Observer-based non-fragile control for T-S fuzzy switched systems against cyber attacks: A double-layer PDT switching method

IF 3.4 2区 数学 Q1 MATHEMATICS, APPLIED Applied Mathematics and Computation Pub Date : 2025-06-15 Epub Date: 2025-01-22 DOI:10.1016/j.amc.2025.129308
Pengcheng Zhang , Yajuan Liu , Shiyu Jiao , Chen Yang
{"title":"Observer-based non-fragile control for T-S fuzzy switched systems against cyber attacks: A double-layer PDT switching method","authors":"Pengcheng Zhang ,&nbsp;Yajuan Liu ,&nbsp;Shiyu Jiao ,&nbsp;Chen Yang","doi":"10.1016/j.amc.2025.129308","DOIUrl":null,"url":null,"abstract":"<div><div>This paper mainly investigates the observer-based non-fragile control issue for a class of T-S fuzzy switched systems under cyber attacks. Firstly, the system under consideration comprises a finite number of subsystems governed by the switching logic subject to the persistent dwell-time constraints, with each local subsystem represented by a T-S fuzzy model. Secondly, the switching logic with persistent dwell-time constraints is also used to make assumptions about the frequency and duration of attacks, and the system under cyber attacks is constructed as a double-layer switched system that satisfies two independent rules simultaneously. In addition, a non-fragile control strategy relying on observed states is developed, and the criterion for the global exponential stability and the synthesis conditions for the observer/controller are established by constructing a Lyapunov function associated with two switching signals. Finally, an electric circuit model is simulated to demonstrate the feasibility of the method.</div></div>","PeriodicalId":55496,"journal":{"name":"Applied Mathematics and Computation","volume":"495 ","pages":"Article 129308"},"PeriodicalIF":3.4000,"publicationDate":"2025-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Applied Mathematics and Computation","FirstCategoryId":"100","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0096300325000359","RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"2025/1/22 0:00:00","PubModel":"Epub","JCR":"Q1","JCRName":"MATHEMATICS, APPLIED","Score":null,"Total":0}
引用次数: 0

Abstract

This paper mainly investigates the observer-based non-fragile control issue for a class of T-S fuzzy switched systems under cyber attacks. Firstly, the system under consideration comprises a finite number of subsystems governed by the switching logic subject to the persistent dwell-time constraints, with each local subsystem represented by a T-S fuzzy model. Secondly, the switching logic with persistent dwell-time constraints is also used to make assumptions about the frequency and duration of attacks, and the system under cyber attacks is constructed as a double-layer switched system that satisfies two independent rules simultaneously. In addition, a non-fragile control strategy relying on observed states is developed, and the criterion for the global exponential stability and the synthesis conditions for the observer/controller are established by constructing a Lyapunov function associated with two switching signals. Finally, an electric circuit model is simulated to demonstrate the feasibility of the method.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于观测器的T-S模糊交换系统抗网络攻击非脆弱控制:一种双层PDT交换方法
本文主要研究了网络攻击下一类T-S模糊交换系统的基于观测器的非脆弱控制问题。首先,所考虑的系统由有限数量的受持续驻留时间约束的切换逻辑控制的子系统组成,每个局部子系统由T-S模糊模型表示。其次,利用具有持久驻留时间约束的交换逻辑对攻击的频率和持续时间进行假设,将网络攻击下的系统构建为同时满足两个独立规则的双层交换系统。此外,提出了一种依赖于观测状态的非脆弱控制策略,并通过构造与两个切换信号相关的Lyapunov函数建立了全局指数稳定性判据和观测器/控制器的综合条件。最后,对电路模型进行了仿真,验证了该方法的可行性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
7.90
自引率
10.00%
发文量
755
审稿时长
36 days
期刊介绍: Applied Mathematics and Computation addresses work at the interface between applied mathematics, numerical computation, and applications of systems – oriented ideas to the physical, biological, social, and behavioral sciences, and emphasizes papers of a computational nature focusing on new algorithms, their analysis and numerical results. In addition to presenting research papers, Applied Mathematics and Computation publishes review articles and single–topics issues.
期刊最新文献
Fixed-time projective quasi-synchronization for multi-layer coupled memristive neural networks under deception attacks Derivative-free root-finding algorithms: Perpendicular and extended secant methods with CESTAC validation Spatial eviction in attraction-Repulsion opinion dynamics: From polarized enclaves to moderate consensus S-asymptotically (ω, c)-periodic behavior of hybrid-time shunting inhibitory cellular neural networks with delays and stochastic perturbations More Players, Less Cooperation? Evolution of Conditional Cooperation in the N-player Iterated Prisoner’s Dilemma Game
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1