Research article

Research on the ellipsoidal boundary of reachable sets of neutral systems with bounded disturbances and discrete time delays

  • Received: 28 March 2024 Revised: 03 May 2024 Accepted: 07 May 2024 Published: 13 May 2024
  • MSC : 34K40, 37B25

  • This research focuses on the challenge of defining the ellipsoidal boundaries of the reachable set (RS) for neutral-type dynamical systems with time delays. A novel analytical approach is proposed, leveraging the development of new Lyapunov functions and matrix inequality techniques. These methods provide powerful tools for determining the ellipsoidal boundaries of the system's RS. A comparative analysis, supported by numerical examples, demonstrates that the approach outlined in this study can accurately identify smaller yet effective RS boundaries compared to existing literature. This precise boundary determination offers significant theoretical support for state estimation and control design in dynamical systems, thereby enhancing their effectiveness and reliability in real-world applications.

    Citation: Beibei Su, Liang Zhao, Liang Du, Qun Gu. Research on the ellipsoidal boundary of reachable sets of neutral systems with bounded disturbances and discrete time delays[J]. AIMS Mathematics, 2024, 9(6): 16586-16604. doi: 10.3934/math.2024804

    Related Papers:

    [1] Wei Lu, Yuangang Li, Yixiu Kong, Liangli Yang . Generalized triangular Pythagorean fuzzy weighted Bonferroni operators and their application in multi-attribute decision-making. AIMS Mathematics, 2023, 8(12): 28376-28397. doi: 10.3934/math.20231452
    [2] Saleem Abdullah, Muhammad Qiyas, Muhammad Naeem, Mamona, Yi Liu . Pythagorean Cubic fuzzy Hamacher aggregation operators and their application in green supply selection problem. AIMS Mathematics, 2022, 7(3): 4735-4766. doi: 10.3934/math.2022263
    [3] Misbah Rasheed, ElSayed Tag-Eldin, Nivin A. Ghamry, Muntazim Abbas Hashmi, Muhammad Kamran, Umber Rana . Decision-making algorithm based on Pythagorean fuzzy environment with probabilistic hesitant fuzzy set and Choquet integral. AIMS Mathematics, 2023, 8(5): 12422-12455. doi: 10.3934/math.2023624
    [4] Jun Hu, Jie Wu, Mengzhe Wang . Research on VIKOR group decision making using WOWA operator based on interval Pythagorean triangular fuzzy numbers. AIMS Mathematics, 2023, 8(11): 26237-26259. doi: 10.3934/math.20231338
    [5] Esmail Hassan Abdullatif Al-Sabri, Muhammad Rahim, Fazli Amin, Rashad Ismail, Salma Khan, Agaeb Mahal Alanzi, Hamiden Abd El-Wahed Khalifa . Multi-criteria decision-making based on Pythagorean cubic fuzzy Einstein aggregation operators for investment management. AIMS Mathematics, 2023, 8(7): 16961-16988. doi: 10.3934/math.2023866
    [6] Mehwish Shehzadi, Hanan Alolaiyan, Umer Shuaib, Abdul Razaq, Qin Xin . Crafting optimal cardiovascular treatment strategy in Pythagorean fuzzy dynamic settings. AIMS Mathematics, 2024, 9(11): 31495-31531. doi: 10.3934/math.20241516
    [7] Nasser Aedh Alreshidi, Muhammad Rahim, Fazli Amin, Abdulaziz Alenazi . Trapezoidal type-2 Pythagorean fuzzy TODIM approach for sensible decision-making with unknown weights in the presence of hesitancy. AIMS Mathematics, 2023, 8(12): 30462-30486. doi: 10.3934/math.20231556
    [8] Jian Qi . Artificial intelligence-based intelligent computing using circular q-rung orthopair fuzzy information aggregation. AIMS Mathematics, 2025, 10(2): 3062-3094. doi: 10.3934/math.2025143
    [9] Sana Shahab, Mohd Anjum, Ashit Kumar Dutta, Shabir Ahmad . Gamified approach towards optimizing supplier selection through Pythagorean Fuzzy soft-max aggregation operators for healthcare applications. AIMS Mathematics, 2024, 9(3): 6738-6771. doi: 10.3934/math.2024329
    [10] Li Li, Mengjing Hao . Interval-valued Pythagorean fuzzy entropy and its application to multi-criterion group decision-making. AIMS Mathematics, 2024, 9(5): 12511-12528. doi: 10.3934/math.2024612
  • This research focuses on the challenge of defining the ellipsoidal boundaries of the reachable set (RS) for neutral-type dynamical systems with time delays. A novel analytical approach is proposed, leveraging the development of new Lyapunov functions and matrix inequality techniques. These methods provide powerful tools for determining the ellipsoidal boundaries of the system's RS. A comparative analysis, supported by numerical examples, demonstrates that the approach outlined in this study can accurately identify smaller yet effective RS boundaries compared to existing literature. This precise boundary determination offers significant theoretical support for state estimation and control design in dynamical systems, thereby enhancing their effectiveness and reliability in real-world applications.



    One of the most preferable and valuable techniques is called meta-analysis [1], which is a statistical tool used to combine and evaluate the results from various independent studies on a particular topic or research question. The technique of meta-analysis [2] is a very suitable procedure for depicting vague and problematic information, but utilizing the technique of meta-analysis under the consideration of the classical set theory is very complex and vague because the range of crisp set is very limited. Further, the decision-making procedure is also used for finding the best optimal among the collection of alternatives, where the MADM technique is an important part of the decision-making process, and is also used for evaluating the required results under the concern criteria [3]. During the decision-making process, many experts have lost a lot of information because of limited information, such as zero and one. For this, Zadeh [4] proposed the fuzzy sets (FSs) with a truth function, such as FBM(Lj)[0,1], where FBM:X[0,1]. Moreover, in dealing with uncertain and unreliable information, the technique of truth function is not enough to resolve some complex problems. Further, the falsity function also plays an essential role in many complex problems because of their features. For this, Atanassov [5,6] derived the intuitionistic FSs (IFSs), which is a very flexible and reliable theory for managing vague and unreliable information, where the truth function and falsity function are a major part of the IFSs with a condition that the sum of the duplet will be contained in the unit interval. Further, the idea of FSs is a special case of the IFSs, and due to these features, many applications have been designed, such as aggregation operators [7,8], hybrid operators [9,10], and decision-making problems [11,12].

    The function of truth grade and the function of falsity grade have a lot of potential to cope with vague and uncertain information with the condition that the sum of the duplet is contained in the unit interval; however, in the presence of the following kinds of pair, (0.6,0.7), the IFSs have not worked feasibly because 0.6+0.7=1.3[0,1]. For this reason, in 2013, Yager [13] proposed the Pythagorean FSs (PFSs), where the structure of PFSs is the same as the structure of IFSs, but the condition of both techniques are different such as the sum of the square of the duplet will be contained in unit interval: 0.62+0.72=0.36+0.49=0.85[0,1]. The technique of PFSs is very wide due to their condition, where the IFSs and FSs are the special cases of the PFSs. Further, Deveci et al. [14] discussed the survey on recent applications of PFSs. Moreover, Mandel and Ranadive [15] exposed the decision-theoretic rough set based on PFSs. Additionally, Perez-Dominguez et al. [16] evaluated the CODAS technique for PFSs and their applications. Further, Alkan and Kahraman [17] presented the CODAS technique for PFSs with application in supply chain management. Moreover, Sun and Wang [18] exposed the distance measures for Pythagorean fuzzy information processing. Additionally, Calik [19] presented the AHP and TOPSIS techniques based on PFSs and their application in Industry 4.0.

    IFSs contained the truth function and falsity function with a condition that the sum of the duplet will be contained in the unit interval, but it is also possible to involve a new function, called the radius function between truth and falsity grades. Therefore, Atanassov [20] presented the technique of circular IFSs (CIFSs) with three different functions with the same range, called the truth function, falsity function, and radius function, with a condition that the sum of the duplet will be contained in the unit interval. Many applications have been proposed by different scholars: example, decision-making problems for CIFSs [21], divergence measures for CIFSs [22], distance measures for CIFSs [23], and similarity/entropy measures for CIFSs [24]. Further, Bozyigit et al. [25] presented the technique of circular PFSs (CPFSs) by modifying the condition of the CIFSs such as that the sum of the square of the duplet will be contained in the unit interval. Further, the CPFSs contain the technique of truth function, falsity function, and radius function, which is wider and more reliable than the existing techniques, such as FSs, IFSs, PFSs, and CIFSs, which can cope with vague and unreliable information in genuine life problems. Further, Ali and Yang [26] derived the technique of Hamacher operators for CPFSs.

    Keshavarz Ghorabaee et al. [27] proposed a new technique, called the EDAS method, known as evaluation based on the distance from average solution, which is mostly used for evaluating the best optimal among the collection of information. Further, Klement et al. [28] proposed the idea of triangular norms, which contained different types of norms and their geometrical representations. Additionally, the Bonferroni mean (BM) operators [29] were proposed based on algebraic norms, which are used for aggregating the collection of information into a singleton set. Furthermore, Xu and Yager [30] proposed the BM operators for IFSs. Moreover, Xia et al. [31] evaluated the BM operators for generalized IFSs. Additionally, Liang et al. [32] derived the BM operators for PFSs and their applications. Further, Yang et al. [33] exposed the BM operators for PFSs based on triangular norms.

    After the overall discussion, we observed that the model of circular Pythagorean fuzzy sets is very reliable and dominant because of the: The model of FSs to the model of CIFSs is the part of the CPF sets. Further, we also noticed that the model of Bonferroni mean operators and weighted Bonferroni mean operators are not proposed yet based on CPFSs, which are used for the aggregation of a finite number of information into a singleton set. The major problem is that up to date no one has derived the BM operators for CPFSs. Further, we also noticed that the EDAS method has not been proposed, which is a very reliable technique for evaluating some complicated and vague information. The major themes of this manuscript are listed below:

    1) To propose the technique of the CPFBM, CPFWBM and describes their special cases using two parameters, "s" and "t". Some describable properties are also proposed for the above techniques.

    2) To present the technique of the EDAS technique for the CPFSs.

    3) To show the flexibility and dominance of the proposed operators by comparing the proposed methods with some techniques.

    This manuscript is arranged as follows: In Section 2, we describe the prevailing notion of CPFSs and their operational laws. Moreover, we discuss the technique of the BM operator for any collection of non-negative integers. In Section 3, we propose the CPFBM operator, and CPFWBM operator and describe their special cases using two parameters, "s" and "t". Some describable properties are also proposed for the above techniques. In Section 4, we present the technique of the EDAS technique for the CPFSs. In Section 5, we use some examples to show the flexibility and dominance of the proposed operators. In Section 6, we compare the proposed method with some existing techniques to enhance the worth of the proposed theory. Some remarkable statements are given in Section 7.

    In this section, we describe the prevailing notion of CPFSs and their operational laws. Moreover, we discuss the technique of the BM operator for any collection of non-negative integers.

    In this section, we describe the prevailing notion of CPFSs and their operational laws. Moreover, we discuss the technique of the BM operator for any collection of non-negative integers.

    Definition 1. [25] A CPFS P on fixed set X is explained below:

    P={(x,FBM(Lj),GBM(Lj),HBM(Lj))|LjX}. (1)

    Here, the representation of the truth grade and falsity grade with radius are follows, such as FBM(Lj),GBM(Lj), and HBM(Lj), satisfying 1FBM(Lj)1, 0GBM(Lj)1 with (FBM(Lj))2+(GBM(Lj))21. Further, for convenience, the simple name of the pair (FPBM(Lj),GPBM(Lj),HPBM(Lj)) is called CPFN, such as Pσ=(FσBM(Lj),GσBM(Lj),HσBM(Lj)),σ=1,2,,φ.

    Definition 2. [26] Consider three CPFNs, P=(FBM(Lj),GBM(Lj),HBM(Lj)), P1=(F1BM(Lj),G1BM(Lj),H1BM(Lj)), and P2=(F2BM(Lj),G2BM(Lj),H2BM(Lj)) with λ, thus

    P1TNP2=((F1BM(Lj))2+(F2BM(Lj))2(F1BM(Lj))2(F2BM(Lj))2,G1BM(Lj)G2BM(Lj),(H1BM(Lj))2+(H2BM(Lj))2(H1BM(Lj))2(H2BM(Lj))2), (2)
    P1TCNP2=((F1BM(Lj))2+(F2BM(Lj))2(F1BM(Lj))2(F2BM(Lj))2,G1BM(Lj)G2BM(Lj),H1BM(Lj)H2BM(Lj)), (3)
    P1TNP2=(F1BM(Lj)F2BM(Lj),(G1BM(Lj))2+(G2BM(Lj))2(G1BM(Lj))2(G2BM(Lj))2,H1BM(Lj)H2BM(Lj)), (4)
    P1TCNP2=(F1BM(Lj)F2BM(Lj),(G1BM(Lj))2+(G2BM(Lj))2(G1BM(Lj))2(G2BM(Lj))2,(H1BM(Lj))2+(H2BM(Lj))2(H1BM(Lj))2(H2BM(Lj))2), (5)
    (λP)TN=(1(1(FBM(Lj))2)λ,(GBM(Lj))λ,1(1(HBM(Lj))2)λ), (6)
    (λP)TCN=(1(1(FBM(Lj))2)λ,(GBM(Lj))λ,(HBM(Lj))λ), (7)
    (Pλ)TN=((FBM(Lj))λ,1(1(GBM(Lj))2)λ,(FBM(Lj))λ), (8)
    (Pλ)TCN=((FBM(Lj))λ,1(1(GBM(Lj))2)λ,1(1(HBM(Lj))2)λ). (9)

    Definition 3. [26] Consider a CPFN, such as P=(FBM(Lj),GBM(Lj),HBM(Lj)), we have

    S(P)=((FBM(Lj))2(GBM(Lj))2)(HBM(Lj))2[1,1], (10)
    H(P)=((FBM(Lj))2+(GBM(Lj))2)(HBM(Lj))2. (11)

    Called score value and accuracy value with a condition that is if S(P1)>S(P1), then P1>P2; if S(P1)=S(P1), then P1=P2, then if H(P1)>H(P1), then P1>P2.

    Definition 4. [29] Consider P,Q0 with a collection of non-negative integers aσ(σ=1,2,,φ), thus

    BMP,Q(a1,a2,,aφ)=[1φ(φ1)φσ,θ=1σθaPσaQθ]1P+Q. (12)

    Called BM operator.

    In this section, we compute the technique of CPFBM operator and CPFWBM operator. Further, we discuss some basic properties of the above-proposed operators, called idempotency, monotonicity, and boundedness.

    Definition 5. Consider s,t>0 with a collection of CPFNs,

    Pσ=(FσBM(Lj),GσBM(Lj),HσBM(Lj))(σ=1,2,,φ).

    Thus,

    CPFBMs,t(P1,P2,,Pφ)TN=[1φ(φ1)[φσ,θ=1σθ(PsσPtθ)]]1s+t, (13)
    CPFBMs,t(P1,P2,,Pφ)TCN=[1φ(φ1)[φσ,θ=1σθ(PsσPtθ)]]1s+t. (14)

    Called CPFBMs,t Operator for t-norm and t-conorm.

    Theorem 1. Consider s,t>0 with a collection of CPFNs,

    Pσ=(FσBM(Lj),GσBM(Lj),HσBM(Lj))(σ=1,2,,φ),

    thus, we prove that the aggregated theory of the above operators is again CPFN, such as

    CPFBMs,t(P1,P2,,Pφ)TN=((1φσ,θ=1σθ(1(FσBM(Lj))2s(FθBM(Lj))2s)φφ(φ1))t2(s+t),1(1φσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t)1φ(φ1))t2(s+t),(1φσ,θ=1σθ(1(HσBM(Lj))2s(HθBM(Lj))2s)φφ(φ1))t2(s+t)) (15)
    CPFBMs,t(P1,P2,,Pφ)TCN=((1φσ,θ=1σθ(1(FσBM(Lj))2s(FθBM(Lj))2s)φφ(φ1))t2(s+t),1(1φσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t)1φ(φ1))t2(s+t),1(1φσ,θ=1σθ(1(1(HσBM(Lj))2)s(1(HθBM(Lj))2)t)1φ(φ1))t2(s+t)). (16)

    Proof. Using mathematical induction, we prove the above theory, such as if

    Psσ=((FσBM(Lj))s,1(1(GσBM(Lj))2)s,(HσBM(Lj))s),
    Ptθ=((FθBM(Lj))t,1(1(GθBM(Lj))2)t,(HθBM(Lj))t).

    Thus, we combine the above two information with the help of product rules, such as

    PsσPtθ=((FσBM(Lj))s(FθBM(Lj))t,1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t,(HσBM(Lj))s(HθBM(Lj))t).

    Further, we use the addition technique, we have

    φσ,θ=1σθ(PsσPtθ)=(1φσ,θ=1σθ(1(FσBM(Lj))2s(FθBM(Lj))2t),φσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t)1φσ,θ=1σθ(1(HσBM(Lj))2s(HθBM(Lj))2t)).

    Finally, by mathematical induction, we have, if φ=2, such as

    2σ,θ=1σθ(PsσPtθ)=(PsσPtθ)(PsσPtθ)=(1(1(F1BM(Lj))2s(F2BM(Lj))2t)(1(F2BM(Lj))2s(F1BM(Lj))2t),(1(1(G1BM(Lj))2)s(1(G2BM(Lj))2)t)(1(1(G2BM(Lj))2)s(1(G1BM(Lj))2)t),1(1(H1BM(Lj))2s(H2BM(Lj))2t)(1(H2BM(Lj))2s(H1BM(Lj))2t))

    The proposed theory holds for φ=2, if we have done the above theory for φ=ω, such as

    ωσ,θ=1σθ(PsσPtθ)=(1ωσ,θ=1σθ(1(FσBM(Lj))2s(FθBM(Lj))2t),ωσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t),1ωσ,θ=1σθ(1(HσBM(Lj))2s(HθBM(Lj))2t)).

    Then, we prove it for φ=ω+1, such as

    ω+1σ,θ=1σθ(PsσPtθ)=(ωσ,θ=1σθ(PsσPtθ))(ωσ=1(PsσPtω+1))(ωσ=1(Psω+1Ptθ)).

    Where,

    ωσ,θ=1σθ(PsσPtω+1)=(1ωσ,θ=1σθ(1(FσBM(Lj))2s(Fω+1BM(Lj))2t),ωσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(Gω+1BM(Lj))2)t),1ωσ,θ=1σθ(1(HσBM(Lj))2s(Hω+1BM(Lj))2t))

    and

    ωσ,θ=1σθ(Psω+1Ptθ)=(1ωσ,θ=1σθ(1(Fω+1BM(Lj))2s(FθBM(Lj))2t),ωσ,θ=1σθ(1(1(Gω+1BM(Lj))2)s(1(GθBM(Lj))2)t),1ωσ,θ=1σθ(1(Hω+1BM(Lj))2s(HθBM(Lj))2t)).

    Then,

    ω+1σ,θ=1σθ(PsσPtθ)=(1ωσ,θ=1σθ(1(Fω+1BM(Lj))2s(FθBM(Lj))2t),ωσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(Gω+1BM(Lj))2)t),1ωσ,θ=1σθ(1(HσBM(Lj))2s(Hω+1BM(Lj))2t))(1ωσ,θ=1σθ(1(FσBM(Lj))2s(Fω+1BM(Lj))2t),ωσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(Gω+1BM(Lj))2)t),1ωσ,θ=1σθ(1(HσBM(Lj))2s(Hω+1BM(Lj))2t))(1ωσ,θ=1σθ(1(Fω+1BM(Lj))2s(FθBM(Lj))2t),ωσ,θ=1σθ(1(1(Gω+1BM(Lj))2)s(1(GθBM(Lj))2)t),1ωσ,θ=1σθ(1(Hω+1BM(Lj))2s(HθBM(Lj))2t))=(1ω+1σ,θ=1σθ(1(Fω+1BM(Lj))2s(FθBM(Lj))2t),ω+1σ,θ=1σθ(1(1(GσBM(Lj))2)s(1(Gω+1BM(Lj))2)t),1ω+1σ,θ=1σθ(1(HσBM(Lj))2s(Hω+1BM(Lj))2t))

    The proposed theory is held for φ=ω+1. Then,

    1φ(φ1)(φσ,θ=1σθ(PsσPtθ))=(1(φσ,θ=1σθ(1(FσBM(Lj))2s(FθBM(Lj))2s))1φ(φ1),φσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t)12φ(φ1),1(φσ,θ=1σθ(1(HσBM(Lj))2s(HθBM(Lj))2s))1φ(φ1)).

    Hence,

    CPFBMP,Q(P1,P2,,Pφ)=[1φ(φ1)(φσ,θ=1σθ(PsσPtθ))]1s+t=((1φσ,θ=1σθ(1(FσBM(Lj))2s(FθBM(Lj))2s)φ2(s+t))12(s+t),1(1φσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t)1φ(φ1))1s+t,(1φσ,θ=1σθ(1(HσBM(Lj))2s(HθBM(Lj))2s)φφ(φ1))12(s+t)).

    The proposed theory holds for all values of φ. Similarly, we evaluate the remaining part using the same procedures, such as

    CPFBMs,t(P1,P2,,Pφ)TCN=((1φσ,θ=1σθ(1(FσBM(Lj))2s(FθBM(Lj))2s)φφ(φ1))t2(s+t),1(1φσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t)1φ(φ1))t2(s+t),1(1φσ,θ=1σθ(1(1(HσBM(Lj))2)s(1(HθBM(Lj))2)t)1φ(φ1))t2(s+t)).

    Theorem 2. Consider s,t>0 with a collection of CPFNs Pσ=(FσBM(Lj),GσBM(Lj),HσBM(Lj))(σ=1,2,,φ), then

    1) Idempotency: If Pσ=P=(FBM(Lj),GBM(Lj),HBM(Lj)), then

    CPFBMs,t(P1,P2,,Pφ)TN=P=(FBM(Lj),GBM(Lj),HBM(Lj)).
    CPFBMs,t(P1,P2,,Pφ)TCN=P=(FBM(Lj),GBM(Lj),HBM(Lj)).

    2) Monotonicity: If PσPσ that is FσBM(Lj)FσBM(Lj), GσBM(Lj)GσBM(Lj), and HBM(Lj)HBM(Lj), thus

    CPFBMs,t(P1,P2,,Pφ)TNCPFBMs,t(P1,P2,,Pφ)TN.
    CPFBMs,t(P1,P2,,Pφ)TCNCPFBMs,t(P1,P2,,Pφ)TCN.

    3) Commutativity: Consider Pσ(σ=1,2,,φ) be the permutation of Pσ(σ=1,2,,φ), thus

    CPFBMs,t(P1,P2,,Pφ)TN=CPFBMs,t(P1,P2,,Pφ)TN.
    CPFBMs,t(P1,P2,,Pφ)TCN=CPFBMs,t(P1,P2,,Pφ)TCN.

    4) Boundedness: Consider P=(mσφσ(FσBM(Lj)),maxσ(GσBM(Lj)),mσφσ(HσBM(Lj))) and P+=(maxσ(FσBM(Lj)),mσφσ(GσBM(Lj)),maxσ(HσBM(Lj))), thus

    PCPFBMs,t(P1,P2,,Pφ)TNP+.
    PCPFBMs,t(P1,P2,,Pφ)TCNP+.

    Further, we simplify the supremacy and validity of the proposed theory by discussing their special cases with the help of parameters.

    Case 1: When t0, then

    lσmt0CPFBMs,t(P1,P2,,Pφ)TN=((1φσ=1(1(FσBM(Lj))2s)1φ)12s,1(1φσ=1(1(1(GσBM(Lj))2)s)1φ)1s,(1φσ=1(1(HσBM(Lj))2s)1φ)12s)=[1φ(φσ=1Psσ)]1s.
    lσmt0CPFBMs,t(P1,P2,,Pφ)TCN=((1φσ=1(1(FσBM(Lj))2s)1φ)12s,1(1φσ=1(1(1(GσBM(Lj))2)s)1φ)1s,1(1φσ=1(1(1(HσBM(Lj))2)s)1φ)1s)=[1φ(φσ=1Psσ)]1s.

    Called the generalized CPF averaging (GCPFA) operator.

    Case 2: When s=1 and t0, thus

    lσmt0CPFBM1,t(P1,P2,,Pφ)TN=(1φσ=1(1(FσBM(Lj))2)1φ,(φσ=1GσBM(Lj))1φ,1φσ=1(1(HσBM(Lj))2)1φ)=1φ(φσ=1Pσ).
    lσmt0CPFBM1,t(P1,P2,,Pφ)TCN=(1φσ=1(1(FσBM(Lj))2)1φ,(φσ=1GσBM(Lj))1φ,(φσ=1HσBM(Lj))1φ)=1φ(φσ=1Pσ).

    This is called the CPF averaging (CPFA) operator.

    Case 3: When s=2 and t0, thus

    lσmt0CPFBM2,t(P1,P2,,Pφ)TN=((1φσ=1(1(FσBM(Lj))4)1φ)14,1(1φσ=1(1(1(GσBM(Lj))2)2)1φ)12,(1φσ=1(1(HσBM(Lj))4)1φ)14)=[1φ(φσ=1(Pσ)2)]12.
    lσmt0CPFBM2,t(P1,P2,,Pφ)TCN=((1φσ=1(1(FσBM(Lj))4)1φ)14,1(1φσ=1(1(1(GσBM(Lj))2)2)1φ)12,1(1φσ=1(1(1(HσBM(Lj))2)2)1φ)12)=[1φ(φσ=1(Pσ)2)]12.

    Called the CPF square mean (CPFSM) operator.

    Definition 6. Consider s,t>0 with a collection of CPFNs,

    Pσ=(FσBM(Lj),GσBM(Lj),HσBM(Lj))(σ=1,2,,φ),

    thus

    CPFWBMs,t(P1,P2,,Pφ)TN=[1φ(φ1)(φσ,θ=1σθ((wσPσ)s(wθPθ)t))]1s+t (17)
    CPFWBMs,t(P1,P2,,Pφ)TCN=[1φ(φ1)(φσ,θ=1σθ((wσPσ)s(wθPθ)t))]1s+t. (18)

    This is called the CPFWBMs,t operator with weight vector wσ[0,1] and φσ=1wσ=1.

    Theorem 3. Consider s,t>0 with a collection of CPFNs, Pσ=(FσBM(Lj),GσBM(Lj),HσBM(Lj))(σ=1,2,,φ), thus we prove that the aggregated theory of the above operators is again CPFN, such as

    CPFWBMs,t(P1,P2,,Pφ)TN=(1(1φσ,θ=1σθ(1(1(1(GσBM(Lj))2)wσ)s(1(1(GσBM(Lj))2)wθ)t)12(s+t))12(s+t),1(1φσ,θ=1σθ(1(1(GσBM(Lj))2wσ)s(1(GθBM(Lj))2wθ)t)1φ(φ1))1s+t,1(1φσ,θ=1σθ(1(1(1(HσBM(Lj))2)wσ)s(1(1(HσBM(Lj))2)wθ)t)12(s+t))12(s+t)). (19)
    CPFWBMs,t(P1,P2,,Pφ)TCN=(1(1φσ,θ=1σθ(1(1(1(GσBM(Lj))2)wσ)s(1(1(GσBM(Lj))2)wθ)t)12(s+t))12(s+t),1(1φσ,θ=1σθ(1(1(GσBM(Lj))2wσ)s(1(GθBM(Lj))2wθ)t)1φ(φ1))1s+t,1(1φσ,θ=1σθ(1(1(HσBM(Lj))2wσ)s(1(HθBM(Lj))2wθ)t)1φ(φ1))12(s+t)). (20)

    Proof. Omitted.

    Theorem 4: Consider s,t>0 with a collection of CPFNs Pσ=(FσBM(Lj),GσBM(Lj),HσBM(Lj))(σ=1,2,,φ), then

    1) Idempotency: If Pσ=P=(FBM(Lj),GBM(Lj),HBM(Lj)), then

    CPFWBMs,t(P1,P2,,Pφ)TN=P=(FBM(Lj),GBM(Lj),HBM(Lj))
    CPFWBMs,t(P1,P2,,Pφ)TCN=P=(FBM(Lj),GBM(Lj),HBM(Lj)).

    2) Monotonicity: If PσPσ that is FσBM(Lj)FσBM(Lj), GσBM(Lj)GσBM(Lj), and HBM(Lj)HBM(Lj), thus

    CPFWBMs,t(P1,P2,,Pφ)TNCPFWBMs,t(P1,P2,,Pφ)TN
    CPFWBMs,t(P1,P2,,Pφ)TCNCPFWBMs,t(P1,P2,,Pφ)TCN.

    3) Commutativity: Consider Pσ(σ=1,2,,φ) be the permutation of Pσ(σ=1,2,,φ), thus

    CPFWBMs,t(P1,P2,,Pφ)TN=CPFWBMs,t(P1,P2,,Pφ)TN
    CPFWBMs,t(P1,P2,,Pφ)TCN=CPFWBMs,t(P1,P2,,Pφ)TCN.

    4) Boundedness: Consider P=(mσφσ(FσBM(Lj)),maxσ(GσBM(Lj)),mσφσ(HσBM(Lj))) and P+=(maxσ(FσBM(Lj)),mσφσ(GσBM(Lj)),maxσ(HσBM(Lj))), thus

    PCPFWBMs,t(P1,P2,,Pφ)TNP+
    PCPFWBMs,t(P1,P2,,Pφ)TCNP+.

    Proof. Omitted.

    The major theme of this section is to expose or construct the technique of the EDAS procedure based on the initiated operators. For this, we compute the following procedure, such as

    Step 1: Design the matrix by including the terms of CPFNS by assigning to each attribute θth in every alternative σth, such as

    DM=[Pij]n×m=[P11P12P1mP21P22P2mPφ1Pφ2Pφm]. (21)

    The representation of the weight vector is as follows, such as W=(w1,w2,,wm)T with φθ=1wj=1.

    Step 2: Consider the technique of the CPFBM operator, we expose the average solution, such as

    CPFBMs,t(P1,P2,,Pφ)TN=((1φσ,θ=1σθ(1(FσBM(Lj))2s(FθBM(Lj))2s)φφ(φ1))t2(s+t),1(1φσ,θ=1σθ(1(1(GσBM(Lj))2)s(1(GθBM(Lj))2)t)1φ(φ1))t2(s+t),(1φσ,θ=1σθ(1(HσBM(Lj))2s(HθBM(Lj))2s)φφ(φ1))t2(s+t)). (22)

    Step 3: Compute the value of PDA and the value of NDA in the shape of a matrix, such as

    PDAσθ=max(0,(xijAVθ))AVθ, (23)
    NDAσθ=max(0,(AVθxij))AVθ. (24)

    These techniques will be used for truth, falsity, and radius functions.

    Step 4: Derive the technique of weighted summation according to the technique of PDA and NDA, such as

    SPi=mj=1wjPDAσθ, (25)
    SNi=mj=1wjNDAσθ. (26)

    Step 5: Compute the normalized values according to the values of SPi and SNi, such as

    NSPi=SPimax(SNi), (27)
    NSNi=1SNimax(SNi). (28)

    Step 6: Derive the appraisal values based on the above information, such as

    ASi=12(NSPi+NSNi). (29)

    Step 7: Rank all alternatives, to examine the best optimal.

    Moreover, we discuss the supremacy of the above technique by evaluating some examples with the help of the above technique. For this, we discuss the problem of the classification of the CPF meta-analysis and its application.

    In this section, we describe one of the most preferable and dominant techniques or applications called meta-analysis, which is a statistical technique used to evaluate or analyze the data from multiple independent studies for a particular topic or research question. In this application, we concentrate on using the initiated operators and methods to evaluate the above problems. For this, we consider the problem of meta-analysis and find the major key steps involved in meta-analysis, such as

    1) Data Extraction "A1".

    2) Pooling of Effect Sizes "A2".

    3) Assessment of Heterogeneity "A3".

    4) Publication Bias Assessment "A4".

    5) Subgroup Analysis and Sensitive Analysis "A5".

    We have some attributes, such as growth analysis, social impact, political impact, environmental impact, and internet resources. For this, we compute the following procedure, such as

    Step 1: Design the matrix by including the terms of CPFNS by assigning to each attribute θth in every alternative σth, see Table 1.

    Table 1.  Representation of the CPF matrix.
    G1 G2 G3 G4 G5
    A1 (0.8,0.5,0.3) (0.81,0.51,0.31) (0.82,0.52,0.32) (0.83,0.53,0.33) (0.84,0.54,0.34)
    A2 (0.4,0.3,0.1) (0.41,0.31,0.11) (0.42,0.32,0.12) (0.43,0.33,0.13) (0.44,0.34,0.14)
    A3 (0.7,0.6,0.3) (0.71,0.61,0.31) (0.72,0.62,0.32) (0.73,0.63,0.33) (0.74,0.64,0.34)
    A4 (0.6,0.5,0.4) (0.61,0.51,0.41) (0.62,0.52,0.42) (0.63,0.53,0.43) (0.64,0.54,0.44)
    A5 (0.5,0.4,0.2) (0.51,0.41,0.21) (0.52,0.42,0.22) (0.53,0.43,0.23) (0.54,0.44,0.24)

     | Show Table
    DownLoad: CSV

    Step 2: Consider the technique of the CPFBM operator, we expose the average solution, such as

    AV1=(0.9945,0.4674,0.8303),
    AV2=(0.9952,0.4775,0.8439),
    AV3=(0.9959,0.4876,0.8565),
    AV4=(0.9964,0.4977,0.8681),
    AV5=(0.9969,0.5078,0.8788).

    Step 3: Compute the value of PDA and the value of NDA in the shape of a matrix, see Tables 2 and 3.

    Table 2.  Positive distance matrix.
    (0,0.0695,0) (0,0.0679,0) (0,0.0663,0) (0,0.0647,0) (0,0.0632,0)
    (0,0,0) (0,0,0) (0,0,0) (0,0,0) (0,0,0)
    (0,0.2834,0) (0,0.2773,0) (0,0.2713,0) (0,0.2656,0) (0,0.2601,0)
    (0,0.0695,0) (0,0.0679,0) (0,0.0663,0) (0,0.0647,0) (0,0.0632)
    (0,0,0) (0,0,0) (0,0,0) (0,0,0) (0,0,0)

     | Show Table
    DownLoad: CSV
    Table 3.  Negative distance matrix.
    (0.1956,0,0.6387) (0.1861,0,0.63269) (0.1766,0,0.6264) (0.1670,0,0.6198) (0.1574,0,0.6131)
    (0.5978,0.3582,0.8795) (0.5880,0.3508,0.8696) (0.5782,0.3437,0.8599) (0.5684,0.3370,0.8502) (0.5586,0.3305,0.8407)
    (0.2961,0,0.6387) (0.2866,0,0.6326) (0.2770,0,0.6264) (0.26742,0,0.6198) (0.2577,0,0.6131)
    (0.3967,0,0.5182) (0.3871,0,0.5142) (0.3774,0,0.5096) (0.367,0,0.5046) (0.3580,0,0.4993)
    (0.4972,0.1443,0.7591) (0.4875,0.1414,0.7511) (0.4778,0.1387,0.7431) (0.4681,0.1361,0.7350) (0.4583,0.1336,0.7269)

     | Show Table
    DownLoad: CSV

    Step 4: Derive the technique of weighted summation according to the technique of PDA and NDA based on the weight vector (0.2,0.2,0.2,0.2,0.2). Tables 4 and 5.

    Table 4.  Weighted information based on the Positive distance matrix.
    SP1 (0,0.0845,0)
    SP2 (0,0.082,0)
    SP3 (0,0.080,0)
    SP4 (0,0.0790,0)
    SP5 (0,0.0773,0)

     | Show Table
    DownLoad: CSV
    Table 5.  Weighted information based on the Negative distance matrix.
    NP1 (0.3967,0.1005,0.6868)
    NP2 (0.3871,0.0984,0.6800)
    NP3 (0.3774,0.0965,0.6731)
    NP4 (0.367,0.0946,0.6659)
    NP5 (0.3580,0.0928,0.6586)

     | Show Table
    DownLoad: CSV

    Step 5: Compute the normalized values according to the values of SPi and SNi, see Table 6.

    Table 6.  Normalized matrix of information.
    NSP1NSN1 (0,0,0)
    NSP2NSN2 (0,0.0204,0.0098)
    NSP3NSN3 (0.9514,0.0399,0.0200)
    NSP4NSN4 (0.9269,0.0586,0.0304)
    NSP5NSN5 (0.9025,0.0765,0.411)

     | Show Table
    DownLoad: CSV

    Step 6: Derive the appraisal values based on the above information, such as

    SV1=0.0,SV2=0.0,SV3=0.0181,SV4=0.0260,SV5=0.0303.

    Step 7: Rank all alternatives, to examine the best optimal, such as

    SV5>SV4>SV3>SV2=SV1.

    The most prominent decision is SV5, according to the technique of the EDAS method, which is represented by the "Subgroup analysis and Sensitive Analysis". Further, we show the flexibility of the proposed theory by using the proposed operators without the EDAS method to evaluate the dominancy and flexibility of the proposed operators. For this, we consider the information in Table 7.

    Table 7.  CPF matrix of information.
    G1 G2 G3 G4 G5
    A1 (0.8,0.5,0.3) (0.81,0.51,0.31) (0.82,0.52,0.32) (0.83,0.53,0.33) (0.84,0.54,0.34)
    A2 (0.4,0.3,0.1) (0.41,0.31,0.11) (0.42,0.32,0.12) (0.43,0.33,0.13) (0.44,0.34,0.14)
    A3 (0.7,0.6,0.3) (0.71,0.61,0.31) (0.72,0.62,0.32) (0.73,0.63,0.33) (0.74,0.64,0.34)
    A4 (0.6,0.5,0.4) (0.61,0.51,0.41) (0.62,0.52,0.42) (0.63,0.53,0.43) (0.64,0.54,0.44)
    A5 (0.5,0.4,0.2) (0.51,0.41,0.21) (0.52,0.42,0.22) (0.53,0.43,0.23) (0.54,0.44,0.24)

     | Show Table
    DownLoad: CSV

    Further, we evaluate the support of any two CPF values based on distance measures. Thus, we have

    S112=S112=0.7333,S113=S131=0.9333,S114=S141=0.9,S115=S151=0.833,S123=S132=0.8333,S124=S142=0.7666,S125=S152=0.9,S134=S143=0.9,S135=S153=0.8333,S145=S154=0.8666.
    S212=S212=0.7333,S213=S231=0.9333,S214=S241=0.9,S215=S251=0.833,S223=S232=0.8333,S224=S242=0.7666,S225=S252=0.9,S234=S243=0.9,S235=S253=0.8333,S245=S254=0.8666.
    S312=S312=0.7333,S313=S331=0.9333,S314=S341=0.9,S315=S351=0.833,S323=S332=0.8333,S324=S342=0.7666,S325=S352=0.9,S334=S343=0.9,S335=S353=0.8333,S345=S354=0.8666.
    S412=S412=0.7333,S413=S431=0.9333,S414=S441=0.9,S415=S451=0.833,S423=S432=0.8333,S424=S442=0.7666,S425=S452=0.9,S434=S443=0.9,S435=S453=0.8333,S445=S454=0.8666.
    S512=S512=0.7333,S513=S531=0.9333,S514=S541=0.9,S515=S551=0.833,S523=S532=0.8333,S524=S542=0.7666,S525=S552=0.9,S534=S543=0.9,S535=S553=0.8333,S545=S554=0.8666.

    Thus, by using the above values, we find the following information, such as

    τ11=0.2018,τ12=0.1896,τ13=0.2018,τ14=0.2033,τ15=0.2033.
    τ21=0.2018,τ22=0.1896,τ23=0.2018,τ24=0.2033,τ25=0.2033.
    τ31=0.2018,τ32=0.1896,τ33=0.2018,τ34=0.2033,τ35=0.2033.
    τ41=0.2018,τ42=0.1896,τ43=0.2018,τ44=0.2033,τ45=0.2033.
    τ51=0.2018,τ52=0.1896,τ53=0.2018,τ54=0.2033,τ55=0.2033.

    Moreover, using the technique of the CPFBM operator, we have the following aggregated values, such as

    z1=(0.9945,0.46748,0.8303),z2=(0.9952,0.477,0.8439),z3=(0.9959,0.4876,0.856),z4=(0.9964,0.4977,0.8681),z5=(0.9969,0.5078,0.8788).

    Thus, we consider the technique of score values, such as

    S(z1)=0.6399,S(z2)=0.6435,S(z3)=0.6458,S(z4)=0.6469,S(z5)=0.6468.

    Finally, we have the following ranking values, such as

    S(z4)>S(z5)>S(z3)>S(z2)>S(z1).

    The most prominent decision is SV4 according to the technique of the CPFBM operator, which is represented by the "Publication Bias Assessment". Further, we compare the proposed theory with some existing techniques for evaluating the supremacy and validity of the proposed theory.

    The main theme of this article is to evaluate the supremacy and flexibility of the proposed method and proposed operators by comparing their ranking values with the obtained values of existing techniques to enhance the worth of the initiated theory. For this, we consider some existing techniques: Ali and Yang [26] derived the technique of Hamacher operators for CPFSs. Furthermore, Xu and Yager [30] proposed the theory of BM operators for IFSs. Moreover, Xia et al. [31] evaluated the technique of BM operators for generalized IFSs. Additionally, Liang et al. [32] derived the technique of BM operators for PFSs and their applications. Further, Yang et al. [33] exposed the BM operators for PFSs based on triangular norms. Finally, using the information in Table 7, the comparative analysis is listed in Table 8.

    Table 8.  Representation of the comparative analysis.
    Methods Score values Best optimal
    Ali and Yang [26] S(z4)>S(z5)>S(z3)>S(z2)>S(z1) S(z4)
    Xu and Yager [30] No No
    Xia et al. [31] No No
    Liang et al. [32] No No
    Yang et al. [33] No No
    CPFBM operator S(z4)>S(z5)>S(z3)>S(z2)>S(z1) S(z4)

     | Show Table
    DownLoad: CSV

    The most prominent decision is SV4, according to the technique of the CPFBM operator, which is represented by the "Publication Bias Assessment". Further, the existing techniques have failed because of ambiguity and limitations, where the proposed theory of Xu and Yager [30], Xia et al. [31], Liang et al. [32], and Yang et al. [33] are the special cases of the proposed theory. The limitations of the existing models are described below:

    1) Ali and Yang [26] derived the technique of Hamacher operators for CPFSs. The models for the Hamacher operators are very flexible and dominant because of their features. According to the theory of Ali and Yang [26], the ranking values are listed as follows: S(z4)>S(z5)>S(z3)>S(z2)>S(z1). Once more, the proposed model is different from the existing technique because it is computed based on the Bonferroni operators.

    2) Xu and Yager [30] proposed the theory of BM operators for IFSs, which is a special part of the proposed theory. The technique of BM operators for IFSs cannot evaluate the CPF kind of information, because the condition of CPF sets is more general. The three functions are the part of CPFSs, but in the case of IFSs, we have just two functions, which is the special case of the derived theory.

    3) Xia et al. [31] evaluated the technique of BM operators for generalized IFSs, which is a special part of the proposed theory. The technique of BM operators for IFSs cannot evaluate the CPF kind of information, because the condition of CPF sets is more general, where the three functions are the part of CPFSs, but in the case of IFSs, we have just two functions, which is the special case of the derived theory.

    4) Liang et al. [32] derived the technique of BM operators for PFSs and their applications as part of initiated operators, since this technique contains only two functions, but the proposed model is the modified version. This is because they contained three functions, and if we ignored the radius function form the CPFSs, then the proposed theory will be converted to the existing models.

    5) Further, Yang et al. [33] exposed the BM operators for PFSs based on triangular norms as part of initiated operators, since this technique contains only two functions, but the proposed model is the modified version. This is because they contained three functions, and if we ignored the radius function form the CPFSs, then the proposed theory will be converted to the existing models.

    Thus, after our long analysis, we concluded that the proposed model is superior and more general than the existing technique in coping with vague and uncertain information. Hence, the proposed model is more reliable and more general than the existing information.

    The major themes of this manuscript are listed below:

    1) We propose the technique of the CPFBM operator, and CPFWBM operator and describe their special cases with the help of two parameters, "s" and "t". Some describable properties are also proposed for the above techniques.

    2) We present the technique of the EDAS technique for the CPFSs.

    3) We show the flexibility and dominance of the proposed operators by comparing the proposed methods with some existing techniques.

    In the future, we will discuss the novel technique of circular picture fuzzy sets and their extensions. Further, we will develop some new techniques for aggregation operators [34], similarity measures [35], and different kinds of methods [36]. Finally, we will discuss their application in artificial intelligence [37], data science [38], and decision-making theory [39] to enhance the worth of the proposed methods.

    Weiwei Jiang: Conceptualization, Methodology, Formal analysis, Writing–review and editing, Visualization; Zeeshan Ali: Conceptualization, Software, Validation, Formal analysis, Investigation, Data Curation, Writing–review and editing; Muhammad Waqas: Conceptualization, Software, Validation, Formal analysis, Investigation, Data Curation, Writing–review and editing; Peide Liu: Software, Validation, Investigation, Resources, Data Curation, Writing–review and editing, Visualization Supervision, Project administration, Funding acquisition. All authors have read and approved the final version of the manuscript for publication.

    The authors declare there is no conflict of interest.



    [1] J. Nilsson, B. Bernhardsson, B. Wittenmark, Stochastic analysis and control of real-time systems with random time delays, Automatica, 34 (1998), 57–64. http://dx.doi.org/10.1016/S0005-1098(97)00170-2 doi: 10.1016/S0005-1098(97)00170-2
    [2] R. Olfati-Saber, R. Murray, Consensus problems in networks of agents with switching topology and time-delays, IEEE T. Automat. Contr., 49 (2004), 1520–1533. http://dx.doi.org/10.1109/TAC.2004.834113 doi: 10.1109/TAC.2004.834113
    [3] C. Zhang, F. Long, Y. He, W. Yao, L. Jiang, M. Wu, A relaxed quadratic function negative-determination lemma and its application to time-delay systems, Automatica, 113 (2020), 108764. http://dx.doi.org/10.1016/j.automatica.2019.108764 doi: 10.1016/j.automatica.2019.108764
    [4] C. Xu, W. Zhang, C. Aouiti, Z. Liu, L. Yao, Bifurcation insight for a fractional-order stage-structured predator-prey system incorporating mixed time delays, Math. Method. Appl. Sci., 46 (2023), 9103–9118. http://dx.doi.org/10.1002/mma.9041 doi: 10.1002/mma.9041
    [5] B. Yan, X. Wang, H. Ma, W. Lu, Q. Li, Hybrid time-delayed feedforward and feedback control of lever-type quasi-zero-stiffness vibration isolators, IEEE T. Ind. Electron., 71 (2024), 2810–2819. http://dx.doi.org/10.1109/TIE.2023.3269481 doi: 10.1109/TIE.2023.3269481
    [6] H. Liu, Y. Wang, X. Li, New results on stability analysis of neutral-type delay systems, Int. J. Control, 95 (2022), 2349–2356. http://dx.doi.org/10.1080/00207179.2021.1909750 doi: 10.1080/00207179.2021.1909750
    [7] Z. Zhao, Z. Wang, L. Zou, J. Guo, Set-membership filtering for time-varying complex networks with uniform quantisations over randomly delayed redundant channels, Int. J. Syst. Sci., 51 (2020), 3364–3377. http://dx.doi.org/10.1080/00207721.2020.1814898 doi: 10.1080/00207721.2020.1814898
    [8] H. Leipholz, Stability theory: an introduction to the stability of dynamic systems and rigid bodies, Wiesbaden: Springer-Verlag, 1987. http://dx.doi.org/10.1007/978-3-663-10648-7
    [9] L. Kolev, S. Petrakieva, Assessing the stability of linear time-invariant continuous interval dynamic systems, IEEE T. Automat. Contr., 50 (2005), 393–397. http://dx.doi.org/10.1109/TAC.2005.843857 doi: 10.1109/TAC.2005.843857
    [10] B. Hang, B. Su, W. Deng, Adaptive sliding mode fault-tolerant attitude control for flexible satellites based on ts fuzzy disturbance modeling, Math. Biosci. Eng., 20 (2023), 12700–12717. http://dx.doi.org/10.3934/mbe.2023566 doi: 10.3934/mbe.2023566
    [11] B. Hang, W. Deng, Finite-time adaptive prescribed performance dsc for pure feedback nonlinear systems with input quantization and unmodeled dynamics, AIMS Mathematics, 9 (2024), 6803–6831. http://dx.doi.org/10.3934/math.2024332 doi: 10.3934/math.2024332
    [12] J. Skarding, B. Gabrys, K. Musial, Foundations and modeling of dynamic networks using dynamic graph neural networks: a survey, IEEE Access, 9 (2021), 79143–79168. http://dx.doi.org/10.1109/ACCESS.2021.3082932 doi: 10.1109/ACCESS.2021.3082932
    [13] Y. Huang, Y. He, J. An, M. Wu, Polynomial-type Lyapunov-Krasovskii functional and Jacobi-Bessel inequality: further results on stability analysis of time-delay systems, IEEE T. Automat. Contr., 66 (2021), 2905–2912. http://dx.doi.org/10.1109/TAC.2020.3013930 doi: 10.1109/TAC.2020.3013930
    [14] H. Phan-Van, K. Gu, Structured invariant subspace and decomposition of systems with time delays and uncertainties, Int. J. Robust Nonlin., in press. http://dx.doi.org/10.1002/rnc.7271
    [15] H. Shen, Y. Wang, J. Wang, J. Park, A fuzzy-model-based approach to optimal control for nonlinear markov jump singularly perturbed systems: a novel integral reinforcement learning scheme, IEEE T. Fuzzy Syst., 31 (2023), 3734–3740. http://dx.doi.org/10.1109/TFUZZ.2023.3265666 doi: 10.1109/TFUZZ.2023.3265666
    [16] J. Wang, J. Wu, H. Shen, J. Cao, L. Rutkowski, Fuzzy h control of discrete-time nonlinear markov jump systems via a novel hybrid reinforcement q-learning method, IEEE T. Cybernetics, 53 (2023), 7380–7391. http://dx.doi.org/10.1109/TCYB.2022.3220537 doi: 10.1109/TCYB.2022.3220537
    [17] M. Cruz, J. Hale, Stability of functional differential equations of neutral type, J. Differ. Equations, 7 (1970), 334–355. http://dx.doi.org/10.1016/0022-0396(70)90114-2 doi: 10.1016/0022-0396(70)90114-2
    [18] G. Li, Q. Yang, Stability analysis of the θ-method for hybrid neutral stochastic functional differential equations with jumps, Chaos Soliton. Fract., 150 (2021), 111062. http://dx.doi.org/10.1016/j.chaos.2021.111062 doi: 10.1016/j.chaos.2021.111062
    [19] J. Džurina, S. Grace, I. Jadlovská, T. Li, Oscillation criteria for second-order emden–-fowler delay differential equations with a sublinear neutral term, Math. Nachr., 293 (2020), 910–922. http://dx.doi.org/10.1002/mana.201800196 doi: 10.1002/mana.201800196
    [20] M. Mansour, S. Me, S. Hadavi, B. Badrzadeh, A. Karimi, B. Bahrani, Nonlinear transient stability analysis of phased-locked loop-based grid-following voltage-source converters using Lyapunov's direct method, IEEE J. Em. Sel. Top. P., 10 (2022), 2699–2709. http://dx.doi.org/10.1109/JESTPE.2021.3057639 doi: 10.1109/JESTPE.2021.3057639
    [21] X. Fan, W. Lin, Z. Liu, L. Zhao, Reachable set control for nonlinear markov jump cyber-physical systems with false data injection attacks, J. Franklin I., 361 (2024), 224–233. http://dx.doi.org/10.1016/j.jfranklin.2023.12.013 doi: 10.1016/j.jfranklin.2023.12.013
    [22] I. Mitchell, A. Bayen, C. Tomlin, A time-dependent hamilton-jacobi formulation of reachable sets for continuous dynamic games, IEEE T. Automat. Contr., 50 (2005), 947–957. http://dx.doi.org/10.1109/TAC.2005.851439 doi: 10.1109/TAC.2005.851439
    [23] Z. Feng, J. Lam, On reachable set estimation of singular systems, Automatica, 52 (2015), 146–153. http://dx.doi.org/10.1016/j.automatica.2014.11.007 doi: 10.1016/j.automatica.2014.11.007
    [24] R. Gonzalez, M. Fiacchini, T. Alamo, J. Guzmán, F. Rodríguez, Online robust tube-based mpc for time-varying systems: a practical approach, Int. J. Control, 84 (2011), 1157–1170. http://dx.doi.org/10.1080/00207179.2011.594093 doi: 10.1080/00207179.2011.594093
    [25] Y. Yang, J. Lam, Y. Niu, C. Fan, Balancing fuzzy control performance and reachable-set-dependent event-triggered communication, IEEE T. Cybernetics, in press. http://dx.doi.org/10.1109/TCYB.2024.3363005
    [26] J. Lam, B. Zhang, Y. Chen, S. Xu, Reachable set estimation for discrete-time linear systems with time delays, Int. J. Robust Nonlin., 25 (2015), 269–281. http://dx.doi.org/10.1002/rnc.3086 doi: 10.1002/rnc.3086
    [27] M. Chen, S. Herbert, M. Vashishtha, S. Bansal, C. Tomlin, Decomposition of reachable sets and tubes for a class of nonlinear systems, IEEE T. Automat. Contr., 63 (2018), 3675–3688. http://dx.doi.org/10.1109/TAC.2018.2797194 doi: 10.1109/TAC.2018.2797194
    [28] E. Fridman, U. Shaked, On reachable sets for linear systems with delay and bounded peak inputs, Automatica, 39 (2003), 2005–2010. http://dx.doi.org/10.1016/S0005-1098(03)00204-8 doi: 10.1016/S0005-1098(03)00204-8
    [29] A. Devonport, M. Arcak, Estimating reachable sets with scenario optimization, Proceedings of the 2nd Conference on Learning for Dynamics and Control, 120 (2020), 75–84.
    [30] J. Scott, P. Barton, Bounds on the reachable sets of nonlinear control systems, Automatica, 49 (2013), 93–100. http://dx.doi.org/10.1016/j.automatica.2012.09.020 doi: 10.1016/j.automatica.2012.09.020
    [31] B. Xue, Z. She, A. Easwaran, Under-approximating backward reachable sets by polytopes, In: Computer aided verification, Cham: Springer, 2016,457–476. http://dx.doi.org/10.1007/978-3-319-41528-4_25
    [32] Y. Li, Y. He, W. Lin, M. Wu, Reachable set estimation for singular systems via state decomposition method, J. Franklin I., 357 (2020), 7327–7342. http://dx.doi.org/10.1016/j.jfranklin.2020.04.031 doi: 10.1016/j.jfranklin.2020.04.031
    [33] J. Kim, Improved ellipsoidal bound of reachable sets for time-delayed linear systems with disturbances, Automatica, 44 (2008), 2940–2943. http://dx.doi.org/10.1016/j.automatica.2008.03.015 doi: 10.1016/j.automatica.2008.03.015
    [34] Z. Feng, W. Zheng, L. Wu, Reachable set estimation of t–s fuzzy systems with time-varying delay, IEEE T. Fuzzy Syst., 25 (2017), 878–891. http://dx.doi.org/10.1109/TFUZZ.2016.2586945 doi: 10.1109/TFUZZ.2016.2586945
    [35] N. That, P. Nam, Q. Ha, Reachable set bounding for linear discrete-time systems with delays and bounded disturbances, J. Optim. Theory Appl., 157 (2013), 96–107. http://dx.doi.org/10.1007/s10957-012-0179-2 doi: 10.1007/s10957-012-0179-2
    [36] Z. Feng, J. Lam, An improved result on reachable set estimation and synthesis of time-delay systems, Appl. Math. Comput., 249 (2014), 89–97. http://dx.doi.org/10.1016/j.amc.2014.10.004 doi: 10.1016/j.amc.2014.10.004
    [37] J. Jian, L. Duan, Finite-time synchronization for fuzzy neutral-type inertial neural networks with time-varying coefficients and proportional delays, Fuzzy Set. Syst., 381 (2020), 51–67. http://dx.doi.org/10.1016/j.fss.2019.04.004 doi: 10.1016/j.fss.2019.04.004
    [38] Y. Liu, X. Pei, H. Zhou, X. Guo, Spatiotemporal trajectory planning for autonomous vehicle based on reachable set and iterative LQR, IEEE T. Veh. Technol., in press. http://dx.doi.org/10.1109/TVT.2024.3371184
    [39] Z. Zuo, D. Ho, Y. Wang, Reachable set bounding for delayed systems with polytopic uncertainties: the maximal Lyapunov-Krasovskii functional approach, Automatica, 46 (2010), 949–952. http://dx.doi.org/10.1016/j.automatica.2010.02.022 doi: 10.1016/j.automatica.2010.02.022
    [40] J. Hale, S. Verduyn Lunel, Introduction to functional differential equations, New York: Springer Science & Business Media, 1993. http://dx.doi.org/10.1007/978-1-4612-4342-7
    [41] J. Tian, L. Xiong, J. Liu, X. Xie, Novel delay-dependent robust stability criteria for uncertain neutral systems with time-varying delay, Chaos Soliton. Fract., 40 (2009), 1858–1866. http://dx.doi.org/10.1016/j.chaos.2007.09.068 doi: 10.1016/j.chaos.2007.09.068
    [42] X. Liu, M. Wu, R. Martin, M. Tang, Delay-dependent stability analysis for uncertain neutral systems with time-varying delays, Math. Comput. Simulat., 75 (2007), 15–27. http://dx.doi.org/10.1016/j.matcom.2006.08.006 doi: 10.1016/j.matcom.2006.08.006
    [43] S. Boyd, L. El Ghaoui, E. Feron, V. Balakrishnan, Linear matrix inequalities in system and control theory, Philadelphia: Society for Industrial and Applied Mathematics, 1994. http://dx.doi.org/10.1137/1.9781611970777
    [44] W. Chen, W. Zheng, Delay-dependent robust stabilization for uncertain neutral systems with distributed delays, Automatica, 43 (2007), 95–104. http://dx.doi.org/10.1016/j.automatica.2006.07.019 doi: 10.1016/j.automatica.2006.07.019
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1092) PDF downloads(47) Cited by(0)

Figures and Tables

Figures(6)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog