2021
DOI: 10.1080/00207721.2020.1868615
|View full text |Cite
|
Sign up to set email alerts
|

Recursive filtering of networked nonlinear systems: a survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
71
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
9

Relationship

3
6

Authors

Journals

citations
Cited by 197 publications
(71 citation statements)
references
References 111 publications
0
71
0
Order By: Relevance
“…Lastly, we give two numerical examples to prove the effectiveness of the proposed method; simulation results show that this method meets the expected requirement well, realizes the synchronization of the master-slave DNNs, and saves the limited network resources effectively. Considering that there are many unpredictable factors in the real operating environment, such as strong signal attenuation and cyberattacks [39], the synchronization and state estimation…”
Section: Discussionmentioning
confidence: 99%
“…Lastly, we give two numerical examples to prove the effectiveness of the proposed method; simulation results show that this method meets the expected requirement well, realizes the synchronization of the master-slave DNNs, and saves the limited network resources effectively. Considering that there are many unpredictable factors in the real operating environment, such as strong signal attenuation and cyberattacks [39], the synchronization and state estimation…”
Section: Discussionmentioning
confidence: 99%
“…According to the expression of (20), it shows the relation of Δu k+1 and Δu k . However, the relation of Δu k and e k is not clear, and it plays an important role in our next analysis.…”
Section: Design Of Average-iterative Learning Controllermentioning
confidence: 99%
“…Coincidentally, Bu et al made a more in-depth study on data-driven ILC and solved the problem of data quantization and limited sensor output [17][18][19]. Bandwidth issues [20] and cyberattacks also increase the difficulty of achieving multiagent consistency control. In [21], a method of dynamic event-triggered scheduling was proposed to deal with the problem of limited bandwidth.…”
Section: Introductionmentioning
confidence: 99%
“…The effectiveness of the proposed method is verified by two examples. Our future work will consider some network-induced complexities such as network-induced time-delays [42] and security-related issues [43].…”
Section: Examplesmentioning
confidence: 99%