Research article Special Issues

Influence of asymptomatic infections for the effectiveness of facemasks during pandemic influenza

  • In this paper, the SEIR model is generalized by introducing an asymptomatic class to quantify the influence of wearing N95 facemasks in reducing the spread of influenza H1N1. What's more, we explain the control reproduction number Rc according to the biological meaning reasonably. Without any intervention, the basic reproduction number R0=1.83 and there will be a large outbreak of infectious diseases. If N95 facemasks are 50% effective in reducing susceptibility and infectivity, 50% of population wear them on the first day, the basic reproduction number will be decreased from 1.83 to 1.17 and the final size reduced from 73% to 2%.

    Citation: Jing’an Cui, Ya’nan Zhang, Zhilan Feng, Songbai Guo, Yan Zhang. Influence of asymptomatic infections for the effectiveness of facemasks during pandemic influenza[J]. Mathematical Biosciences and Engineering, 2019, 16(5): 3936-3946. doi: 10.3934/mbe.2019194

    Related Papers:

    [1] Wenshun Sheng, Jiahui Shen, Qiming Huang, Zhixuan Liu, Zihao Ding . Multi-objective pedestrian tracking method based on YOLOv8 and improved DeepSORT. Mathematical Biosciences and Engineering, 2024, 21(2): 1791-1805. doi: 10.3934/mbe.2024077
    [2] Paola Goatin, Matthias Mimault . A mixed system modeling two-directional pedestrian flows. Mathematical Biosciences and Engineering, 2015, 12(2): 375-392. doi: 10.3934/mbe.2015.12.375
    [3] Alessandro Corbetta, Adrian Muntean, Kiamars Vafayi . Parameter estimation of social forces in pedestrian dynamics models via a probabilistic method. Mathematical Biosciences and Engineering, 2015, 12(2): 337-356. doi: 10.3934/mbe.2015.12.337
    [4] Chun-Chao Yeh, Ke-Jia Jhang, Chin-Chun Chang . An intelligent indoor positioning system based on pedestrian directional signage object detection: a case study of Taipei Main Station. Mathematical Biosciences and Engineering, 2020, 17(1): 266-285. doi: 10.3934/mbe.2020015
    [5] Songlin Liu, Shouming Zhang, Zijian Diao, Zhenbin Fang, Zeyu Jiao, Zhenyu Zhong . Pedestrian re-identification based on attention mechanism and Multi-scale feature fusion. Mathematical Biosciences and Engineering, 2023, 20(9): 16913-16938. doi: 10.3934/mbe.2023754
    [6] Martin Baurmann, Wolfgang Ebenhöh, Ulrike Feudel . Turing instabilities and pattern formation in a benthic nutrient-microorganism system. Mathematical Biosciences and Engineering, 2004, 1(1): 111-130. doi: 10.3934/mbe.2004.1.111
    [7] Raimund Bürger, Paola Goatin, Daniel Inzunza, Luis Miguel Villada . A non-local pedestrian flow model accounting for anisotropic interactions and domain boundaries. Mathematical Biosciences and Engineering, 2020, 17(5): 5883-5906. doi: 10.3934/mbe.2020314
    [8] F. Berezovskaya, G. Karev, Baojun Song, Carlos Castillo-Chavez . A Simple Epidemic Model with Surprising Dynamics. Mathematical Biosciences and Engineering, 2005, 2(1): 133-152. doi: 10.3934/mbe.2005.2.133
    [9] Sebastien Motsch, Mehdi Moussaïd, Elsa G. Guillot, Mathieu Moreau, Julien Pettré, Guy Theraulaz, Cécile Appert-Rolland, Pierre Degond . Modeling crowd dynamics through coarse-grained data analysis. Mathematical Biosciences and Engineering, 2018, 15(6): 1271-1290. doi: 10.3934/mbe.2018059
    [10] Gunog Seo, Mark Kot . The dynamics of a simple Laissez-Faire model with two predators. Mathematical Biosciences and Engineering, 2009, 6(1): 145-172. doi: 10.3934/mbe.2009.6.145
  • In this paper, the SEIR model is generalized by introducing an asymptomatic class to quantify the influence of wearing N95 facemasks in reducing the spread of influenza H1N1. What's more, we explain the control reproduction number Rc according to the biological meaning reasonably. Without any intervention, the basic reproduction number R0=1.83 and there will be a large outbreak of infectious diseases. If N95 facemasks are 50% effective in reducing susceptibility and infectivity, 50% of population wear them on the first day, the basic reproduction number will be decreased from 1.83 to 1.17 and the final size reduced from 73% to 2%.


    Networked control systems(NCSs) are a class of systems where the signals of feedback loops are closed via communication network. These systems are found in many applications such as automobiles and airplanes, large scale disributed industrial systems and telecommunication systems due to easier installation and maintenance, simpler upgrading and more reliability over the point-to-point connected systems [3]. Therefore, much attention has been paid to NCSs in the last decades [5,21]. In the networked control system, the information is exchanged with packets through a network where the data packets encounter delays. Considering the effects of network-induced delays in nonlinear NCS, we model its closed-loop system as a fuzzy system with bounded delays.

    For a nonlinear control system, Takagi-Sugeno fuzzy model has been playing an important role. It can represent a nonlinear system effectively and is known to be a great tool to analyze and synthesize nonlinear control systems [11,12,13]. The papers [4,6,7,9,10,16,19,20] and [22] considered control design problems for nonlinear networked control systems. The paper [6] partially introduced a multiple Lyapunov-Krasovskii matrix method for fuzzy systems with time-delay but it is not a general multiple Lyapunov matrix method. The papers [4,9,20] and [22] discussed various fuzzy networked control systems but all employed a common Lyapunov-Krasovskii function method. The papers [7,10] and [19] employed a common Lyapunov-Krasovskii function method with descriptor system approach, which is still more conservative than a multiple Lyapunov-Krasovskii matrix method. The papers [6,16] and [19] used a free matrix method to reduce the conservatism but increase computational load by introducing a number of free matrices. Furthermore, the paper [17] introduced a new multiple Lyapunov matrix method but only considered the stability of a networked control system. The papers [17] and [18] considered the stability and stabilization problems based on multiple Lyapunov-Krasovskii matrix method.

    In this paper, we consider the H disturbance attenuation of nonlinear networked control systems based on Takagi-Sugeno fuzzy models. First, we assume a new class of fuzzy feedback controller and consider the H disturbance attenuation of the closed-loop system with such a feedback controller. In order to obtain less conservative H disturbance attenuation conditions, we introduce a new type of multiple Lyapunov-Krasovskii function, which reduces the conservatism in stability conditions. A multiple Lyapunov-Krasovskii function is a natural extension of a common Lyapunov-Krasovskii function. However, a conventional multiple Lyapunov function contains the membership function and hence a resulting condition depends on the derivatives of the membership function. However, the derivative of the membership function may not always be known a priori nor differentiable. The paper [8] introduced a new class of multiple Lyapunov function, which contains an integral of the membership function of fuzzy systems. This approach requires no information on the derivatives of the membership function and is shown to reduce the conservatism in H disturbance attenuation conditions. In addition, triple and quadruple integrals of Lyapunov-Krasovskii functions are employed, which enormously reduce the conservatism. Based on such a multiple Lyapunov-Krasovskii function, a control design method of nonlinear networked control systems are proposed. Finally, a numerical example is shown to illustrative our control design method and to show the effectiveness of our approach.

    Consider the Takagi-Sugeno fuzzy model, described by the following IF-THEN rules:

    IFξ1isMi1andandξpisMip,THEN˙x(t)=Aix(t)+Biu(t)+Diw(t),z(t)=Cix(t)

    where x(t)n is the state, u(t)m is the control input. and z(t)q is the controlled output. The matrices Ai, Bi,Ci and Di are constant matrices of appropriate dimensions. r is the number of IF-THEN rules. Mij are fuzzy sets and ξ1,,ξp are premise variables. We set ξ=[ξ1ξp]T. The premise variable ξ(t) is assumed to be measurable.

    Then, the state equation and the controlled output equation are described by

    ˙x(t)=ri=1λi(ξ){Aix(t)+Biu(t)+Diw(t)}Δ=Aλx(t)+Bλu(t)+Dλw(t) (2.1)
    z(t)=ri=1λi(ξ)Cix(t)Δ=Cλx(t) (2.2)

    where

    λi(ξ)=βi(ξ)ri=1βi(ξ),βi(ξ)=pj=1Mij(ξj)

    and Mij() is the grade of the membership function of Mij. We assme

    λi(ξ(t))0,i=1,,r,ri=1λi(ξ(t))=1 (2.3)

    for any ξ(t).

    In the considered networked control system, the controller and the actuator are event-driven and sampler is clock-driven. The actual input of the system (2.1) is realized via a zero-order hold device. The sampling period is assumed to be a positive constant T and the information of the zero-order hold may be updated between sampling instants. The updating instants of the zero-order hold are denoted by tk, and τa and τb are the time-delays from the sampler to the controller and from the controller to the zero-order hold at the updating instant tk, respectively. So, the successfully transmitted data in the networked control system at the instant tk experience round trip delay τ=τa+τb which does not need to be restricted inside one sampling period. Regarding the role of the zero-order hold, for a state sample data tkτ, the corresponding control signal would act on the plant from tk unto tk+1. Therefore, the rules of the fuzzy control input for tkttk+1, is written as follows:

    IFξ1isMi1andandξpisMip,THENu(t)=Kix(tτ(t)),i=1,,r.

    where Ki,i=1,,r are constant matrices, and τ(t) may be an unknown time varying delay but its lower bound τ1 and upper bound τ2 are assumed to be known. The upper bound η of the delay rate is also assumed to be known:

    τ1τ(t)τ2, 0<˙τ(t)η.

    Then, an overall controller is given by

    u(t)=ri=1μi(ξ(tτ(t)))Kix(tτ(t))Δ=Kτμx(tτ(t)) (2.4)

    where

    μi(ξ(t))=1htthλi(ξ(s))ds,

    and h>0 is some scalar. The closed-loop system (2.1) with (2.4) is given by

    ˙x(t)=ri=1rl=1λi(ξ(t))μl(ξ(tτ(t))){Aix(t)+BiKlx(tτ(t))+Diw(t)}=Aλx(t)+BλKτμx(tτ(t)+Dλw(t). (2.5)

    We note that μi(ξ(t))0, i=1,,r and

    ri=1μi(ξ(t))=1htthri=1λi(ξ(s))ds=1,

    which imply that μi(ξ(t)) and λi(ξ(t)) share the same properties as seen in (2.3).

    We define the cost function

    J=0(zT(t)z(t)γ2wT(t)w(t))dt (2.6)

    where γ is a prescribed scalar. Our problem is to find a condition such that the closed-loop system (2.2) and (2.5) is asymptotically stable with w(t)=0 and it satisfies J<0 in (2.6). In this case, the system is said to achieve the H disturbance attenuation with γ.

