Abstract:This paper is concerned with a Takagi-Sugeno (T-S) fuzzy dynamic positioning controller design for an unmanned marine vehicle (UMV) in network environments. Network-based T-S fuzzy dynamic positioning system (DPS) models for the UMV are first established. Then, stability and stabilization criteria are derived by taking into consideration an asynchronous difference between the normalized membership function of the T-S fuzzy DPS and that of the controller. The proposed stabilization criteria can stabilize states… Show more
“…For given parameters m, , , , and matrix sequence K , ∈ {1, . … , m}, system (6) is asymptotically stable if there exist matrices P > 0, Q 1 > 0, Q 2 > 0, R 1 > 0, R 2 > 0, W > 0 and N, M, T, S with appropriate dimensions such that…”
Section: Resultsmentioning
confidence: 99%
“…teleoperation control, artificial vehicles, industrial automation, and unmanned marine vehicles. [1][2][3][4][5][6][7][8][9] In spite of the benefits of NCSs, there are still many tough challenges in NCSs which has to be dealt with. In recent years, great efforts have been paid to NCSs and a rich body of pioneer research studies has emerged to solve the modeling, control, filtering, and estimation problems in NCSs (see other works [10][11][12][13][14][15][16][17][18] and the references therein).…”
Summary
This paper considers resilient event‐triggered control problem for a class of networked systems subject to randomly occurring deception attacks. First, a new memory event‐triggered scheme (METS) is proposed to reduce the utilization of communication resources while maintaining desired system performance. Different from some existing event‐triggered schemes, some recently released packets are firstly utilized in the proposed METS, which provides a better flexibility to improve the system dynamics. Second, considering the security problem of the networked control systems, a randomly occurring deception attack model is employed where the bounded malicious signals are injected by the adversary. Considering both the effects of METS and deception attack, new type of networked control system model is constructed and the corresponding memory state‐feedback controller is designed. Then, sufficient conditions for the asymptotical stability of the systems are derived by using a Lyapunov functional technique. Finally, the obtained results are verified through a pendulum system, which demonstrates the effectiveness of the proposed methods.
“…For given parameters m, , , , and matrix sequence K , ∈ {1, . … , m}, system (6) is asymptotically stable if there exist matrices P > 0, Q 1 > 0, Q 2 > 0, R 1 > 0, R 2 > 0, W > 0 and N, M, T, S with appropriate dimensions such that…”
Section: Resultsmentioning
confidence: 99%
“…teleoperation control, artificial vehicles, industrial automation, and unmanned marine vehicles. [1][2][3][4][5][6][7][8][9] In spite of the benefits of NCSs, there are still many tough challenges in NCSs which has to be dealt with. In recent years, great efforts have been paid to NCSs and a rich body of pioneer research studies has emerged to solve the modeling, control, filtering, and estimation problems in NCSs (see other works [10][11][12][13][14][15][16][17][18] and the references therein).…”
Summary
This paper considers resilient event‐triggered control problem for a class of networked systems subject to randomly occurring deception attacks. First, a new memory event‐triggered scheme (METS) is proposed to reduce the utilization of communication resources while maintaining desired system performance. Different from some existing event‐triggered schemes, some recently released packets are firstly utilized in the proposed METS, which provides a better flexibility to improve the system dynamics. Second, considering the security problem of the networked control systems, a randomly occurring deception attack model is employed where the bounded malicious signals are injected by the adversary. Considering both the effects of METS and deception attack, new type of networked control system model is constructed and the corresponding memory state‐feedback controller is designed. Then, sufficient conditions for the asymptotical stability of the systems are derived by using a Lyapunov functional technique. Finally, the obtained results are verified through a pendulum system, which demonstrates the effectiveness of the proposed methods.
“…and then applying free weighted technologies (18), (19), (23) and inequalities (16), (17), (22) to equality (15), it can be obtained that…”
Section: T; X R; T ð þ ðmentioning
confidence: 99%
“…However, in practical NCS, there inevitably exist time delay, quantization, data packet dropouts and other uncertainties because of the introduction of the communication network, which could cause negative impact on control systems, even lead to instability. Thus, increasing research interests have recently been paid to the study of the stability and stabilization with uncertainties and time‐varying delays, such as …”
Distributed parameter networked control systems mean distributed parameter systems are controlled through a network, where the control loops are closed. In this paper, the problem of guaranteed cost and state feedback controller design is investigated for a class of distributed parameter networked control systems. With the network factors, such as transmission delays, data packet dropouts considered, the distributed parameter networked control system is modeled as a linear closed‐loop system with time‐varying delay and uncertain parameters. By selecting an appropriate Lyapunov‐Krasovskii function and using linear matrix inequality (LMI) approach, the controller is designed to render the system stable and it can keep the cost function less than a certain upper value. In addition, numerical simulation is included to demonstrate the theoretical results.
“…Cyber‐physical systems (CPSs) where sampled signals and control inputs are generally transmitted via shared communication networks connect the cyber layer to the physical plant flexibly. Since the networks are vulnerable to cyber attacks, the analysis and control of critical infrastructures have witnessed increasing research interests, such as power‐grid, autonomous vehicles, and water distribution systems . The research areas on security of CPSs in the literature involve attack detection and identification, optimal attack scheduling, remote state estimation, resilient control under attacks, and so on.…”
Summary
This paper investigates the resilient control problem for constrained continuous‐time cyber‐physical systems subject to bounded disturbances and denial‐of‐service (DoS) attacks. A sampled‐data robust model predictive control law with a packet‐based transmission scheduling is taken advantage to compensate for the loss of the control data during the intermittent DoS intervals, and an event‐triggered control strategy is designed to save communication and computation resources. The robust constraint satisfaction and the stability of the closed‐loop system under DoS attacks are proved. In contrast to the existing studies that guarantee the system under DoS attacks is input‐to‐state stable, the predicted input error caused by the system constraints can be dealt with by the input‐to‐state practical stability framework. Finally, a simulation example is performed to verify the feasibility and efficiency of the proposed strategy.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.