2020
DOI: 10.1109/tac.2019.2929817
|View full text |Cite
|
Sign up to set email alerts
|

Protocol-Based Unscented Kalman Filtering in the Presence of Stochastic Uncertainties

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
38
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7

Relationship

3
4

Authors

Journals

citations
Cited by 96 publications
(38 citation statements)
references
References 47 publications
0
38
0
Order By: Relevance
“…Finally, a simulation example has been given to demonstrate the effectiveness of the proposed control method. The further topic motivated by the main results can be listed as: (1) the extension of the method to observer-based SMC for networked systems with different communication transmission protocols as in Shen, Wang, Shen, Alsaadi, and Alsaadi (2020), Liu, Wang, Chen, and Wei (2019), Wang, Wang, Chen, and Sheng (2019), Zou, Wang, Hu, and Gao (2017), Zou, Wang, Hu, and Zhou (2020) and quantized observation in Zou, Wang, Hu, and Han (2020), Liu, Wang, Han, and Jiang (2020); (2) the discussion of the less conservatism of proposed SMC technique handling the delays.…”
Section: Discussionmentioning
confidence: 99%
“…Finally, a simulation example has been given to demonstrate the effectiveness of the proposed control method. The further topic motivated by the main results can be listed as: (1) the extension of the method to observer-based SMC for networked systems with different communication transmission protocols as in Shen, Wang, Shen, Alsaadi, and Alsaadi (2020), Liu, Wang, Chen, and Wei (2019), Wang, Wang, Chen, and Sheng (2019), Zou, Wang, Hu, and Gao (2017), Zou, Wang, Hu, and Zhou (2020) and quantized observation in Zou, Wang, Hu, and Han (2020), Liu, Wang, Han, and Jiang (2020); (2) the discussion of the less conservatism of proposed SMC technique handling the delays.…”
Section: Discussionmentioning
confidence: 99%
“…Step 2. At time instant k + 1, solve the Riccati-like difference equation (28) to obtain Ξ k+1|k , and then substituting it into (32) and (29) derives the filter gain and the upper bound of the filtering error covariance, respectively. Moreover, the updated statex k+1|k+1 is obtained by using (8a) and (8b).…”
Section: Theorem 1 Let the Initial Conditionmentioning
confidence: 99%
“…For networked control systems with limited communication capacities, in order to avoid the data collisions and reduce the occurrence of the resulted network‐induced phenomena, 22‐24 a practical yet efficient way is to introduce certain data scheduling protocols to allocate the network resource for multiple data packet transmissions. In industry applications, the broadly employed communication protocols include the Round‐Robin (RR) protocol, the try‐once‐discard protocol and the stochastic communication protocol, based on which the corresponding control/filtering problems have stirred some initial attention in the past few years, see, for example, References 25‐34. For those protocol‐based control/filtering problems, there are generally two approaches for dealing with challenges resulting from the protocols, namely, the time‐delay system approach 35,36 and the switched system approach 27,28 …”
Section: Introductionmentioning
confidence: 99%
“…Typical state estimation schemes include, but are not limited to, the recursive state estimation,  ∞ state estimation, set-membership estimation and moving horizon estimation (MHE) approaches. [16][17][18][19][20][21][22][23][24][25][26][27][28][29][30] Among others, the MHE (also called receding-horizon estimation) is one of the mostly applied algorithms dealing with complex nonlinear and/or constrained systems in industrial applications. 31 In a large number of real-world systems, it is quite common that different measurement signals are sampled with different rates, and the resulting multirate measurements are justified by the following two main reasons.…”
Section: Introductionmentioning
confidence: 99%