检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]上海理工大学理学院,上海 [2]上海理工大学光电信息与计算机工程学院,上海
出 处:《建模与仿真》2023年第3期1908-1925,共18页Modeling and Simulation
摘 要:本文研究了一类在测量输出端带有欺骗攻击的区间二型T-S模糊系统模糊模型预测控制(FMPC)的安全问题。针对不可测的系统状态、系统的非线性和欺骗攻击的破坏性,采用了FMPC框架下的动态输出反馈控制,同时提出了无穷时域上的最坏情况的优化问题,进行性能分析和控制综合。利用二次函数方法和奇异值分解技术,解决了变量之间耦合引起的非凸性,并导出了满足终端约束集的条件。此外,为了减轻攻击对递推可行性的破坏,引入了特殊标量,应用了不等式分析技术。在此基础上提出了一个具有可解性的辅助优化问题来求出所需的控制器,并得到了保证在基于FMPC的控制器下控制系统在H2意义上是均方安全的充分条件。最后,通过一个算例证明了所提方法的有效性。This paper studies the security of fuzzy model predictive control (FMPC) for a class of interval type-2 T-S fuzzy systems with deception attack at the measurement output. Aiming at the unmeasurable system state, the nonlinearity of the system and the destructiveness of the deception attack, the dynamic output feedback control under the FMPC framework is adopted, and the optimization problem of the worst case in the infinite time domain is proposed for performance analysis and control synthesis. By using the quadratic function method and singular value decomposition tech-nique, the non-convexity caused by the coupling between variables is solved, and the conditions to satisfy the terminal constraint set are derived. In addition, in order to reduce the damage of attack to the recursion feasibility, a special scalar is introduced and inequality analysis technology is ap-plied. On this basis, a solvable auxiliary optimization problem is proposed to find the required con-troller, and a sufficient condition is obtained to ensure that the control system is mean square safe in the sense of H2 under the FMPC-based controller. Finally, an example is given to demonstrate the effectiveness of the proposed method.
关 键 词:动态输出反馈 安全控制 奇异值分解 欺骗攻击 控制系统 二次函数 模糊模型预测 可解性
分 类 号:TP3[自动化与计算机技术—计算机科学与技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.49