Loading [MathJax]/jax/output/SVG/jax.js
Research article Special Issues

Optimal strategy analysis for adversarial differential games


  • Optimal decision-making and winning-regions analysis in adversarial differential games are challenging theoretical problems because of the complex interactions between players. To solve these problems, we present an organized review for pursuit-evasion games, reach-avoid games and capture-the-flag games; we also outline recent developments in three types of games. First, we summarize recent results for pursuit-evasion games and classify them according to different numbers of players. As a special kind of pursuit-evasion games, target-attacker-defender games with an active target are analyzed from the perspectives of different speed ratios for players. Second, the related works for reach-avoid games and capture-the-flag games are compared in terms of analytical methods and geometric methods, respectively. These methods have different effects on the barriers and optimal strategy analysis between players. Future directions for the pursuit-evasion games, reach-avoid games, capture-the-flag games and their applications are discussed in the end.

    Citation: Jiali Wang, Xin Jin, Yang Tang. Optimal strategy analysis for adversarial differential games[J]. Electronic Research Archive, 2022, 30(10): 3692-3710. doi: 10.3934/era.2022189

    Related Papers:

    [1] Gonca Durmaz Güngör, Ishak Altun . Fixed point results for almost (ζθρ)-contractions on quasi metric spaces and an application. AIMS Mathematics, 2024, 9(1): 763-774. doi: 10.3934/math.2024039
    [2] Hieu Doan . A new type of Kannan's fixed point theorem in strong b- metric spaces. AIMS Mathematics, 2021, 6(7): 7895-7908. doi: 10.3934/math.2021458
    [3] Pragati Gautam, Vishnu Narayan Mishra, Rifaqat Ali, Swapnil Verma . Interpolative Chatterjea and cyclic Chatterjea contraction on quasi-partial b-metric space. AIMS Mathematics, 2021, 6(2): 1727-1742. doi: 10.3934/math.2021103
    [4] Shaoyuan Xu, Yan Han, Suzana Aleksić, Stojan Radenović . Fixed point results for nonlinear contractions of Perov type in abstract metric spaces with applications. AIMS Mathematics, 2022, 7(8): 14895-14921. doi: 10.3934/math.2022817
    [5] Abdullah Shoaib, Poom Kumam, Shaif Saleh Alshoraify, Muhammad Arshad . Fixed point results in double controlled quasi metric type spaces. AIMS Mathematics, 2021, 6(2): 1851-1864. doi: 10.3934/math.2021112
    [6] Mi Zhou, Naeem Saleem, Xiao-lan Liu, Nihal Özgür . On two new contractions and discontinuity on fixed points. AIMS Mathematics, 2022, 7(2): 1628-1663. doi: 10.3934/math.2022095
    [7] Amjad Ali, Muhammad Arshad, Awais Asif, Ekrem Savas, Choonkil Park, Dong Yun Shin . On multivalued maps for φ-contractions involving orbits with application. AIMS Mathematics, 2021, 6(7): 7532-7554. doi: 10.3934/math.2021440
    [8] Tahair Rasham, Abdullah Shoaib, Shaif Alshoraify, Choonkil Park, Jung Rye Lee . Study of multivalued fixed point problems for generalized contractions in double controlled dislocated quasi metric type spaces. AIMS Mathematics, 2022, 7(1): 1058-1073. doi: 10.3934/math.2022063
    [9] Xun Ge, Songlin Yang . Some fixed point results on generalized metric spaces. AIMS Mathematics, 2021, 6(2): 1769-1780. doi: 10.3934/math.2021106
    [10] Qing Yang, Chuanzhi Bai . Fixed point theorem for orthogonal contraction of Hardy-Rogers-type mapping on O-complete metric spaces. AIMS Mathematics, 2020, 5(6): 5734-5742. doi: 10.3934/math.2020368
  • Optimal decision-making and winning-regions analysis in adversarial differential games are challenging theoretical problems because of the complex interactions between players. To solve these problems, we present an organized review for pursuit-evasion games, reach-avoid games and capture-the-flag games; we also outline recent developments in three types of games. First, we summarize recent results for pursuit-evasion games and classify them according to different numbers of players. As a special kind of pursuit-evasion games, target-attacker-defender games with an active target are analyzed from the perspectives of different speed ratios for players. Second, the related works for reach-avoid games and capture-the-flag games are compared in terms of analytical methods and geometric methods, respectively. These methods have different effects on the barriers and optimal strategy analysis between players. Future directions for the pursuit-evasion games, reach-avoid games, capture-the-flag games and their applications are discussed in the end.



    In various fields of science, nonlinear evolution equations practically model many natural, biological and engineering processes. For example, PDEs are very popular and are used in physics to study traveling wave solutions. They have played a crucial role in illustrating the nature of nonlinear problems. PDEs are collected to control the diffusion of chemical reactions. In biology, they play a fundamental role in describing various phenomena, such as population growth. In addition, natural phenomena such as fluid dynamics, plasma physics, optics and optical fibers, electromagnetism, quantum mechanics, ocean waves, and others are studied using PDEs. The qualitative and quantitative characteristics of these phenomena can be identified from the behaviors and shapes of their solutions. Therefore, finding the analytic solutions to such phenomena is a fundamental topic in mathematics. Scientists have developed sparse fundamental approaches to find analytic solutions for nonlinear PDEs. Among these techniques, I present integration methods from [1] and [2], the modified F-expansion and Generalized Algebraic methods, respectively. Bekir and Unsal [3] proposed the first integral method to find the analytical solution of nonlinear equations. Kumar, Seadawy and Joardar [4] used the improved Kudryashov technique to extract fractional differential equations. Adomian [5] proposed the Adomian decomposition technique to find the solution of frontier problems of physics. [6] uses an exploratory method to find explicit solutions of non-linear PDEs. Many different methods of solving equations arising from natural phenomena and some of their analytic solutions, such as dark and light solitons, non-local rogue waves, an occasional wave and mixed soliton solutions, are exhibited and can be found in [7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40].

    The Novikov-Veselov (NV) system [41,42] is given by

    Ψt+αΓxxy+βΦxyy+γΓyΦ+γ(Ψ22)y+λΓΦx+λ(Ψ22)x=0,Γy=Ψx,Ψy=Φx, (1.1)

    where α,β,γ and λ are constants. Barman [42] declared that Eq (1.1) is involved to represent tidal and tsunami waves, electro-magnetic waves in communication cables and magneto-sound and ion waves in plasma. In [42], the generalized Kudryashov method was utilized to have traveling wave solutions for Eq (1.1). According to Croke [43], the Novikov-Veselov system is generalized from the KdV equations which were examined by Novikov and Veselov. Croke [43] used several approaches, (the extended mapping, the Hirota and the extended tanh-function approaches) in the proposed system to achieve numerous soliton solutions, such as breathers, and constrained analytic solutions. Boiti, Leon, and Manna [44] applied the inverse dispersion technique to solve (1.1) for a particular type of initial value. Numerical solutions and a study of the stability of solutions for the proposed equation were presented by Kazeykina and Klein [45]. The Nizhnik-Novikov-Veselov system for two dimensions was also solved using the Kansa technique to find the numerical results [46]. To the best of my knowledge, the stability and error analysis of the numerical scheme presented here has not yet been discussed for system (1.1). Therefore, this has motivated me enormously to do so. The primary purpose is to obtain multiple analytic solutions to system (1.1) by using both the modified F-expansion and Generalized Algebraic methods. In connection with the numerical solution, the method of finite differences is utilized to achieve numerical results for the studied system. I graphically and analytically compare the traveling wave solutions and numerical results. Undoubtedly, the presented results strongly contribute to describing physical problems in practice.

