48,342 research outputs found

    Observer-Based Disturbance Rejection Control for Switched Nonlinear Networked Systems under Event-Triggered Scheme

    Get PDF
    This paper employs the disturbance rejection technique for a class of switched nonlinear networked control systems (SNNCSs) with an observer-based event-triggered scheme. To estimate the influence of exogenous disturbances on the proposed system, the equivalent input disturbance (EID) technique is employed to construct an EID estimator. To provide adequate disturbance rejection performance, a new control law is built that includes the EID estimation. Furthermore, to preserve communication resources, an event-based mechanism for control signal transmission is devised and implemented. The primary goal of this work is to provide an observer-based event-triggered disturbance rejection controller that ensures the resulting closed-loop form of the examined systems is exponentially stable. Specifically, by employing a Lyapunov–Krasovskii approach, a new set of sufficient conditions in the form of linear matrix inequalities (LMIs) is derived, ensuring the exponential stabilization criteria are met. Eventually, a numerical example is used to demonstrate the efficacy and practicality of the proposed control mechanism

    Event-Triggered Stabilizing Controllers for Switched Linear Systems

    Get PDF
    International audienceWe introduce an event-triggered algorithm for the stabilization of switched linear systems. We define a pseudo-Lyapunov function common to all the subsystems. The pseudo-Lyapunov function is compared, at every time instant , to an exponentially decreasing upper threshold. An event is generated when the two functions intersect, or when a new subsystem becomes active. The existence of a Lyapunov function common to all the subsystems is a key requirement of this method. Nevertheless, imposing this condition does not add to the complexity of the problem. Indeed, we formulate the problem in terms of Linear Matrix Inequalities, as a generalized eigenvalue problem. This formulation allows to simultaneously check for the existence of a common Lyapunov function and to obtain the optimal parameters to define the upper threshold. We prove the stability of the system under the event-triggered control and we show that successive events are separated by a minimum interval of time

    Time-and event-driven communication process for networked control systems: A survey

    Get PDF
    Copyright © 2014 Lei Zou et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.In recent years, theoretical and practical research topics on networked control systems (NCSs) have gained an increasing interest from many researchers in a variety of disciplines owing to the extensive applications of NCSs in practice. In particular, an urgent need has arisen to understand the effects of communication processes on system performances. Sampling and protocol are two fundamental aspects of a communication process which have attracted a great deal of research attention. Most research focus has been on the analysis and control of dynamical behaviors under certain sampling procedures and communication protocols. In this paper, we aim to survey some recent advances on the analysis and synthesis issues of NCSs with different sampling procedures (time-and event-driven sampling) and protocols (static and dynamic protocols). First, these sampling procedures and protocols are introduced in detail according to their engineering backgrounds as well as dynamic natures. Then, the developments of the stabilization, control, and filtering problems are systematically reviewed and discussed in great detail. Finally, we conclude the paper by outlining future research challenges for analysis and synthesis problems of NCSs with different communication processes.This work was supported in part by the National Natural Science Foundation of China under Grants 61329301, 61374127, and 61374010, the Royal Society of the UK, and the Alexander von Humboldt Foundation of Germany

    Stochastic Stability of Event-triggered Anytime Control

    Full text link
    We investigate control of a non-linear process when communication and processing capabilities are limited. The sensor communicates with a controller node through an erasure channel which introduces i.i.d. packet dropouts. Processor availability for control is random and, at times, insufficient to calculate plant inputs. To make efficient use of communication and processing resources, the sensor only transmits when the plant state lies outside a bounded target set. Control calculations are triggered by the received data. If a plant state measurement is successfully received and while the processor is available for control, the algorithm recursively calculates a sequence of tentative plant inputs, which are stored in a buffer for potential future use. This safeguards for time-steps when the processor is unavailable for control. We derive sufficient conditions on system parameters for stochastic stability of the closed loop and illustrate performance gains through numerical studies.Comment: IEEE Transactions on Automatic Control, under revie

    A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks

    Get PDF
    In this paper, we formulate and analyze the problem of secure control in the context of networked linear parameter varying (LPV) systems. We consider an energy-constrained, pulse-width modulated (PWM) jammer, which corrupts the control communication channel by performing a denial-of-service (DoS) attack. In particular, the malicious attacker is able to erase the data sent to one or more actuators. In order to achieve secure control, we propose a virtual actuator technique under the assumption that the behavior of the attacker has been identified. The main advantage brought by this technique is that the existing components in the control system can be maintained without need of retuning them, since the virtual actuator will perform a reconfiguration of the plant, hiding the attack from the controller point of view. Using Lyapunov-based results that take into account the possible behavior of the attacker, design conditions for calculating the virtual actuators gains are obtained. A numerical example is used to illustrate the proposed secure control strategy.Peer ReviewedPostprint (author's final draft
    • …
    corecore