-
作者:Lin, Xiangze; Liu, Yuanshan; Park, Ju H.
作者单位:Nanjing Agricultural University; Yeungnam University
摘要:Output feedback control of switched nonlinear planar systems (SNPSs) with quantized after being sampled information under arbitrary switchings is mainly investigated. Output signals are sampled by meticulously constructed switched dynamic event-triggered mechanisms (SDE-TMs). Then, the sampled information is further quantized by logarithmic quantizer, transmitted by network and converted to analog signals by a zero-order holder. Just leveraging this quantized-after-sampled information, switche...
-
作者:Uzun, Samet; Ure, Nazm Kemal; Ackmese, Behcet
作者单位:University of Washington; University of Washington Seattle; Istanbul Technical University
摘要:This article introduces a decentralized state-dependent Markov chain synthesis (DSMC) algorithm for finite-state Markov chains. We present a state-dependent consensus protocol that achieves exponential convergence under mild technical conditions, without relying on any connectivity assumptions regarding the dynamic network topology. Utilizing the proposed consensus protocol, we develop the DSMC algorithm, updating the Markov matrix based on the current state while ensuring the convergence cond...
-
作者:Khong, Sei Zhen; Lanzon, Alexander
作者单位:National Sun Yat Sen University; University of Manchester
摘要:We show that a recent dissipativity approach to feedback stability analysis of potentially open-loop unstable systems, which encompasses the classical soft integral quadratic constraint (IQC) theorem, may be recovered by hard IQC theory. The latter is known to be subsumable by the more general soft IQC theory endowed with homotopies that are continuous in the gap topology. In addition, we demonstrate how the aforementioned classical soft IQC theorem, initially introduced for the analysis of a ...
-
作者:Komaee, Arash
作者单位:Southern Illinois University System; Southern Illinois University
摘要:In feedback control of dynamical systems, the choice of a higher loop gain is typically desirable to achieve a faster closed-loop dynamics, smaller tracking error, and more effective disturbance suppression. Yet, an increased loop gain requires a higher control effort, which can extend beyond the actuation capacity of the feedback system and intermittently cause actuator saturation. To benefit from the advantages of a high feedback gain and simultaneously avoid actuator saturation, this articl...
-
作者:Yang, Hao; Yan, Huaicheng; Li, Yan; Wen, Paul; Yang, Fuwen
作者单位:East China University of Science & Technology; Chengdu University; University of Southern Queensland; University of Southern Queensland; Griffith University; Griffith University - Gold Coast Campus
摘要:In this article, the zonotope-based distributed set-membership state estimation problem is considered for a class of nonlinear multirate complex networks (MRCN) subjected to unknown but bounded (UBB) noises and eavesdropping attacks. Both the process and measurement noises and the system linearization errors are constrained within known zonotopes. To ensure the communication security between the sensor and the estimator, an encryption-decryption mechanism (EDM) is proposed to prevent data from...
-
作者:Mu, Biqiang; Chen, Tianshi
作者单位:Chinese Academy of Sciences; The Chinese University of Hong Kong, Shenzhen; Shenzhen Research Institute of Big Data; The Chinese University of Hong Kong, Shenzhen
摘要:Kernel-based regularized system identification is one of the major advances in system identification in the past decade. A recent focus is to develop its asymptotic theory and it has been found that the Stein's unbiased risk estimator is asymptotically optimal (AO) in the sense of minimizing the mean squared error for prediction ability, but the empirical Bayes estimator is not AO in general. In this article, we further study the AO of various cross-validation (CV) estimators and show that the...
-
作者:Ding, Yi; Zhou, Bin; Zhang, Kang-Kang; Michiels, Wim
作者单位:Harbin Institute of Technology; KU Leuven
摘要:In this article, a novel Lyapunov-based approach for strong prescribed-time stabilization by periodic delayed feedback is established. Since the comparison lemma cannot be directly applied to time-delay systems, their proofs rely on trajectory analysis. Based on this approach, a novel control law for strong prescribed-time stabilization of uncertain scalar nonlinear systems is obtained, with the following appealing properties: singularity problems inherent to time-varying high gain approaches ...
-
作者:Yang, Runqiu; Liu, Xinfu
作者单位:Beijing Institute of Technology
摘要:This article presents a novel approach of using convex optimization to solve an optimal control problem with a linear system subject to general nonconvex control constraints and convex state constraints. A convex hull relaxation of the optimal control problem is obtained by taking the convex hull of the original nonconvex control set. To make sure that the convex hull relaxation is exact (which is generally very challenging to achieve), we slightly modify the convex hull relaxation to get an a...
-
作者:Zhou, Xin; Chen, Guici; Zeng, Zhigang; Hu, Junhao
作者单位:Wuhan University of Science & Technology; Huazhong University of Science & Technology; South Central Minzu University
摘要:This article investigates the finite-time distributed H-infinity filtering problem in sensor networks with switching topology and two-channel stochastic attacks. The two-channel stochastic deception attacks are introduced, encompassing network attacks in the communication channel between the model and the sensor, as well as in the channel between the sensors, implemented through an independent Bernoulli process with uncertain probabilities. To address this problem, a novel distributed filter w...
-
作者:Anand, Sribalaji C.; Teixeira, Andre M. H.; Ahlen, Anders
作者单位:Uppsala University; Uppsala University
摘要:In this article, we address the problem of risk assessment of stealthy attacks on uncertain control systems. Considering the data injection attacks that aim at maximizing the impact while remaining undetected, we use the recently proposed output-to-output gain to characterize the risk associated with the impact of attacks under a limited system knowledge attacker. The risk is formulated using a well-established risk metric, namely the maximum expected loss. Under this setup, the risk assessmen...