In this article, we explore an event-triggered optimal control problem for nonlinear networked control systems (NCSs) with input saturation and aperiodic intermittent control. First, a non-quadratic cost function with...
详细信息
In this article, we explore an event-triggered optimal control problem for nonlinear networked control systems (NCSs) with input saturation and aperiodic intermittent control. First, a non-quadratic cost function with the property of intermittent control is formulated, and a Hamilton-Jacobi-Bellman (HJB) equation is designed based on the given cost function to acquire optimal control inputs. To avoid continuous-time communication in networks, a novel aperiodically intermittent dynamic event-triggered (AIDET) control scheme, integrating a dynamic event-triggered control scheme and an aperiodic intermittent control scheme, is proposed in this article. A piecewise continuous internal dynamic variable is introduced in the event-triggering condition, which is more conducive to increasing inter-event times than static event-triggering schemes. Furthermore, the event-triggering condition designed in this article is proven strictly to exclude the Zeno behavior. Moreover, due to the difficulty of directly solving the HJB equation, an actor-critic algorithm in the AIDET scheme is proposed to approximate the optimal control inputs. The approximation errors of weight vectors are proved to be uniformly ultimately bounded. The stability of the considered systems in the proposed AIDET control scheme is analyzed using the Lyapunov theory. Finally, some simulation examples are given to illustrate the effectiveness of the proposed actor-critic algorithm-based AIDET control scheme.
Dear Editor,This letter presents a joint probabilistic scheduling and resource allocation method(PSRA) for 5G-based wireless networked control systems(WNCSs). As a control-aware optimization method, PSRA minimizes the...
详细信息
Dear Editor,This letter presents a joint probabilistic scheduling and resource allocation method(PSRA) for 5G-based wireless networked control systems(WNCSs). As a control-aware optimization method, PSRA minimizes the linear quadratic Gaussian(LQG) control cost of WNCSs by optimizing the activation probability of subsystems, the number of uplink repetitions, and the durations of uplink and downlink phases. Simulation results show that PSRA achieves smaller LQG control costs than existing works.
This study investigates the application of sliding mode control within the context of networked control systems subject to both internal and external disturbances, employing an event-triggered mechanism that leverages...
详细信息
This study investigates the application of sliding mode control within the context of networked control systems subject to both internal and external disturbances, employing an event-triggered mechanism that leverages neural networks and incorporates an adaptive control strategy. The networkedcontrol system is first modelled, and an event-triggered communication strategy based on neural networks is proposed, allowing the observer to selectively receive the latest sampled data. Next, a sliding mode observer is devised to track the sliding motion and error system, demonstrating system stability and robustness through linear matrix inequalities. In order to pledge the attainment of the sliding surface within a prescribed period, a dynamically adaptive sliding mode controller driven by event-based triggering is devised, proving the positivity of the lower bound of event-triggered intervals. Finally, simulations using a single-link mechanical arm model validate the superiority and effectiveness of the recommended approach.
In this paper, the extended Q-learning method is used to study the HPo output tracking control (HOTC) problem of networked control systems with state delay and data loss. Compared with the existing results, the networ...
详细信息
In this paper, the extended Q-learning method is used to study the HPo output tracking control (HOTC) problem of networked control systems with state delay and data loss. Compared with the existing results, the network control system in this paper contains both network delays and packet loss, as well as external disturbances. To deal with the disturbances, the HPo control problem is transformed into the maximum and minimum value problem, which is solved by the method of zero-sum game. The packet loss and delay of the state make it difficult to obtain accurate current state information. Therefore, it is necessary to design a new smith predictor that contains delay and packet loss to predict the current state. Using the predicted state, the extended Qlearning algorithm is implemented to solve the HPo output tracking problem with unknown dynamics of the system. Then, the convergence of the extended Q-learning algorithm is proved. Moreover, the stability and optimality of the proposed method are analyzed in the theorems. Finally, numerical simulation is performed to verify the effectiveness of the proposed algorithm.
For security and maintenance purposes, fault detection is remarkable for maintaining the smooth operation of networked control systems (NCSs). In addition, the common nonlinearity and uncertainty as well as complex dy...
详细信息
For security and maintenance purposes, fault detection is remarkable for maintaining the smooth operation of networked control systems (NCSs). In addition, the common nonlinearity and uncertainty as well as complex dynamics such as successive packet dropouts and multiplicative noises in various industrial NCSs will hinder or slow down the fault detection and increase the difficulty of analysis, which prompt us to seek better fault detection design. In view of the above, the problem of finite-time fault detection filtering design for uncertain nonlinear NCSs with multiplicative stochastic noises and successive packet dropout is studied in the paper. The NCS with nonlinearity and uncertainty is modeled as an interval type-2 (IT2) T-S fuzzy NCS, and also, a premise-mismatched IT2 T-S fuzzy fault detection filter is constructed accordingly. The challenges of the above-mentioned fault filter design are to overcome the analysis difficulties caused by the premise-mismatch design and how to increase the membership function (MF) utilization in obtaining the fuzzy filter. After the fault detection residual system is formed, the robust performance subject to finite-time bounded constraint of the residual system is analyzed to make the fault detected timely. Furthermore, a novel IT2 fuzzy finite-time fault detection filter parameter acquisition scheme based on the linear matrix inequality (LMI) technique is proposed. In the proposed method, the premise-mismatched design makes the realization of the filter less difficult and increases the flexibility of design. Also, in the obtained method, a developed membership-function-dependent (MFD) technique is introduced to realize the efficient use of the MF information and reduce the conservativeness of the method, which can also be extended to other problems related to IT2 fuzzy models. Numerical simulation verifies the effectiveness of the proposed finite-time IT2 fuzzy fault detection method.
This paper investigates the optimal tracking performance (OTP) of networked control systems (NCSs) with time delay subjected to multiplicative false data injection (FDI) attacks. An auxiliary model is proposed to pres...
详细信息
This paper investigates the optimal tracking performance (OTP) of networked control systems (NCSs) with time delay subjected to multiplicative false data injection (FDI) attacks. An auxiliary model is proposed to preserve the influences of the first and second moments of the attacked channel output through a supplementary additive process. By employing a two-degree-of-freedom control (TDOF) scheme and a frequency-domain analysis approach, a display expression for the OTP of NCSs is derived. It is shown that the OTP has a close relation with the intrinsic characteristic of the plant, time delay, and statistical characteristics of multiplicative false data. Finally, a numerical example is provided to validate the results.
In this article, we consider the problem of security allocation in a networkedcontrol system under stealthy attacks. The system is comprised of interconnected subsystems represented by vertices. A malicious adversary...
详细信息
In this article, we consider the problem of security allocation in a networkedcontrol system under stealthy attacks. The system is comprised of interconnected subsystems represented by vertices. A malicious adversary selects a single vertex on which to conduct a stealthy data injection attack with the purpose of maximally disrupting a distant target vertex while remaining undetected. Defense resources against the adversary are allocated by a defender on several selected vertices. First, the objectives of the adversary and the defender with uncertain targets are formulated in a probabilistic manner, resulting in an expected worst-case impact of stealthy attacks. Next, we provide a graph-theoretic necessary and sufficient condition under which the cost for the defender and the expected worst-case impact of stealthy attacks are bounded. This condition enables the defender to restrict the admissible actions to dominating sets of the graph representing the network. Then, the security allocation problem is solved through a Stackelberg game-theoretic framework. Finally, the obtained results are validated through a numerical example of a 50-vertex networkedcontrol system.
As networked control systems continue to evolve, ensuring the privacy of sensitive data becomes an increasingly pressing concern, especially in situations where the controller is physically separated from the plant. I...
详细信息
As networked control systems continue to evolve, ensuring the privacy of sensitive data becomes an increasingly pressing concern, especially in situations where the controller is physically separated from the plant. In this article, we propose a secure control scheme for computing linear quadratic control in a networkedcontrol system utilizing two networkedcontrollers, a privacy encoder, and a control restorer. Specifically, the encoder generates two state signals blurred with random noise and sends them to the controllers, while the restorer reconstructs the correct control signal. The proposed design effectively preserves the privacy of the control system's state without sacrificing the control performance. We theoretically quantify the privacy-preserving performance in terms of the state estimation error of the controllers and the disclosure probability. In addition, the proposed privacy-preserving scheme is also proven to satisfy differential privacy. Moreover, we extend the proposed privacy-preserving scheme and evaluation method to cases where collusion between two controllers occurs. Finally, we verify the validity of our proposed scheme through simulations.
In this paper, we examine the regulation performance of single-input single-output networked control systems (NCSs). Network limitations such as time delay, noise, and insufficient bandwidth significantly challenge th...
详细信息
In this paper, we examine the regulation performance of single-input single-output networked control systems (NCSs). Network limitations such as time delay, noise, and insufficient bandwidth significantly challenge the regulation performance of NCSs. We derive the regulation performance limits under dual-channel Gaussian noise, encoding-decoding processes, and bandwidth constraints using coprime factorization and spectral techniques. Our findings reveal that the regulation performance of NCSs is closely associated with the nonminimum phase zeros, unstable poles, and the communication constraints of the network. We also present a numerical simulation to validate our findings.
This paper addresses the challenge of efficiently transmitting video data in networked control systems while meeting stringent real-time constraints such as low latency and minimal packet loss. The objective is to dev...
详细信息
This paper addresses the challenge of efficiently transmitting video data in networked control systems while meeting stringent real-time constraints such as low latency and minimal packet loss. The objective is to develop a simple yet scalable network architecture that minimizes end-to-end delays for critical watchdog traffic, ensuring system reliability and performance. The proposed design includes three interconnected workcells with sensors, controllers, actuators, and cameras, and is capable of managing bandwidth-intensive video data alongside time-sensitive control traffic. Using delay calculations and Riverbed simulations, the study evaluates transmission, propagation, queuing, and processing delays. By implementing traffic management strategies like phase-shifting camera traffic, the solution achieves a significant improvement in delay reduction, decreasing end-to-end delays for watchdog traffic by over 95%, demonstrating its effectiveness in mitigating congestion and ensuring timely data delivery.
暂无评论