Abstract

Robust Nash equilibrium (NE) seeking for a constrained aggregative game is explored. Our setting has the following three features: 1. Local feasibility sets are considered. 2. Each player has first-order dynamics that are influenced by unknown time-varying disturbances and unmodeled terms. 3. The communication topology among players may be influenced by attacks. The existence of unknown disturbances results in the trajectories of the players going out of the feasible sets even though the initial values start from inside. To make the ideas clear, we first use an example that exhibits the three features to introduce the problem formulation to be studied. Subsequently, a two-time-scale distributed, projected algorithm is proposed. The simulation results are also shown. To further illustrate the effectiveness of the proposed algorithm through theoretical analysis, such an algorithm is generalized into a two-time-scale hybrid system by using an average dwell-time automaton and a time-ratio monitor to impose restrictions on the frequency and relative activation time of the attacks. To analyze stability of such a hybrid system, the reduced system and the boundary layer system are presented and corresponding Lyapunov functions are constructed. Correspondingly, uniform (uniform global) asymptotic stability is obtained under some mild assumptions. Also, some results are given for systems without attacks. Finally, two aggregative games are used to show the effectiveness of the proposed algorithm and theoretical analysis.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.