    Let us first assume that all the controller gain matrices Ki, i=1,,r are given. Importance on the disturbance attenuation conditions lies on how to choose an appropriate Lyapunov-Krasovskii function. Here, we introduce a new Lyapunov-Krasovskii function. To begin with, let us consider a polytopic matrix:

    Zμ=ri=1μi(ξ(t))Zi

    and similar notations will be used for other matrices. It is easy to see that the time-derivative of Zμ is calculated as

    ˙Zμ=ri=1˙μi(ξ(t))Zi=1hri=1(λi(ξ(t))λi(ξ(tτ)))ZiΔ=1h(ZλZτλ). (3.1)

    For later use, we give some notation and lemmas:

    ζ(t)=[xT(t)xT(tτ(t))xT(tτ1)xT(tτ2)ttτ1xT(s)dstτ1tτ(t)xT(s)dstτ(t)tτ2xT(s)ds0τ1tt+βxT(s)dsdβτ1τ(t)tt+βxT(s)dsτ(t)τ2tt+βxT(s)dsw(t)]TΔ=[ζT1(t)ζT2(t)ζT11(t)]T.

    Lemma 3.1. (Jensen's Inequality) For τ, x(t)n, and P>0n×n, the following inequalities hold:

    τttτxT(s)Px(s)dsttτxT(s)dsPttτx(s)ds,τ220τtt+βxT(s)Px(s)dsdβ0τtt+βxT(s)dsdβP0τtt+βx(s)dsdβ,τ360τ0βtt+θxT(s)Px(s)dsdβdθ0τ0βtt+θxT(s)dsdβdθP0τ0βtt+θx(s)dsdβdθ.

    Lemma 3.2. [1] For τ1, τ2, α, ε, x(t)n, and P>0n×n, the following inequalities hold:

    (τ2τ1)tτ1tτ2xT(s)Px(s)dsζT6(t)Pζ6(t)ζT7(t)Pζ7(t)(1α)ζT6(t)Pζ6(t)αζT7(t)Pζ7(t),(τ22τ21)2tτ1tτ2tt+βxT(s)Px(s)dsdβζT9(t)Pζ9(t)ζT10(t)Pζ10(t)(1ε)ζT9(t)Pζ9(t)εζT10(t)Pζ10(t).

    Now, we are ready to give our first result.

    Theorem 3.1. Given control gain matrices Kl, l=1,,r and scalar h>0. The closed-loop system (2.5) achieves the H disturbance attenuation with γ if there exist matrices Zj>0, P1>0, P2>0, P3>0, P4>0, Rj1>0, R2>0, R3j>0, R4>0, X1j>0, X2>0, X3j>0, X4>0, U1>0, U2>0, Wj, j=1,,r, and scalars δi>0, i=1,2 such that

    [12θijl+θ1j+δ1ICTiI]<0, i,j,l=1,,r, (3.2)
    [12θijl+θ2j+δ1ICTiI]<0, i,j,l=1,,r, (3.3)
    [12θijl+θ3jδ2ICTiI]<0, i,j,l=1,,r, (3.4)
    [12θijl+θ4jδ2ICTiI]<0, i,j,l=1,,r, (3.5)
    δ1δ2>0 (3.6)
    [1τ1Zi+X2X2X2Q1i+X2]0, i=1,,r, (3.7)
    [1τ2τ1Zi+X4X4X4Q2i+X4]0, i=1,,r (3.8)

    where τ12=τ2τ1, τ(2)12=τ22τ21

    θ1j=eT7X3je7(e2e4)TX4(e2e4),θ2j=eT6X3je6(e2e3)TX4(e2e3),θ3j=eT10R3je10(τ12e1e7)TR4(τ12e1e7),θ4j=eT9R3je9(τ12e1e6)TR4(τ12e1e6),θijl=πijleT5X1e5(e1e3)TX2(e1e3)eT6X3e6eT7X3e7(e2e3)TX4(e2e3)(e2e4)TX4(e2e4)eT8R1je8(τ1e1e5)TR2(τ1e1e5)eT9R3je9eT10R3je10(τ12e1e6)TR4(τ12e1e6)(τ12e1e7)TR4(τ12e1e7)(τ122e1e8)TU1(τ122e1e8)(τ(2)122e1e9e10)TU2(τ(2)122e1e9e10)
    πijl=[Λ11ijΛ12ijl00P100τ1P3τ12P4τ12P4Λ22ijl00000000Q1j+Q2j0P1P2P2000Q2j0P2P2000000P300000P4P400P4P4000000ZjDi+ATiΩDiKTlBTiΩDi00000000DTiΩDiγ2I],
    Λ11ij=ATiZj+ZjAi+Q1j+Wj+1h(ZiZl)+τ21X1j+τ212X3j+τ414R1j+(τ(2)12)24R3j+ATiΩAi,Λ12ijl=ZjBiKl+ATiΩBiKl,Λ22ijl=(1η)Wj+KTlBTiΩBiKl,Ω=τ21X2+τ212X4+τ414R2+(τ(2)12)24R4+τ6136U1+(τ32τ31)236U2,Φil=[ATiKTlBTi00000000  DTi],ˉCi=[Ci000000000   0],

    and ei, i=1,,11 denote an 11-dimensional fundamental vector whose i-th element is 1 and 0 elsewhere.

    Proof: Consider the following Lyapunov-Krasovskii function:

    V(xt)=V1(xt)+V2(xt)+V3(xt)+V4(xt)+V5(xt) (3.9)

    where xt=x(t+θ), τ2θ0,

    V1(xt)=xT(t)Zμx(t)+ttτ1xT(s)dsP1ttτ1xT(s)ds+tτ1tτ2xT(s)dsP2tτ1tτ2x(s)ds+0τ1tt+θxT(s)dsdθP30τ1tt+θx(s)dsdθ+τ1τ2tt+θxT(s)dsdθP4τ1τ2tt+θx(s)dsdθ,V2(xt)=ttτ1xT(s)Q1μx(s)ds+tτ1tτ2xT(s)Q2μx(s)ds+ttτ(t)xT(s)Wμx(s)ds,V3(xt)=τ10τ1tt+θxT(s)X1μx(s)dsdθ+τ10τ1tt+θ˙xT(s)X2˙x(s)dsdθ+(τ2τ1)τ1τ2tt+θxT(s)X3μx(s)dsdθ+(τ2τ1)τ1τ2tt+θ˙xT(s)X4˙x(s)dsdθ,V4(xt)=τ2120τ10βtt+θxT(s)R1μx(s)dsdθdβ+τ2120τ10βtt+θ˙xT(s)R2˙x(s)dsdθdβ+τ22τ212τ1τ20βtt+θxT(s)R3μx(s)dsdθdβ+τ22τ212τ1τ20βtt+θ˙xT(s)R4˙x(s)dsdθdβ,V5(xt)=τ3160τ10β0λtt+θ˙xT(s)U1˙x(s)dsdλdβdθ+τ32τ316τ1τ20β0λtt+θ˙xT(s)U2˙x(s)dsdλdβdθ

    where

    Xjμ=ri=1μi(ξ)Xji>0, j=1,3

    and similar notations are used. Now, we take the derivative of V(xt) with respect to t along the solution of the system (2.5).

    First, using Lemma 3.1, we see that

    tt+θ˙xT(s)X2˙x(s)ds1θtt+θ˙xT(s)dsX2tt+θ˙x(s)ds=1θ[x(t)x(t+θ)]TX2[x(t)x(t+θ)]

    and

    0τ1tt+θ˙xT(s)X2˙x(s)dsdθ0τ11θ[x(t)x(t+θ)]TX2[x(t)x(t+θ)]dθ=τ101θ[x(t)x(ts)]TX2[x(t)x(ts)]ds1τ1τ10[x(t)x(ts)]TX2[x(t)x(ts)]ds=1τ1ttτ1[x(t)x(α)]TX2[x(t)x(α)]dα

    Similarly, we have

    τ1τ2tt+θ˙xT(s)X4˙x(s)dsdθ1τ2τ1tτ1tτ2[x(t)x(α)]TX4[x(t)x(α)]dα

    Hence, we get

    xT(t)Zμx(t)+ttτ1xT(s)Q1μx(s)ds+tτ1tτ2xT(s)Q2μx(s)ds+τ10τ1tt+θ˙xT(s)X2˙x(s)dsdθ+(τ2τ1)τ1τ2tt+θ˙xT(s)X4˙x(s)dsdθttτ1[x(t)x(α)]T[1τ1Zμ+X2X2X2Q1μ+X2][x(t)x(α)]dα+tτ1tτ2[x(t)x(α)]T[1τ2τ1Zμ+X4X4X4Q2μ+X4][x(t)x(α)]dα

    It follows from the above that for V1(xt)+V2(xt)+V3(xt) to be positive, the positive definiteness of Q1i and Q2i, i=1,,r can be removed if the positive definiteness of Pi,Wj,X1j,X3j, i=1,,4, j=1,,r is guaranteed and (3.7)-(3.8) are satisfied.

    The derivatives of V1(xt) and V2(xt) in (3.9) are calculated as follows:

    ˙V1(xt)=2(Aλx(t)+BλKτμx(tτ(t))+Dλw(t))TZμx(t)+1hxT(t)(ZλZτλ)x(t)+2(x(t)x(tτ1))TP1ttτ1x(s)ds+2(x(tτ1)x(tτ2))TP2tτ1tτ2x(s)ds+2[τ1x(t)ttτ1xT(s)ds]TP30τ1tt+θx(s)dsdθ+2[(τ2τ1)x(t)tτ1tτ2xT(s)ds]TP4τ1τ2tt+θx(s)dsdθ, (3.10)
    ˙V2(xt)xT(t)(Q1μ+Wμ)x(t)xT(tτ1)Q1μx(tτ1)+xT(tτ1)Q2μx(tτ1)xT(tτ2)Q2μx(tτ2)(1η)xT(tτ(t))Wμx(tτ(t)). (3.11)

    Using Lemmas 3.1 and 3.2, we have

    ˙V3(xt)=τ21xT(t)X1μx(t)τ1ttτ1xT(s)X1μx(s)ds+τ21˙xT(t)X2˙x(t)τ1ttτ1˙xT(s)X2˙x(s)ds+(τ2τ1)2xT(t)X3μx(t)(τ2τ1)tτ1tτ2xT(s)X3μx(s)ds+(τ2τ1)2˙xT(t)X4˙x(t)(τ2τ1)tτ1tτ2˙xT(s)X4˙x(s)ds,τ21xT(t)X1μx(t)ζT5(t)X1μζ5(t)+τ21˙xT(t)X2˙x(t)(ζ1(t)ζ3(t))TX2(ζ1(t)ζ3(t))+(τ2τ1)2xT(t)X3μx(t)ζT6(t)X3μζ6(t)ζT7(t)X3μζ7(t)(1α)ζT6(t)X3μζ6(t)αζT7(t)X3μζ7(t)+(τ2τ1)2˙xT(t)X4˙x(t)(ζ2(t)ζ3(t))TX4(ζ2(t)ζ3(t))(ζ2(t)ζ4(t))TX4(ζ2(t)ζ4(t))(1α)(ζ2(t)ζ3(t))TX4(ζ2(t)ζ3(t))α(ζ2(t)ζ4(t))TX4(ζ2(t)ζ4(t)), (3.12)
    ˙V4(xt)=τ414xT(t)R1μx(t)τ2120τ1tt+βxT(s)R1μx(s)dsdβ+τ414˙xT(t)R2˙x(t)τ2120τ1tt+β˙xT(s)R2˙x(s)dsdβ+(τ22τ21)24xT(t)R3μx(t)τ22τ212τ1τ2tt+βxT(s)R3μx(s)dsdβ+(τ22τ21)24˙xT(t)R4˙x(t)τ22τ212τ1τ2tt+β˙xT(s)R4˙x(s)dsdβτ414xT(t)R1μx(t)ζT8(t)R1μζ8(t)+τ414˙xT(t)R2˙x(t)(τ1ζ1(t)ζ5(t))T(t)R2(τ1ζ1(t)ζ5(t))+(τ22τ21)24xT(t)R3μx(t)ζT9(t)R3μζ9(t)ζT10(t)R3μζ10(t)(1ε)ζT9(t)R3μζ9(t)εζT10(t)R3μζ10(t)+(τ22τ21)24˙xT(t)R4˙x(t)((τ2τ1)ζ1(t)ζ7(t))TR4((τ2τ1)ζ1(t)ζ7(t))((τ2τ1)ζ1(t)ζ6(t))TR4((τ2τ1)ζ1(t)ζ6(t))ε((τ2τ1)ζ1(t)ζ7(t))TR4((τ2τ1)ζ1(t)ζ7(t))(1ε)((τ2τ1)ζ1(t)ζ6(t))TR4((τ2τ1)ζ1(t)ζ6(t)) (3.13)
    ˙V5(xt)=τ6136˙xT(t)U1˙x(t)τ3160τ10βtt+λ˙xT(s)U1˙x(s)dsdλdβ+(τ32τ31)236˙xT(t)U2˙x(t)τ32τ316τ1τ20βtt+λ˙xT(s)U2˙x(s)dsdλdβτ6136˙xT(t)U1˙x(t)(τ212ζ1(t)ζ8(t))TU1(τ212ζ1(t)ζ8(t))+(τ32τ31)236˙xT(t)U2˙x(t)(τ22τ212ζ1(t)ζ9(t)ζ10(t))TU2(τ22τ212ζ1(t)ζ9(t)ζ10(t)). (3.14)

    It follows from (3.10)–(3.14) that

    ˙V(xt)+zT(t)z(t)γ2wT(t)w(t)=ζT(t)[ri=1rj=1rl=1λi(ξ)μj(ξ)μl(ξ(tτ))(αθ(1)ijl+(1α)θ(2)ijl+εθ(3)ijl+(1ε)θ(4)ijl]ζ(t)+xT(t)(ri=1λi(ξ)Ci)T(ri=1λi(ξ)Ci)x(t)+˙xT(t)Ω˙x(t)Δ=ζT(t)[(αθ(1)λμμ+(1α)θ(2)λμμ+εθ(3)λμμ+(1ε)θ(4)λμμ]ζ(t)+ζT(t)eT1CTλCλe1ζ(t)+ζT(t)(Aλe1+BλKτμe2+Dλe11)TΩ(Aλe1+BλKτμe2+Dλe11)ζ(t) (3.15)

    where θ(k)ijl=12θijl+θkj, k=1,2 and θ(k)ijl=12θijl+θkj, k=3,4. By Schur complement formula, the upper bound of ˙V is negative if and only if

    ri=1rj=1rl=1λi(ξ)μj(ξ)μl(ξ(tτ))[αθ(1)ijl+(1α)θ(2)ijl+εθ(3)ijl+(1ε)θ(4)ijlΦTilˉCTiΩ10I]<0. (3.16)

    (3.16) holds if and only if the following conditions hold simultaneously provided that δ2<δ1;

    αΨ(1)λμμ+(1α)Ψ(2)λμμ<δ1I,εΨ(3)λμμ+(1ε)Ψ(4)λμμ<δ2I

    where

    Ψ(i)λμμ=[θ(i)λμμΦλμCTλΩ10I], i=1,2,3,4.

    The above conditions can be rewritten as

    α(Ψ(1)λμμ+δ1I)+(1α)(Ψ(2)λμμ+δ1I)<0, (3.17)
    ε(Ψ(3)λμμδ2I)+(1ε)(Ψ(4)λμμδ2I)<0. (3.18)

    Since 0α, ε1, the terms α(Ψ(1)λμμ+δ1I)+(1α)(Ψ(2)λμμ+δ1I) is a convex combination of Ψ(1)λμμ+δ1I and Ψ(2)λμμ+δ1I. Similarly, the terms ε(Ψ(3)λμμδ2I)+(1ε)(Ψ(4)λμμδ2I) is a convex combination of Ψ(3)λμμδ2I and Ψ(4)λμμδ2I. These combinations are negative definite if the vertices become negative. Therefore, (3.17) and (3.18) are equivalent to

    Ψ(1)λμμ+δ1I<0,Ψ(2)λμμ+δ1I<0,Ψ(3)λμμδ2I<0,Ψ(4)λμμδ2I<0

    which can be written as (3.2)–(3.5). It follows from (3.15) that this proves that the conditions (3.2)–(3.6) suffice to show

    ˙V(xt)+zT(t)z(t)γ2wT(t)w(t)<0.

    Integrating t=0 to t=, we have

    V(x())V(x(0))+J<0.

    Since V(x())0 and V(x(0))=0, we can show that J<0 and this achieves the H disturbance attenuation of the system (2.5). The stability of the system with w(t)=0 is proved in the same lines as in [18].

    Remark 3.1. The paper [18] uses the similar method to propose a stabilizing control design for nonlinear NCSs. It has shown that its method has advantaes over the previous methods in [6] and [7]. The novelty of Theorem 3.1 lies in a new multiple Lyapunov-Krasovskii function (3.9) where Zj, Wj, Q1j, Q2j, R1j, R3j, X1j and X3j are multiple Lyapunov matrices. In addition, the integral μi(ξ(t)), i=1,,r of the membership functions avoid the derivatives of the membership function in the H disturbance attenuation conditions (3.2)–(3.5). The quadruple integral terms and the quadratic forms of the double integral terms xT(s)dsdβPxT(s)dsdβ are employed in (3.9), which leads to a drastic reduction of the conservatism in the H disturbance attenuation condition. In fact, recent papers [6] and [7] do not use the quadruple integrals and the quadratic forms of the double integrals. This implies that our H disturbance attenuation conditions are less conservative than recent results, and is technically better than others. In fact, this advantage was shown in [18].

    Remark 3.2. The conditions (3.7)–(3.8) remove the positive definiteness of Q1i and Q2i, i=1,,r, and reduce the conservatism in conditions in Theorem 3.1.

    Remark 3.3. The conditions (3.2)–(3.8) are not strict LMIs unless h>0 is given. By defining ˜h=1h, these conditions can be seen as bilinear matrix inequalities. Effective algorithms to solve them include the branch-and-cut algorithm, the branch-and-bound algorithm, and the Lagrangian dual global optimization algorithm in [2,14] and [15], respectively.

    Next, we shall propose a control design method. It is assumed that instead of the controller (2.4), a form of the controller is given by non-PDC, described by

    u(t)=ri=1μi(ξ(tτ(t)))Ki(ri=1μi(ξ(tτ(t)))Zi)1x(tτ(t))=Kτμ(Zτμ)1x(tτ(t)) (4.1)

    where Ki and Zi, i=1,,r are to be determined, and μi, i=1,,r are given as in (2.4). Then, the closed-loop system (2.1) with (4.1) becomes

    ˙x(t)=Aλx(t)+BλKτμ(Zτμ)1x(tτ(t))+Dλw(t). (4.2)

    Applying Theorem 3.1, we obtain the following theorem for control design.

    Theorem 4.1. For some scalar h>0. A controller (4.1) makes the fuzzy system (2.1)–(2.2) achieve the H disturbance attenuation with γ if there exist matrices Zj>0, ˉP1mn>0, ˉP2mn>0, ˉP3mn>0, ˉP4mn>0, ˉR1jmn>0, ˉR2mn>0, ˉR3jmn>0, ˉR4mn>0, ˉX1jmn>0, ˉX2mn>0, ˉX3jmn>0, ˉX4mn>0, ˉU1mn>0, ˉU2mn>0, ˉWjmn, Kj,j,m,n=1,,r, and scalars δi>0, i=1,2 such that

    [ΥpijklmnΓijlˉΩjkl]<0,i,j,k,l,m,n=1,,r, p=1,,4, (4.3)
    δ1δ2>0 (4.4)
    [1τ1ˉZi+ˉX2mnˉX2mnˉX2mnˉQ1imn+ˉX2mn]0 i,m,n=1,,r, (4.5)
    [1τ2τ1ˉZi+ˉX4mnˉX4mnˉX4mnˉQ2imn+ˉX4mn]0 i,m,n=1,,r (4.6)

    where

    Υ1ijklmn=12ˉθijklmn+ˉθ1jmn+δ1I,Υ2ijklmn=12ˉθijklmn+ˉθ2jmn+δ1I,Υ3ijklmn=12ˉθijklmn+ˉθ3jmnδ2I,Υ4ijklmn=12ˉθijklmn+ˉθ4jmnδ2I,ˉθ1jmn=eT7ˉX3jmne7(e2e4)TˉX4mn(e2e4),ˉθ2jmn=eT6ˉX3jmne6(e2e3)TˉX4mn(e2e3),ˉθ3jmn=eT10ˉR3jmne10(τ12e1e7)TˉR4mn(τ12e1e7),ˉθ4jmn=eT9ˉR3jmne9(τ12e1e6)TˉR4mn(τ12e1e6),ˉθijlkmn=ˉπijlkmneT5ˉX1mne5(e1e3)TˉX2mn(e1e3)eT6ˉX3jmne6eT7ˉX3jmne7(e2e3)TˉX4mn(e2e3)(e2e4)TˉX4mn(e2e4)eT8ˉR1jmne8(τ1e1e5)TˉR2mn(τ1e1e5)eT9ˉR3jmne9eT10ˉR3jmne10(τ12e1e6)TˉR4mn(τ12e1e6)(τ12e1e7)TˉR4mn(τ12e1e7)(τ122e1e8)TˉU1mn(τ122e1e8)(τ(2)122e1e9e10)TˉU2mn(τ(2)122e1e9e10)
    ˉΞkl=ˉX2klτ21ˉR2kl2τ212ˉR4klτ414ˉU1kl(τ(2)12)24ˉU2kl,ˉπijklmn=[ˉΛijklBiKl00P1mn0τ1ˉP3mnτ12ˉP4mn(1η)Wjmn000000ˉQ1jmn+ˉQ2jmn0P1mnˉP2mnˉP2mn0ˉQ2jmn0ˉP2mnˉP2mn0000ˉP3mn000000τ12ˉP4mn0Di000000000000ˉP4mnˉP4mn0ˉP4mnˉP4mn000000000γ2I],
    ˉΛijkl=AiZj+ZjATi+ˉQ1jkl+ˉWjkl1h(ˉZiˉZl)+τ21ˉX1jkl+τ212ˉX3jkl+τ414ˉR1jkl+(τ(2)12)24ˉR3jkl,ΓTijl=[AiZjBiKl00000000  DiZjCiZj000000000   0],ˉΩjkl=[2(2Zj+τ21ˉX2kl+τ212ˉX4kl+τ414ˉR2kl+(τ(2)12)24ˉR4kl+τ6136ˉU1kl+(τ32τ31)236ˉU2kl)0I]

    where τ12=τ2τ1, τ(2)12=τ22τ21. In this case, control gains Kl and Zj, j,l=1,,r can be found as solutions of the above LMIs.

    Proof: We consider the same Lyapunov-Krasovskii function (3.9) except for the first term of V1(xt), which is replaced by

    ˉV1(xt)=xT(t)Z1μx(t).

    The time-derivative of V11(xt) is calculated as

    ˙ˉV1(xt)=2xT(t)Z1μ(Aλx(t)+BλKτμ(Zτμ)1x(tτ(t))+Dλw(t))+xT(t)˙Z1μx(t)=xT(t)Z1μ(AλZμ+ZμATλ˙Zμ)Z1μx(t)+2xT(t)Z1μBλKτμ(Zτμ)1x(tτ(t)))+2xT(t)Z1μDλw(t))

    We follow the similar lines of proof of Theorem 3.1, and obtain

    ˙V(xt)=ri=1rj=1rk=1rl=1rm=1rn=1λi(ξ)μj(ξ)μk(ξ)μl(ξ)μm(ξ(tτ))×μn(ξ(tτ))ˉζT(t)(αˉθ(1)ijklmn+(1α)ˉθ(2)ijklmn+εˉθ(3)ijklmn+(1ε)ˉθ(4)ijklmn)ˉζ(t)

    where ˉθ(p)ijklmn=12˜θijklmn+ˉθpjmn, p=1,2, ˉθ(p)ijklmn=12˜θijklmn+ˉθpjmn, p=3,4,

    ˜θijklmn=ˉθijklmn+ΦTilΩΦil+[ZTμCTλCλZμ00000000],
    ˉζ=[Z1μ(Zτμ)1(Zτμ)1I]ζ.

    We have defined the following matrices:

    rj=1rk=1rl=1μj(ξ)μk(ξ)μl(ξ)ˉQjkl=ZμQμZμ,rj=1rm=1rn=1μj(ξ)μm(ξ(tτ(t)))μn(ξ(tτ(t)))ˉQjmn=ZτμQμZτμ

    for example. Similar notations have also been used for others matrices. Applying the Schur complement formula and the inequality Ω12Z+ZΩZ, we obtain (4.3)–(4.6).

    Remark 4.1. In case that the delay rate η is unknown, we can still make use of Theorem 4.1 with Wj=0, j=1,,r.

    Remark 4.2. The conditions (4.3)–(4.6) are not strict LMIs unless h>0 is given, either. However, they can be solved in the same way as discussed in Remark 3.3.

    We consider the system [19]

    ˙x(t)=2i=1λi(ξ){Aix(t)+Biu(t)+Diw(t)}, (5.1)
    z(t)=2i=1λi(ξ)Cix(t) (5.2)

    where x1(t)[1, 1] and

    A1=[010.010], A2=[010.680], B1=[01], B2=[01],
    C1=[10.1], C2=[1.10.1], D1=[00.1],D2=[00.5],
    λ1(x1)=1x21,λ2(x1)=x21.

    Suppose that 0.0τ(t)1.50 and η=0.3.

    First, we compare our results with others to show the effectiveness of Theorem 3.1 for stabilization with w(t)=0 (Table 1).

    Table 1.  Comparison of the methods.
    Method τ2
    [19] 0.60
    [7] 1.40
    Theorem 3.1 2.38

     | Show Table
    DownLoad: CSV

    This obviously show that our new multiple Lyapunov-Krasovskii function method is better than the existing conditions.

    Next, we design an H controller for the fuzzy networked system (5.1)–(5.2). Given the H attenuation level γ=1, Theorem 4.1 gives the feedback control u(t) by

    u(t)=Kτμ(Zτμ)1x(tτ(t)) (5.3)

    where

    K1=[0.05220.1368], K2=[0.11210.1643],Z1=[0.09360.04850.04850.1289], Z2=[0.09240.04680.04680.1258].

    Theorem 4.1 is based on Theorem 3.1, which has been shown to be least conservative in the above numerical example. It implies that Theorem 4.1 is a control design method which requires less conservative design conditions than others.

    Finally, the simulation result on the state trajectories of the closed-loop system with the initial conditions x(0)=[0.5  0.5]T and the zero-mean Gaussian random variable w(t) of variance 0.1 is shown in Figure 1. The delay τ(t) is assumed to be τ(t)=1+0.5sin(0.1t). The bold and dotted lines indicate x1(t) and x2(t), respectively, and they show the system stability with disturbance attenuation.

    Figure 1.  The state trajectories.

    The H disturbance attenuation and control design of nonlinear networked control systems described by Takagi-Sugeno fuzzy systems have been considered. A new multiple Lyapunov-Krasovskii function was introduced to obtain new H disturbance attenuation conditions for the closed-loop system. This technique leads to less conservative conditions. Control design method for nonlinear networked control systems was also proposed based on the same multiple Lyapnov-Krasovskii function and thus conditions for control design are less conservative than the existing ones.

    The author declares that there is no conflicts of interest in this paper.



    [1] T. C. Germann, K. Kai, I. M. Longini, et al., Mitigation strategies for pandemic influenza in the United States, P. Natl. Acad. Sci. USA, 103 (2006), 5935–5940.
    [2] S. M. Tracht, S. Y. Valle and J. M. Hyman, Mathematical modeling of the effectiveness of facemasks in reducing the spread of novel influenza A (H1N1), Plos One, 5 (2010), e9018.
    [3] A. Aiello, G. Murray, V. Murray, et al., Mask use, hand hygiene, and seasonal influenza like illness among young adults: a randomized intervention trial, J. Infect. Dis., 201 (2010), 491–498.
    [4] S. A. Lee, S. A. Grinshpun and T. Reponen, Respiratory performance offered by N95 respi-rators and surgical masks: human subject evaluation with NaCl aerosol representing bacterial and viral particle size range, Ann. Occup. Hyg., 52 (2008), 177–185.
    [5] J. Cui, Y. Zhang and Z. Feng, Influence of non-homogeneous mixing on final epidemic size in a meta-population model, J. Biol. Dynam., (2018), DOI: 10.1080/17513758.2018.1484186.
    [6] S. M. Tracht, S. Y. Valle and B. K. Edwards, Economic analysis of the use of facemasks during pandemic (H1N1) 2009, J. Theor. Biol., 300, (2012), 161–172.
    [7] T. Chen, S. Chen, Z. Xie, et al., Simulated effectiveness of control countermeasures for influenza outbreaks based on different asymptomatic infections and transmissibility, China Trop. Med., 17 (2017), 470–476. (in Chinese)
    [8] J. Lee, J. Kim and H. D. Kwon, Optimal control of an influenza model with seasonal forcing and age-dependent transmission rates, J. Theor. Biol., 317 (2013), 310–320.
    [9] Centers for Disease Control and Prevention, Interim guidance on infection control measures for 2009 H1N1 influenza in healthcare settings, including protection of healthcare personnel, Miss. RN, 71 (2009), 13–18.
    [10] R. Liu, R. Ka-kit Leung, T. Chen, et al., The effectiveness of age-specific isolation policies on epidemics of influenza A (H1N1) in a large city in Central South China, Plos One, 10 (2015), e0132588.
    [11] J. K. Taubenberger and D. M. Morens, 1918 Influenza: the mother of all pandemics, Emerg. Infect. Dis., 12 (2006), 15–22.
    [12] N. Zhong, Y. Li, Z. Yang, et al., Chinese guidelines for diagnosis and treatment of influenza (2011), J. Thorac. Dis., 3 (2011), 274–289.
    [13] P. van den Driessche and J. Watmough, Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission, Math. Biosci., 180 (2002), 29–48.
    [14] L. I. Jr, A. Nizam, S. Xu, et al., Containing pandemic influenza at the source, Science, 309 (2005), 1083–1087.
    [15] J. W. Tang, T. J. Liebner, B. A. Craven, et al., A schlieren optical study of the human cough with and without wearing masks for aerosol infection control, J. R. Soc. Interface, 6 (2009), S727– S736.
  • This article has been cited by:

    1. Emilio N.M. Cirillo, Matteo Colangeli, Adrian Muntean, T.K. Thoa Thieu, When diffusion faces drift: Consequences of exclusion processes for bi-directional pedestrian flows, 2020, 413, 01672789, 132651, 10.1016/j.physd.2020.132651
    2. Pei-Yang Wu, Ren-Yong Guo, Liang Ma, Bin Chen, Junjie Wu, Qiuhong Zhao, Simulation of pedestrian route choice with local view: A potential field approach, 2021, 92, 0307904X, 687, 10.1016/j.apm.2020.11.036
    3. T.K. Thoa Thieu, Matteo Colangeli, Adrian Muntean, Uniqueness and stability with respect to parameters of solutions to a fluid-like driven system for active-passive pedestrian dynamics, 2021, 495, 0022247X, 124702, 10.1016/j.jmaa.2020.124702
    4. Yu Song, Bingrui Liu, Lejia Li, Jia Liu, Modelling and simulation of crowd evacuation in terrorist attacks, 2022, 0368-492X, 10.1108/K-02-2022-0260
    5. Matteo Colangeli, Adrian Muntean, 2021, Chapter 8, 978-3-030-91645-9, 185, 10.1007/978-3-030-91646-6_8
    6. Xuemei Zhou, Guohui Wei, Zhen Guan, Jiaojiao Xi, Simulation of Pedestrian Evacuation Behavior Considering Dynamic Information Guidance in a Hub, 2022, 1007-1172, 10.1007/s12204-022-2560-0
    7. Thi Kim Thoa Thieu, Adrian Muntean, Roderick Melnik, Coupled stochastic systems of Skorokhod type: Well‐posedness of a mathematical model and its applications, 2022, 0170-4214, 10.1002/mma.8975
    8. Thoa Thieu, Roderick Melnik, Modelling the Behavior of Human Crowds as Coupled Active-passive Dynamics of Interacting Particle Systems, 2025, 27, 1387-5841, 10.1007/s11009-025-10139-9
  • Reader Comments
  • © 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(5593) PDF downloads(778) Cited by(7)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog