2018
DOI: 10.1109/tsmc.2017.2773634
|View full text |Cite
|
Sign up to set email alerts
|

Event-Triggered Pinning Control for Consensus of Multiagent Systems With Quantized Information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
72
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 187 publications
(72 citation statements)
references
References 37 publications
0
72
0
Order By: Relevance
“…The diagonal matrix Sfalse(tfalse)diagfalse{s1false(tfalse),,smfalse(tfalse)false}, where s i ( t ) ∈ {0,1} is driven by a supervisory switching strategy (see Figure ), and S ( t ) will be used to search for the attacked links and then prevent the attacks from entering the plant. The quantizer is denoted as qfalse(ufalse(tfalse)false)false[q1false(u1false(tfalse)false),,qmfalse(umfalse(tfalse)false)false]TRm, whose quantization error is assumed to be bounded, ie, normalΔqfalse(ufalse(tfalse)false)qfalse(ufalse(tfalse)false)ufalse(tfalse) is bounded, where u i ( t ) is the i th component of u ( t ). Advanced embedded systems‐on‐chip render the possibility to equip the receiver with storage and computing capabilities, and then, it is reasonable to assume that the i th receiver outputs the product of the two inputs s i ( t ) and q i ( u i ( t )) + a i ( t ), where a i ( t ) is the i th component of a ( t ).…”
Section: Problem Statement and Preliminariesmentioning
confidence: 99%
“…The diagonal matrix Sfalse(tfalse)diagfalse{s1false(tfalse),,smfalse(tfalse)false}, where s i ( t ) ∈ {0,1} is driven by a supervisory switching strategy (see Figure ), and S ( t ) will be used to search for the attacked links and then prevent the attacks from entering the plant. The quantizer is denoted as qfalse(ufalse(tfalse)false)false[q1false(u1false(tfalse)false),,qmfalse(umfalse(tfalse)false)false]TRm, whose quantization error is assumed to be bounded, ie, normalΔqfalse(ufalse(tfalse)false)qfalse(ufalse(tfalse)false)ufalse(tfalse) is bounded, where u i ( t ) is the i th component of u ( t ). Advanced embedded systems‐on‐chip render the possibility to equip the receiver with storage and computing capabilities, and then, it is reasonable to assume that the i th receiver outputs the product of the two inputs s i ( t ) and q i ( u i ( t )) + a i ( t ), where a i ( t ) is the i th component of a ( t ).…”
Section: Problem Statement and Preliminariesmentioning
confidence: 99%
“…Since all the eigenvalues of the Laplacian matrix L N−1 of the completed graph with weights N − 1 are 1, all the eigenvalues of 2L N−1 + Λ w(0), f l are positive and less than 3, so it can be derived by (27) and (28) that…”
Section: Adaptive Guaranteed-performance Consensus Design For Leader-mentioning
confidence: 99%
“…The first one is to design a proper Lyapunov function which can translate the nonzero eigenvalues of the Laplacian matrix of the interaction topology rightward. The second one is to construct the relationship between the linear quadratic index and the Laplacian matrix of the interaction topology, as shown in (13) and (14) for leaderless cases and (27) and (28) for leader-follower cases.…”
Section: Adaptive Guaranteed-performance Consensus Design For Leader-mentioning
confidence: 99%
“…However, the synchronization conditions have not appeared under the condition that randomness of controller gain fluctuation, nonfragile character, sampled‐data, uncertainty, and time‐delays are considered in the state‐feedback controller. Many control methods have appeared to achieve synchronization including state‐feedback control, 16 adaptive control, 17 pinning control, 18,19 sliding mode control, 20 intermittent control, 21 and so on. Fragility is the basic problem of performance degradation of the feedback control for CDNs due to the phenomenon of inaccuracies in the process of implementing controller.…”
Section: Introductionmentioning
confidence: 99%