
This study reveals the crease deviation behavior through the developed forming simulation. A combination resistance model was expanded and applied to simulate the 180° folding process of a creased paperboard, using the shear-yield detaching resistance and the out-of-plane fluffing resistance which were based on the isotropic elastro-plastic model. When varying the misalignment of the creasing rule against the groove, the eccentricity of the crease bulging of a white-coated paperboard was compared through the experiment and simulation of the 180° folding process. Comparing the experimental deformation and the simulation, it was explained that the deviation of e contributed to making the crease deviation cd. At the folding test, the 180° folding was compared with the experiment and simulation. The rolling pass of the folded zone was considered to intensify the deviation state. The 180° folding simulation revealed that the crease deviation of cd ≈ 2e was assessed as an ideal condition when using the rolling pass and non-rolling pass. In the case of some shallow indentation in the experiment, 2e < cd < 4e was observed. The inside folded corners were quite different between the simulation and experiment, especially for a certain shallow indentation model. In the simulation, the local crushing was not performed under the assumption of any isotropic properties. In the simulation, the deviation of the creased position at the 180° folding was sufficiently predictable, when compared with experimental behavior.
Citation: Weerayut Jina, Shigeru Nagasawa, Tetsuya Yamamoto, Takaomi Nagumo. Analysis of the folding behavior of a paperboard subjected to indentation of a deviated creasing rule using the finite element method[J]. AIMS Materials Science, 2023, 10(2): 313-341. doi: 10.3934/matersci.2023017
[1] | Sen Ming, Xiaodong Wang, Xiongmei Fan, Xiao Wu . Blow-up of solutions for coupled wave equations with damping terms and derivative nonlinearities. AIMS Mathematics, 2024, 9(10): 26854-26876. doi: 10.3934/math.20241307 |
[2] | Zhiqiang Li . The finite time blow-up for Caputo-Hadamard fractional diffusion equation involving nonlinear memory. AIMS Mathematics, 2022, 7(7): 12913-12934. doi: 10.3934/math.2022715 |
[3] | Mohammad Kafini, Shadi Al-Omari . Local existence and lower bound of blow-up time to a Cauchy problem of a coupled nonlinear wave equations. AIMS Mathematics, 2021, 6(8): 9059-9074. doi: 10.3934/math.2021526 |
[4] | Khaled Zennir, Abderrahmane Beniani, Belhadji Bochra, Loay Alkhalifa . Destruction of solutions for class of wave p(x)−bi-Laplace equation with nonlinear dissipation. AIMS Mathematics, 2023, 8(1): 285-294. doi: 10.3934/math.2023013 |
[5] | Mengyang Liang, Zhong Bo Fang, Su-Cheol Yi . Blow-up analysis for a reaction-diffusion equation with gradient absorption terms. AIMS Mathematics, 2021, 6(12): 13774-13796. doi: 10.3934/math.2021800 |
[6] | Hatice Taskesen . Qualitative results for a relativistic wave equation with multiplicative noise and damping terms. AIMS Mathematics, 2023, 8(7): 15232-15254. doi: 10.3934/math.2023778 |
[7] | Chenchen Lu, Lin Chen, Shaoyong Lai . Local well-posedness and blow-up criterion to a nonlinear shallow water wave equation. AIMS Mathematics, 2024, 9(1): 1199-1210. doi: 10.3934/math.2024059 |
[8] | Ling Zhou, Zuhan Liu . Blow-up in a p-Laplacian mutualistic model based on graphs. AIMS Mathematics, 2023, 8(12): 28210-28218. doi: 10.3934/math.20231444 |
[9] | Xiaoming Peng, Xiaoxiao Zheng, Yadong Shang . Lower bounds for the blow-up time to a nonlinear viscoelastic wave equation with strong damping. AIMS Mathematics, 2018, 3(4): 514-523. doi: 10.3934/Math.2018.4.514 |
[10] | Jin Hong, Shaoyong Lai . Blow-up to a shallow water wave model including the Degasperis-Procesi equation. AIMS Mathematics, 2023, 8(11): 25409-25421. doi: 10.3934/math.20231296 |
This study reveals the crease deviation behavior through the developed forming simulation. A combination resistance model was expanded and applied to simulate the 180° folding process of a creased paperboard, using the shear-yield detaching resistance and the out-of-plane fluffing resistance which were based on the isotropic elastro-plastic model. When varying the misalignment of the creasing rule against the groove, the eccentricity of the crease bulging of a white-coated paperboard was compared through the experiment and simulation of the 180° folding process. Comparing the experimental deformation and the simulation, it was explained that the deviation of e contributed to making the crease deviation cd. At the folding test, the 180° folding was compared with the experiment and simulation. The rolling pass of the folded zone was considered to intensify the deviation state. The 180° folding simulation revealed that the crease deviation of cd ≈ 2e was assessed as an ideal condition when using the rolling pass and non-rolling pass. In the case of some shallow indentation in the experiment, 2e < cd < 4e was observed. The inside folded corners were quite different between the simulation and experiment, especially for a certain shallow indentation model. In the simulation, the local crushing was not performed under the assumption of any isotropic properties. In the simulation, the deviation of the creased position at the 180° folding was sufficiently predictable, when compared with experimental behavior.
Neural networks (NNs) are widely used in various fields, such as pattern recognition, combinatorial optimization, image processing, associate memory, signal processing, and fixed-point computations [1,2,3,4], due to their enormous capacity for information processing. The literatures [5,6,7,8,9,10,11,12] classifies neural networks into two categories. The first category consists of static neural networks (SNNs), which rely on the external states of neurons (neural states of neurons). The second category consists of local field neural networks (LFNNs), which depend on the internal states of neurons (local field states). In recent years, Zhang and Han [13] introduced a novel approach by combining SNNs and LFNNs to create a unified system of neural networks called generalized neural networks (GNNs). NNs may encounter a delay during execution caused by either the communication time of neurons or the finite switching speed of the neuron amplifiers. These time delays can have a detrimental effect on the performance of NNs, resulting in either instability, divergence, or oscillation. Consequently, there has been an increased focus on investigating the stability of GNNs under time delay [12,13,14,15,16,17,18]. Delayed GNNs are classified into various types: distributed delay, mixed delays, constant delay, interval time-varying delay and time-varying delay.
Event-triggered schemes are control strategies that minimize the amount of data transmitted or processed in computers and control systems. These schemes only transmit data when specific events occur, such as system state changes, errors, or specific time intervals. The event-triggered mechanism is a promising technique in networked control systems that aims to reduce communication costs and computational burden, while ensuring good control performance. This technique is necessary since the energy of sensors and network bandwidth is limited and needs to be used efficiently to accomplish other communication tasks. The event-triggered method only transmits signals when they meet the triggering threshold, conserving energy and improving communication bandwidth, as shown by the beneficial outcomes of event-triggered schemes. This success has led to its widespread usage in NNs [19,20,21,22,23,24,25,26]. For instance, Liu et al. [20] investigated a dissipativity-based synchronization method for Markovian jump NNs under the event-triggered framework. Later, Zha et al. [22] presented the problem of H∞ control for NNs with time-varying delay and cyber-attacks under the event-triggered framework.
Cyber-attacks in networked control systems are malicious and unauthorized activities that target the communication network or control algorithms. These attacks aim to either disrupt normal system operations, steal data, or cause physical damage. Such attacks can result in significant losses, making the security and resilience of networked control systems against cyber-attacks a crucial area of research and practice. Over the past few years, several researchers [22,25,27,28,29,30] have placed a considerable emphasis on the problem of cyber-attacks in networked control systems. For example, Liu et al. [30] investigated the state estimation method for T-S fuzzy neural networks under stochastic cyber-attacks and an event-triggered scheme. Recently, a technique of the networked control for neural networks vulnerable to two different types of stochastic cyber-attacks has been proposed by Feng et al. [25]. This approach utilizes a decentralized event-triggered H∞ control.
Stability analysis is a crucial concept in control theory, which usually concentrates on a system's asymptotic behavior over an infinite time interval. However, achieving faster convergence with a greater robustness is often favored in practical engineering applications. For instance, an industrial weight scale needs to attain its steady-state value within a specified threshold for a finite time. The system quickly achieves its equilibrium point using a magnetic force. The preceding situation is known as finite-time stability. The concept of finite-time stability was first introduced by Dorato in 1961 [31]. In 2001, Amato [32] presented finite-time boundedness by extending finite-time stability with external disturbance. While there has been considerable research on achieving finite-time stability for delayed NNs [9,11,12,17,26,33,34], the exploration of finite-time decentralized event-triggered feedback control for GNNs with cyber-attacks remains an unaddressed issue. This research gap serves as the primary motivation for the present study.
To address this research gap, this article introduces an innovative decentralized event-triggered method and feedback controller for GNNs with mixed interval time-varying delays and cyber-attacks. The primary contributions of this article can be summarized as follows:
(1) We propose a novel decentralized event-triggered method and feedback controller for GNNs with mixed interval time-varying delays and cyber-attacks. This approach ensures finite-time boundedness while estimating the derivative of the Lyapunov-Krasovskii functionals using an integral inequality with an exponential function. By utilizing this method, we address the challenges associated with system stability and effectiveness in the presence of time-varying delays and cyber-attacks.
(2) The event-triggered approach introduced in this work leads to a reduction in network resource utilization. This reduction alleviates the transmission burden on the network by enabling each sensor to autonomously determine the optimal time for signal transmission. By minimizing unnecessary transmissions, the proposed approach enhances the overall efficiency and scalability of the system.
(3) We describe random cyber-attacks by utilizing Bernoulli-distributed variables and represent them through a nonlinear function that satisfies a specific condition. This modeling approach allows us to capture the realistic nature of cyber-attacks and effectively incorporate them into the control strategy.
(4) We provide an illustrative example accompanied by simulations to demonstrate the feasibility and effectiveness of the proposed control strategy. The results showcase the improved effectiveness achieved in terms of system stability, finite-time boundedness, and resilience against cyber-attacks.
The remainder of this article is structured as follows. In Section 2, we introduce GNNs and provide preliminaries. Section 3 uses a state feedback controller to examine the stochastic finite-time bounded conditions for delayed GNNs with cyber-attacks. Section 4 presents a numerical example to illustrate the effectiveness of the proposed methods. In Section 5, we conclude and discuss our article.
Notations: This article utilizes the following notations: I denotes the identity matrix; ‖⋅‖ represents the Euclidean vector norm of a matrix; Rn indicates the n-dimensional Euclidean space; Prob{X} represents the probability of event X to occur; diag{⋯} refers a block-diagonal matrix; the notation PT and P−1 stand for the transpose and inverse of matrix P, respectively; the expression P<0 (or P≤0) signifies that the real symmetric matrix P is negative definite (or negative semi-definite); λmin(P) (or λmax(P)) denotes the minimum (or maximum) eigenvalue of real symmetric matrix P; the term L2[0,∞) denotes a function space consisting of quadratically integrable functions over the interval [0,∞); the notation Sym{P} represents the sum of P and its transpose, i.e., P+PT; the symbol ∗ indicates the elements below the main diagonal in a symmetric matrix.
In this article, we introduce a problem involving GNNs with mixed interval time-varying delays. The problem statement is described as follows:
{˙x(t)=ˉAx(t)+B0f(Wx(t))+B1f(Wx(t−τ(t)))+B2∫t−η1(t)t−η2(t)h(Wx(u))du+Bwω(t)+Buu(t),z(t)=x(t), | (2.1) |
where x(t)∈Rn represents the state vector at time t; n is the number of neurals; z(t)∈Rn represents the output of the system; ˉA=diag{a1,a2,...,an} indicates a diagonal matrix; W,B0,B1 and B2 refer connection weight matrices; the matrices Bw and Bu are real constant matrices with known values; ω(t) refers the external disturbance input; u(t)∈Rm denotes the control input; and f(Wx(t))=[f1(Wx1(t)),...,fn(Wxn(t))]T and h(Wx(t))=[h1(Wx1(t)),...,hn(Wxn(t))]T indicate the activation functions. The time delays in the system are represented by ηi(t)(i=1,2) and τ(t), which correspond to interval distributed time-varying delays and interval time-varying delays, respectively.
The functions τ(t) and ηi(t)(i=1,2) are continuous and satisfy the following conditions:
0≤τm≤τ(t)≤τMand0≤η1≤η1(t)≤η2(t)≤η2, t∈[0,T], |
where τm,τM,η1,η2 ∈R refer known real constants.
Additionally, we assume that the neuron activation function and communication network delays satisfy the following assumptions.
Assumption (A1). Each of the activation functions, fi(t) and hi(t), where i=1,2,...,n, is assumed to be continuous and bounded, satisfies the following conditions: there exist constants F−i, F+i, H−i, and H+i such that
F−i≤fi(Wα1)−fi(Wα2)Wα1−Wα2≤F+i,H−i≤hi(Wα1)−hi(Wα2)Wα1−Wα2≤H+i,∀α1,α2∈R,α1≠α2. |
Assumption (A2). Let τtik denote the communication network delay at the sampled instant tik in the ith sensor. It is assumed that 0<τtik<ˉτi, where ˉτ=maxi∈1,2,...,nˉτi.
The diagram of the decentralized event-triggered control for GNNs with cyber-attacks is shown in Figure 1. This structure involves multiple sensors and controllers exchanging information over a communication network, which may experience time delays and potential cyber-attacks. To minimize network transmissions, event generators are employed at each sensor. When a new signal is sampled, it is promptly sent to the corresponding event generator. Additionally, the signal includes the disturbance input vector ω(t), representing either external factors or disturbances that influence the controlled system. The controlled output z(t) represents the desired or targeted system output. Only signals that violate the event-triggered condition are transmitted over the network, thereby reducing communication bandwidth requirements. The primary objective of this decentralized event-triggered structure is to ensure the stability of the neural network while minimizing the impact of cyber-attacks. Furthermore, a three-line table summarizing the algorithm of the proposed method is provided below in Table 1.
Step | Description |
1 | Initialize network parameters, event-triggering thresholds and cyber-attack detection |
mechanisms | |
2 | Sample input signals, check event-triggering conditions and detect potential |
cyber-attacks | |
3 | Update network states, transmit relevant information among nodes and implement |
countermeasures against cyber-attacks |
The following expression gives the predefined event-triggered criterion for the ith sensor:
eTi(t)Ωiei(t)<σixTi(tikh+jih)Ωixi(tikh+jih), | (2.2) |
where a weighting matrix is denoted by Ωi>0, σi∈[0,1), i∈{1,2,..,n}, h is the sampling period of sensor, jih is the sampling instant for the ith sensor, and ei(t) is the difference between the latest transmitted signal xi(tikh) and the current sampled signal x(tikh+jih) at time t.
Remark 2.1. In the event generator of the ith sensor, the most recently triggered instant is tikh, and the current sampling instant is tikh+jih. It is important to note that the set {ti1,ti2,...,}⊆{h,2h,...,jih,...} for i∈{1,2,...,n}.
The zero holder order (ZOH) holding interval [tikh,tik+1h) can be divided into several subsets denoted by ∪jiMji=0Υji. Each subset ∪jiMji=0Υji is given by Υji=[tikh+jih+βtik+ji,tikh+jih+h+βtik+ji+1) for ji=0,1,...,jiM, jiU=tik+1−tik−1.
Following a similar approach to [35], we establish a sequence of buffers on the actuator side, each with a unique timestamp to hold the controller outputs. This enables the actuators to update the controlled inputs by selecting the corresponding controller output from the buffers. Thus, the input update time set for the actuators is defined as tk+1h=tkh+jh, where jh=argminii∈{1,2,...,n}{jih} can be obtained from (2.2).
Define β(t)=t−tkh−jh. It is evident that 0≤βtk≤β(t)≤ˉβ, where ˉβ=h+βtk+j+1. Based on (2.2), the condition for n channels can be derived as follows:
eT(t)Ωe(t)<σxT(t−β(t))Ωx(t−β(t)), | (2.3) |
where e(t)=x(tkh)−x(tk+1h+jh), Ω=diag{Ω1,...,Ωn} and σ=diag{σ1,...,σn}.
The following is a description of the proposed method for designing the controller model, which takes into account both the decentralized event-triggered scheme and cyber-attacks:
u(t)=ρ(tk)Kx(tkh)+(1−ρ(tk))Kg(x(t−d(t))), | (2.4) |
where ρ(tk)∈{0,1}, Prob{ρ(tk)=1}=ˉρ, Prob{ρ(tk)=0}=1−ˉρ, the controller gain is denoted by K, and the function of cyber-attacks is represented by g(x(t−d(t))), where g(x(t))=[g1(x1(t)),g2(x2(t)), ...,gn(xn(t))]T, d(t)∈(0,ˉd] and ˉd is a positive constant.
Remark 2.2. The dynamic event-triggered system (ETS) utilizes periodic sampling and a waiting period of h seconds to evaluate the event-triggering condition, allowing for ample decision-making time and preventing the occurrence of Zeno behavior. Zeno behavior refers to the destabilizing effect of rapid and continuous event triggering. The introduction of this temporal constraint ensures a balanced operation, averting undesirable system behavior and instability by triggering events at appropriate intervals.
Remark 2.3. This article considers the probability distribution of cyber-attacks, which is assumed to follow the Bernoulli distribution. The received sensor measurements are represented by ρ(tk), with ρ(tk)=1 indicating actual sensor measurements and ρ(tk)=0 indicating that the sensor measurements accessible through the communication network have been attacked.
Combining (2.1) and (2.4), we can derive that
˙x(t)=ˉAx(t)+B0f(Wx(t))+B1f(Wx(t−τ(t)))+B2∫t−η1(t)t−η2(t)h(Wx(u))du+Bwω(t)+ρ(tk)BuKx(tkh)+(1−ρ(tk))BuKg(x(t−d(t))),t∈[tkh+βtk,tk+1h+βtk+1]. | (2.5) |
Taking the definition of β(t) and the features of ρ(tk) into account, we can express (2.5) as the following:
˙x(t)=ˉAx(t)+ˉρBuK[x(t−β(t))+e(t)]+(1−ˉρ)BuKg(x(t−d(t)))+B0f(Wx(t))+B1f(Wx(t−τ(t)))+B2∫t−η1(t)t−η2(t)h(Wx(s))ds+Bwω(t)+(ρ(tk)−ˉρ)BuK[x(t−β(t))+e(t)−g(x(t−d(t)))],t∈[tkh+βtk,tk+1h+βtk+1]. | (2.6) |
We present the following assumptions and lemmas instrumental to deriving our main results.
Assumption (A3). For each gi(t), i=1,2,...,n represents a cyber-attack function that is bounded. There exist constants G−i and G+i such that
G−i≤gi(α1)−gi(α2)α1−α2≤G+i,∀α1,α2∈R,α1≠α2. |
Remark 2.4. Assumption (A3) allows for the analysis of the system's response to cyber-attacks, even in the absence of detailed information about the attack signals. It facilitates the design of resilient control strategies that can handle various attack scenarios and maintain system stability, despite bounded cyber-attacks.
Assumption (A4). The external disturbance ω(t) satisfies
∫T0ωT(t)ω(t)dt≤dw,dw≥0,Tis a time constant. |
Definition 2.1. [32] Given positive constants c1,c2 and T with 0<c1<c2 and X is a symmetric positive definite matrix. The GNNs (2.1) is finite-time bounded with respect to (c1,c2,X,T), if ∀t∈[0,T]
sup−τM≤s≤0{xT(s)Xx(s),˙xT(s)X˙x(s)}≤c1⟹xT(t)Xx(t)<c2. | (2.7) |
Lemma 2.2. (Jensen's inequality [36]) For a symmetric positive-definite matrix, M∈Rm×m, and any given scalars d1 and d2, the following inequality holds:
(d2−d1)∫d2d1xT(u)Mx(u)du≥(∫d2d1x(u)du)TM(∫d2d1x(u)du). | (2.8) |
Lemma 2.3. [35] Assume β(t)∈[0,ˉβ], for any matrices R∈R and L that satisfies [RLLTR]≥0, the inequality holds as follows:
−ˉβ∫tt−ˉβ˙xT(u)R˙x(u)du≤[x(t)x(t−β(t))x(t−ˉβ)]T[−R∗∗RT−LT−2R+L+LT∗LTRT−LT−R][x(t)x(t−β(t))x(t−ˉβ)]. | (2.9) |
Lemma 2.4. [37] For any positive scalars a,b>a and α, and any symmetric matrix M=MT>0 with dimension n×n, the following inequality holds:
∫baeα(t−u)˙xT(u)M˙x(u)du≥1Φ0ΣT0MΣ0+1Φ1ΣT1MΣ1, | (2.10) |
where
Σ0=x(b)−x(a),Σ1=ε1x(a)+ε2x(b)−∫bax(u)du,ε1=(b−a)e−α(t−b)e−α(t−b)−e−α(t−a)−1α,ε2=1α−(b−a)e−α(t−a)e−α(t−b)−e−α(t−a),Φ0=∫bae−α(t−u)du=1α(e−α(t−b)−e−α(t−a)),Φ1=∫bae−α(t−u)l21(u)du=e−2α(t−a)−(2+α2(b−a)2)e−α(2t−a−b)+e−2α(t−b)α3(e−α(t−b)−e−α(t−a)),l1(u)=u−(∫bae−α(t−u)du)−1(∫bae−α(t−u)udu). |
Remark 2.5. When α=0, then the specific values of Φ0, Φ1, Σ0, and Σ1 are given by Φ0=b−a, Φ1=(b−a)312, Σ0=x(b)−x(a), and Σ1=b−a2[x(a)+x(b)−2b−a∫bax(u)du]. This implies that Lemma 2.4 reduces to the well-known Wirtinger's inequality.
Lemma 2.5. [38] For a full column rank matrix L∈Rn×m, the singular decomposition is L=U1ΣUT2, where U1 and U2 are orthogonal matrices, and Σ∈Rn×m is a rectangular diagonal matrix with positive real numbers. Let M be a matrix of the form M=U1[R100R2]UT1, then there exists X∈Rm×m such that ML=LX.
Lemma 2.6. (Schur complement [39]) If matrices X, Y, and Z have appropriate dimensions and satisfy X=XT and Y=YT>0, then the inequality X+ZTY−1Z<0 holds if and only if
[XZTZ−Y]<0or[−YZZTX]<0. | (2.11) |
In this section, we introduce new sufficient conditions for delayed GNNs that build on the main theorems. To start, we define the parameters as follows: τMm=τM−τm,τMm≠0,
θ1a=1α(1−e−ατm),θ1b=e−2ατm−(2+α2τ2m)e−ατm+1α3(1−e−ατm),θ2a=1α(1−e−ατM),θ2b=e−2ατM−(2+α2τ2M)e−ατM+1α3(1−e−ατM),θ3a=1α(e−ατm−e−ατ(t)),θ3b=1α3(e−ατm−e−ατ(t))[e−2ατ(t)−(2+α2(τ(t)−τm)2)e−α(τ(t)+τm)+e−2ατm],θ4a=1α(e−ατ(t)−e−ατM),θ4b=1α3(e−ατ(t)−e−ατM)[e−2ατM−(2+α2(τM−τ(t))2)e−α(τ(t)+τM)+e−2ατ(t)],ϵ11=τm1−e−ατm−1α,ϵ12=1α−τme−ατm1−e−ατm,ϵ21=τM1−e−ατM−1α,ϵ22=1α−τMe−ατM1−e−ατM,ϵ31=(τ(t)−τm)e−ατme−ατm−e−ατ(t)−1α,ϵ32=1α−(τ(t)−τm)e−ατ(t)e−ατm−e−ατ(t),ϵ41=(τM−τ(t))e−ατ(t)e−ατ(t)−e−ατM−1α,ϵ42=1α−(τM−τ(t))e−ατMe−ατ(t)−e−ατM,Γ1=[eT1−eT2]T,Γ2=[ϵ11eT2+ϵ12eT1−τmeT13]T,Γ3=[eT1−eT4]T,Γ4=[ϵ21eT4+ϵ22eT1−τMeT14]T,Γ5=[eT2−eT3]T,Γ6=[ϵ31eT3+ϵ32eT2−τMmeT15]T,Γ7=[eT3−eT4]T,Γ8=[ϵ41eT4+ϵ42eT3−τMmeT16]T,Γ9=[eT9−eT1WTFTM]T,Γ10=[FPWe1−e9],Γ11=[eT10−eT3WTFTM]T,Γ12=[FPWe3−e10],Γ13=[eT9−eT10−eT1WTFTM+eT3WTFTM]T,Γ14=[FPWe1−FPWe3−e9+e10],Γ15=[eT11−eT7GTM]T,Γ16=[GPe7−e11],Γ17=[eT12−eT1WTHTM]T,Γ18=[HPWe1−e12],FM=diag{F−1,...,F−n},FP=diag{F+1,...,F+n},GM=diag{G−1,...,G−n},GP=diag{G+1,...,G+n},HM=diag{H−1,...,H−n},HP=diag{H+1,...,H+n},γ1=eατm−1α,γ2=eατM−1α,γ3=eαˉβ−1α,γ4=eαˉβ−1α,γ5=eατm−ατm−1α2,γ6=eατM−ατM−1α2,γ7=eατM−eατm−ατMmα2,γ8=eαˉβ−αˉβ−1α2,γ9=eαˉd−αˉd−1α2,γ10=eαη2−eαη1−αη21α2,η21=η2−η1, |
and we define vectors as follows:
ξ(t)=[xT(t),xT(t−τm),xT(t−τ(t)),xT(t−τM),xT(t−β(t)),xT(t−ˉβ),xT(t−d(t)),xT(t−ˉd),fT(Wx(t)),fT(Wx(t−τ(t))),gT(x(t−d(t))),hT(Wx(t)),1τm∫tt−τmxT(u)du,1τM∫tt−τMxT(u)du,1τ(t)−τm∫t−τmt−τ(t)xT(u)du,1τM−τ(t)∫t−τ(t)t−τMxT(u)du,∫t−η1(t)t−η2(t)hT(Wx(u))du,eT(t),ωT(t)]T, |
ei=[0n×(i−1)nIn0n×(19−i)n],i=1,2,...,19. |
First, we obtain new sufficient conditions of the finite-time decentralized event-triggered feedback control problem for GNNs with mixed interval time-varying delays and cyber-attacks as follows.
Theorem 3.1. Assume that Assumptions (A1)-(A4) are satisfied. Then, for given scalars ˉβ,ˉd,ˉρ,σ,dw,τm,τM, η1,η2,T, c1,c2 and α, the delayed GNNs with cyber-attacks (2.6) under the state feedback controller is stochastic finite-time bounded regarding (c1,c2,T,X,dw), if there exist symmetric positive definite matrices P, Qi,Rj(i=1,2,3,4,j=1,2,3,4,5), M,S and positive diagonal matrices G1,G2,G3,G4,G5, such that the following conditions hold:
[Π∗∗Γa−Λ∗Γb0−Λ]<0, | (3.1) |
eαT[Πλc1+dwλ13(1−e−αT)]<λ1c2, | (3.2) |
where
Π=6∑i=1Πi,Π1=2eT1PˉAe1+2eT1ˉρPBuK[e5+e18]+2(1−ˉρ)eT1PBuKe11+2eT1PB0e9+2eT1PB1e10+2eT1PB2e17+2eT1PBwe19−αeT1Pe1,Π2=eT1(Q1+Q2+Q3+Q4)e1−eατmeT2Q1e2−eατMeT4Q2e4−eαˉβeT6Q3e6−eαˉdeT8Q4e8,Π3=−τmθ1aΓT1R1Γ1−τmθ1bΓT2R1Γ2−τMθ2aΓT3R2Γ3−τMθ2bΓT4R2Γ4−τMmθ3aΓT5R3Γ5−τMmθ3bΓT6R3Γ6−τMmθ4aΓT7R3Γ7−τMmθ4bΓT8R3Γ8+eαˉβ[−eT1R4e1+2eT1(R4−L1)e5+2eT1L1e6+eT5(−2R4+L1+LT1)e5+2eT5(R4−L1)e6+eT6R4e6]+eαˉd[−eT1R5e1+2eT1(R5−L2)e7+2eT1L2e8+eT7(−2R5+L2+LT2)e7+2eT7(R5−L2)e8+eT8R5e8],Π4=η221eT12Me12−eαη2eT17Me17,Π5=2ΓT9G1Γ10+2ΓT11G2Γ12+2ΓT13G3Γ14+2ΓT15G4Γ16+2ΓT17G5Γ18,Π6=−αeT19Se19−eT18Ωe18+σeT5Ωe5,Πλ=λ2+γ1λ3+γ2λ4+γ3λ5+γ4λ6+τmγ5λ7+τMγ6λ8+τMmγ7λ9+ˉβγ8λ10+ˉdγ9λ11+η21γ10λ12,λ1=λmin(¯P),λ2=λmax(¯P),λ3=λmax(¯Q1),λ4=λmax(¯Q2),λ5=λmax(¯Q3),λ6=λmax(¯Q4),λ7=λmax(¯R1),λ8=λmax(¯R2),λ9=λmax(¯R3),λ10=λmax(¯R4),λ11=λmax(¯R5),λ12=λmax(¯M),λ13=λmax(¯S),Λ=diag{PR−11P,PR−12P,PR−13P,PR−14P,PR−15P},Γa=[τmΓTa1τMΓTa1τMmΓTa1ˉβΓTa1ˉdΓTa1]T,Γb=[τmΓTb1τMΓTb1τMmΓTb1ˉβΓTb1ˉdΓTb1]T,Γa1=[Γa11Γa12],Γa11=[PA01×3ˉρPBuK01×3PB0PB1],Γa12=[(1−ˉρ)PBuK01×5PB2ˉρPBuKPBw],Γb1=[01×4δPBuK01×5δPBuK01×6δPBuK0],δ=√ˉρ(1−ˉρ). |
Proof. We formulate the LKFs as follows:
V(xt,t)=3∑i=1Vi(xt,t), | (3.3) |
where
V1(xt,t)=x(t)TPx(t),V2(xt,t)=∫tt−τmeα(t−u)xT(u)Q1x(u)du+∫tt−τMeα(t−u)xT(u)Q2x(u)du+∫tt−ˉβeα(t−u)xT(u)Q3x(u)du+∫tt−ˉdeα(t−u)xT(u)Q4x(u)du,V3(xt,t)=τm∫tt−τm∫tueα(t−s)˙xT(s)R1˙x(s)dsdu+τM∫tt−τM∫tueα(t−s)˙xT(s)R2˙x(s)dsdu+τMm∫t−τmt−τM∫tueα(t−s)˙xT(s)R3˙x(s)dsdu+ˉβ∫tt−ˉβ∫tueα(t−s)˙xT(s)R4˙x(s)dsdu+ˉd∫tt−ˉd∫tueα(t−s)˙xT(s)R5˙x(s)dsdu+(η2−η1)∫t−η1t−η2∫tueα(t−s)hT(Wx(s))Mh(Wx(s))dsdu. |
Taking the mathematical expectation of the derivative of (3.3) over the trajectory of the GNNs (2.6), we obtain
E{˙V1(xt,t)}=2xT(t)P˙x(t)−αxT(t)Px(t)+αV1(xt,t)=ξT(t)Π1ξ(t)+αV1(xt,t), | (3.4) |
E{˙V2(xt,t)}=xT(t){Q1+Q2+Q3+Q4}x(t)−eατmxT(t−τm)Q1x(t−τm)−eατMxT(t−τM)Q2x(t−τM)−eαˉβxT(t−ˉβ)Q3x(t−ˉβ)−eαˉdxT(t−ˉd)Q4x(t−ˉd)+αV2(xt,t)=ξT(t)Π2ξ(t)+αV2(xt,t), | (3.5) |
E{˙V3(xt,t)}=E{˙xT(t)ˆR˙x(t)}−τm∫tt−τmeα(t−u)˙xT(u)R1˙x(u)du−τM∫tt−τMeα(t−u)˙xT(u)R2˙x(u)du−τMm∫t−τmt−τMeα(t−u)˙xT(u)R3˙x(u)du−ˉβ∫tt−ˉβeα(t−u)˙xT(u)R4˙x(u)du−ˉd∫tt−ˉdeα(t−u)˙xT(u)R4˙x(u)du+αV3(xt,t), | (3.6) |
where ˆR=τ2mR1+τ2MR2+τ2MmR3+ˉβ2R4+ˉd2R5,
E{˙V4(xt,t)}=(η2−η1)2hT(Wx(t))Mh(Wx(t))−(η2−η1)∫t−η1t−η2eα(t−u)hT(Wx(u))Mh(Wx(u))du+αV4(xt,t)≤(η2−η1)2hT(Wx(t))Mh(Wx(t))−(η2(t)−η1(t))eαη2∫t−η1(t)t−η2(t)hT(Wx(u))Mh(Wx(u))du+αV4(xt,t). | (3.7) |
Applying Lemma 2.4 to the integral, we obtain
−τm∫tt−τmeα(t−u)˙xT(u)R1˙x(u)du≤ξT(t){−τmθ1a(e1−e2)TR1(e1−e2)−τmθ1b(ϵ11e2+ϵ12e1−τme13)T×R1(ϵ11e2+ϵ12e1−τme13)}ξ(t)=ξT(t){−τmθ1aΓT1R1Γ1−τmθ1bΓT2R1Γ2}ξ(t), | (3.8) |
−τM∫tt−τMeα(t−u)˙xT(u)R2˙x(u)du≤ξT(t){−τMθ2a(e1−e4)TR2(e1−e4)−τMθ2b(ϵ21e4+ϵ22e1−τMe14)T×R2(ϵ21e4+ϵ22e1−τMe14)}ξ(t)=ξT(t){−τMθ2aΓT3R2Γ3−τMθ2bΓT4R2Γ4}ξ(t), | (3.9) |
−τMm∫t−τmt−τMeα(t−u)˙xT(u)R3˙x(u)du=−τMm∫t−τmt−τ(t)eα(t−u)˙xT(u)R3˙x(u)du−τMm∫t−τ(t)t−τMeα(t−u)˙xT(u)R3˙x(u)du≤ξT(t){−τMmθ3a(e2−e3)TR3(e2−e3)−τMmθ3b(ϵ31e3+ϵ32e2−τMme15)T×R3(ϵ31e3+ϵ32e2−τMme15)−τMmθ4a(e3−e4)TR3(e3−e4)−τMmθ4b(ϵ41e4+ϵ42e3−τMme16)T×R3(ϵ41e4+ϵ42e3−τMme16)}ξ(t)=ξT(t){−τMmθ3aΓT5R3Γ5−τMmθ3bΓT6R3Γ6−τMmθ4aΓT7R3Γ7−τMmθ4bΓT8R3Γ8}ξ(t). | (3.10) |
Applying Lemma 2.2, we obtain
−(η2(t)−η1(t))eαη2∫t−η1(t)t−η2(t)hT(Wx(u))Mh(Wx(u))du≤−eαη2(∫t−η1(t)t−η2(t)hT(Wx(u))du)T×M(∫t−η1(t)t−η2(t)hT(Wx(u))du)=ξT(t){−eT17(eαη2M)e17}ξ(t). | (3.11) |
Applying Lemma 2.3, we obtain
−ˉβ∫tt−ˉβeα(t−u)˙xT(u)R4˙x(u)du≤eαˉβ[x(t)x(t−β(t))x(t−ˉβ)]T[−R4∗∗RT4−LT1−2R4+L1+LT1∗LT1RT4−LT1−R4][x(t)x(t−β(t))x(t−ˉβ)]=eαˉβξT(t){−eT1R4e1+2eT1(R4−L1)e5+2eT1L1e6+eT5(−2R4+L1+LT1)e5+2eT5(R4−L1)e6+eT6R4e6}ξ(t), | (3.12) |
−ˉd∫tt−ˉdeα(t−u)˙xT(u)R5˙x(u)du≤eαˉd[x(t)x(t−d(t))x(t−ˉd)]T[−R5∗∗RT5−LT2−2R5+L2+LT2∗LT2RT5−LT2−R5][x(t)x(t−d(t))x(t−ˉd)]=eαˉdξT(t){−eT1R5e1+2eT1(R5−L2)e7+2eT1L2e8+eT7(−2R5+L2+LT2)e7+2eT7(R5−L2)e8+eT8R5e8}ξ(t). | (3.13) |
Noting that E{˙xT(t)ˆR˙x(t)}=ATˆRA+ˉρ(1−ˉρ)BTˆRB, where A=ˉAx(t)+ˉρBuK[x(t−β(t))+e(t)]+(1−ˉρ)BuKg(x(t−d(t)))+B0f(Wx(t))+B1f(Wx(t−τ(t)))+B2∫t−η1(t)t−η2(t)h(Wx(s))ds+Bwω(t),B=BuK[x(t−β(t))+e(t)−g(x(t−d(t)))].
One can deduce from Assumption (A1) that if β1i,β2i,β3i,β4i,β5i>0 for i=1,2,...,n, then
2[fi(Wix(t))−F−iWix(t)]β1i[F+iWix(t)−fi(Wix(t))]≥0, | (3.14) |
2[fi(Wix(t−τ(t)))−F−iWix(t−τ(t))]β2i[F+iWix(t−τ(t))−fi(Wix(t−τ(t)))]≥0, | (3.15) |
2[fi(Wix(t))−fi(Wix(t−τ(t)))−F−i(Wix(t)−Wix(t−τ(t)))]β3i[F+i(Wix(t)−Wix(t−τ(t)))−fi(Wix(t))+fi(Wix(t−τ(t)))]≥0, | (3.16) |
2[gi(Wix(t−d(t)))−G−iWix(t−d(t))]β4i[G+iWix(t−d(t))−gi(Wix(t−d(t)))]≥0, | (3.17) |
2[hi(Wix(t))−H−iWix(t)]β5i[H+iWix(t)−hi(Wix(t))]≥0, | (3.18) |
which implies that
2ξT(t)ΓT9G1Γ10ξ(t)≥0,2ξT(t)ΓT11G2Γ12ξ(t)≥0,2ξT(t)ΓT13G3Γ14ξ(t)≥0,2ξT(t)ΓT15G4Γ16ξ(t)≥0,2ξT(t)ΓT17G5Γ18ξ(t)≥0. |
Thus, we have
0≤ξT(t){2ΓT9G1Γ10+2ΓT11G2Γ12+2ΓT13G3Γ14+2ΓT15G4Γ16+2ΓT17G5Γ18}ξ(t)=ξT(t)Π5ξ(t), | (3.19) |
where G1=diag{β11,...,β1n}, G2=diag{β21,...,β2n}, G3=diag{β31,...,β3n}, G4=diag{β41,...,β4n} and G5=diag{β51,...,β5n}.
Combining (3.4)–(3.19) with (2.3), we obtain
E{˙V(xt,t)−αV(xt,t)}−αωT(t)Sω(t)≤ξT(t){Π1+Π2+Π3+Π4+Π5}ξ(t)−αωT(t)Sω(t)−eT(t)Ωe(t)+σxT(t−β(t))Ωx(t−β(t))+ATˆRA+ˉρ(1−ˉρ)BTˆRB=ξT(t)¯Πξ(t)+ATˆRA+ˉρ(1−ˉρ)BTˆRB. | (3.20) |
Applying the Schur complement [39], we can derive that (3.1) is equal to:
E{˙V(xt,t)−αV(xt,t)}−αωT(t)Sω(t)<0. | (3.21) |
Then, multiplying (3.21) by e−αt, we can be written as
E{ddt(e−αtV(xt,t))}<αe−αtωT(t)Sω(t). | (3.22) |
Assumption (A2) and integrating (3.22) from 0 to t with t∈[0,T], we obtain
E{V(xt,t)}<eαT[V(x0,0)+α∫T0e−αuωT(u)Sω(u)du]<eαT[V(x0,0)+dwλ13(1−e−αT)]. | (3.23) |
Considering V(x0,0), we can derive that
E{V(x0,0)}=E{xT(0)Px(0)+∫0−τme−αuxT(u)Q1x(u)du+∫0−τMe−αuxT(u)Q2x(u)du+∫0−ˉβe−αuxT(u)Q3x(u)du+∫0−ˉde−αuxT(u)Q4x(u)du+τm∫0−τm∫0ue−αs˙x(s)R1˙x(s)dsdu+τM∫0−τM∫0ue−αs˙x(s)R2˙x(s)dsdu+τMm∫−τm−τM∫0ue−αs˙x(s)R3˙x(s)dsdu+ˉβ∫0−ˉβ∫0ue−αs˙x(s)R4˙x(s)dsdu+ˉd∫0−ˉd∫0ue−αs˙x(s)R5˙x(s)dsdu+η21∫−η1−η2∫0ue−αshT(Wx(t))Mh(Wx(t))dsdu}≤E{xT(0)Px(0)+∫0−τme−αuxT(u)Q1x(u)du+∫0−τMe−αuxT(u)Q2x(u)du+∫0−ˉβe−αuxT(u)Q3x(u)du+∫0−ˉde−αuxT(u)Q4x(u)du+τm∫0−τm∫0ue−αs˙x(s)R1˙x(s)dsdu+τM∫0−τM∫0ue−αs˙x(s)R2˙x(s)dsdu+τMm∫−τm−τM∫0ue−αs˙x(s)R3˙x(s)dsdu+ˉβ∫0−ˉβ∫0ue−αs˙x(s)R4˙x(s)dsdu+ˉd∫0−ˉd∫0ue−αs˙x(s)R5˙x(s)dsdu+η21∫−η1−η2∫0ue−αsxT(s)FwMFwx(s)dsdu}, |
where Fw=diag{F+1,F+2,...,F+n}W.
Setting ¯P=X−12PX−12, ¯Qi=X−12QiX−12, ¯Rj=X−12RjX−12, ¯M=X−12FwMFwX−12, i=1,2,3,4,j=1,2,3,4,5, we have
E{V(x0,0)}≤E{xT(0)X12¯PX12x(0)+∫0−τme−αuxT(u)X12¯Q1X12x(u)du+∫0−τMe−αuxT(u)X12¯Q2X12x(u)du+∫0−ˉβe−αuxT(u)X12¯Q3X12x(u)du+∫0−ˉde−αuxT(u)X12¯Q4X12x(u)du+τm∫0−τm∫0ue−αs˙x(s)X12¯R1X12˙x(s)dsdu+τM∫0−τM∫0ue−αs˙x(s)X12¯R2X12˙x(s)dsdu+τMm∫−τm−τM∫0ue−αs˙x(s)X12¯R3X12˙x(s)dsdu+ˉβ∫0−ˉβ∫0ue−αs˙x(s)X12¯R4X12˙x(s)dsdu+ˉd∫0−ˉd∫0ue−αs˙x(s)X12¯R5X12˙x(s)dsdu+η21∫−η1−η2∫0ue−αsxT(s)X12¯MX12x(s)dsdu}≤{λ2+γ1λ3+γ2λ4+γ3λ5+γ4λ6+τmγ5λ7+τMγ6λ8+τMmγ7λ9+ˉβγ8λ10+ˉdγ9λ11+η21γ10λ12}c1=Πλc1. |
Furthermore, by referring Eq (3.3), we obtain the following:
E{V(xt,t)}≥E{xT(t)Px(t)}≥λmin(¯P)E{xT(t)Xx(t)}=λ1E{xT(t)Xx(t)}. | (3.24) |
Subsequently, by utilizing Eqs (3.23) to (3.24), we obtain the following:
E{xT(t)Xx(t)}≤eαTλ1[Πλc1+dwλ13(1−e−αT)]. |
Thus, if the relation in (3.2) holds true, then it implies that E{xT(t)Xx(t)}<c2,∀t∈[0,T]. Consequently, it can be concluded that the delayed GNNs (2.6) with cyber-attacks are stochastically finite-time bounded with respect to (c1,c2,T,X,dw). This completes the proof.
Remark 3.1. The activation functions play a crucial role in determining the existence and uniqueness of solutions in GNNs. Specifically, the activation functions in GNNs need to satisfy the Lipschitz condition, which ensures that the functions possess certain properties that guarantee the existence and uniqueness of solutions. The Lipschitz condition requires the functions to have a bounded derivative, thereby controlling the rate of change of the functions. In this article, the activation function is assumed to satisfy Assumptions (A1) and (A3). In this case, it is important to note that the activation function does not necessarily need to be non-monotonic and differentiable. The constants F−i, F+i, H−i, H+i, G−i and G+i, where i=1,2,…,n, can take either positive, zero, or negative values. Assumptions (A1) and (A3), as considered in Eqs (3.14)–(3.18) of this article, ensuring not only F−i≤fi(Wx(t))Wx(t)≤F+i, F−i≤fi(Wx(t−τ(t)))Wx(t−τ(t))≤F+i, H−i≤hi(Wx(t))Wx(t)≤H+i, H−i≤hi(Wx(t−τ(t)))Wx(t−τ(t))≤H+i, G−i≤gi(x(t))x(t)≤G+i and G−i≤gi(x(t−τ(t)))x(t−τ(t))≤G+i, but also F−i≤fi(Wx1)−fi(Wx2)Wx1−Wx2≤F+i, H−i≤hi(Wx1)−hi(Wx2)Wx1−Wx2≤H+i and G−i≤gi(x1)−gi(x2)x1−x2≤G+i. Therefore, this assumption is weaker and more general than the usual Lipschitz condition. In conclusion, the activation functions in GNNs play a critical role in ensuring the existence and uniqueness of solutions. While the assumption considered in this article relaxes the requirement for non-monotonicity and differentiability, it provides a more general condition that still guarantees the desired properties.
Based on the results of Theorem 3.1, we can now propose a controller design approach for the delayed GNNs (2.6) as follows.
Assumption (A5) To handle the nonlinear terms in Theorem 3.1, we adopt a similar assumption to [38], B is assumed to be full column rank, and the singular decomposition for B as B=L1[Bu00]L2, where Bu0 is the first u0 columns of B, L1 and L2 are appropriate matrices with compatible dimensions.
Theorem 3.2. Assume that Assumptions (A1)–(A5) are satisfied. Then, for the given scalars ˉβ,ˉd,ˉρ,σ,dw,τm,τM, η1,η2,T, c1,c2 and α, the delayed GNNs with cyber attacks (2.6) under the state feedback controller is stochastic finite-time bounded regarding (c1,c2,T,X,dw), if there exist symmetric positive definite matrices P, Qi,Rj(i=1,2,3,4,j=1,2,3,4,5), M,S, and positive diagonal matrices G1,G2,G3,G4,G5, such that the conditions hold as follows:
[Πu∗∗¯Γau−Λu∗¯Γbu0−Λu]<0, | (3.25) |
eαT[Πλc1+dwλ13(1−e−αT)]<λ1c2, | (3.26) |
where
Πu=¯Π1+6∑i=2Πi,¯Π1=2eT1PˉAe1+2eT1ˉρBuY[e5+e18]+2(1−ˉρ)eT1BuYe11+2eT1PB0e9+2eT1PB1e10+2eT1PB2e17+2eT1PBwe19−αeT1Pe1,Λu=diag{−2κ1P+κ21R1,−2κ2P+κ22R2,−2κ3P+κ23R3,−2κ4P+κ24R4,−2κ5P+κ25R5},¯Γau=[τm¯ΓTa1τM¯ΓTa1τMm¯ΓTa1ˉβ¯ΓTa1ˉd¯ΓTa1]T,¯Γbu=[τm¯ΓTb1τM¯ΓTb1τMm¯ΓTb1ˉβ¯ΓTb1ˉd¯ΓTb1]T,¯Γa1=[¯Γa11¯Γa12],¯Γa11=[PA01×3ˉρBuY01×3PB0PB1],¯Γa12=[(1−ˉρ)BuY01×5PB2ˉρBuYPBw],¯Γb1=[01×4δBuY01×5δBuY01×6BuY0],δ=√ˉρ(1−ˉρ), |
where P=L1diag{P1,P2}LT1, P1∈Rm×m,P2∈R(n−m)×(n−m). The other matrices are given in Theorem 3.1. The gain of the controller can be determined as follows:
K=P−1kY,Pk=(Bu0L2)−1P1Bu0L2, | (3.27) |
in which Bu0 and L2 are defined in Assumption (A5).
Proof. Let P and Bu be defined as follows based on Assumption (A5):
P=L1[P100P2]LT1andBu=L1[Bu00]L2. |
By applying Lemma 2.5, we can find a new variable Pk that satisfies PBu=BuPk, from
L1[P100P2]LT1L1[Bu00]L2=L1[Bu00]L2Pk, |
we get
Pk=(Bu0L2)−1P1Bu0L2. |
From PBu=BuPk, then we substitute PBuK=BuPkK and define Y=PkK, it follows from (3.1) that
[Πu∗∗¯Γau−Λ∗¯Γbu0−Λ]<0. | (3.28) |
In terms of the following inequality:
(Rj−κ−1jP)R−1j(Rj−κ−1jP)≥0,(j=1,2,3,4,5). |
One has that
−PR−1jP≤−2κjP+κ2jRj. |
By replacing −PR−1jP with −2κjP+κ2jRj in (3.28), it becomes evident that (3.25) is obtained. Thus, the proof is complete.
The delayed GNNs (2.6) take on the following forms under the decentralized event-triggered scheme without cyber-attacks:
˙x(t)=ˉAx(t)+BuK[x(t−β(t))+e(t)]+B0f(Wx(t))+B1f(Wx(t−τ(t)))+B2∫t−η1(t)t−η2(t)h(Wx(s))ds+Bwω(t),∀t∈[tkh+βtk,tk+1h+βtk+1]. | (3.29) |
Following the same approach as the proof for Theorem 3.2, we can derive the following corollary. Furthermore, we also define the vectors as follows:
ξ(t)=[xT(t),xT(t−τm),xT(t−τ(t)),xT(t−τM),xT(t−β(t)),xT(t−ˉβ),fT(Wx(t)),fT(Wx(t−τ(t))),hT(Wx(t)),1τm∫tt−τmxT(u)du,1τM∫tt−τMxT(u)du,1τ(t)−τm∫t−τmt−τ(t)xT(u)du,1τM−τ(t)∫t−τ(t)t−τMxT(u)du,∫t−η1(t)t−η2(t)hT(Wx(u))du,eT(t),ωT(t)]T, |
ei=[0n×(i−1)nIn0n×(16−i)n],i=1,2,...,16. |
Corollary 3.3. Assume that Assumptions (A1), (A2), (A4) and (A5) are satisfied. Then, for the given scalars ˉβ,ˉρ,σ,dw, τm,τM,η1,η2,T,c1,c2 and α, the delayed GNNs without cyber attacks (3.29) under the state feedback controller are stochastic finite-time bounded regarding (c1,c2,T,X,dw), if there exist symmetric positive definite matrices P, Qi,Rj(i=1,2,3,j=1,2,3,4), M,S, and positive diagonal matrices G1,G2,G3,G5, such that the conditions hold as follows:
[ˆΠu∗ˆΓau−ˆΛu]<0, | (3.30) |
eαT[ˆΠλc1+dwλ13(1−e−αT)]<λ1c2, | (3.31) |
where
ˆΠu=6∑i=1ˆΠui,ˆΠu1=2eT1PˉAe1+2eT1BuY[e5+e15]+2eT1PB0e7+2eT1PB1e8+2eT1PB2e14+2eT1PBwe16−αeT1Pe1,ˆΠu2=eT1(Q1+Q2+Q3)e1−eατmeT2Q1e2−eατMeT4Q2e4−eαˉβeT6Q3e6,ˆΠu3=−τmθ1aΓT1R1Γ1−τmθ1bˆΓT2R1ˆΓ2−τMθ2aΓT3R2Γ3−τMθ2bˆΓT4R2ˆΓ4−τMmθ3aΓT5R3Γ5−τMmθ3bˆΓT6R3ˆΓ6−τMmθ4aΓT7R3Γ7−τMmθ4bˆΓT8R3ˆΓ8+eαˉβ[−eT1R4e1+2eT1(R4−L1)e5+2eT1L1e6+eT5(−2R4+L1+LT1)e5+2eT5(R4−L1)e6+eT6R4e6],ˆΠu4=η221eT9Me9−eαη2eT14Me14,ˆΠu5=2ˆΓT9G1ˆΓ10+ˆΓT11G2ˆΓ12+ˆΓT13G3ˆΓ14+ˆΓT17G5ˆΓ18,ˆΠu6=−αeT16Se16−eT15Ωe15+σeT5Ωe5,ˆΠλ=λ2+γ1λ3+γ2λ4+γ3λ5+τmγ5λ7+τMγ6λ8+τMmγ7λ9+ˉβγ8λ10+η21γ10λ12,ˆΛu=diag{−2κ1P+κ21R1,−2κ2P+κ22R2,−2κ3P+κ23R3,−2κ4P+κ24R4},ˆΓau=[τmˆΓTa1τMˆΓTa1τMmˆΓTa1ˉβˆΓTa1]T,ˆΓa1=[ˆΓa11ˆΓa12],ˆΓa11=[PA01×3BuY01×3PB0PB1],ˆΓa12=[01×3PB2BuYPBw],ˆΓ2=[ϵ11eT2+ϵ12eT1−τmeT10]T,ˆΓ4=[ϵ21eT4+ϵ22eT1−τMeT11]T,ˆΓ6=[ϵ31eT3+ϵ32eT2−τMmeT12]T,ˆΓ8=[ϵ41eT4+ϵ42eT3−τMmeT13]T,ˆΓ9=[eT7−eT1WTFTM]T,ˆΓ10=[FPWe1−e7],ˆΓ11=[eT8−eT3WTFTM]T,ˆΓ12=[FPWe3−e8],ˆΓ13=[eT7−eT8−eT1WTFTM+eT3WTFTM]T,ˆΓ14=[FPWe1−FPWe3−e7+e8],ˆΓ17=[eT9−eT1WTHTM]T,ˆΓ18=[HPWe1−e9], |
where P=L1diag{P1,P2}LT1, P1∈Rm×m,P2∈R(n−m)×(n−m). The other matrices are given in Theorem 3.1. The gain of the controller can be determined as follows:
K=P−1kY,Pk=(Bu0L2)−1P1Bu0L2, | (3.32) |
in which Bu0 and L2 are defined in Assumption (A5).
Remark 3.2. The problem of NNs with a time-varying delay and cyber-attacks under the event-triggered framework using H∞ control was investigated by Zha et al. in [22]. In [30], Liu et al. presented a state estimation method for T-S fuzzy neural networks under stochastic cyber-attacks and an event-triggered scheme. However, previous works mainly focused on the asymptotic stability of NNs and did not address finite-time stability for GNNs. Asymptotic stability refers to the long-term behavior of a system, whereas finite-time stability is concerned with short-term behavior. Thus, this article aims to tackle the finite-time bounded problem of GNNs with decentralized event-triggered communication and cyber-attacks. The proposed decentralized event-triggered scheme enhances system effectiveness and minimizes network transmissions, resulting in a more efficient and secure system.
A simulation example is presented in this section to showcase the effectiveness and superiority of the theoretical method on the finite-time decentralized event-triggered feedback control problem. The parameters of the system (2.1) are given as follows:
ˉA=[−0.5000−0.1000−0.1],B0=[0.20.20.3−0.20.30.1−0.3−0.15−0.2],B1=[0.10.20−0.10.20.1−0.20−0.3],B2=[0.150.30.15−0.150.250.15−0.30.1−0.2],Bw=[0.50000.50000.5],Bu=[0.10000.20000.1],W=diag{1,1,1},Fm=diag{0,0,0},FP=diag{0.03,0.06,0.03},Gm=Fm,Gp=diag{0.03,0.06,0.03},Hm=Fm,Hp=diag{0.04,0.04,0.04},f(x)=[tanh(0.03x1(t))tanh(0.06x2(t))tanh(0.03x3(t))] and h(x)=[tanh(0.04x1(t))tanh(0.04x2(t))tanh(0.04x3(t))]. |
The function of cyber-attacks is given by g(x)=[tanh(0.03x1(t))tanh(0.06x2(t))tanh(0.03x3(t))]. Furthermore, the selected initial condition for generating the simulation results is given by x(0)=[−1.1−0.50.8]T.
Two cases will be analyzed for delayed GNNs. The first case considers both the event-triggered scheme and the cyber-attacks in delayed GNNs (2.6). The second case, on the other hand, looks at the event-triggered scheme used in delayed GNNs without cyber-attacks (3.29).
Case Ⅰ: In this case, we investigate the effects of both the event-triggered method and cyber-attacks on delayed GNNs (2.6). Assuming that the following parameter values are used: c1=2.1,T=50,α=0.3,dw=0.5,ˉβ=0.5,ˉd=0.5,ˉρ=0.1,σ=0.1,κi=1 (for i=1,2,3,...,5), τm=0.25, τM=0.9, τ(t)=0.7|sin(t)|+0.25, η1=0.1, η2=0.7, η1(t)=0.4+0.3sin(t), η2(t)=0.5+0.2sin(t), and an external disturbance given by 0.5e−0.5tsin(t). We solve the LMIs in Theorem 3.2 to obtain a feasible solution that guarantees finite-time boundedness with respect to (c1,c2,T,X,dw).
Applying (3.25), (3.26) and (3.27), we derive the corresponding minimum allowable lower bounds (MALBs) of c2=5.1788 and control gain as follows:
K=[−0.0235−0.01160.0236−0.0092−0.9716−0.00480.0142−0.0007−0.2283]. |
We show the effectiveness of our results in Case Ⅰ. Figure 2 illustrates the state responses of x(t) for the delayed GNNs (2.6) without u(t). The responses of the state variable x(t) and the time history of xT(t)Xx(t) in Case Ⅰ of the delayed GNNs with cyber-attacks (2.6) are depicted in Figures 3 and 4, respectively. Furthermore, the computed MALBs of c2 for different c1 are presented in Table 2. From the table, we can see that the MALBs of c2 from our results increase as c1 increases. Based on the simulation results presented above, it has been determined that the event-triggered state feedback control scheme for delayed GNNs (2.6) is stochastically finite-time bounded within a specified time interval. This conclusion remains valid even in the presence of cyber-attacks and gains fluctuations.
c1 | 1.2 | 1.3 | 1.4 | 1.5 | 1.6 | 1.7 | 1.8 | 1.9 | 2.0 | 2.1 |
c2 | 3.1058 | 3.3361 | 3.5674 | 3.7970 | 4.0288 | 4.2617 | 4.4885 | 4.7190 | 4.9508 | 5.1788 |
Case Ⅱ: This case focuses on delayed GNNs (3.29) under the event-triggered scheme without considering cyber-attacks. Assuming that the following parameter values are used: c1=2.1,T=50,α=0.3,dw=0.5,ˉβ=0.5,ˉd=0.5,ˉρ=0.1,σ=0.1,κi=1 (for i=1,2,3,...,5), τm=0.25, τM=0.9, τ(t)=0.7|sin(t)|+0.25, η1=0.1, η2=0.7, η1(t)=0.4+0.3sin(t), η2(t)=0.5+0.2sin(t), and an external disturbance given by 0.5e−0.5tsin(t). We solve the LMIs in Corollary 3.3 to obtain a feasible solution that guarantees finite-time boundedness with respect to (c1,c2,T,X,dw).
Applying (3.30), (3.31) and (3.32), we derive the corresponding MALBs of c2=3.2378 and control gain as follows
K=[−0.2941−0.1437−0.00080.1203−1.4131−0.26610.1263−0.0001−1.2606]. |
We present the effectiveness of our findings in Case Ⅱ. The response of the state variable x(t) and the time history of xT(t)Xx(t) in Case Ⅱ of the delayed GNNs without cyber-attacks (3.29) are illustrated in Figures 5 and 6, respectively. Additionally, we provide the computed MALBs of c2 for different c1 in Table 3. The table reveals that as c1 increases, the MALB of c2 also increases according to our findings. The simulation results above confirm that the event-triggered state feedback control scheme for delayed GNNs without cyber-attacks (3.29) is stochastically finite-time bounded within a specified time interval.
c1 | 1.2 | 1.3 | 1.4 | 1.5 | 1.6 | 1.7 | 1.8 | 1.9 | 2.0 | 2.1 |
c2 | 1.9536 | 2.0963 | 2.2390 | 2.3817 | 2.5344 | 2.6670 | 2.8097 | 2.9524 | 3.0951 | 3.2378 |
Remark 4.1. Figure 5 illustrates the state responses of the GNNs, represented by the variable x(t), in the absence of cyber-attacks. The graph displays three distinct curves, each corresponding to a specific experimental condition. The first curve represents the state response of the GNNs under normal operating conditions. The second curve represents the state response of the GNNs when subjected to external disturbances. The third curve demonstrates the state response of the GNNs when variations are introduced into the system. By examining these three curves, we can gain a comprehensive understanding of the GNNs' behavior under different experimental conditions without the presence of cyber-attacks.
This article proposes the decentralized event-triggered method and feedback controller to ensure the finite-time boundedness of GNNs with mixed interval time-varying delays and stochastic cyber-attacks. By the Lyapunov-Krasovskii stability theory, we apply the integral inequality with the exponential function to estimate the derivative of the LKFs. We also present new sufficient conditions in the form of linear matrix inequalities. The event-triggered approach reduces the network's resource utilization and transmission burden, while the random cyber-attacks are described applying Bernoulli distributed variables. A numerical example is provided to demonstrate the effectiveness and advantages of the proposed control scheme. Additionally, this research can be expanded in the future to include various dynamic systems, such as uncertain NNs [40], complex networks [41], neutral high-order Hopfield NNs [42], neutral-type NNs [43], quaternion-valued neural networks [44], spiking NNs [45], memristive NNs [46], stochastic memristive NNs [47] and synchronization of Lur'e Systems [48]. By focusing on these research directions, the proposed method can be further enhanced to achieve improved performance such as passivity [8], dissipativity [9], H∞ [5,22,25,26], and extended dissipative performances [12,15,16], even in the presence of cyber-attacks. These advancements will greatly contribute to the development of more robust and high-performing control systems specifically designed for networked applications.
The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.
This research was supported by the Fundamental Fund of Khon Kaen University. The research on finite-time decentralized event-triggered feedback control for generalized neural networks with mixed interval time-varying delays and cyber-attacks by Khon Kaen University has received funding support from the National Science, Research and Innovation Fund or NSRF.
The authors declare that there is no conflict of interests regarding the publication of this paper.
[1] |
Nygårds M, Bhattacharya A, Krishnan S (2014) Optimizing shear strength profiles in paperboard for better crease formation. Nord Pulp Pap Res J 29: 510–520. https://doi.org/10.3183/npprj-2014-29-03-p510-520 doi: 10.3183/npprj-2014-29-03-p510-520
![]() |
[2] |
Marin G, Nygårds M, Östlund S (2022) Experimental quantification of differences in damage due to in‐plane tensile test and bending of paperboard. Packag Technol Sci 35: 69–80. https://doi.org/10.1002/pts.2608 doi: 10.1002/pts.2608
![]() |
[3] | Csavajda P, Böröcz P, Mojzes Á, et al. (2017) The effect of creasing lines on the compression strength of adjustable height corrugated boxes. J Appl Packag Res 9: 15–22. |
[4] |
Hämäläinen P, Hallbäck N, Gåård A, et al. (2017) On the determination of transverse shear properties of paper using the short span compression test. Mech Mater 107: 22–30. https://doi.org/10.1016/j.mechmat.2017.01.012 doi: 10.1016/j.mechmat.2017.01.012
![]() |
[5] |
Robertsson K, Borgqvist E, Wallin M, et al. (2018) Efficient and accurate simulation of the packaging forming process. Packag Technol Sci 31: 1–10. https://doi.org/10.1002/pts.2383 doi: 10.1002/pts.2340
![]() |
[6] |
Viguié J, Dumont PJJ (2013) Analytical post-buckling model of corrugated board panels using digital image correlation measurements. Compos Struct 101: 243–254. https://doi.org/10.1016/j.compstruct.2013.01.023 doi: 10.1016/j.compstruct.2013.01.023
![]() |
[7] |
Luong VD, Abbès B, Abbès F, et al. (2019) Experimental characterisation and finite element modelling of paperboard for the design of paperboard packaging. IOP Conf Ser-Mater Sci Eng 540: 1–6. https://doi.org/10.1088/1757-899X/540/1/012014 doi: 10.1088/1757-899X/540/1/012014
![]() |
[8] |
Ristinmaa M, Ottosen NS, Korin C (2012) Analytical prediction of package collapse loads-basic considerations. Nord Pulp Pap Res J 27: 806–813. https://doi.org/10.3183/npprj-2012-27-04-p806-813 doi: 10.3183/npprj-2012-27-04-p806-813
![]() |
[9] |
Tanninen P, Leminen V, Eskelinen H, et al. (2015) Controlling the folding of the blank in paperboard tray press forming. BioResources 10: 5191–5202. https://doi.org/10.15376/biores.10.3.5191-5202 doi: 10.15376/biores.10.3.5191-5202
![]() |
[10] |
Awais M, Sorvari J, Tanninen P, et al. (2017) Finite element analysis of the press forming process. Int J Mech Sci 131–132:767–775. https://doi.org/10.1016/j.ijmecsci.2017.07.053 doi: 10.1016/j.ijmecsci.2017.07.053
![]() |
[11] |
Bonnet N, Viguié J, Beneventi D, et al. (2023) Reinforcing folding board boxes by printing a PLA patterned grid on their panels: A new approach for lightweighting stiff packaging. Packag Technol Sci 36: 211–218. https://doi.org/10.1002/pts.2705 doi: 10.1002/pts.2705
![]() |
[12] |
Leminen V, Tanninen P, Mäkelä P, et al. (2013) Combined effect of paperboard thickness and mould clearance in the press forming process. BioResources 8: 5701–5714. https://doi.org/10.15376/biores.8.4.5701-5714 doi: 10.15376/biores.8.4.5701-5714
![]() |
[13] |
Lindberg G, Kulachenko A (2022) Tray forming operation of paperboard: A case study using implicit finite element analysis. Packag Technol Sci 35: 183–198. https://doi.org/10.1002/pts.2619 doi: 10.1002/pts.2619
![]() |
[14] |
Gu Z, Hui J, Wang J, et al. (2021) Modelling multiple impacts on the out‐of‐plane cushioning properties of honeycomb paperboard. Packag Technol Sci 34: 541–556. https://doi.org/10.1002/pts.2593 doi: 10.1002/pts.2593
![]() |
[15] | Nagasawa S, Fukuzawa Y, Yamaguchi D, et al. (2001) Deformation characteristics on creasing of paperboard under shallow indentation. The 10th International Congress of Fracture (ICF10), Honolulu, USA. |
[16] |
Nagasawa S, Endo R, Fukuzawa Y, et al. (2008) Creasing characteristic of aluminum foil coated paperboard. J Mater Process Technol 201: 401–407. https://doi.org/10.1016/j.jmatprotec.2007.11.253 doi: 10.1016/j.jmatprotec.2007.11.253
![]() |
[17] | Stenberg N, Fellers C, Östlund S (2001) Measuring the stress-strain properties of paperboard in the thickness direction. J Pulp Pap Sci 27: 213–221. |
[18] |
Nagasawa S, Fukuzawa Y, Yamaguchi T, et al. (2003) Effect of crease depth and crease deviation on folding deformation characteristics of coated paperboard. J Mater Process Technol 140: 157–162. https://doi.org/10.1016/S0924-0136(03)00825-2 doi: 10.1016/S0924-0136(03)00825-2
![]() |
[19] | Nagasawa S, Fukushima Y, Sudo A, et al. (2004) Effect of tip shape of creasing rule on creasing deformation characteristics of paperboard. J Japan Soc Technol Plast 45: 178–182 (in Japanese). |
[20] | Nagasawa S, Murayama M, Sudo A, et al. (2004b) Effect of creaser deviation on folding deformation characteristics of creased paperboard. J Japan Soc Technol Plast 45: 239–243 (in Japanese). |
[21] |
Nagasawa S, Nasruddin M, Shiga Y (2011) Bending moment characteristics on repeated folding motion of coated paperboard scored by round-edge knife. J Adv Mech Des Syst Manuf 5: 385–394. https://doi.org/10.1299/jamdsm.5.385 doi: 10.1299/jamdsm.5.385
![]() |
[22] |
Li Y, Edward S, Reese S, et al. (2016) Anisotropic elastic-plastic deformation of paper : In-plane model. Int J Solids Struct 100–101:286–296. https://doi.org/10.1016/j.ijsolstr.2016.08.024 doi: 10.1016/j.ijsolstr.2016.08.024
![]() |
[23] |
Li Y, Edward S, Reese S, et al. (2018) Anisotropic elastic-plastic deformation of paper : Out-of-plane model. Int J Solids Struct 130–131: 172–182. https://doi.org/10.1016/j.ijsolstr.2017.10.003 doi: 10.1016/j.ijsolstr.2017.10.003
![]() |
[24] | Hine DJ (1987) The rigidity/flexability balance in the creasing of paper based boards. Appita 40: 375–378. |
[25] |
Cavlin SI (1988) The unique convertibility of paperboard. Packag Technol Sci 1: 77–92. https://doi.org/10.1002/pts.2770010206 doi: 10.1002/pts.2770010206
![]() |
[26] |
Cavlin SI, Dunder I, Edholm B (1997) Creasability testing by inclined rules—a base for standardized specification of paperboard. Packag Technol Sci 10: 191–207. https://doi.org/10.1002/(SICI)1099-1522(199707)10:4 < 191::AID-PTS402 > 3.0.CO; 2-J doi: 10.1002/(SICI)1099-1522(199707)10:4<191::AID-PTS402>3.0.CO;2-J
![]() |
[27] |
Mrówczyński D, Garbowski T, Knitter-Piątkowska A (2021) Estimation of the compressive strength of corrugated board boxes with shifted creases on the flaps. Materials 14: 1–18. https://doi.org/10.3390/ma14185181 doi: 10.3390/ma14185181
![]() |
[28] |
Garbowski T, Gajewski T (2022) Influence of analog and digital crease lines on mechanical parameters of corrugated board and packaging. Sensors 22: 1–19. https://doi.org/10.3390/s22134800 doi: 10.1109/JSEN.2022.3226932
![]() |
[29] | Sönmez SİNAN, Dölen E, Fleming P (2011) Binder effects on the creaseability of pigment coated paperboard. Asian J Chem 23: 1193–1197. |
[30] |
Nagasawa S, Yamamoto T, Umemoto K, et al. (2020) Estimation of bending characteristics of creased paperboard using 45° tapered groove against unbalanced punch indentation. J Adv Mech Des Syst Manuf 14: 1–11. https://doi.org/10.1299/jamdsm.2020jamdsm0083 doi: 10.1299/jamdsm.2020jamdsm0083
![]() |
[31] | Hine DJ (1959) Testing boxboard creasing. Modern Packaging 8: 122–128. |
[32] |
Huang H, Hagman A, Nygårds M, et al. (2014) Quasi static analysis of creasing and folding for three paperboards. Mech Mater 69: 11–34. https://doi.org/10.1016/j.mechmat.2013.09.016 doi: 10.1016/j.mechmat.2013.09.016
![]() |
[33] |
Leminen V, Niini A, Tanninen P, et al. (2021) Comparison of creasing and scoring in the manufacturing of folding cartons. Procedia Manuf 55: 221–225. https://doi.org/10.1016/j.promfg.2021.10.031 doi: 10.1016/j.promfg.2021.10.031
![]() |
[34] | Carey K (1992) Creasing: Turning Failure into Success. Packaging Productivity 1: 1–20. |
[35] |
Carlsson L, De Ruvo A, Fellers C (1983) Bending properties of creased zones of paperboard related to interlaminar defects. J Mater Sci 18: 1365–1373. https://doi.org/10.1007/BF01111956 doi: 10.1007/BF01111956
![]() |
[36] |
Tanninen P, Matthews S, Leminen V, et al. (2021) Analysis of paperboard creasing properties with a novel device. Procedia Manuf 55: 232–237. https://doi.org/10.1016/j.promfg.2021.10.033 doi: 10.1016/j.promfg.2021.10.033
![]() |
[37] |
Nygårds M, Sundström J (2016) Comparison and analysis of in-plane compression and bending failure in paperboard. Nord Pulp Pap Res J 31: 432–440. https://doi.org/10.3183/npprj-2016-31-03-p432-440 doi: 10.3183/npprj-2016-31-03-p432-440
![]() |
[38] |
Mentrasti L, Cannella F, Pupilli M, et al. (2013) Large bending behavior of creased paperboard. Ⅰ. Experimental investigations. Int J Solids Struct 50: 3089–3096. https://doi.org/10.1016/j.ijsolstr.2013.05.018 doi: 10.1016/j.ijsolstr.2013.05.018
![]() |
[39] |
Gong Y, Zhao L, Zhang J, (2017) Delamination propagation criterion including the effect of fiber bridging for mixed-mode Ⅰ/Ⅱ delamination in CFRP multidirectional laminates. Compos Sci Technol 151: 302–309. https://doi.org/10.1016/j.compscitech.2017.09.002 doi: 10.1016/j.compscitech.2017.09.002
![]() |
[40] |
Beex LA, Peerlings RH (2012) On the influence of delamination on laminated paperboard creasing and folding. Philos T R Soc A 370: 1912–1924. https://doi.org/10.1098/rsta.2011.0408 doi: 10.1098/rsta.2011.0408
![]() |
[41] |
Alam P, Toivakka M, Carlsson R, et al. (2009) Balancing between fold-crack resistance and stiffness. J Compos Mater 43: 1265–1283. https://doi.org/10.1177/0021998308104227 doi: 10.1177/0021998308104227
![]() |
[42] | Carlsson L, Feller C, Westerlind B (1982) Finite element analysis of the creasing and bending of paper. Svensk Papperstidning 85: 121–125. |
[43] | Tryding J, Gustafsson P-J (2000) Characterization of tensile fracture properties of paper. Tappi J 83: 84–89. |
[44] |
Mäkelä P, Östlund S (2012) Cohesive crack modelling of thin sheet material exhibiting anisotropy, plasticity and large-scale damage evolution. Eng Fract Mech 79: 50–60. https://doi.org/10.1016/j.engfracmech.2011.10.001 doi: 10.1016/j.engfracmech.2011.10.001
![]() |
[45] |
Zechner J, Janko M, Kolednik O (2013) Determining the fracture resistance of thin sheet fiber composites—Paper as a model material. Compos Sci Technol 74: 43–51. https://doi.org/10.1016/j.compscitech.2012.10.007 doi: 10.1016/j.compscitech.2012.10.007
![]() |
[46] |
Tryding J, Marin G, Nygårds M, et al. (2017) Experimental and theoretical analysis of in-plane cohesive testing of paperboard. Int J Damage Mech 26: 895–918. https://doi.org/10.1177/1056789516630776 doi: 10.1177/1056789516630776
![]() |
[47] |
Ortiz M, Pandolfi A (1999) Finite-deformation irreversible cohesive elements for three-dimensional crack-propagation analysis. Int J Numer Methods Eng 44: 1267–1282. https://doi.org/10.1002/(SICI)1097-0207(19990330)44:9 < 1267::AID-NME486 > 3.0.CO; 2-7 doi: 10.1002/(SICI)1097-0207(19990330)44:9<1267::AID-NME486>3.0.CO;2-7
![]() |
[48] |
Park H, Kim S-J, Lee J, et al. (2020) Delamination behavior analysis of steel/polymer/steel high-strength laminated sheets in a V-die bending test. Int J Mech Sci 173: 105430. https://doi.org/10.1016/j.ijmecsci.2020.105430 doi: 10.1016/j.ijmecsci.2020.105430
![]() |
[49] |
Carlsson L, Fellers C, De Ruvo A (1980) The mechanism of failure in bending of paperboard. J Mater Sci 15: 2636–2642. https://doi.org/10.1007/BF00550769 doi: 10.1007/BF00550769
![]() |
[50] |
Biel A, Tryding J, Ristinmaa M, et al. (2022) Experimental evaluation of normal and shear delamination in cellulose-based materials using a cohesive zone model. Int J Solids Struct 252: 111755. https://doi.org/10.1016/j.ijsolstr.2022.111755 doi: 10.1016/j.ijsolstr.2022.111755
![]() |
[51] |
Confalonieri F, Perego U (2019) A new framework for the formulation and validation of cohesive mixed-mode delamination models. Int J Solids Struct 164: 168–190. https://doi.org/10.1016/j.ijsolstr.2018.12.032 doi: 10.1016/j.ijsolstr.2018.12.032
![]() |
[52] |
Nygårds M (2022) Relating papermaking process parameters to properties of paperboard with special attention to through-thickness design. MRS Adv 7: 789–798. https://doi.org/10.1557/s43580-022-00282-7 doi: 10.1557/s43580-022-00282-7
![]() |
[53] |
Huang H, Nygårds M (2011) Numerical and experimental investigation of paperboard folding. Nord Pulp Pap Res J 26: 452–467. https://doi.org/10.3183/npprj-2011-26-04-p452-467 doi: 10.3183/npprj-2011-26-04-p452-467
![]() |
[54] |
Nygårds M (2008) Experimental techniques for characterization of elasticplastic material properties in paperboard. Nord Pulp Pap Res J 23: 432–437. https://doi.org/10.3183/npprj-2008-23-04-p432-437 doi: 10.3183/npprj-2008-23-04-p432-437
![]() |
[55] |
Hagman A, Nygårds M (2016) Short compression testing of multi-ply paperboard, influence from shear strength. Nord Pulp Pap Res J 31: 123–134. https://doi.org/10.3183/npprj-2016-31-01-p123-134 doi: 10.3183/npprj-2016-31-01-p123-134
![]() |
[56] |
Huang H, Nygårds M (2010) A simplified material model for finite element analysis of paperboard creasing. Nord Pulp Pap Res J 25: 505–512. https://doi.org/10.3183/NPPRJ-2010-25-04-p505-512 doi: 10.3183/NPPRJ-2010-25-04-p505-512
![]() |
[57] |
Choi DD, Lavrykov SA, Ramarao BV (2012) Delamination in the scoring and folding of paperboard. Tappi J 11: 61–66. https://doi.org/10.32964/TJ11.1.61 doi: 10.32964/TJ11.1.61
![]() |
[58] |
Hagman A, Huang H, Nygårds M (2013) Investigation of shear induced failure during SCT loading of paperboards. Nord Pulp Pap Res J 28: 415–429. https://doi.org/10.3183/npprj-2013-28-03-p415-429 doi: 10.3183/npprj-2013-28-03-p415-429
![]() |
[59] |
Sudo A, Nagasawa S, Fukuzawa Y, et al. (2005) Analysis of exfoliation of laminated layers and creasing deformation of paperboard. Proc Hokuriku-Shinetsu Dist Annu Conf Japan Soc Mech Eng 047-1: 35–36 (in Japanese). https://doi.org/10.1299/jsmehs.2005.42.35 doi: 10.1299/jsmehs.2005.42.35
![]() |
[60] |
Beex LA., Peerlings RH (2009) An experimental and computational study of laminated paperboard creasing and folding. Int J Solids Struct 46: 4192–4207. https://doi.org/10.1016/j.ijsolstr.2009.08.012 doi: 10.1016/j.ijsolstr.2009.08.012
![]() |
[61] |
Nygårds M, Just M, Tryding J (2009) Experimental and numerical studies of creasing of paperboard. Int J Solids Struct 46: 2493–2505. https://doi.org/10.1016/j.ijsolstr.2009.02.014 doi: 10.1016/j.ijsolstr.2009.02.014
![]() |
[62] |
Giampieri A, Perego U, Borsari R (2011) A constitutive model for the mechanical response of the folding of creased paperboard. Int J Solids Struct 48: 2275–2287. https://doi.org/10.1016/j.ijsolstr.2011.04.002 doi: 10.1016/j.ijsolstr.2011.04.002
![]() |
[63] |
Jina W, Nagasawa S, Chaijit S (2017) Estimation of detaching resistance of a peeled in-plane layer of a white-coated paperboard using fluffing resistance and an isotropic elasticity model. J Adv Mech Des Syst Manuf 11: 1–12. https://doi.org/10.1299/jamdsm.2017jamdsm0018 doi: 10.1299/jamdsm.2017jamdsm0018
![]() |
[64] |
Jina W, Nagasawa S (2018) Finite element analysis of the folding process of creased white-coated paperboard using a combined fluffing resistance and shear yield glue model. J Adv Mech Des Syst Manuf 12: 1–12. https://doi.org/10.1299/jamdsm.2018jamdsm0063 doi: 10.1299/jamdsm.2018jamdsm0063
![]() |
[65] | MSC Software (2010a) Marc document volume A: Theory and user information. 567–568. |
[66] | Komiyama Y, Kon W, Nagasawa S, et al. (2013) Effect of structural shape of corrugated medium on flat crush characteristics of corrugated fiberboard. J Chinese Soc Mech Eng 34: 361–369. |
[67] | Wink WA (1961) The effect of relative humidity and temperature on paper properties. Tappi 44: 171A–178A. |
1. | Amina Benramdane, Nadia Mezouar, Fatna Bensaber, Salah Boulaaras, Rashid Jan, Blow-Up of Solution of Lamé Wave Equation with Fractional Damping and Logarithmic Nonlinearity Source Terms, 2023, 11, 2227-7390, 4591, 10.3390/math11224591 |
Step | Description |
1 | Initialize network parameters, event-triggering thresholds and cyber-attack detection |
mechanisms | |
2 | Sample input signals, check event-triggering conditions and detect potential |
cyber-attacks | |
3 | Update network states, transmit relevant information among nodes and implement |
countermeasures against cyber-attacks |
c1 | 1.2 | 1.3 | 1.4 | 1.5 | 1.6 | 1.7 | 1.8 | 1.9 | 2.0 | 2.1 |
c2 | 3.1058 | 3.3361 | 3.5674 | 3.7970 | 4.0288 | 4.2617 | 4.4885 | 4.7190 | 4.9508 | 5.1788 |
c1 | 1.2 | 1.3 | 1.4 | 1.5 | 1.6 | 1.7 | 1.8 | 1.9 | 2.0 | 2.1 |
c2 | 1.9536 | 2.0963 | 2.2390 | 2.3817 | 2.5344 | 2.6670 | 2.8097 | 2.9524 | 3.0951 | 3.2378 |
Step | Description |
1 | Initialize network parameters, event-triggering thresholds and cyber-attack detection |
mechanisms | |
2 | Sample input signals, check event-triggering conditions and detect potential |
cyber-attacks | |
3 | Update network states, transmit relevant information among nodes and implement |
countermeasures against cyber-attacks |
c1 | 1.2 | 1.3 | 1.4 | 1.5 | 1.6 | 1.7 | 1.8 | 1.9 | 2.0 | 2.1 |
c2 | 3.1058 | 3.3361 | 3.5674 | 3.7970 | 4.0288 | 4.2617 | 4.4885 | 4.7190 | 4.9508 | 5.1788 |
c1 | 1.2 | 1.3 | 1.4 | 1.5 | 1.6 | 1.7 | 1.8 | 1.9 | 2.0 | 2.1 |
c2 | 1.9536 | 2.0963 | 2.2390 | 2.3817 | 2.5344 | 2.6670 | 2.8097 | 2.9524 | 3.0951 | 3.2378 |