2002
DOI: 10.1109/9.983370
|View full text |Cite
|
Sign up to set email alerts
|

Extremum seeking control for discrete-time systems

Abstract: The sets of events that operators 1 and 2 can trigger are, respectively, 6 t 1 = f 1 ; 1 ; 1 g and 6 t 2 = f 2 ; 2 ; 2 g. Similarly, the sets of events operators 1 and 2 can disable are, respectively, 6 d 1 = f1;1; 1g and 6 d 2 = f2;2; 2; 1g.If user 1 wants to insure safety (i.e., prevent the system from reaching any of the illegal states) and user 2 is not cooperative, then 6s = 6 d 1 .The legal language in this case is not controllable and the supremal controllable sublanguage is empty. However, if user 2 is… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
30
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 189 publications
(30 citation statements)
references
References 9 publications
0
30
0
Order By: Relevance
“…Extremum-seeking control (ESC) has grown to become the leading approach to solve real-time optimization problems [1]. Following the seminal work of Krstic and coworkers ( [2][3][4][5][6][7]), this general and practically relevant control approach is equipped with an established and well understood theoretical framework, as highlighted in the proof of Krstic and Wang [2]. The standard perturbation ESC algorithm has been generalized in various forms to handle output and input constraints.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Extremum-seeking control (ESC) has grown to become the leading approach to solve real-time optimization problems [1]. Following the seminal work of Krstic and coworkers ( [2][3][4][5][6][7]), this general and practically relevant control approach is equipped with an established and well understood theoretical framework, as highlighted in the proof of Krstic and Wang [2]. The standard perturbation ESC algorithm has been generalized in various forms to handle output and input constraints.…”
Section: Introductionmentioning
confidence: 99%
“…Although discrete-time systems can be treated in an essentially similar fashion, the application of gradient descent in a discrete-time setting requires some care. A discrete-time version of the standard ESC loop was studied in [4,6] where convergence results similar to continuous time systems are obtained. A similar algorithm was also proposed in [17] for the tuning of PID controllers in unknown dynamical systems using ESC.…”
Section: Introductionmentioning
confidence: 99%
“…Stanković and Stipanović [33] investigated discrete-time extremum seeking with sinusoidal perturbation including measurement noise. Liu and Krstić [34] and Choi et al [35] employed discrete-time ES for one-variable static system with an extremum using stochastic and sinusoidal perturbations, respectively.…”
Section: Introductionmentioning
confidence: 99%
“…Due to this error further assumptions are necessary. From Assumption 4, the ESC scheme of equation (1) need not be considered as a discrete system as in Choi et al (2002). Assumptions 5 and 6 are necessary to neglect any effect due to delay and delay variation (jitter), which is inevitable in a packet switched communication network according to the results of Zampieri (2008), Donkers et al (2011), andPremaratne (2014).…”
Section: Encoding Scheme and Communication Network Modelmentioning
confidence: 99%