CN112269318B - Finite time remote safety state estimation method for time delay uncertain system - Google Patents
Finite time remote safety state estimation method for time delay uncertain system Download PDFInfo
- Publication number
- CN112269318B CN112269318B CN202011236055.4A CN202011236055A CN112269318B CN 112269318 B CN112269318 B CN 112269318B CN 202011236055 A CN202011236055 A CN 202011236055A CN 112269318 B CN112269318 B CN 112269318B
- Authority
- CN
- China
- Prior art keywords
- state
- time
- state estimation
- state estimator
- estimator
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 13
- 239000011159 matrix material Substances 0.000 claims description 33
- 238000013461 design Methods 0.000 claims description 16
- 238000005312 nonlinear dynamic Methods 0.000 claims description 13
- 238000004891 communication Methods 0.000 claims description 12
- 239000013598 vector Substances 0.000 claims description 11
- 238000005259 measurement Methods 0.000 claims description 10
- 230000008569 process Effects 0.000 claims description 10
- 230000011218 segmentation Effects 0.000 claims description 10
- 230000001629 suppression Effects 0.000 claims description 10
- 238000006243 chemical reaction Methods 0.000 claims description 6
- 239000004576 sand Substances 0.000 claims description 3
- 230000000295 complement effect Effects 0.000 claims description 2
- 239000000203 mixture Substances 0.000 claims description 2
- 230000005540 biological transmission Effects 0.000 abstract description 15
- 239000000243 solution Substances 0.000 description 10
- 230000000694 effects Effects 0.000 description 5
- 230000009471 action Effects 0.000 description 3
- 230000000052 comparative effect Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005192 partition Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 239000000047 product Substances 0.000 description 2
- 206010033799 Paralysis Diseases 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 230000002411 adverse Effects 0.000 description 1
- 230000003321 amplification Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000002347 injection Methods 0.000 description 1
- 239000007924 injection Substances 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000000691 measurement method Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000003199 nucleic acid amplification method Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B13/00—Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion
- G05B13/02—Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric
- G05B13/04—Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric involving the use of models or simulators
- G05B13/042—Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric involving the use of models or simulators in which a parameter or coefficient is automatically adjusted to optimise the performance
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Evolutionary Computation (AREA)
- Medical Informatics (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a finite time remote safety state estimation method of a time delay uncertain system, which comprises the following steps: establishing a state space model of the controlled system; establishing a state estimator system model and a calculation center, and developing a state estimation task; establishing an extended state estimation model of an extended state estimation system; providing existence conditions of a finite time remote safety state estimator by combining an energy function with a bounded decision auxiliary equation; a state estimator algorithm is designed through the steps of giving system parameters, initializing parameters, solving an inequality group, modifying the initializing parameters and the like, a remote safety state estimation strategy is generated, and the limited time remote safety state estimation of a delay uncertain system is realized. The invention can ensure the robust finite time safety state estimation of the time delay uncertain system based on the remote transmission data, and realize the timeliness and reliability of the state estimation under the remote data transmission mode with network attack.
Description
Technical Field
The invention belongs to the field of control of a system with time delay and model uncertainty, and particularly relates to a finite time remote safety state estimation method of a time delay uncertainty system.
Background
The system state is an important parameter for understanding the internal dynamics of the system and realizing key control tasks (such as positioning, tracking and synchronization). However, it is not easy to directly acquire the state of the controlled system under the limitation of objective conditions such as measurement technique or cost input. Therefore, how to effectively estimate the unknown system state has been a hot issue in the control field.
In developing state estimation, the main challenges come from two areas: on one hand, the accuracy of the controlled system model is high, and in an actual system, the nonlinearity of electronic components, the hysteresis of signal transmission and the destructiveness of external unknown interference bring great difficulty to the construction of a reasonable and real controlled system model. On the other hand, the validity of the measurement information required by the state estimation is essentially the process of filtering the system state from the measurement information acquired by the sensor, and as can be seen from the intrinsic mechanism, the validity of the measurement information directly relates to the reliability of the state estimation result. With the continuous development of computer and communication technologies, the network-based data transmission mode gradually replaces the traditional wired communication mode due to its advantages of low cost, easy maintenance, high flexibility, etc., and has received more and more attention in the fields including signal processing and automatic control. It should be noted that the network transmission mode brings many conveniences to the implementation of the automatic control, and also causes a series of new technical problems, including the current hot network attack problem. By means of network attack, a malicious attacker can not directly damage a target system any more, but starts with key information required by normal operation of the target system, and takes illegal action to block information transmission or tamper data information, so that the target system is in failure or even paralysis due to failure in receiving normal input, and the purpose of being unable to be notified is achieved. Especially in the distributed design, which is more and more favored today, the data acquisition system, the data processing system and the controller/estimator system are often not in one area, and information exchange is needed to be realized through remote data transmission. In the process of remote data transmission, although designers can take necessary security measures, the diversity and complexity of network attack modes still increase the difficulty of state estimation. Both of the aforementioned challenges pose a serious threat to estimation performance, and inaccuracy in the estimated state may result in significant economic loss or even personal safety. Therefore, by constructing a more objective and actual controlled system model and improving the effectiveness of the measurement information as much as possible, two major problems to be solved urgently in state estimation are solved.
Meanwhile, in a large number of scientific and technological industries such as target tracking, rocket launching, robot control, chemical reaction kettle temperature control and the like, the system state acquisition teaches stronger timeliness, namely, the estimation process is required to be completed within a limited time and a reliable result is given. Therefore, asymptotically stable control targets have great limitations in the use of practical systems. In contrast, the finite time state estimation shows better utility because it can ensure the designer to obtain the required system state within a given finite time, and thus to complete the corresponding control task in time.
In conclusion, it can be seen that how to effectively overcome adverse effects of time delay, model uncertainty and network attack in the context of engineering application of remote data transmission, an estimated state that is as accurate and reliable as possible is provided by designing a finite time state estimator, and the method has important research value.
Disclosure of Invention
The purpose of the invention is as follows: aiming at the problem of state estimation of a controlled system with uncertain time delay and model in given time in the engineering application background of remote data transmission in the prior art, the invention discloses a finite time remote safety state estimation method of a time delay uncertain system, which improves the tolerance of a state estimator to time delay, effectively reduces the damage of time delay to state estimation performance, enhances the robustness of the state estimation process to the model uncertain and unknown external interference, and realizes the timeliness and reliability of state estimation in a remote data transmission mode with network attack.
The technical scheme is as follows: the invention adopts the following technical scheme: a limited-time remote safety state estimation method of a time delay uncertain system is characterized by comprising the following steps:
s1, establishing a controlled system state space model with time delay, nonlinear dynamics, model uncertainty and unknown external disturbance;
s2, establishing a state estimator system model based on the controlled system state space model, and establishing a calculation center;
sequentially establishing communication links between a state estimator system and a computing center as well as between a controlled system and the computing center;
the state estimator system requests the computing center to send information data as external input information and carries out a state estimation task;
s3, constructing an expansion vector;
establishing an extended state estimation model of an extended state estimation system through a controlled system state space model and a state estimator system model;
the method comprises the steps of designing an energy function and applying a bounded decision auxiliary equation at the same time, and providing conditions for an extended state estimation system to obtain robust H-infinity bounded time bounded performance, namely existence conditions of a finite time remote safe state estimator;
s4, according to the existing conditions in the step S3, designing a solving algorithm of the state estimator and calculating the gain of the state estimator, generating a remote safety state estimation strategy, and realizing the limited time remote safety state estimation of the time delay uncertain system, wherein the method comprises the following steps:
giving system parameters; initializing parameters;
solving according to the linear matrix inequality group constraint, wherein the linear matrix inequality constraint is obtained by applying a scaling theorem and a Schur complement theorem under the existence condition in the step S3, and if a feasible solution exists, the gain of the state estimator is obtained; if no feasible solution exists, modifying the parameters;
if the modified parameters meet the requirements, solving again; if the modified parameters are not satisfactory, an acceptable state estimate cannot be achieved.
Preferably, in step S1, the controlled system state space model established over the finite time interval [0, N ] is as follows:
wherein, taukDenotes the time delay of the controlled system, [ tau ]m,τM]Is a time delay interval; x is the number ofk∈RnRepresents the state of the system at time k, xk+1∈RnRepresenting the state of the system at time k +1,the representation system is at k-taukState of time, N ∈ N0Is the dimension of the system state;is a known system initial state; w is ak∈RsIs a set l2Energy-limited external perturbation over [0, ∞) ], s ∈ N0Is the dimension of the external disturbance; f is belonged to C (R)F;RF) Is a non-linear dynamic function and has a zero initial state F (0) of 0, F ∈ N0The number of subfunctions contained in the nonlinear dynamic function f; y isk∈RlRepresents the measurement output of the system, L ∈ N0Is the dimension of the measurement output of the system; z is a radical of formulak∈RgRepresenting the target signal to be estimated, g ∈ N0Is the dimension of the target signal; a is an element of Rn×n、Ad∈Rn×n、Bf∈Rn×F、Bw∈Rn×s、C∈RL×n、D∈RL×sAnd Cz∈Rg×nAre all known matrices; Δ a ═ NzMkNyIn which N iszAnd NyAre all known matrices, MkIs a time-varying real-valued matrix and satisfies Is a known positive scalar quantity; the nonlinear dynamical function f has the characteristic of 2-norm boundingWhere H is a known matrix.
Preferably, step S2 includes the steps of:
s21, establishing a state estimator system model as follows:
where K is the gain of the state estimator in the state estimator system; Σ is the external input information for the state estimator system;representing the state estimate of the system at time k,representing the state estimate of the system at time k +1,the representation system is at k-taukEstimating the state of the moment;representing an estimate of the target signal at time k;
the calculation center is established as follows:
wherein,andare two types of input data for the computation center,is the output data of the computing center, and C is the conversion parameter of different types of data;
s22, establishing the communication relation between the state estimator system and the computing center, and between the controlled system and the computing center as follows:
s23, the computing center receives the request sent by the state estimator system and generates the innovation thetakThe following were used:
innovation thetakIn the process of transmitting from the computing center to the state estimator system, new information is obtained after attackThe following were used:
wherein,χb,kare independent of each other and subject to Bernoulli's scoreRandom variables of cloth, where b is 1,2, …, L, defined by the interval [0,1]And satisfy mathematical expectationsCovarianceWhen a and b are the same, it can be simplified toOr
S24, state estimator system and new informationAs external input information, a state estimation task is performed, i.e.
Preferably, step S3 includes the steps of:
S32, establishing an extended state estimation model of the extended state estimation system through the controlled system state space model and the state estimator system model as follows:
wherein,
s33, providing an extended state estimation system to obtain the parameter (alpha) by designing an energy function, namely Lyapunov functional and combining a bounded decision auxiliary equation1,α2,α3G, N) the condition of robust H ∞ finite time-bounded performance, i.e. the existence condition of the finite time remote safe state estimator;
wherein the designed Lyapunov functional is as follows:
wherein, VkExpanding the Lyapunov functional of the state estimation system for the time k; p and Qi(i ═ 1,2,3,4) is a Lyapunov matrix。
The bounded decision-assist equation is designed as follows:
wherein, Vk+1Expanding the Lyapunov functional of the state estimation system for the time k + 1; delta>0 represents the interference suppression level; mu.s>1 represents a finite time bounded design parameter;is the estimated error of the target signal.
Preferably, in step S33, the parameter (α) is selected1,α2,α3G, N) the robust H ∞ finite time-bounded satisfies the following condition:
wherein, 0 is less than or equal to alpha1≤α3,α2≥0,G>0,N∈N0;Is the estimated error of the target signal.
Preferably, in step S4, the linear inequalities resulting from the presence condition are as follows:
G<P<σ0G
0<Qi<σiG(i=1,2,3,4)
Φ2,1=Φ2,3=Φ2,4=Φ2,5=Φ3,1=Φ3,2=Φ3,4=Φ3,5=0,
Φ4,1=Φ4,2=Φ4,3=Φ4,5=Φ5,1=Φ5,2=Φ5,3=Φ5,4=0,
Wherein σiIs a positive scalar, i is 0,1,2,3, 4; p and QiIs a symmetric positive definite matrix, i is 1,2,3, 4; Λ is a diagonal positive definite matrix; for time delay interval [ tau ]m,τM]Dividing to obtain q subintervals with the lengths of delta tau; m is a weighting coefficient of time delay segmentation; denotes a symmetrical element or elements of the structure,represents the kronecker product;col{ab}b=1,2,…,cis c column vectors abA matrix of compositions; diaga{ b } represents a diagonal matrix containing a diagonal elements b;
preferably, step S4 includes the steps of:
s41, giving system parameters, including: A. a. thed、Bf、Bw、C、D、Cz、Mk、And H; initial state of a controlled systemA nonlinear dynamic function f; lower time delay bound τmAnd upper bound τM(ii) a Increment Δ m ∈ (0,1) and
s42, time delay interval [ tau ]m,τM]Dividing to obtain q subintervals with the lengths of delta tau;
s43, initializing parameters, including: robust H-infinity time-bounded parameter alpha1、α2、α3Q and N; the weighting coefficient m of the time delay segmentation belongs to (0, 1); parameter(s)
S45, solving the parameters delta, kappa and sigma under the condition of satisfying the constraint of the linear matrix inequality groupi、P、Λ and S:
if a feasible solution exists, then the gain of the state estimator is calculated to beA state estimator is designed to realize robust H infinity finite time remote safe state estimation; if no feasible solution exists, go to step S46;
s46, at presentAdding on the basis of the valueObtaining new parametersIf the new parameter isGreater than or equal to 1, then no parameter (α) is found for the current initialization1,α2,α3G, N), then step S47 is performed; otherwise, return to step S44;
s47, adding delta m on the basis of the current m value to obtain a new parameter m, and if the new parameter m is smaller than 1, re-initializing the parameterMaking it identical to that initialized in step S42Equal in value, and then return to step S44; otherwise, no feasible solution is found for all acceptable parameters, and exit is performed.
Has the advantages that: the invention has the following beneficial effects:
the invention improves the time delay tolerance of the state estimator, effectively reduces the damage of time delay to the state estimation performance, enhances the robustness of the state estimation process to the uncertain model and the unknown external interference and realizes the timeliness and the reliability of the state estimation in the remote data transmission mode with network attack by combining a finite time state estimation method of an energy function and an auxiliary equation based on weighted time delay segmentation.
Drawings
FIG. 1 is a general flow diagram of the method of the present invention;
FIG. 2 is a system block diagram of the method of the present invention;
FIG. 3 is a flowchart of the method for solving the state estimator algorithm in step S4 according to the present invention;
fig. 4 shows the expanded state γ under the effect of different bounded design parameters μ in the example of implementationkUpper bound of constraint c3(ii) a change in (c);
FIG. 5 is a trace of the evolution of the H ∞ performance metric J within a finite time interval [0,6] under the action of the optimally bounded design parameter μ in the example of implementation;
FIG. 6 is c3Fixed at 400, the optimum interference suppression level δminAnd a bounded design parameter;
FIG. 7 shows the optimal interference suppression level δ under two different state estimation algorithms (weighted delay splitting and unweighted delay splitting)minA comparative graph of (a).
Detailed Description
The present invention will be further described with reference to the accompanying drawings.
The invention discloses a finite time remote safety state estimation method of a time delay uncertain system, which aims to solve the problems of finite time state estimation and robust safety control of a time delay uncertain system and a model uncertain system in the background of remote data transmission, and comprises the following steps as shown in figures 1 and 2:
the method comprises the following steps: establishing a controlled system state space model with time delay, nonlinear dynamics, model uncertainty and unknown external disturbance, wherein the controlled system state space model with time delay, nonlinear dynamics, model uncertainty and unknown external disturbance defined in a finite time interval [0, N ] has the following form:
wherein N +1 is the length of a given time interval, i.e. the number of times when counted from time 0; tau iskRepresenting the time delay, tau, of the system being controlledk∈[τm,τM]Is the variation interval of time delay, and is the time delay interval [ taum,τM]Dividing to obtain q subintervals with the lengths of delta tau; x is the number ofk∈RnRepresents the state of the system at time k, xk+1∈RnRepresenting the state of the system at time k +1,the representation system is at k-taukState of time, N ∈ N0Is the dimension of the system state;is a known system initial state; w is ak∈RsIs a set l2Energy-limited external perturbation over [0, ∞) ], s ∈ N0Is the dimension of the external disturbance; f is belonged to C (R)F;RF) Is a nonlinear dynamic function and has a zero initial state F (0) 0, F ∈ N0The number of subfunctions contained in the nonlinear dynamic function f; y isk∈RLRepresents the measurement output of the system, L ∈ N0Is the dimension of the measurement output of the system; z is a radical of formulak∈RgRepresenting the target signal to be estimated, g ∈ N0Is the dimension of the target signal; a is an element of Rn×n、Ad∈Rn×n、Bf∈Rn×F、Bw∈Rn×s、C∈RL×n、D∈RL×sAnd Cz∈Rg×nAre all known matrices with suitable dimensions; rnIs an n-dimensional Euclidean space, Rn×mIs the set of all n x m real matrices.
The model is not determined to have time-varying characteristics and satisfies the following relationship:
ΔA=NzMkNy (2)
wherein N isz∈Rn×pAnd Ny∈Rq×nAre all known matrices, Mk∈Rp×qIs a time-varying real-valued matrix and satisfies the following relationship:
The nonlinear dynamical function f in the state space model used has the following 2-norm bounded characteristics:
where H is a known matrix.
Step two: designing a state estimator based on a state space model; establishing a data exchange and calculation center (hereinafter referred to as a calculation center) to realize the unified management and conversion of different types of data and calculate and provide related data as required; constructing a remote communication model based on a transmission network, formulating a communication protocol, and then establishing a communication link between a state estimator system and a computing center, and between a controlled system and the computing center, wherein the state estimator system comprises a state estimator; and the state estimator system requests the computing center to send estimation innovation data so as to carry out a state estimation task.
Designing a state estimator system model based on a state space model as follows:
where K is the gain of the state estimator in the state estimator system; sigma is an external input signal for a state estimator systemInformation;representing the state estimate of the system at time k,representing the state estimate of the system at time k + 1,the representation system is at k-taukEstimating the state of the moment;representing an estimate of the target signal at time k.
Establishing a data exchange and calculation center (hereinafter referred to as a calculation center) to realize the unified management and conversion of different types of data and calculate and provide related data as required, wherein the specific method comprises the following steps:
wherein,andare two types of input data for the computing center,is the output data of the calculation center, and C is the conversion parameter of different types of data, namely the matrix C in formula (1).
The method comprises the following steps of constructing a remote communication model based on a transmission network, formulating a communication protocol, and then establishing communication links between a state estimator system and a computing center and between a controlled system and the computing center, wherein the specific process is as follows:
the state estimator system requests the computing center to send estimated 'innovation' data so as to carry out a state estimation task, and specifically, the computing center generates innovation theta after receiving a request instruction sent by the state estimator systemkThe following were used:
innovation thetakDuring transmission from the computing center to the state estimator system, a denial of service attack or an error data injection attack is encountered, and distortion occurs. New information after attackHas the following form:
wherein,reflects the distortion characteristic of the innovation under the action of network attack, chib,k(b ═ 1,2, …, L) are random variables which are independent of one another and obey a bernoulli distribution, and which are defined in the interval [0,1 [ ]]Is characterized by a discrete-time probability distribution of (c), and satisfies(a and b being the same can be simplified toOr) E { a } represents the mathematical expectation of a, and Cov { a, b } represents the covariance of a and b, definitions
State estimator system for attack-inflicted innovationAs the data actually requested, and running a dynamic estimation process, namely:
substituting equation (10) into the state estimator system of equation (5) above yields:
step three: constructing an expansion vector based on the real state and the estimated state, and establishing an expansion state estimation model of an expansion state estimation system through the controlled system state space model and the state estimator system model obtained in the first step and the second step; aiming at the extended state estimation model, the existence condition of the finite time remote safety state estimator is given by designing an energy function and applying an auxiliary equation at the same time.
Taking the spread vector asAnd establishing an extended state estimation model of the following extended state estimation system:
wherein,
if the finite-time remote security state estimation under model uncertainty and network attack is to be realized, the extended state estimation system needs to be ensured to be robust and bounded within finite time. Robust time-bounded requirements satisfy two conditions: first, in a given time interval [0, N]Inner, expansion vector gammakExhibits the rule shown in formula (13):
wherein alpha is1,α2,α3G and N are given parameters and satisfy 0 ≦ α1≤α3,α2≥0,G>0,N∈N0;
Second, the estimation error of the target signalAnd an external disturbance wkThe following relationship is satisfied under zero initial conditions:
then the extended state estimation system is said to be (α)1,α2,α3G, N) robust H ∞ finite time bounded and having a metric value δ>Interference suppression level of 0.
