This article studies the proportional-integral observer-based synchronization control issue for a kind of singularly perturbed complex dynamical networks, where the challenge lies in simultaneously considering the con...
详细信息
This article studies the proportional-integral observer-based synchronization control issue for a kind of singularly perturbed complex dynamical networks, where the challenge lies in simultaneously considering the constrained communication network and the data transmission security. To address this issue, an improved coding-decoding protocol (CDP) is introduced by equipping with the weighted try-once discard protocol. Unlike the other conventional CDP methods where the coder is required to equip with a strong computing/memory power, the proposed one removes this strict requirement and further reduces the high consumption of the communication bandwidth. Based on this, a proper synchronization controller is designed associating with the decoding states, and sufficient criteria are derived to reveal the relationships between the exponential ultimate boundedness of the synchronization error system and the upper bound of the singularly perturbed parameter as well as the CDP parameters. Finally, two simulation examples are offered to demonstrate effectiveness of the proposed method.
This article focuses on the probability-guaranteed set-membership formation control for leader-following heterogeneous multi-agent systems (MASs) under constrained network. Firstly, a mathematical model is proposed, w...
详细信息
This article focuses on the probability-guaranteed set-membership formation control for leader-following heterogeneous multi-agent systems (MASs) under constrained network. Firstly, a mathematical model is proposed, which is capable of simultaneously describing the security and formation performance of MASs over network subject to bit rates limited and FDI attacks. Based on this model, an improved secure coding-decoding protocol (SCDP) is constructed. Second, by SCDP, a probability-guaranteed and decoded-innovation-based online security control strategy is put forth, where the formation performance under constricted network is discovered. Then, with the help of set-membership theory, the formation error can be confined to the ellipsoids with a certain probability and associated parameters can be solved by two optimization problems. Finally, a simulation example is presented to validate the effectiveness of the proposed method.
暂无评论