Quantized Stabilization for T-S Fuzzy Systems With Hybrid-Triggered Mechanism and Stochastic Cyber-Attacks
This paper examines quantized stabilization for Takagi-Sugeno (T-S) fuzzy systems with a hybrid-triggered mechanism and stochastic cyber-attacks. A hybrid-triggered scheme, which is described by a Bernoulli variable, is adopted to mitigate the burden of the network. By taking the effect of the hybri...
Saved in:
Published in | IEEE transactions on fuzzy systems Vol. 26; no. 6; pp. 3820 - 3834 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.12.2018
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This paper examines quantized stabilization for Takagi-Sugeno (T-S) fuzzy systems with a hybrid-triggered mechanism and stochastic cyber-attacks. A hybrid-triggered scheme, which is described by a Bernoulli variable, is adopted to mitigate the burden of the network. By taking the effect of the hybrid-triggered scheme and stochastic cyber-attacks into consideration, a mathematical model for a closed-loop control system with quantization is constructed. Theorems for main results are developed to guarantee the asymptotical stability of networked control systems by using Lyapunov stability theory and linear matrix inequality techniques. Based on the derived sufficient conditions in theorems, the controller gains are presented in an explicit form. Finally, two practical examples demonstrate the feasibility of designed algorithm. |
---|---|
AbstractList | This paper examines quantized stabilization for Takagi-Sugeno (T-S) fuzzy systems with a hybrid-triggered mechanism and stochastic cyber-attacks. A hybrid-triggered scheme, which is described by a Bernoulli variable, is adopted to mitigate the burden of the network. By taking the effect of the hybrid-triggered scheme and stochastic cyber-attacks into consideration, a mathematical model for a closed-loop control system with quantization is constructed. Theorems for main results are developed to guarantee the asymptotical stability of networked control systems by using Lyapunov stability theory and linear matrix inequality techniques. Based on the derived sufficient conditions in theorems, the controller gains are presented in an explicit form. Finally, two practical examples demonstrate the feasibility of designed algorithm. |
Author | Fei, Shumin Liu, Jinliang Tian, Engang Wei, Lili Xie, Xiangpeng |
Author_xml | – sequence: 1 givenname: Jinliang orcidid: 0000-0001-5489-0246 surname: Liu fullname: Liu, Jinliang email: liujinliang@vip.163.com organization: College of Information Engineering, Nanjing University of Finance and Economics, Nanjing, China – sequence: 2 givenname: Lili surname: Wei fullname: Wei, Lili email: wll150623@163.com organization: College of Information Engineering, Nanjing University of Finance and Economics, Nanjing, China – sequence: 3 givenname: Xiangpeng orcidid: 0000-0003-4822-3134 surname: Xie fullname: Xie, Xiangpeng email: xiexiangpeng1953@163.com organization: Institute of Advanced Technology, Nanjing University of Posts and Telecommunications, Jiangsu, China – sequence: 4 givenname: Engang surname: Tian fullname: Tian, Engang email: teg@njnu.edu.cn organization: School of Electrical and Automation Engineering, Nanjing Normal University, Nanjing, China – sequence: 5 givenname: Shumin orcidid: 0000-0003-1787-7653 surname: Fei fullname: Fei, Shumin email: smfei@seu.edu.cn organization: School of Electrical and Automation Engineering, Nanjing Normal University, Nanjing, China |
BookMark | eNp9kM9LwzAUx4NMcJv-A3oJeM5M0rRNjmM4J0xE1iHsUtI03TK3dibpof3r7X7gwYOn9x68z3t8PwPQK6tSA3BP8IgQLJ6S6XK1GlFM-IhyJmJMr0CfCEYQxgHrdT2OAhTFOLoBA-e2GBMWEt4H249alt60OocLLzOzM630piphUVmYoAWc1m3bwEXjvN47-Gn8Bs6azJocJdas19p25JtWG1kat4eyPN6putF5o-CkybRFY--l-nK34LqQO6fvLnUIltPnZDJD8_eX18l4jhQVoUc5KRgJGSU6j0gXjmSS51nOscqoikKKBeVEsZgVecB1FAmhlQgVz8M4kgwHwRA8nu8ebPVda-fTbVXbsnuZUsLiuAtOcbdFz1vKVs5ZXaQHa_bSNinB6dFpenKaHp2mF6cdxP9AyviTL2-l2f2PPpxRo7X-_cUDQWPOgx8RkIcr |
CODEN | IEFSEV |
CitedBy_id | crossref_primary_10_1109_TSMC_2022_3213516 crossref_primary_10_1177_15501329221090469 crossref_primary_10_1002_acs_3242 crossref_primary_10_1080_00207721_2020_1858205 crossref_primary_10_1002_acs_3241 crossref_primary_10_1016_j_isatra_2019_02_036 crossref_primary_10_1080_00207721_2024_2365433 crossref_primary_10_1109_TCYB_2024_3518578 crossref_primary_10_1016_j_neucom_2019_06_069 crossref_primary_10_1016_j_jfranklin_2024_107361 crossref_primary_10_1007_s40815_018_0593_1 crossref_primary_10_1016_j_ins_2019_04_027 crossref_primary_10_1016_j_jfranklin_2024_107365 crossref_primary_10_1109_TCSI_2019_2930572 crossref_primary_10_1016_j_jfranklin_2019_10_013 crossref_primary_10_1016_j_jfranklin_2024_107089 crossref_primary_10_1109_TFUZZ_2023_3269786 crossref_primary_10_1109_TSMC_2020_2980312 crossref_primary_10_1109_TIV_2023_3281578 crossref_primary_10_1016_j_isatra_2023_09_032 crossref_primary_10_1002_rnc_4837 crossref_primary_10_1007_s11432_019_2691_4 crossref_primary_10_1007_s11071_021_06825_1 crossref_primary_10_1016_j_isatra_2018_12_032 crossref_primary_10_1016_j_jfranklin_2019_08_020 crossref_primary_10_1109_JSYST_2022_3204754 crossref_primary_10_1016_j_neucom_2020_01_022 crossref_primary_10_1016_j_isatra_2019_01_006 crossref_primary_10_1016_j_ins_2021_01_063 crossref_primary_10_1007_s12555_019_0580_9 crossref_primary_10_1016_j_jfranklin_2019_11_046 crossref_primary_10_1016_j_ins_2020_05_140 crossref_primary_10_1109_TCSI_2021_3135911 crossref_primary_10_1109_TCYB_2021_3049508 crossref_primary_10_1016_j_amc_2020_125359 crossref_primary_10_1109_TSMC_2019_2963143 crossref_primary_10_1109_ACCESS_2019_2942958 crossref_primary_10_3390_math12020203 crossref_primary_10_1155_2018_5365493 crossref_primary_10_1049_cth2_12048 crossref_primary_10_1016_j_cnsns_2024_108091 crossref_primary_10_1016_j_jfranklin_2019_12_034 crossref_primary_10_1109_TSMC_2019_2931530 crossref_primary_10_1007_s11071_021_07008_8 crossref_primary_10_1016_j_jfranklin_2024_107504 crossref_primary_10_1109_TSMC_2018_2875484 crossref_primary_10_1002_rnc_6801 crossref_primary_10_1016_j_jfranklin_2019_01_021 crossref_primary_10_1016_j_neucom_2020_01_077 crossref_primary_10_1002_asjc_3553 crossref_primary_10_1109_ACCESS_2019_2935507 crossref_primary_10_1109_JSYST_2021_3064833 crossref_primary_10_1002_acs_3785 crossref_primary_10_3390_s22155674 crossref_primary_10_1109_TSMC_2018_2888633 crossref_primary_10_1109_TCYB_2019_2917929 crossref_primary_10_1109_TVT_2023_3312439 crossref_primary_10_1016_j_jfranklin_2024_107188 crossref_primary_10_1016_j_jfranklin_2020_03_049 crossref_primary_10_1002_rnc_7343 crossref_primary_10_1007_s40815_022_01436_3 crossref_primary_10_1109_TCYB_2020_2970556 crossref_primary_10_1109_TFUZZ_2020_3033851 crossref_primary_10_1016_j_jfranklin_2019_12_001 crossref_primary_10_1016_j_jfranklin_2021_02_014 crossref_primary_10_1177_0142331219900757 crossref_primary_10_1002_acs_3834 crossref_primary_10_1016_j_jfranklin_2019_06_014 crossref_primary_10_1109_ACCESS_2019_2891772 crossref_primary_10_3390_fractalfract8050290 crossref_primary_10_1016_j_jfranklin_2019_02_037 crossref_primary_10_1109_TSMC_2022_3146282 crossref_primary_10_1109_ACCESS_2023_3342015 crossref_primary_10_1109_TCYB_2020_3003752 crossref_primary_10_1002_rnc_6760 crossref_primary_10_1007_s00521_023_08231_7 crossref_primary_10_1049_iet_cta_2018_5868 crossref_primary_10_1002_rnc_6121 crossref_primary_10_1016_j_amc_2019_124841 crossref_primary_10_1016_j_nahs_2019_03_005 crossref_primary_10_1109_TCNS_2022_3153873 crossref_primary_10_1016_j_jfranklin_2022_09_051 crossref_primary_10_1016_j_isatra_2019_11_040 crossref_primary_10_1109_TCYB_2020_2999199 crossref_primary_10_1109_ACCESS_2019_2936586 crossref_primary_10_1109_TITS_2024_3476040 crossref_primary_10_1016_j_jfranklin_2022_06_003 crossref_primary_10_1109_TFUZZ_2019_2960719 crossref_primary_10_1109_TII_2021_3116165 crossref_primary_10_1109_TSMC_2020_3035768 crossref_primary_10_1109_TFUZZ_2020_3021699 crossref_primary_10_1007_s11071_020_05933_8 crossref_primary_10_1016_j_amc_2020_125788 crossref_primary_10_1016_j_jfranklin_2021_03_020 crossref_primary_10_1007_s40815_022_01380_2 crossref_primary_10_1016_j_jfranklin_2020_01_017 crossref_primary_10_1088_1674_1056_ab38a8 crossref_primary_10_1109_ACCESS_2020_3028366 crossref_primary_10_1016_j_jfranklin_2019_09_037 crossref_primary_10_1109_TFUZZ_2021_3095387 crossref_primary_10_1109_TSMC_2019_2895060 crossref_primary_10_1002_rnc_5462 crossref_primary_10_1016_j_jfranklin_2020_03_024 crossref_primary_10_1109_TSMC_2023_3277554 crossref_primary_10_1177_01423312221122471 crossref_primary_10_1109_TCYB_2021_3105058 crossref_primary_10_1109_TSMC_2024_3406563 crossref_primary_10_1109_TCYB_2019_2903817 crossref_primary_10_1109_TNSE_2022_3217618 crossref_primary_10_1007_s40313_024_01073_1 crossref_primary_10_1109_TFUZZ_2020_2975495 crossref_primary_10_1177_01423312231193946 crossref_primary_10_1016_j_automatica_2021_110027 crossref_primary_10_1016_j_neucom_2018_08_019 crossref_primary_10_1016_j_amc_2020_125284 crossref_primary_10_1016_j_neucom_2019_06_034 crossref_primary_10_1109_TNNLS_2022_3141052 crossref_primary_10_1080_21642583_2021_1907259 crossref_primary_10_1109_ACCESS_2022_3194114 crossref_primary_10_1016_j_amc_2018_11_019 crossref_primary_10_1016_j_isatra_2019_02_001 crossref_primary_10_1109_ACCESS_2020_3043238 crossref_primary_10_1109_ACCESS_2020_3008815 crossref_primary_10_1007_s40815_019_00778_9 crossref_primary_10_1109_TNSE_2022_3223978 crossref_primary_10_1038_s41598_020_67925_3 crossref_primary_10_1109_TCSI_2019_2920967 crossref_primary_10_1109_TFUZZ_2018_2873968 crossref_primary_10_1002_acs_3625 crossref_primary_10_3390_electronics10222736 crossref_primary_10_1109_TCSI_2019_2949014 crossref_primary_10_1109_TFUZZ_2021_3111453 crossref_primary_10_1049_iet_cta_2018_5048 crossref_primary_10_1002_rnc_5119 crossref_primary_10_1007_s12555_018_0173_z crossref_primary_10_1016_j_asoc_2020_106635 crossref_primary_10_1016_j_amc_2021_126265 crossref_primary_10_1109_TSMC_2020_2970040 crossref_primary_10_1109_TCYB_2018_2878419 crossref_primary_10_1002_oca_2743 crossref_primary_10_1109_TFUZZ_2022_3162149 crossref_primary_10_1002_asjc_2827 crossref_primary_10_1109_TNSE_2023_3243253 crossref_primary_10_1007_s11071_020_05635_1 crossref_primary_10_1109_TNNLS_2020_3030638 crossref_primary_10_1007_s40815_018_0590_4 crossref_primary_10_1109_TFUZZ_2020_2990772 crossref_primary_10_1002_rnc_6578 crossref_primary_10_1109_TFUZZ_2021_3063813 crossref_primary_10_1002_rnc_4675 crossref_primary_10_1016_j_jfranklin_2020_03_004 crossref_primary_10_1002_rnc_5363 crossref_primary_10_1016_j_nahs_2018_08_007 crossref_primary_10_1002_rnc_4815 crossref_primary_10_1016_j_jfranklin_2019_03_045 crossref_primary_10_1177_09596518241276228 crossref_primary_10_1016_j_ins_2022_05_087 crossref_primary_10_1002_rnc_4898 crossref_primary_10_1109_TFUZZ_2024_3427634 crossref_primary_10_1007_s00034_021_01744_3 crossref_primary_10_1007_s12555_019_0742_9 crossref_primary_10_1007_s11071_022_07285_x crossref_primary_10_1007_s11071_024_10081_4 crossref_primary_10_1016_j_jfranklin_2019_09_002 crossref_primary_10_1016_j_jfranklin_2024_107096 crossref_primary_10_1109_TCSI_2021_3058216 crossref_primary_10_1016_j_isatra_2021_03_034 crossref_primary_10_1016_j_jfranklin_2019_09_006 crossref_primary_10_1016_j_isatra_2018_07_018 crossref_primary_10_1016_j_amc_2022_126949 crossref_primary_10_1109_TFUZZ_2024_3494016 |
Cites_doi | 10.1016/j.automatica.2016.12.026 10.1016/j.amc.2016.12.017 10.1016/j.ins.2014.12.012 10.1016/j.fss.2010.03.008 10.1109/TFUZZ.2008.917293 10.1016/j.jfranklin.2017.02.014 10.1016/j.isatra.2011.09.002 10.1016/j.automatica.2016.12.020 10.1109/TCYB.2017.2659698 10.1016/j.automatica.2004.12.011 10.1109/TAC.2012.2206694 10.1049/iet-cta.2009.0441 10.1016/j.ins.2013.03.042 10.1109/TSMCA.2008.2010787 10.1016/j.fss.2017.05.010 10.1016/j.ins.2018.04.018 10.1007/s11071-017-4002-3 10.1016/j.jfranklin.2015.12.009 10.1109/TSMC.2016.2572145 10.1016/j.automatica.2017.10.014 10.1016/S0165-0114(98)00360-1 10.1016/0167-6911(92)90097-C 10.1109/TIE.2014.2351379 10.1016/j.ins.2015.06.034 10.1109/TIE.2015.2475515 10.1016/j.fss.2009.10.025 10.1016/j.fss.2016.12.011 10.1016/j.jfranklin.2014.10.004 10.1016/S0005-1098(03)00151-1 10.1109/TFUZZ.2016.2612266 10.1109/TNNLS.2015.2397935 10.1109/TAC.2004.828317 10.1016/j.neucom.2015.12.049 10.1016/j.automatica.2017.02.029 10.1016/j.jfranklin.2017.10.007 10.1109/TSMCB.2008.2007496 10.1016/j.automatica.2015.11.008 10.1109/TSMC.1985.6313399 10.1109/TFUZZ.2012.2199994 10.1049/iet-cta.2016.0392 10.1016/j.amc.2017.09.007 10.1016/j.neucom.2016.09.009 10.1016/j.jfranklin.2016.05.019 10.1016/j.isatra.2017.05.001 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1109/TFUZZ.2018.2849702 |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1941-0034 |
EndPage | 3834 |
ExternalDocumentID | 10_1109_TFUZZ_2018_2849702 8392788 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61403185; 61773218 funderid: 10.13039/501100001809 – fundername: Natural Science Foundation of Jiangsu Province of China grantid: BK20171481; BK20161561 |
GroupedDBID | -~X .DC 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 ICLAB IFIPE IFJZH IPLJI JAVBF LAI M43 O9- OCL P2P PQQKQ RIA RIE RNS TAE TN5 VH1 AAYOK AAYXX CITATION RIG 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c295t-d1f415421ed611101ba8dbd80cb2c65209281c474fd38e6699ec95c8d576a4033 |
IEDL.DBID | RIE |
ISSN | 1063-6706 |
IngestDate | Sun Jun 29 16:15:26 EDT 2025 Tue Jul 01 01:55:27 EDT 2025 Thu Apr 24 23:07:22 EDT 2025 Wed Aug 27 02:51:28 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 6 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c295t-d1f415421ed611101ba8dbd80cb2c65209281c474fd38e6699ec95c8d576a4033 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0001-5489-0246 0000-0003-1787-7653 0000-0003-4822-3134 |
PQID | 2147745120 |
PQPubID | 85428 |
PageCount | 15 |
ParticipantIDs | crossref_primary_10_1109_TFUZZ_2018_2849702 ieee_primary_8392788 crossref_citationtrail_10_1109_TFUZZ_2018_2849702 proquest_journals_2147745120 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2018-Dec. 2018-12-00 20181201 |
PublicationDateYYYYMMDD | 2018-12-01 |
PublicationDate_xml | – month: 12 year: 2018 text: 2018-Dec. |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on fuzzy systems |
PublicationTitleAbbrev | TFUZZ |
PublicationYear | 2018 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref35 ref13 ref34 ref12 ref37 ref15 ref36 ref14 ref30 ref33 ref11 ref10 dong (ref16) 2013; 58 ref2 ref1 ref38 yue (ref32) 2005; 41 ref19 ref18 yue (ref39) 2009; 39 ref46 ref24 ref45 ref23 ref25 ref20 ref42 ref41 ref22 ref44 ref21 ref43 liu (ref26) 2018; 91 ref27 ref8 ref7 hu (ref17) 2012; 51 ref9 ref4 ref3 ref6 ref5 ref40 ding (ref29) 2017; 78 wang (ref31) 2018; 355 nishino (ref28) 2014; 47 |
References_xml | – volume: 78 start-page: 231 year: 2017 ident: ref29 article-title: Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks publication-title: Automatica doi: 10.1016/j.automatica.2016.12.026 – ident: ref5 doi: 10.1016/j.amc.2016.12.017 – ident: ref9 doi: 10.1016/j.ins.2014.12.012 – ident: ref44 doi: 10.1016/j.fss.2010.03.008 – ident: ref45 doi: 10.1109/TFUZZ.2008.917293 – ident: ref12 doi: 10.1016/j.jfranklin.2017.02.014 – volume: 51 start-page: 153 year: 2012 ident: ref17 article-title: Event-triggered control design of linear networked systems with quantizations. publication-title: ISA Trans doi: 10.1016/j.isatra.2011.09.002 – ident: ref30 doi: 10.1016/j.automatica.2016.12.020 – ident: ref41 doi: 10.1109/TCYB.2017.2659698 – volume: 41 start-page: 999 year: 2005 ident: ref32 article-title: Network-based robust $H_\infty$ control of systems with uncertainty publication-title: Automatica doi: 10.1016/j.automatica.2004.12.011 – volume: 58 start-page: 475 year: 2013 ident: ref16 article-title: A delay system method for designing event-triggered controllers of networked control systems publication-title: IEEE Trans Autom Control doi: 10.1109/TAC.2012.2206694 – ident: ref33 doi: 10.1049/iet-cta.2009.0441 – ident: ref18 doi: 10.1016/j.ins.2013.03.042 – ident: ref42 doi: 10.1109/TSMCA.2008.2010787 – ident: ref19 doi: 10.1016/j.fss.2017.05.010 – ident: ref25 doi: 10.1016/j.ins.2018.04.018 – volume: 91 start-page: 2049 year: 2018 ident: ref26 article-title: Resilient observer-based control for networked nonlinear T-S fuzzy systems with hybrid-triggered scheme publication-title: Nonlinear Dyn doi: 10.1007/s11071-017-4002-3 – ident: ref6 doi: 10.1016/j.jfranklin.2015.12.009 – ident: ref2 doi: 10.1109/TSMC.2016.2572145 – ident: ref14 doi: 10.1016/j.automatica.2017.10.014 – ident: ref46 doi: 10.1016/S0165-0114(98)00360-1 – ident: ref38 doi: 10.1016/0167-6911(92)90097-C – ident: ref13 doi: 10.1109/TIE.2014.2351379 – ident: ref8 doi: 10.1016/j.ins.2015.06.034 – ident: ref15 doi: 10.1109/TIE.2015.2475515 – ident: ref4 doi: 10.1016/j.fss.2009.10.025 – ident: ref11 doi: 10.1016/j.fss.2016.12.011 – ident: ref36 doi: 10.1016/j.jfranklin.2014.10.004 – ident: ref35 doi: 10.1016/S0005-1098(03)00151-1 – ident: ref1 doi: 10.1109/TFUZZ.2016.2612266 – volume: 355 start-page: 406 year: 2018 ident: ref31 article-title: Centralized security-guaranteed filtering in multirate-sensor fusion under deception attacks publication-title: Automatica – ident: ref27 doi: 10.1109/TNNLS.2015.2397935 – ident: ref40 doi: 10.1109/TAC.2004.828317 – ident: ref7 doi: 10.1016/j.neucom.2015.12.049 – volume: 47 start-page: 11 932 year: 2014 ident: ref28 article-title: Distributed detection of cyber attacks and faults for power systems publication-title: Proc World Congr Int Fed Autom Control – ident: ref23 doi: 10.1016/j.automatica.2017.02.029 – ident: ref21 doi: 10.1016/j.jfranklin.2017.10.007 – volume: 39 start-page: 503 year: 2009 ident: ref39 article-title: Delay-distribution-dependent stability and stabilization of T-S fuzzy systems with probabilistic interval delay publication-title: IEEE Trans Syst Man Cybern B Cybern doi: 10.1109/TSMCB.2008.2007496 – ident: ref24 doi: 10.1016/j.automatica.2015.11.008 – ident: ref3 doi: 10.1109/TSMC.1985.6313399 – ident: ref43 doi: 10.1109/TFUZZ.2012.2199994 – ident: ref20 doi: 10.1049/iet-cta.2016.0392 – ident: ref22 doi: 10.1016/j.amc.2017.09.007 – ident: ref37 doi: 10.1016/j.neucom.2016.09.009 – ident: ref34 doi: 10.1016/j.jfranklin.2016.05.019 – ident: ref10 doi: 10.1016/j.isatra.2017.05.001 |
SSID | ssj0014518 |
Score | 2.6226501 |
Snippet | This paper examines quantized stabilization for Takagi-Sugeno (T-S) fuzzy systems with a hybrid-triggered mechanism and stochastic cyber-attacks. A... This paper examines quantized stabilization for Takagi–Sugeno (T–S) fuzzy systems with a hybrid-triggered mechanism and stochastic cyber-attacks. A... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 3820 |
SubjectTerms | Control stability Control systems Cybersecurity Fuzzy systems Hybrid systems Hybrid-triggered scheme Mathematical analysis Mathematical model Matrix methods networked control systems (NCSs) Nonlinear systems Quantization (signal) Stabilization stochastic cyber-attacks Stochastic processes Symmetric matrices Takagi–Sugeno (T–S) fuzzy systems Theorems |
Title | Quantized Stabilization for T-S Fuzzy Systems With Hybrid-Triggered Mechanism and Stochastic Cyber-Attacks |
URI | https://ieeexplore.ieee.org/document/8392788 https://www.proquest.com/docview/2147745120 |
Volume | 26 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTxsxEB4Bp_bAuyJAkQ-9FYd9eB8-ItQoqhQk1EQgLiu_FkLbpAq7h-TXM7PrjSqKUC-rXcm2rP3Gnhl7vhmAL6EqSx0LzSm3HBcGH0pkCQKitIx1blwTVTm6TocT8f0uuduA8zUXxjnXBJ-5Pr02d_l2bmo6KrsgZY4u2yZs4rPlaq1vDEQStrS3NOZpFqQdQSaQF-PB5P6eorjyPm7GMvNHKJ0Saqqq_LMVN_plsAOjbmZtWMnPfl3pvlm9Str4v1PfhW1vaLLLVjL2YMPN9mGnK-LA_Jreh49_ZSQ8gKebGn_1dOUsQzOUAmdbmiZD25aN-Q82qFerJfN5ztnttHpkwyWxvvgY_fwHqvzJRo7oxNPn30zNaJw5flI6aHa11G7BL6uKiP2HMBl8G18NuS_HwE0kk4rbsERtL6LQ2RR3yCDUKrfa5oHRkUkpnCbKQyMyUdo4d2kqpTMyMblFl0aJII4_wdZsPnNHwKRO0FXRdOWXC2VLqaRDU9NoYYXTQvUg7PApjM9VTiUzfhWNzxLIosG0IEwLj2kPvq77_Gkzdbzb-oBAWrf0-PTgtBODwi_m54JKOWUoX1Fw_HavE_hAY7dRLqewVS1q9xltlUqfNUL6AhZC5bE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB6V9gA9UGhBXSjgAzfwNg_n4WNVsdqWbiVEVlS9RH4Flra7VZscdn89M4mzQoAqLlEi2YmVb-yZseebAXgfqqrSsdCccstxYfCiRJYgIErLWOfGtVGVk_N0PBWnF8nFBnxcc2Gcc23wmRvSbXuWbxemoa2yQ1Lm6LI9gi3U-0nYsbXWZwYiCTviWxrzNAvSniITyMNiNL28pDiufIjLscz8Jkqvhtq6Kn8txq2GGe3ApB9bF1hyNWxqPTSrP9I2_u_gn8FTb2qyo042nsOGm-_CTl_GgflZvQvbv-Uk3IOfXxr82bOVswwNUQqd7YiaDK1bVvCvbNSsVkvmM52zb7P6BxsviffFC_T0v1PtTzZxRCie3d8wNaf3LPCREkKz46V2d_yorona_wKmo0_F8Zj7ggzcRDKpuQ0r1PciCp1NcY0MQq1yq20eGB2ZlAJqojw0IhOVjXOXplI6IxOTW3RqlAji-CVszhdztw9M6gSdFU2HfrlQtpJKOjQ2jRZWOC3UAMIen9L4bOVUNOO6bL2WQJYtpiVhWnpMB_Bh3ee2y9XxYOs9Amnd0uMzgINeDEo_ne9LKuaUoXxFwat_93oHj8fF5Kw8Ozn__Bqe0He6mJcD2KzvGvcGLZdav20F9hc39-j6 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Quantized+Stabilization+for+T%E2%80%93S+Fuzzy+Systems+With+Hybrid-Triggered+Mechanism+and+Stochastic+Cyber-Attacks&rft.jtitle=IEEE+transactions+on+fuzzy+systems&rft.au=Liu%2C+Jinliang&rft.au=Wei%2C+Lili&rft.au=Xie%2C+Xiangpeng&rft.au=Tian%2C+Engang&rft.date=2018-12-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1063-6706&rft.eissn=1941-0034&rft.volume=26&rft.issue=6&rft.spage=3820&rft_id=info:doi/10.1109%2FTFUZZ.2018.2849702&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1063-6706&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1063-6706&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1063-6706&client=summon |