To ensure the above robust H ∞ finite time-bounded performance, the lyapunov functional is constructed as follows:
wherein,
wherein, VkLyapunov functional, P and Q, for a time-k extended state estimation systemi(i ═ 1,2,3,4) is a lyapunov matrix; m is a weighting coefficient of the time delay segmentation, is an arbitrary number between 0 and 1, is given in advance and can be adjusted according to the effect of the time delay segmentation.
At the same time, to verify limited-time bounded performance, a bounded decision-assist equation of the form:
wherein, Vk+1Lyapunov functional, delta, of an extended state estimation system for the k +1 time instant>0 denotes the interference suppression level, μ>1 denotes a time-bounded design parameter.
Based on the aforementioned Lyapunov functional and bounded decision auxiliary equation, the existence condition of the robust H ∞ finite time-bounded performance of the extended state estimation system can be given as shown in equations (17) to (20):
G<P<σ0G (18)
wherein,
Ω12=Ω14=Ω15=Ω21=Ω23=Ω24=Ω25=Ω26=Ω27=Ω31=Ω32=Ω34=Ω35=0,
Ω41=Ω42=Ω43=Ω45=Ω46=Ω47=Ω51=Ω52=Ω53=Ω54=Ω55=Ω56=Ω57=0,
Ω61=Ω62=Ω63=Ω64=Ω65=Ω67=Ω71=Ω72=Ω73=Ω74=Ω75=Ω76=0,
Ψ3=[02n×8n [I2n,0q×2n] 02n×4n],
Ψ4=[02n×8n [0q×2n,I2n] 02n×4n],
wherein the positive scalar σi(i ═ 0,1,2,3,4), symmetric positive definite matrices P and Qi(i ═ 1,2,3,4) and the diagonal positive definite matrix Λ are both undetermined parameters (or matrices); for time delay interval [ tau ]m,τM]Dividing to obtain q subintervals with the lengths of delta tau; m is a weighting coefficient of time delay segmentation; n is the dimension of the system state; mu.s>1 is a finite time bounded design parameter which is preset and adjustable; the symbol denotes a symmetric element which is,represents the kronecker product; I.C. AτIs a τ -dimensional identity matrix; h is taken from equation (4) and is a known matrix.
Step four: designing a solving algorithm of the state estimator and calculating the gain of the state estimator according to the existence condition obtained in the step three; and generating a remote safety state estimation strategy to realize the limited-time remote safety state estimation of the delay uncertain system.
As shown in fig. 3, the method comprises the following steps:
step four, firstly: given the system parameters: A. a. thed、Bf、Bw、C、D、Cz、Mk、And H; a nonlinear dynamic function f; lower bound of delay τmAnd upper bound τM(ii) a Increment Δ m ∈ (0,1) andinitial state of a controlled system
Step four and step two: for time delay interval [ tau ]m,τM]And (4) dividing to obtain q subintervals with the lengths of delta tau.
Step four and step three: initialization parameter alpha1,α2,α3G, N; initializing a weighting coefficient m E (0,1) of time delay segmentation; initialization parameters
Step four and five: solving the parameters δ, κ, σ while satisfying the linear matrix inequality group constraints shown in the following equations (21) to (25)i(i=0,1,2,3,4)、P、Qi(i ═ 1,2,3,4), Λ and S.
G<P<σ0G (23)
0<Qi<σiG(i=1,2,3,4) (24)
Wherein,
Φ2,1=Φ2,3=Φ2,4=Φ2,5=Φ3,1=Φ3,2=Φ3,4=Φ3,5=0,
Φ4,1=Φ4,2=Φ4,3=Φ4,5=Φ5,1=Φ5,2=Φ5,3=Φ5,4=0,
wherein, S ═ P2K;col{ab}b=1,2,…,cIs c column vectors abComposed matrix, diaga{ b } denotes a diagonal matrix containing a diagonal elements b.
Equations (23) to (25) are equivalent to equations (18) to (20). The formula (22) is an 'amplification' of the formula (17), namely the formula (22) can be obtained by applying a scaling theorem and a Schur supplementary theorem on the basis of the formula (17), wherein the application of the Schur supplementary theorem does not influence the equivalence, but the original equivalence relation is changed into an inclusion relation by using the scaling theorem, namely the formula (17) is contained in the formula (22), so that the realization of the formula (22) can ensure the realization of the formula (17), and the designed state estimator can meet the robust H-infinity finite time bounded performance; k is a new parameter introduced after applying scaling theorem, and is used as a variable and needs to be solved.
Wherein, Schur supplements the theory: for a symmetric positive definite matrix S
The following items are equivalent:
(1)S<0
scaling reason: given a matrix U with suitable dimensions U ═ UTH, V and W, then U + HWV + VTWTHT<0 is true if and only if there is a scalar ε>0, such that the following linear matrix inequality holds:
if there is a feasible solution to equations (21) through (25), the gain of the state estimator is calculated asA state estimator is designed to realize robust H infinity finite time remote safe state estimation; if no feasible solution exists, step four and six are executed.
Step four and six: at the present timeAdding on the basis of the valueWill be provided withAs new parametersIf the new parameter isGreater than or equal to1, i.e., the time-bounded design parameter μ is less than or equal to 1, then no information is found for the current initialization (α)1,α2,α3G, N), and then executing step IV; otherwise, returning to the fourth step.
Step four and seven: adding delta m on the basis of the current m value, taking m + delta m as a new parameter m, if the new parameter m<1, then re-initializing the parametersMaking it and initialised in step four or twoThe values are equal, and then the fourth step is returned; otherwise, a feasible solution is not found for all acceptable parameters, and the process exits.
The algorithm provided by the invention is specific to a group of specific parameters and initial conditions, if state estimation suitable for the current parameter set and the initial conditions cannot be found, feasible solutions can still be found by changing the parameters and the initial conditions, and therefore, limited-time remote safety state estimation is realized; if all acceptable parameters and initial conditions are tried and there is still no solution, then an acceptable state estimate is not achieved.
In order to verify the effects of the present invention, the following examples are given.
Consider the following system parameters: D=0,τm=2,τM=8,m=0.15,Nz=10-2×[30 10],Ny=10-2×[20 10]T,H=I2,α1=1,α2=0.5,G=I,N=6,δ=1.0,
the effect of the finite time remote security state estimator obtained based on the algorithm provided by the invention is as follows:
figure 4 shows the expansion vector y under the influence of different finite time bounded design parameters mukIs restricted upper bound of a3(ii) a change in (c); FIG. 5 shows the H ∞ performance metric J over a finite time interval [0,6] under the influence of the optimal finite-time-bounded design parameter μ]An inner evolution track; FIG. 6 shows a3Fixed at 400, the optimum interference suppression level δminAnd a finite time bounded design parameter mu; FIG. 7 shows the optimal interference suppression level δ for two different state estimation algorithms (weighted delay splitting and unweighted delay splitting, the same below)minA comparative graph of (a).
Fig. 4 shows that the state estimator designed based on the invention realizes the state estimation of the controlled system in a limited time, and achieves stronger timeliness. Meanwhile, the trajectory of fig. 5 shows that the dynamic response of the estimated output error already has H ∞ performance, i.e. the designed state estimator reaches a preset level of interference suppression capability. As can be seen from fig. 7, under the same conditions, compared with the finite time state estimation algorithm based on the unweighted delay partition, the finite time state estimation algorithm based on the weighted delay partition has better interference suppression capability, and enhances the robustness of the estimation system.
Table 1 shows the comparison of the maximum allowable delay upper bound for two different state estimation algorithms; table 2 shows the comparison of the feasible ranges of the bounded design parameters obtained based on two different state estimation algorithms under the condition of consistent time delay intervals.
TABLE 1
TABLE 2
The comparison results in table 1 show that, under the condition of the same delay lower bound information, the finite time state estimator based on weighted delay splitting according to the present invention has stronger capacity of accommodating delay, and thus, when the delay is larger (in this case, d is the case)MNot less than 6) can still well complete the state estimation task, and the common finite time state estimator can not work normally; the table 2 is obtained under the condition that the time delay intervals are consistent, and the obtained comparative data show that the finite time state estimation method based on the weighted time delay segmentation has a larger feasible range. This verifies the effectiveness and superiority of the method of the invention from another point of view.
The above description is only of the preferred embodiments of the present invention, and it should be noted that: it will be apparent to those skilled in the art that various modifications and adaptations can be made without departing from the principles of the invention and these are intended to be within the scope of the invention.
Claims (4)
1. A limited-time remote safety state estimation method of a time delay uncertain system is characterized by comprising the following steps:
s1, establishing a controlled system state space model with time delay, nonlinear dynamics, model uncertainty and unknown external disturbance;
s2, establishing a state estimator system model based on the controlled system state space model, and establishing a calculation center;
sequentially establishing communication links between a state estimator system and a computing center as well as between a controlled system and the computing center;
the state estimator system requests the computing center to send information data as external input information and carries out a state estimation task;
s3, constructing an expansion vector;
establishing an extended state estimation model of an extended state estimation system through a controlled system state space model and a state estimator system model;
the method comprises the steps of designing an energy function and applying a bounded decision auxiliary equation at the same time, and providing conditions for an extended state estimation system to obtain robust H-infinity bounded time bounded performance, namely existence conditions of a finite time remote safe state estimator;
s4, according to the existing conditions in the step S3, designing a solving algorithm of the state estimator and calculating the gain of the state estimator, generating a remote safety state estimation strategy, and realizing the limited time remote safety state estimation of the time delay uncertain system, wherein the method comprises the following steps:
giving system parameters; initializing parameters;
solving according to the linear matrix inequality group constraint, wherein the linear matrix inequality constraint is obtained by applying a scaling theorem and a Schur complement theorem under the existence condition in the step S3, and if a feasible solution exists, the gain of the state estimator is obtained; if no feasible solution exists, modifying the parameters;
if the modified parameters meet the requirements, re-solving; if the modified parameters do not meet the requirements, acceptable state estimation cannot be achieved;
specifically, in step S1, the state space model of the controlled system established over the finite time interval [0, N ] is as follows:
wherein, taukDenotes the time delay of the controlled system, [ tau ]m,τM]Is a time delay interval; x is the number ofk∈RnRepresents the state of the system at time k, xk+1∈RnRepresenting the state of the system at time k +1,representation of the system at k-taukState of time, N ∈ N0Is the dimension of the system state;is a known systemAn initial state; w is ak∈RsIs a set l2Energy-limited external perturbation over [0, ∞) ], s ∈ N0Is the dimension of the external disturbance; f is belonged to C (R)F;RF) Is a non-linear dynamic function and has a zero initial state F (0) of 0, F ∈ N0The number of subfunctions contained in the nonlinear dynamic function f; y isk∈RLRepresents the measurement output of the system, L ∈ N0Is the dimension of the measurement output of the system; z is a radical ofk∈RgRepresenting the target signal to be estimated, g ∈ N0Is the dimension of the target signal; a is an element of Rn ×n、Ad∈Rn×n、Bf∈Rn×F、Bw∈Rn×s、C∈RL×n、D∈RL×sAnd Cz∈Rg×nAre all known matrices; Δ a ═ NzMkNyIn which N iszAnd NyAre all known matrices, MkIs a time-varying real-valued matrix and satisfies Is a known positive scalar quantity; the nonlinear dynamical function f has the characteristic of 2-norm boundingWherein H is a known matrix;
step S2 includes the steps of:
s21, establishing a state estimator system model as follows:
where K is the gain of the state estimator in the state estimator system; Σ is the external input information for the state estimator system;representing the state estimate of the system at time k,representing the state estimate of the system at time k +1,the representation system is at k-taukEstimating the state of the moment;representing an estimate of the target signal at time k;
the calculation center is established as follows:
wherein,andare two types of input data for the computing center,is the output data of the computing center, and C is the conversion parameter of different types of data;
s22, establishing the communication relation between the state estimator system and the computing center, and between the controlled system and the computing center as follows:
s23, the computing center receives the request sent by the state estimator system and generates the innovation thetakThe following were used:
innovation thetakIn the process of transmitting from the computing center to the state estimator system, new information is obtained after attackThe following were used:
wherein,χb,kare random variables that are independent of one another and obey a bernoulli distribution, where b is 1,2]And satisfy mathematical expectationsCovarianceWhen a and b are the same, it can be simplified toOr
S24, the state estimator system uses the new informationAs external input information, a state estimation task is performed, i.e.
Step S3 includes the following steps:
S32, establishing an extended state estimation model of the extended state estimation system through the controlled system state space model and the state estimator system model as follows:
wherein,
s33, obtaining the parameter (alpha) by the extended state estimation system by designing an energy function, namely the Lyapunov functional and combining a bounded decision auxiliary equation1,α2,α3G, N) the condition of robust H ∞ finite time-bounded performance, i.e. the existence condition of the finite time remote safe state estimator;
wherein the designed Lyapunov functional is as follows:
wherein, VkExpanding the Lyapunov functional of the state estimation system for the time k; p and Qi(i ═ 1,2,3,4) is a lyapunov matrix;
the bounded decision-assist equation is designed as follows:
2. The finite-time remote security state estimator of a delay uncertainty system as claimed in claim 1The method is characterized in that in step S33, the parameter (alpha) is related to1,α2,α3G, N) the robust H ∞ finite time-bounded satisfies the following condition:
3. The method for estimating the finite-time remote security state of a delay uncertainty system as claimed in claim 2, wherein in step S4, the linear inequalities obtained from the existence condition are as follows:
G<P<σ0G
0<Qi<σiG(i=1,2,3,4)
Φ2,1=Φ2,3=Φ2,4=Φ2,5=Φ3,1=Φ3,2=Φ3,4=Φ3,5=0,
Φ4,1=Φ4,2=Φ4,3=Φ4,5=Φ5,1=Φ5,2=Φ5,3=Φ5,4=0,
Wherein σiIs a positive scalar, i is 0,1,2,3, 4; p and QiIs a symmetric positive definite matrix, i is 1,2,3, 4; Λ is a diagonal positive definite matrix; for time delay interval [ tau ]m,τM]Dividing to obtain q subintervals with the lengths of delta tau; m is a weighting coefficient of time delay segmentation; the symbol denotes a symmetric element which is,in the expression of Crohn2, product restriction;col{ab}b=1,2,...,cis c column vectors abA matrix of compositions; diaga{ b } denotes a diagonal matrix containing a diagonal elements b.
4. The method for estimating the limited-time remote security state of the uncertainty delay system of claim 3, wherein the step S4 comprises the following steps:
s41, giving system parameters, including: A. a. thed、Bf、Bw、C、D、Cz、Mk、And H; initial state of a controlled systemA nonlinear dynamic function f; lower time delay bound τmAnd upper bound τM(ii) a Increment Δ m ∈ (0,1) and
s42, time delay interval [ tau ]m,τM]Dividing to obtain q subintervals with the lengths of delta tau;
s43, initializing parameters, including: robust H-infinity time-bounded parameter alpha1、α2、α3G and N; the weighting coefficient m of the time delay segmentation belongs to (0, 1); parameter(s)
S45, fullUnder the condition of linear matrix inequality group constraint, solving parameters delta and scaling theorem parameters kappa and sigmai、P、QiΛ and S:
if a feasible solution exists, then the gain of the state estimator is calculated to beA state estimator is designed to realize robust H infinity finite time remote safe state estimation; if no feasible solution exists, go to step S46;
s46, at presentAdding on the basis of the valueObtaining new parametersIf the new parameter isGreater than or equal to 1, then no parameter (α) is found for the current initialization1,α2,α3G, N), then step S47 is performed; otherwise, return to step S44;
s47, adding delta m on the basis of the current m value to obtain a new parameter m, and if the new parameter m is smaller than 1, re-initializing the parameterMaking it identical to that initialized in step S42Equal in value, and then return to step S44; otherwise, no feasible solution is found for all acceptable parameters, and exit is performed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011236055.4A CN112269318B (en) | 2020-11-09 | 2020-11-09 | Finite time remote safety state estimation method for time delay uncertain system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011236055.4A CN112269318B (en) | 2020-11-09 | 2020-11-09 | Finite time remote safety state estimation method for time delay uncertain system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112269318A CN112269318A (en) | 2021-01-26 |
CN112269318B true CN112269318B (en) | 2022-06-10 |
Family
ID=74339814
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011236055.4A Active CN112269318B (en) | 2020-11-09 | 2020-11-09 | Finite time remote safety state estimation method for time delay uncertain system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112269318B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113206842B (en) | 2021-04-27 | 2022-06-28 | 东南大学 | Distributed safety state reconstruction method based on double-layer dynamic switching observer |
CN115133816B (en) * | 2022-08-08 | 2023-04-07 | 西南交通大学 | Active disturbance rejection control method of brushless direct current motor under network attack |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105554802A (en) * | 2015-12-09 | 2016-05-04 | 江南大学 | Event-driven sensor data transmission strategy for remote state estimation |
CN109541944A (en) * | 2018-12-20 | 2019-03-29 | 哈尔滨理工大学 | Discrete networks multi-agent system finite-time control method containing communication delay |
CN110213115A (en) * | 2019-06-25 | 2019-09-06 | 南京财经大学 | A kind of Multi net voting attacks the method for controlling security of lower event-driven network control system |
CN110703667A (en) * | 2019-11-13 | 2020-01-17 | 湖州师范学院 | Design method of network control system controller with time delay and data packet loss |
-
2020
- 2020-11-09 CN CN202011236055.4A patent/CN112269318B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105554802A (en) * | 2015-12-09 | 2016-05-04 | 江南大学 | Event-driven sensor data transmission strategy for remote state estimation |
CN109541944A (en) * | 2018-12-20 | 2019-03-29 | 哈尔滨理工大学 | Discrete networks multi-agent system finite-time control method containing communication delay |
CN110213115A (en) * | 2019-06-25 | 2019-09-06 | 南京财经大学 | A kind of Multi net voting attacks the method for controlling security of lower event-driven network control system |
CN110703667A (en) * | 2019-11-13 | 2020-01-17 | 湖州师范学院 | Design method of network control system controller with time delay and data packet loss |
Also Published As
Publication number | Publication date |
---|---|
CN112269318A (en) | 2021-01-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ren et al. | Optimal filtered and smoothed estimators for discrete-time linear systems with multiple packet dropouts under Markovian communication constraints | |
CN112269318B (en) | Finite time remote safety state estimation method for time delay uncertain system | |
Wang et al. | Data-driven-based event-triggered control for nonlinear CPSs against jamming attacks | |
Guo et al. | Hybrid event-triggered group consensus control for heterogeneous multiagent systems with TVNUD faults and stochastic FDI attacks | |
Hou et al. | Data‐driven adaptive terminal sliding mode control with prescribed performance | |
Li et al. | Neural-networks-based prescribed tracking for nonaffine switched nonlinear time-delay systems | |
Liu et al. | Robust fusion time‐varying Kalman estimators for multisensor networked systems with mixed uncertainties | |
Zhu et al. | Adaptive set-membership state estimation for nonlinear systems under bit rate allocation mechanism: A neural-network-based approach | |
Visakamoorthi et al. | Reachable set estimation for T–S fuzzy Markov jump systems with time-varying delays via membership function dependent H∞ performance | |
Gao et al. | Event-triggered adaptive fixed-time secure control for nonlinear cyber-physical system with false data-injection attacks | |
Qi et al. | SMC for discrete-time networked semi-Markovian switching systems with random DoS attacks and applications | |
Cai et al. | The bipartite edge-based event-triggered output tracking of heterogeneous linear multiagent systems | |
Lu et al. | Variance‐constrained resilient H∞ filtering for mobile robot localization under dynamic event‐triggered communication mechanism | |
Wang et al. | Important-Data-Based DoS Attack Mechanism and Resilient $ H_ {\infty} $ Filter Design for Networked T–S Fuzzy Systems | |
Ma et al. | Projective lag synchronization of Markovian jumping neural networks with mode-dependent mixed time-delays based on an integral sliding mode controller | |
Li et al. | Outlier-resistant interval observer design for multirate time-delayed systems under the adaptive event-triggered protocols | |
Cheng et al. | Performance limitation analysis of networked control systems under denial‐of‐service attacks | |
Zhang et al. | Output-constrained fixed-time coordinated control for multi-agent systems with event-triggered and delayed communication | |
Cai et al. | Kalman filter of switching system under hybrid cyber attack | |
Yacine et al. | Finite-time impulsive observers for nonlinear systems represented by Takagi–Sugeno models: Application to a chaotic system | |
CN112255916B (en) | Finite time real-time control method of time delay nonlinear time-varying system | |
Xu et al. | Sliding mode resilient control for TOD-based servo system under DoS attack | |
Zhou et al. | Fault-tolerant reduced-order asynchronous networked filtering of 2-D Bernoulli jump systems | |
Wang et al. | A novel adaptive event‐triggered scheme for network descriptor systems with randomly occurring uncertainties and nonlinearities | |
CN113411312A (en) | State estimation method of nonlinear complex network system based on random communication protocol |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |