Method | τ2 |
[19] | 0.60 |
[7] | 1.40 |
Theorem 3.1 | 2.38 |
Citation: Jing’an Cui, Ya’nan Zhang, Zhilan Feng, Songbai Guo, Yan Zhang. Influence of asymptomatic infections for the effectiveness of facemasks during pandemic influenza[J]. Mathematical Biosciences and Engineering, 2019, 16(5): 3936-3946. doi: 10.3934/mbe.2019194
[1] | Wenshun Sheng, Jiahui Shen, Qiming Huang, Zhixuan Liu, Zihao Ding . Multi-objective pedestrian tracking method based on YOLOv8 and improved DeepSORT. Mathematical Biosciences and Engineering, 2024, 21(2): 1791-1805. doi: 10.3934/mbe.2024077 |
[2] | Paola Goatin, Matthias Mimault . A mixed system modeling two-directional pedestrian flows. Mathematical Biosciences and Engineering, 2015, 12(2): 375-392. doi: 10.3934/mbe.2015.12.375 |
[3] | Alessandro Corbetta, Adrian Muntean, Kiamars Vafayi . Parameter estimation of social forces in pedestrian dynamics models via a probabilistic method. Mathematical Biosciences and Engineering, 2015, 12(2): 337-356. doi: 10.3934/mbe.2015.12.337 |
[4] | Chun-Chao Yeh, Ke-Jia Jhang, Chin-Chun Chang . An intelligent indoor positioning system based on pedestrian directional signage object detection: a case study of Taipei Main Station. Mathematical Biosciences and Engineering, 2020, 17(1): 266-285. doi: 10.3934/mbe.2020015 |
[5] | Songlin Liu, Shouming Zhang, Zijian Diao, Zhenbin Fang, Zeyu Jiao, Zhenyu Zhong . Pedestrian re-identification based on attention mechanism and Multi-scale feature fusion. Mathematical Biosciences and Engineering, 2023, 20(9): 16913-16938. doi: 10.3934/mbe.2023754 |
[6] | Martin Baurmann, Wolfgang Ebenhöh, Ulrike Feudel . Turing instabilities and pattern formation in a benthic nutrient-microorganism system. Mathematical Biosciences and Engineering, 2004, 1(1): 111-130. doi: 10.3934/mbe.2004.1.111 |
[7] | Raimund Bürger, Paola Goatin, Daniel Inzunza, Luis Miguel Villada . A non-local pedestrian flow model accounting for anisotropic interactions and domain boundaries. Mathematical Biosciences and Engineering, 2020, 17(5): 5883-5906. doi: 10.3934/mbe.2020314 |
[8] | F. Berezovskaya, G. Karev, Baojun Song, Carlos Castillo-Chavez . A Simple Epidemic Model with Surprising Dynamics. Mathematical Biosciences and Engineering, 2005, 2(1): 133-152. doi: 10.3934/mbe.2005.2.133 |
[9] | Sebastien Motsch, Mehdi Moussaïd, Elsa G. Guillot, Mathieu Moreau, Julien Pettré, Guy Theraulaz, Cécile Appert-Rolland, Pierre Degond . Modeling crowd dynamics through coarse-grained data analysis. Mathematical Biosciences and Engineering, 2018, 15(6): 1271-1290. doi: 10.3934/mbe.2018059 |
[10] | Gunog Seo, Mark Kot . The dynamics of a simple Laissez-Faire model with two predators. Mathematical Biosciences and Engineering, 2009, 6(1): 145-172. doi: 10.3934/mbe.2009.6.145 |
Networked control systems(NCSs) are a class of systems where the signals of feedback loops are closed via communication network. These systems are found in many applications such as automobiles and airplanes, large scale disributed industrial systems and telecommunication systems due to easier installation and maintenance, simpler upgrading and more reliability over the point-to-point connected systems [3]. Therefore, much attention has been paid to NCSs in the last decades [5,21]. In the networked control system, the information is exchanged with packets through a network where the data packets encounter delays. Considering the effects of network-induced delays in nonlinear NCS, we model its closed-loop system as a fuzzy system with bounded delays.
For a nonlinear control system, Takagi-Sugeno fuzzy model has been playing an important role. It can represent a nonlinear system effectively and is known to be a great tool to analyze and synthesize nonlinear control systems [11,12,13]. The papers [4,6,7,9,10,16,19,20] and [22] considered control design problems for nonlinear networked control systems. The paper [6] partially introduced a multiple Lyapunov-Krasovskii matrix method for fuzzy systems with time-delay but it is not a general multiple Lyapunov matrix method. The papers [4,9,20] and [22] discussed various fuzzy networked control systems but all employed a common Lyapunov-Krasovskii function method. The papers [7,10] and [19] employed a common Lyapunov-Krasovskii function method with descriptor system approach, which is still more conservative than a multiple Lyapunov-Krasovskii matrix method. The papers [6,16] and [19] used a free matrix method to reduce the conservatism but increase computational load by introducing a number of free matrices. Furthermore, the paper [17] introduced a new multiple Lyapunov matrix method but only considered the stability of a networked control system. The papers [17] and [18] considered the stability and stabilization problems based on multiple Lyapunov-Krasovskii matrix method.
In this paper, we consider the H∞ disturbance attenuation of nonlinear networked control systems based on Takagi-Sugeno fuzzy models. First, we assume a new class of fuzzy feedback controller and consider the H∞ disturbance attenuation of the closed-loop system with such a feedback controller. In order to obtain less conservative H∞ disturbance attenuation conditions, we introduce a new type of multiple Lyapunov-Krasovskii function, which reduces the conservatism in stability conditions. A multiple Lyapunov-Krasovskii function is a natural extension of a common Lyapunov-Krasovskii function. However, a conventional multiple Lyapunov function contains the membership function and hence a resulting condition depends on the derivatives of the membership function. However, the derivative of the membership function may not always be known a priori nor differentiable. The paper [8] introduced a new class of multiple Lyapunov function, which contains an integral of the membership function of fuzzy systems. This approach requires no information on the derivatives of the membership function and is shown to reduce the conservatism in H∞ disturbance attenuation conditions. In addition, triple and quadruple integrals of Lyapunov-Krasovskii functions are employed, which enormously reduce the conservatism. Based on such a multiple Lyapunov-Krasovskii function, a control design method of nonlinear networked control systems are proposed. Finally, a numerical example is shown to illustrative our control design method and to show the effectiveness of our approach.
Consider the Takagi-Sugeno fuzzy model, described by the following IF-THEN rules:
IFξ1isMi1and⋯andξpisMip,THEN˙x(t)=Aix(t)+Biu(t)+Diw(t),z(t)=Cix(t) |
where x(t)∈ℜn is the state, u(t)∈ℜm is the control input. and z(t)∈ℜq is the controlled output. The matrices Ai, Bi,Ci and Di are constant matrices of appropriate dimensions. r is the number of IF-THEN rules. Mij are fuzzy sets and ξ1,⋯,ξp are premise variables. We set ξ=[ξ1⋯ξp]T. The premise variable ξ(t) is assumed to be measurable.
Then, the state equation and the controlled output equation are described by
˙x(t)=r∑i=1λi(ξ){Aix(t)+Biu(t)+Diw(t)}Δ=Aλx(t)+Bλu(t)+Dλw(t) | (2.1) |
z(t)=r∑i=1λi(ξ)Cix(t)Δ=Cλx(t) | (2.2) |
where
λi(ξ)=βi(ξ)r∑i=1βi(ξ),βi(ξ)=p∏j=1Mij(ξj) |
and Mij(⋅) is the grade of the membership function of Mij. We assme
λi(ξ(t))≥0,i=1,⋯,r,r∑i=1λi(ξ(t))=1 | (2.3) |
for any ξ(t).
In the considered networked control system, the controller and the actuator are event-driven and sampler is clock-driven. The actual input of the system (2.1) is realized via a zero-order hold device. The sampling period is assumed to be a positive constant T and the information of the zero-order hold may be updated between sampling instants. The updating instants of the zero-order hold are denoted by tk, and τa and τb are the time-delays from the sampler to the controller and from the controller to the zero-order hold at the updating instant tk, respectively. So, the successfully transmitted data in the networked control system at the instant tk experience round trip delay τ=τa+τb which does not need to be restricted inside one sampling period. Regarding the role of the zero-order hold, for a state sample data tk−τ, the corresponding control signal would act on the plant from tk unto tk+1. Therefore, the rules of the fuzzy control input for tk≤t≤tk+1, is written as follows:
IFξ1isMi1and⋯andξpisMip,THENu(t)=Kix(t−τ(t)),i=1,⋯,r. |
where Ki,i=1,⋯,r are constant matrices, and τ(t) may be an unknown time varying delay but its lower bound τ1 and upper bound τ2 are assumed to be known. The upper bound η of the delay rate is also assumed to be known:
τ1≤τ(t)≤τ2, 0<˙τ(t)≤η. |
Then, an overall controller is given by
u(t)=r∑i=1μi(ξ(t−τ(t)))Kix(t−τ(t))Δ=Kτμx(t−τ(t)) | (2.4) |
where
μi(ξ(t))=1h∫tt−hλi(ξ(s))ds, |
and h>0 is some scalar. The closed-loop system (2.1) with (2.4) is given by
˙x(t)=r∑i=1r∑l=1λi(ξ(t))μl(ξ(t−τ(t))){Aix(t)+BiKlx(t−τ(t))+Diw(t)}=Aλx(t)+BλKτμx(t−τ(t)+Dλw(t). | (2.5) |
We note that μi(ξ(t))≥0, i=1,⋯,r and
r∑i=1μi(ξ(t))=1h∫tt−hr∑i=1λi(ξ(s))ds=1, |
which imply that μi(ξ(t)) and λi(ξ(t)) share the same properties as seen in (2.3).
We define the cost function
J=∫∞0(zT(t)z(t)−γ2wT(t)w(t))dt | (2.6) |
where γ is a prescribed scalar. Our problem is to find a condition such that the closed-loop system (2.2) and (2.5) is asymptotically stable with w(t)=0 and it satisfies J<0 in (2.6). In this case, the system is said to achieve the H∞ disturbance attenuation with γ.
Let us first assume that all the controller gain matrices Ki, i=1,⋯,r are given. Importance on the disturbance attenuation conditions lies on how to choose an appropriate Lyapunov-Krasovskii function. Here, we introduce a new Lyapunov-Krasovskii function. To begin with, let us consider a polytopic matrix:
Zμ=r∑i=1μi(ξ(t))Zi |
and similar notations will be used for other matrices. It is easy to see that the time-derivative of Zμ is calculated as
˙Zμ=r∑i=1˙μi(ξ(t))Zi=1hr∑i=1(λi(ξ(t))−λi(ξ(t−τ)))ZiΔ=1h(Zλ−Zτλ). | (3.1) |
For later use, we give some notation and lemmas:
ζ(t)=[xT(t)xT(t−τ(t))xT(t−τ1)xT(t−τ2)∫tt−τ1xT(s)ds∫t−τ1t−τ(t)xT(s)ds∫t−τ(t)t−τ2xT(s)ds∫0−τ1∫tt+βxT(s)dsdβ∫−τ1−τ(t)∫tt+βxT(s)ds∫−τ(t)−τ2∫tt+βxT(s)dsw(t)]TΔ=[ζT1(t)ζT2(t)⋯ζT11(t)]T. |
Lemma 3.1. (Jensen's Inequality) For τ∈ℜ, x(t)∈ℜn, and P>0∈ℜn×n, the following inequalities hold:
−τ∫tt−τxT(s)Px(s)ds≤∫tt−τxT(s)dsP∫tt−τx(s)ds,−τ22∫0−τ∫tt+βxT(s)Px(s)dsdβ≤∫0−τ∫tt+βxT(s)dsdβP∫0−τ∫tt+βx(s)dsdβ,−τ36∫0−τ∫0β∫tt+θxT(s)Px(s)dsdβdθ≤∫0−τ∫0β∫tt+θxT(s)dsdβdθP∫0−τ∫0β∫tt+θx(s)dsdβdθ. |
Lemma 3.2. [1] For τ1, τ2, α, ε∈ℜ, x(t)∈ℜn, and P>0∈ℜn×n, the following inequalities hold:
−(τ2−τ1)∫t−τ1t−τ2xT(s)Px(s)ds≤−ζT6(t)Pζ6(t)−ζT7(t)Pζ7(t)−(1−α)ζT6(t)Pζ6(t)−αζT7(t)Pζ7(t),−(τ22−τ21)2∫t−τ1t−τ2∫tt+βxT(s)Px(s)dsdβ≤−ζT9(t)Pζ9(t)−ζT10(t)Pζ10(t)−(1−ε)ζT9(t)Pζ9(t)−εζT10(t)Pζ10(t). |
Now, we are ready to give our first result.
Theorem 3.1. Given control gain matrices Kl, l=1,⋯,r and scalar h>0. The closed-loop system (2.5) achieves the H∞ disturbance attenuation with γ if there exist matrices Zj>0, P1>0, P2>0, P3>0, P4>0, Rj1>0, R2>0, R3j>0, R4>0, X1j>0, X2>0, X3j>0, X4>0, U1>0, U2>0, Wj, j=1,⋯,r, and scalars δi>0, i=1,2 such that
[12θijl+θ1j+δ1ICTi∗−I]<0, i,j,l=1,⋯,r, | (3.2) |
[12θijl+θ2j+δ1ICTi∗−I]<0, i,j,l=1,⋯,r, | (3.3) |
[12θijl+θ3j−δ2ICTi∗−I]<0, i,j,l=1,⋯,r, | (3.4) |
[12θijl+θ4j−δ2ICTi∗−I]<0, i,j,l=1,⋯,r, | (3.5) |
δ1−δ2>0 | (3.6) |
[1τ1Zi+X2−X2−X2Q1i+X2]≥0, i=1,⋯,r, | (3.7) |
[1τ2−τ1Zi+X4−X4−X4Q2i+X4]≥0, i=1,⋯,r | (3.8) |
where τ12=τ2−τ1, τ(2)12=τ22−τ21
θ1j=−eT7X3je7−(e2−e4)TX4(e2−e4),θ2j=−eT6X3je6−(e2−e3)TX4(e2−e3),θ3j=−eT10R3je10−(τ12e1−e7)TR4(τ12e1−e7),θ4j=−eT9R3je9−(τ12e1−e6)TR4(τ12e1−e6),θijl=πijl−eT5X1e5−(e1−e3)TX2(e1−e3)−eT6X3e6−eT7X3e7−(e2−e3)TX4(e2−e3)−(e2−e4)TX4(e2−e4)−eT8R1je8−(τ1e1−e5)TR2(τ1e1−e5)−eT9R3je9−eT10R3je10−(τ12e1−e6)TR4(τ12e1−e6)−(τ12e1−e7)TR4(τ12e1−e7)−(τ122e1−e8)TU1(τ122e1−e8)−(τ(2)122e1−e9−e10)TU2(τ(2)122e1−e9−e10) |
πijl=[Λ11ijΛ12ijl00P100τ1P3τ12P4τ12P4∗Λ22ijl00000000∗∗−Q1j+Q2j0−P1P2P2000∗∗∗−Q2j0−P2−P2000∗∗∗∗000−P300∗∗∗∗∗000−P4−P4∗∗∗∗∗∗00−P4−P4∗∗∗∗∗∗∗000∗∗∗∗∗∗∗∗00∗∗∗∗∗∗∗∗∗0∗∗∗∗∗∗∗∗∗∗ZjDi+ATiΩDiKTlBTiΩDi00000000DTiΩDi−γ2I], |
Λ11ij=ATiZj+ZjAi+Q1j+Wj+1h(Zi−Zl)+τ21X1j+τ212X3j+τ414R1j+(τ(2)12)24R3j+ATiΩAi,Λ12ijl=ZjBiKl+ATiΩBiKl,Λ22ijl=−(1−η)Wj+KTlBTiΩBiKl,Ω=τ21X2+τ212X4+τ414R2+(τ(2)12)24R4+τ6136U1+(τ32−τ31)236U2,Φil=[ATiKTlBTi00000000 DTi],ˉCi=[Ci000000000 0], |
and ei, i=1,⋯,11 denote an 11-dimensional fundamental vector whose i-th element is 1 and 0 elsewhere.
Proof: Consider the following Lyapunov-Krasovskii function:
V(xt)=V1(xt)+V2(xt)+V3(xt)+V4(xt)+V5(xt) | (3.9) |
where xt=x(t+θ), −τ2≤θ≤0,
V1(xt)=xT(t)Zμx(t)+∫tt−τ1xT(s)dsP1∫tt−τ1xT(s)ds+∫t−τ1t−τ2xT(s)dsP2∫t−τ1t−τ2x(s)ds+∫0−τ1∫tt+θxT(s)dsdθP3∫0−τ1∫tt+θx(s)dsdθ+∫−τ1−τ2∫tt+θxT(s)dsdθP4∫−τ1−τ2∫tt+θx(s)dsdθ,V2(xt)=∫tt−τ1xT(s)Q1μx(s)ds+∫t−τ1t−τ2xT(s)Q2μx(s)ds+∫tt−τ(t)xT(s)Wμx(s)ds,V3(xt)=τ1∫0−τ1∫tt+θxT(s)X1μx(s)dsdθ+τ1∫0−τ1∫tt+θ˙xT(s)X2˙x(s)dsdθ+(τ2−τ1)∫−τ1−τ2∫tt+θxT(s)X3μx(s)dsdθ+(τ2−τ1)∫−τ1−τ2∫tt+θ˙xT(s)X4˙x(s)dsdθ,V4(xt)=τ212∫0−τ1∫0β∫tt+θxT(s)R1μx(s)dsdθdβ+τ212∫0−τ1∫0β∫tt+θ˙xT(s)R2˙x(s)dsdθdβ+τ22−τ212∫−τ1−τ2∫0β∫tt+θxT(s)R3μx(s)dsdθdβ+τ22−τ212∫−τ1−τ2∫0β∫tt+θ˙xT(s)R4˙x(s)dsdθdβ,V5(xt)=τ316∫0−τ1∫0β∫0λ∫tt+θ˙xT(s)U1˙x(s)dsdλdβdθ+τ32−τ316∫−τ1−τ2∫0β∫0λ∫tt+θ˙xT(s)U2˙x(s)dsdλdβdθ |
where
Xjμ=r∑i=1μi(ξ)Xji>0, j=1,3 |
and similar notations are used. Now, we take the derivative of V(xt) with respect to t along the solution of the system (2.5).
First, using Lemma 3.1, we see that
∫tt+θ˙xT(s)X2˙x(s)ds≥−1θ∫tt+θ˙xT(s)dsX2∫tt+θ˙x(s)ds=−1θ[x(t)−x(t+θ)]TX2[x(t)−x(t+θ)] |
and
∫0−τ1∫tt+θ˙xT(s)X2˙x(s)dsdθ≥−∫0−τ11θ[x(t)−x(t+θ)]TX2[x(t)−x(t+θ)]dθ=∫τ101θ[x(t)−x(t−s)]TX2[x(t)−x(t−s)]ds≥1τ1∫τ10[x(t)−x(t−s)]TX2[x(t)−x(t−s)]ds=1τ1∫tt−τ1[x(t)−x(α)]TX2[x(t)−x(α)]dα |
Similarly, we have
∫−τ1−τ2∫tt+θ˙xT(s)X4˙x(s)dsdθ≥1τ2−τ1∫t−τ1t−τ2[x(t)−x(α)]TX4[x(t)−x(α)]dα |
Hence, we get
xT(t)Zμx(t)+∫tt−τ1xT(s)Q1μx(s)ds+∫t−τ1t−τ2xT(s)Q2μx(s)ds+τ1∫0−τ1∫tt+θ˙xT(s)X2˙x(s)dsdθ+(τ2−τ1)∫−τ1−τ2∫tt+θ˙xT(s)X4˙x(s)dsdθ≥∫tt−τ1[x(t)x(α)]T[1τ1Zμ+X2−X2−X2Q1μ+X2][x(t)x(α)]dα+∫t−τ1t−τ2[x(t)x(α)]T[1τ2−τ1Zμ+X4−X4−X4Q2μ+X4][x(t)x(α)]dα |
It follows from the above that for V1(xt)+V2(xt)+V3(xt) to be positive, the positive definiteness of Q1i and Q2i, i=1,⋯,r can be removed if the positive definiteness of Pi,Wj,X1j,X3j, i=1,⋯,4, j=1,⋯,r is guaranteed and (3.7)-(3.8) are satisfied.
The derivatives of V1(xt) and V2(xt) in (3.9) are calculated as follows:
˙V1(xt)=2(Aλx(t)+BλKτμx(t−τ(t))+Dλw(t))TZμx(t)+1hxT(t)(Zλ−Zτλ)x(t)+2(x(t)−x(t−τ1))TP1∫tt−τ1x(s)ds+2(x(t−τ1)−x(t−τ2))TP2∫t−τ1t−τ2x(s)ds+2[τ1x(t)−∫tt−τ1xT(s)ds]TP3∫0−τ1∫tt+θx(s)dsdθ+2[(τ2−τ1)x(t)−∫t−τ1t−τ2xT(s)ds]TP4∫−τ1−τ2∫tt+θx(s)dsdθ, | (3.10) |
˙V2(xt)≤xT(t)(Q1μ+Wμ)x(t)−xT(t−τ1)Q1μx(t−τ1)+xT(t−τ1)Q2μx(t−τ1)−xT(t−τ2)Q2μx(t−τ2)−(1−η)xT(t−τ(t))Wμx(t−τ(t)). | (3.11) |
Using Lemmas 3.1 and 3.2, we have
˙V3(xt)=τ21xT(t)X1μx(t)−τ1∫tt−τ1xT(s)X1μx(s)ds+τ21˙xT(t)X2˙x(t)−τ1∫tt−τ1˙xT(s)X2˙x(s)ds+(τ2−τ1)2xT(t)X3μx(t)−(τ2−τ1)∫t−τ1t−τ2xT(s)X3μx(s)ds+(τ2−τ1)2˙xT(t)X4˙x(t)−(τ2−τ1)∫t−τ1t−τ2˙xT(s)X4˙x(s)ds,≤τ21xT(t)X1μx(t)−ζT5(t)X1μζ5(t)+τ21˙xT(t)X2˙x(t)−(ζ1(t)−ζ3(t))TX2(ζ1(t)−ζ3(t))+(τ2−τ1)2xT(t)X3μx(t)−ζT6(t)X3μζ6(t)−ζT7(t)X3μζ7(t)−(1−α)ζT6(t)X3μζ6(t)−αζT7(t)X3μζ7(t)+(τ2−τ1)2˙xT(t)X4˙x(t)−(ζ2(t)−ζ3(t))TX4(ζ2(t)−ζ3(t))−(ζ2(t)−ζ4(t))TX4(ζ2(t)−ζ4(t))−(1−α)(ζ2(t)−ζ3(t))TX4(ζ2(t)−ζ3(t))−α(ζ2(t)−ζ4(t))TX4(ζ2(t)−ζ4(t)), | (3.12) |
˙V4(xt)=τ414xT(t)R1μx(t)−τ212∫0−τ1∫tt+βxT(s)R1μx(s)dsdβ+τ414˙xT(t)R2˙x(t)−τ212∫0−τ1∫tt+β˙xT(s)R2˙x(s)dsdβ+(τ22−τ21)24xT(t)R3μx(t)−τ22−τ212∫−τ1−τ2∫tt+βxT(s)R3μx(s)dsdβ+(τ22−τ21)24˙xT(t)R4˙x(t)−τ22−τ212∫−τ1−τ2∫tt+β˙xT(s)R4˙x(s)dsdβ≤τ414xT(t)R1μx(t)−ζT8(t)R1μζ8(t)+τ414˙xT(t)R2˙x(t)−(τ1ζ1(t)−ζ5(t))T(t)R2(τ1ζ1(t)−ζ5(t))+(τ22−τ21)24xT(t)R3μx(t)−ζT9(t)R3μζ9(t)−ζT10(t)R3μζ10(t)−(1−ε)ζT9(t)R3μζ9(t)−εζT10(t)R3μζ10(t)+(τ22−τ21)24˙xT(t)R4˙x(t)−((τ2−τ1)ζ1(t)−ζ7(t))TR4((τ2−τ1)ζ1(t)−ζ7(t))−((τ2−τ1)ζ1(t)−ζ6(t))TR4((τ2−τ1)ζ1(t)−ζ6(t))−ε((τ2−τ1)ζ1(t)−ζ7(t))TR4((τ2−τ1)ζ1(t)−ζ7(t))−(1−ε)((τ2−τ1)ζ1(t)−ζ6(t))TR4((τ2−τ1)ζ1(t)−ζ6(t)) | (3.13) |
˙V5(xt)=τ6136˙xT(t)U1˙x(t)−τ316∫0−τ1∫0β∫tt+λ˙xT(s)U1˙x(s)dsdλdβ+(τ32−τ31)236˙xT(t)U2˙x(t)−τ32−τ316∫−τ1−τ2∫0β∫tt+λ˙xT(s)U2˙x(s)dsdλdβ≤τ6136˙xT(t)U1˙x(t)−(τ212ζ1(t)−ζ8(t))TU1(τ212ζ1(t)−ζ8(t))+(τ32−τ31)236˙xT(t)U2˙x(t)−(τ22−τ212ζ1(t)−ζ9(t)−ζ10(t))TU2(τ22−τ212ζ1(t)−ζ9(t)−ζ10(t)). | (3.14) |
It follows from (3.10)–(3.14) that
˙V(xt)+zT(t)z(t)−γ2wT(t)w(t)=ζT(t)[r∑i=1r∑j=1r∑l=1λi(ξ)μj(ξ)μl(ξ(t−τ))(αθ(1)ijl+(1−α)θ(2)ijl+εθ(3)ijl+(1−ε)θ(4)ijl]ζ(t)+xT(t)(r∑i=1λi(ξ)Ci)T(r∑i=1λi(ξ)Ci)x(t)+˙xT(t)Ω˙x(t)Δ=ζT(t)[(αθ(1)λμμ+(1−α)θ(2)λμμ+εθ(3)λμμ+(1−ε)θ(4)λμμ]ζ(t)+ζT(t)eT1CTλCλe1ζ(t)+ζT(t)(Aλe1+BλKτμe2+Dλe11)TΩ(Aλe1+BλKτμe2+Dλe11)ζ(t) | (3.15) |
where θ(k)ijl=12θijl+θkj, k=1,2 and θ(k)ijl=12θijl+θkj, k=3,4. By Schur complement formula, the upper bound of ˙V is negative if and only if
r∑i=1r∑j=1r∑l=1λi(ξ)μj(ξ)μl(ξ(t−τ))[αθ(1)ijl+(1−α)θ(2)ijl+εθ(3)ijl+(1−ε)θ(4)ijlΦTilˉCTi∗−Ω−10∗∗−I]<0. | (3.16) |
(3.16) holds if and only if the following conditions hold simultaneously provided that δ2<δ1;
αΨ(1)λμμ+(1−α)Ψ(2)λμμ<−δ1I,εΨ(3)λμμ+(1−ε)Ψ(4)λμμ<δ2I |
where
Ψ(i)λμμ=[θ(i)λμμΦλμCTλ∗−Ω−10∗∗−I], i=1,2,3,4. |
The above conditions can be rewritten as
α(Ψ(1)λμμ+δ1I)+(1−α)(Ψ(2)λμμ+δ1I)<0, | (3.17) |
ε(Ψ(3)λμμ−δ2I)+(1−ε)(Ψ(4)λμμ−δ2I)<0. | (3.18) |
Since 0≤α, ε≤1, the terms α(Ψ(1)λμμ+δ1I)+(1−α)(Ψ(2)λμμ+δ1I) is a convex combination of Ψ(1)λμμ+δ1I and Ψ(2)λμμ+δ1I. Similarly, the terms ε(Ψ(3)λμμ−δ2I)+(1−ε)(Ψ(4)λμμ−δ2I) is a convex combination of Ψ(3)λμμ−δ2I and Ψ(4)λμμ−δ2I. These combinations are negative definite if the vertices become negative. Therefore, (3.17) and (3.18) are equivalent to
Ψ(1)λμμ+δ1I<0,Ψ(2)λμμ+δ1I<0,Ψ(3)λμμ−δ2I<0,Ψ(4)λμμ−δ2I<0 |
which can be written as (3.2)–(3.5). It follows from (3.15) that this proves that the conditions (3.2)–(3.6) suffice to show
˙V(xt)+zT(t)z(t)−γ2wT(t)w(t)<0. |
Integrating t=0 to t=∞, we have
V(x(∞))−V(x(0))+J<0. |
Since V(x(∞))≥0 and V(x(0))=0, we can show that J<0 and this achieves the H∞ disturbance attenuation of the system (2.5). The stability of the system with w(t)=0 is proved in the same lines as in [18].
Remark 3.1. The paper [18] uses the similar method to propose a stabilizing control design for nonlinear NCSs. It has shown that its method has advantaes over the previous methods in [6] and [7]. The novelty of Theorem 3.1 lies in a new multiple Lyapunov-Krasovskii function (3.9) where Zj, Wj, Q1j, Q2j, R1j, R3j, X1j and X3j are multiple Lyapunov matrices. In addition, the integral μi(ξ(t)), i=1,⋯,r of the membership functions avoid the derivatives of the membership function in the H∞ disturbance attenuation conditions (3.2)–(3.5). The quadruple integral terms and the quadratic forms of the double integral terms ∫∫xT(s)dsdβP∫∫xT(s)dsdβ are employed in (3.9), which leads to a drastic reduction of the conservatism in the H∞ disturbance attenuation condition. In fact, recent papers [6] and [7] do not use the quadruple integrals and the quadratic forms of the double integrals. This implies that our H∞ disturbance attenuation conditions are less conservative than recent results, and is technically better than others. In fact, this advantage was shown in [18].
Remark 3.2. The conditions (3.7)–(3.8) remove the positive definiteness of Q1i and Q2i, i=1,⋯,r, and reduce the conservatism in conditions in Theorem 3.1.
Remark 3.3. The conditions (3.2)–(3.8) are not strict LMIs unless h>0 is given. By defining ˜h=1h, these conditions can be seen as bilinear matrix inequalities. Effective algorithms to solve them include the branch-and-cut algorithm, the branch-and-bound algorithm, and the Lagrangian dual global optimization algorithm in [2,14] and [15], respectively.
Next, we shall propose a control design method. It is assumed that instead of the controller (2.4), a form of the controller is given by non-PDC, described by
u(t)=r∑i=1μi(ξ(t−τ(t)))Ki(r∑i=1μi(ξ(t−τ(t)))Zi)−1x(t−τ(t))=Kτμ(Zτμ)−1x(t−τ(t)) | (4.1) |
where Ki and Zi, i=1,⋯,r are to be determined, and μi, i=1,⋯,r are given as in (2.4). Then, the closed-loop system (2.1) with (4.1) becomes
˙x(t)=Aλx(t)+BλKτμ(Zτμ)−1x(t−τ(t))+Dλw(t). | (4.2) |
Applying Theorem 3.1, we obtain the following theorem for control design.
Theorem 4.1. For some scalar h>0. A controller (4.1) makes the fuzzy system (2.1)–(2.2) achieve the H∞ disturbance attenuation with γ if there exist matrices Zj>0, ˉP1mn>0, ˉP2mn>0, ˉP3mn>0, ˉP4mn>0, ˉR1jmn>0, ˉR2mn>0, ˉR3jmn>0, ˉR4mn>0, ˉX1jmn>0, ˉX2mn>0, ˉX3jmn>0, ˉX4mn>0, ˉU1mn>0, ˉU2mn>0, ˉWjmn, Kj,j,m,n=1,⋯,r, and scalars δi>0, i=1,2 such that
[ΥpijklmnΓijl∗ˉΩjkl]<0,i,j,k,l,m,n=1,⋯,r, p=1,⋯,4, | (4.3) |
δ1−δ2>0 | (4.4) |
[1τ1ˉZi+ˉX2mn−ˉX2mn−ˉX2mnˉQ1imn+ˉX2mn]≥0 i,m,n=1,⋯,r, | (4.5) |
[1τ2−τ1ˉZi+ˉX4mn−ˉX4mn−ˉX4mnˉQ2imn+ˉX4mn]≥0 i,m,n=1,⋯,r | (4.6) |
where
Υ1ijklmn=12ˉθijklmn+ˉθ1jmn+δ1I,Υ2ijklmn=12ˉθijklmn+ˉθ2jmn+δ1I,Υ3ijklmn=12ˉθijklmn+ˉθ3jmn−δ2I,Υ4ijklmn=12ˉθijklmn+ˉθ4jmn−δ2I,ˉθ1jmn=−eT7ˉX3jmne7−(e2−e4)TˉX4mn(e2−e4),ˉθ2jmn=−eT6ˉX3jmne6−(e2−e3)TˉX4mn(e2−e3),ˉθ3jmn=−eT10ˉR3jmne10−(τ12e1−e7)TˉR4mn(τ12e1−e7),ˉθ4jmn=−eT9ˉR3jmne9−(τ12e1−e6)TˉR4mn(τ12e1−e6),ˉθijlkmn=ˉπijlkmn−eT5ˉX1mne5−(e1−e3)TˉX2mn(e1−e3)−eT6ˉX3jmne6−eT7ˉX3jmne7−(e2−e3)TˉX4mn(e2−e3)−(e2−e4)TˉX4mn(e2−e4)−eT8ˉR1jmne8−(τ1e1−e5)TˉR2mn(τ1e1−e5)−eT9ˉR3jmne9−eT10ˉR3jmne10−(τ12e1−e6)TˉR4mn(τ12e1−e6)−(τ12e1−e7)TˉR4mn(τ12e1−e7)−(τ122e1−e8)TˉU1mn(τ122e1−e8)−(τ(2)122e1−e9−e10)TˉU2mn(τ(2)122e1−e9−e10) |
ˉΞkl=−ˉX2kl−τ21ˉR2kl−2τ212ˉR4kl−τ414ˉU1kl−(τ(2)12)24ˉU2kl,ˉπijklmn=[ˉΛijklBiKl00P1mn0τ1ˉP3mnτ12ˉP4mn∗−(1−η)Wjmn000000∗∗−ˉQ1jmn+ˉQ2jmn0−P1mnˉP2mnˉP2mn0∗∗∗−ˉQ2jmn0−ˉP2mn−ˉP2mn0∗∗∗∗000−ˉP3mn∗∗∗∗∗000∗∗∗∗∗∗00∗∗∗∗∗∗∗0∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗∗τ12ˉP4mn0Di000000000000−ˉP4mn−ˉP4mn0−ˉP4mn−ˉP4mn0000000∗00∗∗−γ2I], |
ˉΛijkl=AiZj+ZjATi+ˉQ1jkl+ˉWjkl−1h(ˉZi−ˉZl)+τ21ˉX1jkl+τ212ˉX3jkl+τ414ˉR1jkl+(τ(2)12)24ˉR3jkl,ΓTijl=[AiZjBiKl00000000 DiZjCiZj000000000 0],ˉΩjkl=[2(−2Zj+τ21ˉX2kl+τ212ˉX4kl+τ414ˉR2kl+(τ(2)12)24ˉR4kl+τ6136ˉU1kl+(τ32−τ31)236ˉU2kl)0∗−I] |
where τ12=τ2−τ1, τ(2)12=τ22−τ21. In this case, control gains Kl and Zj, j,l=1,⋯,r can be found as solutions of the above LMIs.
Proof: We consider the same Lyapunov-Krasovskii function (3.9) except for the first term of V1(xt), which is replaced by
ˉV1(xt)=xT(t)Z−1μx(t). |
The time-derivative of V11(xt) is calculated as
˙ˉV1(xt)=2xT(t)Z−1μ(Aλx(t)+BλKτμ(Zτμ)−1x(t−τ(t))+Dλw(t))+xT(t)˙Z−1μx(t)=xT(t)Z−1μ(AλZμ+ZμATλ−˙Zμ)Z−1μx(t)+2xT(t)Z−1μBλKτμ(Zτμ)−1x(t−τ(t)))+2xT(t)Z−1μDλw(t)) |
We follow the similar lines of proof of Theorem 3.1, and obtain
˙V(xt)=r∑i=1r∑j=1r∑k=1r∑l=1r∑m=1r∑n=1λi(ξ)μj(ξ)μk(ξ)μl(ξ)μm(ξ(t−τ))×μn(ξ(t−τ))ˉζT(t)(αˉθ(1)ijklmn+(1−α)ˉθ(2)ijklmn+εˉθ(3)ijklmn+(1−ε)ˉθ(4)ijklmn)ˉζ(t) |
where ˉθ(p)ijklmn=12˜θijklmn+ˉθpjmn, p=1,2, ˉθ(p)ijklmn=12˜θijklmn+ˉθpjmn, p=3,4,
˜θijklmn=ˉθijklmn+ΦTilΩΦil+[ZTμCTλCλZμ0⋯000⋯0⋮⋮⋱⋮00⋯0], |
ˉζ=[Z−1μ(Zτμ)−1⋯(Zτμ)−1I]ζ. |
We have defined the following matrices:
r∑j=1r∑k=1r∑l=1μj(ξ)μk(ξ)μl(ξ)ˉQjkl=ZμQμZμ,r∑j=1r∑m=1r∑n=1μj(ξ)μm(ξ(t−τ(t)))μn(ξ(t−τ(t)))ˉQjmn=ZτμQμZτμ |
for example. Similar notations have also been used for others matrices. Applying the Schur complement formula and the inequality −Ω−1≤−2Z+ZΩZ, we obtain (4.3)–(4.6).
Remark 4.1. In case that the delay rate η is unknown, we can still make use of Theorem 4.1 with Wj=0, j=1,⋯,r.
Remark 4.2. The conditions (4.3)–(4.6) are not strict LMIs unless h>0 is given, either. However, they can be solved in the same way as discussed in Remark 3.3.
We consider the system [19]
˙x(t)=2∑i=1λi(ξ){Aix(t)+Biu(t)+Diw(t)}, | (5.1) |
z(t)=2∑i=1λi(ξ)Cix(t) | (5.2) |
where x1(t)∈[1, −1] and
A1=[01−0.010], A2=[01−0.680], B1=[01], B2=[01], |
C1=[10.1], C2=[1.10.1], D1=[00.1],D2=[00.5], |
λ1(x1)=1−x21,λ2(x1)=x21. |
Suppose that 0.0≤τ(t)≤1.50 and η=0.3.
First, we compare our results with others to show the effectiveness of Theorem 3.1 for stabilization with w(t)=0 (Table 1).
This obviously show that our new multiple Lyapunov-Krasovskii function method is better than the existing conditions.
Next, we design an H∞ controller for the fuzzy networked system (5.1)–(5.2). Given the H∞ attenuation level γ=1, Theorem 4.1 gives the feedback control u(t) by
u(t)=Kτμ(Zτμ)−1x(t−τ(t)) | (5.3) |
where
K1=[0.0522−0.1368], K2=[0.1121−0.1643],Z1=[0.0936−0.0485−0.04850.1289], Z2=[0.0924−0.0468−0.04680.1258]. |
Theorem 4.1 is based on Theorem 3.1, which has been shown to be least conservative in the above numerical example. It implies that Theorem 4.1 is a control design method which requires less conservative design conditions than others.
Finally, the simulation result on the state trajectories of the closed-loop system with the initial conditions x(0)=[−0.5 0.5]T and the zero-mean Gaussian random variable w(t) of variance 0.1 is shown in Figure 1. The delay τ(t) is assumed to be τ(t)=1+0.5sin(0.1t). The bold and dotted lines indicate x1(t) and x2(t), respectively, and they show the system stability with disturbance attenuation.
The H∞ disturbance attenuation and control design of nonlinear networked control systems described by Takagi-Sugeno fuzzy systems have been considered. A new multiple Lyapunov-Krasovskii function was introduced to obtain new H∞ disturbance attenuation conditions for the closed-loop system. This technique leads to less conservative conditions. Control design method for nonlinear networked control systems was also proposed based on the same multiple Lyapnov-Krasovskii function and thus conditions for control design are less conservative than the existing ones.
The author declares that there is no conflicts of interest in this paper.
[1] | T. C. Germann, K. Kai, I. M. Longini, et al., Mitigation strategies for pandemic influenza in the United States, P. Natl. Acad. Sci. USA, 103 (2006), 5935–5940. |
[2] | S. M. Tracht, S. Y. Valle and J. M. Hyman, Mathematical modeling of the effectiveness of facemasks in reducing the spread of novel influenza A (H1N1), Plos One, 5 (2010), e9018. |
[3] | A. Aiello, G. Murray, V. Murray, et al., Mask use, hand hygiene, and seasonal influenza like illness among young adults: a randomized intervention trial, J. Infect. Dis., 201 (2010), 491–498. |
[4] | S. A. Lee, S. A. Grinshpun and T. Reponen, Respiratory performance offered by N95 respi-rators and surgical masks: human subject evaluation with NaCl aerosol representing bacterial and viral particle size range, Ann. Occup. Hyg., 52 (2008), 177–185. |
[5] | J. Cui, Y. Zhang and Z. Feng, Influence of non-homogeneous mixing on final epidemic size in a meta-population model, J. Biol. Dynam., (2018), DOI: 10.1080/17513758.2018.1484186. |
[6] | S. M. Tracht, S. Y. Valle and B. K. Edwards, Economic analysis of the use of facemasks during pandemic (H1N1) 2009, J. Theor. Biol., 300, (2012), 161–172. |
[7] | T. Chen, S. Chen, Z. Xie, et al., Simulated effectiveness of control countermeasures for influenza outbreaks based on different asymptomatic infections and transmissibility, China Trop. Med., 17 (2017), 470–476. (in Chinese) |
[8] | J. Lee, J. Kim and H. D. Kwon, Optimal control of an influenza model with seasonal forcing and age-dependent transmission rates, J. Theor. Biol., 317 (2013), 310–320. |
[9] | Centers for Disease Control and Prevention, Interim guidance on infection control measures for 2009 H1N1 influenza in healthcare settings, including protection of healthcare personnel, Miss. RN, 71 (2009), 13–18. |
[10] | R. Liu, R. Ka-kit Leung, T. Chen, et al., The effectiveness of age-specific isolation policies on epidemics of influenza A (H1N1) in a large city in Central South China, Plos One, 10 (2015), e0132588. |
[11] | J. K. Taubenberger and D. M. Morens, 1918 Influenza: the mother of all pandemics, Emerg. Infect. Dis., 12 (2006), 15–22. |
[12] | N. Zhong, Y. Li, Z. Yang, et al., Chinese guidelines for diagnosis and treatment of influenza (2011), J. Thorac. Dis., 3 (2011), 274–289. |
[13] | P. van den Driessche and J. Watmough, Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission, Math. Biosci., 180 (2002), 29–48. |
[14] | L. I. Jr, A. Nizam, S. Xu, et al., Containing pandemic influenza at the source, Science, 309 (2005), 1083–1087. |
[15] | J. W. Tang, T. J. Liebner, B. A. Craven, et al., A schlieren optical study of the human cough with and without wearing masks for aerosol infection control, J. R. Soc. Interface, 6 (2009), S727– S736. |
1. | Emilio N.M. Cirillo, Matteo Colangeli, Adrian Muntean, T.K. Thoa Thieu, When diffusion faces drift: Consequences of exclusion processes for bi-directional pedestrian flows, 2020, 413, 01672789, 132651, 10.1016/j.physd.2020.132651 | |
2. | Pei-Yang Wu, Ren-Yong Guo, Liang Ma, Bin Chen, Junjie Wu, Qiuhong Zhao, Simulation of pedestrian route choice with local view: A potential field approach, 2021, 92, 0307904X, 687, 10.1016/j.apm.2020.11.036 | |
3. | T.K. Thoa Thieu, Matteo Colangeli, Adrian Muntean, Uniqueness and stability with respect to parameters of solutions to a fluid-like driven system for active-passive pedestrian dynamics, 2021, 495, 0022247X, 124702, 10.1016/j.jmaa.2020.124702 | |
4. | Yu Song, Bingrui Liu, Lejia Li, Jia Liu, Modelling and simulation of crowd evacuation in terrorist attacks, 2022, 0368-492X, 10.1108/K-02-2022-0260 | |
5. | Matteo Colangeli, Adrian Muntean, 2021, Chapter 8, 978-3-030-91645-9, 185, 10.1007/978-3-030-91646-6_8 | |
6. | Xuemei Zhou, Guohui Wei, Zhen Guan, Jiaojiao Xi, Simulation of Pedestrian Evacuation Behavior Considering Dynamic Information Guidance in a Hub, 2022, 1007-1172, 10.1007/s12204-022-2560-0 | |
7. | Thi Kim Thoa Thieu, Adrian Muntean, Roderick Melnik, Coupled stochastic systems of Skorokhod type: Well‐posedness of a mathematical model and its applications, 2022, 0170-4214, 10.1002/mma.8975 | |
8. | Thoa Thieu, Roderick Melnik, Modelling the Behavior of Human Crowds as Coupled Active-passive Dynamics of Interacting Particle Systems, 2025, 27, 1387-5841, 10.1007/s11009-025-10139-9 |