CN115718427B - Non-fragile network prediction control method for security - Google Patents

Non-fragile network prediction control method for security Download PDF

Info

Publication number
CN115718427B
CN115718427B CN202211436497.2A CN202211436497A CN115718427B CN 115718427 B CN115718427 B CN 115718427B CN 202211436497 A CN202211436497 A CN 202211436497A CN 115718427 B CN115718427 B CN 115718427B
Authority
CN
China
Prior art keywords
matrix
time
state
observer
representing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211436497.2A
Other languages
Chinese (zh)
Other versions
CN115718427A (en
Inventor
胡军
赵海瑞
于浍
王树宏
曹志鹏
黄锦鹏
左智源
岳鹏云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin University of Science and Technology
Original Assignee
Harbin University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin University of Science and Technology filed Critical Harbin University of Science and Technology
Priority to CN202211436497.2A priority Critical patent/CN115718427B/en
Publication of CN115718427A publication Critical patent/CN115718427A/en
Application granted granted Critical
Publication of CN115718427B publication Critical patent/CN115718427B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Abstract

The invention discloses a security non-fragile networking prediction control method, which comprises the following steps: step one, establishing a networked control system model under communication delay; step two, designing a matched observer structure; constructing a predictive controller structure based on uniform quantization and false data attack; step four, obtaining a judging basis for guaranteeing the stability of the input-state under the meaning of the mean square of the networked control system; step five, solving the gain parameters of the observer and the gain parameters of the predictive controller; and step six, substituting the obtained observer gain matrix and the predicted controller gain matrix into the observer in the step two and the predicted controller in the step three respectively. The method solves the problems of inaccurate data transmission, low control system and even unstable system caused by the fact that the existing control method can not compensate a networked system with transmission delay and random network attack at the same time after the signal is required to be quantized.

Description

Non-fragile network prediction control method for security
Technical Field
The invention belongs to the field of networked system control, relates to a control method of a networked system under discrete time, and in particular relates to a security non-fragile networked predictive control method.
Background
The advantages of low energy consumption, convenient maintenance, quick transmission and the like of the networked system lead the networked system to be widely applied to the fields of military, traffic, aerospace and the like, and are focuses of attention for the study of control problems of the networked system.
Delay in signal transmission is an unavoidable phenomenon in a networked system, and in order to reduce occupied network bandwidth, the signal often needs to be quantized during transmission, meanwhile, signal transmission through a network brings convenience to an attacker, and the networked system may be attacked by false data injection, so it is very significant to design a control method capable of simultaneously coping with these negative effects.
The existing control method can not process signal quantization transmission and possibly influence the system by false data injection attack under the condition of actively compensating transmission delay, and the robustness of the controller is poor, so that the control performance is reduced, and even the system state can not be controlled to be stable.
Disclosure of Invention
The invention aims to provide a security non-fragile networked prediction control method, which solves the problems that the existing control method cannot compensate a networked system with transmission delay and random network attack after signal quantization, so that data transmission is inaccurate, a control system is low and even the system is unstable.
The invention aims at realizing the following technical scheme:
a security non-fragile networking prediction control method comprises the following steps:
step one, establishing a networked control system model under communication delay;
step two, designing a matched observer structure according to the networking control system model established in the step one;
thirdly, constructing a predictive controller structure based on uniform quantization and false data attack according to the observer designed in the second step;
step four, obtaining a judging basis for guaranteeing the stability of the input-state under the meaning of the mean square of the networked control system;
step five, solving the gain parameters of the observer and the gain parameters of the predictive controller;
and step six, substituting the obtained observer gain matrix and the obtained predictive controller gain matrix into the observer in the step two and the predictive controller in the step three respectively, so as to ensure the input-state stability of the networked control system in the mean square sense.
Compared with the prior art, the invention has the following advantages:
1. the invention provides a safe non-fragile networked prediction control method under the uniform quantization phenomenon aiming at a networked control system with transmission delay and false data injection attack, and considers the influence of signal quantization and false data injection attack on the prediction control performance.
2. The invention provides a design method of the gain parameters of the observer and the gain parameters of the non-fragile predictive controller in the form of linear matrix inequality by means of the Leidepro stability theorem, provides a method for the design of the observer and the controller of the control system, and can ensure the input-state stability of the system in the mean square sense.
3. The invention realizes good control effect, and in the experiment of the invention, even if the probability of occurrence of false data injection attack is 50%, the stability of the system can be ensured.
Drawings
FIG. 1 is a flow chart of the secure non-fragile networked predictive control method of the present invention.
FIG. 2 is a state trace diagram of a lower open loop system, where "-is the system state η 1 The track of (m),
Figure BDA0003946955330000033
is the system state eta 2 Track of (m), "-" is system state η 3 Track of (m), eta 1 (m) is the first component of the system state at time m, η 2 (m) is the second component of the system state at time m, η 3 (m) is the third component of the system state at time m.
FIG. 3 is a diagram of a closed loop system state trace with uncompensated propagation delay, where "-is the system state η 1 The track of (m),
Figure BDA0003946955330000034
is the system state eta 2 The locus of (m), "-" isSystem state eta 3 Track of (m), eta 1 (m) is the first component of the system state at time m, η 2 (m) is the second component of the system state at time m, η 3 (m) is the third component of the system state at time m.
FIG. 4 is under the situation
Figure BDA0003946955330000031
A closed loop system state track diagram obtained by a non-fragile predictive control method, wherein' is the system state eta 1 Track of (m), ->
Figure BDA0003946955330000035
Is the system state eta 2 Track of (m), "-" is system state η 3 Track of (m), eta 1 (m) is the first component of the system state at time m, η 2 (m) is the second component of the system state at time m, η 3 (m) is the third component of the system state at time m.
FIG. 5 is under the situation
Figure BDA0003946955330000032
Control input trace map obtained by non-fragile predictive control method, wherein "-is control input u 1 Track of (m), "-" is control input u 2 Track of (m), u 1 (m) is the first component of the control input at time m, u 2 (m) is the second component of the control input at time m.
FIG. 6 is a diagram of case two
Figure BDA0003946955330000041
A closed loop system state track diagram obtained by a non-fragile predictive control method, wherein' is the system state eta 1 Track of (m), ->
Figure BDA0003946955330000043
Is the system state eta 2 Track of (m), "-" is system state η 3 Track of (m), eta 1 (m)To be the first component of the system state at m time, η 2 (m) is the second component of the system state at time m, η 3 (m) is the third component of the system state at time m.
FIG. 7 is a diagram of case two
Figure BDA0003946955330000042
Control input trace map obtained by non-fragile predictive control method, wherein "-is control input u 1 Track of (m), "-" is control input u 2 Track of (m), u 1 (m) is the first component of the control input at time m, u 2 (m) is the second component of the control input at time m.
Detailed Description
The following description of the present invention is provided with reference to the accompanying drawings, but is not limited to the following description, and any modifications or equivalent substitutions of the present invention should be included in the scope of the present invention without departing from the spirit and scope of the present invention.
The invention provides a security non-fragile networking prediction control method, as shown in figure 1, which comprises the following steps:
step one, establishing a networked control system model under communication delay.
In this step, the networked control system model is:
η(m+1)=Aη(m)+Bu(m) (1)
ξ(m)=Cη(m) (2)
where η (m+1) and η (m) are represented as state information at m+1 time and m time, u (m) is a control input at m time, ζ (m) is measurement output information obtained at m time, A, B and C are a state transition matrix, a control input matrix and a measurement output matrix, respectively, and B is a matrix of rank-full.
And step two, designing a matched observer structure according to the networked control system model established in the step one.
In this step, the specific structure of the observer is:
Figure BDA0003946955330000051
in the formula ,
Figure BDA0003946955330000052
one-step prediction value representing the state at m time versus m+1 time,/for>
Figure BDA0003946955330000053
A one-step predictor representing the state at time m-1 for time m, u (m) representing the control input at time m, L being the observer gain parameter to be determined.
And thirdly, constructing a predictive controller structure based on uniform quantization and false data attack according to the observer designed in the second step. The method comprises the following specific steps:
designing a prediction formula based on the networked control system model in the first step and the observer in the second step:
Figure BDA0003946955330000054
where j represents the step size of the prediction process, and j has a value of 2,3, …, delta,
Figure BDA0003946955330000055
predicted value representing the state at m-delta versus m+j-delta, ++>
Figure BDA0003946955330000056
The predicted value for the state at m+j-delta-1 at m-delta time, u (m+j-delta-1) represents the control input value at m+j-delta-1, and delta represents the transmission delay generated in the network transmission.
The uniform quantizer form is:
Figure BDA0003946955330000057
in the formula ,
Figure BDA0003946955330000058
representing state vector +.>
Figure BDA0003946955330000059
The value quantized by the uniform quantizer is used for the quantization,
Figure BDA0003946955330000061
representation->
Figure BDA0003946955330000062
I has a value of 1,2, … v, wherein v is a state vector
Figure BDA0003946955330000063
Dimension of->
Figure BDA0003946955330000064
Is the predicted value of the state vector at m time to m+1 time, T represents the maximum value of the energy of the quantizer, -T is the minimum value of the energy of the quantizer, alpha is the number of quantization intervals, T β Between cells representing the beta-th quantization, beta being the number between the quantized cells, ++>
Figure BDA0003946955330000065
Representing a downward rounding function, i.e., a maximum integer having a value no greater than "·".
The quantized predicted values after attack are:
Figure BDA0003946955330000066
wherein ,
Figure BDA0003946955330000067
representing state predictors after quantization and attack effects,/->
Figure BDA0003946955330000068
Representing the state predicted value obtained by measuring the output predicted value at m time at m-delta time and passing through a uniform quantizer,
Figure BDA0003946955330000069
and lambda (m) is a random variable conforming to Bernoulli distribution and is used for indicating whether false data injection attack phenomenon occurs at the moment m, and χ (m) is a false value of the fact that the attacker signal acts in the control system.
The predictive controller structure based on uniform quantization and false data attack is:
Figure BDA00039469553300000610
where K represents the controller gain parameter to be determined, D and E represent the left and right coefficient matrices, respectively, in the controller gain perturbation, and the time-varying matrix F (m) represents the uncertainty in the gain perturbation at time m.
And step four, obtaining a judging basis for guaranteeing the stability of the input-state under the meaning of the mean square of the networked control system.
In the step, the input-state stability judgment basis of the networked control system in the mean square sense under the quantization and false data attack is as follows:
Figure BDA0003946955330000071
in the formula ,
Figure BDA0003946955330000072
representing a mathematical expectation value of lambda (m), A δ-1 For the product of delta-1 matrices A, 0 means that the elements are all 0 matrices, the superscript T means transpose, P 1 For the first positive definite matrix to be determined, P 2 For the second positive definite matrix to be determined, Q 1 For the third positive definite matrix to be determined, Q 2 For the fourth positive definite matrix to be determined, R is the first matrix to be solved, W is the second matrix to be solved, mu is to be solvedPositive scalar parameters.
In this step, the lyapunov stability theorem is utilized when the stability criterion is obtained.
And fifthly, solving the gain parameters of the observer and the gain parameters of the predictive controller.
In this step, the observer gain parameter and the predictive controller gain parameter are calculated as follows:
Figure BDA0003946955330000073
Figure BDA0003946955330000074
wherein the orthogonal matrix V is the right matrix of singular value decomposition of matrix B, satisfying
Figure BDA0003946955330000081
The orthogonal matrix U is the left matrix of the singular value decomposition of matrix B, Θ=diag { γ 12 ,…,γ n The matrix is composed of non-zero singular values of matrix B, diag { gamma } 12 ,…,γ n Represented by gamma 12 ,…,γ n Is a diagonal matrix formed by diagonal elements, gamma 12 ,…,γ n For the non-zero singular values of matrix B, n represents the rank of matrix B, P 11 Is P 1 The transformed matrix number one satisfies +.>
Figure BDA0003946955330000082
P 12 Is P 1 The transformed matrix number two, superscript T and-1, represent the transpose and inverse, respectively.
In this step, singular value decomposition of the matrix is used in solving the predictive controller gain parameters.
And step six, substituting the gain matrix of the observer and the gain matrix of the predictive controller which are obtained in the step five into the observer in the step two and the predictive controller in the step three respectively, so as to ensure the input-state stability of the networked control system in the mean square sense.
In this step, the observer gain matrix and the predictive controller gain matrix are respectively substituted into the specific forms of the observer and the predictive controller obtained in the observer in the second step and the predictive controller in the third step, respectively, and are as follows:
Figure BDA0003946955330000083
Figure BDA0003946955330000084
the state value of the system is observed through the prediction model (4), the state information is predicted through the prediction model (11), and the signal is transmitted through the uniform quantizer (5), so that the prediction controller (12) can still ensure that the networked control system (1) is stable in input-state in the mean square sense even if false data is injected and attacked.
Examples:
in this embodiment, taking a networked system with transmission delay and network attack as an example, the following simulation is performed by adopting the method of the present invention:
the parameters of the state transition matrix, the control input matrix and the measurement matrix of the networked system with the transmission delay and the network attack are respectively as follows:
Figure BDA0003946955330000091
C=[-0.8 -0.5 -0.8]
other parameters and initial values are: the network transmission delay is delta=4, and the parameters in the gain perturbation term in the controller are
Figure BDA0003946955330000092
F=0.1sint,E=[0.1 0 0.1]The upper limit of the uniform quantizer is T=40, the quantization number alpha=160, and the attack injection signal is χ (m) = [ 0.1.0.2-0.2] T The initial value of the state vector is η (0) = [ 10-10] T Initial observer valueIs->
Figure BDA0003946955330000093
The initial value of the controller is u (0) = [0 0 ]] T
Case 1:
Figure BDA0003946955330000094
namely, the probability of the system receiving false information of an attacker is 0.5, and in the situation, gain parameters of an observer and a predictive controller are respectively obtained as follows: />
Figure BDA0003946955330000095
Case 2:
Figure BDA0003946955330000096
namely, the probability of the system receiving false information of an attacker is 0.1, and in the situation, gain parameters of an observer and a predictive controller are respectively obtained as follows:
Figure BDA0003946955330000097
the control effect is as follows: as can be seen from fig. 2,3, 4, 5, 6, and 7, the open loop system is unstable, and if the transmission time lag is compensated, the closed loop system is still unstable, and the inventive non-fragile predictive controller design method can effectively cope with the influence of quantization error and false data injection attack on the system and stabilize the control system for the networked control system with transmission delay, quantization, and network attack.

Claims (3)

1. The non-fragile networking prediction control method for the security is characterized by comprising the following steps of:
step one, establishing a networked control system model under communication delay;
step two, designing a matched observer structure according to the networking control system model established in the step one;
thirdly, constructing a predictive controller structure based on uniform quantization and false data attack according to the observer designed in the second step, wherein:
the predictive controller structure based on uniform quantization and false data attack is as follows:
Figure QLYQS_1
where u (m) represents the control input at time m, K represents the controller gain parameter to be determined, D and E represent the left and right coefficient matrices, respectively, in the controller gain perturbation, the time-varying matrix F (m) represents the uncertainty in the gain perturbation at time m,
Figure QLYQS_2
representing state predictors after quantization and attack effects, delta representing transmission delays generated in network transmissions;
the said
Figure QLYQS_3
The method comprises the following steps:
Figure QLYQS_4
wherein ,
Figure QLYQS_5
representing the state prediction value obtained by uniformly quantizing the measured output prediction value at m-delta time to m time,/I>
Figure QLYQS_6
A random variable which is compliant with the Bernoulli distribution and is used for representing whether false data injection attack phenomenon occurs at the moment m, and χ (m) represents a false value of the attacker signal actually acting in a control system;
the said
Figure QLYQS_7
The form is as follows:
Figure QLYQS_8
in the formula ,
Figure QLYQS_9
representing state vector +.>
Figure QLYQS_10
Quantized value by uniform quantizer, +.>
Figure QLYQS_11
Representation->
Figure QLYQS_12
I has a value of 1,2, … v, wherein v is a state vector +.>
Figure QLYQS_13
Is used for the number of dimensions of (c),
Figure QLYQS_14
is the predicted value of the state vector at m time to m+1 time, T represents the maximum value of the energy of the quantizer, -T is the minimum value of the energy of the quantizer, alpha is the number of quantization intervals, T β Between cells representing the beta-th quantization, beta being the number between the quantized cells, ++>
Figure QLYQS_15
Representing a downward rounding function, i.e., a maximum integer having a value not greater than ";
step four, obtaining a judging basis for guaranteeing the stability of the input-state under the meaning of the mean square of the networked control system, wherein:
the input-state stability judging basis of the networked control system in the mean square sense under the quantization and false data attack is as follows:
Figure QLYQS_16
Figure QLYQS_17
in the formula ,
Figure QLYQS_18
represents a mathematical expectation of lambda (m) representing whether a false data injection attack phenomenon occurs at the moment m, A δ-1 For the product of delta-1 matrices A, 0 means that the elements are all 0 matrices, the superscript T means transpose, P 1 For the first positive definite matrix to be determined, P 2 For the second positive definite matrix to be determined, Q 1 For the third positive definite matrix to be determined, Q 2 For the fourth positive definite matrix to be determined, R is the first matrix to be solved, W is the second matrix to be solved, μ is the positive scalar parameter to be solved, A, B and C are the state transition matrix, the control input matrix and the measurement output matrix, respectively, and B is the matrix of column full rank;
fifthly, solving an observer gain parameter and a predictive controller gain parameter according to the following method:
Figure QLYQS_19
Figure QLYQS_20
wherein the orthogonal matrix V is the right matrix of singular value decomposition of matrix B, satisfying
Figure QLYQS_21
The orthogonal matrix U is the left matrix of the singular value decomposition of matrix B, Θ=diag { γ 12 ,...,γ n The matrix is composed of non-zero singular values of matrix B, diag { gamma } 12 ,...,γ n Represented by gamma 12 ,…,γ n Is a diagonal matrix formed by diagonal elements, gamma 12 ,…,γ n For the non-zero singular values of matrix B, n represents the rank of matrix B, P 11 Is P 1 The first matrix obtained by transformation satisfies
Figure QLYQS_22
P 12 Is P 1 The transformed matrix II is marked with superscripts T and-1 respectively representing transposition and inverse;
and step six, substituting the obtained observer gain matrix and the obtained predictive controller gain matrix into the observer in the step two and the predictive controller in the step three respectively, so as to ensure the input-state stability of the networked control system in the mean square sense.
2. The method for secure non-fragile network predictive control according to claim 1, wherein in the first step, the network control system model is:
η(m+1)=Aη(m)+Bu(m)
ξ(m)=Cη(m)
where η (m+1) and η (m) are represented as state information at m+1 time and m time, u (m) is a control input at m time, ζ (m) is measurement output information obtained at m time, A, B and C are a state transition matrix, a control input matrix and a measurement output matrix, respectively, and B is a matrix of rank-full.
3. The method for secure non-fragile network predictive control according to claim 1, wherein in the second step, the specific structure of the observer is:
Figure QLYQS_23
in the formula ,
Figure QLYQS_24
one-step prediction value representing the state at m time versus m+1 time,/for>
Figure QLYQS_25
A one-step predictor representing the state at time m-1 for time m, ζ (m) representing the measured output information obtained at time m, u (m) representing the control input at time m, L being the observer gain parameter to be determined, A, B and C being the state transition matrix, the control input matrix and the measured output matrix, respectively, and B being the matrix of rank-full. />
CN202211436497.2A 2022-11-16 2022-11-16 Non-fragile network prediction control method for security Active CN115718427B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211436497.2A CN115718427B (en) 2022-11-16 2022-11-16 Non-fragile network prediction control method for security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211436497.2A CN115718427B (en) 2022-11-16 2022-11-16 Non-fragile network prediction control method for security

Publications (2)

Publication Number Publication Date
CN115718427A CN115718427A (en) 2023-02-28
CN115718427B true CN115718427B (en) 2023-06-13

Family

ID=85255354

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211436497.2A Active CN115718427B (en) 2022-11-16 2022-11-16 Non-fragile network prediction control method for security

Country Status (1)

Country Link
CN (1) CN115718427B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116760603B (en) * 2023-06-26 2024-02-13 扬州大学 Multi-rate information physical system safety control method based on prediction information under network attack

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7530105B2 (en) * 2006-03-21 2009-05-05 21St Century Technologies, Inc. Tactical and strategic attack detection and prediction
CN109856970B (en) * 2018-12-19 2022-01-25 哈尔滨理工大学 Finite time stabilization method with network-induced bounded time lag and data loss
CN109541944A (en) * 2018-12-20 2019-03-29 哈尔滨理工大学 Discrete networks multi-agent system finite-time control method containing communication delay
US11206278B2 (en) * 2019-01-29 2021-12-21 Battelle Memorial Institute Risk-informed autonomous adaptive cyber controllers
CN110376889B (en) * 2019-07-12 2022-03-01 哈尔滨理工大学 Heterogeneous networked multi-agent system grouping consistency method with time-varying time lag
CN111045331B (en) * 2019-12-25 2022-05-13 北方工业大学 Networked control system and prediction output tracking control method
CN111240201B (en) * 2020-01-17 2023-01-03 哈尔滨工程大学 Disturbance suppression control method
CN112487425B (en) * 2020-11-23 2024-04-26 哈尔滨理工大学 Method for realizing consistency of multi-agent system under condition of spoofing attack
CN112327633A (en) * 2020-11-23 2021-02-05 哈尔滨理工大学 Method for leadership following multi-agent system consistency with time lag and disturbance
CN112596387A (en) * 2020-12-14 2021-04-02 电子科技大学 Networked system security control method based on extended observer
CN113014605B (en) * 2021-04-14 2021-12-28 北京理工大学 Quantitative control method for denial of service attack and disturbance
CN113364796B (en) * 2021-06-18 2022-08-02 西安建筑科技大学 Self-triggering model prediction control security defense method and system under FDI attack
CN113515044B (en) * 2021-07-02 2022-08-26 北京理工大学 Learning prediction-based tracking control method and device for wheeled mobile robot

Also Published As

Publication number Publication date
CN115718427A (en) 2023-02-28

Similar Documents

Publication Publication Date Title
CN109659959B (en) H-infinity load frequency control method of power system based on buffer type event triggering scheme under deception attack
Liu et al. Asynchronous output feedback dissipative control of Markovian jump systems with input time delay and quantized measurements
Zhao et al. Decentralized Resilient $ H_ {\infty} $ Load Frequency Control for Cyber-Physical Power Systems Under DoS Attacks
CN115718427B (en) Non-fragile network prediction control method for security
CN109150639B (en) Finite time domain H-infinity control method of time-varying system under influence of high-rate communication network
CN108733031B (en) Network control system fault estimation method based on intermediate estimator
CN111382499A (en) Joint estimation method for system fault and disturbance of chemical circulation reactor
CN110989552A (en) Fault estimation method of continuous stirred tank reactor system under network attack
Liu et al. Event-triggered non-fragile finite-time guaranteed cost control for uncertain switched nonlinear networked systems
Shen et al. Controller design for network‐based Markovian jump systems with unreliable communication links
CN110262334B (en) Finite time domain H-infinity control method of state saturation system under random communication protocol
CN107168053B (en) Finite field filter design method with random filter gain variation
Huang et al. State and fault estimation for nonlinear systems subject to censored measurements: A dynamic event‐triggered case
Fu et al. Asynchronous resource‐aware control for uncertain semi‐Markov jump systems with application to robot arm
Song et al. Observer-based output feedback control for networked systems with dual-channel event-triggered sampling and quantization
Zhang et al. Event‐triggered finite‐time quantized synchronization of uncertain delayed neural networks
Yin et al. A switched system approach to networked H∞ filtering with packet losses
CN113488993A (en) Event-triggered sliding mode load frequency control method for multi-region interconnected power system
CN111585822A (en) Lifting model prediction compensation method for data packet loss in network system
CN115622142A (en) Direct-current micro-grid coordination method for resisting hybrid network attack
CN114757548A (en) Wind power energy storage equipment adjusting performance evaluation method adopting scene construction
Zhang et al. An outlier‐resistant approach to observer‐based security control for interval type‐2 T‐S fuzzy systems subject to deception attacks
Gonçalves et al. Dynamic output feedback H∞ control of discrete-time Markov jump linear systems through linear matrix inequalities
Li et al. Finite‐time dissipative control of fuzzy distributed parameter CPSs with quantization under cyber attacks
CN109240089B (en) Design method of random control system tracking controller under probability target constraint

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant