Sliding Mode Control for Nonlinear Markovian Jump Systems Under Denial-of-Service Attacks

来源 :自动化学报:英文版 | 被引量 : 0次 | 上传用户:xy255c
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
This paper investigates the sliding mode control(SMC) problem for a class of discrete-time nonlinear networked Markovian jump systems(MJSs) in the presence of probabilistic denial-of-service(Do S) attacks. The communication network via which the data is p
其他文献
In order to improve detection system robustness and reliability, multi-sensors fusion is used in modern air combat. In this paper, a data fusion method based on
Group role assignment(GRA)is originally a complex problem in role-based collaboration(RBC).The solution to GRA provides modelling techniques for more complex pr
Location estimation of underwater sensor networks(USNs)has become a critical technology,due to its fundamental role in the sensing,communication and control of
In this paper,we propose an improved torque sensorless speed control method for electric assisted bicycle,this method considers the coordinate conversion.A low-
In recent years, reconstructing a sparse map from a simultaneous localization and mapping(SLAM) system on a conventional CPU has undergone remarkable progress.
The stabilization problem of distributed proportional-integral-derivative(PID)controllers for general first-order multi-agent systems with time delay is investi
In a passive ultra-high frequency(UHF) radio frequency identification(RFID) system, the recovery of collided tag signals on a physical layer can enhance identification efficiency. However, frequency d
The M?ller algorithm is a self-stabilizing minor component analysis algorithm.This research document involves the study of the convergence and dynamic character
In the cyber-physical environment,the clock synchronization algorithm is required to have better expansion for network scale.In this paper,a new measurement mod
Negative selection algorithm(NSA)is one of the classic artificial immune algorithm widely used in anomaly detection.However,there are still unsolved shortcoming