2015
DOI: 10.1016/j.ins.2015.07.026
|View full text |Cite
|
Sign up to set email alerts
|

Multiple event-triggered H2/H∞ filtering for hybrid wired–wireless networked systems with random network-induced delays

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 62 publications
(20 citation statements)
references
References 38 publications
0
20
0
Order By: Relevance
“…By placing the series of estimates in ( 7 ) in the form of a deterministic trajectory function, ( 37 ) unifies the goals of STF as simply seeking a trajectory function that best explains the sensor data series in the time domain. To accommodate any a priori model information, F ( t ) may be specified as being a specific form of a few parameters or subject to certain constraints, denoted as F ( t; C ) where C denotes the set of the parameters or constraints.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…By placing the series of estimates in ( 7 ) in the form of a deterministic trajectory function, ( 37 ) unifies the goals of STF as simply seeking a trajectory function that best explains the sensor data series in the time domain. To accommodate any a priori model information, F ( t ) may be specified as being a specific form of a few parameters or subject to certain constraints, denoted as F ( t; C ) where C denotes the set of the parameters or constraints.…”
Section: Discussionmentioning
confidence: 99%
“…• Non-cooperative/intractable object motion: constrained [28,35,41] /sparse [1] /circular [19] state sequence and maneuvers [14,27,43] , etc., • Unknown background and sensor uncertainties: noise characteristics [8] , detection probability [13] , clutter rate and detection profiles [31,46,49] , network-induced delay [7] , etc., and • Imperfect data: asynchronous sensor data [14,42] , intractable likelihood [16,33,37,44] , measurement random latency [48] , outlier [32] and continuous-time observation [12] , etc.…”
Section: Motivation and Outlinementioning
confidence: 99%
“…() However, in real‐world networks, the nodes typically have higher‐dimensional states, which are coupled via multidimensional channels. () In such situations, the controllability issue becomes more complicated and challenging.…”
Section: Introductionmentioning
confidence: 99%
“…With the deep integration of electricity infrastructure and modern information and communication technology, a smart grid (SG) uses two-way flows of electricity and information to create a widely distributed automated energy delivery network [2][3][4][5][6][7][8][9][10], leading to the great improvement of the comprehensive level of automation and management. However, SG has been found vulnerable to cyberattacks as a large number of smart devices are deployed over unencrypted cyber communication environments [11][12][13][14][15]. Malicious cyberattacks are one type of the most popular cyberattacks, which may trigger the catastrophic damage to power supplies and widespread power outages [16,17].…”
Section: Introductionmentioning
confidence: 99%