orbitals and a 0.25 eV reduction in band energy per electron compared with the fcc phase.Its nonmagnetic nature was attributed to a low density of states at the Fermi level.Thermodynamic stability of the hcp phase can be explained by the band energy gain and the electrostatic potential energy loss as related to the large lattice expansion.
△ Less
Submitted 6 September, 2020; v1 submitted 26 August, 2020;
originally announced August 2020.
-
Off-resonant coherent electron transport over three nanometers in multi-heme protein bioelectronic junctions
Authors:
Zdenek Futera,
Ichiro Ide,
Ben Kayser,
Kavita Garg,
Xiuyun Jiang,
Jessica H. van Wonderen,
Julea N. Butt,
Hisao Ishii,
Israel Pecht,
Mordechai Sheves,
David Cahen,
Jochen Blumberger
Abstract:
Multi-heme cytochromes (MHC) are fascinating proteins used by bacterial organisms to shuttle electrons within and between their cells. When placed in a solid state electronic junction, they support temperature-independent currents over several nanometers that are three orders of magnitude higher compared to other redox proteins of comparable size. To gain microscopic insight into their astonishing…
▽ More
Multi-heme cytochromes (MHC) are fascinating proteins used by bacterial organisms to shuttle electrons within and between their cells. When placed in a solid state electronic junction, they support temperature-independent currents over several nanometers that are three orders of magnitude higher compared to other redox proteins of comparable size. To gain microscopic insight into their astonishingly high conductivities, we present herein the first current-voltage calculations of its kind, for a MHC sandwiched between two Au(111) electrodes, complemented by photo-emission spectroscopy experiments. We find that conduction proceeds via off-resonant coherent tunneling mediated by a large number of protein valence-band orbitals that are strongly delocalized over heme and protein residues, effectively "gating" the current between the two electrodes. This picture is profoundly different from the dominant electron hopping mechanism supported by the same protein in aqueous solution. Our results imply that current output in MHC junctions could be even further increased in the resonant regime, e.g. by application of a gate voltage, making these proteins extremely interesting for next-generation bionanoelectronic devices.
△ Less
Submitted 20 July, 2020;
originally announced July 2020.
-
Resilient Consensus Against Mobile Malicious Agents
Authors:
Yuan Wang,
Hideaki Ishii,
François Bonnet,
Xavier Défago
Abstract:
This paper addresses novel consensus problems in the presence of adversaries that can move within the network and induce faulty behaviors in the attacked agents. By adopting several mobile adversary models from the computer science literature, we develop protocols which can mitigate the influence of such malicious agents. The algorithms follow the class of mean subsequence reduced (MSR) algorithms…
▽ More
This paper addresses novel consensus problems in the presence of adversaries that can move within the network and induce faulty behaviors in the attacked agents. By adopting several mobile adversary models from the computer science literature, we develop protocols which can mitigate the influence of such malicious agents. The algorithms follow the class of mean subsequence reduced (MSR) algorithms, under which agents ignore the suspicious values received from neighbors during their state updates. Different from the static adversary models, even after the adversaries move away, the infected agents may remain faulty in their values, whose effects must be taken into account. We develop conditions on the network structures for both the complete and non-complete graph cases, under which the proposed algorithms are guaranteed to attain resilient consensus. Extensive simulations are carried out over random graphs to verify the effectiveness of our approach under uncertainties in the systems.
△ Less
Submitted 21 June, 2020;
originally announced June 2020.
-
Fully non-scanning three-dimensional imaging using an all-optical Hilbert transform enabled by an optical frequency comb
Authors:
Takashi Kato,
Hirotaka Ishii,
Kazuhiro Terada,
Tamaki Morito,
Kaoru Minoshima
Abstract:
This paper demonstrates that the precise phase controllability of an optical frequency comb enables all-optical signal processing for the first time. A novel all-optical Hilbert transform is presented with precise control of relative carrier-phase and envelope of optical pulse train based on frequency control utilizing an optical frequency comb. With the proposed all-optical signal processing meth…
▽ More
This paper demonstrates that the precise phase controllability of an optical frequency comb enables all-optical signal processing for the first time. A novel all-optical Hilbert transform is presented with precise control of relative carrier-phase and envelope of optical pulse train based on frequency control utilizing an optical frequency comb. With the proposed all-optical signal processing method, fully non-scanning one-shot three-dimensional (3D) imaging can be realized with high image resolution. The technique can be applied to coherent phase imaging simultaneously. A precise pair of 90$^\circ$-phase-shifted optical pulses over the entire spectral bandwidth can be generated based on the precise optical phase controllability of an optical frequency comb, thereby facilitating a real-time and precise all-optical Hilbert transform to obtain amplitude and phase of optical signal in a single shot of ultrashort pulses. In our experiments, we realized single-shot 3D imaging with an uncertainty of 5 $\rmμ$m and obtained a surface profile with a resolution of 200 $\times$ 200 pixels.
△ Less
Submitted 17 June, 2020; v1 submitted 14 June, 2020;
originally announced June 2020.
-
An example in the vanishing discount problem for monotone systems of Hamilton-Jacobi equations
Authors:
Hitoshi Ishii
Abstract:
In recent years, there have been many contributions to the vanishing discount problem for Hamilton-Jacobi equations. In the case of the scalar equation, B. Ziliotto [Convergence of the solutions of the discounted Hamilton-Jacobi equation: a counterexample. J. Math. Pures Appl. (9) 128 (2019), 330-338] has shown an example of the Hamilton-Jacobi equation having non-convex Hamiltonian in the gradien…
▽ More
In recent years, there have been many contributions to the vanishing discount problem for Hamilton-Jacobi equations. In the case of the scalar equation, B. Ziliotto [Convergence of the solutions of the discounted Hamilton-Jacobi equation: a counterexample. J. Math. Pures Appl. (9) 128 (2019), 330-338] has shown an example of the Hamilton-Jacobi equation having non-convex Hamiltonian in the gradient variable, for which the full convergence of the solutions does not hold as the discount factor tends to zero. We give an example of the nonlinear monotone system of Hamilton-Jacobi equations having convex Hamiltonians in the gradient variable, for which the whole family convergence of the solutions does not hold.
△ Less
Submitted 31 January, 2022; v1 submitted 4 June, 2020;
originally announced June 2020.
-
Dynamic Quantized Consensus of General Linear Multi-agent Systems under Denial-of-Service Attacks
Authors:
Shuai Feng,
Hideaki Ishii
Abstract:
In this paper, we study multi-agent consensus problems under Denial-of-Service (DoS) attacks with data rate constraints. We first consider the leaderless consensus problem and after that we briefly present the analysis of leader-follower consensus. The dynamics of the agents take general forms modeled as homogeneous linear time-invariant systems. In our analysis, we derive lower bounds on the data…
▽ More
In this paper, we study multi-agent consensus problems under Denial-of-Service (DoS) attacks with data rate constraints. We first consider the leaderless consensus problem and after that we briefly present the analysis of leader-follower consensus. The dynamics of the agents take general forms modeled as homogeneous linear time-invariant systems. In our analysis, we derive lower bounds on the data rate for the multi-agent systems to achieve leaderless and leader-follower consensus in the presence of DoS attacks, under which the issue of overflow of quantizer is prevented. The main contribution of the paper is the characterization of the trade-off between the tolerable DoS attack levels for leaderless and leader-follower consensus and the required data rates for the quantizers during the communication attempts among the agents. To mitigate the influence of DoS attacks, we employ dynamic quantization with zooming-in and zooming-out capabilities for avoiding quantizer saturation.
△ Less
Submitted 21 November, 2021; v1 submitted 28 April, 2020;
originally announced April 2020.