File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Security Sampled-Data-Based H∞ Control for Interval Type-2 Fuzzy Systems via SML Algorithm and its Applications

TitleSecurity Sampled-Data-Based H∞ Control for Interval Type-2 Fuzzy Systems via SML Algorithm and its Applications
Authors
KeywordsAnd aperiodic sampling information
asymmetric looped functional
false-data injection attacks
interval type-2 fuzzy systems
transmission delay
Issue Date30-May-2025
PublisherInstitute of Electrical and Electronics Engineers
Citation
IEEE Transactions on Fuzzy Systems, 2025 How to Cite?
Abstract

This article focuses on the issues of security sampled-data-based H∞ control design for interval type-2 (IT2) Takagi-Sugeno (T-S) fuzzy systems against false-data injection (FDI) attacks and external disturbances using a supervision of machine learning (SML) algorithm. To improve the bounds of sampled data period, an SML algorithm is proposed to optimize the allocation of network resources and ensure the effective utilization of bandwidth. Besides, two improved integral inequalities are introduced to estimate the integral quadratic terms that account for signal transmission delays and sampling information. Meanwhile, an appropriate asymmetric looped Lyapunov-Krasovskii functional (ALLKF) is constructed incorporating information on the fuzzy membership function (FMF), aperiodic sampling pattern, and transmission delays to facilitate model conservativeness. Next, based on the constructed fuzzy ALLKF along with the proposed inequalities, a set of necessary conditions for achieving asymptotic stability with H∞ performance is derived through linear matrix inequalities (LMIs), and then control parameters can be obtained to guarantee the less conservative stabilization results of considered closed-loop systems. Finally, to verify the superiority and feasibility of the proposed theoretical observations, the hacked permanent magnet synchronous generator (PMSG)-based wind energy system (WES) is numerically validated. Additionally, comparative examples are presented to demonstrate the improved conservativeness of the proposed technique.


Persistent Identifierhttp://hdl.handle.net/10722/357655
ISSN
2023 Impact Factor: 10.7
2023 SCImago Journal Rankings: 4.204

 

DC FieldValueLanguage
dc.contributor.authorAnbalagan, Pratap-
dc.contributor.authorZhu, Bohao-
dc.contributor.authorFeng, Zhiguang-
dc.contributor.authorHuang, Tingwen-
dc.contributor.authorCui, Yukang-
dc.date.accessioned2025-07-22T03:14:06Z-
dc.date.available2025-07-22T03:14:06Z-
dc.date.issued2025-05-30-
dc.identifier.citationIEEE Transactions on Fuzzy Systems, 2025-
dc.identifier.issn1063-6706-
dc.identifier.urihttp://hdl.handle.net/10722/357655-
dc.description.abstract<p>This article focuses on the issues of security sampled-data-based H∞ control design for interval type-2 (IT2) Takagi-Sugeno (T-S) fuzzy systems against false-data injection (FDI) attacks and external disturbances using a supervision of machine learning (SML) algorithm. To improve the bounds of sampled data period, an SML algorithm is proposed to optimize the allocation of network resources and ensure the effective utilization of bandwidth. Besides, two improved integral inequalities are introduced to estimate the integral quadratic terms that account for signal transmission delays and sampling information. Meanwhile, an appropriate asymmetric looped Lyapunov-Krasovskii functional (ALLKF) is constructed incorporating information on the fuzzy membership function (FMF), aperiodic sampling pattern, and transmission delays to facilitate model conservativeness. Next, based on the constructed fuzzy ALLKF along with the proposed inequalities, a set of necessary conditions for achieving asymptotic stability with H∞ performance is derived through linear matrix inequalities (LMIs), and then control parameters can be obtained to guarantee the less conservative stabilization results of considered closed-loop systems. Finally, to verify the superiority and feasibility of the proposed theoretical observations, the hacked permanent magnet synchronous generator (PMSG)-based wind energy system (WES) is numerically validated. Additionally, comparative examples are presented to demonstrate the improved conservativeness of the proposed technique.</p>-
dc.languageeng-
dc.publisherInstitute of Electrical and Electronics Engineers-
dc.relation.ispartofIEEE Transactions on Fuzzy Systems-
dc.subjectAnd aperiodic sampling information-
dc.subjectasymmetric looped functional-
dc.subjectfalse-data injection attacks-
dc.subjectinterval type-2 fuzzy systems-
dc.subjecttransmission delay-
dc.titleSecurity Sampled-Data-Based H∞ Control for Interval Type-2 Fuzzy Systems via SML Algorithm and its Applications-
dc.typeArticle-
dc.identifier.doi10.1109/TFUZZ.2025.3573507-
dc.identifier.scopuseid_2-s2.0-105007883146-
dc.identifier.eissn1941-0034-
dc.identifier.issnl1063-6706-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats