50 | 21 | 5.468750e-01 | 1.797038e-07 | |||
100 | 28 | 8.437500e-01 | 6.575534e-07 | |||
200 | 28 | 1.281250e+00 | 8.227579e-07 |
This paper examines the problem of master-slave synchronization control for chaotic Lur'e systems (CLS) under sampled-data conditions. Initially, a two-sided looped Lyapunov function is constructed by fully leveraging the system characteristics and information regarding the sampling mode. Subsequently, based on the Lyapunov stability theory and using the integral inequality of free matrices, we establish the stability criteria for the synchronization error system of CLS. Utilizing these conditions, we compute the sampling controller gains through an enhanced iterative conditioned cone complementarity linearization iteration algorithm, thereby achieving synchronization of the master-slave system over more extended sampling periods. Ultimately, numerical examples are presented to demonstrate that the proposed method outperforms existing approaches documented in the literature.
Citation: Xinyu Li, Wei Wang, Jinming Liang. Improved results on sampled-data synchronization control for chaotic Lur'e systems[J]. AIMS Mathematics, 2025, 10(3): 7355-7369. doi: 10.3934/math.2025337
[1] | Saif Ur Rehman, Iqra Shamas, Shamoona Jabeen, Hassen Aydi, Manuel De La Sen . A novel approach of multi-valued contraction results on cone metric spaces with an application. AIMS Mathematics, 2023, 8(5): 12540-12558. doi: 10.3934/math.2023630 |
[2] | Shaoyuan Xu, Yan Han, Suzana Aleksić, Stojan Radenović . Fixed point results for nonlinear contractions of Perov type in abstract metric spaces with applications. AIMS Mathematics, 2022, 7(8): 14895-14921. doi: 10.3934/math.2022817 |
[3] | Li Dong, Jingyong Tang . New convergence analysis of a class of smoothing Newton-type methods for second-order cone complementarity problem. AIMS Mathematics, 2022, 7(9): 17612-17627. doi: 10.3934/math.2022970 |
[4] | Ziran Yin, Chongyang Liu, Xiaoyu Chen, Jihong Zhang, Jinlong Yuan . A comprehensive characterization of the robust isolated calmness of Ky Fan k-norm regularized convex matrix optimization problems. AIMS Mathematics, 2025, 10(3): 4955-4969. doi: 10.3934/math.2025227 |
[5] | Ting Lin, Hong Zhang, Chaofan Xie . A modulus-based modified multivariate spectral gradient projection method for solving the horizontal linear complementarity problem. AIMS Mathematics, 2025, 10(2): 3251-3268. doi: 10.3934/math.2025151 |
[6] | Maysaa Al-Qurashi, Mohammed Shehu Shagari, Saima Rashid, Y. S. Hamed, Mohamed S. Mohamed . Stability of intuitionistic fuzzy set-valued maps and solutions of integral inclusions. AIMS Mathematics, 2022, 7(1): 315-333. doi: 10.3934/math.2022022 |
[7] | Javid Iqbal, Imran Ali, Puneet Kumar Arora, Waseem Ali Mir . Set-valued variational inclusion problem with fuzzy mappings involving XOR-operation. AIMS Mathematics, 2021, 6(4): 3288-3304. doi: 10.3934/math.2021197 |
[8] | Yan Han, Shaoyuan Xu, Jin Chen, Huijuan Yang . Fixed point theorems for b-generalized contractive mappings with weak continuity conditions. AIMS Mathematics, 2024, 9(6): 15024-15039. doi: 10.3934/math.2024728 |
[9] | Duangdaw Rakjarungkiat, Nimit Nimana . An extrapolated fixed-point optimization method for strongly convex smooth optimizations. AIMS Mathematics, 2024, 9(2): 4259-4280. doi: 10.3934/math.2024210 |
[10] | Mohd Jubair, Faizan Ahmad Khan, Javid Ali, Yeşim Saraç . Estimating fixed points of non-expansive mappings with an application. AIMS Mathematics, 2021, 6(9): 9590-9601. doi: 10.3934/math.2021558 |
This paper examines the problem of master-slave synchronization control for chaotic Lur'e systems (CLS) under sampled-data conditions. Initially, a two-sided looped Lyapunov function is constructed by fully leveraging the system characteristics and information regarding the sampling mode. Subsequently, based on the Lyapunov stability theory and using the integral inequality of free matrices, we establish the stability criteria for the synchronization error system of CLS. Utilizing these conditions, we compute the sampling controller gains through an enhanced iterative conditioned cone complementarity linearization iteration algorithm, thereby achieving synchronization of the master-slave system over more extended sampling periods. Ultimately, numerical examples are presented to demonstrate that the proposed method outperforms existing approaches documented in the literature.
A set-valued mapping is a set-to-set correspondence. Problems in many fields can be abstracted as set-valued mapping models, such as sub-differential mapping of convex functions, optimal solution mapping for optimization problems with parametric variables, optimal approximation mapping, parametric mapping in cybernetics and normal dual mapping in functional analysis. These are common examples that can be abstracted into a set-valued mapping model, which shows that it is very meaningful to carry out research on this; see [1,2,3,4,5,6,7,8].
The fixed point problem of set-valued mappings with double constraints appears frequently in many fields, such as equilibrium constraint problems [9,10,11,12], n-person games [13,14] and bi-level programming problems [12,15,16,17]. Such problems are different from simple single-objective optimization problems. The constraint conditions are often more complex and diverse, and they are relatively difficult to deal with.
At present, there are relatively few studies on the fixed point problem of set-valued mappings with double constraints. In [18], the fixed point problem of set-valued mappings with double constraints is discussed, and the properties of symmetric and skew symmetric functions are given. The differential feedback control gradient-type method for solving equilibrium problems with double constraints is innovatively proposed, and its global convergence is proved. However, Antipin [18] only gives the theoretical part. Wang and Zhang [19] used the augmented Lagrange function of the generalized saddle point problem to construct a numerical algorithm on the basis of Antipin's idea. The study [19] proved that the algorithm has global convergence, and some numerical examples are given. However, numerical examples are not well integrated with practical applications.
Motivated by the above and by [20,21,22], this paper uses the projection idea to give a class of inexact alternating direction methods to solve the fixed point problem of set-valued mappings with second-order cone double constraints, and it obtains very good results.
In this paper, we introduce some basic knowledge, properties, definitions and theorems in Section 2. In Section 3, we use the generalized saddle point theory three times to obtain the variational inequality form of the fixed point problem of set-valued mappings with second-order cone double constraints. We also solve the variational inequality problem with the exact alternate method and prove the convergence of the algorithm in Section 4. We use the inexact alternating direction method to solve the variational inequality problem and prove the convergence of the algorithm in Section 5. At last, in Section 6, we solve certain types of complex mathematical optimization problems and give examples to illustrate the feasibility and effectiveness of the inexact alternating direction method.
We will give some basic definitions and properties in this section, which can be found in [18,19,20,21].
Definition 2.1. [18] A function g from Rn×Rn to Rm is called symmetric onto Ω0×Ω0 if it obeys the equality
g(v,w)=g(w,v), ∀ w∈Ω0, ∀ v∈Ω0. |
Symmetric functions have the following properties:
Property 2.1. [18] The matrices of gradient-restrictions of vector symmetric functions g(v,w) with respect to variables v and w onto the diagonal of the square Ω0×Ω0 are identical. That is,
∇Twg(v,v)=∇Tvg(v,v), ∀ v∈Ω0. |
Note that the gradient-restrictions ∇Twg(v,w)∣v=w and ∇Tvg(v,w)∣v=w are the gradients of the function g(v,v), and "∇" is a differential operator.
Property 2.2. [18] The operator 2∇wg(v,w)|v=w is potential, i.e., 2∇Twg(v,v)=∇Tg(v,v).
Definition 2.2. [18] A function Φ(v,w) from Rn×Rn to R is called skew symmetric onto Ω0×Ω0 if it obeys the equality
Φ(w,w)−Φ(w,v)−Φ(v,w)+Φ(v,v)≥0, ∀ v∈Ω0,∀ w∈Ω0. |
Definition 2.3. [19] If the differentiable map f:Rn→R is convex, then for any x,y∈Rn,
⟨∇f(x),y−x⟩≤f(y)−f(x)≤⟨∇f(y),y−x⟩. |
Definition 2.4. [20] Assuming that Ω⊆Rn is a non-empty closed convex set, any projection of x∈Rn on Ω is defined as
ΠΩ(x)=argminy∈Ω{‖y−x‖}. |
Definition 2.5. [21] If Kn⊆Rn(n≥1) satisfies
Kn={(x1;x2)|x1∈R,x2∈Rn−1,x1≥‖x2‖}, |
it is called an n-dimensional second-order cone, also called an ice cream cone.
Definition 2.6. [21] If x=(x1;x2)∈R×Rn−1, then its projection on the second-order cone is
ΠK(x)={12(1+x1‖x2‖)(‖x2‖;x2), if|x1|<‖x2‖,x, if‖x2‖≤x1,0, if‖x2‖≤−x1. |
Definition 2.7. [20] (The non-expansive property of projection) Ω is a closed convex set;
‖ΠΩ(u)−ΠΩ(v)‖≤‖u−v‖, ∀ u,v∈Ω. |
Definition 2.8. Π is an orthogonal projection if and only if there is a subspace W of V such that Π maps all elements in V to W, and Π is an identity transformation on W.
The fixed point problem of set-valued mappings with second-order cone double constraints is as follows: Find v∗∈Ω satisfying
v∗∈argmin{Φ(v∗,w)|−g(v∗,w)∈K,w∈Ω}, | (3.1) |
where Φ:Rn× Rn→R, g:Rn× Rn→Rm are two maps, K=Km1×Km2×…×Kmp, m1,m2,…,mp≥1, and m1+m2+…+mp=m, Kmi, i=1,2,…,p, is an mi-dimensional second-order cone. Ω⊆Rn is a non-empty closed convex set. Assume that Φ(v,w) and each component function of vector-valued function g(v,w) are convex in w∈Ω for any v∈Ω. It is assumed that the solution mapping w(v)≡argmin{Φ(v,w)|−g(v,w)∈K,w∈Ω} is well-defined for any v∈Ω, and the solution set of the original problem is Ω∗={v∗∈Ω|v∗∈w(v∗)}⊂Ω. Ω∗ is non-empty, which can be obtained from the continuity of Φ(v,w) and the convex property of Φ(v,w) in w∈Ω for any v∈Ω; see [25].
Under the condition that the objective function Φ(v,w) is a skew symmetric function and the constraint condition g(v,w) is a symmetric function, the original problem (3.1) is transformed into the form of a variational inequality by using the generalized saddle point three times.
Assuming v∗∈Ω is the solution of the original problem (3.1), then
Φ(v∗,v∗)≤Φ(v∗,w), −g(v∗,w)∈K, ∀ w∈Ω. | (3.2) |
Now, let Ψ(v,w)=Φ(v,w)−Φ(v,v), and then (3.2) can be rewritten as
Ψ(v∗,w)≥0, −g(v∗,w)∈K, ∀ w∈Ω. | (3.3) |
If Φ(v,w) is a skew symmetric function, according to Definition 2.2, we have that
Φ(w,w)−Φ(v,w)−Φ(w,v)+Φ(v,v)≥0, ∀ w∈Ω, ∀ v∈Ω. |
Setting v∗=v in the above inequality, we obtain
Φ(w,w)−Φ(v∗,w)−Φ(w,v∗)+Φ(v∗,v∗)≥0, ∀ w∈Ω, |
which is
Φ(w,w)−Φ(w,v∗)≥Φ(v∗,w)−Φ(v∗,v∗), ∀ w∈Ω. |
Combining the above inequality with (3.3), we can get
Φ(w,w)−Φ(w,v∗)≥Φ(v∗,w)−Φ(v∗,v∗)≥0, ∀ w∈Ω. |
Therefore,
Φ(w,w)−Φ(w,v∗)≥0, −g(v∗,w)∈K, ∀ w∈Ω. |
If g(v,w) is a symmetric function, according to Definition 2.1, the above inequality can be transformed into
Φ(w,w)−Φ(w,v∗)≥0, −g(w,v∗)∈K, ∀ w∈Ω, |
which is
Φ(v,v)−Φ(v,v∗)≥0, −g(v,v∗)∈K, ∀ v∈Ω. |
The above inequality implies that
Ψ(v,v∗)≤0, −g(v,v∗)∈K, ∀ v∈Ω. | (3.4) |
Comparing (3.3) and (3.4), we can see that (v∗,v∗) is the saddle point of the function Ψ(v,w) on the symmetric set {−g(v,w)∈K|w,v∈Ω×Ω}, that is,
{Ψ(v,v∗)≤Ψ(v∗,v∗)≤Ψ(v∗,w),−g(v,v∗)∈K, −g(v∗,w)∈K, ∀ w,v∈Ω. | (3.5) |
Obviously, inequality (3.5) is a generalized saddle point problem. On the one hand, according to Definition 2.3, if the function Φ is convex differentiable in w∈Ω for any v, then the original problem (3.1) can be described equivalently as follows: Find v∗∈Ω satisfying
⟨∇wΦ(v∗,v∗),w−v∗⟩≥0, −g(v∗,w)∈K, ∀ w∈Ω. | (3.6) |
On the other hand, since the function Φ is skew symmetric, ∀ w,v∈Ω, the monotonicity of ∇wΦ(v,w)|v=w is as follows:
⟨∇wΦ(v,v),w−v⟩≤Φ(v,w)−Φ(v,v)≤⟨∇wΦ(w,w),w−v⟩, |
which implies that
⟨∇wΦ(w,w)−∇wΦ(v,v),w−v⟩≥0, ∀ w,v∈Ω. | (3.7) |
Setting v∗=v in (3.7), we get
⟨∇wΦ(w,w)−∇wΦ(v∗,v∗),w−v∗⟩≥0, ∀ w∈Ω. | (3.8) |
Combining (3.8) with (3.6), we can obtain
⟨∇wΦ(w,w),w−v∗⟩≥0, −g(v∗,w)∈K, ∀ w∈Ω. |
Since g(v,w) is a symmetric function, the above inequality can be rewritten as
⟨∇wΦ(v,v),v∗−v⟩≤0, −g(v,v∗)∈K, ∀ v∈Ω. | (3.9) |
Comparing (3.6) with (3.9), we can see that (v∗,v∗) is the saddle point of the function ⟨∇wΦ(v,v),w−v⟩ on the symmetric set {−g(v,w)∈K|w,v∈Ω×Ω}. Hence,
{⟨∇wΦ(v,v),v∗−v⟩≤⟨∇wΦ(v∗,v∗),v∗−v∗⟩≤⟨∇wΦ(v∗,v∗),w−v∗⟩,−g(v,v∗)∈K, −g(v∗,w)∈K, ∀ w,v∈Ω. | (3.10) |
Obviously, inequality (3.10) is a generalized saddle point problem. The Lagrange function of (3.10) has the following form:
L(v,w,λ)=⟨∇wΦ(v,v),w−v⟩+⟨λ,g(v,w)⟩, | (3.11) |
where λ∈K.
If the feasible region {w|−g(v∗,w)∈K,w∈Ω} satisfies the regular condition at w=v∗, for example, the slater condition holds; then, inequality (3.10) is a convex optimization problem on w. Let v∗ be a feasible solution to the problem (3.10), and we have λ∗∈Λ(v∗) such that the function L(v∗,w,λ) satisfies
L(v∗,v∗,λ)≤L(v∗,v∗,λ∗)≤L(v∗,w,λ∗), ∀ w∈Ω, ∀ λ∈K. | (3.12) |
Obviously, inequality (3.12) is a generalized saddle point problem.
For the left side of (3.12):
⟨∇wΦ(v∗,v∗),v∗−v⟩+⟨λ,g(v∗,v∗)⟩≤⟨∇wΦ(v∗,v∗),v∗−v∗⟩+⟨λ∗,g(v∗,v∗)⟩, ∀ λ∈K, |
which implies
⟨λ∗−λ,g(v∗,v∗)⟩≥0, ∀ λ∈K. |
For the right side of (3.12):
⟨∇wΦ(v∗,v∗),v∗−v∗⟩+⟨λ∗,g(v∗,v∗)⟩≤⟨∇wΦ(v∗,v∗),w−v∗⟩+⟨λ∗,g(v∗,w)⟩, ∀ w∈Ω, |
which implies
⟨∇wΦ(v∗,v∗),w−v∗⟩+⟨λ∗,g(v∗,w)−g(v∗,v∗)⟩≥0, ∀ w∈Ω, |
⟨∇wΦ(v∗,v∗),w−v∗⟩+⟨λ∗,∇Twg(w,v∗)(w−v∗)⟩≥0, ∀ w∈Ω, |
⟨∇wΦ(v∗,v∗)+∇wg(v∗,v∗)λ∗,w−v∗⟩≥0, ∀ w∈Ω. |
Through the above discussion, we have
{⟨∇wΦ(v∗,v∗)+∇wg(v∗,v∗)λ∗,w−v∗⟩≥0,∀ w∈Ω,⟨λ−λ∗,−g(v∗,v∗)⟩≥0,∀ λ∈K. | (3.13) |
As we all know, by the equivalent relationship between the projection operator and the variational inequality, inequality (3.13) can be transformed into
{v∗=ΠΩ(v∗−α(∇wΦ(v∗,v∗)+∇wg(v∗,v∗)λ∗)),λ∗=ΠK(λ∗+αg(v∗,v∗)), | (3.14) |
where α>0 is a parameter, and ΠΩ(⋅) and ΠK(⋅) are projection operators onto the set Ω and second-order cone K, respectively.
After the above discussion, it is easy to find that when the objective function Φ(v,w) is a skew symmetric function, and the constraint g(v,w) is a symmetric function, v∗ is the solution of the fixed point problem of set-valued mappings with second-order cone double constraints if and only if v∗ satisfies inequality (3.13) or (3.14).
The classic methods for solving the variational inequality problem (3.13) are the alternating direction method, the projection shrinkage method and the external gradient method. The alternating direction method is more suitable for dealing with large-scale problems that solve the original problem by solving a series of sub-variational inequalities in each iteration.
Solving the variational inequality problem (3.13) is equivalent to solving the projection equation (3.14). Let the residual function be
e(u)=(e1(u)e2(u))=(v−ΠΩ(v−α(∇wΦ(v,v)+∇wg(v,v)λ))λ−ΠK(λ+αg(v,v))), | (4.1) |
where u=(vλ), and α>0 is a parameter. Hence, solving the problem (3.13) is equivalent to finding the zero point of the residual function (4.1). [21] proposes an alternating direction method for structural variational inequalities with equality constraints. Referring to its ideas, we propose Algorithm 1 for the fixed point problem of set-valued mappings with the second-order cone double constraints.
Algorithm 1. Alternating direction method |
Step 0. Given ϵ1>0,α>0 and λ0∈K, set k=0. |
Step 1. Find vk+1∈Ω such that |
(w−vk+1)T(∇wΦ(vk+1,vk+1)+∇wg(vk+1,vk+1)ΠK(λk+αg(vk+1,vk+1))≥0, ∀ w∈Ω. |
Step 2. Update the multiplier |
λk+1=ΠK(λk+αg(vk+1,vk+1)). |
Step 3. Convergence verification: If rk=‖e(uk+1)‖∞≤ϵ1, the iteration is terminated. Otherwise, proceed to the next step. |
Step 4. Set k=k+1, and return to Step 1. |
On the one hand, it can be obtained in Algorithm 1:
{vk+1=ΠΩ(vk+1−α(∇wΦ(vk+1,vk+1)+∇wg(vk+1,vk+1)ΠK(λk+αg(vk+1,vk+1))),λk+1=ΠK(λk+αg(vk+1,vk+1)). | (4.2) |
On the other hand, according to the residual function e(uk+1),
e(uk+1)=(vk+1−ΠΩ(vk+1−α(∇wΦ(vk+1,vk+1)+∇wg(vk+1,vk+1)λk+1))λk+1−ΠK(λk+1+αg(vk+1,vk+1))). | (4.3) |
Substituting the iteration points in Eq (4.2) into Eq (4.3), the following equation holds by using the non-expansive property of projection.
‖e1(uk+1)‖=‖vk+1−ΠΩ(vk+1−α(∇wΦ(vk+1,vk+1)+∇wg(vk+1,vk+1)ΠK(λk+1+αg(vk+1,vk+1)))‖=‖ΠΩ(vk+1−α(∇wΦ(vk+1,vk+1)+∇wg(vk+1,vk+1)ΠK(λk+αg(vk+1,vk+1)))−ΠΩ(vk+1−α(∇wΦ(vk+1,vk+1)+∇wg(vk+1,vk+1)ΠK(λk+1+αg(vk+1,vk+1)))‖≤‖α∇wg(vk+1,vk+1)(ΠK(λk+1+αg(vk+1,vk+1)−ΠK(λk+αg(vk+1,vk+1))‖≤α‖∇wg(vk+1,vk+1)‖‖λk−λk+1‖. |
‖e2(uk+1)‖=‖λk+1−ΠK(λk+1+αg(vk+1,vk+1)‖=‖ΠK(λk+αg(vk+1,vk+1)−ΠK(λk+1+αg(vk+1,vk+1)‖≤‖λk−λk+1‖. |
With the help of ‖e(u)‖2≤‖e1(u)‖2+‖e2(u)‖2, we have
‖e(uk+1)‖2≤(1+α2‖∇wg(vk+1,vk+1)‖2)‖λk−λk+1‖2. | (4.4) |
Therefore, in order to prove that the alternating direction method is convergent, it is necessary to prove limk→∞‖λk+1−λk‖2=0.
Theorem 4.1. Let u∗=(v∗,w∗,λ∗) be the solution of problem (3.1), and let {uk}={vk,wk,λk} be the sequence generated by Algorithm 1. If limk→∞‖λk+1−λk‖2=0 holds, then the algorithm is convergent.
Proof. The iterative system in Algorithm 1 can be equivalently expressed as the following variational inequalities:
⟨∇wΦ(vk+1,vk+1)+∇wg(vk+1,vk+1)λk+1,v∗−vk+1⟩≥0, | (4.5) |
⟨λk+1−λk−αg(vk+1,vk+1),λ∗−λk+1⟩≥0. | (4.6) |
Inequalities (4.5) and (4.6) can be expressed in an equivalent manner as
⟨∇wΦ(vk+1,vk+1),v∗−vk+1⟩+⟨∇wg(vk+1,vk+1)λk+1,v∗−vk+1⟩≥0, | (4.7) |
⟨λk+1−λk,λ∗−λk+1⟩−α⟨g(vk+1,vk+1),λ∗−λk+1⟩≥0. | (4.8) |
Let w=vk+1 in the first inequality of (3.13), and adding it to (4.7), we get
⟨∇wΦ(vk+1,vk+1)−∇wΦ(v∗,v∗),v∗−vk+1⟩+⟨∇wg(vk+1,vk+1)λk+1−∇wg(v∗,v∗)λ∗,v∗−vk+1⟩≥0. | (4.9) |
According to the monotonicity of ∇wΦ(v,w)|v=w, we have
⟨∇wg(vk+1,vk+1)λk+1−∇wg(v∗,v∗)λ∗,v∗−vk+1⟩≥0. | (4.10) |
In view of the convexity of g and Property 2.2, we obtain
⟨g(vk+1,vk+1)−g(v∗,v∗),λ∗−λk+1⟩≥0. | (4.11) |
Since λ∈K, −g(v∗,w)∈K. Therefore, ⟨λ∗,−g(v∗,v∗)⟩=0, ⟨λk+1,g(v∗,v∗)⟩≤0, and
⟨λk+1−λk,λ∗−λk+1⟩−α⟨g(vk+1,vk+1)−g(v∗,v∗),λ∗−λk+1⟩≥0. | (4.12) |
Combining (4.11) and (4.12), we have ⟨λk+1−λk,λ∗−λk+1⟩≥0. So, the following formula holds:
‖λ∗−λk‖2=‖λ∗−λk+1+λk+1−λk‖2≥‖λ∗−λk+1‖2+‖λk+1−λk‖2. | (4.13) |
Summing (4.13) from k=0 to k=n yields
n∑k=0‖λ∗−λk‖2≥n∑k=0‖λ∗−λk+1‖2+n∑k=0‖λk+1−λk‖2, | (4.14) |
which is
‖λ0−λ∗‖2≥‖λ∗−λn+1‖2+n∑k=0‖λk+1−λk‖2. | (4.15) |
Therefore, the series ∞∑k=0‖λk+1−λk‖2 is bounded. According to the convergence of the series, limk→∞‖λk+1−λk‖2=0 can be obtained.
In summary, limk→∞‖e(uk+1)‖2=0, and the convergence of Algorithm 1 is proved.
Algorithm 1 is a theoretical algorithm. From a practical point of view, we will give an inexact alternating direction method to solve our problem, which is what we will discuss in the next section.
Although the alternating direction method can decompose the large-scale original problem into a series of sub-problems for solution, it still needs to solve the sub-variational inequalities during each iteration. Due to the difficulty of solving the variational inequalities, this section proposes the new alternating direction method of projection. It can be approximately solved according to the properties of orthogonal projection and second-order cone projection in each iteration. Compared with the precise solution of sub-problems in the previous section, inexact solution is more feasible and faster.
Using Definition 2.8 of orthogonal projection, the residual function can be expressed as
e(u)=(e1(u)e2(u))=(v−ΠΩ(v−α(∇wΦ(v,v)+∇wg(v,v)λ))λ−ΠK(λ+αg(v,v)))=(α(∇wΦ(v,v)+∇wg(v,v)λ)λ−ΠK(λ+αg(v,v))). |
Then, solving the problem (3.13) is equivalent to finding the zero point of the above residual function. We propose an inexact alternating direction method, namely, Algorithm 2, which improves Algorithm 1 and is feasible.
Algorithm 2. Inexact alternating direction method |
Step 0. Given ϵ1>0,α>0 and λ0∈K, set k=0. |
Step 1. Find vk+1∈Ω such that |
vk+1−vk+α(∇wΦ(vk+1,vk+1)+∇wg(vk+1,vk+1)ΠK(λk+αg(vk+1,vk+1)))=0. |
Step 2. Update multiplier |
λk+1=ΠK(λk+αg(vk+1,vk+1)). |
Step 3. Convergence verification: If rk=‖e(uk+1)‖∞≤ϵ1, the iteration is terminated. Otherwise, proceed to the next step. |
Step 4. Set k=k+1, return to Step 1. |
This article selects ϵ1=10−6.
Let Gk(v)=v−vk+α(∇wΦ(v,v)+∇wg(v,v)ΠK(λk+αg(v,v))). Because the projection operator ΠK(⋅) is semi-smooth (see [23,24]), the equation Gk(⋅) in the inexact alternating direction method is also semi-smooth. If any element in ∂Gk(vk+1) is nonsingular, and vk is sufficiently close to vk+1 when k is sufficiently large, then the first iterative formulation in Algorithm 2 can be solved by applying the semi-smooth Newton method of Qi and Sun [23].
Newton method |
Step 0. Given ϵ0>0 and ξ0=vk, set j=0. |
Step 1. Determine whether ‖Gk(ξj)‖≤ϵ0 is satisfied. If it is satisfied, the iteration is terminated, |
and let vk+1=ξj. Otherwise, proceed to the next step. |
Step 2. Calculate dj=−[∂Gk(ξj)]−1Gk(ξj). |
Step 3. Set ξj+1=ξj+dj, j=j+1, return to Step 1. |
This article selects ϵ0=10−6. On the one hand, it can be obtained with Algorithm 2:
{vk+1−vk+α(∇wΦ(vk+1,vk+1)+∇wg(vk+1,vk+1)ΠK(λk+αg(vk+1,vk+1)))=0,λk+1=ΠK(λk+αg(vk+1,vk+1)). | (5.1) |
On the other hand, according to the residual function e(uk+1),
e(uk+1)=(α(∇wΦ(vk+1,vk+1)+∇wg(vk+1,vk+1)λk+1))λk+1−ΠK(λk+1+αg(vk+1,vk+1))). | (5.2) |
Combining Eqs (5.1) and (5.2), the following equations are established:
‖e1(uk+1)‖=‖α(∇wΦ(vk+1,vk+1)+∇wg(vk+1,vk+1)ΠK(λk+1+αg(vk+1,vk+1))−0‖=‖α(∇wΦ(vk+1,vk+1)+∇wg(vk+1,vk+1)ΠK(λk+1+αg(vk+1,vk+1))−vk+1+vk−α(∇wΦ(vk+1,vk+1)+∇wg(vk+1,vk+1)ΠK(λk+1+αg(vk+1,vk+1))‖≤‖α∇wg(vk+1,vk+1)(ΠK(λk+1+αg(vk+1,vk+1)−ΠK(λk+αg(vk+1,vk+1))‖+‖vk+1−vk‖≤α‖∇wg(vk+1,vk+1)‖‖λk−λk+1‖+‖vk+1−vk‖. |
‖e2(uk+1)‖=‖λk+1−ΠK(λk+1+αg(vk+1,vk+1)‖=‖ΠK(λk+αg(vk+1,vk+1)−ΠK(λk+1+αg(vk+1,vk+1)‖≤‖λk+1−λk‖. |
With the help of ‖e(u)‖2≤‖e1(u)‖2+‖e2(u)‖2, we have
‖e(uk+1)‖2≤(1+2α2‖∇wg(vk+1,vk+1)‖2)‖λk−λk+1‖2+2‖vk+1−vk‖2. |
As in Section 4, in order to illustrate that Algorithm 2 is convergent, it is necessary to prove limk→∞‖λk+1−λk‖2=0 and limk→∞‖vk+1−vk‖2=0.
Theorem 5.1. Let u∗=(v∗,w∗,λ∗) be the solution of problem (3.1), and let {uk}={vk,wk,λk} be the sequence generated by Algorithm 2. If limk→∞‖λk+1−λk‖2=0 and limk→∞‖vk+1−vk‖2=0 hold, then the algorithm is convergent.
Proof. The iterative system in the inexact alternating direction method can be equivalently expressed as the following variational inequality:
⟨vk+1−vk+α(∇wΦ(vk+1,vk+1)+∇wg(vk+1,vk+1)λk+1),v∗−vk+1⟩=0, | (5.3) |
⟨λk+1−λk−αg(vk+1,vk+1),λ∗−λk+1⟩≥0. | (5.4) |
(5.3) and (5.4) can be expressed in an equivalent manner as
⟨vk+1−vk,v∗−vk+1⟩+α⟨∇wΦ(vk+1,vk+1),v∗−vk+1⟩+α⟨∇wg(vk+1,vk+1)λk+1,v∗−vk+1⟩=0, | (5.5) |
⟨λk+1−λk,λ∗−λk+1⟩−α⟨g(vk+1,vk+1),λ∗−λk+1⟩≥0. | (5.6) |
Let w=vk+1 in the first inequality of (3.13). Adding it to the (5.5), we get
⟨vk+1−vk,v∗−vk+1⟩+α⟨∇wΦ(vk+1,vk+1)−∇wΦ(v∗,v∗),v∗−vk+1⟩+α⟨∇wg(vk+1,vk+1)λk+1−∇wg(v∗,v∗)λ∗,v∗−vk+1⟩≥0. |
According to the monotonicity of ∇wΦ(v,w)|v=w, we have
⟨vk+1−vk,v∗−vk+1⟩+α⟨∇wg(vk+1,vk+1)λk+1−∇wg(v∗,v∗)λ∗,v∗−vk+1⟩≥0. | (5.7) |
In view of the convexity of g and Property 2.2, we obtain
⟨vk+1−vk,v∗−vk+1⟩+α2⟨g(vk+1,vk+1)−g(v∗,v∗),λ∗−λk+1⟩≥0. | (5.8) |
Since λ∈K, −g(v∗,w)∈K. Therefore, ⟨λ∗,−g(v∗,v∗)⟩=0, ⟨λk+1,g(v∗,v∗)⟩≤0, and
⟨λk+1−λk,λ∗−λk+1⟩−α⟨g(vk+1,vk+1)−g(v∗,v∗),λ∗−λk+1⟩≥0. | (5.9) |
Combining (5.8) and (5.9), we have ⟨vk+1−vk,v∗−vk+1⟩+12⟨λk+1−λk,λ∗−λk+1⟩≥0. So, the following inequation holds:
12‖λ∗−λk‖2+‖v∗−vk‖2≥12‖λ∗−λk+1‖2+12‖λk+1−λk‖2+‖v∗−vk+1‖2+‖vk+1−vk‖2. | (5.10) |
Summing (5.10) from k=0 to k=n yields
12‖λ0−λ∗‖2+‖v0−v∗‖2≥12‖λ∗−λn+1‖2+‖v∗−vn+1‖2+12n∑k=0‖λk+1−λk‖2+n∑k=0‖vk+1−vk‖2. | (5.11) |
Therefore, the series ∞∑k=0‖λk+1−λk‖2 and ∞∑k=0‖vk+1−vk‖2 are bounded. According to the convergence of the series, limk→∞‖λk+1−λk‖2=0 and limk→∞‖vk+1−vk‖2=0 can be obtained.
In summary, limk→∞‖e(uk+1)‖2=0, and the convergence of the inexact alternating direction method is proved.
The mathematical programming problem with equilibrium constraints is a constraint optimization problem with variational inequalities or complementary systems in the constraints. The function f is the overall objective function of the minimization problem, F is the internal equilibrium function, and Z is the joint upper-level feasible region. For each given x∈X, X={x∈Rn|(x,y)∈Z}, and the range C(x) of y is defined. Assuming that X⊆dom(C), the mathematical programming problem with equilibrium constraints can be expressed as
minf(x,y) |
s.t (x,y)∈Z |
y∈Ω∗, | (6.1) |
where, for each x∈X, Ω∗ is the solution set of the variational inequality defined by VI(F(x,⋅),C(x)). That is, y∈Ω∗ is equivalent to y∈C(x) and satisfies ⟨F(x,y),v−y⟩≥0, ∀ v∈C(x).
If there is a real-valued function Φ(x,y) that satisfies F(x,y)=∇yΦ(x,y), in this special case, problem (6.1) is usually regarded as a bi-level optimization problem. Then, the bottom optimization problem of the bi-level optimization problem can be expressed as
minΦ(x,y) |
y∈Ω∗. | (6.2) |
Therefore, for any given vector x, there is y∈C(x), C={x∈Ω|−g(x,y∗)∈K},
y∗∈argmin{Φ(x,y∗)|−g(x,y∗)∈K,x∈Ω}. |
It can represent the optimal solution mapping S(x) of the above problem (6.2), and the solution mapping S is a set-valued mapping from Rn to Rm. Next, we will solve Examples 1–5 with Algorithm 2.
Example 1. Economic equilibrium model
minf(v,w) |
s.t (v,w)∈Z |
⟨Nw+Mv∗+m,w−v∗⟩≥0, ∀ w∈Ω |
v∈C(w), |
where C(w)={w∈Ω|−g(v,w)∈K}, g(v,w)=v+w. The bottom optimization problem can be processed as
v∗∈argmin{⟨N2w+Mv∗+m,w⟩|−g(v∗,w)∈K,w∈Ω}. | (6.3) |
Here, Φ(v,w)=⟨N2w+Mv+m,w⟩ is a skew symmetric function, and g(v,w)=v+w is a symmetric function.
In this example, α=0.5 is used, and then the expression of Hj in step j in Newton method is as follows:
Hj=In+α(N+M)+2α2∂ΠK(λk+2αξj). |
Table 1 shows the numerical results of Example 1, where Iter is the number of iterations of the solution process, and Time is the CPU calculation time when the program terminates.
50 | 21 | 5.468750e-01 | 1.797038e-07 | |||
100 | 28 | 8.437500e-01 | 6.575534e-07 | |||
200 | 28 | 1.281250e+00 | 8.227579e-07 |
The more general situation of Nash equilibrium n-person game: Let fi(xi,x∗−i) be the economic cost function of the i-th player, i∈I. This function not only depends on the strategy xi∈Xi of this player, where Xi=(xi)i∈I is a convex set, but it also depends on the strategies x−i∈X−i, X−i=(xj)i∈I∖i of other players. Then, the equilibrium point of the n-person game is the solution contained in the following set:
x∗i∈argmin{fi(xi,x∗−i)|xi∈Xi}. |
Let function Φ(v,w)=n∑i=1fi(xi,x−i), where v=(x−i),w=(xi), g(v,w)=(gi(xi,x−i)), i=1,2,⋯,n. Here, (v,w)=(xi,x−i)∈Ω×Ω, Ω=X1×X2×⋯×Xn, and then
v∗∈argmin{Φ(v∗,w)|−g(v∗,w)∈K,w∈Ω}. |
Example 2. Cournot duopoly model
v∗∈argmin{Φ(v∗,w)|−g(v∗,w)∈K,w∈Ω}, | (6.4) |
where Φ(v,w)=wT(1001)w+vT(0110)w−wTu, (u>0), is a skew symmetric function, and g(v,w)=(−(w1−1)2−(v1−1)2−(w2−1)2−(v2−1)2) is a symmetric function.
Let N=(2002), M=(0110). In this example, α=0.5 is used, and then the expression of Hj in step j in Newton method is as follows:
Hj=In+α(N+M)−2αdiag1≤i≤n{ΠK(λki−α(ξji−1)2)−4α(ξji−1)2∂ΠK(λki−2α(ξji−1)2)}. |
Table 2 shows the numerical results of Example 2.
n | K | Iter | Time | rk | ϵ0 | ϵ1 |
2 | K2 | 26 | 6.093750e-01 | 9.330831e-07 | 10−6 | 10−6 |
Consider the following bi-level programming problem:
min(v,w)f(v,w) |
s.t h(v,w)≤0 |
v∈Ω∗, | (6.5) |
where Ω∗ represents the solution set of the underlying problem, which is
minvΦ(v,w) |
s.t −g(v,w)∈K. | (6.6) |
Then, the set of reasonable reflections of the underlying problem is
Ω∗={v∗|v∗∈argmin{Φ(v∗,w)|−g(v∗,w)∈K,w∈Ω}}. |
Example 3. Consider the following bi-level programming problem in R2:
minw−v |
s.t (v,w)≥0 |
v∈argmin{v22|v+w∈K,w∈Ω}. | (6.7) |
Obviously, problem (6.7) has the only optimal solution (0,0).
Example 4. Consider the bottom optimization problem in the bi-level programming problem in Rn:
v∗∈argmin{w22|−g(v∗,w)∈K,w∈Ω}, | (6.8) |
where Φ(v,w)=w22 is a skew symmetric function, and g(v,w)=(w1sin(v1)+v1sin(w1)w2sin(v2)+v2sin(w2)⋮wnsin(vn)+vnsin(wn)) is a symmetric function.
In this example, α=0.5 is used, and then the expression of Hj in step j in Newton method is as follows:
Hj=(1+α)In+αdiag1≤i≤n{[2cos(ξji)−ξjisin(ξji)]ΠK(λki+2αξjisin(ξji))}+2α2diag1≤i≤n{[sin(ξji)+ξjicos(ξji)]2∂ΠK(λki+2αξjisin(ξji))}. |
Table 3 shows the numerical results of Example 3.
n | K | Iter | Time | rk | ϵ0 | ϵ1 |
50 | K50 | 11 | 5.312500e-01 | 5.085837e-07 | 10−6 | 10−6 |
100 | K50×K50 | 17 | 1.218750e+00 | 5.810239e-07 | 10−6 | 10−6 |
200 | K50×K50×K100 | 17 | 3.843750e+00 | 8.325520e-07 | 10−6 | 10−6 |
To illustrate the effectiveness and feasibility of the algorithm, we compared Algorithm 2 with the algorithm in [19] under the condition of achieving the same accuracy, and the numerical results are shown below. Here, ALM denotes the augmented Lagrange method in [19], and IADM denotes Algorithm 2 in this paper.
Ex1(n=50) | Ex4(n=50) | Ex1(n=100) | Ex4(n=100) | |||||
ALM | 7.187500e-01 | 23 | 6.562500e-01 | 11 | 9.843750e-01 | 23 | 1.187500e+00 | 12 |
IADM | 5.468750e-01 | 21 | 5.312500e-01 | 11 | 8.437500e-01 | 28 | 1.218750e+00 | 17 |
Ex1(n=200) | Ex4(n=200) | Ex2(n=2) | ||||||
ALM | 1.859375e+00 | 23 | 4.218750e+00 | 18 | 6.250000e-01 | 42 | ||
IADM | 1.281250e+00 | 28 | 3.843750e+00 | 17 | 6.093750e-01 | 26 |
As can be seen from the above table, Algorithm 2 is better than the algorithm in [19].
Let K be a nonempty closed and convex subset of a Hilbert space E and f:E×E→R be a bi-function satisfying f(x,x)=0 for any x∈K. The equilibrium problem for the bi-function f on K is defined as follows:
Find x∈K such that f(x∗,y)>0, ∀ y∈K. | (6.9) |
Problem (6.9) is equivalent to the following optimization problem with non-negative optimal value:
minf(x∗,y) |
s.t y∈K. | (6.10) |
That is,
x∗∈argmin{f(x∗,y)∣y∈K}. | (6.11) |
Example 5. Consider that f:E×E→R is defined by
f(x,y)=⟨Ax+By+c,y−x⟩, ∀ y∈K, | (6.12) |
where A=(3.1200023.6000003.5200023.3000003), B=(1.6100011.6000001.5100011.5000002), c=(1−2−12−1), and K={x∈R5∣−5≤xi≤5}. It is easy to verify that f(x,y) is a skew symmetric function. Let a=(5,5,5,5,5)T, g(x)=−x−a, and h(x)=x−a. We have
x∗∈argmin{⟨Ax∗+By+c,y−x∗⟩∣y∈K}, | (6.13) |
where K={x∈R5∣g(x)≤0,h(x)≤0}.
In this example, α=0.5 is used, and then the expression of Hj in step j in Newton method is as follows:
Hj=I5+α(A+B)−αI5(β−γ), |
where β={0,ifp−α(ξ+c)<0,−α,ifp−α(ξ+c)>0,0 or −α,ifp−α(ξ+c)=0, and γ={0,ifμ+α(ξ−c)<0,α,ifμ+α(ξ−c)>0,0 or α,ifμ+α(ξ−c)=0.Note that p∈R5+ and μ∈R5+ are Lagrange multipliers of problem (6.13).
Table 5 shows the numerical results of Example 5.
5 | 23 | 0.468750 | 6.202562e-07 |
Table 6 shows the numerical results of [26].
5 | 102 | 0.9632 | ||
5 | 18 | 0.1919 | ||
5 | 13 | 0.1279 | ||
5 | 123 | 1.1854 | ||
5 | 77 | 0.7494 | ||
5 | 18 | 0.1797 |
By comparing with [26], we can see that in the cases of 1n+1, 1(n+1)log(n+3) and log(n+3)n+1, the algorithm of this paper has obvious advantages.
This paper mainly studies the fixed point problem of set-valued mappings with second-order cone double constraints by using the alternating direction method. With the help of generalized saddle point theory, the variational inequality problems of the fixed point problem of set-valued mappings with second-order cone double constraints are obtained. By using the projection idea, a new alternating direction method is proposed. The new alternating direction method requires only simple projection calculations for each iteration, avoiding the problem of solving sub-variational inequalities. Finally, five complex problems with second-order cone double constraints in practical applications are given. An inexact alternating direction method is used to solve them, which further illustrates the practicability and effectiveness of the algorithm. Furthermore, the results for fixed-point problems can also be applied to [27,28,29].
Although the research in this paper has achieved some results, there are still many questions worthy of our continued research. For example, the convergence rate of the new alternating direction method still needs to be estimated. In practical applications, the number of variables is often more than two, and the problem of which alternating direction method is applicable to multiple separable variables is also the focus of future research.
This work was supported by the general project of Liaoning Provincial Department of Education under project No. LJKMZ20220524 and the National Natural Science Foundation of China under project No. 10771026.
[1] |
A. T. Azar, F. E. Serrano, Q. Zhu, M. Bettayeb, G. Fusco, J. Na, et al., Robust stabilization and synchronization of a novel chaotic system with input saturation constraints, Entropy, 23 (2021), 1110. https://doi.org/10.3390/e23091110 doi: 10.3390/e23091110
![]() |
[2] |
J. Wang, K. Shi, Q. Huang, S. Zhong, D. Zhang, Stochastic switched sampled-data control for synchronization of delayed chaotic neural networks with packet dropout, Appl. Math. Comput., 335 (2018), 211–230. https://doi.org/10.1016/j.amc.2018.04.038 doi: 10.1016/j.amc.2018.04.038
![]() |
[3] |
K. Shi, Y. Tang, X. Liu, S. Zhong, Non-fragile sampled-data robust synchronization of uncertain delayed chaotic Lurie systems with randomly occurring controller gain fluctuation, ISA T., 66 (2017), 185–199. https://doi.org/10.1016/j.isatra.2016.11.002 doi: 10.1016/j.isatra.2016.11.002
![]() |
[4] |
T. H. Lee, J. H. Park, S. M. Lee, O. M. Kwon, Robust synchronization of chaotic systems with randomly occurring uncertainties via stochastic sampled-data control, Int. J. Control, 86 (2013), 107–119. https://doi.org/10.1080/00207179.2012.720034 doi: 10.1080/00207179.2012.720034
![]() |
[5] |
B. Kaviarasan, R. Kavikumar, O. M. Kwon, R. Sakthivel, A delay-product-type lyapunov functional approach for enhanced synchronization of chaotic Lur'e systems using a quantized controller, AIMS Math., 9 (2024), 13843–13860. https://doi.org/10.3934/math.2024673 doi: 10.3934/math.2024673
![]() |
[6] |
J. G. Lu, D. J. Hill, Global asymptotical synchronization of chaotic Lur'e systems using sampled data: A linear matrix inequality approach, IEEE T. Circuits II, 55 (2008), 586–590. https://doi.org/10.1109/TCSII.2007.916788 doi: 10.1109/TCSII.2007.916788
![]() |
[7] |
Y. Kim, Y. Lee, S. Lee, P. Selvaraj, R. Sakthivel, O. Kwon, Design and experimentation of sampled-data controller in T-S fuzzy systems with input saturation through the use of linear switching methods, AIMS Math., 9 (2024), 2389–2410. https://doi.org/10.3934/math.2024118 doi: 10.3934/math.2024118
![]() |
[8] |
T. Yu, J. Cao, K. Lu, Finite-time synchronization control of networked chaotic complex-valued systems with adaptive coupling, IEEE T. Netw. Sci. Eng., 9 (2022), 2510–2520. https://doi.org/10.1109/TNSE.2022.3164773 doi: 10.1109/TNSE.2022.3164773
![]() |
[9] |
L. Zhao, G. H. Yang, Adaptive sliding mode fault tolerant control for nonlinearly chaotic systems against dos attack and network faults, J. Franklin I., 354 (2017), 6520–6535. https://doi.org/10.1016/j.jfranklin.2017.08.005 doi: 10.1016/j.jfranklin.2017.08.005
![]() |
[10] |
W. Jiang, H. Wang, J. Lu, G. Cai, W. Qin, Synchronization for chaotic systems via mixed-objective dynamic output feedback robust model predictive control, J. Franklin I., 354 (2017), 4838–4860. https://doi.org/10.1016/j.jfranklin.2017.05.007 doi: 10.1016/j.jfranklin.2017.05.007
![]() |
[11] |
W. Ji, Y. Jiang, J. Sun, Y. Zhu, S. Wang, On stability and H∞ control synthesis of sampled-data systems: A multiple convex function approximation approachl, Int. J. Robust Nonlin., 34 (2024), 7655–7678. https://doi.org/10.1002/rnc.7359 doi: 10.1002/rnc.7359
![]() |
[12] |
D. Tong, B. Ma, Q. Chen, Y. Wei, P. Shi, Finite-time synchronization and energy consumption prediction for multilayer fractional-order networks, IEEE T. Circuits II, 70 (2023), 2176–2180. https://doi.org/10.1109/TCSII.2022.3233420 doi: 10.1109/TCSII.2022.3233420
![]() |
[13] |
S. Zhu, J. Lu, S. i. Azuma, W. X. Zheng, Strong structural controllability of boolean networks: Polynomial-time criteria, minimal node control, and distributed pinning strategies, IEEE T. Automat. Contr., 68 (2023), 5461–5476. https://doi.org/10.1109/TAC.2022.3226701 doi: 10.1109/TAC.2022.3226701
![]() |
[14] |
D. Zeng, R. Zhang, Y. Liu, S. Zhong, Sampled-data synchronization of chaotic Lur'e systems via input-delay-dependent-free-matrix zero equality approach, Appl. Math. Comput., 315 (2017), 34–46. https://doi.org/10.1016/j.amc.2017.07.039 doi: 10.1016/j.amc.2017.07.039
![]() |
[15] |
Q. Zhu, Event-triggered sampling problem for exponential stability of stochastic nonlinear delay systems driven by lévy processes, IEEE T. Automat. Contr., 70 (2025), 1176–1183. https://doi.org/10.1109/TAC.2024.3448128 doi: 10.1109/TAC.2024.3448128
![]() |
[16] |
W. Wang, R. K. Xie, L. Ding, Stability analysis of load frequency control systems with electric vehicle considering time-varying delay, IEEE Access, 13 (2025), 3562–3571. https://doi.org/10.1109/ACCESS.2024.3519343 doi: 10.1109/ACCESS.2024.3519343
![]() |
[17] |
H. B. Zeng, K. L. Teo, Y. He, A new looped-functional for stability analysis of sampled-data systems, Automatica, 82 (2017), 328–331. https://doi.org/10.1016/j.automatica.2017.04.051 doi: 10.1016/j.automatica.2017.04.051
![]() |
[18] |
X. Yang, Q. Zhu, H. Wang, Exponential stabilization of stochastic systems via novel event-triggered switching controls, IEEE T. Automat. Contr., 69 (2024), 7948–7955. https://doi.org/10.1109/TAC.2024.3406668 doi: 10.1109/TAC.2024.3406668
![]() |
[19] |
H. B. Zeng, Y. J. Chen, Y. He, X. M. Zhang, A delay-derivative-dependent switched system model method for stability analysis of linear systems with time-varying delay, Automatica, 175 (2025), 112183. https://doi.org/10.1016/j.automatica.2025.112183 doi: 10.1016/j.automatica.2025.112183
![]() |
[20] |
H. B. Zeng, Z. L. Zhai, H. Yan, W. Wang, A new looped functional to synchronize neural networks with sampled-data control, IEEE T. Neur. Net. Lear., 33 (2022), 406–415. https://doi.org/10.1109/TNNLS.2020.3027862 doi: 10.1109/TNNLS.2020.3027862
![]() |
[21] |
Y. Liu, L. Tong, J. Lou, J. Lu, J. Cao, Sampled-data control for the synchronization of boolean control networks, IEEE T. Cybernetics, 49 (2019), 726–732. https://doi.org/10.1109/TCYB.2017.2779781 doi: 10.1109/TCYB.2017.2779781
![]() |
[22] |
W. H. Chen, Z. Wang, X. Lu, On sampled-data control for master-slave synchronization of chaotic Lur'e systems, IEEE T. Circuits II, 59 (2012), 515–519. https://doi.org/10.1109/TCSII.2012.2204114 doi: 10.1109/TCSII.2012.2204114
![]() |
[23] |
C. K. Zhang, L. Jiang, Y. He, Q. Wu, M. Wu, Asymptotical synchronization for chaotic Lur'e systems using sampled-data control, Commun. Nonlinear Sci., 18 (2013), 2743–2751. https://doi.org/10.1016/j.cnsns.2013.03.008 doi: 10.1016/j.cnsns.2013.03.008
![]() |
[24] |
C. Ge, C. Hua, X. Guan, Master-slave synchronization criteria of Lur'e systems with time-delay feedback control, Appl. Math. Comput., 244 (2014), 895–902. https://doi.org/10.1016/j.amc.2014.07.045 doi: 10.1016/j.amc.2014.07.045
![]() |
[25] |
K. Shi, X. Liu, H. Zhu, S. Zhong, Y. Zeng, C. Yin, Novel delay-dependent master-slave synchronization criteria of chaotic Lur'e systems with time-varying-delay feedback control, Appl. Math. Comput., 282 (2016), 137–154. https://doi.org/10.1016/j.amc.2016.01.062 doi: 10.1016/j.amc.2016.01.062
![]() |
[26] |
T. H. Lee, J. H. Park, Improved criteria for sampled-data synchronization of chaotic Lur'e systems using two new approaches, Nonlinear Anal. Hybri., 24 (2017), 132–145. https://doi.org/10.1016/j.nahs.2016.11.006 doi: 10.1016/j.nahs.2016.11.006
![]() |
[27] |
L. Yao, Z. Wang, X. Huang, Y. Li, Q. Ma, H. Shen, Stochastic sampled-data exponential synchronization of Markovian jump neural networks with time-varying delays, IEEE T. Neur. Net. Lear., 34 (2023), 909–920. https://doi.org/10.1109/TNNLS.2021.3103958 doi: 10.1109/TNNLS.2021.3103958
![]() |
[28] |
E. Fridman, A refined input delay approach to sampled-data control, Automatica, 46 (2010), 421–427. https://doi.org/10.1016/j.automatica.2009.11.017 doi: 10.1016/j.automatica.2009.11.017
![]() |
[29] |
W. Zhang, Q. L. Han, Y. Tang, Y. Liu, Sampled-data control for a class of linear time-varying systems, Automatica, 103 (2019), 126–134. https://doi.org/10.1016/j.automatica.2019.01.027 doi: 10.1016/j.automatica.2019.01.027
![]() |
[30] |
W. Liu, J. Huang, Output regulation of linear systems via sampled-data control, Automatica, 113 (2020), 108684. https://doi.org/10.1016/j.automatica.2019.108684 doi: 10.1016/j.automatica.2019.108684
![]() |
[31] |
C. K. Zhang, Y. He, M. Wu, Improved global asymptotical synchronization of chaotic Lur'e systems with sampled-data control, IEEE T. Circuits. II, 56 (2009), 320–324. https://doi.org/10.1109/TCSII.2009.2015388 doi: 10.1109/TCSII.2009.2015388
![]() |
[32] |
R. Zhang, D. Zeng, S. Zhong, Novel master-lave synchronization criteria of chaotic Lur'e systems with time delays using sampled-data control, J. Franklin I., 354 (2017), 4930–4954. https://doi.org/10.1016/j.jfranklin.2017.05.008 doi: 10.1016/j.jfranklin.2017.05.008
![]() |
[33] |
H. B. Zeng, W. M. Wang, W. Wang, H. Q. Xiao, Improved looped-functional approach for dwell-time-dependent stability analysis of impulsive systems, Nonlinear Anal. Hybri., 52 (2024), 101477. https://doi.org/10.1016/j.nahs.2024.101477 doi: 10.1016/j.nahs.2024.101477
![]() |
[34] |
Z. Zhai, H. Yan, S. Chen, H. Zeng, D. Zhang, Improved fragmentation looped-functional for synchronization of chaotic Lur'e systems, IEEE T. Circuits II, 69 (2022), 3550–3554. https://doi.org/10.1109/TCSII.2022.3167248 doi: 10.1109/TCSII.2022.3167248
![]() |
[35] |
H. B. Zeng, Z. J. Zhu, T. S. Peng, W. Wang, X. M. Zhang, Robust tracking control design for a class of nonlinear networked control systems considering bounded package dropouts and external disturbance, IEEE T. Fuzzy Syst., 32 (2024), 3608–3617. https://doi.org/10.1109/TFUZZ.2024.3377799 doi: 10.1109/TFUZZ.2024.3377799
![]() |
[36] |
Y. He, G. P. Liu, D Ress, M. Wu, Improved stabilisation method for networked control systems, IET Control Theory A., 1 (2007), 1580–1585. https://doi.org/10.1049/iet-cta:2007001 doi: 10.1049/iet-cta:2007001
![]() |
[37] |
W. M. Wang, H. B. Zeng, J. M. Liang, S. P. Xiao, Sampled-data-based load frequency control for power systems considering time delays, J. Franklin I., 362 (2025), 107477. https://doi.org/10.1016/j.jfranklin.2024.107477 doi: 10.1016/j.jfranklin.2024.107477
![]() |
[38] |
H. B. Zeng, Y. He, M. Wu, J. She, Free-matrix-based integral inequality for stability analysis of systems with time-varying delay, IEEE T. Automat. Contr., 60 (2015), 2768–2772. https://doi.org/10.1109/TAC.2015.2404271 doi: 10.1109/TAC.2015.2404271
![]() |
50 | 21 | 5.468750e-01 | 1.797038e-07 | |||
100 | 28 | 8.437500e-01 | 6.575534e-07 | |||
200 | 28 | 1.281250e+00 | 8.227579e-07 |
n | K | Iter | Time | rk | ϵ0 | ϵ1 |
2 | K2 | 26 | 6.093750e-01 | 9.330831e-07 | 10−6 | 10−6 |
n | K | Iter | Time | rk | ϵ0 | ϵ1 |
50 | K50 | 11 | 5.312500e-01 | 5.085837e-07 | 10−6 | 10−6 |
100 | K50×K50 | 17 | 1.218750e+00 | 5.810239e-07 | 10−6 | 10−6 |
200 | K50×K50×K100 | 17 | 3.843750e+00 | 8.325520e-07 | 10−6 | 10−6 |
Ex1(n=50) | Ex4(n=50) | Ex1(n=100) | Ex4(n=100) | |||||
ALM | 7.187500e-01 | 23 | 6.562500e-01 | 11 | 9.843750e-01 | 23 | 1.187500e+00 | 12 |
IADM | 5.468750e-01 | 21 | 5.312500e-01 | 11 | 8.437500e-01 | 28 | 1.218750e+00 | 17 |
Ex1(n=200) | Ex4(n=200) | Ex2(n=2) | ||||||
ALM | 1.859375e+00 | 23 | 4.218750e+00 | 18 | 6.250000e-01 | 42 | ||
IADM | 1.281250e+00 | 28 | 3.843750e+00 | 17 | 6.093750e-01 | 26 |
5 | 23 | 0.468750 | 6.202562e-07 |
5 | 102 | 0.9632 | ||
5 | 18 | 0.1919 | ||
5 | 13 | 0.1279 | ||
5 | 123 | 1.1854 | ||
5 | 77 | 0.7494 | ||
5 | 18 | 0.1797 |
50 | 21 | 5.468750e-01 | 1.797038e-07 | |||
100 | 28 | 8.437500e-01 | 6.575534e-07 | |||
200 | 28 | 1.281250e+00 | 8.227579e-07 |
n | K | Iter | Time | rk | ϵ0 | ϵ1 |
2 | K2 | 26 | 6.093750e-01 | 9.330831e-07 | 10−6 | 10−6 |
n | K | Iter | Time | rk | ϵ0 | ϵ1 |
50 | K50 | 11 | 5.312500e-01 | 5.085837e-07 | 10−6 | 10−6 |
100 | K50×K50 | 17 | 1.218750e+00 | 5.810239e-07 | 10−6 | 10−6 |
200 | K50×K50×K100 | 17 | 3.843750e+00 | 8.325520e-07 | 10−6 | 10−6 |
Ex1(n=50) | Ex4(n=50) | Ex1(n=100) | Ex4(n=100) | |||||
ALM | 7.187500e-01 | 23 | 6.562500e-01 | 11 | 9.843750e-01 | 23 | 1.187500e+00 | 12 |
IADM | 5.468750e-01 | 21 | 5.312500e-01 | 11 | 8.437500e-01 | 28 | 1.218750e+00 | 17 |
Ex1(n=200) | Ex4(n=200) | Ex2(n=2) | ||||||
ALM | 1.859375e+00 | 23 | 4.218750e+00 | 18 | 6.250000e-01 | 42 | ||
IADM | 1.281250e+00 | 28 | 3.843750e+00 | 17 | 6.093750e-01 | 26 |
5 | 23 | 0.468750 | 6.202562e-07 |
5 | 102 | 0.9632 | ||
5 | 18 | 0.1919 | ||
5 | 13 | 0.1279 | ||
5 | 123 | 1.1854 | ||
5 | 77 | 0.7494 | ||
5 | 18 | 0.1797 |