2017 4th International Conference on Control, Decision and Information Technologies (CoDIT) 2017
DOI: 10.1109/codit.2017.8102739
|View full text |Cite
|
Sign up to set email alerts
|

Event-triggered fault detection for networked control systems subject to packet dropout

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(22 citation statements)
references
References 21 publications
0
22
0
Order By: Relevance
“…For instance, in , the ETM invokes the events when the norm of the current state is larger than a constant. In , the ETM invokes the events when the norm of the error, between the current and last transmitted signals, is larger than a constant or monotonically decreasing time‐varying threshold.…”
Section: Introductionmentioning
confidence: 99%
“…For instance, in , the ETM invokes the events when the norm of the current state is larger than a constant. In , the ETM invokes the events when the norm of the error, between the current and last transmitted signals, is larger than a constant or monotonically decreasing time‐varying threshold.…”
Section: Introductionmentioning
confidence: 99%
“…H∞ filtering and LMI Fading measurements [11,23] Quantization effects [74] Stochastic additive faults [15,28] Medium access constraints [14] Unknown transition probability [75] Comprehensive incomplete measurements [12,13,25,26] EM algorithm under the Bayesian framework Asynchronous measurements in distributed systems [54] Residual generating based on fault diagnosis filters and observers Additive faults & incomplete measurements [7,8,17,24,27,31,32,46,47] Attacks on sensors [73] Soft faults & packet dropouts [48] Actuator faults [42,45] Faulty periodic communication [30] Cyber attacks [39,76] Sliding mode observer Attacks on sensors [72] Unknown input observer False data injection attacks [35] Minimum-variance filtering and Kalman filtering Cyber attacks [20,37,64,70] Additive faults [49] Homomorphic encryption [77] Particle filtering Cyber attacks [41,69] Strong tracking filtering Packet dropouts [78] Distributed resilient filtering Sensor degradation [79] Self-learning approaches Additive sensor fault [71,75,…”
Section: Methodologies Major Problems Addressed Literaturementioning
confidence: 99%
“…Event‐triggered schemes were integrated into the measurement model in [27] of polynomial‐fuzzy‐model systems, and an H ∞ based fault detection filter was designed against additive faults. In [28], packet dropouts in networked systems with event‐triggered mechanisms were modeled using Markov chains. A robust residual generator was designed using the dynamic parity space fault detection method with a specific optimization index.…”
Section: Recent Advancesmentioning
confidence: 99%
“…Over the last decades, industrial processes have become more complex and the demands for precise, reliable, and secure procedures followed the same path. In order to fulfill those demands, different approaches have been proposed in the literature and, in particular, one of them is the socalled Fault Detection and Isolation (FDI) approach, which primarily detects faults and rearranges the system to minimize the possible losses and/or chances of accidents, see for example (Wang et al, 2019), (Zhou et al, 2017), and (Atitallah et al, 2018). The FDI framework is widely applied to different fields in engineering as presented in the review (Venkatasubramanian et al, 2003).…”
Section: Introductionmentioning
confidence: 99%