2020
DOI: 10.1016/j.jprocont.2020.01.010
|View full text |Cite
|
Sign up to set email alerts
|

Robust stabilization of competing species in the chemostat

Abstract: This work addresses the problem of robust stabilization of the concentrations of two different species of living organisms, which compete for a single limiting substrate in a bioreactor. This stabilization is performed using discontinuous feedback control laws that ensure the coexistence of all species. The control laws are designed considering bounded parametric uncertainties on the kinetic rates.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 22 publications
0
6
0
Order By: Relevance
“…The system (6) includes the generalized Persidskii systems studied in [6], [12], [11] (the first line in ( 6)), but also additional bilinear terms multiplied by the state components (the second line). The motivation for considering this class is that it encapsulates some models of interest, which have been studied both in the context of observer design and of stabilization [5], [3].…”
Section: Bilinear Persidskii Systemsmentioning
confidence: 99%
See 2 more Smart Citations
“…The system (6) includes the generalized Persidskii systems studied in [6], [12], [11] (the first line in ( 6)), but also additional bilinear terms multiplied by the state components (the second line). The motivation for considering this class is that it encapsulates some models of interest, which have been studied both in the context of observer design and of stabilization [5], [3].…”
Section: Bilinear Persidskii Systemsmentioning
confidence: 99%
“…Example III.1. The following model describes the bacterial growth of two distinct species inside a chemostat with a single limiting substrate [5]:…”
Section: Bilinear Persidskii Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Te mode of the system under consideration is shown in Figure 2. Te data packet dropout in the S-C channel is shown in Figure 3, and the data packet dropout in the C-A channel is exhibited in (1) Set R max as the maximal iteration number, and let c � c 0 (2) Obtain a feasible solution (P 0 i , Y 0 i , K 0 , L 0 ) satisfying ( 23) and (31), and let l � 0 (3) Settle the optimization issue bellow: Min tr(􏽐 g i�1 P l i Y i + Y l i P i ) such that ( 27) and (40) (4) Set P l i � P i , Y l i � Y i , K l � K, L l � L (5) while iterations number <R max do (6) if (27) and ( 28) hold, then (7) c � c − μ, l � l + 1, go to step 3 (8) else (9) l � l + 1, go to step 3 (10) end if (11) end while (12) if c < c 0 , then (13) c min � c + μ (14) else (15) No solution can be obtained within R max (16) end if ALGORITHM 1: Computing steps of ( 24) and (25). As can be seen from Figure 3, the probability of data packet loss during the active attack period is signifcantly greater than that during the attack sleep period.…”
Section: Numerical Examplementioning
confidence: 99%
“…Te frst type is the deception attack, which destroys the system by inserting incorrect data or processing raw data. Te second type is the denial of service (DoS) attack, whose intent is to prevent intercourse between diferent system components, thereby degrading system functionality or destroying system stability [11][12][13]. DoS attacks are easy to implement.…”
Section: Introductionmentioning
confidence: 99%