Security Sampled-Data-Based H Control for Interval Type-2 Fuzzy Systems via SML Algorithm and Its Applications
This article focuses on the issues of security sampled-data-based <inline-formula><tex-math notation="LaTeX">H_{\infty }</tex-math></inline-formula> control design for interval type-2 Takagi-Sugeno fuzzy systems against false-data injection attacks and external dist...
Saved in:
| Published in | IEEE transactions on fuzzy systems Vol. 33; no. 8; pp. 2704 - 2718 |
|---|---|
| Main Authors | , , , , |
| Format | Journal Article |
| Language | English |
| Published |
IEEE
01.08.2025
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 1063-6706 1941-0034 |
| DOI | 10.1109/TFUZZ.2025.3573507 |
Cover
| Summary: | This article focuses on the issues of security sampled-data-based <inline-formula><tex-math notation="LaTeX">H_{\infty }</tex-math></inline-formula> control design for interval type-2 Takagi-Sugeno fuzzy systems against false-data injection attacks and external disturbances using a supervision of machine learning (SML) algorithm. To improve the bounds of sampled data period, an SML algorithm is proposed to optimize the allocation of network resources and ensure the effective utilization of bandwidth. Besides, two improved integral inequalities are introduced to estimate the integral quadratic terms that account for signal transmission delays and sampling information. Meanwhile, an appropriate asymmetric looped Lyapunov-Krasovskii functional (ALLKF) is constructed incorporating information on the fuzzy membership function, aperiodic sampling pattern, and transmission delays to facilitate model conservativeness. Next, based on the constructed fuzzy ALLKF along with the proposed inequalities, a set of necessary conditions for achieving asymptotic stability with <inline-formula><tex-math notation="LaTeX">H_{\infty }</tex-math></inline-formula> performance is derived through linear matrix inequalities, and then control parameters can be obtained to guarantee the less conservative stabilization results of considered closed-loop systems. Finally, to verify the superiority and feasibility of the proposed theoretical observations, the hacked permanent magnet synchronous generator-based wind energy system is numerically validated. In addition, comparative examples are presented to demonstrate the improved conservativeness of the proposed technique. |
|---|---|
| ISSN: | 1063-6706 1941-0034 |
| DOI: | 10.1109/TFUZZ.2025.3573507 |