Discrete-time event-triggered H-infinity stabilization for three closed-loop cyber-physical system with uncertain delay
Z Du, C Zhang, X Yang, H Ye, J Li - Applied Mathematics and Computation, 2025 - Elsevier
This paper investigates the problems of modeling and H∞ control for discrete three closed-
loop cyber-physical system (CPS) with network delay, disturbance, and event-triggered …
loop cyber-physical system (CPS) with network delay, disturbance, and event-triggered …
Robust frequency control based on sliding mode control with lmi in an island microgrid
BA Notchum Deffo, A Bakouri - International Journal of Dynamics and …, 2024 - Springer
Given the negative impact of electricity production on the environment, the development of
smart grids and microgrids using non-polluting renewable sources is recommended …
smart grids and microgrids using non-polluting renewable sources is recommended …
Event‐triggered networked cascade control systems design subject to hybrid attacks
This paper deals with the design problem of networked cascade control systems (NCCSs)
with two different event‐triggered mechanisms (ETMs) for the feedback loops. A combination …
with two different event‐triggered mechanisms (ETMs) for the feedback loops. A combination …
Cyber-Resilient Converter Control System for Doubly Fed Induction Generator-Based Wind Turbine Generators
N Farrar, MH Ali - Electronics, 2024 - mdpi.com
As wind turbine generator systems become more common in the modern power grid, the
question of how to adequately protect them from cyber criminals has become a major theme …
question of how to adequately protect them from cyber criminals has become a major theme …
[PDF][PDF] Attack-Dependent Adaptive Event-Triggered Security Fuzzy Control for Nonlinear Networked Cascade Control Systems Under Deception Attacks.
XM Liu, XH Chang, LW Hou - Mathematics (2227-7390), 2024 - researchgate.net
This article investigates the issue of H∞ security output feedback control for a nonlinear
networked cascade control system with deception attacks. First, to further reduce the amount …
networked cascade control system with deception attacks. First, to further reduce the amount …
[HTML][HTML] Robust H∞ control of singular networked cascade control systems with norm-bounded uncertainty and periodic DoS attack
In this article, the topic of event-triggered H∞ control is investigated for a singular networked
cascade control system (SNCCS) under periodic DoS attacks, norm-bounded uncertainty …
cascade control system (SNCCS) under periodic DoS attacks, norm-bounded uncertainty …
Stealthy FDI attacks on modified Kalman filtering in complex networks with non-Gaussian-Lévy noise
W Yuan, T Tong, Q Dong, J Sun - Chaos, Solitons & Fractals, 2024 - Elsevier
This paper investigates the problem of network security for stealthy false data injection (FDI)
attacks under modified Kalman filtering (MKF) over complex networks with non-Gaussian …
attacks under modified Kalman filtering (MKF) over complex networks with non-Gaussian …
Event‐Triggered Integral Sliding Mode Control for Nonlinear Networked Cascade Control Systems With Uncertain Delay
Z Du, H Wang, J Li, X Yang, H Ye - International Journal of …, 2024 - Wiley Online Library
This article investigates the problem of event‐triggered integral sliding mode control (ISMC)
for a class of nonlinear networked cascade control systems (NCCSs). Due to the limited …
for a class of nonlinear networked cascade control systems (NCCSs). Due to the limited …
stabilization of singular networked cascade control systems subject to periodic DoS attack
In this paper, a H∞ controller with an event-triggered mechanism is designed for a singular
networked cascade control system (SNCCS) under periodic denial-of-service (DoS) attacks …
networked cascade control system (SNCCS) under periodic denial-of-service (DoS) attacks …
Relay based modelling of cascaded systems with propagation delay
S Pandey - IFAC-PapersOnLine, 2024 - Elsevier
In this paper, a relay feedback approach is presented for frequency domain based modelling
and identification of cascaded systems. Using asymmetrical relay as an identification tool, a …
and identification of cascaded systems. Using asymmetrical relay as an identification tool, a …