{"id":"https://openalex.org/W4388727513","doi":"https://doi.org/10.1109/iecon51785.2023.10311752","title":"Neural Network-Based Safety Optimization Control for Constrained Discrete-Time Systems","display_name":"Neural Network-Based Safety Optimization Control for Constrained Discrete-Time Systems","publication_year":2023,"publication_date":"2023-10-16","ids":{"openalex":"https://openalex.org/W4388727513","doi":"https://doi.org/10.1109/iecon51785.2023.10311752"},"language":"en","primary_location":{"id":"doi:10.1109/iecon51785.2023.10311752","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iecon51785.2023.10311752","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IECON 2023- 49th Annual Conference of the IEEE Industrial Electronics Society","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002194502","display_name":"Xueli Wang","orcid":"https://orcid.org/0009-0001-0033-636X"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xueli Wang","raw_affiliation_strings":["Qilu University of Technology,Key Laboratory of Computing, Power Network and Information Security, Shandong Computer Science Center,Jinan,China","Key Laboratory of Computing, Power Network and Information Security, Shandong Computer Science Center, Qilu University of Technology, Jinan, China"],"affiliations":[{"raw_affiliation_string":"Qilu University of Technology,Key Laboratory of Computing, Power Network and Information Security, Shandong Computer Science Center,Jinan,China","institution_ids":["https://openalex.org/I152269853"]},{"raw_affiliation_string":"Key Laboratory of Computing, Power Network and Information Security, Shandong Computer Science Center, Qilu University of Technology, Jinan, China","institution_ids":["https://openalex.org/I152269853"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042729110","display_name":"Shangwei Zhao","orcid":"https://orcid.org/0000-0001-7786-3857"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shangwei Zhao","raw_affiliation_strings":["Shanghai Jiao Tong University,Department of Automation,Shanghai,China","Department of Automation, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,Department of Automation,Shanghai,China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Department of Automation, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019934281","display_name":"Ming Yang","orcid":"https://orcid.org/0000-0003-1691-6817"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ming Yang","raw_affiliation_strings":["Qilu University of Technology,Key Laboratory of Computing, Power Network and Information Security, Shandong Computer Science Center,Jinan,China","Key Laboratory of Computing, Power Network and Information Security, Shandong Computer Science Center, Qilu University of Technology, Jinan, China"],"affiliations":[{"raw_affiliation_string":"Qilu University of Technology,Key Laboratory of Computing, Power Network and Information Security, Shandong Computer Science Center,Jinan,China","institution_ids":["https://openalex.org/I152269853"]},{"raw_affiliation_string":"Key Laboratory of Computing, Power Network and Information Security, Shandong Computer Science Center, Qilu University of Technology, Jinan, China","institution_ids":["https://openalex.org/I152269853"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101416812","display_name":"Xiaoming Wu","orcid":"https://orcid.org/0000-0003-0268-0217"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoming Wu","raw_affiliation_strings":["Qilu University of Technology,Key Laboratory of Computing, Power Network and Information Security, Shandong Computer Science Center,Jinan,China","Key Laboratory of Computing, Power Network and Information Security, Shandong Computer Science Center, Qilu University of Technology, Jinan, China"],"affiliations":[{"raw_affiliation_string":"Qilu University of Technology,Key Laboratory of Computing, Power Network and Information Security, Shandong Computer Science Center,Jinan,China","institution_ids":["https://openalex.org/I152269853"]},{"raw_affiliation_string":"Key Laboratory of Computing, Power Network and Information Security, Shandong Computer Science Center, Qilu University of Technology, Jinan, China","institution_ids":["https://openalex.org/I152269853"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091919918","display_name":"Xin Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Wang","raw_affiliation_strings":["Qilu University of Technology,Key Laboratory of Computing, Power Network and Information Security, Shandong Computer Science Center,Jinan,China","Key Laboratory of Computing, Power Network and Information Security, Shandong Computer Science Center, Qilu University of Technology, Jinan, China"],"affiliations":[{"raw_affiliation_string":"Qilu University of Technology,Key Laboratory of Computing, Power Network and Information Security, Shandong Computer Science Center,Jinan,China","institution_ids":["https://openalex.org/I152269853"]},{"raw_affiliation_string":"Key Laboratory of Computing, Power Network and Information Security, Shandong Computer Science Center, Qilu University of Technology, Jinan, China","institution_ids":["https://openalex.org/I152269853"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102223865","display_name":"Shuo Xu","orcid":"https://orcid.org/0009-0003-5017-8501"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuo Xu","raw_affiliation_strings":["Qilu University of Technology,Key Laboratory of Computing, Power Network and Information Security, Shandong Computer Science Center,Jinan,China","Key Laboratory of Computing, Power Network and Information Security, Shandong Computer Science Center, Qilu University of Technology, Jinan, China"],"affiliations":[{"raw_affiliation_string":"Qilu University of Technology,Key Laboratory of Computing, Power Network and Information Security, Shandong Computer Science Center,Jinan,China","institution_ids":["https://openalex.org/I152269853"]},{"raw_affiliation_string":"Key Laboratory of Computing, Power Network and Information Security, Shandong Computer Science Center, Qilu University of Technology, Jinan, China","institution_ids":["https://openalex.org/I152269853"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100385219","display_name":"Xu Hu","orcid":"https://orcid.org/0000-0002-6345-2448"},"institutions":[{"id":"https://openalex.org/I4210126577","display_name":"Shanghai Public Security Bureau","ror":"https://ror.org/03cfv5b91","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210126577"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xu Hu","raw_affiliation_strings":["Public Security Bureau of Jinan,Jinan,China","Public Security Bureau of Jinan, Jinan, China"],"affiliations":[{"raw_affiliation_string":"Public Security Bureau of Jinan,Jinan,China","institution_ids":["https://openalex.org/I4210126577"]},{"raw_affiliation_string":"Public Security Bureau of Jinan, Jinan, China","institution_ids":["https://openalex.org/I4210126577"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5002194502"],"corresponding_institution_ids":["https://openalex.org/I152269853"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.22894674,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12794","display_name":"Adaptive Dynamic Programming Control","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12794","display_name":"Adaptive Dynamic Programming Control","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10462","display_name":"Reinforcement Learning in Robotics","score":0.9603999853134155,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10675","display_name":"Mechanical Circulatory Support Devices","score":0.9362000226974487,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/augmented-lagrangian-method","display_name":"Augmented Lagrangian method","score":0.6715681552886963},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.6498891711235046},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.6210342049598694},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5602693557739258},{"id":"https://openalex.org/keywords/dynamic-programming","display_name":"Dynamic programming","score":0.5454128980636597},{"id":"https://openalex.org/keywords/lagrange-multiplier","display_name":"Lagrange multiplier","score":0.541316032409668},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.5227227807044983},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.5127025842666626},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5038027167320251},{"id":"https://openalex.org/keywords/lagrangian-relaxation","display_name":"Lagrangian relaxation","score":0.48956188559532166},{"id":"https://openalex.org/keywords/bellman-equation","display_name":"Bellman equation","score":0.4562346935272217},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.4552255868911743},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.4328407347202301},{"id":"https://openalex.org/keywords/constrained-optimization","display_name":"Constrained optimization","score":0.4321640133857727},{"id":"https://openalex.org/keywords/optimal-control","display_name":"Optimal control","score":0.4299654960632324},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.41943663358688354},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.311415433883667},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2581089735031128},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.16372662782669067},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08128875494003296}],"concepts":[{"id":"https://openalex.org/C150452318","wikidata":"https://www.wikidata.org/wiki/Q4820432","display_name":"Augmented Lagrangian method","level":2,"score":0.6715681552886963},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.6498891711235046},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.6210342049598694},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5602693557739258},{"id":"https://openalex.org/C37404715","wikidata":"https://www.wikidata.org/wiki/Q380679","display_name":"Dynamic programming","level":2,"score":0.5454128980636597},{"id":"https://openalex.org/C73684929","wikidata":"https://www.wikidata.org/wiki/Q598870","display_name":"Lagrange multiplier","level":2,"score":0.541316032409668},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.5227227807044983},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.5127025842666626},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5038027167320251},{"id":"https://openalex.org/C91765299","wikidata":"https://www.wikidata.org/wiki/Q3424292","display_name":"Lagrangian relaxation","level":2,"score":0.48956188559532166},{"id":"https://openalex.org/C14646407","wikidata":"https://www.wikidata.org/wiki/Q1430750","display_name":"Bellman equation","level":2,"score":0.4562346935272217},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.4552255868911743},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.4328407347202301},{"id":"https://openalex.org/C55660270","wikidata":"https://www.wikidata.org/wiki/Q5164377","display_name":"Constrained optimization","level":2,"score":0.4321640133857727},{"id":"https://openalex.org/C91575142","wikidata":"https://www.wikidata.org/wiki/Q1971426","display_name":"Optimal control","level":2,"score":0.4299654960632324},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.41943663358688354},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.311415433883667},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2581089735031128},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.16372662782669067},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08128875494003296},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iecon51785.2023.10311752","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iecon51785.2023.10311752","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IECON 2023- 49th Annual Conference of the IEEE Industrial Electronics Society","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1988538197","https://openalex.org/W2048687352","https://openalex.org/W2086720756","https://openalex.org/W2101075098","https://openalex.org/W2189990206","https://openalex.org/W2496350169","https://openalex.org/W2809391642","https://openalex.org/W2991391803","https://openalex.org/W3010689561","https://openalex.org/W3033819030","https://openalex.org/W3039138740","https://openalex.org/W3041482332","https://openalex.org/W3048735518","https://openalex.org/W3111131275","https://openalex.org/W3115892855","https://openalex.org/W3127275112","https://openalex.org/W3127509136","https://openalex.org/W3160458447","https://openalex.org/W3187593522","https://openalex.org/W3193283090","https://openalex.org/W4205701845","https://openalex.org/W4205742605","https://openalex.org/W4205939747","https://openalex.org/W4221050610","https://openalex.org/W4237591687","https://openalex.org/W4250589301","https://openalex.org/W4280607589","https://openalex.org/W4283727098","https://openalex.org/W4291910408","https://openalex.org/W4294891492","https://openalex.org/W4295745576","https://openalex.org/W4297033031","https://openalex.org/W4312547357","https://openalex.org/W4312952916","https://openalex.org/W4313681556","https://openalex.org/W6799835771"],"related_works":["https://openalex.org/W2015060724","https://openalex.org/W2002102264","https://openalex.org/W4237964977","https://openalex.org/W2058578573","https://openalex.org/W2360271985","https://openalex.org/W1996993548","https://openalex.org/W2012871340","https://openalex.org/W3046535663","https://openalex.org/W2131718214","https://openalex.org/W3207854495"],"abstract_inverted_index":{"This":[0],"paper":[1],"proposes":[2],"a":[3,112],"constraint-aware":[4,94],"safety":[5],"control":[6,16,29],"approach":[7,36],"via":[8,33],"adaptive":[9],"dynamic":[10],"programming":[11],"(ADP)":[12],"to":[13,23,53,91,104],"address":[14],"the":[15,27,34,38,43,48,55,65,69,77,85,93,98,108,120,125],"optimization":[17,58],"issues":[18],"for":[19],"discrete-time":[20],"systems":[21],"subjected":[22],"state":[24,61],"constraints.":[25,62],"First,":[26],"constrained":[28],"framework":[30],"is":[31,51,72,89,102],"established":[32],"primal-dual":[35],"with":[37],"modified":[39],"Lagrangian":[40,49],"based":[41],"on":[42],"relaxed":[44],"barrier":[45],"function.":[46],"Herein,":[47],"multiplier":[50],"designed":[52],"achieve":[54],"trade-off":[56],"between":[57],"performance":[59],"and":[60,122],"In":[63],"addition,":[64],"sub":[66],"optimality":[67],"of":[68,124],"dual":[70,78],"method":[71],"built":[73],"by":[74],"proving":[75],"that":[76],"gap":[79],"can":[80],"be":[81,105],"arbitrarily":[82],"small.":[83],"And":[84],"value":[86],"iteration":[87],"algorithm":[88],"utilized":[90],"implement":[92],"ADP":[95],"controller.":[96],"Furthermore,":[97],"weight":[99],"estimation":[100],"error":[101],"proved":[103],"bounded":[106],"when":[107],"learning":[109],"rate":[110],"satisfies":[111],"given":[113],"sufficient":[114],"condition.":[115],"Finally,":[116],"numerical":[117],"simulation":[118],"proves":[119],"effectiveness":[121],"superiority":[123],"proposed":[126],"method.":[127]},"counts_by_year":[],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
