{"title":"4 The Lie Bracket","authors":"W. Levine","doi":"10.1201/B10384-89","DOIUrl":"https://doi.org/10.1201/B10384-89","url":null,"abstract":"","PeriodicalId":131575,"journal":{"name":"The Control Systems Handbook","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125322774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"4 Recursive Lyapunov Design","authors":"W. Levine","doi":"10.1201/B10384-110","DOIUrl":"https://doi.org/10.1201/B10384-110","url":null,"abstract":"","PeriodicalId":131575,"journal":{"name":"The Control Systems Handbook","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121683165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"4 Mixed Identifier and Nonidentifier-Based Tools","authors":"","doi":"10.1201/b10384-81","DOIUrl":"https://doi.org/10.1201/b10384-81","url":null,"abstract":"","PeriodicalId":131575,"journal":{"name":"The Control Systems Handbook","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116159127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Control of Bifurcations and Chaos","authors":"W. Levine","doi":"10.1201/B10384-114","DOIUrl":"https://doi.org/10.1201/B10384-114","url":null,"abstract":"","PeriodicalId":131575,"journal":{"name":"The Control Systems Handbook","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126029869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this chapter, we will adopt the analog erasure model to describe the communication channel present inside a control loop. This model, also referred to as the packet erasure or packet loss model, can be described as follows [8]. The channel operates in discrete time steps. At every time step, the channel accepts as input a finite dimensional real vector r(k). The value of the output of the channel y(k) is chosen according to an erasure process. At every time step, the erasure process assumes either the value T or the value R. If the value at time k is T , y(k + 1) = r(k) and a successful transmission is said to have occurred. Otherwise, y(k + 1) = φ and an erasure event, or a packet loss, is said to have occurred at time k. The symbol φ denotes that the receiver does not receive any data; however, the receiver is aware that an erasure event has occurred at that time. Note that we have assumed that the channel introduces a constant delay of one time step. The analog erasure model aims to capture the data loss effect due to a communication channel. Due to effects such as interference and fading in wireless channels, congestion in shared networks, or even overload and interrupts at a micro-controller, various parts of a control loop between the sensor and controller, or the controller and actuator, may exhibit information loss. By considering the idealization in which every successful transmission results in the communication of a real vector of a bounded dimension, such situations can be modeled using an analog erasure representation. While an analog erasure model has an infinite capacity in an information theoretic sense, it is often a useful representation for the cases when the communication protocols allow for large data packets to be transmitted at every time step. For instance, the minimum size of an ethernet data packet is 72 bytes. This is much more space for carrying information than usually required inside a control loop. If the data packets allow for transmission of control and sensing data to a high fidelity, the quantization effects are often ignored and an analog erasure model adopted. Various descriptions of the erasure process are possible. The following two models are the most popular:
{"title":"2 Notations and Basic Assumptions","authors":"","doi":"10.1201/b10384-88","DOIUrl":"https://doi.org/10.1201/b10384-88","url":null,"abstract":"In this chapter, we will adopt the analog erasure model to describe the communication channel present inside a control loop. This model, also referred to as the packet erasure or packet loss model, can be described as follows [8]. The channel operates in discrete time steps. At every time step, the channel accepts as input a finite dimensional real vector r(k). The value of the output of the channel y(k) is chosen according to an erasure process. At every time step, the erasure process assumes either the value T or the value R. If the value at time k is T , y(k + 1) = r(k) and a successful transmission is said to have occurred. Otherwise, y(k + 1) = φ and an erasure event, or a packet loss, is said to have occurred at time k. The symbol φ denotes that the receiver does not receive any data; however, the receiver is aware that an erasure event has occurred at that time. Note that we have assumed that the channel introduces a constant delay of one time step. The analog erasure model aims to capture the data loss effect due to a communication channel. Due to effects such as interference and fading in wireless channels, congestion in shared networks, or even overload and interrupts at a micro-controller, various parts of a control loop between the sensor and controller, or the controller and actuator, may exhibit information loss. By considering the idealization in which every successful transmission results in the communication of a real vector of a bounded dimension, such situations can be modeled using an analog erasure representation. While an analog erasure model has an infinite capacity in an information theoretic sense, it is often a useful representation for the cases when the communication protocols allow for large data packets to be transmitted at every time step. For instance, the minimum size of an ethernet data packet is 72 bytes. This is much more space for carrying information than usually required inside a control loop. If the data packets allow for transmission of control and sensing data to a high fidelity, the quantization effects are often ignored and an analog erasure model adopted. Various descriptions of the erasure process are possible. The following two models are the most popular:","PeriodicalId":131575,"journal":{"name":"The Control Systems Handbook","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127981436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy Control","authors":"","doi":"10.1201/b10384-121","DOIUrl":"https://doi.org/10.1201/b10384-121","url":null,"abstract":"","PeriodicalId":131575,"journal":{"name":"The Control Systems Handbook","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116315020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nonlinear Zero Dynamics","authors":"W. Levine","doi":"10.1201/B10384-85","DOIUrl":"https://doi.org/10.1201/B10384-85","url":null,"abstract":"","PeriodicalId":131575,"journal":{"name":"The Control Systems Handbook","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123460946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"3 Equivalences for ISS","authors":"","doi":"10.1201/b10384-102","DOIUrl":"https://doi.org/10.1201/b10384-102","url":null,"abstract":"","PeriodicalId":131575,"journal":{"name":"The Control Systems Handbook","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125787632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Input-to-State Stability","authors":"W. Levine","doi":"10.1201/B10384-101","DOIUrl":"https://doi.org/10.1201/B10384-101","url":null,"abstract":"","PeriodicalId":131575,"journal":{"name":"The Control Systems Handbook","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131263161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Variable Structure, Sliding-Mode Controller Design","authors":"","doi":"10.1201/b10384-112","DOIUrl":"https://doi.org/10.1201/b10384-112","url":null,"abstract":"","PeriodicalId":131575,"journal":{"name":"The Control Systems Handbook","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129097371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}