Abstract:Auxiliary particle filtering over sensor networks under protocols of amplify-Auxiliary particle filtering over sensor networks under protocols of amplifyand-forward and decode-and-forward relays and-forward and decode-and-forward relays PLEASE CITE THE PUBLISHED VERSION
“…(2) perform controller design by utilizing the dynamic event-triggering mechanism with an adaptive threshold [12]; and (3) extend the obtained result to more complex systems such as systems with uncertainty [3], multi-rate measurement [22], encoding-decoding schemes [17] and other communication protocols [10,25].…”
Section: Discussionmentioning
confidence: 99%
“…Theorem 1 comprises the overall performance analysis result (12) for the closed-loop system (9) containing stability (10) and H ∞ noise rejection (11). The proof of Theorem 1 is used to carry out performance analysis.…”
Section: Performance Analysis Of Stability and H ∞ Noise Rejectionmentioning
confidence: 99%
“…By solving the inequality (33) using the YALMIP toolbox in MATLAB software, the solution set is obtained as follows: The gain parameters of the observer-based controller ( 5) and ( 6) are computed, and stability and H ∞ noise rejection, using (10) and (11), are achieved as follows: The disturbance is represented as v k = 2e −0.2k sin(k). The initial states of system (1) are specified as an array of random numbers chosen from a standard normal distribution.…”
Section: Simulation Examplementioning
confidence: 99%
“…Filtering/estimation is a parallel extension of control, and all of them constitute the classical issues in the control area to be solved using model-based investigation methods such as linear matrix inequality, the Riccati difference equation, or recursive filtering. For modelbased control-related issues, the research stages include network-induced phenomena (incomplete measurement information, randomly occurring nonlinearities, parameter uncertainties, state saturations and dynamical bias), communication protocol (Round-Robin, weighted try-once-discard, random access, and FlexRay), coding-decoding mechanism (encryption-decryption, constrained bit rate, binary encoding scheme) and signal relay (amplify-and-forward, decode-and-forward, and full-duplex relay networks) [8][9][10][11].…”
Section: Introduction 1engineering Background Research Status and Mot...mentioning
This paper is concerned with the observer-based H∞ proportional-integral-derivative (PID) control issue for discrete-time systems using event-triggered mechanism subject to periodic random denial of service (DoS) jamming attacks and infinitely distributed delays. In order to characterize the occurrence of periodic random DoS jamming attacks in the network channel between controller and actuator, the Kronecker delta function is used to represent the periodic switching between the sleeping period and attack period, and a Bernoulli-distributed random variable is utilized to reflect the probabilistic occurrence of DoS attacks. Infinitely distributed delay is involved to reflect actual state lag. The relative event-triggering mechanism is employed to reduce unnecessary information transmission and save communication energy in the network channel between sensor and observer. An observer-based PID controller is constructed for the regulation of the system to achieve an appropriate working effect. The aim of this paper is to design a security-guaranteed PID controller for delayed systems such that both the exponential mean-square stability and the H∞ performance are satisfied. Using the Lyapunov stability theory, stochastic analysis method and matrix inequality technique, a sufficient condition is put forward that ensures the existence of the required observer and PID controller. Gain parameters of the observer and the PID controller are computed by solving a certain matrix inequality. A simulation is carried out to verify the effectiveness of the developed observer-based H∞ PID control method. The obtained H∞ noise rejection level is below 0.85, the average event-based release interval is 13, the absolute values of the maximum estimation error of two elements in the system state are 1.434 and 0.371 using the observer, and two elements of the system state converge to 0.238 and −0.054 at the 41th time step with two elements of the control output being 0.031 and 0.087.
“…(2) perform controller design by utilizing the dynamic event-triggering mechanism with an adaptive threshold [12]; and (3) extend the obtained result to more complex systems such as systems with uncertainty [3], multi-rate measurement [22], encoding-decoding schemes [17] and other communication protocols [10,25].…”
Section: Discussionmentioning
confidence: 99%
“…Theorem 1 comprises the overall performance analysis result (12) for the closed-loop system (9) containing stability (10) and H ∞ noise rejection (11). The proof of Theorem 1 is used to carry out performance analysis.…”
Section: Performance Analysis Of Stability and H ∞ Noise Rejectionmentioning
confidence: 99%
“…By solving the inequality (33) using the YALMIP toolbox in MATLAB software, the solution set is obtained as follows: The gain parameters of the observer-based controller ( 5) and ( 6) are computed, and stability and H ∞ noise rejection, using (10) and (11), are achieved as follows: The disturbance is represented as v k = 2e −0.2k sin(k). The initial states of system (1) are specified as an array of random numbers chosen from a standard normal distribution.…”
Section: Simulation Examplementioning
confidence: 99%
“…Filtering/estimation is a parallel extension of control, and all of them constitute the classical issues in the control area to be solved using model-based investigation methods such as linear matrix inequality, the Riccati difference equation, or recursive filtering. For modelbased control-related issues, the research stages include network-induced phenomena (incomplete measurement information, randomly occurring nonlinearities, parameter uncertainties, state saturations and dynamical bias), communication protocol (Round-Robin, weighted try-once-discard, random access, and FlexRay), coding-decoding mechanism (encryption-decryption, constrained bit rate, binary encoding scheme) and signal relay (amplify-and-forward, decode-and-forward, and full-duplex relay networks) [8][9][10][11].…”
Section: Introduction 1engineering Background Research Status and Mot...mentioning
This paper is concerned with the observer-based H∞ proportional-integral-derivative (PID) control issue for discrete-time systems using event-triggered mechanism subject to periodic random denial of service (DoS) jamming attacks and infinitely distributed delays. In order to characterize the occurrence of periodic random DoS jamming attacks in the network channel between controller and actuator, the Kronecker delta function is used to represent the periodic switching between the sleeping period and attack period, and a Bernoulli-distributed random variable is utilized to reflect the probabilistic occurrence of DoS attacks. Infinitely distributed delay is involved to reflect actual state lag. The relative event-triggering mechanism is employed to reduce unnecessary information transmission and save communication energy in the network channel between sensor and observer. An observer-based PID controller is constructed for the regulation of the system to achieve an appropriate working effect. The aim of this paper is to design a security-guaranteed PID controller for delayed systems such that both the exponential mean-square stability and the H∞ performance are satisfied. Using the Lyapunov stability theory, stochastic analysis method and matrix inequality technique, a sufficient condition is put forward that ensures the existence of the required observer and PID controller. Gain parameters of the observer and the PID controller are computed by solving a certain matrix inequality. A simulation is carried out to verify the effectiveness of the developed observer-based H∞ PID control method. The obtained H∞ noise rejection level is below 0.85, the average event-based release interval is 13, the absolute values of the maximum estimation error of two elements in the system state are 1.434 and 0.371 using the observer, and two elements of the system state converge to 0.238 and −0.054 at the 41th time step with two elements of the control output being 0.031 and 0.087.
“…The filtering problems over AaF relay networks (AaFRNs) have recently begun to gain particular research attention, see e.g. [26], [35], [37] for some representative results. For instance, a recursive filtering algorithm has been proposed in [35] for a class of discrete systems with stochastic uncertainties over the AaF relay-based protocol.…”
This paper is concerned with the distributed fusion filtering problem for a class of nonlinear time-varying systems subject to quantization effects within a finite-horizon H∞ framework. To improve the communication quality, the amplify-and-forward (AaF) relay mechanism, which accounts for phenomenon of missing measurements, is utilized to schedule the data transmissions from the sensors to the remote filters. The dynamic quantization, as a result of the inherent limit of network bandwidth, is further considered in the communication process from the filters to the fusion center. The main objective of this paper is to propose a distributed fusion scheme that ensures both local and fusion H∞ performance indices over a finite horizon. A sufficient condition is first established for guaranteeing a prescribed performance constraint on the local filtering error dynamics, and then the corresponding filter gains are calculated by solving a set of recursive matrix inequalities. Subsequently, with the help of the acquired local state estimates, the desired parameters of the fusion filters are designed in terms of the solution to a convex optimization problem. Finally, the effectiveness of the obtained theoretical results is testified by a numerical example.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.