首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
This paper investigates a quaternion-based finite-time cooperative attitude synchronization and tracking of multiple rigid spacecraft with a virtual leader subject to bounded external disturbances. Firstly, the communication network between followers is assumed to be an undirected graph and every follower can get a direct access to the virtual leader, by using two neighborhood attitude error signals, a novel chattering-free recursive full-order sliding mode control algorithm is proposed such that all follower spacecraft synchronize to the virtual leader in finite time. In the proposed algorithm, the sliding mode surface is constructed by two layers of sliding mode surfaces, which are called as the outer and the inner sliding mode surfaces. To achieve finite-time performance of sliding mode dynamics, the outer sliding mode surface is designed as a terminal sliding mode manifold, and the inner one is designed as a fast nonsingular terminal sliding mode manifold, respectively. Then, to reduce the heavy communication burden, a distributed recursive full-order sliding mode control law is designed by introducing a distributed finite-time sliding mode estimator such that only a subset of the group members has access to the virtual leader. Finally, a numerical example is illustrated to demonstrate the validity of the proposed results.  相似文献   

2.
This paper studies the control of a medium-voltage DC (MVDC) traction power supply system for rail transit (RT). In order to optimize the ability of DC voltage fluctuation and frequency regulation of rail trains, a fuzzy adaptive cooperative secondary control strategy based on improved virtual synchronous machine (VSM) is proposed. Firstly, the improved VSM control strategy is adopted in the traction substations (TSSs), which makes the RT trains have the external characteristics of synchronous generator and have certain inertia and damping support capacity, so as to improve the ability of the RT traction system to cope with traction network transient changes. Secondly, the virtual inertia and virtual damping can be dynamically adjusted by the system frequency deviating from the nominal steady-state frequency, and the dynamic fuzzy adjustment can be carried out by the fuzzy logic system to slow down the frequency fluctuation. Then, due to the different power supply distances and parameter settings between multiple TSSs, cooperative control is used to coordinate local TSS perceptions of information between adjacent TSS to achieve consistency of frequency response of multiple TSSs under different parameters. Besides, a time-varying switching topology handoff method is considered to select the optimal communication topology between adjacent base stations. Finally, simulation results verify the effectiveness of the proposed control strategy.  相似文献   

3.
This paper investigates output-based dynamic event-triggered control for networked control systems (NCSs), in which hybrid cyber attacks randomly occur in communication network. First, a gain adjustable dynamic output feedback (DOF) controller is designed for NCSs and relaxes state-available constraint in presence of three types of attacks, including stochastic deception attacks, replay attacks and aperiodic denial-of-service (DoS) attacks. Second, a output-based dynamic event-triggered mechanism (DETM) is designed to optimize limited network resources under the cyber attacks. Third, a new switched system is established to describe the effect of hybrid cyber attacks, the DOF controller and the DETM simultaneously. Then, criteria for guaranteeing asymptotically stability of the switched system are obtained. Furthermore, the co-design method of DETM and DOF controller is provided to maintain the NCSs stability. Finally, an example is presented to show the effectiveness of the proposed methods in this paper.  相似文献   

4.
In this paper, Denial-of-Service (DoS) attacks on a microgrid (MG), especially on service-provider-edge routers in the MG, are considered and analysed. To increase the tolerance of the MG for DoS attacks with decreased computing time, we present consensus-based secondary frequency controllers with dynamic P-f droop controllers. Then, with the consideration of the impact on these controllers caused by DoS attacks, a state-space model of the MG is established based on which the stability analysis is derived. Finally, the effectiveness of the method is verified by simulation and experimental results.  相似文献   

5.
In this paper, we study the hybrid-triggered dynamic output feedback-based guaranteed cost control issue for uncertain Takagi-Sugeno (T-S) fuzzy networked control systems (NCSs) with cyber attack and actuator saturation. The hybrid-triggered mechanism comprising of time-triggered mechanism (TTM) and event-triggered mechanism (ETM) is provided to adjust the trigger strategy due to the variety in network resource utilization. Both the switching between two trigger mechanisms and the cyber attack phenomenon in communication network are respectively represented by two Bernoulli distributions. The data quantization is characterized by the sector bound technique and actuator saturation is addressed by invoking an auxiliary matrix. The stability of closed-loop NCSs with bounded disturbance and cyber attack is expressed by the methodology of quadratic boundedness (QB). The existence criteria and design strategies for minimizing the upper bound of performance in view of dynamic output feedback controller are constructed for any admissible uncertainties. Subsequently, in the light of the cone complementarity linearization (CCL) algorithm, the controller design issue is cast into the convex optimization issue which is capable of solving by the technique about linear matrix inequalities (LMIs). Finally, simulation example is employed to demonstrate the validity of designed controller.  相似文献   

6.
This paper develops the secure control strategy design issue for jump cyber–physical systems (CPSs) with malicious attacks. In the jump CPSs, the jump signals are assumed to obey the semi-Markov distribution with the transition probability depends on the stochastic sojourn-time, the physical plant and actuator simultaneous subject to the adversarial attack. A secure control strategy on robust sliding-mode control (SMC) is designed to deal with the malicious attacks. Firstly, an integral sliding-mode hyperplane is constructed, and the sliding-mode dynamics is discussed. Then, the slide-mode parameters are solved by the linear matrix inequality method with prescribed H∞ damping index. Furthermore, a robust sliding-mode controller is presented, and the reachability of the sliding-mode motion is analyzed. Finally, two examples are implemented to prove the potential of the secure control approach.  相似文献   

7.
This paper investigates the event-based control for networked T-S fuzzy cascade control systems with quantization and cyber attacks. In order to solve the problem of limited communication resources, an event-triggered scheme and a quantization mechanism are adopted, which can effectively reduce the burden of communication and save the network resources of the system. By considering the influence of cyber attacks, a newly quantized T-S fuzzy model for networked cascade control systems (NCCSs) under the event-triggered scheme is established. By using the Lyapunov stability theory, sufficient conditions guaranteeing the asymptotical stability of networked T-S fuzzy cascade control systems are obtained. In addition, the controller gains are derived by solving a set of linear matrix inequalities. Finally, a numerical example is presented to verify the validity of the proposed method.  相似文献   

8.
《Journal of The Franklin Institute》2022,359(18):11135-11154
A class of resource allocation problems with equality constraint are considered in this paper, such as economic dispatch problem in smart grid systems, which is essentially an optimization problem. Inspired by the Lagrange multiplier method, the resource allocation problem is transformed into a multi-agent consensus problem for large-scale networked distributed nodes. A consensus-based distributed fixed-time optimization algorithm is presented, where the information exchange network is depicted by a strongly connected and weight-balanced digraph. This type of communication network can ensure that the equality constraint always holds. Moreover, a new globally fixed-time stability theorem for nonlinear systems is first given in this paper. Based on this theorem and consensus theory, the optimal resource allocation scheme can be given in a fixed time. Finally, the application and comparison of the designed algorithm show that the algorithm can effectively solve the allocation problem of power resources such as economic dispatch.  相似文献   

9.
In this paper, the problem of tracking control for discrete cyber physical systems (DCPSs) with disturbance is studied, and the exponential sliding mode tracking strategies via event-triggered are presented. Firstly, for the purpose of reducing chattering in sliding-mode, a new exponential-type reaching law is designed, furthermore, the reachability of sliding surface is verified. Then, the sliding mode tracking schemes under event-triggered are presented, among which two event-triggered strategies are proposed to save network resources. Furthermore, the reachability of designed methods and the boundness of tracking errors are proved. Finally, the feasibility of the presented methods is proved by two simulation examples.  相似文献   

10.
In this paper, the target tracking control problem is investigated for an underactuated autonomous underwater vehicle (AUV) in the presence of actuator faults and external disturbances based on event-triggered mechanism. Firstly, the five degrees-of-freedom kinematic and dynamic models are constructed for an underactuated AUV, where the backstepping method is introduced as the major control framework. Then, radial basis function neural network (RBFNN) and adaptive control method are made full use of estimating and compensating the influences of uncertain information and actuator faults. Besides, the relative threshold event-triggered strategy is integrated into the tracking control to further reduce communication burden from the controller to the actuator. Moreover, through Lyapunov analysis, it is proved that the designed controllers guarantee that the tracking error variables of the underactuated AUV are uniformly ultimately bounded and can converge to a small neighborhood of the origin. Finally, the effectiveness and reasonableness of the designed tracking controllers are illustrated by comparative simulations.  相似文献   

11.
This paper concerns the consensus of the second-order discrete-time autonomous connected vehicle system (CVS) in presence of cyber-attacks. First, the necessary and sufficient conditions for the autonomous CVS are derived without a cyber-attack. Then, a virtual system in hidden layer, interconnected with the original CVS in platoon layer through the designed interaction network, is introduced to resist cyber attacks. Matrix analysis tool, algebraic graph theory and Lyapunov stability method are used to analyze the convergence of CVS. It is proved that the states of CVS can reach consensus and the state errors converge to a certain bound in the case of attacks existing only in hidden layer, or in the overall system including both hidden layer and platoon layer. Finally, the validity of the proposed control approach is verified by the designed simulations.  相似文献   

12.
This paper researches the consensus issue for multi-agent systems on matrix-weighted directed fixed and undirected switching network topologies by sampled data control method which saves resources and is more practical. Using the sampled information, the distributed control laws are designed under two network topologies, respectively. Under directed fixed network topology, the consensus conditions based on the sampling period and the eigenvalues of Laplacian matrix are deduced by matrix theory and analysis theory. Under undirected switching network topology, by using Lyapunov stability theory, the consensus conditions based on the sampling period and switched network topologies are built. Lastly, two simulation examples are offered to verify the validity of the obtained results.  相似文献   

13.
This paper studies the problem of event-triggered control for the class of Markovian jump neural networks (MJNNs) under actuator saturation and hybrid cyber attacks. In order to save the limited network bandwidth, the event-triggered mechanism (ETM) is introduce to determine whether the signal of sampler is transmitted to the remote controller through the communication network. With the aid of two sets of Bernoulli distributed random variables (BDRVs), the mathematical model of randomly occurring deception attacks (RODAs) is presented. Due to the limitations of security and technology factors and the complex network environment in practice, actuator saturation and denial-of-service (DoS) attack are also considered. In summary, the MJNNs, ETM, actuator saturation and hybrid cyber attacks are incorporated into a unified construction, and a augmented system under this construction is modeled for the first time. For this system, the existence conditions of event-triggered control are derived through LyapunovKrasovskii functional (LKF). Based on this sufficient condition, the linear matrix inequality (LMI) technique is utilized to obtain the control gain of the controller and the weight matrix of the trigger. Finally, a numerical example is given to verify the effectiveness of the proposed method in this paper.  相似文献   

14.
虚拟社区是网络环境下出现的一种网络社会现象,它将不同的用户聚集成为有机的网络共同体。本文先介绍了虚拟社区的形成,然后论述了虚拟社区的信息交互过程、信息组织方式及其特点,最后提出图书馆虚拟社区的构建。  相似文献   

15.
基于贝叶斯网络的脆弱性状态评估方法   总被引:1,自引:0,他引:1  
对网络安全性的量化评估问题是目前网络安全领域的研究热点之一。通过对现有的网络安全模型及量化分析方法的研究和比较,针对影响网络安全性的各项因素的全面脆弱性评估,提出了网络可靠度、脆弱点关键度、脆弱性状态图最低阶最小路集和最低阶最小割集4个具体的评估指标,将基于贝叶斯网络的计算方法引入脆弱性评估中,提出了量化评估计算方法。在此基础上构建了网络实例,使用SPIN验证工具对网络攻击进行模拟并对提出的评估指标及算法进行了分析验证。实验结果表明,文中提出的算法和评估指标集能够正确地量化反映网络的安全状态。  相似文献   

16.
In this paper, the issue of leader-following consensus for nonlinear multi-agent systems (NMASs) suffered from uncertain nonhomogeneous Markov switching (UNMS) and denial-of-service (DoS) cyber attacks is studied. In contrast with the existing results on NMASs with a fixed topological structure, the communication topology is governed by an UNMS jump process, where the transition rates (TRs) of UNMS are considered to be partially known or completely unknown. Also, the changes of communication topologies caused by frequently DoS cyber attacks are taken into consideration, which will destroy the chains of communication and lead to network paralysis in NMASs. In view of this, based on the stochastic technique and multiple Lyapunov functional protocol, mean-square leader-following consensus conditions related to NMASs with the UNMS and DoS cyber attacks are proposed. Finally, the effectiveness of the presented theoretical results is validated by numerical example.  相似文献   

17.
为保持用户满意度,减轻产品运营商的迭代压力,设计网络协同创新产品迭代开发模式。首先利用区块链技术搭建网络协同创新云平台,实现信息共享以及大众参与任务完成等功能;然后组建网络协同创新团队,通过这样的模式实现快速且高质量的创新任务;最后设计网络协同创新迭代开发模式的具体路径,其中包括在此路径中进一步实施快速响应的实现路径。所建立的迭代路径可用于帮助企业提升迭代创新中迭代速度和迭代质量。  相似文献   

18.
A feedback controller based on an infinite dimensional observer is proposed to solve the synchronous control problem of network wave equations with time-varying and general perturbations at the boundary. An agent in the network as a virtual leader, and all remaining agents need to incrementally track the status of the virtual leader and each agent is controlled by the Neumann-type drive through the boundary. In this paper, by adopting the idea of the active disturbance rejection control (ADRC) technology, the design of the synchronous controller is divided into three parts and has various functions in this paper. Firstly, it compensates the total disturbance asymptotically. Secondly, it ensures the asymptotic convergence between the network state and the virtual leader state to track the virtual leader. Finally, it ensures that the paired states are synchronized. The convergence of infinite dimensional systems and the suitability of closed-loop systems are analyzed and proved. Three network wave equations with disturbance observer feedback control are simulated numerically, and the simulation results show the effectiveness of the proposed method.  相似文献   

19.
This paper addresses the tracking control problem of TCP/AWM network systems in presence of nonresponsive data flows of category user datagram protocol (UDP) flows. Firstly, a modified network system model is established by a certain suitable variable transformation, and then a fuzzy logic system (FLS) emulator is used to approximate the nonlinear terms in the network dynamics representation system. Secondly, inspired by the idea of the prescribed performance control (PPC), a novel finite-time performance function (NFTPF) is proposed. In turn, an adaptive finite-time congestion control strategy is designed by compatible usage as appropriate of a barrier Lyapunov function (BLF), the backstepping control synthesis, and an event-triggered mechanism. The proposed control strategy can not only make the tracking error to satisfy the pre-assigned transient and steady-state performance, but also ensure that all the closed-loop signals remain semi-globally uniformly ultimately bounded (SGUUB). In addition, the designed congestion control strategy eliminates potential occurrence of Zeno behavior. A set of simulation results are presented to clarify the feasibility and effectiveness of proposed methodological approach and the designed congestion controller.  相似文献   

20.
《Journal of The Franklin Institute》2022,359(18):11155-11185
Nowadays, cyber-physical systems (CPSs) have been widely used in various fields due to their powerful performance and low cost. The cyber attacks will cause security risks and even huge losses according to the universality and vulnerability of CPSs. As a typical network attack, deception attacks have the features of high concealment and strong destructiveness. Compared with the traditional deception attack models with a constant value, a deception attack with random characteristics is introduced in this paper, which is difficult to identify. In order to defend against such deception attacks and overcome energy constraints in CPSs, the secure state estimation and the event-triggered communication mechanism without feedback information are co-considered to reconcile accuracy of estimation and energy consumption. Firstly, an event-triggered augmented state estimator is proposed for secure state estimation and attack identification. Then, under the ideology of equivalence, the augmented state estimator is derived as a concise two-stage estimator with reduced order. The two-stage estimator can perform the secure state estimation and attack identification respectively. The estimators ensure the accuracy of attack identification well since not treating attack information as the trigger event. Afterward, the comparison of the computational complexity of these two algorithms is analyzed. Finally, an example of a target tracking system is supplied to prove the effectiveness and efficiency of the proposed algorithm.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号