학술논문

Decay Aggregation Efficient Output Feedback MPC for Networked Interval Type-2 T-S Fuzzy Systems With AET Mechanism and Deception Attack
Document Type
Periodical
Source
IEEE Transactions on Fuzzy Systems IEEE Trans. Fuzzy Syst. Fuzzy Systems, IEEE Transactions on. 32(5):2677-2689 May, 2024
Subject
Computing and Processing
Fuzzy systems
Estimation error
Output feedback
Observers
Symmetric matrices
Nonlinear systems
Uncertainty
Adaptive event-triggered (AET) mechanism
decay aggregation efficient output feedback model predictive control (DAEOFMPC)
deception attack
elliptic invariant set
interval type-2 Takagi–Sugeno (IT2 T-S) fuzzy model
Language
ISSN
1063-6706
1941-0034
Abstract
This article investigates the decay aggregation efficient output feedback model predictive control problem for networked interval type-2 Takagi–Sugeno fuzzy systems with the adaptive event-triggered (AET) mechanism and deception attack. First of all, this article employs the AET mechanism to save more communication resources in the networked control system, considers the impact of deception attacks on the control performance of the extended state system, and introduces a Bernoulli random variable to represent the occurrence of deception attack events. Followed by two sufficient conditions to deal with the gain matrix of the state observer and the estimation error. Then, the decay aggregation strategy is used, and after offline designing an ellipse as large as possible in the direction of the short axis of the projection ellipse of the original elliptic invariant set so that the two ellipses intersect each other, the additional perturbation variables are online optimized, and convex combinations are performed, which reduces the online computational burden and enlarges the initial feasible region. Finally, according to Lyapunov stability theory, the stability of the augmented closed-loop system under deception attacks is guaranteed and satisfies input constraints. By using the continuous stirred tank reactor simulation example, the feasibility and validity of the proposed method in this article are verified.