期刊文献+
共找到320篇文章
< 1 2 16 >
每页显示 20 50 100
Self-Triggered Set Stabilization of Boolean Control Networks and Its Applications
1
作者 Rong Zhao Jun-e Feng Dawei Zhang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第7期1631-1642,共12页
Set stabilization is one of the essential problems in engineering systems, and self-triggered control(STC) can save the storage space for interactive information, and can be successfully applied in networked control s... Set stabilization is one of the essential problems in engineering systems, and self-triggered control(STC) can save the storage space for interactive information, and can be successfully applied in networked control systems with limited communication resources. In this study, the set stabilization problem and STC design of Boolean control networks are investigated via the semi-tensor product technique. On the one hand, the largest control invariant subset is calculated in terms of the strongly connected components of the state transition graph, by which a graph-theoretical condition for set stabilization is derived. On the other hand, a characteristic function is exploited to determine the triggering mechanism and feasible controls. Based on this, the minimum-time and minimum-triggering open-loop, state-feedback and output-feedback STCs for set stabilization are designed,respectively. As classic applications of self-triggered set stabilization, self-triggered synchronization, self-triggered output tracking and self-triggered output regulation are discussed as well. Additionally, several practical examples are given to illustrate the effectiveness of theoretical results. 展开更多
关键词 Boolean control networks(BCNs) output regulation self-triggered control semi-tensor product of matrices set stabilization SYNCHRONIZATION
下载PDF
Cluster DetectionMethod of Endogenous Security Abnormal Attack Behavior in Air Traffic Control Network
2
作者 Ruchun Jia Jianwei Zhang +2 位作者 Yi Lin Yunxiang Han Feike Yang 《Computers, Materials & Continua》 SCIE EI 2024年第5期2523-2546,共24页
In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set f... In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set for ATC cybersecurity attacks is constructed by setting the feature states,adding recursive features,and determining the feature criticality.The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data.An autoencoder is introduced into the AI(artificial intelligence)algorithm to encode and decode the characteristics of ATC network security attack behavior to reduce the dimensionality of the ATC network security attack behavior data.Based on the above processing,an unsupervised learning algorithm for clustering detection of ATC network security attacks is designed.First,determine the distance between the clustering clusters of ATC network security attack behavior characteristics,calculate the clustering threshold,and construct the initial clustering center.Then,the new average value of all feature objects in each cluster is recalculated as the new cluster center.Second,it traverses all objects in a cluster of ATC network security attack behavior feature data.Finally,the cluster detection of ATC network security attack behavior is completed by the computation of objective functions.The experiment took three groups of experimental attack behavior data sets as the test object,and took the detection rate,false detection rate and recall rate as the test indicators,and selected three similar methods for comparative test.The experimental results show that the detection rate of this method is about 98%,the false positive rate is below 1%,and the recall rate is above 97%.Research shows that this method can improve the detection performance of security attacks in air traffic control network. 展开更多
关键词 Air traffic control network security attack behavior cluster detection behavioral characteristics information gain cluster threshold automatic encoder
下载PDF
The Effect of Key Nodes on theMalware Dynamics in the Industrial Control Network
3
作者 Qiang Fu JunWang +1 位作者 Changfu Si Jiawei Liu 《Computers, Materials & Continua》 SCIE EI 2024年第4期329-349,共21页
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is be... As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network. 展开更多
关键词 Key nodes dynamic model industrial control network SIMULATION
下载PDF
Quantization and Event-Triggered Policy Design for Encrypted Networked Control
4
作者 Yongxia Shi Ehsan Nekouei 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期946-955,共10页
This paper proposes a novel event-driven encrypted control framework for linear networked control systems(NCSs),which relies on two modified uniform quantization policies,the Paillier cryptosystem,and an event-trigger... This paper proposes a novel event-driven encrypted control framework for linear networked control systems(NCSs),which relies on two modified uniform quantization policies,the Paillier cryptosystem,and an event-triggered strategy.Due to the fact that only integers can work in the Pailler cryptosystem,both the real-valued control gain and system state need to be first quantized before encryption.This is dramatically different from the existing quantized control methods,where only the quantization of a single value,e.g.,the control input or the system state,is considered.To handle this issue,static and dynamic quantization policies are presented,which achieve the desired integer conversions and guarantee asymptotic convergence of the quantized system state to the equilibrium.Then,the quantized system state is encrypted and sent to the controller when the triggering condition,specified by a state-based event-triggered strategy,is satisfied.By doing so,not only the security and confidentiality of data transmitted over the communication network are protected,but also the ciphertext expansion phenomenon can be relieved.Additionally,by tactfully designing the quantization sensitivities and triggering error,the proposed event-driven encrypted control framework ensures the asymptotic stability of the overall closedloop system.Finally,a simulation example of the secure motion control for an inverted pendulum cart system is presented to evaluate the effectiveness of the theoretical results. 展开更多
关键词 Cyber-security encrypted control event-triggered control(ETC) networked control systems(NCSs) semi-homomorphic encryption
下载PDF
A novel intrusion detection model for the CAN bus packet of in-vehicle network based on attention mechanism and autoencoder 被引量:1
5
作者 Pengcheng Wei Bo Wang +2 位作者 Xiaojun Dai Li Li Fangcheng He 《Digital Communications and Networks》 SCIE CSCD 2023年第1期14-21,共8页
The attacks on in-vehicle Controller Area Network(CAN)bus messages severely disrupt normal communication between vehicles.Therefore,researches on intrusion detection models for CAN have positive business value for veh... The attacks on in-vehicle Controller Area Network(CAN)bus messages severely disrupt normal communication between vehicles.Therefore,researches on intrusion detection models for CAN have positive business value for vehicle security,and the intrusion detection technology for CAN bus messages can effectively protect the invehicle network from unlawful attacks.Previous machine learning-based models are unable to effectively identify intrusive abnormal messages due to their inherent shortcomings.Hence,to address the shortcomings of the previous machine learning-based intrusion detection technique,we propose a novel method using Attention Mechanism and AutoEncoder for Intrusion Detection(AMAEID).The AMAEID model first converts the raw hexadecimal message data into binary format to obtain better input.Then the AMAEID model encodes and decodes the binary message data using a multi-layer denoising autoencoder model to obtain a hidden feature representation that can represent the potential features behind the message data at a deeper level.Finally,the AMAEID model uses the attention mechanism and the fully connected layer network to infer whether the message is an abnormal message or not.The experimental results with three evaluation metrics on a real in-vehicle CAN bus message dataset outperform some traditional machine learning algorithms,demonstrating the effectiveness of the AMAEID model. 展开更多
关键词 Controller area network bus packet In-vehicle network Attention mechanism Autoencoder
下载PDF
Consensus of networked control multi-agent systems using a double-layer encryption scheme 被引量:1
6
作者 Yamin Yan Zhiyong Chen Vijay Varadharajan 《Journal of Automation and Intelligence》 2023年第4期218-226,共9页
This paper addresses the decentralized consensus problem for a system of multiple dynamic agents with remote controllers via networking,known as a networked control multi-agent system(NCMAS).It presents a challenging ... This paper addresses the decentralized consensus problem for a system of multiple dynamic agents with remote controllers via networking,known as a networked control multi-agent system(NCMAS).It presents a challenging scenario where partial dynamic entities or remote control units are vulnerable to disclosure attacks,making them potentially malicious.To tackle this issue,we propose a secure decentralized control design approach employing a double-layer cryptographic strategy.This approach not only ensures that the input and output information of the benign entities remains protected from the malicious entities but also practically achieves consensus performance.The paper provides an explicit design,supported by theoretical proof and numerical verification,covering stability,steady-state error,and the prevention of computation overflow or underflow. 展开更多
关键词 Multi-agent systems networked control Cyberphysical security Encryption CONSENSUS
下载PDF
The Deformation Analysis of the 3D Alignment Control Network Based on the Multiple Congruence Models
7
作者 Xudong ZHANG Wenjun CHEN +5 位作者 Xiaodong ZHANG Yajun ZHENG Bin ZHANG Shaoming WANG Jiandong YUAN Guozhen SUN 《Journal of Geodesy and Geoinformation Science》 CSCD 2023年第2期21-31,共11页
In the construction and maintenance of particle accelerators,all the accelerator elements should be installed in the same coordinate system,only in this way could the devices in the actual world be consistent with the... In the construction and maintenance of particle accelerators,all the accelerator elements should be installed in the same coordinate system,only in this way could the devices in the actual world be consistent with the design drawings.However,with the occurrence of the movements of the reinforced concrete cover plates at short notice or building deformations in the long term,the control points upon the engineering structure will be displaced,and the fitness between the subnetwork and the global control network may be irresponsible.Therefore,it is necessary to evaluate the deformations of the 3D alignment control network.Different from the extant investigations,in this paper,to characterize the deformations of the control network,all of the congruent models between the points measured in different epochs have been identified,and the congruence model with the most control points is considered as the primary or fundamental model,the remaining models are recognized as the additional ones.Furthermore,the discrepancies between the primary S-transformation parameters and the additional S-transformation parameters can reflect the relative movements of the additional congruence models.Both the iterative GCT method and the iterative combinatorial theory are proposed to detect multiple congruence models in the control network.Considering the actual work of the alignment,it is essential to identify the competitive models in the monitoring network,which can provide us a hint that,even the fitness between the subnetwork and the global control network is good,there are still deformations which may be ignored.The numerical experiments show that the suggested approaches can describe the deformation of the 3D alignment control network roundly. 展开更多
关键词 similarity transformation 3D alignment control network deformation analysis hypothesis testing iterative global congruence test iterative combinatorial theory
下载PDF
A UAV-Assisted V2X Network Architecture with Separated Data Transmission and Network Control
8
作者 Xiao Ma Liang Wang +2 位作者 Weijia Han Xijun Wang Tingting Shang 《China Communications》 SCIE CSCD 2023年第6期260-276,共17页
With the explosive increasing number of connecting devices such as smart phones, vehicles,drones, and satellites in the wireless networks, how to manage and control such a huge number of networking nodes has become a ... With the explosive increasing number of connecting devices such as smart phones, vehicles,drones, and satellites in the wireless networks, how to manage and control such a huge number of networking nodes has become a great challenge. In this paper, we combine the advantages of centralized networks and distributed networks approaches for vehicular networks with the aid of Unmanned Aerial Vehicle(UAV), and propose a Center-controlled Multihop Wireless(CMW) networking scheme consisting of data transmission plane performed by vehicles and the network control plane implemented by the UAV.Besides, we jointly explore the advantages of Medium Access Control(MAC) protocols in the link layer and routing schemes in the network layer to facilitate the multi-hop data transmission for the ground vehicles.Particularly, the network control plane in the UAV can manage the whole network effectively via fully exploiting the acquired network topology information and traffic requests from each vehicle, and implements various kinds of control based on different traffic demands, which can enhance the networking flexibility and scalability significantly in vehicular networks.Simulation results validate the advantages of the proposed scheme compared with existing methods. 展开更多
关键词 V2X networks centralized network control network architecture UAV routing algorithm
下载PDF
Fast Verification of Network Configuration Updates
9
作者 Jiangyuan Yao Zheng Jiang +5 位作者 Kaiwen Zou Shuhua Weng Yaxin Li Deshun Li Yahui Li Xingcan Cao 《Computers, Materials & Continua》 SCIE EI 2023年第1期293-311,共19页
With the expansion of network services,large-scale networks have progressively become common.The network status changes rapidly in response to customer needs and configuration changes,so network configuration changes ... With the expansion of network services,large-scale networks have progressively become common.The network status changes rapidly in response to customer needs and configuration changes,so network configuration changes are also very frequent.However,no matter what changes,the network must ensure the correct conditions,such as isolating tenants from each other or guaranteeing essential services.Once changes occur,it is necessary to verify the after-changed network.Whereas,for the verification of large-scale network configuration changes,many current verifiers show poor efficiency.In order to solve the problem ofmultiple global verifications caused by frequent updates of local configurations in large networks,we present a fast configuration updates verification tool,FastCUV,for distributed control planes.FastCUV aims to enhance the efficiency of distributed control plane verification for medium and large networks while ensuring correctness.This paper presents a method to determine the network range affected by the configuration change.We present a flow model and graph structure to facilitate the design of verification algorithms and speed up verification.Our scheme verifies the network area affected by obtaining the change of the Forwarding Information Base(FIB)before and after.FastCUV supports rich network attributes,meanwhile,has high efficiency and correctness performance.After experimental verification and result analysis,our method outperforms the state-of-the-art method to a certain extent. 展开更多
关键词 network verification configuration updates network control plane forwarding information base
下载PDF
A Tutorial on Quantized Feedback Control
10
作者 Minyue Fu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期5-17,共13页
In this tutorial paper, we explore the field of quantized feedback control, which has gained significant attention due to the growing prevalence of networked control systems. These systems require the transmission of ... In this tutorial paper, we explore the field of quantized feedback control, which has gained significant attention due to the growing prevalence of networked control systems. These systems require the transmission of feedback information, such as measurements and control signals, over digital networks, presenting novel challenges in estimation and control design. Our examination encompasses various topics, including the minimal information needed for effective feedback control, the design of quantizers, strategies for quantized control design and estimation,achieving consensus control with quantized data, and the pursuit of high-precision tracking using quantized measurements. 展开更多
关键词 Consensus control high-precision control networked control quantized estimation quantized feedback control robust control
下载PDF
Time-stamped predictive functional control for networked control systems with random delays
11
作者 张奇智 张卫东 《Journal of Southeast University(English Edition)》 EI CAS 2005年第2期149-152,共4页
The random delays in a networked control system (NCS) degrade control performance and can even destabilize the control system.To deal with this problem,the time-stamped predictive functional control (PFC) algorithm is... The random delays in a networked control system (NCS) degrade control performance and can even destabilize the control system.To deal with this problem,the time-stamped predictive functional control (PFC) algorithm is proposed,which generalizes the standard PFC algorithm to networked control systems with random delays.The algorithm uses the time-stamp method to estimate the control delay,predicts the future outputs based on a discrete time delay state space model,and drives the control law that applies to an NCS from the idea of a PFC algorithm.A networked control system was constructed based on TrueTime simulator,with which the time-stamped PFC algorithm was compared with the standard PFC algorithm.The response curves show that the proposed algorithm has better control performance. 展开更多
关键词 networked control systems random delays predictive functional control industrial Ethernet
下载PDF
Mathematical Modeling and Control Algorithm Development for Bidirectional Power Flow in CCS-CNT System
12
作者 Sinqobile Wiseman Nene 《Journal of Power and Energy Engineering》 2024年第9期131-143,共12页
As the demand for more efficient and adaptable power distribution systems intensifies, especially in rural areas, innovative solutions like the Capacitor-Coupled Substation with a Controllable Network Transformer (CCS... As the demand for more efficient and adaptable power distribution systems intensifies, especially in rural areas, innovative solutions like the Capacitor-Coupled Substation with a Controllable Network Transformer (CCS-CNT) are becoming increasingly critical. Traditional power distribution networks, often limited by unidirectional flow capabilities and inflexibility, struggle to meet the complex demands of modern energy systems. The CCS-CNT system offers a transformative approach by enabling bidirectional power flow between high-voltage transmission lines and local distribution networks, a feature that is essential for integrating renewable energy sources and ensuring reliable electrification in underserved regions. This paper presents a detailed mathematical representation of power flow within the CCS-CNT system, emphasizing the control of both active and reactive power through the adjustment of voltage levels and phase angles. A control algorithm is developed to dynamically manage power flow, ensuring optimal performance by minimizing losses and maintaining voltage stability across the network. The proposed CCS-CNT system demonstrates significant potential in enhancing the efficiency and reliability of power distribution, making it particularly suited for rural electrification and other applications where traditional methods fall short. The findings underscore the system's capability to adapt to varying operational conditions, offering a robust solution for modern power distribution challenges. 展开更多
关键词 Capacitor Couple Substation Ferroresonance Power Flow Control Controllable network Controller Capacitor-Coupled Substation Incorporating Controllable network Transformer (CCS-CNT) System System Modeling
下载PDF
Fundamental Issues in Networked Control Systems 被引量:8
13
作者 Magdi S.Mahmoud a Mutaz M.Hamdan 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2018年第5期902-922,共21页
Abstract--This paper provides a survey on modeling and theories of networked control systems (NCS). In the first part, modeling of the different types of imperfections that affect NCS is discussed. These imperfectio... Abstract--This paper provides a survey on modeling and theories of networked control systems (NCS). In the first part, modeling of the different types of imperfections that affect NCS is discussed. These imperfections are quantization errors, packet dropouts, variable sampling/transmission intervals, vari- able transmission delays, and communication constraints. Then follows in the second part a presentation of several theories that have been applied for controlling networked systems. These theories include: input delay system approach, Markovian system approach, switched system approach, stochastic system approach, impulsive system approach, and predictive control approach. In the last part, some advanced issues in NCS including decentral- ized and distributed NCS, cloud control system, and co-design of NCS are reviewed. Index Terms--Decentralized networked control systems (NCS), distributed networked control systems, network constraints, net- worked control system, quantization, time delays. 展开更多
关键词 Decentralized networked control systems(NCS) distributed networked control systems network constraints networked control system QUANTIZATION time delays
下载PDF
Research on robust fault-tolerant control for networked control system with packet dropout 被引量:50
14
作者 Huo Zhihong Fang Huajing 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第1期76-82,共7页
A kind of networked control system with network-induced delay and packet dropout, modeled on asynchronous dynamical systems was tested, and the integrity design of the networked control system with sensors failures an... A kind of networked control system with network-induced delay and packet dropout, modeled on asynchronous dynamical systems was tested, and the integrity design of the networked control system with sensors failures and actuators failures was analyzed using hybrid systems technique based on the robust fault-tolerant control theory. The parametric expression of controller is given based on the feasible solution of linear matrix inequality. The simulation results are provided on the basis of detailed theoretical analysis, which further demonstrate the validity of the proposed schema. 展开更多
关键词 networked control system (NCS) Fault-tolerant control (FTC) Asynchronous dynamical systems (ADS) Integrity design Packet dropout Time delay
下载PDF
Networked Control Systems:A Survey of Trends and Techniques 被引量:61
15
作者 Xian-Ming Zhang Qing-Long Han +4 位作者 Xiaohua Ge Derui Ding Lei Ding Dong Yue Chen Peng 《IEEE/CAA Journal of Automatica Sinica》 EI CSCD 2020年第1期1-17,共17页
Networked control systems are spatially distributed systems in which the communication between sensors, actuators,and controllers occurs through a shared band-limited digital communication network. Several advantages ... Networked control systems are spatially distributed systems in which the communication between sensors, actuators,and controllers occurs through a shared band-limited digital communication network. Several advantages of the network architectures include reduced system wiring, plug and play devices,increased system agility, and ease of system diagnosis and maintenance. Consequently, networked control is the current trend for industrial automation and has ever-increasing applications in a wide range of areas, such as smart grids, manufacturing systems,process control, automobiles, automated highway systems, and unmanned aerial vehicles. The modelling, analysis, and control of networked control systems have received considerable attention in the last two decades. The ‘control over networks’ is one of the key research directions for networked control systems. This paper aims at presenting a survey of trends and techniques in networked control systems from the perspective of ‘control over networks’, providing a snapshot of five control issues: sampled-data control, quantization control, networked control, event-triggered control, and security control. Some challenging issues are suggested to direct the future research. 展开更多
关键词 Event-triggered control networked control systems quantization control sampled-data control security control
下载PDF
Guaranteed cost control for networked control systems 被引量:14
16
作者 LinboXIE HuajingFANG YingZHENG 《控制理论与应用(英文版)》 EI 2004年第2期143-148,共6页
The guaranteed cost control problem for networked control systems (NCSs) is addressed under communication constraints and varying sampling rate. First of all, a simple information-scheduling scheme is presented to des... The guaranteed cost control problem for networked control systems (NCSs) is addressed under communication constraints and varying sampling rate. First of all, a simple information-scheduling scheme is presented to describe the scheduling approach of system signals in NCSs. Then, based on such a scheme and given sampling method, the design procedure in dynamic output feedback manner is also derived which renders the closed loop system to be asymptotically stable and guarantees an upper bound of the LQ performance cost function. 展开更多
关键词 networked control systems Varying sampling rate Information scheduling Linear matrix inequality
下载PDF
Fault-Tolerant Control Research for Networked Control System under Communication Constraints 被引量:11
17
作者 HUO Zhi-Hong FANG Hua-Jing 《自动化学报》 EI CSCD 北大核心 2006年第5期659-666,共8页
Implementing a control system over a communication network induces inevitable time delays that may degrade performance and even cause instability. One of the most effective ways to reduce the negative effect of delays... Implementing a control system over a communication network induces inevitable time delays that may degrade performance and even cause instability. One of the most effective ways to reduce the negative effect of delays on the performance of networked control system (NCS) is to reduce network traffic. In this paper, adjustable deadbands are explored as a solution to reduce network traffic in NCS. A method of fault-tolerant control of networked control system is presented, which takes into account system response as well as network traffic. The integrity design for a kind of NCS with sensor failures and actuator failures is analyzed based on robust fault-tolerant control theory and information scheduling. After detailed theoretical analysis, the paper also provides the simulation results, which further validate the proposed scheme. 展开更多
关键词 networked control system (NCS) deadbands fault-tolerant control (FTC) integrity design time delay
下载PDF
Improved H_∞ control for networked control systems with network-induced delay and packet dropout 被引量:8
18
作者 李冰 武俊峰 黄玲 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第5期1215-1223,共9页
The H_∞ performance analysis and controller design for linear networked control systems(NCSs) are presented.The NCSs are considered a linear continuous system with time-varying interval input delay by assuming that t... The H_∞ performance analysis and controller design for linear networked control systems(NCSs) are presented.The NCSs are considered a linear continuous system with time-varying interval input delay by assuming that the sensor is time-driven and the logic Zero-order-holder(ZOH) and controller are event-driven.Based on this model,the delay interval is divided into two equal subintervals for H_∞ performance analysis.An improved H_∞ stabilization condition is obtained in linear matrix inequalities(LMIs) framework by adequately considering the information about the bounds of the input delay to construct novel Lyapunov–Krasovskii functionals(LKFs).For the purpose of reducing the conservatism of the proposed results,the bounds of the LKFs differential cross terms are properly estimated without introducing any slack matrix variables.Moreover,the H_∞ controller is reasonably designed to guarantee the robust asymptotic stability for the linear NCSs with an H_∞ performance level γ.Numerical simulation examples are included to validate the reduced conservatism and effectiveness of our proposed method. 展开更多
关键词 H performance networked control systems packet dropout network-induced delay
下载PDF
A Method for Surveying Control Network Optimization Based on Reliability Properties 被引量:4
19
作者 ZHANG Zhenglu DENG Yong LUO Changlin 《Geo-Spatial Information Science》 2007年第4期235-239,共5页
Surveying control network optimization design is related to standards, such as precision, reliability, sensitivity and the cost, and these standards are related closely to each other. A new method for surveying contro... Surveying control network optimization design is related to standards, such as precision, reliability, sensitivity and the cost, and these standards are related closely to each other. A new method for surveying control network simulation optimization design is proposed. This method is based on the inner reliability index of the observation values. 展开更多
关键词 surveying control network optimization design RELIABILITY redundant observation weight
下载PDF
Stability of singular networked control systems with control constraint 被引量:9
20
作者 Qiu Zhanzhi Zhang Qingling Zhao Zhiwu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第2期290-296,共7页
Based on bounded network-induced time-delay, the networked control system is modeled as a linear time-variant singular system. Using the Lyapunov theory and the linear matrix inequality approach, the criteria for dela... Based on bounded network-induced time-delay, the networked control system is modeled as a linear time-variant singular system. Using the Lyapunov theory and the linear matrix inequality approach, the criteria for delay-independent stability and delay-dependent stability of singular networked control systems are derived and transformed to a feasibility problem of linear matrix inequality formulation, which can be solved by the Matlab LMI toolbox, and the feasible solutions provide the maximum allowable delay bound that makes the system stable. A numerical example is provided, which shows that the analysis method is valid and the stability criteria are feasible. 展开更多
关键词 networked control systems Asymptotical stability Linear matrix inequality Singular controlled plant Control constraint Maximum allowable delay bound.
下载PDF
上一页 1 2 16 下一页 到第
使用帮助 返回顶部