2012
DOI: 10.1155/2012/927878
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy Networked Control Systems Design Considering Scheduling Restrictions

Abstract: Nowadays network control systems present a common approximation when connectivity is the issue to be solved based on time delays coupling from external factors. However, this approach tends to be complex in terms of time delays. Therefore, it is necessary to study the behavior of the delays as well as the integration into differential equations of these bounded delays. The related time delays needs to be known a priory but from a dynamic real-time behavior. To do so, the use of priority dynamic Priority exchan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2014
2014
2015
2015

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…Consider the reduced-order DOFC design, that is, s = 1 < n. Solving the quantized H ∞ DOFC problem by means of the designed algorithm of quantized H ∞ DOFC implies that the minimum γ is equal to γ = 5.14, and the corresponding reduced-order DOFC parameters are given aŝ Now, we illustrate effectiveness of the quantized H ∞ DOFC designed in (8) through simulation. The repeated scalar nonlinearity in (7) is chosen as g(x(k)) = sin(x(k)), which satisfies (2). Let the initial conditions be r 0 = 1.…”
Section: Numerical Examplesmentioning
confidence: 99%
See 1 more Smart Citation
“…Consider the reduced-order DOFC design, that is, s = 1 < n. Solving the quantized H ∞ DOFC problem by means of the designed algorithm of quantized H ∞ DOFC implies that the minimum γ is equal to γ = 5.14, and the corresponding reduced-order DOFC parameters are given aŝ Now, we illustrate effectiveness of the quantized H ∞ DOFC designed in (8) through simulation. The repeated scalar nonlinearity in (7) is chosen as g(x(k)) = sin(x(k)), which satisfies (2). Let the initial conditions be r 0 = 1.…”
Section: Numerical Examplesmentioning
confidence: 99%
“…Over the last decades, a great deal of effort has been devoted to the analysis and synthesis of MJS. For some representative work on this general topic, we refer to [1], [2], [4], [5], [9]- [11], [13]- [15], [17] and the references therein.…”
Section: Introductionmentioning
confidence: 99%
“…Now, in order to design a proper control law capable to cope with those time delays, it is feasible to design a state space control as proposed by [20] where an extensive review of related dynamic Matrix of Control law A c j is given.…”
Section: Actuators Plant Sensorsmentioning
confidence: 99%
“…Time delays injected by a hacker in a control system would, in general, destabilize the system or cause inefficiency in performance of the system. This is a new attack in the context of power systems (e.g., load frequency control (LFC)) on networked control systems (NCS) [13] and is named time-delay-switch attack or TDS for short [4]. To avoid possible damage of TDS attacks, systems and controllers must be redesigned in a way to detect and correct for variable time delays.…”
Section: Introductionmentioning
confidence: 99%