Loading [MathJax]/jax/output/SVG/jax.js
Commentary Topical Sections

Beyond “autism spectrum disorder”: toward a redefinition of the conceptual foundations of autism

  • Received: 22 November 2024 Revised: 12 April 2025 Accepted: 13 May 2025 Published: 26 May 2025
  • This article critically examines the conceptual and clinical frameworks underpinning the understanding of autism, challenging the dominance of the autism spectrum disorder (ASD) label. Since the introduction of ASD in the fifth version of the Diagnostic and Statistical Manual of Mental Disorders (DSM-5), research has largely emphasized deficit-focused perspectives, aligning autism with intellectual and cognitive disability. Historical accounts by researchers like Sukhareva, Kanner, Asperger, and Frankl, however, depict autism as a complex neurotype characterized by unique strengths, intelligence, creativity, and personality traits. By juxtaposing these foundational insights with the modern pathological framing introduced by Wing and Gould, the article highlights the limitations of ASD in capturing the real nature and definition of autism. A review of autism research trends reveals a persistent bias toward a homogeneous, deficit-oriented model, often excluding perspectives that view autism as a form of cognitive diversity. The article also critiques media representations, which oscillate between stereotypical portrayals and reductive “idiot” and savant depictions, failing to “authentically” represent autism. Advocating for a paradigm shift, it calls for an interdisciplinary approach rooted in biology (research about species and genera), cognitive and evolutionary psychology, ecology, and anthropology (research about alterity and otherness) and challenges the entrenched deficit model. This shift would promote a better understanding of autism, acknowledging it as a neurodevelopmental condition (characterized by distinct cognitive patterns) rather than a disorder (defined by deficits and/or impairments).

    Citation: Kevin Rebecchi. Beyond “autism spectrum disorder”: toward a redefinition of the conceptual foundations of autism[J]. AIMS Medical Science, 2025, 12(2): 193-209. doi: 10.3934/medsci.2025012

    Related Papers:

    [1] Robert Stephen Cantrell, Chris Cosner, Yuan Lou . Evolution of dispersal and the ideal free distribution. Mathematical Biosciences and Engineering, 2010, 7(1): 17-36. doi: 10.3934/mbe.2010.7.17
    [2] Minus van Baalen, Atsushi Yamauchi . Competition for resources may reinforce the evolution of altruism in spatially structured populations. Mathematical Biosciences and Engineering, 2019, 16(5): 3694-3717. doi: 10.3934/mbe.2019183
    [3] Jinyu Wei, Bin Liu . Coexistence in a competition-diffusion-advection system with equal amount of total resources. Mathematical Biosciences and Engineering, 2021, 18(4): 3543-3558. doi: 10.3934/mbe.2021178
    [4] Andrea Pugliese, Abba B. Gumel, Fabio A. Milner, Jorge X. Velasco-Hernandez . Sex-biased prevalence in infections with heterosexual, direct, and vector-mediated transmission: a theoretical analysis. Mathematical Biosciences and Engineering, 2018, 15(1): 125-140. doi: 10.3934/mbe.2018005
    [5] Nancy Azer, P. van den Driessche . Competition and Dispersal Delays in Patchy Environments. Mathematical Biosciences and Engineering, 2006, 3(2): 283-296. doi: 10.3934/mbe.2006.3.283
    [6] Zhilan Feng, Robert Swihart, Yingfei Yi, Huaiping Zhu . Coexistence in a metapopulation model with explicit local dynamics. Mathematical Biosciences and Engineering, 2004, 1(1): 131-145. doi: 10.3934/mbe.2004.1.131
    [7] Yang Kuang, Angela Peace, Hao Wang . Special issue: Resource explicit population models. Mathematical Biosciences and Engineering, 2019, 16(1): 538-540. doi: 10.3934/mbe.2019025
    [8] Bethan Morris, Lee Curtin, Andrea Hawkins-Daarud, Matthew E. Hubbard, Ruman Rahman, Stuart J. Smith, Dorothee Auer, Nhan L. Tran, Leland S. Hu, Jennifer M. Eschbacher, Kris A. Smith, Ashley Stokes, Kristin R. Swanson, Markus R. Owen . Identifying the spatial and temporal dynamics of molecularly-distinct glioblastoma sub-populations. Mathematical Biosciences and Engineering, 2020, 17(5): 4905-4941. doi: 10.3934/mbe.2020267
    [9] Azmy S. Ackleh, Shuhua Hu . Comparison between stochastic and deterministic selection-mutation models. Mathematical Biosciences and Engineering, 2007, 4(2): 133-157. doi: 10.3934/mbe.2007.4.133
    [10] Muntaser Safan . Mathematical analysis of an SIR respiratory infection model with sex and gender disparity: special reference to influenza A. Mathematical Biosciences and Engineering, 2019, 16(4): 2613-2649. doi: 10.3934/mbe.2019131
  • This article critically examines the conceptual and clinical frameworks underpinning the understanding of autism, challenging the dominance of the autism spectrum disorder (ASD) label. Since the introduction of ASD in the fifth version of the Diagnostic and Statistical Manual of Mental Disorders (DSM-5), research has largely emphasized deficit-focused perspectives, aligning autism with intellectual and cognitive disability. Historical accounts by researchers like Sukhareva, Kanner, Asperger, and Frankl, however, depict autism as a complex neurotype characterized by unique strengths, intelligence, creativity, and personality traits. By juxtaposing these foundational insights with the modern pathological framing introduced by Wing and Gould, the article highlights the limitations of ASD in capturing the real nature and definition of autism. A review of autism research trends reveals a persistent bias toward a homogeneous, deficit-oriented model, often excluding perspectives that view autism as a form of cognitive diversity. The article also critiques media representations, which oscillate between stereotypical portrayals and reductive “idiot” and savant depictions, failing to “authentically” represent autism. Advocating for a paradigm shift, it calls for an interdisciplinary approach rooted in biology (research about species and genera), cognitive and evolutionary psychology, ecology, and anthropology (research about alterity and otherness) and challenges the entrenched deficit model. This shift would promote a better understanding of autism, acknowledging it as a neurodevelopmental condition (characterized by distinct cognitive patterns) rather than a disorder (defined by deficits and/or impairments).



