1. Introduction
1.1. Engineering Background, Research Status and Motivation
The networked control system has been applied successfully in the areas of industry, medical treatment and transportation due to its capabilities/merits of long-distance task accomplishment, low system complexity and required cost, and efficient data sharing among controllers [1,2,3,4]. Efforts have been made to solve model-based control issues to ensure that closed-loop systems satisfy stability or other performance requirements; the corresponding results are reported in the literature (e.g., control, sliding mode control, consensus control, guaranteed cost control and dissipative control) [5,6,7]. Filtering/estimation is a parallel extension of control, and all of them constitute the classical issues in the control area to be solved using model-based investigation methods such as linear matrix inequality, the Riccati difference equation, or recursive filtering. For model-based control-related issues, the research stages include network-induced phenomena (incomplete measurement information, randomly occurring nonlinearities, parameter uncertainties, state saturations and dynamical bias), communication protocol (Round-Robin, weighted try-once-discard, random access, and FlexRay), coding–decoding mechanism (encryption-decryption, constrained bit rate, binary encoding scheme) and signal relay (amplify-and-forward, decode-and-forward, and full-duplex relay networks) [8,9,10,11].
In recent decades, proportional-integral-derivative (PID) control has been applied in various industrial areas with its characteristics such as strong robustness, simple principle, implementation convenience and wide application range [12,13,14,15,16]. Proportion represents the current information in the dynamic control process, which is to correct error and quicken the speed of response. Integration indicates the information in previous accumulation, which helps to eliminate the static error and improve the correctness of the system. Differentiation stands for the future information, which is capable of reflecting the changing tendency of the error signal of the system with lead control, reducing transient time, and enhancing the stability of system. In view of its prominent research significance, considerable attention has been paid to PID control issues [12,17,18,19,20,21]. For instance, in [17], the observer-based PID control problem has been solved for a class of actuator-saturated systems, and the measurement signal has been transmitted under the binary encoding scheme with the occurrence of random bit errors during the transmission. In [18], based on fading measurements, a novel output-feedback PID controller has been designed where the integral-loop has been equipped with the limited time-window for decreasing the computational burden. The orthogonal decomposition in combination with a free matrix has been adopted to promote the controller design. In [12], using the dynamic event-triggered mechanism with a dynamically adjusted threshold, the observer-based PID security control problem has been tackled for linear discrete-time systems suffering from randomly occurring deception attacks, and a new index for security level has been developed to characterize the impact of deception attack on the closed-loop system. Additionally, the problem of proportional-integral observer/estimator design has been dealt with, see [22,23,24] and the references therein.
As a kind of incomplete measurement, cyber attacks have aroused much attention from scholars all over the world, and model-based research methods have already been developed [25,26,27]. For deception attack (or false data injection attack), a nonlinear constraint condition or amplitude-bounded signal have been adopted to describe malicious signal [28]. When dealing with replay attack, time stamp has been utilized to mark the transmitted signal [29]. In consideration of the occurrence of a denial of service (DoS) attack, the receiver acquires nothing through the transmission process due to all the information being intercepted by attacker, the impact of which is similar to that of packet dropout [30]. For the compensation of current transmission, information on the last time step can be adopted instead. As an attacker in practice, energy replenishment may be needed in order to raise attack efficiency [31]. In periodic random DoS jamming attacks, the status of the attacker switches between two patterns (i.e., launching DoS attack and sleeping). Periodic random DoS jamming attacks exist in actual industrial cyber-physical systems such as an uninterruptible power supply and smart grid with a 4-bus model of the distribution test feeders. Considering its importance in ensuring the reliable operation of systems, security-guaranteed control or estimation issue has gained much attention from researchers [32,33,34]. In particular, owing to the normal working demand, there is an urgent need to design PID controller tolerating periodic random DoS jamming attacks from the viewpoint of defenders, which constitutes the research motivation of this paper. Appropriate mathematical models are used to reflect the alternation between the periods of attack and sleep, and conversion is conducted to transform the original issue into one that can be solved with existing methods.
In reality, the time delay phenomenon exists in numerous engineering systems such as chemical processes, electric power systems, mechanical transmission systems, traffic systems, and aerospace systems, which may occur during the measurement process of sensors or the transmission process of signals [35,36,37]. For time-delayed systems, the changing tendency of the state depends on not only the current state but also the previous states [38,39]. Noting that time delay would usually lead to the deterioration of the control performance of practical systems or even the destruction of the system stability, it is necessary to take time delay into account to cohere with the actual working state of systems and restrain the negative effect on the systems. In recent decades, despite the difficulties, analysis (e.g., stability and performance) and synthesis (e.g., control, estimation and filtering) issues for time-delayed systems have become a heated research topic in the control field in terms of the crucial theoretical significance and realistic value [40,41]. The types of time delays include constant time delay, time-varying time delay, infinitely/finitely distributed delays, multiple stochastic time-varying delays, mode-dependent mixed time-delays, and mode-dependent distributed delays [42,43]. Researchers have paid attention to the construction of a Lyapunov–Krasovskii functional based on types of time delays with less conservatism.
For networked control systems, there usually exist problems of communication constraints for network channels between sensor and controller/observer/estimator or between controller and actuator [44,45]. With increasing concern and emphasis on energy conservation in digital communication, preferable active approaches (e.g., event-triggered strategy, coding-decoding mechanism and communication protocol) have been employed during the information transmission to settle the issue of communication constraints instead of using passive modes [46,47,48]. In the event-triggered communication mechanism, with a threshold/parameter determining the triggering frequency, an event-triggered condition is given that ascertains whether there is a sufficient difference between the present measurement signal and the latest transmitted signal. Only when such an event-triggered condition is satisfied at a time step, i.e., the difference is large, is the sensor able to access the network to transmit data rather than transmitting data for each time step [49]. Event-triggered strategy exhibits the advantages of reducing unnecessary data transmission and the occupation of network communication resources, and avoids data congestion and inherent vulnerability. In the last two decades, event-triggered strategy has been applied in real systems such as hydraulic servo systems [49], single-link robot arms [41], and electric circuits with a parasitic capacitor and nonlinear resistor [50]. Noticing that the adoption of event-triggered mechanisms may decrease the system performance to a degree due to less current information being received, there should be balance between the performance degradation and the saving of network resources by selecting an appropriate threshold/parameter [51]. Event-triggered mechanisms may relate to absolute event triggering, relative event triggering, dynamic event triggering and self triggering, and the corresponding research has been conducted for complex dynamic networks, multi-rate systems, two-dimensional fuzzy systems, singularly perturbed systems and shift-varying linear repetitive processes [52]. It is worth pointing out that the event-based PID control issue for networked control systems has not been researched enough yet, not to mention the case that both infinitely distributed delays and periodic random DoS jamming attacks are considered, which constitutes another research motivation for this paper.
1.2. Main Work in This Paper
This paper is concerned with designing an PID controller for a class of discrete-time systems with infinitely distributed delays and periodic random DoS jamming attacks. Via adopting methods including the Lyapunov stability theory, stochastic analysis technique and matrix inequality manipulation, the desired PID controller is obtained in this paper. The following challenges need to be solved: (1) how to formulate the event-triggered PID control issue mathematically for discrete-time systems subject to periodic random DoS jamming attacks and infinitely distributed delays within a model-based unified research framework? (2) how to reflect the influence from periodic random DoS jamming attacks on the control performance? and (3) how to design the PID controller which ensures that the closed-loop system is exponentially stable in mean square and satisfies the performance. The crucial contributions of this paper are emphasized as follows: (1) the event-triggered observer-based PID control issue is, for the first time, dealt with for systems suffering from infinitely distributed delays and periodic random DoS jamming attacks; (2) a sufficient condition is put forward for the existence of the desired observer-based PID controller which guarantees exponential stability and performance of the closed-loop system; and (3) both observer gain and controller gain are computed readily via solving a certain linear matrix inequality.
The detailed structure of this paper is as follows. In Section 2, a mathematical model framework is constructed of PID control for systems with infinitely distributed delays and periodic random DoS jamming attacks. In Section 3, a sufficient condition is given for the presence of the PID controller which guarantees that the closed-loop system is exponentially stable in mean square and fulfils performance. Section 4 shows the simulation verification of the developed PID control method, and Section 5 provides a summary of the work in this paper.
Notation: Symbols used in this paper are general unless otherwise specified. shows the ♭-dimensional Euclidean space. For a matrix U, and represent the transpose and the orthogonal basis of the null space, respectively. stands for the space of square-summable v-dimensional vector functions over . represents a block-diagonal matrix. ⊗ indicates the Kronecker product. For a symmetric matrix, symbol ∗ is an ellipsis of symmetric terms. I and 0 show the identity matrix and zero matrix with proper dimensions, respectively. denotes the expectation of a random variable x. means the set of all non-positive integers. describes the set of positive integers. refers to the occurrence probability of event ‘·’.
2. Problem Formulation
Taking into account the following class of discrete-time networked control systems:
(1)
where is the system state vector, is the control input, is the exterior disturbance, is the measurement output, is the control output, and is the initial state. A, B, C, D, E, and M are known real constant matrices with suitable dimensions. The constants () fulfil the following constraint [42]:(2)
and the term is the infinitely distributed delay.Considering the bandwidth limitation of wireless communication channels, an event-triggered mechanism is introduced to regulate when to transmit the signal. The event-triggering function of the relative type : is expressed as follows:
(3)
where , is the latest time step at which signal transmission is possible, and scalar is a given threshold determining the triggering frequency.Note that signal transmission is permitted when the following event-triggering condition:
(4)
is satisfied. Therefore, time step of signal transmission is decided byIn fact, on account of complex practical conditions, it is difficult to obtain the state vector, so an observer is selected to estimate the state vector. In this paper, the observer structure is constructed as follows:
(5)
where is the estimate of and L is the observer gain to be ascertained.In order to ensure that the system (1) achieves the stability performance, a PID controller is modeled with the following expression:
(6)
where is the controller output, , and are controller gains to be designed, and represents the given time length.The input of the observer-based state-feedback PID controller (6) is the state estimate obtained by observer (5). The output of (6) consists of three parts, that is, , and represent the proportional term, the integral term and the derivative term, respectively.
Note that the control signal (6) may be subject to cyber attacks during the transmission from the controller to the actuator. Considering the attacker with constrained energy [31], the periodic random DoS jamming attacks are involved in this paper, and the period length is T with being a known scalar (see Figure 1).
Within the ()th ( is an integer) period, instead of launching attacks constantly, the adversary first restores energy without action, and then initiates an efficient random DoS attack. That is, the ()th period is divided into the sleeping period () and the attack period ().
The control signal subject to periodic random DoS jamming attacks is modeled as
(7)
where is the actual control input received by the actuator, is the Kronecker delta function characterizing the current period (, ) with and is a Bernoulli-distributed stochastic variable that satisfies with being a given scalar. From (7), it is obvious that when and , DoS attack occurs, and when and , DoS attack does not occur. It is evident that . The system structure studied in this paper is illustrated in Figure 2.Denoting , the estimation error is acquired from (1) and (5) as follows:
(8)
Define and . From (1) and (6)–(8), the following augmented system is acquired:
(9)
whereNow, we introduce the following definition which is important for subsequent analysis.
([53]). The closed-loop system (9) is exponentially mean-square stable if there are scalars and such that the following inequality:
(10)
holds.The aim of this paper is to design a PID controller with the form (6) which realizes the following two conditions concurrently:
(Q1) The closed-loop system is exponentially mean-square stable;
(Q2) For a given scalar , the controlled output under the initial condition satisfies
(11)
for all nonzero , where is a given scalar characterizing the disturbance rejection level.3. Main Results
A crucial Lemma is given as follows to assist with analysis.
([42]). Let be a positive semi-definite matrix, , and constants (). If the series is convergent, then one has
3.1. Performance Analysis of Stability and Noise Rejection
The main purpose of this section is, for discrete networked control systems (1) subjected to periodic random DoS jamming attacks (7), to design a PID controller to achieve system stability and meet specific requirements. In order to ensure that the system realizes the nature index on the basis of exponentially mean-square stability, Theorems 1 and 2 outline strict standard requirements. Then, the PID controller related data are fine-tuned on account of the resulting matrix inequality.
Let the scalars μ and γ, and matrices L, , and be known. The system (9) under periodic random DoS jamming attacks is exponentially mean-square stable and satisfies the performance constraint (11) if there exist positive definite matrices P, (), Q and a positive scalar σ such that the following inequality is satisfied:
(12)
where
Step 1. Define the Lyapunov–Krasovskii functional and compute the mathematical expectation of its difference with .
Define the Lyapunov–Krasovskii functional as follows:
(13)
whereCalculating the expectation of the difference of with , we can obtain
(14)
where ,(15)
and(16)
Step 2. Utilize the constraints on infinitely distributed delays and event-triggered mechanism.
According to Lemma 1, it is convenient to yield
(17)
where is defined in (2).Combining (13)–(17), one derives
(18)
In addition, considering the event-triggered mechanism (3) and (4), the following inequality is obtained:
(19)
When , for a positive scalar , we obtain from (18) and (19) that
(20)
whereStep 3. Analyze the exponential mean-square stability (10) of closed-loop system (9) via a manipulation technique of matrix inequality and realize the stability objective.
Applying the Schur Complement Lemma [54], it is obvious that can be ensured by (12). For a sufficiently small scalar , one has
(21)
According to the definition of , it is found that
(22)
and(23)
For an arbitrary scalar , we can deduce that
(24)
with .Summing the two sides of (24) from to leads to
(25)
which is equivalent to(26)
Letting
(27)
we obtain(28)
It is easy to prove that there exists so that . On the basis of (23), (26) and (28), we can obtain
(29)
which indicates the exponential stability of system (9) in mean square.Step 4. Discuss the performance (11) of system with nonzero under zero-initial condition and achieve the performance objective.
Next, we continue to verify the property (11) of the system (9) under the zero-initial condition. On the basis of (20), we find that
(30)
whereIt is seen from (13) that , which implies from (30) that
(31)
Summing up both sides in (31) concerning k from 0 to ∞ under a zero initial condition, we can acquire
(32)
At this point, the proof has been completed. □
Theorem 1 comprises the overall performance analysis result (12) for the closed-loop system (9) containing stability (10) and noise rejection (11). The proof of Theorem 1 is used to carry out performance analysis. Noting that the inequality (12) in Theorem 1 is nonlinear and cannot be solved directly for the gain parameters, further disposal is carried out in the following.
3.2. Parameter Design of Observer and PID Controller
Based on the performance analysis result in Theorem 1 of stability and noise rejection for system (9) subject to periodic random DoS jamming attacks, we design the gain parameters of the observer-based PID controller (6). In Theorem 2, a sufficient condition is established for the existence of the observer-based PID controller (5) and (6) which makes the closed-loop system (9) exponentially mean-square stable, and the gain parameters of the observer-based controller (5) and (6) are designed directly.
We consider threshold determining the triggering frequency and the noise rejection level . System (9) meets exponential mean-square stability and performance constraint (12) if there exist positive definite matrices , () and Q, matrices , , , , , and , and a positive scalar σ such that the following inequality is fulfilled:
(33)
where
Furthermore, the gain matrices of the observer (5) and the PID controller (6) are expressed by
Step 1. Separate nonlinear terms using inequality properties such as Schur Complement Lemma.
Rewrite (12) into the following form:
i.e.,(34)
whereApplying the Schur Complement Lemma to (34), one derives
(35)
Step 2. Eliminate inverse matrix by denoting new variables, and inequality operation and amplification.
Denote
(36)
Based on (36), pre- and post- multiplying inequality (35) by and its transposition, we yield
(37)
whereExpanding the expression of terms (e.g., , , , P) in (37), (37) is converted into the following equivalent inequality:
(38)
whereNoting that
we see that (38) is true if the following form(39)
is satisfied.Step 3. Perform variable substitution to express the unknown gain parameters and achieve the design objective of the desired controller.
Defining the following symbols:
it is obvious that inequality (39) is the same as inequality (33). Then, the closed-loop system (9) is exponentially stable in mean square with performance (11). The proof is completed at this point. □So far, we have designed the observer-based PID controller under an event-triggered mechanism. Theorem 1 provides the performance analysis result for the closed-loop system (9) with periodic random DoS jamming attacks and infinitely distributed delays, which shows stability and noise rejection. Depending on Theorem 1, Theorem 2 provides a way to solve the PID controller parameters. That is, by computing a feasible solution to the matrix inequality (33) via the YALMIP toolbox of MATLAB software, the gain parameters of the observer (5) and the controller (6) are obtained directly. All the system parameters are reflected in Theorem 2 such as the occurring probability of periodic random DoS jamming attacks, the threshold determining the triggering frequency, the parameter in the constraint condition of infinitely distributed delays, and the disturbance rejection level.
Aiming at solving the stability and performance problems of systems under periodic random DoS jamming attacks, this paper designs a PID controller with observer for state estimation. This paper provides the following innovations: (1) the discussed security-guaranteed PID control issue in this paper is new which comprises infinitely distributed delays, event-triggered strategy, and periodic random DoS jamming attacks; (2) the control method is put forward which makes the system be exponentially mean-square stable and satisfy the required performance of noise rejection; and (3) the unknown gain parameters of the observer and the controller are determined conveniently via solving the matrix inequality.
4. Simulation Example
In this section, a numerical simulation example is shown to verify the correctness and effectiveness of the designed PID controller (5) and (6) for system (1).
Targeted at the networked control system (1) under the event-triggered mechanism (4) with the control signal (7) attacked by periodic random DoS jamming attacks in this paper, the following parameters are chosen [55]:
Let the constant sequence be selected as . It is easy to check that , which satisfies the convergence condition (2).
By solving the inequality (33) using the YALMIP toolbox in MATLAB software, the solution set is obtained as follows:
The gain parameters of the observer-based controller (5) and (6) are computed, and stability and noise rejection, using (10) and (11), are achieved as follows:
The disturbance is represented as . The initial states of system (1) are specified as an array of random numbers chosen from a standard normal distribution. The initial states of the observer (5) are set as . The duration of one period is supposed as , the time of replenishing energy is given as , and the total operating time is , namely . The curves obtained through the simulation are shown in Figure 3, Figure 4, Figure 5, Figure 6, Figure 7, Figure 8, Figure 9, Figure 10 and Figure 11. Figure 3 plots the closed-loop control output with the control input and the open-loop output without the control input, respectively. In Figure 3, is the th element of . The open-loop and closed-loop state trajectories are drawn in Figure 4, where shows the 𝚥th element of . In Figure 5, states of system (1) and the observer (5) are plotted, respectively, in which indicates the ℑth element of . The performance is presented in Figure 6, which illustrates that the influence is rejected below index from the external disturbance on the control output. An event-triggering situation is shown in Figure 7. The occurrence situation of periodic random DoS jamming attacks is seen in Figure 8, where means that a DoS attack appears. State and performances are shown in Figure 9 and Figure 10, respectively, under different occurrence probabilities of attack. It is seen that the exponential mean-square stability and the performance are always satisfied using the developed control method in this paper. It also indicates from Figure 9 and Figure 10 that the bigger the occurrence probability of attack, the slower the convergence rate, and the worse the performance. State under different values of thresholds for event-triggering frequency is shown in Figure 11, which exhibits that the bigger the value of , the more difficult it is to realize event triggering (the longer the convergence time). Thus, the simulation results indicate that the designed PID control method is effective and reliable.
5. Discussion and Conclusions
In this paper, an event-triggered PID controller has been designed for systems suffering from periodic random DoS jamming attacks and infinitely distributed delays. Actual periodic random DoS jamming attacks have been modeled using the Kronecker delta function and a Bernoulli-distributed random variable. Infinitely distributed delays have been taken into consideration to coincide with the working situation. A relative event-triggered protocol has been adopted which promotes energy-saving and reduced consumption. An observer-based PID controller has been formulated and devised to achieve the performance requirements for the closed-loop system containing exponential mean-square stability and index by performance analysis. A sufficient condition has been acquired which ensures the existence of the proper observer-based PID controller via stability discussion, stochastic property usage and matrix inequality disposal. Gain parameters of the observer and the PID controller have been solved by computing the feasible solution to a matrix inequality. Simulation results have demonstrated the correctness of the developed PID control method.
In comparison with [17,47], (1) the system model under consideration in this paper is novel and comprehensive, which involves infinitely distributed delays, periodic random DoS jamming attacks and an event-triggered mechanism reducing transmission frequency; (2) the developed control method is new which solves the PID control problem for such a comprehensive system due to the existing methods being no longer valid without considering the influence of delays, periodic random DoS jamming attacks and the event-triggered mechanism; and (3) gain parameters of both the observer and the PID controller for such a comprehensive system are computed conveniently by solving the feasible solution to a specific matrix inequality.
Note that the developed PID control method can be applied to the control problem of a geared DC motor of the MS150 Modular Servo System [56], and the diesel engine (with an exhaust gas recirculation, valve and a turbo compressor with a variable geometry turbine) [57].
There exist some limitations to this paper, including that (1) the employed way to guarantee security is “passive”; and (2) the adoption of a big/improper event-triggered threshold may reduce the control effect. As for future research topics, we would like to (1) consider an “active” way to guarantee security, such as attack compensation [58]; (2) perform controller design by utilizing the dynamic event-triggering mechanism with an adaptive threshold [12]; and (3) extend the obtained result to more complex systems such as systems with uncertainty [3], multi-rate measurement [22], encoding-decoding schemes [17] and other communication protocols [10,25].
Methodology, D.Z. and W.L.; software, F.Y.; validation, N.H., W.L. and Y.S.; formal analysis, F.Y.; investigation, D.Z.; writing—original draft preparation, D.Z.; writing—review and editing, N.H. and Y.S. All authors have read and agreed to the published version of the manuscript.
Not applicable.
The authors declare no conflict of interest.
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Figure 5. States [Forumla omitted. See PDF.] and observer states [Forumla omitted. See PDF.].
Figure 9. State [Forumla omitted. See PDF.] under different values of [Forumla omitted. See PDF.].
Figure 10. [Forumla omitted. See PDF.] performance under different values of [Forumla omitted. See PDF.].
Figure 11. State [Forumla omitted. See PDF.] under different values of [Forumla omitted. See PDF.].
References
1. Wang, L.; Zhao, D.; Zhang, Y.; Ding, D.; Yi, X. Gain-scheduled state estimation for discrete-time complex networks under bit-rate constraints. Neurocomputing; 2022; 488, pp. 120-129. [DOI: https://dx.doi.org/10.1016/j.neucom.2022.03.002]
2. Shi, P.; Sun, W.; Yang, X.; Rudas, I.J.; Gao, H. Master-slave synchronous control of dual drive gantry stage with cogging force compensation. IEEE Trans. Syst. Man Cybern. Syst.; 2023; 53, pp. 216-225. [DOI: https://dx.doi.org/10.1109/TSMC.2022.3176952]
3. Tan, H.; Shen, B.; Peng, K.; Liu, H. Robust recursive filtering for uncertain stochastic systems with amplify-and-forward relays. Int. J. Syst. Sci.; 2020; 51, pp. 1188-1199. [DOI: https://dx.doi.org/10.1080/00207721.2020.1754960]
4. Liu, Z.; Gao, H.; Lin, W.; Qiu, J.; Rodríguez-Andina, J.J.; Qu, D. B-spline wavelet neural network-based adaptive control for linear motor-driven systems via a novel gradient descent algorithm. IEEE Trans. Ind. Electron.; 2023; in press [DOI: https://dx.doi.org/10.1109/TIE.2023.3260318]
5. Cai, M.; He, X.; Zhou, D. Performance-improved finite-time fault-tolerant control for linear uncertain systems with intermittent faults: An overshoot suppression strategy. Int. J. Syst. Sci.; 2022; 53, pp. 3408-3425. [DOI: https://dx.doi.org/10.1080/00207721.2022.2083261]
6. Bu, X.; Hou, Z.; Zhang, H. Data-Driven multiagent systems consensus tracking using model free adaptive control. IEEE Trans. Neural Netw. Learn. Syst.; 2018; 29, pp. 1514-1524. [DOI: https://dx.doi.org/10.1109/TNNLS.2017.2673020]
7. Gao, C.; He, X.; Dong, H.; Liu, H.; Lyu, G. A survey on fault-tolerant consensus control of multi-agent systems: Trends, methodologies and prospects. Int. J. Syst. Sci.; 2022; 53, pp. 2800-2813. [DOI: https://dx.doi.org/10.1080/00207721.2022.2056772]
8. Wang, L.; Zhao, D.; Wang, Y.-A.; Ding, D.; Liu, H. Partial-neurons-based state estimation for artificial neural networks under constrained bit rate: The finite-time case. Neurocomputing; 2022; 488, pp. 144-153. [DOI: https://dx.doi.org/10.1016/j.neucom.2022.03.001]
9. Su, Y.; Cai, H.; Huang, J. The cooperative output regulation by the distributed observer approach. Int. J. Netw. Dynam. Int.; 2022; 1, pp. 20-35. [DOI: https://dx.doi.org/10.53941/ijndi0101003]
10. Liu, Y.; Wang, Z.; Liu, C.; Coombes, M.; Chen, W.-H. Auxiliary particle filtering over sensor networks under protocols of amplify-and-forward and decode-and-forward relays. IEEE Trans. Signal Inf. Process. Netw.; 2022; 8, pp. 883-893. [DOI: https://dx.doi.org/10.1109/TSIPN.2022.3212318]
11. Tan, H.; Shen, B.; Li, Q.; Qian, W. Recursive filtering for nonlinear systems with self-interferences over full-duplex relay networks. IEEE-CAA J. Autom.; 2022; 9, pp. 2037-2040. [DOI: https://dx.doi.org/10.1109/JAS.2022.105965]
12. Zhao, D.; Wang, Z.; Wei, G.; Han, Q.-L. A dynamic event-triggered approach to observer-based PID security control subject to deception attacks. Automatica; 2020; 120, pp. 109128:1-109128:13. [DOI: https://dx.doi.org/10.1016/j.automatica.2020.109128]
13. Zhao, D.; Wang, Z.; Ho, D.W.C.; Wei, G. Observer-based PID security control for discrete time-delay systems under cyber-attacks. IEEE Trans. Syst. Man Cybern. Syst.; 2021; 51, pp. 3926-3938. [DOI: https://dx.doi.org/10.1109/TSMC.2019.2952539]
14. Su, C.-L.; Chang, W.-J.; Pen, C.-L. Decentralized multi-performance fuzzy control for nonlinear large-scale descriptor systems. Processes; 2022; 10, 2578. [DOI: https://dx.doi.org/10.3390/pr10122578]
15. Zhang, Q.; Zhou, Y. Recent advances in non-Gaussian stochastic systems control theory and its applications. Int. J. Netw. Dynam. Int.; 2022; 1, pp. 111-119. [DOI: https://dx.doi.org/10.53941/ijndi0101010]
16. Chang, W.-J.; Lin, Y.-W.; Lin, Y.-H.; Pen, C.-L.; Tsai, M.-H. Actuator saturated fuzzy controller design for interval Type-2 Takagi-Sugeno fuzzy models with multiplicative noises. Processes; 2021; 9, 823. [DOI: https://dx.doi.org/10.3390/pr9050823]
17. Wen, P.; Dong, H.; Huo, F.; Li, J.; Lu, X. Observer-based PID control for actuator-saturated systems under binary encoding scheme. Neurocomputing; 2022; 499, pp. 54-62. [DOI: https://dx.doi.org/10.1016/j.neucom.2022.05.035]
18. Zhao, D.; Wang, Z.; Ding, D.; Wei, G. H∞ PID control with fading measurements: The output-feedback case. IEEE Trans. Syst. Man Cybern. Syst.; 2020; 50, pp. 2170-2180. [DOI: https://dx.doi.org/10.1109/TSMC.2018.2809489]
19. Lian, S.; Meng, W.; Lin, Z.; Shao, K.; Zheng, J.; Li, H.; Lu, R. Adaptive attitude control of a quadrotor using fast nonsingular terminal sliding mode. IEEE Trans. Ind. Electron.; 2022; 69, pp. 1597-1607. [DOI: https://dx.doi.org/10.1109/TIE.2021.3057015]
20. Liu, Z.; Lin, W.; Yu, X.; Rodríguez-Andina, J.J.; Gao, H. Approximation-free robust synchronization control for dual-linear-motors-driven systems with uncertainties and disturbances. IEEE Trans. Ind. Electron.; 2022; 69, pp. 10500-10509. [DOI: https://dx.doi.org/10.1109/TIE.2021.3137619]
21. Bao, G.; Ma, L.; Yi, X. Recent advances on cooperative control of heterogeneous multi-agent systems subject to constraints: A survey. Syst. Sci. Control Eng.; 2022; 10, pp. 539-551. [DOI: https://dx.doi.org/10.1080/21642583.2022.2074169]
22. Zhao, D.; Wang, Z.; Wang, L.; Wei, G. Proportional-integral observer design for multirate-networked systems under constrained bit rate: An encoding-decoding mechanism. IEEE Trans. Cybern.; 2022; in press [DOI: https://dx.doi.org/10.1109/TCYB.2022.3165041] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/35468076]
23. Zhao, D.; Wang, Z.; Chen, Y.; Wei, G.; Sheng, W. Partial-neurons-based proportional-integral observer design for artificial neural networks: A multiple description encoding scheme. IEEE Trans. Neural Netw. Learn. Syst.; 2022; in press [DOI: https://dx.doi.org/10.1109/TNNLS.2022.3209632]
24. Yang, F.; Li, J.; Dong, H.; Shen, Y. Proportional-integral-type estimator design for delayed recurrent neural networks under encoding-decoding mechanism. Int. J. Syst. Sci.; 2022; 53, pp. 2729-2741. [DOI: https://dx.doi.org/10.1080/00207721.2022.2063968]
25. Meng, X.; Chen, Y.; Ma, L.; Liu, H. Protocol-based variance-constrained distributed secure filtering with measurement censoring. Int. J. Syst. Sci.; 2022; 53, pp. 3322-3338. [DOI: https://dx.doi.org/10.1080/00207721.2022.2080297]
26. Sun, Y.; Tian, X.; Wei, G. Finite-time distributed resilient state estimation subject to hybrid cyber-attacks: A new dynamic event-triggered case. Int. J. Syst. Sci.; 2022; 53, pp. 2832-2844. [DOI: https://dx.doi.org/10.1080/00207721.2022.2083256]
27. Yao, F.; Ding, Y.; Hong, S.; Yang, S.-H. A survey on evolved LoRa-based communication technologies for emerging internet of things applications. Int. J. Netw. Dynam. Int.; 2022; 1, pp. 4-19. [DOI: https://dx.doi.org/10.53941/ijndi0101002]
28. Pang, Z.H.; Fan, L.Z.; Guo, H.; Shi, Y.; Chai, R.; Sun, J.; Liu, G. Security of networked control systems subject to deception attacks: A survey. Int. J. Syst. Sci.; 2022; 53, pp. 3577-3598. [DOI: https://dx.doi.org/10.1080/00207721.2022.2143735]
29. Zou, L.; Wang, Z.; Hu, J.; Liu, Y.; Liu, X. Communication-protocol-based analysis and synthesis of networked systems: Progress, prospects and challenges. Int. J. Syst. Sci.; 2021; 52, pp. 3013-3034. [DOI: https://dx.doi.org/10.1080/00207721.2021.1917721]
30. Tao, H.; Tan, H.; Chen, Q.; Liu, H.; Hu, J. H∞ state estimation for memristive neural networks with randomly occurring DoS attacks. Syst. Sci. Control Eng.; 2022; 10, pp. 154-165. [DOI: https://dx.doi.org/10.1080/21642583.2022.2048322]
31. Su, L.; Ye, D. Reprint of: Observer-based output feedback H∞ control for cyber-physical systems under randomly occurring packet dropout and periodic DoS attacks. ISA Trans.; 2020; 104, pp. 26-35. [DOI: https://dx.doi.org/10.1016/j.isatra.2020.08.040] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/32891420]
32. Li, X.-M.; Yao, D.; Li, P.; Meng, W.; Li, H.; Lu, R. Secure finite-horizon consensus control of multiagent systems against cyber attacks. IEEE Trans. Cybern.; 2022; 52, pp. 9230-9239. [DOI: https://dx.doi.org/10.1109/TCYB.2021.3052467] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/33729965]
33. Yu, G.-R.; Chang, Y.-D.; Chang, C.-H. Synthesis of polynomial fuzzy model-based designs with synchronization and secure communications for chaos systems with H∞ performance. Processes; 2021; 9, 2088. [DOI: https://dx.doi.org/10.3390/pr9112088]
34. Wu, J.; Peng, C.; Yang, H.; Wang, Y.L. Recent advances in event-triggered security control of networked systems: A survey. Int. J. Syst. Sci.; 2022; 53, pp. 2624-2643. [DOI: https://dx.doi.org/10.1080/00207721.2022.2053893]
35. Xiao, B.; Hu, Q.; Zhang, Y. Adaptive sliding mode fault tolerant attitude tracking control for flexible spacecraft under actuator saturation. IEEE Trans. Control Syst. Technol.; 2012; 20, pp. 1605-1612. [DOI: https://dx.doi.org/10.1109/TCST.2011.2169796]
36. Wang, Y.; Ren, W.; Liu, Z.; Li, J.; Zhang, D. T-S fuzzy model-based fault detection for continuous stirring tank reactor. Processes; 2021; 9, 2127. [DOI: https://dx.doi.org/10.3390/pr9122127]
37. Wang, X.; Sun, Y.; Ding, D. Adaptive dynamic programming for networked control systems under communication constraints: A survey of trends and techniques. Int. J. Netw. Dynam. Int.; 2022; 1, pp. 85-98. [DOI: https://dx.doi.org/10.53941/ijndi0101008]
38. Hou, Z.; Xiong, S. On model-free adaptive control and its stability analysis. IEEE Trans. Autom. Control; 2019; 64, pp. 4555-4569. [DOI: https://dx.doi.org/10.1109/TAC.2019.2894586]
39. Wang, L.; Liu, S.; Zhang, Y.; Ding, D.; Yi, X. Non-fragile l2-l∞ state estimation for time-delayed artificial neural networks: An adaptive event-triggered approach. Int. J. Syst. Sci.; 2022; 53, pp. 2247-2259. [DOI: https://dx.doi.org/10.1080/00207721.2022.2049919]
40. Zhang, Y.; Jiang, J. Fault tolerant control system design with explicit consideration of performance degradation. IEEE Trans. Aerosp. Electron. Syst.; 2003; 39, pp. 838-848. [DOI: https://dx.doi.org/10.1109/TAES.2003.1238740]
41. Zhuang, G.; Wang, X.; Xia, J.; Wang, Y. Observer-based asynchronous feedback H∞ control for delayed fuzzy implicit jump systems under HMM and event-trigger mechanisms. Inf. Sci.; 2023; 631, pp. 45-64. [DOI: https://dx.doi.org/10.1016/j.ins.2023.02.040]
42. Liu, Y.; Wang, Z.; Liang, J.; Liu, X. Synchronization and state estimation for discrete-time complex networks with distributed delays. IEEE Trans. Syst. Man Cybern. Part B (Cybern.); 2008; 38, pp. 1314-1325.
43. Xu, J.; Sheng, L.; Gao, M. Fault estimation for nonlinear systems with sensor gain degradation and stochastic protocol based on strong tracking filtering. Syst. Sci. Control Eng.; 2021; 9, pp. 60-70. [DOI: https://dx.doi.org/10.1080/21642583.2020.1833789]
44. Shakiba, F.M.; Shojaee, M.; Azizi, S.M.; Zhou, M. Real-time sensing and fault diagnosis for transmission lines. Int. J. Netw. Dynam. Int.; 2022; 1, pp. 36-47. [DOI: https://dx.doi.org/10.53941/ijndi0101004]
45. Voortman, Q.; Efimov, D.; Pogromsky, A.Y.; Richard, J.-P.; Nijmeijer, H. An event-triggered observation scheme for systems with perturbations and data rate constraints. Automatica; 2022; 145, pp. 110512:1-110512:10. [DOI: https://dx.doi.org/10.1016/j.automatica.2022.110512]
46. Li, M.; Liang, J.; Wang, F. Robust set-membership filtering for two-dimensional systems with sensor saturation under the Round-Robin protocol. Int. J. Syst. Sci.; 2022; 53, pp. 2773-2785. [DOI: https://dx.doi.org/10.1080/00207721.2022.2049918]
47. Wen, P.; Li, X.; Hou, N.; Mu, S. Distributed recursive fault estimation with binary encoding schemes over sensor networks. Syst. Sci. Control Eng.; 2022; 10, pp. 417-427. [DOI: https://dx.doi.org/10.1080/21642583.2022.2063203]
48. Li, X.; Han, F.; Hou, N.; Dong, H.; Liu, H. Set-membership filtering for piecewise linear systems with censored measurements under Round-Robin protocol. Int. J. Syst. Sci.; 2020; 51, pp. 1578-1588. [DOI: https://dx.doi.org/10.1080/00207721.2020.1768453]
49. Shen, W.; Liu, S.; Liu, M. Adaptive sliding mode control of hydraulic systems with the event trigger and finite-time disturbance observer. Inf. Sci.; 2021; 569, pp. 55-69. [DOI: https://dx.doi.org/10.1016/j.ins.2021.03.051]
50. Tan, Y.; Liu, J.; Xie, X.; Tian, E.; Liu, J. Event-triggered sliding-mode control for fuzzy semi-Markovian jump systems with dead zone input and application to circuit systems. IEEE Trans. Circuits Syst. II Express Briefs; 2023; in press [DOI: https://dx.doi.org/10.1109/TCSII.2023.3257088]
51. Li, C.; Wang, Z.; Song, W.; Zhao, S.; Wang, J.; Shan, J. Resilient unscented Kalman filtering fusion with dynamic event-triggered scheme: Applications to multiple unmanned aerial vehicles. IEEE Trans. Control Syst. Technol.; 2023; 31, pp. 370-381. [DOI: https://dx.doi.org/10.1109/TCST.2022.3180942]
52. Jia, C.; Hu, J.; Chen, D.; Cao, Z.; Huang, J.; Tan, H. Adaptive event-triggered state estimation for a class of stochastic complex networks subject to coding-decoding schemes and missing measurements. Neurocomputing; 2022; 494, pp. 297-307. [DOI: https://dx.doi.org/10.1016/j.neucom.2022.04.096]
53. Shen, Y.; Wu, Z.-G.; Shi, P.; Chen, B. H∞ control of constrained Markov jump systems with intermittent mode information loss. IEEE Trans. Autom. Control; 2023.in press [DOI: https://dx.doi.org/10.1109/TAC.2023.3258453]
54. Boyd, S.; Ghaoui, L.E.; Feron, E.; Balakrishnan, V. Linear Matrix Inequalities in System and Control Theory; SIAM: Philadelphia, PA, USA, 1994; pp. 7-8.
55. Li, Z.; Wang, Z.; Ding, D.; Shu, H. Non-fragile H∞ control with randomly occurring gain variations, distributed delays and channel fadings. IET Control Theory Appl.; 2015; 9, pp. 222-231. [DOI: https://dx.doi.org/10.1049/iet-cta.2014.0426]
56. Zhang, H.; Shi, Y.; Mehr, A.S. Robust static output feedback control and remote PID design for networked motor systems. IEEE Trans. Ind. Electron.; 2011; 58, pp. 5396-5405. [DOI: https://dx.doi.org/10.1109/TIE.2011.2107720]
57. Zhang, X.-M.; Han, Q.-L. A decentralized event-triggered dissipative control scheme for systems with multiple sensors to sample the system outputs. IEEE Trans. Cybern.; 2016; 46, pp. 2745-2757. [DOI: https://dx.doi.org/10.1109/TCYB.2015.2487420] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/26513821]
58. Su, L.; Ye, D. A cooperative detection and compensation mechanism against denial-of-service attack for cyber-physical systems. Inform. Sci.; 2018; 444, pp. 122-134. [DOI: https://dx.doi.org/10.1016/j.ins.2018.02.066]
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
This paper is concerned with the observer-based
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details
1 Sanya Offshore Oil & Gas Research Institute, Northeast Petroleum University, Sanya 572025, China; Artificial Intelligence Energy Research Institute, Northeast Petroleum University, Daqing 163318, China; Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control, Northeast Petroleum University, Daqing 163318, China
2 Daqing Emergency Repair Center of National Pipe Network Group North Pipeline Co., Ltd., Daqing 163453, China