Security Sampled-Data-Based H Control for Interval Type-2 Fuzzy Systems via SML Algorithm and Its Applications

This article focuses on the issues of security sampled-data-based <inline-formula><tex-math notation="LaTeX">H_{\infty }</tex-math></inline-formula> control design for interval type-2 Takagi-Sugeno fuzzy systems against false-data injection attacks and external dist...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on fuzzy systems Vol. 33; no. 8; pp. 2704 - 2718
Main Authors Anbalagan, Pratap, Zhu, Bohao, Feng, Zhiguang, Huang, Tingwen, Cui, Yukang
Format Journal Article
LanguageEnglish
Published IEEE 01.08.2025
Subjects
Online AccessGet full text
ISSN1063-6706
1941-0034
DOI10.1109/TFUZZ.2025.3573507

Cover

More Information
Summary:This article focuses on the issues of security sampled-data-based <inline-formula><tex-math notation="LaTeX">H_{\infty }</tex-math></inline-formula> control design for interval type-2 Takagi-Sugeno fuzzy systems against false-data injection attacks and external disturbances using a supervision of machine learning (SML) algorithm. To improve the bounds of sampled data period, an SML algorithm is proposed to optimize the allocation of network resources and ensure the effective utilization of bandwidth. Besides, two improved integral inequalities are introduced to estimate the integral quadratic terms that account for signal transmission delays and sampling information. Meanwhile, an appropriate asymmetric looped Lyapunov-Krasovskii functional (ALLKF) is constructed incorporating information on the fuzzy membership function, aperiodic sampling pattern, and transmission delays to facilitate model conservativeness. Next, based on the constructed fuzzy ALLKF along with the proposed inequalities, a set of necessary conditions for achieving asymptotic stability with <inline-formula><tex-math notation="LaTeX">H_{\infty }</tex-math></inline-formula> performance is derived through linear matrix inequalities, and then control parameters can be obtained to guarantee the less conservative stabilization results of considered closed-loop systems. Finally, to verify the superiority and feasibility of the proposed theoretical observations, the hacked permanent magnet synchronous generator-based wind energy system is numerically validated. In addition, comparative examples are presented to demonstrate the improved conservativeness of the proposed technique.
ISSN:1063-6706
1941-0034
DOI:10.1109/TFUZZ.2025.3573507