    In recent years, multi-agent consensus control has been recognized as a vital element of distributed collaborative control for applications such as distributed computing, unmanned aerial vehicle formation, and intelligent transportation systems. Researchers have shown significant interest in this area, and a wide range of control mechanisms have been explored in the past few years. These control mechanisms include adaptive [1,2,3,4], fault-tolerant [5], impulse [6,7], and sliding mode [8] methods.

    In practical systems, the stability of the system state is susceptible to disruption from unexpected factors, including nonlinear dynamics and system uncertainties. Existing research has primarily focused on continuous-time systems, where the state information of intelligent agents is continuously transmitted between nodes, leading to significant network usage and energy consumption. However, the development of event-triggered control solves this problem by avoiding constant communication. Earlier studies on event-triggered control that can be found have investigated centralized, distributed, and self-triggered event-triggered control techniques [9,10,11]. One researcher proposed an adaptive event-triggered control scheme for strongly connected networks that dynamically adjusted the triggering time interval on the basis of sampled data [12]. Another mechanism using a dynamic event-triggering mechanism was proposed to reduce communication resource wastage compared with traditional event-triggering mechanisms [13]. Others have assumed that system parameters such as the efficiency factor of the executor, external disturbances, and precursor control input signals are all unknown and introduced a fault-tolerant control to obtain sufficient conditions for consistent tracking [14]. However, these findings primarily investigate traditional event triggering mechanisms. In [15,16], researchers proposed a dynamic event-triggered mechanism, which can significantly reduce the number of triggers and conserve communication resources. researchers respectively proposed centralized and distributed dynamic event-triggered mechanisms in [15,16], while scholars suggested both centralized and distributed mechanisms in [17], verifying their superiority.

    However, the rapid growth of network information technologies has also led to a rise in cyber attacks. Among them, denial-of-service (DoS) attacks are the most common, being relatively easy to execute in the attack space. These attacks usually target the controller or exhaust the resources of the target system directly, resulting in the system being unable to provide normal services or communication. In some cases, these attacks cause the system to crash. Therefore, countering DoS attacks has received significant research attention. Researchers studied the multi-agent systems(MASs) under DoS attacks in given attack frequency and upper bounds on attack duration [18,19]. Compared with linear systems, nonlinear MASs are more widely used in real life. Among these, a secure controller based on event triggering was proposed to solve the lead-following consensus problem of second-order nonlinear systems [20]. This is more common than linear systems. Another proposal was for an event-triggered adaptive fault-tolerant control strategy, which reduced the computational cost of heterogeneity [21]. For nonperiodic DoS attacks, the upper bounds of network attacks, actuator failures, attack duration, and frequency are obtained. Another method uses a security mechanism employing a prediction-based switching observer scheme to address the issue of invalidation in event-triggered mechanisms during attack intervals [22]. A novel framework for observer-based event-triggered containment control, taking into account the occurrence of DoS attacks, has also been introduced [23]. This framework establishes a resilient event-triggered controller, using a specially designed observer. The goal is to achieve consistent control of MASs in the presence of DoS attacks.

    Based on these observations, we aim to explore the security consensus problem of nonlinear MAS with external disturbances under DoS attacks in this paper. Our contributions are as follows.

    1) In this paper, a nonlinear system with external disturbances is considered, and the effects of the nonlinear dynamics and uncertainty of the system are eliminated by designing an adaptive scheme and state-feedback control gains by updating the laws of the adaptive parameters online.

    2) Compared with [22,23], a dynamic variable is introduced to adjust the triggering instances under DoS attacks. Therefore, the event-triggered mechanism proposed in this paper is more flexible and can effectively save communication resources. In addition, continuous communication between agents is not required to determine whether a trigger condition satisfies the trigger condition.

    Notation R is the set of real numbers, and RN×N is the set of N×N real matrix. represents a Euclidean norm of vectors or matrices. The superscripts A1 and AT represent the inverse and transpose of matrix A. λmax(A) is the maximum eigenvalue, and λmin(A) is the minimum eigenvalue of matrix A. D+() denotes the righthand derivative of a function, and is Kronecker product. diag{A1,,An} is the diagonal matrix. is the intersection of sets, and denotes the union of sets.

    For a given MAS, the digraph G is (V,E), where V={1,2,,N} is the set of nodes, and EV×V represents the edge set of followers. The information exchange between each node can be described by the adjacency matrix A and the Laplacian matrix L. A=[aij]RN×N if agents i and j communicate with one another, aij=1; otherwise aij=0 and L=[lij]Rn×n where L=DA, The degree matrix D=diag(di) with di=Ni=1aij. In this paper, we assume that the agents are linked by a balancing topology, i.e., aij=aji. If the agent i communicates with the leader, then bi=1; otherwise, bi=0.

    For a leader-following system, the dynamics of the leader are described by the equation

    ˙x0=Ax0+f(t,x0(t)). (2.1)

    The ith follower system is

    ˙xi=Axi+Bui(t)+f(t,xi(t))+wi. (2.2)

    In the preceding, x(t)Rn are positions of the agent, ui(t)R is the control input, ARn×n and BRn×p are system matrices, f(x) is a nonlinear function, and wi is the uncertainty input satisfying

    wiςi1|u|+ςi2|x|+γi, (2.3)

    where ςi1<1, ςi2 and γi are unknown constants.

    Lemma 1. If the nonlinear function f(t,xi(t)),i=1,2,..., is continuously differentiable in a region SR2 and xi(t0)S, then for any xi(t0)S, the following formula is satisfied:

    f(xi(t),t)f(xi(t0),t)=f()xi×(xi(t)xi(t0)), (2.4)

    where f()=f(xi(t0))+Δ(xi(t)xi(t0)), 0<Δ<1.

    Assumption 1. If there is a continuously differentiable function f(t,xi(t)) and the highest order s{1,2,N}, there exist bounded positive scalars δix, such that

    |f(zi)xi|δixxis, (2.5)

    where xis=|xi|s+|xi|s1++1,s1. We also need some assumptions to ensure that the purpose is achieved.

    Assumption 2. A,B can be stabilized, and the digraph G is strongly connected.

    Next, we define the position errors ei(t):

    ei(t)=Nj=0,jiaij(xi(t)xj(t))+bi(xi(t)x0(t)). (2.6)

    According to Definition 1, we have

    ˙ei(t)=Nj=0,jiaij(˙xi(t)˙xj(t))+bi(˙xi(t)˙x0(t))=Nj=0,jiaij(A(xixj)+B(uiuj)+[f(t,xi(t))f(t,xj(t))]+(wiwj))+bi(A(xix0)+Bui)+wi+bi[f(t,xi(t))f(t,x0(t))]=Nj=0,jiAaij((xixj)+bi(xix0))+Baij(uiuj)+aijf(zi)xi(xi(t)xj(t0))+aij(wiwj))+bi(Bui+wi))+bi[f(zi)xi(xi(t)x0(t))]=Nj=0,jiA(aij(xixj)+bi(xix0))+f(zi)xi[aij(xi(t)xj(t0))+bi(xi(t)x0(t))]+aij(B(uiuj))+(wiwj))+bi(Bui+wi)). (2.7)

    We also have

    ˙e(t)=(L+L0)(Bu(t)+w(t))+(A+f(zi)x)e(t), (2.8)

    where e(t)=[e1(t),e2(t),,ei(t)], f(zi)x=diagNi=1[f(zi)xi], L0=diagNi=1[bi]. L is defined as

    lij={Nk=1,kiaik,j=iaij,ji. (2.9)

    , then Eq (2.8) can be expressed as

    ˙e(t)=(A+ΔA)e(t)+ˉL(Bu(t)+w(t)), (2.10)

    where A=[IN×N000], ˉL=[0L+L0], ΔA=[000f(zi)x].

    Definition 1. MAS (2.1) and (2.2) are said to have consensus if each agent's position state in the system satisfies

    limtxi(t)x0(t)=0,i=1,2,,N. (2.11)

    The distributed adaptive control input is

    ui(t)=kiei(t)ˉeiΨi(t), (2.12)

    where ˉei=Nj=1ajieji,aii=ai0+Nj=1,jiaij. ki is the control gain determined based on the linear matrix inequality(LMI)

    (A+ˉLBK)TP+P(A+ˉLBK)0, (2.13)

    where P=[P00N×N0N×NIN×N]>0,K=diag[ki],andP0 is a positive definition matrix. Ψi(t) is defined as

    Ψi={11ςi1(ςi1|kiei|+ςi2|xis|+γi|ei|+2ˆδix|e|2xis|ei|2),ei00,ei=0 (2.14)

    where ˆδix is the estimate of unknown parameters δix. The following describes the updated laws for the adaptive parameters:

    dˆδidt=|ei|2xis. (2.15)

    Since δi is an unknown constant, defined as ˜δi(t)=ˆδi(t)δi, the adaptive error systems are described by

    d˜δidt=dˆδidt. (2.16)

    It follows from Eq (2.12) that

    u(t)=ke(t)ˉeΨ(t), (2.17)

    where k(t)=[k1(t),k2(t),]T and ˉe=[ˉe1,ˉe2ˉen]. According to Eqs (2.11) and (2.15), we have

    ˙e(t)=(A+ˉLBK)e(t)+ΔAe(t)ˉL(BˉevΨ(t))ˉLw(t). (2.18)

    Next, we define the event trigger time series as {tjk} for the jth agent. Therefore, the next triggering time tik+1 for the ith agent can be expressed as

    tik+1=inf{t>tik|Hi(t)0}. (2.19)

    The function Hi() is given by

    Hi()=θiχi(t)+αiqi(t)2ηiei(t)2, (2.20)

    where θi>0, αi,ηiRn>0. qi(t) is defined as the measurement error according to Eq (2.6):

    qi(t)=ei(tik)ei(t). (2.21)

    χi(t) satisfies

    ˙χi(t)=βiχi(t)+ηiei(t)2αiqi(t)2, (2.22)

    where βi>0, initial value χi(0)>0 could be randomly selected, and ti0=0.

    Remark 1: The internal dynamic variable updates according to internal variables such as self-feedback, measurement error, and neighborhood error. In comparison with the conventional static triggering strategy [22,23], the dynamic event triggered control protocol we proposed can more effectively reduce network communication and save resources.

    A DoS attack aims to block the communication channels so the targeted system cannot exchange information normally. Communication channels are not the only things affected by DoS attacks because the attacks can damage communication equipment along with hindering data transmission, measurement, and control channels simultaneously. DoS attacks are extremely destructive to the system, but their energy consumption requires attackers to replenish energy supplies after the attack is over, which takes time. Therefore, the time series can be split into two sections based on whether a DoS assault was launched. In the absence of the DoS attack, the system functions and communicates properly. However, in the presence of a DoS attack, communication is cut off, and the controller stops functioning. Here, we assume that the time interval of DoS attacks is {tm}mN, where tm is the moment of the DoS attack, and [tm,tm+Δm] is the mth DoS time interval, and Δm is the time duration of the mth attack. The DoS attack interval is the same for all multi-agents. Thus, the set time instants where communication is blocked (the interval of the DoS attack) are

    Ξa(t0,t)={mN[tm,tm+Δm]}[t0,t]. (3.1)

    Similarly, the sequence of time intervals without attacks is given by

    Ξs(t0,t)=[t0,t]Ξa(t0,t). (3.2)

    Because of the recovery mechanism, the MAS cannot immediately restore communication after the end of a DoS attack, and due to the event-triggering mechanism, there is an upper bound for the time when the two events occur consecutively. We assume that they can exist at the same time. Therefore, the actual DoS attack lasts longer, and consequently, the mth DoS attack's actual time frame may be described as [tm,tm+ˉΔm]. The new time period of the DoS attack is as follows:

    ˜Ξa(t0,t)={mN[tm,tm+ˉΔm]}[t0,t] (3.3)
    ˜Ξs(t0,t)=[t0,t]˜Ξa(t0,t) (3.4)

    Assumption 2. Define na(t0,t) as the number of attacks in the period [t0,t], so the attack frequency Fa(t0,t)>0 satisfies

    Fa(t0,t)=na(t0,t)tt0. (3.5)

    Assumption 3. Define Na(t0,t) as the total time interval of the DoS attack in the period [t0,t]. The constants T00,F00,0<1T1<1,0<1F1<1 are such that

    |Ξa(t0,t)|Ξ0+tt0T1and (3.6)
    Na(t0,t)F0+tt0F1, (3.7)

    where 1T1 is the attack strength.

    Lemma 1. Previous research considers Eq (2.1) and this DoS attack model under Assumptions 2 and 3 [18]. If the Lyapunov function V1(t),V2(t) satisfies

    {˙V1(t)l0V(t)+τ0t˜Ξs˙V2(t)l1V(t)+τ1t˜Ξa, (3.8)

    where l0,l1,τ0,τ1 are positive constants. T1,F1 defined in Assumption 3 satisfies

    1T1<l0ηl0+l11F1<η2lnκ+(l0+l1)ρ, (3.9)

    where 0<η<l0 is the time to restore communication. ρ>0, κ1 is a constant satisfying

    {κV2((tm+ˉΔm))V1(tm+ˉΔm)0κV1(tm)V2(tm+1)0. (3.10)

    Thus, we say that V(t) are bounded.

    Remark 2: Lemma 1 gives an upper bound on DoS attack frequency and duration, ensuring that the Lyapunov function remains stable over the entire time span [18].

    Remark 3: The DoS attack considered in this paper mainly attacks the communication channels between agents. Thus, when the DoS attack comes, there is no information interaction between neighboring agents, and the event-triggering control is not triggered. In addition, we consider a DETC. Compared with the traditional event-triggering control, we introduce a dynamic variable that uses communication resources more effectively. In the simulation section below, we compare our method with the traditional event-triggering mechanism.

    In this section, we prove system stability. Our presentation has two sections: the stability study of the MAS (2.1) and (2.2) under a DoS attack and the proof of non-Zeno behavior.

    Theorem 1. For the MAS (2.1) and (2.2) under DoS attacks, we consider Assumption 1 and the controller (2.12). If the LMI (2.13) satisfies (A+ˉLBK)TP+P(A+ˉLBK)ξiP, where ξiRn=σiηi,σi>1, then a feasible solution exists and the MAS is said to achieve leader-following consensus.

    Proof of Theorem 1. The system stability proof is also divided into two parts. The communication of the system is damaged under a DoS attack, but the system is not always in an impassable state. The proof is divided between DoS attacks and non-DoS attacks, as per the prior section. When there are non-DoS attacks in the system, we consider the Lyapunov function

    W(t)=V(t)+Ni=1χi(t)=eT(t)Pe(t)+Ni=1κ1i~δ2i+Ni=1χi(t). (4.1)

    It follows from Eqs (2.20)–(2.22) that

    ˙χi=βiχiθiχi. (4.2)

    The preceding implies that

    χi(t)χi(0)e(βi+θi)t>0, (4.3)

    which leads to W(t)>0.

    The derivative of W is

    ˙W(t)=eT[(A+ˉLBK)TP+P(A+ˉLBK)]e+2eTPΔAe2eTPˉLˉeΨ(t)+2eTPˉLw(t)+Ni2κ1i˙˜δi˜δi+Ni=1˙χi(t). (4.4)

    According to Eq (2.3), the condition in Assumption 1, and the control protocol in {Eq (2.12)}, we have

    ˙W(t)eT[(A+ˉLBK)TP+P(A+ˉLBK)]e+2Ni=1|e|2f(zi)xi2Ni=1|e|2Ψi+2Ni=1|e|(ςi1|u|+ςi2|x|+δi)+Ni2κ1i˙˜δi˜δi+Ni=1˙χi(t)eT[(A+ˉLBK)TP+P(A+ˉLBK)]e+2Ni=1δix|e|2xis2Ni=1|e|2(1ςi1)Ψi+2Ni=1|e|(ςi1|kiei|+ςi2|x|+δi)+Ni2κ1i˙˜δi˜δi+Ni=1˙χi(t). (4.5)

    Choosing Ψi(t) as in Eq (2.15), we obtain

    ˙W(t)eT[(A+ˉLBK)TP+P(A+ˉLBK)]e2Ni=1δix|e|2xis+Ni2κ1i˙˜δi˜δi+Ni=1˙χi(t)eT[(A+ˉLBK)TP+P(A+ˉLBK)]e+Ni=1˙χi(t). (4.6)

    On the other hand

    Ni=1ξieTi(t)Pei(t)λmax(P)Ni=1ξiei(t)2. (4.7)

    Based on the condition in Theorem 1, Eq (2.22), and Eq (4.6), we have

    ˙W(t)Ni=1(ξiηi)ei(t)2Ni=1αiqi(t)2Ni=1βiχiNi=1ηi(σi1)ei(t)2Ni=1βiχi, (4.8)

    then

    ˙W(t)(σM1)Ni=1ξiei(t)2Ni=1βiχil0W(t)+τ0, (4.9)

    where l0=min([(σM1)/λmax(P)],1, βm)>0, σM=max[σi], βm=min[βi], τ0=Ni=1κ1i~δ2i, l0,andτ0 are positive constants.

    When there are DoS attacks in the system, then communication and control channel blockages exist. In this case, the control input becomes 0, ui(t)=0, so the Lyapunov function can be expressed as

    V(t)=eT(t)Pe(t)+Ni=1κ1i~δ2i. (4.10)

    Similar to (4.4), (4.10) can be written as

    ˙V(t)V(t)+2Ni=1δix|e|2xis+2Ni=1|e|(ςi2|x|+δi)l1V(t)+τ1, (4.11)

    where l1=1, and τ1=2Ni=1δix|e|2xis+2Ni=1|e|(ςi2|x|+δi). According to the conditions of (3) and Assumption 1, we know that τ1 has an upper bound. From Lemma 1, we know that the system stabilizes in a limited time under a DoS attack. The proof is completed.

    Next is the proof of no Zeno behavior. We assume that there is a positive constant T0 such that limktik=T0. Based on the property of limit, we know that for any ε0>0, there exists N(ε0) such that tik(T0ε0,T0+ε0),kN(ε0). This means tiN(ε0+1)tiN(ε0)<2ε0.

    According to (4.11), W(t) gradually decreases to 0, Then ξmλmin(P)ei(t)2V(t)<W(t). Therefore, we have

    ei(t)W0ξmλmin(P)=ϖ0. (4.12)

    Because ei(t) and qi(t) are bounded, the Dini derivative of qi(t) is

    D+qi(t)˙qi(t)=Nj=1aij(˙xi(t)˙xj(t))+bi(˙xi(t)˙x0(t))A+ΔAei(t)+ˉLBNj=1(ui(t))+ˉLwi(t)ˉAϖ0+ˉLBM1+LM2=ˆW0, (4.13)

    where ˉA=A+ΔA. According to Eqs (2.3), (2.12), and (2.14), we obtain ui(t). wi(t) has an upper bound, and M1,M2 is their upper bound.

    Since only the trigger condition in {Eq (2.19)} is met and the event is triggered when qi(t) is reset to 0, then qi(t)ηiαiei(t)2+θiαiχiθiαiχi,tik,k=1,2, which implies that

    qi(tik)θiαiχi(tik)=θiαiχi(0)eβi+θi2tik, (4.14)

    then, we can obtain

    tiN(ε0+1)tiN(ε0)1ˆW0θiαiχi(0)eβi+θ12tiN(ε0+1). (4.15)

    If ε0>0 is a solution of

    1ˆW0θiαiχi(0)eβi+θi2TO=2ε0eβi+θi2ε0, (4.16)

    then

    tiN(ε0+1)tiN(ε0)1ˆW0θiαiχi(0)eβi+θi2(T0+ε0)=2ε0. (4.17)

    As a result, the aforementioned assumption is false, concluding the evidence that the agent i does not have Zeno behavior.

    To show the efficacy of the proposed control strategy, we present a simulation example in this section. Our simulation uses MASs composed of six agents as shown in Figure 1, where agent 1 is the leader, and others are followers. The system is

    ˙xi(t)=Axi(t)+Bui(t)+(sin(xi(t))+1.5cos(2.5t))+wi
    Figure 1.  Graph G in the example.

    The system parameters are set as

    A=[0I3A1A2],B=[0I3]
    A1=[00002ϕ2000ϕ2],A2=[02ϕ02ϕ00000]
    ςi1=0.1×1+i2,ςi2=0.5×1+i2

    In this example, we consider the flight of an aircraft, ϕ=0.002 is the angular velocity of the aircraft, and I3 represents the identity matrix of 3 × 3.

    αi=87.5,βi=0.004,θi=3.5
    ηi=[0.210.1050.1050.210.210.105]

    Figures 2 and 3 show the response curves and consistency errors of the system state for all agents. They show that the followers' states converge toward those of the leader as time progresses. Figures 3 and 4 show the control input curves and event trigger time instant for all agents. There are four times DoS attacks, with T0=3,F0=4. The duration of the DoS attack is |Ξa(0,40)|=3.5. In Table 1, we can see that the dynamic event-triggered mechanism proposed in this paper has far fewer triggering instances in the same time than the other two literatures [22,23], which can effectively save communication resources. In addition, continuous communication between agents is not required to determine whether a trigger condition satisfies a trigger condition. Considering the static event-triggered control protocol, we have

    tik+1=inf{t>tik|qi(t)2ρei(t)20}
    tik+1=inf{t>tik|qi(t)ϱei(t)0}
    Figure 2.  The control input's response curves.
    Figure 3.  The consensus errors' response curves.
    Figure 4.  Position's response curves.
    Figure 5.  Event trigger time instant for all agents.
    Table 1.  Compared with the traditional triggering protocols in [0, 40 s].
    Agent i 1 2 3 4 5 6
    [22] 260 1897 1914 1704 1635 1861
    [23] 1632 1899 1917 1694 1633 1869
    Our DETC 50 65 70 106 42 6

     | Show Table
    DownLoad: CSV

    where ρ and ϱ are positive constants. Our DETC effectively reduces communication frequency.

    In this paper, we propose a dynamic event-triggered adaptive control approach to address the leader-following consensus problem for nonlinear MASs experiencing DoS attacks. We have presented a distributed control strategy and adaptive update laws to ensure system stability in the presence of uncertainties. The Lyapunov stability theory is used to derive conditions for achieving consensus. The DoS attacks considered here mainly target the MASs' communication channels. In reality, there are other types, scales, and levels of DoS attacks. Formulating mathematical models of these other types of DoS attacks and solving these models is the direction of our future research.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    This research was funded in part by National Natural Science Foundation of China under Grant 62273109, in part by the Guangdong Basic and Applied Basic Research Foundation under Grant 2023A1515010168, Grant 2019A1515010830, in part by the Key Special Foundation for General Universities in Guangdong Province under Grant 2022ZDZX1018, and in part by the Maoming Science and Technology Plan Foundation under Grant 2022S043.

    The authors declare there is no conflict of interest.



    Conflict of interest



    The author declares no conflict of interest.

    [1] American Psychiatric Association (2013) Diagnostic and statistical manual of mental disorders. 5 Eds., American Psychiatric Publishing. https://doi.org/10.1176/appi.books.9780890425596
    [2] American Psychiatric Association (2022) Diagnostic and statistical manual of mental disorders. 5 Eds., text revision. American Psychiatric Publishing. https://doi/book/10.1176/appi.books.9780890425787
    [3] First MB, Yousif LH, Clarke DE, et al. DSM-5-TR: overview of what's new and what's changed. World Psychiatry 21: 218-219. https://doi.org/10.1002/wps.20989
    [4] Salvo MD (2024) Autism Research between Psychology and Neuroscience. Palgrave Macmillan. https://doi.org/10.1007/978-3-031-68338-1
    [5] Baron-Cohen S (2002) The extreme male brain theory of autism. Trends Cogn Sci 6: 248-254. https://doi.org/10.1016/s1364-6613(02)01904-6
    [6] Johnson CP, Myers SM (2007) Identification and evaluation of children with autism spectrum disorders. Pediatrics 120: 1183-1215. https://doi.org/10.1542/peds.2007-2361
    [7] Wing L (1990) What is autism?, In: Ellis, K. Editor, Autism. Therapy in Practice Series. Boston: Springer. https://doi.org/10.1007/978-1-4899-6924-8_1
    [8] Baron-Cohen S (2017) Editorial perspective: neurodiversity—a revolutionary concept for autism and psychiatry. J Child Psychol Psychiatry 58: 744-747. https://doi.org/10.1111/jcpp.12703
    [9] Baron-Cohen S (2020) The Pattern Seekers. Basic Books.
    [10] Baron-Cohen S, Ring HA, Bullmore ET, et al. (2000) The amygdala theory of autism. Neurosci Biobehav Rev 24: 355-364. https://doi.org/10.1016/s0149-7634(00)00011-7
    [11] Frith U, Happé F (1994) Autism: beyond “theory of mind”. Cognition 50: 115-132. https://doi.org/10.1016/0010-0277(94)90024-8
    [12] Hill EL (2004) Executive dysfunction in autism. Trends Cogn Sci 8: 26-32. https://doi.org/10.1016/j.tics.2003.11.003
    [13] Lord C, Elsabbagh M, Baird G, et al. (2018) Autism spectrum disorder. Lancet 392: 508-520. https://doi.org/10.1016/S0140-6736(18)31129-2
    [14] Muhle R, Trentacoste SV, Rapin I (2004) The genetics of autism. Pediatrics 113: e472-e486. https://doi.org/10.1542/peds.113.5.e472
    [15] Baron-Cohen S (2000) Theory of mind and autism: a review. Int Rev Res Ment Retard 23: 169-184. https://doi.org/10.1016/S0074-7750(00)80010-5
    [16] Baron-Cohen S (2009) Autism: the empathizing–systemizing (E-S) theory. Ann N Y Acad Sci 1156: 68-80. https://doi.org/10.1111/j.1749-6632.2009.04467.x
    [17] Baron-Cohen S, Lombardo MV, Auyeung B, et al. (2011) Why are autism spectrum conditions more prevalent in males?. PLoS Biol 9: e1001081. https://doi.org/10.1371/journal.pbio.1001081
    [18] Buescher AV, Cidav Z, Knapp M, et al. (2014) Costs of autism spectrum disorders in the United Kingdom and the United States. JAMA Pediatr 168: 721-728. https://doi.org/10.1001/jamapediatrics.2014.210
    [19] Fombonne E (1999) The epidemiology of autism: a review. Psychol Med 29: 769-786. https://doi.org/10.1017/s0033291799008508
    [20] Fombonne E (2003) The prevalence of autism. JAMA 289: 87-89. https://doi.org/10.1001/jama.289.1.87
    [21] Frith U, Mira M (1992) Autism and Asperger syndrome. Focus Autist Behav 7: 13-15. https://doi.org/10.1177/108835769200700302
    [22] Happé F, Ronald A, Plomin R (2006) Time to give up on a single explanation for autism. Nat Neurosci 9: 1218-1220. https://doi.org/10.1038/nn1770
    [23] Lord C, Cook EH, Leventhal BL, et al. (2000) Autism spectrum disorders. Neuron 28: 355-363. https://doi.org/10.1016/s0896-6273(00)00115-x
    [24] Lord C, Brugha TS, Charman T, et al. (2020) Autism spectrum disorder. Nat Rev Dis Primers 6: 5. https://doi.org/10.1038/s41572-019-0138-4
    [25] Lyall K, Croen L, Daniels J, et al. (2017) The changing epidemiology of autism spectrum disorders. Annu Rev Public Health 38: 81-102. https://doi.org/10.1146/annurev-publhealth-031816-044318
    [26] Myers SM, Johnson CP, American Academy of Pediatrics Council on Children with Disabilities (2007) Management of children with autism spectrum disorders. Pediatrics 120: 1162-1182. https://doi.org/10.1542/peds.2007-2362
    [27] Newschaffer CJ, Croen LA, Daniels J, et al. (2007) The epidemiology of autism spectrum disorders. Annu Rev Public Health 28: 235-258. https://doi.org/10.1146/annurev.publhealth.28.021406.144007
    [28] Robertson CE, Baron-Cohen S (2017) Sensory perception in autism. Nat Rev Neurosci 18: 671-684. https://doi.org/10.1038/nrn.2017.112
    [29] Rogers SJ, Vismara LA (2008) Evidence-based comprehensive treatments for early autism. J Clin Child Adolesc Psychol 37: 8-38. https://doi.org/10.1080/15374410701817808
    [30] Scassellati B, Admoni H, Matarić M (2012) Robots for use in autism research. Annu Rev Biomed Eng 14: 275-294. https://doi.org/10.1146/annurev-bioeng-071811-150036
    [31] Simmons DR, Robertson AE, McKay LS, et al. (2009) Vision in autism spectrum disorders. Vision Res 49: 2705-2739. https://doi.org/10.1016/j.visres.2009.08.005
    [32] Tuchman R, Rapin I (2002) Epilepsy in autism. Lancet Neurol 1: 352-358. https://doi.org/10.1016/s1474-4422(02)00160-6
    [33] Volkmar FR, Lord C, Bailey A, et al. (2004) Autism and pervasive developmental disorders. J Child Psychol Psychiatry 45: 135-170. https://doi.org/10.1046/j.0021-9630.2003.00317.x
    [34] Zeidan J, Fombonne E, Scorah J, et al. (2022) Global prevalence of autism: a systematic review update. Autism Res 15: 778-790. https://doi.org/10.1002/aur.2696
    [35] Bottini SB, Morton HE, Buchanan KA, et al. (2023) Moving from disorder to difference: a systematic review of recent language use in autism research. Autism Adulthood 6: 128-140. https://doi.org/10.1089/aut.2023.0030
    [36] Wing L, Gould J (1979) Severe impairments of social interaction and associated abnormalities in children: epidemiology and classification. J Autism Dev Disord 9: 11-29. https://doi.org/10.1007/BF01531288
    [37] Sukhareva GE (1926) Die schizoiden Psychopathien im Kindesalter (Schizoid psychopathies in childhood). (Part 1 of 2). Monatsschrift für Psychiatrie und Neurologie 60: 235-247. https://doi.org/10.1159/000190478 (Article in German)
    [38] Sukhareva GE (1926) Die schizoiden Psychopathien im Kindesalter (Schizoid psychopathies in childhood). (Part 2 of 2). Monatsschrift für Psychiatrie und Neurologie 60: 248-261. https://doi.org/10.1159/000316609 (Article in German)
    [39] Sukhareva GE (1927) Die Besonderheiten der schizoiden Psychopathien bei den Madchen (The characteristics of schizoid psychopaths in girls). (Part 1 of 2). Monatsschrift für Psychiatrie und Neurologie 62: 171-185. https://doi.org/10.1159/000166291 (Article in German)
    [40] Sukhareva GE (1927) Die Besonderheiten der schizoiden Psychopathien bei den Madchen (The characteristics of schizoid psychopaths in girls). (Part 2 of 2). Monatsschrift für Psychiatrie und Neurologie 62: 186-200. https://doi.org/10.1159/000323311 (Article in German)
    [41] Rebecchi K (2022) Autistic Children - Grunya Sukhareva. Kindle Direct Publishing.
    [42] Asperger H (1938) Das psychisch abnorme kind (The mentally abnormal child). Wiener Klinische Wochenschrift 51: 1314-1317.
    [43] Asperger H (1944) Die “Autistischen Psychopathen” im Kindesalter (The “Autistic Psychopaths” in childhood), In: Archiv für Psychiatrie und Nervenkrankheiten, 117: 76-136.
    [44] Rebecchi K (2021) Autistic Children - Hans Asperger. Kindle Direct Publishing.
    [45] Rebecchi K (2023) Autism: The Founding Writings of Hans Asperger. Kindle Direct Publishing.
    [46] Rebecchi K (2024) “Early childhood autism, Asperger type”, by H. Asperger (1982). Hist Psychiatry 35: 363-376. https://doi.org/10.1177/0957154X241248261
    [47] Kanner L (1943) Autistic disturbances of affective contact. Nervous Child 2: 217-250.
    [48] Kanner L (1971) Follow-up study of eleven autistic children originally reported in 1943. J Autism Child Schizophr 1: 119-145. https://doi.org/10.1007/bf01537953
    [49] Frankl G (1957) Autism in childhood: an attempt of an analysis (unpublished manuscript). Lawrence, KS: Kenneth Spencer Research Library, The University of Kansas.
    [50] Wing L (1981) Asperger's syndrome: a clinical account. Psychol Med 11: 115-129. https://doi.org/10.1017/s0033291700053332
    [51] Feinstein A (2010) A History of Autism Conversations with the Pioneers. Chichester Wiley-Blackwell.
    [52] Chapman R (2020) The reality of autism: on the metaphysics of disorder and diversity. Philos Psychol 33: 799-819. https://doi.org/10.1080/09515089.2020.1751103
    [53] Fein E (2020) Living on the Spectrum: Autism and Youth in Community. NYU Press.
    [54] Haraway D (1988) Situated knowledges: the science question in feminism as a site of discourse on the privilege of perspective. Feminist Studies 14: 575-599.
    [55] Chapman R (2023) Empire of Normality. Pluto Press.
    [56] Limburg J (2021) Letters To My Weird Sisters. Atlantic Books.
    [57] Evans B (2013) How autism became autism: the radical transformation of a central concept of child development in Britain. Hist Human Sci 26: 3-31. https://doi.org/10.1177/0952695113484320
    [58] Evans B (2027) The metamorphosis of autism. Available from: https://doi.org/10.26530/oapen_625488
    [59] McGrath J (2017) Naming Adult Autism: Culture, Science, Identity. Rowman & Littlefield International.
    [60] Frith U (1991) Autism and Asperger Syndrome. Cambridge University Press.
    [61] Thurm A, Farmer C, Salzman E, et al. (2019) State of the field: differentiating intellectual disability from autism spectrum disorder, In: Stavropoulos, K.K.M., McPartland, J.C., Editors. Front Psychiatry 10: 526. https://doi.org/10.3389/fpsyt.2019.00526
    [62] Blacher J, Baker BL, Moody CT (2022) Autism spectrum disorder versus intellectual disability, In: Stavropoulos, K.K.M., McPartland, J.C., Editors, Differential Diagnosis of Autism Spectrum Disorder. New York: Oxford Academic, 22-43. https://doi.org/10.1093/med-psych/9780197516881.003.0002
    [63] Engel-Yeger B, Hardal-Nasser R, Gal E (2011) Sensory processing dysfunctions as expressed among children with different severities of intellectual developmental disabilities. Res Dev Disabil 32: 1770-1775. https://doi.org/10.1016/j.ridd.2011.03.005
    [64] Mauerberg-deCastro E, Cozzani MV, Polanczyk SD, et al. (2009) Motor perseveration during an “A not B” task in children with intellectual disabilities. Hum Mov Sci 28: 818-832. https://doi.org/10.1016/j.humov.2009.07.010
    [65] van Santen JP, Sproat RW, Hill AP (2013) Quantifying repetitive speech in autism spectrum disorders and language impairment. Autism Res 6: 372-383. https://doi.org/10.1002/aur.1301
    [66] Gellini H, Marczak M (2024) “I always knew I was different”: experiences of receiving a diagnosis of autistic spectrum disorder in adulthood—a meta-ethnographic systematic review. Rev J Autism Dev Disord 11: 620-639. https://doi.org/10.1007/s40489-023-00356-8
    [67] Singer J (1998) Odd people in: the birth of community amongst people on the autistic spectrum. (Bachelor's thesis). University of Technology Sydney.
    [68] Singer J (2017) Neurodiversity: The Birth of an Idea. Independently published.
    [69] Singer J (2019) What is neurodiversity? Reflections on neurodiversity.
    [70] Sinclair J (1999) Don't Mourn for Us. Autistic Rights Movement UK.
    [71] Duchan JF (1985) Autistic behavior: deviant or different. Australian J Hum Commun Disord 13: 3-8. https://doi.org/10.3109/asl2.1985.13.issue-2.01
    [72] Wolfensberger W (1980) Research, empiricism, and the principle of normalization. SRV J 2: 29-35.
    [73] Silberman S (2015) Neurotribes: The Legacy of Autism and the Future of Neurodiversity. Avery.
    [74] Mottron L (2021) A radical change in our autism research strategy is needed: back to prototypes. Autism Res 14: 2213-2220. https://doi.org/10.1002/aur.2494
    [75] Mottron L, Bzdok D (2020) Autism spectrum heterogeneity: fact or artifact?. Mol Psychiatry 25: 3178-3185. https://doi.org/10.1038/s41380-020-0748-y
    [76] Taboas A, Doepke K, Zimmerman C (2022) Preferences for identity-first versus person-first language in a US sample of autism stakeholders. Autism 27: 565-570. https://doi.org/10.1177/13623613221130845
    [77] Miller D, Rees J, Pearson A (2021) “Masking is life”: experiences of masking in autistic and nonautistic adults. Autism Adulthood 3: 330-338. https://doi.org/10.1089/aut.2020.0083
    [78] Cridland EK, Jones SC, Caputi P, et al. (2014) Being a girl in a boys' world: investigating the experiences of girls with autism spectrum disorders during adolescence. J Autism Dev Disord 44: 1261-1274. https://doi.org/10.1007/s10803-013-1985-6
    [79] Roane HS, Fisher WW, Carr JE (2016) Applied behavior analysis as treatment for autism spectrum disorder. J Pediatr 175: 27-32. https://doi.org/10.1016/j.jpeds.2016.04.023
    [80] Carmona-Serrano N, López-Belmonte J, López-Núñez JA, et al. (2020) Trends in autism research in the field of education in web of science: a bibliometric study. Brain Sci 10: 1018. https://doi.org/10.3390/brainsci10121018
    [81] Graff HJ, Berkeley S, Evmenova AS, et al. (2014) Trends in autism research: a systematic journal analysis. Exceptionality 22: 158-172. https://doi.org/10.1080/09362835.2013.865532
    [82] Cage E, Crompton CJ, Dantas S, et al. (2024) What are the autism research priorities of autistic adults in Scotland?. Autism 28: 2179-2190. https://doi.org/10.1177/13623613231222656
    [83] Pellicano E, Dinsmore A, Charman T (2014) What should autism research focus upon? Community views and priorities from the United Kingdom. Autism 18: 756-770. https://doi.org/10.1177/1362361314529627
    [84] Roche L, Adams D, Clark M (2020) Research priorities of the autism community: a systematic review of key stakeholder perspectives. Autism 25: 336-348. https://doi.org/10.1177/1362361320967790
    [85] Garcia E (2021) We're Not Broken. HarperCollins.
    [86] Grinker RR (2015) Reframing the science and anthropology of autism. Cult Med Psychiatry 39: 345-350. https://doi.org/10.1007/s11013-015-9444-9
    [87] Price D (2022) Unmasking Autism: Discovering the New Faces of Neurodiversity. Harmony Books.
    [88] Eyal G, Hart B, Onculer E, et al. (2010) The autism matrix: the social origins of the autism epidemic. Polity Press.
    [89] Mottron L (2016) Is autism a different kind of intelligence? New insights from cognitive neurosciences. Bull Acad Natl Med 200: 423-434. https://doi.org/10.1016/S0001-4079(19)30719-8 (Article in French)
    [90] Mottron L (2024) Si l'autisme n'est pas une maladie, qu'est-ce? (If autism is not a disease, what is it?). Mardaga. (Book in French).
    [91] Grinker RR (2019) Autism, “Stigma,” Disability. Curr Anthropol 61. https://doi.org/10.1086/705748
    [92] Waltz M (2023) Autism: A Social and Medical History. Springer Nature.
    [93] Murray S (2008) Representing Autism: Culture, Narrative, Fascination. Liverpool University Press.
    [94] Nordahl-Hansen A (2017) Atypical: a typical portrayal of autism?. Lancet Psychiatry 4: 837-838. https://doi.org/10.1016/S2215-0366(17)30397-8
    [95] Horn JL (1989) Cognitive diversity: A framework of learning, In: Ackerman, D.P.L., Sternberg R.J., Glaser, R. Editors. Learning and individual differences: Advances in theory and research. W. H. Freeman, 61-116.
    [96] Stich S (1988) Reflective equilibrium, analytic epistemology and the problem of cognitive diversity. Synthese 74: 391-413.
    [97] Corbey R, Leerssen J (1991) Studying alterity: backgrounds and perspectives. In: Alterity, Identity, Image: Selves and Others in Society and Scholarship. Amsterdam: Rodopi.
    [98] Wulf C (2016) Exploring Alterity in a Globalized World. Routledge.
    [99] Schröder P (1938) Kinderpsychiatrie (Child Psychiatry). Monatsschrift für Psychiatrie und Neurologie 99: 267-293. https://doi.org/10.1159/000148673 (Article in German)
    [100] Scheepers F (2021) Mensen zijn ingewikkeld: Een pleidooi voor acceptatie van de werkelijkheid en het loslaten van modeldenken (People are complicated: A plea for acceptance of reality and letting go of model thinking). De Arbeiderspers. (Book in Dutch).
    [101] Plomin R (2018) Blueprint: How DNA Makes Us Who We Are. Allen Lane.
    [102] Rebecchi K (2023) Neurodiversité et autisme: entre handicap et différence, science et idéologie. Revue de la neurodiversité (Neurodiversity and autism: between disability and difference, science and ideology). 1: 25-51. hal-04142256. https://doi.org/10.31234/osf.io/bksxn (Article in French)
    [103] Hyman SE (2021) Psychiatric disorders: grounded in human biology but not natural kinds. Perspect Biol Med 64: 6-28. https://doi.org/10.1353/pbm.2021.0002
    [104] Cosgrove L, Krimsky S (2012) A comparison of DSM-IV and DSM-5 panel members' financial associations with industry: a pernicious problem persists. PLoS Med 9: e1001190. https://doi.org/10.1371/journal.pmed.1001190
    [105] Davis LC, Diianni AT, Drumheller SR, et al. (2024) Undisclosed financial conflicts of interest in DSM-5-TR: cross sectional analysis. BMJ 384: e076902. https://doi.org/10.1136/bmj-2023-076902
    [106] Bervoets J, Hens K (2020) Going beyond the Catch-22 of autism diagnosis and research. The moral implications of (Not) asking “What Is Autism?”. Front Psychol 11: 529193. https://doi.org/10.3389/fpsyg.2020.529193
    [107] Feyerabend P (1975) Against Method: Outline of an Anarchistic Theory of Knowledge. University of Minnesota Press.
    [108] Canguilhem G (2012) On the Normal and the Pathological. Springer Science & Business Media.
    [109] Foucault M (1972) Histoire de la folie à l'âge classique (History of Madness in the Classical Age). Gallimard. (Book in French).
    [110] Frances A (2014) Saving normal: An Insider's Revolt Against Out-of-Control Psychiatric Diagnosis, DSM-5, Big Pharma, and the Medicalization of Ordinary Life. William Morrow Paperbacks.
    [111] Szasz TS (1973) The Second Sin. Anchor Press.
  • Reader Comments
  • © 2025 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(602) PDF downloads(38) Cited by(1)

Figures and Tables

Figures(1)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog