• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Adaptive Memory Event-Triggered Observer-Based Control for Nonlinear Multi-Agent Systems Under DoS Attacks

    2021-10-25 01:41:08XiangguiGuoDongyuZhangJianliangWangandChoonKiAhn
    IEEE/CAA Journal of Automatica Sinica 2021年10期

    Xianggui Guo,Dongyu Zhang,Jianliang Wang,,and Choon Ki Ahn,

    Abstract—This paper investigates the event-triggered security consensus problem for nonlinear multi-agent systems (MASs)under denial-of-service (DoS) attacks over an undirected graph.A novel adaptive memory observer-based anti-disturbance control scheme is presented to improve the observer accuracy by adding a buffer for the system output measurements.Meanwhile,this control scheme can also provide more reasonable control signals when DoS attacks occur.To save network resources,an adaptive memory event-triggered mechanism (AMETM) is also proposed and Zeno behavior is excluded.It is worth mentioning that the AMETM’s updates do not require global information.Then,the observer and controller gains are obtained by using the linear matrix inequality (LMI) technique.Finally,simulation examples show the effectiveness of the proposed control scheme.

    I.INTRODUCTION

    NOWADAYS,multi-agent systems are widely used in various fields,such as unmanned aerial vehicles,power systems,sensor networks,etc.[1]–[4].However,as networks evolve,the problem of network security becomes more prominent [5]–[7].Since multi-agent systems (MASs) work in networked environments,they are vulnerable to cyber attacks,which may cause system performance degradation or even instability [8].Hence,the security problems of MASs have attracted the research interest of many scholars in the control field [8]–[10].In multi-agent networks,agents may be subjected to denial-of-service (DoS) attacks,stealthy deception attacks,replay attacks,false data injection attacks,etc.[11],[12].Among these attacks,the DoS attack scenarios can be divided into two types;the first type affects the cyberphysical network (which is constituted of a physical layer with fixed physical links and a cyber layer with cyber control units)to prevent the prompt update of the control inputs,and the other type destroys the communication network within the cyber layer to affect the communication topology graph,which would hinder the information interaction among agents[13];thus,they are more destructive than other attacks [14].To resist DoS attacks,there are existing results on solving security problems for MASs [15]–[21].Persis and Tesi [15]studied the input-to-state stability (ISS) of networked systems,and clearly described the frequency and duration of DoS attacks under ISS for the first time.Based on this work,in[16]–[19],the secure consensus problem of MASs under DoS attacks was analyzed,and constraint conditions on DoS attack frequency and duration were obtained under guaranteed consensus.It should be noted that most previous works only consider the security of linear MASs.However,in practice,real systems are essentially nonlinear [22]–[24],and the study of nonlinear systems is more challenging.Moreover,although some results,such as those in [20],[21],consider the security consensus of nonlinear MASs,they generally require that all system states are measurable.Nevertheless,full system states are often challenging to obtain in most practical applications[24]–[27].Therefore,the observer-based feedback control is often used.Furthermore,in practice,it is generally believed that external disturbances in the system are the main underlying cause of performance degradation and even instability [28].Due to the growing demand for high-accuracy performance under external disturbances,disturbance compensation control approaches have been widely applied in the control community due to their powerful ability to reject disturbances [29],[30].The composition of the state observer with the disturbance compensation mechanism and the design of an observer-based anti-disturbance controller under DoS attacks make the secure consensus control problems of MASs highly complicated and challenging.Hence,how to design an observer-based anti-disturbance controller for nonlinear MASs under DoS attacks is the main motivation of this article.

    Another problem in multi-agent networks is limited communication bandwidth.In contrast to the traditional timetriggered mechanism,the event-triggered mechanism (ETM)is based on pre-set conditions to determine whether the transmission and control tasks are executed,which can reduce the collection and transmission of redundant data and save network resources [31].Therefore,the consensus problem for MASs based on ETM has been widely studied [21],[32]–[34].In [21],an event-based consensus control scheme is proposed for MASs under cyber attacks by using fixed threshold parameters in the event triggering scheme,which may cause significant consumption of communication resources.A centralized event triggering scheme is presented in [32],in which all agents are triggered at the same time.This method reduces the design difficulty but requires global information,and will result in unnecessary usage of communication and computing resources.A distributed adaptive event triggering strategy is adopted in [33],[34],where the threshold can be adjusted dynamically with the system state,and only the information of it and its neighbors are needed to update.As a result,network resources are saved and it is a good choice for ameliorating the event triggering strategy.Certainly,reducing the communication burden will inevitably lead to the decline of system performance.Therefore,how to dynamically adjust the number of trigger points to improve system performance based on reducing the communication burden is another motivation of this article.

    Considering the above discussion,the main difficulties are summarized as follows:a) how to design a more accurate state observer and a more effective controller under DoS attacks and disturbance to achieve consensus for nonlinear MASs and b) how to design an ETM based on reduced communication resources to improve system performance.To solve these problems,this paper studies the event-triggered security consensus problem for nonlinear MASs under DoS attacks,and the main contributions are as follows:

    1) An Anti-Disturbance Control Scheme Based on a Novel State Observer:Compared with the observer design scheme proposed in [25],[26],by embedding a buffer in the state observer,the state of the previous moment can be stored;thus,the observer accuracy can be improved in the presence of DoS attacks.Unlike [25],[35] where the control signal is set to zero when DoS attacks occur,the proposed observer-based controller can reduce the impact of packet loss caused by DoS attacks due to the existence of the buffer,which can provide a more reasonable control signal and improve the security and reliability of MASs.

    2) A Novel Adaptive Memory Event-Triggered Mechanism(AMETM):In contrast to the adaptive ETM studied in [33],[34],by storing recently received information,we can dynamically adjust the number of trigger points to improve system performance and reduce the occurrence of error triggered events caused by sudden changes due to erroneous measurements.Meanwhile,its threshold can be adjusted with state changes for the purpose of saving network resources,and the design process is considerably simpler than that of the memory ETM in [36],[37].Moreover,a hybrid update mechanism is used to eliminate Zeno behaviors.

    3) The Compensation Mechanism for the Observer and Controller:In contrast to [38] in which a disturbance observer is used based on the state feedback control technique to resist disturbances,the proposed compensation mechanism can effectively reduce the difficulty caused by unmeasurable states and resist the influence of disturbances.In addition,the consensus performance of the system can be improved.

    The remaining sections of this article are organized as follows.Section II introduces the system description and some preliminaries.The main results are given in Section III.Simulation examples in Section IV illustrate the feasibility and effectiveness of the proposed method.Finally,conclusions and future work directions are presented in Section V.

    The following notations are used throughout this article: Rn,RN×N,and N denote then-dimensional space,N×Nreal matrices,and set of positive natural numbers,respectively;INrepresents the identity matrix of dimensionN;and 1Ndenotes theN×1 matrix with all ones.The superscript“T”is used to represent the transpose of a matrix.Let diag{·} be a diagonal matrix and colThe Euclidean norm and union are denoted as ‖·‖ and ∪,respectively.For a symmetric matrixM,M>0(≥0) orM<0 denotes that the matrixMis positive definite (positive semidefinite) or negative definite,respectively,and its maximum and minimum eigenvalues are denoted by λmax(M) and λmin(M),respectively.In addition,to facilitate the calculation,we give the definition of Kronecker product below.IfM=[mij]∈Rα×βandN=[nij]∈Rp×q,then the Kronecker productM?N∈Rαp×βqis the block matrix

    II.PROBLEM STATEMENT AND PRELIMINARIES

    Fig.1 depicts the structure of theith agent under DoS attacks,which mainly consists of sensor,actuator,controller,buffers,zero-order hold (ZOH),AMETM,and observer.When the AMETM picks out state variables that need to be sampled,these data are transmitted to observers and controllers over the network.If DoS attacks occur,the data transmission will be blocked,which will adversely affect the system stability and performance.

    A.Graph Theory

    Fig.1.Framework of the ith agent under DoS attacks.

    The multi-agent system is assumed to have an undirected topology G=(V,E) where V={1,...,N} is the node set and E ?V×V is the edge set.Each agent is represented by a node.In graph G,if nodesiandjcan exchange information with each other,then nodejis a neighbor of nodeiand vice versa.Let Ni={j∈V|(j,i)∈E,j≠i} represent the set of neighbor nodes of nodei,and A=[ai j]∈RN×Nbe the adjacency matrix,whereai j=1 if(j,i)∈E,which means that agentican receive information from agentj;otherwise,aij=0.For an undirected graph,(j,i)∈E implies(i,j)∈E.Furthermore,define the degree matrixD=diag{d1,...,dN}∈RN×Nwiththen,the Laplacian matrix L is denoted by L=D?A.For the fixed undirected graph G,its Laplacian matrix L is a symmetric matrix with eigenvalues satisfying 0=λ1(L)<λ2(L)<···<λN(L).For brevity,λ2(L)and λN(L) will be denoted respectively as λ2and λNin the rest of this paper.

    B.System Model

    Consider a nonlinear MAS ofNagents with the dynamics of theith agent being given by

    wherexi(t)∈Rn,ui(t)∈Rb,yi(t)∈Rq,andwi(t)∈Rdare the state,input,output and external disturbance of theith agent,respectively.f(xi(t),t)=col{f1(xi(t),t),...,fn(xi(t),t)}∈Rnrepresents the nonlinear dynamics of theith agent.Furthermore,A,B,C,D,andFare known matrices with appropriate dimensions,and ΔAis a time-varying uncertain matrix.Suppose that rank(B)=rank(B,D)=b.

    Assumption 1:The pair (A,B) is stabilizable,the pair (A,C)is observable,and matrixCis of full row rank.

    Assumption 2:There exists a positive constant?and a matrixE(t),such that

    E(t)ET(t)E(t)≤IN

    where time-varying matrix satisfies .

    Assumption 3:There exists a matrix Λ such that?x1(t),x2(t)∈Rn,the nonlinear functionf(xi(t),t) satisfies

    Assumption 4:The disturbance signalwi(t) is bounded,i.e.,whereis a known upper bound of the disturbance signal.

    Remark 1:Assumption 1 is common in many existing results [10],[25],[39].Assumption 2 is a constraint condition for the uncertainties that may be caused by mismatched parameters,inaccuracies in the model,etc.[40].The mild Lipschitz condition in Assumption 3 describes a class of nonlinear systems,such as robot systems.In fact,all linear functions and piecewise time-invariant continuous functions also satisfy this assumption [41],[42].

    C.DoS Attack Model and AMETM

    In this paper,as shown in Fig.1,we only consider DoS attacks that affect the updating of the controller,i.e.,the first type of DoS attacks mentioned in the introduction section,which prevents the transmission of sensor data by destroying the communication channel from sensors to observers.It affects the updating of the observer and controller.In addition,under DoS attacks,each agent may be attacked at any time.In practice,however,it is impossible for an attacker to launch a continuous attack because it needs to gather energy for the next attack.Next,to facilitate the analysis,the relevant definitions of DoS attacks are given below.

    Let {hk}k≥0be a time sequence of DoS attacks,where thekth DoS time interval is Hk=[hk,hk+ηk) withhk+1>hk+ηk,in whichhkis the instant when thekth DoS attack starts,and ηk>0indicates the duration of thekth attack.Over the time interval [t0,t),let Φ(t) denote the time period set,where communication is subjected to attack,and let Ψ(t) denote the time period set,where communication is allowed.Then,

    In addition,to describe the influence of DoS attacks on trigger points,we give the following definition.

    Definition 1 (Communication Failure Frequency [32]):For?t>t0,letn(t0,t) denote the total number of trigger points under attack during [t0,t) for each agent.Then,the frequency of attack on trigger points ?(t0,t) over [t0,t) is defined as

    Remark 2:In order to distinguish between a DoS attack and package dropout,the differences are summarized as follows:1) The number of packet losses usually belongs to an integer set,and the number of continuous packet losses is usually a small number,while the DoS attack may last for a long period of time.For example,when the communication failure frequency is less than a certain value,the considered DoS attacks may include the case in which the network is blocked for a certain period of time.However,this case usually does not fall into the category of packet loss owing to the fact that the continuous packet loss is less than a small number.2)From 1),we know that the developed method is effective when the communication failure frequency is smaller than a certain value.Thus,as long as a class of packet losses meet this condition,the developed mathematical framework is also applicable for addressing issues related to this class of packet losses.Note that such a framework for dealing with packet loss has not been used in the existing literature;therefore,it is also a new method in the area of handling packet loss.

    wherep∈N denotes the number of data stored in a buffer.Then,in contrast to the traditional event triggering scheme,a novel AMETM is proposed as follows:

    Remark 3:Compared with the centralized event triggered condition designed by accumulating all agent errors in [32],this paper adopts the event triggered condition (7) that requires neighboring agents only.This can effectively reduce unnecessary communication.Differently from the traditional event triggered condition [21],recently triggered packets are also used by adding a buffer of sizemto (7).Note that the latest released packet is more important,so the choice of ε1should be larger than the other εp’s.By adjusting the value of εp,we can change the number of trigger points.A smaller ε1and a largermwill trigger more points to ensure system performance.When ε1=1 andm=1,the event triggering scheme degenerates to a normal adaptive trigger mechanism,as in [33].In addition,the trigger speed depends onci(t).The smallerci(t) is,the more triggers there are but the better the system performance is.Alternately,the largerci(t) is,the fewer triggers there are but the worse the system performance is.Obviously,the larger the number of triggers,the heavier the communication burden.Moreover,whenci(t)=0,the event triggering scheme becomes a time triggering mechanism.Therefore,the choice ofci(t) should be a tradeoff between system performance and communication burden.

    To avoid Zeno behavior,similarly to [17],[32],the next triggered instant is determined as follows:

    whereσis a given positive constant.

    In this study,undirected communication networks are considered,and the control objective is to design a control strategy based on observation information to ensure that the multi-agent system (1) can achieve consensus in the presence of DoS attacks and disturbance,i.e.,

    Furthermore,to achieve the purpose of this article,the following Lemmas are necessary.

    Lemma 1 [32]:For a positive definite functionV(t),if it satisfies:

    whereαandρare unknown positive constants,andts+1is the next trigger instant with the latest successful trigger instant beingtswhent∈[tk,tk+1) andtk∈Φ(t).Then,the following inequality holds:

    Lemma 2 [24]:For a matrix equality constraint,i.e.,PB=BN,it can be transformed into a standard linear matrix inequality and be rewritten approximately as

    whereνis an arbitrarily small positive constant.

    III.MAIN RESULTS

    In this section,an anti-disturbance control strategy based on a state observer is proposed,which improves the observer accuracy by storing the previous data in a buffer and compensating for the uncertainty and disturbance.The secure consensus of the multi-agent system subject to external disturbances and DoS attacks is analyzed,and the conditions for ensuring consensus are given.In addition,the problem of coupling observer and controller gains with unknown matrix variables is solved by using the linear matrix inequality (LMI)technique.Finally,Zeno behavior is excluded for all agents.

    A.Design of Observer and Controller

    The state observer for theith agent is constructed as below:

    B.Consensus Analysis

    To simplify the notation,denote the state estimation errorThen,it follows from (1) and (15) that

    Then,based on the above definitions and (17),the dynamic of the consensus error δ is given by

    Next,the main results of this article are presented in the following theorem.

    Theorem 1:Suppose that Assumptions 1–4 hold.Under the observer-based anti-disturbance controller (15) and the triggering function (7) with the triggering sequence (9),MAS(1) can achieve consensus and the designed observer (12) can give accurate estimate of the state in the presence of DoS attacks and external disturbances,if there exist symmetric positive definite matricesP1,P2and matricesL,K,W,andW1satisfying

    Proof:The proof of Theorem 1 is given in Appendix.■

    Remark 5:In order to solve LMIs (19)–(23) more easily,we can pre-set the parameters of the same type,such as χ1,χ2,and χ3,to the same value,and then adjust them by trial-anderror method.Besides,for conditions (22) and (23) in Theorem 1,since (19)–(21) have solved forP1,P2,L,andK,we only need to find a suitableρto satisfy these conditions instead of solving forLandKwith (19)–(23).This can simplify the solution process.

    Remark 6:In many existing results (such as [16],[17],[19])on the secure consensus of multi-agent systems under DoS attacks,time is divided into two parts according to whethertis during the interval of DoS attacks,so the duration and frequency of DoS attacks are restricted.However,in this paper,we discuss whether the trigger time is during DoS attacks,so there is no need to limit the frequency and duration of DoS attacks separately.Instead,we just limit the frequency of communication failures,which will also indirectly limit DoS attacks.Moreover,the constraints need to be met for all agents.

    Remark 7:In previous works [16]–[19],[32],[43],algebraic Riccati equation (ARE) and algebraic Riccati inequality (ARI)are used to solve for the control gain.It should be pointed out that these methods are very conservative when the matrix dimension is large or there are many parameters.In this paper,the observer and the controller are simultaneously designed based on the LMI technique without adjusting the parameters and the symmetric positive definite matrices in advance.In addition,the obtained conditions without involving the Kronecker product will be convenient to solve.

    C.Joint Design of Observer and Controller

    The conditions of Theorem 1 ensure that the MAS achieves consensus and observers observe the system state under external disturbances and DoS attacks.However,sinceLandKin (19) are coupled with unknown matrices,and (20),(21)are equality constraints,they cannot be solved directly using the LMI toolbox in MATLAB.To facilitate finding a solution,the following theorem presents a design method for observer and controller gains.

    Theorem 2:For given positive scalarsα,γ,χ1,χ2,χ3,νand?,if there exist symmetric positive definite matricesP1andP2,and matricesQ1,N,WandW1satisfying the following conditions:

    Next,using the Schur complement lemma and Lemma 2,we can obtain (25)–(28).■

    D.Zeno Behavior Analysis

    Zeno behavior is a very important issue in the eventtriggering strategy.Zeno behavior will result in unlimited triggers in finite time,which is physically unrealizable and obviously violates the original intention of the eventtriggering strategy to reduce the number of triggers.Therefore,we should endeavor to avoid it.

    In this paper,a mixed event-triggering method is adopted to determine the triggered time instants.If DoS attacks occur,a fixed timeσis used to determine the next triggered instant,so Zeno behavior will not occur during this period.If DoS attacks do not occur,the trigger functiongi(t) in (7) will determine the next trigger moment.Next,the following theorem shows that a positive lower bound exists between two arbitrary consecutive event instants in communication areas,which proves that Zeno behavior does not occur.

    Theorem 3:Under the event triggering strategy (9),Zeno behavior will not be exhibited in MAS (1) and the minimum time interval between any inter-event instants is strictly positive when DoS attacks do not occur.That is

    Remark 8:It should be pointed out that the proof process of Theorem 3 is enlightened by [43].Note that the interval ?ibetween two events is related toci(t),so it is very important to select an appropriateci(t) to achieve a balance between the performance and communication burden.In addition,the existence of a hybrid update mechanism means that a lower bound always exists when DoS attacks occur;thus,this mechanism prevents continuous triggering.

    IV.SIMULATION ExAMPLES

    In this section,we demonstrate the validity of our method by using the communication topology shown in Fig.2.Consider each agent with the dynamic as (1) and system matrices as follows:

    Fig.2.Communication topology.

    In addition,the nonlinear functionf(xi(t),t) is denoted asf(xi(t),t)=[0,0,0,0.01sin(xi1(t))]T.Then,according to Assumption 3,one has Λ=diag{0.01,...,0.01}.Moreover,from Fig.2,it is easy to obtain the Laplacian matrix L whose minimum non-zero eigenvalue and maximum eigenvalue are 0.6972 and 4.3028,respectively.

    It is worth noting that in the following simulation part,we consider the following two different types of disturbances acting on the first agent to show the validity of the proposed method

    and there are no disturbances to other agents.

    Then,based on Theorems 1 and 2,we choose parameters ?=0.0001, γ=1,χ1=0.01, χ2=4.5, χ3=0.01,ν=0.001,α=0.25,ρ=4,?=0.001 and σ=0.04.By solving LMIs(25)–(28),the observer gainL,the controller gainKand matricesP1,W,andW1are obtained as follows:

    To achieve a trade-off between the system performance and communication burden,the parameters and initial coupling gains in the trigger function (7) and the adaptive law (8) are selected asm=3, ε1=0.8, ε2=0.15, ε3=0.05, βi=0.1,c1(0)=0.27,c2(0)=0.28,c3(0)=0.28,c4(0)=0.1 andc5(0)=0.2.Furthermore,the initial states of each agent are given in Table I.

    TABLEI INITIAL STATES OF EACH AGENT

    It is assumed that the disturbance signaloccurs for the first agent.Define the consensus error of the whole system asThe simulation results are shown in Figs.3–7.Fig.3 displays the state trajectories of the five agents,with gray bars indicating DoS attacks that act on all agents when the attacks occur.Note that our proposed control scheme can achieve better consensus even in the presence of external disturbances and DoS attacks.The adaptive coupling gainsci(t) and triggering instants of each agent are depicted in Figs.4 and 5,respectively.From Fig.5 and through calculation,we can find that the communication failure frequency of each agent satisfies (24) and prevents Zeno behavior.In addition,we find that the dense period of trigger points corresponds to the time when the disturbance signal changes most violently,i.e.,when its first derivative is the largest.To achieve the ideal performance in the presence of disturbances,more packets are needed to adapt to the disturbances.This requires the event-triggered mechanism to generate more trigger points during the disturbance,which is consistent with the theoretical analysis.The observer errors for the first agent with or without disturbance compensationGi(t)in observer (12) underare shown in Figs.6.From this,we can see that the observer errors gradually tend toward 0 withGi(t).The consensus errors of the five agents with and without disturbance compensationzi(t) in control scheme (15)are shown in Fig.7.It can be found from Figs.6 and 7 that better state estimation performance and consensus performance are achieved by introducing disturbance compensationGi(t) andzi(t),which illustrates the validity of the proposed method.

    Fig.3.State trajectories of five agents under DoS attacks and

    Fig.4.Adaptive coupling gains ci(t) under

    Fig.5.Triggering i nstants of each age nt under

    Fig.6.Observer errors for the first agent with (a) and without (b)disturbance compensation Gi(t) in observer (12) under

    Fig.7.The consensus error of five agents with (a) and without (b)disturbance compensation zi(t) in control scheme (15) under

    To further highlight the advantages of our design method,comparisons with existing methods are made in the following.To make the comparisons more obvious,suppose that the disturbance signaloccurs for the first agent,and the initial states are reset asx1(0)=[?0.05 ?0.05 ?0.05?0.05]T,x2(0)=[0.05 0.05 0.05 0.05]T,x3(0)=[0.1 0.1 0.1 0.1]T,x4(0)=[0.15 0.15 0.15 0.15]T,x5(0)=[0.2 0.2 0.2 0.2]T.Fig.8 displays the comparison between two different methods,one of which uses the AMETM (7) and the observer-based controller (15) proposed in this paper.The other uses the method of [44].From Fig.8,we can see that the control strategy of [44] can not achieve consensus due to the existence of external disturbances,and the designed observer can not track the states accurately.Nevertheless,our method introduces a compensation mechanism for the observer and controller,which can achieve better performance.Moreover,Table II shows the number of releases under these two different control schemes.By comparison,we can conclude that better consensus performance and state estimation performance are obtained by using the method of this paper.Furthermore,the communication burden is also reduced.

    V.CONCLUSIONS

    Fig.8.Comparison between proposed observer-based control scheme (15)in Theorem 1 and the method in [44] under

    TABLEII TRIGGER NUMBERS OF EACH AGENT UNDER DIFFERENT CONTROL SCHEMES

    In this paper,the consensus problem of nonlinear MASs subject to DoS attacks is studied.More practically,external disturbances and uncertainties have also been considered in this work.An observer-based controller design method is proposed to ensure the consensus of MAS under DoS attacks and disturbance signals.The controller gain and observer gain are obtained through a joint design method.Moreover,to reduce the communication burden,an AMETM for MAS is designed,whose updates not only depend on the current state but also previously stored information,and Zeno behavior is eliminated.Finally,simulation results show the advantages of our method.Note that in this paper,only undirected network communication is considered in the cyber layer.Thus,how to extend this result to directed network communication is an interesting future research direction.In addition,extending these results to fault-tolerant problems will also be a future research topic.

    APPENDIx

    Proof of Theorem 1:Choose the Lyapunov function candidate as follows

    where ζi(t)=col{exi(t),δi(t)}.Then,according to whetheris under attack instant,we divide the proof process into two parts.First,consider

    Additionally,it is easy to conclude that

    Next,using the analysis methods in Part 1),combining (47)and (48) with (49),and according to LMIs (22) and (23),we can deduce from (46) that

    which means thatV(t) is bounded.Therefore,the secure average consensus of MASs (1) is guaranteed.■

    日韩有码中文字幕| 亚洲成国产人片在线观看| 黄色丝袜av网址大全| 麻豆一二三区av精品| 日韩国内少妇激情av| 韩国精品一区二区三区| 19禁男女啪啪无遮挡网站| av超薄肉色丝袜交足视频| 精品久久蜜臀av无| 免费在线观看视频国产中文字幕亚洲| 国产三级在线视频| 亚洲熟妇中文字幕五十中出| 99在线视频只有这里精品首页| 亚洲精品国产一区二区精华液| 国产精品亚洲美女久久久| 午夜视频精品福利| 99精品欧美一区二区三区四区| 一边摸一边抽搐一进一小说| 中文字幕色久视频| netflix在线观看网站| 成人av一区二区三区在线看| 日本精品一区二区三区蜜桃| 大香蕉久久成人网| 国产在线精品亚洲第一网站| 国产乱人伦免费视频| 国产xxxxx性猛交| 国产一区二区三区在线臀色熟女| 国产极品粉嫩免费观看在线| 99久久99久久久精品蜜桃| 日韩免费av在线播放| 88av欧美| 亚洲人成电影观看| 最新美女视频免费是黄的| 手机成人av网站| 美女免费视频网站| 日日干狠狠操夜夜爽| 国产97色在线日韩免费| 99国产精品99久久久久| 亚洲 国产 在线| 啦啦啦 在线观看视频| 真人一进一出gif抽搐免费| 国产aⅴ精品一区二区三区波| 日韩国内少妇激情av| 精品福利观看| 他把我摸到了高潮在线观看| 免费看十八禁软件| 久久久久久久久免费视频了| 精品电影一区二区在线| 亚洲性夜色夜夜综合| 18禁黄网站禁片午夜丰满| 成人18禁高潮啪啪吃奶动态图| 亚洲专区国产一区二区| www.999成人在线观看| 一区二区三区精品91| 正在播放国产对白刺激| 亚洲精品中文字幕在线视频| 91成年电影在线观看| 久9热在线精品视频| 九色国产91popny在线| 国产精品亚洲一级av第二区| 老汉色av国产亚洲站长工具| av福利片在线| 搡老熟女国产l中国老女人| 精品人妻1区二区| 亚洲性夜色夜夜综合| 老司机午夜十八禁免费视频| 亚洲va日本ⅴa欧美va伊人久久| 精品久久久久久,| 欧美激情高清一区二区三区| 精品日产1卡2卡| 日韩精品中文字幕看吧| 国产私拍福利视频在线观看| 欧美人与性动交α欧美精品济南到| 人人澡人人妻人| 国产99白浆流出| 美女高潮喷水抽搐中文字幕| 无人区码免费观看不卡| 超碰成人久久| 国产精品,欧美在线| 这个男人来自地球电影免费观看| 亚洲精品国产色婷婷电影| 在线观看66精品国产| 国产蜜桃级精品一区二区三区| 国产精品久久视频播放| 午夜久久久久精精品| 一边摸一边做爽爽视频免费| 日韩三级视频一区二区三区| 欧美色欧美亚洲另类二区 | avwww免费| 欧美在线一区亚洲| 久久久久久久久免费视频了| 日本五十路高清| 午夜亚洲福利在线播放| 精品午夜福利视频在线观看一区| 一边摸一边做爽爽视频免费| 在线天堂中文资源库| 国产成人一区二区三区免费视频网站| 精品国产国语对白av| 亚洲自拍偷在线| 亚洲七黄色美女视频| 亚洲av电影不卡..在线观看| 黄色成人免费大全| 国产成人精品无人区| 免费久久久久久久精品成人欧美视频| 不卡一级毛片| 国产三级黄色录像| 一卡2卡三卡四卡精品乱码亚洲| 91九色精品人成在线观看| 日韩成人在线观看一区二区三区| 亚洲av熟女| 国产精品久久电影中文字幕| 午夜视频精品福利| av视频在线观看入口| 熟女少妇亚洲综合色aaa.| 九色亚洲精品在线播放| 美女高潮到喷水免费观看| 国产麻豆69| 一级毛片高清免费大全| 男人舔女人下体高潮全视频| 好男人在线观看高清免费视频 | 亚洲成人免费电影在线观看| 亚洲精品在线观看二区| 天堂√8在线中文| 欧美成人一区二区免费高清观看 | 成人18禁高潮啪啪吃奶动态图| 麻豆成人av在线观看| 久久亚洲精品不卡| 色综合站精品国产| 18美女黄网站色大片免费观看| 十分钟在线观看高清视频www| 欧美乱码精品一区二区三区| 精品人妻在线不人妻| 禁无遮挡网站| 免费一级毛片在线播放高清视频 | 国内久久婷婷六月综合欲色啪| 亚洲国产高清在线一区二区三 | 一夜夜www| 午夜成年电影在线免费观看| www.自偷自拍.com| 中亚洲国语对白在线视频| 久久久久久久久免费视频了| 在线视频色国产色| 最近最新免费中文字幕在线| 黄色a级毛片大全视频| 伊人久久大香线蕉亚洲五| 日韩欧美免费精品| 国产在线精品亚洲第一网站| 美女大奶头视频| 久久精品成人免费网站| 久久久久久久久中文| 色在线成人网| 如日韩欧美国产精品一区二区三区| 日日摸夜夜添夜夜添小说| 最好的美女福利视频网| 日韩大码丰满熟妇| 精品久久久精品久久久| 一区二区日韩欧美中文字幕| bbb黄色大片| 国产成+人综合+亚洲专区| 在线观看一区二区三区| 精品熟女少妇八av免费久了| 又黄又爽又免费观看的视频| 欧美激情极品国产一区二区三区| 成人三级做爰电影| 午夜福利高清视频| 久久精品国产亚洲av高清一级| 中文字幕最新亚洲高清| av中文乱码字幕在线| 人成视频在线观看免费观看| 黄色毛片三级朝国网站| 午夜福利欧美成人| 日本一区二区免费在线视频| 一级黄色大片毛片| 亚洲人成77777在线视频| 精品日产1卡2卡| 亚洲精品在线美女| 搡老妇女老女人老熟妇| 亚洲欧美日韩高清在线视频| avwww免费| 欧美成狂野欧美在线观看| 亚洲av片天天在线观看| 精品乱码久久久久久99久播| 人人妻人人澡人人看| 可以在线观看毛片的网站| 激情在线观看视频在线高清| 999久久久精品免费观看国产| 精品国产美女av久久久久小说| 欧美成人性av电影在线观看| 成年女人毛片免费观看观看9| 国产1区2区3区精品| 亚洲中文字幕日韩| 亚洲国产看品久久| 久久久久久国产a免费观看| 视频在线观看一区二区三区| x7x7x7水蜜桃| 9191精品国产免费久久| 老熟妇仑乱视频hdxx| 亚洲,欧美精品.| 亚洲精品久久国产高清桃花| 中出人妻视频一区二区| 久久精品国产综合久久久| 少妇粗大呻吟视频| 美女高潮喷水抽搐中文字幕| 国产精华一区二区三区| 久久午夜综合久久蜜桃| 亚洲专区国产一区二区| 日韩欧美一区二区三区在线观看| 操出白浆在线播放| 中文亚洲av片在线观看爽| 90打野战视频偷拍视频| 欧美一级a爱片免费观看看 | 自线自在国产av| 免费人成视频x8x8入口观看| 9191精品国产免费久久| АⅤ资源中文在线天堂| 国产av一区在线观看免费| 伊人久久大香线蕉亚洲五| 国产成人精品无人区| 日日夜夜操网爽| 搡老岳熟女国产| 成人亚洲精品一区在线观看| 一卡2卡三卡四卡精品乱码亚洲| 黄网站色视频无遮挡免费观看| 日韩欧美一区二区三区在线观看| 久久久精品国产亚洲av高清涩受| 少妇 在线观看| 天天躁狠狠躁夜夜躁狠狠躁| 黄片播放在线免费| 老司机靠b影院| 久久久久久国产a免费观看| 一级作爱视频免费观看| or卡值多少钱| 亚洲电影在线观看av| 亚洲av成人av| 黄色片一级片一级黄色片| e午夜精品久久久久久久| 亚洲精品一卡2卡三卡4卡5卡| 国产又爽黄色视频| cao死你这个sao货| 在线播放国产精品三级| 久久久久久人人人人人| 极品教师在线免费播放| 最新在线观看一区二区三区| av电影中文网址| 午夜福利18| 国产高清有码在线观看视频 | 黑人巨大精品欧美一区二区mp4| 国产午夜精品久久久久久| 欧美丝袜亚洲另类 | 午夜免费成人在线视频| 亚洲五月天丁香| 正在播放国产对白刺激| 午夜福利高清视频| 国产精品av久久久久免费| 亚洲人成伊人成综合网2020| 黑人操中国人逼视频| 国产av一区二区精品久久| 久久久国产成人免费| 50天的宝宝边吃奶边哭怎么回事| 亚洲中文字幕一区二区三区有码在线看 | 午夜影院日韩av| 国产成人精品在线电影| 色av中文字幕| 少妇 在线观看| 久久精品人人爽人人爽视色| 99久久国产精品久久久| 久久青草综合色| 国产野战对白在线观看| 18美女黄网站色大片免费观看| 亚洲中文日韩欧美视频| 午夜a级毛片| 黄色片一级片一级黄色片| 亚洲午夜精品一区,二区,三区| 国产黄a三级三级三级人| 欧美一级毛片孕妇| 精品少妇一区二区三区视频日本电影| 中文字幕人妻丝袜一区二区| 波多野结衣一区麻豆| 丁香六月欧美| 欧美在线黄色| 禁无遮挡网站| 级片在线观看| 成人特级黄色片久久久久久久| 午夜福利一区二区在线看| 视频在线观看一区二区三区| 最近最新中文字幕大全电影3 | 久久精品国产综合久久久| 欧美av亚洲av综合av国产av| 免费女性裸体啪啪无遮挡网站| 国产亚洲欧美98| 看片在线看免费视频| 人人妻,人人澡人人爽秒播| 国产亚洲精品久久久久5区| www国产在线视频色| 色老头精品视频在线观看| 婷婷六月久久综合丁香| 免费看十八禁软件| 熟妇人妻久久中文字幕3abv| 亚洲狠狠婷婷综合久久图片| 窝窝影院91人妻| 亚洲精品久久成人aⅴ小说| 亚洲一区高清亚洲精品| 乱人伦中国视频| 欧美色视频一区免费| 黄色成人免费大全| 久久天躁狠狠躁夜夜2o2o| 免费在线观看视频国产中文字幕亚洲| 欧美日韩亚洲综合一区二区三区_| 脱女人内裤的视频| 十八禁网站免费在线| 日本三级黄在线观看| 神马国产精品三级电影在线观看 | 母亲3免费完整高清在线观看| 国产伦一二天堂av在线观看| 成人亚洲精品一区在线观看| 91老司机精品| 欧美黑人欧美精品刺激| 久久伊人香网站| 国产成人系列免费观看| 99久久精品国产亚洲精品| 午夜精品国产一区二区电影| 亚洲一卡2卡3卡4卡5卡精品中文| 少妇粗大呻吟视频| 国产色视频综合| 亚洲五月色婷婷综合| 亚洲一码二码三码区别大吗| 国产精品国产高清国产av| 久久人妻福利社区极品人妻图片| 午夜福利影视在线免费观看| 日韩欧美免费精品| 欧美绝顶高潮抽搐喷水| 亚洲狠狠婷婷综合久久图片| 欧美乱码精品一区二区三区| 日韩欧美免费精品| 亚洲va日本ⅴa欧美va伊人久久| 亚洲性夜色夜夜综合| 波多野结衣巨乳人妻| 天堂√8在线中文| 两个人看的免费小视频| 日韩高清综合在线| 天天一区二区日本电影三级 | 欧美精品亚洲一区二区| 久久精品91无色码中文字幕| 少妇 在线观看| 电影成人av| 日韩精品中文字幕看吧| av网站免费在线观看视频| 岛国在线观看网站| 国产精品 国内视频| 免费无遮挡裸体视频| 18禁美女被吸乳视频| 91九色精品人成在线观看| 精品久久久久久久毛片微露脸| 91精品国产国语对白视频| 亚洲精品美女久久av网站| 欧美一级a爱片免费观看看 | 1024香蕉在线观看| 久久人人爽av亚洲精品天堂| 亚洲精品美女久久久久99蜜臀| 久久久久久久久免费视频了| 天堂√8在线中文| 色尼玛亚洲综合影院| 欧美黑人精品巨大| 级片在线观看| 欧美黑人欧美精品刺激| 黄片播放在线免费| 变态另类丝袜制服| 啦啦啦韩国在线观看视频| 一二三四社区在线视频社区8| 亚洲在线自拍视频| 亚洲精品美女久久av网站| 啦啦啦观看免费观看视频高清 | 国产熟女xx| 国产一区二区三区在线臀色熟女| 亚洲一区二区三区不卡视频| 久久精品国产亚洲av高清一级| 国产精品日韩av在线免费观看 | 俄罗斯特黄特色一大片| av电影中文网址| 免费看美女性在线毛片视频| 色婷婷久久久亚洲欧美| 欧美在线一区亚洲| 国产精品1区2区在线观看.| 久久久久久久精品吃奶| 麻豆成人av在线观看| 一边摸一边抽搐一进一小说| 亚洲中文字幕日韩| 欧美人与性动交α欧美精品济南到| 黄色 视频免费看| 男人操女人黄网站| 黑人巨大精品欧美一区二区蜜桃| 免费在线观看亚洲国产| 在线视频色国产色| 午夜成年电影在线免费观看| 亚洲,欧美精品.| 国产成人av激情在线播放| 久久精品国产清高在天天线| 淫妇啪啪啪对白视频| 99国产精品免费福利视频| 亚洲在线自拍视频| 色综合站精品国产| 一本大道久久a久久精品| 制服丝袜大香蕉在线| 两性午夜刺激爽爽歪歪视频在线观看 | 国产精品影院久久| 亚洲第一欧美日韩一区二区三区| avwww免费| 国产片内射在线| 亚洲成人国产一区在线观看| 啦啦啦韩国在线观看视频| 琪琪午夜伦伦电影理论片6080| 男男h啪啪无遮挡| 极品教师在线免费播放| 欧美激情久久久久久爽电影 | 一区二区三区高清视频在线| 无人区码免费观看不卡| 久久人人精品亚洲av| 久久精品国产99精品国产亚洲性色 | 免费女性裸体啪啪无遮挡网站| 757午夜福利合集在线观看| 一个人观看的视频www高清免费观看 | 欧美黑人精品巨大| 亚洲情色 制服丝袜| 国产精品一区二区三区四区久久 | 久久精品国产亚洲av高清一级| 国产亚洲精品一区二区www| 黄频高清免费视频| 少妇 在线观看| 两性夫妻黄色片| 精品电影一区二区在线| 欧美中文日本在线观看视频| 国产精品久久久人人做人人爽| 国产日韩一区二区三区精品不卡| 亚洲精品粉嫩美女一区| 精品高清国产在线一区| 日日干狠狠操夜夜爽| 国产精品99久久99久久久不卡| 嫁个100分男人电影在线观看| 亚洲中文字幕一区二区三区有码在线看 | 日韩精品中文字幕看吧| 久久久久九九精品影院| 午夜精品国产一区二区电影| 欧美黄色淫秽网站| 国产野战对白在线观看| 亚洲成国产人片在线观看| 人人妻,人人澡人人爽秒播| 国产欧美日韩综合在线一区二区| 最好的美女福利视频网| 熟女少妇亚洲综合色aaa.| 日韩欧美一区二区三区在线观看| 精品国内亚洲2022精品成人| 精品国产乱码久久久久久男人| 欧美 亚洲 国产 日韩一| 亚洲精华国产精华精| 国产一级毛片七仙女欲春2 | 免费观看精品视频网站| 国产精品精品国产色婷婷| 在线十欧美十亚洲十日本专区| 啪啪无遮挡十八禁网站| 欧美亚洲日本最大视频资源| 欧美色欧美亚洲另类二区 | 一级毛片女人18水好多| 欧美日韩亚洲综合一区二区三区_| 一边摸一边抽搐一进一出视频| 一本久久中文字幕| 亚洲av成人不卡在线观看播放网| 最新在线观看一区二区三区| 丰满的人妻完整版| 久久 成人 亚洲| 国产伦人伦偷精品视频| 亚洲人成网站在线播放欧美日韩| 久99久视频精品免费| 亚洲自拍偷在线| svipshipincom国产片| 99精品欧美一区二区三区四区| 真人做人爱边吃奶动态| 久久久久久久精品吃奶| 色哟哟哟哟哟哟| 桃色一区二区三区在线观看| 少妇被粗大的猛进出69影院| 久久国产亚洲av麻豆专区| 性色av乱码一区二区三区2| 国产精品1区2区在线观看.| 欧美色视频一区免费| 男女午夜视频在线观看| 伦理电影免费视频| 90打野战视频偷拍视频| 99riav亚洲国产免费| 亚洲全国av大片| 在线av久久热| 久久天堂一区二区三区四区| 亚洲中文日韩欧美视频| 电影成人av| 成人av一区二区三区在线看| 中出人妻视频一区二区| 国产精品二区激情视频| 91九色精品人成在线观看| av超薄肉色丝袜交足视频| 香蕉久久夜色| 久久久久国内视频| 好男人电影高清在线观看| 午夜福利成人在线免费观看| 久久精品影院6| 老司机深夜福利视频在线观看| 18禁裸乳无遮挡免费网站照片 | 一a级毛片在线观看| 黄色a级毛片大全视频| 国产精品av久久久久免费| 久久国产精品影院| 久久这里只有精品19| 自线自在国产av| 婷婷丁香在线五月| 久久精品影院6| 超碰成人久久| 真人一进一出gif抽搐免费| 久久国产乱子伦精品免费另类| 亚洲天堂国产精品一区在线| 国产一区二区在线av高清观看| 欧美日韩瑟瑟在线播放| 久久香蕉激情| av在线播放免费不卡| 国内精品久久久久精免费| 欧美日韩亚洲综合一区二区三区_| 真人做人爱边吃奶动态| 久久久国产精品麻豆| 亚洲午夜理论影院| 免费高清在线观看日韩| 精品久久久久久久人妻蜜臀av | 好男人在线观看高清免费视频 | 亚洲国产精品999在线| 狂野欧美激情性xxxx| 女人高潮潮喷娇喘18禁视频| 日本撒尿小便嘘嘘汇集6| 国产精品久久久久久亚洲av鲁大| 亚洲人成伊人成综合网2020| 日韩欧美国产一区二区入口| 日韩一卡2卡3卡4卡2021年| 人人妻,人人澡人人爽秒播| 桃色一区二区三区在线观看| 美女大奶头视频| 精品久久久久久成人av| 久久婷婷人人爽人人干人人爱 | 日韩欧美一区二区三区在线观看| 中文字幕最新亚洲高清| 国产精品,欧美在线| 高潮久久久久久久久久久不卡| 亚洲熟妇熟女久久| 国产精品野战在线观看| 琪琪午夜伦伦电影理论片6080| 亚洲av成人一区二区三| 久久中文字幕一级| 色婷婷久久久亚洲欧美| 电影成人av| 在线观看www视频免费| 欧美乱妇无乱码| 每晚都被弄得嗷嗷叫到高潮| 国产欧美日韩综合在线一区二区| 婷婷精品国产亚洲av在线| 狂野欧美激情性xxxx| 在线观看免费视频网站a站| 高潮久久久久久久久久久不卡| 国产高清有码在线观看视频 | 国产1区2区3区精品| 久久精品国产亚洲av高清一级| 免费在线观看影片大全网站| 精品日产1卡2卡| 国产精品九九99| 久热爱精品视频在线9| 免费不卡黄色视频| 美女高潮喷水抽搐中文字幕| 在线十欧美十亚洲十日本专区| 99精品久久久久人妻精品| 久久狼人影院| 丝袜美足系列| 黄片大片在线免费观看| 日韩成人在线观看一区二区三区| 精品国产乱子伦一区二区三区| 久久精品国产亚洲av高清一级| 午夜福利高清视频| 级片在线观看| 日本免费a在线| 亚洲成人久久性| 亚洲国产精品久久男人天堂| 一个人免费在线观看的高清视频| 亚洲国产高清在线一区二区三 | 精品一区二区三区av网在线观看| 亚洲av熟女| 此物有八面人人有两片| 欧美久久黑人一区二区| 一夜夜www| 成人av一区二区三区在线看| 国产精品永久免费网站| 久久人妻福利社区极品人妻图片| 麻豆久久精品国产亚洲av| 欧美日韩亚洲国产一区二区在线观看| 淫秽高清视频在线观看| 成人特级黄色片久久久久久久| 大码成人一级视频| 亚洲av日韩精品久久久久久密| 在线观看免费视频日本深夜| www国产在线视频色| 久久久久久国产a免费观看| 欧美成人午夜精品| 婷婷丁香在线五月| 一个人免费在线观看的高清视频| 精品一区二区三区视频在线观看免费| 精品欧美一区二区三区在线| 久久精品人人爽人人爽视色| 精品国产亚洲在线| 午夜久久久在线观看| 大陆偷拍与自拍| 每晚都被弄得嗷嗷叫到高潮| 国产片内射在线| 日日干狠狠操夜夜爽| 神马国产精品三级电影在线观看 |