    The outline of this article is provided in this paragraph. Section 2 summarizes the employed methods. All the analytic solutions are extracted in Section 3. The shooting and BVP results for the proposed system are presented in Section 4. In addition, I examine the numerical solution of the system (1.1) in Section 5. Sections 6 and 7 study the stability and error analysis of the numerical scheme, respectively. Section 8 presents the results and discussion.

    Considering the development equation with physical fields Ψ(x,y,t), Φ(x,y,t) and Γ(x,y,t) in the variables x, y and t is given in the following form:

    Q1(Ψ,Ψt,Ψx,Ψy,Γ,Γy,Γxxy,Φ,Φxyy,Φx,)=0. (2.1)

    Step 1. We extract the traveling-wave solutions of System (1.1) that are formed as follows:

    Φ(x,y,t)=ϕ(η),η=x+ywt,Ψ(x,y,t)=ψ(η),Γ(x,y,t)=Θ(η), (2.2)

    where w is the wave speed.

    Step 2. The nonlinear evolution (2.1) is reduced to the following ODE:

    Q2(ψ,ψη,Θ,Θη,Θηηη,ϕ,ϕηηη,ϕη,)=0, (2.3)

    where Q2 is a polynomial in ψ(η),ϕ(η), Θ(η) and their total derivatives.

    According to the modified F-expansion method, the solutions of (2.3) are given by the form

    ψ(η)=ρ0+Nk=1(ρkF(η)k+qkF(η)k), (2.4)

    and F(η) is a solution of the following differential equation:

    F(η)=μ0+μ1F(η)+μ2F(η)2, (2.5)

    where μ0, μ1, μ2, are given in Table 1 [1], and ρk, qk are to be determined later.

    Table 1.  The relations among μ0, μ1, μ2 and the function F(η).
    μ0 μ1 μ2 F(η)
    μ0=0, μ1=1, μ2=1, F(η)=12+12tanh(12η).
    μ0=0, μ1=1, μ2=1, F(η)=1212coth(12η).
    μ0=12, μ1=0, μ2=12, F(η)=coth(η)±csch(η), tanh(η)±sech(η).
    μ0=1, μ1=0, μ2=1, F(η)=tanh(η), coth(η).
    μ0=12, μ1=0, μ2=12, F(η)=sec(η)+tan(η), csc(η)cot(η).
    μ0=12, μ1=0, μ2=12, F(η)=sec(η)tan(η), csc(η)+cot(η).
    μ0=±1, μ1=0, μ2=±1, F(η)=tan(η), cot(η).

     | Show Table
    DownLoad: CSV

    According to the generalized direct algebraic method, the solutions of (2.3) are given by

    ψ(η)=ν0+Nk=1(νkG(η)k+rkG(η)k), (2.6)

    and G(η) is a solution of the following differential equation:

    G(η)=ε4k=0δkGk(η), (2.7)

    where νk, and rk are to be determined, and N is an integer number obtained by the highest degree of the nonlinear terms and the highest order of the derivatives. ε is user-specified, usually taken with ε=±1, and δk, k=0,1,2,3,4, are given in Table 2 [2].

    Table 2.  The relations among δk, k=0,1,2,3,4, and the function G(η).
    δ0 δ1 δ2 δ3 δ4 G(η)
    δ0=0, δ1=0, δ2>0, δ3=0, δ4<0, G(η)=ε δ2δ4sech(δ2η).
    δ0=δ224c4, δ1=0, δ2<0, δ3=0, δ4>0, G(η)=εδ22δ4tanh(δ22η).
    δ0=0, δ1=0, δ2<0, δ3=0, δ4>0, G(η)=ε δ2δ4 sec (δ2η).
    δ0=δ224δ4, δ1=0, δ2>0, δ3=0, δ4>0, G(η)=ε δ22δ4tan(δ22η).
    δ0=0, δ1=0, δ2=0, δ3=0, δ4>0, G(η)=εδ4η.
    δ0=0, δ1=0, δ2>0, δ30, δ4=0, G(η)=δ2δ3.sech2(δ22η).

     | Show Table
    DownLoad: CSV

    Consider the Novikov-Veselov (NV) system

    Ψt+αΓxxy+βΦxyy+γΓyΦ+γ(Ψ22)y+λΓΦx+λ(Ψ22)x=0,Γy=Ψx,Ψy=Φx, (3.1)

    a system of PDEs in the unknown functions Ψ=Ψ(x,y,t),Φ=Φ(x,y,t), Γ=Γ(x,y,t) and their partial derivatives. I plug the transformations

    Φ(x,y,t)=ϕ(η),η=x+ywt,Ψ(x,y,t)=ψ(η),Γ(x,y,t)=Θ(η), (3.2)

    into Eq (3.1) to reduce it to a system of ODEs given by

    wψη+αΘηηη+βϕηηη+γΘηϕ+γ(ψ22)η+λΘϕη+λ(ψ22)η=0,Θη=ψη,ψη=ϕη. (3.3)

    Integrating Θη=ψη and ϕη=ψη yields

    Θ=ψ,and ϕ=ψ. (3.4)

    Substituting (3.4) into the first equation of (3.3) and integrating once with respect to η yields

    wψ+(α+β)ψηη+(γ+λ)ψ2=0. (3.5)

    Balancing ψηη with ψ2 in (3.5) calculates the value of N=2.

    According to the modified F-expansion method with N=2, the solutions of (3.5) are

    ψ(η)=ρ0+ρ1F(η)+q1F(η)+ρ2F(η)2+q2F(η)2, (3.6)

    and F(η) is a solution of the following differential equation:

    F(η)=μ0+μ1F(η)+μ2F(η)2, (3.7)

    where μ0, μ1, μ2 are given in Table 1. To explore the analytic solutions to (3.5), I ought to follow the subsequent steps.

    Step 1. Placing (3.6) along with (3.7) into Eq (3.5) and gathering the coefficients of F(η)j, j = 4,3,2,1,0,1,2,3,4, to zeros gives a system of equations for ρ0,ρk,qk, k=1,2.

    Step 2. Solve the resulting system using mathematical software: for example, Mathematica or Maple.

    Step 3. Choosing the values of μ0,μ1 and μ2 and the function F(η) from Table 1 and substituting them along with ρ0,ρk,qk, k=1,2, in (3.6) produces a set of trigonometric function and rational solutions to (3.5).

    Applying the above steps, I determine the values of ρ0,ρ1,ρ2,q1,q2 and w as follows:

    (1). When μ0=0, μ1=1 and μ2=1, I have two cases.

    Case 1.

    ρ0=0,ρ1=6(α+β)γ+λ,ρ2=6(α+β)γ+λ,q1=q2=0,andw=α+β. (3.8)

    The solution is given by

    Ψ1(x,y,t)=3(α+β)2(γ+λ)sech2(12(x+y(α+β)t+x0)). (3.9)

    Case 2.

    ρ0=α+βγ+λ,ρ1=6(α+β)γ+λ,ρ2=6(α+β)γ+λ,q1=q2=0,andw=(α+β). (3.10)

    The solution is given by

    Ψ2(x,y,t)=(α+β)2(γ+λ)(3tanh2(12(x+y+t(α+β))+x0)1). (3.11)

    Figure 1 presents the time evolution of the analytic solutions (a) Ψ1 and (b) Ψ2 with t=0,10,20. The parameter values are x0=20, α=0.50,β=0.6, γ=1.5, and λ=1. Figure 2 presents the wave behavior by changing a certain parameter value and fixing the values of the others. Figure 2(a,b) presents the behavior of Ψ1 when I change the values of (a) α or β and (b) γ or λ. In Figure 2(a) it can also be seen that the value of α or β affects the direction and amplitude of the wave, such that a negative value always makes the wave negative, its amplitude decreases when α,β0, and its amplitude increases when α,β. In Figure 2(b) the value of γ or λ affects the direction and amplitude of the wave, such that a negative value always makes the wave negative, and its amplitude decreases when the value of γ or λ increases. In Figure 2, (c) and (d) present the wave behavior of Ψ2.

    Figure 1.  Time evolution of the analytic solutions (a) Ψ1 and (b) Ψ2 with t=0,10,20. The parameter are given by x0=20, α=0.50,β=0.6, γ=1.5, and λ=1.
    Figure 2.  This figure present the wave behavior when changing a certain parameter value and fixing the values of the others. (a) presents the behavior when I change the value of α or β, and (b) presents when I change the value of γ or λ for the solution Ψ1. (c) and (d) are for Ψ2.

    (2). When μ0=0, μ1=1, and μ2=1, I have two cases.

    Case 3. The solution is given by

    Ψ3(x,y,t)=3(α+β)2(γ+λ)csch2(12(x+y(α+β)t)). (3.12)

    Case 4. The solution is given by

    Ψ4(x,y,t)=(α+β)2(γ+λ)(3coth2(12(x+y+t(α+β)))1). (3.13)

    (3). When μ0=1, μ1=0, and μ2=1, I have

    Case 5. The solution is given by

    Ψ5(x,y,t)=8(α+β)γ+λ(cosh(4(16t(α+β)+x+y))+2)csch2(2(16t(α+β)+x+y)). (3.14)

    (4). When μ0=±1, μ1=0, and μ2=±1, I have one case.

    Case 6. The solution is given by

    Ψ6(x,y,t)=24(α+β)γ+λcsc2(2(16t(α+β)+x+y)). (3.15)

    According to the generalized algebraic method, the solutions of (3.5) are given by the form

    ψ(η)=ν0+ν1G(η)+ν2G(η)2+r1G(η)+r2G(η)2, (3.16)

    where νk, rk are to be determined later. G(η) is a solution of the following differential equation:

    G(η)=ε4k=0δkGk(η), (3.17)

    where δk, k=0,1,3,4, are given in Table 2. In all the cases mentioned above and the subsequent solutions, I used the mathematical software Mathematica to find the values of the constants ν0,ν1,ν2,r1,r2 and w. Thus, the analytic solutions to (3.5) using the generalized algebraic method will be presented here with different values of the constants δk, k=0,1,3,4.

    (5). When δ0=δ224δ4, δ1=δ3=0, δ2<0, δ4>0, and ε=±1,

    ν0=±4δ22ε4(α+β)2(γ+λ)23δ2ε4(α+β)2(γ+λ)22δ2ε2(α+β)(γ+λ)(γ+λ)2,ν2=6δ4ε2(α+β)(γ+λ),ν1=r1=r2=0,ε=±1.w=±2(4δ223δ2)ε4(α+β)2(γ+λ)2(γ+λ). (3.18)

    Case 7. The solution is given by

    Ψ7(x,y,t)=1(γ+λ)2(3δ2ε4(α+β)(γ+λ)tanh2(δ2(2tδ2(4δ23)ε4(α+β)2(γ+λ)2γ+λ+x+y)2)+2δ2ε2(α+β)(γ+λ)+δ2(4δ23)ε4(α+β)2(γ+λ)2). (3.19)

    Figure 3 shows the time evolution of the analytic solutions. Figure 3(a) shows Ψ7 with t = 0:2:6. The parameter values are δ2=1, δ4=1, ϵ=1, α=0.50, β=0.6, γ=1.5, λ=1.8 and x0=10. Figure 3(b) shows Ψ8 with t=0:2:8. The parameter values are δ2=1, δ4=1, ϵ=1, α=0.50, β=0.6, γ=1.5, λ=1.8 and x0=10. Figures 46 present the 3D time evolution of the analytic solutions Ψ2 (left) and the numerical solutions (right) obtained employing the scheme 5.1 with t=5,15,25, Mx=1600, Ny=100, x=060 and y=01.

    Figure 3.  Time evolution of the analytic solutions. (a) Ψ7 with t=0:2:6. The parameter values are δ2=1, δ4=1, ϵ=1, α=0.50, β=0.6, γ=1.5, λ=1.8 and x0=10. (b) Ψ8 with t=0:2:8. The parameter values are δ2=1, δ4=1, ϵ=1, α=0.50, β=0.6, γ=1.5, λ=1.8 and x0=10.
    Figure 4.  3D graphs presenting the analytic (left) and the numerical (right) solutions of Ψ2(x,y,t) at t=5. The figures present the strength of agreement between analytic and numerical solutions.
    Figure 5.  3D graphs presenting the analytic (left) and the numerical (right) solutions of Ψ2(x,y,t) at t=15. The figures present the strength of agreement between analytic and numerical solutions.
    Figure 6.  3D graphs presenting the analytic (left) and the numerical (right) solutions of Ψ2(x,y,t) at t=25. The figures present the strength of agreement between analytic and numerical solutions.

    (6). When δ0=0, δ1=δ3=0, δ2>0, δ4<0, and ε=±1,

    ν2=6δ4ε2(α+β)γ+λ,ν1=ν0=r1=r2=0,w=4δ2ε2(α+β). (3.20)

    Case 8. The solution is given by

    Ψ8(x,y,t)=6δ2ϵ4(α+β)sech2(δ2(4δ2ϵ2t(α+β)+x+y))γ+λ (3.21)

    (7). When δ0=0, δ1=δ4=0, δ30, δ2>0, ε=±1

    Set 1.ν1=3δ3ε2(α+β)2(γ+λ),ν0=ν2=r1=r2=0,w=δ2ε2(α+β).Set 2.ν0=δ2ε2(α+β)(γ+λ),ν1=3δ3ε2(α+β)2(γ+λ),ν2=r1=r2=0,w=δ2ε2(α+β). (3.22)

    Case 9.The solution is given by

    Ψ9(x,y,t)=3δ2(α+β)sech2(12δ2(δ2t((α+β))+x+y))2(γ+λ). (3.23)

    Case 10. The solution is given by

    Ψ10(x,y,t)=3δ2(α+β)sech2(12δ2(δ2t(α+β)+x+y))2(γ+λ)δ2(α+β)γ+λ. (3.24)

    In this section I extract numerical solutions to the resulting ODE system (3.5) using several numerical methods. The purpose of this procedure is to guarantee the accuracy of the analytic solutions. I picked one of the analytic solutions above to be a sample, (3.11). The nonlinear shooting and BVP methods, at t=0, are used by taking the value of ψ at the right endpoint of the domain η=0 with guessing the initial value for ψη. The new target is to obtain the second boundary condition of ψ at the left endpoint of a particular domain. Once the numerical result is obtained, I compare it with the analytic solution (3.11). The MATLAB solver ODE15s and FSOLVE [47] are used to get the numerical solution. The resulting ODE (3.5) is discretized as

    f(ψ)=0,f(ψi)=wψi+α+βΔη(ψi+12ψi+ψi1)+γ+λ2Δη(ψ2i+1ψ2i1), (4.1)

    for the BVP method and

    ψηη=1α+β(wψ(γ+λ)ψ2), (4.2)

    for the shooting method. Figure 7 presents the comparison between the numerical solutions obtained using the above numerical methods and the analytic solution. Figure 7 shows that the solutions are identical to the analytic solution.

    Figure 7.  Comparing the numerical solutions resulting from the shooting and BVP methods with the analytic solution (3.11) at t=0. The parameter values are taken as α=0.50, β=0.6, γ=1.5,λ=1.8, with N=600.

    Thus, it is possible to verify the correctness of the analytic solution. I also accept the obtained numerical solution as an initial condition for the numerical scheme in the next section.

    In this section, I use the finite-difference method to obtain the numerical results of system (1.1) over the domain [a,b]×[c,d]. Here, a,b,c and d represent the endpoints of the rectangular domain in the x and y directions, respectively, and Tf is a certain time. The domain [a,b]×[c,d] is split into (Mx+1)×(Ny+1) mesh points:

    xm=a+mΔx,m=0,1,2,,Mx,yn=c+nΔy,n=0,1,2,,Ny,

    where Δx and Δy are the step-sizes of the x and y domains, respectively. The system (1.1) is converted to an ODE system by discretizing the space derivatives while keeping the time derivative continuous. Completing this yields

    Ψt|km,n+α2ΔyΔ2xδ2x(Γk+1m,n+1Γk+1m,n1)+β2ΔxΔ2yδ2y(Φk+1m+1,nΦk+1m1,n)γ4Δy((Φk+1m,n+1+Φk+1m,n)Γk+1m,n+1(Φk+1m,n+Φk+1m,n1)Γk+1m,n1)λ4Δx((Γk+1m+1,n+Γk+1m,n)Φk+1m+1,n(Γk+1m,n+Γk+1m1,n)Φk+1m1,n)+γ4Δy((Ψk+1m,n+1)2(Ψk+1m,n1)2)+λ4Δx((Ψk+1m+1,n)2(Ψk+1m1,n)2)=0,12Δy(Γk+1m,n+1Γk+1m,n1)=12Δx(Ψk+1m+1,nΨk+1m1,n),12Δy(Ψk+1m,n+1Ψk+1m,n1)=12Δx(Φk+1m+1,nΦk+1m1,n), (5.1)

    where

    δ2xΓk+1m,n=(Γk+1m+1,n2Γk+1m,n+Γk+1m1,n),δ2yΦk+1m,n=(Φk+1m,n+12Φk+1m,n+Φk+1m,n1),

    subject to the boundary conditions:

    Ψx(a,y,t)=Ψx(b,y,t)=0,y[c,d],Ψy(x,c,t)=Ψy(x,d,t)=0,x[a,b]. (5.2)

    Equation (5.2) permits us to use fictitious points in estimating the space derivatives at the domain's endpoints. The initial conditions are generated by

    Ψ2(x,y,0)=(α+β)2(γ+λ)(3tanh2(12(x+y+x0)1), (5.3)

    where α,β,γ and λ are user-defined parameters. In all the numerical results shown in this section, the parameter values are fixed as α=0.50,β=0.6,γ=1.50,λ=1.80,x0=45.0, y=01, x=060 and t=025. The above system is solved by using an ODE solver in FORTRAN called the DDASPK solver [48]. This solver used a backward differentiation formula. Since I do not have the initial conditions for the space derivatives, I approximate the Jacobian matrix of the linearized system by using LU-Factorization. The obtained numerical results are acceptable. This can be observed from the Figures 8 and 9.

    Figure 8.  Time change for the numerical results while holding y=0.5 and Mx=1600 at t=0:5:25. The wave at t=25 illustrates that the numerical and the analytic solutions are quite identical.
    Figure 9.  The convergence histories of the scheme with the fixation of both y=0.5 and Mx=1600 at t=5.

    The von Neumann analysis is used to examine the stability of the scheme (5.1). The von Neumann analysis is occasionally called Fourier analysis and is utilized exclusively when the scheme is linear. Hence, I suppose that the linear version is given by

    Ψt+αΓxxy+βΦxyy+s0Γy+s1Ψy+s2Φx+s3Ψx=0,Γy=Ψx,Ψy=Φx, (6.1)

    where s0=γΦ, s1=γΨ, s2=λΓ, s3=λΨ are constants. Since Γy=Ψx, and Ψy=Φx, the first equation of (6.1) is given by

    Ψt+αΨxxx+βΨyyy+s0Ψy+s1Ψy+s2Ψx+s3Ψx=0, (6.2)

    where α,β,γ,λ,s0,s1,s2,s3,l4 are constants. I set directly

    Ψkm,n=μkexp(ιπξ0nΔx)exp(ιπξ1mΔy), (6.3)

    and also I can have

    Ψk+1m,n=μΨkm,n,Ψkm+1,n=exp(ιπξ0Δx)Ψkm,n,Ψkm,n+1=exp(ιπξ1Δy)Ψkm,n,Ψkm1,n=exp(ιπξ0Δx)Ψkm,n,Ψkm,n1=exp(ιπξ1Δy)Ψkm,n,m=1,2,,Nx1,n=1,2,,Ny1.

    Substituting (6.3) into (6.2) and doing some operations, I have

    1=μ(1ιΔt(sin(ξ0πΔx)Δx(4αΔ2xsin2(ξ0πΔx2)s2s3)+sin(ξ1πΔy)Δy(4βΔ2ysin2(ξ1πΔy2)s0s1))).

    Hence,

    μ=11aι, (6.4)

    where

    a=Δt(sin(ξ0πΔx)Δx(4αΔ2xsin2(ξ0πΔx2)s2s3)+sin(ξ1πΔy)Δy(4βΔ2ysin2(ξ1πΔy2)s0s1)).

    Thus,

    |μ|2=11+a21. (6.5)

    The stability condition of the von Neumann analysis is fulfilled. Consequently, from Eq (6.5), the scheme is unconditionally stable.

    To examine the accuracy of the numerical scheme (5.1), I study the truncation error utilizing Taylor expansions. Suppose that the error is

    ek+1m,n=Ψk+1m,nΨ(xm,yn,tk+1), (7.1)

    where Ψ(xm,yn,tk+1) and Ψk+1m,n are the analytic solution and an approximate solution, respectively. Substituting (7.1) into (5.1) gives

    ek+1j,kekj,kΔt=Tk+1m,n(α12Δ3xδ2x(ek+1m+1,nek+1m1,n)+β12Δ3yδ2y(ek+1m,n+1ek+1m,n1)+s2+s32Δx(ek+1m+1,nek+1m1,n)+s0+s12Δy(ek+1m,n+1ek+1m,n1)),

    where

    Tk+1m,n=α2Δ3xδ2x(Ψ(xm+1,yn,tk+1)Ψ(xm1,yn,tk+1))+β2Δ3yδ2y(Ψ(xm,yn+1,tk+1)Ψ(xm,yn1,tk+1))+s2+s32Δx(Ψ(xm+1,yn,tk+1)Ψ(xm1,yn,tk+1))+s0+s12Δy(Ψ(xm,yn+1,tk+1)Ψ(xm,yn1,tk+1)).

    Hence,

    Tk+1m,nΔt22Ψ(xm,yn,ξk+1)t2Δ2x25Ψ(ζm,yn,tk+1)x5Δ2y25Ψ(xm,ηn,tk+1)x5Δ2y63Ψ(xm,ηn,tk+1)x3Δ2x63Ψ(ζm,yn,tk+1)x3.

    Accordingly, the truncation error of the numerical scheme is

    Tk+1m,n=O(Δt,Δ2x,Δ2y).

    I have prosperously employed several analytical methods to extract the traveling wave solutions to the two-dimensional Novikov-Veselov system, confirming the solutions with numerical results obtained using the numerical scheme (5.1). The major highlights of the results are shown in Table 3 and Figures 810, which allow immediate comparison of the analytic solutions with the numerical results. Through these, I can notice that the solutions are identical to a large extent, and the error approaches zero whenever the value of Δx,Δy0. The numerical schemes are unconditionally stable for fixing the parameter values α=0.50,β=0.6,γ=1.50,λ=1.80,x0=45.0, y=01, x=060 and t=025.

    Table 3.  The relative error with L2 norm and CPU at t=20..
    Δx The Relative Error CPU
    0.6000 5.600×103 0.063×103m
    0.3000 2.100×103 0.1524×103s
    0.1500 6.700×104 0.3564×103s
    0.0750 2.100×104 0.8892×103s
    0.0375 6.610×105 1.7424×103s
    0.0187 2.310×105 4.0230×103s

     | Show Table
    DownLoad: CSV
    Figure 10.  The convergence histories measured utilizing the relative error with l2 norm as a function of Δx (see Table 3). Here, I picked a certain value of the variable y=0.5 at t=20 and x=060.

    Figure 1 presents the time evolution of the analytic solutions (a) Ψ1 and (b) Ψ2 with t=0,10,20. The parameter values are x0=20, α=0.50, β=0.6, γ=1.5, and λ=1. Figure 2 presents the wave behavior by changing a certain parameter value and fixing the values of the others. Figure 2(a,b) presents the behavior of Ψ1 when I change the values of (a) α or β and (b) γ or λ. In Figure 2(a) it can also be seen that the value of α or β affects the direction and amplitude of the wave, such that a negative value always makes the wave negative, its amplitude decreases when α,β0, and its amplitude increases when α,β. In Figure 2(b) the value of γ or λ affects the direction and amplitude of the wave, such that a negative value always makes the wave negative, and its amplitude decreases when the value of γ or λ increases. In Figure 2(c,d) present the wave behavior of Ψ2. Figure 3 shows the time evolution of the analytic solutions. Figure 3(a) shows Ψ7 with t=0:2:6. The parameter values are δ2=1, δ4=1, ϵ=1, α=0.50, β=0.6, γ=1.5, λ=1.8 and x0=10. Figure 3(b) shows Ψ8 with t=0:2:8. The parameter values are δ2=1, δ4=1, ϵ=1, α=0.50, β=0.6, γ=1.5, λ=1.8 and x0=10. Figures 46 present the 3D time evolution of the analytic solutions Ψ2 (left) and the numerical solutions (right) obtained employing the scheme 5.1 with t=5,15,25, Mx=1600, Ny=100, x=060 and y=01. These figures provide us with an adequate answer that the numerical and analytic solutions are quite identical. Barman et al. [42] accepted several traveling wave solutions for (1.1) as hyperbolic functions. The authors employed other parameters to develop new forms for the accepted solution. They proposed that Eq (1.1) describes tidal and tsunami waves, electromagnetic waves in transmission cables and magneto-sound and ion waves in plasma. In comparison, I have found numerous solutions also as hyperbolic functions. Furthermore, I obtained the numerical solutions to enhance the assurance that the solutions presented here are correct and accurate.

    I have successfully utilized the generalized algebraic and modified F-expansion methods to acquire the soliton solutions for the two-dimensional Novikov-Veselov system, verifying these solutions with numerical results obtained by employing the numerical scheme (5.1). The major highlights of the results shown in Figures 810 and Table 3, which allow immediate comparison of the analytic solutions with the numerical results. Through these, I can notice that the solutions are identical to a large extent, and the error approaches zero whenever the value of Δx,Δy0. The numerical schemes are unconditionally stable for fixing the parameter values α=0.50,β=0.6,γ=1.50,λ=1.80, x0=45.0, y=01, x=060 and t=025. The Jacobi elliptic functions have effectively deteriorated to hyperbolic functions. The applied numerical schemes have provided reliable numerical solutions when using a small value of Δx,Δy0.

    Ultimately, I can deduce that the methods used are valuable and applicable to extract soliton solutions for other nonlinear evolutionary systems found in chemistry, engineering, physics and other sciences.

    The author declares that he has no potential conflict of interest in this article.



    [1] R. Yan, Z. Shi, Y. Zhong, Task assignment for multiplayer reach–avoid games in convex domains via analytical barriers, IEEE Trans. Rob., 36 (2019), 107–124. https://doi.org/10.1109/TRO.2019.2935345 doi: 10.1109/TRO.2019.2935345
    [2] E. Garcia, I. Weintraub, D. W. Casbeer, M. Pachter, Optimal strategies for the game of protecting a plane in 3-d, preprint, arXiv: 2202.01826.
    [3] E. Garcia, D. W. Casbeer, M. Pachter, Optimal strategies of the differential game in a circular region, IEEE Control Syst. Lett., 4 (2019), 492–497. https://doi.org/10.1109/LCSYS.2019.2963173 doi: 10.1109/LCSYS.2019.2963173
    [4] J. Chen, W. Zha, Z. Peng, D. Gu, Multi-player pursuit–evasion games with one superior evader, Automatica, 71 (2016), 24–32. https://doi.org/10.1016/j.automatica.2016.04.012 doi: 10.1016/j.automatica.2016.04.012
    [5] K. Chen, W. He, Q. L. Han, M. Xue, Y. Tang, Leader selection in networks under switching topologies with antagonistic interactions, Automatica, 142 (2022), 110334. https://doi.org/10.1016/j.automatica.2022.110334 doi: 10.1016/j.automatica.2022.110334
    [6] Z. Li, X. Yu, J. Qiu, H. Gao, Cell division genetic algorithm for component allocation optimization in multifunctional placers, IEEE Trans. Ind. Inf., 18 (2021), 559–570. https://doi.org/10.1109/TⅡ.2021.3069459 doi: 10.1109/TⅡ.2021.3069459
    [7] Y. Tang, C. Zhao, J. Wang, C. Zhang, Q. Sun, W. Zheng, et al., An overview of perception and decision-making in autonomous systems in the era of learning, IEEE Trans. Neural Networks Learn. Syst., 2022. https://doi.org/10.1109/TNNLS.2022.3167688 doi: 10.1109/TNNLS.2022.3167688
    [8] E. Garcia, D. W. Casbeer, A. V. Moll, M. Pachter, Multiple pursuer multiple evader differential games, IEEE Trans. Autom. Control, 66 (2020), 2345–2350. https://doi.org/10.1109/TAC.2020.3003840 doi: 10.1109/TAC.2020.3003840
    [9] E. Garcia, D. W. Casbeer, M. Pachter, Optimal strategies for a class of multi-player reach-avoid differential games in 3d space, IEEE Rob. Autom. Lett., 5 (2020), 4257–4264, https://doi.org/10.1109/LRA.2020.2994023 doi: 10.1109/LRA.2020.2994023
    [10] H. Huang, J. Ding, W. Zhang, C. J. Tomlin, Automation-assisted capture-the-flag: A differential game approach, IEEE Trans. Control Syst. Technol., 23 (2014), 1014–1028. https://doi.org/10.1109/TCST.2014.2360502 doi: 10.1109/TCST.2014.2360502
    [11] Z. Zhou, J. Huang, J. Xu, Y. Tang, Two-phase jointly optimal strategies and winning regions of the capture-the-flag game, in IECON 2021 – 47th Annual Conference of the IEEE Industrial Electronics Society, (2021), 1–6. https://doi.org/10.1109/IECON48115.2021.9589624
    [12] E. Garcia, A. V. Moll, D. W. Casbeer, M. Pachter, Strategies for defending a coastline against multiple attackers, in 2019 IEEE 58th Conference on Decision and Control (CDC), (2019), 7319–7324. https://doi.org/10.1109/CDC40024.2019.9029340
    [13] I. E. Weintraub, M. Pachter, E. Garcia, An introduction to pursuit-evasion differential games, in 2020 American Control Conference (ACC), (2020), 1049–1066. https://doi.org/10.23919/ACC45564.2020.9147205
    [14] T. Başar, A tutorial on dynamic and differential games, Dyn. Games Appl. Econ., (1986), 1–25. https://doi.org/10.1007/978-3-642-61636-5_1 doi: 10.1007/978-3-642-61636-5_1
    [15] S. S. Kumkov, S. L. Ménec, V. S. Patsko, Zero-sum pursuit-evasion differential games with many objects: survey of publications, Dyn. Games Appl., 7 (2017), 609–633. https://doi.org/10.1007/s13235-016-0209-z doi: 10.1007/s13235-016-0209-z
    [16] R. Yan, Z. Shi, Y. Zhong, Defense game in a circular region, in 2017 IEEE 56th Annual Conference on Decision and Control (CDC), (2017), 5590–5595. https://doi.org/10.1109/CDC.2017.8264502
    [17] I. E. Weintraub, A. V. Moll, E. Garcia, D. Casbeer, Z. J. Demers, M. Pachter, Maximum observation of a faster non-maneuvering target by a slower observer, in 2020 American Control Conference (ACC), (2020), 100–105. https://doi.org/10.23919/ACC45564.2020.9147340
    [18] J. Wang, Y. Hong, J. Wang, J. Xu, Y. Tang, Q. L. Han, et al., Cooperative and competitive multi-agent systems:from optimization to games, IEEE/CAA J. Autom. Sin., 9 (2022), 763–783. https://doi.org/10.1109/JAS.2022.105506 doi: 10.1109/JAS.2022.105506
    [19] A. A. Al-Talabi, Multi-player pursuit-evasion differential game with equal speed, in 2017 International Automatic Control Conference (CACS), (2017), 1–6. https://doi.org/10.1109/CACS.2017.8284276
    [20] D. Shishika, J. Paulos, V. Kumar, Cooperative team strategies for multi-player perimeter-defense games, IEEE Rob. Autom. Lett., 5 (2020), 2738–2745. https://doi.org/10.1109/LRA.2020.2972818 doi: 10.1109/LRA.2020.2972818
    [21] E. Garcia, Z. E. Fuchs, D. Milutinovic, D. W. Casbeer, M. Pachter, A geometric approach for the cooperative two-pursuer one-evader differential game, IFAC-PapersOnLine, 50 (2017), 15209–15214. https://doi.org/10.1016/j.ifacol.2017.08.2366 doi: 10.1016/j.ifacol.2017.08.2366
    [22] A. V. Moll, D. Casbeer, E. Garcia, D. Milutinović, M. Pachter, The multi-pursuer single-evader game, J. Intell. Rob. Syst., 96 (2019), 193–207. https://doi.org/10.1007/s10846-018-0963-9 doi: 10.1007/s10846-018-0963-9
    [23] E. Garcia, S. D. Bopardikar, Cooperative containment of a high-speed evader, in 2021 American Control Conference (ACC), (2021), 4698–4703. https://doi.org/10.23919/ACC50511.2021.9483097
    [24] E. Garcia, D. W. Casbeer, D. Tran, M. Pachter, A differential game approach for beyond visual range tactics, in 2021 American Control Conference (ACC), (2021), 3210–3215. https://doi.org/10.23919/ACC50511.2021.9482650
    [25] Y. Xu, H. Yang, B. Jiang, M. M. Polycarpou, Multi-player pursuit-evasion differential games with malicious pursuers, IEEE Trans. Autom. Control, 2022. https://doi.org/10.1109/TAC.2022.3168430 doi: 10.1109/TAC.2022.3168430
    [26] W. Lin, Z. Qu, M. A. Simaan, Nash strategies for pursuit-evasion differential games involving limited observations, IEEE Trans. Aerosp. Electron. Syst., 51 (2015), 1347–1356. https://doi.org/10.1109/TAES.2014.130569 doi: 10.1109/TAES.2014.130569
    [27] M. Pachter, E. Garcia, D. W. Casbeer, Active target defense differential game, in 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (2014), 46–53. https://doi.org/10.1109/ALLERTON.2014.7028434
    [28] E. Garcia, D. W. Casbeer, M. Pachter, Active target defense using first order missile models, Automatica, 78 (2017), 139–143. https://doi.org/10.1016/j.automatica.2016.12.032 doi: 10.1016/j.automatica.2016.12.032
    [29] M. Coon, D. Panagou, Control strategies for multiplayer target-attacker-defender differential games with double integrator dynamics, in 2017 IEEE 56th Annual Conference on Decision and Control (CDC), (2017), 1496–1502. https://doi.org/10.1109/CDC.2017.8263864
    [30] I. E. Weintraub, E. Garcia, M. Pachter, A kinematic rejoin method for active defense of non-maneuverable aircraft, in 2018 Annual American Control Conference (ACC), (2018), 6533–6538. https://doi.org/10.23919/ACC.2018.8431129
    [31] E. Garcia, D. W. Casbeer, M. Pachter, Design and analysis of state-feedback optimal strategies for the differential game of active defense, IEEE Trans. Autom. Control, 64 (2018), 553–568. https://doi.org/10.1109/TAC.2018.2828088 doi: 10.1109/TAC.2018.2828088
    [32] E. Garcia, D. W. Casbeer, M. Pachter, Optimal target capture strategies in the target-attacker-defender differential game, in 2018 Annual American Control Conference (ACC), (2018), 68–73. https://doi.org/10.23919/ACC.2018.8431715
    [33] E. Garcia, D. W. Casbeer, M. Pachter, The complete differential game of active target defense, J. Optim. Theory Appl., 191 (2021), 675–699. https://doi.org/10.1007/s10957-021-01816-z doi: 10.1007/s10957-021-01816-z
    [34] E. Garcia, D. W. Casbeer, M. Pachter, Pursuit in the presence of a defender, Dyn. Games Appl., 9 (2019), 652–670. https://doi.org/10.1007/s13235-018-0271-9 doi: 10.1007/s13235-018-0271-9
    [35] M. Pachter, E. Garcia, D. W. Casbeer, Toward a solution of the active target defense differential game, Dyn. Games Appl., 9 (2019), 165–216. https://doi.org/10.1007/s13235-018-0250-1 doi: 10.1007/s13235-018-0250-1
    [36] E. Garcia, Cooperative target protection from a superior attacker, Automatica, 131 (2021), 109696. https://doi.org/10.1016/j.automatica.2021.109696 doi: 10.1016/j.automatica.2021.109696
    [37] M. Pachter, E. Garcia, R. Anderson, D. W. Casbeer, K. Pham, Maximizing the target's longevity in the active target defense differential game, in 2019 18th European Control Conference (ECC), (2019), 2036–2041. https://doi.org/10.23919/ECC.2019.8795650
    [38] E. Garcia, D. W. Casbeer, M. Pachter, Defense of a target against intelligent adversaries: A linear quadratic formulation, in 2020 IEEE Conference on Control Technology and Applications (CCTA), (2020), 619–624. https://doi.org/10.1109/CCTA41146.2020.9206368
    [39] E. Garcia, D. W. Casbeer, M. Pachter, Cooperative strategies for optimal aircraft defense from an attacking missile, J. Guid., Control, Dyn., 38 (2015), 1510–1520. https://doi.org/10.2514/1.G001083 doi: 10.2514/1.G001083
    [40] L. Liang, F. Deng, Z. Peng, X. Li, W. Zha, A differential game for cooperative target defense, Automatica, 102 (2019), 58–71. https://doi.org/10.1016/j.automatica.2018.12.034 doi: 10.1016/j.automatica.2018.12.034
    [41] Z. Zhou, J. Ding, H. Huang, R. Takei, C. Tomlin, Efficient path planning algorithms in reach-avoid problems, Automatica, 89 (2018), 28–36. https://doi.org/10.1016/j.automatica.2017.11.035 doi: 10.1016/j.automatica.2017.11.035
    [42] P. Shi, W. Sun, X. Yang, I. J. Rudas, H. Gao, Master-slave synchronous control of dual-drive gantry stage with cogging force compensation, IEEE Trans. Syst. Man Cybern.: Syst., https://doi.org/10.1109/TSMC.2022.3176952
    [43] J. Lorenzetti, M. Chen, B. Landry, M. Pavone, Reach-avoid games via mixed-integer second-order cone programming, in 2018 IEEE Conference on Decision and Control (CDC), (2018), 4409–4416. https://doi.org/10.1109/CDC.2018.8619382
    [44] R. Isaacs, Differential games: Their scope, nature, and future, J. Optim. Theory Appl., 3 (1969), 283–295. https://doi.org/10.1007/BF00931368 doi: 10.1007/BF00931368
    [45] R. Yan, Z. Shi, Y. Zhong, Guarding a subspace in high-dimensional space with two defenders and one attacker, IEEE Trans. Cybern., 2020. https://doi.org/10.1109/TCYB.2020.3015031 doi: 10.1109/TCYB.2020.3015031
    [46] R. Yan, Z. Shi, Y. Zhong, Construction of the barrier for reach-avoid differential games in three-dimensional space with four equal-speed players, in 2019 IEEE 58th Conference on Decision and Control (CDC), (2019), 4067–4072. https://doi.org/10.1109/CDC40024.2019.9029495
    [47] K. Margellos, J. Lygeros, Hamilton–jacobi formulation for reach–avoid differential games, IEEE Trans. Autom. Control, 56 (2011), 1849–1861. https://doi.org/10.1109/TAC.2011.2105730 doi: 10.1109/TAC.2011.2105730
    [48] J. F. Fisac, M. Chen, C. J. Tomlin, S. S. Sastry, Reach-avoid problems with time-varying dynamics, targets and constraints, in HSCC '15: Proceedings of the 18th International Conference on Hybrid Systems: Computation and Control, (2015), 11–20. https://doi.org/10.1145/2728606.2728612
    [49] M. Chen, Z. Zhou, C. J. Tomlin, Multiplayer reach-avoid games via pairwise outcomes, IEEE Trans. Autom. Control, 62 (2016), 1451–1457. https://doi.org/10.1109/TAC.2016.2577619 doi: 10.1109/TAC.2016.2577619
    [50] V. Mnih, K. Kavukcuoglu, D. Silver, A. Graves, I. Antonoglou, D. Wierstra, et al., Playing atari with deep reinforcement learning, preprint, arXiv: 1312.5602.
    [51] S. Bansal, C. J. Tomlin, Deepreach: A deep learning approach to high-dimensional reachability, in 2021 IEEE International Conference on Robotics and Automation (ICRA), (2021), 1817–1824. https://doi.org/10.1109/ICRA48506.2021.9561949
    [52] J. Li, D. Lee, S. Sojoudi, C. J. Tomlin, Infinite-horizon reach-avoid zero-sum games via deep reinforcement learning, preprint, arXiv: 2203.10142.
    [53] K. C. Hsu, V. R. Royo, C. J. Tomlin, J. F. Fisac, Safety and liveness guarantees through reach-avoid reinforcement learning, preprint, arXiv: 2112.12288.
    [54] E. Garcia, D. W. Casbeer, A. V. Moll, M. Pachter, Cooperative two-pursuer one-evader blocking differential game, in 2019 American Control Conference (ACC), (2019), 2702–2709. https://doi.org/10.23919/ACC.2019.8814294
    [55] R. Yan, X. Duan, Z. Shi, Y. Zhong, F. Bullo, Matching-based capture strategies for 3d heterogeneous multiplayer reach-avoid differential games, Automatica, 140 (2022), 110207. https://doi.org/10.1016/j.automatica.2022.110207 doi: 10.1016/j.automatica.2022.110207
    [56] J. Selvakumar, E. Bakolas, Feedback strategies for a reach-avoid game with a single evader and multiple pursuers, IEEE Trans. Cybern., 51 (2019), 696–707. https://doi.org/10.1109/TCYB.2019.2914869 doi: 10.1109/TCYB.2019.2914869
    [57] E. Garcia, D. W. Casbeer, M. Pachter, J. W. Curtis, E. Doucette, A two-team linear quadratic differential game of defending a target, in 2020 American Control Conference (ACC), (2020), 1665–1670. https://doi.org/10.23919/ACC45564.2020.9147665
    [58] S. D. Bopardikar, F. Bullo, J. P. Hespanha, A cooperative homicidal chauffeur game, Automatica, 45 (2009), 1771–1777. https://doi.org/10.1016/j.automatica.2009.03.014 doi: 10.1016/j.automatica.2009.03.014
    [59] R. Lopez-Padilla, R. Murrieta-Cid, I. Becerra, G. Laguna, S. M. LaValle, Optimal navigation for a differential drive disc robot: A game against the polygonal environment, J. Intell. Rob. Syst., 89 (2018), 211–250. https://doi.org/10.1007/s10846-016-0433-1 doi: 10.1007/s10846-016-0433-1
    [60] A. Pierson, Z. Wang, M. Schwager, Intercepting rogue robots: An algorithm for capturing multiple evaders with multiple pursuers, IEEE Rob. Autom. Lett., 2 (2016), 530–537. https://doi.org/10.1109/LRA.2016.2645516 doi: 10.1109/LRA.2016.2645516
    [61] Z. Zhou, W. Zhang, J. Ding, H. Huang, D. M. Stipanović, C. J. Tomlin, Cooperative pursuit with voronoi partitions, Automatica, 72 (2016), 64–72. https://doi.org/10.1016/j.automatica.2016.05.007 doi: 10.1016/j.automatica.2016.05.007
    [62] E. Bakolas, P. Tsiotras, Relay pursuit of a maneuvering target using dynamic voronoi diagrams, Automatica, 48 (2012), 2213–2220. https://doi.org/10.1016/j.automatica.2012.06.003 doi: 10.1016/j.automatica.2012.06.003
    [63] R. Yan, Z. Shi, Y. Zhong, Reach-avoid games with two defenders and one attacker: An analytical approach, IEEE Trans. Cybern., 49 (2018), 1035–1046. https://doi.org/10.1109/TCYB.2018.2794769 doi: 10.1109/TCYB.2018.2794769
    [64] R. Yan, Z. Shi, Y. Zhong, Cooperative strategies for two-evader-one-pursuer reach-avoid differential games, Int. J. Syst. Sci., 52 (2021), 1894–1912. https://doi.org/10.1080/00207721.2021.1872116 doi: 10.1080/00207721.2021.1872116
    [65] J. Wang, J. Huang, Y. Tang, Swarm intelligence capture-the-flag game with imperfect information based on deep reinforcement learning, Sci. Sin. Technol., 2021. https://doi.org/10.1360/SST-2021-0382 doi: 10.1360/SST-2021-0382
    [66] I. M. Mitchell, A. M. Bayen, C. J. Tomlin, A time-dependent hamilton-jacobi formulation of reachable sets for continuous dynamic games, IEEE Trans. Autom. Control, 50 (2005), 947–957. https://doi.org/10.1109/TAC.2005.851439 doi: 10.1109/TAC.2005.851439
    [67] E. Garcia, D. W. Casbeer, M. Pachter, The capture-the-flag differential game, in 2018 IEEE Conference on Decision and Control (CDC), (2018), 4167–4172. https://doi.org/10.1109/CDC.2018.8619026
    [68] M. Pachter, D. W. Casbeer, E. Garcia, Capture-the-flag: A differential game, in 2020 IEEE Conference on Control Technology and Applications (CCTA), (2020), 606–610. https://doi.org/10.1109/CCTA41146.2020.9206333
    [69] Z. Liu, W. Lin, X. Yu, J. J. Rodríguez-Andina, H. Gao, Approximation-free robust synchronization control for dual-linear-motors-driven systems with uncertainties and disturbances, IEEE Trans. Ind. Electron., 69 (2021), 10500–10509. https://doi.org/10.1109/TIE.2021.3137619 doi: 10.1109/TIE.2021.3137619
    [70] Y. Tang, X. Jin, Y. Shi, W. Du, Event-triggered attitude synchronization of multiple rigid body systems with velocity-free measurements, Automatica, in press.
    [71] X. Jin, Y. Shi, Y. Tang, X. Wu, Event-triggered attitude consensus with absolute and relative attitude measurements, Automatica, 122 (2020), 109245. https://doi.org/10.1016/j.automatica.2020.109245 doi: 10.1016/j.automatica.2020.109245
    [72] R. R. Brooks, J. E. Pang, C. Griffin, Game and information theory analysis of electronic countermeasures in pursuit-evasion games, IEEE Trans. Syst. Man Cybern. Part A Syst. Humans, 38 (2008), 1281–1294. https://doi.org/10.1109/TSMCA.2008.2003970 doi: 10.1109/TSMCA.2008.2003970
    [73] J. Ni, S. X. Yang, Bioinspired neural network for real-time cooperative hunting by multirobots in unknown environments, IEEE Trans. Neural Networks, 22 (2011), 2062–2077. https://doi.org/10.1109/TNN.2011.2169808 doi: 10.1109/TNN.2011.2169808
    [74] J. Poropudas, K. Virtanen, Game-theoretic validation and analysis of air combat simulation models, IEEE Trans. Syst. Man Cybern. Part A Syst. Humans, 40 (2010), 1057–1070. https://doi.org/10.1109/TSMCA.2010.2044997 doi: 10.1109/TSMCA.2010.2044997
    [75] Z. E. Fuchs, P. P. Khargonekar, J. Evers, Cooperative defense within a single-pursuer, two-evader pursuit evasion differential game, in 49th IEEE Conference on Decision and Control (CDC), (2010), 3091–3097. https://doi.org/10.1109/CDC.2010.5717894
    [76] B. Goode, A. Kurdila, M. Roan, Pursuit-evasion with acoustic sensing using one step nash equilibria, in Proceedings of the 2010 American Control Conference, (2010), 1925–1930. https://doi.org/10.1109/ACC.2010.5531356
    [77] Y. Tang, D. Zhang, P. Shi, W. Zhang, F. Qian, Event-based formation control for nonlinear multiagent systems under DoS attacks, IEEE Trans. Autom. Control, 66 (2020), 452–459. https://doi.org/10.1109/TAC.2020.2979936 doi: 10.1109/TAC.2020.2979936
    [78] S. Wang, X. Jin, S. Mao, A. V. Vasilakos, Y. Tang, Model-free event-triggered optimal consensus control of multiple Euler-Lagrange systems via reinforcement learning, IEEE Trans. Network Sci. Eng., 8 (2020), 246–258. https://doi.org/10.1109/TNSE.2020.3036604 doi: 10.1109/TNSE.2020.3036604
    [79] H. Gao, Z. Li, X. Yu, J. Qiu, Hierarchical multiobjective heuristic for PCB assembly optimization in a beam-head surface mounter, IEEE Trans. Cybern., 2021. https://doi.org/10.1109/TCYB.2020.3040788 doi: 10.1109/TCYB.2020.3040788
    [80] Y. Tang, X. Wu, P. Shi, F. Qian, Input-to-state stability for nonlinear systems with stochastic impulses, Automatica, 113 (2020), 108766. https://doi.org/10.1016/j.automatica.2019.108766 doi: 10.1016/j.automatica.2019.108766
  • This article has been cited by:

    1. Erdal Karapinar, Andreea Fulga, Seher Sultan Yeşilkaya, Santosh Kumar, Fixed Points of Proinov Type Multivalued Mappings on Quasimetric Spaces, 2022, 2022, 2314-8888, 1, 10.1155/2022/7197541
    2. Mi Zhou, Xiaolan Liu, Naeem Saleem, Andreea Fulga, Nihal Özgür, A New Study on the Fixed Point Sets of Proinov-Type Contractions via Rational Forms, 2022, 14, 2073-8994, 93, 10.3390/sym14010093
    3. Salvador Romaguera, Basic Contractions of Suzuki-Type on Quasi-Metric Spaces and Fixed Point Results, 2022, 10, 2227-7390, 3931, 10.3390/math10213931
    4. Salvador Romaguera, On Protected Quasi-Metrics, 2024, 13, 2075-1680, 158, 10.3390/axioms13030158
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2749) PDF downloads(157) Cited by(4)

Figures and Tables

Figures(6)  /  Tables(1)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog